| Index: chromeos/login/auth/login_performer.cc
|
| diff --git a/chromeos/login/auth/login_performer.cc b/chromeos/login/auth/login_performer.cc
|
| index ba4e82bd3b0657de4cc10d421d8b4da9ead4e0d1..b988f1d3786382e5017e1c033355d1416438b360 100644
|
| --- a/chromeos/login/auth/login_performer.cc
|
| +++ b/chromeos/login/auth/login_performer.cc
|
| @@ -18,6 +18,7 @@
|
| #include "chromeos/login/user_names.h"
|
| #include "chromeos/login_event_recorder.h"
|
| #include "chromeos/settings/cros_settings_names.h"
|
| +#include "components/signin/core/account_id/account_id.h"
|
| #include "google_apis/gaia/gaia_auth_util.h"
|
| #include "net/cookies/cookie_monster.h"
|
| #include "net/cookies/cookie_store.h"
|
| @@ -107,7 +108,8 @@ void LoginPerformer::OnPasswordChangeDetected() {
|
|
|
| void LoginPerformer::NotifyWhitelistCheckFailure() {
|
| if (delegate_)
|
| - delegate_->WhiteListCheckFailed(user_context_.GetUserID());
|
| + delegate_->WhiteListCheckFailed(
|
| + user_context_.GetAccountId().GetUserEmail());
|
| else
|
| NOTREACHED();
|
| }
|
| @@ -128,7 +130,8 @@ void LoginPerformer::PerformLogin(const UserContext& user_context,
|
|
|
| void LoginPerformer::DoPerformLogin(const UserContext& user_context,
|
| AuthorizationMode auth_mode) {
|
| - std::string email = gaia::CanonicalizeEmail(user_context.GetUserID());
|
| + const std::string email =
|
| + gaia::CanonicalizeEmail(user_context.GetAccountId().GetUserEmail());
|
| bool wildcard_match = false;
|
|
|
| if (!IsUserWhitelisted(email, &wildcard_match)) {
|
| @@ -137,7 +140,7 @@ void LoginPerformer::DoPerformLogin(const UserContext& user_context,
|
| }
|
|
|
| if (user_context.GetAuthFlow() == UserContext::AUTH_FLOW_EASY_UNLOCK)
|
| - SetupEasyUnlockUserFlow(user_context.GetUserID());
|
| + SetupEasyUnlockUserFlow(user_context.GetAccountId().GetUserEmail());
|
|
|
| switch (auth_mode_) {
|
| case AUTH_MODE_EXTENSION: {
|
| @@ -156,8 +159,9 @@ void LoginPerformer::DoPerformLogin(const UserContext& user_context,
|
| }
|
|
|
| void LoginPerformer::LoginAsSupervisedUser(const UserContext& user_context) {
|
| - DCHECK_EQ(chromeos::login::kSupervisedUserDomain,
|
| - gaia::ExtractDomainName(user_context.GetUserID()));
|
| + DCHECK_EQ(
|
| + chromeos::login::kSupervisedUserDomain,
|
| + gaia::ExtractDomainName(user_context.GetAccountId().GetUserEmail()));
|
|
|
| user_context_ = user_context;
|
| user_context_.SetUserType(user_manager::USER_TYPE_SUPERVISED);
|
| @@ -174,11 +178,11 @@ void LoginPerformer::TrustedLoginAsSupervisedUser(
|
| const UserContext& user_context) {
|
| if (!AreSupervisedUsersAllowed()) {
|
| LOG(ERROR) << "Login attempt of supervised user detected.";
|
| - delegate_->WhiteListCheckFailed(user_context.GetUserID());
|
| + delegate_->WhiteListCheckFailed(user_context.GetAccountId().GetUserEmail());
|
| return;
|
| }
|
|
|
| - SetupSupervisedUserFlow(user_context.GetUserID());
|
| + SetupSupervisedUserFlow(user_context.GetAccountId().GetUserEmail());
|
| UserContext user_context_copy = TransformSupervisedKey(user_context);
|
|
|
| if (UseExtendedAuthenticatorForSupervisedUser(user_context)) {
|
| @@ -202,7 +206,7 @@ void LoginPerformer::TrustedLoginAsSupervisedUser(
|
| }
|
|
|
| void LoginPerformer::LoginAsPublicSession(const UserContext& user_context) {
|
| - if (!CheckPolicyForUser(user_context.GetUserID())) {
|
| + if (!CheckPolicyForUser(user_context.GetAccountId().GetUserEmail())) {
|
| DCHECK(delegate_);
|
| if (delegate_)
|
| delegate_->PolicyLoadFailed();
|
|
|