Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(415)

Side by Side Diff: chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h

Issue 1767443002: Add enterprise enrollment support for fake users. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr
Patch Set: Split PolicyOAuth2TokenFetcher into impl/fake classes; fix SAML browsertests Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 5 #ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 6 #define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/callback.h" 10 #include "base/callback.h"
(...skipping 12 matching lines...) Expand all
23 class URLRequestContextGetter; 23 class URLRequestContextGetter;
24 } 24 }
25 25
26 namespace policy { 26 namespace policy {
27 27
28 // Fetches the OAuth2 token for the device management service. Since Profile 28 // Fetches the OAuth2 token for the device management service. Since Profile
29 // creation might be blocking on a user policy fetch, this fetcher must always 29 // creation might be blocking on a user policy fetch, this fetcher must always
30 // send a (possibly empty) token to the callback, which will then let the policy 30 // send a (possibly empty) token to the callback, which will then let the policy
31 // subsystem proceed and resume Profile creation. Sending the token even when no 31 // subsystem proceed and resume Profile creation. Sending the token even when no
32 // Profile is pending is also OK. 32 // Profile is pending is also OK.
33 class PolicyOAuth2TokenFetcher 33 class PolicyOAuth2TokenFetcher {
34 : public base::SupportsWeakPtr<PolicyOAuth2TokenFetcher>,
35 public GaiaAuthConsumer,
36 public OAuth2AccessTokenConsumer {
37 public: 34 public:
35 static PolicyOAuth2TokenFetcher* CreateInstance();
36
37 // Makes CreateInstance() return a fake token fetcher that does not make
38 // network calls so tests can avoid a dependency on GAIA.
39 static void UseFakeTokensForTesting();
40
38 typedef base::Callback<void(const std::string&, 41 typedef base::Callback<void(const std::string&,
achuithb 2016/03/08 08:11:45 switch this to 'using' since you're here.
jdufault 2016/03/08 21:37:09 Done.
39 const GoogleServiceAuthError&)> TokenCallback; 42 const GoogleServiceAuthError&)> TokenCallback;
40 43
41 PolicyOAuth2TokenFetcher(); 44 PolicyOAuth2TokenFetcher();
42 ~PolicyOAuth2TokenFetcher() override; 45 virtual ~PolicyOAuth2TokenFetcher();
43 46
44 // Fetches the device management service's oauth2 token. This may be fetched 47 // Fetches the device management service's oauth2 token. This may be fetched
45 // via signin context, auth code, or oauth2 refresh token. 48 // via signin context, auth code, or oauth2 refresh token.
46 void StartWithSigninContext( 49 virtual void StartWithSigninContext(
47 net::URLRequestContextGetter* auth_context_getter, 50 net::URLRequestContextGetter* auth_context_getter,
48 net::URLRequestContextGetter* system_context_getter, 51 net::URLRequestContextGetter* system_context_getter,
49 const TokenCallback& callback); 52 const TokenCallback& callback) = 0;
50 void StartWithAuthCode(const std::string& auth_code, 53 virtual void StartWithAuthCode(
51 net::URLRequestContextGetter* system_context_getter, 54 const std::string& auth_code,
52 const TokenCallback& callback); 55 net::URLRequestContextGetter* system_context_getter,
53 void StartWithRefreshToken( 56 const TokenCallback& callback) = 0;
57 virtual void StartWithRefreshToken(
54 const std::string& oauth2_refresh_token, 58 const std::string& oauth2_refresh_token,
55 net::URLRequestContextGetter* system_context_getter, 59 net::URLRequestContextGetter* system_context_getter,
56 const TokenCallback& callback); 60 const TokenCallback& callback) = 0;
57 61
58 // Returns true if we have previously attempted to fetch tokens with this 62 // Returns true if we have previously attempted to fetch tokens with this
59 // class and failed. 63 // class and failed.
60 bool failed() const { 64 virtual bool failed() const = 0;
achuithb 2016/03/08 08:11:45 Shouldn't this be Failed()? Same for methods below
jdufault 2016/03/08 21:37:08 Done.
61 return failed_; 65 virtual const std::string& oauth2_refresh_token() const = 0;
62 } 66 virtual const std::string& oauth2_access_token() const = 0;
63
64 const std::string& oauth2_refresh_token() const {
65 return oauth2_refresh_token_;
66 }
67 const std::string& oauth2_access_token() const {
68 return oauth2_access_token_;
69 }
70 67
71 private: 68 private:
72 // GaiaAuthConsumer overrides. 69 // If true, fake policy tokens will be sent instead of making network
73 void OnClientOAuthSuccess( 70 // requests.
74 const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) override; 71 static bool use_fake_tokens_for_testing_;
achuithb 2016/03/08 08:11:44 move this to anonymous namespace in cc?
jdufault 2016/03/08 21:37:09 Done.
75 void OnClientOAuthFailure(const GoogleServiceAuthError& error) override;
76
77 // OAuth2AccessTokenConsumer overrides.
78 void OnGetTokenSuccess(const std::string& access_token,
79 const base::Time& expiration_time) override;
80 void OnGetTokenFailure(const GoogleServiceAuthError& error) override;
81
82 // Starts fetching OAuth2 refresh token.
83 void StartFetchingRefreshToken();
84
85 // Starts fetching OAuth2 access token for the device management service.
86 void StartFetchingAccessToken();
87
88 // Decides how to proceed on GAIA |error|. If the error looks temporary,
89 // retries |task| until max retry count is reached.
90 // If retry count runs out, or error condition is unrecoverable, it calls
91 // Delegate::OnOAuth2TokenFetchFailed().
92 void RetryOnError(const GoogleServiceAuthError& error,
93 const base::Closure& task);
94
95 // Passes |token| and |error| to the |callback_|.
96 void ForwardPolicyToken(const std::string& token,
97 const GoogleServiceAuthError& error);
98
99 // Auth code which is used to retreive a refresh token.
100 std::string auth_code_;
101
102 scoped_refptr<net::URLRequestContextGetter> auth_context_getter_;
103 scoped_refptr<net::URLRequestContextGetter> system_context_getter_;
104 scoped_ptr<GaiaAuthFetcher> refresh_token_fetcher_;
105 scoped_ptr<OAuth2AccessTokenFetcher> access_token_fetcher_;
106
107 // OAuth2 refresh token. Could come either from the outside or through
108 // refresh token fetching flow within this class.
109 std::string oauth2_refresh_token_;
110
111 // OAuth2 access token.
112 std::string oauth2_access_token_;
113
114 // The retry counter. Increment this only when failure happened.
115 int retry_count_ = 0;
116
117 // True if we have already failed to fetch the policy.
118 bool failed_ = false;
119
120 // The callback to invoke when done.
121 TokenCallback callback_;
122 72
123 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher); 73 DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher);
124 }; 74 };
125 75
126 } // namespace policy 76 } // namespace policy
127 77
128 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_ 78 #endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698