Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(454)

Unified Diff: net/proxy/proxy_bypass_rules.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/proxy/proxy_bypass_rules.h ('k') | net/proxy/proxy_bypass_rules_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/proxy/proxy_bypass_rules.cc
diff --git a/net/proxy/proxy_bypass_rules.cc b/net/proxy/proxy_bypass_rules.cc
deleted file mode 100644
index 970e3bbd6c89349b407d7047d659726810a30b47..0000000000000000000000000000000000000000
--- a/net/proxy/proxy_bypass_rules.cc
+++ /dev/null
@@ -1,347 +0,0 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/proxy/proxy_bypass_rules.h"
-
-#include "base/stl_util.h"
-#include "base/strings/string_number_conversions.h"
-#include "base/strings/string_piece.h"
-#include "base/strings/string_tokenizer.h"
-#include "base/strings/string_util.h"
-#include "base/strings/stringprintf.h"
-#include "net/base/host_port_pair.h"
-#include "net/base/net_util.h"
-
-namespace net {
-
-namespace {
-
-class HostnamePatternRule : public ProxyBypassRules::Rule {
- public:
- HostnamePatternRule(const std::string& optional_scheme,
- const std::string& hostname_pattern,
- int optional_port)
- : optional_scheme_(base::StringToLowerASCII(optional_scheme)),
- hostname_pattern_(base::StringToLowerASCII(hostname_pattern)),
- optional_port_(optional_port) {
- }
-
- bool Matches(const GURL& url) const override {
- if (optional_port_ != -1 && url.EffectiveIntPort() != optional_port_)
- return false; // Didn't match port expectation.
-
- if (!optional_scheme_.empty() && url.scheme() != optional_scheme_)
- return false; // Didn't match scheme expectation.
-
- // Note it is necessary to lower-case the host, since GURL uses capital
- // letters for percent-escaped characters.
- return MatchPattern(base::StringToLowerASCII(url.host()),
- hostname_pattern_);
- }
-
- std::string ToString() const override {
- std::string str;
- if (!optional_scheme_.empty())
- base::StringAppendF(&str, "%s://", optional_scheme_.c_str());
- str += hostname_pattern_;
- if (optional_port_ != -1)
- base::StringAppendF(&str, ":%d", optional_port_);
- return str;
- }
-
- Rule* Clone() const override {
- return new HostnamePatternRule(optional_scheme_,
- hostname_pattern_,
- optional_port_);
- }
-
- private:
- const std::string optional_scheme_;
- const std::string hostname_pattern_;
- const int optional_port_;
-};
-
-class BypassLocalRule : public ProxyBypassRules::Rule {
- public:
- bool Matches(const GURL& url) const override {
- const std::string& host = url.host();
- if (host == "127.0.0.1" || host == "[::1]")
- return true;
- return host.find('.') == std::string::npos;
- }
-
- std::string ToString() const override { return "<local>"; }
-
- Rule* Clone() const override { return new BypassLocalRule(); }
-};
-
-// Rule for matching a URL that is an IP address, if that IP address falls
-// within a certain numeric range. For example, you could use this rule to
-// match all the IPs in the CIDR block 10.10.3.4/24.
-class BypassIPBlockRule : public ProxyBypassRules::Rule {
- public:
- // |ip_prefix| + |prefix_length| define the IP block to match.
- BypassIPBlockRule(const std::string& description,
- const std::string& optional_scheme,
- const IPAddressNumber& ip_prefix,
- size_t prefix_length_in_bits)
- : description_(description),
- optional_scheme_(optional_scheme),
- ip_prefix_(ip_prefix),
- prefix_length_in_bits_(prefix_length_in_bits) {
- }
-
- bool Matches(const GURL& url) const override {
- if (!url.HostIsIPAddress())
- return false;
-
- if (!optional_scheme_.empty() && url.scheme() != optional_scheme_)
- return false; // Didn't match scheme expectation.
-
- // Parse the input IP literal to a number.
- IPAddressNumber ip_number;
- if (!ParseIPLiteralToNumber(url.HostNoBrackets(), &ip_number))
- return false;
-
- // Test if it has the expected prefix.
- return IPNumberMatchesPrefix(ip_number, ip_prefix_,
- prefix_length_in_bits_);
- }
-
- std::string ToString() const override { return description_; }
-
- Rule* Clone() const override {
- return new BypassIPBlockRule(description_,
- optional_scheme_,
- ip_prefix_,
- prefix_length_in_bits_);
- }
-
- private:
- const std::string description_;
- const std::string optional_scheme_;
- const IPAddressNumber ip_prefix_;
- const size_t prefix_length_in_bits_;
-};
-
-// Returns true if the given string represents an IP address.
-// IPv6 addresses are expected to be bracketed.
-bool IsIPAddress(const std::string& domain) {
- // From GURL::HostIsIPAddress()
- url::RawCanonOutputT<char, 128> ignored_output;
- url::CanonHostInfo host_info;
- url::Component domain_comp(0, domain.size());
- url::CanonicalizeIPAddress(domain.c_str(), domain_comp, &ignored_output,
- &host_info);
- return host_info.IsIPAddress();
-}
-
-} // namespace
-
-ProxyBypassRules::Rule::Rule() {
-}
-
-ProxyBypassRules::Rule::~Rule() {
-}
-
-bool ProxyBypassRules::Rule::Equals(const Rule& rule) const {
- return ToString() == rule.ToString();
-}
-
-ProxyBypassRules::ProxyBypassRules() {
-}
-
-ProxyBypassRules::ProxyBypassRules(const ProxyBypassRules& rhs) {
- AssignFrom(rhs);
-}
-
-ProxyBypassRules::~ProxyBypassRules() {
- Clear();
-}
-
-ProxyBypassRules& ProxyBypassRules::operator=(const ProxyBypassRules& rhs) {
- AssignFrom(rhs);
- return *this;
-}
-
-bool ProxyBypassRules::Matches(const GURL& url) const {
- for (RuleList::const_iterator it = rules_.begin(); it != rules_.end(); ++it) {
- if ((*it)->Matches(url))
- return true;
- }
- return false;
-}
-
-bool ProxyBypassRules::Equals(const ProxyBypassRules& other) const {
- if (rules_.size() != other.rules_.size())
- return false;
-
- for (size_t i = 0; i < rules_.size(); ++i) {
- if (!rules_[i]->Equals(*other.rules_[i]))
- return false;
- }
- return true;
-}
-
-void ProxyBypassRules::ParseFromString(const std::string& raw) {
- ParseFromStringInternal(raw, false);
-}
-
-void ProxyBypassRules::ParseFromStringUsingSuffixMatching(
- const std::string& raw) {
- ParseFromStringInternal(raw, true);
-}
-
-bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme,
- const std::string& hostname_pattern,
- int optional_port) {
- if (hostname_pattern.empty())
- return false;
-
- rules_.push_back(new HostnamePatternRule(optional_scheme,
- hostname_pattern,
- optional_port));
- return true;
-}
-
-void ProxyBypassRules::AddRuleToBypassLocal() {
- rules_.push_back(new BypassLocalRule);
-}
-
-bool ProxyBypassRules::AddRuleFromString(const std::string& raw) {
- return AddRuleFromStringInternalWithLogging(raw, false);
-}
-
-bool ProxyBypassRules::AddRuleFromStringUsingSuffixMatching(
- const std::string& raw) {
- return AddRuleFromStringInternalWithLogging(raw, true);
-}
-
-std::string ProxyBypassRules::ToString() const {
- std::string result;
- for (RuleList::const_iterator rule(rules_.begin());
- rule != rules_.end();
- ++rule) {
- result += (*rule)->ToString();
- result += ";";
- }
- return result;
-}
-
-void ProxyBypassRules::Clear() {
- STLDeleteElements(&rules_);
-}
-
-void ProxyBypassRules::AssignFrom(const ProxyBypassRules& other) {
- Clear();
-
- // Make a copy of the rules list.
- for (RuleList::const_iterator it = other.rules_.begin();
- it != other.rules_.end(); ++it) {
- rules_.push_back((*it)->Clone());
- }
-}
-
-void ProxyBypassRules::ParseFromStringInternal(
- const std::string& raw,
- bool use_hostname_suffix_matching) {
- Clear();
-
- base::StringTokenizer entries(raw, ",;");
- while (entries.GetNext()) {
- AddRuleFromStringInternalWithLogging(entries.token(),
- use_hostname_suffix_matching);
- }
-}
-
-bool ProxyBypassRules::AddRuleFromStringInternal(
- const std::string& raw_untrimmed,
- bool use_hostname_suffix_matching) {
- std::string raw;
- base::TrimWhitespaceASCII(raw_untrimmed, base::TRIM_ALL, &raw);
-
- // This is the special syntax used by WinInet's bypass list -- we allow it
- // on all platforms and interpret it the same way.
- if (LowerCaseEqualsASCII(raw, "<local>")) {
- AddRuleToBypassLocal();
- return true;
- }
-
- // Extract any scheme-restriction.
- std::string::size_type scheme_pos = raw.find("://");
- std::string scheme;
- if (scheme_pos != std::string::npos) {
- scheme = raw.substr(0, scheme_pos);
- raw = raw.substr(scheme_pos + 3);
- if (scheme.empty())
- return false;
- }
-
- if (raw.empty())
- return false;
-
- // If there is a forward slash in the input, it is probably a CIDR style
- // mask.
- if (raw.find('/') != std::string::npos) {
- IPAddressNumber ip_prefix;
- size_t prefix_length_in_bits;
-
- if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits))
- return false;
-
- rules_.push_back(
- new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits));
-
- return true;
- }
-
- // Check if we have an <ip-address>[:port] input. We need to treat this
- // separately since the IP literal may not be in a canonical form.
- std::string host;
- int port;
- if (ParseHostAndPort(raw, &host, &port)) {
- // Note that HostPortPair is used to merely to convert any IPv6 literals to
- // a URL-safe format that can be used by canonicalization below.
- std::string bracketed_host = HostPortPair(host, 80).HostForURL();
- if (IsIPAddress(bracketed_host)) {
- // Canonicalize the IP literal before adding it as a string pattern.
- GURL tmp_url("http://" + bracketed_host);
- return AddRuleForHostname(scheme, tmp_url.host(), port);
- }
- }
-
- // Otherwise assume we have <hostname-pattern>[:port].
- std::string::size_type pos_colon = raw.rfind(':');
- host = raw;
- port = -1;
- if (pos_colon != std::string::npos) {
- if (!base::StringToInt(base::StringPiece(raw.begin() + pos_colon + 1,
- raw.end()),
- &port) ||
- (port < 0 || port > 0xFFFF)) {
- return false; // Port was invalid.
- }
- raw = raw.substr(0, pos_colon);
- }
-
- // Special-case hostnames that begin with a period.
- // For example, we remap ".google.com" --> "*.google.com".
- if (StartsWithASCII(raw, ".", false))
- raw = "*" + raw;
-
- // If suffix matching was asked for, make sure the pattern starts with a
- // wildcard.
- if (use_hostname_suffix_matching && !StartsWithASCII(raw, "*", false))
- raw = "*" + raw;
-
- return AddRuleForHostname(scheme, raw, port);
-}
-
-bool ProxyBypassRules::AddRuleFromStringInternalWithLogging(
- const std::string& raw,
- bool use_hostname_suffix_matching) {
- return AddRuleFromStringInternal(raw, use_hostname_suffix_matching);
-}
-
-} // namespace net
« no previous file with comments | « net/proxy/proxy_bypass_rules.h ('k') | net/proxy/proxy_bypass_rules_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698