OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "google_apis/gaia/oauth2_mint_token_fetcher.h" | |
6 | |
7 #include <algorithm> | |
8 #include <string> | |
9 | |
10 #include "base/json/json_reader.h" | |
11 #include "base/string_util.h" | |
12 #include "base/stringprintf.h" | |
13 #include "base/values.h" | |
14 #include "google_apis/gaia/gaia_urls.h" | |
15 #include "google_apis/gaia/google_service_auth_error.h" | |
16 #include "net/base/escape.h" | |
17 #include "net/base/load_flags.h" | |
18 #include "net/http/http_status_code.h" | |
19 #include "net/url_request/url_fetcher.h" | |
20 #include "net/url_request/url_request_context_getter.h" | |
21 #include "net/url_request/url_request_status.h" | |
22 | |
23 using net::URLFetcher; | |
24 using net::URLFetcherDelegate; | |
25 using net::ResponseCookies; | |
26 using net::URLRequestContextGetter; | |
27 using net::URLRequestStatus; | |
28 | |
29 namespace { | |
30 static const char kAuthorizationHeaderFormat[] = | |
31 "Authorization: Bearer %s"; | |
32 static const char kOAuth2IssueTokenBodyFormat[] = | |
33 "force=true" | |
34 "&response_type=token" | |
35 "&scope=%s" | |
36 "&client_id=%s" | |
37 "&origin=%s"; | |
38 static const char kAccessTokenKey[] = "token"; | |
39 | |
40 static GoogleServiceAuthError CreateAuthError(URLRequestStatus status) { | |
41 CHECK(!status.is_success()); | |
42 if (status.status() == URLRequestStatus::CANCELED) { | |
43 return GoogleServiceAuthError(GoogleServiceAuthError::REQUEST_CANCELED); | |
44 } else { | |
45 DLOG(WARNING) << "Could not reach Google Accounts servers: errno " | |
46 << status.error(); | |
47 return GoogleServiceAuthError::FromConnectionError(status.error()); | |
48 } | |
49 } | |
50 | |
51 static URLFetcher* CreateFetcher(URLRequestContextGetter* getter, | |
52 const GURL& url, | |
53 const std::string& headers, | |
54 const std::string& body, | |
55 URLFetcherDelegate* delegate) { | |
56 bool empty_body = body.empty(); | |
57 URLFetcher* result = net::URLFetcher::Create( | |
58 0, url, | |
59 empty_body ? URLFetcher::GET : URLFetcher::POST, | |
60 delegate); | |
61 | |
62 result->SetRequestContext(getter); | |
63 result->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES | | |
64 net::LOAD_DO_NOT_SAVE_COOKIES); | |
65 // Fetchers are sometimes cancelled because a network change was detected, | |
66 // especially at startup and after sign-in on ChromeOS. Retrying once should | |
67 // be enough in those cases; let the fetcher retry up to 3 times just in case. | |
68 // http://crbug.com/163710 | |
69 result->SetAutomaticallyRetryOnNetworkChanges(3); | |
70 | |
71 if (!empty_body) | |
72 result->SetUploadData("application/x-www-form-urlencoded", body); | |
73 if (!headers.empty()) | |
74 result->SetExtraRequestHeaders(headers); | |
75 | |
76 return result; | |
77 } | |
78 } // namespace | |
79 | |
80 OAuth2MintTokenFetcher::OAuth2MintTokenFetcher( | |
81 OAuth2MintTokenConsumer* consumer, | |
82 URLRequestContextGetter* getter, | |
83 const std::string& source) | |
84 : consumer_(consumer), | |
85 getter_(getter), | |
86 source_(source), | |
87 state_(INITIAL) { } | |
88 | |
89 OAuth2MintTokenFetcher::~OAuth2MintTokenFetcher() { } | |
90 | |
91 void OAuth2MintTokenFetcher::CancelRequest() { | |
92 fetcher_.reset(); | |
93 } | |
94 | |
95 void OAuth2MintTokenFetcher::Start(const std::string& oauth_login_access_token, | |
96 const std::string& client_id, | |
97 const std::vector<std::string>& scopes, | |
98 const std::string& origin) { | |
99 oauth_login_access_token_ = oauth_login_access_token; | |
100 client_id_ = client_id; | |
101 scopes_ = scopes; | |
102 origin_ = origin; | |
103 StartMintToken(); | |
104 } | |
105 | |
106 void OAuth2MintTokenFetcher::StartMintToken() { | |
107 CHECK_EQ(INITIAL, state_); | |
108 state_ = MINT_TOKEN_STARTED; | |
109 fetcher_.reset(CreateFetcher( | |
110 getter_, | |
111 MakeMintTokenUrl(), | |
112 MakeMintTokenHeader(oauth_login_access_token_), | |
113 MakeMintTokenBody(client_id_, scopes_, origin_), | |
114 this)); | |
115 fetcher_->Start(); // OnURLFetchComplete will be called. | |
116 } | |
117 | |
118 void OAuth2MintTokenFetcher::EndMintToken(const net::URLFetcher* source) { | |
119 CHECK_EQ(MINT_TOKEN_STARTED, state_); | |
120 state_ = MINT_TOKEN_DONE; | |
121 | |
122 URLRequestStatus status = source->GetStatus(); | |
123 if (!status.is_success()) { | |
124 OnMintTokenFailure(CreateAuthError(status)); | |
125 return; | |
126 } | |
127 | |
128 if (source->GetResponseCode() != net::HTTP_OK) { | |
129 OnMintTokenFailure(GoogleServiceAuthError( | |
130 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); | |
131 return; | |
132 } | |
133 | |
134 // The request was successfully fetched and it returned OK. | |
135 // Parse out the access token. | |
136 std::string access_token; | |
137 ParseMintTokenResponse(source, &access_token); | |
138 OnMintTokenSuccess(access_token); | |
139 } | |
140 | |
141 void OAuth2MintTokenFetcher::OnMintTokenSuccess( | |
142 const std::string& access_token) { | |
143 consumer_->OnMintTokenSuccess(access_token); | |
144 } | |
145 | |
146 void OAuth2MintTokenFetcher::OnMintTokenFailure( | |
147 const GoogleServiceAuthError& error) { | |
148 state_ = ERROR_STATE; | |
149 consumer_->OnMintTokenFailure(error); | |
150 } | |
151 | |
152 void OAuth2MintTokenFetcher::OnURLFetchComplete(const net::URLFetcher* source) { | |
153 CHECK(source); | |
154 CHECK_EQ(MINT_TOKEN_STARTED, state_); | |
155 EndMintToken(source); | |
156 } | |
157 | |
158 // static | |
159 GURL OAuth2MintTokenFetcher::MakeMintTokenUrl() { | |
160 return GURL(GaiaUrls::GetInstance()->oauth2_issue_token_url()); | |
161 } | |
162 | |
163 // static | |
164 std::string OAuth2MintTokenFetcher::MakeMintTokenHeader( | |
165 const std::string& access_token) { | |
166 return base::StringPrintf(kAuthorizationHeaderFormat, access_token.c_str()); | |
167 } | |
168 | |
169 // static | |
170 std::string OAuth2MintTokenFetcher::MakeMintTokenBody( | |
171 const std::string& client_id, | |
172 const std::vector<std::string>& scopes, | |
173 const std::string& origin) { | |
174 return base::StringPrintf( | |
175 kOAuth2IssueTokenBodyFormat, | |
176 net::EscapeUrlEncodedData(JoinString(scopes, ','), true).c_str(), | |
177 net::EscapeUrlEncodedData(client_id, true).c_str(), | |
178 net::EscapeUrlEncodedData(origin, true).c_str()); | |
179 } | |
180 | |
181 // static | |
182 bool OAuth2MintTokenFetcher::ParseMintTokenResponse( | |
183 const net::URLFetcher* source, | |
184 std::string* access_token) { | |
185 CHECK(source); | |
186 CHECK(access_token); | |
187 std::string data; | |
188 source->GetResponseAsString(&data); | |
189 scoped_ptr<base::Value> value(base::JSONReader::Read(data)); | |
190 if (!value.get() || value->GetType() != base::Value::TYPE_DICTIONARY) | |
191 return false; | |
192 | |
193 DictionaryValue* dict = static_cast<DictionaryValue*>(value.get()); | |
194 return dict->GetString(kAccessTokenKey, access_token); | |
195 } | |
OLD | NEW |