Index: remoting/host/oauth_token_getter.cc |
diff --git a/remoting/host/oauth_token_getter.cc b/remoting/host/oauth_token_getter.cc |
index bf92e95a8c3d5ad2b1fcf47c767b6be74d40a610..7ac01c57afef40351c49fe43f3624afbe9edd601 100644 |
--- a/remoting/host/oauth_token_getter.cc |
+++ b/remoting/host/oauth_token_getter.cc |
@@ -34,12 +34,16 @@ OAuthTokenGetter::OAuthCredentials::OAuthCredentials( |
OAuthTokenGetter::OAuthTokenGetter( |
scoped_ptr<OAuthCredentials> oauth_credentials, |
- scoped_refptr<net::URLRequestContextGetter> url_request_context_getter) |
+ scoped_refptr<net::URLRequestContextGetter> url_request_context_getter, |
+ bool auto_refresh) |
: oauth_credentials_(oauth_credentials.Pass()), |
gaia_oauth_client_( |
new gaia::GaiaOAuthClient(url_request_context_getter)), |
url_request_context_getter_(url_request_context_getter), |
refreshing_oauth_token_(false) { |
+ if (auto_refresh) { |
+ refresh_timer_.reset(new base::OneShotTimer<OAuthTokenGetter>()); |
+ } |
} |
OAuthTokenGetter::~OAuthTokenGetter() {} |
@@ -58,11 +62,24 @@ void OAuthTokenGetter::OnRefreshTokenResponse( |
HOST_LOG << "Received OAuth token."; |
oauth_access_token_ = access_token; |
- auth_token_expiry_time_ = base::Time::Now() + |
+ base::TimeDelta token_expiration = |
base::TimeDelta::FromSeconds(expires_seconds) - |
base::TimeDelta::FromSeconds(kTokenUpdateTimeBeforeExpirySeconds); |
+ auth_token_expiry_time_ = base::Time::Now() + token_expiration; |
+ |
+ if (refresh_timer_) { |
+ refresh_timer_->Stop(); |
+ refresh_timer_->Start(FROM_HERE, token_expiration, this, |
+ &OAuthTokenGetter::RefreshOAuthToken); |
+ } |
- gaia_oauth_client_->GetUserEmail(access_token, kMaxRetries, this); |
+ if (verified_email_.empty()) { |
+ gaia_oauth_client_->GetUserEmail(access_token, kMaxRetries, this); |
+ } else { |
+ refreshing_oauth_token_ = false; |
+ NotifyCallbacks( |
+ OAuthTokenGetter::SUCCESS, verified_email_, oauth_access_token_); |
+ } |
} |
void OAuthTokenGetter::OnGetUserEmailResponse(const std::string& user_email) { |
@@ -77,6 +94,7 @@ void OAuthTokenGetter::OnGetUserEmailResponse(const std::string& user_email) { |
return; |
} |
+ verified_email_ = user_email; |
refreshing_oauth_token_ = false; |
// Now that we've refreshed the token and verified that it's for the correct |
@@ -100,6 +118,12 @@ void OAuthTokenGetter::OnOAuthError() { |
DCHECK(CalledOnValidThread()); |
LOG(ERROR) << "OAuth: invalid credentials."; |
refreshing_oauth_token_ = false; |
+ |
+ // Throw away invalid credentials and force a refresh. |
+ oauth_access_token_.clear(); |
+ auth_token_expiry_time_ = base::Time(); |
+ verified_email_.clear(); |
+ |
NotifyCallbacks(OAuthTokenGetter::AUTH_ERROR, std::string(), std::string()); |
} |
@@ -114,9 +138,10 @@ void OAuthTokenGetter::OnNetworkError(int response_code) { |
void OAuthTokenGetter::CallWithToken(const TokenCallback& on_access_token) { |
DCHECK(CalledOnValidThread()); |
- bool need_new_auth_token = oauth_credentials_.get() && |
- (auth_token_expiry_time_.is_null() || |
- base::Time::Now() >= auth_token_expiry_time_); |
+ bool need_new_auth_token = auth_token_expiry_time_.is_null() || |
+ base::Time::Now() >= auth_token_expiry_time_ || |
+ verified_email_.empty(); |
+ |
if (need_new_auth_token) { |
pending_callbacks_.push(on_access_token); |
if (!refreshing_oauth_token_) |