Index: chrome/browser/signin/fake_profile_oauth2_token_service.cc |
diff --git a/chrome/browser/signin/fake_profile_oauth2_token_service.cc b/chrome/browser/signin/fake_profile_oauth2_token_service.cc |
deleted file mode 100644 |
index d86b5d346e144e2acff62521e4f00172dc1f3b27..0000000000000000000000000000000000000000 |
--- a/chrome/browser/signin/fake_profile_oauth2_token_service.cc |
+++ /dev/null |
@@ -1,152 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/signin/fake_profile_oauth2_token_service.h" |
- |
-#include "base/bind.h" |
-#include "base/location.h" |
-#include "base/single_thread_task_runner.h" |
-#include "base/thread_task_runner_handle.h" |
-#include "google_apis/gaia/fake_oauth2_token_service_delegate.h" |
- |
-FakeProfileOAuth2TokenService::PendingRequest::PendingRequest() { |
-} |
- |
-FakeProfileOAuth2TokenService::PendingRequest::~PendingRequest() { |
-} |
- |
-FakeProfileOAuth2TokenService::FakeProfileOAuth2TokenService() |
- : FakeProfileOAuth2TokenService( |
- new FakeOAuth2TokenServiceDelegate(nullptr)) {} |
- |
-FakeProfileOAuth2TokenService::FakeProfileOAuth2TokenService( |
- OAuth2TokenServiceDelegate* delegate) |
- : ProfileOAuth2TokenService(delegate), |
- auto_post_fetch_response_on_message_loop_(false), |
- weak_ptr_factory_(this) {} |
- |
-FakeProfileOAuth2TokenService::~FakeProfileOAuth2TokenService() { |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueAllTokensForAccount( |
- const std::string& account_id, |
- const std::string& access_token, |
- const base::Time& expiration) { |
- CompleteRequests(account_id, |
- true, |
- ScopeSet(), |
- GoogleServiceAuthError::AuthErrorNone(), |
- access_token, |
- expiration); |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueErrorForAllPendingRequestsForAccount( |
- const std::string& account_id, |
- const GoogleServiceAuthError& error) { |
- CompleteRequests(account_id, |
- true, |
- ScopeSet(), |
- error, |
- std::string(), |
- base::Time()); |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueTokenForScope( |
- const ScopeSet& scope, |
- const std::string& access_token, |
- const base::Time& expiration) { |
- CompleteRequests("", |
- false, |
- scope, |
- GoogleServiceAuthError::AuthErrorNone(), |
- access_token, |
- expiration); |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueErrorForScope( |
- const ScopeSet& scope, |
- const GoogleServiceAuthError& error) { |
- CompleteRequests("", false, scope, error, std::string(), base::Time()); |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueErrorForAllPendingRequests( |
- const GoogleServiceAuthError& error) { |
- CompleteRequests("", true, ScopeSet(), error, std::string(), base::Time()); |
-} |
- |
-void FakeProfileOAuth2TokenService::IssueTokenForAllPendingRequests( |
- const std::string& access_token, |
- const base::Time& expiration) { |
- CompleteRequests("", |
- true, |
- ScopeSet(), |
- GoogleServiceAuthError::AuthErrorNone(), |
- access_token, |
- expiration); |
-} |
- |
-void FakeProfileOAuth2TokenService::CompleteRequests( |
- const std::string& account_id, |
- bool all_scopes, |
- const ScopeSet& scope, |
- const GoogleServiceAuthError& error, |
- const std::string& access_token, |
- const base::Time& expiration) { |
- std::vector<FakeProfileOAuth2TokenService::PendingRequest> requests = |
- GetPendingRequests(); |
- |
- // Walk the requests and notify the callbacks. |
- for (std::vector<PendingRequest>::iterator it = requests.begin(); |
- it != requests.end(); ++it) { |
- DCHECK(it->request); |
- |
- bool scope_matches = all_scopes || it->scopes == scope; |
- bool account_matches = account_id.empty() || account_id == it->account_id; |
- if (account_matches && scope_matches) |
- it->request->InformConsumer(error, access_token, expiration); |
- } |
-} |
- |
-std::vector<FakeProfileOAuth2TokenService::PendingRequest> |
-FakeProfileOAuth2TokenService::GetPendingRequests() { |
- std::vector<PendingRequest> valid_requests; |
- for (std::vector<PendingRequest>::iterator it = pending_requests_.begin(); |
- it != pending_requests_.end(); ++it) { |
- if (it->request) |
- valid_requests.push_back(*it); |
- } |
- return valid_requests; |
-} |
- |
-void FakeProfileOAuth2TokenService::FetchOAuth2Token( |
- RequestImpl* request, |
- const std::string& account_id, |
- net::URLRequestContextGetter* getter, |
- const std::string& client_id, |
- const std::string& client_secret, |
- const ScopeSet& scopes) { |
- PendingRequest pending_request; |
- pending_request.account_id = account_id; |
- pending_request.client_id = client_id; |
- pending_request.client_secret = client_secret; |
- pending_request.scopes = scopes; |
- pending_request.request = request->AsWeakPtr(); |
- pending_requests_.push_back(pending_request); |
- |
- if (auto_post_fetch_response_on_message_loop_) { |
- base::ThreadTaskRunnerHandle::Get()->PostTask( |
- FROM_HERE, |
- base::Bind(&FakeProfileOAuth2TokenService::IssueAllTokensForAccount, |
- weak_ptr_factory_.GetWeakPtr(), account_id, "access_token", |
- base::Time::Max())); |
- } |
-} |
- |
-void FakeProfileOAuth2TokenService::InvalidateAccessTokenImpl( |
- const std::string& account_id, |
- const std::string& client_id, |
- const ScopeSet& scopes, |
- const std::string& access_token) { |
- // Do nothing, as we don't have a cache from which to remove the token. |
-} |