Index: chrome/common/net/gaia/oauth2_access_token_fetcher.cc |
diff --git a/chrome/common/net/gaia/oauth2_access_token_fetcher.cc b/chrome/common/net/gaia/oauth2_access_token_fetcher.cc |
deleted file mode 100644 |
index e3d01806bec7f4a2123f544037a53ddd6848e6f4..0000000000000000000000000000000000000000 |
--- a/chrome/common/net/gaia/oauth2_access_token_fetcher.cc |
+++ /dev/null |
@@ -1,218 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/common/net/gaia/oauth2_access_token_fetcher.h" |
- |
-#include <algorithm> |
-#include <string> |
-#include <vector> |
- |
-#include "base/json/json_reader.h" |
-#include "base/string_util.h" |
-#include "base/stringprintf.h" |
-#include "base/time.h" |
-#include "base/values.h" |
-#include "chrome/common/net/gaia/gaia_urls.h" |
-#include "chrome/common/net/gaia/google_service_auth_error.h" |
-#include "net/base/escape.h" |
-#include "net/base/load_flags.h" |
-#include "net/http/http_status_code.h" |
-#include "net/url_request/url_fetcher.h" |
-#include "net/url_request/url_request_context_getter.h" |
-#include "net/url_request/url_request_status.h" |
- |
-using net::ResponseCookies; |
-using net::URLFetcher; |
-using net::URLFetcherDelegate; |
-using net::URLRequestContextGetter; |
-using net::URLRequestStatus; |
- |
-namespace { |
-static const char kGetAccessTokenBodyFormat[] = |
- "client_id=%s&" |
- "client_secret=%s&" |
- "grant_type=refresh_token&" |
- "refresh_token=%s"; |
- |
-static const char kGetAccessTokenBodyWithScopeFormat[] = |
- "client_id=%s&" |
- "client_secret=%s&" |
- "grant_type=refresh_token&" |
- "refresh_token=%s&" |
- "scope=%s"; |
- |
-static const char kAccessTokenKey[] = "access_token"; |
-static const char kExpiresInKey[] = "expires_in"; |
- |
-static GoogleServiceAuthError CreateAuthError(URLRequestStatus status) { |
- CHECK(!status.is_success()); |
- if (status.status() == URLRequestStatus::CANCELED) { |
- return GoogleServiceAuthError(GoogleServiceAuthError::REQUEST_CANCELED); |
- } else { |
- DLOG(WARNING) << "Could not reach Google Accounts servers: errno " |
- << status.error(); |
- return GoogleServiceAuthError::FromConnectionError(status.error()); |
- } |
-} |
- |
-static URLFetcher* CreateFetcher(URLRequestContextGetter* getter, |
- const GURL& url, |
- const std::string& body, |
- URLFetcherDelegate* delegate) { |
- bool empty_body = body.empty(); |
- URLFetcher* result = net::URLFetcher::Create( |
- 0, url, |
- empty_body ? URLFetcher::GET : URLFetcher::POST, |
- delegate); |
- |
- result->SetRequestContext(getter); |
- result->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | |
- net::LOAD_DO_NOT_SAVE_COOKIES); |
- |
- if (!empty_body) |
- result->SetUploadData("application/x-www-form-urlencoded", body); |
- |
- return result; |
-} |
-} // namespace |
- |
-OAuth2AccessTokenFetcher::OAuth2AccessTokenFetcher( |
- OAuth2AccessTokenConsumer* consumer, |
- URLRequestContextGetter* getter) |
- : consumer_(consumer), |
- getter_(getter), |
- state_(INITIAL) { } |
- |
-OAuth2AccessTokenFetcher::~OAuth2AccessTokenFetcher() { } |
- |
-void OAuth2AccessTokenFetcher::CancelRequest() { |
- fetcher_.reset(); |
-} |
- |
-void OAuth2AccessTokenFetcher::Start(const std::string& client_id, |
- const std::string& client_secret, |
- const std::string& refresh_token, |
- const std::vector<std::string>& scopes) { |
- client_id_ = client_id; |
- client_secret_ = client_secret; |
- refresh_token_ = refresh_token; |
- scopes_ = scopes; |
- StartGetAccessToken(); |
-} |
- |
-void OAuth2AccessTokenFetcher::StartGetAccessToken() { |
- CHECK_EQ(INITIAL, state_); |
- state_ = GET_ACCESS_TOKEN_STARTED; |
- fetcher_.reset(CreateFetcher( |
- getter_, |
- MakeGetAccessTokenUrl(), |
- MakeGetAccessTokenBody( |
- client_id_, client_secret_, refresh_token_, scopes_), |
- this)); |
- fetcher_->Start(); // OnURLFetchComplete will be called. |
-} |
- |
-void OAuth2AccessTokenFetcher::EndGetAccessToken( |
- const net::URLFetcher* source) { |
- CHECK_EQ(GET_ACCESS_TOKEN_STARTED, state_); |
- state_ = GET_ACCESS_TOKEN_DONE; |
- |
- URLRequestStatus status = source->GetStatus(); |
- if (!status.is_success()) { |
- OnGetTokenFailure(CreateAuthError(status)); |
- return; |
- } |
- |
- if (source->GetResponseCode() != net::HTTP_OK) { |
- OnGetTokenFailure(GoogleServiceAuthError( |
- GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); |
- return; |
- } |
- |
- // The request was successfully fetched and it returned OK. |
- // Parse out the access token and the expiration time. |
- std::string access_token; |
- int expires_in; |
- if (!ParseGetAccessTokenResponse(source, &access_token, &expires_in)) { |
- DLOG(WARNING) << "Response doesn't match expected format"; |
- OnGetTokenFailure( |
- GoogleServiceAuthError(GoogleServiceAuthError::SERVICE_UNAVAILABLE)); |
- return; |
- } |
- // The token will expire in |expires_in| seconds. Take a 10% error margin to |
- // prevent reusing a token too close to its expiration date. |
- OnGetTokenSuccess( |
- access_token, |
- base::Time::Now() + base::TimeDelta::FromSeconds(9 * expires_in / 10)); |
-} |
- |
-void OAuth2AccessTokenFetcher::OnGetTokenSuccess( |
- const std::string& access_token, |
- const base::Time& expiration_time) { |
- consumer_->OnGetTokenSuccess(access_token, expiration_time); |
-} |
- |
-void OAuth2AccessTokenFetcher::OnGetTokenFailure( |
- const GoogleServiceAuthError& error) { |
- state_ = ERROR_STATE; |
- consumer_->OnGetTokenFailure(error); |
-} |
- |
-void OAuth2AccessTokenFetcher::OnURLFetchComplete( |
- const net::URLFetcher* source) { |
- CHECK(source); |
- CHECK(state_ == GET_ACCESS_TOKEN_STARTED); |
- EndGetAccessToken(source); |
-} |
- |
-// static |
-GURL OAuth2AccessTokenFetcher::MakeGetAccessTokenUrl() { |
- return GURL(GaiaUrls::GetInstance()->oauth2_token_url()); |
-} |
- |
-// static |
-std::string OAuth2AccessTokenFetcher::MakeGetAccessTokenBody( |
- const std::string& client_id, |
- const std::string& client_secret, |
- const std::string& refresh_token, |
- const std::vector<std::string>& scopes) { |
- std::string enc_client_id = net::EscapeUrlEncodedData(client_id, true); |
- std::string enc_client_secret = |
- net::EscapeUrlEncodedData(client_secret, true); |
- std::string enc_refresh_token = |
- net::EscapeUrlEncodedData(refresh_token, true); |
- if (scopes.empty()) { |
- return StringPrintf( |
- kGetAccessTokenBodyFormat, |
- enc_client_id.c_str(), |
- enc_client_secret.c_str(), |
- enc_refresh_token.c_str()); |
- } else { |
- std::string scopes_string = JoinString(scopes, ' '); |
- return StringPrintf( |
- kGetAccessTokenBodyWithScopeFormat, |
- enc_client_id.c_str(), |
- enc_client_secret.c_str(), |
- enc_refresh_token.c_str(), |
- net::EscapeUrlEncodedData(scopes_string, true).c_str()); |
- } |
-} |
- |
-// static |
-bool OAuth2AccessTokenFetcher::ParseGetAccessTokenResponse( |
- const net::URLFetcher* source, |
- std::string* access_token, |
- int* expires_in) { |
- CHECK(source); |
- CHECK(access_token); |
- std::string data; |
- source->GetResponseAsString(&data); |
- scoped_ptr<base::Value> value(base::JSONReader::Read(data)); |
- if (!value.get() || value->GetType() != base::Value::TYPE_DICTIONARY) |
- return false; |
- |
- DictionaryValue* dict = static_cast<DictionaryValue*>(value.get()); |
- return dict->GetString(kAccessTokenKey, access_token) && |
- dict->GetInteger(kExpiresInKey, expires_in); |
-} |