1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/profiler/scoped_tracker.h"
#include "google_apis/gaia/oauth2_token_service.h"
#include "google_apis/gaia/oauth2_token_service_delegate.h"
OAuth2TokenServiceDelegate::ScopedBatchChange::ScopedBatchChange(
OAuth2TokenServiceDelegate* delegate)
: delegate_(delegate) {
DCHECK(delegate_);
delegate_->StartBatchChanges();
}
OAuth2TokenServiceDelegate::ScopedBatchChange::~ScopedBatchChange() {
delegate_->EndBatchChanges();
}
OAuth2TokenServiceDelegate::OAuth2TokenServiceDelegate()
: batch_change_depth_(0) {
}
OAuth2TokenServiceDelegate::~OAuth2TokenServiceDelegate() {
}
bool OAuth2TokenServiceDelegate::ValidateAccountId(
const std::string& account_id) const {
bool valid = !account_id.empty();
// If the account is given as an email, make sure its a canonical email.
// Note that some tests don't use email strings as account id, and after
// the gaia id migration it won't be an email. So only check for
// canonicalization if the account_id is suspected to be an email.
if (account_id.find('@') != std::string::npos &&
gaia::CanonicalizeEmail(account_id) != account_id) {
valid = false;
}
DCHECK(valid);
return valid;
}
void OAuth2TokenServiceDelegate::AddObserver(
OAuth2TokenService::Observer* observer) {
observer_list_.AddObserver(observer);
}
void OAuth2TokenServiceDelegate::RemoveObserver(
OAuth2TokenService::Observer* observer) {
observer_list_.RemoveObserver(observer);
}
// static
bool OAuth2TokenServiceDelegate::IsError(const GoogleServiceAuthError& error) {
return error.IsPersistentError();
}
void OAuth2TokenServiceDelegate::StartBatchChanges() {
++batch_change_depth_;
if (batch_change_depth_ == 1)
FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_,
OnStartBatchChanges());
}
void OAuth2TokenServiceDelegate::EndBatchChanges() {
--batch_change_depth_;
DCHECK_LE(0, batch_change_depth_);
if (batch_change_depth_ == 0)
FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_,
OnEndBatchChanges());
}
void OAuth2TokenServiceDelegate::FireRefreshTokenAvailable(
const std::string& account_id) {
// TODO(robliao): Remove ScopedTracker below once https://crbug.com/422460 is
// fixed.
tracked_objects::ScopedTracker tracking_profile(
FROM_HERE_WITH_EXPLICIT_FUNCTION(
"422460 OAuth2TokenService::FireRefreshTokenAvailable"));
FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_,
OnRefreshTokenAvailable(account_id));
}
void OAuth2TokenServiceDelegate::FireRefreshTokenRevoked(
const std::string& account_id) {
FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_,
OnRefreshTokenRevoked(account_id));
}
void OAuth2TokenServiceDelegate::FireRefreshTokensLoaded() {
// TODO(robliao): Remove ScopedTracker below once https://crbug.com/422460 is
// fixed.
tracked_objects::ScopedTracker tracking_profile(
FROM_HERE_WITH_EXPLICIT_FUNCTION(
"422460 OAuth2TokenService::FireRefreshTokensLoaded"));
FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_,
OnRefreshTokensLoaded());
}
net::URLRequestContextGetter* OAuth2TokenServiceDelegate::GetRequestContext()
const {
return nullptr;
}
bool OAuth2TokenServiceDelegate::RefreshTokenHasError(
const std::string& account_id) const {
return false;
}
std::vector<std::string> OAuth2TokenServiceDelegate::GetAccounts() {
return std::vector<std::string>();
}
const net::BackoffEntry* OAuth2TokenServiceDelegate::BackoffEntry() const {
return nullptr;
}
|