forked from chromium/chromium
-
Notifications
You must be signed in to change notification settings - Fork 0
/
fake_oauth2_token_service.cc
92 lines (78 loc) · 3.29 KB
/
fake_oauth2_token_service.cc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "google_apis/gaia/fake_oauth2_token_service.h"
#include <memory>
FakeOAuth2TokenService::PendingRequest::PendingRequest() {
}
FakeOAuth2TokenService::PendingRequest::PendingRequest(
const PendingRequest& other) = default;
FakeOAuth2TokenService::PendingRequest::~PendingRequest() {
}
FakeOAuth2TokenService::FakeOAuth2TokenService()
: OAuth2TokenService(std::make_unique<FakeOAuth2TokenServiceDelegate>()) {}
FakeOAuth2TokenService::~FakeOAuth2TokenService() {
}
void FakeOAuth2TokenService::FetchOAuth2Token(
RequestImpl* request,
const std::string& account_id,
scoped_refptr<network::SharedURLLoaderFactory> url_loader_factory,
const std::string& client_id,
const std::string& client_secret,
const ScopeSet& scopes) {
PendingRequest pending_request;
pending_request.account_id = account_id;
pending_request.client_id = client_id;
pending_request.client_secret = client_secret;
pending_request.scopes = scopes;
pending_request.request = request->AsWeakPtr();
pending_requests_.push_back(pending_request);
}
void FakeOAuth2TokenService::InvalidateAccessTokenImpl(
const std::string& account_id,
const std::string& client_id,
const ScopeSet& scopes,
const std::string& access_token) {
}
void FakeOAuth2TokenService::AddAccount(const std::string& account_id) {
GetDelegate()->UpdateCredentials(account_id, "fake_refresh_token");
}
void FakeOAuth2TokenService::RemoveAccount(const std::string& account_id) {
GetDelegate()->RevokeCredentials(account_id);
}
void FakeOAuth2TokenService::IssueAllTokensForAccount(
const std::string& account_id,
const OAuth2AccessTokenConsumer::TokenResponse& token_response) {
// Walk the requests and notify the callbacks.
// Using a copy of pending requests to make sure a new token request triggered
// from the handling code does not invalidate the iterator.
std::vector<PendingRequest> pending_requests_copy = pending_requests_;
for (std::vector<PendingRequest>::iterator it = pending_requests_copy.begin();
it != pending_requests_copy.end();
++it) {
if (it->request && (account_id == it->account_id)) {
it->request->InformConsumer(GoogleServiceAuthError::AuthErrorNone(),
token_response);
}
}
}
void FakeOAuth2TokenService::IssueErrorForAllPendingRequestsForAccount(
const std::string& account_id,
const GoogleServiceAuthError& auth_error) {
// Walk the requests and notify the callbacks.
// Using a copy of pending requests to make sure retrying a request in
// response to the error does not invalidate the iterator.
std::vector<PendingRequest> pending_requests_copy = pending_requests_;
for (std::vector<PendingRequest>::iterator it = pending_requests_copy.begin();
it != pending_requests_copy.end();
++it) {
if (it->request && (account_id == it->account_id)) {
it->request->InformConsumer(auth_error,
OAuth2AccessTokenConsumer::TokenResponse());
}
}
}
FakeOAuth2TokenServiceDelegate*
FakeOAuth2TokenService::GetFakeOAuth2TokenServiceDelegate() {
return static_cast<FakeOAuth2TokenServiceDelegate*>(GetDelegate());
}