diff options
Diffstat (limited to '')
-rw-r--r-- | netwerk/base/nsProxyInfo.cpp | 196 |
1 files changed, 196 insertions, 0 deletions
diff --git a/netwerk/base/nsProxyInfo.cpp b/netwerk/base/nsProxyInfo.cpp new file mode 100644 index 0000000000..8a72a91c42 --- /dev/null +++ b/netwerk/base/nsProxyInfo.cpp @@ -0,0 +1,196 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim:set ts=2 sw=2 sts=2 et cindent: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsProxyInfo.h" + +#include "mozilla/net/NeckoChannelParams.h" +#include "nsCOMPtr.h" + +namespace mozilla { +namespace net { + +// Yes, we support QI to nsProxyInfo +NS_IMPL_ISUPPORTS(nsProxyInfo, nsProxyInfo, nsIProxyInfo) + +// These pointers are declared in nsProtocolProxyService.cpp and +// comparison of mType by string pointer is valid within necko +extern const char kProxyType_HTTP[]; +extern const char kProxyType_HTTPS[]; +extern const char kProxyType_SOCKS[]; +extern const char kProxyType_SOCKS4[]; +extern const char kProxyType_SOCKS5[]; +extern const char kProxyType_DIRECT[]; + +nsProxyInfo::nsProxyInfo(const nsACString& aType, const nsACString& aHost, + int32_t aPort, const nsACString& aUsername, + const nsACString& aPassword, uint32_t aFlags, + uint32_t aTimeout, uint32_t aResolveFlags, + const nsACString& aProxyAuthorizationHeader, + const nsACString& aConnectionIsolationKey) + : mHost(aHost), + mUsername(aUsername), + mPassword(aPassword), + mProxyAuthorizationHeader(aProxyAuthorizationHeader), + mConnectionIsolationKey(aConnectionIsolationKey), + mPort(aPort), + mFlags(aFlags), + mResolveFlags(aResolveFlags), + mTimeout(aTimeout), + mNext(nullptr) { + if (aType.EqualsASCII(kProxyType_HTTP)) { + mType = kProxyType_HTTP; + } else if (aType.EqualsASCII(kProxyType_HTTPS)) { + mType = kProxyType_HTTPS; + } else if (aType.EqualsASCII(kProxyType_SOCKS)) { + mType = kProxyType_SOCKS; + } else if (aType.EqualsASCII(kProxyType_SOCKS4)) { + mType = kProxyType_SOCKS4; + } else if (aType.EqualsASCII(kProxyType_SOCKS5)) { + mType = kProxyType_SOCKS5; + } else if (aType.EqualsASCII(kProxyType_PROXY)) { + mType = kProxyType_PROXY; + } else { + mType = kProxyType_DIRECT; + } +} + +NS_IMETHODIMP +nsProxyInfo::GetHost(nsACString& result) { + result = mHost; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetPort(int32_t* result) { + *result = mPort; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetType(nsACString& result) { + result = mType; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetFlags(uint32_t* result) { + *result = mFlags; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetResolveFlags(uint32_t* result) { + *result = mResolveFlags; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::SetResolveFlags(uint32_t flags) { + mResolveFlags = flags; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetUsername(nsACString& result) { + result = mUsername; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetPassword(nsACString& result) { + result = mPassword; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetProxyAuthorizationHeader(nsACString& result) { + result = mProxyAuthorizationHeader; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetConnectionIsolationKey(nsACString& result) { + result = mConnectionIsolationKey; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetFailoverTimeout(uint32_t* result) { + *result = mTimeout; + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::GetFailoverProxy(nsIProxyInfo** result) { + NS_IF_ADDREF(*result = mNext); + return NS_OK; +} + +NS_IMETHODIMP +nsProxyInfo::SetFailoverProxy(nsIProxyInfo* proxy) { + nsCOMPtr<nsProxyInfo> pi = do_QueryInterface(proxy); + NS_ENSURE_ARG(pi); + + pi.swap(mNext); + return NS_OK; +} + +bool nsProxyInfo::IsDirect() { + if (!mType) return true; + return mType == kProxyType_DIRECT; +} + +bool nsProxyInfo::IsHTTP() { return mType == kProxyType_HTTP; } + +bool nsProxyInfo::IsHTTPS() { return mType == kProxyType_HTTPS; } + +bool nsProxyInfo::IsSOCKS() { + return mType == kProxyType_SOCKS || mType == kProxyType_SOCKS4 || + mType == kProxyType_SOCKS5; +} + +/* static */ +void nsProxyInfo::SerializeProxyInfo(nsProxyInfo* aProxyInfo, + nsTArray<ProxyInfoCloneArgs>& aResult) { + for (nsProxyInfo* iter = aProxyInfo; iter; iter = iter->mNext) { + ProxyInfoCloneArgs* arg = aResult.AppendElement(); + arg->type() = nsCString(iter->Type()); + arg->host() = iter->Host(); + arg->port() = iter->Port(); + arg->username() = iter->Username(); + arg->password() = iter->Password(); + arg->proxyAuthorizationHeader() = iter->ProxyAuthorizationHeader(); + arg->connectionIsolationKey() = iter->ConnectionIsolationKey(); + arg->flags() = iter->Flags(); + arg->timeout() = iter->Timeout(); + arg->resolveFlags() = iter->ResolveFlags(); + } +} + +/* static */ +nsProxyInfo* nsProxyInfo::DeserializeProxyInfo( + const nsTArray<ProxyInfoCloneArgs>& aArgs) { + nsProxyInfo *pi = nullptr, *first = nullptr, *last = nullptr; + for (const ProxyInfoCloneArgs& info : aArgs) { + pi = new nsProxyInfo(info.type(), info.host(), info.port(), info.username(), + info.password(), info.flags(), info.timeout(), + info.resolveFlags(), info.proxyAuthorizationHeader(), + info.connectionIsolationKey()); + if (last) { + last->mNext = pi; + // |mNext| will be released in |last|'s destructor. + NS_IF_ADDREF(last->mNext); + } else { + first = pi; + } + last = pi; + } + + return first; +} + +} // namespace net +} // namespace mozilla |