blob: b902655c0de0ecd628bfd7f4074a645939782452 [file] [log] [blame]
[email protected]24f49bd32011-04-19 19:01:141// Copyright (c) 2011 The Chromium Authors. All rights reserved.
[email protected]7541206c2010-02-19 20:24:062// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/proxy/proxy_bypass_rules.h"
6
[email protected]7286e3fc2011-07-19 22:13:247#include "base/stl_util.h"
[email protected]fc9be5802013-06-11 10:56:518#include "base/strings/string_number_conversions.h"
9#include "base/strings/string_util.h"
10#include "base/strings/stringprintf.h"
[email protected]d069c11a2013-04-13 00:01:5511#include "base/strings/string_piece.h"
[email protected]f4ebe772013-02-02 00:21:3912#include "base/strings/string_tokenizer.h"
[email protected]7541206c2010-02-19 20:24:0613#include "net/base/net_util.h"
14
15namespace net {
16
17namespace {
18
19class HostnamePatternRule : public ProxyBypassRules::Rule {
20 public:
21 HostnamePatternRule(const std::string& optional_scheme,
22 const std::string& hostname_pattern,
23 int optional_port)
24 : optional_scheme_(StringToLowerASCII(optional_scheme)),
25 hostname_pattern_(StringToLowerASCII(hostname_pattern)),
26 optional_port_(optional_port) {
27 }
28
[email protected]c4c1b482011-07-22 17:24:2629 virtual bool Matches(const GURL& url) const OVERRIDE {
[email protected]7541206c2010-02-19 20:24:0630 if (optional_port_ != -1 && url.EffectiveIntPort() != optional_port_)
31 return false; // Didn't match port expectation.
32
33 if (!optional_scheme_.empty() && url.scheme() != optional_scheme_)
34 return false; // Didn't match scheme expectation.
35
36 // Note it is necessary to lower-case the host, since GURL uses capital
37 // letters for percent-escaped characters.
[email protected]44935742010-09-10 08:18:4638 return MatchPattern(StringToLowerASCII(url.host()), hostname_pattern_);
[email protected]7541206c2010-02-19 20:24:0639 }
40
[email protected]c4c1b482011-07-22 17:24:2641 virtual std::string ToString() const OVERRIDE {
[email protected]7541206c2010-02-19 20:24:0642 std::string str;
43 if (!optional_scheme_.empty())
[email protected]a77fa2dc2010-11-15 12:11:1144 base::StringAppendF(&str, "%s://", optional_scheme_.c_str());
[email protected]7541206c2010-02-19 20:24:0645 str += hostname_pattern_;
46 if (optional_port_ != -1)
[email protected]a77fa2dc2010-11-15 12:11:1147 base::StringAppendF(&str, ":%d", optional_port_);
[email protected]7541206c2010-02-19 20:24:0648 return str;
49 }
50
[email protected]c4c1b482011-07-22 17:24:2651 virtual Rule* Clone() const OVERRIDE {
[email protected]af370092010-12-01 02:06:2652 return new HostnamePatternRule(optional_scheme_,
53 hostname_pattern_,
54 optional_port_);
55 }
56
[email protected]7541206c2010-02-19 20:24:0657 private:
58 const std::string optional_scheme_;
59 const std::string hostname_pattern_;
60 const int optional_port_;
61};
62
63class BypassLocalRule : public ProxyBypassRules::Rule {
64 public:
[email protected]c4c1b482011-07-22 17:24:2665 virtual bool Matches(const GURL& url) const OVERRIDE {
[email protected]7541206c2010-02-19 20:24:0666 const std::string& host = url.host();
67 if (host == "127.0.0.1" || host == "[::1]")
68 return true;
69 return host.find('.') == std::string::npos;
70 }
71
[email protected]c4c1b482011-07-22 17:24:2672 virtual std::string ToString() const OVERRIDE {
[email protected]7541206c2010-02-19 20:24:0673 return "<local>";
74 }
[email protected]af370092010-12-01 02:06:2675
[email protected]c4c1b482011-07-22 17:24:2676 virtual Rule* Clone() const OVERRIDE {
[email protected]af370092010-12-01 02:06:2677 return new BypassLocalRule();
78 }
[email protected]7541206c2010-02-19 20:24:0679};
80
[email protected]54392832010-06-08 23:25:0481// Rule for matching a URL that is an IP address, if that IP address falls
82// within a certain numeric range. For example, you could use this rule to
83// match all the IPs in the CIDR block 10.10.3.4/24.
84class BypassIPBlockRule : public ProxyBypassRules::Rule {
85 public:
86 // |ip_prefix| + |prefix_length| define the IP block to match.
87 BypassIPBlockRule(const std::string& description,
88 const std::string& optional_scheme,
89 const IPAddressNumber& ip_prefix,
90 size_t prefix_length_in_bits)
91 : description_(description),
92 optional_scheme_(optional_scheme),
93 ip_prefix_(ip_prefix),
94 prefix_length_in_bits_(prefix_length_in_bits) {
95 }
96
[email protected]c4c1b482011-07-22 17:24:2697 virtual bool Matches(const GURL& url) const OVERRIDE {
[email protected]54392832010-06-08 23:25:0498 if (!url.HostIsIPAddress())
99 return false;
100
101 if (!optional_scheme_.empty() && url.scheme() != optional_scheme_)
102 return false; // Didn't match scheme expectation.
103
104 // Parse the input IP literal to a number.
105 IPAddressNumber ip_number;
106 if (!ParseIPLiteralToNumber(url.HostNoBrackets(), &ip_number))
107 return false;
108
109 // Test if it has the expected prefix.
110 return IPNumberMatchesPrefix(ip_number, ip_prefix_,
111 prefix_length_in_bits_);
112 }
113
[email protected]c4c1b482011-07-22 17:24:26114 virtual std::string ToString() const OVERRIDE {
[email protected]54392832010-06-08 23:25:04115 return description_;
116 }
117
[email protected]c4c1b482011-07-22 17:24:26118 virtual Rule* Clone() const OVERRIDE {
[email protected]af370092010-12-01 02:06:26119 return new BypassIPBlockRule(description_,
120 optional_scheme_,
121 ip_prefix_,
122 prefix_length_in_bits_);
123 }
124
[email protected]54392832010-06-08 23:25:04125 private:
126 const std::string description_;
127 const std::string optional_scheme_;
128 const IPAddressNumber ip_prefix_;
129 const size_t prefix_length_in_bits_;
130};
131
[email protected]7541206c2010-02-19 20:24:06132// Returns true if the given string represents an IP address.
133bool IsIPAddress(const std::string& domain) {
134 // From GURL::HostIsIPAddress()
135 url_canon::RawCanonOutputT<char, 128> ignored_output;
136 url_canon::CanonHostInfo host_info;
137 url_parse::Component domain_comp(0, domain.size());
138 url_canon::CanonicalizeIPAddress(domain.c_str(), domain_comp,
139 &ignored_output, &host_info);
140 return host_info.IsIPAddress();
141}
142
143} // namespace
144
[email protected]af370092010-12-01 02:06:26145ProxyBypassRules::Rule::Rule() {
146}
147
148ProxyBypassRules::Rule::~Rule() {
149}
150
151bool ProxyBypassRules::Rule::Equals(const Rule& rule) const {
152 return ToString() == rule.ToString();
153}
154
[email protected]9349cfb2010-08-31 18:00:53155ProxyBypassRules::ProxyBypassRules() {
156}
157
[email protected]af370092010-12-01 02:06:26158ProxyBypassRules::ProxyBypassRules(const ProxyBypassRules& rhs) {
159 AssignFrom(rhs);
[email protected]9349cfb2010-08-31 18:00:53160}
161
[email protected]7541206c2010-02-19 20:24:06162ProxyBypassRules::~ProxyBypassRules() {
[email protected]af370092010-12-01 02:06:26163 Clear();
[email protected]7541206c2010-02-19 20:24:06164}
165
[email protected]9349cfb2010-08-31 18:00:53166ProxyBypassRules& ProxyBypassRules::operator=(const ProxyBypassRules& rhs) {
[email protected]af370092010-12-01 02:06:26167 AssignFrom(rhs);
[email protected]9349cfb2010-08-31 18:00:53168 return *this;
169}
170
[email protected]7541206c2010-02-19 20:24:06171bool ProxyBypassRules::Matches(const GURL& url) const {
172 for (RuleList::const_iterator it = rules_.begin(); it != rules_.end(); ++it) {
173 if ((*it)->Matches(url))
174 return true;
175 }
176 return false;
177}
178
179bool ProxyBypassRules::Equals(const ProxyBypassRules& other) const {
[email protected]af370092010-12-01 02:06:26180 if (rules_.size() != other.rules_.size())
[email protected]7541206c2010-02-19 20:24:06181 return false;
182
183 for (size_t i = 0; i < rules_.size(); ++i) {
[email protected]af370092010-12-01 02:06:26184 if (!rules_[i]->Equals(*other.rules_[i]))
[email protected]7541206c2010-02-19 20:24:06185 return false;
186 }
187 return true;
188}
189
190void ProxyBypassRules::ParseFromString(const std::string& raw) {
191 ParseFromStringInternal(raw, false);
192}
193
194void ProxyBypassRules::ParseFromStringUsingSuffixMatching(
195 const std::string& raw) {
196 ParseFromStringInternal(raw, true);
197}
198
199bool ProxyBypassRules::AddRuleForHostname(const std::string& optional_scheme,
200 const std::string& hostname_pattern,
201 int optional_port) {
202 if (hostname_pattern.empty())
203 return false;
204
[email protected]af370092010-12-01 02:06:26205 rules_.push_back(new HostnamePatternRule(optional_scheme,
206 hostname_pattern,
207 optional_port));
[email protected]7541206c2010-02-19 20:24:06208 return true;
209}
210
211void ProxyBypassRules::AddRuleToBypassLocal() {
[email protected]af370092010-12-01 02:06:26212 rules_.push_back(new BypassLocalRule);
[email protected]7541206c2010-02-19 20:24:06213}
214
215bool ProxyBypassRules::AddRuleFromString(const std::string& raw) {
216 return AddRuleFromStringInternalWithLogging(raw, false);
217}
218
[email protected]1a597192010-07-09 16:58:38219bool ProxyBypassRules::AddRuleFromStringUsingSuffixMatching(
220 const std::string& raw) {
221 return AddRuleFromStringInternalWithLogging(raw, true);
222}
223
[email protected]24f49bd32011-04-19 19:01:14224std::string ProxyBypassRules::ToString() const {
225 std::string result;
226 for (RuleList::const_iterator rule(rules_.begin());
227 rule != rules_.end();
228 ++rule) {
229 result += (*rule)->ToString();
230 result += ";";
231 }
232 return result;
233}
234
[email protected]7541206c2010-02-19 20:24:06235void ProxyBypassRules::Clear() {
[email protected]af370092010-12-01 02:06:26236 STLDeleteElements(&rules_);
237}
238
239void ProxyBypassRules::AssignFrom(const ProxyBypassRules& other) {
240 Clear();
241
242 // Make a copy of the rules list.
243 for (RuleList::const_iterator it = other.rules_.begin();
244 it != other.rules_.end(); ++it) {
245 rules_.push_back((*it)->Clone());
246 }
[email protected]7541206c2010-02-19 20:24:06247}
248
249void ProxyBypassRules::ParseFromStringInternal(
250 const std::string& raw,
251 bool use_hostname_suffix_matching) {
252 Clear();
253
[email protected]f4ebe772013-02-02 00:21:39254 base::StringTokenizer entries(raw, ",;");
[email protected]7541206c2010-02-19 20:24:06255 while (entries.GetNext()) {
256 AddRuleFromStringInternalWithLogging(entries.token(),
257 use_hostname_suffix_matching);
258 }
259}
260
261bool ProxyBypassRules::AddRuleFromStringInternal(
262 const std::string& raw_untrimmed,
263 bool use_hostname_suffix_matching) {
264 std::string raw;
[email protected]8af69c6c2014-03-03 19:05:31265 base::TrimWhitespaceASCII(raw_untrimmed, base::TRIM_ALL, &raw);
[email protected]7541206c2010-02-19 20:24:06266
267 // This is the special syntax used by WinInet's bypass list -- we allow it
268 // on all platforms and interpret it the same way.
269 if (LowerCaseEqualsASCII(raw, "<local>")) {
270 AddRuleToBypassLocal();
271 return true;
272 }
273
274 // Extract any scheme-restriction.
275 std::string::size_type scheme_pos = raw.find("://");
276 std::string scheme;
277 if (scheme_pos != std::string::npos) {
278 scheme = raw.substr(0, scheme_pos);
279 raw = raw.substr(scheme_pos + 3);
280 if (scheme.empty())
281 return false;
282 }
283
284 if (raw.empty())
285 return false;
286
287 // If there is a forward slash in the input, it is probably a CIDR style
288 // mask.
289 if (raw.find('/') != std::string::npos) {
[email protected]54392832010-06-08 23:25:04290 IPAddressNumber ip_prefix;
291 size_t prefix_length_in_bits;
292
293 if (!ParseCIDRBlock(raw, &ip_prefix, &prefix_length_in_bits))
294 return false;
295
[email protected]af370092010-12-01 02:06:26296 rules_.push_back(
297 new BypassIPBlockRule(raw, scheme, ip_prefix, prefix_length_in_bits));
[email protected]54392832010-06-08 23:25:04298
299 return true;
[email protected]7541206c2010-02-19 20:24:06300 }
301
302 // Check if we have an <ip-address>[:port] input. We need to treat this
303 // separately since the IP literal may not be in a canonical form.
304 std::string host;
305 int port;
306 if (ParseHostAndPort(raw, &host, &port)) {
307 if (IsIPAddress(host)) {
308 // Canonicalize the IP literal before adding it as a string pattern.
309 GURL tmp_url("http://" + host);
310 return AddRuleForHostname(scheme, tmp_url.host(), port);
311 }
312 }
313
314 // Otherwise assume we have <hostname-pattern>[:port].
315 std::string::size_type pos_colon = raw.rfind(':');
316 host = raw;
317 port = -1;
318 if (pos_colon != std::string::npos) {
[email protected]eb72b272011-12-19 16:10:55319 if (!base::StringToInt(base::StringPiece(raw.begin() + pos_colon + 1,
320 raw.end()),
321 &port) ||
[email protected]7541206c2010-02-19 20:24:06322 (port < 0 || port > 0xFFFF)) {
323 return false; // Port was invalid.
324 }
325 raw = raw.substr(0, pos_colon);
326 }
327
328 // Special-case hostnames that begin with a period.
329 // For example, we remap ".google.com" --> "*.google.com".
330 if (StartsWithASCII(raw, ".", false))
331 raw = "*" + raw;
332
333 // If suffix matching was asked for, make sure the pattern starts with a
334 // wildcard.
335 if (use_hostname_suffix_matching && !StartsWithASCII(raw, "*", false))
336 raw = "*" + raw;
337
338 return AddRuleForHostname(scheme, raw, port);
339}
340
341bool ProxyBypassRules::AddRuleFromStringInternalWithLogging(
342 const std::string& raw,
343 bool use_hostname_suffix_matching) {
[email protected]e5e61662010-03-11 02:32:39344 return AddRuleFromStringInternal(raw, use_hostname_suffix_matching);
[email protected]7541206c2010-02-19 20:24:06345}
346
347} // namespace net