| Index: chrome/browser/intranet_redirect_detector.cc
|
| ===================================================================
|
| --- chrome/browser/intranet_redirect_detector.cc (revision 0)
|
| +++ chrome/browser/intranet_redirect_detector.cc (revision 0)
|
| @@ -0,0 +1,171 @@
|
| +// Copyright (c) 2010 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/intranet_redirect_detector.h"
|
| +
|
| +#include "base/rand_util.h"
|
| +#include "base/stl_util-inl.h"
|
| +#include "base/utf_string_conversions.h"
|
| +#include "chrome/browser/browser_process.h"
|
| +#include "chrome/browser/profile.h"
|
| +#include "chrome/common/notification_service.h"
|
| +#include "chrome/common/pref_names.h"
|
| +#include "chrome/common/pref_service.h"
|
| +#include "net/base/load_flags.h"
|
| +#include "net/base/net_errors.h"
|
| +#include "net/base/registry_controlled_domain.h"
|
| +#include "net/url_request/url_request_status.h"
|
| +
|
| +const size_t IntranetRedirectDetector::kNumCharsInHostnames = 10;
|
| +
|
| +IntranetRedirectDetector::IntranetRedirectDetector()
|
| + : redirect_origin_(WideToUTF8(g_browser_process->local_state()->GetString(
|
| + prefs::kLastKnownIntranetRedirectOrigin))),
|
| + ALLOW_THIS_IN_INITIALIZER_LIST(fetcher_factory_(this)),
|
| + in_startup_sleep_(true),
|
| + request_context_available_(!!Profile::GetDefaultRequestContext()) {
|
| + registrar_.Add(this, NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
|
| + NotificationService::AllSources());
|
| +
|
| + // Because this function can be called during startup, when kicking off a URL
|
| + // fetch can eat up 20 ms of time, we delay seven seconds, which is hopefully
|
| + // long enough to be after startup, but still get results back quickly.
|
| + // Ideally, instead of this timer, we'd do something like "check if the
|
| + // browser is starting up, and if so, come back later", but there is currently
|
| + // no function to do this.
|
| + static const int kStartFetchDelayMS = 7000;
|
| + MessageLoop::current()->PostDelayedTask(FROM_HERE,
|
| + fetcher_factory_.NewRunnableMethod(
|
| + &IntranetRedirectDetector::FinishSleep),
|
| + kStartFetchDelayMS);
|
| +}
|
| +
|
| +IntranetRedirectDetector::~IntranetRedirectDetector() {
|
| + STLDeleteElements(&fetchers_);
|
| +}
|
| +
|
| +// static
|
| +GURL IntranetRedirectDetector::RedirectOrigin() {
|
| + const IntranetRedirectDetector* const detector =
|
| + g_browser_process->intranet_redirect_detector();
|
| + return detector ? detector->redirect_origin_ : GURL();
|
| +}
|
| +
|
| +// static
|
| +void IntranetRedirectDetector::RegisterPrefs(PrefService* prefs) {
|
| + prefs->RegisterStringPref(prefs::kLastKnownIntranetRedirectOrigin,
|
| + std::wstring());
|
| +}
|
| +
|
| +void IntranetRedirectDetector::FinishSleep() {
|
| + in_startup_sleep_ = false;
|
| + StartFetchesIfPossible();
|
| +}
|
| +
|
| +void IntranetRedirectDetector::StartFetchesIfPossible() {
|
| + // Bail if a fetch isn't appropriate right now. This function will be called
|
| + // again each time one of the preconditions changes, so we'll fetch
|
| + // immediately once all of them are met.
|
| + if (in_startup_sleep_ || !request_context_available_)
|
| + return;
|
| +
|
| + // We shouldn't somehow run twice.
|
| + DCHECK(fetchers_.empty() && resulting_origins_.empty());
|
| +
|
| + // Start three fetchers on random hostnames.
|
| + for (size_t i = 0; i < 3; ++i) {
|
| + std::string url_string("http://");
|
| + for (size_t j = 0; j < kNumCharsInHostnames; ++j)
|
| + url_string += ('a' + base::RandInt(0, 'z' - 'a'));
|
| + GURL random_url(url_string + '/');
|
| + URLFetcher* fetcher = new URLFetcher(random_url, URLFetcher::HEAD, this);
|
| + // We don't want these fetches to affect existing state in the profile.
|
| + fetcher->set_load_flags(net::LOAD_DISABLE_CACHE |
|
| + net::LOAD_DO_NOT_SAVE_COOKIES);
|
| + fetcher->set_request_context(Profile::GetDefaultRequestContext());
|
| + fetcher->Start();
|
| + fetchers_.insert(fetcher);
|
| + }
|
| +}
|
| +
|
| +void IntranetRedirectDetector::OnURLFetchComplete(
|
| + const URLFetcher* source,
|
| + const GURL& url,
|
| + const URLRequestStatus& status,
|
| + int response_code,
|
| + const ResponseCookies& cookies,
|
| + const std::string& data) {
|
| + // Delete the fetcher on this function's exit.
|
| + Fetchers::iterator fetcher = fetchers_.find(const_cast<URLFetcher*>(source));
|
| + DCHECK(fetcher != fetchers_.end());
|
| + scoped_ptr<URLFetcher> clean_up_fetcher(*fetcher);
|
| + fetchers_.erase(fetcher);
|
| +
|
| + // If any two fetches result in the same domain/host, we set the redirect
|
| + // origin to that; otherwise we set it to nothing.
|
| + if (!status.is_success() || (response_code != 200)) {
|
| + if ((resulting_origins_.empty()) ||
|
| + ((resulting_origins_.size() == 1) &&
|
| + resulting_origins_.front().is_valid())) {
|
| + resulting_origins_.push_back(GURL());
|
| + return;
|
| + }
|
| + redirect_origin_ = GURL();
|
| + } else {
|
| + DCHECK(url.is_valid());
|
| + GURL origin(url.GetOrigin());
|
| + if (resulting_origins_.empty()) {
|
| + resulting_origins_.push_back(origin);
|
| + return;
|
| + }
|
| + if (net::RegistryControlledDomainService::SameDomainOrHost(
|
| + resulting_origins_.front(), origin)) {
|
| + redirect_origin_ = origin;
|
| + if (!fetchers_.empty()) {
|
| + // Cancel remaining fetch, we don't need it.
|
| + DCHECK(fetchers_.size() == 1);
|
| + delete (*fetchers_.begin());
|
| + fetchers_.clear();
|
| + }
|
| + }
|
| + if (resulting_origins_.size() == 1) {
|
| + resulting_origins_.push_back(origin);
|
| + return;
|
| + }
|
| + DCHECK(resulting_origins_.size() == 2);
|
| + redirect_origin_ = net::RegistryControlledDomainService::SameDomainOrHost(
|
| + resulting_origins_.back(), origin) ? origin : GURL();
|
| + }
|
| +
|
| + g_browser_process->local_state()->SetString(
|
| + prefs::kLastKnownIntranetRedirectOrigin, redirect_origin_.is_valid() ?
|
| + UTF8ToWide(redirect_origin_.spec()) : std::wstring());
|
| +}
|
| +
|
| +void IntranetRedirectDetector::Observe(NotificationType type,
|
| + const NotificationSource& source,
|
| + const NotificationDetails& details) {
|
| + DCHECK_EQ(NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE, type.value);
|
| + request_context_available_ = true;
|
| + StartFetchesIfPossible();
|
| +}
|
| +
|
| +IntranetRedirectHostResolverProc::IntranetRedirectHostResolverProc(
|
| + net::HostResolverProc* previous)
|
| + : net::HostResolverProc(previous) {
|
| +}
|
| +
|
| +int IntranetRedirectHostResolverProc::Resolve(const std::string& host,
|
| + net::AddressFamily address_family,
|
| + net::AddressList* addrlist) {
|
| + // We'd love to just ask the IntranetRedirectDetector, but we may not be on
|
| + // the same thread. So just use the heuristic that any all-lowercase a-z
|
| + // hostname with the right number of characters is likely from the detector
|
| + // (and thus should be blocked).
|
| + return ((host.length() == IntranetRedirectDetector::kNumCharsInHostnames) &&
|
| + (host.find_first_not_of("abcdefghijklmnopqrstuvwxyz") ==
|
| + std::string::npos)) ?
|
| + net::ERR_NAME_NOT_RESOLVED :
|
| + ResolveUsingPrevious(host, address_family, addrlist);
|
| +}
|
|
|
| Property changes on: chrome/browser/intranet_redirect_detector.cc
|
| ___________________________________________________________________
|
| Added: svn:eol-style
|
| + LF
|
|
|
|
|