| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/proxy/proxy_resolver_v8.h" | |
| 6 | |
| 7 #include <algorithm> | |
| 8 #include <cstdio> | |
| 9 | |
| 10 #include "base/basictypes.h" | |
| 11 #include "base/compiler_specific.h" | |
| 12 #include "base/debug/leak_annotations.h" | |
| 13 #include "base/logging.h" | |
| 14 #include "base/strings/string_tokenizer.h" | |
| 15 #include "base/strings/string_util.h" | |
| 16 #include "base/strings/utf_string_conversions.h" | |
| 17 #include "base/synchronization/lock.h" | |
| 18 #include "gin/array_buffer.h" | |
| 19 #include "gin/public/isolate_holder.h" | |
| 20 #include "net/base/net_errors.h" | |
| 21 #include "net/base/net_log.h" | |
| 22 #include "net/base/net_util.h" | |
| 23 #include "net/proxy/proxy_info.h" | |
| 24 #include "net/proxy/proxy_resolver_script.h" | |
| 25 #include "url/gurl.h" | |
| 26 #include "url/url_canon.h" | |
| 27 #include "v8/include/v8.h" | |
| 28 | |
| 29 // Notes on the javascript environment: | |
| 30 // | |
| 31 // For the majority of the PAC utility functions, we use the same code | |
| 32 // as Firefox. See the javascript library that proxy_resolver_scipt.h | |
| 33 // pulls in. | |
| 34 // | |
| 35 // In addition, we implement a subset of Microsoft's extensions to PAC. | |
| 36 // - myIpAddressEx() | |
| 37 // - dnsResolveEx() | |
| 38 // - isResolvableEx() | |
| 39 // - isInNetEx() | |
| 40 // - sortIpAddressList() | |
| 41 // | |
| 42 // It is worth noting that the original PAC specification does not describe | |
| 43 // the return values on failure. Consequently, there are compatibility | |
| 44 // differences between browsers on what to return on failure, which are | |
| 45 // illustrated below: | |
| 46 // | |
| 47 // --------------------+-------------+-------------------+-------------- | |
| 48 // | Firefox3 | InternetExplorer8 | --> Us <--- | |
| 49 // --------------------+-------------+-------------------+-------------- | |
| 50 // myIpAddress() | "127.0.0.1" | ??? | "127.0.0.1" | |
| 51 // dnsResolve() | null | false | null | |
| 52 // myIpAddressEx() | N/A | "" | "" | |
| 53 // sortIpAddressList() | N/A | false | false | |
| 54 // dnsResolveEx() | N/A | "" | "" | |
| 55 // isInNetEx() | N/A | false | false | |
| 56 // --------------------+-------------+-------------------+-------------- | |
| 57 // | |
| 58 // TODO(eroman): The cell above reading ??? means I didn't test it. | |
| 59 // | |
| 60 // Another difference is in how dnsResolve() and myIpAddress() are | |
| 61 // implemented -- whether they should restrict to IPv4 results, or | |
| 62 // include both IPv4 and IPv6. The following table illustrates the | |
| 63 // differences: | |
| 64 // | |
| 65 // --------------------+-------------+-------------------+-------------- | |
| 66 // | Firefox3 | InternetExplorer8 | --> Us <--- | |
| 67 // --------------------+-------------+-------------------+-------------- | |
| 68 // myIpAddress() | IPv4/IPv6 | IPv4 | IPv4 | |
| 69 // dnsResolve() | IPv4/IPv6 | IPv4 | IPv4 | |
| 70 // isResolvable() | IPv4/IPv6 | IPv4 | IPv4 | |
| 71 // myIpAddressEx() | N/A | IPv4/IPv6 | IPv4/IPv6 | |
| 72 // dnsResolveEx() | N/A | IPv4/IPv6 | IPv4/IPv6 | |
| 73 // sortIpAddressList() | N/A | IPv4/IPv6 | IPv4/IPv6 | |
| 74 // isResolvableEx() | N/A | IPv4/IPv6 | IPv4/IPv6 | |
| 75 // isInNetEx() | N/A | IPv4/IPv6 | IPv4/IPv6 | |
| 76 // -----------------+-------------+-------------------+-------------- | |
| 77 | |
| 78 namespace net { | |
| 79 | |
| 80 namespace { | |
| 81 | |
| 82 // Pseudo-name for the PAC script. | |
| 83 const char kPacResourceName[] = "proxy-pac-script.js"; | |
| 84 // Pseudo-name for the PAC utility script. | |
| 85 const char kPacUtilityResourceName[] = "proxy-pac-utility-script.js"; | |
| 86 | |
| 87 // External string wrapper so V8 can access the UTF16 string wrapped by | |
| 88 // ProxyResolverScriptData. | |
| 89 class V8ExternalStringFromScriptData | |
| 90 : public v8::String::ExternalStringResource { | |
| 91 public: | |
| 92 explicit V8ExternalStringFromScriptData( | |
| 93 const scoped_refptr<ProxyResolverScriptData>& script_data) | |
| 94 : script_data_(script_data) {} | |
| 95 | |
| 96 const uint16_t* data() const override { | |
| 97 return reinterpret_cast<const uint16*>(script_data_->utf16().data()); | |
| 98 } | |
| 99 | |
| 100 size_t length() const override { return script_data_->utf16().size(); } | |
| 101 | |
| 102 private: | |
| 103 const scoped_refptr<ProxyResolverScriptData> script_data_; | |
| 104 DISALLOW_COPY_AND_ASSIGN(V8ExternalStringFromScriptData); | |
| 105 }; | |
| 106 | |
| 107 // External string wrapper so V8 can access a string literal. | |
| 108 class V8ExternalASCIILiteral | |
| 109 : public v8::String::ExternalOneByteStringResource { | |
| 110 public: | |
| 111 // |ascii| must be a NULL-terminated C string, and must remain valid | |
| 112 // throughout this object's lifetime. | |
| 113 V8ExternalASCIILiteral(const char* ascii, size_t length) | |
| 114 : ascii_(ascii), length_(length) { | |
| 115 DCHECK(base::IsStringASCII(ascii)); | |
| 116 } | |
| 117 | |
| 118 const char* data() const override { return ascii_; } | |
| 119 | |
| 120 size_t length() const override { return length_; } | |
| 121 | |
| 122 private: | |
| 123 const char* ascii_; | |
| 124 size_t length_; | |
| 125 DISALLOW_COPY_AND_ASSIGN(V8ExternalASCIILiteral); | |
| 126 }; | |
| 127 | |
| 128 // When creating a v8::String from a C++ string we have two choices: create | |
| 129 // a copy, or create a wrapper that shares the same underlying storage. | |
| 130 // For small strings it is better to just make a copy, whereas for large | |
| 131 // strings there are savings by sharing the storage. This number identifies | |
| 132 // the cutoff length for when to start wrapping rather than creating copies. | |
| 133 const size_t kMaxStringBytesForCopy = 256; | |
| 134 | |
| 135 // Converts a V8 String to a UTF8 std::string. | |
| 136 std::string V8StringToUTF8(v8::Local<v8::String> s) { | |
| 137 int len = s->Length(); | |
| 138 std::string result; | |
| 139 if (len > 0) | |
| 140 s->WriteUtf8(WriteInto(&result, len + 1)); | |
| 141 return result; | |
| 142 } | |
| 143 | |
| 144 // Converts a V8 String to a UTF16 base::string16. | |
| 145 base::string16 V8StringToUTF16(v8::Local<v8::String> s) { | |
| 146 int len = s->Length(); | |
| 147 base::string16 result; | |
| 148 // Note that the reinterpret cast is because on Windows string16 is an alias | |
| 149 // to wstring, and hence has character type wchar_t not uint16_t. | |
| 150 if (len > 0) | |
| 151 s->Write(reinterpret_cast<uint16_t*>(WriteInto(&result, len + 1)), 0, len); | |
| 152 return result; | |
| 153 } | |
| 154 | |
| 155 // Converts an ASCII std::string to a V8 string. | |
| 156 v8::Local<v8::String> ASCIIStringToV8String(v8::Isolate* isolate, | |
| 157 const std::string& s) { | |
| 158 DCHECK(base::IsStringASCII(s)); | |
| 159 return v8::String::NewFromUtf8(isolate, s.data(), v8::String::kNormalString, | |
| 160 s.size()); | |
| 161 } | |
| 162 | |
| 163 // Converts a UTF16 base::string16 (warpped by a ProxyResolverScriptData) to a | |
| 164 // V8 string. | |
| 165 v8::Local<v8::String> ScriptDataToV8String( | |
| 166 v8::Isolate* isolate, const scoped_refptr<ProxyResolverScriptData>& s) { | |
| 167 if (s->utf16().size() * 2 <= kMaxStringBytesForCopy) { | |
| 168 return v8::String::NewFromTwoByte( | |
| 169 isolate, | |
| 170 reinterpret_cast<const uint16_t*>(s->utf16().data()), | |
| 171 v8::String::kNormalString, | |
| 172 s->utf16().size()); | |
| 173 } | |
| 174 return v8::String::NewExternal(isolate, | |
| 175 new V8ExternalStringFromScriptData(s)); | |
| 176 } | |
| 177 | |
| 178 // Converts an ASCII string literal to a V8 string. | |
| 179 v8::Local<v8::String> ASCIILiteralToV8String(v8::Isolate* isolate, | |
| 180 const char* ascii) { | |
| 181 DCHECK(base::IsStringASCII(ascii)); | |
| 182 size_t length = strlen(ascii); | |
| 183 if (length <= kMaxStringBytesForCopy) | |
| 184 return v8::String::NewFromUtf8(isolate, ascii, v8::String::kNormalString, | |
| 185 length); | |
| 186 return v8::String::NewExternal(isolate, | |
| 187 new V8ExternalASCIILiteral(ascii, length)); | |
| 188 } | |
| 189 | |
| 190 // Stringizes a V8 object by calling its toString() method. Returns true | |
| 191 // on success. This may fail if the toString() throws an exception. | |
| 192 bool V8ObjectToUTF16String(v8::Local<v8::Value> object, | |
| 193 base::string16* utf16_result, | |
| 194 v8::Isolate* isolate) { | |
| 195 if (object.IsEmpty()) | |
| 196 return false; | |
| 197 | |
| 198 v8::HandleScope scope(isolate); | |
| 199 v8::Local<v8::String> str_object = object->ToString(isolate); | |
| 200 if (str_object.IsEmpty()) | |
| 201 return false; | |
| 202 *utf16_result = V8StringToUTF16(str_object); | |
| 203 return true; | |
| 204 } | |
| 205 | |
| 206 // Extracts an hostname argument from |args|. On success returns true | |
| 207 // and fills |*hostname| with the result. | |
| 208 bool GetHostnameArgument(const v8::FunctionCallbackInfo<v8::Value>& args, | |
| 209 std::string* hostname) { | |
| 210 // The first argument should be a string. | |
| 211 if (args.Length() == 0 || args[0].IsEmpty() || !args[0]->IsString()) | |
| 212 return false; | |
| 213 | |
| 214 const base::string16 hostname_utf16 = | |
| 215 V8StringToUTF16(v8::Local<v8::String>::Cast(args[0])); | |
| 216 | |
| 217 // If the hostname is already in ASCII, simply return it as is. | |
| 218 if (base::IsStringASCII(hostname_utf16)) { | |
| 219 *hostname = base::UTF16ToASCII(hostname_utf16); | |
| 220 return true; | |
| 221 } | |
| 222 | |
| 223 // Otherwise try to convert it from IDN to punycode. | |
| 224 const int kInitialBufferSize = 256; | |
| 225 url::RawCanonOutputT<base::char16, kInitialBufferSize> punycode_output; | |
| 226 if (!url::IDNToASCII(hostname_utf16.data(), hostname_utf16.length(), | |
| 227 &punycode_output)) { | |
| 228 return false; | |
| 229 } | |
| 230 | |
| 231 // |punycode_output| should now be ASCII; convert it to a std::string. | |
| 232 // (We could use UTF16ToASCII() instead, but that requires an extra string | |
| 233 // copy. Since ASCII is a subset of UTF8 the following is equivalent). | |
| 234 bool success = base::UTF16ToUTF8(punycode_output.data(), | |
| 235 punycode_output.length(), | |
| 236 hostname); | |
| 237 DCHECK(success); | |
| 238 DCHECK(base::IsStringASCII(*hostname)); | |
| 239 return success; | |
| 240 } | |
| 241 | |
| 242 // Wrapper for passing around IP address strings and IPAddressNumber objects. | |
| 243 struct IPAddress { | |
| 244 IPAddress(const std::string& ip_string, const IPAddressNumber& ip_number) | |
| 245 : string_value(ip_string), | |
| 246 ip_address_number(ip_number) { | |
| 247 } | |
| 248 | |
| 249 // Used for sorting IP addresses in ascending order in SortIpAddressList(). | |
| 250 // IP6 addresses are placed ahead of IPv4 addresses. | |
| 251 bool operator<(const IPAddress& rhs) const { | |
| 252 const IPAddressNumber& ip1 = this->ip_address_number; | |
| 253 const IPAddressNumber& ip2 = rhs.ip_address_number; | |
| 254 if (ip1.size() != ip2.size()) | |
| 255 return ip1.size() > ip2.size(); // IPv6 before IPv4. | |
| 256 DCHECK(ip1.size() == ip2.size()); | |
| 257 return memcmp(&ip1[0], &ip2[0], ip1.size()) < 0; // Ascending order. | |
| 258 } | |
| 259 | |
| 260 std::string string_value; | |
| 261 IPAddressNumber ip_address_number; | |
| 262 }; | |
| 263 | |
| 264 // Handler for "sortIpAddressList(IpAddressList)". |ip_address_list| is a | |
| 265 // semi-colon delimited string containing IP addresses. | |
| 266 // |sorted_ip_address_list| is the resulting list of sorted semi-colon delimited | |
| 267 // IP addresses or an empty string if unable to sort the IP address list. | |
| 268 // Returns 'true' if the sorting was successful, and 'false' if the input was an | |
| 269 // empty string, a string of separators (";" in this case), or if any of the IP | |
| 270 // addresses in the input list failed to parse. | |
| 271 bool SortIpAddressList(const std::string& ip_address_list, | |
| 272 std::string* sorted_ip_address_list) { | |
| 273 sorted_ip_address_list->clear(); | |
| 274 | |
| 275 // Strip all whitespace (mimics IE behavior). | |
| 276 std::string cleaned_ip_address_list; | |
| 277 base::RemoveChars(ip_address_list, " \t", &cleaned_ip_address_list); | |
| 278 if (cleaned_ip_address_list.empty()) | |
| 279 return false; | |
| 280 | |
| 281 // Split-up IP addresses and store them in a vector. | |
| 282 std::vector<IPAddress> ip_vector; | |
| 283 IPAddressNumber ip_num; | |
| 284 base::StringTokenizer str_tok(cleaned_ip_address_list, ";"); | |
| 285 while (str_tok.GetNext()) { | |
| 286 if (!ParseIPLiteralToNumber(str_tok.token(), &ip_num)) | |
| 287 return false; | |
| 288 ip_vector.push_back(IPAddress(str_tok.token(), ip_num)); | |
| 289 } | |
| 290 | |
| 291 if (ip_vector.empty()) // Can happen if we have something like | |
| 292 return false; // sortIpAddressList(";") or sortIpAddressList("; ;") | |
| 293 | |
| 294 DCHECK(!ip_vector.empty()); | |
| 295 | |
| 296 // Sort lists according to ascending numeric value. | |
| 297 if (ip_vector.size() > 1) | |
| 298 std::stable_sort(ip_vector.begin(), ip_vector.end()); | |
| 299 | |
| 300 // Return a semi-colon delimited list of sorted addresses (IPv6 followed by | |
| 301 // IPv4). | |
| 302 for (size_t i = 0; i < ip_vector.size(); ++i) { | |
| 303 if (i > 0) | |
| 304 *sorted_ip_address_list += ";"; | |
| 305 *sorted_ip_address_list += ip_vector[i].string_value; | |
| 306 } | |
| 307 return true; | |
| 308 } | |
| 309 | |
| 310 // Handler for "isInNetEx(ip_address, ip_prefix)". |ip_address| is a string | |
| 311 // containing an IPv4/IPv6 address, and |ip_prefix| is a string containg a | |
| 312 // slash-delimited IP prefix with the top 'n' bits specified in the bit | |
| 313 // field. This returns 'true' if the address is in the same subnet, and | |
| 314 // 'false' otherwise. Also returns 'false' if the prefix is in an incorrect | |
| 315 // format, or if an address and prefix of different types are used (e.g. IPv6 | |
| 316 // address and IPv4 prefix). | |
| 317 bool IsInNetEx(const std::string& ip_address, const std::string& ip_prefix) { | |
| 318 IPAddressNumber address; | |
| 319 if (!ParseIPLiteralToNumber(ip_address, &address)) | |
| 320 return false; | |
| 321 | |
| 322 IPAddressNumber prefix; | |
| 323 size_t prefix_length_in_bits; | |
| 324 if (!ParseCIDRBlock(ip_prefix, &prefix, &prefix_length_in_bits)) | |
| 325 return false; | |
| 326 | |
| 327 // Both |address| and |prefix| must be of the same type (IPv4 or IPv6). | |
| 328 if (address.size() != prefix.size()) | |
| 329 return false; | |
| 330 | |
| 331 DCHECK((address.size() == 4 && prefix.size() == 4) || | |
| 332 (address.size() == 16 && prefix.size() == 16)); | |
| 333 | |
| 334 return IPNumberMatchesPrefix(address, prefix, prefix_length_in_bits); | |
| 335 } | |
| 336 | |
| 337 // Consider only single component domains like 'foo' as plain host names. | |
| 338 bool IsPlainHostName(const std::string& hostname_utf8) { | |
| 339 if (hostname_utf8.find('.') != std::string::npos) | |
| 340 return false; | |
| 341 | |
| 342 // IPv6 literals might not contain any periods, however are not considered | |
| 343 // plain host names. | |
| 344 IPAddressNumber unused; | |
| 345 return !ParseIPLiteralToNumber(hostname_utf8, &unused); | |
| 346 } | |
| 347 | |
| 348 } // namespace | |
| 349 | |
| 350 // ProxyResolverV8::Context --------------------------------------------------- | |
| 351 | |
| 352 class ProxyResolverV8::Context { | |
| 353 public: | |
| 354 Context(ProxyResolverV8* parent, v8::Isolate* isolate) | |
| 355 : parent_(parent), | |
| 356 isolate_(isolate) { | |
| 357 DCHECK(isolate); | |
| 358 } | |
| 359 | |
| 360 ~Context() { | |
| 361 v8::Locker locked(isolate_); | |
| 362 v8::Isolate::Scope isolate_scope(isolate_); | |
| 363 | |
| 364 v8_this_.Reset(); | |
| 365 v8_context_.Reset(); | |
| 366 } | |
| 367 | |
| 368 JSBindings* js_bindings() { | |
| 369 return parent_->js_bindings_; | |
| 370 } | |
| 371 | |
| 372 int ResolveProxy(const GURL& query_url, ProxyInfo* results) { | |
| 373 v8::Locker locked(isolate_); | |
| 374 v8::Isolate::Scope isolate_scope(isolate_); | |
| 375 v8::HandleScope scope(isolate_); | |
| 376 | |
| 377 v8::Local<v8::Context> context = | |
| 378 v8::Local<v8::Context>::New(isolate_, v8_context_); | |
| 379 v8::Context::Scope function_scope(context); | |
| 380 | |
| 381 v8::Local<v8::Value> function; | |
| 382 if (!GetFindProxyForURL(&function)) { | |
| 383 js_bindings()->OnError( | |
| 384 -1, base::ASCIIToUTF16("FindProxyForURL() is undefined.")); | |
| 385 return ERR_PAC_SCRIPT_FAILED; | |
| 386 } | |
| 387 | |
| 388 v8::Local<v8::Value> argv[] = { | |
| 389 ASCIIStringToV8String(isolate_, query_url.spec()), | |
| 390 ASCIIStringToV8String(isolate_, query_url.HostNoBrackets()), | |
| 391 }; | |
| 392 | |
| 393 v8::TryCatch try_catch; | |
| 394 v8::Local<v8::Value> ret = v8::Function::Cast(*function)->Call( | |
| 395 context->Global(), arraysize(argv), argv); | |
| 396 | |
| 397 if (try_catch.HasCaught()) { | |
| 398 HandleError(try_catch.Message()); | |
| 399 return ERR_PAC_SCRIPT_FAILED; | |
| 400 } | |
| 401 | |
| 402 if (!ret->IsString()) { | |
| 403 js_bindings()->OnError( | |
| 404 -1, base::ASCIIToUTF16("FindProxyForURL() did not return a string.")); | |
| 405 return ERR_PAC_SCRIPT_FAILED; | |
| 406 } | |
| 407 | |
| 408 base::string16 ret_str = V8StringToUTF16(v8::Local<v8::String>::Cast(ret)); | |
| 409 | |
| 410 if (!base::IsStringASCII(ret_str)) { | |
| 411 // TODO(eroman): Rather than failing when a wide string is returned, we | |
| 412 // could extend the parsing to handle IDNA hostnames by | |
| 413 // converting them to ASCII punycode. | |
| 414 // crbug.com/47234 | |
| 415 base::string16 error_message = | |
| 416 base::ASCIIToUTF16("FindProxyForURL() returned a non-ASCII string " | |
| 417 "(crbug.com/47234): ") + ret_str; | |
| 418 js_bindings()->OnError(-1, error_message); | |
| 419 return ERR_PAC_SCRIPT_FAILED; | |
| 420 } | |
| 421 | |
| 422 results->UsePacString(base::UTF16ToASCII(ret_str)); | |
| 423 return OK; | |
| 424 } | |
| 425 | |
| 426 int InitV8(const scoped_refptr<ProxyResolverScriptData>& pac_script) { | |
| 427 v8::Locker locked(isolate_); | |
| 428 v8::Isolate::Scope isolate_scope(isolate_); | |
| 429 v8::HandleScope scope(isolate_); | |
| 430 | |
| 431 v8_this_.Reset(isolate_, v8::External::New(isolate_, this)); | |
| 432 v8::Local<v8::External> v8_this = | |
| 433 v8::Local<v8::External>::New(isolate_, v8_this_); | |
| 434 v8::Local<v8::ObjectTemplate> global_template = | |
| 435 v8::ObjectTemplate::New(isolate_); | |
| 436 | |
| 437 // Attach the javascript bindings. | |
| 438 v8::Local<v8::FunctionTemplate> alert_template = | |
| 439 v8::FunctionTemplate::New(isolate_, &AlertCallback, v8_this); | |
| 440 global_template->Set(ASCIILiteralToV8String(isolate_, "alert"), | |
| 441 alert_template); | |
| 442 | |
| 443 v8::Local<v8::FunctionTemplate> my_ip_address_template = | |
| 444 v8::FunctionTemplate::New(isolate_, &MyIpAddressCallback, v8_this); | |
| 445 global_template->Set(ASCIILiteralToV8String(isolate_, "myIpAddress"), | |
| 446 my_ip_address_template); | |
| 447 | |
| 448 v8::Local<v8::FunctionTemplate> dns_resolve_template = | |
| 449 v8::FunctionTemplate::New(isolate_, &DnsResolveCallback, v8_this); | |
| 450 global_template->Set(ASCIILiteralToV8String(isolate_, "dnsResolve"), | |
| 451 dns_resolve_template); | |
| 452 | |
| 453 v8::Local<v8::FunctionTemplate> is_plain_host_name_template = | |
| 454 v8::FunctionTemplate::New(isolate_, &IsPlainHostNameCallback, v8_this); | |
| 455 global_template->Set(ASCIILiteralToV8String(isolate_, "isPlainHostName"), | |
| 456 is_plain_host_name_template); | |
| 457 | |
| 458 // Microsoft's PAC extensions: | |
| 459 | |
| 460 v8::Local<v8::FunctionTemplate> dns_resolve_ex_template = | |
| 461 v8::FunctionTemplate::New(isolate_, &DnsResolveExCallback, v8_this); | |
| 462 global_template->Set(ASCIILiteralToV8String(isolate_, "dnsResolveEx"), | |
| 463 dns_resolve_ex_template); | |
| 464 | |
| 465 v8::Local<v8::FunctionTemplate> my_ip_address_ex_template = | |
| 466 v8::FunctionTemplate::New(isolate_, &MyIpAddressExCallback, v8_this); | |
| 467 global_template->Set(ASCIILiteralToV8String(isolate_, "myIpAddressEx"), | |
| 468 my_ip_address_ex_template); | |
| 469 | |
| 470 v8::Local<v8::FunctionTemplate> sort_ip_address_list_template = | |
| 471 v8::FunctionTemplate::New(isolate_, | |
| 472 &SortIpAddressListCallback, | |
| 473 v8_this); | |
| 474 global_template->Set(ASCIILiteralToV8String(isolate_, "sortIpAddressList"), | |
| 475 sort_ip_address_list_template); | |
| 476 | |
| 477 v8::Local<v8::FunctionTemplate> is_in_net_ex_template = | |
| 478 v8::FunctionTemplate::New(isolate_, &IsInNetExCallback, v8_this); | |
| 479 global_template->Set(ASCIILiteralToV8String(isolate_, "isInNetEx"), | |
| 480 is_in_net_ex_template); | |
| 481 | |
| 482 v8_context_.Reset( | |
| 483 isolate_, v8::Context::New(isolate_, NULL, global_template)); | |
| 484 | |
| 485 v8::Local<v8::Context> context = | |
| 486 v8::Local<v8::Context>::New(isolate_, v8_context_); | |
| 487 v8::Context::Scope ctx(context); | |
| 488 | |
| 489 // Add the PAC utility functions to the environment. | |
| 490 // (This script should never fail, as it is a string literal!) | |
| 491 // Note that the two string literals are concatenated. | |
| 492 int rv = RunScript( | |
| 493 ASCIILiteralToV8String( | |
| 494 isolate_, | |
| 495 PROXY_RESOLVER_SCRIPT | |
| 496 PROXY_RESOLVER_SCRIPT_EX), | |
| 497 kPacUtilityResourceName); | |
| 498 if (rv != OK) { | |
| 499 NOTREACHED(); | |
| 500 return rv; | |
| 501 } | |
| 502 | |
| 503 // Add the user's PAC code to the environment. | |
| 504 rv = | |
| 505 RunScript(ScriptDataToV8String(isolate_, pac_script), kPacResourceName); | |
| 506 if (rv != OK) | |
| 507 return rv; | |
| 508 | |
| 509 // At a minimum, the FindProxyForURL() function must be defined for this | |
| 510 // to be a legitimiate PAC script. | |
| 511 v8::Local<v8::Value> function; | |
| 512 if (!GetFindProxyForURL(&function)) { | |
| 513 js_bindings()->OnError( | |
| 514 -1, base::ASCIIToUTF16("FindProxyForURL() is undefined.")); | |
| 515 return ERR_PAC_SCRIPT_FAILED; | |
| 516 } | |
| 517 | |
| 518 return OK; | |
| 519 } | |
| 520 | |
| 521 private: | |
| 522 bool GetFindProxyForURL(v8::Local<v8::Value>* function) { | |
| 523 v8::Local<v8::Context> context = | |
| 524 v8::Local<v8::Context>::New(isolate_, v8_context_); | |
| 525 *function = | |
| 526 context->Global()->Get( | |
| 527 ASCIILiteralToV8String(isolate_, "FindProxyForURL")); | |
| 528 return (*function)->IsFunction(); | |
| 529 } | |
| 530 | |
| 531 // Handle an exception thrown by V8. | |
| 532 void HandleError(v8::Local<v8::Message> message) { | |
| 533 base::string16 error_message; | |
| 534 int line_number = -1; | |
| 535 | |
| 536 if (!message.IsEmpty()) { | |
| 537 line_number = message->GetLineNumber(); | |
| 538 V8ObjectToUTF16String(message->Get(), &error_message, isolate_); | |
| 539 } | |
| 540 | |
| 541 js_bindings()->OnError(line_number, error_message); | |
| 542 } | |
| 543 | |
| 544 // Compiles and runs |script| in the current V8 context. | |
| 545 // Returns OK on success, otherwise an error code. | |
| 546 int RunScript(v8::Local<v8::String> script, const char* script_name) { | |
| 547 v8::TryCatch try_catch; | |
| 548 | |
| 549 // Compile the script. | |
| 550 v8::ScriptOrigin origin = | |
| 551 v8::ScriptOrigin(ASCIILiteralToV8String(isolate_, script_name)); | |
| 552 v8::Local<v8::Script> code = v8::Script::Compile(script, &origin); | |
| 553 | |
| 554 // Execute. | |
| 555 if (!code.IsEmpty()) | |
| 556 code->Run(); | |
| 557 | |
| 558 // Check for errors. | |
| 559 if (try_catch.HasCaught()) { | |
| 560 HandleError(try_catch.Message()); | |
| 561 return ERR_PAC_SCRIPT_FAILED; | |
| 562 } | |
| 563 | |
| 564 return OK; | |
| 565 } | |
| 566 | |
| 567 // V8 callback for when "alert()" is invoked by the PAC script. | |
| 568 static void AlertCallback(const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 569 Context* context = | |
| 570 static_cast<Context*>(v8::External::Cast(*args.Data())->Value()); | |
| 571 | |
| 572 // Like firefox we assume "undefined" if no argument was specified, and | |
| 573 // disregard any arguments beyond the first. | |
| 574 base::string16 message; | |
| 575 if (args.Length() == 0) { | |
| 576 message = base::ASCIIToUTF16("undefined"); | |
| 577 } else { | |
| 578 if (!V8ObjectToUTF16String(args[0], &message, args.GetIsolate())) | |
| 579 return; // toString() threw an exception. | |
| 580 } | |
| 581 | |
| 582 context->js_bindings()->Alert(message); | |
| 583 } | |
| 584 | |
| 585 // V8 callback for when "myIpAddress()" is invoked by the PAC script. | |
| 586 static void MyIpAddressCallback( | |
| 587 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 588 DnsResolveCallbackHelper(args, JSBindings::MY_IP_ADDRESS); | |
| 589 } | |
| 590 | |
| 591 // V8 callback for when "myIpAddressEx()" is invoked by the PAC script. | |
| 592 static void MyIpAddressExCallback( | |
| 593 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 594 DnsResolveCallbackHelper(args, JSBindings::MY_IP_ADDRESS_EX); | |
| 595 } | |
| 596 | |
| 597 // V8 callback for when "dnsResolve()" is invoked by the PAC script. | |
| 598 static void DnsResolveCallback( | |
| 599 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 600 DnsResolveCallbackHelper(args, JSBindings::DNS_RESOLVE); | |
| 601 } | |
| 602 | |
| 603 // V8 callback for when "dnsResolveEx()" is invoked by the PAC script. | |
| 604 static void DnsResolveExCallback( | |
| 605 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 606 DnsResolveCallbackHelper(args, JSBindings::DNS_RESOLVE_EX); | |
| 607 } | |
| 608 | |
| 609 // Shared code for implementing: | |
| 610 // - myIpAddress(), myIpAddressEx(), dnsResolve(), dnsResolveEx(). | |
| 611 static void DnsResolveCallbackHelper( | |
| 612 const v8::FunctionCallbackInfo<v8::Value>& args, | |
| 613 JSBindings::ResolveDnsOperation op) { | |
| 614 Context* context = | |
| 615 static_cast<Context*>(v8::External::Cast(*args.Data())->Value()); | |
| 616 | |
| 617 std::string hostname; | |
| 618 | |
| 619 // dnsResolve() and dnsResolveEx() need at least 1 argument. | |
| 620 if (op == JSBindings::DNS_RESOLVE || op == JSBindings::DNS_RESOLVE_EX) { | |
| 621 if (!GetHostnameArgument(args, &hostname)) { | |
| 622 if (op == JSBindings::DNS_RESOLVE) | |
| 623 args.GetReturnValue().SetNull(); | |
| 624 return; | |
| 625 } | |
| 626 } | |
| 627 | |
| 628 std::string result; | |
| 629 bool success; | |
| 630 bool terminate = false; | |
| 631 | |
| 632 { | |
| 633 v8::Unlocker unlocker(args.GetIsolate()); | |
| 634 success = context->js_bindings()->ResolveDns( | |
| 635 hostname, op, &result, &terminate); | |
| 636 } | |
| 637 | |
| 638 if (terminate) | |
| 639 v8::V8::TerminateExecution(args.GetIsolate()); | |
| 640 | |
| 641 if (success) { | |
| 642 args.GetReturnValue().Set( | |
| 643 ASCIIStringToV8String(args.GetIsolate(), result)); | |
| 644 return; | |
| 645 } | |
| 646 | |
| 647 // Each function handles resolution errors differently. | |
| 648 switch (op) { | |
| 649 case JSBindings::DNS_RESOLVE: | |
| 650 args.GetReturnValue().SetNull(); | |
| 651 return; | |
| 652 case JSBindings::DNS_RESOLVE_EX: | |
| 653 args.GetReturnValue().SetEmptyString(); | |
| 654 return; | |
| 655 case JSBindings::MY_IP_ADDRESS: | |
| 656 args.GetReturnValue().Set( | |
| 657 ASCIILiteralToV8String(args.GetIsolate(), "127.0.0.1")); | |
| 658 return; | |
| 659 case JSBindings::MY_IP_ADDRESS_EX: | |
| 660 args.GetReturnValue().SetEmptyString(); | |
| 661 return; | |
| 662 } | |
| 663 | |
| 664 NOTREACHED(); | |
| 665 } | |
| 666 | |
| 667 // V8 callback for when "sortIpAddressList()" is invoked by the PAC script. | |
| 668 static void SortIpAddressListCallback( | |
| 669 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 670 // We need at least one string argument. | |
| 671 if (args.Length() == 0 || args[0].IsEmpty() || !args[0]->IsString()) { | |
| 672 args.GetReturnValue().SetNull(); | |
| 673 return; | |
| 674 } | |
| 675 | |
| 676 std::string ip_address_list = | |
| 677 V8StringToUTF8(v8::Local<v8::String>::Cast(args[0])); | |
| 678 if (!base::IsStringASCII(ip_address_list)) { | |
| 679 args.GetReturnValue().SetNull(); | |
| 680 return; | |
| 681 } | |
| 682 std::string sorted_ip_address_list; | |
| 683 bool success = SortIpAddressList(ip_address_list, &sorted_ip_address_list); | |
| 684 if (!success) { | |
| 685 args.GetReturnValue().Set(false); | |
| 686 return; | |
| 687 } | |
| 688 args.GetReturnValue().Set( | |
| 689 ASCIIStringToV8String(args.GetIsolate(), sorted_ip_address_list)); | |
| 690 } | |
| 691 | |
| 692 // V8 callback for when "isInNetEx()" is invoked by the PAC script. | |
| 693 static void IsInNetExCallback( | |
| 694 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 695 // We need at least 2 string arguments. | |
| 696 if (args.Length() < 2 || args[0].IsEmpty() || !args[0]->IsString() || | |
| 697 args[1].IsEmpty() || !args[1]->IsString()) { | |
| 698 args.GetReturnValue().SetNull(); | |
| 699 return; | |
| 700 } | |
| 701 | |
| 702 std::string ip_address = | |
| 703 V8StringToUTF8(v8::Local<v8::String>::Cast(args[0])); | |
| 704 if (!base::IsStringASCII(ip_address)) { | |
| 705 args.GetReturnValue().Set(false); | |
| 706 return; | |
| 707 } | |
| 708 std::string ip_prefix = | |
| 709 V8StringToUTF8(v8::Local<v8::String>::Cast(args[1])); | |
| 710 if (!base::IsStringASCII(ip_prefix)) { | |
| 711 args.GetReturnValue().Set(false); | |
| 712 return; | |
| 713 } | |
| 714 args.GetReturnValue().Set(IsInNetEx(ip_address, ip_prefix)); | |
| 715 } | |
| 716 | |
| 717 // V8 callback for when "isPlainHostName()" is invoked by the PAC script. | |
| 718 static void IsPlainHostNameCallback( | |
| 719 const v8::FunctionCallbackInfo<v8::Value>& args) { | |
| 720 // Need at least 1 string arguments. | |
| 721 if (args.Length() < 1 || args[0].IsEmpty() || !args[0]->IsString()) { | |
| 722 args.GetIsolate()->ThrowException( | |
| 723 v8::Exception::TypeError(ASCIIStringToV8String( | |
| 724 args.GetIsolate(), "Requires 1 string parameter"))); | |
| 725 return; | |
| 726 } | |
| 727 | |
| 728 std::string hostname_utf8 = | |
| 729 V8StringToUTF8(v8::Local<v8::String>::Cast(args[0])); | |
| 730 args.GetReturnValue().Set(IsPlainHostName(hostname_utf8)); | |
| 731 } | |
| 732 | |
| 733 mutable base::Lock lock_; | |
| 734 ProxyResolverV8* parent_; | |
| 735 v8::Isolate* isolate_; | |
| 736 v8::Persistent<v8::External> v8_this_; | |
| 737 v8::Persistent<v8::Context> v8_context_; | |
| 738 }; | |
| 739 | |
| 740 // ProxyResolverV8 ------------------------------------------------------------ | |
| 741 | |
| 742 ProxyResolverV8::ProxyResolverV8() | |
| 743 : ProxyResolver(true /*expects_pac_bytes*/), | |
| 744 js_bindings_(NULL) { | |
| 745 } | |
| 746 | |
| 747 ProxyResolverV8::~ProxyResolverV8() {} | |
| 748 | |
| 749 int ProxyResolverV8::GetProxyForURL( | |
| 750 const GURL& query_url, ProxyInfo* results, | |
| 751 const CompletionCallback& /*callback*/, | |
| 752 RequestHandle* /*request*/, | |
| 753 const BoundNetLog& net_log) { | |
| 754 DCHECK(js_bindings_); | |
| 755 | |
| 756 // If the V8 instance has not been initialized (either because | |
| 757 // SetPacScript() wasn't called yet, or because it failed. | |
| 758 if (!context_) | |
| 759 return ERR_FAILED; | |
| 760 | |
| 761 // Otherwise call into V8. | |
| 762 int rv = context_->ResolveProxy(query_url, results); | |
| 763 | |
| 764 return rv; | |
| 765 } | |
| 766 | |
| 767 void ProxyResolverV8::CancelRequest(RequestHandle request) { | |
| 768 // This is a synchronous ProxyResolver; no possibility for async requests. | |
| 769 NOTREACHED(); | |
| 770 } | |
| 771 | |
| 772 LoadState ProxyResolverV8::GetLoadState(RequestHandle request) const { | |
| 773 NOTREACHED(); | |
| 774 return LOAD_STATE_IDLE; | |
| 775 } | |
| 776 | |
| 777 void ProxyResolverV8::CancelSetPacScript() { | |
| 778 NOTREACHED(); | |
| 779 } | |
| 780 | |
| 781 int ProxyResolverV8::SetPacScript( | |
| 782 const scoped_refptr<ProxyResolverScriptData>& script_data, | |
| 783 const CompletionCallback& /*callback*/) { | |
| 784 DCHECK(script_data.get()); | |
| 785 DCHECK(js_bindings_); | |
| 786 | |
| 787 context_.reset(); | |
| 788 if (script_data->utf16().empty()) | |
| 789 return ERR_PAC_SCRIPT_FAILED; | |
| 790 | |
| 791 // Try parsing the PAC script. | |
| 792 scoped_ptr<Context> context(new Context(this, GetDefaultIsolate())); | |
| 793 int rv = context->InitV8(script_data); | |
| 794 if (rv == OK) | |
| 795 context_.reset(context.release()); | |
| 796 return rv; | |
| 797 } | |
| 798 | |
| 799 // static | |
| 800 void ProxyResolverV8::EnsureIsolateCreated() { | |
| 801 if (g_proxy_resolver_isolate_) | |
| 802 return; | |
| 803 gin::IsolateHolder::Initialize(gin::IsolateHolder::kNonStrictMode, | |
| 804 gin::ArrayBufferAllocator::SharedInstance()); | |
| 805 g_proxy_resolver_isolate_ = new gin::IsolateHolder; | |
| 806 ANNOTATE_LEAKING_OBJECT_PTR(g_proxy_resolver_isolate_); | |
| 807 } | |
| 808 | |
| 809 // static | |
| 810 v8::Isolate* ProxyResolverV8::GetDefaultIsolate() { | |
| 811 DCHECK(g_proxy_resolver_isolate_) | |
| 812 << "Must call ProxyResolverV8::EnsureIsolateCreated() first"; | |
| 813 return g_proxy_resolver_isolate_->isolate(); | |
| 814 } | |
| 815 | |
| 816 gin::IsolateHolder* ProxyResolverV8::g_proxy_resolver_isolate_ = NULL; | |
| 817 | |
| 818 // static | |
| 819 size_t ProxyResolverV8::GetTotalHeapSize() { | |
| 820 if (!g_proxy_resolver_isolate_) | |
| 821 return 0; | |
| 822 | |
| 823 v8::Locker locked(g_proxy_resolver_isolate_->isolate()); | |
| 824 v8::Isolate::Scope isolate_scope(g_proxy_resolver_isolate_->isolate()); | |
| 825 v8::HeapStatistics heap_statistics; | |
| 826 g_proxy_resolver_isolate_->isolate()->GetHeapStatistics(&heap_statistics); | |
| 827 return heap_statistics.total_heap_size(); | |
| 828 } | |
| 829 | |
| 830 // static | |
| 831 size_t ProxyResolverV8::GetUsedHeapSize() { | |
| 832 if (!g_proxy_resolver_isolate_) | |
| 833 return 0; | |
| 834 | |
| 835 v8::Locker locked(g_proxy_resolver_isolate_->isolate()); | |
| 836 v8::Isolate::Scope isolate_scope(g_proxy_resolver_isolate_->isolate()); | |
| 837 v8::HeapStatistics heap_statistics; | |
| 838 g_proxy_resolver_isolate_->isolate()->GetHeapStatistics(&heap_statistics); | |
| 839 return heap_statistics.used_heap_size(); | |
| 840 } | |
| 841 | |
| 842 } // namespace net | |
| OLD | NEW |