Index: net/http/http_network_transaction.cc |
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc |
index 5b59a957dffd6e8a75380e960a5d4fca8a006ea6..e889bbfb7526b73500d272bc56d1ea43258d53bf 100644 |
--- a/net/http/http_network_transaction.cc |
+++ b/net/http/http_network_transaction.cc |
@@ -52,6 +52,7 @@ |
#include "net/http/http_util.h" |
#include "net/http/transport_security_state.h" |
#include "net/http/url_security_manager.h" |
+#include "net/log/net_log_event_type.h" |
#include "net/socket/client_socket_factory.h" |
#include "net/socket/socks_client_socket_pool.h" |
#include "net/socket/ssl_client_socket.h" |
@@ -699,7 +700,7 @@ int HttpNetworkTransaction::DoLoop(int result) { |
break; |
case STATE_BUILD_REQUEST: |
DCHECK_EQ(OK, rv); |
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST); |
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST); |
rv = DoBuildRequest(); |
break; |
case STATE_BUILD_REQUEST_COMPLETE: |
@@ -712,38 +713,38 @@ int HttpNetworkTransaction::DoLoop(int result) { |
case STATE_SEND_REQUEST_COMPLETE: |
rv = DoSendRequestComplete(rv); |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST, rv); |
+ NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST, rv); |
break; |
case STATE_READ_HEADERS: |
DCHECK_EQ(OK, rv); |
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS); |
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_HEADERS); |
rv = DoReadHeaders(); |
break; |
case STATE_READ_HEADERS_COMPLETE: |
rv = DoReadHeadersComplete(rv); |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_READ_HEADERS, rv); |
+ NetLogEventType::HTTP_TRANSACTION_READ_HEADERS, rv); |
break; |
case STATE_READ_BODY: |
DCHECK_EQ(OK, rv); |
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_READ_BODY); |
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_READ_BODY); |
rv = DoReadBody(); |
break; |
case STATE_READ_BODY_COMPLETE: |
rv = DoReadBodyComplete(rv); |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_READ_BODY, rv); |
+ NetLogEventType::HTTP_TRANSACTION_READ_BODY, rv); |
break; |
case STATE_DRAIN_BODY_FOR_AUTH_RESTART: |
DCHECK_EQ(OK, rv); |
net_log_.BeginEvent( |
- NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART); |
+ NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART); |
rv = DoDrainBodyForAuthRestart(); |
break; |
case STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE: |
rv = DoDrainBodyForAuthRestartComplete(rv); |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv); |
+ NetLogEventType::HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, rv); |
break; |
default: |
NOTREACHED() << "bad state"; |
@@ -914,7 +915,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKey() { |
if (!IsTokenBindingEnabled()) |
return OK; |
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY); |
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY); |
ChannelIDService* channel_id_service = session_->params().channel_id_service; |
return channel_id_service->GetOrCreateChannelID( |
request_->url.host(), &provided_token_binding_key_, io_callback_, |
@@ -925,7 +926,7 @@ int HttpNetworkTransaction::DoGetProvidedTokenBindingKeyComplete(int rv) { |
DCHECK_NE(ERR_IO_PENDING, rv); |
if (IsTokenBindingEnabled()) { |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv); |
+ NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv); |
} |
if (rv == OK) |
@@ -938,7 +939,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKey() { |
if (!IsTokenBindingEnabled() || request_->token_binding_referrer.empty()) |
return OK; |
- net_log_.BeginEvent(NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY); |
+ net_log_.BeginEvent(NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY); |
ChannelIDService* channel_id_service = session_->params().channel_id_service; |
return channel_id_service->GetOrCreateChannelID( |
request_->token_binding_referrer, &referred_token_binding_key_, |
@@ -949,7 +950,7 @@ int HttpNetworkTransaction::DoGetReferredTokenBindingKeyComplete(int rv) { |
DCHECK_NE(ERR_IO_PENDING, rv); |
if (IsTokenBindingEnabled() && !request_->token_binding_referrer.empty()) { |
net_log_.EndEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv); |
+ NetLogEventType::HTTP_TRANSACTION_GET_TOKEN_BINDING_KEY, rv); |
} |
if (rv == OK) |
next_state_ = STATE_INIT_REQUEST_BODY; |
@@ -1182,7 +1183,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) { |
if (response_.headers.get() && response_.headers->response_code() == 408 && |
stream_->IsConnectionReused()) { |
net_log_.AddEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, |
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, |
response_.headers->response_code()); |
// This will close the socket - it would be weird to try and reuse it, even |
// if the server doesn't actually close it. |
@@ -1198,7 +1199,7 @@ int HttpNetworkTransaction::DoReadHeadersComplete(int result) { |
} |
net_log_.AddEvent( |
- NetLog::TYPE_HTTP_TRANSACTION_READ_RESPONSE_HEADERS, |
+ NetLogEventType::HTTP_TRANSACTION_READ_RESPONSE_HEADERS, |
base::Bind(&HttpResponseHeaders::NetLogCallback, response_.headers)); |
if (response_.headers->GetHttpVersion() < HttpVersion(1, 0)) { |
@@ -1422,7 +1423,7 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) { |
(error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH || |
error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) { |
net_log_.AddEvent( |
- NetLog::TYPE_SSL_CIPHER_FALLBACK, |
+ NetLogEventType::SSL_CIPHER_FALLBACK, |
base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error)); |
server_ssl_config_.deprecated_cipher_suites_enabled = true; |
ResetConnectionAndRequestForResend(); |
@@ -1463,7 +1464,7 @@ int HttpNetworkTransaction::HandleIOError(int error) { |
case ERR_EMPTY_RESPONSE: |
if (ShouldResendRequest()) { |
net_log_.AddEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error); |
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error); |
ResetConnectionAndRequestForResend(); |
error = OK; |
} |
@@ -1472,7 +1473,7 @@ int HttpNetworkTransaction::HandleIOError(int error) { |
case ERR_SPDY_SERVER_REFUSED_STREAM: |
case ERR_QUIC_HANDSHAKE_FAILED: |
net_log_.AddEventWithNetErrorCode( |
- NetLog::TYPE_HTTP_TRANSACTION_RESTART_AFTER_ERROR, error); |
+ NetLogEventType::HTTP_TRANSACTION_RESTART_AFTER_ERROR, error); |
ResetConnectionAndRequestForResend(); |
error = OK; |
break; |