1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262
|
// Copyright 2011 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/proxy_resolution/proxy_bypass_rules.h"
#include "base/strings/string_tokenizer.h"
#include "base/strings/string_util.h"
#include "build/build_config.h"
#include "net/base/url_util.h"
namespace net {
namespace {
// The <-loopback> rule corresponds with "remove the implicitly added bypass
// rules".
//
// The name <-loopback> is not a very precise name (as the implicit rules cover
// more than strictly loopback addresses), however this is the name that is
// used on Windows so re-used here.
//
// For platform-differences between implicit rules see
// ProxyResolverRules::MatchesImplicitRules().
const char kSubtractImplicitBypasses[] = "<-loopback>";
// The <local> rule bypasses any hostname that has no dots (and is not
// an IP literal). The name is misleading as it has nothing to do with
// localhost/loopback addresses, and would have better been called
// something like "simple hostnames". However this is the name used on
// Windows so is matched here.
const char kBypassSimpleHostnames[] = "<local>";
bool IsLinkLocalIP(const GURL& url) {
// Quick fail if definitely not link-local, to avoid doing unnecessary work in
// common case.
if (!(url.host_piece().starts_with("169.254.") ||
url.host_piece().starts_with("["))) {
return false;
}
IPAddress ip_address;
if (!ip_address.AssignFromIPLiteral(url.HostNoBracketsPiece()))
return false;
return ip_address.IsLinkLocal();
}
// Returns true if the URL's host is an IPv6 literal in the range
// [::ffff:127.0.0.1]/104.
//
// Note that net::IsLocalhost() does not currently return true for such
// addresses. However for proxy resolving such URLs should bypass the use
// of a PAC script, since the destination is local.
bool IsIPv4MappedLoopback(const GURL& url) {
if (!url.host_piece().starts_with("[::ffff")) {
return false;
}
IPAddress ip_address;
if (!ip_address.AssignFromIPLiteral(url.HostNoBracketsPiece()))
return false;
if (!ip_address.IsIPv4MappedIPv6())
return false;
return ip_address.bytes()[12] == 127;
}
class BypassSimpleHostnamesRule : public SchemeHostPortMatcherRule {
public:
BypassSimpleHostnamesRule() = default;
BypassSimpleHostnamesRule(const BypassSimpleHostnamesRule&) = delete;
BypassSimpleHostnamesRule& operator=(const BypassSimpleHostnamesRule&) =
delete;
SchemeHostPortMatcherResult Evaluate(const GURL& url) const override {
return ((url.host_piece().find('.') == std::string::npos) &&
!url.HostIsIPAddress())
? SchemeHostPortMatcherResult::kInclude
: SchemeHostPortMatcherResult::kNoMatch;
}
std::string ToString() const override { return kBypassSimpleHostnames; }
};
class SubtractImplicitBypassesRule : public SchemeHostPortMatcherRule {
public:
SubtractImplicitBypassesRule() = default;
SubtractImplicitBypassesRule(const SubtractImplicitBypassesRule&) = delete;
SubtractImplicitBypassesRule& operator=(const SubtractImplicitBypassesRule&) =
delete;
SchemeHostPortMatcherResult Evaluate(const GURL& url) const override {
return ProxyBypassRules::MatchesImplicitRules(url)
? SchemeHostPortMatcherResult::kExclude
: SchemeHostPortMatcherResult::kNoMatch;
}
std::string ToString() const override { return kSubtractImplicitBypasses; }
};
std::unique_ptr<SchemeHostPortMatcherRule> ParseRule(
std::string_view raw_untrimmed) {
std::string_view raw =
base::TrimWhitespaceASCII(raw_untrimmed, base::TRIM_ALL);
// <local> and <-loopback> are special syntax used by WinInet's bypass list
// -- we allow it on all platforms and interpret it the same way.
if (base::EqualsCaseInsensitiveASCII(raw, kBypassSimpleHostnames))
return std::make_unique<BypassSimpleHostnamesRule>();
if (base::EqualsCaseInsensitiveASCII(raw, kSubtractImplicitBypasses))
return std::make_unique<SubtractImplicitBypassesRule>();
return SchemeHostPortMatcherRule::FromUntrimmedRawString(raw_untrimmed);
}
} // namespace
constexpr char net::ProxyBypassRules::kBypassListDelimeter[];
ProxyBypassRules::ProxyBypassRules() = default;
ProxyBypassRules::ProxyBypassRules(const ProxyBypassRules& rhs) {
*this = rhs;
}
ProxyBypassRules::ProxyBypassRules(ProxyBypassRules&& rhs) {
*this = std::move(rhs);
}
ProxyBypassRules::~ProxyBypassRules() = default;
ProxyBypassRules& ProxyBypassRules::operator=(const ProxyBypassRules& rhs) {
ParseFromString(rhs.ToString());
return *this;
}
ProxyBypassRules& ProxyBypassRules::operator=(ProxyBypassRules&& rhs) {
matcher_ = std::move(rhs.matcher_);
return *this;
}
void ProxyBypassRules::ReplaceRule(
size_t index,
std::unique_ptr<SchemeHostPortMatcherRule> rule) {
matcher_.ReplaceRule(index, std::move(rule));
}
bool ProxyBypassRules::Matches(const GURL& url, bool reverse) const {
switch (matcher_.Evaluate(url)) {
case SchemeHostPortMatcherResult::kInclude:
return !reverse;
case SchemeHostPortMatcherResult::kExclude:
return reverse;
case SchemeHostPortMatcherResult::kNoMatch:
break;
}
// If none of the explicit rules matched, fall back to the implicit rules.
bool matches_implicit = MatchesImplicitRules(url);
if (matches_implicit)
return matches_implicit;
return reverse;
}
bool ProxyBypassRules::operator==(const ProxyBypassRules& other) const {
if (rules().size() != other.rules().size())
return false;
for (size_t i = 0; i < rules().size(); ++i) {
if (rules()[i]->ToString() != other.rules()[i]->ToString())
return false;
}
return true;
}
void ProxyBypassRules::ParseFromString(const std::string& raw) {
Clear();
base::StringTokenizer entries(
raw, SchemeHostPortMatcher::kParseRuleListDelimiterList);
while (entries.GetNext()) {
AddRuleFromString(entries.token_piece());
}
}
void ProxyBypassRules::PrependRuleToBypassSimpleHostnames() {
matcher_.AddAsFirstRule(std::make_unique<BypassSimpleHostnamesRule>());
}
bool ProxyBypassRules::AddRuleFromString(std::string_view raw_untrimmed) {
auto rule = ParseRule(raw_untrimmed);
if (rule) {
matcher_.AddAsLastRule(std::move(rule));
return true;
}
return false;
}
void ProxyBypassRules::AddRulesToSubtractImplicit() {
matcher_.AddAsLastRule(std::make_unique<SubtractImplicitBypassesRule>());
}
std::string ProxyBypassRules::GetRulesToSubtractImplicit() {
ProxyBypassRules rules;
rules.AddRulesToSubtractImplicit();
return rules.ToString();
}
std::string ProxyBypassRules::ToString() const {
return matcher_.ToString();
}
void ProxyBypassRules::Clear() {
matcher_.Clear();
}
bool ProxyBypassRules::MatchesImplicitRules(const GURL& url) {
// On Windows the implict rules are:
//
// localhost
// loopback
// 127.0.0.1
// [::1]
// 169.254/16
// [FE80::]/10
//
// And on macOS they are:
//
// localhost
// 127.0.0.1/8
// [::1]
// 169.254/16
//
// Our implicit rules are approximately:
//
// localhost
// localhost.
// *.localhost
// loopback [Windows only]
// loopback. [Windows only]
// [::1]
// 127.0.0.1/8
// 169.254/16
// [FE80::]/10
return IsLocalhost(url) || IsIPv4MappedLoopback(url) ||
IsLinkLocalIP(url)
#if BUILDFLAG(IS_WIN)
// See http://crbug.com/904889
|| (url.host_piece() == "loopback") ||
(url.host_piece() == "loopback.")
#endif
;
}
} // namespace net
|