diff options
Diffstat (limited to 'chromium/net/reporting/reporting_header_parser.cc')
-rw-r--r-- | chromium/net/reporting/reporting_header_parser.cc | 42 |
1 files changed, 22 insertions, 20 deletions
diff --git a/chromium/net/reporting/reporting_header_parser.cc b/chromium/net/reporting/reporting_header_parser.cc index 1dfd5e6d8a8..9bc7d46e766 100644 --- a/chromium/net/reporting/reporting_header_parser.cc +++ b/chromium/net/reporting/reporting_header_parser.cc @@ -1,4 +1,4 @@ -// Copyright 2017 The Chromium Authors. All rights reserved. +// Copyright 2017 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. @@ -18,7 +18,7 @@ #include "base/values.h" #include "net/base/features.h" #include "net/base/isolation_info.h" -#include "net/base/network_isolation_key.h" +#include "net/base/network_anonymization_key.h" #include "net/base/registry_controlled_domains/registry_controlled_domain.h" #include "net/reporting/reporting_cache.h" #include "net/reporting/reporting_context.h" @@ -118,12 +118,13 @@ bool ProcessEndpoint(ReportingDelegate* delegate, // |value| is the parsed JSON value of the endpoint group tuple. // Returns true on successfully adding a non-empty group, or false if endpoint // group was discarded or processed as a deletion. -bool ProcessEndpointGroup(ReportingDelegate* delegate, - ReportingCache* cache, - const NetworkIsolationKey& network_isolation_key, - const url::Origin& origin, - const base::Value& value, - ReportingEndpointGroup* parsed_endpoint_group_out) { +bool ProcessEndpointGroup( + ReportingDelegate* delegate, + ReportingCache* cache, + const NetworkAnonymizationKey& network_anonymization_key, + const url::Origin& origin, + const base::Value& value, + ReportingEndpointGroup* parsed_endpoint_group_out) { const base::Value::Dict* dict = value.GetIfDict(); if (!dict) return false; @@ -134,7 +135,7 @@ bool ProcessEndpointGroup(ReportingDelegate* delegate, return false; group_name = maybe_group_name->GetString(); } - ReportingEndpointGroupKey group_key(network_isolation_key, origin, + ReportingEndpointGroupKey group_key(network_anonymization_key, origin, group_name); parsed_endpoint_group_out->group_key = group_key; @@ -216,14 +217,14 @@ bool ProcessEndpoint(ReportingDelegate* delegate, bool ProcessV1Endpoint(ReportingDelegate* delegate, ReportingCache* cache, const base::UnguessableToken& reporting_source, - const NetworkIsolationKey& network_isolation_key, + const NetworkAnonymizationKey& network_anonymization_key, const url::Origin& origin, const std::string& endpoint_name, const std::string& endpoint_url_string, ReportingEndpoint& parsed_endpoint_out) { DCHECK(!reporting_source.is_empty()); - ReportingEndpointGroupKey group_key(network_isolation_key, reporting_source, - origin, endpoint_name); + ReportingEndpointGroupKey group_key(network_anonymization_key, + reporting_source, origin, endpoint_name); parsed_endpoint_out.group_key = group_key; ReportingEndpoint::EndpointInfo parsed_endpoint; @@ -276,7 +277,7 @@ void ReportingHeaderParser::RecordReportingHeaderType( // static void ReportingHeaderParser::ParseReportToHeader( ReportingContext* context, - const NetworkIsolationKey& network_isolation_key, + const NetworkAnonymizationKey& network_anonymization_key, const url::Origin& origin, const base::Value::List& list) { DCHECK(GURL::SchemeIsCryptographic(origin.scheme())); @@ -288,7 +289,7 @@ void ReportingHeaderParser::ParseReportToHeader( for (const auto& group_value : list) { ReportingEndpointGroup parsed_endpoint_group; - if (ProcessEndpointGroup(delegate, cache, network_isolation_key, origin, + if (ProcessEndpointGroup(delegate, cache, network_anonymization_key, origin, group_value, &parsed_endpoint_group)) { parsed_header.push_back(std::move(parsed_endpoint_group)); } @@ -300,13 +301,13 @@ void ReportingHeaderParser::ParseReportToHeader( // Remove the client if it has no valid endpoint groups. if (parsed_header.empty()) { - cache->RemoveClient(network_isolation_key, origin); + cache->RemoveClient(network_anonymization_key, origin); return; } RecordReportingHeaderType(ReportingHeaderType::kReportTo); - cache->OnParsedHeader(network_isolation_key, origin, + cache->OnParsedHeader(network_anonymization_key, origin, std::move(parsed_header)); } @@ -315,14 +316,15 @@ void ReportingHeaderParser::ProcessParsedReportingEndpointsHeader( ReportingContext* context, const base::UnguessableToken& reporting_source, const IsolationInfo& isolation_info, - const NetworkIsolationKey& network_isolation_key, + const NetworkAnonymizationKey& network_anonymization_key, const url::Origin& origin, base::flat_map<std::string, std::string> header) { DCHECK(base::FeatureList::IsEnabled(net::features::kDocumentReporting)); DCHECK(GURL::SchemeIsCryptographic(origin.scheme())); DCHECK(!reporting_source.is_empty()); - DCHECK(network_isolation_key.IsEmpty() || - network_isolation_key == isolation_info.network_isolation_key()); + DCHECK(network_anonymization_key.IsEmpty() || + network_anonymization_key == + isolation_info.network_anonymization_key()); ReportingDelegate* delegate = context->delegate(); ReportingCache* cache = context->cache(); @@ -332,7 +334,7 @@ void ReportingHeaderParser::ProcessParsedReportingEndpointsHeader( for (const auto& member : header) { ReportingEndpoint parsed_endpoint; if (ProcessV1Endpoint(delegate, cache, reporting_source, - network_isolation_key, origin, member.first, + network_anonymization_key, origin, member.first, member.second, parsed_endpoint)) { parsed_header.push_back(std::move(parsed_endpoint)); } |