| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/login/auth/login_performer.h" | |
| 6 | |
| 7 #include "base/bind.h" | |
| 8 #include "base/logging.h" | |
| 9 #include "base/message_loop/message_loop.h" | |
| 10 #include "base/metrics/histogram.h" | |
| 11 #include "base/prefs/pref_service.h" | |
| 12 #include "base/strings/utf_string_conversions.h" | |
| 13 #include "base/threading/thread_restrictions.h" | |
| 14 #include "chrome/browser/browser_process.h" | |
| 15 #include "chrome/browser/chrome_notification_types.h" | |
| 16 #include "chrome/browser/chromeos/boot_times_loader.h" | |
| 17 #include "chrome/browser/chromeos/login/login_utils.h" | |
| 18 #include "chrome/browser/chromeos/login/supervised/supervised_user_authenticatio
n.h" | |
| 19 #include "chrome/browser/chromeos/login/supervised/supervised_user_constants.h" | |
| 20 #include "chrome/browser/chromeos/login/supervised/supervised_user_login_flow.h" | |
| 21 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h" | |
| 22 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h" | |
| 23 #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h" | |
| 24 #include "chrome/browser/chromeos/policy/device_local_account_policy_service.h" | |
| 25 #include "chrome/browser/chromeos/profiles/profile_helper.h" | |
| 26 #include "chrome/browser/chromeos/settings/cros_settings.h" | |
| 27 #include "chrome/common/pref_names.h" | |
| 28 #include "chromeos/dbus/dbus_thread_manager.h" | |
| 29 #include "chromeos/dbus/session_manager_client.h" | |
| 30 #include "chromeos/login/user_names.h" | |
| 31 #include "chromeos/settings/cros_settings_names.h" | |
| 32 #include "components/user_manager/user_manager.h" | |
| 33 #include "content/public/browser/browser_thread.h" | |
| 34 #include "content/public/browser/notification_service.h" | |
| 35 #include "content/public/browser/notification_types.h" | |
| 36 #include "content/public/browser/user_metrics.h" | |
| 37 #include "google_apis/gaia/gaia_auth_util.h" | |
| 38 #include "net/cookies/cookie_monster.h" | |
| 39 #include "net/cookies/cookie_store.h" | |
| 40 #include "net/url_request/url_request_context.h" | |
| 41 #include "net/url_request/url_request_context_getter.h" | |
| 42 | |
| 43 using base::UserMetricsAction; | |
| 44 using content::BrowserThread; | |
| 45 | |
| 46 namespace chromeos { | |
| 47 | |
| 48 LoginPerformer::LoginPerformer(Delegate* delegate) | |
| 49 : online_attempt_host_(this), | |
| 50 last_login_failure_(AuthFailure::AuthFailureNone()), | |
| 51 delegate_(delegate), | |
| 52 password_changed_(false), | |
| 53 password_changed_callback_count_(0), | |
| 54 auth_mode_(AUTH_MODE_INTERNAL), | |
| 55 weak_factory_(this) { | |
| 56 } | |
| 57 | |
| 58 LoginPerformer::~LoginPerformer() { | |
| 59 DVLOG(1) << "Deleting LoginPerformer"; | |
| 60 if (authenticator_.get()) | |
| 61 authenticator_->SetConsumer(NULL); | |
| 62 if (extended_authenticator_.get()) | |
| 63 extended_authenticator_->SetConsumer(NULL); | |
| 64 } | |
| 65 | |
| 66 //////////////////////////////////////////////////////////////////////////////// | |
| 67 // LoginPerformer, AuthStatusConsumer implementation: | |
| 68 | |
| 69 void LoginPerformer::OnAuthFailure(const AuthFailure& failure) { | |
| 70 content::RecordAction(UserMetricsAction("Login_Failure")); | |
| 71 UMA_HISTOGRAM_ENUMERATION("Login.FailureReason", | |
| 72 failure.reason(), | |
| 73 AuthFailure::NUM_FAILURE_REASONS); | |
| 74 | |
| 75 DVLOG(1) << "failure.reason " << failure.reason(); | |
| 76 DVLOG(1) << "failure.error.state " << failure.error().state(); | |
| 77 | |
| 78 last_login_failure_ = failure; | |
| 79 if (delegate_) { | |
| 80 delegate_->OnAuthFailure(failure); | |
| 81 return; | |
| 82 } else { | |
| 83 // COULD_NOT_MOUNT_CRYPTOHOME, COULD_NOT_MOUNT_TMPFS: | |
| 84 // happens during offline auth only. | |
| 85 NOTREACHED(); | |
| 86 } | |
| 87 } | |
| 88 | |
| 89 void LoginPerformer::OnRetailModeAuthSuccess(const UserContext& user_context) { | |
| 90 content::RecordAction( | |
| 91 UserMetricsAction("Login_DemoUserLoginSuccess")); | |
| 92 AuthStatusConsumer::OnRetailModeAuthSuccess(user_context); | |
| 93 } | |
| 94 | |
| 95 void LoginPerformer::OnAuthSuccess(const UserContext& user_context) { | |
| 96 content::RecordAction(UserMetricsAction("Login_Success")); | |
| 97 VLOG(1) << "LoginSuccess hash: " << user_context.GetUserIDHash(); | |
| 98 DCHECK(delegate_); | |
| 99 // After delegate_->OnAuthSuccess(...) is called, delegate_ releases | |
| 100 // LoginPerformer ownership. LP now manages it's lifetime on its own. | |
| 101 base::MessageLoop::current()->DeleteSoon(FROM_HERE, this); | |
| 102 delegate_->OnAuthSuccess(user_context); | |
| 103 } | |
| 104 | |
| 105 void LoginPerformer::OnOffTheRecordAuthSuccess() { | |
| 106 content::RecordAction( | |
| 107 UserMetricsAction("Login_GuestLoginSuccess")); | |
| 108 | |
| 109 if (delegate_) | |
| 110 delegate_->OnOffTheRecordAuthSuccess(); | |
| 111 else | |
| 112 NOTREACHED(); | |
| 113 } | |
| 114 | |
| 115 void LoginPerformer::OnPasswordChangeDetected() { | |
| 116 password_changed_ = true; | |
| 117 password_changed_callback_count_++; | |
| 118 if (delegate_) { | |
| 119 delegate_->OnPasswordChangeDetected(); | |
| 120 } else { | |
| 121 NOTREACHED(); | |
| 122 } | |
| 123 } | |
| 124 | |
| 125 void LoginPerformer::OnChecked(const std::string& username, bool success) { | |
| 126 if (!delegate_) { | |
| 127 // Delegate is reset in case of successful offline login. | |
| 128 // See ExistingUserConstoller::OnAuthSuccess(). | |
| 129 // Case when user has changed password and enters old password | |
| 130 // does not block user from sign in yet. | |
| 131 return; | |
| 132 } | |
| 133 delegate_->OnOnlineChecked(username, success); | |
| 134 } | |
| 135 | |
| 136 //////////////////////////////////////////////////////////////////////////////// | |
| 137 // LoginPerformer, public: | |
| 138 | |
| 139 void LoginPerformer::PerformLogin(const UserContext& user_context, | |
| 140 AuthorizationMode auth_mode) { | |
| 141 auth_mode_ = auth_mode; | |
| 142 user_context_ = user_context; | |
| 143 | |
| 144 CrosSettings* cros_settings = CrosSettings::Get(); | |
| 145 | |
| 146 // Whitelist check is always performed during initial login. | |
| 147 CrosSettingsProvider::TrustedStatus status = | |
| 148 cros_settings->PrepareTrustedValues( | |
| 149 base::Bind(&LoginPerformer::PerformLogin, | |
| 150 weak_factory_.GetWeakPtr(), | |
| 151 user_context_, auth_mode)); | |
| 152 // Must not proceed without signature verification. | |
| 153 if (status == CrosSettingsProvider::PERMANENTLY_UNTRUSTED) { | |
| 154 if (delegate_) | |
| 155 delegate_->PolicyLoadFailed(); | |
| 156 else | |
| 157 NOTREACHED(); | |
| 158 return; | |
| 159 } else if (status != CrosSettingsProvider::TRUSTED) { | |
| 160 // Value of AllowNewUser setting is still not verified. | |
| 161 // Another attempt will be invoked after verification completion. | |
| 162 return; | |
| 163 } | |
| 164 | |
| 165 bool wildcard_match = false; | |
| 166 std::string email = gaia::CanonicalizeEmail(user_context.GetUserID()); | |
| 167 bool is_whitelisted = LoginUtils::IsWhitelisted(email, &wildcard_match); | |
| 168 if (is_whitelisted) { | |
| 169 switch (auth_mode_) { | |
| 170 case AUTH_MODE_EXTENSION: { | |
| 171 // On enterprise devices, reconfirm login permission with the server. | |
| 172 policy::BrowserPolicyConnectorChromeOS* connector = | |
| 173 g_browser_process->platform_part() | |
| 174 ->browser_policy_connector_chromeos(); | |
| 175 if (connector->IsEnterpriseManaged() && wildcard_match && | |
| 176 !connector->IsNonEnterpriseUser(email)) { | |
| 177 wildcard_login_checker_.reset(new policy::WildcardLoginChecker()); | |
| 178 wildcard_login_checker_->Start( | |
| 179 ProfileHelper::GetSigninProfile()->GetRequestContext(), | |
| 180 base::Bind(&LoginPerformer::OnlineWildcardLoginCheckCompleted, | |
| 181 weak_factory_.GetWeakPtr())); | |
| 182 } else { | |
| 183 StartLoginCompletion(); | |
| 184 } | |
| 185 break; | |
| 186 } | |
| 187 case AUTH_MODE_INTERNAL: | |
| 188 StartAuthentication(); | |
| 189 break; | |
| 190 } | |
| 191 } else { | |
| 192 if (delegate_) | |
| 193 delegate_->WhiteListCheckFailed(user_context.GetUserID()); | |
| 194 else | |
| 195 NOTREACHED(); | |
| 196 } | |
| 197 } | |
| 198 | |
| 199 void LoginPerformer::LoginAsSupervisedUser( | |
| 200 const UserContext& user_context) { | |
| 201 DCHECK_EQ(chromeos::login::kSupervisedUserDomain, | |
| 202 gaia::ExtractDomainName(user_context.GetUserID())); | |
| 203 | |
| 204 CrosSettings* cros_settings = CrosSettings::Get(); | |
| 205 CrosSettingsProvider::TrustedStatus status = | |
| 206 cros_settings->PrepareTrustedValues( | |
| 207 base::Bind(&LoginPerformer::LoginAsSupervisedUser, | |
| 208 weak_factory_.GetWeakPtr(), | |
| 209 user_context_)); | |
| 210 // Must not proceed without signature verification. | |
| 211 if (status == CrosSettingsProvider::PERMANENTLY_UNTRUSTED) { | |
| 212 if (delegate_) | |
| 213 delegate_->PolicyLoadFailed(); | |
| 214 else | |
| 215 NOTREACHED(); | |
| 216 return; | |
| 217 } else if (status != CrosSettingsProvider::TRUSTED) { | |
| 218 // Value of kAccountsPrefSupervisedUsersEnabled setting is still not | |
| 219 // verified. Another attempt will be invoked after verification completion. | |
| 220 return; | |
| 221 } | |
| 222 | |
| 223 if (!user_manager::UserManager::Get()->AreSupervisedUsersAllowed()) { | |
| 224 LOG(ERROR) << "Login attempt of supervised user detected."; | |
| 225 delegate_->WhiteListCheckFailed(user_context.GetUserID()); | |
| 226 return; | |
| 227 } | |
| 228 | |
| 229 SupervisedUserLoginFlow* new_flow = | |
| 230 new SupervisedUserLoginFlow(user_context.GetUserID()); | |
| 231 new_flow->set_host( | |
| 232 ChromeUserManager::Get()->GetUserFlow(user_context.GetUserID())->host()); | |
| 233 ChromeUserManager::Get()->SetUserFlow(user_context.GetUserID(), new_flow); | |
| 234 | |
| 235 SupervisedUserAuthentication* authentication = | |
| 236 ChromeUserManager::Get()->GetSupervisedUserManager()->GetAuthentication(); | |
| 237 | |
| 238 UserContext user_context_copy = authentication->TransformKey(user_context); | |
| 239 | |
| 240 if (authentication->GetPasswordSchema(user_context.GetUserID()) == | |
| 241 SupervisedUserAuthentication::SCHEMA_SALT_HASHED) { | |
| 242 if (extended_authenticator_.get()) { | |
| 243 extended_authenticator_->SetConsumer(NULL); | |
| 244 } | |
| 245 extended_authenticator_ = ExtendedAuthenticator::Create(this); | |
| 246 // TODO(antrim) : Replace empty callback with explicit method. | |
| 247 // http://crbug.com/351268 | |
| 248 BrowserThread::PostTask( | |
| 249 BrowserThread::UI, | |
| 250 FROM_HERE, | |
| 251 base::Bind(&ExtendedAuthenticator::AuthenticateToMount, | |
| 252 extended_authenticator_.get(), | |
| 253 user_context_copy, | |
| 254 ExtendedAuthenticator::ResultCallback())); | |
| 255 | |
| 256 } else { | |
| 257 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 258 BrowserThread::PostTask( | |
| 259 BrowserThread::UI, | |
| 260 FROM_HERE, | |
| 261 base::Bind(&Authenticator::LoginAsSupervisedUser, | |
| 262 authenticator_.get(), | |
| 263 user_context_copy)); | |
| 264 } | |
| 265 } | |
| 266 | |
| 267 void LoginPerformer::LoginRetailMode() { | |
| 268 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 269 BrowserThread::PostTask( | |
| 270 BrowserThread::UI, FROM_HERE, | |
| 271 base::Bind(&Authenticator::LoginRetailMode, authenticator_.get())); | |
| 272 } | |
| 273 | |
| 274 void LoginPerformer::LoginOffTheRecord() { | |
| 275 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 276 BrowserThread::PostTask( | |
| 277 BrowserThread::UI, FROM_HERE, | |
| 278 base::Bind(&Authenticator::LoginOffTheRecord, authenticator_.get())); | |
| 279 } | |
| 280 | |
| 281 void LoginPerformer::LoginAsPublicSession(const UserContext& user_context) { | |
| 282 // Login is not allowed if policy could not be loaded for the account. | |
| 283 policy::BrowserPolicyConnectorChromeOS* connector = | |
| 284 g_browser_process->platform_part()->browser_policy_connector_chromeos(); | |
| 285 policy::DeviceLocalAccountPolicyService* policy_service = | |
| 286 connector->GetDeviceLocalAccountPolicyService(); | |
| 287 if (!policy_service || | |
| 288 !policy_service->IsPolicyAvailableForUser(user_context.GetUserID())) { | |
| 289 DCHECK(delegate_); | |
| 290 if (delegate_) | |
| 291 delegate_->PolicyLoadFailed(); | |
| 292 return; | |
| 293 } | |
| 294 | |
| 295 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 296 BrowserThread::PostTask( | |
| 297 BrowserThread::UI, FROM_HERE, | |
| 298 base::Bind(&Authenticator::LoginAsPublicSession, | |
| 299 authenticator_.get(), | |
| 300 user_context)); | |
| 301 } | |
| 302 | |
| 303 void LoginPerformer::LoginAsKioskAccount(const std::string& app_user_id, | |
| 304 bool use_guest_mount) { | |
| 305 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 306 BrowserThread::PostTask( | |
| 307 BrowserThread::UI, FROM_HERE, | |
| 308 base::Bind(&Authenticator::LoginAsKioskAccount, authenticator_.get(), | |
| 309 app_user_id, use_guest_mount)); | |
| 310 } | |
| 311 | |
| 312 void LoginPerformer::RecoverEncryptedData(const std::string& old_password) { | |
| 313 BrowserThread::PostTask( | |
| 314 BrowserThread::UI, FROM_HERE, | |
| 315 base::Bind(&Authenticator::RecoverEncryptedData, authenticator_.get(), | |
| 316 old_password)); | |
| 317 } | |
| 318 | |
| 319 void LoginPerformer::ResyncEncryptedData() { | |
| 320 BrowserThread::PostTask( | |
| 321 BrowserThread::UI, FROM_HERE, | |
| 322 base::Bind(&Authenticator::ResyncEncryptedData, authenticator_.get())); | |
| 323 } | |
| 324 | |
| 325 //////////////////////////////////////////////////////////////////////////////// | |
| 326 // LoginPerformer, private: | |
| 327 | |
| 328 void LoginPerformer::StartLoginCompletion() { | |
| 329 DVLOG(1) << "Login completion started"; | |
| 330 BootTimesLoader::Get()->AddLoginTimeMarker("AuthStarted", false); | |
| 331 Profile* profile = ProfileHelper::GetSigninProfile(); | |
| 332 | |
| 333 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 334 BrowserThread::PostTask( | |
| 335 BrowserThread::UI, FROM_HERE, | |
| 336 base::Bind(&Authenticator::CompleteLogin, authenticator_.get(), | |
| 337 profile, | |
| 338 user_context_)); | |
| 339 user_context_.ClearSecrets(); | |
| 340 } | |
| 341 | |
| 342 void LoginPerformer::StartAuthentication() { | |
| 343 DVLOG(1) << "Auth started"; | |
| 344 BootTimesLoader::Get()->AddLoginTimeMarker("AuthStarted", false); | |
| 345 Profile* profile = ProfileHelper::GetSigninProfile(); | |
| 346 if (delegate_) { | |
| 347 authenticator_ = LoginUtils::Get()->CreateAuthenticator(this); | |
| 348 BrowserThread::PostTask( | |
| 349 BrowserThread::UI, FROM_HERE, | |
| 350 base::Bind(&Authenticator::AuthenticateToLogin, authenticator_.get(), | |
| 351 profile, | |
| 352 user_context_)); | |
| 353 // Make unobtrusive online check. It helps to determine password change | |
| 354 // state in the case when offline login fails. | |
| 355 online_attempt_host_.Check(profile->GetRequestContext(), user_context_); | |
| 356 } else { | |
| 357 NOTREACHED(); | |
| 358 } | |
| 359 user_context_.ClearSecrets(); | |
| 360 } | |
| 361 | |
| 362 void LoginPerformer::OnlineWildcardLoginCheckCompleted( | |
| 363 policy::WildcardLoginChecker::Result result) { | |
| 364 if (result == policy::WildcardLoginChecker::RESULT_ALLOWED) { | |
| 365 StartLoginCompletion(); | |
| 366 } else { | |
| 367 if (delegate_) | |
| 368 delegate_->WhiteListCheckFailed(user_context_.GetUserID()); | |
| 369 } | |
| 370 } | |
| 371 | |
| 372 } // namespace chromeos | |
| OLD | NEW |