Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(41)

Side by Side Diff: chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h

Issue 1767443002: Add enterprise enrollment support for fake users. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr
Patch Set: Nits Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/callback.h" 10 #include "base/callback.h"
11 #include "base/compiler_specific.h"
12 #include "base/macros.h" 11 #include "base/macros.h"
13 #include "base/memory/ref_counted.h"
14 #include "base/memory/scoped_ptr.h"
15 #include "base/memory/weak_ptr.h"
16 #include "google_apis/gaia/gaia_auth_consumer.h" 12 #include "google_apis/gaia/gaia_auth_consumer.h"
17 #include "google_apis/gaia/oauth2_access_token_consumer.h"
18 13
19 class GaiaAuthFetcher; 14 class GaiaAuthFetcher;
20 class OAuth2AccessTokenFetcher; 15 class OAuth2AccessTokenFetcher;
21 16
22 namespace net { 17 namespace net {
23 class URLRequestContextGetter; 18 class URLRequestContextGetter;
24 } 19 }
25 20
26 namespace policy { 21 namespace policy {
27 22
28 // Fetches the OAuth2 token for the device management service. Since Profile 23 // Fetches the OAuth2 token for the device management service. Since Profile
29 // creation might be blocking on a user policy fetch, this fetcher must always 24 // creation might be blocking on a user policy fetch, this fetcher must always
30 // send a (possibly empty) token to the callback, which will then let the policy 25 // send a (possibly empty) token to the callback, which will then let the policy
31 // subsystem proceed and resume Profile creation. Sending the token even when no 26 // subsystem proceed and resume Profile creation. Sending the token even when no
32 // Profile is pending is also OK. 27 // Profile is pending is also OK.
33 class PolicyOAuth2TokenFetcher 28 class PolicyOAuth2TokenFetcher {
34 : public base::SupportsWeakPtr<PolicyOAuth2TokenFetcher>,
35 public GaiaAuthConsumer,
36 public OAuth2AccessTokenConsumer {
37 public: 29 public:
38 typedef base::Callback<void(const std::string&, 30 // Allocates a PolicyOAuth2TokenFetcher instance.
39 const GoogleServiceAuthError&)> TokenCallback; 31 static PolicyOAuth2TokenFetcher* CreateInstance();
Andrew T Wilson (Slow) 2016/03/23 12:37:13 See my previous comment around using injection rat
32
33 // Makes CreateInstance() return a fake token fetcher that does not make
34 // network calls so tests can avoid a dependency on GAIA.
35 static void UseFakeTokensForTesting();
36
37 using TokenCallback =
38 base::Callback<void(const std::string&, const GoogleServiceAuthError&)>;
40 39
41 PolicyOAuth2TokenFetcher(); 40 PolicyOAuth2TokenFetcher();
42 ~PolicyOAuth2TokenFetcher() override; 41 virtual ~PolicyOAuth2TokenFetcher();
43 42
44 // Fetches the device management service's oauth2 token. This may be fetched 43 // Fetches the device management service's oauth2 token. This may be fetched
45 // via signin context, auth code, or oauth2 refresh token. 44 // via signin context, auth code, or oauth2 refresh token.
46 void StartWithSigninContext( 45 virtual void StartWithSigninContext(
47 net::URLRequestContextGetter* auth_context_getter, 46 net::URLRequestContextGetter* auth_context_getter,
48 net::URLRequestContextGetter* system_context_getter, 47 net::URLRequestContextGetter* system_context_getter,
49 const TokenCallback& callback); 48 const TokenCallback& callback) = 0;
50 void StartWithAuthCode(const std::string& auth_code, 49 virtual void StartWithAuthCode(
51 net::URLRequestContextGetter* system_context_getter, 50 const std::string& auth_code,
52 const TokenCallback& callback); 51 net::URLRequestContextGetter* system_context_getter,
53 void StartWithRefreshToken( 52 const TokenCallback& callback) = 0;
53 virtual void StartWithRefreshToken(
54 const std::string& oauth2_refresh_token, 54 const std::string& oauth2_refresh_token,
55 net::URLRequestContextGetter* system_context_getter, 55 net::URLRequestContextGetter* system_context_getter,
56 const TokenCallback& callback); 56 const TokenCallback& callback) = 0;
57 57
58 // Returns true if we have previously attempted to fetch tokens with this 58 // Returns true if we have previously attempted to fetch tokens with this
59 // class and failed. 59 // class and failed.
60 bool failed() const { 60 virtual bool Failed() const = 0;
61 return failed_; 61 virtual const std::string& OAuth2RefreshToken() const = 0;
62 } 62 virtual const std::string& OAuth2AccessToken() const = 0;
63
64 const std::string& oauth2_refresh_token() const {
65 return oauth2_refresh_token_;
66 }
67 const std::string& oauth2_access_token() const {
68 return oauth2_access_token_;
69 }
70 63
71 private: 64 private:
72 // GaiaAuthConsumer overrides.
73 void OnClientOAuthSuccess(
74 const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) override;
75 void OnClientOAuthFailure(const GoogleServiceAuthError& error) override;
76
77 // OAuth2AccessTokenConsumer overrides.
78 void OnGetTokenSuccess(const std::string& access_token,
79 const base::Time& expiration_time) override;
80 void OnGetTokenFailure(const GoogleServiceAuthError& error) override;
81
82 // Starts fetching OAuth2 refresh token.
83 void StartFetchingRefreshToken();
84
85 // Starts fetching OAuth2 access token for the device management service.
86 void StartFetchingAccessToken();
87
88 // Decides how to proceed on GAIA |error|. If the error looks temporary,
89 // retries |task| until max retry count is reached.
90 // If retry count runs out, or error condition is unrecoverable, it calls
91 // Delegate::OnOAuth2TokenFetchFailed().
92 void RetryOnError(const GoogleServiceAuthError& error,
93 const base::Closure& task);
94
95 // Passes |token| and |error| to the |callback_|.
96 void ForwardPolicyToken(const std::string& token,
97 const GoogleServiceAuthError& error);
98
99 // Auth code which is used to retreive a refresh token.
100 std::string auth_code_;
101
102 scoped_refptr<net::URLRequestContextGetter> auth_context_getter_;
103 scoped_refptr<net::URLRequestContextGetter> system_context_getter_;
104 scoped_ptr<GaiaAuthFetcher> refresh_token_fetcher_;
105 scoped_ptr<OAuth2AccessTokenFetcher> access_token_fetcher_;
106
107 // OAuth2 refresh token. Could come either from the outside or through
108 // refresh token fetching flow within this class.
109 std::string oauth2_refresh_token_;
110
111 // OAuth2 access token.
112 std::string oauth2_access_token_;
113
114 // The retry counter. Increment this only when failure happened.
115 int retry_count_ = 0;
116
117 // True if we have already failed to fetch the policy.
118 bool failed_ = false;
119
120 // The callback to invoke when done.
121 TokenCallback callback_;
122
123 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher); 65 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher);
124 }; 66 };
125 67
126 } // namespace policy 68 } // namespace policy
127 69
128 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 70 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698