| Index: chrome/browser/chromeos/login/login_utils.cc
|
| diff --git a/chrome/browser/chromeos/login/login_utils.cc b/chrome/browser/chromeos/login/login_utils.cc
|
| index b369abb5d071373673a8eea8b0b2cf34be957ac6..f5946418504d2da79c93a9e5e30a60878f3974fc 100644
|
| --- a/chrome/browser/chromeos/login/login_utils.cc
|
| +++ b/chrome/browser/chromeos/login/login_utils.cc
|
| @@ -21,7 +21,6 @@
|
| #include "base/memory/weak_ptr.h"
|
| #include "base/path_service.h"
|
| #include "base/prefs/pref_member.h"
|
| -#include "base/prefs/pref_registry_simple.h"
|
| #include "base/prefs/pref_service.h"
|
| #include "base/strings/string_util.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| @@ -36,7 +35,6 @@
|
| #include "chrome/browser/browser_shutdown.h"
|
| #include "chrome/browser/chrome_notification_types.h"
|
| #include "chrome/browser/chromeos/boot_times_loader.h"
|
| -#include "chrome/browser/chromeos/input_method/input_method_util.h"
|
| #include "chrome/browser/chromeos/login/auth/parallel_authenticator.h"
|
| #include "chrome/browser/chromeos/login/auth/user_context.h"
|
| #include "chrome/browser/chromeos/login/chrome_restart_request.h"
|
| @@ -45,6 +43,7 @@
|
| #include "chrome/browser/chromeos/login/profile_auth_data.h"
|
| #include "chrome/browser/chromeos/login/saml/saml_offline_signin_limiter.h"
|
| #include "chrome/browser/chromeos/login/saml/saml_offline_signin_limiter_factory.h"
|
| +#include "chrome/browser/chromeos/login/session/session_manager.h"
|
| #include "chrome/browser/chromeos/login/signin/oauth2_login_manager.h"
|
| #include "chrome/browser/chromeos/login/signin/oauth2_login_manager_factory.h"
|
| #include "chrome/browser/chromeos/login/startup_utils.h"
|
| @@ -76,7 +75,6 @@
|
| #include "chromeos/dbus/dbus_method_call_status.h"
|
| #include "chromeos/dbus/dbus_thread_manager.h"
|
| #include "chromeos/dbus/session_manager_client.h"
|
| -#include "chromeos/ime/input_method_manager.h"
|
| #include "chromeos/settings/cros_settings_names.h"
|
| #include "components/signin/core/browser/signin_manager.h"
|
| #include "content/public/browser/browser_thread.h"
|
| @@ -111,21 +109,14 @@ struct DoBrowserLaunchOnLocaleLoadedData;
|
|
|
| class LoginUtilsImpl
|
| : public LoginUtils,
|
| - public OAuth2LoginManager::Observer,
|
| - public net::NetworkChangeNotifier::ConnectionTypeObserver,
|
| - public base::SupportsWeakPtr<LoginUtilsImpl> {
|
| + public base::SupportsWeakPtr<LoginUtilsImpl>,
|
| + public SessionManager::Delegate {
|
| public:
|
| LoginUtilsImpl()
|
| - : has_web_auth_cookies_(false),
|
| - delegate_(NULL),
|
| - exit_after_session_restore_(false),
|
| - session_restore_strategy_(
|
| - OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN) {
|
| - net::NetworkChangeNotifier::AddConnectionTypeObserver(this);
|
| + : delegate_(NULL) {
|
| }
|
|
|
| virtual ~LoginUtilsImpl() {
|
| - net::NetworkChangeNotifier::RemoveConnectionTypeObserver(this);
|
| }
|
|
|
| // LoginUtils implementation:
|
| @@ -133,33 +124,23 @@ class LoginUtilsImpl
|
| LoginDisplayHost* login_host) OVERRIDE;
|
| virtual void PrepareProfile(
|
| const UserContext& user_context,
|
| - const std::string& display_email,
|
| bool has_cookies,
|
| bool has_active_session,
|
| LoginUtils::Delegate* delegate) OVERRIDE;
|
| virtual void DelegateDeleted(LoginUtils::Delegate* delegate) OVERRIDE;
|
| virtual void CompleteOffTheRecordLogin(const GURL& start_url) OVERRIDE;
|
| - virtual void SetFirstLoginPrefs(PrefService* prefs) OVERRIDE;
|
| virtual scoped_refptr<Authenticator> CreateAuthenticator(
|
| LoginStatusConsumer* consumer) OVERRIDE;
|
| - virtual void RestoreAuthenticationSession(Profile* profile) OVERRIDE;
|
| - virtual void InitRlzDelayed(Profile* user_profile) OVERRIDE;
|
|
|
| - // OAuth2LoginManager::Observer overrides.
|
| - virtual void OnSessionRestoreStateChanged(
|
| - Profile* user_profile,
|
| - OAuth2LoginManager::SessionRestoreState state) OVERRIDE;
|
| - virtual void OnNewRefreshTokenAvaiable(Profile* user_profile) OVERRIDE;
|
| -
|
| - // net::NetworkChangeNotifier::ConnectionTypeObserver overrides.
|
| - virtual void OnConnectionTypeChanged(
|
| - net::NetworkChangeNotifier::ConnectionType type) OVERRIDE;
|
| + // SessionManager::Delegate implementation:
|
| + virtual void OnProfilePrepared(Profile* profile) OVERRIDE;
|
| + #if defined(ENABLE_RLZ)
|
| + virtual void OnRlzInitialized() OVERRIDE;
|
| + #endif
|
|
|
| private:
|
| - typedef std::set<std::string> SessionRestoreStateSet;
|
| -
|
| // DoBrowserLaunch is split into two parts.
|
| - // This one is called after anynchronous locale switch.
|
| + // This one is called after asynchronous locale switch.
|
| void DoBrowserLaunchOnLocaleLoadedImpl(Profile* profile,
|
| LoginDisplayHost* login_host);
|
|
|
| @@ -170,79 +151,16 @@ class LoginUtilsImpl
|
| const std::string& loaded_locale,
|
| const bool success);
|
|
|
| - // Restarts OAuth session authentication check.
|
| - void KickStartAuthentication(Profile* profile);
|
| -
|
| - // Callback for Profile::CREATE_STATUS_CREATED profile state.
|
| - // Initializes basic preferences for newly created profile. Any other
|
| - // early profile initialization that needs to happen before
|
| - // ProfileManager::DoFinalInit() gets called is done here.
|
| - void InitProfilePreferences(Profile* user_profile,
|
| - const std::string& email);
|
| -
|
| - // Callback for asynchronous profile creation.
|
| - void OnProfileCreated(const std::string& email,
|
| - Profile* profile,
|
| - Profile::CreateStatus status);
|
| -
|
| - // Callback for asynchronous off the record profile creation.
|
| - void OnOTRProfileCreated(const std::string& email,
|
| - Profile* profile,
|
| - Profile::CreateStatus status);
|
| -
|
| - // Callback for Profile::CREATE_STATUS_INITIALIZED profile state.
|
| - // Profile is created, extensions and promo resources are initialized.
|
| - void UserProfileInitialized(Profile* user_profile);
|
| -
|
| - // Callback for Profile::CREATE_STATUS_INITIALIZED profile state for an OTR
|
| - // login.
|
| - void OTRProfileInitialized(Profile* user_profile);
|
| -
|
| - // Callback to resume profile creation after transferring auth data from
|
| - // the authentication profile.
|
| - void CompleteProfileCreate(Profile* user_profile);
|
| -
|
| - // Finalized profile preparation.
|
| - void FinalizePrepareProfile(Profile* user_profile);
|
| -
|
| - // Initializes member variables needed for session restore process via
|
| - // OAuthLoginManager.
|
| - void InitSessionRestoreStrategy();
|
| -
|
| - // Restores GAIA auth cookies for the created user profile from OAuth2 token.
|
| - void RestoreAuthSession(Profile* user_profile,
|
| - bool restore_from_auth_cookies);
|
| -
|
| - // Initializes RLZ. If |disabled| is true, RLZ pings are disabled.
|
| - void InitRlz(Profile* user_profile, bool disabled);
|
| -
|
| // Attempts restarting the browser process and esures that this does
|
| // not happen while we are still fetching new OAuth refresh tokens.
|
| void AttemptRestart(Profile* profile);
|
|
|
| - UserContext user_context_;
|
| -
|
| - // True if the authentication profile's cookie jar should contain
|
| - // authentication cookies from the authentication extension log in flow.
|
| - bool has_web_auth_cookies_;
|
| // Has to be scoped_refptr, see comment for CreateAuthenticator(...).
|
| scoped_refptr<Authenticator> authenticator_;
|
|
|
| // Delegate to be fired when the profile will be prepared.
|
| LoginUtils::Delegate* delegate_;
|
|
|
| - // Set of user_id for those users that we should restore authentication
|
| - // session when notified about online state change.
|
| - SessionRestoreStateSet pending_restore_sessions_;
|
| -
|
| - // True if we should restart chrome right after session restore.
|
| - bool exit_after_session_restore_;
|
| -
|
| - // Sesion restore strategy.
|
| - OAuth2LoginManager::SessionRestoreStrategy session_restore_strategy_;
|
| - // OAuth2 refresh token for session restore.
|
| - std::string oauth2_refresh_token_;
|
| -
|
| DISALLOW_COPY_AND_ASSIGN(LoginUtilsImpl);
|
| };
|
|
|
| @@ -385,57 +303,22 @@ void LoginUtilsImpl::DoBrowserLaunch(Profile* profile,
|
|
|
| void LoginUtilsImpl::PrepareProfile(
|
| const UserContext& user_context,
|
| - const std::string& display_email,
|
| bool has_cookies,
|
| bool has_active_session,
|
| LoginUtils::Delegate* delegate) {
|
| - BootTimesLoader* btl = BootTimesLoader::Get();
|
| -
|
| - VLOG(1) << "Completing login for " << user_context.GetUserID();
|
| -
|
| - if (!has_active_session) {
|
| - btl->AddLoginTimeMarker("StartSession-Start", false);
|
| - DBusThreadManager::Get()->GetSessionManagerClient()->StartSession(
|
| - user_context.GetUserID());
|
| - btl->AddLoginTimeMarker("StartSession-End", false);
|
| - }
|
| -
|
| - btl->AddLoginTimeMarker("UserLoggedIn-Start", false);
|
| - UserManager* user_manager = UserManager::Get();
|
| - user_manager->UserLoggedIn(user_context.GetUserID(),
|
| - user_context.GetUserIDHash(),
|
| - false);
|
| - btl->AddLoginTimeMarker("UserLoggedIn-End", false);
|
| -
|
| - // Switch log file as soon as possible.
|
| - if (base::SysInfo::IsRunningOnChromeOS())
|
| - logging::RedirectChromeLogging(*(CommandLine::ForCurrentProcess()));
|
| -
|
| - // Update user's displayed email.
|
| - if (!display_email.empty())
|
| - user_manager->SaveUserDisplayEmail(user_context.GetUserID(), display_email);
|
| -
|
| - user_context_ = user_context;
|
| -
|
| - has_web_auth_cookies_ = has_cookies;
|
| + // TODO(nkostylev): We have to initialize LoginUtils delegate as long
|
| + // as it coexist with SessionManager.
|
| delegate_ = delegate;
|
| - InitSessionRestoreStrategy();
|
| -
|
| - if (DemoAppLauncher::IsDemoAppSession(user_context.GetUserID())) {
|
| - g_browser_process->profile_manager()->CreateProfileAsync(
|
| - user_manager->GetUserProfileDir(user_context.GetUserID()),
|
| - base::Bind(&LoginUtilsImpl::OnOTRProfileCreated, AsWeakPtr(),
|
| - user_context.GetUserID()),
|
| - base::string16(), base::string16(), std::string());
|
| - } else {
|
| - // Can't use display_email because it is empty when existing user logs in
|
| - // using sing-in pod on login screen (i.e. user didn't type email).
|
| - g_browser_process->profile_manager()->CreateProfileAsync(
|
| - user_manager->GetUserProfileDir(user_context.GetUserID()),
|
| - base::Bind(&LoginUtilsImpl::OnProfileCreated, AsWeakPtr(),
|
| - user_context.GetUserID()),
|
| - base::string16(), base::string16(), std::string());
|
| - }
|
| +
|
| + // For the transition part LoginUtils will just delegate profile
|
| + // creation and initialization to SessionManager. Later LoginUtils will be
|
| + // removed and all LoginUtils clients will just work with SessionManager
|
| + // directly.
|
| + SessionManager::GetInstance()->StartSession(user_context,
|
| + authenticator_,
|
| + has_cookies,
|
| + has_active_session,
|
| + this);
|
| }
|
|
|
| void LoginUtilsImpl::DelegateDeleted(LoginUtils::Delegate* delegate) {
|
| @@ -443,273 +326,6 @@ void LoginUtilsImpl::DelegateDeleted(LoginUtils::Delegate* delegate) {
|
| delegate_ = NULL;
|
| }
|
|
|
| -void LoginUtilsImpl::InitProfilePreferences(Profile* user_profile,
|
| - const std::string& user_id) {
|
| - if (UserManager::Get()->IsCurrentUserNew())
|
| - SetFirstLoginPrefs(user_profile->GetPrefs());
|
| -
|
| - if (UserManager::Get()->IsLoggedInAsLocallyManagedUser()) {
|
| - User* active_user = UserManager::Get()->GetActiveUser();
|
| - std::string managed_user_sync_id =
|
| - UserManager::Get()->GetSupervisedUserManager()->
|
| - GetUserSyncId(active_user->email());
|
| -
|
| - // TODO(ibraaaa): Remove that when 97% of our users are using M31.
|
| - // http://crbug.com/276163
|
| - if (managed_user_sync_id.empty())
|
| - managed_user_sync_id = "DUMMY_ID";
|
| -
|
| - user_profile->GetPrefs()->SetString(prefs::kSupervisedUserId,
|
| - managed_user_sync_id);
|
| - } else if (UserManager::Get()->IsLoggedInAsRegularUser()) {
|
| - // Make sure that the google service username is properly set (we do this
|
| - // on every sign in, not just the first login, to deal with existing
|
| - // profiles that might not have it set yet).
|
| - SigninManagerBase* signin_manager =
|
| - SigninManagerFactory::GetForProfile(user_profile);
|
| - signin_manager->SetAuthenticatedUsername(user_id);
|
| - }
|
| -}
|
| -
|
| -void LoginUtilsImpl::InitSessionRestoreStrategy() {
|
| - CommandLine* command_line = CommandLine::ForCurrentProcess();
|
| - bool in_app_mode = chrome::IsRunningInForcedAppMode();
|
| -
|
| - // Are we in kiosk app mode?
|
| - if (in_app_mode) {
|
| - if (command_line->HasSwitch(::switches::kAppModeOAuth2Token)) {
|
| - oauth2_refresh_token_ = command_line->GetSwitchValueASCII(
|
| - ::switches::kAppModeOAuth2Token);
|
| - }
|
| -
|
| - if (command_line->HasSwitch(::switches::kAppModeAuthCode)) {
|
| - user_context_.SetAuthCode(command_line->GetSwitchValueASCII(
|
| - ::switches::kAppModeAuthCode));
|
| - }
|
| -
|
| - DCHECK(!has_web_auth_cookies_);
|
| - if (!user_context_.GetAuthCode().empty()) {
|
| - session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_AUTH_CODE;
|
| - } else if (!oauth2_refresh_token_.empty()) {
|
| - session_restore_strategy_ =
|
| - OAuth2LoginManager::RESTORE_FROM_PASSED_OAUTH2_REFRESH_TOKEN;
|
| - } else {
|
| - session_restore_strategy_ =
|
| - OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN;
|
| - }
|
| - return;
|
| - }
|
| -
|
| - if (has_web_auth_cookies_) {
|
| - session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_COOKIE_JAR;
|
| - } else if (!user_context_.GetAuthCode().empty()) {
|
| - session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_AUTH_CODE;
|
| - } else {
|
| - session_restore_strategy_ =
|
| - OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN;
|
| - }
|
| -}
|
| -
|
| -
|
| -void LoginUtilsImpl::OnProfileCreated(
|
| - const std::string& user_id,
|
| - Profile* user_profile,
|
| - Profile::CreateStatus status) {
|
| - CHECK(user_profile);
|
| -
|
| - switch (status) {
|
| - case Profile::CREATE_STATUS_CREATED:
|
| - InitProfilePreferences(user_profile, user_id);
|
| - break;
|
| - case Profile::CREATE_STATUS_INITIALIZED:
|
| - UserProfileInitialized(user_profile);
|
| - break;
|
| - case Profile::CREATE_STATUS_LOCAL_FAIL:
|
| - case Profile::CREATE_STATUS_REMOTE_FAIL:
|
| - case Profile::CREATE_STATUS_CANCELED:
|
| - case Profile::MAX_CREATE_STATUS:
|
| - NOTREACHED();
|
| - break;
|
| - }
|
| -}
|
| -
|
| -void LoginUtilsImpl::OnOTRProfileCreated(
|
| - const std::string& user_id,
|
| - Profile* user_profile,
|
| - Profile::CreateStatus status) {
|
| - CHECK(user_profile);
|
| -
|
| - switch (status) {
|
| - case Profile::CREATE_STATUS_CREATED:
|
| - InitProfilePreferences(user_profile, user_id);
|
| - break;
|
| - case Profile::CREATE_STATUS_INITIALIZED:
|
| - OTRProfileInitialized(user_profile);
|
| - break;
|
| - case Profile::CREATE_STATUS_LOCAL_FAIL:
|
| - case Profile::CREATE_STATUS_REMOTE_FAIL:
|
| - case Profile::CREATE_STATUS_CANCELED:
|
| - case Profile::MAX_CREATE_STATUS:
|
| - NOTREACHED();
|
| - break;
|
| - }
|
| -}
|
| -
|
| -void LoginUtilsImpl::UserProfileInitialized(Profile* user_profile) {
|
| - BootTimesLoader* btl = BootTimesLoader::Get();
|
| - btl->AddLoginTimeMarker("UserProfileGotten", false);
|
| -
|
| - if (user_context_.IsUsingOAuth()) {
|
| - // Transfer proxy authentication cache, cookies (optionally) and server
|
| - // bound certs from the profile that was used for authentication. This
|
| - // profile contains cookies that auth extension should have already put in
|
| - // place that will ensure that the newly created session is authenticated
|
| - // for the websites that work with the used authentication schema.
|
| - ProfileAuthData::Transfer(authenticator_->authentication_profile(),
|
| - user_profile,
|
| - has_web_auth_cookies_, // transfer_cookies
|
| - base::Bind(
|
| - &LoginUtilsImpl::CompleteProfileCreate,
|
| - AsWeakPtr(),
|
| - user_profile));
|
| - return;
|
| - }
|
| -
|
| - FinalizePrepareProfile(user_profile);
|
| -}
|
| -
|
| -void LoginUtilsImpl::OTRProfileInitialized(Profile* user_profile) {
|
| - user_profile->OnLogin();
|
| - // Send the notification before creating the browser so additional objects
|
| - // that need the profile (e.g. the launcher) can be created first.
|
| - content::NotificationService::current()->Notify(
|
| - chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
|
| - content::NotificationService::AllSources(),
|
| - content::Details<Profile>(user_profile));
|
| -
|
| - if (delegate_)
|
| - delegate_->OnProfilePrepared(user_profile);
|
| -}
|
| -
|
| -void LoginUtilsImpl::CompleteProfileCreate(Profile* user_profile) {
|
| - RestoreAuthSession(user_profile, has_web_auth_cookies_);
|
| - FinalizePrepareProfile(user_profile);
|
| -}
|
| -
|
| -void LoginUtilsImpl::RestoreAuthSession(Profile* user_profile,
|
| - bool restore_from_auth_cookies) {
|
| - CHECK((authenticator_.get() && authenticator_->authentication_profile()) ||
|
| - !restore_from_auth_cookies);
|
| -
|
| - if (chrome::IsRunningInForcedAppMode() ||
|
| - CommandLine::ForCurrentProcess()->HasSwitch(
|
| - chromeos::switches::kOobeSkipPostLogin)) {
|
| - return;
|
| - }
|
| -
|
| - exit_after_session_restore_ = false;
|
| - // Remove legacy OAuth1 token if we have one. If it's valid, we should already
|
| - // have OAuth2 refresh token in OAuth2TokenService that could be used to
|
| - // retrieve all other tokens and user_context.
|
| - OAuth2LoginManager* login_manager =
|
| - OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile);
|
| - login_manager->AddObserver(this);
|
| - login_manager->RestoreSession(
|
| - authenticator_.get() && authenticator_->authentication_profile()
|
| - ? authenticator_->authentication_profile()->GetRequestContext()
|
| - : NULL,
|
| - session_restore_strategy_,
|
| - oauth2_refresh_token_,
|
| - user_context_.GetAuthCode());
|
| -}
|
| -
|
| -void LoginUtilsImpl::FinalizePrepareProfile(Profile* user_profile) {
|
| - BootTimesLoader* btl = BootTimesLoader::Get();
|
| - // Own TPM device if, for any reason, it has not been done in EULA
|
| - // wizard screen.
|
| - CryptohomeClient* client = DBusThreadManager::Get()->GetCryptohomeClient();
|
| - btl->AddLoginTimeMarker("TPMOwn-Start", false);
|
| - if (cryptohome_util::TpmIsEnabled() && !cryptohome_util::TpmIsBeingOwned()) {
|
| - if (cryptohome_util::TpmIsOwned()) {
|
| - client->CallTpmClearStoredPasswordAndBlock();
|
| - } else {
|
| - client->TpmCanAttemptOwnership(EmptyVoidDBusMethodCallback());
|
| - }
|
| - }
|
| - btl->AddLoginTimeMarker("TPMOwn-End", false);
|
| -
|
| - if (UserManager::Get()->IsLoggedInAsRegularUser()) {
|
| - SAMLOfflineSigninLimiter* saml_offline_signin_limiter =
|
| - SAMLOfflineSigninLimiterFactory::GetForProfile(user_profile);
|
| - if (saml_offline_signin_limiter)
|
| - saml_offline_signin_limiter->SignedIn(user_context_.GetAuthFlow());
|
| - }
|
| -
|
| - user_profile->OnLogin();
|
| -
|
| - // Send the notification before creating the browser so additional objects
|
| - // that need the profile (e.g. the launcher) can be created first.
|
| - content::NotificationService::current()->Notify(
|
| - chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
|
| - content::NotificationService::AllSources(),
|
| - content::Details<Profile>(user_profile));
|
| -
|
| - // Initialize RLZ only for primary user.
|
| - if (UserManager::Get()->GetPrimaryUser() ==
|
| - UserManager::Get()->GetUserByProfile(user_profile)) {
|
| - InitRlzDelayed(user_profile);
|
| - }
|
| - // TODO(altimofeev): This pointer should probably never be NULL, but it looks
|
| - // like LoginUtilsImpl::OnProfileCreated() may be getting called before
|
| - // LoginUtilsImpl::PrepareProfile() has set |delegate_| when Chrome is killed
|
| - // during shutdown in tests -- see http://crosbug.com/18269. Replace this
|
| - // 'if' statement with a CHECK(delegate_) once the underlying issue is
|
| - // resolved.
|
| - if (delegate_)
|
| - delegate_->OnProfilePrepared(user_profile);
|
| -}
|
| -
|
| -void LoginUtilsImpl::InitRlzDelayed(Profile* user_profile) {
|
| -#if defined(ENABLE_RLZ)
|
| - if (!g_browser_process->local_state()->HasPrefPath(prefs::kRLZBrand)) {
|
| - // Read brand code asynchronously from an OEM data and repost ourselves.
|
| - google_brand::chromeos::InitBrand(
|
| - base::Bind(&LoginUtilsImpl::InitRlzDelayed, AsWeakPtr(), user_profile));
|
| - return;
|
| - }
|
| - base::PostTaskAndReplyWithResult(
|
| - base::WorkerPool::GetTaskRunner(false),
|
| - FROM_HERE,
|
| - base::Bind(&base::PathExists, GetRlzDisabledFlagPath()),
|
| - base::Bind(&LoginUtilsImpl::InitRlz, AsWeakPtr(), user_profile));
|
| -#endif
|
| -}
|
| -
|
| -void LoginUtilsImpl::InitRlz(Profile* user_profile, bool disabled) {
|
| -#if defined(ENABLE_RLZ)
|
| - PrefService* local_state = g_browser_process->local_state();
|
| - if (disabled) {
|
| - // Empty brand code means an organic install (no RLZ pings are sent).
|
| - google_brand::chromeos::ClearBrandForCurrentSession();
|
| - }
|
| - if (disabled != local_state->GetBoolean(prefs::kRLZDisabled)) {
|
| - // When switching to RLZ enabled/disabled state, clear all recorded events.
|
| - RLZTracker::ClearRlzState();
|
| - local_state->SetBoolean(prefs::kRLZDisabled, disabled);
|
| - }
|
| - // Init the RLZ library.
|
| - int ping_delay = user_profile->GetPrefs()->GetInteger(
|
| - first_run::GetPingDelayPrefName().c_str());
|
| - // Negative ping delay means to send ping immediately after a first search is
|
| - // recorded.
|
| - RLZTracker::InitRlzFromProfileDelayed(
|
| - user_profile, UserManager::Get()->IsCurrentUserNew(),
|
| - ping_delay < 0, base::TimeDelta::FromMilliseconds(abs(ping_delay)));
|
| - if (delegate_)
|
| - delegate_->OnRlzInitialized(user_profile);
|
| -#endif
|
| -}
|
| -
|
| void LoginUtilsImpl::CompleteOffTheRecordLogin(const GURL& start_url) {
|
| VLOG(1) << "Completing incognito login";
|
|
|
| @@ -726,52 +342,6 @@ void LoginUtilsImpl::CompleteOffTheRecordLogin(const GURL& start_url) {
|
| RestartChrome(cmd_line_str);
|
| }
|
|
|
| -void LoginUtilsImpl::SetFirstLoginPrefs(PrefService* prefs) {
|
| - VLOG(1) << "Setting first login prefs";
|
| - BootTimesLoader* btl = BootTimesLoader::Get();
|
| - std::string locale = g_browser_process->GetApplicationLocale();
|
| -
|
| - // First, we'll set kLanguagePreloadEngines.
|
| - input_method::InputMethodManager* manager =
|
| - input_method::InputMethodManager::Get();
|
| - std::vector<std::string> input_method_ids;
|
| - manager->GetInputMethodUtil()->GetFirstLoginInputMethodIds(
|
| - locale, manager->GetCurrentInputMethod(), &input_method_ids);
|
| - // Save the input methods in the user's preferences.
|
| - StringPrefMember language_preload_engines;
|
| - language_preload_engines.Init(prefs::kLanguagePreloadEngines,
|
| - prefs);
|
| - language_preload_engines.SetValue(JoinString(input_method_ids, ','));
|
| - btl->AddLoginTimeMarker("IMEStarted", false);
|
| -
|
| - // Second, we'll set kLanguagePreferredLanguages.
|
| - std::vector<std::string> language_codes;
|
| - // The current locale should be on the top.
|
| - language_codes.push_back(locale);
|
| -
|
| - // Add input method IDs based on the input methods, as there may be
|
| - // input methods that are unrelated to the current locale. Example: the
|
| - // hardware keyboard layout xkb:us::eng is used for logging in, but the
|
| - // UI language is set to French. In this case, we should set "fr,en"
|
| - // to the preferred languages preference.
|
| - std::vector<std::string> candidates;
|
| - manager->GetInputMethodUtil()->GetLanguageCodesFromInputMethodIds(
|
| - input_method_ids, &candidates);
|
| - for (size_t i = 0; i < candidates.size(); ++i) {
|
| - const std::string& candidate = candidates[i];
|
| - // Skip if it's already in language_codes.
|
| - if (std::count(language_codes.begin(), language_codes.end(),
|
| - candidate) == 0) {
|
| - language_codes.push_back(candidate);
|
| - }
|
| - }
|
| - // Save the preferred languages in the user's preferences.
|
| - StringPrefMember language_preferred_languages;
|
| - language_preferred_languages.Init(prefs::kLanguagePreferredLanguages,
|
| - prefs);
|
| - language_preferred_languages.SetValue(JoinString(language_codes, ','));
|
| -}
|
| -
|
| scoped_refptr<Authenticator> LoginUtilsImpl::CreateAuthenticator(
|
| LoginStatusConsumer* consumer) {
|
| // Screen locker needs new Authenticator instance each time.
|
| @@ -790,118 +360,20 @@ scoped_refptr<Authenticator> LoginUtilsImpl::CreateAuthenticator(
|
| return authenticator_;
|
| }
|
|
|
| -void LoginUtilsImpl::RestoreAuthenticationSession(Profile* user_profile) {
|
| - UserManager* user_manager = UserManager::Get();
|
| - // We don't need to restore session for demo/guest/stub/public account users.
|
| - if (!user_manager->IsUserLoggedIn() ||
|
| - user_manager->IsLoggedInAsGuest() ||
|
| - user_manager->IsLoggedInAsPublicAccount() ||
|
| - user_manager->IsLoggedInAsDemoUser() ||
|
| - user_manager->IsLoggedInAsStub()) {
|
| - return;
|
| - }
|
| -
|
| - User* user = user_manager->GetUserByProfile(user_profile);
|
| - DCHECK(user);
|
| - if (!net::NetworkChangeNotifier::IsOffline()) {
|
| - pending_restore_sessions_.erase(user->email());
|
| - RestoreAuthSession(user_profile, false);
|
| - } else {
|
| - // Even if we're online we should wait till initial
|
| - // OnConnectionTypeChanged() call. Otherwise starting fetchers too early may
|
| - // end up canceling all request when initial network connection type is
|
| - // processed. See http://crbug.com/121643.
|
| - pending_restore_sessions_.insert(user->email());
|
| - }
|
| -}
|
| -
|
| -void LoginUtilsImpl::OnSessionRestoreStateChanged(
|
| - Profile* user_profile,
|
| - OAuth2LoginManager::SessionRestoreState state) {
|
| - User::OAuthTokenStatus user_status = User::OAUTH_TOKEN_STATUS_UNKNOWN;
|
| - OAuth2LoginManager* login_manager =
|
| - OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile);
|
| -
|
| - bool connection_error = false;
|
| - switch (state) {
|
| - case OAuth2LoginManager::SESSION_RESTORE_DONE:
|
| - user_status = User::OAUTH2_TOKEN_STATUS_VALID;
|
| - break;
|
| - case OAuth2LoginManager::SESSION_RESTORE_FAILED:
|
| - user_status = User::OAUTH2_TOKEN_STATUS_INVALID;
|
| - break;
|
| - case OAuth2LoginManager::SESSION_RESTORE_CONNECTION_FAILED:
|
| - connection_error = true;
|
| - break;
|
| - case OAuth2LoginManager::SESSION_RESTORE_NOT_STARTED:
|
| - case OAuth2LoginManager::SESSION_RESTORE_PREPARING:
|
| - case OAuth2LoginManager::SESSION_RESTORE_IN_PROGRESS:
|
| - return;
|
| - }
|
| -
|
| - // We should not be clearing existing token state if that was a connection
|
| - // error. http://crbug.com/295245
|
| - if (!connection_error) {
|
| - // We are in one of "done" states here.
|
| - UserManager::Get()->SaveUserOAuthStatus(
|
| - UserManager::Get()->GetLoggedInUser()->email(),
|
| - user_status);
|
| - }
|
| -
|
| - login_manager->RemoveObserver(this);
|
| -}
|
| -
|
| -void LoginUtilsImpl::OnNewRefreshTokenAvaiable(Profile* user_profile) {
|
| - // Check if we were waiting to restart chrome.
|
| - if (!exit_after_session_restore_)
|
| - return;
|
| -
|
| - OAuth2LoginManager* login_manager =
|
| - OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile);
|
| - login_manager->RemoveObserver(this);
|
| -
|
| - // Mark user auth token status as valid.
|
| - UserManager::Get()->SaveUserOAuthStatus(
|
| - UserManager::Get()->GetLoggedInUser()->email(),
|
| - User::OAUTH2_TOKEN_STATUS_VALID);
|
| -
|
| - LOG(WARNING) << "Exiting after new refresh token fetched";
|
| - // We need to restart cleanly in this case to make sure OAuth2 RT is actually
|
| - // saved.
|
| - chrome::AttemptRestart();
|
| +void LoginUtilsImpl::OnProfilePrepared(Profile* profile) {
|
| + if (delegate_)
|
| + delegate_->OnProfilePrepared(profile);
|
| }
|
|
|
| -void LoginUtilsImpl::OnConnectionTypeChanged(
|
| - net::NetworkChangeNotifier::ConnectionType type) {
|
| - UserManager* user_manager = UserManager::Get();
|
| - if (type == net::NetworkChangeNotifier::CONNECTION_NONE ||
|
| - user_manager->IsLoggedInAsGuest() || !user_manager->IsUserLoggedIn()) {
|
| - return;
|
| - }
|
| -
|
| - // Need to iterate over all users and their OAuth2 session state.
|
| - const UserList& users = user_manager->GetLoggedInUsers();
|
| - for (UserList::const_iterator it = users.begin(); it != users.end(); ++it) {
|
| - Profile* user_profile = user_manager->GetProfileByUser(*it);
|
| - bool should_restore_session =
|
| - pending_restore_sessions_.find((*it)->email()) !=
|
| - pending_restore_sessions_.end();
|
| - OAuth2LoginManager* login_manager =
|
| - OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile);
|
| - if (login_manager->state() ==
|
| - OAuth2LoginManager::SESSION_RESTORE_IN_PROGRESS) {
|
| - // If we come online for the first time after successful offline login,
|
| - // we need to kick off OAuth token verification process again.
|
| - login_manager->ContinueSessionRestore();
|
| - } else if (should_restore_session) {
|
| - pending_restore_sessions_.erase((*it)->email());
|
| - RestoreAuthSession(user_profile, has_web_auth_cookies_);
|
| - }
|
| - }
|
| +#if defined(ENABLE_RLZ)
|
| +void LoginUtilsImpl::OnRlzInitialized() {
|
| + if (delegate_)
|
| + delegate_->OnRlzInitialized();
|
| }
|
| +#endif
|
|
|
| void LoginUtilsImpl::AttemptRestart(Profile* profile) {
|
| - if (session_restore_strategy_ !=
|
| + if (SessionManager::GetInstance()->GetSigninSessionRestoreStrategy() !=
|
| OAuth2LoginManager::RESTORE_FROM_COOKIE_JAR) {
|
| chrome::AttemptRestart();
|
| return;
|
| @@ -920,15 +392,7 @@ void LoginUtilsImpl::AttemptRestart(Profile* profile) {
|
| }
|
|
|
| LOG(WARNING) << "Attempting browser restart during session restore.";
|
| - exit_after_session_restore_ = true;
|
| -}
|
| -
|
| -// static
|
| -void LoginUtils::RegisterPrefs(PrefRegistrySimple* registry) {
|
| - registry->RegisterBooleanPref(prefs::kFactoryResetRequested, false);
|
| - registry->RegisterBooleanPref(prefs::kRollbackRequested, false);
|
| - registry->RegisterStringPref(prefs::kRLZBrand, std::string());
|
| - registry->RegisterBooleanPref(prefs::kRLZDisabled, false);
|
| + SessionManager::GetInstance()->set_exit_after_session_restore(true);
|
| }
|
|
|
| // static
|
|
|