/*
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include "webrtc/base/proxydetect.h"
#if defined(WEBRTC_WIN)
#include "webrtc/base/win32.h"
#include <shlobj.h>
#endif // WEBRTC_WIN
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#if defined(WEBRTC_MAC) && !defined(WEBRTC_IOS)
#include <SystemConfiguration/SystemConfiguration.h>
#include <CoreFoundation/CoreFoundation.h>
#include <CoreServices/CoreServices.h>
#include <Security/Security.h>
#include "macconversion.h"
#endif
#include <map>
#include "webrtc/base/fileutils.h"
#include "webrtc/base/httpcommon.h"
#include "webrtc/base/httpcommon-inl.h"
#include "webrtc/base/pathutils.h"
#include "webrtc/base/stringutils.h"
#if defined(WEBRTC_WIN)
#define _TRY_WINHTTP 1
#define _TRY_JSPROXY 0
#define _TRY_WM_FINDPROXY 0
#define _TRY_IE_LAN_SETTINGS 1
#endif // WEBRTC_WIN
// For all platforms try Firefox.
#define _TRY_FIREFOX 1
// Use profiles.ini to find the correct profile for this user.
// If not set, we'll just look for the default one.
#define USE_FIREFOX_PROFILES_INI 1
static const size_t kMaxLineLength = 1024;
static const char kFirefoxPattern[] = "Firefox";
static const char kInternetExplorerPattern[] = "MSIE";
struct StringMap {
public:
void Add(const char * name, const char * value) { map_[name] = value; }
const std::string& Get(const char * name, const char * def = "") const {
std::map<std::string, std::string>::const_iterator it =
map_.find(name);
if (it != map_.end())
return it->second;
def_ = def;
return def_;
}
bool IsSet(const char * name) const {
return (map_.find(name) != map_.end());
}
private:
std::map<std::string, std::string> map_;
mutable std::string def_;
};
enum UserAgent {
UA_FIREFOX,
UA_INTERNETEXPLORER,
UA_OTHER,
UA_UNKNOWN
};
#if _TRY_WINHTTP
//#include <winhttp.h>
// Note: From winhttp.h
const char WINHTTP[] = "winhttp";
typedef LPVOID HINTERNET;
typedef struct {
DWORD dwAccessType; // see WINHTTP_ACCESS_* types below
LPWSTR lpszProxy; // proxy server list
LPWSTR lpszProxyBypass; // proxy bypass list
} WINHTTP_PROXY_INFO, * LPWINHTTP_PROXY_INFO;
typedef struct {
DWORD dwFlags;
DWORD dwAutoDetectFlags;
LPCWSTR lpszAutoConfigUrl;
LPVOID lpvReserved;
DWORD dwReserved;
BOOL fAutoLogonIfChallenged;
} WINHTTP_AUTOPROXY_OPTIONS;
typedef struct {
BOOL fAutoDetect;
LPWSTR lpszAutoConfigUrl;
LPWSTR lpszProxy;
LPWSTR lpszProxyBypass;
} WINHTTP_CURRENT_USER_IE_PROXY_CONFIG;
extern "C" {
typedef HINTERNET (WINAPI * pfnWinHttpOpen)
(
IN LPCWSTR pwszUserAgent,
IN DWORD dwAccessType,
IN LPCWSTR pwszProxyName OPTIONAL,
IN LPCWSTR pwszProxyBypass OPTIONAL,
IN DWORD dwFlags
);
typedef BOOL (STDAPICALLTYPE * pfnWinHttpCloseHandle)
(
IN HINTERNET hInternet
);
typedef BOOL (STDAPICALLTYPE * pfnWinHttpGetProxyForUrl)
(
IN HINTERNET hSession,
IN LPCWSTR lpcwszUrl,
IN WINHTTP_AUTOPROXY_OPTIONS * pAutoProxyOptions,
OUT WINHTTP_PROXY_INFO * pProxyInfo
);
typedef BOOL (STDAPICALLTYPE * pfnWinHttpGetIEProxyConfig)
(
IN OUT WINHTTP_CURRENT_USER_IE_PROXY_CONFIG * pProxyConfig
);
} // extern "C"
#define WINHTTP_AUTOPROXY_AUTO_DETECT 0x00000001
#define WINHTTP_AUTOPROXY_CONFIG_URL 0x00000002
#define WINHTTP_AUTOPROXY_RUN_INPROCESS 0x00010000
#define WINHTTP_AUTOPROXY_RUN_OUTPROCESS_ONLY 0x00020000
#define WINHTTP_AUTO_DETECT_TYPE_DHCP 0x00000001
#define WINHTTP_AUTO_DETECT_TYPE_DNS_A 0x00000002
#define WINHTTP_ACCESS_TYPE_DEFAULT_PROXY 0
#define WINHTTP_ACCESS_TYPE_NO_PROXY 1
#define WINHTTP_ACCESS_TYPE_NAMED_PROXY 3
#define WINHTTP_NO_PROXY_NAME NULL
#define WINHTTP_NO_PROXY_BYPASS NULL
#endif // _TRY_WINHTTP
#if _TRY_JSPROXY
extern "C" {
typedef BOOL (STDAPICALLTYPE * pfnInternetGetProxyInfo)
(
LPCSTR lpszUrl,
DWORD dwUrlLength,
LPSTR lpszUrlHostName,
DWORD dwUrlHostNameLength,
LPSTR * lplpszProxyHostName,
LPDWORD lpdwProxyHostNameLength
);
} // extern "C"
#endif // _TRY_JSPROXY
#if _TRY_WM_FINDPROXY
#include <comutil.h>
#include <wmnetsourcecreator.h>
#include <wmsinternaladminnetsource.h>
#endif // _TRY_WM_FINDPROXY
#if _TRY_IE_LAN_SETTINGS
#include <wininet.h>
#include <string>
#endif // _TRY_IE_LAN_SETTINGS
namespace rtc {
//////////////////////////////////////////////////////////////////////
// Utility Functions
//////////////////////////////////////////////////////////////////////
#if defined(WEBRTC_WIN)
#ifdef _UNICODE
typedef std::wstring tstring;
std::string Utf8String(const tstring& str) { return ToUtf8(str); }
#else // !_UNICODE
typedef std::string tstring;
std::string Utf8String(const tstring& str) { return str; }
#endif // !_UNICODE
#endif // WEBRTC_WIN
bool ProxyItemMatch(const Url<char>& url, char * item, size_t len) {
// hostname:443
if (char * port = ::strchr(item, ':')) {
*port++ = '\0';
if (url.port() != atol(port)) {
return false;
}
}
// A.B.C.D or A.B.C.D/24
int a, b, c, d, m;
int match = sscanf(item, "%d.%d.%d.%d/%d", &a, &b, &c, &d, &m);
if (match >= 4) {
uint32 ip = ((a & 0xFF) << 24) | ((b & 0xFF) << 16) | ((c & 0xFF) << 8) |
(d & 0xFF);
if ((match < 5) || (m > 32))
m = 32;
else if (m < 0)
m = 0;
uint32 mask = (m == 0) ? 0 : (~0UL) << (32 - m);
SocketAddress addr(url.host(), 0);
// TODO: Support IPv6 proxyitems. This code block is IPv4 only anyway.
return !addr.IsUnresolved() &&
((addr.ipaddr().v4AddressAsHostOrderInteger() & mask) == (ip & mask));
}
// .foo.com
if (*item == '.') {
size_t hostlen = url.host().length();
return (hostlen > len)
&& (stricmp(url.host().c_str() + (hostlen - len), item) == 0);
}
// localhost or www.*.com
if (!string_match(url.host().c_str(), item))
return false;
return true;
}
bool ProxyListMatch(const Url<char>& url, const std::string& proxy_list,
char sep) {
const size_t BUFSIZE = 256;
char buffer[BUFSIZE];
const char* list = proxy_list.c_str();
while (*list) {
// Remove leading space
if (isspace(*list)) {
++list;
continue;
}
// Break on separator
size_t len;
const char * start = list;
if (const char * end = ::strchr(list, sep)) {
len = (end - list);
list += len + 1;
} else {
len = strlen(list);
list += len;
}
// Remove trailing space
while ((len > 0) && isspace(start[len-1]))
--len;
// Check for oversized entry
if (len >= BUFSIZE)
continue;
memcpy(buffer, start, len);
buffer[len] = 0;
if (!ProxyItemMatch(url, buffer, len))
continue;
return true;
}
return false;
}
bool Better(ProxyType lhs, const ProxyType rhs) {
// PROXY_NONE, PROXY_HTTPS, PROXY_SOCKS5, PROXY_UNKNOWN
const int PROXY_VALUE[5] = { 0, 2, 3, 1 };
return (PROXY_VALUE[lhs] > PROXY_VALUE[rhs]);
}
bool ParseProxy(const std::string& saddress, ProxyInfo* proxy) {
const size_t kMaxAddressLength = 1024;
// Allow semicolon, space, or tab as an address separator
const char* const kAddressSeparator = " ;\t";
ProxyType ptype;
std::string host;
uint16 port;
const char* address = saddress.c_str();
while (*address) {
size_t len;
const char * start = address;
if (const char * sep = strchr(address, kAddressSeparator)) {
len = (sep - address);
address += len + 1;
while (*address != '\0' && ::strchr(kAddressSeparator, *address)) {
address += 1;
}
} else {
len = strlen(address);
address += len;
}
if (len > kMaxAddressLength - 1) {
LOG(LS_WARNING) << "Proxy address too long [" << start << "]";
continue;
}
char buffer[kMaxAddressLength];
memcpy(buffer, start, len);
buffer[len] = 0;
char * colon = ::strchr(buffer, ':');
if (!colon) {
LOG(LS_WARNING) << "Proxy address without port [" << buffer << "]";
continue;
}
*colon = 0;
char * endptr;
port = static_cast<uint16>(strtol(colon + 1, &endptr, 0));
if (*endptr != 0) {
LOG(LS_WARNING) << "Proxy address with invalid port [" << buffer << "]";
continue;
}
if (char * equals = ::strchr(buffer, '=')) {
*equals = 0;
host = equals + 1;
if (_stricmp(buffer, "socks") == 0) {
ptype = PROXY_SOCKS5;
} else if (_stricmp(buffer, "https") == 0) {
ptype = PROXY_HTTPS;
} else {
LOG(LS_WARNING) << "Proxy address with unknown protocol ["
<< buffer << "]";
ptype = PROXY_UNKNOWN;
}
} else {
host = buffer;
ptype = PROXY_UNKNOWN;
}
if (Better(ptype, proxy->type)) {
proxy->type = ptype;
proxy->address.SetIP(host);
proxy->address.SetPort(port);
}
}
return proxy->type != PROXY_NONE;
}
UserAgent GetAgent(const char* agent) {
if (agent) {
std::string agent_str(agent);
if (agent_str.find(kFirefoxPattern) != std::string::npos) {
return UA_FIREFOX;
} else if (agent_str.find(kInternetExplorerPattern) != std::string::npos) {
return UA_INTERNETEXPLORER;
} else if (agent_str.empty()) {
return UA_UNKNOWN;
}
}
return UA_OTHER;
}
bool EndsWith(const std::string& a, const std::string& b) {
if (b.size() > a.size()) {
return false;
}
int result = a.compare(a.size() - b.size(), b.size(), b);
return result == 0;
}
bool GetFirefoxProfilePath(Pathname* path) {
#if defined(WEBRTC_WIN)
wchar_t w_path[MAX_PATH];
if (SHGetFolderPath(0, CSIDL_APPDATA, 0, SHGFP_TYPE_CURRENT, w_path) !=
S_OK) {
LOG(LS_ERROR) << "SHGetFolderPath failed";
return false;
}
path->SetFolder(ToUtf8(w_path, wcslen(w_path)));
path->AppendFolder("Mozilla");
path->AppendFolder("Firefox");
#elif defined(WEBRTC_MAC) && !defined(WEBRTC_IOS)
FSRef fr;
if (0 != FSFindFolder(kUserDomain, kApplicationSupportFolderType,
kCreateFolder, &fr)) {
LOG(LS_ERROR) << "FSFindFolder failed";
return false;
}
char buffer[NAME_MAX + 1];
if (0 != FSRefMakePath(&fr, reinterpret_cast<uint8*>(buffer),
ARRAY_SIZE(buffer))) {
LOG(LS_ERROR) << "FSRefMakePath failed";
return false;
}
path->SetFolder(std::string(buffer));
path->AppendFolder("Firefox");
#else
char* user_home = getenv("HOME");
if (user_home == NULL) {
return false;
}
path->SetFolder(std::string(user_home));
path->AppendFolder(".mozilla");
path->AppendFolder("firefox");
#endif // WEBRTC_WIN
return true;
}
bool GetDefaultFirefoxProfile(Pathname* profile_path) {
ASSERT(NULL != profile_path);
Pathname path;
if (!GetFirefoxProfilePath(&path)) {
return false;
}
#if USE_FIREFOX_PROFILES_INI
// [Profile0]
// Name=default
// IsRelative=1
// Path=Profiles/2de53ejb.default
// Default=1
// Note: we are looking for the first entry with "Default=1", or the last
// entry in the file
path.SetFilename("profiles.ini");
scoped_ptr<FileStream> fs(Filesystem::OpenFile(path, "r"));
if (!fs) {
return false;
}
Pathname candidate;
bool relative = true;
std::string line;
while (fs->ReadLine(&line) == SR_SUCCESS) {
if (line.length() == 0) {
continue;
}
if (line.at(0) == '[') {
relative = true;
candidate.clear();
} else if (line.find("IsRelative=") == 0 &&
line.length() >= 12) {
// TODO: The initial Linux public launch revealed a fairly
// high number of machines where IsRelative= did not have anything after
// it. Perhaps that is legal profiles.ini syntax?
relative = (line.at(11) != '0');
} else if (line.find("Path=") == 0 &&
line.length() >= 6) {
if (relative) {
candidate = path;
} else {
candidate.clear();
}
candidate.AppendFolder(line.substr(5));
} else if (line.find("Default=") == 0 &&
line.length() >= 9) {
if ((line.at(8) != '0') && !candidate.empty()) {
break;
}
}
}
fs->Close();
if (candidate.empty()) {
return false;
}
profile_path->SetPathname(candidate.pathname());
#else // !USE_FIREFOX_PROFILES_INI
path.AppendFolder("Profiles");
DirectoryIterator* it = Filesystem::IterateDirectory();
it->Iterate(path);
std::string extension(".default");
while (!EndsWith(it->Name(), extension)) {
if (!it->Next()) {
return false;
}
}
profile_path->SetPathname(path);
profile->AppendFolder("Profiles");
profile->AppendFolder(it->Name());
delete it;
#endif // !USE_FIREFOX_PROFILES_INI
return true;
}
bool ReadFirefoxPrefs(const Pathname& filename,
const char * prefix,
StringMap* settings) {
scoped_ptr<FileStream> fs(Filesystem::OpenFile(filename, "r"));
if (!fs) {
LOG(LS_ERROR) << "Failed to open file: " << filename.pathname();
return false;
}
std::string line;
while (fs->ReadLine(&line) == SR_SUCCESS) {
size_t prefix_len = strlen(prefix);
// Skip blank lines and too long lines.
if ((line.length() == 0) || (line.length() > kMaxLineLength)
|| (line.at(0) == '#') || line.compare(0, 2, "/*") == 0
|| line.compare(0, 2, " *") == 0) {
continue;
}
char buffer[kMaxLineLength];
strcpyn(buffer, sizeof(buffer), line.c_str());
int nstart = 0, nend = 0, vstart = 0, vend = 0;
sscanf(buffer, "user_pref(\"%n%*[^\"]%n\", %n%*[^)]%n);",
&nstart, &nend, &vstart, &vend);
if (vend > 0) {
char* name = buffer + nstart;
name[nend - nstart] = 0;
if ((vend - vstart >= 2) && (buffer[vstart] == '"')) {
vstart += 1;
vend -= 1;
}
char* value = buffer + vstart;
value[vend - vstart] = 0;
if ((strncmp(name, prefix, prefix_len) == 0) && *value) {
settings->Add(name + prefix_len, value);
}
} else {
LOG_F(LS_WARNING) << "Unparsed pref [" << buffer << "]";
}
}
fs->Close();
return true;
}
bool GetFirefoxProxySettings(const char* url, ProxyInfo* proxy) {
Url<char> purl(url);
Pathname path;
bool success = false;
if (GetDefaultFirefoxProfile(&path)) {
StringMap settings;
path.SetFilename("prefs.js");
if (ReadFirefoxPrefs(path, "network.proxy.", &settings)) {
success = true;
proxy->bypass_list =
settings.Get("no_proxies_on", "localhost, 127.0.0.1");
if (settings.Get("type") == "1") {
// User has manually specified a proxy, try to figure out what
// type it is.
if (ProxyListMatch(purl, proxy->bypass_list.c_str(), ',')) {
// Our url is in the list of url's to bypass proxy.
} else if (settings.Get("share_proxy_settings") == "true") {
proxy->type = PROXY_UNKNOWN;
proxy->address.SetIP(settings.Get("http"));
proxy->address.SetPort(atoi(settings.Get("http_port").c_str()));
} else if (settings.IsSet("socks")) {
proxy->type = PROXY_SOCKS5;
proxy->address.SetIP(settings.Get("socks"));
proxy->address.SetPort(atoi(settings.Get("socks_port").c_str()));
} else if (settings.IsSet("ssl")) {
proxy->type = PROXY_HTTPS;
proxy->address.SetIP(settings.Get("ssl"));
proxy->address.SetPort(atoi(settings.Get("ssl_port").c_str()));
} else if (settings.IsSet("http")) {
proxy->type = PROXY_HTTPS;
proxy->address.SetIP(settings.Get("http"));
proxy->address.SetPort(atoi(settings.Get("http_port").c_str()));
}
} else if (settings.Get("type") == "2") {
// Browser is configured to get proxy settings from a given url.
proxy->autoconfig_url = settings.Get("autoconfig_url").c_str();
} else if (settings.Get("type") == "4") {
// Browser is configured to auto detect proxy config.
proxy->autodetect = true;
} else {
// No proxy set.
}
}
}
return success;
}
#if defined(WEBRTC_WIN) // Windows specific implementation for reading Internet
// Explorer proxy settings.
void LogGetProxyFault() {
LOG_GLEM(LERROR, WINHTTP) << "WinHttpGetProxyForUrl faulted!!";
}
BOOL MyWinHttpGetProxyForUrl(pfnWinHttpGetProxyForUrl pWHGPFU,
HINTERNET hWinHttp, LPCWSTR url,
WINHTTP_AUTOPROXY_OPTIONS *options,
WINHTTP_PROXY_INFO *info) {
// WinHttpGetProxyForUrl() can call plugins which can crash.
// In the case of McAfee scriptproxy.dll, it does crash in
// older versions. Try to catch crashes here and treat as an
// error.
BOOL success = FALSE;
#if (_HAS_EXCEPTIONS == 0)
__try {
success = pWHGPFU(hWinHttp, url, options, info);
} __except(EXCEPTION_EXECUTE_HANDLER) {
// This is a separate function to avoid
// Visual C++ error 2712 when compiling with C++ EH
LogGetProxyFault();
}
#else
success = pWHGPFU(hWinHttp, url, options, info);
#endif // (_HAS_EXCEPTIONS == 0)
return success;
}
bool IsDefaultBrowserFirefox() {
HKEY key;
LONG result = RegOpenKeyEx(HKEY_CLASSES_ROOT, L"http\\shell\\open\\command",
0, KEY_READ, &key);
if (ERROR_SUCCESS != result)
return false;
DWORD size, type;
bool success = false;
result = RegQueryValueEx(key, L"", 0, &type, NULL, &size);
if (result == ERROR_SUCCESS && type == REG_SZ) {
wchar_t* value = new wchar_t[size+1];
BYTE* buffer = reinterpret_cast<BYTE*>(value);
result = RegQueryValueEx(key, L"", 0, &type, buffer, &size);
if (result == ERROR_SUCCESS) {
// Size returned by RegQueryValueEx is in bytes, convert to number of
// wchar_t's.
size /= sizeof(value[0]);
value[size] = L'\0';
for (size_t i = 0; i < size; ++i) {
value[i] = tolowercase(value[i]);
}
success = (NULL != strstr(value, L"firefox.exe"));
}
delete[] value;
}
RegCloseKey(key);
return success;
}
bool GetWinHttpProxySettings(const char* url, ProxyInfo* proxy) {
HMODULE winhttp_handle = LoadLibrary(L"winhttp.dll");
if (winhttp_handle == NULL) {
LOG(LS_ERROR) << "Failed to load winhttp.dll.";
return false;
}
WINHTTP_CURRENT_USER_IE_PROXY_CONFIG iecfg;
memset(&iecfg, 0, sizeof(iecfg));
Url<char> purl(url);
pfnWinHttpGetIEProxyConfig pWHGIEPC =
reinterpret_cast<pfnWinHttpGetIEProxyConfig>(
GetProcAddress(winhttp_handle,
"WinHttpGetIEProxyConfigForCurrentUser"));
bool success = false;
if (pWHGIEPC && pWHGIEPC(&iecfg)) {
// We were read proxy config successfully.
success = true;
if (iecfg.fAutoDetect) {
proxy->autodetect = true;
}
if (iecfg.lpszAutoConfigUrl) {
proxy->autoconfig_url = ToUtf8(iecfg.lpszAutoConfigUrl);
GlobalFree(iecfg.lpszAutoConfigUrl);
}
if (iecfg.lpszProxyBypass) {
proxy->bypass_list = ToUtf8(iecfg.lpszProxyBypass);
GlobalFree(iecfg.lpszProxyBypass);
}
if (iecfg.lpszProxy) {
if (!ProxyListMatch(purl, proxy->bypass_list, ';')) {
ParseProxy(ToUtf8(iecfg.lpszProxy), proxy);
}
GlobalFree(iecfg.lpszProxy);
}
}
FreeLibrary(winhttp_handle);
return success;
}
// Uses the WinHTTP API to auto detect proxy for the given url. Firefox and IE
// have slightly different option dialogs for proxy settings. In Firefox,
// either a location of a proxy configuration file can be specified or auto
// detection can be selected. In IE theese two options can be independently
// selected. For the case where both options are selected (only IE) we try to
// fetch the config file first, and if that fails we'll perform an auto
// detection.
//
// Returns true if we successfully performed an auto detection not depending on
// whether we found a proxy or not. Returns false on error.
bool WinHttpAutoDetectProxyForUrl(const char* agent, const char* url,
ProxyInfo* proxy) {
Url<char> purl(url);
bool success = true;
HMODULE winhttp_handle = LoadLibrary(L"winhttp.dll");
if (winhttp_handle == NULL) {
LOG(LS_ERROR) << "Failed to load winhttp.dll.";
return false;
}
pfnWinHttpOpen pWHO =
reinterpret_cast<pfnWinHttpOpen>(GetProcAddress(winhttp_handle,
"WinHttpOpen"));
pfnWinHttpCloseHandle pWHCH =
reinterpret_cast<pfnWinHttpCloseHandle>(
GetProcAddress(winhttp_handle, "WinHttpCloseHandle"));
pfnWinHttpGetProxyForUrl pWHGPFU =
reinterpret_cast<pfnWinHttpGetProxyForUrl>(
GetProcAddress(winhttp_handle, "WinHttpGetProxyForUrl"));
if (pWHO && pWHCH && pWHGPFU) {
if (HINTERNET hWinHttp = pWHO(ToUtf16(agent).c_str(),
WINHTTP_ACCESS_TYPE_NO_PROXY,
WINHTTP_NO_PROXY_NAME,
WINHTTP_NO_PROXY_BYPASS,
0)) {
BOOL result = FALSE;
WINHTTP_PROXY_INFO info;
memset(&info, 0, sizeof(info));
if (proxy->autodetect) {
// Use DHCP and DNS to try to find any proxy to use.
WINHTTP_AUTOPROXY_OPTIONS options;
memset(&options, 0, sizeof(options));
options.fAutoLogonIfChallenged = TRUE;
options.dwFlags |= WINHTTP_AUTOPROXY_AUTO_DETECT;
options.dwAutoDetectFlags |= WINHTTP_AUTO_DETECT_TYPE_DHCP
| WINHTTP_AUTO_DETECT_TYPE_DNS_A;
result = MyWinHttpGetProxyForUrl(
pWHGPFU, hWinHttp, ToUtf16(url).c_str(), &options, &info);
}
if (!result && !proxy->autoconfig_url.empty()) {
// We have the location of a proxy config file. Download it and
// execute it to find proxy settings for our url.
WINHTTP_AUTOPROXY_OPTIONS options;
memset(&options, 0, sizeof(options));
memset(&info, 0, sizeof(info));
options.fAutoLogonIfChallenged = TRUE;
std::wstring autoconfig_url16((ToUtf16)(proxy->autoconfig_url));
options.dwFlags |= WINHTTP_AUTOPROXY_CONFIG_URL;
options.lpszAutoConfigUrl = autoconfig_url16.c_str();
result = MyWinHttpGetProxyForUrl(
pWHGPFU, hWinHttp, ToUtf16(url).c_str(), &options, &info);
}
if (result) {
// Either the given auto config url was valid or auto
// detection found a proxy on this network.
if (info.lpszProxy) {
// TODO: Does this bypass list differ from the list
// retreived from GetWinHttpProxySettings earlier?
if (info.lpszProxyBypass) {
proxy->bypass_list = ToUtf8(info.lpszProxyBypass);
GlobalFree(info.lpszProxyBypass);
} else {
proxy->bypass_list.clear();
}
if (!ProxyListMatch(purl, proxy->bypass_list, ';')) {
// Found proxy for this URL. If parsing the address turns
// out ok then we are successful.
success = ParseProxy(ToUtf8(info.lpszProxy), proxy);
}
GlobalFree(info.lpszProxy);
}
} else {
// We could not find any proxy for this url.
LOG(LS_INFO) << "No proxy detected for " << url;
}
pWHCH(hWinHttp);
}
} else {
LOG(LS_ERROR) << "Failed loading WinHTTP functions.";
success = false;
}
FreeLibrary(winhttp_handle);
return success;
}
#if 0 // Below functions currently not used.
bool GetJsProxySettings(const char* url, ProxyInfo* proxy) {
Url<char> purl(url);
bool success = false;
if (HMODULE hModJS = LoadLibrary(_T("jsproxy.dll"))) {
pfnInternetGetProxyInfo pIGPI =
reinterpret_cast<pfnInternetGetProxyInfo>(
GetProcAddress(hModJS, "InternetGetProxyInfo"));
if (pIGPI) {
char proxy[256], host[256];
memset(proxy, 0, sizeof(proxy));
char * ptr = proxy;
DWORD proxylen = sizeof(proxy);
std::string surl = Utf8String(url);
DWORD hostlen = _snprintf(host, sizeof(host), "http%s://%S",
purl.secure() ? "s" : "", purl.server());
if (pIGPI(surl.data(), surl.size(), host, hostlen, &ptr, &proxylen)) {
LOG(INFO) << "Proxy: " << proxy;
} else {
LOG_GLE(INFO) << "InternetGetProxyInfo";
}
}
FreeLibrary(hModJS);
}
return success;
}
bool GetWmProxySettings(const char* url, ProxyInfo* proxy) {
Url<char> purl(url);
bool success = false;
INSNetSourceCreator * nsc = 0;
HRESULT hr = CoCreateInstance(CLSID_ClientNetManager, 0, CLSCTX_ALL,
IID_INSNetSourceCreator, (LPVOID *) &nsc);
if (SUCCEEDED(hr)) {
if (SUCCEEDED(hr = nsc->Initialize())) {
VARIANT dispatch;
VariantInit(&dispatch);
if (SUCCEEDED(hr = nsc->GetNetSourceAdminInterface(L"http", &dispatch))) {
IWMSInternalAdminNetSource * ians = 0;
if (SUCCEEDED(hr = dispatch.pdispVal->QueryInterface(
IID_IWMSInternalAdminNetSource, (LPVOID *) &ians))) {
_bstr_t host(purl.server());
BSTR proxy = 0;
BOOL bProxyEnabled = FALSE;
DWORD port, context = 0;
if (SUCCEEDED(hr = ians->FindProxyForURL(
L"http", host, &bProxyEnabled, &proxy, &port, &context))) {
success = true;
if (bProxyEnabled) {
_bstr_t sproxy = proxy;
proxy->ptype = PT_HTTPS;
proxy->host = sproxy;
proxy->port = port;
}
}
SysFreeString(proxy);
if (FAILED(hr = ians->ShutdownProxyContext(context))) {
LOG(LS_INFO) << "IWMSInternalAdminNetSource::ShutdownProxyContext"
<< "failed: " << hr;
}
ians->Release();
}
}
VariantClear(&dispatch);
if (FAILED(hr = nsc->Shutdown())) {
LOG(LS_INFO) << "INSNetSourceCreator::Shutdown failed: " << hr;
}
}
nsc->Release();
}
return success;
}
bool GetIePerConnectionProxySettings(const char* url, ProxyInfo* proxy) {
Url<char> purl(url);
bool success = false;
INTERNET_PER_CONN_OPTION_LIST list;
INTERNET_PER_CONN_OPTION options[3];
memset(&list, 0, sizeof(list));
memset(&options, 0, sizeof(options));
list.dwSize = sizeof(list);
list.dwOptionCount = 3;
list.pOptions = options;
options[0].dwOption = INTERNET_PER_CONN_FLAGS;
options[1].dwOption = INTERNET_PER_CONN_PROXY_SERVER;
options[2].dwOption = INTERNET_PER_CONN_PROXY_BYPASS;
DWORD dwSize = sizeof(list);
if (!InternetQueryOption(0, INTERNET_OPTION_PER_CONNECTION_OPTION, &list,
&dwSize)) {
LOG(LS_INFO) << "InternetQueryOption failed: " << GetLastError();
} else if ((options[0].Value.dwValue & PROXY_TYPE_PROXY) != 0) {
success = true;
if (!ProxyListMatch(purl, nonnull(options[2].Value.pszValue), _T(';'))) {
ParseProxy(nonnull(options[1].Value.pszValue), proxy);
}
} else if ((options[0].Value.dwValue & PROXY_TYPE_DIRECT) != 0) {
success = true;
} else {
LOG(LS_INFO) << "unknown internet access type: "
<< options[0].Value.dwValue;
}
if (options[1].Value.pszValue) {
GlobalFree(options[1].Value.pszValue);
}
if (options[2].Value.pszValue) {
GlobalFree(options[2].Value.pszValue);
}
return success;
}
#endif // 0
// Uses the InternetQueryOption function to retrieve proxy settings
// from the registry. This will only give us the 'static' settings,
// ie, not any information about auto config etc.
bool GetIeLanProxySettings(const char* url, ProxyInfo* proxy) {
Url<char> purl(url);
bool success = false;
wchar_t buffer[1024];
memset(buffer, 0, sizeof(buffer));
INTERNET_PROXY_INFO * info = reinterpret_cast<INTERNET_PROXY_INFO *>(buffer);
DWORD dwSize = sizeof(buffer);
if (!InternetQueryOption(0, INTERNET_OPTION_PROXY, info, &dwSize)) {
LOG(LS_INFO) << "InternetQueryOption failed: " << GetLastError();
} else if (info->dwAccessType == INTERNET_OPEN_TYPE_DIRECT) {
success = true;
} else if (info->dwAccessType == INTERNET_OPEN_TYPE_PROXY) {
success = true;
if (!ProxyListMatch(purl, nonnull(reinterpret_cast<const char*>(
info->lpszProxyBypass)), ' ')) {
ParseProxy(nonnull(reinterpret_cast<const char*>(info->lpszProxy)),
proxy);
}
} else {
LOG(LS_INFO) << "unknown internet access type: " << info->dwAccessType;
}
return success;
}
bool GetIeProxySettings(const char* agent, const char* url, ProxyInfo* proxy) {
bool success = GetWinHttpProxySettings(url, proxy);
if (!success) {
// TODO: Should always call this if no proxy were detected by
// GetWinHttpProxySettings?
// WinHttp failed. Try using the InternetOptionQuery method instead.
return GetIeLanProxySettings(url, proxy);
}
return true;
}
#endif // WEBRTC_WIN
#if defined(WEBRTC_MAC) && !defined(WEBRTC_IOS) // WEBRTC_MAC && !defined(WEBRTC_IOS) specific implementation for reading system wide
// proxy settings.
bool p_getProxyInfoForTypeFromDictWithKeys(ProxyInfo* proxy,
ProxyType type,
const CFDictionaryRef proxyDict,
const CFStringRef enabledKey,
const CFStringRef hostKey,
const CFStringRef portKey) {
// whether or not we set up the proxy info.
bool result = false;
// we use this as a scratch variable for determining if operations
// succeeded.
bool converted = false;
// the data we need to construct the SocketAddress for the proxy.
std::string hostname;
int port;
if ((proxyDict != NULL) &&
(CFGetTypeID(proxyDict) == CFDictionaryGetTypeID())) {
// CoreFoundation stuff that we'll have to get from
// the dictionaries and interpret or convert into more usable formats.
CFNumberRef enabledCFNum;
CFNumberRef portCFNum;
CFStringRef hostCFStr;
enabledCFNum = (CFNumberRef)CFDictionaryGetValue(proxyDict, enabledKey);
if (p_isCFNumberTrue(enabledCFNum)) {
// let's see if we can get the address and port.
hostCFStr = (CFStringRef)CFDictionaryGetValue(proxyDict, hostKey);
converted = p_convertHostCFStringRefToCPPString(hostCFStr, hostname);
if (converted) {
portCFNum = (CFNumberRef)CFDictionaryGetValue(proxyDict, portKey);
converted = p_convertCFNumberToInt(portCFNum, &port);
if (converted) {
// we have something enabled, with a hostname and a port.
// That's sufficient to set up the proxy info.
proxy->type = type;
proxy->address.SetIP(hostname);
proxy->address.SetPort(port);
result = true;
}
}
}
}
return result;
}
// Looks for proxy information in the given dictionary,
// return true if it found sufficient information to define one,
// false otherwise. This is guaranteed to not change the values in proxy
// unless a full-fledged proxy description was discovered in the dictionary.
// However, at the present time this does not support username or password.
// Checks first for a SOCKS proxy, then for HTTPS, then HTTP.
bool GetMacProxySettingsFromDictionary(ProxyInfo* proxy,
const CFDictionaryRef proxyDict) {
// the function result.
bool gotProxy = false;
// first we see if there's a SOCKS proxy in place.
gotProxy = p_getProxyInfoForTypeFromDictWithKeys(proxy,
PROXY_SOCKS5,
proxyDict,
kSCPropNetProxiesSOCKSEnable,
kSCPropNetProxiesSOCKSProxy,
kSCPropNetProxiesSOCKSPort);
if (!gotProxy) {
// okay, no SOCKS proxy, let's look for https.
gotProxy = p_getProxyInfoForTypeFromDictWithKeys(proxy,
PROXY_HTTPS,
proxyDict,
kSCPropNetProxiesHTTPSEnable,
kSCPropNetProxiesHTTPSProxy,
kSCPropNetProxiesHTTPSPort);
if (!gotProxy) {
// Finally, try HTTP proxy. Note that flute doesn't
// differentiate between HTTPS and HTTP, hence we are using the
// same flute type here, ie. PROXY_HTTPS.
gotProxy = p_getProxyInfoForTypeFromDictWithKeys(
proxy, PROXY_HTTPS, proxyDict, kSCPropNetProxiesHTTPEnable,
kSCPropNetProxiesHTTPProxy, kSCPropNetProxiesHTTPPort);
}
}
return gotProxy;
}
// TODO(hughv) Update keychain functions. They work on 10.8, but are depricated.
#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
bool p_putPasswordInProxyInfo(ProxyInfo* proxy) {
bool result = true; // by default we assume we're good.
// for all we know there isn't any password. We'll set to false
// if we find a problem.
// Ask the keychain for an internet password search for the given protocol.
OSStatus oss = 0;
SecKeychainAttributeList attrList;
attrList.count = 3;
SecKeychainAttribute attributes[3];
attrList.attr = attributes;
attributes[0].tag = kSecProtocolItemAttr;
attributes[0].length = sizeof(SecProtocolType);
SecProtocolType protocol;
switch (proxy->type) {
case PROXY_HTTPS :
protocol = kSecProtocolTypeHTTPS;
break;
case PROXY_SOCKS5 :
protocol = kSecProtocolTypeSOCKS;
break;
default :
LOG(LS_ERROR) << "asked for proxy password for unknown proxy type.";
result = false;
break;
}
attributes[0].data = &protocol;
UInt32 port = proxy->address.port();
attributes[1].tag = kSecPortItemAttr;
attributes[1].length = sizeof(UInt32);
attributes[1].data = &port;
std::string ip = proxy->address.ipaddr().ToString();
attributes[2].tag = kSecServerItemAttr;
attributes[2].length = ip.length();
attributes[2].data = const_cast<char*>(ip.c_str());
if (result) {
LOG(LS_INFO) << "trying to get proxy username/password";
SecKeychainSearchRef sref;
oss = SecKeychainSearchCreateFromAttributes(NULL,
kSecInternetPasswordItemClass,
&attrList, &sref);
if (0 == oss) {
LOG(LS_INFO) << "SecKeychainSearchCreateFromAttributes was good";
// Get the first item, if there is one.
SecKeychainItemRef iref;
oss = SecKeychainSearchCopyNext(sref, &iref);
if (0 == oss) {
LOG(LS_INFO) << "...looks like we have the username/password data";
// If there is, get the username and the password.
SecKeychainAttributeInfo attribsToGet;
attribsToGet.count = 1;
UInt32 tag = kSecAccountItemAttr;
UInt32 format = CSSM_DB_ATTRIBUTE_FORMAT_STRING;
void *data;
UInt32 length;
SecKeychainAttributeList *localList;
attribsToGet.tag = &tag;
attribsToGet.format = &format;
OSStatus copyres = SecKeychainItemCopyAttributesAndData(iref,
&attribsToGet,
NULL,
&localList,
&length,
&data);
if (0 == copyres) {
LOG(LS_INFO) << "...and we can pull it out.";
// now, we know from experimentation (sadly not from docs)
// that the username is in the local attribute list,
// and the password in the data,
// both without null termination but with info on their length.
// grab the password from the data.
std::string password;
password.append(static_cast<const char*>(data), length);
// make the password into a CryptString
// huh, at the time of writing, you can't.
// so we'll skip that for now and come back to it later.
// now put the username in the proxy.
if (1 <= localList->attr->length) {
proxy->username.append(
static_cast<const char*>(localList->attr->data),
localList->attr->length);
LOG(LS_INFO) << "username is " << proxy->username;
} else {
LOG(LS_ERROR) << "got keychain entry with no username";
result = false;
}
} else {
LOG(LS_ERROR) << "couldn't copy info from keychain.";
result = false;
}
SecKeychainItemFreeAttributesAndData(localList, data);
} else if (errSecItemNotFound == oss) {
LOG(LS_INFO) << "...username/password info not found";
} else {
// oooh, neither 0 nor itemNotFound.
LOG(LS_ERROR) << "Couldn't get keychain information, error code" << oss;
result = false;
}
} else if (errSecItemNotFound == oss) { // noop
} else {
// oooh, neither 0 nor itemNotFound.
LOG(LS_ERROR) << "Couldn't get keychain information, error code" << oss;
result = false;
}
}
return result;
}
bool GetMacProxySettings(ProxyInfo* proxy) {
// based on the Apple Technical Q&A QA1234
// http://developer.apple.com/qa/qa2001/qa1234.html
CFDictionaryRef proxyDict = SCDynamicStoreCopyProxies(NULL);
bool result = false;
if (proxyDict != NULL) {
// sending it off to another function makes it easier to unit test
// since we can make our own dictionary to hand to that function.
result = GetMacProxySettingsFromDictionary(proxy, proxyDict);
if (result) {
result = p_putPasswordInProxyInfo(proxy);
}
// We created the dictionary with something that had the
// word 'copy' in it, so we have to release it, according
// to the Carbon memory management standards.
CFRelease(proxyDict);
} else {
LOG(LS_ERROR) << "SCDynamicStoreCopyProxies failed";
}
return result;
}
#endif // WEBRTC_MAC && !defined(WEBRTC_IOS)
bool AutoDetectProxySettings(const char* agent, const char* url,
ProxyInfo* proxy) {
#if defined(WEBRTC_WIN)
return WinHttpAutoDetectProxyForUrl(agent, url, proxy);
#else
LOG(LS_WARNING) << "Proxy auto-detection not implemented for this platform";
return false;
#endif
}
bool GetSystemDefaultProxySettings(const char* agent, const char* url,
ProxyInfo* proxy) {
#if defined(WEBRTC_WIN)
return GetIeProxySettings(agent, url, proxy);
#elif defined(WEBRTC_MAC) && !defined(WEBRTC_IOS)
return GetMacProxySettings(proxy);
#else
// TODO: Get System settings if browser is not firefox.
return GetFirefoxProxySettings(url, proxy);
#endif
}
bool GetProxySettingsForUrl(const char* agent, const char* url,
ProxyInfo* proxy, bool long_operation) {
UserAgent a = GetAgent(agent);
bool result;
switch (a) {
case UA_FIREFOX: {
result = GetFirefoxProxySettings(url, proxy);
break;
}
#if defined(WEBRTC_WIN)
case UA_INTERNETEXPLORER:
result = GetIeProxySettings(agent, url, proxy);
break;
case UA_UNKNOWN:
// Agent not defined, check default browser.
if (IsDefaultBrowserFirefox()) {
result = GetFirefoxProxySettings(url, proxy);
} else {
result = GetIeProxySettings(agent, url, proxy);
}
break;
#endif // WEBRTC_WIN
default:
result = GetSystemDefaultProxySettings(agent, url, proxy);
break;
}
// TODO: Consider using the 'long_operation' parameter to
// decide whether to do the auto detection.
if (result && (proxy->autodetect ||
!proxy->autoconfig_url.empty())) {
// Use WinHTTP to auto detect proxy for us.
result = AutoDetectProxySettings(agent, url, proxy);
if (!result) {
// Either auto detection is not supported or we simply didn't
// find any proxy, reset type.
proxy->type = rtc::PROXY_NONE;
}
}
return result;
}
} // namespace rtc