Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(570)

Unified Diff: net/proxy/proxy_config.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/proxy/proxy_config.h ('k') | net/proxy/proxy_config_service.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/proxy/proxy_config.cc
diff --git a/net/proxy/proxy_config.cc b/net/proxy/proxy_config.cc
deleted file mode 100644
index 71264fd0b67f8c3f77c43c7dcbf35f2f1a3296d7..0000000000000000000000000000000000000000
--- a/net/proxy/proxy_config.cc
+++ /dev/null
@@ -1,290 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/proxy/proxy_config.h"
-
-#include "base/logging.h"
-#include "base/strings/string_util.h"
-#include "base/strings/string_tokenizer.h"
-#include "base/values.h"
-#include "net/proxy/proxy_info.h"
-
-namespace net {
-
-namespace {
-
-// If |proxies| is non-empty, sets it in |dict| under the key |name|.
-void AddProxyListToValue(const char* name,
- const ProxyList& proxies,
- base::DictionaryValue* dict) {
- if (!proxies.IsEmpty())
- dict->Set(name, proxies.ToValue());
-}
-
-// Split the |uri_list| on commas and add each entry to |proxy_list| in turn.
-void AddProxyURIListToProxyList(std::string uri_list,
- ProxyList* proxy_list,
- ProxyServer::Scheme default_scheme) {
- base::StringTokenizer proxy_uri_list(uri_list, ",");
- while (proxy_uri_list.GetNext()) {
- proxy_list->AddProxyServer(
- ProxyServer::FromURI(proxy_uri_list.token(), default_scheme));
- }
-}
-
-} // namespace
-
-ProxyConfig::ProxyRules::ProxyRules()
- : reverse_bypass(false),
- type(TYPE_NO_RULES) {
-}
-
-ProxyConfig::ProxyRules::~ProxyRules() {
-}
-
-void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const {
- if (empty()) {
- result->UseDirect();
- return;
- }
-
- bool bypass_proxy = bypass_rules.Matches(url);
- if (reverse_bypass)
- bypass_proxy = !bypass_proxy;
- if (bypass_proxy) {
- result->UseDirectWithBypassedProxy();
- return;
- }
-
- switch (type) {
- case ProxyRules::TYPE_SINGLE_PROXY: {
- result->UseProxyList(single_proxies);
- return;
- }
- case ProxyRules::TYPE_PROXY_PER_SCHEME: {
- const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme());
- if (entry) {
- result->UseProxyList(*entry);
- } else {
- // We failed to find a matching proxy server for the current URL
- // scheme. Default to direct.
- result->UseDirect();
- }
- return;
- }
- default: {
- result->UseDirect();
- NOTREACHED();
- return;
- }
- }
-}
-
-void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) {
- // Reset.
- type = TYPE_NO_RULES;
- single_proxies = ProxyList();
- proxies_for_http = ProxyList();
- proxies_for_https = ProxyList();
- proxies_for_ftp = ProxyList();
- fallback_proxies = ProxyList();
-
- base::StringTokenizer proxy_server_list(proxy_rules, ";");
- while (proxy_server_list.GetNext()) {
- base::StringTokenizer proxy_server_for_scheme(
- proxy_server_list.token_begin(), proxy_server_list.token_end(), "=");
-
- while (proxy_server_for_scheme.GetNext()) {
- std::string url_scheme = proxy_server_for_scheme.token();
-
- // If we fail to get the proxy server here, it means that
- // this is a regular proxy server configuration, i.e. proxies
- // are not configured per protocol.
- if (!proxy_server_for_scheme.GetNext()) {
- if (type == TYPE_PROXY_PER_SCHEME)
- continue; // Unexpected.
- AddProxyURIListToProxyList(url_scheme,
- &single_proxies,
- ProxyServer::SCHEME_HTTP);
- type = TYPE_SINGLE_PROXY;
- return;
- }
-
- // Trim whitespace off the url scheme.
- base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme);
-
- // Add it to the per-scheme mappings (if supported scheme).
- type = TYPE_PROXY_PER_SCHEME;
- ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme);
- ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP;
-
- // socks=XXX is inconsistent with the other formats, since "socks"
- // is not a URL scheme. Rather this means "for everything else, send
- // it to the SOCKS proxy server XXX".
- if (url_scheme == "socks") {
- DCHECK(!entry);
- entry = &fallback_proxies;
- // Note that here 'socks' is understood to be SOCKS4, even though
- // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal.
- default_scheme = ProxyServer::SCHEME_SOCKS4;
- }
-
- if (entry) {
- AddProxyURIListToProxyList(proxy_server_for_scheme.token(),
- entry,
- default_scheme);
- }
- }
- }
-}
-
-const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList(
- const std::string& url_scheme) const {
- const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)->
- MapUrlSchemeToProxyListNoFallback(url_scheme);
- if (proxy_server_list && !proxy_server_list->IsEmpty())
- return proxy_server_list;
- if (url_scheme == "ws" || url_scheme == "wss")
- return GetProxyListForWebSocketScheme();
- if (!fallback_proxies.IsEmpty())
- return &fallback_proxies;
- return NULL; // No mapping for this scheme. Use direct.
-}
-
-bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const {
- return type == other.type &&
- single_proxies.Equals(other.single_proxies) &&
- proxies_for_http.Equals(other.proxies_for_http) &&
- proxies_for_https.Equals(other.proxies_for_https) &&
- proxies_for_ftp.Equals(other.proxies_for_ftp) &&
- fallback_proxies.Equals(other.fallback_proxies) &&
- bypass_rules.Equals(other.bypass_rules) &&
- reverse_bypass == other.reverse_bypass;
-}
-
-ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback(
- const std::string& scheme) {
- DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type);
- if (scheme == "http")
- return &proxies_for_http;
- if (scheme == "https")
- return &proxies_for_https;
- if (scheme == "ftp")
- return &proxies_for_ftp;
- return NULL; // No mapping for this scheme.
-}
-
-const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme()
- const {
- if (!fallback_proxies.IsEmpty())
- return &fallback_proxies;
- if (!proxies_for_https.IsEmpty())
- return &proxies_for_https;
- if (!proxies_for_http.IsEmpty())
- return &proxies_for_http;
- return NULL;
-}
-
-ProxyConfig::ProxyConfig()
- : auto_detect_(false), pac_mandatory_(false),
- source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID) {
-}
-
-ProxyConfig::ProxyConfig(const ProxyConfig& config)
- : auto_detect_(config.auto_detect_),
- pac_url_(config.pac_url_),
- pac_mandatory_(config.pac_mandatory_),
- proxy_rules_(config.proxy_rules_),
- source_(config.source_),
- id_(config.id_) {
-}
-
-ProxyConfig::~ProxyConfig() {
-}
-
-ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) {
- auto_detect_ = config.auto_detect_;
- pac_url_ = config.pac_url_;
- pac_mandatory_ = config.pac_mandatory_;
- proxy_rules_ = config.proxy_rules_;
- source_ = config.source_;
- id_ = config.id_;
- return *this;
-}
-
-bool ProxyConfig::Equals(const ProxyConfig& other) const {
- // The two configs can have different IDs and sources. We are just interested
- // in if they have the same settings.
- return auto_detect_ == other.auto_detect_ &&
- pac_url_ == other.pac_url_ &&
- pac_mandatory_ == other.pac_mandatory_ &&
- proxy_rules_.Equals(other.proxy_rules());
-}
-
-bool ProxyConfig::HasAutomaticSettings() const {
- return auto_detect_ || has_pac_url();
-}
-
-void ProxyConfig::ClearAutomaticSettings() {
- auto_detect_ = false;
- pac_url_ = GURL();
-}
-
-base::DictionaryValue* ProxyConfig::ToValue() const {
- base::DictionaryValue* dict = new base::DictionaryValue();
-
- // Output the automatic settings.
- if (auto_detect_)
- dict->SetBoolean("auto_detect", auto_detect_);
- if (has_pac_url()) {
- dict->SetString("pac_url", pac_url_.possibly_invalid_spec());
- if (pac_mandatory_)
- dict->SetBoolean("pac_mandatory", pac_mandatory_);
- }
-
- // Output the manual settings.
- if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) {
- switch (proxy_rules_.type) {
- case ProxyRules::TYPE_SINGLE_PROXY:
- AddProxyListToValue("single_proxy",
- proxy_rules_.single_proxies, dict);
- break;
- case ProxyRules::TYPE_PROXY_PER_SCHEME: {
- base::DictionaryValue* dict2 = new base::DictionaryValue();
- AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2);
- AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2);
- AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2);
- AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2);
- dict->Set("proxy_per_scheme", dict2);
- break;
- }
- default:
- NOTREACHED();
- }
-
- // Output the bypass rules.
- const ProxyBypassRules& bypass = proxy_rules_.bypass_rules;
- if (!bypass.rules().empty()) {
- if (proxy_rules_.reverse_bypass)
- dict->SetBoolean("reverse_bypass", true);
-
- base::ListValue* list = new base::ListValue();
-
- for (ProxyBypassRules::RuleList::const_iterator it =
- bypass.rules().begin();
- it != bypass.rules().end(); ++it) {
- list->Append(new base::StringValue((*it)->ToString()));
- }
-
- dict->Set("bypass_list", list);
- }
- }
-
- // Output the source.
- dict->SetString("source", ProxyConfigSourceToString(source_));
-
- return dict;
-}
-
-} // namespace net
« no previous file with comments | « net/proxy/proxy_config.h ('k') | net/proxy/proxy_config_service.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698