blob: 9afd37813e60a95759bb6d5224e99398dbbdbac5 [file] [log] [blame]
// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <string>
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/signin/force_signin_verifier.h"
#include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
#include "chrome/browser/signin/signin_manager_factory.h"
#include "components/signin/core/browser/signin_manager.h"
#include "google_apis/gaia/gaia_constants.h"
namespace {
const net::BackoffEntry::Policy kBackoffPolicy = {
0, // Number of initial errors to ignore before applying
// exponential back-off rules.
2000, // Initial delay in ms.
2, // Factor by which the waiting time will be multiplied.
0.2, // Fuzzing percentage.
4 * 60 * 1000, // Maximum amount of time to delay th request in ms.
-1, // Never discard the entry.
false // Do not always use initial delay.
};
} // namespace
ForceSigninVerifier::ForceSigninVerifier(Profile* profile)
: OAuth2TokenService::Consumer("force_signin_verifier"),
has_token_verified_(false),
backoff_entry_(&kBackoffPolicy),
oauth2_token_service_(
ProfileOAuth2TokenServiceFactory::GetForProfile(profile)),
signin_manager_(SigninManagerFactory::GetForProfile(profile)),
token_request_time_(base::Time::Now()) {
net::NetworkChangeNotifier::AddNetworkChangeObserver(this);
SendRequest();
}
ForceSigninVerifier::~ForceSigninVerifier() {
Cancel();
}
void ForceSigninVerifier::OnGetTokenSuccess(
const OAuth2TokenService::Request* request,
const std::string& access_token,
const base::Time& expiration_time) {
has_token_verified_ = true;
net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
Cancel();
}
void ForceSigninVerifier::OnGetTokenFailure(
const OAuth2TokenService::Request* request,
const GoogleServiceAuthError& error) {
if (error.IsPersistentError()) {
has_token_verified_ = true;
ShowDialog();
net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
Cancel();
} else {
backoff_entry_.InformOfRequest(false);
backoff_request_timer_.Start(
FROM_HERE, backoff_entry_.GetTimeUntilRelease(),
base::Bind(&ForceSigninVerifier::SendRequest, base::Unretained(this)));
access_token_request_.reset();
}
}
void ForceSigninVerifier::OnNetworkChanged(
net::NetworkChangeNotifier::ConnectionType type) {
// Try again immediately once the network is back and cancel any pending
// request.
backoff_entry_.Reset();
if (backoff_request_timer_.IsRunning())
backoff_request_timer_.Stop();
if (type != net::NetworkChangeNotifier::ConnectionType::CONNECTION_NONE)
SendRequest();
}
void ForceSigninVerifier::Cancel() {
backoff_entry_.Reset();
backoff_request_timer_.Stop();
access_token_request_.reset();
net::NetworkChangeNotifier::RemoveNetworkChangeObserver(this);
}
bool ForceSigninVerifier::HasTokenBeenVerified() {
return has_token_verified_;
}
void ForceSigninVerifier::SendRequest() {
if (!ShouldSendRequest())
return;
std::string account_id = signin_manager_->GetAuthenticatedAccountId();
OAuth2TokenService::ScopeSet oauth2_scopes;
oauth2_scopes.insert(GaiaConstants::kChromeSyncOAuth2Scope);
access_token_request_ =
oauth2_token_service_->StartRequest(account_id, oauth2_scopes, this);
}
bool ForceSigninVerifier::ShouldSendRequest() {
return !has_token_verified_ && access_token_request_.get() == nullptr &&
!net::NetworkChangeNotifier::IsOffline() &&
signin_manager_->IsAuthenticated();
}
void ForceSigninVerifier::ShowDialog() {
// TODO(zmin): Show app modal dialog.
}
OAuth2TokenService::Request* ForceSigninVerifier::GetRequestForTesting() {
return access_token_request_.get();
}
net::BackoffEntry* ForceSigninVerifier::GetBackoffEntryForTesting() {
return &backoff_entry_;
}
base::OneShotTimer* ForceSigninVerifier::GetOneShotTimerForTesting() {
return &backoff_request_timer_;
}