Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(161)

Side by Side Diff: components/proximity_auth/cryptauth/cryptauth_client.h

Issue 738593002: Introduce CryptAuthClient, a class capable of performing all CryptAuth APIs. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef COMPONENTS_PROXIMITY_AUTH_CRYPT_AUTH_CLIENT_H
6 #define COMPONENTS_PROXIMITY_AUTH_CRYPT_AUTH_CLIENT_H
7
8 #include "base/callback.h"
9 #include "base/macros.h"
10 #include "base/memory/scoped_ptr.h"
11 #include "base/memory/weak_ptr.h"
12 #include "components/proximity_auth/cryptauth/proto/cryptauth_api.pb.h"
Ilya Sherman 2014/11/18 22:30:44 nit: Can you forward-declare the necessary classes
Tim Song 2014/12/03 01:18:24 You will still have to include cryptauth_api.pb.h
13 #include "net/url_request/url_request_context_getter.h"
14 #include "url/gurl.h"
15
16 class OAuth2TokenService;
17
18 namespace proximity_auth {
19
20 class CryptAuthAccessTokenFetcher;
21 class CryptAuthApiCallFlow;
22
23 // Use CryptAuthClient to make API requests to the CryptAuth service, which
24 // manages cryptographic credentials (ie. public keys) for a user's devices.
25 // At most one request can be processed concurrently; the error callback will
26 // be invoked if you make a request when there is another pending. Create
27 // another CryptAuthClient if you want to make two requests at the same time.
28 class CryptAuthClient {
29 public:
30 typedef base::Callback<void(const std::string&)> ErrorCallback;
31
32 CryptAuthClient(net::URLRequestContextGetter* url_request_context,
Ilya Sherman 2014/11/18 22:30:44 It looks like this is stored in a scoped_refptr be
Tim Song 2014/12/03 01:18:24 Done.
33 CryptAuthAccessTokenFetcher* access_token_fetcher);
Ilya Sherman 2014/11/18 22:30:44 nit: Please document, including lifetime expectati
Tim Song 2014/12/03 01:18:24 Done.
34 virtual ~CryptAuthClient();
35
36 // The GetMyDevices API request returns a list of devices that the user has
37 // registered with CryptAuth.
38 typedef base::Callback<void(const cryptauth::GetMyDevicesResponse&)>
39 GetMyDevicesCallback;
40 void GetMyDevices(bool allow_stale_read,
41 GetMyDevicesCallback callback,
42 ErrorCallback error_callback);
Ilya Sherman 2014/11/18 22:30:44 nit: Please pass callbacks by const-reference. (A
Tim Song 2014/12/03 01:18:24 Done.
43
44 // The FindEligibleUnlockDevices API request returns a list of devices
45 // eligible to be an "unlock key", that is a device capable of unlocking other
46 // devices.
47 // The |bluetooth_address| field should contain the Bluetooth address of the
48 // local device, which is sent to the eligible devices so they can connect to
49 // the local device.
Ilya Sherman 2014/11/18 22:30:44 I wonder if it would be better to just document th
Tim Song 2014/12/03 01:18:24 I would prefer the documentation to be here as the
50 typedef base::Callback<void(
51 const cryptauth::FindEligibleUnlockDevicesResponse&)>
52 FindEligibleUnlockDevicesCallback;
53 void FindEligibleUnlockDevices(const std::string& bluetooth_address,
54 FindEligibleUnlockDevicesCallback callback,
55 ErrorCallback error_callback);
56
57 // The SendDeviceSyncTickle API request tells the server to "tickle" all
58 // the user's registered devices, so they can sync the latest device state.
59 typedef base::Callback<void(const cryptauth::SendDeviceSyncTickleResponse&)>
60 SendDeviceSyncTickleCallback;
61 void SendDeviceSyncTickle(SendDeviceSyncTickleCallback callback,
62 ErrorCallback error_callback);
63
64 // The ToggleEasyUnlock API request tells the server to designate devices as
65 // an "unlock key" that can unlock other devices. The |turn_on| argument is
66 // used to enable or disable the device given by its |public_key|. If
67 // |apply_to_all| is true, then |public_key| will be ignored, and |turn_on|
68 // will be applied to all eligible unlock keys.
69 typedef base::Callback<void(const cryptauth::ToggleEasyUnlockResponse&)>
70 ToggleEasyUnlockCallback;
71 void ToggleEasyUnlock(bool turn_on,
72 bool apply_to_all,
73 const std::string public_key,
Ilya Sherman 2014/11/18 22:30:44 nit: Please pass strings by const-reference too (a
Ilya Sherman 2014/11/18 22:30:44 Since we already reference cryptauth::ToggleEasyUn
Tim Song 2014/12/03 01:18:24 Done.
Tim Song 2014/12/03 01:18:24 Done.
74 ToggleEasyUnlockCallback callback,
75 ErrorCallback error_callback);
76
77 // The SetupEnrollment API request is the first of a two step process to
78 // enroll the device with CryptAuth. See FinishEnrollment for the last step of
79 // enrollment.
80 // You most likely will not use this API directly. Look instead at
81 // CryptAuthEnroller, which handles the entire enrollment operation.
82 typedef base::Callback<void(const cryptauth::SetupEnrollmentResponse&)>
83 SetupEnrollmentCallback;
84 void SetupEnrollment(const std::string application_id,
85 const std::vector<std::string>& supported_protocols,
86 SetupEnrollmentCallback callback,
87 ErrorCallback error_callback);
88
89 // The FinishEnrollment API request is the last of a two step process to
90 // enroll the device with CryptAuth. See for the SetupEnrollment for the
91 // first step of enrollment.
92 // You most likely will not use this API directly. Look instead at
93 // CryptAuthEnroller, which handles the entire enrollment operation.
94 typedef base::Callback<void(const cryptauth::FinishEnrollmentResponse&)>
95 FinishEnrollmentCallback;
96 void FinishEnrollment(const std::string& enrollment_session_id,
97 const std::string& enrollment_message,
98 const std::string& device_ephermeral_key,
99 FinishEnrollmentCallback callback,
100 ErrorCallback error_callback);
101
102 protected:
103 // Creates a CryptAuthApiCallFlow object and takes ownership of it.
104 // Exposed for testing.
105 virtual CryptAuthApiCallFlow* CreateFlow(GURL request_url);
Ilya Sherman 2014/11/18 22:30:44 nit: Please pass by const-reference.
Tim Song 2014/12/03 01:18:24 Done.
106
107 private:
108 // Starts a call to the API given by |request_path|, with the templated
109 // request and response types. The client first fetches the access token and
110 // then makes the HTTP request.
111 template <class RequestProto, class ResponseProto>
112 void MakeApiCall(const std::string& request_path,
113 const RequestProto& request_proto,
114 base::Callback<void(const ResponseProto&)> response_callback,
115 ErrorCallback error_callback);
Ilya Sherman 2014/11/18 22:30:44 Expanding on a comment above: Why not just expose
Tim Song 2014/12/03 01:18:24 I prefer making all the possible API calls explici
116
117 // Called when the access token is obtained so the API request can be made.
118 template <class ResponseProto>
119 void OnAccessTokenFetched(
120 std::string serialized_request,
121 base::Callback<void(const ResponseProto&)> response_callback,
122 const std::string& access_token);
123
124 // Called with CryptAuthApiCallFlow completes successfully to deserialize and
125 // return the result.
126 template <class ResponseProto>
127 void OnFlowSuccess(base::Callback<void(const ResponseProto&)> result_callback,
128 const std::string& serialized_response);
129 // Called when the current API call fails at any step.
130 void OnApiCallFailed(const std::string& error_message);
131
132 // The context for network requests.
133 scoped_refptr<net::URLRequestContextGetter> url_request_context_;
Ilya Sherman 2014/11/18 22:30:44 nit: Please leave blank lines between documented v
Tim Song 2014/12/03 01:18:24 Done.
134 // Fetchs the access token authorizing the API calls.
135 CryptAuthAccessTokenFetcher* access_token_fetcher_;
Ilya Sherman 2014/11/18 22:30:44 nit: Please document lifetime expectations. Alter
Tim Song 2014/12/03 01:18:24 I haven't implemented the access token fetching ye
136
137 // Handles the current API call.
138 scoped_ptr<CryptAuthApiCallFlow> flow_;
139 // URL path of the current request.
140 std::string request_path_;
141 // Called when the current request fails.
142 ErrorCallback error_callback_;
143
144 base::WeakPtrFactory<CryptAuthClient> weak_ptr_factory_;
145
146 DISALLOW_COPY_AND_ASSIGN(CryptAuthClient);
147 };
148
149 } // namespace proximity_auth
150
151 #endif // COMPONENTS_PROXIMITY_AUTH_CRYPT_AUTH_CLIENT_H
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698