joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 1 | // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "remoting/test/access_token_fetcher.h" |
| 6 | |
joedow | dd5660bd | 2015-03-06 02:41:02 | [diff] [blame] | 7 | #include <string> |
Daniel Cheng | ce48c3c4 | 2019-04-26 15:06:08 | [diff] [blame] | 8 | #include <utility> |
joedow | dd5660bd | 2015-03-06 02:41:02 | [diff] [blame] | 9 | #include <vector> |
| 10 | |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 11 | #include "base/bind.h" |
| 12 | #include "base/logging.h" |
gab | bac02f5 | 2016-05-11 17:55:51 | [diff] [blame] | 13 | #include "base/threading/thread_task_runner_handle.h" |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 14 | #include "google_apis/gaia/gaia_constants.h" |
| 15 | #include "google_apis/google_api_keys.h" |
| 16 | #include "net/url_request/url_fetcher.h" |
| 17 | #include "remoting/base/url_request_context_getter.h" |
Maks Orlovich | 8db7d0d6 | 2018-08-16 19:22:27 | [diff] [blame] | 18 | #include "services/network/public/cpp/shared_url_loader_factory.h" |
| 19 | #include "services/network/transitional_url_loader_factory_owner.h" |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 20 | |
| 21 | namespace { |
| 22 | const int kMaxGetTokensRetries = 3; |
| 23 | const char kOauthRedirectUrl[] = |
| 24 | "https://chromoting-oauth.talkgadget." |
| 25 | "google.com/talkgadget/oauth/chrome-remote-desktop/dev"; |
joedow | dd5660bd | 2015-03-06 02:41:02 | [diff] [blame] | 26 | } // namespace |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 27 | |
| 28 | namespace remoting { |
| 29 | namespace test { |
| 30 | |
| 31 | AccessTokenFetcher::AccessTokenFetcher() { |
| 32 | oauth_client_info_ = { |
| 33 | google_apis::GetOAuth2ClientID(google_apis::CLIENT_REMOTING), |
| 34 | google_apis::GetOAuth2ClientSecret(google_apis::CLIENT_REMOTING), |
| 35 | kOauthRedirectUrl}; |
| 36 | } |
| 37 | |
Chris Watkins | 6fe52aa | 2017-11-28 03:24:05 | [diff] [blame] | 38 | AccessTokenFetcher::~AccessTokenFetcher() = default; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 39 | |
| 40 | void AccessTokenFetcher::GetAccessTokenFromAuthCode( |
| 41 | const std::string& auth_code, |
Sylvain Defresne | 77274cc | 2019-06-28 17:17:48 | [diff] [blame] | 42 | AccessTokenCallback callback) { |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 43 | DCHECK(!auth_code.empty()); |
| 44 | DCHECK(!callback.is_null()); |
| 45 | DCHECK(access_token_callback_.is_null()); |
| 46 | |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 47 | VLOG(2) << "Calling GetTokensFromAuthCode to exchange auth_code for token"; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 48 | |
| 49 | access_token_.clear(); |
| 50 | refresh_token_.clear(); |
Sylvain Defresne | 77274cc | 2019-06-28 17:17:48 | [diff] [blame] | 51 | access_token_callback_ = std::move(callback); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 52 | |
| 53 | // Create a new GaiaOAuthClient for each request to GAIA. |
| 54 | CreateNewGaiaOAuthClientInstance(); |
joedow | 910989d | 2016-12-02 21:15:32 | [diff] [blame] | 55 | auth_client_->GetTokensFromAuthCode(oauth_client_info_, auth_code, |
| 56 | kMaxGetTokensRetries, |
| 57 | /*delegate=*/this); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 58 | } |
| 59 | |
| 60 | void AccessTokenFetcher::GetAccessTokenFromRefreshToken( |
| 61 | const std::string& refresh_token, |
Sylvain Defresne | 77274cc | 2019-06-28 17:17:48 | [diff] [blame] | 62 | AccessTokenCallback callback) { |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 63 | DCHECK(!refresh_token.empty()); |
| 64 | DCHECK(!callback.is_null()); |
| 65 | DCHECK(access_token_callback_.is_null()); |
| 66 | |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 67 | VLOG(2) << "Calling RefreshToken to generate a new access token"; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 68 | |
| 69 | access_token_.clear(); |
| 70 | refresh_token_ = refresh_token; |
Sylvain Defresne | 77274cc | 2019-06-28 17:17:48 | [diff] [blame] | 71 | access_token_callback_ = std::move(callback); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 72 | |
| 73 | // Create a new GaiaOAuthClient for each request to GAIA. |
| 74 | CreateNewGaiaOAuthClientInstance(); |
joedow | 13648c6 | 2015-03-26 03:47:55 | [diff] [blame] | 75 | auth_client_->RefreshToken(oauth_client_info_, refresh_token_, |
joedow | 910989d | 2016-12-02 21:15:32 | [diff] [blame] | 76 | /*scopes=*/std::vector<std::string>(), |
joedow | 13648c6 | 2015-03-26 03:47:55 | [diff] [blame] | 77 | kMaxGetTokensRetries, |
joedow | 910989d | 2016-12-02 21:15:32 | [diff] [blame] | 78 | /*delegate=*/this); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 79 | } |
| 80 | |
Maks Orlovich | 8db7d0d6 | 2018-08-16 19:22:27 | [diff] [blame] | 81 | void AccessTokenFetcher::SetURLLoaderFactoryForTesting( |
| 82 | scoped_refptr<network::SharedURLLoaderFactory> |
| 83 | url_loader_factory_for_testing) { |
| 84 | url_loader_factory_for_testing_ = url_loader_factory_for_testing; |
| 85 | } |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 86 | |
Maks Orlovich | 8db7d0d6 | 2018-08-16 19:22:27 | [diff] [blame] | 87 | void AccessTokenFetcher::CreateNewGaiaOAuthClientInstance() { |
| 88 | scoped_refptr<network::SharedURLLoaderFactory> url_loader_factory; |
| 89 | if (url_loader_factory_for_testing_) { |
| 90 | url_loader_factory = url_loader_factory_for_testing_; |
| 91 | } else { |
| 92 | scoped_refptr<remoting::URLRequestContextGetter> request_context_getter; |
| 93 | request_context_getter = new remoting::URLRequestContextGetter( |
| 94 | base::ThreadTaskRunnerHandle::Get()); |
| 95 | |
| 96 | url_loader_factory_owner_.reset( |
| 97 | new network::TransitionalURLLoaderFactoryOwner(request_context_getter)); |
| 98 | url_loader_factory = url_loader_factory_owner_->GetURLLoaderFactory(); |
| 99 | } |
| 100 | |
| 101 | auth_client_.reset(new gaia::GaiaOAuthClient(url_loader_factory)); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 102 | } |
| 103 | |
| 104 | void AccessTokenFetcher::OnGetTokensResponse(const std::string& refresh_token, |
| 105 | const std::string& access_token, |
| 106 | int expires_in_seconds) { |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 107 | VLOG(1) << "AccessTokenFetcher::OnGetTokensResponse() Called"; |
| 108 | VLOG(1) << "--refresh_token: " << refresh_token; |
| 109 | VLOG(1) << "--access_token: " << access_token; |
| 110 | VLOG(1) << "--expires_in_seconds: " << expires_in_seconds; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 111 | |
| 112 | refresh_token_ = refresh_token; |
| 113 | access_token_ = access_token; |
| 114 | |
| 115 | ValidateAccessToken(); |
| 116 | } |
| 117 | |
| 118 | void AccessTokenFetcher::OnRefreshTokenResponse(const std::string& access_token, |
| 119 | int expires_in_seconds) { |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 120 | VLOG(1) << "AccessTokenFetcher::OnRefreshTokenResponse() Called"; |
| 121 | VLOG(1) << "--access_token: " << access_token; |
| 122 | VLOG(1) << "--expires_in_seconds: " << expires_in_seconds; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 123 | |
| 124 | access_token_ = access_token; |
| 125 | |
| 126 | ValidateAccessToken(); |
| 127 | } |
| 128 | |
| 129 | void AccessTokenFetcher::OnGetUserEmailResponse(const std::string& user_email) { |
| 130 | // This callback should not be called as we do not request the user's email. |
| 131 | NOTREACHED(); |
| 132 | } |
| 133 | |
| 134 | void AccessTokenFetcher::OnGetUserIdResponse(const std::string& user_id) { |
| 135 | // This callback should not be called as we do not request the user's id. |
| 136 | NOTREACHED(); |
| 137 | } |
| 138 | |
| 139 | void AccessTokenFetcher::OnGetUserInfoResponse( |
dcheng | 0765c49 | 2016-04-06 22:41:53 | [diff] [blame] | 140 | std::unique_ptr<base::DictionaryValue> user_info) { |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 141 | // This callback should not be called as we do not request user info. |
| 142 | NOTREACHED(); |
| 143 | } |
| 144 | |
| 145 | void AccessTokenFetcher::OnGetTokenInfoResponse( |
dcheng | 0765c49 | 2016-04-06 22:41:53 | [diff] [blame] | 146 | std::unique_ptr<base::DictionaryValue> token_info) { |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 147 | VLOG(1) << "AccessTokenFetcher::OnGetTokenInfoResponse() Called"; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 148 | |
| 149 | std::string error_string; |
| 150 | std::string error_description; |
| 151 | |
| 152 | // Check to see if the token_info we received had any errors, |
| 153 | // otherwise we will assume that it is valid for our purposes. |
| 154 | if (token_info->HasKey("error")) { |
| 155 | token_info->GetString("error", &error_string); |
| 156 | token_info->GetString("error_description", &error_description); |
| 157 | |
| 158 | LOG(ERROR) << "OnGetTokenInfoResponse returned an error. " |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 159 | << "error: " << error_string << ", " |
| 160 | << "description: " << error_description; |
| 161 | access_token_.clear(); |
| 162 | refresh_token_.clear(); |
| 163 | } else { |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 164 | VLOG(1) << "Access Token has been validated"; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 165 | } |
| 166 | |
Daniel Cheng | ce48c3c4 | 2019-04-26 15:06:08 | [diff] [blame] | 167 | std::move(access_token_callback_).Run(access_token_, refresh_token_); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 168 | } |
| 169 | |
| 170 | void AccessTokenFetcher::OnOAuthError() { |
| 171 | LOG(ERROR) << "AccessTokenFetcher::OnOAuthError() Called"; |
| 172 | |
| 173 | access_token_.clear(); |
| 174 | refresh_token_.clear(); |
| 175 | |
Daniel Cheng | ce48c3c4 | 2019-04-26 15:06:08 | [diff] [blame] | 176 | std::move(access_token_callback_).Run(access_token_, refresh_token_); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 177 | } |
| 178 | |
| 179 | void AccessTokenFetcher::OnNetworkError(int response_code) { |
| 180 | LOG(ERROR) << "AccessTokenFetcher::OnNetworkError() Called"; |
| 181 | LOG(ERROR) << "response code: " << response_code; |
| 182 | |
| 183 | access_token_.clear(); |
| 184 | refresh_token_.clear(); |
| 185 | |
Daniel Cheng | ce48c3c4 | 2019-04-26 15:06:08 | [diff] [blame] | 186 | std::move(access_token_callback_).Run(access_token_, refresh_token_); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 187 | } |
| 188 | |
| 189 | void AccessTokenFetcher::ValidateAccessToken() { |
joedow | 9cfae7c | 2015-07-06 18:44:18 | [diff] [blame] | 190 | VLOG(2) << "Calling GetTokenInfo to validate access token"; |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 191 | |
| 192 | // Create a new GaiaOAuthClient for each request to GAIA. |
| 193 | CreateNewGaiaOAuthClientInstance(); |
joedow | 13648c6 | 2015-03-26 03:47:55 | [diff] [blame] | 194 | auth_client_->GetTokenInfo(access_token_, kMaxGetTokensRetries, |
joedow | 910989d | 2016-12-02 21:15:32 | [diff] [blame] | 195 | /*delegate=*/this); |
joedow | ea77cec | 2015-02-25 23:12:51 | [diff] [blame] | 196 | } |
| 197 | |
| 198 | } // namespace test |
| 199 | } // namespace remoting |