| Index: chrome/browser/supervised_user/chromeos/manager_password_service.cc
|
| diff --git a/chrome/browser/managed_mode/chromeos/manager_password_service.cc b/chrome/browser/supervised_user/chromeos/manager_password_service.cc
|
| similarity index 84%
|
| rename from chrome/browser/managed_mode/chromeos/manager_password_service.cc
|
| rename to chrome/browser/supervised_user/chromeos/manager_password_service.cc
|
| index 0548b12cb58765d324338a1c1fffb71b4057ff02..79958c69a98650f0ae768465252cc999c922cab0 100644
|
| --- a/chrome/browser/managed_mode/chromeos/manager_password_service.cc
|
| +++ b/chrome/browser/supervised_user/chromeos/manager_password_service.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/managed_mode/chromeos/manager_password_service.h"
|
| +#include "chrome/browser/supervised_user/chromeos/manager_password_service.h"
|
|
|
| #include "base/bind.h"
|
| #include "base/logging.h"
|
| @@ -15,8 +15,8 @@
|
| #include "chrome/browser/chromeos/login/users/supervised_user_manager.h"
|
| #include "chrome/browser/chromeos/login/users/user.h"
|
| #include "chrome/browser/chromeos/login/users/user_manager.h"
|
| -#include "chrome/browser/managed_mode/managed_user_constants.h"
|
| -#include "chrome/browser/managed_mode/managed_user_sync_service.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_constants.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_sync_service.h"
|
|
|
| namespace chromeos {
|
|
|
| @@ -26,8 +26,8 @@ ManagerPasswordService::~ManagerPasswordService() {}
|
|
|
| void ManagerPasswordService::Init(
|
| const std::string& user_id,
|
| - ManagedUserSyncService* user_service,
|
| - ManagedUserSharedSettingsService* shared_settings_service) {
|
| + SupervisedUserSyncService* user_service,
|
| + SupervisedUserSharedSettingsService* shared_settings_service) {
|
| user_id_ = user_id;
|
| user_service_ = user_service;
|
| settings_service_ = shared_settings_service;
|
| @@ -51,24 +51,24 @@ void ManagerPasswordService::Init(
|
| continue;
|
| OnSharedSettingsChange(
|
| supervised_user_manager->GetUserSyncId((*it)->email()),
|
| - managed_users::kChromeOSPasswordData);
|
| + supervised_users::kChromeOSPasswordData);
|
| }
|
| }
|
|
|
| void ManagerPasswordService::OnSharedSettingsChange(
|
| - const std::string& mu_id,
|
| + const std::string& su_id,
|
| const std::string& key) {
|
| - if (key != managed_users::kChromeOSPasswordData)
|
| + if (key != supervised_users::kChromeOSPasswordData)
|
| return;
|
|
|
| SupervisedUserManager* supervised_user_manager =
|
| UserManager::Get()->GetSupervisedUserManager();
|
| - const User* user = supervised_user_manager->FindBySyncId(mu_id);
|
| + const User* user = supervised_user_manager->FindBySyncId(su_id);
|
| // No user on device.
|
| if (user == NULL)
|
| return;
|
|
|
| - const base::Value* value = settings_service_->GetValue(mu_id, key);
|
| + const base::Value* value = settings_service_->GetValue(su_id, key);
|
|
|
| if (value == NULL) {
|
| LOG(WARNING) << "Got empty value from sync.";
|
| @@ -88,27 +88,27 @@ void ManagerPasswordService::OnSharedSettingsChange(
|
| return;
|
| }
|
| scoped_ptr<base::DictionaryValue> wrapper(dict->DeepCopy());
|
| - user_service_->GetManagedUsersAsync(
|
| - base::Bind(&ManagerPasswordService::GetManagedUsersCallback,
|
| + user_service_->GetSupervisedUsersAsync(
|
| + base::Bind(&ManagerPasswordService::GetSupervisedUsersCallback,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| - mu_id,
|
| + su_id,
|
| user->email(),
|
| Passed(&wrapper)));
|
| }
|
|
|
| -void ManagerPasswordService::GetManagedUsersCallback(
|
| - const std::string& sync_mu_id,
|
| +void ManagerPasswordService::GetSupervisedUsersCallback(
|
| + const std::string& sync_su_id,
|
| const std::string& user_id,
|
| scoped_ptr<base::DictionaryValue> password_data,
|
| - const base::DictionaryValue* managed_users) {
|
| - const base::DictionaryValue* managed_user = NULL;
|
| - if (!managed_users->GetDictionary(sync_mu_id, &managed_user))
|
| + const base::DictionaryValue* supervised_users) {
|
| + const base::DictionaryValue* supervised_user = NULL;
|
| + if (!supervised_users->GetDictionary(sync_su_id, &supervised_user))
|
| return;
|
| std::string master_key;
|
| std::string encryption_key;
|
| std::string signature_key;
|
| - if (!managed_user->GetString(ManagedUserSyncService::kMasterKey,
|
| - &master_key)) {
|
| + if (!supervised_user->GetString(SupervisedUserSyncService::kMasterKey,
|
| + &master_key)) {
|
| LOG(WARNING) << "Can not apply password change to " << user_id
|
| << ": no master key found";
|
| UMA_HISTOGRAM_ENUMERATION(
|
| @@ -118,10 +118,11 @@ void ManagerPasswordService::GetManagedUsersCallback(
|
| return;
|
| }
|
|
|
| - if (!managed_user->GetString(ManagedUserSyncService::kPasswordSignatureKey,
|
| - &signature_key) ||
|
| - !managed_user->GetString(ManagedUserSyncService::kPasswordEncryptionKey,
|
| - &encryption_key)) {
|
| + if (!supervised_user->GetString(
|
| + SupervisedUserSyncService::kPasswordSignatureKey, &signature_key) ||
|
| + !supervised_user->GetString(
|
| + SupervisedUserSyncService::kPasswordEncryptionKey,
|
| + &encryption_key)) {
|
| LOG(WARNING) << "Can not apply password change to " << user_id
|
| << ": no signature / encryption keys.";
|
| UMA_HISTOGRAM_ENUMERATION(
|
| @@ -157,7 +158,7 @@ void ManagerPasswordService::GetManagedUsersCallback(
|
|
|
| cryptohome::KeyDefinition new_key_definition(
|
| new_key,
|
| - kCryptohomeManagedUserKeyLabel,
|
| + kCryptohomeSupervisedUserKeyLabel,
|
| cryptohome::PRIV_AUTHORIZED_UPDATE || cryptohome::PRIV_MOUNT);
|
| new_key_definition.revision = revision;
|
|
|
| @@ -238,15 +239,15 @@ void ManagerPasswordService::OnNewManagerKeySuccess(
|
| VLOG(1) << "Added new master key for " << master_key_context.GetUserID();
|
| authenticator_->RemoveKey(
|
| master_key_context,
|
| - kLegacyCryptohomeManagedUserKeyLabel,
|
| - base::Bind(&ManagerPasswordService::OnOldManagedUserKeyDeleted,
|
| + kLegacyCryptohomeSupervisedUserKeyLabel,
|
| + base::Bind(&ManagerPasswordService::OnOldSupervisedUserKeyDeleted,
|
| weak_ptr_factory_.GetWeakPtr(),
|
| master_key_context));
|
| }
|
|
|
| -void ManagerPasswordService::OnOldManagedUserKeyDeleted(
|
| +void ManagerPasswordService::OnOldSupervisedUserKeyDeleted(
|
| const UserContext& master_key_context) {
|
| - VLOG(1) << "Removed old managed user key for "
|
| + VLOG(1) << "Removed old supervised user key for "
|
| << master_key_context.GetUserID();
|
| authenticator_->RemoveKey(
|
| master_key_context,
|
|
|