diff options
Diffstat (limited to 'chromium/net/base/net_log_event_type_list.h')
-rw-r--r-- | chromium/net/base/net_log_event_type_list.h | 200 |
1 files changed, 156 insertions, 44 deletions
diff --git a/chromium/net/base/net_log_event_type_list.h b/chromium/net/base/net_log_event_type_list.h index ca43b1bf12c..c6ed7c5d937 100644 --- a/chromium/net/base/net_log_event_type_list.h +++ b/chromium/net/base/net_log_event_type_list.h @@ -549,6 +549,10 @@ EVENT_TYPE(SSL_SOCKET_BYTES_RECEIVED) EVENT_TYPE(SOCKET_READ_ERROR) EVENT_TYPE(SOCKET_WRITE_ERROR) +// The socket was closed locally (The socket may or may not have been closed +// by the remote side already) +EVENT_TYPE(SOCKET_CLOSED) + // Certificates were received from the SSL server (during a handshake or // renegotiation). This event is only present when logging at LOG_ALL. // The following parameters are attached to the event: @@ -781,13 +785,19 @@ EVENT_TYPE(URL_REQUEST_JOB_BYTES_READ) EVENT_TYPE(URL_REQUEST_JOB_FILTERED_BYTES_READ) // This event is sent when the priority of a net::URLRequest is -// changed after it has started. The parameters attached to this event -// are: +// changed after it has started. The following parameters are attached: // { // "priority": <Numerical value of the priority (higher is more important)>, // } EVENT_TYPE(URL_REQUEST_SET_PRIORITY) +EVENT_TYPE(URL_REQUEST_REDIRECT_JOB) +// This event is logged when a URLRequestRedirectJob is started for a request. +// The following parameters are attached: +// { +// "reason": <Reason for the redirect, as a string>, +// } + // ------------------------------------------------------------------------ // HttpCache // ------------------------------------------------------------------------ @@ -989,6 +999,15 @@ EVENT_TYPE(HTTP_TRANSACTION_SEND_REQUEST_BODY) // } EVENT_TYPE(HTTP_TRANSACTION_SPDY_SEND_REQUEST_HEADERS) +// This event is sent for a HTTP request over a SPDY stream. +// The following parameters are attached: +// { +// "headers": <The list of header:value pairs>, +// "quic_priority": <Integer representing the priority of this request>, +// "quic_stream_id": <Id of the QUIC stream sending this request>, +// } +EVENT_TYPE(HTTP_TRANSACTION_QUIC_SEND_REQUEST_HEADERS) + // Measures the time to read HTTP response headers from the server. EVENT_TYPE(HTTP_TRANSACTION_READ_HEADERS) @@ -1009,7 +1028,9 @@ EVENT_TYPE(HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART) // This event is sent when we try to restart a transaction after an error. // The following parameters are attached: // { -// "net_error": <The net error code integer for the failure>, +// "net_error": <The net error code integer for the failure, if applicable>, +// "http_status_code": <HTTP status code indicating an error, if +// applicable>, // } EVENT_TYPE(HTTP_TRANSACTION_RESTART_AFTER_ERROR) @@ -1189,6 +1210,15 @@ EVENT_TYPE(SPDY_SESSION_SEND_DATA) // } EVENT_TYPE(SPDY_SESSION_RECV_DATA) +// This event is sent for a receiving SPDY PUSH_PROMISE frame. +// The following parameters are attached: +// { +// "headers": <The list of header:value pairs>, +// "id": <The stream id>, +// "promised_stream_id": <The stream id>, +// } +EVENT_TYPE(SPDY_SESSION_RECV_PUSH_PROMISE) + // A stream is stalled by the session send window being closed. EVENT_TYPE(SPDY_SESSION_STREAM_STALLED_BY_SESSION_SEND_WINDOW) @@ -1330,12 +1360,13 @@ EVENT_TYPE(QUIC_SESSION_PACKET_RECEIVED) // Session sent a QUIC packet. // { -// "encryption_level": <The EncryptionLevel of the packet> +// "encryption_level": <The EncryptionLevel of the packet>, +// "transmission_type": <The TransmissionType of the packet>, // "packet_sequence_number": <The packet's full 64-bit sequence number, // as a base-10 string.>, // "size": <The size of the packet in bytes> // } -EVENT_TYPE(QUIC_SESSION_PACKET_RETRANSMITTED) +EVENT_TYPE(QUIC_SESSION_PACKET_SENT) // Session retransmitted a QUIC packet. // { @@ -1344,11 +1375,12 @@ EVENT_TYPE(QUIC_SESSION_PACKET_RETRANSMITTED) // "new_packet_sequence_number": <The new packet's full 64-bit sequence // number, as a base-10 string.>, // } -EVENT_TYPE(QUIC_SESSION_PACKET_SENT) +EVENT_TYPE(QUIC_SESSION_PACKET_RETRANSMITTED) // Session received a QUIC packet header for a valid packet. // { -// "guid": <The 64-bit GUID for this connection, as a base-10 string>, +// "connection_id": <The 64-bit CONNECTION_ID for this connection, as a +// base-10 string>, // "public_flags": <The public flags set for this packet>, // "packet_sequence_number": <The packet's full 64-bit sequence number, // as a base-10 string.>, @@ -1411,6 +1443,74 @@ EVENT_TYPE(QUIC_SESSION_ACK_FRAME_RECEIVED) // } EVENT_TYPE(QUIC_SESSION_ACK_FRAME_SENT) +// Session received a WINDOW_UPDATE frame. +// { +// "stream_id": <The id of the stream which this data is for>, +// "byte_offset": <Byte offset in the stream>, +// } +EVENT_TYPE(QUIC_SESSION_WINDOW_UPDATE_FRAME_RECEIVED) + +// Session sent a WINDOW_UPDATE frame. +// { +// "stream_id": <The id of the stream which this data is for>, +// "byte_offset": <Byte offset in the stream>, +// } +EVENT_TYPE(QUIC_SESSION_WINDOW_UPDATE_FRAME_SENT) + +// Session received a BLOCKED frame. +// { +// "stream_id": <The id of the stream which this data is for>, +// } +EVENT_TYPE(QUIC_SESSION_BLOCKED_FRAME_RECEIVED) + +// Session sent a BLOCKED frame. +// { +// "stream_id": <The id of the stream which this data is for>, +// } +EVENT_TYPE(QUIC_SESSION_BLOCKED_FRAME_SENT) + +// Session received a GOAWAY frame. +// { +// "quic_error": <QuicErrorCode in the frame>, +// "last_good_stream_id": <Last correctly received stream id by the server>, +// "reason_phrase": <Prose justifying go-away request>, +// } +EVENT_TYPE(QUIC_SESSION_GOAWAY_FRAME_RECEIVED) + +// Session sent a GOAWAY frame. +// { +// "quic_error": <QuicErrorCode in the frame>, +// "last_good_stream_id": <Last correctly received stream id by the server>, +// "reason_phrase": <Prose justifying go-away request>, +// } +EVENT_TYPE(QUIC_SESSION_GOAWAY_FRAME_SENT) + +// Session received a PING frame. +EVENT_TYPE(QUIC_SESSION_PING_FRAME_RECEIVED) + +// Session sent a PING frame. +EVENT_TYPE(QUIC_SESSION_PING_FRAME_SENT) + +// Session received a STOP_WAITING frame. +// { +// "sent_info": <Details of packet sent by the peer> +// { +// "least_unacked": <Lowest sequence number of a packet sent by the peer +// for which it has not received an ACK>, +// } +// } +EVENT_TYPE(QUIC_SESSION_STOP_WAITING_FRAME_RECEIVED) + +// Session sent an STOP_WAITING frame. +// { +// "sent_info": <Details of packet sent by the peer> +// { +// "least_unacked": <Lowest sequence number of a packet sent by the peer +// for which it has not received an ACK>, +// } +// } +EVENT_TYPE(QUIC_SESSION_STOP_WAITING_FRAME_SENT) + // Session recevied a RST_STREAM frame. // { // "offset": <Offset in the byte stream which triggered the reset>, @@ -1502,7 +1602,8 @@ EVENT_TYPE(QUIC_SESSION_VERSION_NEGOTIATED) // Session revived a QUIC packet packet via FEC. // { -// "guid": <The 64-bit GUID for this connection, as a base-10 string>, +// "connection_id": <The 64-bit CONNECTION_ID for this connection, as a +// base-10 string>, // "public_flags": <The public flags set for this packet>, // "packet_sequence_number": <The packet's full 64-bit sequence number, // as a base-10 string.>, @@ -1830,12 +1931,51 @@ EVENT_TYPE(CHROME_POLICY_ABORTED_REQUEST) EVENT_TYPE(CERT_VERIFIER_REQUEST) // This event is created when we start a CertVerifier job. +// The BEGIN phase event parameters are: +// { +// "certificates": <A list of PEM encoded certificates, the first one +// being the certificate to verify and the remaining +// being intermediate certificates to assist path +// building. Only present when byte logging is enabled.> +// } +// // The END phase event parameters are: // { -// "certificates": <A list of PEM encoded certificates, the first one -// being the certificate to verify and the remaining -// being intermediate certificates to assist path -// building. Only present when byte logging is enabled.> +// "cert_status": <Bitmask of CERT_STATUS_* +// from net/base/cert_status_flags.h> +// "common_name_fallback_used": <True if a fallback to the common name +// was used when matching the host +// name, rather than using the +// subjectAltName.> +// "has_md2": <True if a certificate in the certificate chain is signed with +// a MD2 signature.> +// "has_md4": <True if a certificate in the certificate chain is signed with +// a MD4 signature.> +// "has_md5": <True if a certificate in the certificate chain is signed with +// a MD5 signature.> +// "is_issued_by_additional_trust_anchor": <True if the root CA used for +// this verification came from the +// list of additional trust +// anchors.> +// "is_issued_by_known_root": <True if we recognise the root CA as a +// standard root. If it isn't then it's +// probably the case that this certificate +// was generated by a MITM proxy whose root +// has been installed locally. This is +// meaningless if the certificate was not +// trusted.> +// "public_key_hashes": <If the certificate was successfully verified then +// this contains the hashes, in several hash +// algorithms, of the SubjectPublicKeyInfos of the +// chain.> +// "verified_cert": <The certificate chain that was constructed +// during verification. Note that though the verified +// certificate will match the originally supplied +// certificate, the intermediate certificates stored +// within may be substantially different. In the event +// of a verification failure, this will contain the +// chain as supplied by the server. This may be NULL +// if running within the sandbox.> // } EVENT_TYPE(CERT_VERIFIER_JOB) @@ -1848,38 +1988,6 @@ EVENT_TYPE(CERT_VERIFIER_JOB) EVENT_TYPE(CERT_VERIFIER_REQUEST_BOUND_TO_JOB) // ------------------------------------------------------------------------ -// HttpPipelinedConnection -// ------------------------------------------------------------------------ - -// The start/end of a HttpPipelinedConnection. -// { -// "host_and_port": <The host-port string>, -// } -EVENT_TYPE(HTTP_PIPELINED_CONNECTION) - -// This event is created when a pipelined connection finishes sending a request. -// { -// "source_dependency": <Source id of the requesting stream>, -// } -EVENT_TYPE(HTTP_PIPELINED_CONNECTION_SENT_REQUEST) - -// This event is created when a pipelined connection finishes receiving the -// response headers. -// { -// "source_dependency": <Source id of the requesting stream>, -// "feedback": <The value of HttpPipelinedConnection::Feedback indicating -// pipeline capability>, -// } -EVENT_TYPE(HTTP_PIPELINED_CONNECTION_RECEIVED_HEADERS) - -// This event is created when a pipelined stream closes. -// { -// "source_dependency": <Source id of the requesting stream>, -// "must_close": <True if the pipeline must shut down>, -// } -EVENT_TYPE(HTTP_PIPELINED_CONNECTION_STREAM_CLOSED) - -// ------------------------------------------------------------------------ // Download start events. // ------------------------------------------------------------------------ @@ -2267,3 +2375,7 @@ EVENT_TYPE(SIMPLE_CACHE_ENTRY_CLOSE_BEGIN) // This event is created when the Simple Cache finishes a CloseEntry call. It // contains no parameters. EVENT_TYPE(SIMPLE_CACHE_ENTRY_CLOSE_END) + +// This event is created (in a source of the same name) when the internal DNS +// resolver creates a UDP socket to check for global IPv6 connectivity. +EVENT_TYPE(IPV6_REACHABILITY_CHECK) |