Index: chrome/browser/sync/engine/auth_watcher.cc |
diff --git a/chrome/browser/sync/engine/auth_watcher.cc b/chrome/browser/sync/engine/auth_watcher.cc |
index 53c21cff88b2b9627816b3f675320145b2f06674..e75b6de60313fb3b771476ed1bde61544f976ce2 100644 |
--- a/chrome/browser/sync/engine/auth_watcher.cc |
+++ b/chrome/browser/sync/engine/auth_watcher.cc |
@@ -78,18 +78,14 @@ void AuthWatcher::PersistCredentials() { |
ClearAuthenticationData(); |
user_settings_->StoreEmailForSignin(results.email, results.primary_email); |
- user_settings_->RememberSigninType(results.email, results.signin); |
- user_settings_->RememberSigninType(results.primary_email, results.signin); |
results.email = results.primary_email; |
gaia_->SetUsernamePassword(results.primary_email, results.password); |
if (!user_settings_->VerifyAgainstStoredHash(results.email, results.password)) |
user_settings_->StoreHashedPassword(results.email, results.password); |
- if (gaia::PERSIST_TO_DISK == results.credentials_saved) { |
- user_settings_->SetAuthTokenForService(results.email, |
- SYNC_SERVICE_NAME, |
- gaia_->auth_token()); |
- } |
+ user_settings_->SetAuthTokenForService(results.email, |
+ SYNC_SERVICE_NAME, |
+ gaia_->auth_token()); |
} |
// TODO(chron): Full integration test suite needed. http://crbug.com/35429 |
@@ -130,7 +126,7 @@ void AuthWatcher::DoAuthenticateWithLsid(const std::string& lsid) { |
AuthWatcherEvent event = { AuthWatcherEvent::AUTHENTICATION_ATTEMPT_START }; |
NotifyListeners(&event); |
- if (gaia_->AuthenticateWithLsid(lsid, true)) { |
+ if (gaia_->AuthenticateWithLsid(lsid)) { |
PersistCredentials(); |
DoAuthenticateWithToken(gaia_->email(), gaia_->auth_token()); |
} else { |
@@ -159,9 +155,10 @@ void AuthWatcher::DoAuthenticateWithToken(const std::string& gaia_email, |
LOG(INFO) << "Auth returned email " << email << " for gaia email " << |
gaia_email; |
} |
+ |
AuthWatcherEvent event = {AuthWatcherEvent::ILLEGAL_VALUE , 0}; |
gaia_->SetUsername(email); |
- gaia_->SetAuthToken(auth_token, gaia::SAVE_IN_MEMORY_ONLY); |
+ gaia_->SetAuthToken(auth_token); |
const bool was_authenticated = NOT_AUTHENTICATED != status_; |
switch (result) { |
case Authenticator::SUCCESS: |
@@ -235,15 +232,11 @@ void AuthWatcher::ProcessGaiaAuthFailure() { |
if (LOCALLY_AUTHENTICATED == status_) { |
return; // nothing todo |
} else if (AuthenticateLocally(results.email, results.password)) { |
- // We save the "Remember me" checkbox by putting a non-null auth |
- // token into the last_user table. So if we're offline and the |
- // user checks the box, insert a bogus auth token. |
- if (gaia::PERSIST_TO_DISK == results.credentials_saved) { |
- const string auth_token("bogus"); |
- user_settings_->SetAuthTokenForService(results.email, |
- SYNC_SERVICE_NAME, |
- auth_token); |
- } |
+ // TODO(chron): Do we really want a bogus token? |
+ const string auth_token("bogus"); |
+ user_settings_->SetAuthTokenForService(results.email, |
+ SYNC_SERVICE_NAME, |
+ auth_token); |
const bool unavailable = |
gaia::ConnectionUnavailable == results.auth_error || |
gaia::Unknown == results.auth_error || |
@@ -263,11 +256,6 @@ void AuthWatcher::DoAuthenticate(const AuthRequest& request) { |
current_attempt_trigger_ = request.trigger; |
- gaia::SaveCredentials save = request.persist_creds_to_disk ? |
- gaia::PERSIST_TO_DISK : gaia::SAVE_IN_MEMORY_ONLY; |
- gaia::SignIn const signin = user_settings_-> |
- RecallSigninType(request.email, gaia::GMAIL_SIGNIN); |
- |
// We let the caller be lazy and try using the last captcha token seen by |
// the gaia authenticator if they haven't provided a token but have sent |
// a challenge response. Of course, if the captcha token is specified, |
@@ -280,11 +268,10 @@ void AuthWatcher::DoAuthenticate(const AuthRequest& request) { |
bool authenticated = false; |
if (!captcha_token.empty()) { |
authenticated = gaia_->Authenticate(request.email, request.password, |
- save, captcha_token, |
- request.captcha_value, signin); |
+ captcha_token, |
+ request.captcha_value); |
} else { |
- authenticated = gaia_->Authenticate(request.email, request.password, |
- save, signin); |
+ authenticated = gaia_->Authenticate(request.email, request.password); |
} |
if (authenticated) { |
PersistCredentials(); |
@@ -334,8 +321,6 @@ void AuthWatcher::DoHandleServerConnectionEvent( |
AuthRequest request = { authresults.email, authresults.password, |
authresults.auth_token, std::string(), |
std::string(), |
- gaia::PERSIST_TO_DISK == |
- authresults.credentials_saved, |
AuthWatcherEvent::EXPIRED_CREDENTIALS }; |
DoAuthenticate(request); |
} |
@@ -352,13 +337,12 @@ AuthWatcher::~AuthWatcher() { |
} |
void AuthWatcher::Authenticate(const string& email, const string& password, |
- const string& captcha_token, const string& captcha_value, |
- bool persist_creds_to_disk) { |
+ const string& captcha_token, const string& captcha_value) { |
LOG(INFO) << "AuthWatcher::Authenticate called"; |
string empty; |
AuthRequest request = { FormatAsEmailAddress(email), password, empty, |
- captcha_token, captcha_value, persist_creds_to_disk, |
+ captcha_token, captcha_value, |
AuthWatcherEvent::USER_INITIATED }; |
message_loop()->PostTask(FROM_HERE, NewRunnableMethod(this, |
&AuthWatcher::DoAuthenticate, request)); |