Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(711)

Unified Diff: components/ntp_snippets/ntp_snippets_fetcher.cc

Issue 1922083004: Allow fetching personalized snippets from ChromeReader. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: After code review #4 Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/ntp_snippets/ntp_snippets_fetcher.cc
diff --git a/components/ntp_snippets/ntp_snippets_fetcher.cc b/components/ntp_snippets/ntp_snippets_fetcher.cc
index a5a5298ca84c580b7a7d5d366d9acc23164d61c1..97d58b4f5a322d94ef3db9a3df4943fe817561b0 100644
--- a/components/ntp_snippets/ntp_snippets_fetcher.cc
+++ b/components/ntp_snippets/ntp_snippets_fetcher.cc
@@ -4,6 +4,8 @@
#include "components/ntp_snippets/ntp_snippets_fetcher.h"
+#include <stdlib.h>
+
#include "base/command_line.h"
#include "base/files/file_path.h"
#include "base/files/file_util.h"
@@ -14,13 +16,20 @@
#include "base/strings/stringprintf.h"
#include "base/values.h"
#include "components/data_use_measurement/core/data_use_user_data.h"
+#include "components/ntp_snippets/ntp_snippets_constants.h"
#include "components/ntp_snippets/switches.h"
+#include "components/signin/core/browser/profile_oauth2_token_service.h"
+#include "components/signin/core/browser/signin_manager.h"
+#include "components/signin/core/browser/signin_manager_base.h"
+#include "components/variations/variations_associated_data.h"
#include "google_apis/google_api_keys.h"
#include "net/base/load_flags.h"
#include "net/http/http_request_headers.h"
#include "net/http/http_response_headers.h"
#include "net/http/http_status_code.h"
#include "net/url_request/url_fetcher.h"
+#include "third_party/icu/source/common/unicode/uloc.h"
+#include "third_party/icu/source/common/unicode/utypes.h"
using net::URLFetcher;
using net::URLRequestContextGetter;
@@ -37,16 +46,29 @@ const char kStatusMessageHTTPErrorFormat[] = "HTTP error %d";
const char kStatusMessageJsonErrorFormat[] = "Received invalid JSON (error %s)";
const char kStatusMessageInvalidList[] = "Invalid / empty list.";
-const char kContentSnippetsServerFormat[] =
- "https://chromereader-pa.googleapis.com/v1/fetch?key=%s";
+const char kApiScope[] = "https://www.googleapis.com/auth/webhistory";
+const char kSnippetsServer[] =
+ "https://chromereader-pa.googleapis.com/v1/fetch";
+const char kSnippetsServerNonAuthorizedFormat[] = "%s?key=%s";
+const char kAuthorizationRequestHeaderFormat[] = "Bearer %s";
+
+// Variation parameter for the variant of fetching to use.
+const char kVariantName[] = "fetching_variant";
+
+// Constants listing possible values of the "fetching_variant" parameter.
+const char kVariantRestrictedString[] = "restricted";
+const char kVariantPersonalizedString[] = "personalized";
+const char kVariantRestrictedPersonalizedString[] = "restricted_personalized";
const char kRequestParameterFormat[] =
"{"
" \"response_detail_level\": \"STANDARD\","
+ "%s" // If authenticated - an obfuscated Gaia ID will be inserted here.
" \"advanced_options\": {"
" \"local_scoring_params\": {"
" \"content_params\": {"
" \"only_return_personalized_results\": false"
+ "%s" // If authenticated - user segment (lang code) will be inserted here.
" },"
" \"content_restricts\": {"
" \"type\": \"METADATA\","
@@ -60,14 +82,17 @@ const char kRequestParameterFormat[] =
" \"type\": \"METADATA\","
" \"value\": \"THUMBNAIL\""
" }"
- "%s"
+ "%s" // If host restricted - host restrictions will be inserted here.
" },"
" \"global_scoring_params\": {"
- " \"num_to_return\": %i"
+ " \"num_to_return\": %i,"
+ " \"sort_type\": 1"
" }"
" }"
"}";
+const char kGaiaIdFormat[] = " \"obfuscated_gaia_id\": \"%s\",";
+const char kUserSegmentFormat[] = " ,\"user_segment\": \"%s\"";
const char kHostRestrictFormat[] =
" ,\"content_selectors\": {"
" \"type\": \"HOST_RESTRICT\","
@@ -77,15 +102,37 @@ const char kHostRestrictFormat[] =
} // namespace
NTPSnippetsFetcher::NTPSnippetsFetcher(
+ SigninManagerBase* signin_manager,
+ OAuth2TokenService* token_service,
scoped_refptr<URLRequestContextGetter> url_request_context_getter,
const ParseJSONCallback& parse_json_callback,
bool is_stable_channel)
- : url_request_context_getter_(url_request_context_getter),
+ : OAuth2TokenService::Consumer("ntp_snippets"),
+ signin_manager_(signin_manager),
+ token_service_(token_service),
+ waiting_for_refresh_token_(false),
+ url_request_context_getter_(url_request_context_getter),
parse_json_callback_(parse_json_callback),
is_stable_channel_(is_stable_channel),
- weak_ptr_factory_(this) {}
+ weak_ptr_factory_(this) {
+ // Parse the variation parameters and set the defaults if missing.
+ std::string variant = variations::GetVariationParamValue(
+ ntp_snippets::kStudyName, kVariantName);
+ if (variant == kVariantRestrictedString) {
+ variant_ = Variant::kRestricted;
+ } else if (variant == kVariantPersonalizedString) {
+ variant_ = Variant::kPersonalized;
+ } else {
+ variant_ = Variant::kRestrictedPersonalized;
+ if (!variant.empty() && variant != kVariantRestrictedPersonalizedString)
+ LOG(WARNING) << "Unknown fetching variant provided: " << variant;
+ }
+}
-NTPSnippetsFetcher::~NTPSnippetsFetcher() {}
+NTPSnippetsFetcher::~NTPSnippetsFetcher() {
+ if (waiting_for_refresh_token_)
+ token_service_->RemoveObserver(this);
+}
void NTPSnippetsFetcher::SetCallback(
const SnippetsAvailableCallback& callback) {
@@ -93,39 +140,67 @@ void NTPSnippetsFetcher::SetCallback(
}
void NTPSnippetsFetcher::FetchSnippetsFromHosts(
- const std::set<std::string>& hosts, int count) {
- std::string host_restricts;
- if (!base::CommandLine::ForCurrentProcess()->HasSwitch(
- switches::kDontRestrict)) {
- if (hosts.empty()) {
- if (!snippets_available_callback_.is_null()) {
- snippets_available_callback_.Run(NTPSnippet::PtrVector(),
- kStatusMessageEmptyHosts);
- }
- return;
+ const std::set<std::string>& hosts,
+ const std::string& language_code,
+ int count) {
+ hosts_ = hosts;
+
+ if (UseHostRestriction() && hosts_.empty()) {
+ if (!snippets_available_callback_.is_null()) {
+ snippets_available_callback_.Run(NTPSnippet::PtrVector(),
+ kStatusMessageEmptyHosts);
}
- for (const std::string& host : hosts)
- host_restricts += base::StringPrintf(kHostRestrictFormat, host.c_str());
+ return;
}
- const std::string& key = is_stable_channel_
- ? google_apis::GetAPIKey()
- : google_apis::GetNonStableAPIKey();
- std::string url =
- base::StringPrintf(kContentSnippetsServerFormat, key.c_str());
- url_fetcher_ = URLFetcher::Create(GURL(url), URLFetcher::POST, this);
+
+ // Translate the BCP 47 |language_code| into a posix locale string.
+ char locale[ULOC_FULLNAME_CAPACITY];
+ UErrorCode error;
+ uloc_forLanguageTag(language_code.c_str(), locale, ULOC_FULLNAME_CAPACITY,
+ nullptr, &error);
+ DLOG_IF(WARNING, U_ZERO_ERROR != error) <<
+ "Error in translating language code to a locale string: " << error;
+ locale_ = locale;
+
+ count_to_fetch_ = count;
+
+ bool use_authentication = UseAuthentication();
+
+ if (use_authentication && signin_manager_->IsAuthenticated()) {
+ // Signed-in: get OAuth token --> fetch snippets.
+ StartTokenRequest();
+ } else if (use_authentication && signin_manager_->AuthInProgress()) {
+ // Currently signing in: wait for auth to finish (the refresh token) -->
+ // get OAuth token --> fetch snippets.
+ if (!waiting_for_refresh_token_) {
+ // Wait until we get a refresh token.
+ waiting_for_refresh_token_ = true;
+ token_service_->AddObserver(this);
+ }
+ } else {
+ // Not signed in: fetch snippets (without authentication).
+ FetchSnippetsNonAuthenticated();
+ }
+}
+
+void NTPSnippetsFetcher::FetchSnippetsImpl(const GURL& url,
+ const std::string& auth_header,
+ const std::string& request) {
+ url_fetcher_ = URLFetcher::Create(url, URLFetcher::POST, this);
+
url_fetcher_->SetRequestContext(url_request_context_getter_.get());
url_fetcher_->SetLoadFlags(net::LOAD_DO_NOT_SEND_COOKIES |
net::LOAD_DO_NOT_SAVE_COOKIES);
+
data_use_measurement::DataUseUserData::AttachToFetcher(
url_fetcher_.get(), data_use_measurement::DataUseUserData::NTP_SNIPPETS);
+
HttpRequestHeaders headers;
+ if (!auth_header.empty())
+ headers.SetHeader("Authorization", auth_header);
headers.SetHeader("Content-Type", "application/json; charset=UTF-8");
url_fetcher_->SetExtraRequestHeaders(headers.ToString());
- url_fetcher_->SetUploadData("application/json",
- base::StringPrintf(kRequestParameterFormat,
- host_restricts.c_str(),
- count));
-
+ url_fetcher_->SetUploadData("application/json", request);
// Fetchers are sometimes cancelled because a network change was detected.
url_fetcher_->SetAutomaticallyRetryOnNetworkChanges(3);
// Try to make fetching the files bit more robust even with poor connection.
@@ -133,6 +208,99 @@ void NTPSnippetsFetcher::FetchSnippetsFromHosts(
url_fetcher_->Start();
}
+std::string NTPSnippetsFetcher::GetHostRestricts() const {
+ std::string host_restricts;
+ if (UseHostRestriction()) {
+ for (const std::string& host : hosts_)
+ host_restricts += base::StringPrintf(kHostRestrictFormat, host.c_str());
+ }
+ return host_restricts;
+}
+
+bool NTPSnippetsFetcher::UseHostRestriction() const {
+ return (variant_ == Variant::kRestricted ||
+ variant_ == Variant::kRestrictedPersonalized) &&
+ !base::CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kDontRestrict);
+}
+
+bool NTPSnippetsFetcher::UseAuthentication() const {
+ return (variant_ == Variant::kPersonalized ||
+ variant_ == Variant::kRestrictedPersonalized);
+}
+
+void NTPSnippetsFetcher::FetchSnippetsNonAuthenticated() {
+ // When not providing OAuth token, we need to pass the Google API key.
+ const std::string& key = is_stable_channel_
+ ? google_apis::GetAPIKey()
+ : google_apis::GetNonStableAPIKey();
+ GURL url(base::StringPrintf(kSnippetsServerNonAuthorizedFormat,
+ kSnippetsServer,
+ key.c_str()));
+
+ FetchSnippetsImpl(url, std::string(),
+ base::StringPrintf(kRequestParameterFormat, "", "",
+ GetHostRestricts().c_str(),
+ count_to_fetch_));
+}
+
+void NTPSnippetsFetcher::FetchSnippetsAuthenticated(
+ const std::string& account_id,
+ const std::string& oauth_access_token) {
+ std::string auth =
+ base::StringPrintf(kGaiaIdFormat, account_id.c_str());
Marc Treib 2016/05/09 16:48:24 I think this fits on the previous line?
jkrcal 2016/05/09 19:04:16 Done.
+ std::string user_segment =
+ base::StringPrintf(kUserSegmentFormat, locale_.c_str());
+
+ FetchSnippetsImpl(GURL(kSnippetsServer),
+ base::StringPrintf(kAuthorizationRequestHeaderFormat,
+ oauth_access_token.c_str()),
+ base::StringPrintf(kRequestParameterFormat,
+ auth.c_str(),
+ user_segment.c_str(),
+ GetHostRestricts().c_str(),
+ count_to_fetch_));
+}
+
+void NTPSnippetsFetcher::StartTokenRequest() {
+ OAuth2TokenService::ScopeSet scopes;
+ scopes.insert(kApiScope);
+ oauth_request_ = token_service_->StartRequest(
+ signin_manager_->GetAuthenticatedAccountId(), scopes, this);
+}
+
+////////////////////////////////////////////////////////////////////////////////
+// OAuth2TokenService::Consumer overrides
+void NTPSnippetsFetcher::OnGetTokenSuccess(
+ const OAuth2TokenService::Request* request,
+ const std::string& access_token,
+ const base::Time& expiration_time) {
+ std::unique_ptr<OAuth2TokenService::Request> oauth_request(
Marc Treib 2016/05/09 16:48:24 nit: Might be worth a comment ("delete after we le
jkrcal 2016/05/09 19:04:16 Done.
+ std::move(oauth_request_));
+
+ FetchSnippetsAuthenticated(oauth_request->GetAccountId(), access_token);
Marc Treib 2016/05/09 16:48:24 Have you checked that this actually returns an obf
jkrcal 2016/05/09 19:04:16 Yes, I've checked with Roger and it also returns m
Marc Treib 2016/05/10 08:42:19 Okay, great! In that case, could you send a CL to
+}
+
+void NTPSnippetsFetcher::OnGetTokenFailure(
+ const OAuth2TokenService::Request* request,
+ const GoogleServiceAuthError& error) {
+ oauth_request_.reset();
+ DLOG(ERROR) << "Unable to get token: " << error.ToString()
+ << " - fetching the snippets without authentication.";
+
+ // Fallback to fetching non-authenticated tokens.
+ FetchSnippetsNonAuthenticated();
+}
+
+////////////////////////////////////////////////////////////////////////////////
+// OAuth2TokenService::Observer overrides
+void NTPSnippetsFetcher::OnRefreshTokenAvailable(
+ const std::string& account_id) {
+ token_service_->RemoveObserver(this);
+ waiting_for_refresh_token_ = false;
+ StartTokenRequest();
+}
+
////////////////////////////////////////////////////////////////////////////////
// URLFetcherDelegate overrides
void NTPSnippetsFetcher::OnURLFetchComplete(const URLFetcher* source) {
@@ -149,13 +317,20 @@ void NTPSnippetsFetcher::OnURLFetchComplete(const URLFetcher* source) {
message = base::StringPrintf(kStatusMessageURLRequestErrorFormat,
status.error());
} else if (source->GetResponseCode() != net::HTTP_OK) {
+ // TODO(jkrcal): https://crbug.com/609084
+ // We need to deal with the edge case again where the auth
+ // token expires just before we send the request (in which case we need to
+ // fetch a new auth token). We should extract that into a common class
+ // instead of adding it to every single class that uses auth tokens.
message = base::StringPrintf(kStatusMessageHTTPErrorFormat,
source->GetResponseCode());
}
if (!message.empty()) {
+ std::string error_response;
+ source->GetResponseAsString(&error_response);
DLOG(WARNING) << message << " while trying to download "
- << source->GetURL().spec();
+ << source->GetURL().spec() << ": " << error_response;
if (!snippets_available_callback_.is_null())
snippets_available_callback_.Run(NTPSnippet::PtrVector(), message);
} else {
« no previous file with comments | « components/ntp_snippets/ntp_snippets_fetcher.h ('k') | components/ntp_snippets/ntp_snippets_fetcher_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698