| // Copyright 2015 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "base/profiler/scoped_tracker.h" |
| #include "google_apis/gaia/oauth2_token_service.h" |
| #include "google_apis/gaia/oauth2_token_service_delegate.h" |
| |
| OAuth2TokenServiceDelegate::ScopedBatchChange::ScopedBatchChange( |
| OAuth2TokenServiceDelegate* delegate) |
| : delegate_(delegate) { |
| DCHECK(delegate_); |
| delegate_->StartBatchChanges(); |
| } |
| |
| OAuth2TokenServiceDelegate::ScopedBatchChange::~ScopedBatchChange() { |
| delegate_->EndBatchChanges(); |
| } |
| |
| OAuth2TokenServiceDelegate::OAuth2TokenServiceDelegate() |
| : batch_change_depth_(0) { |
| } |
| |
| OAuth2TokenServiceDelegate::~OAuth2TokenServiceDelegate() { |
| } |
| |
| bool OAuth2TokenServiceDelegate::ValidateAccountId( |
| const std::string& account_id) const { |
| bool valid = !account_id.empty(); |
| |
| // If the account is given as an email, make sure its a canonical email. |
| // Note that some tests don't use email strings as account id, and after |
| // the gaia id migration it won't be an email. So only check for |
| // canonicalization if the account_id is suspected to be an email. |
| if (account_id.find('@') != std::string::npos && |
| gaia::CanonicalizeEmail(account_id) != account_id) { |
| valid = false; |
| } |
| |
| DCHECK(valid); |
| return valid; |
| } |
| |
| void OAuth2TokenServiceDelegate::AddObserver( |
| OAuth2TokenService::Observer* observer) { |
| observer_list_.AddObserver(observer); |
| } |
| |
| void OAuth2TokenServiceDelegate::RemoveObserver( |
| OAuth2TokenService::Observer* observer) { |
| observer_list_.RemoveObserver(observer); |
| } |
| |
| // static |
| bool OAuth2TokenServiceDelegate::IsError(const GoogleServiceAuthError& error) { |
| return error.IsPersistentError(); |
| } |
| |
| void OAuth2TokenServiceDelegate::StartBatchChanges() { |
| ++batch_change_depth_; |
| if (batch_change_depth_ == 1) |
| FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_, |
| OnStartBatchChanges()); |
| } |
| |
| void OAuth2TokenServiceDelegate::EndBatchChanges() { |
| --batch_change_depth_; |
| DCHECK_LE(0, batch_change_depth_); |
| if (batch_change_depth_ == 0) |
| FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_, |
| OnEndBatchChanges()); |
| } |
| |
| void OAuth2TokenServiceDelegate::FireRefreshTokenAvailable( |
| const std::string& account_id) { |
| // TODO(robliao): Remove ScopedTracker below once https://crbug.com/422460 is |
| // fixed. |
| tracked_objects::ScopedTracker tracking_profile( |
| FROM_HERE_WITH_EXPLICIT_FUNCTION( |
| "422460 OAuth2TokenService::FireRefreshTokenAvailable")); |
| |
| FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_, |
| OnRefreshTokenAvailable(account_id)); |
| } |
| |
| void OAuth2TokenServiceDelegate::FireRefreshTokenRevoked( |
| const std::string& account_id) { |
| FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_, |
| OnRefreshTokenRevoked(account_id)); |
| } |
| |
| void OAuth2TokenServiceDelegate::FireRefreshTokensLoaded() { |
| // TODO(robliao): Remove ScopedTracker below once https://crbug.com/422460 is |
| // fixed. |
| tracked_objects::ScopedTracker tracking_profile( |
| FROM_HERE_WITH_EXPLICIT_FUNCTION( |
| "422460 OAuth2TokenService::FireRefreshTokensLoaded")); |
| |
| FOR_EACH_OBSERVER(OAuth2TokenService::Observer, observer_list_, |
| OnRefreshTokensLoaded()); |
| } |
| |
| net::URLRequestContextGetter* OAuth2TokenServiceDelegate::GetRequestContext() |
| const { |
| return nullptr; |
| } |
| |
| bool OAuth2TokenServiceDelegate::RefreshTokenHasError( |
| const std::string& account_id) const { |
| return false; |
| } |
| |
| std::vector<std::string> OAuth2TokenServiceDelegate::GetAccounts() { |
| return std::vector<std::string>(); |
| } |
| |
| const net::BackoffEntry* OAuth2TokenServiceDelegate::BackoffEntry() const { |
| return nullptr; |
| } |