Index: net/proxy/proxy_bypass_rules.cc |
diff --git a/net/proxy/proxy_bypass_rules.cc b/net/proxy/proxy_bypass_rules.cc |
deleted file mode 100644 |
index 970e3bbd6c89349b407d7047d659726810a30b47..0000000000000000000000000000000000000000 |
--- a/net/proxy/proxy_bypass_rules.cc |
+++ /dev/null |
@@ -1,347 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/proxy/proxy_bypass_rules.h" |
- |
-#include "base/stl_util.h" |
-#include "base/strings/string_number_conversions.h" |
-#include "base/strings/string_piece.h" |
-#include "base/strings/string_tokenizer.h" |
-#include "base/strings/string_util.h" |
-#include "base/strings/stringprintf.h" |
-#include "net/base/host_port_pair.h" |
-#include "net/base/net_util.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-class HostnamePatternRule : public ProxyBypassRules::Rule { |
- public: |
- HostnamePatternRule(const std::string& optional_scheme, |
- const std::string& hostname_pattern, |
- int optional_port) |
- : optional_scheme_(base::StringToLowerASCII(optional_scheme)), |
- hostname_pattern_(base::StringToLowerASCII(hostname_pattern)), |
- optional_port_(optional_port) { |
- } |
- |
- bool Matches(const GURL& url) const override { |
- if (optional_port_ != -1 && url.EffectiveIntPort() != optional_port_) |
- return false; // Didn't match port expectation. |
- |
- if (!optional_scheme_.empty() && url.scheme() != optional_scheme_) |
- return false; // Didn't match scheme expectation. |
- |
- // Note it is necessary to lower-case the host, since GURL uses capital |
- // letters for percent-escaped characters. |
- return MatchPattern(base::StringToLowerASCII(url.host()), |
- hostname_pattern_); |
- } |
- |
- std::string ToString() const override { |
- std::string str; |
- if (!optional_scheme_.empty()) |
- base::StringAppendF(&str, "%s://", optional_scheme_.c_str()); |
- str += hostname_pattern_; |
- if (optional_port_ != -1) |
- base::StringAppendF(&str, ":%d", optional_port_); |
- return str; |
- } |
- |
- Rule* Clone() const override { |
- return new HostnamePatternRule(optional_scheme_, |
- hostname_pattern_, |
- optional_port_); |
- } |
- |
- private: |
- const std::string optional_scheme_; |
- const std::string hostname_pattern_; |
- const int optional_port_; |
-}; |
- |
-class BypassLocalRule : public ProxyBypassRules::Rule { |
- public: |
- bool Matches(const GURL& url) const override { |
- const std::string& host = url.host(); |
- if (host == "127.0.0.1" || host == "[::1]") |
- return true; |
- return host.find('.') == std::string::npos; |
- } |
- |
- std::string ToString() const override { return "<local>"; } |
- |
- Rule* Clone() const override { return new BypassLocalRule(); } |
-}; |
- |
-// Rule for matching a URL that is an IP address, if that IP address falls |
-// within a certain numeric range. For example, you could use this rule to |
-// match all the IPs in the CIDR block 10.10.3.4/24. |
-class BypassIPBlockRule : public ProxyBypassRules::Rule { |
- public: |
- // |ip_prefix| + |prefix_length| define the IP block to match. |
- BypassIPBlockRule(const std::string& description, |
- const std::string& optional_scheme, |
- const IPAddressNumber& ip_prefix, |
- size_t prefix_length_in_bits) |
- : description_(description), |
- optional_scheme_(optional_scheme), |
- ip_prefix_(ip_prefix), |
- prefix_length_in_bits_(prefix_length_in_bits) { |
- } |
- |
- bool Matches(const GURL& url) const override { |
- if (!url.HostIsIPAddress()) |
- return false; |
- |
- if (!optional_scheme_.empty() && url.scheme() != optional_scheme_) |
- return false; // Didn't match scheme expectation. |
- |
- // Parse the input IP literal to a number. |
- IPAddressNumber ip_number; |
- if (!ParseIPLiteralToNumber(url.HostNoBrackets(), &ip_number)) |
- return false; |
- |
- // Test if it has the expected prefix. |
- return IPNumberMatchesPrefix(ip_number, ip_prefix_, |
- prefix_length_in_bits_); |
- } |
- |
- std::string ToString() const override { return description_; } |
- |
- Rule* Clone() const override { |
- return new BypassIPBlockRule(description_, |
- optional_scheme_, |
- ip_prefix_, |
- prefix_length_in_bits_); |
- } |
- |
- private: |
- const std::string description_; |
- const std::string optional_scheme_; |
- const IPAddressNumber ip_prefix_; |
- const size_t prefix_length_in_bits_; |
-}; |
- |
-// Returns true if the given string represents an IP address. |
-// IPv6 addresses are expected to be bracketed. |
-bool IsIPAddress(const std::string& domain) { |
- // From GURL::HostIsIPAddress() |
- url::RawCanonOutputT<char, 128> ignored_output; |
- url::CanonHostInfo host_info; |
- url::Component domain_comp(0, domain.size()); |
- url::CanonicalizeIPAddress(domain.c_str(), domain_comp, &ignored_output, |
- &host_info); |
- return host_info.IsIPAddress(); |
-} |
- |
-} // namespace |
- |
-ProxyBypassRules::Rule::Rule() { |
-} |
- |
-ProxyBypassRules::Rule::~Rule() { |
-} |
- |
-bool ProxyBypassRules::Rule::Equals(const Rule& rule) const { |
- return ToString() == rule.ToString(); |
-} |
- |
-ProxyBypassRules::ProxyBypassRules() { |
-} |
- |
-ProxyBypassRules::ProxyBypassRules(const ProxyBypassRules& rhs) { |
- AssignFrom(rhs); |
-} |
- |
-ProxyBypassRules::~ProxyBypassRules() { |
- Clear(); |
-} |
- |
-ProxyBypassRules& ProxyBypassRules::operator=(const ProxyBypassRules& rhs) { |
- AssignFrom(rhs); |
- return *this; |
-} |
- |
-bool ProxyBypassRules::Matches(const GURL& url) const { |
- for (RuleList::const_iterator it = rules_.begin(); it != rules_.end(); ++it) { |
- if ((*it)->Matches(url)) |
- return true; |
- } |
- return false; |
-} |
- |
-bool ProxyBypassRules::Equals(const ProxyBypassRules& other) const { |
- if (rules_.size() != other.rules_.size()) |
- return false; |
- |
- for (size_t i = 0; i < rules_.size(); ++i) { |
- if (!rules_[i]->Equals(*other.rules_[i])) |
- return false; |
- } |
- return true; |
-} |
- |
-void ProxyBypassRules::ParseFromString(const std::string& raw) { |
- ParseFromStringInternal(raw, false); |
-} |
- |
-void ProxyBypassRules::ParseFromStringUsingSuffixMatching( |
- const std::string& raw) { |
- ParseFromStringInternal(raw, true); |
-} |
- |
-bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme, |
- const std::string& hostname_pattern, |
- int optional_port) { |
- if (hostname_pattern.empty()) |
- return false; |
- |
- rules_.push_back(new HostnamePatternRule(optional_scheme, |
- hostname_pattern, |
- optional_port)); |
- return true; |
-} |
- |
-void ProxyBypassRules::AddRuleToBypassLocal() { |
- rules_.push_back(new BypassLocalRule); |
-} |
- |
-bool ProxyBypassRules::AddRuleFromString(const std::string& raw) { |
- return AddRuleFromStringInternalWithLogging(raw, false); |
-} |
- |
-bool ProxyBypassRules::AddRuleFromStringUsingSuffixMatching( |
- const std::string& raw) { |
- return AddRuleFromStringInternalWithLogging(raw, true); |
-} |
- |
-std::string ProxyBypassRules::ToString() const { |
- std::string result; |
- for (RuleList::const_iterator rule(rules_.begin()); |
- rule != rules_.end(); |
- ++rule) { |
- result += (*rule)->ToString(); |
- result += ";"; |
- } |
- return result; |
-} |
- |
-void ProxyBypassRules::Clear() { |
- STLDeleteElements(&rules_); |
-} |
- |
-void ProxyBypassRules::AssignFrom(const ProxyBypassRules& other) { |
- Clear(); |
- |
- // Make a copy of the rules list. |
- for (RuleList::const_iterator it = other.rules_.begin(); |
- it != other.rules_.end(); ++it) { |
- rules_.push_back((*it)->Clone()); |
- } |
-} |
- |
-void ProxyBypassRules::ParseFromStringInternal( |
- const std::string& raw, |
- bool use_hostname_suffix_matching) { |
- Clear(); |
- |
- base::StringTokenizer entries(raw, ",;"); |
- while (entries.GetNext()) { |
- AddRuleFromStringInternalWithLogging(entries.token(), |
- use_hostname_suffix_matching); |
- } |
-} |
- |
-bool ProxyBypassRules::AddRuleFromStringInternal( |
- const std::string& raw_untrimmed, |
- bool use_hostname_suffix_matching) { |
- std::string raw; |
- base::TrimWhitespaceASCII(raw_untrimmed, base::TRIM_ALL, &raw); |
- |
- // This is the special syntax used by WinInet's bypass list -- we allow it |
- // on all platforms and interpret it the same way. |
- if (LowerCaseEqualsASCII(raw, "<local>")) { |
- AddRuleToBypassLocal(); |
- return true; |
- } |
- |
- // Extract any scheme-restriction. |
- std::string::size_type scheme_pos = raw.find("://"); |
- std::string scheme; |
- if (scheme_pos != std::string::npos) { |
- scheme = raw.substr(0, scheme_pos); |
- raw = raw.substr(scheme_pos + 3); |
- if (scheme.empty()) |
- return false; |
- } |
- |
- if (raw.empty()) |
- return false; |
- |
- // If there is a forward slash in the input, it is probably a CIDR style |
- // mask. |
- if (raw.find('/') != std::string::npos) { |
- IPAddressNumber ip_prefix; |
- size_t prefix_length_in_bits; |
- |
- if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits)) |
- return false; |
- |
- rules_.push_back( |
- new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits)); |
- |
- return true; |
- } |
- |
- // Check if we have an <ip-address>[:port] input. We need to treat this |
- // separately since the IP literal may not be in a canonical form. |
- std::string host; |
- int port; |
- if (ParseHostAndPort(raw, &host, &port)) { |
- // Note that HostPortPair is used to merely to convert any IPv6 literals to |
- // a URL-safe format that can be used by canonicalization below. |
- std::string bracketed_host = HostPortPair(host, 80).HostForURL(); |
- if (IsIPAddress(bracketed_host)) { |
- // Canonicalize the IP literal before adding it as a string pattern. |
- GURL tmp_url("http://" + bracketed_host); |
- return AddRuleForHostname(scheme, tmp_url.host(), port); |
- } |
- } |
- |
- // Otherwise assume we have <hostname-pattern>[:port]. |
- std::string::size_type pos_colon = raw.rfind(':'); |
- host = raw; |
- port = -1; |
- if (pos_colon != std::string::npos) { |
- if (!base::StringToInt(base::StringPiece(raw.begin() + pos_colon + 1, |
- raw.end()), |
- &port) || |
- (port < 0 || port > 0xFFFF)) { |
- return false; // Port was invalid. |
- } |
- raw = raw.substr(0, pos_colon); |
- } |
- |
- // Special-case hostnames that begin with a period. |
- // For example, we remap ".google.com" --> "*.google.com". |
- if (StartsWithASCII(raw, ".", false)) |
- raw = "*" + raw; |
- |
- // If suffix matching was asked for, make sure the pattern starts with a |
- // wildcard. |
- if (use_hostname_suffix_matching && !StartsWithASCII(raw, "*", false)) |
- raw = "*" + raw; |
- |
- return AddRuleForHostname(scheme, raw, port); |
-} |
- |
-bool ProxyBypassRules::AddRuleFromStringInternalWithLogging( |
- const std::string& raw, |
- bool use_hostname_suffix_matching) { |
- return AddRuleFromStringInternal(raw, use_hostname_suffix_matching); |
-} |
- |
-} // namespace net |