| Index: chrome/browser/chromeos/login/auth/chrome_login_performer.cc
|
| diff --git a/chrome/browser/chromeos/login/auth/chrome_login_performer.cc b/chrome/browser/chromeos/login/auth/chrome_login_performer.cc
|
| deleted file mode 100644
|
| index 1922cd563e7000517b2b87c783daeabce9ae1ba5..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/chromeos/login/auth/chrome_login_performer.cc
|
| +++ /dev/null
|
| @@ -1,171 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/chromeos/login/auth/chrome_login_performer.h"
|
| -
|
| -#include "base/bind.h"
|
| -#include "base/thread_task_runner_handle.h"
|
| -#include "chrome/browser/browser_process.h"
|
| -#include "chrome/browser/chromeos/login/login_utils.h"
|
| -#include "chrome/browser/chromeos/login/supervised/supervised_user_authentication.h"
|
| -#include "chrome/browser/chromeos/login/supervised/supervised_user_constants.h"
|
| -#include "chrome/browser/chromeos/login/supervised/supervised_user_login_flow.h"
|
| -#include "chrome/browser/chromeos/login/users/chrome_user_manager.h"
|
| -#include "chrome/browser/chromeos/login/users/supervised_user_manager.h"
|
| -#include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h"
|
| -#include "chrome/browser/chromeos/policy/device_local_account_policy_service.h"
|
| -#include "chrome/browser/chromeos/profiles/profile_helper.h"
|
| -#include "chrome/browser/chromeos/settings/cros_settings.h"
|
| -
|
| -namespace chromeos {
|
| -
|
| -ChromeLoginPerformer::ChromeLoginPerformer(Delegate* delegate)
|
| - : LoginPerformer(base::ThreadTaskRunnerHandle::Get(), delegate),
|
| - weak_factory_(this) {
|
| -}
|
| -
|
| -ChromeLoginPerformer::~ChromeLoginPerformer() {
|
| -}
|
| -
|
| -////////////////////////////////////////////////////////////////////////////////
|
| -// ChromeLoginPerformer, public:
|
| -
|
| -bool ChromeLoginPerformer::RunTrustedCheck(const base::Closure& callback) {
|
| - CrosSettings* cros_settings = CrosSettings::Get();
|
| -
|
| - CrosSettingsProvider::TrustedStatus status =
|
| - cros_settings->PrepareTrustedValues(
|
| - base::Bind(&ChromeLoginPerformer::DidRunTrustedCheck,
|
| - weak_factory_.GetWeakPtr(),
|
| - callback));
|
| - // Must not proceed without signature verification.
|
| - if (status == CrosSettingsProvider::PERMANENTLY_UNTRUSTED) {
|
| - if (delegate_)
|
| - delegate_->PolicyLoadFailed();
|
| - else
|
| - NOTREACHED();
|
| - return true; // Some callback was called.
|
| - } else if (status == CrosSettingsProvider::TEMPORARILY_UNTRUSTED) {
|
| - // Value of AllowNewUser setting is still not verified.
|
| - // Another attempt will be invoked after verification completion.
|
| - return false;
|
| - } else {
|
| - DCHECK(status == CrosSettingsProvider::TRUSTED);
|
| - // CrosSettingsProvider::TRUSTED
|
| - callback.Run();
|
| - return true; // Some callback was called.
|
| - }
|
| -}
|
| -
|
| -void ChromeLoginPerformer::DidRunTrustedCheck(const base::Closure& callback) {
|
| - CrosSettings* cros_settings = CrosSettings::Get();
|
| -
|
| - CrosSettingsProvider::TrustedStatus status =
|
| - cros_settings->PrepareTrustedValues(
|
| - base::Bind(&ChromeLoginPerformer::DidRunTrustedCheck,
|
| - weak_factory_.GetWeakPtr(),
|
| - callback));
|
| - // Must not proceed without signature verification.
|
| - if (status == CrosSettingsProvider::PERMANENTLY_UNTRUSTED) {
|
| - if (delegate_)
|
| - delegate_->PolicyLoadFailed();
|
| - else
|
| - NOTREACHED();
|
| - } else if (status == CrosSettingsProvider::TEMPORARILY_UNTRUSTED) {
|
| - // Value of AllowNewUser setting is still not verified.
|
| - // Another attempt will be invoked after verification completion.
|
| - return;
|
| - } else {
|
| - DCHECK(status == CrosSettingsProvider::TRUSTED);
|
| - callback.Run();
|
| - }
|
| -}
|
| -
|
| -bool ChromeLoginPerformer::IsUserWhitelisted(const std::string& user_id,
|
| - bool* wildcard_match) {
|
| - return LoginUtils::IsWhitelisted(user_id, wildcard_match);
|
| -}
|
| -
|
| -void ChromeLoginPerformer::RunOnlineWhitelistCheck(
|
| - const std::string& user_id,
|
| - bool wildcard_match,
|
| - const base::Closure& success_callback,
|
| - const base::Closure& failure_callback) {
|
| - // On enterprise devices, reconfirm login permission with the server.
|
| - policy::BrowserPolicyConnectorChromeOS* connector =
|
| - g_browser_process->platform_part()->browser_policy_connector_chromeos();
|
| - if (connector->IsEnterpriseManaged() && wildcard_match &&
|
| - !connector->IsNonEnterpriseUser(user_id)) {
|
| - wildcard_login_checker_.reset(new policy::WildcardLoginChecker());
|
| - wildcard_login_checker_->Start(
|
| - ProfileHelper::GetSigninProfile()->GetRequestContext(),
|
| - base::Bind(&ChromeLoginPerformer::OnlineWildcardLoginCheckCompleted,
|
| - weak_factory_.GetWeakPtr(),
|
| - success_callback,
|
| - failure_callback));
|
| - } else {
|
| - success_callback.Run();
|
| - }
|
| -}
|
| -
|
| -scoped_refptr<Authenticator> ChromeLoginPerformer::CreateAuthenticator() {
|
| - return LoginUtils::Get()->CreateAuthenticator(this);
|
| -}
|
| -
|
| -bool ChromeLoginPerformer::AreSupervisedUsersAllowed() {
|
| - return user_manager::UserManager::Get()->AreSupervisedUsersAllowed();
|
| -}
|
| -
|
| -bool ChromeLoginPerformer::UseExtendedAuthenticatorForSupervisedUser(
|
| - const UserContext& user_context) {
|
| - SupervisedUserAuthentication* authentication =
|
| - ChromeUserManager::Get()->GetSupervisedUserManager()->GetAuthentication();
|
| - return authentication->GetPasswordSchema(user_context.GetUserID()) ==
|
| - SupervisedUserAuthentication::SCHEMA_SALT_HASHED;
|
| -}
|
| -
|
| -UserContext ChromeLoginPerformer::TransformSupervisedKey(
|
| - const UserContext& context) {
|
| - SupervisedUserAuthentication* authentication =
|
| - ChromeUserManager::Get()->GetSupervisedUserManager()->GetAuthentication();
|
| - return authentication->TransformKey(context);
|
| -}
|
| -
|
| -void ChromeLoginPerformer::SetupSupervisedUserFlow(const std::string& user_id) {
|
| - SupervisedUserLoginFlow* new_flow = new SupervisedUserLoginFlow(user_id);
|
| - new_flow->set_host(ChromeUserManager::Get()->GetUserFlow(user_id)->host());
|
| - ChromeUserManager::Get()->SetUserFlow(user_id, new_flow);
|
| -}
|
| -
|
| -bool ChromeLoginPerformer::CheckPolicyForUser(const std::string& user_id) {
|
| - // Login is not allowed if policy could not be loaded for the account.
|
| - policy::BrowserPolicyConnectorChromeOS* connector =
|
| - g_browser_process->platform_part()->browser_policy_connector_chromeos();
|
| - policy::DeviceLocalAccountPolicyService* policy_service =
|
| - connector->GetDeviceLocalAccountPolicyService();
|
| - return policy_service && policy_service->IsPolicyAvailableForUser(user_id);
|
| -}
|
| -////////////////////////////////////////////////////////////////////////////////
|
| -// ChromeLoginPerformer, private:
|
| -
|
| -content::BrowserContext* ChromeLoginPerformer::GetSigninContext() {
|
| - return ProfileHelper::GetSigninProfile();
|
| -}
|
| -
|
| -net::URLRequestContextGetter* ChromeLoginPerformer::GetSigninRequestContext() {
|
| - return ProfileHelper::GetSigninProfile()->GetRequestContext();
|
| -}
|
| -
|
| -void ChromeLoginPerformer::OnlineWildcardLoginCheckCompleted(
|
| - const base::Closure& success_callback,
|
| - const base::Closure& failure_callback,
|
| - policy::WildcardLoginChecker::Result result) {
|
| - if (result == policy::WildcardLoginChecker::RESULT_ALLOWED) {
|
| - success_callback.Run();
|
| - } else {
|
| - failure_callback.Run();
|
| - }
|
| -}
|
| -
|
| -} // namespace chromeos
|
|
|