OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/existing_user_controller.h" | 5 #include "chrome/browser/chromeos/login/existing_user_controller.h" |
6 | 6 |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
(...skipping 434 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
445 } | 445 } |
446 | 446 |
447 void ExistingUserController::ShowWrongHWIDScreen() { | 447 void ExistingUserController::ShowWrongHWIDScreen() { |
448 host_->StartWizard(WizardController::kWrongHWIDScreenName); | 448 host_->StartWizard(WizardController::kWrongHWIDScreenName); |
449 } | 449 } |
450 | 450 |
451 void ExistingUserController::Signout() { | 451 void ExistingUserController::Signout() { |
452 NOTREACHED(); | 452 NOTREACHED(); |
453 } | 453 } |
454 | 454 |
| 455 bool ExistingUserController::IsUserWhitelisted(const std::string& user_id) { |
| 456 bool wildcard_match = false; |
| 457 if (login_performer_.get()) |
| 458 return login_performer_->IsUserWhitelisted(user_id, &wildcard_match); |
| 459 |
| 460 return chromeos::CrosSettings::IsWhitelisted(user_id, &wildcard_match); |
| 461 } |
| 462 |
455 void ExistingUserController::OnConsumerKioskAutoLaunchCheckCompleted( | 463 void ExistingUserController::OnConsumerKioskAutoLaunchCheckCompleted( |
456 KioskAppManager::ConsumerKioskAutoLaunchStatus status) { | 464 KioskAppManager::ConsumerKioskAutoLaunchStatus status) { |
457 if (status == KioskAppManager::CONSUMER_KIOSK_AUTO_LAUNCH_CONFIGURABLE) | 465 if (status == KioskAppManager::CONSUMER_KIOSK_AUTO_LAUNCH_CONFIGURABLE) |
458 ShowKioskEnableScreen(); | 466 ShowKioskEnableScreen(); |
459 } | 467 } |
460 | 468 |
461 void ExistingUserController::OnEnrollmentOwnershipCheckCompleted( | 469 void ExistingUserController::OnEnrollmentOwnershipCheckCompleted( |
462 DeviceSettingsService::OwnershipStatus status) { | 470 DeviceSettingsService::OwnershipStatus status) { |
463 if (status == DeviceSettingsService::OWNERSHIP_NONE) { | 471 if (status == DeviceSettingsService::OWNERSHIP_NONE) { |
464 ShowEnrollmentScreen(); | 472 ShowEnrollmentScreen(); |
(...skipping 783 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1248 if (!success) { | 1256 if (!success) { |
1249 LOG(ERROR) << "OAuth2 token fetch failed."; | 1257 LOG(ERROR) << "OAuth2 token fetch failed."; |
1250 OnAuthFailure(AuthFailure(AuthFailure::FAILED_TO_INITIALIZE_TOKEN)); | 1258 OnAuthFailure(AuthFailure(AuthFailure::FAILED_TO_INITIALIZE_TOKEN)); |
1251 return; | 1259 return; |
1252 } | 1260 } |
1253 UserSessionManager::GetInstance()->OnOAuth2TokensFetched(user_context); | 1261 UserSessionManager::GetInstance()->OnOAuth2TokensFetched(user_context); |
1254 PerformLogin(user_context, LoginPerformer::AUTH_MODE_EXTENSION); | 1262 PerformLogin(user_context, LoginPerformer::AUTH_MODE_EXTENSION); |
1255 } | 1263 } |
1256 | 1264 |
1257 } // namespace chromeos | 1265 } // namespace chromeos |
OLD | NEW |