Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(336)

Side by Side Diff: chrome/browser/signin/signin_manager.cc

Issue 12220060: Load policy before signin completes. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Merge with ToT. Created 7 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chrome/browser/signin/signin_manager.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/signin/signin_manager.h" 5 #include "chrome/browser/signin/signin_manager.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/callback_helpers.h" 10 #include "base/callback_helpers.h"
(...skipping 22 matching lines...) Expand all
33 #include "content/public/browser/browser_thread.h" 33 #include "content/public/browser/browser_thread.h"
34 #include "content/public/browser/notification_service.h" 34 #include "content/public/browser/notification_service.h"
35 #include "google_apis/gaia/gaia_auth_fetcher.h" 35 #include "google_apis/gaia/gaia_auth_fetcher.h"
36 #include "google_apis/gaia/gaia_constants.h" 36 #include "google_apis/gaia/gaia_constants.h"
37 #include "google_apis/gaia/gaia_urls.h" 37 #include "google_apis/gaia/gaia_urls.h"
38 #include "net/cookies/cookie_monster.h" 38 #include "net/cookies/cookie_monster.h"
39 #include "net/url_request/url_request_context.h" 39 #include "net/url_request/url_request_context.h"
40 #include "net/url_request/url_request_context_getter.h" 40 #include "net/url_request/url_request_context_getter.h"
41 #include "third_party/icu/public/i18n/unicode/regex.h" 41 #include "third_party/icu/public/i18n/unicode/regex.h"
42 42
43 #if defined(ENABLE_CONFIGURATION_POLICY) && !defined(OS_CHROMEOS)
44 #include "chrome/browser/policy/user_policy_signin_service.h"
45 #include "chrome/browser/policy/user_policy_signin_service_factory.h"
46 #endif
47
43 using namespace signin_internals_util; 48 using namespace signin_internals_util;
44 49
45 using content::BrowserThread; 50 using content::BrowserThread;
46 51
47 namespace { 52 namespace {
48 53
49 const char kGetInfoDisplayEmailKey[] = "displayEmail"; 54 const char kGetInfoDisplayEmailKey[] = "displayEmail";
50 const char kGetInfoEmailKey[] = "email"; 55 const char kGetInfoEmailKey[] = "email";
51 56
52 const char kGoogleAccountsUrl[] = "https://accounts.google.com"; 57 const char kGoogleAccountsUrl[] = "https://accounts.google.com";
(...skipping 586 matching lines...) Expand 10 before | Expand all | Expand 10 after
639 644
640 void SigninManager::OnGetUserInfoSuccess(const UserInfoMap& data) { 645 void SigninManager::OnGetUserInfoSuccess(const UserInfoMap& data) {
641 NotifyDiagnosticsObservers(GET_USER_INFO_STATUS, "Successful"); 646 NotifyDiagnosticsObservers(GET_USER_INFO_STATUS, "Successful");
642 647
643 UserInfoMap::const_iterator email_iter = data.find(kGetInfoEmailKey); 648 UserInfoMap::const_iterator email_iter = data.find(kGetInfoEmailKey);
644 UserInfoMap::const_iterator display_email_iter = 649 UserInfoMap::const_iterator display_email_iter =
645 data.find(kGetInfoDisplayEmailKey); 650 data.find(kGetInfoDisplayEmailKey);
646 if (email_iter == data.end()) { 651 if (email_iter == data.end()) {
647 OnGetUserInfoKeyNotFound(kGetInfoEmailKey); 652 OnGetUserInfoKeyNotFound(kGetInfoEmailKey);
648 return; 653 return;
649 } else if (display_email_iter == data.end()) { 654 }
655 if (display_email_iter == data.end()) {
650 OnGetUserInfoKeyNotFound(kGetInfoDisplayEmailKey); 656 OnGetUserInfoKeyNotFound(kGetInfoDisplayEmailKey);
651 return; 657 return;
652 } else { 658 }
653 DCHECK(email_iter->first == kGetInfoEmailKey); 659 DCHECK(email_iter->first == kGetInfoEmailKey);
654 DCHECK(display_email_iter->first == kGetInfoDisplayEmailKey); 660 DCHECK(display_email_iter->first == kGetInfoDisplayEmailKey);
655 661
656 // When signing in with credentials, the possibly invalid name is the Gaia 662 // When signing in with credentials, the possibly invalid name is the Gaia
657 // display name. If the name returned by GetUserInfo does not match what is 663 // display name. If the name returned by GetUserInfo does not match what is
658 // expected, return an error. 664 // expected, return an error.
659 if (type_ == SIGNIN_TYPE_WITH_CREDENTIALS && 665 if (type_ == SIGNIN_TYPE_WITH_CREDENTIALS &&
660 base::strcasecmp(display_email_iter->second.c_str(), 666 base::strcasecmp(display_email_iter->second.c_str(),
661 possibly_invalid_username_.c_str()) != 0) { 667 possibly_invalid_username_.c_str()) != 0) {
662 OnGetUserInfoKeyNotFound(kGetInfoDisplayEmailKey); 668 OnGetUserInfoKeyNotFound(kGetInfoDisplayEmailKey);
663 return; 669 return;
664 } 670 }
665 671
666 SetAuthenticatedUsername(email_iter->second); 672 possibly_invalid_username_ = email_iter->second;
667 possibly_invalid_username_.clear(); 673
668 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, 674 #if defined(ENABLE_CONFIGURATION_POLICY) && !defined(OS_CHROMEOS)
669 authenticated_username_); 675 // If we have an OAuth token, try loading policy for this user now, before
676 // any signed in services are initialized. If there's no oauth token (the
677 // user is using the old ClientLogin flow) then policy will get loaded once
678 // the TokenService finishes initializing (not ideal, but it's a reasonable
679 // fallback).
680 if (!temp_oauth_login_tokens_.refresh_token.empty()) {
681 policy::UserPolicySigninService* policy_service =
682 policy::UserPolicySigninServiceFactory::GetForProfile(profile_);
683 policy_service->RegisterPolicyClient(
684 possibly_invalid_username_,
685 temp_oauth_login_tokens_.refresh_token,
686 base::Bind(&SigninManager::OnRegisteredForPolicy,
687 base::Unretained(this)));
688 return;
670 } 689 }
690 #endif
691
692 // Not waiting for policy load - just complete signin directly.
693 CompleteSigninAfterPolicyLoad();
694 }
695
696 #if defined(ENABLE_CONFIGURATION_POLICY) && !defined(OS_CHROMEOS)
697 void SigninManager::OnRegisteredForPolicy(
698 scoped_ptr<policy::CloudPolicyClient> client) {
699 // If there's no token for the user (no policy) just finish signing in.
700 if (!client.get()) {
701 DVLOG(1) << "Policy registration failed";
702 CompleteSigninAfterPolicyLoad();
703 return;
704 }
705
706 DVLOG(1) << "Policy registration succeeded: dm_token=" << client->dm_token();
707 // TODO(dconnelly): Prompt user for whether they want to create a new profile
708 // or not (http://crbug.com/171236). For now, just immediately load policy.
709 policy::UserPolicySigninService* policy_service =
710 policy::UserPolicySigninServiceFactory::GetForProfile(profile_);
711 policy_service->FetchPolicyForSignedInUser(
712 client.Pass(),
713 base::Bind(&SigninManager::OnPolicyFetchComplete,
714 base::Unretained(this)));
715 }
716
717 void SigninManager::OnPolicyFetchComplete(bool success) {
718 // For now, we allow signin to complete even if the policy fetch fails. If
719 // we ever want to change this behavior, we could call SignOut() here
720 // instead.
721 DLOG_IF(ERROR, !success) << "Error fetching policy for user";
722 DVLOG_IF(1, success) << "Policy fetch successful - completing signin";
723 CompleteSigninAfterPolicyLoad();
724 }
725 #endif
726
727 void SigninManager::CompleteSigninAfterPolicyLoad() {
728 DCHECK(!possibly_invalid_username_.empty());
729 SetAuthenticatedUsername(possibly_invalid_username_);
730 possibly_invalid_username_.clear();
731 profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername,
732 authenticated_username_);
733
671 GoogleServiceSigninSuccessDetails details(authenticated_username_, 734 GoogleServiceSigninSuccessDetails details(authenticated_username_,
672 password_); 735 password_);
673 content::NotificationService::current()->Notify( 736 content::NotificationService::current()->Notify(
674 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL, 737 chrome::NOTIFICATION_GOOGLE_SIGNIN_SUCCESSFUL,
675 content::Source<Profile>(profile_), 738 content::Source<Profile>(profile_),
676 content::Details<const GoogleServiceSigninSuccessDetails>(&details)); 739 content::Details<const GoogleServiceSigninSuccessDetails>(&details));
677 740
678 password_.clear(); // Don't need it anymore. 741 password_.clear(); // Don't need it anymore.
679 DisableOneClickSignIn(profile_); // Don't ever offer again. 742 DisableOneClickSignIn(profile_); // Don't ever offer again.
680 743
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after
778 NotifySigninValueChanged(field, value)); 841 NotifySigninValueChanged(field, value));
779 } 842 }
780 843
781 void SigninManager::NotifyDiagnosticsObservers( 844 void SigninManager::NotifyDiagnosticsObservers(
782 const TimedSigninStatusField& field, 845 const TimedSigninStatusField& field,
783 const std::string& value) { 846 const std::string& value) {
784 FOR_EACH_OBSERVER(SigninDiagnosticsObserver, 847 FOR_EACH_OBSERVER(SigninDiagnosticsObserver,
785 signin_diagnostics_observers_, 848 signin_diagnostics_observers_,
786 NotifySigninValueChanged(field, value)); 849 NotifySigninValueChanged(field, value));
787 } 850 }
OLDNEW
« no previous file with comments | « chrome/browser/signin/signin_manager.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698