blob: 7b969d0de66b2a38c106ee75e331903912c27de6 [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_PROXY_RESOLUTION_PROXY_INFO_H_
#define NET_PROXY_RESOLUTION_PROXY_INFO_H_
#include <string>
#include "base/gtest_prod_util.h"
#include "base/time/time.h"
#include "net/base/net_export.h"
#include "net/base/proxy_chain.h"
#include "net/base/proxy_server.h"
#include "net/proxy_resolution/proxy_config.h"
#include "net/proxy_resolution/proxy_list.h"
#include "net/proxy_resolution/proxy_retry_info.h"
#include "net/traffic_annotation/network_traffic_annotation.h"
namespace net {
class NetLogWithSource;
// This object holds proxy information returned by ResolveProxy.
class NET_EXPORT ProxyInfo {
public:
ProxyInfo();
ProxyInfo(const ProxyInfo& other);
~ProxyInfo();
// Default copy-constructor and assignment operator are OK!
// Uses the same proxy server as the given |proxy_info|.
void Use(const ProxyInfo& proxy_info);
// Uses a direct connection.
void UseDirect();
// Uses a direct connection. did_bypass_proxy() will return true to indicate
// that the direct connection is the result of configured proxy bypass rules.
void UseDirectWithBypassedProxy();
// Uses a specific proxy server, of the form:
// proxy-uri = [<scheme> "://"] <hostname> [":" <port>]
// This may optionally be a semi-colon delimited list of <proxy-uri>.
// It is OK to have LWS between entries.
void UseNamedProxy(const std::string& proxy_uri_list);
// Sets the proxy list to a single entry, |proxy_chain|.
void UseProxyChain(const ProxyChain& proxy_chain);
// Parses from the given PAC result.
void UsePacString(const std::string& pac_string);
// Uses the proxies from the given list.
void UseProxyList(const ProxyList& proxy_list);
// Uses the proxies from the given list, but does not otherwise reset the
// proxy configuration.
void OverrideProxyList(const ProxyList& proxy_list);
// Indicates that the request that uses this proxy config caused a match with
// the masked domain list.
// This is a temporary workaround to gather initial metrics for IP Protection.
// TODO(1507085): Remove once the experiment is concluded.
void set_is_mdl_match(bool is_mdl_match) { is_mdl_match_ = is_mdl_match; }
// Returns true if this proxy info specifies a direct connection.
bool is_direct() const {
// We don't implicitly fallback to DIRECT unless it was added to the list.
if (is_empty()) {
return false;
}
return proxy_chain().is_direct();
}
bool is_direct_only() const {
return is_direct() && proxy_list_.size() == 1 && proxy_retry_info_.empty();
}
// Returns true if any of the contained ProxyChains are multi-proxy.
bool ContainsMultiProxyChain() const;
// Returns true if the first valid proxy server is an https proxy.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_https() const;
// Returns true if the first proxy server is an HTTP compatible proxy.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_http_like() const;
// Returns true if the first proxy server is an HTTP compatible proxy over a
// secure connection.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_secure_http_like() const;
// Returns true if the first valid proxy server is an http proxy.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_http() const;
// Returns true if the first valid proxy server is a quic proxy.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_quic() const;
// Returns true if the first valid proxy server is a socks server.
// TODO(https://crbug.com/1491092): Remove this method in favor of checking
// the corresponding property of the relevant proxy server from the next
// proxy chain in the proxy list.
bool is_socks() const;
// Returns true if this proxy info has no proxies left to try.
bool is_empty() const {
return proxy_list_.IsEmpty();
}
// Returns true if this proxy resolution is using a direct connection due to
// proxy bypass rules.
bool did_bypass_proxy() const {
return did_bypass_proxy_;
}
// Returns true if the first proxy chain corresponds to one used for IP
// Protection. For more info, see `ProxyChain::is_for_ip_protection()`.
bool is_for_ip_protection() const;
// Returns true if the request that uses this proxy config caused a match with
// the masked domain list.
// This is a temporary workaround to gather initial metrics for IP Protection.
// TODO(1507085): Remove once the experiment is concluded.
bool is_mdl_match() const { return is_mdl_match_; }
// Returns the first valid proxy chain. is_empty() must be false to be able
// to call this function.
const ProxyChain& proxy_chain() const { return proxy_list_.First(); }
// Returns the full list of proxies to use.
const ProxyList& proxy_list() const { return proxy_list_; }
// See description in ProxyList::ToPacString().
std::string ToPacString() const;
// See description in ProxyList::ToDebugString().
std::string ToDebugString() const;
// Marks the current proxy as bad. |net_error| should contain the network
// error encountered when this proxy was tried, if any. If this fallback
// is not because of a network error, then |OK| should be passed in (eg. for
// reasons such as local policy). Returns true if there is another proxy
// available to try in |proxy_list_|.
bool Fallback(int net_error, const NetLogWithSource& net_log);
// De-prioritizes the proxies that we have cached as not working, by moving
// them to the end of the proxy list.
void DeprioritizeBadProxyChains(const ProxyRetryInfoMap& proxy_retry_info);
// Deletes any entry which doesn't have one of the specified proxy schemes.
void RemoveProxiesWithoutScheme(int scheme_bit_field);
void set_proxy_resolve_start_time(
const base::TimeTicks& proxy_resolve_start_time) {
proxy_resolve_start_time_ = proxy_resolve_start_time;
}
base::TimeTicks proxy_resolve_start_time() const {
return proxy_resolve_start_time_;
}
void set_proxy_resolve_end_time(
const base::TimeTicks& proxy_resolve_end_time) {
proxy_resolve_end_time_ = proxy_resolve_end_time;
}
base::TimeTicks proxy_resolve_end_time() const {
return proxy_resolve_end_time_;
}
void set_traffic_annotation(
const MutableNetworkTrafficAnnotationTag& traffic_annotation) {
traffic_annotation_ = traffic_annotation;
}
MutableNetworkTrafficAnnotationTag traffic_annotation() const {
return traffic_annotation_;
}
const ProxyRetryInfoMap& proxy_retry_info() const {
return proxy_retry_info_;
}
private:
// Reset proxy and config settings.
void Reset();
// Verify that all proxies in the first chain have `SCHEME_HTTPS`. This is
// currently enforced by `ProxyChain::IsValid`, and assumed by various `is_..`
// methods in this class.
bool AllChainProxiesAreHttps() const;
// The ordered list of proxy servers (including DIRECT attempts) remaining to
// try. If proxy_list_ is empty, then there is nothing left to fall back to.
ProxyList proxy_list_;
// List of proxies that have been tried already.
ProxyRetryInfoMap proxy_retry_info_;
// The traffic annotation of the used proxy config.
MutableNetworkTrafficAnnotationTag traffic_annotation_;
// Whether the proxy result represent a proxy bypass.
bool did_bypass_proxy_ = false;
// Whether the request that uses this proxy config caused a match with the
// masked domain list.
// This is a temporary workaround to gather initial metrics for IP Protection.
// TODO(1507085): Remove once the experiment is concluded.
bool is_mdl_match_ = false;
// How long it took to resolve the proxy. Times are both null if proxy was
// determined synchronously without running a PAC.
base::TimeTicks proxy_resolve_start_time_;
base::TimeTicks proxy_resolve_end_time_;
};
} // namespace net
#endif // NET_PROXY_RESOLUTION_PROXY_INFO_H_