| Index: net/http/http_network_transaction.cc
|
| diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc
|
| index 5b59a957dffd6e8a75380e960a5d4fca8a006ea6..e889bbfb7526b73500d272bc56d1ea43258d53bf 100644
|
| --- a/net/http/http_network_transaction.cc
|
| +++ b/net/http/http_network_transaction.cc
|
| @@ -52,6 +52,7 @@
|
| #include "net/http/http_util.h"
|
| #include "net/http/transport_security_state.h"
|
| #include "net/http/url_security_manager.h"
|
| +#include "net/log/net_log_event_type.h"
|
| #include "net/socket/client_socket_factory.h"
|
| #include "net/socket/socks_client_socket_pool.h"
|
| #include "net/socket/ssl_client_socket.h"
|
| @@ -699,7 +700,7 @@ int HttpNetworkTransaction::DoLoop(int result) {
|
| break;
|
| case STATE_BUILD_REQUEST:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST);
|
| + net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST);
|
| rv = DoBuildRequest();
|
| break;
|
| case STATE_BUILD_REQUEST_COMPLETE:
|
| @@ -712,38 +713,38 @@ int HttpNetworkTransaction::DoLoop(int result) {
|
| case STATE_SEND_REQUEST_COMPLETE:
|
| rv = DoSendRequestComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST, rv);
|
| break;
|
| case STATE_READ_HEADERS:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS);
|
| + net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_HEADERS);
|
| rv = DoReadHeaders();
|
| break;
|
| case STATE_READ_HEADERS_COMPLETE:
|
| rv = DoReadHeadersComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_READ_HEADERS, rv);
|
| break;
|
| case STATE_READ_BODY:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_BODY);
|
| + net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_BODY);
|
| rv = DoReadBody();
|
| break;
|
| case STATE_READ_BODY_COMPLETE:
|
| rv = DoReadBodyComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_READ_BODY, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_READ_BODY, rv);
|
| break;
|
| case STATE_DRAIN_BODY_FOR_AUTH_RESTART:
|
| DCHECK_EQ(OK, rv);
|
| net_log_.BeginEvent(
|
| - NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART);
|
| + NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART);
|
| rv = DoDrainBodyForAuthRestart();
|
| break;
|
| case STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE:
|
| rv = DoDrainBodyForAuthRestartComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv);
|
| break;
|
| default:
|
| NOTREACHED() << "bad state";
|
| @@ -914,7 +915,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKey() {
|
| if (!IsTokenBindingEnabled())
|
| return OK;
|
|
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
|
| + net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
|
| ChannelIDService* channel_id_service = session_->params().channel_id_service;
|
| return channel_id_service->GetOrCreateChannelID(
|
| request_->url.host(), &provided_token_binding_key_, io_callback_,
|
| @@ -925,7 +926,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKeyComplete(int rv) {
|
| DCHECK_NE(ERR_IO_PENDING, rv);
|
| if (IsTokenBindingEnabled()) {
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
|
| }
|
|
|
| if (rv == OK)
|
| @@ -938,7 +939,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKey() {
|
| if (!IsTokenBindingEnabled() || request_->token_binding_referrer.empty())
|
| return OK;
|
|
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
|
| + net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
|
| ChannelIDService* channel_id_service = session_->params().channel_id_service;
|
| return channel_id_service->GetOrCreateChannelID(
|
| request_->token_binding_referrer, &referred_token_binding_key_,
|
| @@ -949,7 +950,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKeyComplete(int rv) {
|
| DCHECK_NE(ERR_IO_PENDING, rv);
|
| if (IsTokenBindingEnabled() && !request_->token_binding_referrer.empty()) {
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
|
| + NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
|
| }
|
| if (rv == OK)
|
| next_state_ = STATE_INIT_REQUEST_BODY;
|
| @@ -1182,7 +1183,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) {
|
| if (response_.headers.get() && response_.headers->response_code() == 408 &&
|
| stream_->IsConnectionReused()) {
|
| net_log_.AddEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR,
|
| + NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR,
|
| response_.headers->response_code());
|
| // This will close the socket - it would be weird to try and reuse it, even
|
| // if the server doesn't actually close it.
|
| @@ -1198,7 +1199,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) {
|
| }
|
|
|
| net_log_.AddEvent(
|
| - NetLog::TYPE_HTTP_TRANSACTION_READ_RESPONSE_HEADERS,
|
| + NetLogEventType::HTTP_TRANSACTION_READ_RESPONSE_HEADERS,
|
| base::Bind(&HttpResponseHeaders::NetLogCallback, response_.headers));
|
|
|
| if (response_.headers->GetHttpVersion() < HttpVersion(1, 0)) {
|
| @@ -1422,7 +1423,7 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) {
|
| (error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH ||
|
| error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) {
|
| net_log_.AddEvent(
|
| - NetLog::TYPE_SSL_CIPHER_FALLBACK,
|
| + NetLogEventType::SSL_CIPHER_FALLBACK,
|
| base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error));
|
| server_ssl_config_.deprecated_cipher_suites_enabled = true;
|
| ResetConnectionAndRequestForResend();
|
| @@ -1463,7 +1464,7 @@ int HttpNetworkTransaction::HandleIOError(int error) {
|
| case ERR_EMPTY_RESPONSE:
|
| if (ShouldResendRequest()) {
|
| net_log_.AddEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
|
| + NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
|
| ResetConnectionAndRequestForResend();
|
| error = OK;
|
| }
|
| @@ -1472,7 +1473,7 @@ int HttpNetworkTransaction::HandleIOError(int error) {
|
| case ERR_SPDY_SERVER_REFUSED_STREAM:
|
| case ERR_QUIC_HANDSHAKE_FAILED:
|
| net_log_.AddEventWithNetErrorCode(
|
| - NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
|
| + NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
|
| ResetConnectionAndRequestForResend();
|
| error = OK;
|
| break;
|
|
|