OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "extensions/browser/updater/extension_downloader.h" | 5 #include "extensions/browser/updater/extension_downloader.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 897 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
908 return true; | 908 return true; |
909 case ExtensionFetch::CREDENTIALS_OAUTH2_TOKEN: | 909 case ExtensionFetch::CREDENTIALS_OAUTH2_TOKEN: |
910 fetch->oauth2_attempt_count++; | 910 fetch->oauth2_attempt_count++; |
911 // OAuth2 may fail due to an expired access token, in which case we | 911 // OAuth2 may fail due to an expired access token, in which case we |
912 // should invalidate the token and try again. | 912 // should invalidate the token and try again. |
913 if (response_code == net::HTTP_UNAUTHORIZED && | 913 if (response_code == net::HTTP_UNAUTHORIZED && |
914 fetch->oauth2_attempt_count <= kMaxOAuth2Attempts) { | 914 fetch->oauth2_attempt_count <= kMaxOAuth2Attempts) { |
915 DCHECK(identity_provider_.get()); | 915 DCHECK(identity_provider_.get()); |
916 OAuth2TokenService::ScopeSet webstore_scopes; | 916 OAuth2TokenService::ScopeSet webstore_scopes; |
917 webstore_scopes.insert(kWebstoreOAuth2Scope); | 917 webstore_scopes.insert(kWebstoreOAuth2Scope); |
918 identity_provider_->GetTokenService()->InvalidateToken( | 918 identity_provider_->GetTokenService()->InvalidateAccessToken( |
919 identity_provider_->GetActiveAccountId(), | 919 identity_provider_->GetActiveAccountId(), webstore_scopes, |
920 webstore_scopes, | |
921 access_token_); | 920 access_token_); |
922 access_token_.clear(); | 921 access_token_.clear(); |
923 return true; | 922 return true; |
924 } | 923 } |
925 // Either there is no Gaia identity available, the active identity | 924 // Either there is no Gaia identity available, the active identity |
926 // doesn't have access to this resource, or the server keeps returning | 925 // doesn't have access to this resource, or the server keeps returning |
927 // 401s and we've retried too many times. Fall back on cookies. | 926 // 401s and we've retried too many times. Fall back on cookies. |
928 if (access_token_.empty() || response_code == net::HTTP_FORBIDDEN || | 927 if (access_token_.empty() || response_code == net::HTTP_FORBIDDEN || |
929 fetch->oauth2_attempt_count > kMaxOAuth2Attempts) { | 928 fetch->oauth2_attempt_count > kMaxOAuth2Attempts) { |
930 fetch->credentials = ExtensionFetch::CREDENTIALS_COOKIES; | 929 fetch->credentials = ExtensionFetch::CREDENTIALS_COOKIES; |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
969 const GURL& update_url, | 968 const GURL& update_url, |
970 int request_id) { | 969 int request_id) { |
971 ManifestFetchData::PingMode ping_mode = ManifestFetchData::NO_PING; | 970 ManifestFetchData::PingMode ping_mode = ManifestFetchData::NO_PING; |
972 if (update_url.DomainIs(ping_enabled_domain_.c_str())) | 971 if (update_url.DomainIs(ping_enabled_domain_.c_str())) |
973 ping_mode = ManifestFetchData::PING_WITH_ENABLED_STATE; | 972 ping_mode = ManifestFetchData::PING_WITH_ENABLED_STATE; |
974 return new ManifestFetchData( | 973 return new ManifestFetchData( |
975 update_url, request_id, brand_code_, manifest_query_params_, ping_mode); | 974 update_url, request_id, brand_code_, manifest_query_params_, ping_mode); |
976 } | 975 } |
977 | 976 |
978 } // namespace extensions | 977 } // namespace extensions |
OLD | NEW |