Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(151)

Side by Side Diff: chrome/browser/chromeos/login/supervised/supervised_user_creation_controller_new.cc

Issue 393343002: Rename "managed (mode|user)" to "supervised user" (part 7) (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: more alphabetize (and rebase again) Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/login/managed/managed_user_creation_controller _new.h" 5 #include "chrome/browser/chromeos/login/supervised/supervised_user_creation_cont roller_new.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/bind.h" 8 #include "base/bind.h"
9 #include "base/file_util.h" 9 #include "base/file_util.h"
10 #include "base/files/file_path.h" 10 #include "base/files/file_path.h"
11 #include "base/strings/string_number_conversions.h" 11 #include "base/strings/string_number_conversions.h"
12 #include "base/strings/string_util.h" 12 #include "base/strings/string_util.h"
13 #include "base/sys_info.h" 13 #include "base/sys_info.h"
14 #include "base/task_runner_util.h" 14 #include "base/task_runner_util.h"
15 #include "base/threading/sequenced_worker_pool.h" 15 #include "base/threading/sequenced_worker_pool.h"
16 #include "base/values.h" 16 #include "base/values.h"
17 #include "chrome/browser/chromeos/login/auth/mount_manager.h" 17 #include "chrome/browser/chromeos/login/auth/mount_manager.h"
18 #include "chrome/browser/chromeos/login/managed/locally_managed_user_constants.h " 18 #include "chrome/browser/chromeos/login/supervised/supervised_user_authenticatio n.h"
19 #include "chrome/browser/chromeos/login/managed/supervised_user_authentication.h " 19 #include "chrome/browser/chromeos/login/supervised/supervised_user_constants.h"
20 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h" 20 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h"
21 #include "chrome/browser/chromeos/login/users/user.h" 21 #include "chrome/browser/chromeos/login/users/user.h"
22 #include "chrome/browser/chromeos/login/users/user_manager.h" 22 #include "chrome/browser/chromeos/login/users/user_manager.h"
23 #include "chrome/browser/lifetime/application_lifetime.h" 23 #include "chrome/browser/lifetime/application_lifetime.h"
24 #include "chrome/browser/sync/profile_sync_service.h" 24 #include "chrome/browser/sync/profile_sync_service.h"
25 #include "chrome/browser/sync/profile_sync_service_factory.h" 25 #include "chrome/browser/sync/profile_sync_service_factory.h"
26 #include "chromeos/cryptohome/cryptohome_parameters.h" 26 #include "chromeos/cryptohome/cryptohome_parameters.h"
27 #include "chromeos/dbus/dbus_thread_manager.h" 27 #include "chromeos/dbus/dbus_thread_manager.h"
28 #include "chromeos/dbus/session_manager_client.h" 28 #include "chromeos/dbus/session_manager_client.h"
29 #include "chromeos/login/auth/key.h" 29 #include "chromeos/login/auth/key.h"
30 #include "chromeos/login/auth/user_context.h" 30 #include "chromeos/login/auth/user_context.h"
31 #include "content/public/browser/browser_thread.h" 31 #include "content/public/browser/browser_thread.h"
32 #include "content/public/browser/user_metrics.h" 32 #include "content/public/browser/user_metrics.h"
33 #include "crypto/random.h" 33 #include "crypto/random.h"
34 #include "google_apis/gaia/google_service_auth_error.h" 34 #include "google_apis/gaia/google_service_auth_error.h"
35 35
36 namespace chromeos { 36 namespace chromeos {
37 37
38 namespace { 38 namespace {
39 39
40 const int kUserCreationTimeoutSeconds = 30; // 30 seconds. 40 const int kUserCreationTimeoutSeconds = 30; // 30 seconds.
41 41
42 bool StoreManagedUserFiles(const std::string& token, 42 bool StoreSupervisedUserFiles(const std::string& token,
43 const base::FilePath& base_path) { 43 const base::FilePath& base_path) {
44 if (!base::SysInfo::IsRunningOnChromeOS()) { 44 if (!base::SysInfo::IsRunningOnChromeOS()) {
45 // If running on desktop, cryptohome stub does not create home directory. 45 // If running on desktop, cryptohome stub does not create home directory.
46 base::CreateDirectory(base_path); 46 base::CreateDirectory(base_path);
47 } 47 }
48 base::FilePath token_file = base_path.Append(kSupervisedUserTokenFilename); 48 base::FilePath token_file = base_path.Append(kSupervisedUserTokenFilename);
49 int bytes = base::WriteFile(token_file, token.c_str(), token.length()); 49 int bytes = base::WriteFile(token_file, token.c_str(), token.length());
50 return bytes >= 0; 50 return bytes >= 0;
51 } 51 }
52 52
53 } // namespace 53 } // namespace
54 54
55 ManagedUserCreationControllerNew::ManagedUserCreationControllerNew( 55 SupervisedUserCreationControllerNew::SupervisedUserCreationControllerNew(
56 ManagedUserCreationControllerNew::StatusConsumer* consumer, 56 SupervisedUserCreationControllerNew::StatusConsumer* consumer,
57 const std::string& manager_id) 57 const std::string& manager_id)
58 : ManagedUserCreationController(consumer), 58 : SupervisedUserCreationController(consumer),
59 stage_(STAGE_INITIAL), 59 stage_(STAGE_INITIAL),
60 weak_factory_(this) { 60 weak_factory_(this) {
61 creation_context_.reset( 61 creation_context_.reset(
62 new ManagedUserCreationControllerNew::UserCreationContext()); 62 new SupervisedUserCreationControllerNew::UserCreationContext());
63 creation_context_->manager_id = manager_id; 63 creation_context_->manager_id = manager_id;
64 } 64 }
65 65
66 ManagedUserCreationControllerNew::~ManagedUserCreationControllerNew() {} 66 SupervisedUserCreationControllerNew::~SupervisedUserCreationControllerNew() {}
67 67
68 ManagedUserCreationControllerNew::UserCreationContext::UserCreationContext() {} 68 SupervisedUserCreationControllerNew::UserCreationContext::
69 UserCreationContext() {}
69 70
70 ManagedUserCreationControllerNew::UserCreationContext::~UserCreationContext() {} 71 SupervisedUserCreationControllerNew::UserCreationContext::
72 ~UserCreationContext() {}
71 73
72 void ManagedUserCreationControllerNew::SetManagerProfile( 74 void SupervisedUserCreationControllerNew::SetManagerProfile(
73 Profile* manager_profile) { 75 Profile* manager_profile) {
74 creation_context_->manager_profile = manager_profile; 76 creation_context_->manager_profile = manager_profile;
75 } 77 }
76 78
77 Profile* ManagedUserCreationControllerNew::GetManagerProfile() { 79 Profile* SupervisedUserCreationControllerNew::GetManagerProfile() {
78 return creation_context_->manager_profile; 80 return creation_context_->manager_profile;
79 } 81 }
80 82
81 void ManagedUserCreationControllerNew::StartCreation( 83 void SupervisedUserCreationControllerNew::StartCreation(
82 const base::string16& display_name, 84 const base::string16& display_name,
83 const std::string& password, 85 const std::string& password,
84 int avatar_index) { 86 int avatar_index) {
85 DCHECK(creation_context_); 87 DCHECK(creation_context_);
86 creation_context_->creation_type = NEW_USER; 88 creation_context_->creation_type = NEW_USER;
87 creation_context_->display_name = display_name; 89 creation_context_->display_name = display_name;
88 creation_context_->password = password; 90 creation_context_->password = password;
89 creation_context_->avatar_index = avatar_index; 91 creation_context_->avatar_index = avatar_index;
90 StartCreationImpl(); 92 StartCreationImpl();
91 } 93 }
92 94
93 void ManagedUserCreationControllerNew::StartImport( 95 void SupervisedUserCreationControllerNew::StartImport(
94 const base::string16& display_name, 96 const base::string16& display_name,
95 const std::string& password, 97 const std::string& password,
96 int avatar_index, 98 int avatar_index,
97 const std::string& sync_id, 99 const std::string& sync_id,
98 const std::string& master_key) { 100 const std::string& master_key) {
99 DCHECK(creation_context_); 101 DCHECK(creation_context_);
100 creation_context_->creation_type = USER_IMPORT_OLD; 102 creation_context_->creation_type = USER_IMPORT_OLD;
101 103
102 creation_context_->display_name = display_name; 104 creation_context_->display_name = display_name;
103 creation_context_->password = password; 105 creation_context_->password = password;
104 creation_context_->avatar_index = avatar_index; 106 creation_context_->avatar_index = avatar_index;
105 107
106 creation_context_->sync_user_id = sync_id; 108 creation_context_->sync_user_id = sync_id;
107 109
108 creation_context_->master_key = master_key; 110 creation_context_->master_key = master_key;
109 StartCreationImpl(); 111 StartCreationImpl();
110 } 112 }
111 113
112 void ManagedUserCreationControllerNew::StartImport( 114 void SupervisedUserCreationControllerNew::StartImport(
113 const base::string16& display_name, 115 const base::string16& display_name,
114 int avatar_index, 116 int avatar_index,
115 const std::string& sync_id, 117 const std::string& sync_id,
116 const std::string& master_key, 118 const std::string& master_key,
117 const base::DictionaryValue* password_data, 119 const base::DictionaryValue* password_data,
118 const std::string& encryption_key, 120 const std::string& encryption_key,
119 const std::string& signature_key) { 121 const std::string& signature_key) {
120 DCHECK(creation_context_); 122 DCHECK(creation_context_);
121 creation_context_->creation_type = USER_IMPORT_NEW; 123 creation_context_->creation_type = USER_IMPORT_NEW;
122 124
123 creation_context_->display_name = display_name; 125 creation_context_->display_name = display_name;
124 126
125 creation_context_->avatar_index = avatar_index; 127 creation_context_->avatar_index = avatar_index;
126 128
127 creation_context_->sync_user_id = sync_id; 129 creation_context_->sync_user_id = sync_id;
128 130
129 creation_context_->master_key = master_key; 131 creation_context_->master_key = master_key;
130 132
131 password_data->GetStringWithoutPathExpansion( 133 password_data->GetStringWithoutPathExpansion(
132 kEncryptedPassword, &creation_context_->salted_password); 134 kEncryptedPassword, &creation_context_->salted_password);
133 135
134 creation_context_->signature_key = signature_key; 136 creation_context_->signature_key = signature_key;
135 creation_context_->encryption_key = encryption_key; 137 creation_context_->encryption_key = encryption_key;
136 138
137 creation_context_->password_data.MergeDictionary(password_data); 139 creation_context_->password_data.MergeDictionary(password_data);
138 140
139 StartCreationImpl(); 141 StartCreationImpl();
140 } 142 }
141 143
142 void ManagedUserCreationControllerNew::StartCreationImpl() { 144 void SupervisedUserCreationControllerNew::StartCreationImpl() {
143 DCHECK(creation_context_); 145 DCHECK(creation_context_);
144 DCHECK_EQ(STAGE_INITIAL, stage_); 146 DCHECK_EQ(STAGE_INITIAL, stage_);
145 VLOG(1) << "Starting supervised user creation"; 147 VLOG(1) << "Starting supervised user creation";
146 VLOG(1) << " Phase 1 : Prepare keys"; 148 VLOG(1) << " Phase 1 : Prepare keys";
147 149
148 SupervisedUserManager* manager = 150 SupervisedUserManager* manager =
149 UserManager::Get()->GetSupervisedUserManager(); 151 UserManager::Get()->GetSupervisedUserManager();
150 manager->StartCreationTransaction(creation_context_->display_name); 152 manager->StartCreationTransaction(creation_context_->display_name);
151 153
152 creation_context_->local_user_id = manager->GenerateUserId(); 154 creation_context_->local_user_id = manager->GenerateUserId();
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after
192 authentication->StorePasswordData(creation_context_->local_user_id, 194 authentication->StorePasswordData(creation_context_->local_user_id,
193 creation_context_->password_data); 195 creation_context_->password_data);
194 stage_ = KEYS_GENERATED; 196 stage_ = KEYS_GENERATED;
195 197
196 VLOG(1) << " Phase 2 : Create cryptohome"; 198 VLOG(1) << " Phase 2 : Create cryptohome";
197 199
198 timeout_timer_.Start( 200 timeout_timer_.Start(
199 FROM_HERE, 201 FROM_HERE,
200 base::TimeDelta::FromSeconds(kUserCreationTimeoutSeconds), 202 base::TimeDelta::FromSeconds(kUserCreationTimeoutSeconds),
201 this, 203 this,
202 &ManagedUserCreationControllerNew::CreationTimedOut); 204 &SupervisedUserCreationControllerNew::CreationTimedOut);
203 authenticator_ = new ExtendedAuthenticator(this); 205 authenticator_ = new ExtendedAuthenticator(this);
204 UserContext user_context; 206 UserContext user_context;
205 user_context.SetKey(Key(creation_context_->master_key)); 207 user_context.SetKey(Key(creation_context_->master_key));
206 authenticator_->TransformKeyIfNeeded( 208 authenticator_->TransformKeyIfNeeded(
207 user_context, 209 user_context,
208 base::Bind(&ManagedUserCreationControllerNew::OnKeyTransformedIfNeeded, 210 base::Bind(&SupervisedUserCreationControllerNew::OnKeyTransformedIfNeeded,
209 weak_factory_.GetWeakPtr())); 211 weak_factory_.GetWeakPtr()));
210 } 212 }
211 213
212 void ManagedUserCreationControllerNew::OnKeyTransformedIfNeeded( 214 void SupervisedUserCreationControllerNew::OnKeyTransformedIfNeeded(
213 const UserContext& user_context) { 215 const UserContext& user_context) {
214 VLOG(1) << " Phase 2.1 : Got hashed master key"; 216 VLOG(1) << " Phase 2.1 : Got hashed master key";
215 creation_context_->salted_master_key = user_context.GetKey()->GetSecret(); 217 creation_context_->salted_master_key = user_context.GetKey()->GetSecret();
216 218
217 // Create home dir with two keys. 219 // Create home dir with two keys.
218 std::vector<cryptohome::KeyDefinition> keys; 220 std::vector<cryptohome::KeyDefinition> keys;
219 221
220 // Main key is the master key. Just as keys for plain GAIA users, it is salted 222 // Main key is the master key. Just as keys for plain GAIA users, it is salted
221 // with system salt. It has all usual privileges. 223 // with system salt. It has all usual privileges.
222 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key, 224 cryptohome::KeyDefinition master_key(creation_context_->salted_master_key,
223 kCryptohomeMasterKeyLabel, 225 kCryptohomeMasterKeyLabel,
224 cryptohome::PRIV_DEFAULT); 226 cryptohome::PRIV_DEFAULT);
225 227
226 keys.push_back(master_key); 228 keys.push_back(master_key);
227 authenticator_->CreateMount( 229 authenticator_->CreateMount(
228 creation_context_->local_user_id, 230 creation_context_->local_user_id,
229 keys, 231 keys,
230 base::Bind(&ManagedUserCreationControllerNew::OnMountSuccess, 232 base::Bind(&SupervisedUserCreationControllerNew::OnMountSuccess,
231 weak_factory_.GetWeakPtr())); 233 weak_factory_.GetWeakPtr()));
232 } 234 }
233 235
234 void ManagedUserCreationControllerNew::OnAuthenticationFailure( 236 void SupervisedUserCreationControllerNew::OnAuthenticationFailure(
235 ExtendedAuthenticator::AuthState error) { 237 ExtendedAuthenticator::AuthState error) {
236 timeout_timer_.Stop(); 238 timeout_timer_.Stop();
237 ErrorCode code = NO_ERROR; 239 ErrorCode code = NO_ERROR;
238 switch (error) { 240 switch (error) {
239 case ManagedUserAuthenticator::NO_MOUNT: 241 case SupervisedUserAuthenticator::NO_MOUNT:
240 code = CRYPTOHOME_NO_MOUNT; 242 code = CRYPTOHOME_NO_MOUNT;
241 break; 243 break;
242 case ManagedUserAuthenticator::FAILED_MOUNT: 244 case SupervisedUserAuthenticator::FAILED_MOUNT:
243 code = CRYPTOHOME_FAILED_MOUNT; 245 code = CRYPTOHOME_FAILED_MOUNT;
244 break; 246 break;
245 case ManagedUserAuthenticator::FAILED_TPM: 247 case SupervisedUserAuthenticator::FAILED_TPM:
246 code = CRYPTOHOME_FAILED_TPM; 248 code = CRYPTOHOME_FAILED_TPM;
247 break; 249 break;
248 default: 250 default:
249 NOTREACHED(); 251 NOTREACHED();
250 } 252 }
251 stage_ = STAGE_ERROR; 253 stage_ = STAGE_ERROR;
252 if (consumer_) 254 if (consumer_)
253 consumer_->OnCreationError(code); 255 consumer_->OnCreationError(code);
254 } 256 }
255 257
256 void ManagedUserCreationControllerNew::OnMountSuccess( 258 void SupervisedUserCreationControllerNew::OnMountSuccess(
257 const std::string& mount_hash) { 259 const std::string& mount_hash) {
258 DCHECK(creation_context_); 260 DCHECK(creation_context_);
259 DCHECK_EQ(KEYS_GENERATED, stage_); 261 DCHECK_EQ(KEYS_GENERATED, stage_);
260 VLOG(1) << " Phase 2.2 : Created home dir with master key"; 262 VLOG(1) << " Phase 2.2 : Created home dir with master key";
261 263
262 creation_context_->mount_hash = mount_hash; 264 creation_context_->mount_hash = mount_hash;
263 265
264 // Plain text password, hashed and salted with individual salt. 266 // Plain text password, hashed and salted with individual salt.
265 // It can be used for mounting homedir, and can be replaced only when signed. 267 // It can be used for mounting homedir, and can be replaced only when signed.
266 cryptohome::KeyDefinition password_key( 268 cryptohome::KeyDefinition password_key(
(...skipping 10 matching lines...) Expand all
277 creation_context_->salted_master_key); 279 creation_context_->salted_master_key);
278 key.SetLabel(kCryptohomeMasterKeyLabel); 280 key.SetLabel(kCryptohomeMasterKeyLabel);
279 UserContext context(creation_context_->local_user_id); 281 UserContext context(creation_context_->local_user_id);
280 context.SetKey(key); 282 context.SetKey(key);
281 context.SetIsUsingOAuth(false); 283 context.SetIsUsingOAuth(false);
282 284
283 authenticator_->AddKey( 285 authenticator_->AddKey(
284 context, 286 context,
285 password_key, 287 password_key,
286 true, 288 true,
287 base::Bind(&ManagedUserCreationControllerNew::OnAddKeySuccess, 289 base::Bind(&SupervisedUserCreationControllerNew::OnAddKeySuccess,
288 weak_factory_.GetWeakPtr())); 290 weak_factory_.GetWeakPtr()));
289 } 291 }
290 292
291 void ManagedUserCreationControllerNew::OnAddKeySuccess() { 293 void SupervisedUserCreationControllerNew::OnAddKeySuccess() {
292 DCHECK(creation_context_); 294 DCHECK(creation_context_);
293 DCHECK_EQ(KEYS_GENERATED, stage_); 295 DCHECK_EQ(KEYS_GENERATED, stage_);
294 stage_ = CRYPTOHOME_CREATED; 296 stage_ = CRYPTOHOME_CREATED;
295 297
296 VLOG(1) << " Phase 3 : Create/update user on chrome.com/manage"; 298 VLOG(1) << " Phase 3 : Create/update user on chrome.com/manage";
297 299
298 ProfileSyncService* sync_service = 300 ProfileSyncService* sync_service =
299 ProfileSyncServiceFactory::GetInstance()->GetForProfile( 301 ProfileSyncServiceFactory::GetInstance()->GetForProfile(
300 creation_context_->manager_profile); 302 creation_context_->manager_profile);
301 ProfileSyncService::SyncStatusSummary status = 303 ProfileSyncService::SyncStatusSummary status =
(...skipping 11 matching lines...) Expand all
313 info.master_key = creation_context_->master_key; 315 info.master_key = creation_context_->master_key;
314 info.password_signature_key = creation_context_->signature_key; 316 info.password_signature_key = creation_context_->signature_key;
315 info.password_encryption_key = creation_context_->encryption_key; 317 info.password_encryption_key = creation_context_->encryption_key;
316 318
317 info.password_data.MergeDictionary(&creation_context_->password_data); 319 info.password_data.MergeDictionary(&creation_context_->password_data);
318 320
319 // Registration utility will update user data if user already exist. 321 // Registration utility will update user data if user already exist.
320 creation_context_->registration_utility->Register( 322 creation_context_->registration_utility->Register(
321 creation_context_->sync_user_id, 323 creation_context_->sync_user_id,
322 info, 324 info,
323 base::Bind(&ManagedUserCreationControllerNew::RegistrationCallback, 325 base::Bind(&SupervisedUserCreationControllerNew::RegistrationCallback,
324 weak_factory_.GetWeakPtr())); 326 weak_factory_.GetWeakPtr()));
325 } 327 }
326 328
327 void ManagedUserCreationControllerNew::RegistrationCallback( 329 void SupervisedUserCreationControllerNew::RegistrationCallback(
328 const GoogleServiceAuthError& error, 330 const GoogleServiceAuthError& error,
329 const std::string& token) { 331 const std::string& token) {
330 DCHECK(creation_context_); 332 DCHECK(creation_context_);
331 DCHECK_EQ(CRYPTOHOME_CREATED, stage_); 333 DCHECK_EQ(CRYPTOHOME_CREATED, stage_);
332 334
333 stage_ = DASHBOARD_CREATED; 335 stage_ = DASHBOARD_CREATED;
334 336
335 if (error.state() == GoogleServiceAuthError::NONE) { 337 if (error.state() == GoogleServiceAuthError::NONE) {
336 creation_context_->token = token; 338 creation_context_->token = token;
337 339
338 PostTaskAndReplyWithResult( 340 PostTaskAndReplyWithResult(
339 content::BrowserThread::GetBlockingPool(), 341 content::BrowserThread::GetBlockingPool(),
340 FROM_HERE, 342 FROM_HERE,
341 base::Bind(&StoreManagedUserFiles, 343 base::Bind(&StoreSupervisedUserFiles,
342 creation_context_->token, 344 creation_context_->token,
343 MountManager::GetHomeDir(creation_context_->mount_hash)), 345 MountManager::GetHomeDir(creation_context_->mount_hash)),
344 base::Bind(&ManagedUserCreationControllerNew::OnManagedUserFilesStored, 346 base::Bind(&SupervisedUserCreationControllerNew::
347 OnSupervisedUserFilesStored,
345 weak_factory_.GetWeakPtr())); 348 weak_factory_.GetWeakPtr()));
346 } else { 349 } else {
347 stage_ = STAGE_ERROR; 350 stage_ = STAGE_ERROR;
348 LOG(ERROR) << "Managed user creation failed. Error code " << error.state(); 351 LOG(ERROR) << "Supervised user creation failed. Error code "
352 << error.state();
349 if (consumer_) 353 if (consumer_)
350 consumer_->OnCreationError(CLOUD_SERVER_ERROR); 354 consumer_->OnCreationError(CLOUD_SERVER_ERROR);
351 } 355 }
352 } 356 }
353 357
354 void ManagedUserCreationControllerNew::OnManagedUserFilesStored(bool success) { 358 void SupervisedUserCreationControllerNew::OnSupervisedUserFilesStored(
359 bool success) {
355 DCHECK(creation_context_); 360 DCHECK(creation_context_);
356 DCHECK_EQ(DASHBOARD_CREATED, stage_); 361 DCHECK_EQ(DASHBOARD_CREATED, stage_);
357 362
358 if (!success) { 363 if (!success) {
359 stage_ = STAGE_ERROR; 364 stage_ = STAGE_ERROR;
360 if (consumer_) 365 if (consumer_)
361 consumer_->OnCreationError(TOKEN_WRITE_FAILED); 366 consumer_->OnCreationError(TOKEN_WRITE_FAILED);
362 return; 367 return;
363 } 368 }
364 // Assume that new token is valid. It will be automatically invalidated if 369 // Assume that new token is valid. It will be automatically invalidated if
365 // sync service fails to use it. 370 // sync service fails to use it.
366 UserManager::Get()->SaveUserOAuthStatus(creation_context_->local_user_id, 371 UserManager::Get()->SaveUserOAuthStatus(creation_context_->local_user_id,
367 User::OAUTH2_TOKEN_STATUS_VALID); 372 User::OAUTH2_TOKEN_STATUS_VALID);
368 373
369 stage_ = TOKEN_WRITTEN; 374 stage_ = TOKEN_WRITTEN;
370 375
371 timeout_timer_.Stop(); 376 timeout_timer_.Stop();
372 UserManager::Get()->GetSupervisedUserManager()->CommitCreationTransaction(); 377 UserManager::Get()->GetSupervisedUserManager()->CommitCreationTransaction();
373 content::RecordAction( 378 content::RecordAction(
374 base::UserMetricsAction("ManagedMode_LocallyManagedUserCreated")); 379 base::UserMetricsAction("ManagedMode_LocallyManagedUserCreated"));
375 380
376 stage_ = TRANSACTION_COMMITTED; 381 stage_ = TRANSACTION_COMMITTED;
377 382
378 if (consumer_) 383 if (consumer_)
379 consumer_->OnCreationSuccess(); 384 consumer_->OnCreationSuccess();
380 } 385 }
381 386
382 void ManagedUserCreationControllerNew::CreationTimedOut() { 387 void SupervisedUserCreationControllerNew::CreationTimedOut() {
383 LOG(ERROR) << "Supervised user creation timed out. stage = " << stage_; 388 LOG(ERROR) << "Supervised user creation timed out. stage = " << stage_;
384 if (consumer_) 389 if (consumer_)
385 consumer_->OnCreationTimeout(); 390 consumer_->OnCreationTimeout();
386 } 391 }
387 392
388 void ManagedUserCreationControllerNew::FinishCreation() { 393 void SupervisedUserCreationControllerNew::FinishCreation() {
389 chrome::AttemptUserExit(); 394 chrome::AttemptUserExit();
390 } 395 }
391 396
392 void ManagedUserCreationControllerNew::CancelCreation() { 397 void SupervisedUserCreationControllerNew::CancelCreation() {
393 creation_context_->registration_utility.reset(); 398 creation_context_->registration_utility.reset();
394 chrome::AttemptUserExit(); 399 chrome::AttemptUserExit();
395 } 400 }
396 401
397 std::string ManagedUserCreationControllerNew::GetManagedUserId() { 402 std::string SupervisedUserCreationControllerNew::GetSupervisedUserId() {
398 DCHECK(creation_context_); 403 DCHECK(creation_context_);
399 return creation_context_->local_user_id; 404 return creation_context_->local_user_id;
400 } 405 }
401 406
402 } // namespace chromeos 407 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698