blob: 9983c9b59cc9eeef1303135eb362c6fcbc48486e [file] [log] [blame]
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_SPDY_SPDY_SESSION_KEY_H_
#define NET_SPDY_SPDY_SESSION_KEY_H_
#include <optional>
#include "net/base/net_export.h"
#include "net/base/network_anonymization_key.h"
#include "net/base/network_isolation_key.h"
#include "net/base/privacy_mode.h"
#include "net/base/proxy_chain.h"
#include "net/base/session_usage.h"
#include "net/dns/public/secure_dns_policy.h"
#include "net/socket/socket_tag.h"
namespace net {
// SpdySessionKey is used as unique index for SpdySessionPool.
class NET_EXPORT_PRIVATE SpdySessionKey {
public:
SpdySessionKey();
// Note that if `session_usage` is kProxy, then:
// * `privacy_mode` must be PRIVACY_MODE_DISABLED to pool credentialed and
// uncredetialed requests onto the same proxy connections.
// * `disable_cert_verification_network_fetches` must be true, to avoid
// depending on cert fetches, which would be made through the proxy.
SpdySessionKey(const HostPortPair& host_port_pair,
PrivacyMode privacy_mode,
const ProxyChain& proxy_chain,
SessionUsage session_usage,
const SocketTag& socket_tag,
const NetworkAnonymizationKey& network_anonymization_key,
SecureDnsPolicy secure_dns_policy,
bool disable_cert_verification_network_fetches);
SpdySessionKey(const SpdySessionKey& other);
~SpdySessionKey();
// Comparator function so this can be placed in a std::map.
bool operator<(const SpdySessionKey& other) const;
// Equality tests of contents.
bool operator==(const SpdySessionKey& other) const;
bool operator!=(const SpdySessionKey& other) const;
// Struct returned by CompareForAliasing().
struct CompareForAliasingResult {
// True if the two SpdySessionKeys match, except possibly for their
// |host_port_pair| and |socket_tag|.
bool is_potentially_aliasable = false;
// True if the |socket_tag| fields match. If this is false, it's up to the
// caller to change the tag of the session (if possible) or to not alias the
// session, even if |is_potentially_aliasable| is true.
bool is_socket_tag_match = false;
};
// Checks if requests using SpdySessionKey can potentially be used to service
// requests using another. The caller *MUST* also make sure that the session
// associated with one key has been verified for use with the other.
//
// Note that this method is symmetric, so it doesn't matter which key's method
// is called on the other.
CompareForAliasingResult CompareForAliasing(
const SpdySessionKey& other) const;
const HostPortProxyPair& host_port_proxy_pair() const {
return host_port_proxy_pair_;
}
const HostPortPair& host_port_pair() const {
return host_port_proxy_pair_.first;
}
const ProxyChain& proxy_chain() const { return host_port_proxy_pair_.second; }
PrivacyMode privacy_mode() const {
return privacy_mode_;
}
SessionUsage session_usage() const { return session_usage_; }
const SocketTag& socket_tag() const { return socket_tag_; }
const NetworkAnonymizationKey& network_anonymization_key() const {
return network_anonymization_key_;
}
SecureDnsPolicy secure_dns_policy() const { return secure_dns_policy_; }
bool disable_cert_verification_network_fetches() const {
return disable_cert_verification_network_fetches_;
}
private:
HostPortProxyPair host_port_proxy_pair_;
// If enabled, then session cannot be tracked by the server.
PrivacyMode privacy_mode_ = PRIVACY_MODE_DISABLED;
SessionUsage session_usage_;
SocketTag socket_tag_;
// Used to separate requests made in different contexts. If network state
// partitioning is disabled this will be set to an empty key.
NetworkAnonymizationKey network_anonymization_key_;
SecureDnsPolicy secure_dns_policy_;
bool disable_cert_verification_network_fetches_;
};
} // namespace net
#endif // NET_SPDY_SPDY_SESSION_KEY_H_