OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chromeos/login/auth/login_performer.h" | 5 #include "chromeos/login/auth/login_performer.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/message_loop/message_loop.h" | 9 #include "base/message_loop/message_loop.h" |
10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
(...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
123 weak_factory_.GetWeakPtr(), | 123 weak_factory_.GetWeakPtr(), |
124 user_context_, | 124 user_context_, |
125 auth_mode))) { | 125 auth_mode))) { |
126 return; | 126 return; |
127 } | 127 } |
128 DoPerformLogin(user_context_, auth_mode); | 128 DoPerformLogin(user_context_, auth_mode); |
129 } | 129 } |
130 | 130 |
131 void LoginPerformer::DoPerformLogin(const UserContext& user_context, | 131 void LoginPerformer::DoPerformLogin(const UserContext& user_context, |
132 AuthorizationMode auth_mode) { | 132 AuthorizationMode auth_mode) { |
133 const std::string email = | |
134 gaia::CanonicalizeEmail(user_context.GetAccountId().GetUserEmail()); | |
135 bool wildcard_match = false; | 133 bool wildcard_match = false; |
136 | 134 |
137 if (!IsUserWhitelisted(email, &wildcard_match)) { | 135 const AccountId& account_id = user_context.GetAccountId(); |
| 136 if (!IsUserWhitelisted(account_id, &wildcard_match)) { |
138 NotifyWhitelistCheckFailure(); | 137 NotifyWhitelistCheckFailure(); |
139 return; | 138 return; |
140 } | 139 } |
141 | 140 |
142 if (user_context.GetAuthFlow() == UserContext::AUTH_FLOW_EASY_UNLOCK) | 141 if (user_context.GetAuthFlow() == UserContext::AUTH_FLOW_EASY_UNLOCK) |
143 SetupEasyUnlockUserFlow(user_context.GetAccountId().GetUserEmail()); | 142 SetupEasyUnlockUserFlow(user_context.GetAccountId()); |
144 | 143 |
145 switch (auth_mode_) { | 144 switch (auth_mode_) { |
146 case AUTH_MODE_EXTENSION: { | 145 case AUTH_MODE_EXTENSION: { |
147 RunOnlineWhitelistCheck( | 146 RunOnlineWhitelistCheck( |
148 email, wildcard_match, user_context.GetRefreshToken(), | 147 account_id, wildcard_match, user_context.GetRefreshToken(), |
149 base::Bind(&LoginPerformer::StartLoginCompletion, | 148 base::Bind(&LoginPerformer::StartLoginCompletion, |
150 weak_factory_.GetWeakPtr()), | 149 weak_factory_.GetWeakPtr()), |
151 base::Bind(&LoginPerformer::NotifyWhitelistCheckFailure, | 150 base::Bind(&LoginPerformer::NotifyWhitelistCheckFailure, |
152 weak_factory_.GetWeakPtr())); | 151 weak_factory_.GetWeakPtr())); |
153 break; | 152 break; |
154 } | 153 } |
155 case AUTH_MODE_INTERNAL: | 154 case AUTH_MODE_INTERNAL: |
156 StartAuthentication(); | 155 StartAuthentication(); |
157 break; | 156 break; |
158 } | 157 } |
(...skipping 16 matching lines...) Expand all Loading... |
175 } | 174 } |
176 | 175 |
177 void LoginPerformer::TrustedLoginAsSupervisedUser( | 176 void LoginPerformer::TrustedLoginAsSupervisedUser( |
178 const UserContext& user_context) { | 177 const UserContext& user_context) { |
179 if (!AreSupervisedUsersAllowed()) { | 178 if (!AreSupervisedUsersAllowed()) { |
180 LOG(ERROR) << "Login attempt of supervised user detected."; | 179 LOG(ERROR) << "Login attempt of supervised user detected."; |
181 delegate_->WhiteListCheckFailed(user_context.GetAccountId().GetUserEmail()); | 180 delegate_->WhiteListCheckFailed(user_context.GetAccountId().GetUserEmail()); |
182 return; | 181 return; |
183 } | 182 } |
184 | 183 |
185 SetupSupervisedUserFlow(user_context.GetAccountId().GetUserEmail()); | 184 SetupSupervisedUserFlow(user_context.GetAccountId()); |
186 UserContext user_context_copy = TransformSupervisedKey(user_context); | 185 UserContext user_context_copy = TransformSupervisedKey(user_context); |
187 | 186 |
188 if (UseExtendedAuthenticatorForSupervisedUser(user_context)) { | 187 if (UseExtendedAuthenticatorForSupervisedUser(user_context)) { |
189 EnsureExtendedAuthenticator(); | 188 EnsureExtendedAuthenticator(); |
190 // TODO(antrim) : Replace empty callback with explicit method. | 189 // TODO(antrim) : Replace empty callback with explicit method. |
191 // http://crbug.com/351268 | 190 // http://crbug.com/351268 |
192 task_runner_->PostTask( | 191 task_runner_->PostTask( |
193 FROM_HERE, | 192 FROM_HERE, |
194 base::Bind(&ExtendedAuthenticator::AuthenticateToMount, | 193 base::Bind(&ExtendedAuthenticator::AuthenticateToMount, |
195 extended_authenticator_.get(), | 194 extended_authenticator_.get(), |
196 user_context_copy, | 195 user_context_copy, |
197 ExtendedAuthenticator::ResultCallback())); | 196 ExtendedAuthenticator::ResultCallback())); |
198 | 197 |
199 } else { | 198 } else { |
200 EnsureAuthenticator(); | 199 EnsureAuthenticator(); |
201 task_runner_->PostTask(FROM_HERE, | 200 task_runner_->PostTask(FROM_HERE, |
202 base::Bind(&Authenticator::LoginAsSupervisedUser, | 201 base::Bind(&Authenticator::LoginAsSupervisedUser, |
203 authenticator_.get(), | 202 authenticator_.get(), |
204 user_context_copy)); | 203 user_context_copy)); |
205 } | 204 } |
206 } | 205 } |
207 | 206 |
208 void LoginPerformer::LoginAsPublicSession(const UserContext& user_context) { | 207 void LoginPerformer::LoginAsPublicSession(const UserContext& user_context) { |
209 if (!CheckPolicyForUser(user_context.GetAccountId().GetUserEmail())) { | 208 if (!CheckPolicyForUser(user_context.GetAccountId())) { |
210 DCHECK(delegate_); | 209 DCHECK(delegate_); |
211 if (delegate_) | 210 if (delegate_) |
212 delegate_->PolicyLoadFailed(); | 211 delegate_->PolicyLoadFailed(); |
213 return; | 212 return; |
214 } | 213 } |
215 | 214 |
216 EnsureAuthenticator(); | 215 EnsureAuthenticator(); |
217 task_runner_->PostTask(FROM_HERE, | 216 task_runner_->PostTask(FROM_HERE, |
218 base::Bind(&Authenticator::LoginAsPublicSession, | 217 base::Bind(&Authenticator::LoginAsPublicSession, |
219 authenticator_.get(), | 218 authenticator_.get(), |
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
286 } else { | 285 } else { |
287 NOTREACHED(); | 286 NOTREACHED(); |
288 } | 287 } |
289 user_context_.ClearSecrets(); | 288 user_context_.ClearSecrets(); |
290 } | 289 } |
291 | 290 |
292 void LoginPerformer::EnsureAuthenticator() { | 291 void LoginPerformer::EnsureAuthenticator() { |
293 authenticator_ = CreateAuthenticator(); | 292 authenticator_ = CreateAuthenticator(); |
294 } | 293 } |
295 } // namespace chromeos | 294 } // namespace chromeos |
OLD | NEW |