blob: aa0bce3cb38ac0e15d8ad0c20633337ec5e9b017 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "google_apis/gaia/oauth2_token_service_delegate.h"
#include "google_apis/gaia/oauth2_token_service.h"
#include "services/network/public/cpp/shared_url_loader_factory.h"
// static
const char OAuth2TokenServiceDelegate::kInvalidRefreshToken[] =
"invalid_refresh_token";
OAuth2TokenServiceDelegate::ScopedBatchChange::ScopedBatchChange(
OAuth2TokenServiceDelegate* delegate)
: delegate_(delegate) {
DCHECK(delegate_);
delegate_->StartBatchChanges();
}
OAuth2TokenServiceDelegate::ScopedBatchChange::~ScopedBatchChange() {
delegate_->EndBatchChanges();
}
OAuth2TokenServiceDelegate::OAuth2TokenServiceDelegate()
: batch_change_depth_(0) {
}
OAuth2TokenServiceDelegate::~OAuth2TokenServiceDelegate() {
}
bool OAuth2TokenServiceDelegate::ValidateAccountId(
const std::string& account_id) const {
bool valid = !account_id.empty();
// If the account is given as an email, make sure its a canonical email.
// Note that some tests don't use email strings as account id, and after
// the gaia id migration it won't be an email. So only check for
// canonicalization if the account_id is suspected to be an email.
if (account_id.find('@') != std::string::npos &&
gaia::CanonicalizeEmail(account_id) != account_id) {
valid = false;
}
DCHECK(valid);
return valid;
}
void OAuth2TokenServiceDelegate::AddObserver(
OAuth2TokenService::Observer* observer) {
observer_list_.AddObserver(observer);
}
void OAuth2TokenServiceDelegate::RemoveObserver(
OAuth2TokenService::Observer* observer) {
observer_list_.RemoveObserver(observer);
}
void OAuth2TokenServiceDelegate::StartBatchChanges() {
++batch_change_depth_;
if (batch_change_depth_ == 1) {
for (auto& observer : observer_list_)
observer.OnStartBatchChanges();
}
}
void OAuth2TokenServiceDelegate::EndBatchChanges() {
--batch_change_depth_;
DCHECK_LE(0, batch_change_depth_);
if (batch_change_depth_ == 0) {
for (auto& observer : observer_list_)
observer.OnEndBatchChanges();
}
}
void OAuth2TokenServiceDelegate::FireRefreshTokenAvailable(
const std::string& account_id) {
for (auto& observer : observer_list_)
observer.OnRefreshTokenAvailable(account_id);
}
void OAuth2TokenServiceDelegate::FireRefreshTokenRevoked(
const std::string& account_id) {
for (auto& observer : observer_list_)
observer.OnRefreshTokenRevoked(account_id);
}
void OAuth2TokenServiceDelegate::FireRefreshTokensLoaded() {
for (auto& observer : observer_list_)
observer.OnRefreshTokensLoaded();
}
void OAuth2TokenServiceDelegate::FireAuthErrorChanged(
const std::string& account_id,
const GoogleServiceAuthError& error) {
for (auto& observer : observer_list_)
observer.OnAuthErrorChanged(account_id, error);
}
net::URLRequestContextGetter* OAuth2TokenServiceDelegate::GetRequestContext()
const {
return nullptr;
}
scoped_refptr<network::SharedURLLoaderFactory>
OAuth2TokenServiceDelegate::GetURLLoaderFactory() const {
return nullptr;
}
GoogleServiceAuthError OAuth2TokenServiceDelegate::GetAuthError(
const std::string& account_id) const {
return GoogleServiceAuthError::AuthErrorNone();
}
std::vector<std::string> OAuth2TokenServiceDelegate::GetAccounts() {
return std::vector<std::string>();
}
const net::BackoffEntry* OAuth2TokenServiceDelegate::BackoffEntry() const {
return nullptr;
}
OAuth2TokenServiceDelegate::LoadCredentialsState
OAuth2TokenServiceDelegate::GetLoadCredentialsState() const {
return LOAD_CREDENTIALS_UNKNOWN;
}