Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/settings/device_oauth2_token_service.h" | 5 #include "chrome/browser/chromeos/settings/device_oauth2_token_service.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/prefs/pref_registry_simple.h" | 10 #include "base/prefs/pref_registry_simple.h" |
| (...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 108 gaia_oauth_client_.reset(new gaia::GaiaOAuthClient( | 108 gaia_oauth_client_.reset(new gaia::GaiaOAuthClient( |
| 109 g_browser_process->system_request_context())); | 109 g_browser_process->system_request_context())); |
| 110 | 110 |
| 111 GaiaUrls* gaia_urls = GaiaUrls::GetInstance(); | 111 GaiaUrls* gaia_urls = GaiaUrls::GetInstance(); |
| 112 gaia::OAuthClientInfo client_info; | 112 gaia::OAuthClientInfo client_info; |
| 113 client_info.client_id = gaia_urls->oauth2_chrome_client_id(); | 113 client_info.client_id = gaia_urls->oauth2_chrome_client_id(); |
| 114 client_info.client_secret = gaia_urls->oauth2_chrome_client_secret(); | 114 client_info.client_secret = gaia_urls->oauth2_chrome_client_secret(); |
| 115 | 115 |
| 116 gaia_oauth_client_->RefreshToken( | 116 gaia_oauth_client_->RefreshToken( |
| 117 client_info, | 117 client_info, |
| 118 token_service_->GetRefreshToken(), | 118 token_service_->GetRefreshToken(std::string()), |
| 119 std::vector<std::string>(1, kServiceScopeGetUserInfo), | 119 std::vector<std::string>(1, kServiceScopeGetUserInfo), |
| 120 token_service_->max_refresh_token_validation_retries_, | 120 token_service_->max_refresh_token_validation_retries_, |
| 121 this); | 121 this); |
| 122 } | 122 } |
| 123 | 123 |
| 124 void DeviceOAuth2TokenService::ValidatingConsumer::OnRefreshTokenResponse( | 124 void DeviceOAuth2TokenService::ValidatingConsumer::OnRefreshTokenResponse( |
| 125 const std::string& access_token, | 125 const std::string& access_token, |
| 126 int expires_in_seconds) { | 126 int expires_in_seconds) { |
| 127 gaia_oauth_client_->GetTokenInfo( | 127 gaia_oauth_client_->GetTokenInfo( |
| 128 access_token, | 128 access_token, |
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 214 : refresh_token_is_valid_(false), | 214 : refresh_token_is_valid_(false), |
| 215 max_refresh_token_validation_retries_(3), | 215 max_refresh_token_validation_retries_(3), |
| 216 url_request_context_getter_(getter), | 216 url_request_context_getter_(getter), |
| 217 local_state_(local_state) { | 217 local_state_(local_state) { |
| 218 } | 218 } |
| 219 | 219 |
| 220 DeviceOAuth2TokenService::~DeviceOAuth2TokenService() { | 220 DeviceOAuth2TokenService::~DeviceOAuth2TokenService() { |
| 221 } | 221 } |
| 222 | 222 |
| 223 scoped_ptr<OAuth2TokenService::Request> DeviceOAuth2TokenService::StartRequest( | 223 scoped_ptr<OAuth2TokenService::Request> DeviceOAuth2TokenService::StartRequest( |
| 224 const std::string& account_id, | |
| 224 const OAuth2TokenService::ScopeSet& scopes, | 225 const OAuth2TokenService::ScopeSet& scopes, |
| 225 OAuth2TokenService::Consumer* consumer) { | 226 OAuth2TokenService::Consumer* consumer) { |
| 226 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); | 227 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
|
Roger Tawa OOO till Jul 10th
2013/08/29 15:41:40
Should we DCHECK that |account_id| is empty? Same
fgorski
2013/08/29 23:04:14
Done.
| |
| 227 | 228 |
| 228 if (refresh_token_is_valid_) { | 229 if (refresh_token_is_valid_) { |
| 229 return OAuth2TokenService::StartRequest(scopes, consumer).Pass(); | 230 return OAuth2TokenService::StartRequest( |
| 231 account_id, scopes, consumer).Pass(); | |
| 230 } else { | 232 } else { |
| 231 scoped_ptr<ValidatingConsumer> validating_consumer( | 233 scoped_ptr<ValidatingConsumer> validating_consumer( |
| 232 new ValidatingConsumer(this, consumer)); | 234 new ValidatingConsumer(this, consumer)); |
| 233 | 235 |
| 234 scoped_ptr<Request> request = OAuth2TokenService::StartRequest( | 236 scoped_ptr<Request> request = OAuth2TokenService::StartRequest( |
| 235 scopes, validating_consumer.get()); | 237 account_id, scopes, validating_consumer.get()); |
| 236 validating_consumer->StartValidation(request.Pass()); | 238 validating_consumer->StartValidation(request.Pass()); |
| 237 return validating_consumer.PassAs<Request>(); | 239 return validating_consumer.PassAs<Request>(); |
| 238 } | 240 } |
| 239 } | 241 } |
| 240 | 242 |
| 241 void DeviceOAuth2TokenService::OnValidationComplete( | 243 void DeviceOAuth2TokenService::OnValidationComplete( |
| 242 bool refresh_token_is_valid) { | 244 bool refresh_token_is_valid) { |
| 243 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); | 245 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
| 244 refresh_token_is_valid_ = refresh_token_is_valid; | 246 refresh_token_is_valid_ = refresh_token_is_valid; |
| 245 } | 247 } |
| 246 | 248 |
| 247 // static | 249 // static |
| 248 void DeviceOAuth2TokenService::RegisterPrefs(PrefRegistrySimple* registry) { | 250 void DeviceOAuth2TokenService::RegisterPrefs(PrefRegistrySimple* registry) { |
| 249 registry->RegisterStringPref(prefs::kDeviceRobotAnyApiRefreshToken, | 251 registry->RegisterStringPref(prefs::kDeviceRobotAnyApiRefreshToken, |
| 250 std::string()); | 252 std::string()); |
| 251 } | 253 } |
| 252 | 254 |
| 253 void DeviceOAuth2TokenService::SetAndSaveRefreshToken( | 255 void DeviceOAuth2TokenService::SetAndSaveRefreshToken( |
| 254 const std::string& refresh_token) { | 256 const std::string& refresh_token) { |
| 255 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); | 257 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::UI)); |
| 256 std::string encrypted_refresh_token = | 258 std::string encrypted_refresh_token = |
| 257 CryptohomeLibrary::Get()->EncryptWithSystemSalt(refresh_token); | 259 CryptohomeLibrary::Get()->EncryptWithSystemSalt(refresh_token); |
| 258 | 260 |
| 259 local_state_->SetString(prefs::kDeviceRobotAnyApiRefreshToken, | 261 local_state_->SetString(prefs::kDeviceRobotAnyApiRefreshToken, |
| 260 encrypted_refresh_token); | 262 encrypted_refresh_token); |
| 261 } | 263 } |
| 262 | 264 |
| 263 std::string DeviceOAuth2TokenService::GetRefreshToken() { | 265 std::string DeviceOAuth2TokenService::GetRefreshToken( |
| 266 const std::string& account_id) { | |
| 264 if (refresh_token_.empty()) { | 267 if (refresh_token_.empty()) { |
| 265 std::string encrypted_refresh_token = | 268 std::string encrypted_refresh_token = |
| 266 local_state_->GetString(prefs::kDeviceRobotAnyApiRefreshToken); | 269 local_state_->GetString(prefs::kDeviceRobotAnyApiRefreshToken); |
| 267 | 270 |
| 268 refresh_token_ = CryptohomeLibrary::Get()->DecryptWithSystemSalt( | 271 refresh_token_ = CryptohomeLibrary::Get()->DecryptWithSystemSalt( |
| 269 encrypted_refresh_token); | 272 encrypted_refresh_token); |
| 270 } | 273 } |
| 271 return refresh_token_; | 274 return refresh_token_; |
| 272 } | 275 } |
| 273 | 276 |
| 274 std::string DeviceOAuth2TokenService::GetRobotAccountId() { | 277 std::string DeviceOAuth2TokenService::GetRobotAccountId() { |
| 275 policy::BrowserPolicyConnector* connector = | 278 policy::BrowserPolicyConnector* connector = |
| 276 g_browser_process->browser_policy_connector(); | 279 g_browser_process->browser_policy_connector(); |
| 277 if (connector) | 280 if (connector) |
| 278 return connector->GetDeviceCloudPolicyManager()->GetRobotAccountId(); | 281 return connector->GetDeviceCloudPolicyManager()->GetRobotAccountId(); |
| 279 return std::string(); | 282 return std::string(); |
| 280 } | 283 } |
| 281 | 284 |
| 282 net::URLRequestContextGetter* DeviceOAuth2TokenService::GetRequestContext() { | 285 net::URLRequestContextGetter* DeviceOAuth2TokenService::GetRequestContext() { |
| 283 return url_request_context_getter_.get(); | 286 return url_request_context_getter_.get(); |
| 284 } | 287 } |
| 285 | 288 |
| 286 } // namespace chromeos | 289 } // namespace chromeos |
| OLD | NEW |