OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/signin/easy_unlock_service_regular.h" | 5 #include "chrome/browser/signin/easy_unlock_service_regular.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/prefs/pref_service.h" | 9 #include "base/prefs/pref_service.h" |
10 #include "base/prefs/scoped_user_pref_update.h" | 10 #include "base/prefs/scoped_user_pref_update.h" |
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
86 weak_ptr_factory_(this) { | 86 weak_ptr_factory_(this) { |
87 } | 87 } |
88 | 88 |
89 EasyUnlockServiceRegular::~EasyUnlockServiceRegular() { | 89 EasyUnlockServiceRegular::~EasyUnlockServiceRegular() { |
90 } | 90 } |
91 | 91 |
92 EasyUnlockService::Type EasyUnlockServiceRegular::GetType() const { | 92 EasyUnlockService::Type EasyUnlockServiceRegular::GetType() const { |
93 return EasyUnlockService::TYPE_REGULAR; | 93 return EasyUnlockService::TYPE_REGULAR; |
94 } | 94 } |
95 | 95 |
96 std::string EasyUnlockServiceRegular::GetUserEmail() const { | 96 user_manager::UserID EasyUnlockServiceRegular::GetUserID() const { |
97 const SigninManagerBase* signin_manager = | 97 return user_manager::UserID::FromUserEmail(GetUserEmail()); |
98 SigninManagerFactory::GetForProfileIfExists(profile()); | |
99 // |profile| has to be a signed-in profile with SigninManager already | |
100 // created. Otherwise, just crash to collect stack. | |
101 DCHECK(signin_manager); | |
102 const std::string user_email = signin_manager->GetAuthenticatedUsername(); | |
103 return user_email.empty() ? user_email : gaia::CanonicalizeEmail(user_email); | |
104 } | 98 } |
105 | 99 |
106 void EasyUnlockServiceRegular::LaunchSetup() { | 100 void EasyUnlockServiceRegular::LaunchSetup() { |
107 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); | 101 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); |
108 #if defined(OS_CHROMEOS) | 102 #if defined(OS_CHROMEOS) |
109 // Force the user to reauthenticate by showing a modal overlay (similar to the | 103 // Force the user to reauthenticate by showing a modal overlay (similar to the |
110 // lock screen). The password obtained from the reauth is cached for a short | 104 // lock screen). The password obtained from the reauth is cached for a short |
111 // period of time and used to create the cryptohome keys for sign-in. | 105 // period of time and used to create the cryptohome keys for sign-in. |
112 if (short_lived_user_context_ && short_lived_user_context_->user_context()) { | 106 if (short_lived_user_context_ && short_lived_user_context_->user_context()) { |
113 OpenSetupApp(); | 107 OpenSetupApp(); |
(...skipping 30 matching lines...) Expand all Loading... |
144 base::Bind(&EasyUnlockServiceRegular::SetHardlockAfterKeyOperation, | 138 base::Bind(&EasyUnlockServiceRegular::SetHardlockAfterKeyOperation, |
145 weak_ptr_factory_.GetWeakPtr(), | 139 weak_ptr_factory_.GetWeakPtr(), |
146 EasyUnlockScreenlockStateHandler::NO_PAIRING)); | 140 EasyUnlockScreenlockStateHandler::NO_PAIRING)); |
147 } | 141 } |
148 } | 142 } |
149 | 143 |
150 void EasyUnlockServiceRegular::SetHardlockAfterKeyOperation( | 144 void EasyUnlockServiceRegular::SetHardlockAfterKeyOperation( |
151 EasyUnlockScreenlockStateHandler::HardlockState state_on_success, | 145 EasyUnlockScreenlockStateHandler::HardlockState state_on_success, |
152 bool success) { | 146 bool success) { |
153 if (success) | 147 if (success) |
154 SetHardlockStateForUser(GetUserEmail(), state_on_success); | 148 SetHardlockStateForUser(GetUserID(), state_on_success); |
155 | 149 |
156 // Even if the refresh keys operation suceeded, we still fetch and check the | 150 // Even if the refresh keys operation suceeded, we still fetch and check the |
157 // cryptohome keys against the keys in local preferences as a sanity check. | 151 // cryptohome keys against the keys in local preferences as a sanity check. |
158 CheckCryptohomeKeysAndMaybeHardlock(); | 152 CheckCryptohomeKeysAndMaybeHardlock(); |
159 } | 153 } |
160 #endif | 154 #endif |
161 | 155 |
162 const base::DictionaryValue* EasyUnlockServiceRegular::GetPermitAccess() const { | 156 const base::DictionaryValue* EasyUnlockServiceRegular::GetPermitAccess() const { |
163 const base::DictionaryValue* pairing_dict = | 157 const base::DictionaryValue* pairing_dict = |
164 profile()->GetPrefs()->GetDictionary(prefs::kEasyUnlockPairing); | 158 profile()->GetPrefs()->GetDictionary(prefs::kEasyUnlockPairing); |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
260 | 254 |
261 std::string EasyUnlockServiceRegular::GetChallenge() const { | 255 std::string EasyUnlockServiceRegular::GetChallenge() const { |
262 return std::string(); | 256 return std::string(); |
263 } | 257 } |
264 | 258 |
265 std::string EasyUnlockServiceRegular::GetWrappedSecret() const { | 259 std::string EasyUnlockServiceRegular::GetWrappedSecret() const { |
266 return std::string(); | 260 return std::string(); |
267 } | 261 } |
268 | 262 |
269 void EasyUnlockServiceRegular::RecordEasySignInOutcome( | 263 void EasyUnlockServiceRegular::RecordEasySignInOutcome( |
270 const std::string& user_id, | 264 const user_manager::UserID& user_id, |
271 bool success) const { | 265 bool success) const { |
272 NOTREACHED(); | 266 NOTREACHED(); |
273 } | 267 } |
274 | 268 |
275 void EasyUnlockServiceRegular::RecordPasswordLoginEvent( | 269 void EasyUnlockServiceRegular::RecordPasswordLoginEvent( |
276 const std::string& user_id) const { | 270 const user_manager::UserID& user_id) const { |
277 NOTREACHED(); | 271 NOTREACHED(); |
278 } | 272 } |
279 | 273 |
280 void EasyUnlockServiceRegular::StartAutoPairing( | 274 void EasyUnlockServiceRegular::StartAutoPairing( |
281 const AutoPairingResultCallback& callback) { | 275 const AutoPairingResultCallback& callback) { |
282 if (!auto_pairing_callback_.is_null()) { | 276 if (!auto_pairing_callback_.is_null()) { |
283 LOG(ERROR) | 277 LOG(ERROR) |
284 << "Start auto pairing when there is another auto pairing requested."; | 278 << "Start auto pairing when there is another auto pairing requested."; |
285 callback.Run(false, std::string()); | 279 callback.Run(false, std::string()); |
286 return; | 280 return; |
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
385 if (will_unlock_using_easy_unlock_) { | 379 if (will_unlock_using_easy_unlock_) { |
386 RecordEasyUnlockScreenUnlockDuration( | 380 RecordEasyUnlockScreenUnlockDuration( |
387 base::TimeTicks::Now() - lock_screen_last_shown_timestamp_); | 381 base::TimeTicks::Now() - lock_screen_last_shown_timestamp_); |
388 } | 382 } |
389 } | 383 } |
390 | 384 |
391 will_unlock_using_easy_unlock_ = false; | 385 will_unlock_using_easy_unlock_ = false; |
392 } | 386 } |
393 | 387 |
394 void EasyUnlockServiceRegular::OnFocusedUserChanged( | 388 void EasyUnlockServiceRegular::OnFocusedUserChanged( |
395 const std::string& user_id) { | 389 const user_manager::UserID& user_id) { |
396 // Nothing to do. | 390 // Nothing to do. |
397 } | 391 } |
398 | 392 |
| 393 std::string EasyUnlockServiceRegular::GetUserEmail() const { |
| 394 const SigninManagerBase* signin_manager = |
| 395 SigninManagerFactory::GetForProfileIfExists(profile()); |
| 396 // |profile| has to be a signed-in profile with SigninManager already |
| 397 // created. Otherwise, just crash to collect stack. |
| 398 DCHECK(signin_manager); |
| 399 const std::string user_email = signin_manager->GetAuthenticatedUsername(); |
| 400 return user_email.empty() ? user_email : gaia::CanonicalizeEmail(user_email); |
| 401 } |
| 402 |
399 void EasyUnlockServiceRegular::OnPrefsChanged() { | 403 void EasyUnlockServiceRegular::OnPrefsChanged() { |
400 SyncProfilePrefsToLocalState(); | 404 SyncProfilePrefsToLocalState(); |
401 UpdateAppState(); | 405 UpdateAppState(); |
402 } | 406 } |
403 | 407 |
404 void EasyUnlockServiceRegular::SetTurnOffFlowStatus(TurnOffFlowStatus status) { | 408 void EasyUnlockServiceRegular::SetTurnOffFlowStatus(TurnOffFlowStatus status) { |
405 turn_off_flow_status_ = status; | 409 turn_off_flow_status_ = status; |
406 NotifyTurnOffOperationStatusChanged(); | 410 NotifyTurnOffOperationStatusChanged(); |
407 } | 411 } |
408 | 412 |
(...skipping 25 matching lines...) Expand all Loading... |
434 new base::DictionaryValue()); | 438 new base::DictionaryValue()); |
435 user_prefs_dict->SetBooleanWithoutPathExpansion( | 439 user_prefs_dict->SetBooleanWithoutPathExpansion( |
436 prefs::kEasyUnlockProximityRequired, | 440 prefs::kEasyUnlockProximityRequired, |
437 profile_prefs->GetBoolean(prefs::kEasyUnlockProximityRequired)); | 441 profile_prefs->GetBoolean(prefs::kEasyUnlockProximityRequired)); |
438 | 442 |
439 DictionaryPrefUpdate update(local_state, | 443 DictionaryPrefUpdate update(local_state, |
440 prefs::kEasyUnlockLocalStateUserPrefs); | 444 prefs::kEasyUnlockLocalStateUserPrefs); |
441 std::string user_email = GetUserEmail(); | 445 std::string user_email = GetUserEmail(); |
442 update->SetWithoutPathExpansion(user_email, user_prefs_dict.Pass()); | 446 update->SetWithoutPathExpansion(user_email, user_prefs_dict.Pass()); |
443 } | 447 } |
OLD | NEW |