| Index: net/proxy/proxy_config.cc
|
| diff --git a/net/proxy/proxy_config.cc b/net/proxy/proxy_config.cc
|
| deleted file mode 100644
|
| index 71264fd0b67f8c3f77c43c7dcbf35f2f1a3296d7..0000000000000000000000000000000000000000
|
| --- a/net/proxy/proxy_config.cc
|
| +++ /dev/null
|
| @@ -1,290 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/proxy/proxy_config.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "base/strings/string_tokenizer.h"
|
| -#include "base/values.h"
|
| -#include "net/proxy/proxy_info.h"
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -// If |proxies| is non-empty, sets it in |dict| under the key |name|.
|
| -void AddProxyListToValue(const char* name,
|
| - const ProxyList& proxies,
|
| - base::DictionaryValue* dict) {
|
| - if (!proxies.IsEmpty())
|
| - dict->Set(name, proxies.ToValue());
|
| -}
|
| -
|
| -// Split the |uri_list| on commas and add each entry to |proxy_list| in turn.
|
| -void AddProxyURIListToProxyList(std::string uri_list,
|
| - ProxyList* proxy_list,
|
| - ProxyServer::Scheme default_scheme) {
|
| - base::StringTokenizer proxy_uri_list(uri_list, ",");
|
| - while (proxy_uri_list.GetNext()) {
|
| - proxy_list->AddProxyServer(
|
| - ProxyServer::FromURI(proxy_uri_list.token(), default_scheme));
|
| - }
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -ProxyConfig::ProxyRules::ProxyRules()
|
| - : reverse_bypass(false),
|
| - type(TYPE_NO_RULES) {
|
| -}
|
| -
|
| -ProxyConfig::ProxyRules::~ProxyRules() {
|
| -}
|
| -
|
| -void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const {
|
| - if (empty()) {
|
| - result->UseDirect();
|
| - return;
|
| - }
|
| -
|
| - bool bypass_proxy = bypass_rules.Matches(url);
|
| - if (reverse_bypass)
|
| - bypass_proxy = !bypass_proxy;
|
| - if (bypass_proxy) {
|
| - result->UseDirectWithBypassedProxy();
|
| - return;
|
| - }
|
| -
|
| - switch (type) {
|
| - case ProxyRules::TYPE_SINGLE_PROXY: {
|
| - result->UseProxyList(single_proxies);
|
| - return;
|
| - }
|
| - case ProxyRules::TYPE_PROXY_PER_SCHEME: {
|
| - const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme());
|
| - if (entry) {
|
| - result->UseProxyList(*entry);
|
| - } else {
|
| - // We failed to find a matching proxy server for the current URL
|
| - // scheme. Default to direct.
|
| - result->UseDirect();
|
| - }
|
| - return;
|
| - }
|
| - default: {
|
| - result->UseDirect();
|
| - NOTREACHED();
|
| - return;
|
| - }
|
| - }
|
| -}
|
| -
|
| -void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) {
|
| - // Reset.
|
| - type = TYPE_NO_RULES;
|
| - single_proxies = ProxyList();
|
| - proxies_for_http = ProxyList();
|
| - proxies_for_https = ProxyList();
|
| - proxies_for_ftp = ProxyList();
|
| - fallback_proxies = ProxyList();
|
| -
|
| - base::StringTokenizer proxy_server_list(proxy_rules, ";");
|
| - while (proxy_server_list.GetNext()) {
|
| - base::StringTokenizer proxy_server_for_scheme(
|
| - proxy_server_list.token_begin(), proxy_server_list.token_end(), "=");
|
| -
|
| - while (proxy_server_for_scheme.GetNext()) {
|
| - std::string url_scheme = proxy_server_for_scheme.token();
|
| -
|
| - // If we fail to get the proxy server here, it means that
|
| - // this is a regular proxy server configuration, i.e. proxies
|
| - // are not configured per protocol.
|
| - if (!proxy_server_for_scheme.GetNext()) {
|
| - if (type == TYPE_PROXY_PER_SCHEME)
|
| - continue; // Unexpected.
|
| - AddProxyURIListToProxyList(url_scheme,
|
| - &single_proxies,
|
| - ProxyServer::SCHEME_HTTP);
|
| - type = TYPE_SINGLE_PROXY;
|
| - return;
|
| - }
|
| -
|
| - // Trim whitespace off the url scheme.
|
| - base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme);
|
| -
|
| - // Add it to the per-scheme mappings (if supported scheme).
|
| - type = TYPE_PROXY_PER_SCHEME;
|
| - ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme);
|
| - ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP;
|
| -
|
| - // socks=XXX is inconsistent with the other formats, since "socks"
|
| - // is not a URL scheme. Rather this means "for everything else, send
|
| - // it to the SOCKS proxy server XXX".
|
| - if (url_scheme == "socks") {
|
| - DCHECK(!entry);
|
| - entry = &fallback_proxies;
|
| - // Note that here 'socks' is understood to be SOCKS4, even though
|
| - // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal.
|
| - default_scheme = ProxyServer::SCHEME_SOCKS4;
|
| - }
|
| -
|
| - if (entry) {
|
| - AddProxyURIListToProxyList(proxy_server_for_scheme.token(),
|
| - entry,
|
| - default_scheme);
|
| - }
|
| - }
|
| - }
|
| -}
|
| -
|
| -const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList(
|
| - const std::string& url_scheme) const {
|
| - const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)->
|
| - MapUrlSchemeToProxyListNoFallback(url_scheme);
|
| - if (proxy_server_list && !proxy_server_list->IsEmpty())
|
| - return proxy_server_list;
|
| - if (url_scheme == "ws" || url_scheme == "wss")
|
| - return GetProxyListForWebSocketScheme();
|
| - if (!fallback_proxies.IsEmpty())
|
| - return &fallback_proxies;
|
| - return NULL; // No mapping for this scheme. Use direct.
|
| -}
|
| -
|
| -bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const {
|
| - return type == other.type &&
|
| - single_proxies.Equals(other.single_proxies) &&
|
| - proxies_for_http.Equals(other.proxies_for_http) &&
|
| - proxies_for_https.Equals(other.proxies_for_https) &&
|
| - proxies_for_ftp.Equals(other.proxies_for_ftp) &&
|
| - fallback_proxies.Equals(other.fallback_proxies) &&
|
| - bypass_rules.Equals(other.bypass_rules) &&
|
| - reverse_bypass == other.reverse_bypass;
|
| -}
|
| -
|
| -ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback(
|
| - const std::string& scheme) {
|
| - DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type);
|
| - if (scheme == "http")
|
| - return &proxies_for_http;
|
| - if (scheme == "https")
|
| - return &proxies_for_https;
|
| - if (scheme == "ftp")
|
| - return &proxies_for_ftp;
|
| - return NULL; // No mapping for this scheme.
|
| -}
|
| -
|
| -const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme()
|
| - const {
|
| - if (!fallback_proxies.IsEmpty())
|
| - return &fallback_proxies;
|
| - if (!proxies_for_https.IsEmpty())
|
| - return &proxies_for_https;
|
| - if (!proxies_for_http.IsEmpty())
|
| - return &proxies_for_http;
|
| - return NULL;
|
| -}
|
| -
|
| -ProxyConfig::ProxyConfig()
|
| - : auto_detect_(false), pac_mandatory_(false),
|
| - source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID) {
|
| -}
|
| -
|
| -ProxyConfig::ProxyConfig(const ProxyConfig& config)
|
| - : auto_detect_(config.auto_detect_),
|
| - pac_url_(config.pac_url_),
|
| - pac_mandatory_(config.pac_mandatory_),
|
| - proxy_rules_(config.proxy_rules_),
|
| - source_(config.source_),
|
| - id_(config.id_) {
|
| -}
|
| -
|
| -ProxyConfig::~ProxyConfig() {
|
| -}
|
| -
|
| -ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) {
|
| - auto_detect_ = config.auto_detect_;
|
| - pac_url_ = config.pac_url_;
|
| - pac_mandatory_ = config.pac_mandatory_;
|
| - proxy_rules_ = config.proxy_rules_;
|
| - source_ = config.source_;
|
| - id_ = config.id_;
|
| - return *this;
|
| -}
|
| -
|
| -bool ProxyConfig::Equals(const ProxyConfig& other) const {
|
| - // The two configs can have different IDs and sources. We are just interested
|
| - // in if they have the same settings.
|
| - return auto_detect_ == other.auto_detect_ &&
|
| - pac_url_ == other.pac_url_ &&
|
| - pac_mandatory_ == other.pac_mandatory_ &&
|
| - proxy_rules_.Equals(other.proxy_rules());
|
| -}
|
| -
|
| -bool ProxyConfig::HasAutomaticSettings() const {
|
| - return auto_detect_ || has_pac_url();
|
| -}
|
| -
|
| -void ProxyConfig::ClearAutomaticSettings() {
|
| - auto_detect_ = false;
|
| - pac_url_ = GURL();
|
| -}
|
| -
|
| -base::DictionaryValue* ProxyConfig::ToValue() const {
|
| - base::DictionaryValue* dict = new base::DictionaryValue();
|
| -
|
| - // Output the automatic settings.
|
| - if (auto_detect_)
|
| - dict->SetBoolean("auto_detect", auto_detect_);
|
| - if (has_pac_url()) {
|
| - dict->SetString("pac_url", pac_url_.possibly_invalid_spec());
|
| - if (pac_mandatory_)
|
| - dict->SetBoolean("pac_mandatory", pac_mandatory_);
|
| - }
|
| -
|
| - // Output the manual settings.
|
| - if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) {
|
| - switch (proxy_rules_.type) {
|
| - case ProxyRules::TYPE_SINGLE_PROXY:
|
| - AddProxyListToValue("single_proxy",
|
| - proxy_rules_.single_proxies, dict);
|
| - break;
|
| - case ProxyRules::TYPE_PROXY_PER_SCHEME: {
|
| - base::DictionaryValue* dict2 = new base::DictionaryValue();
|
| - AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2);
|
| - AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2);
|
| - AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2);
|
| - AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2);
|
| - dict->Set("proxy_per_scheme", dict2);
|
| - break;
|
| - }
|
| - default:
|
| - NOTREACHED();
|
| - }
|
| -
|
| - // Output the bypass rules.
|
| - const ProxyBypassRules& bypass = proxy_rules_.bypass_rules;
|
| - if (!bypass.rules().empty()) {
|
| - if (proxy_rules_.reverse_bypass)
|
| - dict->SetBoolean("reverse_bypass", true);
|
| -
|
| - base::ListValue* list = new base::ListValue();
|
| -
|
| - for (ProxyBypassRules::RuleList::const_iterator it =
|
| - bypass.rules().begin();
|
| - it != bypass.rules().end(); ++it) {
|
| - list->Append(new base::StringValue((*it)->ToString()));
|
| - }
|
| -
|
| - dict->Set("bypass_list", list);
|
| - }
|
| - }
|
| -
|
| - // Output the source.
|
| - dict->SetString("source", ProxyConfigSourceToString(source_));
|
| -
|
| - return dict;
|
| -}
|
| -
|
| -} // namespace net
|
|
|