OLD | NEW |
---|---|
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/policy/device_token_fetcher.h" | 5 #include "chrome/browser/policy/device_token_fetcher.h" |
6 | 6 |
7 #include "base/file_util.h" | 7 #include "base/file_util.h" |
8 #include "base/path_service.h" | 8 #include "base/path_service.h" |
9 #include "base/singleton.h" | 9 #include "base/singleton.h" |
10 #include "base/string_util.h" | |
11 #include "chrome/browser/chromeos/login/user_manager.h" | |
10 #include "chrome/browser/net/gaia/token_service.h" | 12 #include "chrome/browser/net/gaia/token_service.h" |
13 #include "chrome/browser/prefs/pref_service.h" | |
14 #include "chrome/browser/profile.h" | |
11 #include "chrome/common/chrome_paths.h" | 15 #include "chrome/common/chrome_paths.h" |
12 #include "chrome/common/net/gaia/gaia_constants.h" | 16 #include "chrome/common/net/gaia/gaia_constants.h" |
13 #include "chrome/common/notification_details.h" | 17 #include "chrome/common/notification_details.h" |
14 #include "chrome/common/notification_service.h" | 18 #include "chrome/common/notification_service.h" |
15 #include "chrome/common/notification_source.h" | 19 #include "chrome/common/notification_source.h" |
16 #include "chrome/common/notification_type.h" | 20 #include "chrome/common/notification_type.h" |
21 #include "chrome/common/pref_names.h" | |
22 | |
23 #if defined(OS_CHROMEOS) | |
24 #include "chrome/browser/chromeos/login/user_manager.h" | |
25 #else | |
26 #include "chrome/browser/sync/signin_manager.h" | |
27 #endif | |
28 | |
29 class PrefService; | |
17 | 30 |
18 namespace { | 31 namespace { |
19 | 32 |
20 static const char kPlaceholderDeviceID[] = "placeholder_device_id"; | 33 static const char kPlaceholderDeviceID[] = "placeholder_device_id"; |
21 | 34 |
35 int kNumNonDasherDomains = 2; | |
Mattias Nissler (ping if slow)
2010/11/16 09:54:31
You can move this down and use arraysize(kNonDashe
gfeher
2010/11/16 17:37:01
Done.
| |
36 | |
37 // Domain names that are known not to support Dasher. | |
38 // We don't register the device when such a user logs in. | |
39 const char* kNonDasherDomains[] = { | |
40 "@googlemail.com", | |
41 "@gmail.com" | |
42 }; | |
43 | |
22 } // namespace | 44 } // namespace |
23 | 45 |
24 namespace policy { | 46 namespace policy { |
25 | 47 |
26 DeviceTokenFetcher::DeviceTokenFetcher( | 48 DeviceTokenFetcher::DeviceTokenFetcher( |
27 DeviceManagementBackend* backend, | 49 DeviceManagementBackend* backend, |
28 const FilePath& token_path) | 50 const FilePath& token_path) |
29 : token_path_(token_path), | 51 : token_path_(token_path), |
30 backend_(backend), | 52 backend_(backend), |
31 state_(kStateNotStarted), | 53 state_(kStateNotStarted), |
32 device_token_load_complete_event_(true, false) { | 54 device_token_load_complete_event_(true, false), |
55 profile_(NULL) { | |
33 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 56 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
34 // The token fetcher gets initialized AuthTokens for the device management | 57 // The token fetcher gets initialized AuthTokens for the device management |
35 // server are available. Install a notification observer to ensure that the | 58 // server are available. Install a notification observer to ensure that the |
36 // device management token gets fetched after the AuthTokens are available. | 59 // device management token gets fetched after the AuthTokens are available. |
37 registrar_.Add(this, | 60 registrar_.Add(this, |
38 NotificationType::TOKEN_AVAILABLE, | 61 NotificationType::TOKEN_AVAILABLE, |
39 NotificationService::AllSources()); | 62 NotificationService::AllSources()); |
63 // Register for the event of user login. The device management token won't | |
64 // be fetched until we know the domain of the currently logged in user. | |
65 #if defined(OS_CHROMEOS) | |
66 registrar_.Add(this, | |
67 NotificationType::LOGIN_USER_CHANGED, | |
68 NotificationService::AllSources()); | |
69 #else | |
70 registrar_.Add(this, | |
71 NotificationType::GOOGLE_SIGNIN_SUCCESSFUL, | |
72 NotificationService::AllSources()); | |
73 #endif | |
40 } | 74 } |
41 | 75 |
42 void DeviceTokenFetcher::Observe(NotificationType type, | 76 void DeviceTokenFetcher::Observe(NotificationType type, |
43 const NotificationSource& source, | 77 const NotificationSource& source, |
44 const NotificationDetails& details) { | 78 const NotificationDetails& details) { |
45 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 79 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
46 if (type == NotificationType::TOKEN_AVAILABLE) { | 80 if (type == NotificationType::TOKEN_AVAILABLE) { |
47 const Source<TokenService> token_service(source); | |
48 const TokenService::TokenAvailableDetails* token_details = | 81 const TokenService::TokenAvailableDetails* token_details = |
49 Details<const TokenService::TokenAvailableDetails>(details).ptr(); | 82 Details<const TokenService::TokenAvailableDetails>(details).ptr(); |
50 if (token_details->service() == GaiaConstants::kDeviceManagementService) { | 83 if (token_details->service() == GaiaConstants::kDeviceManagementService) { |
51 if (!HasAuthToken()) { | 84 if (!HasAuthToken()) { |
52 auth_token_ = token_details->token(); | 85 auth_token_ = token_details->token(); |
53 SendServerRequestIfPossible(); | 86 SendServerRequestIfPossible(); |
54 } | 87 } |
55 } | 88 } |
89 #if defined(OS_CHROMEOS) | |
90 } else if (type == NotificationType::LOGIN_USER_CHANGED) { | |
91 SendServerRequestIfPossible(); | |
92 #else | |
93 } else if (type == NotificationType::GOOGLE_SIGNIN_SUCCESSFUL) { | |
94 profile_ = Source<Profile>(source).ptr(); | |
95 SendServerRequestIfPossible(); | |
96 #endif | |
56 } else { | 97 } else { |
57 NOTREACHED(); | 98 NOTREACHED(); |
58 } | 99 } |
59 } | 100 } |
60 | 101 |
102 std::string DeviceTokenFetcher::GetCurrentUser() { | |
103 if (injected_username.get() == NULL) { | |
Mattias Nissler (ping if slow)
2010/11/16 09:54:31
Is the inject_username quirk really necessary? I s
gfeher
2010/11/16 17:37:01
Done.
| |
104 #if defined(OS_CHROMEOS) | |
105 return chromeos::UserManager::Get()->logged_in_user().email(); | |
106 #else | |
107 if (profile_ == NULL) { | |
108 return ""; | |
109 } | |
110 return profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername); | |
111 #endif | |
112 } else { | |
113 return *(injected_username.get()); | |
114 } | |
115 } | |
116 | |
117 bool DeviceTokenFetcher::CanCurrentUserBeDasher() { | |
118 std::string username = GetCurrentUser(); | |
119 if (username.empty()) { | |
120 // This means incognito user in case of ChromiumOS and | |
121 // no logged-in user in case of Chromium (SigninService). | |
122 return false; | |
123 } | |
124 for (int i = 0; i < kNumNonDasherDomains; i++) { | |
125 if (EndsWith(username, kNonDasherDomains[i], true)) { | |
126 return false; | |
127 } | |
128 } | |
129 return true; | |
130 } | |
131 | |
61 void DeviceTokenFetcher::HandleRegisterResponse( | 132 void DeviceTokenFetcher::HandleRegisterResponse( |
62 const em::DeviceRegisterResponse& response) { | 133 const em::DeviceRegisterResponse& response) { |
63 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 134 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
64 DCHECK_EQ(kStateRequestingDeviceTokenFromServer, state_); | 135 DCHECK_EQ(kStateRequestingDeviceTokenFromServer, state_); |
65 if (response.has_device_management_token()) { | 136 if (response.has_device_management_token()) { |
66 device_token_ = response.device_management_token(); | 137 device_token_ = response.device_management_token(); |
67 BrowserThread::PostTask( | 138 BrowserThread::PostTask( |
68 BrowserThread::FILE, | 139 BrowserThread::FILE, |
69 FROM_HERE, | 140 FROM_HERE, |
70 NewRunnableFunction(&WriteDeviceTokenToDisk, | 141 NewRunnableFunction(&WriteDeviceTokenToDisk, |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
122 | 193 |
123 void DeviceTokenFetcher::MakeReadyToRequestDeviceToken() { | 194 void DeviceTokenFetcher::MakeReadyToRequestDeviceToken() { |
124 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 195 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
125 SetState(kStateReadyToRequestDeviceTokenFromServer); | 196 SetState(kStateReadyToRequestDeviceTokenFromServer); |
126 SendServerRequestIfPossible(); | 197 SendServerRequestIfPossible(); |
127 } | 198 } |
128 | 199 |
129 void DeviceTokenFetcher::SendServerRequestIfPossible() { | 200 void DeviceTokenFetcher::SendServerRequestIfPossible() { |
130 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 201 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
131 if (state_ == kStateReadyToRequestDeviceTokenFromServer | 202 if (state_ == kStateReadyToRequestDeviceTokenFromServer |
132 && HasAuthToken()) { | 203 && HasAuthToken() && CanCurrentUserBeDasher()) { |
133 em::DeviceRegisterRequest register_request; | 204 em::DeviceRegisterRequest register_request; |
134 SetState(kStateRequestingDeviceTokenFromServer); | 205 SetState(kStateRequestingDeviceTokenFromServer); |
135 backend_->ProcessRegisterRequest(auth_token_, | 206 backend_->ProcessRegisterRequest(auth_token_, |
136 GetDeviceID(), | 207 GetDeviceID(), |
137 register_request, | 208 register_request, |
138 this); | 209 this); |
139 } | 210 } |
140 } | 211 } |
141 | 212 |
142 bool DeviceTokenFetcher::IsTokenPending() { | 213 bool DeviceTokenFetcher::IsTokenPending() { |
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
185 device_token.length()); | 256 device_token.length()); |
186 } | 257 } |
187 | 258 |
188 // static | 259 // static |
189 std::string DeviceTokenFetcher::GetDeviceID() { | 260 std::string DeviceTokenFetcher::GetDeviceID() { |
190 // TODO(danno): fetch a real device_id | 261 // TODO(danno): fetch a real device_id |
191 return kPlaceholderDeviceID; | 262 return kPlaceholderDeviceID; |
192 } | 263 } |
193 | 264 |
194 } | 265 } |
OLD | NEW |