1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
|
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
#define CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
#include <string>
#include "base/basictypes.h"
#include "base/callback.h"
#include "base/compiler_specific.h"
#include "base/memory/ref_counted.h"
#include "base/memory/scoped_ptr.h"
#include "base/memory/weak_ptr.h"
#include "google_apis/gaia/gaia_auth_consumer.h"
#include "google_apis/gaia/oauth2_access_token_consumer.h"
class GaiaAuthFetcher;
class OAuth2AccessTokenFetcher;
namespace net {
class URLRequestContextGetter;
}
namespace policy {
// Fetches the OAuth2 token for the device management service. Since Profile
// creation might be blocking on a user policy fetch, this fetcher must always
// send a (possibly empty) token to the callback, which will then let the policy
// subsystem proceed and resume Profile creation. Sending the token even when no
// Profile is pending is also OK.
class PolicyOAuth2TokenFetcher
: public base::SupportsWeakPtr<PolicyOAuth2TokenFetcher>,
public GaiaAuthConsumer,
public OAuth2AccessTokenConsumer {
public:
typedef base::Callback<void(const std::string&,
const GoogleServiceAuthError&)> TokenCallback;
// Fetches the device management service's oauth2 token, after also retrieving
// the OAuth2 refresh tokens.
PolicyOAuth2TokenFetcher(net::URLRequestContextGetter* auth_context_getter,
net::URLRequestContextGetter* system_context_getter,
const TokenCallback& callback);
virtual ~PolicyOAuth2TokenFetcher();
// Starts process of minting device management service OAuth2 access token.
void Start();
// Returns true if we have previously attempted to fetch tokens with this
// class and failed.
bool failed() const {
return failed_;
}
const std::string& oauth2_refresh_token() const {
return oauth2_refresh_token_;
}
const std::string& oauth2_access_token() const {
return oauth2_access_token_;
}
private:
// GaiaAuthConsumer overrides.
virtual void OnClientOAuthSuccess(
const GaiaAuthConsumer::ClientOAuthResult& oauth_tokens) override;
virtual void OnClientOAuthFailure(
const GoogleServiceAuthError& error) override;
// OAuth2AccessTokenConsumer overrides.
virtual void OnGetTokenSuccess(const std::string& access_token,
const base::Time& expiration_time) override;
virtual void OnGetTokenFailure(const GoogleServiceAuthError& error) override;
// Starts fetching OAuth2 refresh token.
void StartFetchingRefreshToken();
// Starts fetching OAuth2 access token for the device management service.
void StartFetchingAccessToken();
// Decides how to proceed on GAIA |error|. If the error looks temporary,
// retries |task| until max retry count is reached.
// If retry count runs out, or error condition is unrecoverable, it calls
// Delegate::OnOAuth2TokenFetchFailed().
void RetryOnError(const GoogleServiceAuthError& error,
const base::Closure& task);
// Passes |token| and |error| to the |callback_|.
void ForwardPolicyToken(const std::string& token,
const GoogleServiceAuthError& error);
scoped_refptr<net::URLRequestContextGetter> auth_context_getter_;
scoped_refptr<net::URLRequestContextGetter> system_context_getter_;
scoped_ptr<GaiaAuthFetcher> refresh_token_fetcher_;
scoped_ptr<OAuth2AccessTokenFetcher> access_token_fetcher_;
// OAuth2 refresh token. Could come either from the outside or through
// refresh token fetching flow within this class.
std::string oauth2_refresh_token_;
// OAuth2 access token.
std::string oauth2_access_token_;
// The retry counter. Increment this only when failure happened.
int retry_count_;
// True if we have already failed to fetch the policy.
bool failed_;
// The callback to invoke when done.
TokenCallback callback_;
DISALLOW_COPY_AND_ASSIGN(PolicyOAuth2TokenFetcher);
};
} // namespace policy
#endif // CHROME_BROWSER_CHROMEOS_POLICY_POLICY_OAUTH2_TOKEN_FETCHER_H_
|