| Index: chrome/browser/supervised_user/supervised_user_registration_utility.cc
|
| diff --git a/chrome/browser/managed_mode/managed_user_registration_utility.cc b/chrome/browser/supervised_user/supervised_user_registration_utility.cc
|
| similarity index 40%
|
| rename from chrome/browser/managed_mode/managed_user_registration_utility.cc
|
| rename to chrome/browser/supervised_user/supervised_user_registration_utility.cc
|
| index 6d2d8e166e7ec4f1e62e9e70eb41ffe9245b3a15..e53c858a065432d2553e62eb3aee5c1f7058f485 100644
|
| --- a/chrome/browser/managed_mode/managed_user_registration_utility.cc
|
| +++ b/chrome/browser/supervised_user/supervised_user_registration_utility.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/managed_mode/managed_user_registration_utility.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_registration_utility.h"
|
|
|
| #include "base/base64.h"
|
| #include "base/bind.h"
|
| @@ -11,16 +11,16 @@
|
| #include "base/prefs/pref_service.h"
|
| #include "base/rand_util.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| -#include "chrome/browser/managed_mode/managed_user_constants.h"
|
| -#include "chrome/browser/managed_mode/managed_user_refresh_token_fetcher.h"
|
| -#include "chrome/browser/managed_mode/managed_user_shared_settings_service.h"
|
| -#include "chrome/browser/managed_mode/managed_user_shared_settings_service_factory.h"
|
| -#include "chrome/browser/managed_mode/managed_user_shared_settings_update.h"
|
| -#include "chrome/browser/managed_mode/managed_user_sync_service.h"
|
| -#include "chrome/browser/managed_mode/managed_user_sync_service_factory.h"
|
| #include "chrome/browser/profiles/profile.h"
|
| #include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
|
| #include "chrome/browser/signin/signin_manager_factory.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_constants.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_refresh_token_fetcher.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_shared_settings_service.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_shared_settings_service_factory.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_shared_settings_update.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_sync_service.h"
|
| +#include "chrome/browser/supervised_user/supervised_user_sync_service_factory.h"
|
| #include "chrome/browser/sync/glue/device_info.h"
|
| #include "chrome/common/chrome_switches.h"
|
| #include "chrome/common/pref_names.h"
|
| @@ -33,45 +33,44 @@ using base::DictionaryValue;
|
|
|
| namespace {
|
|
|
| -ManagedUserRegistrationUtility* g_instance_for_tests = NULL;
|
| +SupervisedUserRegistrationUtility* g_instance_for_tests = NULL;
|
|
|
| -// Actual implementation of ManagedUserRegistrationUtility.
|
| -class ManagedUserRegistrationUtilityImpl
|
| - : public ManagedUserRegistrationUtility,
|
| - public ManagedUserSyncServiceObserver {
|
| +// Actual implementation of SupervisedUserRegistrationUtility.
|
| +class SupervisedUserRegistrationUtilityImpl
|
| + : public SupervisedUserRegistrationUtility,
|
| + public SupervisedUserSyncServiceObserver {
|
| public:
|
| - ManagedUserRegistrationUtilityImpl(
|
| + SupervisedUserRegistrationUtilityImpl(
|
| PrefService* prefs,
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher,
|
| - ManagedUserSyncService* service,
|
| - ManagedUserSharedSettingsService* shared_settings_service);
|
| -
|
| - virtual ~ManagedUserRegistrationUtilityImpl();
|
| -
|
| - // Registers a new managed user with the server. |managed_user_id| is a new
|
| - // unique ID for the new managed user. If its value is the same as that of
|
| - // of one of the existing managed users, then the same user will be created
|
| - // on this machine (and if he has no avatar in sync, his avatar will
|
| - // be updated). |info| contains necessary information like
|
| - // the display name of the user and his avatar. |callback| is called
|
| - // with the result of the registration. We use the info here and not the
|
| - // profile, because on Chrome OS the profile of the managed user does not
|
| - // yet exist.
|
| - virtual void Register(const std::string& managed_user_id,
|
| - const ManagedUserRegistrationInfo& info,
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher,
|
| + SupervisedUserSyncService* service,
|
| + SupervisedUserSharedSettingsService* shared_settings_service);
|
| +
|
| + virtual ~SupervisedUserRegistrationUtilityImpl();
|
| +
|
| + // Registers a new supervised user with the server. |supervised_user_id| is a
|
| + // new unique ID for the new supervised user. If its value is the same as that
|
| + // of one of the existing supervised users, then the same user will be created
|
| + // on this machine (and if he has no avatar in sync, his avatar will be
|
| + // updated). |info| contains necessary information like the display name of
|
| + // the user and his avatar. |callback| is called with the result of the
|
| + // registration. We use the info here and not the profile, because on Chrome
|
| + // OS the profile of the supervised user does not yet exist.
|
| + virtual void Register(const std::string& supervised_user_id,
|
| + const SupervisedUserRegistrationInfo& info,
|
| const RegistrationCallback& callback) OVERRIDE;
|
|
|
| - // ManagedUserSyncServiceObserver:
|
| - virtual void OnManagedUserAcknowledged(const std::string& managed_user_id)
|
| - OVERRIDE;
|
| - virtual void OnManagedUsersSyncingStopped() OVERRIDE;
|
| - virtual void OnManagedUsersChanged() OVERRIDE;
|
| + // SupervisedUserSyncServiceObserver:
|
| + virtual void OnSupervisedUserAcknowledged(
|
| + const std::string& supervised_user_id) OVERRIDE;
|
| + virtual void OnSupervisedUsersSyncingStopped() OVERRIDE;
|
| + virtual void OnSupervisedUsersChanged() OVERRIDE;
|
|
|
| private:
|
| - // Fetches the managed user token when we have the device name.
|
| + // Fetches the supervised user token when we have the device name.
|
| void FetchToken(const std::string& client_name);
|
|
|
| - // Called when we have received a token for the managed user.
|
| + // Called when we have received a token for the supervised user.
|
| void OnReceivedToken(const GoogleServiceAuthError& error,
|
| const std::string& token);
|
|
|
| @@ -93,59 +92,59 @@ class ManagedUserRegistrationUtilityImpl
|
| // callback or reporting an error.
|
| void CancelPendingRegistration();
|
|
|
| - // ManagedUserSharedSettingsUpdate acknowledgment callback for password data
|
| - // in shared settings.
|
| + // SupervisedUserSharedSettingsUpdate acknowledgment callback for password
|
| + // data in shared settings.
|
| void OnPasswordChangeAcknowledged(bool success);
|
|
|
| PrefService* prefs_;
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher_;
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher_;
|
|
|
| // A |KeyedService| owned by the custodian profile.
|
| - ManagedUserSyncService* managed_user_sync_service_;
|
| + SupervisedUserSyncService* supervised_user_sync_service_;
|
|
|
| // A |KeyedService| owned by the custodian profile.
|
| - ManagedUserSharedSettingsService* managed_user_shared_settings_service_;
|
| + SupervisedUserSharedSettingsService* supervised_user_shared_settings_service_;
|
|
|
| - std::string pending_managed_user_id_;
|
| - std::string pending_managed_user_token_;
|
| - bool pending_managed_user_acknowledged_;
|
| - bool is_existing_managed_user_;
|
| + std::string pending_supervised_user_id_;
|
| + std::string pending_supervised_user_token_;
|
| + bool pending_supervised_user_acknowledged_;
|
| + bool is_existing_supervised_user_;
|
| bool avatar_updated_;
|
| RegistrationCallback callback_;
|
| - scoped_ptr<ManagedUserSharedSettingsUpdate> password_update_;
|
| + scoped_ptr<SupervisedUserSharedSettingsUpdate> password_update_;
|
|
|
| - base::WeakPtrFactory<ManagedUserRegistrationUtilityImpl> weak_ptr_factory_;
|
| + base::WeakPtrFactory<SupervisedUserRegistrationUtilityImpl> weak_ptr_factory_;
|
|
|
| - DISALLOW_COPY_AND_ASSIGN(ManagedUserRegistrationUtilityImpl);
|
| + DISALLOW_COPY_AND_ASSIGN(SupervisedUserRegistrationUtilityImpl);
|
| };
|
|
|
| } // namespace
|
|
|
| -ManagedUserRegistrationInfo::ManagedUserRegistrationInfo(
|
| +SupervisedUserRegistrationInfo::SupervisedUserRegistrationInfo(
|
| const base::string16& name,
|
| int avatar_index)
|
| : avatar_index(avatar_index),
|
| name(name) {
|
| }
|
|
|
| -ManagedUserRegistrationInfo::~ManagedUserRegistrationInfo() {}
|
| +SupervisedUserRegistrationInfo::~SupervisedUserRegistrationInfo() {}
|
|
|
| -ScopedTestingManagedUserRegistrationUtility::
|
| - ScopedTestingManagedUserRegistrationUtility(
|
| - ManagedUserRegistrationUtility* instance) {
|
| - ManagedUserRegistrationUtility::SetUtilityForTests(instance);
|
| +ScopedTestingSupervisedUserRegistrationUtility::
|
| + ScopedTestingSupervisedUserRegistrationUtility(
|
| + SupervisedUserRegistrationUtility* instance) {
|
| + SupervisedUserRegistrationUtility::SetUtilityForTests(instance);
|
| }
|
|
|
| -ScopedTestingManagedUserRegistrationUtility::
|
| - ~ScopedTestingManagedUserRegistrationUtility() {
|
| - ManagedUserRegistrationUtility::SetUtilityForTests(NULL);
|
| +ScopedTestingSupervisedUserRegistrationUtility::
|
| + ~ScopedTestingSupervisedUserRegistrationUtility() {
|
| + SupervisedUserRegistrationUtility::SetUtilityForTests(NULL);
|
| }
|
|
|
| // static
|
| -scoped_ptr<ManagedUserRegistrationUtility>
|
| -ManagedUserRegistrationUtility::Create(Profile* profile) {
|
| +scoped_ptr<SupervisedUserRegistrationUtility>
|
| +SupervisedUserRegistrationUtility::Create(Profile* profile) {
|
| if (g_instance_for_tests) {
|
| - ManagedUserRegistrationUtility* result = g_instance_for_tests;
|
| + SupervisedUserRegistrationUtility* result = g_instance_for_tests;
|
| g_instance_for_tests = NULL;
|
| return make_scoped_ptr(result);
|
| }
|
| @@ -154,111 +153,115 @@ ManagedUserRegistrationUtility::Create(Profile* profile) {
|
| ProfileOAuth2TokenServiceFactory::GetForProfile(profile);
|
| SigninManagerBase* signin_manager =
|
| SigninManagerFactory::GetForProfile(profile);
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher =
|
| - ManagedUserRefreshTokenFetcher::Create(
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher =
|
| + SupervisedUserRefreshTokenFetcher::Create(
|
| token_service,
|
| signin_manager->GetAuthenticatedAccountId(),
|
| profile->GetRequestContext());
|
| - ManagedUserSyncService* managed_user_sync_service =
|
| - ManagedUserSyncServiceFactory::GetForProfile(profile);
|
| - ManagedUserSharedSettingsService* managed_user_shared_settings_service =
|
| - ManagedUserSharedSettingsServiceFactory::GetForBrowserContext(profile);
|
| - return make_scoped_ptr(ManagedUserRegistrationUtility::CreateImpl(
|
| + SupervisedUserSyncService* supervised_user_sync_service =
|
| + SupervisedUserSyncServiceFactory::GetForProfile(profile);
|
| + SupervisedUserSharedSettingsService* supervised_user_shared_settings_service =
|
| + SupervisedUserSharedSettingsServiceFactory::GetForBrowserContext(profile);
|
| + return make_scoped_ptr(SupervisedUserRegistrationUtility::CreateImpl(
|
| profile->GetPrefs(),
|
| token_fetcher.Pass(),
|
| - managed_user_sync_service,
|
| - managed_user_shared_settings_service));
|
| + supervised_user_sync_service,
|
| + supervised_user_shared_settings_service));
|
| }
|
|
|
| // static
|
| -std::string ManagedUserRegistrationUtility::GenerateNewManagedUserId() {
|
| - std::string new_managed_user_id;
|
| - base::Base64Encode(base::RandBytesAsString(8), &new_managed_user_id);
|
| - return new_managed_user_id;
|
| +std::string SupervisedUserRegistrationUtility::GenerateNewSupervisedUserId() {
|
| + std::string new_supervised_user_id;
|
| + base::Base64Encode(base::RandBytesAsString(8), &new_supervised_user_id);
|
| + return new_supervised_user_id;
|
| }
|
|
|
| // static
|
| -void ManagedUserRegistrationUtility::SetUtilityForTests(
|
| - ManagedUserRegistrationUtility* utility) {
|
| +void SupervisedUserRegistrationUtility::SetUtilityForTests(
|
| + SupervisedUserRegistrationUtility* utility) {
|
| if (g_instance_for_tests)
|
| delete g_instance_for_tests;
|
| g_instance_for_tests = utility;
|
| }
|
|
|
| // static
|
| -ManagedUserRegistrationUtility* ManagedUserRegistrationUtility::CreateImpl(
|
| +SupervisedUserRegistrationUtility*
|
| +SupervisedUserRegistrationUtility::CreateImpl(
|
| PrefService* prefs,
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher,
|
| - ManagedUserSyncService* service,
|
| - ManagedUserSharedSettingsService* shared_settings_service) {
|
| - return new ManagedUserRegistrationUtilityImpl(prefs,
|
| - token_fetcher.Pass(),
|
| - service,
|
| - shared_settings_service);
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher,
|
| + SupervisedUserSyncService* service,
|
| + SupervisedUserSharedSettingsService* shared_settings_service) {
|
| + return new SupervisedUserRegistrationUtilityImpl(prefs,
|
| + token_fetcher.Pass(),
|
| + service,
|
| + shared_settings_service);
|
| }
|
|
|
| namespace {
|
|
|
| -ManagedUserRegistrationUtilityImpl::ManagedUserRegistrationUtilityImpl(
|
| +SupervisedUserRegistrationUtilityImpl::SupervisedUserRegistrationUtilityImpl(
|
| PrefService* prefs,
|
| - scoped_ptr<ManagedUserRefreshTokenFetcher> token_fetcher,
|
| - ManagedUserSyncService* service,
|
| - ManagedUserSharedSettingsService* shared_settings_service)
|
| + scoped_ptr<SupervisedUserRefreshTokenFetcher> token_fetcher,
|
| + SupervisedUserSyncService* service,
|
| + SupervisedUserSharedSettingsService* shared_settings_service)
|
| : prefs_(prefs),
|
| token_fetcher_(token_fetcher.Pass()),
|
| - managed_user_sync_service_(service),
|
| - managed_user_shared_settings_service_(shared_settings_service),
|
| - pending_managed_user_acknowledged_(false),
|
| - is_existing_managed_user_(false),
|
| + supervised_user_sync_service_(service),
|
| + supervised_user_shared_settings_service_(shared_settings_service),
|
| + pending_supervised_user_acknowledged_(false),
|
| + is_existing_supervised_user_(false),
|
| avatar_updated_(false),
|
| weak_ptr_factory_(this) {
|
| - managed_user_sync_service_->AddObserver(this);
|
| + supervised_user_sync_service_->AddObserver(this);
|
| }
|
|
|
| -ManagedUserRegistrationUtilityImpl::~ManagedUserRegistrationUtilityImpl() {
|
| - managed_user_sync_service_->RemoveObserver(this);
|
| +SupervisedUserRegistrationUtilityImpl::
|
| +~SupervisedUserRegistrationUtilityImpl() {
|
| + supervised_user_sync_service_->RemoveObserver(this);
|
| CancelPendingRegistration();
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::Register(
|
| - const std::string& managed_user_id,
|
| - const ManagedUserRegistrationInfo& info,
|
| +void SupervisedUserRegistrationUtilityImpl::Register(
|
| + const std::string& supervised_user_id,
|
| + const SupervisedUserRegistrationInfo& info,
|
| const RegistrationCallback& callback) {
|
| - DCHECK(pending_managed_user_id_.empty());
|
| + DCHECK(pending_supervised_user_id_.empty());
|
| callback_ = callback;
|
| - pending_managed_user_id_ = managed_user_id;
|
| + pending_supervised_user_id_ = supervised_user_id;
|
|
|
| bool need_password_update = !info.password_data.empty();
|
| const base::DictionaryValue* dict =
|
| prefs_->GetDictionary(prefs::kSupervisedUsers);
|
| - is_existing_managed_user_ = dict->HasKey(managed_user_id);
|
| - if (!is_existing_managed_user_) {
|
| - managed_user_sync_service_->AddManagedUser(pending_managed_user_id_,
|
| - base::UTF16ToUTF8(info.name),
|
| - info.master_key,
|
| - info.password_signature_key,
|
| - info.password_encryption_key,
|
| - info.avatar_index);
|
| + is_existing_supervised_user_ = dict->HasKey(supervised_user_id);
|
| + if (!is_existing_supervised_user_) {
|
| + supervised_user_sync_service_->AddSupervisedUser(
|
| + pending_supervised_user_id_,
|
| + base::UTF16ToUTF8(info.name),
|
| + info.master_key,
|
| + info.password_signature_key,
|
| + info.password_encryption_key,
|
| + info.avatar_index);
|
| } else {
|
| const base::DictionaryValue* value = NULL;
|
| bool success =
|
| - dict->GetDictionaryWithoutPathExpansion(managed_user_id, &value);
|
| + dict->GetDictionaryWithoutPathExpansion(supervised_user_id, &value);
|
| DCHECK(success);
|
| std::string key;
|
| bool need_keys = !info.password_signature_key.empty() ||
|
| !info.password_encryption_key.empty();
|
| bool have_keys =
|
| - value->GetString(ManagedUserSyncService::kPasswordSignatureKey, &key) &&
|
| + value->GetString(SupervisedUserSyncService::kPasswordSignatureKey,
|
| + &key) &&
|
| !key.empty() &&
|
| - value->GetString(ManagedUserSyncService::kPasswordEncryptionKey,
|
| + value->GetString(SupervisedUserSyncService::kPasswordEncryptionKey,
|
| &key) &&
|
| !key.empty();
|
|
|
| bool keys_need_update = need_keys && !have_keys;
|
|
|
| if (keys_need_update) {
|
| - managed_user_sync_service_->UpdateManagedUser(
|
| - pending_managed_user_id_,
|
| + supervised_user_sync_service_->UpdateSupervisedUser(
|
| + pending_supervised_user_id_,
|
| base::UTF16ToUTF8(info.name),
|
| info.master_key,
|
| info.password_signature_key,
|
| @@ -267,52 +270,53 @@ void ManagedUserRegistrationUtilityImpl::Register(
|
| } else {
|
| // The user already exists and does not need to be updated.
|
| need_password_update = false;
|
| - OnManagedUserAcknowledged(managed_user_id);
|
| + OnSupervisedUserAcknowledged(supervised_user_id);
|
| }
|
| avatar_updated_ =
|
| - managed_user_sync_service_->UpdateManagedUserAvatarIfNeeded(
|
| - managed_user_id,
|
| + supervised_user_sync_service_->UpdateSupervisedUserAvatarIfNeeded(
|
| + supervised_user_id,
|
| info.avatar_index);
|
| }
|
| #if defined(OS_CHROMEOS)
|
| - const char* kAvatarKey = managed_users::kChromeOSAvatarIndex;
|
| + const char* kAvatarKey = supervised_users::kChromeOSAvatarIndex;
|
| #else
|
| - const char* kAvatarKey = managed_users::kChromeAvatarIndex;
|
| + const char* kAvatarKey = supervised_users::kChromeAvatarIndex;
|
| #endif
|
| - managed_user_shared_settings_service_->SetValue(
|
| - pending_managed_user_id_, kAvatarKey,
|
| + supervised_user_shared_settings_service_->SetValue(
|
| + pending_supervised_user_id_, kAvatarKey,
|
| base::FundamentalValue(info.avatar_index));
|
| if (need_password_update) {
|
| - password_update_.reset(new ManagedUserSharedSettingsUpdate(
|
| - managed_user_shared_settings_service_,
|
| - pending_managed_user_id_,
|
| - managed_users::kChromeOSPasswordData,
|
| + password_update_.reset(new SupervisedUserSharedSettingsUpdate(
|
| + supervised_user_shared_settings_service_,
|
| + pending_supervised_user_id_,
|
| + supervised_users::kChromeOSPasswordData,
|
| scoped_ptr<base::Value>(info.password_data.DeepCopy()),
|
| base::Bind(
|
| - &ManagedUserRegistrationUtilityImpl::OnPasswordChangeAcknowledged,
|
| + &SupervisedUserRegistrationUtilityImpl::
|
| + OnPasswordChangeAcknowledged,
|
| weak_ptr_factory_.GetWeakPtr())));
|
| }
|
|
|
| browser_sync::DeviceInfo::GetClientName(
|
| - base::Bind(&ManagedUserRegistrationUtilityImpl::FetchToken,
|
| + base::Bind(&SupervisedUserRegistrationUtilityImpl::FetchToken,
|
| weak_ptr_factory_.GetWeakPtr()));
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::CancelPendingRegistration() {
|
| +void SupervisedUserRegistrationUtilityImpl::CancelPendingRegistration() {
|
| AbortPendingRegistration(
|
| false, // Don't run the callback. The error will be ignored.
|
| GoogleServiceAuthError(GoogleServiceAuthError::NONE));
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::OnManagedUserAcknowledged(
|
| - const std::string& managed_user_id) {
|
| - DCHECK_EQ(pending_managed_user_id_, managed_user_id);
|
| - DCHECK(!pending_managed_user_acknowledged_);
|
| - pending_managed_user_acknowledged_ = true;
|
| +void SupervisedUserRegistrationUtilityImpl::OnSupervisedUserAcknowledged(
|
| + const std::string& supervised_user_id) {
|
| + DCHECK_EQ(pending_supervised_user_id_, supervised_user_id);
|
| + DCHECK(!pending_supervised_user_acknowledged_);
|
| + pending_supervised_user_acknowledged_ = true;
|
| CompleteRegistrationIfReady();
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::OnPasswordChangeAcknowledged(
|
| +void SupervisedUserRegistrationUtilityImpl::OnPasswordChangeAcknowledged(
|
| bool success) {
|
| DCHECK(password_update_);
|
| DCHECK(success);
|
| @@ -320,23 +324,23 @@ void ManagedUserRegistrationUtilityImpl::OnPasswordChangeAcknowledged(
|
| CompleteRegistrationIfReady();
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::OnManagedUsersSyncingStopped() {
|
| +void SupervisedUserRegistrationUtilityImpl::OnSupervisedUsersSyncingStopped() {
|
| AbortPendingRegistration(
|
| true, // Run the callback.
|
| GoogleServiceAuthError(GoogleServiceAuthError::REQUEST_CANCELED));
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::OnManagedUsersChanged() {}
|
| +void SupervisedUserRegistrationUtilityImpl::OnSupervisedUsersChanged() {}
|
|
|
| -void ManagedUserRegistrationUtilityImpl::FetchToken(
|
| +void SupervisedUserRegistrationUtilityImpl::FetchToken(
|
| const std::string& client_name) {
|
| token_fetcher_->Start(
|
| - pending_managed_user_id_, client_name,
|
| - base::Bind(&ManagedUserRegistrationUtilityImpl::OnReceivedToken,
|
| + pending_supervised_user_id_, client_name,
|
| + base::Bind(&SupervisedUserRegistrationUtilityImpl::OnReceivedToken,
|
| weak_ptr_factory_.GetWeakPtr()));
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::OnReceivedToken(
|
| +void SupervisedUserRegistrationUtilityImpl::OnReceivedToken(
|
| const GoogleServiceAuthError& error,
|
| const std::string& token) {
|
| if (error.state() != GoogleServiceAuthError::NONE) {
|
| @@ -345,57 +349,59 @@ void ManagedUserRegistrationUtilityImpl::OnReceivedToken(
|
| }
|
|
|
| DCHECK(!token.empty());
|
| - pending_managed_user_token_ = token;
|
| + pending_supervised_user_token_ = token;
|
| CompleteRegistrationIfReady();
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::CompleteRegistrationIfReady() {
|
| +void SupervisedUserRegistrationUtilityImpl::CompleteRegistrationIfReady() {
|
| bool skip_check = CommandLine::ForCurrentProcess()->HasSwitch(
|
| switches::kNoSupervisedUserAcknowledgmentCheck);
|
|
|
| - if (!pending_managed_user_acknowledged_ && !skip_check)
|
| + if (!pending_supervised_user_acknowledged_ && !skip_check)
|
| return;
|
| if (password_update_ && !skip_check)
|
| return;
|
| - if (pending_managed_user_token_.empty())
|
| + if (pending_supervised_user_token_.empty())
|
| return;
|
|
|
| GoogleServiceAuthError error(GoogleServiceAuthError::NONE);
|
| CompleteRegistration(true, error);
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::AbortPendingRegistration(
|
| +void SupervisedUserRegistrationUtilityImpl::AbortPendingRegistration(
|
| bool run_callback,
|
| const GoogleServiceAuthError& error) {
|
| - pending_managed_user_token_.clear();
|
| + pending_supervised_user_token_.clear();
|
| CompleteRegistration(run_callback, error);
|
| }
|
|
|
| -void ManagedUserRegistrationUtilityImpl::CompleteRegistration(
|
| +void SupervisedUserRegistrationUtilityImpl::CompleteRegistration(
|
| bool run_callback,
|
| const GoogleServiceAuthError& error) {
|
| if (callback_.is_null())
|
| return;
|
|
|
| - if (pending_managed_user_token_.empty()) {
|
| - DCHECK(!pending_managed_user_id_.empty());
|
| + if (pending_supervised_user_token_.empty()) {
|
| + DCHECK(!pending_supervised_user_id_.empty());
|
|
|
| - if (!is_existing_managed_user_) {
|
| - // Remove the pending managed user if we weren't successful.
|
| - // However, check that we are not importing a managed user
|
| + if (!is_existing_supervised_user_) {
|
| + // Remove the pending supervised user if we weren't successful.
|
| + // However, check that we are not importing a supervised user
|
| // before deleting it from sync to avoid accidental deletion of
|
| - // existing managed users by just canceling the registration for example.
|
| - managed_user_sync_service_->DeleteManagedUser(pending_managed_user_id_);
|
| + // existing supervised users by just canceling the registration for
|
| + // example.
|
| + supervised_user_sync_service_->DeleteSupervisedUser(
|
| + pending_supervised_user_id_);
|
| } else if (avatar_updated_) {
|
| - // Canceling (or failing) a managed user import that did set the avatar
|
| + // Canceling (or failing) a supervised user import that did set the avatar
|
| // should undo this change.
|
| - managed_user_sync_service_->ClearManagedUserAvatar(
|
| - pending_managed_user_id_);
|
| + supervised_user_sync_service_->ClearSupervisedUserAvatar(
|
| + pending_supervised_user_id_);
|
| }
|
| }
|
|
|
| if (run_callback)
|
| - callback_.Run(error, pending_managed_user_token_);
|
| + callback_.Run(error, pending_supervised_user_token_);
|
| callback_.Reset();
|
| }
|
|
|
|
|