| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/signin/profile_oauth2_token_service.h" | 5 #include "chrome/browser/signin/profile_oauth2_token_service.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/message_loop/message_loop.h" | 8 #include "base/message_loop/message_loop.h" |
| 9 #include "base/stl_util.h" | 9 #include "base/stl_util.h" |
| 10 #include "base/time/time.h" | 10 #include "base/time/time.h" |
| (...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 61 last_auth_error_(GoogleServiceAuthError::NONE) { | 61 last_auth_error_(GoogleServiceAuthError::NONE) { |
| 62 } | 62 } |
| 63 | 63 |
| 64 ProfileOAuth2TokenService::~ProfileOAuth2TokenService() { | 64 ProfileOAuth2TokenService::~ProfileOAuth2TokenService() { |
| 65 DCHECK(!signin_global_error_.get()) << | 65 DCHECK(!signin_global_error_.get()) << |
| 66 "ProfileOAuth2TokenService::Initialize called but not " | 66 "ProfileOAuth2TokenService::Initialize called but not " |
| 67 "ProfileOAuth2TokenService::Shutdown"; | 67 "ProfileOAuth2TokenService::Shutdown"; |
| 68 } | 68 } |
| 69 | 69 |
| 70 void ProfileOAuth2TokenService::Initialize(Profile* profile) { | 70 void ProfileOAuth2TokenService::Initialize(Profile* profile) { |
| 71 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); | |
| 72 | |
| 73 DCHECK(profile); | 71 DCHECK(profile); |
| 74 DCHECK(!profile_); | 72 DCHECK(!profile_); |
| 75 profile_ = profile; | 73 profile_ = profile; |
| 76 | 74 |
| 77 signin_global_error_.reset(new SigninGlobalError(profile)); | 75 signin_global_error_.reset(new SigninGlobalError(profile)); |
| 78 GlobalErrorServiceFactory::GetForProfile(profile_)->AddGlobalError( | 76 GlobalErrorServiceFactory::GetForProfile(profile_)->AddGlobalError( |
| 79 signin_global_error_.get()); | 77 signin_global_error_.get()); |
| 80 signin_global_error_->AddProvider(this); | 78 signin_global_error_->AddProvider(this); |
| 81 | 79 |
| 82 content::Source<TokenService> token_service_source( | 80 content::Source<TokenService> token_service_source( |
| 83 TokenServiceFactory::GetForProfile(profile)); | 81 TokenServiceFactory::GetForProfile(profile)); |
| 84 registrar_.Add(this, | 82 registrar_.Add(this, |
| 85 chrome::NOTIFICATION_TOKENS_CLEARED, | 83 chrome::NOTIFICATION_TOKENS_CLEARED, |
| 86 token_service_source); | 84 token_service_source); |
| 87 registrar_.Add(this, | 85 registrar_.Add(this, |
| 88 chrome::NOTIFICATION_TOKEN_AVAILABLE, | 86 chrome::NOTIFICATION_TOKEN_AVAILABLE, |
| 89 token_service_source); | 87 token_service_source); |
| 90 registrar_.Add(this, | 88 registrar_.Add(this, |
| 91 chrome::NOTIFICATION_TOKEN_LOADING_FINISHED, | 89 chrome::NOTIFICATION_TOKEN_LOADING_FINISHED, |
| 92 token_service_source); | 90 token_service_source); |
| 93 } | 91 } |
| 94 | 92 |
| 95 void ProfileOAuth2TokenService::Shutdown() { | 93 void ProfileOAuth2TokenService::Shutdown() { |
| 94 DCHECK(profile_) << "Shutdown() called without matching call to Initialize()"; |
| 96 CancelAllRequests(); | 95 CancelAllRequests(); |
| 97 signin_global_error_->RemoveProvider(this); | 96 signin_global_error_->RemoveProvider(this); |
| 98 GlobalErrorServiceFactory::GetForProfile(profile_)->RemoveGlobalError( | 97 GlobalErrorServiceFactory::GetForProfile(profile_)->RemoveGlobalError( |
| 99 signin_global_error_.get()); | 98 signin_global_error_.get()); |
| 100 signin_global_error_.reset(); | 99 signin_global_error_.reset(); |
| 101 } | 100 } |
| 102 | 101 |
| 103 std::string ProfileOAuth2TokenService::GetRefreshToken() { | 102 std::string ProfileOAuth2TokenService::GetRefreshToken() { |
| 104 TokenService* token_service = TokenServiceFactory::GetForProfile(profile_); | 103 TokenService* token_service = TokenServiceFactory::GetForProfile(profile_); |
| 105 if (!token_service || !token_service->HasOAuthLoginToken()) { | 104 if (!token_service || !token_service->HasOAuthLoginToken()) { |
| 106 return std::string(); | 105 return std::string(); |
| 107 } | 106 } |
| 108 return token_service->GetOAuth2LoginRefreshToken(); | 107 return token_service->GetOAuth2LoginRefreshToken(); |
| 109 } | 108 } |
| 110 | 109 |
| 110 net::URLRequestContextGetter* ProfileOAuth2TokenService::GetRequestContext() { |
| 111 return profile_->GetRequestContext(); |
| 112 } |
| 113 |
| 111 void ProfileOAuth2TokenService::UpdateAuthError( | 114 void ProfileOAuth2TokenService::UpdateAuthError( |
| 112 const GoogleServiceAuthError& error) { | 115 const GoogleServiceAuthError& error) { |
| 113 // Do not report connection errors as these are not actually auth errors. | 116 // Do not report connection errors as these are not actually auth errors. |
| 114 // We also want to avoid masking a "real" auth error just because we | 117 // We also want to avoid masking a "real" auth error just because we |
| 115 // subsequently get a transient network error. | 118 // subsequently get a transient network error. |
| 116 if (error.state() == GoogleServiceAuthError::CONNECTION_FAILED) | 119 if (error.state() == GoogleServiceAuthError::CONNECTION_FAILED) |
| 117 return; | 120 return; |
| 118 | 121 |
| 119 if (error.state() != last_auth_error_.state()) { | 122 if (error.state() != last_auth_error_.state()) { |
| 120 last_auth_error_ = error; | 123 last_auth_error_ = error; |
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 157 default: | 160 default: |
| 158 NOTREACHED() << "Invalid notification type=" << type; | 161 NOTREACHED() << "Invalid notification type=" << type; |
| 159 break; | 162 break; |
| 160 } | 163 } |
| 161 } | 164 } |
| 162 | 165 |
| 163 GoogleServiceAuthError ProfileOAuth2TokenService::GetAuthStatus() const { | 166 GoogleServiceAuthError ProfileOAuth2TokenService::GetAuthStatus() const { |
| 164 return last_auth_error_; | 167 return last_auth_error_; |
| 165 } | 168 } |
| 166 | 169 |
| 167 net::URLRequestContextGetter* ProfileOAuth2TokenService::GetRequestContext() { | |
| 168 return profile_->GetRequestContext(); | |
| 169 } | |
| 170 | |
| 171 void ProfileOAuth2TokenService::RegisterCacheEntry( | 170 void ProfileOAuth2TokenService::RegisterCacheEntry( |
| 172 const std::string& refresh_token, | 171 const std::string& refresh_token, |
| 173 const ScopeSet& scopes, | 172 const ScopeSet& scopes, |
| 174 const std::string& access_token, | 173 const std::string& access_token, |
| 175 const base::Time& expiration_date) { | 174 const base::Time& expiration_date) { |
| 176 if (ShouldCacheForRefreshToken(TokenServiceFactory::GetForProfile(profile_), | 175 if (ShouldCacheForRefreshToken(TokenServiceFactory::GetForProfile(profile_), |
| 177 refresh_token)) { | 176 refresh_token)) { |
| 178 OAuth2TokenService::RegisterCacheEntry(refresh_token, | 177 OAuth2TokenService::RegisterCacheEntry(refresh_token, |
| 179 scopes, | 178 scopes, |
| 180 access_token, | 179 access_token, |
| (...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 315 } | 314 } |
| 316 } | 315 } |
| 317 | 316 |
| 318 if (!old_login_token.empty() && | 317 if (!old_login_token.empty() && |
| 319 refresh_tokens_.count(GetAccountId(profile_)) == 0) { | 318 refresh_tokens_.count(GetAccountId(profile_)) == 0) { |
| 320 UpdateCredentials(GetAccountId(profile_), old_login_token); | 319 UpdateCredentials(GetAccountId(profile_), old_login_token); |
| 321 } | 320 } |
| 322 | 321 |
| 323 FireRefreshTokensLoaded(); | 322 FireRefreshTokensLoaded(); |
| 324 } | 323 } |
| OLD | NEW |