| Index: chrome/browser/chromeos/login/oauth2_token_fetcher.cc
|
| diff --git a/chrome/browser/chromeos/login/oauth2_token_fetcher.cc b/chrome/browser/chromeos/login/oauth2_token_fetcher.cc
|
| deleted file mode 100644
|
| index 6656dd4adf89e9afbaa46d52d118b683a65746d9..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/chromeos/login/oauth2_token_fetcher.cc
|
| +++ /dev/null
|
| @@ -1,133 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/chromeos/login/oauth2_token_fetcher.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "chromeos/network/network_handler.h"
|
| -#include "chromeos/network/network_state.h"
|
| -#include "chromeos/network/network_state_handler.h"
|
| -#include "content/public/browser/browser_thread.h"
|
| -#include "google_apis/gaia/gaia_constants.h"
|
| -#include "google_apis/gaia/google_service_auth_error.h"
|
| -#include "third_party/cros_system_api/dbus/service_constants.h"
|
| -
|
| -using content::BrowserThread;
|
| -
|
| -namespace {
|
| -
|
| -// OAuth token request max retry count.
|
| -const int kMaxRequestAttemptCount = 5;
|
| -// OAuth token request retry delay in milliseconds.
|
| -const int kRequestRestartDelay = 3000;
|
| -
|
| -} // namespace
|
| -
|
| -namespace chromeos {
|
| -
|
| -OAuth2TokenFetcher::OAuth2TokenFetcher(
|
| - OAuth2TokenFetcher::Delegate* delegate,
|
| - net::URLRequestContextGetter* context_getter)
|
| - : delegate_(delegate),
|
| - auth_fetcher_(this, GaiaConstants::kChromeSource, context_getter),
|
| - retry_count_(0) {
|
| - DCHECK(delegate);
|
| -}
|
| -
|
| -OAuth2TokenFetcher::~OAuth2TokenFetcher() {
|
| -}
|
| -
|
| -void OAuth2TokenFetcher::StartExchangeFromCookies(
|
| - const std::string& session_index) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - session_index_ = session_index;
|
| - // Delay the verification if the network is not connected or on a captive
|
| - // portal.
|
| - const NetworkState* default_network =
|
| - NetworkHandler::Get()->network_state_handler()->DefaultNetwork();
|
| - if (!default_network ||
|
| - default_network->connection_state() == shill::kStatePortal) {
|
| - // If network is offline, defer the token fetching until online.
|
| - VLOG(1) << "Network is offline. Deferring OAuth2 token fetch.";
|
| - BrowserThread::PostDelayedTask(
|
| - BrowserThread::UI,
|
| - FROM_HERE,
|
| - base::Bind(&OAuth2TokenFetcher::StartExchangeFromCookies,
|
| - AsWeakPtr(),
|
| - session_index),
|
| - base::TimeDelta::FromMilliseconds(kRequestRestartDelay));
|
| - return;
|
| - }
|
| - auth_fetcher_.StartCookieForOAuthLoginTokenExchange(session_index);
|
| -}
|
| -
|
| -void OAuth2TokenFetcher::StartExchangeFromAuthCode(
|
| - const std::string& auth_code) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - auth_code_ = auth_code;
|
| - // Delay the verification if the network is not connected or on a captive
|
| - // portal.
|
| - const NetworkState* default_network =
|
| - NetworkHandler::Get()->network_state_handler()->DefaultNetwork();
|
| - if (!default_network ||
|
| - default_network->connection_state() == shill::kStatePortal) {
|
| - // If network is offline, defer the token fetching until online.
|
| - VLOG(1) << "Network is offline. Deferring OAuth2 token fetch.";
|
| - BrowserThread::PostDelayedTask(
|
| - BrowserThread::UI, FROM_HERE,
|
| - base::Bind(&OAuth2TokenFetcher::StartExchangeFromAuthCode,
|
| - AsWeakPtr(),
|
| - auth_code),
|
| - base::TimeDelta::FromMilliseconds(kRequestRestartDelay));
|
| - return;
|
| - }
|
| - auth_fetcher_.StartAuthCodeForOAuth2TokenExchange(auth_code);
|
| -}
|
| -
|
| -void OAuth2TokenFetcher::OnClientOAuthSuccess(
|
| - const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - VLOG(1) << "Got OAuth2 tokens!";
|
| - retry_count_ = 0;
|
| - oauth_tokens_ = oauth_tokens;
|
| - delegate_->OnOAuth2TokensAvailable(oauth_tokens_);
|
| -}
|
| -
|
| -void OAuth2TokenFetcher::OnClientOAuthFailure(
|
| - const GoogleServiceAuthError& error) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - RetryOnError(error,
|
| - auth_code_.empty()
|
| - ? base::Bind(&OAuth2TokenFetcher::StartExchangeFromCookies,
|
| - AsWeakPtr(),
|
| - session_index_)
|
| - : base::Bind(&OAuth2TokenFetcher::StartExchangeFromAuthCode,
|
| - AsWeakPtr(),
|
| - auth_code_),
|
| - base::Bind(&Delegate::OnOAuth2TokensFetchFailed,
|
| - base::Unretained(delegate_)));
|
| -}
|
| -
|
| -void OAuth2TokenFetcher::RetryOnError(const GoogleServiceAuthError& error,
|
| - const base::Closure& task,
|
| - const base::Closure& error_handler) {
|
| - DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| - if ((error.state() == GoogleServiceAuthError::CONNECTION_FAILED ||
|
| - error.state() == GoogleServiceAuthError::SERVICE_UNAVAILABLE ||
|
| - error.state() == GoogleServiceAuthError::REQUEST_CANCELED) &&
|
| - retry_count_ < kMaxRequestAttemptCount) {
|
| - retry_count_++;
|
| - BrowserThread::PostDelayedTask(
|
| - BrowserThread::UI, FROM_HERE, task,
|
| - base::TimeDelta::FromMilliseconds(kRequestRestartDelay));
|
| - return;
|
| - }
|
| - LOG(ERROR) << "Unrecoverable error or retry count max reached. State: "
|
| - << error.state() << ", network error: " << error.network_error()
|
| - << ", message: " << error.error_message();
|
| - error_handler.Run();
|
| -}
|
| -
|
| -} // namespace chromeos
|
|
|