Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2496)

Unified Diff: blimp/client/core/session/identity_source.h

Issue 2204223005: Blimp OAuth2 token retreival on application start up. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Minor fix. Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: blimp/client/core/session/identity_source.h
diff --git a/blimp/client/core/session/identity_source.h b/blimp/client/core/session/identity_source.h
new file mode 100644
index 0000000000000000000000000000000000000000..f8d29d69862803620540a3316ac4662fca18f11c
--- /dev/null
+++ b/blimp/client/core/session/identity_source.h
@@ -0,0 +1,80 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef BLIMP_CLIENT_CORE_SESSION_IDENTITY_SOURCE_H_
+#define BLIMP_CLIENT_CORE_SESSION_IDENTITY_SOURCE_H_
+
+#include <memory>
+#include <string>
+
+#include "base/callback.h"
+#include "base/macros.h"
+
+#include "blimp/client/public/blimp_client_context_delegate.h"
+#include "google_apis/gaia/identity_provider.h"
+#include "google_apis/gaia/oauth2_token_service.h"
+
+namespace blimp {
+namespace client {
+
+// IdentitySource handles OAuth2 token request and forward user sign in state
+// change to Blimp with ProfileIdentityProvider.
+class IdentitySource : public OAuth2TokenService::Consumer,
+ public OAuth2TokenService::Observer,
+ public IdentityProvider::Observer {
+ public:
+ typedef base::Callback<void(const std::string&)> TokenCallback;
+
+ explicit IdentitySource(BlimpClientContextDelegate* delegate);
+ ~IdentitySource() override;
+
+ // Start Blimp authentication by requesting OAuth2 token from Google.
+ void Connect();
nyquist 2016/08/18 17:43:52 Nit: Could you add a comment similar to |is_fetchi
xingliu 2016/08/18 18:29:22 Done.
+
+ // Set token callback.
+ void SetTokenCallback(const TokenCallback& callback);
nyquist 2016/08/18 17:46:46 Could you move this to become a constructor argume
xingliu 2016/08/18 18:29:22 Done.
+
+ // OAuth2TokenService::Consumer implementation.
+ void OnGetTokenSuccess(const OAuth2TokenService::Request* request,
+ const std::string& access_token,
+ const base::Time& expiration_time) override;
+ void OnGetTokenFailure(const OAuth2TokenService::Request* request,
+ const GoogleServiceAuthError& error) override;
+
+ // OAuth2TokenService::Observer implementation.
+ void OnRefreshTokenAvailable(const std::string& account_id) override;
+
+ protected:
+ // Provide OAuth2 token service and listen to Google account sign in state,
+ // protected for testing.
+ std::unique_ptr<IdentityProvider> identity_provider_;
+
+ private:
+ // Fetch OAuth token.
+ void FetchAuthToken();
+
+ // OAuth2 token request. The request is created when we start to fetch the
+ // access token in OAuth2TokenService::StartRequest, and destroyed when
+ // OAuth2TokenService::Consumer callback get called.
+ std::unique_ptr<OAuth2TokenService::Request> token_request_;
+
+ // Callback after OAuth2 token is fetched.
+ TokenCallback token_callback_;
+
+ // If we are fetching OAuth2 token. Connect call during token fetching will
+ // be ignored.
+ bool is_fetching_token_;
+
+ // Account id of current active user, used during token request.
+ std::string account_id_;
+
+ BlimpClientContextDelegate* delegate_;
+
+ DISALLOW_COPY_AND_ASSIGN(IdentitySource);
+};
+
+} // namespace client
+} // namespace blimp
+
+#endif // BLIMP_CLIENT_CORE_SESSION_IDENTITY_SOURCE_H_

Powered by Google App Engine
This is Rietveld 408576698