[go: nahoru, domu]

blob: 2f29a71bde1385c492ee792887639ae0df219e89 [file] [log] [blame]
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_SPDY_SPDY_SESSION_KEY_H_
#define NET_SPDY_SPDY_SESSION_KEY_H_
#include "net/base/net_export.h"
#include "net/base/network_anonymization_key.h"
#include "net/base/network_isolation_key.h"
#include "net/base/privacy_mode.h"
#include "net/base/proxy_server.h"
#include "net/dns/public/secure_dns_policy.h"
#include "net/socket/socket_tag.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
namespace net {
// SpdySessionKey is used as unique index for SpdySessionPool.
class NET_EXPORT_PRIVATE SpdySessionKey {
public:
enum class IsProxySession {
kFalse,
// This means this is a ProxyServer::Direct() session for an HTTP2 proxy,
// with |host_port_pair| being the proxy host and port. This should not be
// confused with a tunnel over an HTTP2 proxy session, for which
// |proxy_server| will be information about the proxy being used, and
// |host_port_pair| will be information not about the proxy, but the host
// that we're proxying the connection to.
kTrue,
};
SpdySessionKey();
SpdySessionKey(const HostPortPair& host_port_pair,
const ProxyServer& proxy_server,
PrivacyMode privacy_mode,
IsProxySession is_proxy_session,
const SocketTag& socket_tag,
const NetworkAnonymizationKey& network_anonymization_key,
SecureDnsPolicy secure_dns_policy);
SpdySessionKey(const SpdySessionKey& other);
~SpdySessionKey();
// Comparator function so this can be placed in a std::map.
bool operator<(const SpdySessionKey& other) const;
// Equality tests of contents.
bool operator==(const SpdySessionKey& other) const;
bool operator!=(const SpdySessionKey& other) const;
// Struct returned by CompareForAliasing().
struct CompareForAliasingResult {
// True if the two SpdySessionKeys match, except possibly for their
// |host_port_pair| and |socket_tag|.
bool is_potentially_aliasable = false;
// True if the |socket_tag| fields match. If this is false, it's up to the
// caller to change the tag of the session (if possible) or to not alias the
// session, even if |is_potentially_aliasable| is true.
bool is_socket_tag_match = false;
};
// Checks if requests using SpdySessionKey can potentially be used to service
// requests using another. The caller *MUST* also make sure that the session
// associated with one key has been verified for use with the other.
//
// Note that this method is symmetric, so it doesn't matter which key's method
// is called on the other.
CompareForAliasingResult CompareForAliasing(
const SpdySessionKey& other) const;
const HostPortProxyPair& host_port_proxy_pair() const {
return host_port_proxy_pair_;
}
const HostPortPair& host_port_pair() const {
return host_port_proxy_pair_.first;
}
const ProxyServer& proxy_server() const {
return host_port_proxy_pair_.second;
}
PrivacyMode privacy_mode() const {
return privacy_mode_;
}
IsProxySession is_proxy_session() const { return is_proxy_session_; }
const SocketTag& socket_tag() const { return socket_tag_; }
const NetworkAnonymizationKey& network_anonymization_key() const {
return network_anonymization_key_;
}
SecureDnsPolicy secure_dns_policy() const { return secure_dns_policy_; }
private:
HostPortProxyPair host_port_proxy_pair_;
// If enabled, then session cannot be tracked by the server.
PrivacyMode privacy_mode_ = PRIVACY_MODE_DISABLED;
IsProxySession is_proxy_session_;
SocketTag socket_tag_;
// Used to separate requests made in different contexts. If
// `kPartitionConnectionsByNetworkIsolationKey` is disabled this will be set
// to an empty key.
NetworkAnonymizationKey network_anonymization_key_;
SecureDnsPolicy secure_dns_policy_;
};
} // namespace net
#endif // NET_SPDY_SPDY_SESSION_KEY_H_