| Index: chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h
|
| diff --git a/chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h b/chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h
|
| index f112280dd8816558c1a79170086ad6f46604038f..18ef8c187f9a70c6d7edceba94b42eb413e152ac 100644
|
| --- a/chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h
|
| +++ b/chrome/browser/chromeos/policy/policy_oauth2_token_fetcher.h
|
| @@ -9,8 +9,12 @@
|
| #include <string>
|
|
|
| #include "base/callback.h"
|
| +#include "base/compiler_specific.h"
|
| #include "base/macros.h"
|
| +#include "base/memory/ref_counted.h"
|
| +#include "base/memory/weak_ptr.h"
|
| #include "google_apis/gaia/gaia_auth_consumer.h"
|
| +#include "google_apis/gaia/oauth2_access_token_consumer.h"
|
|
|
| class GaiaAuthFetcher;
|
| class OAuth2AccessTokenFetcher;
|
| @@ -26,43 +30,96 @@
|
| // send a (possibly empty) token to the callback, which will then let the policy
|
| // subsystem proceed and resume Profile creation. Sending the token even when no
|
| // Profile is pending is also OK.
|
| -class PolicyOAuth2TokenFetcher {
|
| +class PolicyOAuth2TokenFetcher
|
| + : public base::SupportsWeakPtr<PolicyOAuth2TokenFetcher>,
|
| + public GaiaAuthConsumer,
|
| + public OAuth2AccessTokenConsumer {
|
| public:
|
| - // Allocates a PolicyOAuth2TokenFetcher instance.
|
| - static PolicyOAuth2TokenFetcher* CreateInstance();
|
| -
|
| - // Makes CreateInstance() return a fake token fetcher that does not make
|
| - // network calls so tests can avoid a dependency on GAIA.
|
| - static void UseFakeTokensForTesting();
|
| -
|
| - using TokenCallback =
|
| - base::Callback<void(const std::string&, const GoogleServiceAuthError&)>;
|
| + typedef base::Callback<void(const std::string&,
|
| + const GoogleServiceAuthError&)> TokenCallback;
|
|
|
| PolicyOAuth2TokenFetcher();
|
| - virtual ~PolicyOAuth2TokenFetcher();
|
| + ~PolicyOAuth2TokenFetcher() override;
|
|
|
| // Fetches the device management service's oauth2 token. This may be fetched
|
| // via signin context, auth code, or oauth2 refresh token.
|
| - virtual void StartWithSigninContext(
|
| + void StartWithSigninContext(
|
| net::URLRequestContextGetter* auth_context_getter,
|
| net::URLRequestContextGetter* system_context_getter,
|
| - const TokenCallback& callback) = 0;
|
| - virtual void StartWithAuthCode(
|
| - const std::string& auth_code,
|
| - net::URLRequestContextGetter* system_context_getter,
|
| - const TokenCallback& callback) = 0;
|
| - virtual void StartWithRefreshToken(
|
| + const TokenCallback& callback);
|
| + void StartWithAuthCode(const std::string& auth_code,
|
| + net::URLRequestContextGetter* system_context_getter,
|
| + const TokenCallback& callback);
|
| + void StartWithRefreshToken(
|
| const std::string& oauth2_refresh_token,
|
| net::URLRequestContextGetter* system_context_getter,
|
| - const TokenCallback& callback) = 0;
|
| + const TokenCallback& callback);
|
|
|
| // Returns true if we have previously attempted to fetch tokens with this
|
| // class and failed.
|
| - virtual bool Failed() const = 0;
|
| - virtual const std::string& OAuth2RefreshToken() const = 0;
|
| - virtual const std::string& OAuth2AccessToken() const = 0;
|
| + bool failed() const {
|
| + return failed_;
|
| + }
|
| +
|
| + const std::string& oauth2_refresh_token() const {
|
| + return oauth2_refresh_token_;
|
| + }
|
| + const std::string& oauth2_access_token() const {
|
| + return oauth2_access_token_;
|
| + }
|
|
|
| private:
|
| + // GaiaAuthConsumer overrides.
|
| + void OnClientOAuthSuccess(
|
| + const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) override;
|
| + void OnClientOAuthFailure(const GoogleServiceAuthError& error) override;
|
| +
|
| + // OAuth2AccessTokenConsumer overrides.
|
| + void OnGetTokenSuccess(const std::string& access_token,
|
| + const base::Time& expiration_time) override;
|
| + void OnGetTokenFailure(const GoogleServiceAuthError& error) override;
|
| +
|
| + // Starts fetching OAuth2 refresh token.
|
| + void StartFetchingRefreshToken();
|
| +
|
| + // Starts fetching OAuth2 access token for the device management service.
|
| + void StartFetchingAccessToken();
|
| +
|
| + // Decides how to proceed on GAIA |error|. If the error looks temporary,
|
| + // retries |task| until max retry count is reached.
|
| + // If retry count runs out, or error condition is unrecoverable, it calls
|
| + // Delegate::OnOAuth2TokenFetchFailed().
|
| + void RetryOnError(const GoogleServiceAuthError& error,
|
| + const base::Closure& task);
|
| +
|
| + // Passes |token| and |error| to the |callback_|.
|
| + void ForwardPolicyToken(const std::string& token,
|
| + const GoogleServiceAuthError& error);
|
| +
|
| + // Auth code which is used to retreive a refresh token.
|
| + std::string auth_code_;
|
| +
|
| + scoped_refptr<net::URLRequestContextGetter> auth_context_getter_;
|
| + scoped_refptr<net::URLRequestContextGetter> system_context_getter_;
|
| + std::unique_ptr<GaiaAuthFetcher> refresh_token_fetcher_;
|
| + std::unique_ptr<OAuth2AccessTokenFetcher> access_token_fetcher_;
|
| +
|
| + // OAuth2 refresh token. Could come either from the outside or through
|
| + // refresh token fetching flow within this class.
|
| + std::string oauth2_refresh_token_;
|
| +
|
| + // OAuth2 access token.
|
| + std::string oauth2_access_token_;
|
| +
|
| + // The retry counter. Increment this only when failure happened.
|
| + int retry_count_ = 0;
|
| +
|
| + // True if we have already failed to fetch the policy.
|
| + bool failed_ = false;
|
| +
|
| + // The callback to invoke when done.
|
| + TokenCallback callback_;
|
| +
|
| DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher);
|
| };
|
|
|
|
|