| Index: chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.cc
|
| diff --git a/chrome/browser/managed_mode/managed_user_refresh_token_fetcher.cc b/chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.cc
|
| similarity index 79%
|
| rename from chrome/browser/managed_mode/managed_user_refresh_token_fetcher.cc
|
| rename to chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.cc
|
| index 4c25d874edd4c574a3caed8ad1e4c165bae2521d..a58c64b54c5a806be14235be0ed1b87de15fc683 100644
|
| --- a/chrome/browser/managed_mode/managed_user_refresh_token_fetcher.cc
|
| +++ b/chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.h"
|
|
|
| #include "base/callback.h"
|
| #include "base/json/json_reader.h"
|
| @@ -45,19 +45,20 @@ static const char kAuthorizationHeaderFormat[] =
|
|
|
| static const char kCodeKey[] = "code";
|
|
|
| -class ManagedUserRefreshTokenFetcherImpl
|
| - : public ManagedUserRefreshTokenFetcher,
|
| +class SupervisedUserRefreshTokenFetcherImpl
|
| + : public SupervisedUserRefreshTokenFetcher,
|
| public OAuth2TokenService::Consumer,
|
| public URLFetcherDelegate,
|
| public GaiaOAuthClient::Delegate {
|
| public:
|
| - ManagedUserRefreshTokenFetcherImpl(OAuth2TokenService* oauth2_token_service,
|
| - const std::string& account_id,
|
| - URLRequestContextGetter* context);
|
| - virtual ~ManagedUserRefreshTokenFetcherImpl();
|
| -
|
| - // ManagedUserRefreshTokenFetcher implementation:
|
| - virtual void Start(const std::string& managed_user_id,
|
| + SupervisedUserRefreshTokenFetcherImpl(
|
| + OAuth2TokenService* oauth2_token_service,
|
| + const std::string& account_id,
|
| + URLRequestContextGetter* context);
|
| + virtual ~SupervisedUserRefreshTokenFetcherImpl();
|
| +
|
| + // SupervisedUserRefreshTokenFetcher implementation:
|
| + virtual void Start(const std::string& supervised_user_id,
|
| const std::string& device_name,
|
| const TokenCallback& callback) OVERRIDE;
|
|
|
| @@ -94,7 +95,7 @@ class ManagedUserRefreshTokenFetcherImpl
|
| URLRequestContextGetter* context_;
|
|
|
| std::string device_name_;
|
| - std::string managed_user_id_;
|
| + std::string supervised_user_id_;
|
| TokenCallback callback_;
|
|
|
| scoped_ptr<OAuth2TokenService::Request> access_token_request_;
|
| @@ -104,37 +105,38 @@ class ManagedUserRefreshTokenFetcherImpl
|
| scoped_ptr<GaiaOAuthClient> gaia_oauth_client_;
|
| };
|
|
|
| -ManagedUserRefreshTokenFetcherImpl::ManagedUserRefreshTokenFetcherImpl(
|
| +SupervisedUserRefreshTokenFetcherImpl::SupervisedUserRefreshTokenFetcherImpl(
|
| OAuth2TokenService* oauth2_token_service,
|
| const std::string& account_id,
|
| URLRequestContextGetter* context)
|
| - : OAuth2TokenService::Consumer("managed_user"),
|
| + : OAuth2TokenService::Consumer("supervised_user"),
|
| oauth2_token_service_(oauth2_token_service),
|
| account_id_(account_id),
|
| context_(context),
|
| access_token_expired_(false) {}
|
|
|
| -ManagedUserRefreshTokenFetcherImpl::~ManagedUserRefreshTokenFetcherImpl() {}
|
| +SupervisedUserRefreshTokenFetcherImpl::
|
| +~SupervisedUserRefreshTokenFetcherImpl() {}
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::Start(
|
| - const std::string& managed_user_id,
|
| +void SupervisedUserRefreshTokenFetcherImpl::Start(
|
| + const std::string& supervised_user_id,
|
| const std::string& device_name,
|
| const TokenCallback& callback) {
|
| DCHECK(callback_.is_null());
|
| - managed_user_id_ = managed_user_id;
|
| + supervised_user_id_ = supervised_user_id;
|
| device_name_ = device_name;
|
| callback_ = callback;
|
| StartFetching();
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::StartFetching() {
|
| +void SupervisedUserRefreshTokenFetcherImpl::StartFetching() {
|
| OAuth2TokenService::ScopeSet scopes;
|
| scopes.insert(GaiaConstants::kOAuth1LoginScope);
|
| access_token_request_ = oauth2_token_service_->StartRequest(
|
| account_id_, scopes, this);
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnGetTokenSuccess(
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnGetTokenSuccess(
|
| const OAuth2TokenService::Request* request,
|
| const std::string& access_token,
|
| const Time& expiration_time) {
|
| @@ -160,14 +162,14 @@ void ManagedUserRefreshTokenFetcherImpl::OnGetTokenSuccess(
|
| net::EscapeUrlEncodedData(
|
| GaiaUrls::GetInstance()->oauth2_chrome_client_id(), true).c_str(),
|
| net::EscapeUrlEncodedData(kChromeSyncSupervisedOAuth2Scope, true).c_str(),
|
| - net::EscapeUrlEncodedData(managed_user_id_, true).c_str(),
|
| + net::EscapeUrlEncodedData(supervised_user_id_, true).c_str(),
|
| net::EscapeUrlEncodedData(device_name_, true).c_str());
|
| url_fetcher_->SetUploadData("application/x-www-form-urlencoded", body);
|
|
|
| url_fetcher_->Start();
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnGetTokenFailure(
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnGetTokenFailure(
|
| const OAuth2TokenService::Request* request,
|
| const GoogleServiceAuthError& error) {
|
| DCHECK_EQ(access_token_request_.get(), request);
|
| @@ -175,7 +177,7 @@ void ManagedUserRefreshTokenFetcherImpl::OnGetTokenFailure(
|
| callback_.Reset();
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnURLFetchComplete(
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnURLFetchComplete(
|
| const URLFetcher* source) {
|
| const net::URLRequestStatus& status = source->GetStatus();
|
| if (!status.is_success()) {
|
| @@ -225,7 +227,7 @@ void ManagedUserRefreshTokenFetcherImpl::OnURLFetchComplete(
|
| this);
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnGetTokensResponse(
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnGetTokensResponse(
|
| const std::string& refresh_token,
|
| const std::string& access_token,
|
| int expires_in_seconds) {
|
| @@ -235,19 +237,19 @@ void ManagedUserRefreshTokenFetcherImpl::OnGetTokensResponse(
|
| refresh_token);
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnRefreshTokenResponse(
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnRefreshTokenResponse(
|
| const std::string& access_token,
|
| int expires_in_seconds) {
|
| NOTREACHED();
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnOAuthError() {
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnOAuthError() {
|
| DispatchGoogleServiceAuthError(
|
| GoogleServiceAuthError(GoogleServiceAuthError::CONNECTION_FAILED),
|
| std::string());
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::OnNetworkError(int response_code) {
|
| +void SupervisedUserRefreshTokenFetcherImpl::OnNetworkError(int response_code) {
|
| // TODO(bauerb): We should return the HTTP response code somehow.
|
| DLOG(WARNING) << "HTTP error " << response_code;
|
| DispatchGoogleServiceAuthError(
|
| @@ -255,12 +257,13 @@ void ManagedUserRefreshTokenFetcherImpl::OnNetworkError(int response_code) {
|
| std::string());
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::DispatchNetworkError(int error_code) {
|
| +void SupervisedUserRefreshTokenFetcherImpl::DispatchNetworkError(
|
| + int error_code) {
|
| DispatchGoogleServiceAuthError(
|
| GoogleServiceAuthError::FromConnectionError(error_code), std::string());
|
| }
|
|
|
| -void ManagedUserRefreshTokenFetcherImpl::DispatchGoogleServiceAuthError(
|
| +void SupervisedUserRefreshTokenFetcherImpl::DispatchGoogleServiceAuthError(
|
| const GoogleServiceAuthError& error,
|
| const std::string& token) {
|
| callback_.Run(error, token);
|
| @@ -270,14 +273,16 @@ void ManagedUserRefreshTokenFetcherImpl::DispatchGoogleServiceAuthError(
|
| } // namespace
|
|
|
| // static
|
| -scoped_ptr<ManagedUserRefreshTokenFetcher>
|
| -ManagedUserRefreshTokenFetcher::Create(OAuth2TokenService* oauth2_token_service,
|
| - const std::string& account_id,
|
| - URLRequestContextGetter* context) {
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> fetcher(
|
| - new ManagedUserRefreshTokenFetcherImpl(oauth2_token_service, account_id,
|
| - context));
|
| +scoped_ptr<SupervisedUserRefreshTokenFetcher>
|
| +SupervisedUserRefreshTokenFetcher::Create(
|
| + OAuth2TokenService* oauth2_token_service,
|
| + const std::string& account_id,
|
| + URLRequestContextGetter* context) {
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> fetcher(
|
| + new SupervisedUserRefreshTokenFetcherImpl(oauth2_token_service,
|
| + account_id,
|
| + context));
|
| return fetcher.Pass();
|
| }
|
|
|
| -ManagedUserRefreshTokenFetcher::~ManagedUserRefreshTokenFetcher() {}
|
| +SupervisedUserRefreshTokenFetcher::~SupervisedUserRefreshTokenFetcher() {}
|
|
|