OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/signin/ios/browser/profile_oauth2_token_service_ios_delegat
e.h" | 5 #include "components/signin/ios/browser/profile_oauth2_token_service_ios_delegat
e.h" |
6 | 6 |
7 #include <Foundation/Foundation.h> | 7 #include <Foundation/Foundation.h> |
8 | 8 |
9 #include <set> | 9 #include <set> |
10 #include <string> | 10 #include <string> |
(...skipping 292 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
303 return account_ids; | 303 return account_ids; |
304 } | 304 } |
305 | 305 |
306 bool ProfileOAuth2TokenServiceIOSDelegate::RefreshTokenIsAvailable( | 306 bool ProfileOAuth2TokenServiceIOSDelegate::RefreshTokenIsAvailable( |
307 const std::string& account_id) const { | 307 const std::string& account_id) const { |
308 DCHECK(thread_checker_.CalledOnValidThread()); | 308 DCHECK(thread_checker_.CalledOnValidThread()); |
309 | 309 |
310 return accounts_.count(account_id) > 0; | 310 return accounts_.count(account_id) > 0; |
311 } | 311 } |
312 | 312 |
| 313 bool ProfileOAuth2TokenServiceIOSDelegate::RefreshTokenHasError( |
| 314 const std::string& account_id) const { |
| 315 DCHECK(thread_checker_.CalledOnValidThread()); |
| 316 auto it = accounts_.find(account_id); |
| 317 // TODO(rogerta): should we distinguish between transient and persistent? |
| 318 return it == accounts_.end() ? false : IsError(it->second->GetAuthStatus()); |
| 319 } |
| 320 |
313 void ProfileOAuth2TokenServiceIOSDelegate::UpdateAuthError( | 321 void ProfileOAuth2TokenServiceIOSDelegate::UpdateAuthError( |
314 const std::string& account_id, | 322 const std::string& account_id, |
315 const GoogleServiceAuthError& error) { | 323 const GoogleServiceAuthError& error) { |
316 DCHECK(thread_checker_.CalledOnValidThread()); | 324 DCHECK(thread_checker_.CalledOnValidThread()); |
317 | 325 |
318 // Do not report connection errors as these are not actually auth errors. | 326 // Do not report connection errors as these are not actually auth errors. |
319 // We also want to avoid masking a "real" auth error just because we | 327 // We also want to avoid masking a "real" auth error just because we |
320 // subsequently get a transient network error. | 328 // subsequently get a transient network error. |
321 if (error.state() == GoogleServiceAuthError::CONNECTION_FAILED || | 329 if (error.state() == GoogleServiceAuthError::CONNECTION_FAILED || |
322 error.state() == GoogleServiceAuthError::SERVICE_UNAVAILABLE) { | 330 error.state() == GoogleServiceAuthError::SERVICE_UNAVAILABLE) { |
(...skipping 125 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
448 void ProfileOAuth2TokenServiceIOSDelegate::ExcludeAllSecondaryAccounts() { | 456 void ProfileOAuth2TokenServiceIOSDelegate::ExcludeAllSecondaryAccounts() { |
449 client_->GetPrefs()->SetBoolean( | 457 client_->GetPrefs()->SetBoolean( |
450 prefs::kTokenServiceExcludeAllSecondaryAccounts, true); | 458 prefs::kTokenServiceExcludeAllSecondaryAccounts, true); |
451 } | 459 } |
452 | 460 |
453 void ProfileOAuth2TokenServiceIOSDelegate::ClearExcludedSecondaryAccounts() { | 461 void ProfileOAuth2TokenServiceIOSDelegate::ClearExcludedSecondaryAccounts() { |
454 client_->GetPrefs()->ClearPref( | 462 client_->GetPrefs()->ClearPref( |
455 prefs::kTokenServiceExcludeAllSecondaryAccounts); | 463 prefs::kTokenServiceExcludeAllSecondaryAccounts); |
456 client_->GetPrefs()->ClearPref(prefs::kTokenServiceExcludedSecondaryAccounts); | 464 client_->GetPrefs()->ClearPref(prefs::kTokenServiceExcludedSecondaryAccounts); |
457 } | 465 } |
OLD | NEW |