| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/host_signaling_manager.h" | 5 #include "remoting/host/host_signaling_manager.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/time/time.h" | 8 #include "base/time/time.h" |
| 9 #include "net/socket/client_socket_factory.h" | 9 #include "net/socket/client_socket_factory.h" |
| 10 #include "remoting/base/auto_thread_task_runner.h" | 10 #include "remoting/base/auto_thread_task_runner.h" |
| (...skipping 25 matching lines...) Expand all Loading... |
| 36 const std::string& host_id, | 36 const std::string& host_id, |
| 37 const scoped_refptr<const RsaKeyPair>& host_key_pair, | 37 const scoped_refptr<const RsaKeyPair>& host_key_pair, |
| 38 const std::string& directory_bot_jid, | 38 const std::string& directory_bot_jid, |
| 39 scoped_ptr<OAuthTokenGetter::OAuthCredentials> oauth_credentials) { | 39 scoped_ptr<OAuthTokenGetter::OAuthCredentials> oauth_credentials) { |
| 40 scoped_ptr<XmppSignalStrategy> signal_strategy( | 40 scoped_ptr<XmppSignalStrategy> signal_strategy( |
| 41 new XmppSignalStrategy(net::ClientSocketFactory::GetDefaultFactory(), | 41 new XmppSignalStrategy(net::ClientSocketFactory::GetDefaultFactory(), |
| 42 url_request_context_getter, xmpp_server_config)); | 42 url_request_context_getter, xmpp_server_config)); |
| 43 | 43 |
| 44 scoped_ptr<DnsBlackholeChecker> dns_blackhole_checker(new DnsBlackholeChecker( | 44 scoped_ptr<DnsBlackholeChecker> dns_blackhole_checker(new DnsBlackholeChecker( |
| 45 url_request_context_getter, talkgadget_prefix_policy)); | 45 url_request_context_getter, talkgadget_prefix_policy)); |
| 46 scoped_ptr<OAuthTokenGetter> oauth_token_getter(new OAuthTokenGetter( |
| 47 oauth_credentials.Pass(), url_request_context_getter, false)); |
| 46 | 48 |
| 47 scoped_ptr<SignalingConnector> signaling_connector(new SignalingConnector( | 49 scoped_ptr<SignalingConnector> signaling_connector(new SignalingConnector( |
| 48 signal_strategy.get(), dns_blackhole_checker.Pass(), | 50 signal_strategy.get(), dns_blackhole_checker.Pass(), |
| 51 oauth_token_getter.Pass(), |
| 49 base::Bind(&Listener::OnAuthFailed, base::Unretained(listener)))); | 52 base::Bind(&Listener::OnAuthFailed, base::Unretained(listener)))); |
| 50 | 53 |
| 51 if (!oauth_credentials->refresh_token.empty()) { | |
| 52 scoped_ptr<OAuthTokenGetter> oauth_token_getter(new OAuthTokenGetter( | |
| 53 oauth_credentials.Pass(), url_request_context_getter, false)); | |
| 54 | |
| 55 signaling_connector->EnableOAuth(oauth_token_getter.Pass()); | |
| 56 } | |
| 57 | |
| 58 scoped_ptr<HeartbeatSender> heartbeat_sender(new HeartbeatSender( | 54 scoped_ptr<HeartbeatSender> heartbeat_sender(new HeartbeatSender( |
| 59 base::Bind(&Listener::OnHeartbeatSuccessful, base::Unretained(listener)), | 55 base::Bind(&Listener::OnHeartbeatSuccessful, base::Unretained(listener)), |
| 60 base::Bind(&Listener::OnUnknownHostIdError, base::Unretained(listener)), | 56 base::Bind(&Listener::OnUnknownHostIdError, base::Unretained(listener)), |
| 61 host_id, signal_strategy.get(), host_key_pair, directory_bot_jid)); | 57 host_id, signal_strategy.get(), host_key_pair, directory_bot_jid)); |
| 62 | 58 |
| 63 return scoped_ptr<HostSignalingManager>(new HostSignalingManager( | 59 return scoped_ptr<HostSignalingManager>(new HostSignalingManager( |
| 64 signal_strategy.Pass(), signaling_connector.Pass(), | 60 signal_strategy.Pass(), signaling_connector.Pass(), |
| 65 heartbeat_sender.Pass())); | 61 heartbeat_sender.Pass())); |
| 66 } | 62 } |
| 67 | 63 |
| 68 HostSignalingManager::~HostSignalingManager() { | 64 HostSignalingManager::~HostSignalingManager() { |
| 69 DCHECK(thread_checker_.CalledOnValidThread()); | 65 DCHECK(thread_checker_.CalledOnValidThread()); |
| 70 } | 66 } |
| 71 | 67 |
| 72 void HostSignalingManager::SendHostOfflineReason( | 68 void HostSignalingManager::SendHostOfflineReason( |
| 73 const std::string& host_offline_reason, | 69 const std::string& host_offline_reason, |
| 74 const base::TimeDelta& timeout, | 70 const base::TimeDelta& timeout, |
| 75 const base::Callback<void(bool success)>& ack_callback) { | 71 const base::Callback<void(bool success)>& ack_callback) { |
| 76 DCHECK(thread_checker_.CalledOnValidThread()); | 72 DCHECK(thread_checker_.CalledOnValidThread()); |
| 77 HOST_LOG << "SendHostOfflineReason: sending " << host_offline_reason << "."; | 73 HOST_LOG << "SendHostOfflineReason: sending " << host_offline_reason << "."; |
| 78 heartbeat_sender_->SetHostOfflineReason(host_offline_reason, timeout, | 74 heartbeat_sender_->SetHostOfflineReason(host_offline_reason, timeout, |
| 79 ack_callback); | 75 ack_callback); |
| 80 } | 76 } |
| 81 | 77 |
| 82 } // namespace remoting | 78 } // namespace remoting |
| OLD | NEW |