OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/existing_user_controller.h" | 5 #include "chrome/browser/chromeos/login/existing_user_controller.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
11 #include "base/message_loop.h" | 11 #include "base/message_loop.h" |
12 #include "base/stringprintf.h" | 12 #include "base/stringprintf.h" |
13 #include "base/string_util.h" | 13 #include "base/string_util.h" |
14 #include "base/utf_string_conversions.h" | 14 #include "base/utf_string_conversions.h" |
15 #include "base/values.h" | 15 #include "base/values.h" |
16 #include "chrome/browser/browser_process.h" | 16 #include "chrome/browser/browser_process.h" |
17 #include "chrome/browser/chromeos/boot_times_loader.h" | 17 #include "chrome/browser/chromeos/boot_times_loader.h" |
| 18 #include "chrome/browser/chromeos/cros_settings.h" |
18 #include "chrome/browser/chromeos/cros/cros_library.h" | 19 #include "chrome/browser/chromeos/cros/cros_library.h" |
19 #include "chrome/browser/chromeos/cros/cryptohome_library.h" | 20 #include "chrome/browser/chromeos/cros/cryptohome_library.h" |
20 #include "chrome/browser/chromeos/cros/login_library.h" | 21 #include "chrome/browser/chromeos/cros/login_library.h" |
21 #include "chrome/browser/chromeos/cros/network_library.h" | 22 #include "chrome/browser/chromeos/cros/network_library.h" |
22 #include "chrome/browser/chromeos/customization_document.h" | 23 #include "chrome/browser/chromeos/customization_document.h" |
23 #include "chrome/browser/chromeos/login/helper.h" | 24 #include "chrome/browser/chromeos/login/helper.h" |
24 #include "chrome/browser/chromeos/login/login_display_host.h" | 25 #include "chrome/browser/chromeos/login/login_display_host.h" |
25 #include "chrome/browser/chromeos/login/views_login_display.h" | 26 #include "chrome/browser/chromeos/login/views_login_display.h" |
26 #include "chrome/browser/chromeos/login/wizard_accessibility_helper.h" | 27 #include "chrome/browser/chromeos/login/wizard_accessibility_helper.h" |
27 #include "chrome/browser/chromeos/login/wizard_controller.h" | 28 #include "chrome/browser/chromeos/login/wizard_controller.h" |
28 #include "chrome/browser/chromeos/status/status_area_view.h" | 29 #include "chrome/browser/chromeos/status/status_area_view.h" |
29 #include "chrome/browser/chromeos/user_cros_settings_provider.h" | |
30 #include "chrome/browser/google/google_util.h" | 30 #include "chrome/browser/google/google_util.h" |
31 #include "chrome/browser/prefs/pref_service.h" | 31 #include "chrome/browser/prefs/pref_service.h" |
32 #include "chrome/browser/profiles/profile_manager.h" | 32 #include "chrome/browser/profiles/profile_manager.h" |
33 #include "chrome/browser/ui/views/window.h" | 33 #include "chrome/browser/ui/views/window.h" |
34 #include "chrome/common/chrome_notification_types.h" | 34 #include "chrome/common/chrome_notification_types.h" |
35 #include "chrome/common/chrome_switches.h" | 35 #include "chrome/common/chrome_switches.h" |
36 #include "chrome/common/net/gaia/google_service_auth_error.h" | 36 #include "chrome/common/net/gaia/google_service_auth_error.h" |
37 #include "chrome/common/pref_names.h" | 37 #include "chrome/common/pref_names.h" |
38 #include "content/common/content_notification_types.h" | 38 #include "content/common/content_notification_types.h" |
39 #include "content/common/notification_service.h" | 39 #include "content/common/notification_service.h" |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
73 // static | 73 // static |
74 ExistingUserController* ExistingUserController::current_controller_ = NULL; | 74 ExistingUserController* ExistingUserController::current_controller_ = NULL; |
75 | 75 |
76 //////////////////////////////////////////////////////////////////////////////// | 76 //////////////////////////////////////////////////////////////////////////////// |
77 // ExistingUserController, public: | 77 // ExistingUserController, public: |
78 | 78 |
79 ExistingUserController::ExistingUserController(LoginDisplayHost* host) | 79 ExistingUserController::ExistingUserController(LoginDisplayHost* host) |
80 : login_status_consumer_(NULL), | 80 : login_status_consumer_(NULL), |
81 host_(host), | 81 host_(host), |
82 num_login_attempts_(0), | 82 num_login_attempts_(0), |
83 user_settings_(new UserCrosSettingsProvider), | 83 user_settings_(CrosSettings::Get()), |
84 weak_factory_(this), | 84 weak_factory_(this), |
85 is_owner_login_(false) { | 85 is_owner_login_(false) { |
86 DCHECK(current_controller_ == NULL); | 86 DCHECK(current_controller_ == NULL); |
87 current_controller_ = this; | 87 current_controller_ = this; |
88 | 88 |
89 login_display_ = host_->CreateLoginDisplay(this); | 89 login_display_ = host_->CreateLoginDisplay(this); |
90 | 90 |
91 registrar_.Add(this, | 91 registrar_.Add(this, |
92 chrome::NOTIFICATION_LOGIN_USER_IMAGE_CHANGED, | 92 chrome::NOTIFICATION_LOGIN_USER_IMAGE_CHANGED, |
93 NotificationService::AllSources()); | 93 NotificationService::AllSources()); |
94 } | 94 } |
95 | 95 |
96 void ExistingUserController::Init(const UserVector& users) { | 96 void ExistingUserController::Init(const UserVector& users) { |
97 UserVector filtered_users; | 97 UserVector filtered_users; |
98 if (UserCrosSettingsProvider::cached_show_users_on_signin()) { | 98 bool show_users_on_signin; |
99 for (size_t i = 0; i < users.size(); ++i) | 99 |
| 100 // TODO(pastarmovj): Make this class an observer of the CrosSettings to be |
| 101 // able to update the UI whenever policy is loaded. |
| 102 user_settings_->GetBoolean(kAccountsPrefShowUserNamesOnSignIn, |
| 103 &show_users_on_signin); |
| 104 if (show_users_on_signin) { |
| 105 bool allow_new_user = false; |
| 106 const base::ListValue *user_list; |
| 107 user_settings_->GetBoolean(kAccountsPrefAllowNewUser, &allow_new_user); |
| 108 user_settings_->GetList(kAccountsPrefUsers, &user_list); |
| 109 for (size_t i = 0; i < users.size(); ++i) { |
| 110 base::StringValue email(users[i].email()); |
100 // TODO(xiyuan): Clean user profile whose email is not in whitelist. | 111 // TODO(xiyuan): Clean user profile whose email is not in whitelist. |
101 if (UserCrosSettingsProvider::cached_allow_new_user() || | 112 if (allow_new_user || |
102 UserCrosSettingsProvider::IsEmailInCachedWhitelist( | 113 user_list->Find(email) != user_list->end()) { |
103 users[i].email())) { | |
104 filtered_users.push_back(users[i]); | 114 filtered_users.push_back(users[i]); |
105 } | 115 } |
| 116 } |
106 } | 117 } |
107 | 118 |
108 // If no user pods are visible, fallback to single new user pod which will | 119 // If no user pods are visible, fallback to single new user pod which will |
109 // have guest session link. | 120 // have guest session link. |
110 bool show_guest = UserCrosSettingsProvider::cached_allow_guest() && | 121 bool show_guest; |
111 !filtered_users.empty(); | 122 user_settings_->GetBoolean(kAccountsPrefAllowGuest, &show_guest); |
| 123 show_guest &= !filtered_users.empty(); |
112 bool show_new_user = true; | 124 bool show_new_user = true; |
113 login_display_->set_parent_window(GetNativeWindow()); | 125 login_display_->set_parent_window(GetNativeWindow()); |
114 login_display_->Init(filtered_users, show_guest, show_new_user); | 126 login_display_->Init(filtered_users, show_guest, show_new_user); |
115 | 127 |
116 LoginUtils::Get()->PrewarmAuthentication(); | 128 LoginUtils::Get()->PrewarmAuthentication(); |
117 if (CrosLibrary::Get()->EnsureLoaded()) | 129 if (CrosLibrary::Get()->EnsureLoaded()) |
118 CrosLibrary::Get()->GetLoginLibrary()->EmitLoginPromptReady(); | 130 CrosLibrary::Get()->GetLoginLibrary()->EmitLoginPromptReady(); |
119 StartAutomaticFreeDiskSpaceControl(); | 131 StartAutomaticFreeDiskSpaceControl(); |
120 } | 132 } |
121 | 133 |
(...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
225 false, true); | 237 false, true); |
226 } | 238 } |
227 | 239 |
228 void ExistingUserController::LoginAsGuest() { | 240 void ExistingUserController::LoginAsGuest() { |
229 SetStatusAreaEnabled(false); | 241 SetStatusAreaEnabled(false); |
230 // Disable clicking on other windows. | 242 // Disable clicking on other windows. |
231 login_display_->SetUIEnabled(false); | 243 login_display_->SetUIEnabled(false); |
232 | 244 |
233 // Check allow_guest in case this call is fired from key accelerator. | 245 // Check allow_guest in case this call is fired from key accelerator. |
234 // Must not proceed without signature verification. | 246 // Must not proceed without signature verification. |
235 bool trusted_setting_available = user_settings_->RequestTrustedAllowGuest( | 247 bool trusted_setting_available = user_settings_->GetTrusted( |
| 248 kAccountsPrefAllowGuest, |
236 base::Bind(&ExistingUserController::LoginAsGuest, | 249 base::Bind(&ExistingUserController::LoginAsGuest, |
237 weak_factory_.GetWeakPtr())); | 250 weak_factory_.GetWeakPtr())); |
238 if (!trusted_setting_available) { | 251 if (!trusted_setting_available) { |
239 // Value of AllowGuest setting is still not verified. | 252 // Value of AllowGuest setting is still not verified. |
240 // Another attempt will be invoked again after verification completion. | 253 // Another attempt will be invoked again after verification completion. |
241 return; | 254 return; |
242 } | 255 } |
243 if (!UserCrosSettingsProvider::cached_allow_guest()) { | 256 bool allow_guest; |
| 257 user_settings_->GetBoolean(kAccountsPrefAllowGuest, &allow_guest); |
| 258 if (!allow_guest) { |
244 // Disallowed. | 259 // Disallowed. |
245 return; | 260 return; |
246 } | 261 } |
247 | 262 |
248 // Only one instance of LoginPerformer should exist at a time. | 263 // Only one instance of LoginPerformer should exist at a time. |
249 login_performer_.reset(NULL); | 264 login_performer_.reset(NULL); |
250 login_performer_.reset(new LoginPerformer(this)); | 265 login_performer_.reset(new LoginPerformer(this)); |
251 login_performer_->LoginOffTheRecord(); | 266 login_performer_->LoginOffTheRecord(); |
252 WizardAccessibilityHelper::GetInstance()->MaybeSpeak( | 267 WizardAccessibilityHelper::GetInstance()->MaybeSpeak( |
253 l10n_util::GetStringUTF8(IDS_CHROMEOS_ACC_LOGIN_SIGNIN_OFFRECORD).c_str(), | 268 l10n_util::GetStringUTF8(IDS_CHROMEOS_ACC_LOGIN_SIGNIN_OFFRECORD).c_str(), |
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
324 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING_HOSTED, error); | 339 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING_HOSTED, error); |
325 } else if ((active_network && active_network->restricted_pool()) || | 340 } else if ((active_network && active_network->restricted_pool()) || |
326 (failure.reason() == LoginFailure::NETWORK_AUTH_FAILED && | 341 (failure.reason() == LoginFailure::NETWORK_AUTH_FAILED && |
327 failure.error().state() == | 342 failure.error().state() == |
328 GoogleServiceAuthError::SERVICE_UNAVAILABLE)) { | 343 GoogleServiceAuthError::SERVICE_UNAVAILABLE)) { |
329 // Use explicit captive portal state (restricted_pool()) or implicit one. | 344 // Use explicit captive portal state (restricted_pool()) or implicit one. |
330 // SERVICE_UNAVAILABLE is generated in 2 cases: | 345 // SERVICE_UNAVAILABLE is generated in 2 cases: |
331 // 1. ClientLogin returns ServiceUnavailable code. | 346 // 1. ClientLogin returns ServiceUnavailable code. |
332 // 2. Internet connectivity may be behind the captive portal. | 347 // 2. Internet connectivity may be behind the captive portal. |
333 // Suggesting user to try sign in to a portal in Guest mode. | 348 // Suggesting user to try sign in to a portal in Guest mode. |
334 if (UserCrosSettingsProvider::cached_allow_guest()) | 349 bool allow_guest; |
| 350 user_settings_->GetBoolean(kAccountsPrefAllowGuest, &allow_guest); |
| 351 if (allow_guest) |
335 ShowError(IDS_LOGIN_ERROR_CAPTIVE_PORTAL, error); | 352 ShowError(IDS_LOGIN_ERROR_CAPTIVE_PORTAL, error); |
336 else | 353 else |
337 ShowError(IDS_LOGIN_ERROR_CAPTIVE_PORTAL_NO_GUEST_MODE, error); | 354 ShowError(IDS_LOGIN_ERROR_CAPTIVE_PORTAL_NO_GUEST_MODE, error); |
338 } else { | 355 } else { |
339 if (!is_known_user) | 356 if (!is_known_user) |
340 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING_NEW, error); | 357 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING_NEW, error); |
341 else | 358 else |
342 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING, error); | 359 ShowError(IDS_LOGIN_ERROR_AUTHENTICATING, error); |
343 } | 360 } |
344 } | 361 } |
(...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
465 ActivateWizard(WizardController::kRegistrationScreenName); | 482 ActivateWizard(WizardController::kRegistrationScreenName); |
466 } | 483 } |
467 | 484 |
468 if (login_status_consumer_) | 485 if (login_status_consumer_) |
469 login_status_consumer_->OnOffTheRecordLoginSuccess(); | 486 login_status_consumer_->OnOffTheRecordLoginSuccess(); |
470 } | 487 } |
471 | 488 |
472 void ExistingUserController::OnPasswordChangeDetected( | 489 void ExistingUserController::OnPasswordChangeDetected( |
473 const GaiaAuthConsumer::ClientLoginResult& credentials) { | 490 const GaiaAuthConsumer::ClientLoginResult& credentials) { |
474 // Must not proceed without signature verification. | 491 // Must not proceed without signature verification. |
475 bool trusted_setting_available = user_settings_->RequestTrustedOwner( | 492 bool trusted_setting_available = user_settings_->GetTrusted( |
| 493 kDeviceOwner, |
476 base::Bind(&ExistingUserController::OnPasswordChangeDetected, | 494 base::Bind(&ExistingUserController::OnPasswordChangeDetected, |
477 weak_factory_.GetWeakPtr(), credentials)); | 495 weak_factory_.GetWeakPtr(), credentials)); |
| 496 |
478 if (!trusted_setting_available) { | 497 if (!trusted_setting_available) { |
479 // Value of owner email is still not verified. | 498 // Value of owner email is still not verified. |
480 // Another attempt will be invoked after verification completion. | 499 // Another attempt will be invoked after verification completion. |
481 return; | 500 return; |
482 } | 501 } |
483 | 502 |
484 // Passing 'false' here enables "full sync" mode in the dialog, | 503 // Passing 'false' here enables "full sync" mode in the dialog, |
485 // which disables the requirement for the old owner password, | 504 // which disables the requirement for the old owner password, |
486 // allowing us to recover from a lost owner password/homedir. | 505 // allowing us to recover from a lost owner password/homedir. |
487 // TODO(gspencer): We shouldn't have to erase stateful data when | 506 // TODO(gspencer): We shouldn't have to erase stateful data when |
(...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
570 help_topic_id = login_performer_->login_timed_out() ? | 589 help_topic_id = login_performer_->login_timed_out() ? |
571 HelpAppLauncher::HELP_CANT_ACCESS_ACCOUNT_OFFLINE : | 590 HelpAppLauncher::HELP_CANT_ACCESS_ACCOUNT_OFFLINE : |
572 HelpAppLauncher::HELP_CANT_ACCESS_ACCOUNT; | 591 HelpAppLauncher::HELP_CANT_ACCESS_ACCOUNT; |
573 break; | 592 break; |
574 } | 593 } |
575 | 594 |
576 login_display_->ShowError(error_id, num_login_attempts_, help_topic_id); | 595 login_display_->ShowError(error_id, num_login_attempts_, help_topic_id); |
577 } | 596 } |
578 | 597 |
579 void ExistingUserController::StartAutomaticFreeDiskSpaceControl() { | 598 void ExistingUserController::StartAutomaticFreeDiskSpaceControl() { |
580 bool trusted_owner_available = user_settings_->RequestTrustedOwner( | 599 bool trusted_owner_available = user_settings_->GetTrusted( |
| 600 kDeviceOwner, |
581 base::Bind(&ExistingUserController::StartAutomaticFreeDiskSpaceControl, | 601 base::Bind(&ExistingUserController::StartAutomaticFreeDiskSpaceControl, |
582 weak_factory_.GetWeakPtr())); | 602 weak_factory_.GetWeakPtr())); |
583 if (!trusted_owner_available) { | 603 if (!trusted_owner_available) { |
584 // Value of owner email is still not verified. | 604 // Value of owner email is still not verified. |
585 // Another attempt will be invoked after verification completion. | 605 // Another attempt will be invoked after verification completion. |
586 return; | 606 return; |
587 } | 607 } |
588 if (CrosLibrary::Get()->EnsureLoaded()) { | 608 if (CrosLibrary::Get()->EnsureLoaded()) { |
589 CryptohomeLibrary* cryptohomed = CrosLibrary::Get()->GetCryptohomeLibrary(); | 609 CryptohomeLibrary* cryptohomed = CrosLibrary::Get()->GetCryptohomeLibrary(); |
590 cryptohomed->AsyncSetOwnerUser( | 610 std::string owner; |
591 UserCrosSettingsProvider::cached_owner(), NULL); | 611 user_settings_->GetString(kDeviceOwner, &owner); |
| 612 cryptohomed->AsyncSetOwnerUser(owner, NULL); |
592 cryptohomed->AsyncDoAutomaticFreeDiskSpaceControl(NULL); | 613 cryptohomed->AsyncDoAutomaticFreeDiskSpaceControl(NULL); |
593 } | 614 } |
594 } | 615 } |
595 | 616 |
596 } // namespace chromeos | 617 } // namespace chromeos |
OLD | NEW |