Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(94)

Unified Diff: net/http/http_network_transaction.cc

Issue 2315613002: Extracted NetLog class's inner enum types into their own enum classes and (Closed)
Patch Set: Ran "git cl format" on code. Much formatting ensued. Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/http/http_cache_unittest.cc ('k') | net/http/http_network_transaction_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_network_transaction.cc
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc
index 5b59a957dffd6e8a75380e960a5d4fca8a006ea6..e889bbfb7526b73500d272bc56d1ea43258d53bf 100644
--- a/net/http/http_network_transaction.cc
+++ b/net/http/http_network_transaction.cc
@@ -52,6 +52,7 @@
#include "net/http/http_util.h"
#include "net/http/transport_security_state.h"
#include "net/http/url_security_manager.h"
+#include "net/log/net_log_event_type.h"
#include "net/socket/client_socket_factory.h"
#include "net/socket/socks_client_socket_pool.h"
#include "net/socket/ssl_client_socket.h"
@@ -699,7 +700,7 @@ int HttpNetworkTransaction::DoLoop(int result) {
break;
case STATE_BUILD_REQUEST:
DCHECK_EQ(OK, rv);
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST);
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST);
rv = DoBuildRequest();
break;
case STATE_BUILD_REQUEST_COMPLETE:
@@ -712,38 +713,38 @@ int HttpNetworkTransaction::DoLoop(int result) {
case STATE_SEND_REQUEST_COMPLETE:
rv = DoSendRequestComplete(rv);
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST, rv);
+ NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST, rv);
break;
case STATE_READ_HEADERS:
DCHECK_EQ(OK, rv);
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS);
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_HEADERS);
rv = DoReadHeaders();
break;
case STATE_READ_HEADERS_COMPLETE:
rv = DoReadHeadersComplete(rv);
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS, rv);
+ NetLogEventType::HTTP_TRANSACTION_READ_HEADERS, rv);
break;
case STATE_READ_BODY:
DCHECK_EQ(OK, rv);
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_BODY);
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_BODY);
rv = DoReadBody();
break;
case STATE_READ_BODY_COMPLETE:
rv = DoReadBodyComplete(rv);
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_READ_BODY, rv);
+ NetLogEventType::HTTP_TRANSACTION_READ_BODY, rv);
break;
case STATE_DRAIN_BODY_FOR_AUTH_RESTART:
DCHECK_EQ(OK, rv);
net_log_.BeginEvent(
- NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART);
+ NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART);
rv = DoDrainBodyForAuthRestart();
break;
case STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE:
rv = DoDrainBodyForAuthRestartComplete(rv);
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv);
+ NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv);
break;
default:
NOTREACHED() << "bad state";
@@ -914,7 +915,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKey() {
if (!IsTokenBindingEnabled())
return OK;
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
ChannelIDService* channel_id_service = session_->params().channel_id_service;
return channel_id_service->GetOrCreateChannelID(
request_->url.host(), &provided_token_binding_key_, io_callback_,
@@ -925,7 +926,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKeyComplete(int rv) {
DCHECK_NE(ERR_IO_PENDING, rv);
if (IsTokenBindingEnabled()) {
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
+ NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
}
if (rv == OK)
@@ -938,7 +939,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKey() {
if (!IsTokenBindingEnabled() || request_->token_binding_referrer.empty())
return OK;
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY);
ChannelIDService* channel_id_service = session_->params().channel_id_service;
return channel_id_service->GetOrCreateChannelID(
request_->token_binding_referrer, &referred_token_binding_key_,
@@ -949,7 +950,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKeyComplete(int rv) {
DCHECK_NE(ERR_IO_PENDING, rv);
if (IsTokenBindingEnabled() && !request_->token_binding_referrer.empty()) {
net_log_.EndEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
+ NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv);
}
if (rv == OK)
next_state_ = STATE_INIT_REQUEST_BODY;
@@ -1182,7 +1183,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) {
if (response_.headers.get() && response_.headers->response_code() == 408 &&
stream_->IsConnectionReused()) {
net_log_.AddEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR,
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR,
response_.headers->response_code());
// This will close the socket - it would be weird to try and reuse it, even
// if the server doesn't actually close it.
@@ -1198,7 +1199,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) {
}
net_log_.AddEvent(
- NetLog::TYPE_HTTP_TRANSACTION_READ_RESPONSE_HEADERS,
+ NetLogEventType::HTTP_TRANSACTION_READ_RESPONSE_HEADERS,
base::Bind(&HttpResponseHeaders::NetLogCallback, response_.headers));
if (response_.headers->GetHttpVersion() < HttpVersion(1, 0)) {
@@ -1422,7 +1423,7 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) {
(error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH ||
error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) {
net_log_.AddEvent(
- NetLog::TYPE_SSL_CIPHER_FALLBACK,
+ NetLogEventType::SSL_CIPHER_FALLBACK,
base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error));
server_ssl_config_.deprecated_cipher_suites_enabled = true;
ResetConnectionAndRequestForResend();
@@ -1463,7 +1464,7 @@ int HttpNetworkTransaction::HandleIOError(int error) {
case ERR_EMPTY_RESPONSE:
if (ShouldResendRequest()) {
net_log_.AddEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
ResetConnectionAndRequestForResend();
error = OK;
}
@@ -1472,7 +1473,7 @@ int HttpNetworkTransaction::HandleIOError(int error) {
case ERR_SPDY_SERVER_REFUSED_STREAM:
case ERR_QUIC_HANDSHAKE_FAILED:
net_log_.AddEventWithNetErrorCode(
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error);
ResetConnectionAndRequestForResend();
error = OK;
break;
« no previous file with comments | « net/http/http_cache_unittest.cc ('k') | net/http/http_network_transaction_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698