diff options
author | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:42:52 +0000 |
---|---|---|
committer | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:42:52 +0000 |
commit | 586acc5fe142f498261f52c66862fa417c3d52d2 (patch) | |
tree | c98b3417a883f2477029c8cd5888f4078681e24e /net/base/registry_controlled_domain.cc | |
parent | a814a8d55429605fe6d7045045cd25b6bf624580 (diff) | |
download | chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.zip chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.gz chromium_src-586acc5fe142f498261f52c66862fa417c3d52d2.tar.bz2 |
Add net to the repository.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@14 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/registry_controlled_domain.cc')
-rw-r--r-- | net/base/registry_controlled_domain.cc | 351 |
1 files changed, 351 insertions, 0 deletions
diff --git a/net/base/registry_controlled_domain.cc b/net/base/registry_controlled_domain.cc new file mode 100644 index 0000000..b573d17 --- /dev/null +++ b/net/base/registry_controlled_domain.cc @@ -0,0 +1,351 @@ +//* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* ***** BEGIN LICENSE BLOCK ***** + * Version: MPL 1.1/GPL 2.0/LGPL 2.1 + * + * The contents of this file are subject to the Mozilla Public License Version + * 1.1 (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * http://www.mozilla.org/MPL/ + * + * Software distributed under the License is distributed on an "AS IS" basis, + * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License + * for the specific language governing rights and limitations under the + * License. + * + * The Original Code is Mozilla Effective-TLD Service + * + * The Initial Developer of the Original Code is + * Google Inc. + * Portions created by the Initial Developer are Copyright (C) 2006 + * the Initial Developer. All Rights Reserved. + * + * Contributor(s): + * Pamela Greene <pamg.bugs@gmail.com> (original author) + * Daniel Witte <dwitte@stanford.edu> + * + * Alternatively, the contents of this file may be used under the terms of + * either the GNU General Public License Version 2 or later (the "GPL"), or + * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), + * in which case the provisions of the GPL or the LGPL are applicable instead + * of those above. If you wish to allow use of your version of this file only + * under the terms of either the GPL or the LGPL, and not to allow others to + * use your version of this file under the terms of the MPL, indicate your + * decision by deleting the provisions above and replace them with the notice + * and other provisions required by the GPL or the LGPL. If you do not delete + * the provisions above, a recipient may use your version of this file under + * the terms of any one of the MPL, the GPL or the LGPL. + * + * ***** END LICENSE BLOCK ***** */ + +#include <windows.h> + +#include "base/logging.h" +#include "base/string_util.h" +#include "googleurl/src/gurl.h" +#include "googleurl/src/url_parse.h" +#include "net/base/net_module.h" +#include "net/base/net_resources.h" +#include "net/base/net_util.h" +#include "net/base/registry_controlled_domain.h" + +// This list of rules is used by unit tests and any other time that the main +// resource file is not available. It should be kept exceedingly short to +// avoid impacting unit test performance. +static const char kDefaultDomainData[] = "com\n" + "edu\n" + "gov\n" + "net\n" + "org\n" + "co.uk\n"; + +// static +std::string RegistryControlledDomainService::GetDomainAndRegistry( + const GURL& gurl) { + const url_parse::Component host = + gurl.parsed_for_possibly_invalid_spec().host; + if ((host.len <= 0) || gurl.HostIsIPAddress()) + return std::string(); + return GetDomainAndRegistryImpl(std::string( + gurl.possibly_invalid_spec().data() + host.begin, host.len)); +} + +// static +std::string RegistryControlledDomainService::GetDomainAndRegistry( + const std::string& host) { + bool is_ip_address; + const std::string canon_host(net_util::CanonicalizeHost(host, + &is_ip_address)); + if (canon_host.empty() || is_ip_address) + return std::string(); + return GetDomainAndRegistryImpl(canon_host); +} + +// static +std::string RegistryControlledDomainService::GetDomainAndRegistry( + const std::wstring& host) { + bool is_ip_address; + const std::string canon_host(net_util::CanonicalizeHost(host, + &is_ip_address)); + if (canon_host.empty() || is_ip_address) + return std::string(); + return GetDomainAndRegistryImpl(canon_host); +} + +// static +bool RegistryControlledDomainService::SameDomainOrHost(const GURL& gurl1, + const GURL& gurl2) { + // See if both URLs have a known domain + registry, and those values are the + // same. + const std::string domain1(GetDomainAndRegistry(gurl1)); + const std::string domain2(GetDomainAndRegistry(gurl2)); + if (!domain1.empty() || !domain2.empty()) + return domain1 == domain2; + + // No domains. See if the hosts are identical. + const url_parse::Component host1 = + gurl1.parsed_for_possibly_invalid_spec().host; + const url_parse::Component host2 = + gurl2.parsed_for_possibly_invalid_spec().host; + if ((host1.len <= 0) || (host1.len != host2.len)) + return false; + return !strncmp(gurl1.possibly_invalid_spec().data() + host1.begin, + gurl2.possibly_invalid_spec().data() + host2.begin, + host1.len); +} + +// static +size_t RegistryControlledDomainService::GetRegistryLength( + const GURL& gurl, + bool allow_unknown_registries) { + const url_parse::Component host = + gurl.parsed_for_possibly_invalid_spec().host; + if (host.len <= 0) + return std::string::npos; + if (gurl.HostIsIPAddress()) + return 0; + return GetInstance()->GetRegistryLengthImpl( + std::string(gurl.possibly_invalid_spec().data() + host.begin, host.len), + allow_unknown_registries); +} + +// static +size_t RegistryControlledDomainService::GetRegistryLength( + const std::string& host, + bool allow_unknown_registries) { + bool is_ip_address; + const std::string canon_host(net_util::CanonicalizeHost(host, + &is_ip_address)); + if (canon_host.empty()) + return std::string::npos; + if (is_ip_address) + return 0; + return GetInstance()->GetRegistryLengthImpl(canon_host, + allow_unknown_registries); +} + +// static +size_t RegistryControlledDomainService::GetRegistryLength( + const std::wstring& host, + bool allow_unknown_registries) { + bool is_ip_address; + const std::string canon_host(net_util::CanonicalizeHost(host, + &is_ip_address)); + if (canon_host.empty()) + return std::string::npos; + if (is_ip_address) + return 0; + return GetInstance()->GetRegistryLengthImpl(canon_host, + allow_unknown_registries); +} + +// static +std::string RegistryControlledDomainService::GetDomainAndRegistryImpl( + const std::string& host) { + DCHECK(!host.empty()); + + // Find the length of the registry for this host. + const size_t registry_length = + GetInstance()->GetRegistryLengthImpl(host, true); + if ((registry_length == std::string::npos) || (registry_length == 0)) + return std::string(); // No registry. + // The "2" in this next line is 1 for the dot, plus a 1-char minimum preceding + // subcomponent length. + if (registry_length > (host.length() - 2)) { + NOTREACHED() << + "Host does not have at least one subcomponent before registry!"; + return std::string(); + } + + // Move past the dot preceding the registry, and search for the next previous + // dot. Return the host from after that dot, or the whole host when there is + // no dot. + const size_t dot = host.rfind('.', host.length() - registry_length - 2); + if (dot == std::string::npos) + return host; + return host.substr(dot + 1); +} + +size_t RegistryControlledDomainService::GetRegistryLengthImpl( + const std::string& host, + bool allow_unknown_registries) { + DCHECK(!host.empty()); + + // Skip leading dots. + const size_t host_check_begin = host.find_first_not_of('.'); + if (host_check_begin == std::string::npos) + return 0; // Host is only dots. + + // A single trailing dot isn't relevant in this determination, but does need + // to be included in the final returned length. + size_t host_check_len = host.length(); + if (host[host_check_len - 1] == '.') { + --host_check_len; + DCHECK(host_check_len > 0); // If this weren't true, the host would be ".", + // and we'd have already returned above. + if (host[host_check_len - 1] == '.') + return 0; // Multiple trailing dots. + } + + // Walk up the domain tree, most specific to least specific, + // looking for matches at each level. + StringSegment match; + size_t prev_start = std::string::npos; + size_t curr_start = host_check_begin; + size_t next_dot = host.find('.', curr_start); + if (next_dot >= host_check_len) // Catches std::string::npos as well. + return 0; // This can't have a registry + domain. + while (1) { + match.Set(host.data(), curr_start, host_check_len - curr_start); + DomainMap::iterator iter = domain_map_.find(match); + if (iter != domain_map_.end()) { + DomainEntry entry = iter->second; + // Exception rules override wildcard rules when the domain is an exact + // match, but wildcards take precedence when there's a subdomain. + if (entry.wildcard && (prev_start != std::string::npos)) { + // If prev_start == host_check_begin, then the host is the registry + // itself, so return 0. + return (prev_start == host_check_begin) ? + 0 : (host.length() - prev_start); + } + + if (entry.exception) { + if (next_dot == std::string::npos) { + // If we get here, we had an exception rule with no dots (e.g. + // "!foo"). This would only be valid if we had a corresponding + // wildcard rule, which would have to be "*". But we explicitly + // disallow that case, so this kind of rule is invalid. + NOTREACHED() << "Invalid exception rule"; + return 0; + } + return host.length() - next_dot - 1; + } + + // If curr_start == host_check_begin, then the host is the registry + // itself, so return 0. + return (curr_start == host_check_begin) ? + 0 : (host.length() - curr_start); + } + + if (next_dot >= host_check_len) // Catches std::string::npos as well. + break; + + prev_start = curr_start; + curr_start = next_dot + 1; + next_dot = host.find('.', curr_start); + } + + // No rule found in the registry. curr_start now points to the first + // character of the last subcomponent of the host, so if we allow unknown + // registries, return the length of this subcomponent. + return allow_unknown_registries ? (host.length() - curr_start) : 0; +} + +RegistryControlledDomainService* RegistryControlledDomainService::instance_ = + NULL; + +// static +RegistryControlledDomainService* RegistryControlledDomainService::GetInstance() +{ + if (!instance_) { + RegistryControlledDomainService* s = new RegistryControlledDomainService(); + s->Init(); + // TODO(darin): use fix_wp64.h once it lives in base/ + if (InterlockedCompareExchangePointer( + reinterpret_cast<PVOID*>(&instance_), s, NULL)) { + // Oops, another thread initialized instance_ out from under us. + delete s; + } + } + return instance_; +} + +// static +void RegistryControlledDomainService::UseDomainData(const std::string& data) { + RegistryControlledDomainService* instance = GetInstance(); + instance->domain_data_ = data; + instance->ParseDomainData(); +} + +void RegistryControlledDomainService::Init() { + domain_data_ = NetModule::GetResource(IDR_EFFECTIVE_TLD_NAMES); + if (domain_data_.empty()) { + // The resource file isn't present for some unit tests, for example. Fall + // back to a tiny, basic list of rules in that case. + domain_data_ = kDefaultDomainData; + } + ParseDomainData(); +} + +void RegistryControlledDomainService::ParseDomainData() { + domain_map_.clear(); + + StringSegment rule; + size_t line_end = 0; + size_t line_start = 0; + while (line_start < domain_data_.size()) { + line_end = domain_data_.find('\n', line_start); + if (line_end == std::string::npos) + line_end = domain_data_.size(); + rule.Set(domain_data_.data(), line_start, line_end - line_start); + AddRule(&rule); + line_start = line_end + 1; + } +} + +void RegistryControlledDomainService::AddRule(StringSegment* rule) { + // Determine rule properties. + size_t property_offset = 0; + bool exception = false; + bool wild = false; + + // Valid rules may be either wild or exceptions, but not both. + if (rule->CharAt(0) == '!') { + exception = true; + property_offset = 1; + } else if (rule->CharAt(0) == '*' && rule->CharAt(1) == '.') { + wild = true; + property_offset = 2; + } + + // Find or create an entry for this host. + rule->TrimFromStart(property_offset); + DomainEntry entry; + DomainMap::iterator iter = domain_map_.find(*rule); + if (iter != domain_map_.end()) + entry = iter->second; + + entry.exception |= exception; + entry.wildcard |= wild; + domain_map_[*rule] = entry; +} + +bool RegistryControlledDomainService::StringSegment::operator<( + const StringSegment &other) const { + // If the segments are of equal length, compare their contents; otherwise, + // the shorter segment is "less than" the longer one. + if (len_ == other.len_) { + int comparison = strncmp(data_ + begin_, other.data_ + other.begin_, len_); + return (comparison < 0); + } + return (len_ < other.len_); +} |