Index: chrome/browser/managed_mode/permission_request_creator_apiary.h |
diff --git a/chrome/browser/managed_mode/permission_request_creator_apiary.h b/chrome/browser/managed_mode/permission_request_creator_apiary.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..fe4407a0f64968f859379282e842843d88b3b810 |
--- /dev/null |
+++ b/chrome/browser/managed_mode/permission_request_creator_apiary.h |
@@ -0,0 +1,80 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CHROME_BROWSER_MANAGED_MODE_PERMISSION_REQUEST_CREATOR_APIARY_H_ |
+#define CHROME_BROWSER_MANAGED_MODE_PERMISSION_REQUEST_CREATOR_APIARY_H_ |
+ |
+#include "chrome/browser/managed_mode/permission_request_creator.h" |
+ |
+#include "base/memory/scoped_ptr.h" |
+#include "google_apis/gaia/oauth2_token_service.h" |
+#include "net/url_request/url_fetcher_delegate.h" |
+ |
+class ManagedUserSigninManagerWrapper; |
+class Profile; |
+ |
+namespace base { |
+class Time; |
+} |
+ |
+namespace net { |
+class URLFetcher; |
+class URLRequestContextGetter; |
+} |
+ |
+class PermissionRequestCreatorApiary |
+ : public PermissionRequestCreator, |
+ public OAuth2TokenService::Consumer, |
+ public net::URLFetcherDelegate { |
+ public: |
+ PermissionRequestCreatorApiary( |
+ OAuth2TokenService* oauth2_token_service, |
+ scoped_ptr<ManagedUserSigninManagerWrapper> signin_wrapper, |
+ net::URLRequestContextGetter* context); |
+ virtual ~PermissionRequestCreatorApiary(); |
+ |
+ static scoped_ptr<PermissionRequestCreator> Create( |
+ OAuth2TokenService* oauth2_token_service, |
+ scoped_ptr<ManagedUserSigninManagerWrapper>, |
+ net::URLRequestContextGetter* context); |
+ |
+ static scoped_ptr<PermissionRequestCreator> CreateWithProfile( |
+ Profile* profile); |
+ |
+ // PermissionRequestCreator implementation: |
+ virtual void CreatePermissionRequest( |
+ const std::string& url_requested, |
+ const PermissionRequestCallback& callback) OVERRIDE; |
+ |
+ protected: |
+ // OAuth2TokenService::Consumer implementation: |
+ virtual void OnGetTokenSuccess(const OAuth2TokenService::Request* request, |
Bernhard Bauer
2014/05/19 17:11:26
Why is this protected?
Adrian Kuegel
2014/05/20 08:38:06
Copy/paste from ManagedUserRefreshTokenFetcher, an
|
+ const std::string& access_token, |
+ const base::Time& expiration_time) OVERRIDE; |
+ virtual void OnGetTokenFailure(const OAuth2TokenService::Request* request, |
+ const GoogleServiceAuthError& error) OVERRIDE; |
+ |
+ // net::URLFetcherDelegate implementation. |
+ virtual void OnURLFetchComplete(const net::URLFetcher* source) OVERRIDE; |
+ |
+ private: |
+ // Requests an access token, which is the first thing we need. This is where |
+ // we restart when the returned access token has expired. |
+ void StartFetching(); |
+ |
+ void DispatchNetworkError(int error_code); |
+ void DispatchGoogleServiceAuthError(const GoogleServiceAuthError& error); |
+ |
+ OAuth2TokenService* oauth2_token_service_; |
+ scoped_ptr<ManagedUserSigninManagerWrapper> signin_wrapper_; |
+ PermissionRequestCallback callback_; |
+ net::URLRequestContextGetter* context_; |
+ std::string url_requested_; |
+ scoped_ptr<OAuth2TokenService::Request> access_token_request_; |
+ std::string access_token_; |
+ bool access_token_expired_; |
+ scoped_ptr<net::URLFetcher> url_fetcher_; |
+}; |
+ |
+#endif // CHROME_BROWSER_MANAGED_MODE_PERMISSION_REQUEST_CREATOR_APIARY_H_ |