| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/supervised_user/chromeos/manager_password_service.h" | 5 #include "chrome/browser/supervised_user/chromeos/manager_password_service.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/logging.h" | 8 #include "base/logging.h" |
| 9 #include "base/metrics/histogram.h" | 9 #include "base/metrics/histogram.h" |
| 10 #include "base/values.h" | 10 #include "base/values.h" |
| (...skipping 20 matching lines...) Expand all Loading... |
| 31 SupervisedUserSharedSettingsService* shared_settings_service) { | 31 SupervisedUserSharedSettingsService* shared_settings_service) { |
| 32 user_id_ = user_id; | 32 user_id_ = user_id; |
| 33 user_service_ = user_service; | 33 user_service_ = user_service; |
| 34 settings_service_ = shared_settings_service; | 34 settings_service_ = shared_settings_service; |
| 35 settings_service_subscription_ = settings_service_->Subscribe( | 35 settings_service_subscription_ = settings_service_->Subscribe( |
| 36 base::Bind(&ManagerPasswordService::OnSharedSettingsChange, | 36 base::Bind(&ManagerPasswordService::OnSharedSettingsChange, |
| 37 weak_ptr_factory_.GetWeakPtr())); | 37 weak_ptr_factory_.GetWeakPtr())); |
| 38 | 38 |
| 39 authenticator_ = new ExtendedAuthenticator(this); | 39 authenticator_ = new ExtendedAuthenticator(this); |
| 40 | 40 |
| 41 UserManager* user_manager = UserManager::Get(); | 41 UserManager* user_manager = GetUserManager(); |
| 42 | 42 |
| 43 SupervisedUserManager* supervised_user_manager = | 43 SupervisedUserManager* supervised_user_manager = |
| 44 user_manager->GetSupervisedUserManager(); | 44 user_manager->GetSupervisedUserManager(); |
| 45 | 45 |
| 46 const UserList& users = user_manager->GetUsers(); | 46 const UserList& users = user_manager->GetUsers(); |
| 47 | 47 |
| 48 for (UserList::const_iterator it = users.begin(); it != users.end(); ++it) { | 48 for (UserList::const_iterator it = users.begin(); it != users.end(); ++it) { |
| 49 if ((*it)->GetType() != user_manager::USER_TYPE_LOCALLY_MANAGED) | 49 if ((*it)->GetType() != user_manager::USER_TYPE_LOCALLY_MANAGED) |
| 50 continue; | 50 continue; |
| 51 if (user_id != supervised_user_manager->GetManagerUserId((*it)->email())) | 51 if (user_id != supervised_user_manager->GetManagerUserId((*it)->email())) |
| 52 continue; | 52 continue; |
| 53 OnSharedSettingsChange( | 53 OnSharedSettingsChange( |
| 54 supervised_user_manager->GetUserSyncId((*it)->email()), | 54 supervised_user_manager->GetUserSyncId((*it)->email()), |
| 55 supervised_users::kChromeOSPasswordData); | 55 supervised_users::kChromeOSPasswordData); |
| 56 } | 56 } |
| 57 } | 57 } |
| 58 | 58 |
| 59 void ManagerPasswordService::OnSharedSettingsChange( | 59 void ManagerPasswordService::OnSharedSettingsChange( |
| 60 const std::string& su_id, | 60 const std::string& su_id, |
| 61 const std::string& key) { | 61 const std::string& key) { |
| 62 if (key != supervised_users::kChromeOSPasswordData) | 62 if (key != supervised_users::kChromeOSPasswordData) |
| 63 return; | 63 return; |
| 64 | 64 |
| 65 SupervisedUserManager* supervised_user_manager = | 65 SupervisedUserManager* supervised_user_manager = |
| 66 UserManager::Get()->GetSupervisedUserManager(); | 66 GetUserManager()->GetSupervisedUserManager(); |
| 67 const User* user = supervised_user_manager->FindBySyncId(su_id); | 67 const User* user = supervised_user_manager->FindBySyncId(su_id); |
| 68 // No user on device. | 68 // No user on device. |
| 69 if (user == NULL) | 69 if (user == NULL) |
| 70 return; | 70 return; |
| 71 | 71 |
| 72 const base::Value* value = settings_service_->GetValue(su_id, key); | 72 const base::Value* value = settings_service_->GetValue(su_id, key); |
| 73 | 73 |
| 74 if (value == NULL) { | 74 if (value == NULL) { |
| 75 LOG(WARNING) << "Got empty value from sync."; | 75 LOG(WARNING) << "Got empty value from sync."; |
| 76 return; | 76 return; |
| (...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 189 const UserContext& master_key_context, | 189 const UserContext& master_key_context, |
| 190 const std::string& user_id, | 190 const std::string& user_id, |
| 191 scoped_ptr<base::DictionaryValue> password_data) { | 191 scoped_ptr<base::DictionaryValue> password_data) { |
| 192 VLOG(0) << "Password changed for " << user_id; | 192 VLOG(0) << "Password changed for " << user_id; |
| 193 UMA_HISTOGRAM_ENUMERATION( | 193 UMA_HISTOGRAM_ENUMERATION( |
| 194 "ManagedUsers.ChromeOS.PasswordChange", | 194 "ManagedUsers.ChromeOS.PasswordChange", |
| 195 SupervisedUserAuthentication::PASSWORD_CHANGED_IN_MANAGER_SESSION, | 195 SupervisedUserAuthentication::PASSWORD_CHANGED_IN_MANAGER_SESSION, |
| 196 SupervisedUserAuthentication::PASSWORD_CHANGE_RESULT_MAX_VALUE); | 196 SupervisedUserAuthentication::PASSWORD_CHANGE_RESULT_MAX_VALUE); |
| 197 | 197 |
| 198 SupervisedUserAuthentication* auth = | 198 SupervisedUserAuthentication* auth = |
| 199 UserManager::Get()->GetSupervisedUserManager()->GetAuthentication(); | 199 GetUserManager()->GetSupervisedUserManager()->GetAuthentication(); |
| 200 int old_schema = auth->GetPasswordSchema(user_id); | 200 int old_schema = auth->GetPasswordSchema(user_id); |
| 201 auth->StorePasswordData(user_id, *password_data.get()); | 201 auth->StorePasswordData(user_id, *password_data.get()); |
| 202 | 202 |
| 203 if (auth->HasIncompleteKey(user_id)) | 203 if (auth->HasIncompleteKey(user_id)) |
| 204 auth->MarkKeyIncomplete(user_id, false /* key is complete now */); | 204 auth->MarkKeyIncomplete(user_id, false /* key is complete now */); |
| 205 | 205 |
| 206 // Check if we have legacy labels for keys. | 206 // Check if we have legacy labels for keys. |
| 207 // TODO(antrim): Migrate it to GetLabels call once wad@ implement it. | 207 // TODO(antrim): Migrate it to GetLabels call once wad@ implement it. |
| 208 if (old_schema == SupervisedUserAuthentication::SCHEMA_PLAIN) { | 208 if (old_schema == SupervisedUserAuthentication::SCHEMA_PLAIN) { |
| 209 // 1) Add new manager key (using old key). | 209 // 1) Add new manager key (using old key). |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 261 void ManagerPasswordService::OnOldManagerKeyDeleted( | 261 void ManagerPasswordService::OnOldManagerKeyDeleted( |
| 262 const UserContext& master_key_context) { | 262 const UserContext& master_key_context) { |
| 263 VLOG(1) << "Removed old master key for " << master_key_context.GetUserID(); | 263 VLOG(1) << "Removed old master key for " << master_key_context.GetUserID(); |
| 264 } | 264 } |
| 265 | 265 |
| 266 void ManagerPasswordService::Shutdown() { | 266 void ManagerPasswordService::Shutdown() { |
| 267 settings_service_subscription_.reset(); | 267 settings_service_subscription_.reset(); |
| 268 } | 268 } |
| 269 | 269 |
| 270 } // namespace chromeos | 270 } // namespace chromeos |
| OLD | NEW |