Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2772)

Unified Diff: chrome/browser/signin/force_signin_verifier.cc

Issue 2802373002: Add ForceSigninVerifier. (Closed)
Patch Set: rogers' comments Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/signin/force_signin_verifier.cc
diff --git a/chrome/browser/signin/force_signin_verifier.cc b/chrome/browser/signin/force_signin_verifier.cc
new file mode 100644
index 0000000000000000000000000000000000000000..9afd37813e60a95759bb6d5224e99398dbbdbac5
--- /dev/null
+++ b/chrome/browser/signin/force_signin_verifier.cc
@@ -0,0 +1,124 @@
+// Copyright 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <string>
+
+#include "chrome/browser/profiles/profile.h"
+#include "chrome/browser/signin/force_signin_verifier.h"
+#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
+#include "chrome/browser/signin/signin_manager_factory.h"
+#include "components/signin/core/browser/signin_manager.h"
+#include "google_apis/gaia/gaia_constants.h"
+
+namespace {
+const net::BackoffEntry::Policy kBackoffPolicy = {
+ 0, // Number of initial errors to ignore before applying
+ // exponential back-off rules.
+ 2000, // Initial delay in ms.
+ 2, // Factor by which the waiting time will be multiplied.
+ 0.2, // Fuzzing percentage.
+ 4 * 60 * 1000, // Maximum amount of time to delay th request in ms.
+ -1, // Never discard the entry.
+ false // Do not always use initial delay.
+};
+
+} // namespace
+
+ForceSigninVerifier::ForceSigninVerifier(Profile* profile)
+ : OAuth2TokenService::Consumer("force_signin_verifier"),
+ has_token_verified_(false),
+ backoff_entry_(&kBackoffPolicy),
+ oauth2_token_service_(
+ ProfileOAuth2TokenServiceFactory::GetForProfile(profile)),
+ signin_manager_(SigninManagerFactory::GetForProfile(profile)),
+ token_request_time_(base::Time::Now()) {
+ net::NetworkChangeNotifier::AddNetworkChangeObserver(this);
+ SendRequest();
+}
+
+ForceSigninVerifier::~ForceSigninVerifier() {
+ Cancel();
+}
+
+void ForceSigninVerifier::OnGetTokenSuccess(
+ const OAuth2TokenService::Request* request,
+ const std::string& access_token,
+ const base::Time& expiration_time) {
+ has_token_verified_ = true;
+ net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
+ Cancel();
+}
+
+void ForceSigninVerifier::OnGetTokenFailure(
+ const OAuth2TokenService::Request* request,
+ const GoogleServiceAuthError& error) {
+ if (error.IsPersistentError()) {
+ has_token_verified_ = true;
+ ShowDialog();
+ net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
+ Cancel();
+ } else {
+ backoff_entry_.InformOfRequest(false);
+ backoff_request_timer_.Start(
+ FROM_HERE, backoff_entry_.GetTimeUntilRelease(),
+ base::Bind(&ForceSigninVerifier::SendRequest, base::Unretained(this)));
+ access_token_request_.reset();
+ }
+}
+
+void ForceSigninVerifier::OnNetworkChanged(
+ net::NetworkChangeNotifier::ConnectionType type) {
+ // Try again immediately once the network is back and cancel any pending
+ // request.
+ backoff_entry_.Reset();
+ if (backoff_request_timer_.IsRunning())
+ backoff_request_timer_.Stop();
+
+ if (type != net::NetworkChangeNotifier::ConnectionType::CONNECTION_NONE)
+ SendRequest();
+}
+
+void ForceSigninVerifier::Cancel() {
+ backoff_entry_.Reset();
+ backoff_request_timer_.Stop();
+ access_token_request_.reset();
+ net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
+}
+
+bool ForceSigninVerifier::HasTokenBeenVerified() {
+ return has_token_verified_;
+}
+
+void ForceSigninVerifier::SendRequest() {
+ if (!ShouldSendRequest())
+ return;
+
+ std::string account_id = signin_manager_->GetAuthenticatedAccountId();
+ OAuth2TokenService::ScopeSet oauth2_scopes;
+ oauth2_scopes.insert(GaiaConstants::kChromeSyncOAuth2Scope);
+ access_token_request_ =
+ oauth2_token_service_->StartRequest(account_id, oauth2_scopes, this);
+}
+
+bool ForceSigninVerifier::ShouldSendRequest() {
+ return !has_token_verified_ && access_token_request_.get() == nullptr &&
+ !net::NetworkChangeNotifier::IsOffline() &&
+ signin_manager_->IsAuthenticated();
+}
+
+void ForceSigninVerifier::ShowDialog() {
+ // TODO(zmin): Show app modal dialog.
+}
+
+OAuth2TokenService::Request* ForceSigninVerifier::GetRequestForTesting() {
+ return access_token_request_.get();
+}
+
+net::BackoffEntry* ForceSigninVerifier::GetBackoffEntryForTesting() {
+ return &backoff_entry_;
+}
+
+base::OneShotTimer* ForceSigninVerifier::GetOneShotTimerForTesting() {
+ return &backoff_request_timer_;
+}
« no previous file with comments | « chrome/browser/signin/force_signin_verifier.h ('k') | chrome/browser/signin/force_signin_verifier_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698