Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(666)

Side by Side Diff: chromeos/login/auth/cryptohome_authenticator.cc

Issue 1693383003: ChromeOS cryptohome should be able to use gaia id as user identifier. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Better condition in LOG_ASSERT in AccountId. Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chromeos/login/auth/cryptohome_authenticator.h" 5 #include "chromeos/login/auth/cryptohome_authenticator.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 8
9 #include <vector> 9 #include <vector>
10 10
11 #include "base/bind.h" 11 #include "base/bind.h"
12 #include "base/files/file_path.h" 12 #include "base/files/file_path.h"
13 #include "base/location.h" 13 #include "base/location.h"
14 #include "base/logging.h" 14 #include "base/logging.h"
15 #include "base/memory/weak_ptr.h" 15 #include "base/memory/weak_ptr.h"
16 #include "chromeos/chromeos_switches.h"
16 #include "chromeos/cryptohome/async_method_caller.h" 17 #include "chromeos/cryptohome/async_method_caller.h"
17 #include "chromeos/cryptohome/cryptohome_parameters.h" 18 #include "chromeos/cryptohome/cryptohome_parameters.h"
18 #include "chromeos/cryptohome/homedir_methods.h" 19 #include "chromeos/cryptohome/homedir_methods.h"
19 #include "chromeos/cryptohome/system_salt_getter.h" 20 #include "chromeos/cryptohome/system_salt_getter.h"
20 #include "chromeos/dbus/cryptohome_client.h" 21 #include "chromeos/dbus/cryptohome_client.h"
21 #include "chromeos/dbus/dbus_thread_manager.h" 22 #include "chromeos/dbus/dbus_thread_manager.h"
22 #include "chromeos/login/auth/auth_status_consumer.h" 23 #include "chromeos/login/auth/auth_status_consumer.h"
23 #include "chromeos/login/auth/key.h" 24 #include "chromeos/login/auth/key.h"
24 #include "chromeos/login/auth/user_context.h" 25 #include "chromeos/login/auth/user_context.h"
25 #include "chromeos/login/login_state.h" 26 #include "chromeos/login/login_state.h"
26 #include "chromeos/login/user_names.h" 27 #include "chromeos/login/user_names.h"
27 #include "chromeos/login_event_recorder.h" 28 #include "chromeos/login_event_recorder.h"
28 #include "components/device_event_log/device_event_log.h" 29 #include "components/device_event_log/device_event_log.h"
29 #include "components/signin/core/account_id/account_id.h" 30 #include "components/signin/core/account_id/account_id.h"
31 #include "components/user_manager/known_user.h"
30 #include "components/user_manager/user_type.h" 32 #include "components/user_manager/user_type.h"
31 #include "third_party/cros_system_api/dbus/service_constants.h" 33 #include "third_party/cros_system_api/dbus/service_constants.h"
32 34
33 namespace chromeos { 35 namespace chromeos {
34 36
35 namespace { 37 namespace {
36 38
37 // The label used for the key derived from the user's GAIA credentials. 39 // The label used for the key derived from the user's GAIA credentials.
38 const char kCryptohomeGAIAKeyLabel[] = "gaia"; 40 const char kCryptohomeGAIAKeyLabel[] = "gaia";
39 41
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after
142 cryptohome::PRIV_DEFAULT); 144 cryptohome::PRIV_DEFAULT);
143 cryptohome::MountParameters mount(ephemeral); 145 cryptohome::MountParameters mount(ephemeral);
144 if (create_if_nonexistent) { 146 if (create_if_nonexistent) {
145 mount.create_keys.push_back(cryptohome::KeyDefinition( 147 mount.create_keys.push_back(cryptohome::KeyDefinition(
146 key->GetSecret(), 148 key->GetSecret(),
147 kCryptohomeGAIAKeyLabel, 149 kCryptohomeGAIAKeyLabel,
148 cryptohome::PRIV_DEFAULT)); 150 cryptohome::PRIV_DEFAULT));
149 } 151 }
150 152
151 cryptohome::HomedirMethods::GetInstance()->MountEx( 153 cryptohome::HomedirMethods::GetInstance()->MountEx(
152 cryptohome::Identification( 154 cryptohome::Identification(attempt->user_context.GetAccountId()),
153 attempt->user_context.GetAccountId().GetUserEmail()),
154 cryptohome::Authorization(auth_key), mount, 155 cryptohome::Authorization(auth_key), mount,
155 base::Bind(&OnMount, attempt, resolver)); 156 base::Bind(&OnMount, attempt, resolver));
156 } 157 }
157 158
159 // Handle cryptohome migration status.
160 void OnCryptohomeRenamed(const base::WeakPtr<AuthAttemptState>& attempt,
161 scoped_refptr<CryptohomeAuthenticator> resolver,
162 bool ephemeral,
163 bool create_if_nonexistent,
164 bool success,
165 cryptohome::MountError return_code) {
166 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(
167 "CryptohomeRename-End", false);
168 const AccountId account_id = attempt->user_context.GetAccountId();
169 if (success) {
170 cryptohome::SetGaiaIdMigrationStatusDone(account_id);
171 } else {
172 LOG(ERROR) << "Failed to rename cryptohome for account_id='"
173 << account_id.Serialize() << "' (return_code=" << return_code
174 << ")";
175 }
176
177 DoMount(attempt, resolver, ephemeral, create_if_nonexistent);
178 }
179
180 // This method migrates cryptohome identifier to gaia id (if needed),
181 // and then calls Mount.
182 void EnsureCryptohomeMigratedToGaiaId(
183 const base::WeakPtr<AuthAttemptState>& attempt,
184 scoped_refptr<CryptohomeAuthenticator> resolver,
185 bool ephemeral,
186 bool create_if_nonexistent) {
187 const bool is_gaiaid_migration_started = switches::IsGaiaIdMigrationStarted();
188 if (!is_gaiaid_migration_started) {
189 DoMount(attempt, resolver, ephemeral, create_if_nonexistent);
190 return;
191 }
192 const bool already_migrated = cryptohome::GetGaiaIdMigrationStatus(
193 attempt->user_context.GetAccountId());
194 const bool has_gaia_id =
195 !attempt->user_context.GetAccountId().GetGaiaId().empty();
196
197 bool need_migration = false;
198 if (!create_if_nonexistent && !already_migrated) {
199 if (has_gaia_id) {
200 need_migration = true;
201 } else {
202 LOG(WARNING) << "Account '"
203 << attempt->user_context.GetAccountId().Serialize()
204 << "' has no gaia id. Cryptohome migration skipped.";
205 }
206 }
207 if (need_migration) {
208 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(
209 "CryptohomeRename-Start", false);
210 const std::string& cryptohome_id_from =
211 attempt->user_context.GetAccountId().GetUserEmail(); // Migrated
212 const std::string cryptohome_id_to =
213 attempt->user_context.GetAccountId().GetGaiaIdKey();
214
215 cryptohome::HomedirMethods::GetInstance()->RenameCryptohome(
216 cryptohome::Identification::FromString(cryptohome_id_from),
217 cryptohome::Identification::FromString(cryptohome_id_to),
218 base::Bind(&OnCryptohomeRenamed, attempt, resolver, ephemeral,
219 create_if_nonexistent));
220 return;
221 }
222 if (!already_migrated && has_gaia_id) {
223 // Mark new users migrated.
224 cryptohome::SetGaiaIdMigrationStatusDone(
225 attempt->user_context.GetAccountId());
226 }
227 DoMount(attempt, resolver, ephemeral, create_if_nonexistent);
228 }
stevenjb 2016/02/23 19:27:34 Can these be added separately?
Alexander Alekseev 2016/02/24 09:27:42 What do you mean?
stevenjb 2016/02/24 17:25:43 I was hoping it would be reasonable to add EnsureC
Alexander Alekseev 2016/02/25 07:40:46 Done.
229
158 // Callback invoked when the system salt has been retrieved. Transforms the key 230 // Callback invoked when the system salt has been retrieved. Transforms the key
159 // in |attempt->user_context| using Chrome's default hashing algorithm and the 231 // in |attempt->user_context| using Chrome's default hashing algorithm and the
160 // system salt, then calls MountEx(). 232 // system salt, then calls MountEx().
161 void OnGetSystemSalt(const base::WeakPtr<AuthAttemptState>& attempt, 233 void OnGetSystemSalt(const base::WeakPtr<AuthAttemptState>& attempt,
162 scoped_refptr<CryptohomeAuthenticator> resolver, 234 scoped_refptr<CryptohomeAuthenticator> resolver,
163 bool ephemeral, 235 bool ephemeral,
164 bool create_if_nonexistent, 236 bool create_if_nonexistent,
165 const std::string& system_salt) { 237 const std::string& system_salt) {
166 DCHECK_EQ(Key::KEY_TYPE_PASSWORD_PLAIN, 238 DCHECK_EQ(Key::KEY_TYPE_PASSWORD_PLAIN,
167 attempt->user_context.GetKey()->GetKeyType()); 239 attempt->user_context.GetKey()->GetKeyType());
168 240
169 attempt->user_context.GetKey()->Transform( 241 attempt->user_context.GetKey()->Transform(
170 Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, 242 Key::KEY_TYPE_SALTED_SHA256_TOP_HALF,
171 system_salt); 243 system_salt);
172 244
173 DoMount(attempt, resolver, ephemeral, create_if_nonexistent); 245 EnsureCryptohomeMigratedToGaiaId(attempt, resolver, ephemeral,
246 create_if_nonexistent);
174 } 247 }
175 248
176 // Callback invoked when cryptohome's GetKeyDataEx() method has finished. 249 // Callback invoked when cryptohome's GetKeyDataEx() method has finished.
177 // * If GetKeyDataEx() returned metadata indicating the hashing algorithm and 250 // * If GetKeyDataEx() returned metadata indicating the hashing algorithm and
178 // salt that were used to generate the key for this user's cryptohome, 251 // salt that were used to generate the key for this user's cryptohome,
179 // transforms the key in |attempt->user_context| with the same parameters. 252 // transforms the key in |attempt->user_context| with the same parameters.
180 // * Otherwise, starts the retrieval of the system salt so that the key in 253 // * Otherwise, starts the retrieval of the system salt so that the key in
181 // |attempt->user_context| can be transformed with Chrome's default hashing 254 // |attempt->user_context| can be transformed with Chrome's default hashing
182 // algorithm and the system salt. 255 // algorithm and the system salt.
183 // The resulting key is then passed to cryptohome's MountEx(). 256 // The resulting key is then passed to cryptohome's MountEx().
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
222 295
223 if (!salt) { 296 if (!salt) {
224 LOGIN_LOG(ERROR) << "Missing salt."; 297 LOGIN_LOG(ERROR) << "Missing salt.";
225 RecordKeyErrorAndResolve(attempt, resolver); 298 RecordKeyErrorAndResolve(attempt, resolver);
226 return; 299 return;
227 } 300 }
228 301
229 attempt->user_context.GetKey()->Transform( 302 attempt->user_context.GetKey()->Transform(
230 static_cast<Key::KeyType>(*type), 303 static_cast<Key::KeyType>(*type),
231 *salt); 304 *salt);
232 DoMount(attempt, resolver, ephemeral, create_if_nonexistent); 305 EnsureCryptohomeMigratedToGaiaId(attempt, resolver, ephemeral,
306 create_if_nonexistent);
233 return; 307 return;
234 } 308 }
235 } else { 309 } else {
236 LOGIN_LOG(EVENT) << "GetKeyDataEx() returned " << key_definitions.size() 310 LOGIN_LOG(EVENT) << "GetKeyDataEx() returned " << key_definitions.size()
237 << " entries."; 311 << " entries.";
238 } 312 }
239 } 313 }
240 314
241 SystemSaltGetter::Get()->GetSystemSalt(base::Bind(&OnGetSystemSalt, 315 SystemSaltGetter::Get()->GetSystemSalt(base::Bind(&OnGetSystemSalt,
242 attempt, 316 attempt,
(...skipping 12 matching lines...) Expand all
255 // transformed accordingly before calling MountEx(). 329 // transformed accordingly before calling MountEx().
256 void StartMount(const base::WeakPtr<AuthAttemptState>& attempt, 330 void StartMount(const base::WeakPtr<AuthAttemptState>& attempt,
257 scoped_refptr<CryptohomeAuthenticator> resolver, 331 scoped_refptr<CryptohomeAuthenticator> resolver,
258 bool ephemeral, 332 bool ephemeral,
259 bool create_if_nonexistent) { 333 bool create_if_nonexistent) {
260 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( 334 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(
261 "CryptohomeMount-Start", false); 335 "CryptohomeMount-Start", false);
262 336
263 if (attempt->user_context.GetKey()->GetKeyType() != 337 if (attempt->user_context.GetKey()->GetKeyType() !=
264 Key::KEY_TYPE_PASSWORD_PLAIN) { 338 Key::KEY_TYPE_PASSWORD_PLAIN) {
265 DoMount(attempt, resolver, ephemeral, create_if_nonexistent); 339 EnsureCryptohomeMigratedToGaiaId(attempt, resolver, ephemeral,
340 create_if_nonexistent);
266 return; 341 return;
267 } 342 }
268 343
269 cryptohome::HomedirMethods::GetInstance()->GetKeyDataEx( 344 cryptohome::HomedirMethods::GetInstance()->GetKeyDataEx(
270 cryptohome::Identification( 345 cryptohome::Identification(attempt->user_context.GetAccountId()),
271 attempt->user_context.GetAccountId().GetUserEmail()),
272 kCryptohomeGAIAKeyLabel, base::Bind(&OnGetKeyDataEx, attempt, resolver, 346 kCryptohomeGAIAKeyLabel, base::Bind(&OnGetKeyDataEx, attempt, resolver,
273 ephemeral, create_if_nonexistent)); 347 ephemeral, create_if_nonexistent));
274 } 348 }
275 349
276 // Calls cryptohome's mount method for guest and also get the user hash from 350 // Calls cryptohome's mount method for guest and also get the user hash from
277 // cryptohome. 351 // cryptohome.
278 void MountGuestAndGetHash(const base::WeakPtr<AuthAttemptState>& attempt, 352 void MountGuestAndGetHash(const base::WeakPtr<AuthAttemptState>& attempt,
279 scoped_refptr<CryptohomeAuthenticator> resolver) { 353 scoped_refptr<CryptohomeAuthenticator> resolver) {
280 attempt->UsernameHashRequested(); 354 attempt->UsernameHashRequested();
281 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountGuest( 355 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountGuest(
282 base::Bind(&TriggerResolveWithLoginTimeMarker, 356 base::Bind(&TriggerResolveWithLoginTimeMarker,
283 "CryptohomeMount-End", 357 "CryptohomeMount-End",
284 attempt, 358 attempt,
285 resolver)); 359 resolver));
286 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( 360 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername(
287 attempt->user_context.GetAccountId().GetUserEmail(), 361 cryptohome::Identification(attempt->user_context.GetAccountId()),
288 base::Bind(&TriggerResolveHash, attempt, resolver)); 362 base::Bind(&TriggerResolveHash, attempt, resolver));
289 } 363 }
290 364
291 // Calls cryptohome's MountPublic method 365 // Calls cryptohome's MountPublic method
292 void MountPublic(const base::WeakPtr<AuthAttemptState>& attempt, 366 void MountPublic(const base::WeakPtr<AuthAttemptState>& attempt,
293 scoped_refptr<CryptohomeAuthenticator> resolver, 367 scoped_refptr<CryptohomeAuthenticator> resolver,
294 int flags) { 368 int flags) {
295 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountPublic( 369 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountPublic(
296 attempt->user_context.GetAccountId().GetUserEmail(), flags, 370 cryptohome::Identification(attempt->user_context.GetAccountId()), flags,
297 base::Bind(&TriggerResolveWithLoginTimeMarker, 371 base::Bind(&TriggerResolveWithLoginTimeMarker,
298 "CryptohomeMountPublic-End", attempt, resolver)); 372 "CryptohomeMountPublic-End", attempt, resolver));
299 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( 373 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername(
300 attempt->user_context.GetAccountId().GetUserEmail(), 374 cryptohome::Identification(attempt->user_context.GetAccountId()),
301 base::Bind(&TriggerResolveHash, attempt, resolver)); 375 base::Bind(&TriggerResolveHash, attempt, resolver));
302 } 376 }
303 377
304 // Calls cryptohome's key migration method. 378 // Calls cryptohome's key migration method.
305 void Migrate(const base::WeakPtr<AuthAttemptState>& attempt, 379 void Migrate(const base::WeakPtr<AuthAttemptState>& attempt,
306 scoped_refptr<CryptohomeAuthenticator> resolver, 380 scoped_refptr<CryptohomeAuthenticator> resolver,
307 bool passing_old_hash, 381 bool passing_old_hash,
308 const std::string& old_password, 382 const std::string& old_password,
309 const std::string& system_salt) { 383 const std::string& system_salt) {
310 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( 384 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(
311 "CryptohomeMigrate-Start", false); 385 "CryptohomeMigrate-Start", false);
312 cryptohome::AsyncMethodCaller* caller = 386 cryptohome::AsyncMethodCaller* caller =
313 cryptohome::AsyncMethodCaller::GetInstance(); 387 cryptohome::AsyncMethodCaller::GetInstance();
314 388
315 // TODO(bartfab): Retrieve the hashing algorithm and salt to use for |old_key| 389 // TODO(bartfab): Retrieve the hashing algorithm and salt to use for |old_key|
316 // from cryptohomed. 390 // from cryptohomed.
317 scoped_ptr<Key> old_key = 391 scoped_ptr<Key> old_key =
318 TransformKeyIfNeeded(Key(old_password), system_salt); 392 TransformKeyIfNeeded(Key(old_password), system_salt);
319 scoped_ptr<Key> new_key = 393 scoped_ptr<Key> new_key =
320 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); 394 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt);
321 if (passing_old_hash) { 395 if (passing_old_hash) {
322 caller->AsyncMigrateKey( 396 caller->AsyncMigrateKey(
323 attempt->user_context.GetAccountId().GetUserEmail(), 397 cryptohome::Identification(attempt->user_context.GetAccountId()),
324 old_key->GetSecret(), new_key->GetSecret(), 398 old_key->GetSecret(), new_key->GetSecret(),
325 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeMount-End", 399 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeMount-End",
326 attempt, resolver)); 400 attempt, resolver));
327 } else { 401 } else {
328 caller->AsyncMigrateKey( 402 caller->AsyncMigrateKey(
329 attempt->user_context.GetAccountId().GetUserEmail(), 403 cryptohome::Identification(attempt->user_context.GetAccountId()),
330 new_key->GetSecret(), old_key->GetSecret(), 404 new_key->GetSecret(), old_key->GetSecret(),
331 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeMount-End", 405 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeMount-End",
332 attempt, resolver)); 406 attempt, resolver));
333 } 407 }
334 } 408 }
335 409
336 // Calls cryptohome's remove method. 410 // Calls cryptohome's remove method.
337 void Remove(const base::WeakPtr<AuthAttemptState>& attempt, 411 void Remove(const base::WeakPtr<AuthAttemptState>& attempt,
338 scoped_refptr<CryptohomeAuthenticator> resolver) { 412 scoped_refptr<CryptohomeAuthenticator> resolver) {
339 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( 413 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(
340 "CryptohomeRemove-Start", false); 414 "CryptohomeRemove-Start", false);
341 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( 415 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove(
342 attempt->user_context.GetAccountId().GetUserEmail(), 416 cryptohome::Identification(attempt->user_context.GetAccountId()),
343 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeRemove-End", 417 base::Bind(&TriggerResolveWithLoginTimeMarker, "CryptohomeRemove-End",
344 attempt, resolver)); 418 attempt, resolver));
345 } 419 }
346 420
347 // Calls cryptohome's key check method. 421 // Calls cryptohome's key check method.
348 void CheckKey(const base::WeakPtr<AuthAttemptState>& attempt, 422 void CheckKey(const base::WeakPtr<AuthAttemptState>& attempt,
349 scoped_refptr<CryptohomeAuthenticator> resolver, 423 scoped_refptr<CryptohomeAuthenticator> resolver,
350 const std::string& system_salt) { 424 const std::string& system_salt) {
351 scoped_ptr<Key> key = 425 scoped_ptr<Key> key =
352 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); 426 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt);
353 cryptohome::AsyncMethodCaller::GetInstance()->AsyncCheckKey( 427 cryptohome::AsyncMethodCaller::GetInstance()->AsyncCheckKey(
354 attempt->user_context.GetAccountId().GetUserEmail(), key->GetSecret(), 428 cryptohome::Identification(attempt->user_context.GetAccountId()),
355 base::Bind(&TriggerResolve, attempt, resolver)); 429 key->GetSecret(), base::Bind(&TriggerResolve, attempt, resolver));
356 } 430 }
357 431
358 } // namespace 432 } // namespace
359 433
360 CryptohomeAuthenticator::CryptohomeAuthenticator( 434 CryptohomeAuthenticator::CryptohomeAuthenticator(
361 scoped_refptr<base::TaskRunner> task_runner, 435 scoped_refptr<base::TaskRunner> task_runner,
362 AuthStatusConsumer* consumer) 436 AuthStatusConsumer* consumer)
363 : Authenticator(consumer), 437 : Authenticator(consumer),
364 task_runner_(task_runner), 438 task_runner_(task_runner),
365 migrate_attempted_(false), 439 migrate_attempted_(false),
(...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after
440 false, // online_complete 514 false, // online_complete
441 false)); // user_is_new 515 false)); // user_is_new
442 remove_user_data_on_failure_ = false; 516 remove_user_data_on_failure_ = false;
443 StartMount(current_state_->AsWeakPtr(), 517 StartMount(current_state_->AsWeakPtr(),
444 scoped_refptr<CryptohomeAuthenticator>(this), 518 scoped_refptr<CryptohomeAuthenticator>(this),
445 false /* ephemeral */, false /* create_if_nonexistent */); 519 false /* ephemeral */, false /* create_if_nonexistent */);
446 } 520 }
447 521
448 void CryptohomeAuthenticator::LoginOffTheRecord() { 522 void CryptohomeAuthenticator::LoginOffTheRecord() {
449 DCHECK(task_runner_->RunsTasksOnCurrentThread()); 523 DCHECK(task_runner_->RunsTasksOnCurrentThread());
450 current_state_.reset( 524 current_state_.reset(new AuthAttemptState(
451 new AuthAttemptState(UserContext(user_manager::USER_TYPE_GUEST, 525 UserContext(user_manager::USER_TYPE_GUEST, login::GuestAccountId()),
452 login::GuestAccountId().GetUserEmail()), 526 false, // unlock
453 false, // unlock 527 false, // online_complete
454 false, // online_complete 528 false)); // user_is_new
455 false)); // user_is_new
456 remove_user_data_on_failure_ = false; 529 remove_user_data_on_failure_ = false;
457 ephemeral_mount_attempted_ = true; 530 ephemeral_mount_attempted_ = true;
458 MountGuestAndGetHash(current_state_->AsWeakPtr(), 531 MountGuestAndGetHash(current_state_->AsWeakPtr(),
459 scoped_refptr<CryptohomeAuthenticator>(this)); 532 scoped_refptr<CryptohomeAuthenticator>(this));
460 } 533 }
461 534
462 void CryptohomeAuthenticator::LoginAsPublicSession( 535 void CryptohomeAuthenticator::LoginAsPublicSession(
463 const UserContext& user_context) { 536 const UserContext& user_context) {
464 DCHECK(task_runner_->RunsTasksOnCurrentThread()); 537 DCHECK(task_runner_->RunsTasksOnCurrentThread());
465 DCHECK_EQ(user_manager::USER_TYPE_PUBLIC_ACCOUNT, user_context.GetUserType()); 538 DCHECK_EQ(user_manager::USER_TYPE_PUBLIC_ACCOUNT, user_context.GetUserType());
466 539
467 current_state_.reset( 540 current_state_.reset(
468 new AuthAttemptState(user_context, 541 new AuthAttemptState(user_context,
469 false, // unlock 542 false, // unlock
470 false, // online_complete 543 false, // online_complete
471 false)); // user_is_new 544 false)); // user_is_new
472 remove_user_data_on_failure_ = false; 545 remove_user_data_on_failure_ = false;
473 ephemeral_mount_attempted_ = true; 546 ephemeral_mount_attempted_ = true;
474 StartMount(current_state_->AsWeakPtr(), 547 StartMount(current_state_->AsWeakPtr(),
475 scoped_refptr<CryptohomeAuthenticator>(this), true /* ephemeral */, 548 scoped_refptr<CryptohomeAuthenticator>(this), true /* ephemeral */,
476 true /* create_if_nonexistent */); 549 true /* create_if_nonexistent */);
477 } 550 }
478 551
479 void CryptohomeAuthenticator::LoginAsKioskAccount( 552 void CryptohomeAuthenticator::LoginAsKioskAccount(
480 const std::string& app_user_id, 553 const AccountId& app_account_id,
481 bool use_guest_mount) { 554 bool use_guest_mount) {
482 DCHECK(task_runner_->RunsTasksOnCurrentThread()); 555 DCHECK(task_runner_->RunsTasksOnCurrentThread());
483 556
484 const std::string user_id = 557 const AccountId& account_id =
485 use_guest_mount ? login::GuestAccountId().GetUserEmail() : app_user_id; 558 use_guest_mount ? login::GuestAccountId() : app_account_id;
486 current_state_.reset(new AuthAttemptState( 559 current_state_.reset(new AuthAttemptState(
487 UserContext(user_manager::USER_TYPE_KIOSK_APP, user_id), 560 UserContext(user_manager::USER_TYPE_KIOSK_APP, account_id),
488 false, // unlock 561 false, // unlock
489 false, // online_complete 562 false, // online_complete
490 false)); // user_is_new 563 false)); // user_is_new
491 564
492 remove_user_data_on_failure_ = true; 565 remove_user_data_on_failure_ = true;
493 if (!use_guest_mount) { 566 if (!use_guest_mount) {
494 MountPublic(current_state_->AsWeakPtr(), 567 MountPublic(current_state_->AsWeakPtr(),
495 scoped_refptr<CryptohomeAuthenticator>(this), 568 scoped_refptr<CryptohomeAuthenticator>(this),
496 cryptohome::CREATE_IF_MISSING); 569 cryptohome::CREATE_IF_MISSING);
497 } else { 570 } else {
(...skipping 375 matching lines...) Expand 10 before | Expand all | Expand 10 after
873 Resolve(); 946 Resolve();
874 } 947 }
875 948
876 void CryptohomeAuthenticator::SetOwnerState(bool owner_check_finished, 949 void CryptohomeAuthenticator::SetOwnerState(bool owner_check_finished,
877 bool check_result) { 950 bool check_result) {
878 owner_is_verified_ = owner_check_finished; 951 owner_is_verified_ = owner_check_finished;
879 user_can_login_ = check_result; 952 user_can_login_ = check_result;
880 } 953 }
881 954
882 } // namespace chromeos 955 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698