Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(976)

Side by Side Diff: chrome/browser/ui/webui/chromeos/login/enrollment_screen_handler.cc

Issue 2737733003: Add Active Directory login UI tests (Closed)
Patch Set: Rebase Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ui/webui/chromeos/login/enrollment_screen_handler.h" 5 #include "chrome/browser/ui/webui/chromeos/login/enrollment_screen_handler.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 8
9 #include "ash/common/system/chromeos/devicetype_utils.h" 9 #include "ash/common/system/chromeos/devicetype_utils.h"
10 #include "base/bind.h" 10 #include "base/bind.h"
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
101 } 101 }
102 102
103 103
104 // Returns the enterprise domain after enrollment, or an empty string. 104 // Returns the enterprise domain after enrollment, or an empty string.
105 std::string GetEnterpriseDomain() { 105 std::string GetEnterpriseDomain() {
106 policy::BrowserPolicyConnectorChromeOS* connector = 106 policy::BrowserPolicyConnectorChromeOS* connector =
107 g_browser_process->platform_part()->browser_policy_connector_chromeos(); 107 g_browser_process->platform_part()->browser_policy_connector_chromeos();
108 return connector->GetEnterpriseDomain(); 108 return connector->GetEnterpriseDomain();
109 } 109 }
110 110
111 enum ActiveDirectoryErrorState {
112 ERROR_STATE_NONE = 0,
113 ERROR_STATE_MACHINE_NAME_INVALID = 1,
114 ERROR_STATE_MACHINE_NAME_TOO_LONG = 2,
115 ERROR_STATE_BAD_USERNAME = 3,
116 ERROR_STATE_BAD_PASSWORD = 4,
117 };
118
119 } // namespace 111 } // namespace
120 112
121 // EnrollmentScreenHandler, public ------------------------------ 113 // EnrollmentScreenHandler, public ------------------------------
122 114
123 EnrollmentScreenHandler::EnrollmentScreenHandler( 115 EnrollmentScreenHandler::EnrollmentScreenHandler(
124 const scoped_refptr<NetworkStateInformer>& network_state_informer, 116 const scoped_refptr<NetworkStateInformer>& network_state_informer,
125 ErrorScreen* error_screen) 117 ErrorScreen* error_screen)
126 : BaseScreenHandler(kScreenId), 118 : BaseScreenHandler(kScreenId),
127 network_state_informer_(network_state_informer), 119 network_state_informer_(network_state_informer),
128 error_screen_(error_screen), 120 error_screen_(error_screen),
(...skipping 462 matching lines...) Expand 10 before | Expand all | Expand 10 after
591 case authpolicy::ERROR_LOCAL_IO: 583 case authpolicy::ERROR_LOCAL_IO:
592 case authpolicy::ERROR_STORE_POLICY_FAILED: 584 case authpolicy::ERROR_STORE_POLICY_FAILED:
593 ShowError(IDS_AD_DOMAIN_JOIN_UNKNOWN_ERROR, true); 585 ShowError(IDS_AD_DOMAIN_JOIN_UNKNOWN_ERROR, true);
594 return; 586 return;
595 case authpolicy::ERROR_NETWORK_PROBLEM: 587 case authpolicy::ERROR_NETWORK_PROBLEM:
596 ShowError(IDS_ENTERPRISE_ENROLLMENT_AUTH_NETWORK_ERROR, true); 588 ShowError(IDS_ENTERPRISE_ENROLLMENT_AUTH_NETWORK_ERROR, true);
597 return; 589 return;
598 case authpolicy::ERROR_PARSE_UPN_FAILED: 590 case authpolicy::ERROR_PARSE_UPN_FAILED:
599 case authpolicy::ERROR_BAD_USER_NAME: 591 case authpolicy::ERROR_BAD_USER_NAME:
600 CallJS("invalidateAd", machine_name, user_name, 592 CallJS("invalidateAd", machine_name, user_name,
601 static_cast<int>(ERROR_STATE_BAD_USERNAME)); 593 static_cast<int>(ActiveDirectoryErrorState::BAD_USERNAME));
602 return; 594 return;
603 case authpolicy::ERROR_BAD_PASSWORD: 595 case authpolicy::ERROR_BAD_PASSWORD:
604 CallJS("invalidateAd", machine_name, user_name, 596 CallJS("invalidateAd", machine_name, user_name,
605 static_cast<int>(ERROR_STATE_BAD_PASSWORD)); 597 static_cast<int>(ActiveDirectoryErrorState::BAD_PASSWORD));
606 return; 598 return;
607 case authpolicy::ERROR_MACHINE_NAME_TOO_LONG: 599 case authpolicy::ERROR_MACHINE_NAME_TOO_LONG:
608 CallJS("invalidateAd", machine_name, user_name, 600 CallJS(
609 static_cast<int>(ERROR_STATE_MACHINE_NAME_TOO_LONG)); 601 "invalidateAd", machine_name, user_name,
602 static_cast<int>(ActiveDirectoryErrorState::MACHINE_NAME_TOO_LONG));
610 return; 603 return;
611 case authpolicy::ERROR_BAD_MACHINE_NAME: 604 case authpolicy::ERROR_BAD_MACHINE_NAME:
612 CallJS("invalidateAd", machine_name, user_name, 605 CallJS("invalidateAd", machine_name, user_name,
613 static_cast<int>(ERROR_STATE_MACHINE_NAME_INVALID)); 606 static_cast<int>(ActiveDirectoryErrorState::MACHINE_NAME_INVALID));
614 return; 607 return;
615 case authpolicy::ERROR_JOIN_ACCESS_DENIED: 608 case authpolicy::ERROR_JOIN_ACCESS_DENIED:
616 ShowError(IDS_AD_USER_DENIED_TO_JOIN_MACHINE, true); 609 ShowError(IDS_AD_USER_DENIED_TO_JOIN_MACHINE, true);
617 return; 610 return;
618 case authpolicy::ERROR_USER_HIT_JOIN_QUOTA: 611 case authpolicy::ERROR_USER_HIT_JOIN_QUOTA:
619 ShowError(IDS_AD_USER_HIT_JOIN_QUOTA, true); 612 ShowError(IDS_AD_USER_HIT_JOIN_QUOTA, true);
620 return; 613 return;
621 case authpolicy::ERROR_PASSWORD_EXPIRED: 614 case authpolicy::ERROR_PASSWORD_EXPIRED:
622 case authpolicy::ERROR_CANNOT_RESOLVE_KDC: 615 case authpolicy::ERROR_CANNOT_RESOLVE_KDC:
623 case authpolicy::ERROR_KINIT_FAILED: 616 case authpolicy::ERROR_KINIT_FAILED:
624 case authpolicy::ERROR_NOT_JOINED: 617 case authpolicy::ERROR_NOT_JOINED:
625 case authpolicy::ERROR_NOT_LOGGED_IN: 618 case authpolicy::ERROR_NOT_LOGGED_IN:
626 default: 619 default:
627 LOG(WARNING) << "Unhandled error code: " << code; 620 LOG(WARNING) << "Unhandled error code: " << code;
628 CallJS("invalidateAd", machine_name, user_name, 621 CallJS("invalidateAd", machine_name, user_name,
629 static_cast<int>(ERROR_STATE_NONE)); 622 static_cast<int>(ActiveDirectoryErrorState::NONE));
630 return; 623 return;
631 } 624 }
632 } 625 }
633 626
634 void EnrollmentScreenHandler::HandleRetry() { 627 void EnrollmentScreenHandler::HandleRetry() {
635 DCHECK(controller_); 628 DCHECK(controller_);
636 controller_->OnRetry(); 629 controller_->OnRetry();
637 } 630 }
638 631
639 void EnrollmentScreenHandler::HandleFrameLoadingCompleted() { 632 void EnrollmentScreenHandler::HandleFrameLoadingCompleted() {
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
693 686
694 ShowScreenWithData(OobeScreen::SCREEN_OOBE_ENROLLMENT, &screen_data); 687 ShowScreenWithData(OobeScreen::SCREEN_OOBE_ENROLLMENT, &screen_data);
695 if (first_show_) { 688 if (first_show_) {
696 first_show_ = false; 689 first_show_ = false;
697 UpdateStateInternal(NetworkError::ERROR_REASON_UPDATE, true); 690 UpdateStateInternal(NetworkError::ERROR_REASON_UPDATE, true);
698 } 691 }
699 histogram_helper_->OnScreenShow(); 692 histogram_helper_->OnScreenShow();
700 } 693 }
701 694
702 } // namespace chromeos 695 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698