OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/sync/signin_manager.h" | 5 #include "chrome/browser/sync/signin_manager.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/string_util.h" | 8 #include "base/string_util.h" |
9 #include "chrome/browser/net/gaia/token_service.h" | 9 #include "chrome/browser/net/gaia/token_service.h" |
10 #include "chrome/browser/prefs/pref_service.h" | 10 #include "chrome/browser/prefs/pref_service.h" |
11 #include "chrome/browser/profiles/profile.h" | 11 #include "chrome/browser/profiles/profile.h" |
12 #include "chrome/browser/sync/profile_sync_service.h" | 12 #include "chrome/browser/sync/profile_sync_service.h" |
| 13 #include "chrome/browser/sync/util/oauth.h" |
13 #include "chrome/common/chrome_notification_types.h" | 14 #include "chrome/common/chrome_notification_types.h" |
| 15 #include "chrome/common/chrome_switches.h" |
14 #include "chrome/common/net/gaia/gaia_constants.h" | 16 #include "chrome/common/net/gaia/gaia_constants.h" |
15 #include "chrome/common/pref_names.h" | 17 #include "chrome/common/pref_names.h" |
16 #include "chrome/common/chrome_switches.h" | |
17 #include "content/common/notification_service.h" | 18 #include "content/common/notification_service.h" |
18 | 19 |
19 const char kGetInfoEmailKey[] = "email"; | 20 const char kGetInfoEmailKey[] = "email"; |
20 | 21 |
21 SigninManager::SigninManager() | 22 SigninManager::SigninManager() |
22 : profile_(NULL), had_two_factor_error_(false) {} | 23 : profile_(NULL), had_two_factor_error_(false) {} |
23 | 24 |
24 SigninManager::~SigninManager() {} | 25 SigninManager::~SigninManager() {} |
25 | 26 |
26 // static | 27 // static |
27 void SigninManager::RegisterUserPrefs(PrefService* user_prefs) { | 28 void SigninManager::RegisterUserPrefs(PrefService* user_prefs) { |
| 29 user_prefs->RegisterBooleanPref(prefs::kSyncUsingOAuth, |
| 30 "", |
| 31 PrefService::UNSYNCABLE_PREF); |
28 user_prefs->RegisterStringPref(prefs::kGoogleServicesUsername, | 32 user_prefs->RegisterStringPref(prefs::kGoogleServicesUsername, |
29 "", | 33 "", |
30 PrefService::UNSYNCABLE_PREF); | 34 PrefService::UNSYNCABLE_PREF); |
31 user_prefs->RegisterBooleanPref(prefs::kAutologinEnabled, | 35 user_prefs->RegisterBooleanPref(prefs::kAutologinEnabled, |
32 true, | 36 true, |
33 PrefService::UNSYNCABLE_PREF); | 37 PrefService::UNSYNCABLE_PREF); |
34 } | 38 } |
35 | 39 |
36 void SigninManager::Initialize(Profile* profile) { | 40 void SigninManager::Initialize(Profile* profile) { |
37 profile_ = profile; | 41 profile_ = profile; |
38 username_ = profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername); | 42 SetUsername(profile_->GetPrefs()->GetString(prefs::kGoogleServicesUsername)); |
39 profile_->GetTokenService()->Initialize( | 43 profile_->GetTokenService()->Initialize( |
40 GaiaConstants::kChromeSource, profile_); | 44 GaiaConstants::kChromeSource, profile_); |
41 if (!username_.empty()) { | 45 if (!GetUsername().empty()) { |
42 profile_->GetTokenService()->LoadTokensFromDB(); | 46 profile_->GetTokenService()->LoadTokensFromDB(); |
43 } | 47 } |
44 } | 48 } |
45 | 49 |
46 bool SigninManager::IsInitialized() const { | 50 bool SigninManager::IsInitialized() const { |
47 return profile_ != NULL; | 51 return profile_ != NULL; |
48 } | 52 } |
49 | 53 |
50 void SigninManager::CleanupNotificationRegistration() { | 54 void SigninManager::CleanupNotificationRegistration() { |
51 #if !defined(OS_CHROMEOS) | 55 #if !defined(OS_CHROMEOS) |
52 Source<TokenService> token_service(profile_->GetTokenService()); | 56 Source<TokenService> token_service(profile_->GetTokenService()); |
53 if (registrar_.IsRegistered(this, | 57 if (registrar_.IsRegistered(this, |
54 chrome::NOTIFICATION_TOKEN_AVAILABLE, | 58 chrome::NOTIFICATION_TOKEN_AVAILABLE, |
55 token_service)) { | 59 token_service)) { |
56 registrar_.Remove(this, | 60 registrar_.Remove(this, |
57 chrome::NOTIFICATION_TOKEN_AVAILABLE, | 61 chrome::NOTIFICATION_TOKEN_AVAILABLE, |
58 token_service); | 62 token_service); |
59 } | 63 } |
60 #endif | 64 #endif |
61 } | 65 } |
62 | 66 |
63 // If a username already exists, the user is logged in. | 67 // If a username already exists, the user is logged in. |
64 const std::string& SigninManager::GetUsername() { | 68 const std::string& SigninManager::GetUsername() { |
65 return username_; | 69 return browser_sync::IsUsingOAuth() ? oauth_username_ : username_; |
66 } | 70 } |
67 | 71 |
68 void SigninManager::SetUsername(const std::string& username) { | 72 void SigninManager::SetUsername(const std::string& username) { |
69 username_ = username; | 73 if (browser_sync::IsUsingOAuth()) |
| 74 oauth_username_ = username; |
| 75 else |
| 76 username_ = username; |
70 } | 77 } |
71 | 78 |
72 // static | 79 // static |
73 void SigninManager::PrepareForSignin() { | 80 void SigninManager::PrepareForSignin() { |
74 DCHECK(username_.empty()); | 81 DCHECK(username_.empty()); |
75 #if !defined(OS_CHROMEOS) | 82 #if !defined(OS_CHROMEOS) |
76 // The Sign out should clear the token service credentials. | 83 // The Sign out should clear the token service credentials. |
77 // Note: In CHROMEOS we might have valid credentials but still need to | 84 // Note: In CHROMEOS we might have valid credentials but still need to |
78 // set up 2-factor authentication. | 85 // set up 2-factor authentication. |
79 DCHECK(!profile_->GetTokenService()->AreCredentialsValid()); | 86 DCHECK(!profile_->GetTokenService()->AreCredentialsValid()); |
80 #endif | 87 #endif |
81 } | 88 } |
82 | 89 |
| 90 // static |
| 91 void SigninManager::PrepareForOAuthSignin() { |
| 92 DCHECK(oauth_username_.empty()); |
| 93 #if !defined(OS_CHROMEOS) |
| 94 // The Sign out should clear the token service credentials. |
| 95 // Note: In CHROMEOS we might have valid credentials but still need to |
| 96 // set up 2-factor authentication. |
| 97 DCHECK(!profile_->GetTokenService()->AreOAuthCredentialsValid()); |
| 98 #endif |
| 99 } |
| 100 |
83 // Users must always sign out before they sign in again. | 101 // Users must always sign out before they sign in again. |
84 void SigninManager::StartOAuthSignIn() { | 102 void SigninManager::StartOAuthSignIn() { |
85 PrepareForSignin(); | 103 PrepareForOAuthSignin(); |
86 oauth_login_.reset(new GaiaOAuthFetcher(this, | 104 oauth_login_.reset(new GaiaOAuthFetcher(this, |
87 profile_->GetRequestContext(), | 105 profile_->GetRequestContext(), |
88 profile_, | 106 profile_, |
89 GaiaConstants::kSyncServiceOAuth)); | 107 GaiaConstants::kSyncServiceOAuth)); |
90 oauth_login_->StartGetOAuthToken(); | 108 oauth_login_->StartGetOAuthToken(); |
| 109 // TODO(rogerta?): Bug 92325: Expand Autologin to include OAuth signin |
91 } | 110 } |
92 | 111 |
93 // Users must always sign out before they sign in again. | 112 // Users must always sign out before they sign in again. |
94 void SigninManager::StartSignIn(const std::string& username, | 113 void SigninManager::StartSignIn(const std::string& username, |
95 const std::string& password, | 114 const std::string& password, |
96 const std::string& login_token, | 115 const std::string& login_token, |
97 const std::string& login_captcha) { | 116 const std::string& login_captcha) { |
98 PrepareForSignin(); | 117 PrepareForSignin(); |
99 username_.assign(username); | 118 username_.assign(username); |
100 password_.assign(password); | 119 password_.assign(password); |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
139 | 158 |
140 void SigninManager::SignOut() { | 159 void SigninManager::SignOut() { |
141 if (!profile_) | 160 if (!profile_) |
142 return; | 161 return; |
143 | 162 |
144 CleanupNotificationRegistration(); | 163 CleanupNotificationRegistration(); |
145 | 164 |
146 client_login_.reset(); | 165 client_login_.reset(); |
147 last_result_ = ClientLoginResult(); | 166 last_result_ = ClientLoginResult(); |
148 username_.clear(); | 167 username_.clear(); |
| 168 oauth_username_.clear(); |
149 password_.clear(); | 169 password_.clear(); |
150 had_two_factor_error_ = false; | 170 had_two_factor_error_ = false; |
151 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, username_); | 171 profile_->GetPrefs()->ClearPref(prefs::kGoogleServicesUsername); |
| 172 profile_->GetPrefs()->ClearPref(prefs::kSyncUsingOAuth); |
152 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); | 173 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); |
153 profile_->GetTokenService()->ResetCredentialsInMemory(); | 174 profile_->GetTokenService()->ResetCredentialsInMemory(); |
154 profile_->GetTokenService()->EraseTokensFromDB(); | 175 profile_->GetTokenService()->EraseTokensFromDB(); |
155 } | 176 } |
156 | 177 |
157 void SigninManager::OnClientLoginSuccess(const ClientLoginResult& result) { | 178 void SigninManager::OnClientLoginSuccess(const ClientLoginResult& result) { |
| 179 DCHECK(!browser_sync::IsUsingOAuth()); |
158 last_result_ = result; | 180 last_result_ = result; |
159 // Make a request for the canonical email address. | 181 // Make a request for the canonical email address. |
160 client_login_->StartGetUserInfo(result.lsid, kGetInfoEmailKey); | 182 client_login_->StartGetUserInfo(result.lsid, kGetInfoEmailKey); |
161 } | 183 } |
162 | 184 |
| 185 // NOTE: GetUserInfo is a ClientLogin request similar to OAuth's userinfo |
163 void SigninManager::OnGetUserInfoSuccess(const std::string& key, | 186 void SigninManager::OnGetUserInfoSuccess(const std::string& key, |
164 const std::string& value) { | 187 const std::string& value) { |
| 188 DCHECK(!browser_sync::IsUsingOAuth()); |
165 DCHECK(key == kGetInfoEmailKey); | 189 DCHECK(key == kGetInfoEmailKey); |
166 | 190 |
167 username_ = value; | 191 username_ = value; |
168 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, username_); | 192 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, username_); |
| 193 profile_->GetPrefs()->SetBoolean(prefs::kSyncUsingOAuth, false); |
169 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); | 194 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); |
170 | 195 |
171 GoogleServiceSigninSuccessDetails details(username_, password_); | 196 GoogleServiceSigninSuccessDetails details(username_, password_); |
172 NotificationService::current()->Notify( | 197 NotificationService::current()->Notify( |
173 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, | 198 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, |
174 Source<Profile>(profile_), | 199 Source<Profile>(profile_), |
175 Details<const GoogleServiceSigninSuccessDetails>(&details)); | 200 Details<const GoogleServiceSigninSuccessDetails>(&details)); |
176 | 201 |
177 password_.clear(); // Don't need it anymore. | 202 password_.clear(); // Don't need it anymore. |
178 | 203 |
179 profile_->GetTokenService()->UpdateCredentials(last_result_); | 204 profile_->GetTokenService()->UpdateCredentials(last_result_); |
180 DCHECK(profile_->GetTokenService()->AreCredentialsValid()); | 205 DCHECK(profile_->GetTokenService()->AreCredentialsValid()); |
181 profile_->GetTokenService()->StartFetchingTokens(); | 206 profile_->GetTokenService()->StartFetchingTokens(); |
182 } | 207 } |
183 | 208 |
184 void SigninManager::OnGetUserInfoKeyNotFound(const std::string& key) { | 209 void SigninManager::OnGetUserInfoKeyNotFound(const std::string& key) { |
| 210 DCHECK(!browser_sync::IsUsingOAuth()); |
185 DCHECK(key == kGetInfoEmailKey); | 211 DCHECK(key == kGetInfoEmailKey); |
186 LOG(ERROR) << "Account is not associated with a valid email address. " | 212 LOG(ERROR) << "Account is not associated with a valid email address. " |
187 << "Login failed."; | 213 << "Login failed."; |
188 OnClientLoginFailure(GoogleServiceAuthError( | 214 OnClientLoginFailure(GoogleServiceAuthError( |
189 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); | 215 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS)); |
190 } | 216 } |
191 | 217 |
192 void SigninManager::OnGetUserInfoFailure(const GoogleServiceAuthError& error) { | 218 void SigninManager::OnGetUserInfoFailure(const GoogleServiceAuthError& error) { |
| 219 DCHECK(!browser_sync::IsUsingOAuth()); |
193 LOG(ERROR) << "Unable to retreive the canonical email address. Login failed."; | 220 LOG(ERROR) << "Unable to retreive the canonical email address. Login failed."; |
194 OnClientLoginFailure(error); | 221 OnClientLoginFailure(error); |
195 } | 222 } |
196 | 223 |
197 void SigninManager::OnTokenAuthFailure(const GoogleServiceAuthError& error) { | 224 void SigninManager::OnTokenAuthFailure(const GoogleServiceAuthError& error) { |
| 225 DCHECK(!browser_sync::IsUsingOAuth()); |
198 #if !defined(OS_CHROMEOS) | 226 #if !defined(OS_CHROMEOS) |
199 VLOG(1) << "Unable to retrieve the token auth."; | 227 VLOG(1) << "Unable to retrieve the token auth."; |
200 CleanupNotificationRegistration(); | 228 CleanupNotificationRegistration(); |
201 #endif | 229 #endif |
202 } | 230 } |
203 | 231 |
204 void SigninManager::OnClientLoginFailure(const GoogleServiceAuthError& error) { | 232 void SigninManager::OnClientLoginFailure(const GoogleServiceAuthError& error) { |
| 233 DCHECK(!browser_sync::IsUsingOAuth()); |
205 NotificationService::current()->Notify( | 234 NotificationService::current()->Notify( |
206 chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, | 235 chrome::NOTIFICATION_GOOGLE_SIGNIN_FAILED, |
207 Source<Profile>(profile_), | 236 Source<Profile>(profile_), |
208 Details<const GoogleServiceAuthError>(&error)); | 237 Details<const GoogleServiceAuthError>(&error)); |
209 | 238 |
210 // We don't sign-out if the password was valid and we're just dealing with | 239 // We don't sign-out if the password was valid and we're just dealing with |
211 // a second factor error, and we don't sign out if we're dealing with | 240 // a second factor error, and we don't sign out if we're dealing with |
212 // an invalid access code (again, because the password was valid). | 241 // an invalid access code (again, because the password was valid). |
213 bool invalid_gaia = error.state() == | 242 bool invalid_gaia = error.state() == |
214 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS; | 243 GoogleServiceAuthError::INVALID_GAIA_CREDENTIALS; |
215 if (error.state() == GoogleServiceAuthError::TWO_FACTOR || | 244 if (error.state() == GoogleServiceAuthError::TWO_FACTOR || |
216 (had_two_factor_error_ && invalid_gaia)) { | 245 (had_two_factor_error_ && invalid_gaia)) { |
217 had_two_factor_error_ = true; | 246 had_two_factor_error_ = true; |
218 return; | 247 return; |
219 } | 248 } |
220 | 249 |
221 SignOut(); | 250 SignOut(); |
222 } | 251 } |
223 | 252 |
224 void SigninManager::OnGetOAuthTokenSuccess(const std::string& oauth_token) { | 253 void SigninManager::OnGetOAuthTokenSuccess(const std::string& oauth_token) { |
| 254 DCHECK(browser_sync::IsUsingOAuth()); |
225 VLOG(1) << "SigninManager::SigninManager::OnGetOAuthTokenSuccess"; | 255 VLOG(1) << "SigninManager::SigninManager::OnGetOAuthTokenSuccess"; |
226 } | 256 } |
227 | 257 |
228 void SigninManager::OnGetOAuthTokenFailure() { | 258 void SigninManager::OnGetOAuthTokenFailure() { |
229 VLOG(1) << "SigninManager::OnGetOAuthTokenFailure"; | 259 DCHECK(browser_sync::IsUsingOAuth()); |
| 260 LOG(WARNING) << "SigninManager::OnGetOAuthTokenFailure"; |
230 } | 261 } |
231 | 262 |
232 void SigninManager::OnOAuthGetAccessTokenSuccess(const std::string& token, | 263 void SigninManager::OnOAuthGetAccessTokenSuccess(const std::string& token, |
233 const std::string& secret) { | 264 const std::string& secret) { |
| 265 DCHECK(browser_sync::IsUsingOAuth()); |
234 VLOG(1) << "SigninManager::OnOAuthGetAccessTokenSuccess"; | 266 VLOG(1) << "SigninManager::OnOAuthGetAccessTokenSuccess"; |
| 267 profile_->GetTokenService()->UpdateOAuthCredentials(token, secret); |
235 } | 268 } |
236 | 269 |
237 void SigninManager::OnOAuthGetAccessTokenFailure( | 270 void SigninManager::OnOAuthGetAccessTokenFailure( |
238 const GoogleServiceAuthError& error) { | 271 const GoogleServiceAuthError& error) { |
239 VLOG(1) << "SigninManager::OnOAuthGetAccessTokenFailure"; | 272 DCHECK(browser_sync::IsUsingOAuth()); |
| 273 LOG(WARNING) << "SigninManager::OnOAuthGetAccessTokenFailure"; |
240 } | 274 } |
241 | 275 |
242 void SigninManager::OnOAuthWrapBridgeSuccess(const std::string& service_name, | 276 void SigninManager::OnOAuthWrapBridgeSuccess(const std::string& service_name, |
243 const std::string& token, | 277 const std::string& token, |
244 const std::string& expires_in) { | 278 const std::string& expires_in) { |
| 279 DCHECK(browser_sync::IsUsingOAuth()); |
245 VLOG(1) << "SigninManager::OnOAuthWrapBridgeSuccess"; | 280 VLOG(1) << "SigninManager::OnOAuthWrapBridgeSuccess"; |
246 } | 281 } |
247 | 282 |
248 void SigninManager::OnOAuthWrapBridgeFailure( | 283 void SigninManager::OnOAuthWrapBridgeFailure( |
249 const std::string& service_scope, | 284 const std::string& service_scope, |
250 const GoogleServiceAuthError& error) { | 285 const GoogleServiceAuthError& error) { |
251 VLOG(1) << "SigninManager::OnOAuthWrapBridgeFailure"; | 286 DCHECK(browser_sync::IsUsingOAuth()); |
| 287 LOG(WARNING) << "SigninManager::OnOAuthWrapBridgeFailure"; |
252 } | 288 } |
253 | 289 |
| 290 // NOTE: userinfo is an OAuth request similar to ClientLogin's GetUserInfo |
254 void SigninManager::OnUserInfoSuccess(const std::string& email) { | 291 void SigninManager::OnUserInfoSuccess(const std::string& email) { |
255 VLOG(1) << "SigninManager::OnUserInfoSuccess(\"" << email << "\")"; | 292 DCHECK(browser_sync::IsUsingOAuth()); |
| 293 VLOG(1) << "Sync signin for " << email << " is complete."; |
| 294 oauth_username_ = email; |
| 295 profile_->GetPrefs()->SetString( |
| 296 prefs::kGoogleServicesUsername, oauth_username_); |
| 297 profile_->GetPrefs()->SetBoolean(prefs::kSyncUsingOAuth, true); |
| 298 profile_->GetPrefs()->ScheduleSavePersistentPrefs(); |
| 299 |
| 300 DCHECK(password_.empty()); |
| 301 GoogleServiceSigninSuccessDetails details(oauth_username_, ""); |
| 302 NotificationService::current()->Notify( |
| 303 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, |
| 304 Source<Profile>(profile_), |
| 305 Details<const GoogleServiceSigninSuccessDetails>(&details)); |
| 306 |
| 307 DCHECK(profile_->GetTokenService()->AreOAuthCredentialsValid()); |
| 308 profile_->GetTokenService()->StartFetchingOAuthTokens(); |
256 } | 309 } |
257 | 310 |
258 void SigninManager::OnUserInfoFailure(const GoogleServiceAuthError& error) { | 311 void SigninManager::OnUserInfoFailure(const GoogleServiceAuthError& error) { |
259 VLOG(1) << "SigninManager::OnUserInfoFailure"; | 312 DCHECK(browser_sync::IsUsingOAuth()); |
| 313 LOG(WARNING) << "SigninManager::OnUserInfoFailure"; |
260 } | 314 } |
261 | 315 |
262 void SigninManager::Observe(int type, | 316 void SigninManager::Observe(int type, |
263 const NotificationSource& source, | 317 const NotificationSource& source, |
264 const NotificationDetails& details) { | 318 const NotificationDetails& details) { |
265 #if !defined(OS_CHROMEOS) | 319 #if !defined(OS_CHROMEOS) |
266 DCHECK(type == chrome::NOTIFICATION_TOKEN_AVAILABLE); | 320 DCHECK(type == chrome::NOTIFICATION_TOKEN_AVAILABLE); |
267 TokenService::TokenAvailableDetails* tok_details = | 321 TokenService::TokenAvailableDetails* tok_details = |
268 Details<TokenService::TokenAvailableDetails>(details).ptr(); | 322 Details<TokenService::TokenAvailableDetails>(details).ptr(); |
269 | 323 |
270 // If a GAIA service token has become available, use it to pre-login the | 324 // If a GAIA service token has become available, use it to pre-login the |
271 // user to other services that depend on GAIA credentials. | 325 // user to other services that depend on GAIA credentials. |
272 if (tok_details->service() == GaiaConstants::kGaiaService) { | 326 if (tok_details->service() == GaiaConstants::kGaiaService) { |
273 if (client_login_.get() == NULL) { | 327 if (client_login_.get() == NULL) { |
274 client_login_.reset(new GaiaAuthFetcher(this, | 328 client_login_.reset(new GaiaAuthFetcher(this, |
275 GaiaConstants::kChromeSource, | 329 GaiaConstants::kChromeSource, |
276 profile_->GetRequestContext())); | 330 profile_->GetRequestContext())); |
277 } | 331 } |
278 | 332 |
279 client_login_->StartTokenAuth(tok_details->token()); | 333 client_login_->StartTokenAuth(tok_details->token()); |
280 | 334 |
281 // We only want to do this once per sign-in. | 335 // We only want to do this once per sign-in. |
282 CleanupNotificationRegistration(); | 336 CleanupNotificationRegistration(); |
283 } | 337 } |
284 #endif | 338 #endif |
285 } | 339 } |
OLD | NEW |