Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(106)

Side by Side Diff: remoting/base/oauth_token_getter_impl.cc

Issue 2661153003: Moving oauth code from host to base to allow code sharing between host and client. (Closed)
Patch Set: Merge branch 'master' into auth_token Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « remoting/base/oauth_token_getter_impl.h ('k') | remoting/host/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/oauth_token_getter_impl.h" 5 #include "remoting/base/oauth_token_getter_impl.h"
6 6
7 #include <utility> 7 #include <utility>
8 8
9 #include "base/bind.h" 9 #include "base/bind.h"
10 #include "base/callback.h" 10 #include "base/callback.h"
11 #include "base/strings/string_util.h" 11 #include "base/strings/string_util.h"
12 #include "google_apis/google_api_keys.h" 12 #include "google_apis/google_api_keys.h"
13 #include "net/url_request/url_request_context_getter.h" 13 #include "net/url_request/url_request_context_getter.h"
14 #include "remoting/base/logging.h" 14 #include "remoting/base/logging.h"
15 15
(...skipping 29 matching lines...) Expand all
45 const std::string& access_token, 45 const std::string& access_token,
46 int expires_seconds) { 46 int expires_seconds) {
47 NOTREACHED(); 47 NOTREACHED();
48 } 48 }
49 49
50 void OAuthTokenGetterImpl::OnRefreshTokenResponse( 50 void OAuthTokenGetterImpl::OnRefreshTokenResponse(
51 const std::string& access_token, 51 const std::string& access_token,
52 int expires_seconds) { 52 int expires_seconds) {
53 DCHECK(CalledOnValidThread()); 53 DCHECK(CalledOnValidThread());
54 DCHECK(oauth_credentials_.get()); 54 DCHECK(oauth_credentials_.get());
55 HOST_LOG << "Received OAuth token."; 55 VLOG(1) << "Received OAuth token.";
56 56
57 oauth_access_token_ = access_token; 57 oauth_access_token_ = access_token;
58 base::TimeDelta token_expiration = 58 base::TimeDelta token_expiration =
59 base::TimeDelta::FromSeconds(expires_seconds) - 59 base::TimeDelta::FromSeconds(expires_seconds) -
60 base::TimeDelta::FromSeconds(kTokenUpdateTimeBeforeExpirySeconds); 60 base::TimeDelta::FromSeconds(kTokenUpdateTimeBeforeExpirySeconds);
61 auth_token_expiry_time_ = base::Time::Now() + token_expiration; 61 auth_token_expiry_time_ = base::Time::Now() + token_expiration;
62 62
63 if (refresh_timer_) { 63 if (refresh_timer_) {
64 refresh_timer_->Stop(); 64 refresh_timer_->Stop();
65 refresh_timer_->Start(FROM_HERE, token_expiration, this, 65 refresh_timer_->Start(FROM_HERE, token_expiration, this,
66 &OAuthTokenGetterImpl::RefreshOAuthToken); 66 &OAuthTokenGetterImpl::RefreshOAuthToken);
67 } 67 }
68 68
69 if (!oauth_credentials_->is_service_account && !email_verified_) { 69 if (!oauth_credentials_->is_service_account && !email_verified_) {
70 gaia_oauth_client_->GetUserEmail(access_token, kMaxRetries, this); 70 gaia_oauth_client_->GetUserEmail(access_token, kMaxRetries, this);
71 } else { 71 } else {
72 refreshing_oauth_token_ = false; 72 refreshing_oauth_token_ = false;
73 NotifyCallbacks(OAuthTokenGetterImpl::SUCCESS, oauth_credentials_->login, 73 NotifyCallbacks(OAuthTokenGetterImpl::SUCCESS, oauth_credentials_->login,
74 oauth_access_token_); 74 oauth_access_token_);
75 } 75 }
76 } 76 }
77 77
78 void OAuthTokenGetterImpl::OnGetUserEmailResponse( 78 void OAuthTokenGetterImpl::OnGetUserEmailResponse(
79 const std::string& user_email) { 79 const std::string& user_email) {
80 DCHECK(CalledOnValidThread()); 80 DCHECK(CalledOnValidThread());
81 DCHECK(oauth_credentials_.get()); 81 DCHECK(oauth_credentials_.get());
82 HOST_LOG << "Received user info."; 82 VLOG(1) << "Received user info.";
83 83
84 if (user_email != oauth_credentials_->login) { 84 if (user_email != oauth_credentials_->login) {
85 LOG(ERROR) << "OAuth token and email address do not refer to " 85 LOG(ERROR) << "OAuth token and email address do not refer to "
86 "the same account."; 86 "the same account.";
87 OnOAuthError(); 87 OnOAuthError();
88 return; 88 return;
89 } 89 }
90 90
91 email_verified_ = true; 91 email_verified_ = true;
92 refreshing_oauth_token_ = false; 92 refreshing_oauth_token_ = false;
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
127 DCHECK(CalledOnValidThread()); 127 DCHECK(CalledOnValidThread());
128 LOG(ERROR) << "Network error when trying to update OAuth token: " 128 LOG(ERROR) << "Network error when trying to update OAuth token: "
129 << response_code; 129 << response_code;
130 refreshing_oauth_token_ = false; 130 refreshing_oauth_token_ = false;
131 NotifyCallbacks(OAuthTokenGetterImpl::NETWORK_ERROR, std::string(), 131 NotifyCallbacks(OAuthTokenGetterImpl::NETWORK_ERROR, std::string(),
132 std::string()); 132 std::string());
133 } 133 }
134 134
135 void OAuthTokenGetterImpl::CallWithToken(const TokenCallback& on_access_token) { 135 void OAuthTokenGetterImpl::CallWithToken(const TokenCallback& on_access_token) {
136 DCHECK(CalledOnValidThread()); 136 DCHECK(CalledOnValidThread());
137 bool need_new_auth_token = auth_token_expiry_time_.is_null() || 137 bool need_new_auth_token =
138 base::Time::Now() >= auth_token_expiry_time_ || 138 auth_token_expiry_time_.is_null() ||
139 (!oauth_credentials_->is_service_account && 139 base::Time::Now() >= auth_token_expiry_time_ ||
140 !email_verified_); 140 (!oauth_credentials_->is_service_account && !email_verified_);
141 141
142 if (need_new_auth_token) { 142 if (need_new_auth_token) {
143 pending_callbacks_.push(on_access_token); 143 pending_callbacks_.push(on_access_token);
144 if (!refreshing_oauth_token_) 144 if (!refreshing_oauth_token_)
145 RefreshOAuthToken(); 145 RefreshOAuthToken();
146 } else { 146 } else {
147 on_access_token.Run(SUCCESS, oauth_credentials_->login, 147 on_access_token.Run(SUCCESS, oauth_credentials_->login,
148 oauth_access_token_); 148 oauth_access_token_);
149 } 149 }
150 } 150 }
151 151
152 void OAuthTokenGetterImpl::InvalidateCache() { 152 void OAuthTokenGetterImpl::InvalidateCache() {
153 DCHECK(CalledOnValidThread()); 153 DCHECK(CalledOnValidThread());
154 auth_token_expiry_time_ = base::Time(); 154 auth_token_expiry_time_ = base::Time();
155 } 155 }
156 156
157 void OAuthTokenGetterImpl::RefreshOAuthToken() { 157 void OAuthTokenGetterImpl::RefreshOAuthToken() {
158 DCHECK(CalledOnValidThread()); 158 DCHECK(CalledOnValidThread());
159 HOST_LOG << "Refreshing OAuth token."; 159 VLOG(1) << "Refreshing OAuth token.";
160 DCHECK(!refreshing_oauth_token_); 160 DCHECK(!refreshing_oauth_token_);
161 161
162 // Service accounts use different API keys, as they use the client app flow. 162 // Service accounts use different API keys, as they use the client app flow.
163 google_apis::OAuth2Client oauth2_client = 163 google_apis::OAuth2Client oauth2_client =
164 oauth_credentials_->is_service_account ? google_apis::CLIENT_REMOTING_HOST 164 oauth_credentials_->is_service_account ? google_apis::CLIENT_REMOTING_HOST
165 : google_apis::CLIENT_REMOTING; 165 : google_apis::CLIENT_REMOTING;
166 166
167 gaia::OAuthClientInfo client_info = { 167 gaia::OAuthClientInfo client_info = {
168 google_apis::GetOAuth2ClientID(oauth2_client), 168 google_apis::GetOAuth2ClientID(oauth2_client),
169 google_apis::GetOAuth2ClientSecret(oauth2_client), 169 google_apis::GetOAuth2ClientSecret(oauth2_client),
170 // Redirect URL is only used when getting tokens from auth code. It 170 // Redirect URL is only used when getting tokens from auth code. It
171 // is not required when getting access tokens. 171 // is not required when getting access tokens.
172 ""}; 172 ""};
173 173
174 refreshing_oauth_token_ = true; 174 refreshing_oauth_token_ = true;
175 std::vector<std::string> empty_scope_list; // Use scope from refresh token. 175 std::vector<std::string> empty_scope_list; // Use scope from refresh token.
176 gaia_oauth_client_->RefreshToken(client_info, 176 gaia_oauth_client_->RefreshToken(client_info,
177 oauth_credentials_->refresh_token, 177 oauth_credentials_->refresh_token,
178 empty_scope_list, kMaxRetries, this); 178 empty_scope_list, kMaxRetries, this);
179 } 179 }
180 180
181 } // namespace remoting 181 } // namespace remoting
OLDNEW
« no previous file with comments | « remoting/base/oauth_token_getter_impl.h ('k') | remoting/host/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698