OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/login/user_manager_impl.h" | 5 #include "chrome/browser/chromeos/login/user_manager_impl.h" |
6 | 6 |
| 7 #include <cstddef> |
| 8 #include <set> |
| 9 #include <vector> |
| 10 |
7 #include "ash/shell.h" | 11 #include "ash/shell.h" |
8 #include "base/bind.h" | 12 #include "base/bind.h" |
9 #include "base/chromeos/chromeos_version.h" | 13 #include "base/chromeos/chromeos_version.h" |
10 #include "base/command_line.h" | 14 #include "base/command_line.h" |
11 #include "base/compiler_specific.h" | 15 #include "base/compiler_specific.h" |
12 #include "base/file_path.h" | 16 #include "base/file_path.h" |
13 #include "base/file_util.h" | 17 #include "base/file_util.h" |
14 #include "base/logging.h" | 18 #include "base/logging.h" |
15 #include "base/rand_util.h" | 19 #include "base/rand_util.h" |
16 #include "base/utf_string_conversions.h" | 20 #include "base/utf_string_conversions.h" |
17 #include "base/values.h" | 21 #include "base/values.h" |
18 #include "chrome/browser/browser_process.h" | 22 #include "chrome/browser/browser_process.h" |
19 #include "chrome/browser/chromeos/cros/cert_library.h" | 23 #include "chrome/browser/chromeos/cros/cert_library.h" |
20 #include "chrome/browser/chromeos/cros/cros_library.h" | 24 #include "chrome/browser/chromeos/cros/cros_library.h" |
21 #include "chrome/browser/chromeos/input_method/input_method_manager.h" | 25 #include "chrome/browser/chromeos/input_method/input_method_manager.h" |
22 #include "chrome/browser/chromeos/login/login_display.h" | 26 #include "chrome/browser/chromeos/login/login_display.h" |
23 #include "chrome/browser/chromeos/login/remove_user_delegate.h" | 27 #include "chrome/browser/chromeos/login/remove_user_delegate.h" |
24 #include "chrome/browser/chromeos/login/user_image_manager_impl.h" | 28 #include "chrome/browser/chromeos/login/user_image_manager_impl.h" |
25 #include "chrome/browser/chromeos/login/wizard_controller.h" | 29 #include "chrome/browser/chromeos/login/wizard_controller.h" |
26 #include "chrome/browser/chromeos/settings/cros_settings.h" | |
27 #include "chrome/browser/policy/browser_policy_connector.h" | 30 #include "chrome/browser/policy/browser_policy_connector.h" |
28 #include "chrome/browser/prefs/pref_service.h" | 31 #include "chrome/browser/prefs/pref_service.h" |
29 #include "chrome/browser/prefs/scoped_user_pref_update.h" | 32 #include "chrome/browser/prefs/scoped_user_pref_update.h" |
30 #include "chrome/browser/profiles/profile_manager.h" | 33 #include "chrome/browser/profiles/profile_manager.h" |
31 #include "chrome/browser/sync/profile_sync_service.h" | 34 #include "chrome/browser/sync/profile_sync_service.h" |
32 #include "chrome/browser/sync/profile_sync_service_factory.h" | 35 #include "chrome/browser/sync/profile_sync_service_factory.h" |
33 #include "chrome/common/chrome_notification_types.h" | 36 #include "chrome/common/chrome_notification_types.h" |
34 #include "chrome/common/chrome_switches.h" | 37 #include "chrome/common/chrome_switches.h" |
35 #include "chrome/common/pref_names.h" | 38 #include "chrome/common/pref_names.h" |
36 #include "chromeos/cryptohome/async_method_caller.h" | 39 #include "chromeos/cryptohome/async_method_caller.h" |
37 #include "content/public/browser/browser_thread.h" | 40 #include "content/public/browser/browser_thread.h" |
38 #include "content/public/browser/notification_service.h" | 41 #include "content/public/browser/notification_service.h" |
39 #include "google_apis/gaia/google_service_auth_error.h" | 42 #include "google_apis/gaia/google_service_auth_error.h" |
40 | 43 |
41 using content::BrowserThread; | 44 using content::BrowserThread; |
42 | 45 |
43 namespace chromeos { | 46 namespace chromeos { |
44 | 47 |
45 namespace { | 48 namespace { |
46 | 49 |
47 // A vector pref of the users who have logged into the device. | 50 // A vector pref of the the regular users known on this device, arranged in LRU |
48 const char kLoggedInUsers[] = "LoggedInUsers"; | 51 // order. |
| 52 const char kRegularUsers[] = "LoggedInUsers"; |
| 53 |
| 54 // A vector pref of the public accounts defined on this device. |
| 55 const char kPublicAccounts[] = "PublicAccounts"; |
| 56 |
| 57 // A string pref that gets set when a public account is removed but a user is |
| 58 // currently logged into that account, requiring the account's data to be |
| 59 // removed after logout. |
| 60 const char kPublicAccountPendingDataRemoval[] = |
| 61 "PublicAccountPendingDataRemoval"; |
49 | 62 |
50 // A dictionary that maps usernames to the displayed name. | 63 // A dictionary that maps usernames to the displayed name. |
51 const char kUserDisplayName[] = "UserDisplayName"; | 64 const char kUserDisplayName[] = "UserDisplayName"; |
52 | 65 |
53 // A dictionary that maps usernames to the displayed (non-canonical) emails. | 66 // A dictionary that maps usernames to the displayed (non-canonical) emails. |
54 const char kUserDisplayEmail[] = "UserDisplayEmail"; | 67 const char kUserDisplayEmail[] = "UserDisplayEmail"; |
55 | 68 |
56 // A dictionary that maps usernames to OAuth token presence flag. | 69 // A dictionary that maps usernames to OAuth token presence flag. |
57 const char kUserOAuthTokenStatus[] = "OAuthTokenStatus"; | 70 const char kUserOAuthTokenStatus[] = "OAuthTokenStatus"; |
58 | 71 |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
90 delegate->OnBeforeUserRemoved(user_email); | 103 delegate->OnBeforeUserRemoved(user_email); |
91 | 104 |
92 chromeos::UserManager::Get()->RemoveUserFromList(user_email); | 105 chromeos::UserManager::Get()->RemoveUserFromList(user_email); |
93 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( | 106 cryptohome::AsyncMethodCaller::GetInstance()->AsyncRemove( |
94 user_email, base::Bind(&OnRemoveUserComplete, user_email)); | 107 user_email, base::Bind(&OnRemoveUserComplete, user_email)); |
95 | 108 |
96 if (delegate) | 109 if (delegate) |
97 delegate->OnUserRemoved(user_email); | 110 delegate->OnUserRemoved(user_email); |
98 } | 111 } |
99 | 112 |
| 113 // Helper function that copies users from |users_list| to |users_vector| and |
| 114 // |users_set|. Duplicates and users already present in |existing_users| are |
| 115 // skipped. The |logged_in_user| is also skipped and the return value |
| 116 // indicates whether that user was found in |users_list|. |
| 117 bool ParseUserList(const ListValue& users_list, |
| 118 const std::set<std::string>& existing_users, |
| 119 const std::string& logged_in_user, |
| 120 std::vector<std::string>* users_vector, |
| 121 std::set<std::string>* users_set) { |
| 122 users_vector->clear(); |
| 123 users_set->clear(); |
| 124 bool logged_in_user_on_list = false; |
| 125 for (size_t i = 0; i < users_list.GetSize(); ++i) { |
| 126 std::string email; |
| 127 if (!users_list.GetString(i, &email) || email.empty()) { |
| 128 LOG(ERROR) << "Corrupt entry in user list at index " << i << "."; |
| 129 continue; |
| 130 } |
| 131 if (existing_users.find(email) != existing_users.end() || |
| 132 !users_set->insert(email).second) { |
| 133 LOG(ERROR) << "Duplicate user: " << email; |
| 134 continue; |
| 135 } |
| 136 if (email == logged_in_user) { |
| 137 logged_in_user_on_list = true; |
| 138 continue; |
| 139 } |
| 140 users_vector->push_back(email); |
| 141 } |
| 142 users_set->erase(logged_in_user); |
| 143 return logged_in_user_on_list; |
| 144 } |
| 145 |
100 } // namespace | 146 } // namespace |
101 | 147 |
102 // static | 148 // static |
103 void UserManager::RegisterPrefs(PrefService* local_state) { | 149 void UserManager::RegisterPrefs(PrefService* local_state) { |
104 local_state->RegisterListPref(kLoggedInUsers, PrefService::UNSYNCABLE_PREF); | 150 local_state->RegisterListPref(kRegularUsers, PrefService::UNSYNCABLE_PREF); |
| 151 local_state->RegisterListPref(kPublicAccounts, PrefService::UNSYNCABLE_PREF); |
| 152 local_state->RegisterStringPref(kPublicAccountPendingDataRemoval, "", |
| 153 PrefService::UNSYNCABLE_PREF); |
105 local_state->RegisterDictionaryPref(kUserOAuthTokenStatus, | 154 local_state->RegisterDictionaryPref(kUserOAuthTokenStatus, |
106 PrefService::UNSYNCABLE_PREF); | 155 PrefService::UNSYNCABLE_PREF); |
107 local_state->RegisterDictionaryPref(kUserDisplayName, | 156 local_state->RegisterDictionaryPref(kUserDisplayName, |
108 PrefService::UNSYNCABLE_PREF); | 157 PrefService::UNSYNCABLE_PREF); |
109 local_state->RegisterDictionaryPref(kUserDisplayEmail, | 158 local_state->RegisterDictionaryPref(kUserDisplayEmail, |
110 PrefService::UNSYNCABLE_PREF); | 159 PrefService::UNSYNCABLE_PREF); |
111 } | 160 } |
112 | 161 |
113 UserManagerImpl::UserManagerImpl() | 162 UserManagerImpl::UserManagerImpl() |
114 : logged_in_user_(NULL), | 163 : cros_settings_(CrosSettings::Get()), |
| 164 users_loaded_(false), |
| 165 logged_in_user_(NULL), |
115 session_started_(false), | 166 session_started_(false), |
116 is_current_user_owner_(false), | 167 is_current_user_owner_(false), |
117 is_current_user_new_(false), | 168 is_current_user_new_(false), |
118 is_current_user_ephemeral_(false), | 169 is_current_user_ephemeral_(false), |
119 ephemeral_users_enabled_(false), | 170 ephemeral_users_enabled_(false), |
120 observed_sync_service_(NULL), | 171 observed_sync_service_(NULL), |
121 user_image_manager_(new UserImageManagerImpl) { | 172 user_image_manager_(new UserImageManagerImpl) { |
122 // UserManager instance should be used only on UI thread. | 173 // UserManager instance should be used only on UI thread. |
123 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 174 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
124 registrar_.Add(this, chrome::NOTIFICATION_OWNERSHIP_STATUS_CHANGED, | 175 registrar_.Add(this, chrome::NOTIFICATION_OWNERSHIP_STATUS_CHANGED, |
125 content::NotificationService::AllSources()); | 176 content::NotificationService::AllSources()); |
126 registrar_.Add(this, chrome::NOTIFICATION_PROFILE_ADDED, | 177 registrar_.Add(this, chrome::NOTIFICATION_PROFILE_ADDED, |
127 content::NotificationService::AllSources()); | 178 content::NotificationService::AllSources()); |
128 RetrieveTrustedDevicePolicies(); | 179 RetrieveTrustedDevicePolicies(); |
129 } | 180 } |
130 | 181 |
131 UserManagerImpl::~UserManagerImpl() { | 182 UserManagerImpl::~UserManagerImpl() { |
132 // Can't use STLDeleteElements because of the private destructor of User. | 183 // Can't use STLDeleteElements because of the private destructor of User. |
133 for (size_t i = 0; i < users_.size(); ++i) | 184 for (size_t i = 0; i < users_.size(); ++i) |
134 delete users_[i]; | 185 delete users_[i]; |
135 users_.clear(); | 186 users_.clear(); |
136 if (is_current_user_ephemeral_) | 187 if (is_current_user_ephemeral_) |
137 delete logged_in_user_; | 188 delete logged_in_user_; |
138 } | 189 } |
139 | 190 |
| 191 void UserManagerImpl::Shutdown() { |
| 192 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 193 cros_settings_->RemoveSettingsObserver(kAccountsPrefDeviceLocalAccounts, |
| 194 this); |
| 195 } |
| 196 |
140 UserImageManager* UserManagerImpl::GetUserImageManager() { | 197 UserImageManager* UserManagerImpl::GetUserImageManager() { |
141 return user_image_manager_.get(); | 198 return user_image_manager_.get(); |
142 } | 199 } |
143 | 200 |
144 const UserList& UserManagerImpl::GetUsers() const { | 201 const UserList& UserManagerImpl::GetUsers() const { |
145 const_cast<UserManagerImpl*>(this)->EnsureUsersLoaded(); | 202 const_cast<UserManagerImpl*>(this)->EnsureUsersLoaded(); |
146 return users_; | 203 return users_; |
147 } | 204 } |
148 | 205 |
149 void UserManagerImpl::UserLoggedIn(const std::string& email, | 206 void UserManagerImpl::UserLoggedIn(const std::string& email, |
(...skipping 11 matching lines...) Expand all Loading... |
161 return; | 218 return; |
162 } | 219 } |
163 | 220 |
164 if (IsEphemeralUser(email)) { | 221 if (IsEphemeralUser(email)) { |
165 EphemeralUserLoggedIn(email); | 222 EphemeralUserLoggedIn(email); |
166 return; | 223 return; |
167 } | 224 } |
168 | 225 |
169 EnsureUsersLoaded(); | 226 EnsureUsersLoaded(); |
170 | 227 |
171 // Clear the prefs view of the users. | 228 // Remove the user from the user list. |
172 PrefService* prefs = g_browser_process->local_state(); | 229 logged_in_user_ = RemoveRegularUserFromList(email); |
173 ListPrefUpdate prefs_users_update(prefs, kLoggedInUsers); | |
174 prefs_users_update->Clear(); | |
175 | 230 |
176 // Make sure this user is first. | 231 // Add the user to the front of the persistent user list. |
177 prefs_users_update->Append(new base::StringValue(email)); | 232 ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
178 UserList::iterator logged_in_user = users_.end(); | 233 kRegularUsers); |
179 for (UserList::iterator it = users_.begin(); it != users_.end(); ++it) { | 234 prefs_users_update->Insert(0, new base::StringValue(email)); |
180 std::string user_email = (*it)->email(); | |
181 // Skip the most recent user. | |
182 if (email != user_email) | |
183 prefs_users_update->Append(new base::StringValue(user_email)); | |
184 else | |
185 logged_in_user = it; | |
186 } | |
187 | 235 |
188 if (logged_in_user == users_.end()) { | 236 // If the user was not found on the user list, create a new user. |
| 237 if (!logged_in_user_) { |
189 is_current_user_new_ = true; | 238 is_current_user_new_ = true; |
190 logged_in_user_ = User::CreateRegularUser(email); | 239 logged_in_user_ = User::CreateRegularUser(email); |
191 logged_in_user_->set_oauth_token_status(LoadUserOAuthStatus(email)); | 240 logged_in_user_->set_oauth_token_status(LoadUserOAuthStatus(email)); |
192 } else { | |
193 logged_in_user_ = *logged_in_user; | |
194 users_.erase(logged_in_user); | |
195 } | |
196 // This user must be in the front of the user list. | |
197 users_.insert(users_.begin(), logged_in_user_); | |
198 | |
199 if (is_current_user_new_) { | |
200 SaveUserDisplayName(logged_in_user_->email(), | 241 SaveUserDisplayName(logged_in_user_->email(), |
201 UTF8ToUTF16(logged_in_user_->GetAccountName(true))); | 242 UTF8ToUTF16(logged_in_user_->GetAccountName(true))); |
202 WallpaperManager::Get()->SetInitialUserWallpaper(email, true); | 243 WallpaperManager::Get()->SetInitialUserWallpaper(email, true); |
203 } | 244 } |
204 | 245 |
205 user_image_manager_->UserLoggedIn(email, is_current_user_new_); | 246 user_image_manager_->UserLoggedIn(email, is_current_user_new_); |
206 | 247 |
207 if (!browser_restart) { | 248 if (!browser_restart) { |
208 // For GAIA login flow, logged in user wallpaper may not be loaded. | 249 // For GAIA login flow, logged in user wallpaper may not be loaded. |
209 WallpaperManager::Get()->EnsureLoggedInUserWallpaperLoaded(); | 250 WallpaperManager::Get()->EnsureLoggedInUserWallpaperLoaded(); |
210 } | 251 } |
211 | 252 |
212 // Make sure we persist new user data to Local State. | 253 // Make sure that new data is persisted to Local State. |
213 prefs->CommitPendingWrite(); | 254 g_browser_process->local_state()->CommitPendingWrite(); |
214 | 255 |
215 NotifyOnLogin(); | 256 NotifyOnLogin(); |
216 } | 257 } |
217 | 258 |
218 void UserManagerImpl::RetailModeUserLoggedIn() { | 259 void UserManagerImpl::RetailModeUserLoggedIn() { |
219 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 260 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
220 is_current_user_new_ = true; | 261 is_current_user_new_ = true; |
221 is_current_user_ephemeral_ = true; | 262 is_current_user_ephemeral_ = true; |
222 logged_in_user_ = User::CreateRetailModeUser(); | 263 logged_in_user_ = User::CreateRetailModeUser(); |
223 user_image_manager_->UserLoggedIn(kRetailModeUserEMail, | 264 user_image_manager_->UserLoggedIn(kRetailModeUserEMail, |
(...skipping 22 matching lines...) Expand all Loading... |
246 } | 287 } |
247 | 288 |
248 void UserManagerImpl::SessionStarted() { | 289 void UserManagerImpl::SessionStarted() { |
249 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 290 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
250 session_started_ = true; | 291 session_started_ = true; |
251 content::NotificationService::current()->Notify( | 292 content::NotificationService::current()->Notify( |
252 chrome::NOTIFICATION_SESSION_STARTED, | 293 chrome::NOTIFICATION_SESSION_STARTED, |
253 content::NotificationService::AllSources(), | 294 content::NotificationService::AllSources(), |
254 content::NotificationService::NoDetails()); | 295 content::NotificationService::NoDetails()); |
255 if (is_current_user_new_) { | 296 if (is_current_user_new_) { |
256 // Make sure we persist new user data to Local State. | 297 // Make sure that the new user's data is persisted to Local State. |
257 g_browser_process->local_state()->CommitPendingWrite(); | 298 g_browser_process->local_state()->CommitPendingWrite(); |
258 } | 299 } |
259 } | 300 } |
260 | 301 |
261 void UserManagerImpl::RemoveUser(const std::string& email, | 302 void UserManagerImpl::RemoveUser(const std::string& email, |
262 RemoveUserDelegate* delegate) { | 303 RemoveUserDelegate* delegate) { |
263 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 304 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
264 | 305 |
265 if (!IsKnownUser(email)) | 306 const User* user = FindUser(email); |
| 307 if (!user || user->GetType() != User::USER_TYPE_REGULAR) |
266 return; | 308 return; |
267 | 309 |
268 // Sanity check: we must not remove single user. This check may seem | 310 // Sanity check: we must not remove single user. This check may seem |
269 // redundant at a first sight because this single user must be an owner and | 311 // redundant at a first sight because this single user must be an owner and |
270 // we perform special check later in order not to remove an owner. However | 312 // we perform special check later in order not to remove an owner. However |
271 // due to non-instant nature of ownership assignment this later check may | 313 // due to non-instant nature of ownership assignment this later check may |
272 // sometimes fail. See http://crosbug.com/12723 | 314 // sometimes fail. See http://crosbug.com/12723 |
273 if (users_.size() < 2) | 315 if (users_.size() < 2) |
274 return; | 316 return; |
275 | 317 |
276 // Sanity check: do not allow the logged-in user to remove himself. | 318 // Sanity check: do not allow the logged-in user to remove himself. |
277 if (logged_in_user_ && logged_in_user_->email() == email) | 319 if (logged_in_user_ && logged_in_user_->email() == email) |
278 return; | 320 return; |
279 | 321 |
280 RemoveUserInternal(email, delegate); | 322 RemoveUserInternal(email, delegate); |
281 } | 323 } |
282 | 324 |
283 void UserManagerImpl::RemoveUserFromList(const std::string& email) { | 325 void UserManagerImpl::RemoveUserFromList(const std::string& email) { |
284 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 326 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
285 EnsureUsersLoaded(); | 327 EnsureUsersLoaded(); |
286 RemoveUserFromListInternal(email); | 328 RemoveNonCryptohomeData(email); |
| 329 delete RemoveRegularUserFromList(email); |
| 330 // Make sure that new data is persisted to Local State. |
| 331 g_browser_process->local_state()->CommitPendingWrite(); |
287 } | 332 } |
288 | 333 |
289 bool UserManagerImpl::IsKnownUser(const std::string& email) const { | 334 bool UserManagerImpl::IsKnownUser(const std::string& email) const { |
290 return FindUser(email) != NULL; | 335 return FindUser(email) != NULL; |
291 } | 336 } |
292 | 337 |
293 const User* UserManagerImpl::FindUser(const std::string& email) const { | 338 const User* UserManagerImpl::FindUser(const std::string& email) const { |
294 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 339 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
295 if (logged_in_user_ && logged_in_user_->email() == email) | 340 if (logged_in_user_ && logged_in_user_->email() == email) |
296 return logged_in_user_; | 341 return logged_in_user_; |
(...skipping 125 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
422 if (!profile->IsOffTheRecord() && | 467 if (!profile->IsOffTheRecord() && |
423 profile == ProfileManager::GetDefaultProfile()) { | 468 profile == ProfileManager::GetDefaultProfile()) { |
424 DCHECK(NULL == observed_sync_service_); | 469 DCHECK(NULL == observed_sync_service_); |
425 observed_sync_service_ = | 470 observed_sync_service_ = |
426 ProfileSyncServiceFactory::GetForProfile(profile); | 471 ProfileSyncServiceFactory::GetForProfile(profile); |
427 if (observed_sync_service_) | 472 if (observed_sync_service_) |
428 observed_sync_service_->AddObserver(this); | 473 observed_sync_service_->AddObserver(this); |
429 } | 474 } |
430 } | 475 } |
431 break; | 476 break; |
| 477 case chrome::NOTIFICATION_SYSTEM_SETTING_CHANGED: |
| 478 DCHECK_EQ(*content::Details<const std::string>(details).ptr(), |
| 479 kAccountsPrefDeviceLocalAccounts); |
| 480 RetrieveTrustedDevicePolicies(); |
| 481 break; |
432 default: | 482 default: |
433 NOTREACHED(); | 483 NOTREACHED(); |
434 } | 484 } |
435 } | 485 } |
436 | 486 |
437 void UserManagerImpl::OnStateChanged() { | 487 void UserManagerImpl::OnStateChanged() { |
438 DCHECK(IsUserLoggedIn() && !IsLoggedInAsGuest()); | 488 DCHECK(IsLoggedInAsRegularUser()); |
439 GoogleServiceAuthError::State state = | 489 GoogleServiceAuthError::State state = |
440 observed_sync_service_->GetAuthError().state(); | 490 observed_sync_service_->GetAuthError().state(); |
441 if (state != GoogleServiceAuthError::NONE && | 491 if (state != GoogleServiceAuthError::NONE && |
442 state != GoogleServiceAuthError::CONNECTION_FAILED && | 492 state != GoogleServiceAuthError::CONNECTION_FAILED && |
443 state != GoogleServiceAuthError::SERVICE_UNAVAILABLE && | 493 state != GoogleServiceAuthError::SERVICE_UNAVAILABLE && |
444 state != GoogleServiceAuthError::REQUEST_CANCELED) { | 494 state != GoogleServiceAuthError::REQUEST_CANCELED) { |
445 // Invalidate OAuth token to force Gaia sign-in flow. This is needed | 495 // Invalidate OAuth token to force Gaia sign-in flow. This is needed |
446 // because sign-out/sign-in solution is suggested to the user. | 496 // because sign-out/sign-in solution is suggested to the user. |
447 // TODO(altimofeev): this code isn't needed after crosbug.com/25978 is | 497 // TODO(altimofeev): this code isn't needed after crosbug.com/25978 is |
448 // implemented. | 498 // implemented. |
(...skipping 28 matching lines...) Expand all Loading... |
477 bool UserManagerImpl::CanCurrentUserLock() const { | 527 bool UserManagerImpl::CanCurrentUserLock() const { |
478 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 528 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
479 return IsUserLoggedIn() && logged_in_user_->can_lock(); | 529 return IsUserLoggedIn() && logged_in_user_->can_lock(); |
480 } | 530 } |
481 | 531 |
482 bool UserManagerImpl::IsUserLoggedIn() const { | 532 bool UserManagerImpl::IsUserLoggedIn() const { |
483 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 533 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
484 return logged_in_user_; | 534 return logged_in_user_; |
485 } | 535 } |
486 | 536 |
| 537 bool UserManagerImpl::IsLoggedInAsRegularUser() const { |
| 538 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 539 return IsUserLoggedIn() && |
| 540 logged_in_user_->GetType() == User::USER_TYPE_REGULAR; |
| 541 } |
| 542 |
487 bool UserManagerImpl::IsLoggedInAsDemoUser() const { | 543 bool UserManagerImpl::IsLoggedInAsDemoUser() const { |
488 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 544 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
489 return IsUserLoggedIn() && | 545 return IsUserLoggedIn() && |
490 logged_in_user_->GetType() == User::USER_TYPE_RETAIL_MODE; | 546 logged_in_user_->GetType() == User::USER_TYPE_RETAIL_MODE; |
491 } | 547 } |
492 | 548 |
493 bool UserManagerImpl::IsLoggedInAsPublicAccount() const { | 549 bool UserManagerImpl::IsLoggedInAsPublicAccount() const { |
494 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 550 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
495 return IsUserLoggedIn() && | 551 return IsUserLoggedIn() && |
496 logged_in_user_->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT; | 552 logged_in_user_->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT; |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
546 } | 602 } |
547 | 603 |
548 void UserManagerImpl::NotifyLocalStateChanged() { | 604 void UserManagerImpl::NotifyLocalStateChanged() { |
549 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 605 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
550 FOR_EACH_OBSERVER(UserManager::Observer, observer_list_, | 606 FOR_EACH_OBSERVER(UserManager::Observer, observer_list_, |
551 LocalStateChanged(this)); | 607 LocalStateChanged(this)); |
552 } | 608 } |
553 | 609 |
554 void UserManagerImpl::EnsureUsersLoaded() { | 610 void UserManagerImpl::EnsureUsersLoaded() { |
555 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 611 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
556 if (!users_.empty()) | |
557 return; | |
558 if (!g_browser_process) | 612 if (!g_browser_process) |
559 return; | 613 return; |
560 | 614 |
| 615 if (users_loaded_) |
| 616 return; |
| 617 users_loaded_ = true; |
| 618 |
561 PrefService* local_state = g_browser_process->local_state(); | 619 PrefService* local_state = g_browser_process->local_state(); |
562 const ListValue* prefs_users = | 620 const ListValue* prefs_regular_users = local_state->GetList(kRegularUsers); |
563 local_state->GetList(kLoggedInUsers); | 621 const ListValue* prefs_public_accounts = |
| 622 local_state->GetList(kPublicAccounts); |
564 const DictionaryValue* prefs_display_names = | 623 const DictionaryValue* prefs_display_names = |
565 local_state->GetDictionary(kUserDisplayName); | 624 local_state->GetDictionary(kUserDisplayName); |
566 const DictionaryValue* prefs_display_emails = | 625 const DictionaryValue* prefs_display_emails = |
567 local_state->GetDictionary(kUserDisplayEmail); | 626 local_state->GetDictionary(kUserDisplayEmail); |
568 | 627 |
569 if (!prefs_users) | 628 // Load regular users. |
570 return; | 629 std::vector<std::string> regular_users; |
| 630 std::set<std::string> regular_users_set; |
| 631 ParseUserList(*prefs_regular_users, std::set<std::string>(), "", |
| 632 ®ular_users, ®ular_users_set); |
| 633 for (std::vector<std::string>::const_iterator it = regular_users.begin(); |
| 634 it != regular_users.end(); ++it) { |
| 635 User* user = User::CreateRegularUser(*it); |
| 636 user->set_oauth_token_status(LoadUserOAuthStatus(*it)); |
| 637 users_.push_back(user); |
571 | 638 |
572 for (ListValue::const_iterator it = prefs_users->begin(); | 639 string16 display_name; |
573 it != prefs_users->end(); ++it) { | 640 if (prefs_display_names->GetStringWithoutPathExpansion(*it, |
574 std::string email; | 641 &display_name)) { |
575 if ((*it)->GetAsString(&email)) { | 642 user->set_display_name(display_name); |
576 User* user = User::CreateRegularUser(email); | 643 } |
577 user->set_oauth_token_status(LoadUserOAuthStatus(email)); | |
578 users_.push_back(user); | |
579 | 644 |
580 string16 display_name; | 645 std::string display_email; |
581 if (prefs_display_names && | 646 if (prefs_display_emails->GetStringWithoutPathExpansion(*it, |
582 prefs_display_names->GetStringWithoutPathExpansion( | 647 &display_email)) { |
583 email, &display_name)) { | 648 user->set_display_email(display_email); |
584 user->set_display_name(display_name); | 649 } |
585 } | 650 } |
586 | 651 |
587 std::string display_email; | 652 // Load public accounts. |
588 if (prefs_display_emails && | 653 std::vector<std::string> public_accounts; |
589 prefs_display_emails->GetStringWithoutPathExpansion( | 654 std::set<std::string> public_accounts_set; |
590 email, &display_email)) { | 655 ParseUserList(*prefs_public_accounts, regular_users_set, "", |
591 user->set_display_email(display_email); | 656 &public_accounts, &public_accounts_set); |
592 } | 657 for (std::vector<std::string>::const_iterator it = public_accounts.begin(); |
593 } | 658 it != public_accounts.end(); ++it) { |
| 659 users_.push_back(User::CreatePublicAccountUser(*it)); |
594 } | 660 } |
595 | 661 |
596 user_image_manager_->LoadUserImages(users_); | 662 user_image_manager_->LoadUserImages(users_); |
597 } | 663 } |
598 | 664 |
599 void UserManagerImpl::RetrieveTrustedDevicePolicies() { | 665 void UserManagerImpl::RetrieveTrustedDevicePolicies() { |
600 ephemeral_users_enabled_ = false; | 666 ephemeral_users_enabled_ = false; |
601 owner_email_ = ""; | 667 owner_email_ = ""; |
602 | 668 |
603 CrosSettings* cros_settings = CrosSettings::Get(); | |
604 // Schedule a callback if device policy has not yet been verified. | 669 // Schedule a callback if device policy has not yet been verified. |
605 if (CrosSettingsProvider::TRUSTED != cros_settings->PrepareTrustedValues( | 670 if (CrosSettingsProvider::TRUSTED != cros_settings_->PrepareTrustedValues( |
606 base::Bind(&UserManagerImpl::RetrieveTrustedDevicePolicies, | 671 base::Bind(&UserManagerImpl::RetrieveTrustedDevicePolicies, |
607 base::Unretained(this)))) { | 672 base::Unretained(this)))) { |
608 return; | 673 return; |
609 } | 674 } |
610 | 675 |
611 cros_settings->GetBoolean(kAccountsPrefEphemeralUsersEnabled, | 676 cros_settings_->GetBoolean(kAccountsPrefEphemeralUsersEnabled, |
612 &ephemeral_users_enabled_); | 677 &ephemeral_users_enabled_); |
613 cros_settings->GetString(kDeviceOwner, &owner_email_); | 678 cros_settings_->GetString(kDeviceOwner, &owner_email_); |
| 679 const base::ListValue* public_accounts; |
| 680 cros_settings_->GetList(kAccountsPrefDeviceLocalAccounts, &public_accounts); |
| 681 |
| 682 EnsureUsersLoaded(); |
| 683 |
| 684 bool changed = UpdateAndCleanUpPublicAccounts(*public_accounts); |
614 | 685 |
615 // If ephemeral users are enabled and we are on the login screen, take this | 686 // If ephemeral users are enabled and we are on the login screen, take this |
616 // opportunity to clean up by removing all users except the owner. | 687 // opportunity to clean up by removing all regular users except the owner. |
617 if (ephemeral_users_enabled_ && !IsUserLoggedIn()) { | 688 if (ephemeral_users_enabled_ && !IsUserLoggedIn()) { |
618 scoped_ptr<base::ListValue> users( | 689 ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
619 g_browser_process->local_state()->GetList(kLoggedInUsers)->DeepCopy()); | 690 kRegularUsers); |
620 | 691 prefs_users_update->Clear(); |
621 bool changed = false; | 692 for (UserList::iterator it = users_.begin(); it != users_.end(); ) { |
622 for (base::ListValue::const_iterator user = users->begin(); | 693 const std::string user_email = (*it)->email(); |
623 user != users->end(); ++user) { | 694 if ((*it)->GetType() == User::USER_TYPE_REGULAR && |
624 std::string user_email; | 695 user_email != owner_email_) { |
625 (*user)->GetAsString(&user_email); | 696 RemoveNonCryptohomeData(user_email); |
626 if (user_email != owner_email_) { | 697 delete *it; |
627 RemoveUserFromListInternal(user_email); | 698 it = users_.erase(it); |
628 changed = true; | 699 changed = true; |
| 700 } else { |
| 701 prefs_users_update->Append(new base::StringValue(user_email)); |
| 702 ++it; |
629 } | 703 } |
630 } | 704 } |
| 705 } |
631 | 706 |
632 if (changed) { | 707 if (changed) { |
633 content::NotificationService::current()->Notify( | 708 content::NotificationService::current()->Notify( |
634 chrome::NOTIFICATION_POLICY_USER_LIST_CHANGED, | 709 chrome::NOTIFICATION_POLICY_USER_LIST_CHANGED, |
635 content::Source<UserManager>(this), | 710 content::Source<UserManager>(this), |
636 content::NotificationService::NoDetails()); | 711 content::NotificationService::NoDetails()); |
637 } | |
638 } | 712 } |
| 713 |
| 714 cros_settings_->AddSettingsObserver(kAccountsPrefDeviceLocalAccounts, |
| 715 this); |
639 } | 716 } |
640 | 717 |
641 bool UserManagerImpl::AreEphemeralUsersEnabled() const { | 718 bool UserManagerImpl::AreEphemeralUsersEnabled() const { |
642 return ephemeral_users_enabled_ && | 719 return ephemeral_users_enabled_ && |
643 (g_browser_process->browser_policy_connector()->IsEnterpriseManaged() || | 720 (g_browser_process->browser_policy_connector()->IsEnterpriseManaged() || |
644 !owner_email_.empty()); | 721 !owner_email_.empty()); |
645 } | 722 } |
646 | 723 |
647 const User* UserManagerImpl::FindUserInList(const std::string& email) const { | 724 const User* UserManagerImpl::FindUserInList(const std::string& email) const { |
648 const UserList& users = GetUsers(); | 725 const UserList& users = GetUsers(); |
(...skipping 25 matching lines...) Expand all Loading... |
674 | 751 |
675 SetCurrentUserIsOwner(is_owner); | 752 SetCurrentUserIsOwner(is_owner); |
676 } | 753 } |
677 | 754 |
678 void UserManagerImpl::CheckOwnership() { | 755 void UserManagerImpl::CheckOwnership() { |
679 DeviceSettingsService::Get()->GetOwnershipStatusAsync( | 756 DeviceSettingsService::Get()->GetOwnershipStatusAsync( |
680 base::Bind(&UserManagerImpl::UpdateOwnership, | 757 base::Bind(&UserManagerImpl::UpdateOwnership, |
681 base::Unretained(this))); | 758 base::Unretained(this))); |
682 } | 759 } |
683 | 760 |
684 void UserManagerImpl::RemoveUserFromListInternal(const std::string& email) { | 761 void UserManagerImpl::RemoveNonCryptohomeData(const std::string& email) { |
685 // Clear the prefs view of the users. | 762 WallpaperManager::Get()->RemoveUserWallpaperInfo(email); |
| 763 user_image_manager_->DeleteUserImage(email); |
| 764 |
686 PrefService* prefs = g_browser_process->local_state(); | 765 PrefService* prefs = g_browser_process->local_state(); |
687 ListPrefUpdate prefs_users_update(prefs, kLoggedInUsers); | |
688 prefs_users_update->Clear(); | |
689 | |
690 UserList::iterator user_to_remove = users_.end(); | |
691 for (UserList::iterator it = users_.begin(); it != users_.end(); ++it) { | |
692 std::string user_email = (*it)->email(); | |
693 // Skip user that we would like to delete. | |
694 if (email != user_email) | |
695 prefs_users_update->Append(new base::StringValue(user_email)); | |
696 else | |
697 user_to_remove = it; | |
698 } | |
699 | |
700 WallpaperManager::Get()->RemoveUserWallpaperInfo(email); | |
701 | |
702 DictionaryPrefUpdate prefs_oauth_update(prefs, kUserOAuthTokenStatus); | 766 DictionaryPrefUpdate prefs_oauth_update(prefs, kUserOAuthTokenStatus); |
703 int oauth_status; | 767 int oauth_status; |
704 prefs_oauth_update->GetIntegerWithoutPathExpansion(email, &oauth_status); | 768 prefs_oauth_update->GetIntegerWithoutPathExpansion(email, &oauth_status); |
705 prefs_oauth_update->RemoveWithoutPathExpansion(email, NULL); | 769 prefs_oauth_update->RemoveWithoutPathExpansion(email, NULL); |
706 | 770 |
707 DictionaryPrefUpdate prefs_display_name_update(prefs, kUserDisplayName); | 771 DictionaryPrefUpdate prefs_display_name_update(prefs, kUserDisplayName); |
708 prefs_display_name_update->RemoveWithoutPathExpansion(email, NULL); | 772 prefs_display_name_update->RemoveWithoutPathExpansion(email, NULL); |
709 | 773 |
710 DictionaryPrefUpdate prefs_display_email_update(prefs, kUserDisplayEmail); | 774 DictionaryPrefUpdate prefs_display_email_update(prefs, kUserDisplayEmail); |
711 prefs_display_email_update->RemoveWithoutPathExpansion(email, NULL); | 775 prefs_display_email_update->RemoveWithoutPathExpansion(email, NULL); |
| 776 } |
712 | 777 |
713 if (user_to_remove != users_.end()) { | 778 User *UserManagerImpl::RemoveRegularUserFromList(const std::string& email) { |
714 delete *user_to_remove; | 779 ListPrefUpdate prefs_users_update(g_browser_process->local_state(), |
715 users_.erase(user_to_remove); | 780 kRegularUsers); |
| 781 prefs_users_update->Clear(); |
| 782 User* user = NULL; |
| 783 for (UserList::iterator it = users_.begin(); it != users_.end(); ) { |
| 784 const std::string user_email = (*it)->email(); |
| 785 if (user_email == email) { |
| 786 user = *it; |
| 787 it = users_.erase(it); |
| 788 } else { |
| 789 if ((*it)->GetType() == User::USER_TYPE_REGULAR) |
| 790 prefs_users_update->Append(new base::StringValue(user_email)); |
| 791 ++it; |
| 792 } |
716 } | 793 } |
| 794 return user; |
| 795 } |
| 796 |
| 797 bool UserManagerImpl::UpdateAndCleanUpPublicAccounts( |
| 798 const base::ListValue& public_accounts) { |
| 799 PrefService* local_state = g_browser_process->local_state(); |
| 800 |
| 801 // Determine the currently logged-in user's email. |
| 802 std::string logged_in_user_email; |
| 803 if (IsUserLoggedIn()) |
| 804 logged_in_user_email = GetLoggedInUser()->email(); |
| 805 |
| 806 // If there is a public account whose data is pending removal and the user is |
| 807 // not currently logged in with that account, take this opportunity to remove |
| 808 // the data. |
| 809 std::string public_account_pending_data_removal = |
| 810 local_state->GetString(kPublicAccountPendingDataRemoval); |
| 811 if (!public_account_pending_data_removal.empty() && |
| 812 public_account_pending_data_removal != logged_in_user_email) { |
| 813 RemoveNonCryptohomeData(public_account_pending_data_removal); |
| 814 local_state->ClearPref(kPublicAccountPendingDataRemoval); |
| 815 } |
| 816 |
| 817 // Split the current user list public accounts and regular users. |
| 818 std::vector<std::string> old_public_accounts; |
| 819 std::set<std::string> regular_users; |
| 820 for (UserList::const_iterator it = users_.begin(); it != users_.end(); ++it) { |
| 821 if ((*it)->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT) |
| 822 old_public_accounts.push_back((*it)->email()); |
| 823 else |
| 824 regular_users.insert((*it)->email()); |
| 825 } |
| 826 |
| 827 // Get the new list of public accounts from policy. |
| 828 std::vector<std::string> new_public_accounts; |
| 829 std::set<std::string> new_public_accounts_set; |
| 830 if (!ParseUserList(public_accounts, regular_users, logged_in_user_email, |
| 831 &new_public_accounts, &new_public_accounts_set) && |
| 832 IsUserLoggedIn()) { |
| 833 User* user = GetLoggedInUser(); |
| 834 // If the user is currently logged into a public account that has been |
| 835 // removed from the list, mark the account's data as pending removal after |
| 836 // logout. |
| 837 if (user->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT) { |
| 838 local_state->SetString(kPublicAccountPendingDataRemoval, |
| 839 logged_in_user_email); |
| 840 } |
| 841 } |
| 842 |
| 843 // Persist the new list of public accounts in a pref. |
| 844 ListPrefUpdate prefs_public_accounts_update(local_state, kPublicAccounts); |
| 845 scoped_ptr<base::ListValue> prefs_public_accounts(public_accounts.DeepCopy()); |
| 846 prefs_public_accounts_update->Swap(prefs_public_accounts.get()); |
| 847 |
| 848 // If the list of public accounts has not changed, return. |
| 849 if (new_public_accounts.size() == old_public_accounts.size()) { |
| 850 bool changed = false; |
| 851 for (size_t i = 0; i < new_public_accounts.size(); ++i) { |
| 852 if (new_public_accounts[i] != old_public_accounts[i]) { |
| 853 changed = true; |
| 854 break; |
| 855 } |
| 856 } |
| 857 if (!changed) |
| 858 return false; |
| 859 } |
| 860 |
| 861 // Remove the old public accounts from the user list. |
| 862 for (UserList::iterator it = users_.begin(); it != users_.end(); ) { |
| 863 if ((*it)->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT) { |
| 864 delete *it; |
| 865 it = users_.erase(it); |
| 866 } else { |
| 867 ++it; |
| 868 } |
| 869 } |
| 870 |
| 871 // Add the new public accounts to the front of the user list. |
| 872 for (std::vector<std::string>::const_reverse_iterator |
| 873 it = new_public_accounts.rbegin(); |
| 874 it != new_public_accounts.rend(); ++it) { |
| 875 users_.insert(users_.begin(), User::CreatePublicAccountUser(*it)); |
| 876 } |
| 877 |
| 878 user_image_manager_->LoadUserImages( |
| 879 UserList(users_.begin(), users_.begin() + new_public_accounts.size())); |
| 880 |
| 881 return true; |
717 } | 882 } |
718 | 883 |
719 } // namespace chromeos | 884 } // namespace chromeos |
OLD | NEW |