Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(977)

Side by Side Diff: chrome/browser/signin/easy_unlock_service_signin_chromeos.cc

Issue 1165323004: We should use UserID object to identify users instead of username. Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/signin/easy_unlock_service_signin_chromeos.h" 5 #include "chrome/browser/signin/easy_unlock_service_signin_chromeos.h"
6 6
7 #include "base/basictypes.h" 7 #include "base/basictypes.h"
8 #include "base/bind.h" 8 #include "base/bind.h"
9 #include "base/location.h" 9 #include "base/location.h"
10 #include "base/logging.h" 10 #include "base/logging.h"
(...skipping 20 matching lines...) Expand all
31 31
32 // Calculates the backoff interval that should be used next. 32 // Calculates the backoff interval that should be used next.
33 // |backoff| The last backoff interval used. 33 // |backoff| The last backoff interval used.
34 uint32 GetNextBackoffInterval(uint32 backoff) { 34 uint32 GetNextBackoffInterval(uint32 backoff) {
35 if (backoff == 0u) 35 if (backoff == 0u)
36 return kInitialCryptohomeBackoffIntervalMs; 36 return kInitialCryptohomeBackoffIntervalMs;
37 return backoff * 2; 37 return backoff * 2;
38 } 38 }
39 39
40 void LoadDataForUser( 40 void LoadDataForUser(
41 const std::string& user_id, 41 const user_manager::UserID& user_id,
42 uint32 backoff_ms, 42 uint32 backoff_ms,
43 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback); 43 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback);
44 44
45 // Callback passed to |LoadDataForUser()|. 45 // Callback passed to |LoadDataForUser()|.
46 // If |LoadDataForUser| function succeeded, it invokes |callback| with the 46 // If |LoadDataForUser| function succeeded, it invokes |callback| with the
47 // results. 47 // results.
48 // If |LoadDataForUser| failed and further retries are allowed, schedules new 48 // If |LoadDataForUser| failed and further retries are allowed, schedules new
49 // |LoadDataForUser| call with some backoff. If no further retires are allowed, 49 // |LoadDataForUser| call with some backoff. If no further retires are allowed,
50 // it invokes |callback| with the |LoadDataForUser| results. 50 // it invokes |callback| with the |LoadDataForUser| results.
51 void RetryDataLoadOnError( 51 void RetryDataLoadOnError(
52 const std::string& user_id, 52 const user_manager::UserID& user_id,
53 uint32 backoff_ms, 53 uint32 backoff_ms,
54 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback, 54 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback,
55 bool success, 55 bool success,
56 const chromeos::EasyUnlockDeviceKeyDataList& data_list) { 56 const chromeos::EasyUnlockDeviceKeyDataList& data_list) {
57 if (success) { 57 if (success) {
58 callback.Run(success, data_list); 58 callback.Run(success, data_list);
59 return; 59 return;
60 } 60 }
61 61
62 uint32 next_backoff_ms = GetNextBackoffInterval(backoff_ms); 62 uint32 next_backoff_ms = GetNextBackoffInterval(backoff_ms);
63 if (next_backoff_ms > kMaxCryptohomeBackoffIntervalMs) { 63 if (next_backoff_ms > kMaxCryptohomeBackoffIntervalMs) {
64 callback.Run(false, data_list); 64 callback.Run(false, data_list);
65 return; 65 return;
66 } 66 }
67 67
68 base::ThreadTaskRunnerHandle::Get()->PostDelayedTask( 68 base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(
69 FROM_HERE, 69 FROM_HERE,
70 base::Bind(&LoadDataForUser, user_id, next_backoff_ms, callback), 70 base::Bind(&LoadDataForUser, user_id, next_backoff_ms, callback),
71 base::TimeDelta::FromMilliseconds(next_backoff_ms)); 71 base::TimeDelta::FromMilliseconds(next_backoff_ms));
72 } 72 }
73 73
74 // Loads device data list associated with the user's Easy unlock keys. 74 // Loads device data list associated with the user's Easy unlock keys.
75 void LoadDataForUser( 75 void LoadDataForUser(
76 const std::string& user_id, 76 const user_manager::UserID& user_id,
77 uint32 backoff_ms, 77 uint32 backoff_ms,
78 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback) { 78 const chromeos::EasyUnlockKeyManager::GetDeviceDataListCallback& callback) {
79 chromeos::EasyUnlockKeyManager* key_manager = 79 chromeos::EasyUnlockKeyManager* key_manager =
80 chromeos::UserSessionManager::GetInstance()->GetEasyUnlockKeyManager(); 80 chromeos::UserSessionManager::GetInstance()->GetEasyUnlockKeyManager();
81 DCHECK(key_manager); 81 DCHECK(key_manager);
82 82
83 key_manager->GetDeviceDataList( 83 key_manager->GetDeviceDataList(
84 chromeos::UserContext(user_id), 84 chromeos::UserContext(user_id),
85 base::Bind(&RetryDataLoadOnError, user_id, backoff_ms, callback)); 85 base::Bind(&RetryDataLoadOnError, user_id, backoff_ms, callback));
86 } 86 }
87 87
88 } // namespace 88 } // namespace
89 89
90 EasyUnlockServiceSignin::UserData::UserData() 90 EasyUnlockServiceSignin::UserData::UserData()
91 : state(EasyUnlockServiceSignin::USER_DATA_STATE_INITIAL) { 91 : state(EasyUnlockServiceSignin::USER_DATA_STATE_INITIAL) {
92 } 92 }
93 93
94 EasyUnlockServiceSignin::UserData::~UserData() {} 94 EasyUnlockServiceSignin::UserData::~UserData() {}
95 95
96 EasyUnlockServiceSignin::EasyUnlockServiceSignin(Profile* profile) 96 EasyUnlockServiceSignin::EasyUnlockServiceSignin(Profile* profile)
97 : EasyUnlockService(profile), 97 : EasyUnlockService(profile),
98 user_id_(std::string(), std::string()),
98 allow_cryptohome_backoff_(true), 99 allow_cryptohome_backoff_(true),
99 service_active_(false), 100 service_active_(false),
100 user_pod_last_focused_timestamp_(base::TimeTicks::Now()), 101 user_pod_last_focused_timestamp_(base::TimeTicks::Now()),
101 weak_ptr_factory_(this) { 102 weak_ptr_factory_(this) {
102 } 103 }
103 104
104 EasyUnlockServiceSignin::~EasyUnlockServiceSignin() { 105 EasyUnlockServiceSignin::~EasyUnlockServiceSignin() {
105 } 106 }
106 107
107 void EasyUnlockServiceSignin::SetCurrentUser(const std::string& user_id) { 108 void EasyUnlockServiceSignin::SetCurrentUser(const user_manager::UserID& user_id ) {
108 OnFocusedUserChanged(user_id); 109 OnFocusedUserChanged(user_id);
109 } 110 }
110 111
111 EasyUnlockService::Type EasyUnlockServiceSignin::GetType() const { 112 EasyUnlockService::Type EasyUnlockServiceSignin::GetType() const {
112 return EasyUnlockService::TYPE_SIGNIN; 113 return EasyUnlockService::TYPE_SIGNIN;
113 } 114 }
114 115
115 std::string EasyUnlockServiceSignin::GetUserEmail() const { 116 user_manager::UserID EasyUnlockServiceSignin::GetUserID() const {
116 return user_id_; 117 return user_id_;
117 } 118 }
118 119
119 void EasyUnlockServiceSignin::LaunchSetup() { 120 void EasyUnlockServiceSignin::LaunchSetup() {
120 NOTREACHED(); 121 NOTREACHED();
121 } 122 }
122 123
123 const base::DictionaryValue* EasyUnlockServiceSignin::GetPermitAccess() const { 124 const base::DictionaryValue* EasyUnlockServiceSignin::GetPermitAccess() const {
124 return NULL; 125 return NULL;
125 } 126 }
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
170 std::string EasyUnlockServiceSignin::GetWrappedSecret() const { 171 std::string EasyUnlockServiceSignin::GetWrappedSecret() const {
171 const UserData* data = FindLoadedDataForCurrentUser(); 172 const UserData* data = FindLoadedDataForCurrentUser();
172 // TODO(xiyuan): Use correct remote device instead of hard coded first one. 173 // TODO(xiyuan): Use correct remote device instead of hard coded first one.
173 uint32 device_index = 0; 174 uint32 device_index = 0;
174 if (!data || data->devices.size() <= device_index) 175 if (!data || data->devices.size() <= device_index)
175 return std::string(); 176 return std::string();
176 return data->devices[device_index].wrapped_secret; 177 return data->devices[device_index].wrapped_secret;
177 } 178 }
178 179
179 void EasyUnlockServiceSignin::RecordEasySignInOutcome( 180 void EasyUnlockServiceSignin::RecordEasySignInOutcome(
180 const std::string& user_id, 181 const user_manager::UserID& user_id,
181 bool success) const { 182 bool success) const {
182 DCHECK_EQ(GetUserEmail(), user_id); 183 DCHECK(GetUserID() == user_id);
183 184
184 RecordEasyUnlockSigninEvent( 185 RecordEasyUnlockSigninEvent(
185 success ? EASY_UNLOCK_SUCCESS : EASY_UNLOCK_FAILURE); 186 success ? EASY_UNLOCK_SUCCESS : EASY_UNLOCK_FAILURE);
186 if (success) { 187 if (success) {
187 RecordEasyUnlockSigninDuration( 188 RecordEasyUnlockSigninDuration(
188 base::TimeTicks::Now() - user_pod_last_focused_timestamp_); 189 base::TimeTicks::Now() - user_pod_last_focused_timestamp_);
189 } 190 }
190 DVLOG(1) << "Easy sign-in " << (success ? "success" : "failure"); 191 DVLOG(1) << "Easy sign-in " << (success ? "success" : "failure");
191 } 192 }
192 193
193 void EasyUnlockServiceSignin::RecordPasswordLoginEvent( 194 void EasyUnlockServiceSignin::RecordPasswordLoginEvent(
194 const std::string& user_id) const { 195 const user_manager::UserID& user_id) const {
195 // This happens during tests, where a user could log in without the user pod 196 // This happens during tests, where a user could log in without the user pod
196 // being focused. 197 // being focused.
197 if (GetUserEmail() != user_id) 198 if (GetUserID() != user_id)
198 return; 199 return;
199 200
200 if (!IsEnabled()) 201 if (!IsEnabled())
201 return; 202 return;
202 203
203 EasyUnlockAuthEvent event = GetPasswordAuthEvent(); 204 EasyUnlockAuthEvent event = GetPasswordAuthEvent();
204 RecordEasyUnlockSigninEvent(event); 205 RecordEasyUnlockSigninEvent(event);
205 DVLOG(1) << "Easy Sign-in password login event, event=" << event; 206 DVLOG(1) << "Easy Sign-in password login event, event=" << event;
206 } 207 }
207 208
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
277 // in tests, the screen type might be different. 278 // in tests, the screen type might be different.
278 if (screen_type != 279 if (screen_type !=
279 proximity_auth::ScreenlockBridge::LockHandler::SIGNIN_SCREEN) 280 proximity_auth::ScreenlockBridge::LockHandler::SIGNIN_SCREEN)
280 return; 281 return;
281 282
282 DisableAppWithoutResettingScreenlockState(); 283 DisableAppWithoutResettingScreenlockState();
283 284
284 Shutdown(); 285 Shutdown();
285 } 286 }
286 287
287 void EasyUnlockServiceSignin::OnFocusedUserChanged(const std::string& user_id) { 288 void EasyUnlockServiceSignin::OnFocusedUserChanged(const user_manager::UserID& u ser_id) {
288 if (user_id_ == user_id) 289 if (user_id_ == user_id)
289 return; 290 return;
290 291
291 // Setting or clearing the user_id may changed |IsAllowed| value, so in these 292 // Setting or clearing the user_id may changed |IsAllowed| value, so in these
292 // cases update the app state. Otherwise, it's enough to notify the app the 293 // cases update the app state. Otherwise, it's enough to notify the app the
293 // user data has been updated. 294 // user data has been updated.
294 bool should_update_app_state = user_id_.empty() != user_id.empty(); 295 bool should_update_app_state = user_id_.empty() != user_id.empty();
295 user_id_ = user_id; 296 user_id_ = user_id;
296 user_pod_last_focused_timestamp_ = base::TimeTicks::Now(); 297 user_pod_last_focused_timestamp_ = base::TimeTicks::Now();
297 298
(...skipping 25 matching lines...) Expand all
323 } 324 }
324 325
325 void EasyUnlockServiceSignin::LoadCurrentUserDataIfNeeded() { 326 void EasyUnlockServiceSignin::LoadCurrentUserDataIfNeeded() {
326 // TODO(xiyuan): Revisit this when adding tests. 327 // TODO(xiyuan): Revisit this when adding tests.
327 if (!base::SysInfo::IsRunningOnChromeOS()) 328 if (!base::SysInfo::IsRunningOnChromeOS())
328 return; 329 return;
329 330
330 if (user_id_.empty() || !service_active_) 331 if (user_id_.empty() || !service_active_)
331 return; 332 return;
332 333
333 std::map<std::string, UserData*>::iterator it = user_data_.find(user_id_); 334 std::map<user_manager::UserID, UserData*>::iterator it = user_data_.find(user_ id_);
334 if (it == user_data_.end()) 335 if (it == user_data_.end())
335 user_data_.insert(std::make_pair(user_id_, new UserData())); 336 user_data_.insert(std::make_pair(user_id_, new UserData()));
336 337
337 UserData* data = user_data_[user_id_]; 338 UserData* data = user_data_[user_id_];
338 339
339 if (data->state != USER_DATA_STATE_INITIAL) 340 if (data->state != USER_DATA_STATE_INITIAL)
340 return; 341 return;
341 data->state = USER_DATA_STATE_LOADING; 342 data->state = USER_DATA_STATE_LOADING;
342 343
343 LoadDataForUser( 344 LoadDataForUser(
344 user_id_, 345 user_id_,
345 allow_cryptohome_backoff_ ? 0u : kMaxCryptohomeBackoffIntervalMs, 346 allow_cryptohome_backoff_ ? 0u : kMaxCryptohomeBackoffIntervalMs,
346 base::Bind(&EasyUnlockServiceSignin::OnUserDataLoaded, 347 base::Bind(&EasyUnlockServiceSignin::OnUserDataLoaded,
347 weak_ptr_factory_.GetWeakPtr(), 348 weak_ptr_factory_.GetWeakPtr(),
348 user_id_)); 349 user_id_));
349 } 350 }
350 351
351 void EasyUnlockServiceSignin::OnUserDataLoaded( 352 void EasyUnlockServiceSignin::OnUserDataLoaded(
352 const std::string& user_id, 353 const user_manager::UserID& user_id,
353 bool success, 354 bool success,
354 const chromeos::EasyUnlockDeviceKeyDataList& devices) { 355 const chromeos::EasyUnlockDeviceKeyDataList& devices) {
355 allow_cryptohome_backoff_ = false; 356 allow_cryptohome_backoff_ = false;
356 357
357 UserData* data = user_data_[user_id]; 358 UserData* data = user_data_[user_id];
358 data->state = USER_DATA_STATE_LOADED; 359 data->state = USER_DATA_STATE_LOADED;
359 if (success) { 360 if (success) {
360 data->devices = devices; 361 data->devices = devices;
361 chromeos::EasyUnlockKeyManager::DeviceDataListToRemoteDeviceList( 362 chromeos::EasyUnlockKeyManager::DeviceDataListToRemoteDeviceList(
362 user_id, devices, &data->remote_devices_value); 363 user_id, devices, &data->remote_devices_value);
(...skipping 15 matching lines...) Expand all
378 // that it has to refresh it's user data. 379 // that it has to refresh it's user data.
379 if (user_id == user_id_) 380 if (user_id == user_id_)
380 NotifyUserUpdated(); 381 NotifyUserUpdated();
381 } 382 }
382 383
383 const EasyUnlockServiceSignin::UserData* 384 const EasyUnlockServiceSignin::UserData*
384 EasyUnlockServiceSignin::FindLoadedDataForCurrentUser() const { 385 EasyUnlockServiceSignin::FindLoadedDataForCurrentUser() const {
385 if (user_id_.empty()) 386 if (user_id_.empty())
386 return NULL; 387 return NULL;
387 388
388 std::map<std::string, UserData*>::const_iterator it = 389 std::map<user_manager::UserID, UserData*>::const_iterator it =
389 user_data_.find(user_id_); 390 user_data_.find(user_id_);
390 if (it == user_data_.end()) 391 if (it == user_data_.end())
391 return NULL; 392 return NULL;
392 if (it->second->state != USER_DATA_STATE_LOADED) 393 if (it->second->state != USER_DATA_STATE_LOADED)
393 return NULL; 394 return NULL;
394 return it->second; 395 return it->second;
395 } 396 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698