| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/proxy/proxy_bypass_rules.h" | 5 #include "net/proxy/proxy_bypass_rules.h" |
| 6 | 6 |
| 7 #include "base/stl_util.h" | 7 #include "base/stl_util.h" |
| 8 #include "base/strings/pattern.h" | 8 #include "base/strings/pattern.h" |
| 9 #include "base/strings/string_number_conversions.h" | 9 #include "base/strings/string_number_conversions.h" |
| 10 #include "base/strings/string_piece.h" | 10 #include "base/strings/string_piece.h" |
| 11 #include "base/strings/string_tokenizer.h" | 11 #include "base/strings/string_tokenizer.h" |
| 12 #include "base/strings/string_util.h" | 12 #include "base/strings/string_util.h" |
| 13 #include "base/strings/stringprintf.h" | 13 #include "base/strings/stringprintf.h" |
| 14 #include "net/base/host_port_pair.h" | 14 #include "net/base/host_port_pair.h" |
| 15 #include "net/base/ip_address_number.h" | 15 #include "net/base/ip_address.h" |
| 16 #include "net/base/url_util.h" | 16 #include "net/base/url_util.h" |
| 17 | 17 |
| 18 namespace net { | 18 namespace net { |
| 19 | 19 |
| 20 namespace { | 20 namespace { |
| 21 | 21 |
| 22 class HostnamePatternRule : public ProxyBypassRules::Rule { | 22 class HostnamePatternRule : public ProxyBypassRules::Rule { |
| 23 public: | 23 public: |
| 24 HostnamePatternRule(const std::string& optional_scheme, | 24 HostnamePatternRule(const std::string& optional_scheme, |
| 25 const std::string& hostname_pattern, | 25 const std::string& hostname_pattern, |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 77 }; | 77 }; |
| 78 | 78 |
| 79 // Rule for matching a URL that is an IP address, if that IP address falls | 79 // Rule for matching a URL that is an IP address, if that IP address falls |
| 80 // within a certain numeric range. For example, you could use this rule to | 80 // within a certain numeric range. For example, you could use this rule to |
| 81 // match all the IPs in the CIDR block 10.10.3.4/24. | 81 // match all the IPs in the CIDR block 10.10.3.4/24. |
| 82 class BypassIPBlockRule : public ProxyBypassRules::Rule { | 82 class BypassIPBlockRule : public ProxyBypassRules::Rule { |
| 83 public: | 83 public: |
| 84 // |ip_prefix| + |prefix_length| define the IP block to match. | 84 // |ip_prefix| + |prefix_length| define the IP block to match. |
| 85 BypassIPBlockRule(const std::string& description, | 85 BypassIPBlockRule(const std::string& description, |
| 86 const std::string& optional_scheme, | 86 const std::string& optional_scheme, |
| 87 const IPAddressNumber& ip_prefix, | 87 const IPAddress& ip_prefix, |
| 88 size_t prefix_length_in_bits) | 88 size_t prefix_length_in_bits) |
| 89 : description_(description), | 89 : description_(description), |
| 90 optional_scheme_(optional_scheme), | 90 optional_scheme_(optional_scheme), |
| 91 ip_prefix_(ip_prefix), | 91 ip_prefix_(ip_prefix), |
| 92 prefix_length_in_bits_(prefix_length_in_bits) { | 92 prefix_length_in_bits_(prefix_length_in_bits) {} |
| 93 } | |
| 94 | 93 |
| 95 bool Matches(const GURL& url) const override { | 94 bool Matches(const GURL& url) const override { |
| 96 if (!url.HostIsIPAddress()) | 95 if (!url.HostIsIPAddress()) |
| 97 return false; | 96 return false; |
| 98 | 97 |
| 99 if (!optional_scheme_.empty() && url.scheme() != optional_scheme_) | 98 if (!optional_scheme_.empty() && url.scheme() != optional_scheme_) |
| 100 return false; // Didn't match scheme expectation. | 99 return false; // Didn't match scheme expectation. |
| 101 | 100 |
| 102 // Parse the input IP literal to a number. | 101 // Parse the input IP literal to a number. |
| 103 IPAddressNumber ip_number; | 102 IPAddress ip_address; |
| 104 if (!ParseIPLiteralToNumber(url.HostNoBrackets(), &ip_number)) | 103 if (!ip_address.AssignFromIPLiteral(url.HostNoBrackets())) |
| 105 return false; | 104 return false; |
| 106 | 105 |
| 107 // Test if it has the expected prefix. | 106 // Test if it has the expected prefix. |
| 108 return IPNumberMatchesPrefix(ip_number, ip_prefix_, | 107 return IPAddressMatchesPrefix(ip_address, ip_prefix_, |
| 109 prefix_length_in_bits_); | 108 prefix_length_in_bits_); |
| 110 } | 109 } |
| 111 | 110 |
| 112 std::string ToString() const override { return description_; } | 111 std::string ToString() const override { return description_; } |
| 113 | 112 |
| 114 Rule* Clone() const override { | 113 Rule* Clone() const override { |
| 115 return new BypassIPBlockRule(description_, | 114 return new BypassIPBlockRule(description_, |
| 116 optional_scheme_, | 115 optional_scheme_, |
| 117 ip_prefix_, | 116 ip_prefix_, |
| 118 prefix_length_in_bits_); | 117 prefix_length_in_bits_); |
| 119 } | 118 } |
| 120 | 119 |
| 121 private: | 120 private: |
| 122 const std::string description_; | 121 const std::string description_; |
| 123 const std::string optional_scheme_; | 122 const std::string optional_scheme_; |
| 124 const IPAddressNumber ip_prefix_; | 123 const IPAddress ip_prefix_; |
| 125 const size_t prefix_length_in_bits_; | 124 const size_t prefix_length_in_bits_; |
| 126 }; | 125 }; |
| 127 | 126 |
| 128 // Returns true if the given string represents an IP address. | 127 // Returns true if the given string represents an IP address. |
| 129 // IPv6 addresses are expected to be bracketed. | 128 // IPv6 addresses are expected to be bracketed. |
| 130 bool IsIPAddress(const std::string& domain) { | 129 bool IsIPAddress(const std::string& domain) { |
| 131 // From GURL::HostIsIPAddress() | 130 // From GURL::HostIsIPAddress() |
| 132 url::RawCanonOutputT<char, 128> ignored_output; | 131 url::RawCanonOutputT<char, 128> ignored_output; |
| 133 url::CanonHostInfo host_info; | 132 url::CanonHostInfo host_info; |
| 134 url::Component domain_comp(0, domain.size()); | 133 url::Component domain_comp(0, domain.size()); |
| (...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 277 if (scheme.empty()) | 276 if (scheme.empty()) |
| 278 return false; | 277 return false; |
| 279 } | 278 } |
| 280 | 279 |
| 281 if (raw.empty()) | 280 if (raw.empty()) |
| 282 return false; | 281 return false; |
| 283 | 282 |
| 284 // If there is a forward slash in the input, it is probably a CIDR style | 283 // If there is a forward slash in the input, it is probably a CIDR style |
| 285 // mask. | 284 // mask. |
| 286 if (raw.find('/') != std::string::npos) { | 285 if (raw.find('/') != std::string::npos) { |
| 287 IPAddressNumber ip_prefix; | 286 IPAddress ip_prefix; |
| 288 size_t prefix_length_in_bits; | 287 size_t prefix_length_in_bits; |
| 289 | 288 |
| 290 if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits)) | 289 if (!ParseCIDRBlock(raw, ip_prefix, prefix_length_in_bits)) |
| 291 return false; | 290 return false; |
| 292 | 291 |
| 293 rules_.push_back( | 292 rules_.push_back( |
| 294 new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)); | 293 new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)); |
| 295 | 294 |
| 296 return true; | 295 return true; |
| 297 } | 296 } |
| 298 | 297 |
| 299 // Check if we have an <ip-address>[:port] input. We need to treat this | 298 // Check if we have an <ip-address>[:port] input. We need to treat this |
| 300 // separately since the IP literal may not be in a canonical form. | 299 // separately since the IP literal may not be in a canonical form. |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 344 return AddRuleForHostname(scheme, raw, port); | 343 return AddRuleForHostname(scheme, raw, port); |
| 345 } | 344 } |
| 346 | 345 |
| 347 bool ProxyBypassRules::AddRuleFromStringInternalWithLogging( | 346 bool ProxyBypassRules::AddRuleFromStringInternalWithLogging( |
| 348 const std::string& raw, | 347 const std::string& raw, |
| 349 bool use_hostname_suffix_matching) { | 348 bool use_hostname_suffix_matching) { |
| 350 return AddRuleFromStringInternal(raw, use_hostname_suffix_matching); | 349 return AddRuleFromStringInternal(raw, use_hostname_suffix_matching); |
| 351 } | 350 } |
| 352 | 351 |
| 353 } // namespace net | 352 } // namespace net |
| OLD | NEW |