OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/auth/parallel_authenticator.h" | 5 #include "chromeos/login/auth/cryptohome_authenticator.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/command_line.h" | |
9 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
| 9 #include "base/location.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
11 #include "chrome/browser/chromeos/ownership/owner_settings_service.h" | |
12 #include "chrome/browser/chromeos/settings/cros_settings.h" | |
13 #include "chrome/common/chrome_switches.h" | |
14 #include "chromeos/cryptohome/async_method_caller.h" | 11 #include "chromeos/cryptohome/async_method_caller.h" |
15 #include "chromeos/cryptohome/system_salt_getter.h" | 12 #include "chromeos/cryptohome/system_salt_getter.h" |
16 #include "chromeos/dbus/cryptohome_client.h" | 13 #include "chromeos/dbus/cryptohome_client.h" |
17 #include "chromeos/dbus/dbus_thread_manager.h" | 14 #include "chromeos/dbus/dbus_thread_manager.h" |
18 #include "chromeos/login/auth/auth_status_consumer.h" | 15 #include "chromeos/login/auth/auth_status_consumer.h" |
19 #include "chromeos/login/auth/key.h" | 16 #include "chromeos/login/auth/key.h" |
20 #include "chromeos/login/auth/user_context.h" | 17 #include "chromeos/login/auth/user_context.h" |
21 #include "chromeos/login/login_state.h" | 18 #include "chromeos/login/login_state.h" |
22 #include "chromeos/login/user_names.h" | 19 #include "chromeos/login/user_names.h" |
23 #include "chromeos/login_event_recorder.h" | 20 #include "chromeos/login_event_recorder.h" |
24 #include "components/user_manager/user_manager.h" | |
25 #include "components/user_manager/user_type.h" | 21 #include "components/user_manager/user_type.h" |
26 #include "content/public/browser/browser_thread.h" | |
27 #include "third_party/cros_system_api/dbus/service_constants.h" | 22 #include "third_party/cros_system_api/dbus/service_constants.h" |
28 | 23 |
29 using content::BrowserThread; | |
30 | |
31 namespace chromeos { | 24 namespace chromeos { |
32 | 25 |
33 namespace { | 26 namespace { |
34 | 27 |
35 // Hashes |key| with |system_salt| if it its type is KEY_TYPE_PASSWORD_PLAIN. | 28 // Hashes |key| with |system_salt| if it its type is KEY_TYPE_PASSWORD_PLAIN. |
36 // Returns the keys unmodified otherwise. | 29 // Returns the keys unmodified otherwise. |
37 scoped_ptr<Key> TransformKeyIfNeeded(const Key& key, | 30 scoped_ptr<Key> TransformKeyIfNeeded(const Key& key, |
38 const std::string& system_salt) { | 31 const std::string& system_salt) { |
39 scoped_ptr<Key> result(new Key(key)); | 32 scoped_ptr<Key> result(new Key(key)); |
40 if (result->GetKeyType() == Key::KEY_TYPE_PASSWORD_PLAIN) | 33 if (result->GetKeyType() == Key::KEY_TYPE_PASSWORD_PLAIN) |
41 result->Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); | 34 result->Transform(Key::KEY_TYPE_SALTED_SHA256_TOP_HALF, system_salt); |
42 | 35 |
43 return result.Pass(); | 36 return result.Pass(); |
44 } | 37 } |
45 | 38 |
46 // Records status and calls resolver->Resolve(). | 39 // Records status and calls resolver->Resolve(). |
47 void TriggerResolve(AuthAttemptState* attempt, | 40 void TriggerResolve(AuthAttemptState* attempt, |
48 scoped_refptr<ParallelAuthenticator> resolver, | 41 scoped_refptr<CryptohomeAuthenticator> resolver, |
49 bool success, | 42 bool success, |
50 cryptohome::MountError return_code) { | 43 cryptohome::MountError return_code) { |
51 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
52 attempt->RecordCryptohomeStatus(success, return_code); | 44 attempt->RecordCryptohomeStatus(success, return_code); |
53 resolver->Resolve(); | 45 resolver->Resolve(); |
54 } | 46 } |
55 | 47 |
56 // Records get hash status and calls resolver->Resolve(). | 48 // Records get hash status and calls resolver->Resolve(). |
57 void TriggerResolveHash(AuthAttemptState* attempt, | 49 void TriggerResolveHash(AuthAttemptState* attempt, |
58 scoped_refptr<ParallelAuthenticator> resolver, | 50 scoped_refptr<CryptohomeAuthenticator> resolver, |
59 bool success, | 51 bool success, |
60 const std::string& username_hash) { | 52 const std::string& username_hash) { |
61 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
62 if (success) | 53 if (success) |
63 attempt->RecordUsernameHash(username_hash); | 54 attempt->RecordUsernameHash(username_hash); |
64 else | 55 else |
65 attempt->RecordUsernameHashFailed(); | 56 attempt->RecordUsernameHashFailed(); |
66 resolver->Resolve(); | 57 resolver->Resolve(); |
67 } | 58 } |
68 | 59 |
69 // Calls TriggerResolve while adding login time marker. | 60 // Calls TriggerResolve while adding login time marker. |
70 void TriggerResolveWithLoginTimeMarker( | 61 void TriggerResolveWithLoginTimeMarker( |
71 const std::string& marker_name, | 62 const std::string& marker_name, |
72 AuthAttemptState* attempt, | 63 AuthAttemptState* attempt, |
73 scoped_refptr<ParallelAuthenticator> resolver, | 64 scoped_refptr<CryptohomeAuthenticator> resolver, |
74 bool success, | 65 bool success, |
75 cryptohome::MountError return_code) { | 66 cryptohome::MountError return_code) { |
76 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(marker_name, false); | 67 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker(marker_name, false); |
77 TriggerResolve(attempt, resolver, success, return_code); | 68 TriggerResolve(attempt, resolver, success, return_code); |
78 } | 69 } |
79 | 70 |
80 // Calls cryptohome's mount method. | 71 // Calls cryptohome's mount method. |
81 void Mount(AuthAttemptState* attempt, | 72 void Mount(AuthAttemptState* attempt, |
82 scoped_refptr<ParallelAuthenticator> resolver, | 73 scoped_refptr<CryptohomeAuthenticator> resolver, |
83 int flags, | 74 int flags, |
84 const std::string& system_salt) { | 75 const std::string& system_salt) { |
85 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
86 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( | 76 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( |
87 "CryptohomeMount-Start", false); | 77 "CryptohomeMount-Start", false); |
88 // Set state that username_hash is requested here so that test implementation | 78 // Set state that username_hash is requested here so that test implementation |
89 // that returns directly would not generate 2 OnLoginSucces() calls. | 79 // that returns directly would not generate 2 OnLoginSucces() calls. |
90 attempt->UsernameHashRequested(); | 80 attempt->UsernameHashRequested(); |
91 | 81 |
92 scoped_ptr<Key> key = | 82 scoped_ptr<Key> key = |
93 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); | 83 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); |
94 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMount( | 84 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMount( |
95 attempt->user_context.GetUserID(), | 85 attempt->user_context.GetUserID(), |
96 key->GetSecret(), | 86 key->GetSecret(), |
97 flags, | 87 flags, |
98 base::Bind(&TriggerResolveWithLoginTimeMarker, | 88 base::Bind(&TriggerResolveWithLoginTimeMarker, |
99 "CryptohomeMount-End", | 89 "CryptohomeMount-End", |
100 attempt, | 90 attempt, |
101 resolver)); | 91 resolver)); |
102 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( | 92 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( |
103 attempt->user_context.GetUserID(), | 93 attempt->user_context.GetUserID(), |
104 base::Bind(&TriggerResolveHash, | 94 base::Bind(&TriggerResolveHash, attempt, resolver)); |
105 attempt, | |
106 resolver)); | |
107 } | |
108 | |
109 // Calls cryptohome's mount method for guest. | |
110 void MountGuest(AuthAttemptState* attempt, | |
111 scoped_refptr<ParallelAuthenticator> resolver) { | |
112 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
113 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountGuest( | |
114 base::Bind(&TriggerResolveWithLoginTimeMarker, | |
115 "CryptohomeMount-End", | |
116 attempt, | |
117 resolver)); | |
118 } | 95 } |
119 | 96 |
120 // Calls cryptohome's mount method for guest and also get the user hash from | 97 // Calls cryptohome's mount method for guest and also get the user hash from |
121 // cryptohome. | 98 // cryptohome. |
122 void MountGuestAndGetHash(AuthAttemptState* attempt, | 99 void MountGuestAndGetHash(AuthAttemptState* attempt, |
123 scoped_refptr<ParallelAuthenticator> resolver) { | 100 scoped_refptr<CryptohomeAuthenticator> resolver) { |
124 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
125 attempt->UsernameHashRequested(); | 101 attempt->UsernameHashRequested(); |
126 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountGuest( | 102 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountGuest( |
127 base::Bind(&TriggerResolveWithLoginTimeMarker, | 103 base::Bind(&TriggerResolveWithLoginTimeMarker, |
128 "CryptohomeMount-End", | 104 "CryptohomeMount-End", |
129 attempt, | 105 attempt, |
130 resolver)); | 106 resolver)); |
131 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( | 107 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( |
132 attempt->user_context.GetUserID(), | 108 attempt->user_context.GetUserID(), |
133 base::Bind(&TriggerResolveHash, | 109 base::Bind(&TriggerResolveHash, attempt, resolver)); |
134 attempt, | |
135 resolver)); | |
136 } | 110 } |
137 | 111 |
138 // Calls cryptohome's MountPublic method | 112 // Calls cryptohome's MountPublic method |
139 void MountPublic(AuthAttemptState* attempt, | 113 void MountPublic(AuthAttemptState* attempt, |
140 scoped_refptr<ParallelAuthenticator> resolver, | 114 scoped_refptr<CryptohomeAuthenticator> resolver, |
141 int flags) { | 115 int flags) { |
142 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
143 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountPublic( | 116 cryptohome::AsyncMethodCaller::GetInstance()->AsyncMountPublic( |
144 attempt->user_context.GetUserID(), | 117 attempt->user_context.GetUserID(), |
145 flags, | 118 flags, |
146 base::Bind(&TriggerResolveWithLoginTimeMarker, | 119 base::Bind(&TriggerResolveWithLoginTimeMarker, |
147 "CryptohomeMountPublic-End", | 120 "CryptohomeMountPublic-End", |
148 attempt, | 121 attempt, |
149 resolver)); | 122 resolver)); |
150 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( | 123 cryptohome::AsyncMethodCaller::GetInstance()->AsyncGetSanitizedUsername( |
151 attempt->user_context.GetUserID(), | 124 attempt->user_context.GetUserID(), |
152 base::Bind(&TriggerResolveHash, | 125 base::Bind(&TriggerResolveHash, attempt, resolver)); |
153 attempt, | |
154 resolver)); | |
155 } | 126 } |
156 | 127 |
157 // Calls cryptohome's key migration method. | 128 // Calls cryptohome's key migration method. |
158 void Migrate(AuthAttemptState* attempt, | 129 void Migrate(AuthAttemptState* attempt, |
159 scoped_refptr<ParallelAuthenticator> resolver, | 130 scoped_refptr<CryptohomeAuthenticator> resolver, |
160 bool passing_old_hash, | 131 bool passing_old_hash, |
161 const std::string& old_password, | 132 const std::string& old_password, |
162 const std::string& system_salt) { | 133 const std::string& system_salt) { |
163 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
164 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( | 134 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( |
165 "CryptohomeMigrate-Start", false); | 135 "CryptohomeMigrate-Start", false); |
166 cryptohome::AsyncMethodCaller* caller = | 136 cryptohome::AsyncMethodCaller* caller = |
167 cryptohome::AsyncMethodCaller::GetInstance(); | 137 cryptohome::AsyncMethodCaller::GetInstance(); |
168 | 138 |
169 // TODO(bartfab): Retrieve the hashing algorithm and salt to use for |old_key| | 139 // TODO(bartfab): Retrieve the hashing algorithm and salt to use for |old_key| |
170 // from cryptohomed. | 140 // from cryptohomed. |
171 scoped_ptr<Key> old_key = | 141 scoped_ptr<Key> old_key = |
172 TransformKeyIfNeeded(Key(old_password), system_salt); | 142 TransformKeyIfNeeded(Key(old_password), system_salt); |
173 scoped_ptr<Key> new_key = | 143 scoped_ptr<Key> new_key = |
(...skipping 12 matching lines...) Expand all Loading... |
186 old_key->GetSecret(), | 156 old_key->GetSecret(), |
187 base::Bind(&TriggerResolveWithLoginTimeMarker, | 157 base::Bind(&TriggerResolveWithLoginTimeMarker, |
188 "CryptohomeMount-End", | 158 "CryptohomeMount-End", |
189 attempt, | 159 attempt, |
190 resolver)); | 160 resolver)); |
191 } | 161 } |
192 } | 162 } |
193 | 163 |
194 // Calls cryptohome's remove method. | 164 // Calls cryptohome's remove method. |
195 void Remove(AuthAttemptState* attempt, | 165 void Remove(AuthAttemptState* attempt, |
196 scoped_refptr<ParallelAuthenticator> resolver) { | 166 scoped_refptr<CryptohomeAuthenticator> resolver) { |
197 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
198 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( | 167 chromeos::LoginEventRecorder::Get()->AddLoginTimeMarker( |
199 "CryptohomeRemove-Start", false); | 168 "CryptohomeRemove-Start", false); |
200 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( | 169 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( |
201 attempt->user_context.GetUserID(), | 170 attempt->user_context.GetUserID(), |
202 base::Bind(&TriggerResolveWithLoginTimeMarker, | 171 base::Bind(&TriggerResolveWithLoginTimeMarker, |
203 "CryptohomeRemove-End", | 172 "CryptohomeRemove-End", |
204 attempt, | 173 attempt, |
205 resolver)); | 174 resolver)); |
206 } | 175 } |
207 | 176 |
208 // Calls cryptohome's key check method. | 177 // Calls cryptohome's key check method. |
209 void CheckKey(AuthAttemptState* attempt, | 178 void CheckKey(AuthAttemptState* attempt, |
210 scoped_refptr<ParallelAuthenticator> resolver, | 179 scoped_refptr<CryptohomeAuthenticator> resolver, |
211 const std::string& system_salt) { | 180 const std::string& system_salt) { |
212 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | |
213 scoped_ptr<Key> key = | 181 scoped_ptr<Key> key = |
214 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); | 182 TransformKeyIfNeeded(*attempt->user_context.GetKey(), system_salt); |
215 cryptohome::AsyncMethodCaller::GetInstance()->AsyncCheckKey( | 183 cryptohome::AsyncMethodCaller::GetInstance()->AsyncCheckKey( |
216 attempt->user_context.GetUserID(), | 184 attempt->user_context.GetUserID(), |
217 key->GetSecret(), | 185 key->GetSecret(), |
218 base::Bind(&TriggerResolve, attempt, resolver)); | 186 base::Bind(&TriggerResolve, attempt, resolver)); |
219 } | 187 } |
220 | 188 |
221 } // namespace | 189 } // namespace |
222 | 190 |
223 ParallelAuthenticator::ParallelAuthenticator(AuthStatusConsumer* consumer) | 191 CryptohomeAuthenticator::CryptohomeAuthenticator( |
| 192 scoped_refptr<base::TaskRunner> task_runner, |
| 193 AuthStatusConsumer* consumer) |
224 : Authenticator(consumer), | 194 : Authenticator(consumer), |
| 195 task_runner_(task_runner), |
225 migrate_attempted_(false), | 196 migrate_attempted_(false), |
226 remove_attempted_(false), | 197 remove_attempted_(false), |
227 resync_attempted_(false), | 198 resync_attempted_(false), |
228 ephemeral_mount_attempted_(false), | 199 ephemeral_mount_attempted_(false), |
229 check_key_attempted_(false), | 200 check_key_attempted_(false), |
230 already_reported_success_(false), | 201 already_reported_success_(false), |
231 owner_is_verified_(false), | 202 owner_is_verified_(false), |
232 user_can_login_(false), | 203 user_can_login_(false), |
233 remove_user_data_on_failure_(false), | 204 remove_user_data_on_failure_(false), |
234 delayed_login_failure_(NULL) { | 205 delayed_login_failure_(NULL) { |
235 } | 206 } |
236 | 207 |
237 void ParallelAuthenticator::AuthenticateToLogin( | 208 void CryptohomeAuthenticator::AuthenticateToLogin( |
238 Profile* profile, | 209 Profile* profile, |
239 const UserContext& user_context) { | 210 const UserContext& user_context) { |
240 authentication_profile_ = profile; | 211 authentication_profile_ = profile; |
241 current_state_.reset( | 212 current_state_.reset(new AuthAttemptState(user_context, |
242 new AuthAttemptState(user_context, | 213 user_manager::USER_TYPE_REGULAR, |
243 user_manager::USER_TYPE_REGULAR, | 214 false, // unlock |
244 false, // unlock | 215 false, // online_complete |
245 false, // online_complete | 216 !IsKnownUser(user_context))); |
246 !user_manager::UserManager::Get()->IsKnownUser( | |
247 user_context.GetUserID()))); | |
248 // Reset the verified flag. | 217 // Reset the verified flag. |
249 owner_is_verified_ = false; | 218 owner_is_verified_ = false; |
250 | 219 |
251 SystemSaltGetter::Get()->GetSystemSalt( | 220 SystemSaltGetter::Get()->GetSystemSalt( |
252 base::Bind(&Mount, | 221 base::Bind(&Mount, |
253 current_state_.get(), | 222 current_state_.get(), |
254 scoped_refptr<ParallelAuthenticator>(this), | 223 scoped_refptr<CryptohomeAuthenticator>(this), |
255 cryptohome::MOUNT_FLAGS_NONE)); | 224 cryptohome::MOUNT_FLAGS_NONE)); |
256 } | 225 } |
257 | 226 |
258 void ParallelAuthenticator::CompleteLogin(Profile* profile, | 227 void CryptohomeAuthenticator::CompleteLogin(Profile* profile, |
259 const UserContext& user_context) { | 228 const UserContext& user_context) { |
260 authentication_profile_ = profile; | 229 authentication_profile_ = profile; |
261 current_state_.reset( | 230 current_state_.reset(new AuthAttemptState(user_context, |
262 new AuthAttemptState(user_context, | 231 user_manager::USER_TYPE_REGULAR, |
263 user_manager::USER_TYPE_REGULAR, | 232 true, // unlock |
264 true, // unlock | 233 false, // online_complete |
265 false, // online_complete | 234 !IsKnownUser(user_context))); |
266 !user_manager::UserManager::Get()->IsKnownUser( | |
267 user_context.GetUserID()))); | |
268 | 235 |
269 // Reset the verified flag. | 236 // Reset the verified flag. |
270 owner_is_verified_ = false; | 237 owner_is_verified_ = false; |
271 | 238 |
272 SystemSaltGetter::Get()->GetSystemSalt( | 239 SystemSaltGetter::Get()->GetSystemSalt( |
273 base::Bind(&Mount, | 240 base::Bind(&Mount, |
274 current_state_.get(), | 241 current_state_.get(), |
275 scoped_refptr<ParallelAuthenticator>(this), | 242 scoped_refptr<CryptohomeAuthenticator>(this), |
276 cryptohome::MOUNT_FLAGS_NONE)); | 243 cryptohome::MOUNT_FLAGS_NONE)); |
277 | 244 |
278 // For login completion from extension, we just need to resolve the current | 245 // For login completion from extension, we just need to resolve the current |
279 // auth attempt state, the rest of OAuth related tasks will be done in | 246 // auth attempt state, the rest of OAuth related tasks will be done in |
280 // parallel. | 247 // parallel. |
281 BrowserThread::PostTask( | 248 task_runner_->PostTask( |
282 BrowserThread::UI, FROM_HERE, | 249 FROM_HERE, |
283 base::Bind(&ParallelAuthenticator::ResolveLoginCompletionStatus, this)); | 250 base::Bind(&CryptohomeAuthenticator::ResolveLoginCompletionStatus, this)); |
284 } | 251 } |
285 | 252 |
286 void ParallelAuthenticator::AuthenticateToUnlock( | 253 void CryptohomeAuthenticator::AuthenticateToUnlock( |
287 const UserContext& user_context) { | 254 const UserContext& user_context) { |
288 current_state_.reset(new AuthAttemptState(user_context, | 255 current_state_.reset(new AuthAttemptState(user_context, |
289 user_manager::USER_TYPE_REGULAR, | 256 user_manager::USER_TYPE_REGULAR, |
290 true, // unlock | 257 true, // unlock |
291 true, // online_complete | 258 true, // online_complete |
292 false)); // user_is_new | 259 false)); // user_is_new |
293 remove_user_data_on_failure_ = false; | 260 remove_user_data_on_failure_ = false; |
294 check_key_attempted_ = true; | 261 check_key_attempted_ = true; |
295 SystemSaltGetter::Get()->GetSystemSalt( | 262 SystemSaltGetter::Get()->GetSystemSalt( |
296 base::Bind(&CheckKey, | 263 base::Bind(&CheckKey, |
297 current_state_.get(), | 264 current_state_.get(), |
298 scoped_refptr<ParallelAuthenticator>(this))); | 265 scoped_refptr<CryptohomeAuthenticator>(this))); |
299 } | 266 } |
300 | 267 |
301 void ParallelAuthenticator::LoginAsSupervisedUser( | 268 void CryptohomeAuthenticator::LoginAsSupervisedUser( |
302 const UserContext& user_context) { | 269 const UserContext& user_context) { |
303 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 270 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
304 // TODO(nkostylev): Pass proper value for |user_is_new| or remove (not used). | 271 // TODO(nkostylev): Pass proper value for |user_is_new| or remove (not used). |
305 current_state_.reset( | 272 current_state_.reset(new AuthAttemptState(user_context, |
306 new AuthAttemptState(user_context, | 273 user_manager::USER_TYPE_SUPERVISED, |
307 user_manager::USER_TYPE_SUPERVISED, | 274 false, // unlock |
308 false, // unlock | 275 false, // online_complete |
309 false, // online_complete | 276 false)); // user_is_new |
310 false)); // user_is_new | |
311 remove_user_data_on_failure_ = false; | 277 remove_user_data_on_failure_ = false; |
312 SystemSaltGetter::Get()->GetSystemSalt( | 278 SystemSaltGetter::Get()->GetSystemSalt( |
313 base::Bind(&Mount, | 279 base::Bind(&Mount, |
314 current_state_.get(), | 280 current_state_.get(), |
315 scoped_refptr<ParallelAuthenticator>(this), | 281 scoped_refptr<CryptohomeAuthenticator>(this), |
316 cryptohome::MOUNT_FLAGS_NONE)); | 282 cryptohome::MOUNT_FLAGS_NONE)); |
317 } | 283 } |
318 | 284 |
319 void ParallelAuthenticator::LoginRetailMode() { | 285 void CryptohomeAuthenticator::LoginRetailMode() { |
320 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 286 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
321 // Note: |kRetailModeUserEMail| is used in other places to identify a retail | 287 // Note: |kRetailModeUserEMail| is used in other places to identify a retail |
322 // mode session. | 288 // mode session. |
323 current_state_.reset( | 289 current_state_.reset( |
324 new AuthAttemptState(UserContext(chromeos::login::kRetailModeUserName), | 290 new AuthAttemptState(UserContext(chromeos::login::kRetailModeUserName), |
325 user_manager::USER_TYPE_RETAIL_MODE, | 291 user_manager::USER_TYPE_RETAIL_MODE, |
326 false, // unlock | 292 false, // unlock |
327 false, // online_complete | 293 false, // online_complete |
328 false)); // user_is_new | 294 false)); // user_is_new |
329 remove_user_data_on_failure_ = false; | 295 remove_user_data_on_failure_ = false; |
330 ephemeral_mount_attempted_ = true; | 296 ephemeral_mount_attempted_ = true; |
331 MountGuestAndGetHash(current_state_.get(), | 297 MountGuestAndGetHash(current_state_.get(), |
332 scoped_refptr<ParallelAuthenticator>(this)); | 298 scoped_refptr<CryptohomeAuthenticator>(this)); |
333 } | 299 } |
334 | 300 |
335 void ParallelAuthenticator::LoginOffTheRecord() { | 301 void CryptohomeAuthenticator::LoginOffTheRecord() { |
336 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 302 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
337 current_state_.reset( | 303 current_state_.reset( |
338 new AuthAttemptState(UserContext(chromeos::login::kGuestUserName), | 304 new AuthAttemptState(UserContext(chromeos::login::kGuestUserName), |
339 user_manager::USER_TYPE_GUEST, | 305 user_manager::USER_TYPE_GUEST, |
340 false, // unlock | 306 false, // unlock |
341 false, // online_complete | 307 false, // online_complete |
342 false)); // user_is_new | 308 false)); // user_is_new |
343 remove_user_data_on_failure_ = false; | 309 remove_user_data_on_failure_ = false; |
344 ephemeral_mount_attempted_ = true; | 310 ephemeral_mount_attempted_ = true; |
345 MountGuest(current_state_.get(), | 311 MountGuestAndGetHash(current_state_.get(), |
346 scoped_refptr<ParallelAuthenticator>(this)); | 312 scoped_refptr<CryptohomeAuthenticator>(this)); |
347 } | 313 } |
348 | 314 |
349 void ParallelAuthenticator::LoginAsPublicSession( | 315 void CryptohomeAuthenticator::LoginAsPublicSession( |
350 const UserContext& user_context) { | 316 const UserContext& user_context) { |
351 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 317 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
352 current_state_.reset( | 318 current_state_.reset( |
353 new AuthAttemptState(user_context, | 319 new AuthAttemptState(user_context, |
354 user_manager::USER_TYPE_PUBLIC_ACCOUNT, | 320 user_manager::USER_TYPE_PUBLIC_ACCOUNT, |
355 false, // unlock | 321 false, // unlock |
356 false, // online_complete | 322 false, // online_complete |
357 false)); // user_is_new | 323 false)); // user_is_new |
358 remove_user_data_on_failure_ = false; | 324 remove_user_data_on_failure_ = false; |
359 ephemeral_mount_attempted_ = true; | 325 ephemeral_mount_attempted_ = true; |
360 SystemSaltGetter::Get()->GetSystemSalt( | 326 SystemSaltGetter::Get()->GetSystemSalt( |
361 base::Bind(&Mount, | 327 base::Bind(&Mount, |
362 current_state_.get(), | 328 current_state_.get(), |
363 scoped_refptr<ParallelAuthenticator>(this), | 329 scoped_refptr<CryptohomeAuthenticator>(this), |
364 cryptohome::CREATE_IF_MISSING | cryptohome::ENSURE_EPHEMERAL)); | 330 cryptohome::CREATE_IF_MISSING | cryptohome::ENSURE_EPHEMERAL)); |
365 } | 331 } |
366 | 332 |
367 void ParallelAuthenticator::LoginAsKioskAccount( | 333 void CryptohomeAuthenticator::LoginAsKioskAccount( |
368 const std::string& app_user_id, | 334 const std::string& app_user_id, |
369 bool use_guest_mount) { | 335 bool use_guest_mount) { |
370 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 336 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
371 | 337 |
372 const std::string user_id = | 338 const std::string user_id = |
373 use_guest_mount ? chromeos::login::kGuestUserName : app_user_id; | 339 use_guest_mount ? chromeos::login::kGuestUserName : app_user_id; |
374 current_state_.reset(new AuthAttemptState(UserContext(user_id), | 340 current_state_.reset(new AuthAttemptState(UserContext(user_id), |
375 user_manager::USER_TYPE_KIOSK_APP, | 341 user_manager::USER_TYPE_KIOSK_APP, |
376 false, // unlock | 342 false, // unlock |
377 false, // online_complete | 343 false, // online_complete |
378 false)); // user_is_new | 344 false)); // user_is_new |
379 | 345 |
380 remove_user_data_on_failure_ = true; | 346 remove_user_data_on_failure_ = true; |
381 if (!use_guest_mount) { | 347 if (!use_guest_mount) { |
382 MountPublic(current_state_.get(), | 348 MountPublic(current_state_.get(), |
383 scoped_refptr<ParallelAuthenticator>(this), | 349 scoped_refptr<CryptohomeAuthenticator>(this), |
384 cryptohome::CREATE_IF_MISSING); | 350 cryptohome::CREATE_IF_MISSING); |
385 } else { | 351 } else { |
386 ephemeral_mount_attempted_ = true; | 352 ephemeral_mount_attempted_ = true; |
387 MountGuestAndGetHash(current_state_.get(), | 353 MountGuestAndGetHash(current_state_.get(), |
388 scoped_refptr<ParallelAuthenticator>(this)); | 354 scoped_refptr<CryptohomeAuthenticator>(this)); |
389 } | 355 } |
390 } | 356 } |
391 | 357 |
392 void ParallelAuthenticator::OnRetailModeAuthSuccess() { | 358 void CryptohomeAuthenticator::OnRetailModeAuthSuccess() { |
393 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 359 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
394 VLOG(1) << "Retail mode login success"; | 360 VLOG(1) << "Retail mode login success"; |
395 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); | 361 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); |
396 if (consumer_) | 362 if (consumer_) |
397 consumer_->OnRetailModeAuthSuccess(current_state_->user_context); | 363 consumer_->OnRetailModeAuthSuccess(current_state_->user_context); |
398 } | 364 } |
399 | 365 |
400 void ParallelAuthenticator::OnAuthSuccess() { | 366 void CryptohomeAuthenticator::OnAuthSuccess() { |
401 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 367 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
402 VLOG(1) << "Login success"; | 368 VLOG(1) << "Login success"; |
403 // Send notification of success | 369 // Send notification of success |
404 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); | 370 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); |
405 { | 371 { |
406 base::AutoLock for_this_block(success_lock_); | 372 base::AutoLock for_this_block(success_lock_); |
407 already_reported_success_ = true; | 373 already_reported_success_ = true; |
408 } | 374 } |
409 if (consumer_) | 375 if (consumer_) |
410 consumer_->OnAuthSuccess(current_state_->user_context); | 376 consumer_->OnAuthSuccess(current_state_->user_context); |
411 } | 377 } |
412 | 378 |
413 void ParallelAuthenticator::OnOffTheRecordAuthSuccess() { | 379 void CryptohomeAuthenticator::OnOffTheRecordAuthSuccess() { |
414 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 380 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
415 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); | 381 chromeos::LoginEventRecorder::Get()->RecordAuthenticationSuccess(); |
416 if (consumer_) | 382 if (consumer_) |
417 consumer_->OnOffTheRecordAuthSuccess(); | 383 consumer_->OnOffTheRecordAuthSuccess(); |
418 } | 384 } |
419 | 385 |
420 void ParallelAuthenticator::OnPasswordChangeDetected() { | 386 void CryptohomeAuthenticator::OnPasswordChangeDetected() { |
421 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 387 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
422 if (consumer_) | 388 if (consumer_) |
423 consumer_->OnPasswordChangeDetected(); | 389 consumer_->OnPasswordChangeDetected(); |
424 } | 390 } |
425 | 391 |
426 void ParallelAuthenticator::OnAuthFailure(const AuthFailure& error) { | 392 void CryptohomeAuthenticator::OnAuthFailure(const AuthFailure& error) { |
427 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 393 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
428 | 394 |
429 // OnAuthFailure will be called again with the same |error| | 395 // OnAuthFailure will be called again with the same |error| |
430 // after the cryptohome has been removed. | 396 // after the cryptohome has been removed. |
431 if (remove_user_data_on_failure_) { | 397 if (remove_user_data_on_failure_) { |
432 delayed_login_failure_ = &error; | 398 delayed_login_failure_ = &error; |
433 RemoveEncryptedData(); | 399 RemoveEncryptedData(); |
434 return; | 400 return; |
435 } | 401 } |
436 chromeos::LoginEventRecorder::Get()->RecordAuthenticationFailure(); | 402 chromeos::LoginEventRecorder::Get()->RecordAuthenticationFailure(); |
437 LOG(WARNING) << "Login failed: " << error.GetErrorString(); | 403 LOG(WARNING) << "Login failed: " << error.GetErrorString(); |
438 if (consumer_) | 404 if (consumer_) |
439 consumer_->OnAuthFailure(error); | 405 consumer_->OnAuthFailure(error); |
440 } | 406 } |
441 | 407 |
442 void ParallelAuthenticator::RecoverEncryptedData( | 408 void CryptohomeAuthenticator::RecoverEncryptedData( |
443 const std::string& old_password) { | 409 const std::string& old_password) { |
444 migrate_attempted_ = true; | 410 migrate_attempted_ = true; |
445 current_state_->ResetCryptohomeStatus(); | 411 current_state_->ResetCryptohomeStatus(); |
446 SystemSaltGetter::Get()->GetSystemSalt( | 412 SystemSaltGetter::Get()->GetSystemSalt( |
447 base::Bind(&Migrate, | 413 base::Bind(&Migrate, |
448 current_state_.get(), | 414 current_state_.get(), |
449 scoped_refptr<ParallelAuthenticator>(this), | 415 scoped_refptr<CryptohomeAuthenticator>(this), |
450 true, | 416 true, |
451 old_password)); | 417 old_password)); |
452 } | 418 } |
453 | 419 |
454 void ParallelAuthenticator::RemoveEncryptedData() { | 420 void CryptohomeAuthenticator::RemoveEncryptedData() { |
455 remove_attempted_ = true; | 421 remove_attempted_ = true; |
456 current_state_->ResetCryptohomeStatus(); | 422 current_state_->ResetCryptohomeStatus(); |
457 BrowserThread::PostTask( | 423 task_runner_->PostTask( |
458 BrowserThread::UI, FROM_HERE, | 424 FROM_HERE, |
459 base::Bind(&Remove, | 425 base::Bind(&Remove, |
460 current_state_.get(), | 426 current_state_.get(), |
461 scoped_refptr<ParallelAuthenticator>(this))); | 427 scoped_refptr<CryptohomeAuthenticator>(this))); |
462 } | 428 } |
463 | 429 |
464 void ParallelAuthenticator::ResyncEncryptedData() { | 430 void CryptohomeAuthenticator::ResyncEncryptedData() { |
465 resync_attempted_ = true; | 431 resync_attempted_ = true; |
466 current_state_->ResetCryptohomeStatus(); | 432 current_state_->ResetCryptohomeStatus(); |
467 BrowserThread::PostTask( | 433 task_runner_->PostTask( |
468 BrowserThread::UI, FROM_HERE, | 434 FROM_HERE, |
469 base::Bind(&Remove, | 435 base::Bind(&Remove, |
470 current_state_.get(), | 436 current_state_.get(), |
471 scoped_refptr<ParallelAuthenticator>(this))); | 437 scoped_refptr<CryptohomeAuthenticator>(this))); |
472 } | 438 } |
473 | 439 |
474 bool ParallelAuthenticator::VerifyOwner() { | 440 bool CryptohomeAuthenticator::VerifyOwner() { |
475 if (owner_is_verified_) | 441 if (owner_is_verified_) |
476 return true; | 442 return true; |
477 // Check if policy data is fine and continue in safe mode if needed. | 443 // Check if policy data is fine and continue in safe mode if needed. |
478 bool is_safe_mode = false; | 444 if (!IsSafeMode()) { |
479 CrosSettings::Get()->GetBoolean(kPolicyMissingMitigationMode, &is_safe_mode); | |
480 if (!is_safe_mode) { | |
481 // Now we can continue with the login and report mount success. | 445 // Now we can continue with the login and report mount success. |
482 user_can_login_ = true; | 446 user_can_login_ = true; |
483 owner_is_verified_ = true; | 447 owner_is_verified_ = true; |
484 return true; | 448 return true; |
485 } | 449 } |
486 | 450 |
487 const std::string& user_id = current_state_->user_context.GetUserID(); | 451 CheckSafeModeOwnership( |
488 | 452 current_state_->user_context, |
489 // |IsOwnerForSafeModeAsync| expects logged in state to be | 453 base::Bind(&CryptohomeAuthenticator::OnOwnershipChecked, this)); |
490 // LOGGED_IN_SAFE_MODE. | |
491 if (LoginState::IsInitialized()) { | |
492 LoginState::Get()->SetLoggedInState(LoginState::LOGGED_IN_SAFE_MODE, | |
493 LoginState::LOGGED_IN_USER_NONE); | |
494 } | |
495 | |
496 OwnerSettingsService::IsOwnerForSafeModeAsync( | |
497 user_id, | |
498 current_state_->user_context.GetUserIDHash(), | |
499 base::Bind(&ParallelAuthenticator::OnOwnershipChecked, this)); | |
500 return false; | 454 return false; |
501 } | 455 } |
502 | 456 |
503 void ParallelAuthenticator::OnOwnershipChecked(bool is_owner) { | 457 void CryptohomeAuthenticator::OnOwnershipChecked(bool is_owner) { |
504 // Now we can check if this user is the owner. | 458 // Now we can check if this user is the owner. |
505 user_can_login_ = is_owner; | 459 user_can_login_ = is_owner; |
506 owner_is_verified_ = true; | 460 owner_is_verified_ = true; |
507 Resolve(); | 461 Resolve(); |
508 } | 462 } |
509 | 463 |
510 void ParallelAuthenticator::Resolve() { | 464 void CryptohomeAuthenticator::Resolve() { |
511 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 465 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
512 int mount_flags = cryptohome::MOUNT_FLAGS_NONE; | 466 int mount_flags = cryptohome::MOUNT_FLAGS_NONE; |
513 ParallelAuthenticator::AuthState state = ResolveState(); | 467 CryptohomeAuthenticator::AuthState state = ResolveState(); |
514 VLOG(1) << "Resolved state to: " << state; | 468 VLOG(1) << "Resolved state to: " << state; |
515 switch (state) { | 469 switch (state) { |
516 case CONTINUE: | 470 case CONTINUE: |
517 case POSSIBLE_PW_CHANGE: | 471 case POSSIBLE_PW_CHANGE: |
518 case NO_MOUNT: | 472 case NO_MOUNT: |
519 // These are intermediate states; we need more info from a request that | 473 // These are intermediate states; we need more info from a request that |
520 // is still pending. | 474 // is still pending. |
521 break; | 475 break; |
522 case FAILED_MOUNT: | 476 case FAILED_MOUNT: |
523 // In this case, whether login succeeded or not, we can't log | 477 // In this case, whether login succeeded or not, we can't log |
524 // the user in because their data is horked. So, override with | 478 // the user in because their data is horked. So, override with |
525 // the appropriate failure. | 479 // the appropriate failure. |
526 BrowserThread::PostTask( | 480 task_runner_->PostTask( |
527 BrowserThread::UI, | |
528 FROM_HERE, | 481 FROM_HERE, |
529 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 482 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
530 this, | 483 this, |
531 AuthFailure(AuthFailure::COULD_NOT_MOUNT_CRYPTOHOME))); | 484 AuthFailure(AuthFailure::COULD_NOT_MOUNT_CRYPTOHOME))); |
532 break; | 485 break; |
533 case FAILED_REMOVE: | 486 case FAILED_REMOVE: |
534 // In this case, we tried to remove the user's old cryptohome at her | 487 // In this case, we tried to remove the user's old cryptohome at her |
535 // request, and the remove failed. | 488 // request, and the remove failed. |
536 remove_user_data_on_failure_ = false; | 489 remove_user_data_on_failure_ = false; |
537 BrowserThread::PostTask( | 490 task_runner_->PostTask( |
538 BrowserThread::UI, | |
539 FROM_HERE, | 491 FROM_HERE, |
540 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 492 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
541 this, | 493 this, |
542 AuthFailure(AuthFailure::DATA_REMOVAL_FAILED))); | 494 AuthFailure(AuthFailure::DATA_REMOVAL_FAILED))); |
543 break; | 495 break; |
544 case FAILED_TMPFS: | 496 case FAILED_TMPFS: |
545 // In this case, we tried to mount a tmpfs for guest and failed. | 497 // In this case, we tried to mount a tmpfs for guest and failed. |
546 BrowserThread::PostTask( | 498 task_runner_->PostTask( |
547 BrowserThread::UI, | |
548 FROM_HERE, | 499 FROM_HERE, |
549 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 500 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
550 this, | 501 this, |
551 AuthFailure(AuthFailure::COULD_NOT_MOUNT_TMPFS))); | 502 AuthFailure(AuthFailure::COULD_NOT_MOUNT_TMPFS))); |
552 break; | 503 break; |
553 case FAILED_TPM: | 504 case FAILED_TPM: |
554 // In this case, we tried to create/mount cryptohome and failed | 505 // In this case, we tried to create/mount cryptohome and failed |
555 // because of the critical TPM error. | 506 // because of the critical TPM error. |
556 // Chrome will notify user and request reboot. | 507 // Chrome will notify user and request reboot. |
557 BrowserThread::PostTask(BrowserThread::UI, | 508 task_runner_->PostTask(FROM_HERE, |
558 FROM_HERE, | 509 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
559 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 510 this, |
560 this, | 511 AuthFailure(AuthFailure::TPM_ERROR))); |
561 AuthFailure(AuthFailure::TPM_ERROR))); | |
562 break; | 512 break; |
563 case FAILED_USERNAME_HASH: | 513 case FAILED_USERNAME_HASH: |
564 // In this case, we failed the GetSanitizedUsername request to | 514 // In this case, we failed the GetSanitizedUsername request to |
565 // cryptohomed. This can happen for any login attempt. | 515 // cryptohomed. This can happen for any login attempt. |
566 BrowserThread::PostTask( | 516 task_runner_->PostTask( |
567 BrowserThread::UI, | |
568 FROM_HERE, | 517 FROM_HERE, |
569 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 518 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
570 this, | 519 this, |
571 AuthFailure(AuthFailure::USERNAME_HASH_FAILED))); | 520 AuthFailure(AuthFailure::USERNAME_HASH_FAILED))); |
572 break; | 521 break; |
573 case REMOVED_DATA_AFTER_FAILURE: | 522 case REMOVED_DATA_AFTER_FAILURE: |
574 remove_user_data_on_failure_ = false; | 523 remove_user_data_on_failure_ = false; |
575 BrowserThread::PostTask(BrowserThread::UI, | 524 task_runner_->PostTask(FROM_HERE, |
576 FROM_HERE, | 525 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
577 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 526 this, |
578 this, | 527 *delayed_login_failure_)); |
579 *delayed_login_failure_)); | |
580 break; | 528 break; |
581 case CREATE_NEW: | 529 case CREATE_NEW: |
582 mount_flags |= cryptohome::CREATE_IF_MISSING; | 530 mount_flags |= cryptohome::CREATE_IF_MISSING; |
583 case RECOVER_MOUNT: | 531 case RECOVER_MOUNT: |
584 current_state_->ResetCryptohomeStatus(); | 532 current_state_->ResetCryptohomeStatus(); |
585 SystemSaltGetter::Get()->GetSystemSalt( | 533 SystemSaltGetter::Get()->GetSystemSalt( |
586 base::Bind(&Mount, | 534 base::Bind(&Mount, |
587 current_state_.get(), | 535 current_state_.get(), |
588 scoped_refptr<ParallelAuthenticator>(this), | 536 scoped_refptr<CryptohomeAuthenticator>(this), |
589 mount_flags)); | 537 mount_flags)); |
590 break; | 538 break; |
591 case NEED_OLD_PW: | 539 case NEED_OLD_PW: |
592 BrowserThread::PostTask( | 540 task_runner_->PostTask( |
593 BrowserThread::UI, FROM_HERE, | 541 FROM_HERE, |
594 base::Bind(&ParallelAuthenticator::OnPasswordChangeDetected, this)); | 542 base::Bind(&CryptohomeAuthenticator::OnPasswordChangeDetected, this)); |
595 break; | 543 break; |
596 case ONLINE_FAILED: | 544 case ONLINE_FAILED: |
597 case NEED_NEW_PW: | 545 case NEED_NEW_PW: |
598 case HAVE_NEW_PW: | 546 case HAVE_NEW_PW: |
599 NOTREACHED() << "Using obsolete ClientLogin code path."; | 547 NOTREACHED() << "Using obsolete ClientLogin code path."; |
600 break; | 548 break; |
601 case OFFLINE_LOGIN: | 549 case OFFLINE_LOGIN: |
602 VLOG(2) << "Offline login"; | 550 VLOG(2) << "Offline login"; |
603 // Fall through. | 551 // Fall through. |
604 case UNLOCK: | 552 case UNLOCK: |
605 VLOG(2) << "Unlock"; | 553 VLOG(2) << "Unlock"; |
606 // Fall through. | 554 // Fall through. |
607 case ONLINE_LOGIN: | 555 case ONLINE_LOGIN: |
608 VLOG(2) << "Online login"; | 556 VLOG(2) << "Online login"; |
609 BrowserThread::PostTask( | 557 task_runner_->PostTask( |
610 BrowserThread::UI, | 558 FROM_HERE, base::Bind(&CryptohomeAuthenticator::OnAuthSuccess, this)); |
611 FROM_HERE, | |
612 base::Bind(&ParallelAuthenticator::OnAuthSuccess, this)); | |
613 break; | 559 break; |
614 case DEMO_LOGIN: | 560 case DEMO_LOGIN: |
615 VLOG(2) << "Retail mode login"; | 561 VLOG(2) << "Retail mode login"; |
616 current_state_->user_context.SetIsUsingOAuth(false); | 562 current_state_->user_context.SetIsUsingOAuth(false); |
617 BrowserThread::PostTask( | 563 task_runner_->PostTask( |
618 BrowserThread::UI, | |
619 FROM_HERE, | 564 FROM_HERE, |
620 base::Bind(&ParallelAuthenticator::OnRetailModeAuthSuccess, this)); | 565 base::Bind(&CryptohomeAuthenticator::OnRetailModeAuthSuccess, this)); |
621 break; | 566 break; |
622 case GUEST_LOGIN: | 567 case GUEST_LOGIN: |
623 BrowserThread::PostTask( | 568 task_runner_->PostTask( |
624 BrowserThread::UI, | |
625 FROM_HERE, | 569 FROM_HERE, |
626 base::Bind(&ParallelAuthenticator::OnOffTheRecordAuthSuccess, this)); | 570 base::Bind(&CryptohomeAuthenticator::OnOffTheRecordAuthSuccess, |
| 571 this)); |
627 break; | 572 break; |
628 case KIOSK_ACCOUNT_LOGIN: | 573 case KIOSK_ACCOUNT_LOGIN: |
629 case PUBLIC_ACCOUNT_LOGIN: | 574 case PUBLIC_ACCOUNT_LOGIN: |
630 current_state_->user_context.SetIsUsingOAuth(false); | 575 current_state_->user_context.SetIsUsingOAuth(false); |
631 BrowserThread::PostTask( | 576 task_runner_->PostTask( |
632 BrowserThread::UI, | 577 FROM_HERE, base::Bind(&CryptohomeAuthenticator::OnAuthSuccess, this)); |
633 FROM_HERE, | |
634 base::Bind(&ParallelAuthenticator::OnAuthSuccess, this)); | |
635 break; | 578 break; |
636 case SUPERVISED_USER_LOGIN: | 579 case SUPERVISED_USER_LOGIN: |
637 current_state_->user_context.SetIsUsingOAuth(false); | 580 current_state_->user_context.SetIsUsingOAuth(false); |
638 BrowserThread::PostTask( | 581 task_runner_->PostTask( |
639 BrowserThread::UI, | 582 FROM_HERE, base::Bind(&CryptohomeAuthenticator::OnAuthSuccess, this)); |
640 FROM_HERE, | |
641 base::Bind(&ParallelAuthenticator::OnAuthSuccess, this)); | |
642 break; | 583 break; |
643 case LOGIN_FAILED: | 584 case LOGIN_FAILED: |
644 current_state_->ResetCryptohomeStatus(); | 585 current_state_->ResetCryptohomeStatus(); |
645 BrowserThread::PostTask(BrowserThread::UI, | 586 task_runner_->PostTask(FROM_HERE, |
646 FROM_HERE, | 587 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
647 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 588 this, |
648 this, | 589 current_state_->online_outcome())); |
649 current_state_->online_outcome())); | |
650 break; | 590 break; |
651 case OWNER_REQUIRED: { | 591 case OWNER_REQUIRED: { |
652 current_state_->ResetCryptohomeStatus(); | 592 current_state_->ResetCryptohomeStatus(); |
653 bool success = false; | 593 bool success = false; |
654 DBusThreadManager::Get()->GetCryptohomeClient()->Unmount(&success); | 594 DBusThreadManager::Get()->GetCryptohomeClient()->Unmount(&success); |
655 if (!success) { | 595 if (!success) { |
656 // Maybe we should reboot immediately here? | 596 // Maybe we should reboot immediately here? |
657 LOG(ERROR) << "Couldn't unmount users home!"; | 597 LOG(ERROR) << "Couldn't unmount users home!"; |
658 } | 598 } |
659 BrowserThread::PostTask( | 599 task_runner_->PostTask( |
660 BrowserThread::UI, | |
661 FROM_HERE, | 600 FROM_HERE, |
662 base::Bind(&ParallelAuthenticator::OnAuthFailure, | 601 base::Bind(&CryptohomeAuthenticator::OnAuthFailure, |
663 this, | 602 this, |
664 AuthFailure(AuthFailure::OWNER_REQUIRED))); | 603 AuthFailure(AuthFailure::OWNER_REQUIRED))); |
665 break; | 604 break; |
666 } | 605 } |
667 default: | 606 default: |
668 NOTREACHED(); | 607 NOTREACHED(); |
669 break; | 608 break; |
670 } | 609 } |
671 } | 610 } |
672 | 611 |
673 ParallelAuthenticator::~ParallelAuthenticator() {} | 612 CryptohomeAuthenticator::~CryptohomeAuthenticator() { |
| 613 } |
674 | 614 |
675 ParallelAuthenticator::AuthState ParallelAuthenticator::ResolveState() { | 615 CryptohomeAuthenticator::AuthState CryptohomeAuthenticator::ResolveState() { |
676 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 616 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
677 // If we haven't mounted the user's home dir yet or | 617 // If we haven't mounted the user's home dir yet or |
678 // haven't got sanitized username value, we can't be done. | 618 // haven't got sanitized username value, we can't be done. |
679 // We never get past here if any of these two cryptohome ops is still pending. | 619 // We never get past here if any of these two cryptohome ops is still pending. |
680 // This is an important invariant. | 620 // This is an important invariant. |
681 if (!current_state_->cryptohome_complete() || | 621 if (!current_state_->cryptohome_complete() || |
682 !current_state_->username_hash_obtained()) { | 622 !current_state_->username_hash_obtained()) { |
683 return CONTINUE; | 623 return CONTINUE; |
684 } | 624 } |
685 | 625 |
686 AuthState state = CONTINUE; | 626 AuthState state = CONTINUE; |
687 | 627 |
688 if (current_state_->cryptohome_outcome() && | 628 if (current_state_->cryptohome_outcome() && |
689 current_state_->username_hash_valid()) { | 629 current_state_->username_hash_valid()) { |
690 state = ResolveCryptohomeSuccessState(); | 630 state = ResolveCryptohomeSuccessState(); |
691 } else { | 631 } else { |
692 state = ResolveCryptohomeFailureState(); | 632 state = ResolveCryptohomeFailureState(); |
693 } | 633 } |
694 | 634 |
695 DCHECK(current_state_->cryptohome_complete()); // Ensure invariant holds. | 635 DCHECK(current_state_->cryptohome_complete()); // Ensure invariant holds. |
696 migrate_attempted_ = false; | 636 migrate_attempted_ = false; |
697 remove_attempted_ = false; | 637 remove_attempted_ = false; |
698 resync_attempted_ = false; | 638 resync_attempted_ = false; |
699 ephemeral_mount_attempted_ = false; | 639 ephemeral_mount_attempted_ = false; |
700 check_key_attempted_ = false; | 640 check_key_attempted_ = false; |
701 | 641 |
702 if (state != POSSIBLE_PW_CHANGE && | 642 if (state != POSSIBLE_PW_CHANGE && state != NO_MOUNT && |
703 state != NO_MOUNT && | |
704 state != OFFLINE_LOGIN) | 643 state != OFFLINE_LOGIN) |
705 return state; | 644 return state; |
706 | 645 |
707 if (current_state_->online_complete()) { | 646 if (current_state_->online_complete()) { |
708 if (current_state_->online_outcome().reason() == AuthFailure::NONE) { | 647 if (current_state_->online_outcome().reason() == AuthFailure::NONE) { |
709 // Online attempt succeeded as well, so combine the results. | 648 // Online attempt succeeded as well, so combine the results. |
710 return ResolveOnlineSuccessState(state); | 649 return ResolveOnlineSuccessState(state); |
711 } | 650 } |
712 NOTREACHED() << "Using obsolete ClientLogin code path."; | 651 NOTREACHED() << "Using obsolete ClientLogin code path."; |
713 } | 652 } |
714 // if online isn't complete yet, just return the offline result. | 653 // if online isn't complete yet, just return the offline result. |
715 return state; | 654 return state; |
716 } | 655 } |
717 | 656 |
718 ParallelAuthenticator::AuthState | 657 CryptohomeAuthenticator::AuthState |
719 ParallelAuthenticator::ResolveCryptohomeFailureState() { | 658 CryptohomeAuthenticator::ResolveCryptohomeFailureState() { |
720 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 659 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
721 if (remove_attempted_ || resync_attempted_) | 660 if (remove_attempted_ || resync_attempted_) |
722 return FAILED_REMOVE; | 661 return FAILED_REMOVE; |
723 if (ephemeral_mount_attempted_) | 662 if (ephemeral_mount_attempted_) |
724 return FAILED_TMPFS; | 663 return FAILED_TMPFS; |
725 if (migrate_attempted_) | 664 if (migrate_attempted_) |
726 return NEED_OLD_PW; | 665 return NEED_OLD_PW; |
727 if (check_key_attempted_) | 666 if (check_key_attempted_) |
728 return LOGIN_FAILED; | 667 return LOGIN_FAILED; |
729 | 668 |
730 if (current_state_->cryptohome_code() == | 669 if (current_state_->cryptohome_code() == |
(...skipping 20 matching lines...) Expand all Loading... |
751 return NO_MOUNT; | 690 return NO_MOUNT; |
752 } | 691 } |
753 } | 692 } |
754 | 693 |
755 if (!current_state_->username_hash_valid()) | 694 if (!current_state_->username_hash_valid()) |
756 return FAILED_USERNAME_HASH; | 695 return FAILED_USERNAME_HASH; |
757 | 696 |
758 return FAILED_MOUNT; | 697 return FAILED_MOUNT; |
759 } | 698 } |
760 | 699 |
761 ParallelAuthenticator::AuthState | 700 CryptohomeAuthenticator::AuthState |
762 ParallelAuthenticator::ResolveCryptohomeSuccessState() { | 701 CryptohomeAuthenticator::ResolveCryptohomeSuccessState() { |
763 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 702 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
764 if (resync_attempted_) | 703 if (resync_attempted_) |
765 return CREATE_NEW; | 704 return CREATE_NEW; |
766 if (remove_attempted_) | 705 if (remove_attempted_) |
767 return REMOVED_DATA_AFTER_FAILURE; | 706 return REMOVED_DATA_AFTER_FAILURE; |
768 if (migrate_attempted_) | 707 if (migrate_attempted_) |
769 return RECOVER_MOUNT; | 708 return RECOVER_MOUNT; |
770 if (check_key_attempted_) | 709 if (check_key_attempted_) |
771 return UNLOCK; | 710 return UNLOCK; |
772 | 711 |
773 if (current_state_->user_type == user_manager::USER_TYPE_GUEST) | 712 if (current_state_->user_type == user_manager::USER_TYPE_GUEST) |
774 return GUEST_LOGIN; | 713 return GUEST_LOGIN; |
775 if (current_state_->user_type == user_manager::USER_TYPE_RETAIL_MODE) | 714 if (current_state_->user_type == user_manager::USER_TYPE_RETAIL_MODE) |
776 return DEMO_LOGIN; | 715 return DEMO_LOGIN; |
777 if (current_state_->user_type == user_manager::USER_TYPE_PUBLIC_ACCOUNT) | 716 if (current_state_->user_type == user_manager::USER_TYPE_PUBLIC_ACCOUNT) |
778 return PUBLIC_ACCOUNT_LOGIN; | 717 return PUBLIC_ACCOUNT_LOGIN; |
779 if (current_state_->user_type == user_manager::USER_TYPE_KIOSK_APP) | 718 if (current_state_->user_type == user_manager::USER_TYPE_KIOSK_APP) |
780 return KIOSK_ACCOUNT_LOGIN; | 719 return KIOSK_ACCOUNT_LOGIN; |
781 if (current_state_->user_type == user_manager::USER_TYPE_SUPERVISED) | 720 if (current_state_->user_type == user_manager::USER_TYPE_SUPERVISED) |
782 return SUPERVISED_USER_LOGIN; | 721 return SUPERVISED_USER_LOGIN; |
783 | 722 |
784 if (!VerifyOwner()) | 723 if (!VerifyOwner()) |
785 return CONTINUE; | 724 return CONTINUE; |
786 return user_can_login_ ? OFFLINE_LOGIN : OWNER_REQUIRED; | 725 return user_can_login_ ? OFFLINE_LOGIN : OWNER_REQUIRED; |
787 } | 726 } |
788 | 727 |
789 ParallelAuthenticator::AuthState | 728 CryptohomeAuthenticator::AuthState |
790 ParallelAuthenticator::ResolveOnlineSuccessState( | 729 CryptohomeAuthenticator::ResolveOnlineSuccessState( |
791 ParallelAuthenticator::AuthState offline_state) { | 730 CryptohomeAuthenticator::AuthState offline_state) { |
792 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 731 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
793 switch (offline_state) { | 732 switch (offline_state) { |
794 case POSSIBLE_PW_CHANGE: | 733 case POSSIBLE_PW_CHANGE: |
795 return NEED_OLD_PW; | 734 return NEED_OLD_PW; |
796 case NO_MOUNT: | 735 case NO_MOUNT: |
797 return CREATE_NEW; | 736 return CREATE_NEW; |
798 case OFFLINE_LOGIN: | 737 case OFFLINE_LOGIN: |
799 return ONLINE_LOGIN; | 738 return ONLINE_LOGIN; |
800 default: | 739 default: |
801 NOTREACHED(); | 740 NOTREACHED(); |
802 return offline_state; | 741 return offline_state; |
803 } | 742 } |
804 } | 743 } |
805 | 744 |
806 void ParallelAuthenticator::ResolveLoginCompletionStatus() { | 745 void CryptohomeAuthenticator::ResolveLoginCompletionStatus() { |
807 // Shortcut online state resolution process. | 746 // Shortcut online state resolution process. |
808 current_state_->RecordOnlineLoginStatus(AuthFailure::AuthFailureNone()); | 747 current_state_->RecordOnlineLoginStatus(AuthFailure::AuthFailureNone()); |
809 Resolve(); | 748 Resolve(); |
810 } | 749 } |
811 | 750 |
812 void ParallelAuthenticator::SetOwnerState(bool owner_check_finished, | 751 void CryptohomeAuthenticator::SetOwnerState(bool owner_check_finished, |
813 bool check_result) { | 752 bool check_result) { |
814 owner_is_verified_ = owner_check_finished; | 753 owner_is_verified_ = owner_check_finished; |
815 user_can_login_ = check_result; | 754 user_can_login_ = check_result; |
816 } | 755 } |
817 | 756 |
818 } // namespace chromeos | 757 } // namespace chromeos |
OLD | NEW |