Chromium Code Reviews| Index: chrome/browser/chromeos/enrollment_dialog_view.cc |
| diff --git a/chrome/browser/chromeos/enrollment_dialog_view.cc b/chrome/browser/chromeos/enrollment_dialog_view.cc |
| index 33f3af5a4bfdb2e073d95eb3517c9a7d5c812f09..96f342fc65dbbe2e39750acafeb0c5b4857f1690 100644 |
| --- a/chrome/browser/chromeos/enrollment_dialog_view.cc |
| +++ b/chrome/browser/chromeos/enrollment_dialog_view.cc |
| @@ -16,6 +16,7 @@ |
| #include "chrome/browser/ui/browser_navigator.h" |
| #include "chrome/browser/ui/browser_navigator_params.h" |
| #include "chrome/grit/generated_resources.h" |
| +#include "chromeos/login/login_state.h" |
| #include "chromeos/network/client_cert_util.h" |
| #include "chromeos/network/managed_network_configuration_handler.h" |
| #include "chromeos/network/network_event_log.h" |
| @@ -251,6 +252,37 @@ void EnrollmentComplete(const std::string& network_id) { |
| NET_LOG_USER("Enrollment Complete", network_id); |
| } |
| +// Decides if the enrollment dialog is allowed in the current login state. |
| +bool EnrollmentDialogAllowed() { |
| + chromeos::LoginState::LoggedInUserType user_type = |
| + LoginState::Get()->GetLoggedInUserType(); |
| + switch (user_type) { |
| + case LoginState::LOGGED_IN_USER_NONE: |
| + // Enrollment on the sign-in screen would not work anyway because we have |
| + // no extensions there yet and no PKCS11 token is loaded. |
|
emaxx
2017/04/25 15:15:58
nit: The part "because we have no extensions there
pmarko
2017/04/25 16:59:57
Done. (You're right - I've dropped the comments he
|
| + return false; |
| + case LoginState::LOGGED_IN_USER_REGULAR: |
| + return true; |
|
emaxx
2017/04/25 15:15:58
I'm afraid this potentially opens the possibility
pmarko
2017/04/25 16:59:57
Done. (Added back IsSigninProfile check in the beg
|
| + case LoginState::LOGGED_IN_USER_OWNER: |
| + return true; |
| + case LoginState::LOGGED_IN_USER_GUEST: |
| + return true; |
| + case LoginState::LOGGED_IN_USER_PUBLIC_ACCOUNT: |
| + // Not allowed for now because we haven't tested this. |
|
emaxx
2017/04/25 15:15:58
nit: I think it's better not to track in the code
pmarko
2017/04/25 16:59:57
Done.
|
| + return false; |
| + case LoginState::LOGGED_IN_USER_SUPERVISED: |
| + return true; |
| + case LoginState::LOGGED_IN_USER_KIOSK_APP: |
| + // We don't want to show dialogs on kiosk. |
| + return false; |
| + case LoginState::LOGGED_IN_USER_ARC_KIOSK_APP: |
| + // We don't want to show dialogs on kiosk. |
| + return false; |
| + } |
| + NOTREACHED(); |
| + return false; |
| +} |
| + |
| } // namespace |
| //////////////////////////////////////////////////////////////////////////////// |
| @@ -270,6 +302,8 @@ bool CreateEnrollmentDialog(const std::string& network_id, |
| Browser* browser = chrome::FindBrowserWithWindow(owning_window); |
| Profile* profile = |
| browser ? browser->profile() : ProfileManager::GetPrimaryUserProfile(); |
| + if (!EnrollmentDialogAllowed()) |
| + return false; |
| std::string username_hash = ProfileHelper::GetUserIdHashFromProfile(profile); |
| onc::ONCSource onc_source = onc::ONC_SOURCE_NONE; |
| @@ -278,14 +312,11 @@ bool CreateEnrollmentDialog(const std::string& network_id, |
| ->managed_network_configuration_handler() |
| ->FindPolicyByGUID(username_hash, network_id, &onc_source); |
| - // We skip certificate patterns for device policy ONC so that an unmanaged |
| - // user can't get to the place where a cert is presented for them |
| - // involuntarily. |
| - if (!policy || onc_source == onc::ONC_SOURCE_DEVICE_POLICY) |
| + if (!policy) |
| return false; |
| client_cert::ClientCertConfig cert_config; |
| - OncToClientCertConfig(*policy, &cert_config); |
| + OncToClientCertConfig(onc_source, *policy, &cert_config); |
| if (cert_config.client_cert_type != onc::client_cert::kPattern) |
| return false; |