Index: components/cast_channel/logger.cc |
diff --git a/components/cast_channel/logger.cc b/components/cast_channel/logger.cc |
deleted file mode 100644 |
index a2d282c5c175cadb62fbb415a3a4e0fc93e4566a..0000000000000000000000000000000000000000 |
--- a/components/cast_channel/logger.cc |
+++ /dev/null |
@@ -1,151 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "components/cast_channel/logger.h" |
- |
-#include <stdint.h> |
- |
-#include <string> |
-#include <utility> |
- |
-#include "base/memory/ptr_util.h" |
-#include "base/strings/string_util.h" |
-#include "components/cast_channel/cast_auth_util.h" |
-#include "components/cast_channel/cast_socket.h" |
-#include "net/base/net_errors.h" |
- |
-namespace cast_channel { |
- |
-using net::IPEndPoint; |
-using proto::EventType; |
-using proto::Log; |
-using proto::SocketEvent; |
- |
-namespace { |
- |
-proto::ChallengeReplyErrorType ChallegeReplyErrorToProto( |
- AuthResult::ErrorType error_type) { |
- switch (error_type) { |
- case AuthResult::ERROR_NONE: |
- return proto::CHALLENGE_REPLY_ERROR_NONE; |
- case AuthResult::ERROR_PEER_CERT_EMPTY: |
- return proto::CHALLENGE_REPLY_ERROR_PEER_CERT_EMPTY; |
- case AuthResult::ERROR_WRONG_PAYLOAD_TYPE: |
- return proto::CHALLENGE_REPLY_ERROR_WRONG_PAYLOAD_TYPE; |
- case AuthResult::ERROR_NO_PAYLOAD: |
- return proto::CHALLENGE_REPLY_ERROR_NO_PAYLOAD; |
- case AuthResult::ERROR_PAYLOAD_PARSING_FAILED: |
- return proto::CHALLENGE_REPLY_ERROR_PAYLOAD_PARSING_FAILED; |
- case AuthResult::ERROR_MESSAGE_ERROR: |
- return proto::CHALLENGE_REPLY_ERROR_MESSAGE_ERROR; |
- case AuthResult::ERROR_NO_RESPONSE: |
- return proto::CHALLENGE_REPLY_ERROR_NO_RESPONSE; |
- case AuthResult::ERROR_FINGERPRINT_NOT_FOUND: |
- return proto::CHALLENGE_REPLY_ERROR_FINGERPRINT_NOT_FOUND; |
- case AuthResult::ERROR_CERT_PARSING_FAILED: |
- return proto::CHALLENGE_REPLY_ERROR_CERT_PARSING_FAILED; |
- case AuthResult::ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA: |
- return proto::CHALLENGE_REPLY_ERROR_CERT_NOT_SIGNED_BY_TRUSTED_CA; |
- case AuthResult::ERROR_CANNOT_EXTRACT_PUBLIC_KEY: |
- return proto::CHALLENGE_REPLY_ERROR_CANNOT_EXTRACT_PUBLIC_KEY; |
- case AuthResult::ERROR_SIGNED_BLOBS_MISMATCH: |
- return proto::CHALLENGE_REPLY_ERROR_SIGNED_BLOBS_MISMATCH; |
- case AuthResult::ERROR_TLS_CERT_VALIDITY_PERIOD_TOO_LONG: |
- return proto::CHALLENGE_REPLY_ERROR_TLS_CERT_VALIDITY_PERIOD_TOO_LONG; |
- case AuthResult::ERROR_TLS_CERT_VALID_START_DATE_IN_FUTURE: |
- return proto::CHALLENGE_REPLY_ERROR_TLS_CERT_VALID_START_DATE_IN_FUTURE; |
- case AuthResult::ERROR_TLS_CERT_EXPIRED: |
- return proto::CHALLENGE_REPLY_ERROR_TLS_CERT_EXPIRED; |
- case AuthResult::ERROR_CRL_INVALID: |
- return proto::CHALLENGE_REPLY_ERROR_CRL_INVALID; |
- case AuthResult::ERROR_CERT_REVOKED: |
- return proto::CHALLENGE_REPLY_ERROR_CERT_REVOKED; |
- default: |
- NOTREACHED(); |
- return proto::CHALLENGE_REPLY_ERROR_NONE; |
- } |
-} |
- |
-// Propagate any error fields set in |event| to |last_errors|. If any error |
-// field in |event| is set, then also set |last_errors->event_type|. |
-void MaybeSetLastErrors(const SocketEvent& event, LastErrors* last_errors) { |
- if (event.has_net_return_value() && |
- event.net_return_value() < net::ERR_IO_PENDING) { |
- last_errors->net_return_value = event.net_return_value(); |
- last_errors->event_type = event.type(); |
- } |
- if (event.has_challenge_reply_error_type()) { |
- last_errors->challenge_reply_error_type = |
- event.challenge_reply_error_type(); |
- last_errors->event_type = event.type(); |
- } |
-} |
- |
-} // namespace |
- |
-LastErrors::LastErrors() |
- : event_type(proto::EVENT_TYPE_UNKNOWN), |
- challenge_reply_error_type(proto::CHALLENGE_REPLY_ERROR_NONE), |
- net_return_value(net::OK) {} |
- |
-LastErrors::~LastErrors() {} |
- |
-Logger::Logger() { |
- // Logger may not be necessarily be created on the IO thread, but logging |
- // happens exclusively there. |
- DETACH_FROM_THREAD(thread_checker_); |
-} |
- |
-Logger::~Logger() {} |
- |
-void Logger::LogSocketEventWithRv(int channel_id, |
- EventType event_type, |
- int rv) { |
- DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
- |
- SocketEvent event = CreateEvent(event_type); |
- event.set_net_return_value(rv); |
- |
- LogSocketEvent(channel_id, event); |
-} |
- |
-void Logger::LogSocketChallengeReplyEvent(int channel_id, |
- const AuthResult& auth_result) { |
- DCHECK_CALLED_ON_VALID_THREAD(thread_checker_); |
- |
- SocketEvent event = CreateEvent(proto::AUTH_CHALLENGE_REPLY); |
- event.set_challenge_reply_error_type( |
- ChallegeReplyErrorToProto(auth_result.error_type)); |
- |
- LogSocketEvent(channel_id, event); |
-} |
- |
-LastErrors Logger::GetLastErrors(int channel_id) const { |
- LastErrorsMap::const_iterator it = last_errors_.find(channel_id); |
- if (it != last_errors_.end()) { |
- return it->second; |
- } else { |
- return LastErrors(); |
- } |
-} |
- |
-void Logger::ClearLastErrors(int channel_id) { |
- last_errors_.erase(channel_id); |
-} |
- |
-SocketEvent Logger::CreateEvent(EventType event_type) { |
- SocketEvent event; |
- event.set_type(event_type); |
- return event; |
-} |
- |
-void Logger::LogSocketEvent(int channel_id, const SocketEvent& socket_event) { |
- LastErrorsMap::iterator it = last_errors_.find(channel_id); |
- if (it == last_errors_.end()) |
- last_errors_[channel_id] = LastErrors(); |
- |
- MaybeSetLastErrors(socket_event, &last_errors_[channel_id]); |
-} |
- |
-} // namespace cast_channel |