OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CHROME_BROWSER_CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ | 5 #ifndef CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ |
6 #define CHROME_BROWSER_CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ | 6 #define CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
| 11 #include "base/callback.h" |
11 #include "base/memory/scoped_ptr.h" | 12 #include "base/memory/scoped_ptr.h" |
12 #include "base/memory/weak_ptr.h" | 13 #include "base/memory/weak_ptr.h" |
13 #include "chrome/browser/chromeos/policy/wildcard_login_checker.h" | 14 #include "chromeos/chromeos_export.h" |
14 #include "chromeos/login/auth/auth_status_consumer.h" | 15 #include "chromeos/login/auth/auth_status_consumer.h" |
15 #include "chromeos/login/auth/authenticator.h" | 16 #include "chromeos/login/auth/authenticator.h" |
16 #include "chromeos/login/auth/extended_authenticator.h" | 17 #include "chromeos/login/auth/extended_authenticator.h" |
17 #include "chromeos/login/auth/online_attempt_host.h" | 18 #include "chromeos/login/auth/online_attempt_host.h" |
18 #include "chromeos/login/auth/user_context.h" | 19 #include "chromeos/login/auth/user_context.h" |
19 #include "content/public/browser/notification_observer.h" | |
20 #include "content/public/browser/notification_registrar.h" | |
21 #include "google_apis/gaia/google_service_auth_error.h" | 20 #include "google_apis/gaia/google_service_auth_error.h" |
22 | 21 |
| 22 namespace net { |
| 23 class URLRequestContextGetter; |
| 24 } |
| 25 |
23 namespace policy { | 26 namespace policy { |
24 class WildcardLoginChecker; | 27 class WildcardLoginChecker; |
25 } | 28 } |
26 | 29 |
| 30 namespace content { |
| 31 class BrowserContext; |
| 32 } |
| 33 |
27 namespace chromeos { | 34 namespace chromeos { |
28 | 35 |
29 // This class encapsulates sign in operations. | 36 // This class encapsulates sign in operations. |
30 // Sign in is performed in a way that offline auth is executed first. | 37 // Sign in is performed in a way that offline auth is executed first. |
31 // Once offline auth is OK - user homedir is mounted, UI is launched. | 38 // Once offline auth is OK - user homedir is mounted, UI is launched. |
32 // At this point LoginPerformer |delegate_| is destroyed and it releases | 39 // At this point LoginPerformer |delegate_| is destroyed and it releases |
33 // LP instance ownership. LP waits for online login result. | 40 // LP instance ownership. LP waits for online login result. |
34 // If auth is succeeded, cookie fetcher is executed, LP instance deletes itself. | 41 // If auth is succeeded, cookie fetcher is executed, LP instance deletes itself. |
35 // | 42 // |
36 // If |delegate_| is not NULL it will handle error messages, password input. | 43 // If |delegate_| is not NULL it will handle error messages, password input. |
37 class LoginPerformer : public AuthStatusConsumer, | 44 class CHROMEOS_EXPORT LoginPerformer : public AuthStatusConsumer, |
38 public OnlineAttemptHost::Delegate { | 45 public OnlineAttemptHost::Delegate { |
39 public: | 46 public: |
40 typedef enum AuthorizationMode { | 47 typedef enum AuthorizationMode { |
41 // Authorization performed internally by Chrome. | 48 // Authorization performed internally by Chrome. |
42 AUTH_MODE_INTERNAL, | 49 AUTH_MODE_INTERNAL, |
43 // Authorization performed by an extension. | 50 // Authorization performed by an extension. |
44 AUTH_MODE_EXTENSION | 51 AUTH_MODE_EXTENSION |
45 } AuthorizationMode; | 52 } AuthorizationMode; |
46 | 53 |
47 // Delegate class to get notifications from the LoginPerformer. | 54 // Delegate class to get notifications from the LoginPerformer. |
48 class Delegate : public AuthStatusConsumer { | 55 class Delegate : public AuthStatusConsumer { |
49 public: | 56 public: |
50 virtual ~Delegate() {} | 57 virtual ~Delegate() {} |
51 virtual void WhiteListCheckFailed(const std::string& email) = 0; | 58 virtual void WhiteListCheckFailed(const std::string& email) = 0; |
52 virtual void PolicyLoadFailed() = 0; | 59 virtual void PolicyLoadFailed() = 0; |
53 virtual void OnOnlineChecked(const std::string& email, bool success) = 0; | 60 virtual void OnOnlineChecked(const std::string& email, bool success) = 0; |
54 }; | 61 }; |
55 | 62 |
56 explicit LoginPerformer(Delegate* delegate); | 63 LoginPerformer(scoped_refptr<base::TaskRunner> task_runner, |
| 64 Delegate* delegate); |
57 virtual ~LoginPerformer(); | 65 virtual ~LoginPerformer(); |
58 | 66 |
59 // AuthStatusConsumer implementation: | |
60 virtual void OnAuthFailure(const AuthFailure& error) override; | |
61 virtual void OnRetailModeAuthSuccess( | |
62 const UserContext& user_context) override; | |
63 virtual void OnAuthSuccess(const UserContext& user_context) override; | |
64 virtual void OnOffTheRecordAuthSuccess() override; | |
65 virtual void OnPasswordChangeDetected() override; | |
66 | |
67 // Performs a login for |user_context|. | 67 // Performs a login for |user_context|. |
68 // If auth_mode is AUTH_MODE_EXTENSION, there are no further auth checks, | 68 // If auth_mode is AUTH_MODE_EXTENSION, there are no further auth checks, |
69 // AUTH_MODE_INTERNAL will perform auth checks. | 69 // AUTH_MODE_INTERNAL will perform auth checks. |
70 void PerformLogin(const UserContext& user_context, | 70 void PerformLogin(const UserContext& user_context, |
71 AuthorizationMode auth_mode); | 71 AuthorizationMode auth_mode); |
72 | 72 |
73 // Performs supervised user login with a given |user_context|. | 73 // Performs supervised user login with a given |user_context|. |
74 void LoginAsSupervisedUser(const UserContext& user_context); | 74 void LoginAsSupervisedUser(const UserContext& user_context); |
75 | 75 |
76 // Performs retail mode login. | 76 // Performs retail mode login. |
77 void LoginRetailMode(); | 77 void LoginRetailMode(); |
78 | 78 |
79 // Performs actions to prepare guest mode login. | 79 // Performs actions to prepare guest mode login. |
80 void LoginOffTheRecord(); | 80 void LoginOffTheRecord(); |
81 | 81 |
82 // Performs public session login with a given |user_context|. | 82 // Performs public session login with a given |user_context|. |
83 void LoginAsPublicSession(const UserContext& user_context); | 83 void LoginAsPublicSession(const UserContext& user_context); |
84 | 84 |
85 // Performs a login into the kiosk mode account with |app_user_id|. | 85 // Performs a login into the kiosk mode account with |app_user_id|. |
86 void LoginAsKioskAccount(const std::string& app_user_id, | 86 void LoginAsKioskAccount(const std::string& app_user_id, |
87 bool use_guest_mount); | 87 bool use_guest_mount); |
88 | 88 |
| 89 // AuthStatusConsumer implementation: |
| 90 virtual void OnAuthFailure(const AuthFailure& error) override; |
| 91 virtual void OnRetailModeAuthSuccess( |
| 92 const UserContext& user_context) override; |
| 93 virtual void OnAuthSuccess(const UserContext& user_context) override; |
| 94 virtual void OnOffTheRecordAuthSuccess() override; |
| 95 virtual void OnPasswordChangeDetected() override; |
| 96 |
89 // Migrates cryptohome using |old_password| specified. | 97 // Migrates cryptohome using |old_password| specified. |
90 void RecoverEncryptedData(const std::string& old_password); | 98 void RecoverEncryptedData(const std::string& old_password); |
91 | 99 |
92 // Reinitializes cryptohome with the new password. | 100 // Reinitializes cryptohome with the new password. |
93 void ResyncEncryptedData(); | 101 void ResyncEncryptedData(); |
94 | 102 |
95 // Returns latest auth error. | 103 // Returns latest auth error. |
96 const GoogleServiceAuthError& error() const { | 104 const GoogleServiceAuthError& error() const { |
97 return last_login_failure_.error(); | 105 return last_login_failure_.error(); |
98 } | 106 } |
99 | 107 |
100 // True if password change has been detected. | 108 // True if password change has been detected. |
101 bool password_changed() { return password_changed_; } | 109 bool password_changed() { return password_changed_; } |
102 | 110 |
103 // Number of times we've been called with OnPasswordChangeDetected(). | 111 // Number of times we've been called with OnPasswordChangeDetected(). |
104 // If user enters incorrect old password, same LoginPerformer instance will | 112 // If user enters incorrect old password, same LoginPerformer instance will |
105 // be called so callback count makes it possible to distinguish initial | 113 // be called so callback count makes it possible to distinguish initial |
106 // "password changed detected" event from further attempts to enter old | 114 // "password changed detected" event from further attempts to enter old |
107 // password for cryptohome migration (when > 1). | 115 // password for cryptohome migration (when > 1). |
108 int password_changed_callback_count() { | 116 int password_changed_callback_count() { |
109 return password_changed_callback_count_; | 117 return password_changed_callback_count_; |
110 } | 118 } |
111 | 119 |
112 void set_delegate(Delegate* delegate) { delegate_ = delegate; } | 120 void set_delegate(Delegate* delegate) { delegate_ = delegate; } |
113 | 121 |
114 AuthorizationMode auth_mode() const { return auth_mode_; } | 122 AuthorizationMode auth_mode() const { return auth_mode_; } |
115 | 123 |
116 protected: | 124 protected: |
117 // Implements OnlineAttemptHost::Delegate. | 125 // Implements OnlineAttemptHost::Delegate. |
118 virtual void OnChecked(const std::string& username, bool success) override; | 126 virtual void OnChecked(const std::string& user_id, bool success) override; |
| 127 |
| 128 // Platform-dependant methods to be implemented by concrete class. |
| 129 |
| 130 // Run trusted check for a platform. If trusted check have to be performed |
| 131 // asynchronously, |false| will be returned, and either delegate's |
| 132 // PolicyLoadFailed() or |callback| will be called upon actual check. |
| 133 virtual bool RunTrustedCheck(const base::Closure& callback) = 0; |
| 134 |
| 135 // Check if user is allowed to sign in on device. |wildcard_match| will |
| 136 // contain additional information whether this user is explicitly listed or |
| 137 // not (may be relevant for extension-based sign-in). |
| 138 virtual bool IsUserWhitelisted(const std::string& user_id, |
| 139 bool* wildcard_match) = 0; |
| 140 |
| 141 // This method should run addional online check if user can sign in on device. |
| 142 // Either |success_callback| or |failure_callback| should be called upon this |
| 143 // check. |
| 144 virtual void RunOnlineWhitelistCheck( |
| 145 const std::string& user_id, |
| 146 bool wildcard_match, |
| 147 const base::Closure& success_callback, |
| 148 const base::Closure& failure_callback) = 0; |
| 149 |
| 150 // Supervised users-related methods. |
| 151 |
| 152 // Check if supervised users are allowed on this device. |
| 153 virtual bool AreSupervisedUsersAllowed() = 0; |
| 154 |
| 155 // Check which authenticator should be used for supervised user. |
| 156 virtual bool UseExtendedAuthenticatorForSupervisedUser( |
| 157 const UserContext& user_context) = 0; |
| 158 |
| 159 // Probably transform supervised user's authentication key. |
| 160 virtual UserContext TransformSupervisedKey(const UserContext& context) = 0; |
| 161 |
| 162 // Set up sign-in flow for supervised user. |
| 163 virtual void SetupSupervisedUserFlow(const std::string& user_id) = 0; |
| 164 |
| 165 // Run policy check for |user_id|. If something is wrong, delegate's |
| 166 // PolicyLoadFailed is called. |
| 167 virtual bool CheckPolicyForUser(const std::string& user_id) = 0; |
| 168 |
| 169 // Look up browser context to use during signin. |
| 170 virtual content::BrowserContext* GetSigninContext() = 0; |
| 171 |
| 172 // Get RequestContext used for sign in. |
| 173 virtual net::URLRequestContextGetter* GetSigninRequestContext() = 0; |
| 174 |
| 175 // Create authenticator implementation. |
| 176 virtual scoped_refptr<Authenticator> CreateAuthenticator() = 0; |
| 177 |
| 178 void set_authenticator(scoped_refptr<Authenticator> authenticator); |
| 179 |
| 180 // Notifications receiver. |
| 181 Delegate* delegate_; |
119 | 182 |
120 private: | 183 private: |
121 // Starts login completion of externally authenticated user. | 184 // Starts login completion of externally authenticated user. |
122 void StartLoginCompletion(); | 185 void StartLoginCompletion(); |
123 | 186 |
124 // Starts authentication. | 187 // Starts authentication. |
125 void StartAuthentication(); | 188 void StartAuthentication(); |
| 189 void NotifyWhitelistCheckFailure(); |
126 | 190 |
127 // Completion callback for the online wildcard login check for enterprise | 191 // Makes sure that authenticator is created. |
128 // devices. Continues the login process or signals whitelist check failure | 192 void EnsureAuthenticator(); |
129 // depending on the value of |result|. | 193 void EnsureExtendedAuthenticator(); |
130 void OnlineWildcardLoginCheckCompleted( | 194 |
131 policy::WildcardLoginChecker::Result result); | 195 // Actual implementantion of PeformLogin that is run after trusted values |
| 196 // check. |
| 197 void DoPerformLogin(const UserContext& user_context, |
| 198 AuthorizationMode auth_mode); |
| 199 |
| 200 scoped_refptr<base::TaskRunner> task_runner_; |
132 | 201 |
133 // Used for logging in. | 202 // Used for logging in. |
134 scoped_refptr<Authenticator> authenticator_; | 203 scoped_refptr<Authenticator> authenticator_; |
| 204 |
| 205 // Used for logging in. |
135 scoped_refptr<ExtendedAuthenticator> extended_authenticator_; | 206 scoped_refptr<ExtendedAuthenticator> extended_authenticator_; |
136 | 207 |
137 // Used to make auxiliary online check. | 208 // Used to make auxiliary online check. |
138 OnlineAttemptHost online_attempt_host_; | 209 OnlineAttemptHost online_attempt_host_; |
139 | 210 |
140 // Represents last login failure that was encountered when communicating to | 211 // Represents last login failure that was encountered when communicating to |
141 // sign-in server. AuthFailure.LoginFailureNone() by default. | 212 // sign-in server. AuthFailure.LoginFailureNone() by default. |
142 AuthFailure last_login_failure_; | 213 AuthFailure last_login_failure_; |
143 | 214 |
144 // User credentials for the current login attempt. | 215 // User credentials for the current login attempt. |
145 UserContext user_context_; | 216 UserContext user_context_; |
146 | 217 |
147 // Notifications receiver. | |
148 Delegate* delegate_; | |
149 | |
150 // True if password change has been detected. | 218 // True if password change has been detected. |
151 // Once correct password is entered homedir migration is executed. | 219 // Once correct password is entered homedir migration is executed. |
152 bool password_changed_; | 220 bool password_changed_; |
153 int password_changed_callback_count_; | 221 int password_changed_callback_count_; |
154 | 222 |
155 // Authorization mode type. | 223 // Authorization mode type. |
156 AuthorizationMode auth_mode_; | 224 AuthorizationMode auth_mode_; |
157 | 225 |
158 // Used to verify logins that matched wildcard on the login whitelist. | |
159 scoped_ptr<policy::WildcardLoginChecker> wildcard_login_checker_; | |
160 | |
161 base::WeakPtrFactory<LoginPerformer> weak_factory_; | 226 base::WeakPtrFactory<LoginPerformer> weak_factory_; |
162 | |
163 DISALLOW_COPY_AND_ASSIGN(LoginPerformer); | 227 DISALLOW_COPY_AND_ASSIGN(LoginPerformer); |
164 }; | 228 }; |
165 | 229 |
166 } // namespace chromeos | 230 } // namespace chromeos |
167 | 231 |
168 #endif // CHROME_BROWSER_CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ | 232 #endif // CHROMEOS_LOGIN_AUTH_LOGIN_PERFORMER_H_ |
OLD | NEW |