1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136
|
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/device_identity/device_identity_provider.h"
#include "base/functional/callback_helpers.h"
#include "base/logging.h"
#include "chrome/browser/device_identity/device_oauth2_token_service.h"
namespace {
// An implementation of ActiveAccountAccessTokenFetcher that is backed by
// DeviceOAuth2TokenService.
class ActiveAccountAccessTokenFetcherImpl
: public invalidation::ActiveAccountAccessTokenFetcher,
OAuth2AccessTokenManager::Consumer {
public:
ActiveAccountAccessTokenFetcherImpl(
const std::string& oauth_consumer_name,
DeviceOAuth2TokenService* token_service,
const OAuth2AccessTokenManager::ScopeSet& scopes,
invalidation::ActiveAccountAccessTokenCallback callback);
ActiveAccountAccessTokenFetcherImpl(
const ActiveAccountAccessTokenFetcherImpl&) = delete;
ActiveAccountAccessTokenFetcherImpl& operator=(
const ActiveAccountAccessTokenFetcherImpl&) = delete;
~ActiveAccountAccessTokenFetcherImpl() override;
private:
// OAuth2AccessTokenManager::Consumer implementation.
void OnGetTokenSuccess(
const OAuth2AccessTokenManager::Request* request,
const OAuth2AccessTokenConsumer::TokenResponse& token_response) override;
void OnGetTokenFailure(const OAuth2AccessTokenManager::Request* request,
const GoogleServiceAuthError& error) override;
// Invokes |callback_| with (|access_token|, |error|).
void HandleTokenRequestCompletion(
const OAuth2AccessTokenManager::Request* request,
const GoogleServiceAuthError& error,
const std::string& access_token);
invalidation::ActiveAccountAccessTokenCallback callback_;
std::unique_ptr<OAuth2AccessTokenManager::Request> access_token_request_;
};
} // namespace
ActiveAccountAccessTokenFetcherImpl::ActiveAccountAccessTokenFetcherImpl(
const std::string& oauth_consumer_name,
DeviceOAuth2TokenService* token_service,
const OAuth2AccessTokenManager::ScopeSet& scopes,
invalidation::ActiveAccountAccessTokenCallback callback)
: OAuth2AccessTokenManager::Consumer(oauth_consumer_name),
callback_(std::move(callback)) {
access_token_request_ = token_service->StartAccessTokenRequest(scopes, this);
}
ActiveAccountAccessTokenFetcherImpl::~ActiveAccountAccessTokenFetcherImpl() =
default;
void ActiveAccountAccessTokenFetcherImpl::OnGetTokenSuccess(
const OAuth2AccessTokenManager::Request* request,
const OAuth2AccessTokenConsumer::TokenResponse& token_response) {
HandleTokenRequestCompletion(request, GoogleServiceAuthError::AuthErrorNone(),
token_response.access_token);
}
void ActiveAccountAccessTokenFetcherImpl::OnGetTokenFailure(
const OAuth2AccessTokenManager::Request* request,
const GoogleServiceAuthError& error) {
HandleTokenRequestCompletion(request, error, std::string());
}
void ActiveAccountAccessTokenFetcherImpl::HandleTokenRequestCompletion(
const OAuth2AccessTokenManager::Request* request,
const GoogleServiceAuthError& error,
const std::string& access_token) {
DCHECK_EQ(request, access_token_request_.get());
std::unique_ptr<OAuth2AccessTokenManager::Request> request_deleter(
std::move(access_token_request_));
std::move(callback_).Run(error, access_token);
}
DeviceIdentityProvider::DeviceIdentityProvider(
DeviceOAuth2TokenService* token_service)
: token_service_(token_service) {
// TODO(blundell): Can |token_service_| ever actually be non-null?
if (token_service_) {
token_service->SetRefreshTokenAvailableCallback(
base::BindRepeating(&DeviceIdentityProvider::OnRefreshTokenAvailable,
base::Unretained(this)));
}
}
DeviceIdentityProvider::~DeviceIdentityProvider() {
// TODO(blundell): Can |token_service_| ever actually be non-null?
if (token_service_) {
token_service_->SetRefreshTokenAvailableCallback(base::NullCallback());
}
}
CoreAccountId DeviceIdentityProvider::GetActiveAccountId() {
return token_service_->GetRobotAccountId();
}
bool DeviceIdentityProvider::IsActiveAccountWithRefreshToken() {
if (GetActiveAccountId().empty() || !token_service_ ||
!token_service_->RefreshTokenIsAvailable())
return false;
return true;
}
std::unique_ptr<invalidation::ActiveAccountAccessTokenFetcher>
DeviceIdentityProvider::FetchAccessToken(
const std::string& oauth_consumer_name,
const OAuth2AccessTokenManager::ScopeSet& scopes,
invalidation::ActiveAccountAccessTokenCallback callback) {
return std::make_unique<ActiveAccountAccessTokenFetcherImpl>(
oauth_consumer_name, token_service_, scopes, std::move(callback));
}
void DeviceIdentityProvider::InvalidateAccessToken(
const OAuth2AccessTokenManager::ScopeSet& scopes,
const std::string& access_token) {
token_service_->InvalidateAccessToken(scopes, access_token);
}
void DeviceIdentityProvider::OnRefreshTokenAvailable() {
ProcessRefreshTokenUpdateForAccount(GetActiveAccountId());
}
|