OLD | NEW |
---|---|
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ | 5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ |
6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ | 6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/callback.h" | 10 #include "base/callback.h" |
11 #include "base/compiler_specific.h" | |
12 #include "base/macros.h" | 11 #include "base/macros.h" |
13 #include "base/memory/ref_counted.h" | |
14 #include "base/memory/scoped_ptr.h" | |
15 #include "base/memory/weak_ptr.h" | |
16 #include "google_apis/gaia/gaia_auth_consumer.h" | 12 #include "google_apis/gaia/gaia_auth_consumer.h" |
17 #include "google_apis/gaia/oauth2_access_token_consumer.h" | |
18 | 13 |
19 class GaiaAuthFetcher; | 14 class GaiaAuthFetcher; |
20 class OAuth2AccessTokenFetcher; | 15 class OAuth2AccessTokenFetcher; |
21 | 16 |
22 namespace net { | 17 namespace net { |
23 class URLRequestContextGetter; | 18 class URLRequestContextGetter; |
24 } | 19 } |
25 | 20 |
26 namespace policy { | 21 namespace policy { |
27 | 22 |
28 // Fetches the OAuth2 token for the device management service. Since Profile | 23 // Fetches the OAuth2 token for the device management service. Since Profile |
29 // creation might be blocking on a user policy fetch, this fetcher must always | 24 // creation might be blocking on a user policy fetch, this fetcher must always |
30 // send a (possibly empty) token to the callback, which will then let the policy | 25 // send a (possibly empty) token to the callback, which will then let the policy |
31 // subsystem proceed and resume Profile creation. Sending the token even when no | 26 // subsystem proceed and resume Profile creation. Sending the token even when no |
32 // Profile is pending is also OK. | 27 // Profile is pending is also OK. |
33 class PolicyOAuth2TokenFetcher | 28 class PolicyOAuth2TokenFetcher { |
34 : public base::SupportsWeakPtr<PolicyOAuth2TokenFetcher>, | |
35 public GaiaAuthConsumer, | |
36 public OAuth2AccessTokenConsumer { | |
37 public: | 29 public: |
38 typedef base::Callback<void(const std::string&, | 30 // Allocates a PolicyOAuth2TokenFetcher instance. |
39 const GoogleServiceAuthError&)> TokenCallback; | 31 static PolicyOAuth2TokenFetcher* CreateInstance(); |
Andrew T Wilson (Slow)
2016/03/23 12:37:13
See my previous comment around using injection rat
| |
32 | |
33 // Makes CreateInstance() return a fake token fetcher that does not make | |
34 // network calls so tests can avoid a dependency on GAIA. | |
35 static void UseFakeTokensForTesting(); | |
36 | |
37 using TokenCallback = | |
38 base::Callback<void(const std::string&, const GoogleServiceAuthError&)>; | |
40 | 39 |
41 PolicyOAuth2TokenFetcher(); | 40 PolicyOAuth2TokenFetcher(); |
42 ~PolicyOAuth2TokenFetcher() override; | 41 virtual ~PolicyOAuth2TokenFetcher(); |
43 | 42 |
44 // Fetches the device management service's oauth2 token. This may be fetched | 43 // Fetches the device management service's oauth2 token. This may be fetched |
45 // via signin context, auth code, or oauth2 refresh token. | 44 // via signin context, auth code, or oauth2 refresh token. |
46 void StartWithSigninContext( | 45 virtual void StartWithSigninContext( |
47 net::URLRequestContextGetter* auth_context_getter, | 46 net::URLRequestContextGetter* auth_context_getter, |
48 net::URLRequestContextGetter* system_context_getter, | 47 net::URLRequestContextGetter* system_context_getter, |
49 const TokenCallback& callback); | 48 const TokenCallback& callback) = 0; |
50 void StartWithAuthCode(const std::string& auth_code, | 49 virtual void StartWithAuthCode( |
51 net::URLRequestContextGetter* system_context_getter, | 50 const std::string& auth_code, |
52 const TokenCallback& callback); | 51 net::URLRequestContextGetter* system_context_getter, |
53 void StartWithRefreshToken( | 52 const TokenCallback& callback) = 0; |
53 virtual void StartWithRefreshToken( | |
54 const std::string& oauth2_refresh_token, | 54 const std::string& oauth2_refresh_token, |
55 net::URLRequestContextGetter* system_context_getter, | 55 net::URLRequestContextGetter* system_context_getter, |
56 const TokenCallback& callback); | 56 const TokenCallback& callback) = 0; |
57 | 57 |
58 // Returns true if we have previously attempted to fetch tokens with this | 58 // Returns true if we have previously attempted to fetch tokens with this |
59 // class and failed. | 59 // class and failed. |
60 bool failed() const { | 60 virtual bool Failed() const = 0; |
61 return failed_; | 61 virtual const std::string& OAuth2RefreshToken() const = 0; |
62 } | 62 virtual const std::string& OAuth2AccessToken() const = 0; |
63 | |
64 const std::string& oauth2_refresh_token() const { | |
65 return oauth2_refresh_token_; | |
66 } | |
67 const std::string& oauth2_access_token() const { | |
68 return oauth2_access_token_; | |
69 } | |
70 | 63 |
71 private: | 64 private: |
72 // GaiaAuthConsumer overrides. | |
73 void OnClientOAuthSuccess( | |
74 const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) override; | |
75 void OnClientOAuthFailure(const GoogleServiceAuthError& error) override; | |
76 | |
77 // OAuth2AccessTokenConsumer overrides. | |
78 void OnGetTokenSuccess(const std::string& access_token, | |
79 const base::Time& expiration_time) override; | |
80 void OnGetTokenFailure(const GoogleServiceAuthError& error) override; | |
81 | |
82 // Starts fetching OAuth2 refresh token. | |
83 void StartFetchingRefreshToken(); | |
84 | |
85 // Starts fetching OAuth2 access token for the device management service. | |
86 void StartFetchingAccessToken(); | |
87 | |
88 // Decides how to proceed on GAIA |error|. If the error looks temporary, | |
89 // retries |task| until max retry count is reached. | |
90 // If retry count runs out, or error condition is unrecoverable, it calls | |
91 // Delegate::OnOAuth2TokenFetchFailed(). | |
92 void RetryOnError(const GoogleServiceAuthError& error, | |
93 const base::Closure& task); | |
94 | |
95 // Passes |token| and |error| to the |callback_|. | |
96 void ForwardPolicyToken(const std::string& token, | |
97 const GoogleServiceAuthError& error); | |
98 | |
99 // Auth code which is used to retreive a refresh token. | |
100 std::string auth_code_; | |
101 | |
102 scoped_refptr<net::URLRequestContextGetter> auth_context_getter_; | |
103 scoped_refptr<net::URLRequestContextGetter> system_context_getter_; | |
104 scoped_ptr<GaiaAuthFetcher> refresh_token_fetcher_; | |
105 scoped_ptr<OAuth2AccessTokenFetcher> access_token_fetcher_; | |
106 | |
107 // OAuth2 refresh token. Could come either from the outside or through | |
108 // refresh token fetching flow within this class. | |
109 std::string oauth2_refresh_token_; | |
110 | |
111 // OAuth2 access token. | |
112 std::string oauth2_access_token_; | |
113 | |
114 // The retry counter. Increment this only when failure happened. | |
115 int retry_count_ = 0; | |
116 | |
117 // True if we have already failed to fetch the policy. | |
118 bool failed_ = false; | |
119 | |
120 // The callback to invoke when done. | |
121 TokenCallback callback_; | |
122 | |
123 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher); | 65 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher); |
124 }; | 66 }; |
125 | 67 |
126 } // namespace policy | 68 } // namespace policy |
127 | 69 |
128 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ | 70 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ |
OLD | NEW |