OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/sync/signin_manager.h" | 5 #include "chrome/browser/sync/signin_manager.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/string_util.h" | 8 #include "base/string_util.h" |
9 #include "chrome/browser/net/gaia/token_service.h" | 9 #include "chrome/browser/net/gaia/token_service.h" |
10 #include "chrome/browser/prefs/pref_service.h" | 10 #include "chrome/browser/prefs/pref_service.h" |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
73 if (browser_sync::IsUsingOAuth()) | 73 if (browser_sync::IsUsingOAuth()) |
74 oauth_username_ = username; | 74 oauth_username_ = username; |
75 else | 75 else |
76 username_ = username; | 76 username_ = username; |
77 } | 77 } |
78 | 78 |
79 // static | 79 // static |
80 void SigninManager::PrepareForSignin() { | 80 void SigninManager::PrepareForSignin() { |
81 DCHECK(!browser_sync::IsUsingOAuth()); | 81 DCHECK(!browser_sync::IsUsingOAuth()); |
82 DCHECK(username_.empty()); | 82 DCHECK(username_.empty()); |
83 #if !defined(OS_CHROMEOS) | |
84 // The Sign out should clear the token service credentials. | |
85 // Note: In CHROMEOS we might have valid credentials but still need to | |
86 // set up 2-factor authentication. | |
87 DCHECK(!profile_->GetTokenService()->AreCredentialsValid()); | |
88 #endif | |
89 } | 83 } |
90 | 84 |
91 // static | 85 // static |
92 void SigninManager::PrepareForOAuthSignin() { | 86 void SigninManager::PrepareForOAuthSignin() { |
93 DCHECK(browser_sync::IsUsingOAuth()); | 87 DCHECK(browser_sync::IsUsingOAuth()); |
94 DCHECK(oauth_username_.empty()); | 88 DCHECK(oauth_username_.empty()); |
95 #if !defined(OS_CHROMEOS) | 89 #if !defined(OS_CHROMEOS) |
96 // The Sign out should clear the token service credentials. | 90 // The Sign out should clear the token service credentials. |
97 // Note: In CHROMEOS we might have valid credentials but still need to | 91 // Note: In CHROMEOS we might have valid credentials but still need to |
98 // set up 2-factor authentication. | 92 // set up 2-factor authentication. |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
153 GaiaConstants::kChromeSource, | 147 GaiaConstants::kChromeSource, |
154 profile_->GetRequestContext())); | 148 profile_->GetRequestContext())); |
155 client_login_->StartClientLogin(username_, | 149 client_login_->StartClientLogin(username_, |
156 access_code, | 150 access_code, |
157 "", | 151 "", |
158 std::string(), | 152 std::string(), |
159 std::string(), | 153 std::string(), |
160 GaiaAuthFetcher::HostedAccountsNotAllowed); | 154 GaiaAuthFetcher::HostedAccountsNotAllowed); |
161 } | 155 } |
162 | 156 |
| 157 void SigninManager::ClearInMemoryData() { |
| 158 if (!profile_) |
| 159 return; |
| 160 |
| 161 CleanupNotificationRegistration(); |
| 162 client_login_.reset(); |
| 163 last_result_ = ClientLoginResult(); |
| 164 username_.clear(); |
| 165 oauth_username_.clear(); |
| 166 password_.clear(); |
| 167 had_two_factor_error_ = false; |
| 168 } |
| 169 |
163 void SigninManager::SignOut() { | 170 void SigninManager::SignOut() { |
164 if (!profile_) | 171 if (!profile_) |
165 return; | 172 return; |
166 | 173 |
167 CleanupNotificationRegistration(); | 174 ClearInMemoryData(); |
168 | |
169 client_login_.reset(); | |
170 last_result_ = ClientLoginResult(); | |
171 username_.clear(); | |
172 oauth_username_.clear(); | |
173 password_.clear(); | |
174 had_two_factor_error_ = false; | |
175 profile_->GetPrefs()->ClearPref(prefs::kGoogleServicesUsername); | 175 profile_->GetPrefs()->ClearPref(prefs::kGoogleServicesUsername); |
176 profile_->GetPrefs()->ClearPref(prefs::kSyncUsingOAuth); | 176 profile_->GetPrefs()->ClearPref(prefs::kSyncUsingOAuth); |
177 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); | 177 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); |
178 profile_->GetTokenService()->ResetCredentialsInMemory(); | 178 profile_->GetTokenService()->ResetCredentialsInMemory(); |
179 profile_->GetTokenService()->EraseTokensFromDB(); | 179 profile_->GetTokenService()->EraseTokensFromDB(); |
180 } | 180 } |
181 | 181 |
182 void SigninManager::OnClientLoginSuccess(const ClientLoginResult& result) { | 182 void SigninManager::OnClientLoginSuccess(const ClientLoginResult& result) { |
183 DCHECK(!browser_sync::IsUsingOAuth()); | 183 DCHECK(!browser_sync::IsUsingOAuth()); |
184 last_result_ = result; | 184 last_result_ = result; |
(...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
244 // a second factor error, and we don't sign out if we're dealing with | 244 // a second factor error, and we don't sign out if we're dealing with |
245 // an invalid access code (again, because the password was valid). | 245 // an invalid access code (again, because the password was valid). |
246 bool invalid_gaia = error.state() == | 246 bool invalid_gaia = error.state() == |
247 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS; | 247 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS; |
248 if (error.state() == GoogleServiceAuthError::TWO_FACTOR || | 248 if (error.state() == GoogleServiceAuthError::TWO_FACTOR || |
249 (had_two_factor_error_ && invalid_gaia)) { | 249 (had_two_factor_error_ && invalid_gaia)) { |
250 had_two_factor_error_ = true; | 250 had_two_factor_error_ = true; |
251 return; | 251 return; |
252 } | 252 } |
253 | 253 |
254 SignOut(); | 254 ClearInMemoryData(); |
255 } | 255 } |
256 | 256 |
257 void SigninManager::OnOAuthGetAccessTokenSuccess(const std::string& token, | 257 void SigninManager::OnOAuthGetAccessTokenSuccess(const std::string& token, |
258 const std::string& secret) { | 258 const std::string& secret) { |
259 DCHECK(browser_sync::IsUsingOAuth()); | 259 DCHECK(browser_sync::IsUsingOAuth()); |
260 VLOG(1) << "SigninManager::OnOAuthGetAccessTokenSuccess"; | 260 VLOG(1) << "SigninManager::OnOAuthGetAccessTokenSuccess"; |
261 profile_->GetTokenService()->UpdateOAuthCredentials(token, secret); | 261 profile_->GetTokenService()->UpdateOAuthCredentials(token, secret); |
262 } | 262 } |
263 | 263 |
264 void SigninManager::OnOAuthGetAccessTokenFailure( | 264 void SigninManager::OnOAuthGetAccessTokenFailure( |
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
334 profile_->GetRequestContext())); | 334 profile_->GetRequestContext())); |
335 } | 335 } |
336 | 336 |
337 client_login_->StartMergeSession(tok_details->token()); | 337 client_login_->StartMergeSession(tok_details->token()); |
338 | 338 |
339 // We only want to do this once per sign-in. | 339 // We only want to do this once per sign-in. |
340 CleanupNotificationRegistration(); | 340 CleanupNotificationRegistration(); |
341 } | 341 } |
342 #endif | 342 #endif |
343 } | 343 } |
OLD | NEW |