Index: net/proxy/proxy_list.cc |
diff --git a/net/proxy/proxy_list.cc b/net/proxy/proxy_list.cc |
deleted file mode 100644 |
index 4dc46267d05f32419edb054ded590d4a479758c3..0000000000000000000000000000000000000000 |
--- a/net/proxy/proxy_list.cc |
+++ /dev/null |
@@ -1,243 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/proxy/proxy_list.h" |
- |
-#include "base/callback.h" |
-#include "base/logging.h" |
-#include "base/strings/string_tokenizer.h" |
-#include "base/time/time.h" |
-#include "base/values.h" |
-#include "net/proxy/proxy_server.h" |
- |
-using base::TimeDelta; |
-using base::TimeTicks; |
- |
-namespace net { |
- |
-ProxyList::ProxyList() { |
-} |
- |
-ProxyList::~ProxyList() { |
-} |
- |
-void ProxyList::Set(const std::string& proxy_uri_list) { |
- proxies_.clear(); |
- base::StringTokenizer str_tok(proxy_uri_list, ";"); |
- while (str_tok.GetNext()) { |
- ProxyServer uri = ProxyServer::FromURI( |
- str_tok.token_begin(), str_tok.token_end(), ProxyServer::SCHEME_HTTP); |
- // Silently discard malformed inputs. |
- if (uri.is_valid()) |
- proxies_.push_back(uri); |
- } |
-} |
- |
-void ProxyList::SetSingleProxyServer(const ProxyServer& proxy_server) { |
- proxies_.clear(); |
- AddProxyServer(proxy_server); |
-} |
- |
-void ProxyList::AddProxyServer(const ProxyServer& proxy_server) { |
- if (proxy_server.is_valid()) |
- proxies_.push_back(proxy_server); |
-} |
- |
-void ProxyList::DeprioritizeBadProxies( |
- const ProxyRetryInfoMap& proxy_retry_info) { |
- // Partition the proxy list in two: |
- // (1) the known bad proxies |
- // (2) everything else |
- std::vector<ProxyServer> good_proxies; |
- std::vector<ProxyServer> bad_proxies_to_try; |
- |
- std::vector<ProxyServer>::const_iterator iter = proxies_.begin(); |
- for (; iter != proxies_.end(); ++iter) { |
- ProxyRetryInfoMap::const_iterator bad_proxy = |
- proxy_retry_info.find(iter->ToURI()); |
- if (bad_proxy != proxy_retry_info.end()) { |
- // This proxy is bad. Check if it's time to retry. |
- if (bad_proxy->second.bad_until >= TimeTicks::Now()) { |
- // still invalid. |
- if (bad_proxy->second.try_while_bad) |
- bad_proxies_to_try.push_back(*iter); |
- continue; |
- } |
- } |
- good_proxies.push_back(*iter); |
- } |
- |
- // "proxies_ = good_proxies + bad_proxies" |
- proxies_.swap(good_proxies); |
- proxies_.insert(proxies_.end(), bad_proxies_to_try.begin(), |
- bad_proxies_to_try.end()); |
-} |
- |
-void ProxyList::RemoveProxiesWithoutScheme(int scheme_bit_field) { |
- for (std::vector<ProxyServer>::iterator it = proxies_.begin(); |
- it != proxies_.end(); ) { |
- if (!(scheme_bit_field & it->scheme())) { |
- it = proxies_.erase(it); |
- continue; |
- } |
- ++it; |
- } |
-} |
- |
-void ProxyList::Clear() { |
- proxies_.clear(); |
-} |
- |
-bool ProxyList::IsEmpty() const { |
- return proxies_.empty(); |
-} |
- |
-size_t ProxyList::size() const { |
- return proxies_.size(); |
-} |
- |
-// Returns true if |*this| lists the same proxies as |other|. |
-bool ProxyList::Equals(const ProxyList& other) const { |
- if (size() != other.size()) |
- return false; |
- return proxies_ == other.proxies_; |
-} |
- |
-const ProxyServer& ProxyList::Get() const { |
- DCHECK(!proxies_.empty()); |
- return proxies_[0]; |
-} |
- |
-void ProxyList::SetFromPacString(const std::string& pac_string) { |
- base::StringTokenizer entry_tok(pac_string, ";"); |
- proxies_.clear(); |
- while (entry_tok.GetNext()) { |
- ProxyServer uri = ProxyServer::FromPacString( |
- entry_tok.token_begin(), entry_tok.token_end()); |
- // Silently discard malformed inputs. |
- if (uri.is_valid()) |
- proxies_.push_back(uri); |
- } |
- |
- // If we failed to parse anything from the PAC results list, fallback to |
- // DIRECT (this basically means an error in the PAC script). |
- if (proxies_.empty()) { |
- proxies_.push_back(ProxyServer::Direct()); |
- } |
-} |
- |
-std::string ProxyList::ToPacString() const { |
- std::string proxy_list; |
- std::vector<ProxyServer>::const_iterator iter = proxies_.begin(); |
- for (; iter != proxies_.end(); ++iter) { |
- if (!proxy_list.empty()) |
- proxy_list += ";"; |
- proxy_list += iter->ToPacString(); |
- } |
- return proxy_list.empty() ? std::string() : proxy_list; |
-} |
- |
-base::ListValue* ProxyList::ToValue() const { |
- base::ListValue* list = new base::ListValue(); |
- for (size_t i = 0; i < proxies_.size(); ++i) |
- list->AppendString(proxies_[i].ToURI()); |
- return list; |
-} |
- |
-bool ProxyList::Fallback(ProxyRetryInfoMap* proxy_retry_info, |
- int net_error, |
- const BoundNetLog& net_log) { |
- |
- // TODO(eroman): It would be good if instead of removing failed proxies |
- // from the list, we simply annotated them with the error code they failed |
- // with. Of course, ProxyService::ReconsiderProxyAfterError() would need to |
- // be given this information by the network transaction. |
- // |
- // The advantage of this approach is when the network transaction |
- // fails, we could output the full list of proxies that were attempted, and |
- // why each one of those failed (as opposed to just the last failure). |
- // |
- // And also, before failing the transaction wholesale, we could go back and |
- // retry the "bad proxies" which we never tried to begin with. |
- // (RemoveBadProxies would annotate them as 'expected bad' rather then delete |
- // them from the list, so we would know what they were). |
- |
- if (proxies_.empty()) { |
- NOTREACHED(); |
- return false; |
- } |
- // By default, proxies are not retried for 5 minutes. |
- UpdateRetryInfoOnFallback(proxy_retry_info, |
- TimeDelta::FromMinutes(5), |
- true, |
- ProxyServer(), |
- net_error, |
- net_log); |
- |
- // Remove this proxy from our list. |
- proxies_.erase(proxies_.begin()); |
- return !proxies_.empty(); |
-} |
- |
-void ProxyList::AddProxyToRetryList(ProxyRetryInfoMap* proxy_retry_info, |
- base::TimeDelta retry_delay, |
- bool try_while_bad, |
- const ProxyServer& proxy_to_retry, |
- int net_error, |
- const BoundNetLog& net_log) const { |
- // Mark this proxy as bad. |
- std::string proxy_key = proxy_to_retry.ToURI(); |
- ProxyRetryInfoMap::iterator iter = proxy_retry_info->find(proxy_key); |
- if (iter != proxy_retry_info->end()) { |
- // TODO(nsylvain): This is not the first time we get this. We should |
- // double the retry time. Bug 997660. |
- iter->second.bad_until = TimeTicks::Now() + iter->second.current_delay; |
- } else { |
- ProxyRetryInfo retry_info; |
- retry_info.current_delay = retry_delay; |
- retry_info.bad_until = TimeTicks().Now() + retry_info.current_delay; |
- retry_info.try_while_bad = try_while_bad; |
- retry_info.net_error = net_error; |
- (*proxy_retry_info)[proxy_key] = retry_info; |
- } |
- net_log.AddEvent(NetLog::TYPE_PROXY_LIST_FALLBACK, |
- NetLog::StringCallback("bad_proxy", &proxy_key)); |
-} |
- |
-void ProxyList::UpdateRetryInfoOnFallback( |
- ProxyRetryInfoMap* proxy_retry_info, |
- base::TimeDelta retry_delay, |
- bool reconsider, |
- const ProxyServer& another_proxy_to_bypass, |
- int net_error, |
- const BoundNetLog& net_log) const { |
- DCHECK(retry_delay != base::TimeDelta()); |
- |
- if (proxies_.empty()) { |
- NOTREACHED(); |
- return; |
- } |
- |
- if (!proxies_[0].is_direct()) { |
- AddProxyToRetryList(proxy_retry_info, |
- retry_delay, |
- reconsider, |
- proxies_[0], |
- net_error, |
- net_log); |
- |
- // If an additional proxy to bypass is specified, add it to the retry map |
- // as well. |
- if (another_proxy_to_bypass.is_valid()) { |
- AddProxyToRetryList(proxy_retry_info, |
- retry_delay, |
- reconsider, |
- another_proxy_to_bypass, |
- net_error, |
- net_log); |
- } |
- } |
-} |
- |
-} // namespace net |