Index: chrome/browser/chromeos/login/session/session_manager.cc |
diff --git a/chrome/browser/chromeos/login/session/session_manager.cc b/chrome/browser/chromeos/login/session/session_manager.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..b54c7c004b2f370669f064d8e6c9d1d818ee6692 |
--- /dev/null |
+++ b/chrome/browser/chromeos/login/session/session_manager.cc |
@@ -0,0 +1,578 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "chrome/browser/chromeos/login/session/session_manager.h" |
+ |
+#include <string> |
+ |
+#include "base/base_paths.h" |
+#include "base/bind.h" |
+#include "base/command_line.h" |
+#include "base/logging.h" |
+#include "base/path_service.h" |
+#include "base/prefs/pref_member.h" |
+#include "base/prefs/pref_registry_simple.h" |
+#include "base/prefs/pref_service.h" |
+#include "base/strings/string16.h" |
+#include "base/sys_info.h" |
+#include "base/task_runner_util.h" |
+#include "base/threading/worker_pool.h" |
+#include "chrome/browser/app_mode/app_mode_utils.h" |
+#include "chrome/browser/browser_process.h" |
+#include "chrome/browser/chrome_notification_types.h" |
+#include "chrome/browser/chromeos/boot_times_loader.h" |
+#include "chrome/browser/chromeos/input_method/input_method_util.h" |
+#include "chrome/browser/chromeos/login/demo_mode/demo_app_launcher.h" |
+#include "chrome/browser/chromeos/login/profile_auth_data.h" |
+#include "chrome/browser/chromeos/login/saml/saml_offline_signin_limiter.h" |
+#include "chrome/browser/chromeos/login/saml/saml_offline_signin_limiter_factory.h" |
+#include "chrome/browser/chromeos/login/signin/oauth2_login_manager.h" |
+#include "chrome/browser/chromeos/login/signin/oauth2_login_manager_factory.h" |
+#include "chrome/browser/chromeos/login/users/supervised_user_manager.h" |
+#include "chrome/browser/chromeos/login/users/user.h" |
+#include "chrome/browser/chromeos/login/users/user_manager.h" |
+#include "chrome/browser/first_run/first_run.h" |
+#include "chrome/browser/google/google_brand_chromeos.h" |
+#include "chrome/browser/lifetime/application_lifetime.h" |
+#include "chrome/browser/profiles/profile.h" |
+#include "chrome/browser/profiles/profile_manager.h" |
+#include "chrome/browser/rlz/rlz.h" |
+#include "chrome/browser/signin/signin_manager_factory.h" |
+#include "chrome/common/chrome_switches.h" |
+#include "chrome/common/logging_chrome.h" |
+#include "chrome/common/pref_names.h" |
+#include "chromeos/chromeos_switches.h" |
+#include "chromeos/cryptohome/cryptohome_util.h" |
+#include "chromeos/dbus/cryptohome_client.h" |
+#include "chromeos/dbus/dbus_thread_manager.h" |
+#include "chromeos/dbus/session_manager_client.h" |
+#include "chromeos/ime/input_method_manager.h" |
+#include "components/signin/core/browser/signin_manager_base.h" |
+#include "content/public/browser/notification_service.h" |
+ |
+namespace chromeos { |
+ |
+namespace { |
+ |
+void InitLocaleAndInputMethodsForNewUser(PrefService* prefs) { |
+ // First, we'll set kLanguagePreloadEngines. |
+ std::string locale = g_browser_process->GetApplicationLocale(); |
+ input_method::InputMethodManager* manager = |
+ input_method::InputMethodManager::Get(); |
+ std::vector<std::string> input_method_ids; |
+ manager->GetInputMethodUtil()->GetFirstLoginInputMethodIds( |
+ locale, manager->GetCurrentInputMethod(), &input_method_ids); |
+ |
+ // Save the input methods in the user's preferences. |
+ StringPrefMember language_preload_engines; |
+ language_preload_engines.Init(prefs::kLanguagePreloadEngines, prefs); |
+ language_preload_engines.SetValue(JoinString(input_method_ids, ',')); |
+ BootTimesLoader::Get()->AddLoginTimeMarker("IMEStarted", false); |
+ |
+ // Second, we'll set kLanguagePreferredLanguages. |
+ std::vector<std::string> language_codes; |
+ |
+ // The current locale should be on the top. |
+ language_codes.push_back(locale); |
+ |
+ // Add input method IDs based on the input methods, as there may be |
+ // input methods that are unrelated to the current locale. Example: the |
+ // hardware keyboard layout xkb:us::eng is used for logging in, but the |
+ // UI language is set to French. In this case, we should set "fr,en" |
+ // to the preferred languages preference. |
+ std::vector<std::string> candidates; |
+ manager->GetInputMethodUtil()->GetLanguageCodesFromInputMethodIds( |
+ input_method_ids, &candidates); |
+ for (size_t i = 0; i < candidates.size(); ++i) { |
+ const std::string& candidate = candidates[i]; |
+ // Skip if it's already in language_codes. |
+ if (std::count(language_codes.begin(), language_codes.end(), |
+ candidate) == 0) { |
+ language_codes.push_back(candidate); |
+ } |
+ } |
+ |
+ // Save the preferred languages in the user's preferences. |
+ StringPrefMember language_preferred_languages; |
+ language_preferred_languages.Init(prefs::kLanguagePreferredLanguages, prefs); |
+ language_preferred_languages.SetValue(JoinString(language_codes, ',')); |
+} |
+ |
+#if defined(ENABLE_RLZ) |
+// Flag file that disables RLZ tracking, when present. |
+const base::FilePath::CharType kRLZDisabledFlagName[] = |
+ FILE_PATH_LITERAL(".rlz_disabled"); |
+ |
+base::FilePath GetRlzDisabledFlagPath() { |
+ base::FilePath homedir; |
+ PathService::Get(base::DIR_HOME, &homedir); |
+ return homedir.Append(kRLZDisabledFlagName); |
+} |
+#endif |
+ |
+} // namespace |
+ |
+// static |
+SessionManager* SessionManager::GetInstance() { |
+ return Singleton<SessionManager, |
+ DefaultSingletonTraits<SessionManager> >::get(); |
+} |
+ |
+// static |
+void SessionManager::RegisterPrefs(PrefRegistrySimple* registry) { |
+ registry->RegisterStringPref(prefs::kRLZBrand, std::string()); |
+ registry->RegisterBooleanPref(prefs::kRLZDisabled, false); |
+} |
+ |
+SessionManager::SessionManager() |
+ : delegate_(NULL), |
+ has_web_auth_cookies_(false), |
+ exit_after_session_restore_(false), |
+ session_restore_strategy_( |
+ OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN) { |
+ net::NetworkChangeNotifier::AddConnectionTypeObserver(this); |
+} |
+ |
+SessionManager::~SessionManager() { |
+ net::NetworkChangeNotifier::RemoveConnectionTypeObserver(this); |
+} |
+ |
+void SessionManager::OnSessionRestoreStateChanged( |
+ Profile* user_profile, |
+ OAuth2LoginManager::SessionRestoreState state) { |
+ User::OAuthTokenStatus user_status = User::OAUTH_TOKEN_STATUS_UNKNOWN; |
+ OAuth2LoginManager* login_manager = |
+ OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile); |
+ |
+ bool connection_error = false; |
+ switch (state) { |
+ case OAuth2LoginManager::SESSION_RESTORE_DONE: |
+ user_status = User::OAUTH2_TOKEN_STATUS_VALID; |
+ break; |
+ case OAuth2LoginManager::SESSION_RESTORE_FAILED: |
+ user_status = User::OAUTH2_TOKEN_STATUS_INVALID; |
+ break; |
+ case OAuth2LoginManager::SESSION_RESTORE_CONNECTION_FAILED: |
+ connection_error = true; |
+ break; |
+ case OAuth2LoginManager::SESSION_RESTORE_NOT_STARTED: |
+ case OAuth2LoginManager::SESSION_RESTORE_PREPARING: |
+ case OAuth2LoginManager::SESSION_RESTORE_IN_PROGRESS: |
+ return; |
+ } |
+ |
+ // We should not be clearing existing token state if that was a connection |
+ // error. http://crbug.com/295245 |
+ if (!connection_error) { |
+ // We are in one of "done" states here. |
+ UserManager::Get()->SaveUserOAuthStatus( |
+ UserManager::Get()->GetLoggedInUser()->email(), |
+ user_status); |
+ } |
+ |
+ login_manager->RemoveObserver(this); |
+} |
+ |
+void SessionManager::OnNewRefreshTokenAvaiable(Profile* user_profile) { |
+ // Check if we were waiting to restart chrome. |
+ if (!exit_after_session_restore_) |
+ return; |
+ |
+ OAuth2LoginManager* login_manager = |
+ OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile); |
+ login_manager->RemoveObserver(this); |
+ |
+ // Mark user auth token status as valid. |
+ UserManager::Get()->SaveUserOAuthStatus( |
+ UserManager::Get()->GetLoggedInUser()->email(), |
+ User::OAUTH2_TOKEN_STATUS_VALID); |
+ |
+ LOG(WARNING) << "Exiting after new refresh token fetched"; |
+ |
+ // We need to restart cleanly in this case to make sure OAuth2 RT is actually |
+ // saved. |
+ chrome::AttemptRestart(); |
+} |
+ |
+void SessionManager::OnConnectionTypeChanged( |
+ net::NetworkChangeNotifier::ConnectionType type) { |
+ UserManager* user_manager = UserManager::Get(); |
+ if (type == net::NetworkChangeNotifier::CONNECTION_NONE || |
+ user_manager->IsLoggedInAsGuest() || !user_manager->IsUserLoggedIn()) { |
+ return; |
+ } |
+ |
+ // Need to iterate over all users and their OAuth2 session state. |
+ const UserList& users = user_manager->GetLoggedInUsers(); |
+ for (UserList::const_iterator it = users.begin(); it != users.end(); ++it) { |
+ Profile* user_profile = user_manager->GetProfileByUser(*it); |
+ bool should_restore_session = |
+ pending_restore_sessions_.find((*it)->email()) != |
+ pending_restore_sessions_.end(); |
+ OAuth2LoginManager* login_manager = |
+ OAuth2LoginManagerFactory::GetInstance()->GetForProfile(user_profile); |
+ if (login_manager->state() == |
+ OAuth2LoginManager::SESSION_RESTORE_IN_PROGRESS) { |
+ // If we come online for the first time after successful offline login, |
+ // we need to kick off OAuth token verification process again. |
+ login_manager->ContinueSessionRestore(); |
+ } else if (should_restore_session) { |
+ pending_restore_sessions_.erase((*it)->email()); |
+ RestoreAuthSessionImpl(user_profile, has_web_auth_cookies_); |
+ } |
+ } |
+} |
+ |
+void SessionManager::StartSession(const UserContext& user_context, |
+ scoped_refptr<Authenticator> authenticator, |
+ bool has_cookies, |
+ bool has_active_session, |
+ Delegate* delegate) { |
+ authenticator_ = authenticator; |
+ delegate_ = delegate; |
+ |
+ VLOG(1) << "Starting session for " << user_context.GetUserID(); |
+ |
+ PreStartSession(); |
+ CreateUserSession(user_context, has_cookies); |
+ |
+ if (!has_active_session) |
+ StartCrosSession(); |
+ |
+ // TODO(nkostylev): Notify UserLoggedIn() after profile is actually |
+ // ready to be used (http://crbug.com/361528). |
+ NotifyUserLoggedIn(); |
+ PrepareProfile(); |
+} |
+ |
+void SessionManager::RestoreAuthenticationSession(Profile* user_profile) { |
+ UserManager* user_manager = UserManager::Get(); |
+ // We don't need to restore session for demo/guest/stub/public account users. |
+ if (!user_manager->IsUserLoggedIn() || |
+ user_manager->IsLoggedInAsGuest() || |
+ user_manager->IsLoggedInAsPublicAccount() || |
+ user_manager->IsLoggedInAsDemoUser() || |
+ user_manager->IsLoggedInAsStub()) { |
+ return; |
+ } |
+ |
+ User* user = user_manager->GetUserByProfile(user_profile); |
+ DCHECK(user); |
+ if (!net::NetworkChangeNotifier::IsOffline()) { |
+ pending_restore_sessions_.erase(user->email()); |
+ RestoreAuthSessionImpl(user_profile, false); |
+ } else { |
+ // Even if we're online we should wait till initial |
+ // OnConnectionTypeChanged() call. Otherwise starting fetchers too early may |
+ // end up canceling all request when initial network connection type is |
+ // processed. See http://crbug.com/121643. |
+ pending_restore_sessions_.insert(user->email()); |
+ } |
+} |
+ |
+void SessionManager::InitRlz(Profile* profile) { |
+#if defined(ENABLE_RLZ) |
+ if (!g_browser_process->local_state()->HasPrefPath(prefs::kRLZBrand)) { |
+ // Read brand code asynchronously from an OEM data and repost ourselves. |
+ google_brand::chromeos::InitBrand( |
+ base::Bind(&SessionManager::InitRlz, AsWeakPtr(), profile)); |
+ return; |
+ } |
+ base::PostTaskAndReplyWithResult( |
+ base::WorkerPool::GetTaskRunner(false), |
+ FROM_HERE, |
+ base::Bind(&base::PathExists, GetRlzDisabledFlagPath()), |
+ base::Bind(&SessionManager::InitRlzImpl, AsWeakPtr(), profile)); |
+#endif |
+} |
+ |
+OAuth2LoginManager::SessionRestoreStrategy |
+SessionManager::GetSigninSessionRestoreStrategy() { |
+ return session_restore_strategy_; |
+} |
+ |
+// static |
+void SessionManager::SetFirstLoginPrefs(PrefService* prefs) { |
+ VLOG(1) << "Setting first login prefs"; |
+ InitLocaleAndInputMethodsForNewUser(prefs); |
+} |
+ |
+void SessionManager::CreateUserSession(const UserContext& user_context, |
+ bool has_cookies) { |
+ user_context_ = user_context; |
+ has_web_auth_cookies_ = has_cookies; |
+ InitSessionRestoreStrategy(); |
+} |
+ |
+void SessionManager::PreStartSession() { |
+ // Switch log file as soon as possible. |
+ if (base::SysInfo::IsRunningOnChromeOS()) |
+ logging::RedirectChromeLogging(*(CommandLine::ForCurrentProcess())); |
+} |
+ |
+void SessionManager::StartCrosSession() { |
+ BootTimesLoader* btl = BootTimesLoader::Get(); |
+ btl->AddLoginTimeMarker("StartSession-Start", false); |
+ DBusThreadManager::Get()->GetSessionManagerClient()-> |
+ StartSession(user_context_.GetUserID()); |
+ btl->AddLoginTimeMarker("StartSession-End", false); |
+} |
+ |
+void SessionManager:: NotifyUserLoggedIn() { |
+ BootTimesLoader* btl = BootTimesLoader::Get(); |
+ btl->AddLoginTimeMarker("UserLoggedIn-Start", false); |
+ UserManager* user_manager = UserManager::Get(); |
+ user_manager->UserLoggedIn(user_context_.GetUserID(), |
+ user_context_.GetUserIDHash(), |
+ false); |
+ btl->AddLoginTimeMarker("UserLoggedIn-End", false); |
+} |
+ |
+void SessionManager::PrepareProfile() { |
+ UserManager* user_manager = UserManager::Get(); |
+ bool is_demo_session = |
+ DemoAppLauncher::IsDemoAppSession(user_context_.GetUserID()); |
+ |
+ // TODO(nkostylev): Figure out whether demo session is using the right profile |
+ // path or not. See https://codereview.chromium.org/171423009 |
+ g_browser_process->profile_manager()->CreateProfileAsync( |
+ user_manager->GetUserProfileDir(user_context_.GetUserID()), |
+ base::Bind(&SessionManager::OnProfileCreated, AsWeakPtr(), |
+ user_context_.GetUserID(), is_demo_session), |
+ base::string16(), base::string16(), std::string()); |
+} |
+ |
+void SessionManager::OnProfileCreated(const std::string& user_id, |
+ bool is_incognito_profile, |
+ Profile* profile, |
+ Profile::CreateStatus status) { |
+ CHECK(profile); |
+ |
+ switch (status) { |
+ case Profile::CREATE_STATUS_CREATED: |
+ // Profile created but before initializing extensions and promo resources. |
+ InitProfilePreferences(profile, user_id); |
+ break; |
+ case Profile::CREATE_STATUS_INITIALIZED: |
+ // Profile is created, extensions and promo resources are initialized. |
+ // At this point all other Chrome OS services will be notified that it is |
+ // safe to use this profile. |
+ UserProfileInitialized(profile, is_incognito_profile); |
+ break; |
+ case Profile::CREATE_STATUS_LOCAL_FAIL: |
+ case Profile::CREATE_STATUS_REMOTE_FAIL: |
+ case Profile::CREATE_STATUS_CANCELED: |
+ case Profile::MAX_CREATE_STATUS: |
+ NOTREACHED(); |
+ break; |
+ } |
+} |
+ |
+void SessionManager::InitProfilePreferences(Profile* profile, |
+ const std::string& user_id) { |
+ if (UserManager::Get()->IsCurrentUserNew()) |
+ SetFirstLoginPrefs(profile->GetPrefs()); |
+ |
+ if (UserManager::Get()->IsLoggedInAsLocallyManagedUser()) { |
+ User* active_user = UserManager::Get()->GetActiveUser(); |
+ std::string managed_user_sync_id = |
+ UserManager::Get()->GetSupervisedUserManager()-> |
+ GetUserSyncId(active_user->email()); |
+ profile->GetPrefs()->SetString(prefs::kSupervisedUserId, |
+ managed_user_sync_id); |
+ } else if (UserManager::Get()->IsLoggedInAsRegularUser()) { |
+ // Make sure that the google service username is properly set (we do this |
+ // on every sign in, not just the first login, to deal with existing |
+ // profiles that might not have it set yet). |
+ SigninManagerBase* signin_manager = |
+ SigninManagerFactory::GetForProfile(profile); |
+ signin_manager->SetAuthenticatedUsername(user_id); |
+ } |
+} |
+ |
+void SessionManager::UserProfileInitialized(Profile* profile, |
+ bool is_incognito_profile) { |
+ if (is_incognito_profile) { |
+ profile->OnLogin(); |
+ // Send the notification before creating the browser so additional objects |
+ // that need the profile (e.g. the launcher) can be created first. |
+ content::NotificationService::current()->Notify( |
+ chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, |
+ content::NotificationService::AllSources(), |
+ content::Details<Profile>(profile)); |
+ |
+ if (delegate_) |
+ delegate_->OnProfilePrepared(profile); |
+ |
+ return; |
+ } |
+ |
+ BootTimesLoader* btl = BootTimesLoader::Get(); |
+ btl->AddLoginTimeMarker("UserProfileGotten", false); |
+ |
+ if (user_context_.IsUsingOAuth()) { |
+ // Transfer proxy authentication cache, cookies (optionally) and server |
+ // bound certs from the profile that was used for authentication. This |
+ // profile contains cookies that auth extension should have already put in |
+ // place that will ensure that the newly created session is authenticated |
+ // for the websites that work with the used authentication schema. |
+ ProfileAuthData::Transfer( |
+ authenticator_->authentication_profile(), |
+ profile, |
+ has_web_auth_cookies_, // transfer_cookies |
+ base::Bind(&SessionManager::CompleteProfileCreateAfterAuthTransfer, |
+ AsWeakPtr(), |
+ profile)); |
+ return; |
+ } |
+ |
+ FinalizePrepareProfile(profile); |
+} |
+ |
+void SessionManager::CompleteProfileCreateAfterAuthTransfer(Profile* profile) { |
+ RestoreAuthSessionImpl(profile, has_web_auth_cookies_); |
+ FinalizePrepareProfile(profile); |
+} |
+ |
+void SessionManager::FinalizePrepareProfile(Profile* profile) { |
+ BootTimesLoader* btl = BootTimesLoader::Get(); |
+ |
+ // Own TPM device if, for any reason, it has not been done in EULA screen. |
+ CryptohomeClient* client = DBusThreadManager::Get()->GetCryptohomeClient(); |
+ btl->AddLoginTimeMarker("TPMOwn-Start", false); |
+ if (cryptohome_util::TpmIsEnabled() && !cryptohome_util::TpmIsBeingOwned()) { |
+ if (cryptohome_util::TpmIsOwned()) { |
+ client->CallTpmClearStoredPasswordAndBlock(); |
+ } else { |
+ client->TpmCanAttemptOwnership(EmptyVoidDBusMethodCallback()); |
+ } |
+ } |
+ btl->AddLoginTimeMarker("TPMOwn-End", false); |
+ |
+ UserManager* user_manager = UserManager::Get(); |
+ if (user_manager->IsLoggedInAsRegularUser()) { |
+ SAMLOfflineSigninLimiter* saml_offline_signin_limiter = |
+ SAMLOfflineSigninLimiterFactory::GetForProfile(profile); |
+ if (saml_offline_signin_limiter) |
+ saml_offline_signin_limiter->SignedIn(user_context_.GetAuthFlow()); |
+ } |
+ |
+ profile->OnLogin(); |
+ |
+ // Send the notification before creating the browser so additional objects |
+ // that need the profile (e.g. the launcher) can be created first. |
+ content::NotificationService::current()->Notify( |
+ chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, |
+ content::NotificationService::AllSources(), |
+ content::Details<Profile>(profile)); |
+ |
+ // Initialize RLZ only for primary user. |
+ if (user_manager->GetPrimaryUser() == |
+ user_manager->GetUserByProfile(profile)) { |
+ InitRlz(profile); |
+ } |
+ |
+ // TODO(altimofeev): This pointer should probably never be NULL, but it looks |
+ // like LoginUtilsImpl::OnProfileCreated() may be getting called before |
+ // SessionManager::PrepareProfile() has set |delegate_| when Chrome is killed |
+ // during shutdown in tests -- see http://crosbug.com/18269. Replace this |
+ // 'if' statement with a CHECK(delegate_) once the underlying issue is |
+ // resolved. |
+ if (delegate_) |
+ delegate_->OnProfilePrepared(profile); |
+} |
+ |
+void SessionManager::InitSessionRestoreStrategy() { |
+ CommandLine* command_line = CommandLine::ForCurrentProcess(); |
+ bool in_app_mode = chrome::IsRunningInForcedAppMode(); |
+ |
+ // Are we in kiosk app mode? |
+ if (in_app_mode) { |
+ if (command_line->HasSwitch(::switches::kAppModeOAuth2Token)) { |
+ oauth2_refresh_token_ = command_line->GetSwitchValueASCII( |
+ ::switches::kAppModeOAuth2Token); |
+ } |
+ |
+ if (command_line->HasSwitch(::switches::kAppModeAuthCode)) { |
+ user_context_.SetAuthCode(command_line->GetSwitchValueASCII( |
+ ::switches::kAppModeAuthCode)); |
+ } |
+ |
+ DCHECK(!has_web_auth_cookies_); |
+ if (!user_context_.GetAuthCode().empty()) { |
+ session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_AUTH_CODE; |
+ } else if (!oauth2_refresh_token_.empty()) { |
+ session_restore_strategy_ = |
+ OAuth2LoginManager::RESTORE_FROM_PASSED_OAUTH2_REFRESH_TOKEN; |
+ } else { |
+ session_restore_strategy_ = |
+ OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN; |
+ } |
+ return; |
+ } |
+ |
+ if (has_web_auth_cookies_) { |
+ session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_COOKIE_JAR; |
+ } else if (!user_context_.GetAuthCode().empty()) { |
+ session_restore_strategy_ = OAuth2LoginManager::RESTORE_FROM_AUTH_CODE; |
+ } else { |
+ session_restore_strategy_ = |
+ OAuth2LoginManager::RESTORE_FROM_SAVED_OAUTH2_REFRESH_TOKEN; |
+ } |
+} |
+ |
+void SessionManager::RestoreAuthSessionImpl(Profile* profile, |
+ bool restore_from_auth_cookies) { |
+ CHECK((authenticator_.get() && authenticator_->authentication_profile()) || |
+ !restore_from_auth_cookies); |
+ |
+ if (chrome::IsRunningInForcedAppMode() || |
+ CommandLine::ForCurrentProcess()->HasSwitch( |
+ chromeos::switches::kOobeSkipPostLogin)) { |
+ return; |
+ } |
+ |
+ exit_after_session_restore_ = false; |
+ |
+ // Remove legacy OAuth1 token if we have one. If it's valid, we should already |
+ // have OAuth2 refresh token in OAuth2TokenService that could be used to |
+ // retrieve all other tokens and user_context. |
+ OAuth2LoginManager* login_manager = |
+ OAuth2LoginManagerFactory::GetInstance()->GetForProfile(profile); |
+ login_manager->AddObserver(this); |
+ login_manager->RestoreSession( |
+ authenticator_.get() && authenticator_->authentication_profile() |
+ ? authenticator_->authentication_profile()->GetRequestContext() |
+ : NULL, |
+ session_restore_strategy_, |
+ oauth2_refresh_token_, |
+ user_context_.GetAuthCode()); |
+} |
+ |
+void SessionManager::InitRlzImpl(Profile* profile, bool disabled) { |
+#if defined(ENABLE_RLZ) |
+ PrefService* local_state = g_browser_process->local_state(); |
+ if (disabled) { |
+ // Empty brand code means an organic install (no RLZ pings are sent). |
+ google_brand::chromeos::ClearBrandForCurrentSession(); |
+ } |
+ if (disabled != local_state->GetBoolean(prefs::kRLZDisabled)) { |
+ // When switching to RLZ enabled/disabled state, clear all recorded events. |
+ RLZTracker::ClearRlzState(); |
+ local_state->SetBoolean(prefs::kRLZDisabled, disabled); |
+ } |
+ // Init the RLZ library. |
+ int ping_delay = profile->GetPrefs()->GetInteger( |
+ first_run::GetPingDelayPrefName().c_str()); |
+ // Negative ping delay means to send ping immediately after a first search is |
+ // recorded. |
+ RLZTracker::InitRlzFromProfileDelayed( |
+ profile, UserManager::Get()->IsCurrentUserNew(), |
+ ping_delay < 0, base::TimeDelta::FromMilliseconds(abs(ping_delay))); |
+ if (delegate_) |
+ delegate_->OnRlzInitialized(); |
+#endif |
+} |
+ |
+} // namespace chromeos |