Index: chrome/browser/chromeos/login/users/user_manager_impl.cc |
diff --git a/chrome/browser/chromeos/login/users/user_manager_impl.cc b/chrome/browser/chromeos/login/users/user_manager_impl.cc |
deleted file mode 100644 |
index 2a8d493b2fee140b5430430997630afa0d7c6e2b..0000000000000000000000000000000000000000 |
--- a/chrome/browser/chromeos/login/users/user_manager_impl.cc |
+++ /dev/null |
@@ -1,1839 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/chromeos/login/users/user_manager_impl.h" |
- |
-#include <cstddef> |
-#include <set> |
- |
-#include "ash/multi_profile_uma.h" |
-#include "base/base_paths.h" |
-#include "base/bind.h" |
-#include "base/bind_helpers.h" |
-#include "base/command_line.h" |
-#include "base/compiler_specific.h" |
-#include "base/files/file_path.h" |
-#include "base/format_macros.h" |
-#include "base/logging.h" |
-#include "base/metrics/histogram.h" |
-#include "base/path_service.h" |
-#include "base/prefs/pref_registry_simple.h" |
-#include "base/prefs/pref_service.h" |
-#include "base/prefs/scoped_user_pref_update.h" |
-#include "base/rand_util.h" |
-#include "base/strings/string_util.h" |
-#include "base/strings/stringprintf.h" |
-#include "base/strings/utf_string_conversions.h" |
-#include "base/sys_info.h" |
-#include "base/threading/worker_pool.h" |
-#include "base/values.h" |
-#include "chrome/browser/browser_process.h" |
-#include "chrome/browser/chrome_notification_types.h" |
-#include "chrome/browser/chromeos/login/demo_mode/demo_app_launcher.h" |
-#include "chrome/browser/chromeos/login/session/user_session_manager.h" |
-#include "chrome/browser/chromeos/login/signin/auth_sync_observer.h" |
-#include "chrome/browser/chromeos/login/signin/auth_sync_observer_factory.h" |
-#include "chrome/browser/chromeos/login/users/avatar/user_image_manager_impl.h" |
-#include "chrome/browser/chromeos/login/users/multi_profile_user_controller.h" |
-#include "chrome/browser/chromeos/login/users/remove_user_delegate.h" |
-#include "chrome/browser/chromeos/login/users/supervised_user_manager_impl.h" |
-#include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h" |
-#include "chrome/browser/chromeos/policy/device_local_account.h" |
-#include "chrome/browser/chromeos/profiles/multiprofiles_session_aborted_dialog.h" |
-#include "chrome/browser/chromeos/profiles/profile_helper.h" |
-#include "chrome/browser/chromeos/session_length_limiter.h" |
-#include "chrome/browser/net/crl_set_fetcher.h" |
-#include "chrome/browser/profiles/profile.h" |
-#include "chrome/browser/supervised_user/chromeos/manager_password_service_factory.h" |
-#include "chrome/browser/supervised_user/chromeos/supervised_user_password_service_factory.h" |
-#include "chrome/common/chrome_constants.h" |
-#include "chrome/common/chrome_paths.h" |
-#include "chrome/common/chrome_switches.h" |
-#include "chrome/common/crash_keys.h" |
-#include "chrome/common/pref_names.h" |
-#include "chromeos/chromeos_switches.h" |
-#include "chromeos/cryptohome/async_method_caller.h" |
-#include "chromeos/dbus/dbus_thread_manager.h" |
-#include "chromeos/login/auth/user_context.h" |
-#include "chromeos/login/login_state.h" |
-#include "chromeos/login/user_names.h" |
-#include "chromeos/settings/cros_settings_names.h" |
-#include "components/session_manager/core/session_manager.h" |
-#include "components/user_manager/user_image/user_image.h" |
-#include "components/user_manager/user_type.h" |
-#include "content/public/browser/browser_thread.h" |
-#include "content/public/browser/notification_service.h" |
-#include "google_apis/gaia/gaia_auth_util.h" |
-#include "google_apis/gaia/google_service_auth_error.h" |
-#include "grit/theme_resources.h" |
-#include "policy/policy_constants.h" |
-#include "ui/base/l10n/l10n_util.h" |
-#include "ui/base/resource/resource_bundle.h" |
-#include "ui/wm/core/wm_core_switches.h" |
- |
-using content::BrowserThread; |
- |
-namespace chromeos { |
-namespace { |
- |
-// A vector pref of the the regular users known on this device, arranged in LRU |
-// order. |
-const char kRegularUsers[] = "LoggedInUsers"; |
- |
-// A vector pref of the public accounts defined on this device. |
-const char kPublicAccounts[] = "PublicAccounts"; |
- |
-// A string pref that gets set when a public account is removed but a user is |
-// currently logged into that account, requiring the account's data to be |
-// removed after logout. |
-const char kPublicAccountPendingDataRemoval[] = |
- "PublicAccountPendingDataRemoval"; |
- |
-// A dictionary that maps user IDs to the displayed name. |
-const char kUserDisplayName[] = "UserDisplayName"; |
- |
-// A dictionary that maps user IDs to the user's given name. |
-const char kUserGivenName[] = "UserGivenName"; |
- |
-// A dictionary that maps user IDs to the displayed (non-canonical) emails. |
-const char kUserDisplayEmail[] = "UserDisplayEmail"; |
- |
-// A dictionary that maps user IDs to OAuth token presence flag. |
-const char kUserOAuthTokenStatus[] = "OAuthTokenStatus"; |
- |
-// A dictionary that maps user IDs to a flag indicating whether online |
-// authentication against GAIA should be enforced during the next sign-in. |
-const char kUserForceOnlineSignin[] = "UserForceOnlineSignin"; |
- |
-// A string pref containing the ID of the last user who logged in if it was |
-// a regular user or an empty string if it was another type of user (guest, |
-// kiosk, public account, etc.). |
-const char kLastLoggedInRegularUser[] = "LastLoggedInRegularUser"; |
- |
-// Upper bound for a histogram metric reporting the amount of time between |
-// one regular user logging out and a different regular user logging in. |
-const int kLogoutToLoginDelayMaxSec = 1800; |
- |
-// Callback that is called after user removal is complete. |
-void OnRemoveUserComplete(const std::string& user_email, |
- bool success, |
- cryptohome::MountError return_code) { |
- // Log the error, but there's not much we can do. |
- if (!success) { |
- LOG(ERROR) << "Removal of cryptohome for " << user_email |
- << " failed, return code: " << return_code; |
- } |
-} |
- |
-// Helper function that copies users from |users_list| to |users_vector| and |
-// |users_set|. Duplicates and users already present in |existing_users| are |
-// skipped. |
-void ParseUserList(const base::ListValue& users_list, |
- const std::set<std::string>& existing_users, |
- std::vector<std::string>* users_vector, |
- std::set<std::string>* users_set) { |
- users_vector->clear(); |
- users_set->clear(); |
- for (size_t i = 0; i < users_list.GetSize(); ++i) { |
- std::string email; |
- if (!users_list.GetString(i, &email) || email.empty()) { |
- LOG(ERROR) << "Corrupt entry in user list at index " << i << "."; |
- continue; |
- } |
- if (existing_users.find(email) != existing_users.end() || |
- !users_set->insert(email).second) { |
- LOG(ERROR) << "Duplicate user: " << email; |
- continue; |
- } |
- users_vector->push_back(email); |
- } |
-} |
- |
-// Runs on SequencedWorkerPool thread. Passes resolved locale to |
-// |on_resolve_callback| on UI thread. |
-void ResolveLocale( |
- const std::string& raw_locale, |
- base::Callback<void(const std::string&)> on_resolve_callback) { |
- DCHECK(!BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- std::string resolved_locale; |
- // Ignore result |
- l10n_util::CheckAndResolveLocale(raw_locale, &resolved_locale); |
- BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, |
- base::Bind(on_resolve_callback, resolved_locale)); |
-} |
- |
-} // namespace |
- |
-// static |
-void UserManager::RegisterPrefs(PrefRegistrySimple* registry) { |
- registry->RegisterListPref(kRegularUsers); |
- registry->RegisterListPref(kPublicAccounts); |
- registry->RegisterStringPref(kPublicAccountPendingDataRemoval, ""); |
- registry->RegisterStringPref(kLastLoggedInRegularUser, ""); |
- registry->RegisterDictionaryPref(kUserDisplayName); |
- registry->RegisterDictionaryPref(kUserGivenName); |
- registry->RegisterDictionaryPref(kUserDisplayEmail); |
- registry->RegisterDictionaryPref(kUserOAuthTokenStatus); |
- registry->RegisterDictionaryPref(kUserForceOnlineSignin); |
- SupervisedUserManager::RegisterPrefs(registry); |
- SessionLengthLimiter::RegisterPrefs(registry); |
-} |
- |
-UserManagerImpl::UserManagerImpl() |
- : cros_settings_(CrosSettings::Get()), |
- device_local_account_policy_service_(NULL), |
- user_loading_stage_(STAGE_NOT_LOADED), |
- active_user_(NULL), |
- primary_user_(NULL), |
- session_started_(false), |
- is_current_user_owner_(false), |
- is_current_user_new_(false), |
- is_current_user_ephemeral_regular_user_(false), |
- ephemeral_users_enabled_(false), |
- supervised_user_manager_(new SupervisedUserManagerImpl(this)), |
- manager_creation_time_(base::TimeTicks::Now()) { |
- UpdateNumberOfUsers(); |
- // UserManager instance should be used only on UI thread. |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- registrar_.Add(this, chrome::NOTIFICATION_OWNERSHIP_STATUS_CHANGED, |
- content::NotificationService::AllSources()); |
- registrar_.Add(this, chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED, |
- content::NotificationService::AllSources()); |
- registrar_.Add(this, |
- chrome::NOTIFICATION_PROFILE_CREATED, |
- content::NotificationService::AllSources()); |
- RetrieveTrustedDevicePolicies(); |
- local_accounts_subscription_ = cros_settings_->AddSettingsObserver( |
- kAccountsPrefDeviceLocalAccounts, |
- base::Bind(&UserManagerImpl::RetrieveTrustedDevicePolicies, |
- base::Unretained(this))); |
- multi_profile_user_controller_.reset(new MultiProfileUserController( |
- this, g_browser_process->local_state())); |
- |
- policy::BrowserPolicyConnectorChromeOS* connector = |
- g_browser_process->platform_part()->browser_policy_connector_chromeos(); |
- avatar_policy_observer_.reset(new policy::CloudExternalDataPolicyObserver( |
- cros_settings_, |
- connector->GetDeviceLocalAccountPolicyService(), |
- policy::key::kUserAvatarImage, |
- this)); |
- avatar_policy_observer_->Init(); |
- |
- wallpaper_policy_observer_.reset(new policy::CloudExternalDataPolicyObserver( |
- cros_settings_, |
- connector->GetDeviceLocalAccountPolicyService(), |
- policy::key::kWallpaperImage, |
- this)); |
- wallpaper_policy_observer_->Init(); |
- |
- UpdateLoginState(); |
-} |
- |
-UserManagerImpl::~UserManagerImpl() { |
- // Can't use STLDeleteElements because of the private destructor of User. |
- for (user_manager::UserList::iterator it = users_.begin(); it != users_.end(); |
- it = users_.erase(it)) { |
- DeleteUser(*it); |
- } |
- // These are pointers to the same User instances that were in users_ list. |
- logged_in_users_.clear(); |
- lru_logged_in_users_.clear(); |
- |
- DeleteUser(active_user_); |
-} |
- |
-void UserManagerImpl::Shutdown() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- local_accounts_subscription_.reset(); |
- // Stop the session length limiter. |
- session_length_limiter_.reset(); |
- |
- if (device_local_account_policy_service_) |
- device_local_account_policy_service_->RemoveObserver(this); |
- |
- for (UserImageManagerMap::iterator it = user_image_managers_.begin(), |
- ie = user_image_managers_.end(); |
- it != ie; ++it) { |
- it->second->Shutdown(); |
- } |
- multi_profile_user_controller_.reset(); |
- avatar_policy_observer_.reset(); |
- wallpaper_policy_observer_.reset(); |
- registrar_.RemoveAll(); |
-} |
- |
-MultiProfileUserController* UserManagerImpl::GetMultiProfileUserController() { |
- return multi_profile_user_controller_.get(); |
-} |
- |
-UserImageManager* UserManagerImpl::GetUserImageManager( |
- const std::string& user_id) { |
- UserImageManagerMap::iterator ui = user_image_managers_.find(user_id); |
- if (ui != user_image_managers_.end()) |
- return ui->second.get(); |
- linked_ptr<UserImageManagerImpl> mgr(new UserImageManagerImpl(user_id, this)); |
- user_image_managers_[user_id] = mgr; |
- return mgr.get(); |
-} |
- |
-SupervisedUserManager* UserManagerImpl::GetSupervisedUserManager() { |
- return supervised_user_manager_.get(); |
-} |
- |
-const user_manager::UserList& UserManagerImpl::GetUsers() const { |
- const_cast<UserManagerImpl*>(this)->EnsureUsersLoaded(); |
- return users_; |
-} |
- |
-user_manager::UserList UserManagerImpl::GetUsersAdmittedForMultiProfile() |
- const { |
- // Supervised users are not allowed to use multi-profiles. |
- if (logged_in_users_.size() == 1 && |
- GetPrimaryUser()->GetType() != user_manager::USER_TYPE_REGULAR) { |
- return user_manager::UserList(); |
- } |
- |
- user_manager::UserList result; |
- const user_manager::UserList& users = GetUsers(); |
- for (user_manager::UserList::const_iterator it = users.begin(); |
- it != users.end(); |
- ++it) { |
- if ((*it)->GetType() == user_manager::USER_TYPE_REGULAR && |
- !(*it)->is_logged_in()) { |
- MultiProfileUserController::UserAllowedInSessionResult check = |
- multi_profile_user_controller_-> |
- IsUserAllowedInSession((*it)->email()); |
- if (check == MultiProfileUserController:: |
- NOT_ALLOWED_PRIMARY_USER_POLICY_FORBIDS) { |
- return user_manager::UserList(); |
- } |
- |
- // Users with a policy that prevents them being added to a session will be |
- // shown in login UI but will be grayed out. |
- // Same applies to owner account (see http://crbug.com/385034). |
- if (check == MultiProfileUserController::ALLOWED || |
- check == MultiProfileUserController::NOT_ALLOWED_POLICY_FORBIDS || |
- check == MultiProfileUserController::NOT_ALLOWED_OWNER_AS_SECONDARY) { |
- result.push_back(*it); |
- } |
- } |
- } |
- |
- return result; |
-} |
- |
-const user_manager::UserList& UserManagerImpl::GetLoggedInUsers() const { |
- return logged_in_users_; |
-} |
- |
-const user_manager::UserList& UserManagerImpl::GetLRULoggedInUsers() { |
- // If there is no user logged in, we return the active user as the only one. |
- if (lru_logged_in_users_.empty() && active_user_) { |
- temp_single_logged_in_users_.clear(); |
- temp_single_logged_in_users_.insert(temp_single_logged_in_users_.begin(), |
- active_user_); |
- return temp_single_logged_in_users_; |
- } |
- return lru_logged_in_users_; |
-} |
- |
-user_manager::UserList UserManagerImpl::GetUnlockUsers() const { |
- const user_manager::UserList& logged_in_users = GetLoggedInUsers(); |
- if (logged_in_users.empty()) |
- return user_manager::UserList(); |
- |
- user_manager::UserList unlock_users; |
- Profile* profile = ProfileHelper::Get()->GetProfileByUser(primary_user_); |
- std::string primary_behavior = |
- profile->GetPrefs()->GetString(prefs::kMultiProfileUserBehavior); |
- |
- // Specific case: only one logged in user or |
- // primary user has primary-only multi-profile policy. |
- if (logged_in_users.size() == 1 || |
- primary_behavior == MultiProfileUserController::kBehaviorPrimaryOnly) { |
- if (primary_user_->can_lock()) |
- unlock_users.push_back(primary_user_); |
- } else { |
- // Fill list of potential unlock users based on multi-profile policy state. |
- for (user_manager::UserList::const_iterator it = logged_in_users.begin(); |
- it != logged_in_users.end(); |
- ++it) { |
- user_manager::User* user = (*it); |
- Profile* profile = ProfileHelper::Get()->GetProfileByUser(user); |
- const std::string behavior = |
- profile->GetPrefs()->GetString(prefs::kMultiProfileUserBehavior); |
- if (behavior == MultiProfileUserController::kBehaviorUnrestricted && |
- user->can_lock()) { |
- unlock_users.push_back(user); |
- } else if (behavior == MultiProfileUserController::kBehaviorPrimaryOnly) { |
- NOTREACHED() |
- << "Spotted primary-only multi-profile policy for non-primary user"; |
- } |
- } |
- } |
- |
- return unlock_users; |
-} |
- |
-const std::string& UserManagerImpl::GetOwnerEmail() { |
- return owner_email_; |
-} |
- |
-void UserManagerImpl::UserLoggedIn(const std::string& user_id, |
- const std::string& username_hash, |
- bool browser_restart) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- user_manager::User* user = FindUserInListAndModify(user_id); |
- if (active_user_ && user) { |
- user->set_is_logged_in(true); |
- user->set_username_hash(username_hash); |
- logged_in_users_.push_back(user); |
- lru_logged_in_users_.push_back(user); |
- // Reset the new user flag if the user already exists. |
- is_current_user_new_ = false; |
- NotifyUserAddedToSession(user); |
- // Remember that we need to switch to this user as soon as profile ready. |
- pending_user_switch_ = user_id; |
- return; |
- } |
- |
- policy::DeviceLocalAccount::Type device_local_account_type; |
- if (user_id == chromeos::login::kGuestUserName) { |
- GuestUserLoggedIn(); |
- } else if (user_id == chromeos::login::kRetailModeUserName) { |
- RetailModeUserLoggedIn(); |
- } else if (policy::IsDeviceLocalAccountUser(user_id, |
- &device_local_account_type) && |
- device_local_account_type == |
- policy::DeviceLocalAccount::TYPE_KIOSK_APP) { |
- KioskAppLoggedIn(user_id); |
- } else if (DemoAppLauncher::IsDemoAppSession(user_id)) { |
- DemoAccountLoggedIn(); |
- } else { |
- EnsureUsersLoaded(); |
- |
- if (user && user->GetType() == user_manager::USER_TYPE_PUBLIC_ACCOUNT) { |
- PublicAccountUserLoggedIn(user); |
- } else if ((user && |
- user->GetType() == user_manager::USER_TYPE_SUPERVISED) || |
- (!user && |
- gaia::ExtractDomainName(user_id) == |
- chromeos::login::kSupervisedUserDomain)) { |
- SupervisedUserLoggedIn(user_id); |
- } else if (browser_restart && user_id == g_browser_process->local_state()-> |
- GetString(kPublicAccountPendingDataRemoval)) { |
- PublicAccountUserLoggedIn( |
- user_manager::User::CreatePublicAccountUser(user_id)); |
- } else if (user_id != owner_email_ && !user && |
- (AreEphemeralUsersEnabled() || browser_restart)) { |
- RegularUserLoggedInAsEphemeral(user_id); |
- } else { |
- RegularUserLoggedIn(user_id); |
- } |
- |
- // Initialize the session length limiter and start it only if |
- // session limit is defined by the policy. |
- session_length_limiter_.reset(new SessionLengthLimiter(NULL, |
- browser_restart)); |
- } |
- DCHECK(active_user_); |
- active_user_->set_is_logged_in(true); |
- active_user_->set_is_active(true); |
- active_user_->set_username_hash(username_hash); |
- |
- // Place user who just signed in to the top of the logged in users. |
- logged_in_users_.insert(logged_in_users_.begin(), active_user_); |
- SetLRUUser(active_user_); |
- |
- if (!primary_user_) { |
- // Register CRLSet now that the home dir is mounted. |
- if (!username_hash.empty()) { |
- base::FilePath path; |
- path = |
- chromeos::ProfileHelper::GetProfilePathByUserIdHash(username_hash); |
- component_updater::ComponentUpdateService* cus = |
- g_browser_process->component_updater(); |
- CRLSetFetcher* crl_set = g_browser_process->crl_set_fetcher(); |
- if (crl_set && cus) |
- crl_set->StartInitialLoad(cus, path); |
- } |
- primary_user_ = active_user_; |
- if (primary_user_->GetType() == user_manager::USER_TYPE_REGULAR) |
- SendRegularUserLoginMetrics(user_id); |
- } |
- |
- UMA_HISTOGRAM_ENUMERATION("UserManager.LoginUserType", |
- active_user_->GetType(), |
- user_manager::NUM_USER_TYPES); |
- |
- g_browser_process->local_state()->SetString( |
- kLastLoggedInRegularUser, |
- (active_user_->GetType() == user_manager::USER_TYPE_REGULAR) ? user_id |
- : ""); |
- |
- NotifyOnLogin(); |
-} |
- |
-void UserManagerImpl::SwitchActiveUser(const std::string& user_id) { |
- user_manager::User* user = FindUserAndModify(user_id); |
- if (!user) { |
- NOTREACHED() << "Switching to a non-existing user"; |
- return; |
- } |
- if (user == active_user_) { |
- NOTREACHED() << "Switching to a user who is already active"; |
- return; |
- } |
- if (!user->is_logged_in()) { |
- NOTREACHED() << "Switching to a user that is not logged in"; |
- return; |
- } |
- if (user->GetType() != user_manager::USER_TYPE_REGULAR) { |
- NOTREACHED() << "Switching to a non-regular user"; |
- return; |
- } |
- if (user->username_hash().empty()) { |
- NOTREACHED() << "Switching to a user that doesn't have username_hash set"; |
- return; |
- } |
- |
- DCHECK(active_user_); |
- active_user_->set_is_active(false); |
- user->set_is_active(true); |
- active_user_ = user; |
- |
- // Move the user to the front. |
- SetLRUUser(active_user_); |
- |
- NotifyActiveUserHashChanged(active_user_->username_hash()); |
- NotifyActiveUserChanged(active_user_); |
-} |
- |
-void UserManagerImpl::SessionStarted() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- session_started_ = true; |
- |
- UpdateLoginState(); |
- g_browser_process->platform_part()->SessionManager()->SetSessionState( |
- session_manager::SESSION_STATE_ACTIVE); |
- |
- content::NotificationService::current()->Notify( |
- chrome::NOTIFICATION_SESSION_STARTED, |
- content::Source<UserManager>(this), |
- content::Details<const user_manager::User>(active_user_)); |
- if (is_current_user_new_) { |
- // Make sure that the new user's data is persisted to Local State. |
- g_browser_process->local_state()->CommitPendingWrite(); |
- } |
-} |
- |
-void UserManagerImpl::RemoveUser(const std::string& user_id, |
- RemoveUserDelegate* delegate) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- const user_manager::User* user = FindUser(user_id); |
- if (!user || (user->GetType() != user_manager::USER_TYPE_REGULAR && |
- user->GetType() != user_manager::USER_TYPE_SUPERVISED)) |
- return; |
- |
- // Sanity check: we must not remove single user unless it's an enterprise |
- // device. This check may seem redundant at a first sight because |
- // this single user must be an owner and we perform special check later |
- // in order not to remove an owner. However due to non-instant nature of |
- // ownership assignment this later check may sometimes fail. |
- // See http://crosbug.com/12723 |
- policy::BrowserPolicyConnectorChromeOS* connector = |
- g_browser_process->platform_part() |
- ->browser_policy_connector_chromeos(); |
- if (users_.size() < 2 && !connector->IsEnterpriseManaged()) |
- return; |
- |
- // Sanity check: do not allow any of the the logged in users to be removed. |
- for (user_manager::UserList::const_iterator it = logged_in_users_.begin(); |
- it != logged_in_users_.end(); |
- ++it) { |
- if ((*it)->email() == user_id) |
- return; |
- } |
- |
- RemoveUserInternal(user_id, delegate); |
-} |
- |
-void UserManagerImpl::RemoveUserInternal(const std::string& user_email, |
- RemoveUserDelegate* delegate) { |
- CrosSettings* cros_settings = CrosSettings::Get(); |
- |
- // Ensure the value of owner email has been fetched. |
- if (CrosSettingsProvider::TRUSTED != cros_settings->PrepareTrustedValues( |
- base::Bind(&UserManagerImpl::RemoveUserInternal, |
- base::Unretained(this), |
- user_email, delegate))) { |
- // Value of owner email is not fetched yet. RemoveUserInternal will be |
- // called again after fetch completion. |
- return; |
- } |
- std::string owner; |
- cros_settings->GetString(kDeviceOwner, &owner); |
- if (user_email == owner) { |
- // Owner is not allowed to be removed from the device. |
- return; |
- } |
- RemoveNonOwnerUserInternal(user_email, delegate); |
-} |
- |
-void UserManagerImpl::RemoveNonOwnerUserInternal(const std::string& user_email, |
- RemoveUserDelegate* delegate) { |
- if (delegate) |
- delegate->OnBeforeUserRemoved(user_email); |
- RemoveUserFromList(user_email); |
- cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( |
- user_email, base::Bind(&OnRemoveUserComplete, user_email)); |
- |
- if (delegate) |
- delegate->OnUserRemoved(user_email); |
-} |
- |
-void UserManagerImpl::RemoveUserFromList(const std::string& user_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- RemoveNonCryptohomeData(user_id); |
- if (user_loading_stage_ == STAGE_LOADED) { |
- DeleteUser(RemoveRegularOrSupervisedUserFromList(user_id)); |
- } else if (user_loading_stage_ == STAGE_LOADING) { |
- DCHECK(gaia::ExtractDomainName(user_id) == |
- chromeos::login::kSupervisedUserDomain); |
- // Special case, removing partially-constructed supervised user during user |
- // list loading. |
- ListPrefUpdate users_update(g_browser_process->local_state(), |
- kRegularUsers); |
- users_update->Remove(base::StringValue(user_id), NULL); |
- } else { |
- NOTREACHED() << "Users are not loaded yet."; |
- return; |
- } |
- // Make sure that new data is persisted to Local State. |
- g_browser_process->local_state()->CommitPendingWrite(); |
-} |
- |
-bool UserManagerImpl::IsKnownUser(const std::string& user_id) const { |
- return FindUser(user_id) != NULL; |
-} |
- |
-const user_manager::User* UserManagerImpl::FindUser( |
- const std::string& user_id) const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (active_user_ && active_user_->email() == user_id) |
- return active_user_; |
- return FindUserInList(user_id); |
-} |
- |
-user_manager::User* UserManagerImpl::FindUserAndModify( |
- const std::string& user_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (active_user_ && active_user_->email() == user_id) |
- return active_user_; |
- return FindUserInListAndModify(user_id); |
-} |
- |
-const user_manager::User* UserManagerImpl::GetLoggedInUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return active_user_; |
-} |
- |
-user_manager::User* UserManagerImpl::GetLoggedInUser() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return active_user_; |
-} |
- |
-const user_manager::User* UserManagerImpl::GetActiveUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return active_user_; |
-} |
- |
-user_manager::User* UserManagerImpl::GetActiveUser() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return active_user_; |
-} |
- |
-const user_manager::User* UserManagerImpl::GetPrimaryUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return primary_user_; |
-} |
- |
-void UserManagerImpl::SaveUserOAuthStatus( |
- const std::string& user_id, |
- user_manager::User::OAuthTokenStatus oauth_token_status) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- DVLOG(1) << "Saving user OAuth token status in Local State"; |
- user_manager::User* user = FindUserAndModify(user_id); |
- if (user) |
- user->set_oauth_token_status(oauth_token_status); |
- |
- GetUserFlow(user_id)->HandleOAuthTokenStatusChange(oauth_token_status); |
- |
- // Do not update local state if data stored or cached outside the user's |
- // cryptohome is to be treated as ephemeral. |
- if (IsUserNonCryptohomeDataEphemeral(user_id)) |
- return; |
- |
- PrefService* local_state = g_browser_process->local_state(); |
- |
- DictionaryPrefUpdate oauth_status_update(local_state, kUserOAuthTokenStatus); |
- oauth_status_update->SetWithoutPathExpansion(user_id, |
- new base::FundamentalValue(static_cast<int>(oauth_token_status))); |
-} |
- |
-void UserManagerImpl::SaveForceOnlineSignin(const std::string& user_id, |
- bool force_online_signin) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- // Do not update local state if data stored or cached outside the user's |
- // cryptohome is to be treated as ephemeral. |
- if (IsUserNonCryptohomeDataEphemeral(user_id)) |
- return; |
- |
- DictionaryPrefUpdate force_online_update(g_browser_process->local_state(), |
- kUserForceOnlineSignin); |
- force_online_update->SetBooleanWithoutPathExpansion(user_id, |
- force_online_signin); |
-} |
- |
-void UserManagerImpl::SaveUserDisplayName(const std::string& user_id, |
- const base::string16& display_name) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- if (user_manager::User* user = FindUserAndModify(user_id)) { |
- user->set_display_name(display_name); |
- |
- // Do not update local state if data stored or cached outside the user's |
- // cryptohome is to be treated as ephemeral. |
- if (!IsUserNonCryptohomeDataEphemeral(user_id)) { |
- PrefService* local_state = g_browser_process->local_state(); |
- |
- DictionaryPrefUpdate display_name_update(local_state, kUserDisplayName); |
- display_name_update->SetWithoutPathExpansion( |
- user_id, |
- new base::StringValue(display_name)); |
- |
- supervised_user_manager_->UpdateManagerName(user_id, display_name); |
- } |
- } |
-} |
- |
-base::string16 UserManagerImpl::GetUserDisplayName( |
- const std::string& user_id) const { |
- const user_manager::User* user = FindUser(user_id); |
- return user ? user->display_name() : base::string16(); |
-} |
- |
-void UserManagerImpl::SaveUserDisplayEmail(const std::string& user_id, |
- const std::string& display_email) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- user_manager::User* user = FindUserAndModify(user_id); |
- if (!user) |
- return; // Ignore if there is no such user. |
- |
- user->set_display_email(display_email); |
- |
- // Do not update local state if data stored or cached outside the user's |
- // cryptohome is to be treated as ephemeral. |
- if (IsUserNonCryptohomeDataEphemeral(user_id)) |
- return; |
- |
- PrefService* local_state = g_browser_process->local_state(); |
- |
- DictionaryPrefUpdate display_email_update(local_state, kUserDisplayEmail); |
- display_email_update->SetWithoutPathExpansion( |
- user_id, |
- new base::StringValue(display_email)); |
-} |
- |
-std::string UserManagerImpl::GetUserDisplayEmail( |
- const std::string& user_id) const { |
- const user_manager::User* user = FindUser(user_id); |
- return user ? user->display_email() : user_id; |
-} |
- |
-void UserManagerImpl::UpdateUserAccountData( |
- const std::string& user_id, |
- const UserAccountData& account_data) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- SaveUserDisplayName(user_id, account_data.display_name()); |
- |
- if (user_manager::User* user = FindUserAndModify(user_id)) { |
- base::string16 given_name = account_data.given_name(); |
- user->set_given_name(given_name); |
- if (!IsUserNonCryptohomeDataEphemeral(user_id)) { |
- PrefService* local_state = g_browser_process->local_state(); |
- |
- DictionaryPrefUpdate given_name_update(local_state, kUserGivenName); |
- given_name_update->SetWithoutPathExpansion( |
- user_id, |
- new base::StringValue(given_name)); |
- } |
- } |
- |
- UpdateUserAccountLocale(user_id, account_data.locale()); |
-} |
- |
-void UserManagerImpl::StopPolicyObserverForTesting() { |
- avatar_policy_observer_.reset(); |
- wallpaper_policy_observer_.reset(); |
-} |
- |
-void UserManagerImpl::Observe(int type, |
- const content::NotificationSource& source, |
- const content::NotificationDetails& details) { |
- switch (type) { |
- case chrome::NOTIFICATION_OWNERSHIP_STATUS_CHANGED: |
- if (!device_local_account_policy_service_) { |
- policy::BrowserPolicyConnectorChromeOS* connector = |
- g_browser_process->platform_part() |
- ->browser_policy_connector_chromeos(); |
- device_local_account_policy_service_ = |
- connector->GetDeviceLocalAccountPolicyService(); |
- if (device_local_account_policy_service_) |
- device_local_account_policy_service_->AddObserver(this); |
- } |
- RetrieveTrustedDevicePolicies(); |
- UpdateOwnership(); |
- break; |
- case chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED: { |
- Profile* profile = content::Details<Profile>(details).ptr(); |
- if (IsUserLoggedIn() && |
- !IsLoggedInAsGuest() && |
- !IsLoggedInAsKioskApp()) { |
- if (IsLoggedInAsSupervisedUser()) |
- SupervisedUserPasswordServiceFactory::GetForProfile(profile); |
- if (IsLoggedInAsRegularUser()) |
- ManagerPasswordServiceFactory::GetForProfile(profile); |
- |
- if (!profile->IsOffTheRecord()) { |
- AuthSyncObserver* sync_observer = |
- AuthSyncObserverFactory::GetInstance()->GetForProfile(profile); |
- sync_observer->StartObserving(); |
- multi_profile_user_controller_->StartObserving(profile); |
- } |
- } |
- break; |
- } |
- case chrome::NOTIFICATION_PROFILE_CREATED: { |
- Profile* profile = content::Source<Profile>(source).ptr(); |
- user_manager::User* user = |
- ProfileHelper::Get()->GetUserByProfile(profile); |
- if (user != NULL) |
- user->set_profile_is_created(); |
- // If there is pending user switch, do it now. |
- if (!pending_user_switch_.empty()) { |
- // Call SwitchActiveUser async because otherwise it may cause |
- // ProfileManager::GetProfile before the profile gets registered |
- // in ProfileManager. It happens in case of sync profile load when |
- // NOTIFICATION_PROFILE_CREATED is called synchronously. |
- base::MessageLoop::current()->PostTask(FROM_HERE, |
- base::Bind(&UserManagerImpl::SwitchActiveUser, |
- base::Unretained(this), |
- pending_user_switch_)); |
- pending_user_switch_.clear(); |
- } |
- break; |
- } |
- default: |
- NOTREACHED(); |
- } |
-} |
- |
-void UserManagerImpl::OnExternalDataSet(const std::string& policy, |
- const std::string& user_id) { |
- if (policy == policy::key::kUserAvatarImage) |
- GetUserImageManager(user_id)->OnExternalDataSet(policy); |
- else if (policy == policy::key::kWallpaperImage) |
- WallpaperManager::Get()->OnPolicySet(policy, user_id); |
- else |
- NOTREACHED(); |
-} |
- |
-void UserManagerImpl::OnExternalDataCleared(const std::string& policy, |
- const std::string& user_id) { |
- if (policy == policy::key::kUserAvatarImage) |
- GetUserImageManager(user_id)->OnExternalDataCleared(policy); |
- else if (policy == policy::key::kWallpaperImage) |
- WallpaperManager::Get()->OnPolicyCleared(policy, user_id); |
- else |
- NOTREACHED(); |
-} |
- |
-void UserManagerImpl::OnExternalDataFetched(const std::string& policy, |
- const std::string& user_id, |
- scoped_ptr<std::string> data) { |
- if (policy == policy::key::kUserAvatarImage) |
- GetUserImageManager(user_id)->OnExternalDataFetched(policy, data.Pass()); |
- else if (policy == policy::key::kWallpaperImage) |
- WallpaperManager::Get()->OnPolicyFetched(policy, user_id, data.Pass()); |
- else |
- NOTREACHED(); |
-} |
- |
-void UserManagerImpl::OnPolicyUpdated(const std::string& user_id) { |
- const user_manager::User* user = FindUserInList(user_id); |
- if (!user || user->GetType() != user_manager::USER_TYPE_PUBLIC_ACCOUNT) |
- return; |
- UpdatePublicAccountDisplayName(user_id); |
- NotifyUserListChanged(); |
-} |
- |
-void UserManagerImpl::OnDeviceLocalAccountsChanged() { |
- // No action needed here, changes to the list of device-local accounts get |
- // handled via the kAccountsPrefDeviceLocalAccounts device setting observer. |
-} |
- |
-bool UserManagerImpl::IsCurrentUserOwner() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- base::AutoLock lk(is_current_user_owner_lock_); |
- return is_current_user_owner_; |
-} |
- |
-void UserManagerImpl::SetCurrentUserIsOwner(bool is_current_user_owner) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- { |
- base::AutoLock lk(is_current_user_owner_lock_); |
- is_current_user_owner_ = is_current_user_owner; |
- } |
- UpdateLoginState(); |
-} |
- |
-bool UserManagerImpl::IsCurrentUserNew() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return is_current_user_new_; |
-} |
- |
-bool UserManagerImpl::IsCurrentUserNonCryptohomeDataEphemeral() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- IsUserNonCryptohomeDataEphemeral(GetLoggedInUser()->email()); |
-} |
- |
-bool UserManagerImpl::CanCurrentUserLock() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && active_user_->can_lock() && |
- GetCurrentUserFlow()->CanLockScreen(); |
-} |
- |
-bool UserManagerImpl::IsUserLoggedIn() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return active_user_; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsRegularUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_REGULAR; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsDemoUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_RETAIL_MODE; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsPublicAccount() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_PUBLIC_ACCOUNT; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsGuest() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_GUEST; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsSupervisedUser() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_SUPERVISED; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsKioskApp() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && |
- active_user_->GetType() == user_manager::USER_TYPE_KIOSK_APP; |
-} |
- |
-bool UserManagerImpl::IsLoggedInAsStub() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return IsUserLoggedIn() && active_user_->email() == login::kStubUser; |
-} |
- |
-bool UserManagerImpl::IsSessionStarted() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- return session_started_; |
-} |
- |
-bool UserManagerImpl::IsUserNonCryptohomeDataEphemeral( |
- const std::string& user_id) const { |
- // Data belonging to the guest, retail mode and stub users is always |
- // ephemeral. |
- if (user_id == login::kGuestUserName || |
- user_id == login::kRetailModeUserName || user_id == login::kStubUser) { |
- return true; |
- } |
- |
- // Data belonging to the owner, anyone found on the user list and obsolete |
- // public accounts whose data has not been removed yet is not ephemeral. |
- if (user_id == owner_email_ || UserExistsInList(user_id) || |
- user_id == g_browser_process->local_state()-> |
- GetString(kPublicAccountPendingDataRemoval)) { |
- return false; |
- } |
- |
- // Data belonging to the currently logged-in user is ephemeral when: |
- // a) The user logged into a regular account while the ephemeral users policy |
- // was enabled. |
- // - or - |
- // b) The user logged into any other account type. |
- if (IsUserLoggedIn() && (user_id == GetLoggedInUser()->email()) && |
- (is_current_user_ephemeral_regular_user_ || !IsLoggedInAsRegularUser())) { |
- return true; |
- } |
- |
- // Data belonging to any other user is ephemeral when: |
- // a) Going through the regular login flow and the ephemeral users policy is |
- // enabled. |
- // - or - |
- // b) The browser is restarting after a crash. |
- return AreEphemeralUsersEnabled() || |
- UserSessionManager::GetInstance()->HasBrowserRestarted(); |
-} |
- |
-void UserManagerImpl::AddObserver(UserManager::Observer* obs) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- observer_list_.AddObserver(obs); |
-} |
- |
-void UserManagerImpl::RemoveObserver(UserManager::Observer* obs) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- observer_list_.RemoveObserver(obs); |
-} |
- |
-void UserManagerImpl::AddSessionStateObserver( |
- UserManager::UserSessionStateObserver* obs) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- session_state_observer_list_.AddObserver(obs); |
-} |
- |
-void UserManagerImpl::RemoveSessionStateObserver( |
- UserManager::UserSessionStateObserver* obs) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- session_state_observer_list_.RemoveObserver(obs); |
-} |
- |
-void UserManagerImpl::NotifyLocalStateChanged() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FOR_EACH_OBSERVER(UserManager::Observer, observer_list_, |
- LocalStateChanged(this)); |
-} |
- |
-void UserManagerImpl::EnsureUsersLoaded() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (!g_browser_process || !g_browser_process->local_state()) |
- return; |
- |
- if (user_loading_stage_ != STAGE_NOT_LOADED) |
- return; |
- user_loading_stage_ = STAGE_LOADING; |
- // Clean up user list first. All code down the path should be synchronous, |
- // so that local state after transaction rollback is in consistent state. |
- // This process also should not trigger EnsureUsersLoaded again. |
- if (supervised_user_manager_->HasFailedUserCreationTransaction()) |
- supervised_user_manager_->RollbackUserCreationTransaction(); |
- |
- PrefService* local_state = g_browser_process->local_state(); |
- const base::ListValue* prefs_regular_users = |
- local_state->GetList(kRegularUsers); |
- const base::ListValue* prefs_public_sessions = |
- local_state->GetList(kPublicAccounts); |
- const base::DictionaryValue* prefs_display_names = |
- local_state->GetDictionary(kUserDisplayName); |
- const base::DictionaryValue* prefs_given_names = |
- local_state->GetDictionary(kUserGivenName); |
- const base::DictionaryValue* prefs_display_emails = |
- local_state->GetDictionary(kUserDisplayEmail); |
- |
- // Load public sessions first. |
- std::vector<std::string> public_sessions; |
- std::set<std::string> public_sessions_set; |
- ParseUserList(*prefs_public_sessions, std::set<std::string>(), |
- &public_sessions, &public_sessions_set); |
- for (std::vector<std::string>::const_iterator it = public_sessions.begin(); |
- it != public_sessions.end(); ++it) { |
- users_.push_back(user_manager::User::CreatePublicAccountUser(*it)); |
- UpdatePublicAccountDisplayName(*it); |
- } |
- |
- // Load regular users and supervised users. |
- std::vector<std::string> regular_users; |
- std::set<std::string> regular_users_set; |
- ParseUserList(*prefs_regular_users, public_sessions_set, |
- ®ular_users, ®ular_users_set); |
- for (std::vector<std::string>::const_iterator it = regular_users.begin(); |
- it != regular_users.end(); ++it) { |
- user_manager::User* user = NULL; |
- const std::string domain = gaia::ExtractDomainName(*it); |
- if (domain == chromeos::login::kSupervisedUserDomain) |
- user = user_manager::User::CreateSupervisedUser(*it); |
- else |
- user = user_manager::User::CreateRegularUser(*it); |
- user->set_oauth_token_status(LoadUserOAuthStatus(*it)); |
- user->set_force_online_signin(LoadForceOnlineSignin(*it)); |
- users_.push_back(user); |
- |
- base::string16 display_name; |
- if (prefs_display_names->GetStringWithoutPathExpansion(*it, |
- &display_name)) { |
- user->set_display_name(display_name); |
- } |
- |
- base::string16 given_name; |
- if (prefs_given_names->GetStringWithoutPathExpansion(*it, &given_name)) { |
- user->set_given_name(given_name); |
- } |
- |
- std::string display_email; |
- if (prefs_display_emails->GetStringWithoutPathExpansion(*it, |
- &display_email)) { |
- user->set_display_email(display_email); |
- } |
- } |
- |
- user_loading_stage_ = STAGE_LOADED; |
- |
- for (user_manager::UserList::iterator ui = users_.begin(), ue = users_.end(); |
- ui != ue; |
- ++ui) { |
- GetUserImageManager((*ui)->email())->LoadUserImage(); |
- } |
-} |
- |
-void UserManagerImpl::RetrieveTrustedDevicePolicies() { |
- ephemeral_users_enabled_ = false; |
- owner_email_.clear(); |
- |
- // Schedule a callback if device policy has not yet been verified. |
- if (CrosSettingsProvider::TRUSTED != cros_settings_->PrepareTrustedValues( |
- base::Bind(&UserManagerImpl::RetrieveTrustedDevicePolicies, |
- base::Unretained(this)))) { |
- return; |
- } |
- |
- cros_settings_->GetBoolean(kAccountsPrefEphemeralUsersEnabled, |
- &ephemeral_users_enabled_); |
- cros_settings_->GetString(kDeviceOwner, &owner_email_); |
- |
- EnsureUsersLoaded(); |
- |
- bool changed = UpdateAndCleanUpPublicAccounts( |
- policy::GetDeviceLocalAccounts(cros_settings_)); |
- |
- // If ephemeral users are enabled and we are on the login screen, take this |
- // opportunity to clean up by removing all regular users except the owner. |
- if (ephemeral_users_enabled_ && !IsUserLoggedIn()) { |
- ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
- kRegularUsers); |
- prefs_users_update->Clear(); |
- for (user_manager::UserList::iterator it = users_.begin(); |
- it != users_.end();) { |
- const std::string user_email = (*it)->email(); |
- if ((*it)->GetType() == user_manager::USER_TYPE_REGULAR && |
- user_email != owner_email_) { |
- RemoveNonCryptohomeData(user_email); |
- DeleteUser(*it); |
- it = users_.erase(it); |
- changed = true; |
- } else { |
- if ((*it)->GetType() != user_manager::USER_TYPE_PUBLIC_ACCOUNT) |
- prefs_users_update->Append(new base::StringValue(user_email)); |
- ++it; |
- } |
- } |
- } |
- |
- if (changed) |
- NotifyUserListChanged(); |
-} |
- |
-bool UserManagerImpl::AreEphemeralUsersEnabled() const { |
- policy::BrowserPolicyConnectorChromeOS* connector = |
- g_browser_process->platform_part()->browser_policy_connector_chromeos(); |
- return ephemeral_users_enabled_ && |
- (connector->IsEnterpriseManaged() || !owner_email_.empty()); |
-} |
- |
-user_manager::UserList& UserManagerImpl::GetUsersAndModify() { |
- EnsureUsersLoaded(); |
- return users_; |
-} |
- |
-const user_manager::User* UserManagerImpl::FindUserInList( |
- const std::string& user_id) const { |
- const user_manager::UserList& users = GetUsers(); |
- for (user_manager::UserList::const_iterator it = users.begin(); |
- it != users.end(); |
- ++it) { |
- if ((*it)->email() == user_id) |
- return *it; |
- } |
- return NULL; |
-} |
- |
-const bool UserManagerImpl::UserExistsInList(const std::string& user_id) const { |
- PrefService* local_state = g_browser_process->local_state(); |
- const base::ListValue* user_list = local_state->GetList(kRegularUsers); |
- for (size_t i = 0; i < user_list->GetSize(); ++i) { |
- std::string email; |
- if (user_list->GetString(i, &email) && (user_id == email)) |
- return true; |
- } |
- return false; |
-} |
- |
-user_manager::User* UserManagerImpl::FindUserInListAndModify( |
- const std::string& user_id) { |
- user_manager::UserList& users = GetUsersAndModify(); |
- for (user_manager::UserList::iterator it = users.begin(); it != users.end(); |
- ++it) { |
- if ((*it)->email() == user_id) |
- return *it; |
- } |
- return NULL; |
-} |
- |
-void UserManagerImpl::GuestUserLoggedIn() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- active_user_ = user_manager::User::CreateGuestUser(); |
- // TODO(nkostylev): Add support for passing guest session cryptohome |
- // mount point. Legacy (--login-profile) value will be used for now. |
- // http://crosbug.com/230859 |
- active_user_->SetStubImage( |
- user_manager::UserImage( |
- *ResourceBundle::GetSharedInstance().GetImageSkiaNamed( |
- IDR_PROFILE_PICTURE_LOADING)), |
- user_manager::User::USER_IMAGE_INVALID, |
- false); |
- // Initializes wallpaper after active_user_ is set. |
- WallpaperManager::Get()->SetUserWallpaperNow(chromeos::login::kGuestUserName); |
-} |
- |
-void UserManagerImpl::AddUserRecord(user_manager::User* user) { |
- // Add the user to the front of the user list. |
- ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
- kRegularUsers); |
- prefs_users_update->Insert(0, new base::StringValue(user->email())); |
- users_.insert(users_.begin(), user); |
-} |
- |
-void UserManagerImpl::RegularUserLoggedIn(const std::string& user_id) { |
- // Remove the user from the user list. |
- active_user_ = RemoveRegularOrSupervisedUserFromList(user_id); |
- |
- // If the user was not found on the user list, create a new user. |
- is_current_user_new_ = !active_user_; |
- if (!active_user_) { |
- active_user_ = user_manager::User::CreateRegularUser(user_id); |
- active_user_->set_oauth_token_status(LoadUserOAuthStatus(user_id)); |
- SaveUserDisplayName(active_user_->email(), |
- base::UTF8ToUTF16(active_user_->GetAccountName(true))); |
- WallpaperManager::Get()->SetUserWallpaperNow(user_id); |
- } |
- |
- AddUserRecord(active_user_); |
- |
- GetUserImageManager(user_id)->UserLoggedIn(is_current_user_new_, false); |
- |
- WallpaperManager::Get()->EnsureLoggedInUserWallpaperLoaded(); |
- |
- // Make sure that new data is persisted to Local State. |
- g_browser_process->local_state()->CommitPendingWrite(); |
-} |
- |
-void UserManagerImpl::RegularUserLoggedInAsEphemeral( |
- const std::string& user_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- is_current_user_new_ = true; |
- is_current_user_ephemeral_regular_user_ = true; |
- active_user_ = user_manager::User::CreateRegularUser(user_id); |
- GetUserImageManager(user_id)->UserLoggedIn(is_current_user_new_, false); |
- WallpaperManager::Get()->SetUserWallpaperNow(user_id); |
-} |
- |
-void UserManagerImpl::SupervisedUserLoggedIn( |
- const std::string& user_id) { |
- // TODO(nkostylev): Refactor, share code with RegularUserLoggedIn(). |
- |
- // Remove the user from the user list. |
- active_user_ = RemoveRegularOrSupervisedUserFromList(user_id); |
- // If the user was not found on the user list, create a new user. |
- if (!active_user_) { |
- is_current_user_new_ = true; |
- active_user_ = user_manager::User::CreateSupervisedUser(user_id); |
- // Leaving OAuth token status at the default state = unknown. |
- WallpaperManager::Get()->SetUserWallpaperNow(user_id); |
- } else { |
- if (supervised_user_manager_->CheckForFirstRun(user_id)) { |
- is_current_user_new_ = true; |
- WallpaperManager::Get()->SetUserWallpaperNow(user_id); |
- } else { |
- is_current_user_new_ = false; |
- } |
- } |
- |
- // Add the user to the front of the user list. |
- ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
- kRegularUsers); |
- prefs_users_update->Insert(0, new base::StringValue(user_id)); |
- users_.insert(users_.begin(), active_user_); |
- |
- // Now that user is in the list, save display name. |
- if (is_current_user_new_) { |
- SaveUserDisplayName(active_user_->email(), |
- active_user_->GetDisplayName()); |
- } |
- |
- GetUserImageManager(user_id)->UserLoggedIn(is_current_user_new_, true); |
- WallpaperManager::Get()->EnsureLoggedInUserWallpaperLoaded(); |
- |
- // Make sure that new data is persisted to Local State. |
- g_browser_process->local_state()->CommitPendingWrite(); |
-} |
- |
-void UserManagerImpl::PublicAccountUserLoggedIn(user_manager::User* user) { |
- is_current_user_new_ = true; |
- active_user_ = user; |
- // The UserImageManager chooses a random avatar picture when a user logs in |
- // for the first time. Tell the UserImageManager that this user is not new to |
- // prevent the avatar from getting changed. |
- GetUserImageManager(user->email())->UserLoggedIn(false, true); |
- WallpaperManager::Get()->EnsureLoggedInUserWallpaperLoaded(); |
-} |
- |
-void UserManagerImpl::KioskAppLoggedIn(const std::string& app_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- policy::DeviceLocalAccount::Type device_local_account_type; |
- DCHECK(policy::IsDeviceLocalAccountUser(app_id, |
- &device_local_account_type)); |
- DCHECK_EQ(policy::DeviceLocalAccount::TYPE_KIOSK_APP, |
- device_local_account_type); |
- |
- active_user_ = user_manager::User::CreateKioskAppUser(app_id); |
- active_user_->SetStubImage( |
- user_manager::UserImage( |
- *ResourceBundle::GetSharedInstance().GetImageSkiaNamed( |
- IDR_PROFILE_PICTURE_LOADING)), |
- user_manager::User::USER_IMAGE_INVALID, |
- false); |
- |
- WallpaperManager::Get()->SetUserWallpaperNow(app_id); |
- |
- // TODO(bartfab): Add KioskAppUsers to the users_ list and keep metadata like |
- // the kiosk_app_id in these objects, removing the need to re-parse the |
- // device-local account list here to extract the kiosk_app_id. |
- const std::vector<policy::DeviceLocalAccount> device_local_accounts = |
- policy::GetDeviceLocalAccounts(cros_settings_); |
- const policy::DeviceLocalAccount* account = NULL; |
- for (std::vector<policy::DeviceLocalAccount>::const_iterator |
- it = device_local_accounts.begin(); |
- it != device_local_accounts.end(); ++it) { |
- if (it->user_id == app_id) { |
- account = &*it; |
- break; |
- } |
- } |
- std::string kiosk_app_id; |
- if (account) { |
- kiosk_app_id = account->kiosk_app_id; |
- } else { |
- LOG(ERROR) << "Logged into nonexistent kiosk-app account: " << app_id; |
- NOTREACHED(); |
- } |
- |
- CommandLine* command_line = CommandLine::ForCurrentProcess(); |
- command_line->AppendSwitch(::switches::kForceAppMode); |
- command_line->AppendSwitchASCII(::switches::kAppId, kiosk_app_id); |
- |
- // Disable window animation since kiosk app runs in a single full screen |
- // window and window animation causes start-up janks. |
- command_line->AppendSwitch( |
- wm::switches::kWindowAnimationsDisabled); |
-} |
- |
-void UserManagerImpl::DemoAccountLoggedIn() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- active_user_ = |
- user_manager::User::CreateKioskAppUser(DemoAppLauncher::kDemoUserName); |
- active_user_->SetStubImage( |
- user_manager::UserImage( |
- *ResourceBundle::GetSharedInstance().GetImageSkiaNamed( |
- IDR_PROFILE_PICTURE_LOADING)), |
- user_manager::User::USER_IMAGE_INVALID, |
- false); |
- WallpaperManager::Get()->SetUserWallpaperNow(DemoAppLauncher::kDemoUserName); |
- |
- CommandLine* command_line = CommandLine::ForCurrentProcess(); |
- command_line->AppendSwitch(::switches::kForceAppMode); |
- command_line->AppendSwitchASCII(::switches::kAppId, |
- DemoAppLauncher::kDemoAppId); |
- |
- // Disable window animation since the demo app runs in a single full screen |
- // window and window animation causes start-up janks. |
- CommandLine::ForCurrentProcess()->AppendSwitch( |
- wm::switches::kWindowAnimationsDisabled); |
-} |
- |
-void UserManagerImpl::RetailModeUserLoggedIn() { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- is_current_user_new_ = true; |
- active_user_ = user_manager::User::CreateRetailModeUser(); |
- GetUserImageManager(chromeos::login::kRetailModeUserName) |
- ->UserLoggedIn(is_current_user_new_, true); |
- WallpaperManager::Get()->SetUserWallpaperNow( |
- chromeos::login::kRetailModeUserName); |
-} |
- |
-void UserManagerImpl::NotifyOnLogin() { |
- CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- UserSessionManager::OverrideHomedir(); |
- |
- UpdateNumberOfUsers(); |
- NotifyActiveUserHashChanged(active_user_->username_hash()); |
- NotifyActiveUserChanged(active_user_); |
- UpdateLoginState(); |
- |
- // TODO(nkostylev): Deprecate this notification in favor of |
- // ActiveUserChanged() observer call. |
- content::NotificationService::current()->Notify( |
- chrome::NOTIFICATION_LOGIN_USER_CHANGED, |
- content::Source<UserManager>(this), |
- content::Details<const user_manager::User>(active_user_)); |
- |
- UserSessionManager::GetInstance()->PerformPostUserLoggedInActions(); |
-} |
- |
-user_manager::User::OAuthTokenStatus UserManagerImpl::LoadUserOAuthStatus( |
- const std::string& user_id) const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- PrefService* local_state = g_browser_process->local_state(); |
- const base::DictionaryValue* prefs_oauth_status = |
- local_state->GetDictionary(kUserOAuthTokenStatus); |
- int oauth_token_status = user_manager::User::OAUTH_TOKEN_STATUS_UNKNOWN; |
- if (prefs_oauth_status && |
- prefs_oauth_status->GetIntegerWithoutPathExpansion( |
- user_id, &oauth_token_status)) { |
- user_manager::User::OAuthTokenStatus result = |
- static_cast<user_manager::User::OAuthTokenStatus>(oauth_token_status); |
- if (result == user_manager::User::OAUTH2_TOKEN_STATUS_INVALID) |
- GetUserFlow(user_id)->HandleOAuthTokenStatusChange(result); |
- return result; |
- } |
- return user_manager::User::OAUTH_TOKEN_STATUS_UNKNOWN; |
-} |
- |
-bool UserManagerImpl::LoadForceOnlineSignin(const std::string& user_id) const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- |
- PrefService* local_state = g_browser_process->local_state(); |
- const base::DictionaryValue* prefs_force_online = |
- local_state->GetDictionary(kUserForceOnlineSignin); |
- bool force_online_signin = false; |
- if (prefs_force_online) { |
- prefs_force_online->GetBooleanWithoutPathExpansion(user_id, |
- &force_online_signin); |
- } |
- return force_online_signin; |
-} |
- |
-void UserManagerImpl::UpdateOwnership() { |
- bool is_owner = DeviceSettingsService::Get()->HasPrivateOwnerKey(); |
- VLOG(1) << "Current user " << (is_owner ? "is owner" : "is not owner"); |
- |
- SetCurrentUserIsOwner(is_owner); |
-} |
- |
-void UserManagerImpl::RemoveNonCryptohomeData(const std::string& user_id) { |
- WallpaperManager::Get()->RemoveUserWallpaperInfo(user_id); |
- GetUserImageManager(user_id)->DeleteUserImage(); |
- |
- PrefService* prefs = g_browser_process->local_state(); |
- DictionaryPrefUpdate prefs_display_name_update(prefs, kUserDisplayName); |
- prefs_display_name_update->RemoveWithoutPathExpansion(user_id, NULL); |
- |
- DictionaryPrefUpdate prefs_given_name_update(prefs, kUserGivenName); |
- prefs_given_name_update->RemoveWithoutPathExpansion(user_id, NULL); |
- |
- DictionaryPrefUpdate prefs_display_email_update(prefs, kUserDisplayEmail); |
- prefs_display_email_update->RemoveWithoutPathExpansion(user_id, NULL); |
- |
- DictionaryPrefUpdate prefs_oauth_update(prefs, kUserOAuthTokenStatus); |
- prefs_oauth_update->RemoveWithoutPathExpansion(user_id, NULL); |
- |
- DictionaryPrefUpdate prefs_force_online_update(prefs, kUserForceOnlineSignin); |
- prefs_force_online_update->RemoveWithoutPathExpansion(user_id, NULL); |
- |
- supervised_user_manager_->RemoveNonCryptohomeData(user_id); |
- |
- multi_profile_user_controller_->RemoveCachedValues(user_id); |
-} |
- |
-user_manager::User* UserManagerImpl::RemoveRegularOrSupervisedUserFromList( |
- const std::string& user_id) { |
- ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
- kRegularUsers); |
- prefs_users_update->Clear(); |
- user_manager::User* user = NULL; |
- for (user_manager::UserList::iterator it = users_.begin(); |
- it != users_.end();) { |
- const std::string user_email = (*it)->email(); |
- if (user_email == user_id) { |
- user = *it; |
- it = users_.erase(it); |
- } else { |
- if ((*it)->GetType() == user_manager::USER_TYPE_REGULAR || |
- (*it)->GetType() == user_manager::USER_TYPE_SUPERVISED) { |
- prefs_users_update->Append(new base::StringValue(user_email)); |
- } |
- ++it; |
- } |
- } |
- return user; |
-} |
- |
-void UserManagerImpl::CleanUpPublicAccountNonCryptohomeDataPendingRemoval() { |
- PrefService* local_state = g_browser_process->local_state(); |
- const std::string public_account_pending_data_removal = |
- local_state->GetString(kPublicAccountPendingDataRemoval); |
- if (public_account_pending_data_removal.empty() || |
- (IsUserLoggedIn() && |
- public_account_pending_data_removal == GetActiveUser()->email())) { |
- return; |
- } |
- |
- RemoveNonCryptohomeData(public_account_pending_data_removal); |
- local_state->ClearPref(kPublicAccountPendingDataRemoval); |
-} |
- |
-void UserManagerImpl::CleanUpPublicAccountNonCryptohomeData( |
- const std::vector<std::string>& old_public_accounts) { |
- std::set<std::string> users; |
- for (user_manager::UserList::const_iterator it = users_.begin(); |
- it != users_.end(); |
- ++it) |
- users.insert((*it)->email()); |
- |
- // If the user is logged into a public account that has been removed from the |
- // user list, mark the account's data as pending removal after logout. |
- if (IsLoggedInAsPublicAccount()) { |
- const std::string active_user_id = GetActiveUser()->email(); |
- if (users.find(active_user_id) == users.end()) { |
- g_browser_process->local_state()->SetString( |
- kPublicAccountPendingDataRemoval, active_user_id); |
- users.insert(active_user_id); |
- } |
- } |
- |
- // Remove the data belonging to any other public accounts that are no longer |
- // found on the user list. |
- for (std::vector<std::string>::const_iterator |
- it = old_public_accounts.begin(); |
- it != old_public_accounts.end(); ++it) { |
- if (users.find(*it) == users.end()) |
- RemoveNonCryptohomeData(*it); |
- } |
-} |
- |
-bool UserManagerImpl::UpdateAndCleanUpPublicAccounts( |
- const std::vector<policy::DeviceLocalAccount>& device_local_accounts) { |
- // Try to remove any public account data marked as pending removal. |
- CleanUpPublicAccountNonCryptohomeDataPendingRemoval(); |
- |
- // Get the current list of public accounts. |
- std::vector<std::string> old_public_accounts; |
- for (user_manager::UserList::const_iterator it = users_.begin(); |
- it != users_.end(); |
- ++it) { |
- if ((*it)->GetType() == user_manager::USER_TYPE_PUBLIC_ACCOUNT) |
- old_public_accounts.push_back((*it)->email()); |
- } |
- |
- // Get the new list of public accounts from policy. |
- std::vector<std::string> new_public_accounts; |
- for (std::vector<policy::DeviceLocalAccount>::const_iterator it = |
- device_local_accounts.begin(); |
- it != device_local_accounts.end(); ++it) { |
- // TODO(mnissler, nkostylev, bartfab): Process Kiosk Apps within the |
- // standard login framework: http://crbug.com/234694 |
- if (it->type == policy::DeviceLocalAccount::TYPE_PUBLIC_SESSION) |
- new_public_accounts.push_back(it->user_id); |
- } |
- |
- // If the list of public accounts has not changed, return. |
- if (new_public_accounts.size() == old_public_accounts.size()) { |
- bool changed = false; |
- for (size_t i = 0; i < new_public_accounts.size(); ++i) { |
- if (new_public_accounts[i] != old_public_accounts[i]) { |
- changed = true; |
- break; |
- } |
- } |
- if (!changed) |
- return false; |
- } |
- |
- // Persist the new list of public accounts in a pref. |
- ListPrefUpdate prefs_public_accounts_update(g_browser_process->local_state(), |
- kPublicAccounts); |
- prefs_public_accounts_update->Clear(); |
- for (std::vector<std::string>::const_iterator it = |
- new_public_accounts.begin(); |
- it != new_public_accounts.end(); ++it) { |
- prefs_public_accounts_update->AppendString(*it); |
- } |
- |
- // Remove the old public accounts from the user list. |
- for (user_manager::UserList::iterator it = users_.begin(); |
- it != users_.end();) { |
- if ((*it)->GetType() == user_manager::USER_TYPE_PUBLIC_ACCOUNT) { |
- if (*it != GetLoggedInUser()) |
- DeleteUser(*it); |
- it = users_.erase(it); |
- } else { |
- ++it; |
- } |
- } |
- |
- // Add the new public accounts to the front of the user list. |
- for (std::vector<std::string>::const_reverse_iterator it = |
- new_public_accounts.rbegin(); |
- it != new_public_accounts.rend(); ++it) { |
- if (IsLoggedInAsPublicAccount() && *it == GetActiveUser()->email()) |
- users_.insert(users_.begin(), GetLoggedInUser()); |
- else |
- users_.insert(users_.begin(), |
- user_manager::User::CreatePublicAccountUser(*it)); |
- UpdatePublicAccountDisplayName(*it); |
- } |
- |
- for (user_manager::UserList::iterator |
- ui = users_.begin(), |
- ue = users_.begin() + new_public_accounts.size(); |
- ui != ue; |
- ++ui) { |
- GetUserImageManager((*ui)->email())->LoadUserImage(); |
- } |
- |
- // Remove data belonging to public accounts that are no longer found on the |
- // user list. |
- CleanUpPublicAccountNonCryptohomeData(old_public_accounts); |
- |
- return true; |
-} |
- |
-void UserManagerImpl::UpdatePublicAccountDisplayName( |
- const std::string& user_id) { |
- std::string display_name; |
- |
- if (device_local_account_policy_service_) { |
- policy::DeviceLocalAccountPolicyBroker* broker = |
- device_local_account_policy_service_->GetBrokerForUser(user_id); |
- if (broker) |
- display_name = broker->GetDisplayName(); |
- } |
- |
- // Set or clear the display name. |
- SaveUserDisplayName(user_id, base::UTF8ToUTF16(display_name)); |
-} |
- |
-UserFlow* UserManagerImpl::GetCurrentUserFlow() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (!IsUserLoggedIn()) |
- return GetDefaultUserFlow(); |
- return GetUserFlow(GetLoggedInUser()->email()); |
-} |
- |
-UserFlow* UserManagerImpl::GetUserFlow(const std::string& user_id) const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FlowMap::const_iterator it = specific_flows_.find(user_id); |
- if (it != specific_flows_.end()) |
- return it->second; |
- return GetDefaultUserFlow(); |
-} |
- |
-void UserManagerImpl::SetUserFlow(const std::string& user_id, UserFlow* flow) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- ResetUserFlow(user_id); |
- specific_flows_[user_id] = flow; |
-} |
- |
-void UserManagerImpl::ResetUserFlow(const std::string& user_id) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FlowMap::iterator it = specific_flows_.find(user_id); |
- if (it != specific_flows_.end()) { |
- delete it->second; |
- specific_flows_.erase(it); |
- } |
-} |
- |
-bool UserManagerImpl::AreSupervisedUsersAllowed() const { |
- bool supervised_users_allowed = false; |
- cros_settings_->GetBoolean(kAccountsPrefSupervisedUsersEnabled, |
- &supervised_users_allowed); |
- return supervised_users_allowed; |
-} |
- |
-UserFlow* UserManagerImpl::GetDefaultUserFlow() const { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- if (!default_flow_.get()) |
- default_flow_.reset(new DefaultUserFlow()); |
- return default_flow_.get(); |
-} |
- |
-void UserManagerImpl::NotifyUserListChanged() { |
- content::NotificationService::current()->Notify( |
- chrome::NOTIFICATION_USER_LIST_CHANGED, |
- content::Source<UserManager>(this), |
- content::NotificationService::NoDetails()); |
-} |
- |
-void UserManagerImpl::NotifyActiveUserChanged( |
- const user_manager::User* active_user) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FOR_EACH_OBSERVER(UserManager::UserSessionStateObserver, |
- session_state_observer_list_, |
- ActiveUserChanged(active_user)); |
-} |
- |
-void UserManagerImpl::NotifyUserAddedToSession( |
- const user_manager::User* added_user) { |
- UpdateNumberOfUsers(); |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FOR_EACH_OBSERVER(UserManager::UserSessionStateObserver, |
- session_state_observer_list_, |
- UserAddedToSession(added_user)); |
-} |
- |
-void UserManagerImpl::NotifyActiveUserHashChanged(const std::string& hash) { |
- DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
- FOR_EACH_OBSERVER(UserManager::UserSessionStateObserver, |
- session_state_observer_list_, |
- ActiveUserHashChanged(hash)); |
-} |
- |
-void UserManagerImpl::UpdateLoginState() { |
- if (!LoginState::IsInitialized()) |
- return; // LoginState may not be intialized in tests. |
- LoginState::LoggedInState logged_in_state; |
- logged_in_state = active_user_ ? LoginState::LOGGED_IN_ACTIVE |
- : LoginState::LOGGED_IN_NONE; |
- |
- LoginState::LoggedInUserType login_user_type; |
- if (logged_in_state == LoginState::LOGGED_IN_NONE) |
- login_user_type = LoginState::LOGGED_IN_USER_NONE; |
- else if (is_current_user_owner_) |
- login_user_type = LoginState::LOGGED_IN_USER_OWNER; |
- else if (active_user_->GetType() == user_manager::USER_TYPE_GUEST) |
- login_user_type = LoginState::LOGGED_IN_USER_GUEST; |
- else if (active_user_->GetType() == user_manager::USER_TYPE_RETAIL_MODE) |
- login_user_type = LoginState::LOGGED_IN_USER_RETAIL_MODE; |
- else if (active_user_->GetType() == user_manager::USER_TYPE_PUBLIC_ACCOUNT) |
- login_user_type = LoginState::LOGGED_IN_USER_PUBLIC_ACCOUNT; |
- else if (active_user_->GetType() == user_manager::USER_TYPE_SUPERVISED) |
- login_user_type = LoginState::LOGGED_IN_USER_SUPERVISED; |
- else if (active_user_->GetType() == user_manager::USER_TYPE_KIOSK_APP) |
- login_user_type = LoginState::LOGGED_IN_USER_KIOSK_APP; |
- else |
- login_user_type = LoginState::LOGGED_IN_USER_REGULAR; |
- |
- if (primary_user_) { |
- LoginState::Get()->SetLoggedInStateAndPrimaryUser( |
- logged_in_state, login_user_type, primary_user_->username_hash()); |
- } else { |
- LoginState::Get()->SetLoggedInState(logged_in_state, login_user_type); |
- } |
-} |
- |
-void UserManagerImpl::SetLRUUser(user_manager::User* user) { |
- user_manager::UserList::iterator it = |
- std::find(lru_logged_in_users_.begin(), lru_logged_in_users_.end(), user); |
- if (it != lru_logged_in_users_.end()) |
- lru_logged_in_users_.erase(it); |
- lru_logged_in_users_.insert(lru_logged_in_users_.begin(), user); |
-} |
- |
-void UserManagerImpl::SendRegularUserLoginMetrics(const std::string& user_id) { |
- // If this isn't the first time Chrome was run after the system booted, |
- // assume that Chrome was restarted because a previous session ended. |
- if (!CommandLine::ForCurrentProcess()->HasSwitch( |
- switches::kFirstExecAfterBoot)) { |
- const std::string last_email = |
- g_browser_process->local_state()->GetString(kLastLoggedInRegularUser); |
- const base::TimeDelta time_to_login = |
- base::TimeTicks::Now() - manager_creation_time_; |
- if (!last_email.empty() && user_id != last_email && |
- time_to_login.InSeconds() <= kLogoutToLoginDelayMaxSec) { |
- UMA_HISTOGRAM_CUSTOM_COUNTS("UserManager.LogoutToLoginDelay", |
- time_to_login.InSeconds(), 0, kLogoutToLoginDelayMaxSec, 50); |
- } |
- } |
-} |
- |
-void UserManagerImpl::OnUserNotAllowed(const std::string& user_email) { |
- LOG(ERROR) << "Shutdown session because a user is not allowed to be in the " |
- "current session"; |
- chromeos::ShowMultiprofilesSessionAbortedDialog(user_email); |
-} |
- |
-void UserManagerImpl::UpdateUserAccountLocale(const std::string& user_id, |
- const std::string& locale) { |
- if (!locale.empty() && |
- locale != g_browser_process->GetApplicationLocale()) { |
- BrowserThread::PostBlockingPoolTask( |
- FROM_HERE, |
- base::Bind(ResolveLocale, locale, |
- base::Bind(&UserManagerImpl::DoUpdateAccountLocale, |
- base::Unretained(this), |
- user_id))); |
- } else { |
- DoUpdateAccountLocale(user_id, locale); |
- } |
-} |
- |
-void UserManagerImpl::DoUpdateAccountLocale( |
- const std::string& user_id, |
- const std::string& resolved_locale) { |
- if (user_manager::User* user = FindUserAndModify(user_id)) |
- user->SetAccountLocale(resolved_locale); |
-} |
- |
-void UserManagerImpl::UpdateNumberOfUsers() { |
- size_t users = GetLoggedInUsers().size(); |
- if (users) { |
- // Write the user number as UMA stat when a multi user session is possible. |
- if ((users + GetUsersAdmittedForMultiProfile().size()) > 1) |
- ash::MultiProfileUMA::RecordUserCount(users); |
- } |
- |
- base::debug::SetCrashKeyValue(crash_keys::kNumberOfUsers, |
- base::StringPrintf("%" PRIuS, GetLoggedInUsers().size())); |
-} |
- |
-void UserManagerImpl::DeleteUser(user_manager::User* user) { |
- const bool is_active_user = (user == active_user_); |
- delete user; |
- if (is_active_user) |
- active_user_ = NULL; |
-} |
- |
-} // namespace chromeos |