Index: net/proxy/proxy_config.cc |
diff --git a/net/proxy/proxy_config.cc b/net/proxy/proxy_config.cc |
deleted file mode 100644 |
index 71264fd0b67f8c3f77c43c7dcbf35f2f1a3296d7..0000000000000000000000000000000000000000 |
--- a/net/proxy/proxy_config.cc |
+++ /dev/null |
@@ -1,290 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/proxy/proxy_config.h" |
- |
-#include "base/logging.h" |
-#include "base/strings/string_util.h" |
-#include "base/strings/string_tokenizer.h" |
-#include "base/values.h" |
-#include "net/proxy/proxy_info.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-// If |proxies| is non-empty, sets it in |dict| under the key |name|. |
-void AddProxyListToValue(const char* name, |
- const ProxyList& proxies, |
- base::DictionaryValue* dict) { |
- if (!proxies.IsEmpty()) |
- dict->Set(name, proxies.ToValue()); |
-} |
- |
-// Split the |uri_list| on commas and add each entry to |proxy_list| in turn. |
-void AddProxyURIListToProxyList(std::string uri_list, |
- ProxyList* proxy_list, |
- ProxyServer::Scheme default_scheme) { |
- base::StringTokenizer proxy_uri_list(uri_list, ","); |
- while (proxy_uri_list.GetNext()) { |
- proxy_list->AddProxyServer( |
- ProxyServer::FromURI(proxy_uri_list.token(), default_scheme)); |
- } |
-} |
- |
-} // namespace |
- |
-ProxyConfig::ProxyRules::ProxyRules() |
- : reverse_bypass(false), |
- type(TYPE_NO_RULES) { |
-} |
- |
-ProxyConfig::ProxyRules::~ProxyRules() { |
-} |
- |
-void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const { |
- if (empty()) { |
- result->UseDirect(); |
- return; |
- } |
- |
- bool bypass_proxy = bypass_rules.Matches(url); |
- if (reverse_bypass) |
- bypass_proxy = !bypass_proxy; |
- if (bypass_proxy) { |
- result->UseDirectWithBypassedProxy(); |
- return; |
- } |
- |
- switch (type) { |
- case ProxyRules::TYPE_SINGLE_PROXY: { |
- result->UseProxyList(single_proxies); |
- return; |
- } |
- case ProxyRules::TYPE_PROXY_PER_SCHEME: { |
- const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme()); |
- if (entry) { |
- result->UseProxyList(*entry); |
- } else { |
- // We failed to find a matching proxy server for the current URL |
- // scheme. Default to direct. |
- result->UseDirect(); |
- } |
- return; |
- } |
- default: { |
- result->UseDirect(); |
- NOTREACHED(); |
- return; |
- } |
- } |
-} |
- |
-void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) { |
- // Reset. |
- type = TYPE_NO_RULES; |
- single_proxies = ProxyList(); |
- proxies_for_http = ProxyList(); |
- proxies_for_https = ProxyList(); |
- proxies_for_ftp = ProxyList(); |
- fallback_proxies = ProxyList(); |
- |
- base::StringTokenizer proxy_server_list(proxy_rules, ";"); |
- while (proxy_server_list.GetNext()) { |
- base::StringTokenizer proxy_server_for_scheme( |
- proxy_server_list.token_begin(), proxy_server_list.token_end(), "="); |
- |
- while (proxy_server_for_scheme.GetNext()) { |
- std::string url_scheme = proxy_server_for_scheme.token(); |
- |
- // If we fail to get the proxy server here, it means that |
- // this is a regular proxy server configuration, i.e. proxies |
- // are not configured per protocol. |
- if (!proxy_server_for_scheme.GetNext()) { |
- if (type == TYPE_PROXY_PER_SCHEME) |
- continue; // Unexpected. |
- AddProxyURIListToProxyList(url_scheme, |
- &single_proxies, |
- ProxyServer::SCHEME_HTTP); |
- type = TYPE_SINGLE_PROXY; |
- return; |
- } |
- |
- // Trim whitespace off the url scheme. |
- base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme); |
- |
- // Add it to the per-scheme mappings (if supported scheme). |
- type = TYPE_PROXY_PER_SCHEME; |
- ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme); |
- ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP; |
- |
- // socks=XXX is inconsistent with the other formats, since "socks" |
- // is not a URL scheme. Rather this means "for everything else, send |
- // it to the SOCKS proxy server XXX". |
- if (url_scheme == "socks") { |
- DCHECK(!entry); |
- entry = &fallback_proxies; |
- // Note that here 'socks' is understood to be SOCKS4, even though |
- // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal. |
- default_scheme = ProxyServer::SCHEME_SOCKS4; |
- } |
- |
- if (entry) { |
- AddProxyURIListToProxyList(proxy_server_for_scheme.token(), |
- entry, |
- default_scheme); |
- } |
- } |
- } |
-} |
- |
-const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList( |
- const std::string& url_scheme) const { |
- const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)-> |
- MapUrlSchemeToProxyListNoFallback(url_scheme); |
- if (proxy_server_list && !proxy_server_list->IsEmpty()) |
- return proxy_server_list; |
- if (url_scheme == "ws" || url_scheme == "wss") |
- return GetProxyListForWebSocketScheme(); |
- if (!fallback_proxies.IsEmpty()) |
- return &fallback_proxies; |
- return NULL; // No mapping for this scheme. Use direct. |
-} |
- |
-bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const { |
- return type == other.type && |
- single_proxies.Equals(other.single_proxies) && |
- proxies_for_http.Equals(other.proxies_for_http) && |
- proxies_for_https.Equals(other.proxies_for_https) && |
- proxies_for_ftp.Equals(other.proxies_for_ftp) && |
- fallback_proxies.Equals(other.fallback_proxies) && |
- bypass_rules.Equals(other.bypass_rules) && |
- reverse_bypass == other.reverse_bypass; |
-} |
- |
-ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback( |
- const std::string& scheme) { |
- DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type); |
- if (scheme == "http") |
- return &proxies_for_http; |
- if (scheme == "https") |
- return &proxies_for_https; |
- if (scheme == "ftp") |
- return &proxies_for_ftp; |
- return NULL; // No mapping for this scheme. |
-} |
- |
-const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme() |
- const { |
- if (!fallback_proxies.IsEmpty()) |
- return &fallback_proxies; |
- if (!proxies_for_https.IsEmpty()) |
- return &proxies_for_https; |
- if (!proxies_for_http.IsEmpty()) |
- return &proxies_for_http; |
- return NULL; |
-} |
- |
-ProxyConfig::ProxyConfig() |
- : auto_detect_(false), pac_mandatory_(false), |
- source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID) { |
-} |
- |
-ProxyConfig::ProxyConfig(const ProxyConfig& config) |
- : auto_detect_(config.auto_detect_), |
- pac_url_(config.pac_url_), |
- pac_mandatory_(config.pac_mandatory_), |
- proxy_rules_(config.proxy_rules_), |
- source_(config.source_), |
- id_(config.id_) { |
-} |
- |
-ProxyConfig::~ProxyConfig() { |
-} |
- |
-ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) { |
- auto_detect_ = config.auto_detect_; |
- pac_url_ = config.pac_url_; |
- pac_mandatory_ = config.pac_mandatory_; |
- proxy_rules_ = config.proxy_rules_; |
- source_ = config.source_; |
- id_ = config.id_; |
- return *this; |
-} |
- |
-bool ProxyConfig::Equals(const ProxyConfig& other) const { |
- // The two configs can have different IDs and sources. We are just interested |
- // in if they have the same settings. |
- return auto_detect_ == other.auto_detect_ && |
- pac_url_ == other.pac_url_ && |
- pac_mandatory_ == other.pac_mandatory_ && |
- proxy_rules_.Equals(other.proxy_rules()); |
-} |
- |
-bool ProxyConfig::HasAutomaticSettings() const { |
- return auto_detect_ || has_pac_url(); |
-} |
- |
-void ProxyConfig::ClearAutomaticSettings() { |
- auto_detect_ = false; |
- pac_url_ = GURL(); |
-} |
- |
-base::DictionaryValue* ProxyConfig::ToValue() const { |
- base::DictionaryValue* dict = new base::DictionaryValue(); |
- |
- // Output the automatic settings. |
- if (auto_detect_) |
- dict->SetBoolean("auto_detect", auto_detect_); |
- if (has_pac_url()) { |
- dict->SetString("pac_url", pac_url_.possibly_invalid_spec()); |
- if (pac_mandatory_) |
- dict->SetBoolean("pac_mandatory", pac_mandatory_); |
- } |
- |
- // Output the manual settings. |
- if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) { |
- switch (proxy_rules_.type) { |
- case ProxyRules::TYPE_SINGLE_PROXY: |
- AddProxyListToValue("single_proxy", |
- proxy_rules_.single_proxies, dict); |
- break; |
- case ProxyRules::TYPE_PROXY_PER_SCHEME: { |
- base::DictionaryValue* dict2 = new base::DictionaryValue(); |
- AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2); |
- AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2); |
- AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2); |
- AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2); |
- dict->Set("proxy_per_scheme", dict2); |
- break; |
- } |
- default: |
- NOTREACHED(); |
- } |
- |
- // Output the bypass rules. |
- const ProxyBypassRules& bypass = proxy_rules_.bypass_rules; |
- if (!bypass.rules().empty()) { |
- if (proxy_rules_.reverse_bypass) |
- dict->SetBoolean("reverse_bypass", true); |
- |
- base::ListValue* list = new base::ListValue(); |
- |
- for (ProxyBypassRules::RuleList::const_iterator it = |
- bypass.rules().begin(); |
- it != bypass.rules().end(); ++it) { |
- list->Append(new base::StringValue((*it)->ToString())); |
- } |
- |
- dict->Set("bypass_list", list); |
- } |
- } |
- |
- // Output the source. |
- dict->SetString("source", ProxyConfigSourceToString(source_)); |
- |
- return dict; |
-} |
- |
-} // namespace net |