blob: 2feaf8dc737c85152ca63a10a7192b7612eb6d94 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
|
// Copyright 2020 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_SIGNIN_SIGNIN_MANAGER_H_
#define CHROME_BROWSER_SIGNIN_SIGNIN_MANAGER_H_
#include "base/memory/raw_ptr.h"
#include "base/memory/weak_ptr.h"
#include "components/keyed_service/core/keyed_service.h"
#include "components/prefs/pref_member.h"
#include "components/signin/public/identity_manager/identity_manager.h"
class PrefService;
class SigninManager : public KeyedService,
public signin::IdentityManager::Observer {
public:
SigninManager(PrefService* prefs, signin::IdentityManager* identity_manger);
SigninManager(const SigninManager&) = delete;
SigninManager& operator=(const SigninManager&) = delete;
~SigninManager() override;
private:
// Updates the cached version of unconsented primary account and notifies the
// observers if there is any change.
void UpdateUnconsentedPrimaryAccount();
// Computes and returns the unconsented primary account (UPA).
// - If a primary account with sync consent exists, the UPA is equal to it.
// - The UPA is the first account in cookies and must have a refresh token.
// For the UPA to be computed, it needs fresh cookies and tokens to be loaded.
// - If tokens are not loaded or cookies are not fresh, the UPA can't be
// computed but if one already exists it might be invalid. That can happen if
// cookies are fresh but are empty or the first account is different than the
// current UPA, the other cases are if tokens are not loaded but the current
// UPA's refresh token has been rekoved or tokens are loaded but the current
// UPA does not have a refresh token. If the UPA is invalid, it needs to be
// cleared, |absl::nullopt| is returned. If it is still valid, returns the
// valid UPA.
absl::optional<CoreAccountInfo> ComputeUnconsentedPrimaryAccountInfo() const;
// signin::IdentityManager::Observer implementation.
void OnPrimaryAccountChanged(
const signin::PrimaryAccountChangeEvent& event_details) override;
void OnRefreshTokenUpdatedForAccount(
const CoreAccountInfo& account_info) override;
void OnRefreshTokenRemovedForAccount(
const CoreAccountId& account_id) override;
void OnRefreshTokensLoaded() override;
void OnAccountsInCookieUpdated(
const signin::AccountsInCookieJarInfo& accounts_in_cookie_jar_info,
const GoogleServiceAuthError& error) override;
void OnAccountsCookieDeletedByUserAction() override;
void OnErrorStateOfRefreshTokenUpdatedForAccount(
const CoreAccountInfo& account_info,
const GoogleServiceAuthError& error) override;
void OnSigninAllowedPrefChanged();
raw_ptr<PrefService> prefs_;
raw_ptr<signin::IdentityManager> identity_manager_;
// Helper object to listen for changes to the signin allowed preference.
BooleanPrefMember signin_allowed_;
base::WeakPtrFactory<SigninManager> weak_ptr_factory_{this};
};
#endif // CHROME_BROWSER_SIGNIN_SIGNIN_MANAGER_H_
|