signin_screen_handler.cc revision 68043e1e95eeb07d5cae7aca370b26518b0867d6
1// Copyright (c) 2013 The Chromium Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5#include "chrome/browser/ui/webui/chromeos/login/signin_screen_handler.h" 6 7#include "base/callback.h" 8#include "base/chromeos/chromeos_version.h" 9#include "base/command_line.h" 10#include "base/debug/trace_event.h" 11#include "base/logging.h" 12#include "base/memory/scoped_ptr.h" 13#include "base/metrics/histogram.h" 14#include "base/prefs/pref_registry_simple.h" 15#include "base/prefs/pref_service.h" 16#include "base/strings/string16.h" 17#include "base/strings/string_util.h" 18#include "base/strings/stringprintf.h" 19#include "base/strings/utf_string_conversions.h" 20#include "chrome/browser/browser_process.h" 21#include "chrome/browser/browser_process_platform_part_chromeos.h" 22#include "chrome/browser/browser_shutdown.h" 23#include "chrome/browser/chrome_notification_types.h" 24#include "chrome/browser/chromeos/app_mode/kiosk_app_manager.h" 25#include "chrome/browser/chromeos/input_method/input_method_util.h" 26#include "chrome/browser/chromeos/kiosk_mode/kiosk_mode_settings.h" 27#include "chrome/browser/chromeos/login/hwid_checker.h" 28#include "chrome/browser/chromeos/login/login_display_host_impl.h" 29#include "chrome/browser/chromeos/login/screen_locker.h" 30#include "chrome/browser/chromeos/login/screens/core_oobe_actor.h" 31#include "chrome/browser/chromeos/login/user.h" 32#include "chrome/browser/chromeos/login/webui_login_display.h" 33#include "chrome/browser/chromeos/login/wizard_controller.h" 34#include "chrome/browser/chromeos/net/network_portal_detector.h" 35#include "chrome/browser/chromeos/profiles/profile_helper.h" 36#include "chrome/browser/chromeos/settings/cros_settings.h" 37#include "chrome/browser/io_thread.h" 38#include "chrome/browser/policy/browser_policy_connector.h" 39#include "chrome/browser/prefs/scoped_user_pref_update.h" 40#include "chrome/browser/profiles/profile.h" 41#include "chrome/browser/ui/webui/chromeos/login/error_screen_handler.h" 42#include "chrome/browser/ui/webui/chromeos/login/native_window_delegate.h" 43#include "chrome/browser/ui/webui/chromeos/login/network_state_informer.h" 44#include "chrome/browser/ui/webui/chromeos/login/oobe_ui.h" 45#include "chrome/common/chrome_switches.h" 46#include "chrome/common/pref_names.h" 47#include "chrome/common/url_constants.h" 48#include "chromeos/chromeos_switches.h" 49#include "chromeos/dbus/dbus_thread_manager.h" 50#include "chromeos/dbus/power_manager_client.h" 51#include "chromeos/ime/input_method_manager.h" 52#include "chromeos/ime/xkeyboard.h" 53#include "chromeos/network/network_state.h" 54#include "chromeos/network/network_state_handler.h" 55#include "content/public/browser/render_view_host.h" 56#include "content/public/browser/web_contents.h" 57#include "google_apis/gaia/gaia_auth_util.h" 58#include "google_apis/gaia/gaia_switches.h" 59#include "google_apis/gaia/gaia_urls.h" 60#include "grit/chromium_strings.h" 61#include "grit/generated_resources.h" 62#include "third_party/cros_system_api/dbus/service_constants.h" 63#include "ui/base/l10n/l10n_util.h" 64 65#if defined(USE_AURA) 66#include "ash/shell.h" 67#include "ash/wm/lock_state_controller.h" 68#endif 69 70using content::BrowserThread; 71using content::RenderViewHost; 72 73namespace { 74 75// User dictionary keys. 76const char kKeyUsername[] = "username"; 77const char kKeyDisplayName[] = "displayName"; 78const char kKeyEmailAddress[] = "emailAddress"; 79const char kKeyEnterpriseDomain[] = "enterpriseDomain"; 80const char kKeyPublicAccount[] = "publicAccount"; 81const char kKeyLocallyManagedUser[] = "locallyManagedUser"; 82const char kKeySignedIn[] = "signedIn"; 83const char kKeyCanRemove[] = "canRemove"; 84const char kKeyIsOwner[] = "isOwner"; 85const char kKeyOauthTokenStatus[] = "oauthTokenStatus"; 86 87// Max number of users to show. 88const size_t kMaxUsers = 18; 89 90// Timeout to delay first notification about offline state for a 91// current network. 92const int kOfflineTimeoutSec = 5; 93 94// Timeout used to prevent infinite connecting to a flaky network. 95const int kConnectingTimeoutSec = 60; 96 97// Type of the login screen UI that is currently presented to user. 98const char kSourceGaiaSignin[] = "gaia-signin"; 99const char kSourceAccountPicker[] = "account-picker"; 100 101// The Task posted to PostTaskAndReply in StartClearingDnsCache on the IO 102// thread. 103void ClearDnsCache(IOThread* io_thread) { 104 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 105 if (browser_shutdown::IsTryingToQuit()) 106 return; 107 108 io_thread->ClearHostCache(); 109} 110 111static bool Contains(const std::vector<std::string>& container, 112 const std::string& value) { 113 return std::find(container.begin(), container.end(), value) != 114 container.end(); 115} 116 117} // namespace 118 119namespace chromeos { 120 121namespace { 122 123const char kNetworkStateOffline[] = "offline"; 124const char kNetworkStateOnline[] = "online"; 125const char kNetworkStateCaptivePortal[] = "behind captive portal"; 126const char kNetworkStateConnecting[] = "connecting"; 127const char kNetworkStateProxyAuthRequired[] = "proxy auth required"; 128 129const char kErrorReasonProxyAuthCancelled[] = "proxy auth cancelled"; 130const char kErrorReasonProxyAuthSupplied[] = "proxy auth supplied"; 131const char kErrorReasonProxyConnectionFailed[] = "proxy connection failed"; 132const char kErrorReasonProxyConfigChanged[] = "proxy config changed"; 133const char kErrorReasonLoadingTimeout[] = "loading timeout"; 134const char kErrorReasonPortalDetected[] = "portal detected"; 135const char kErrorReasonNetworkStateChanged[] = "network state changed"; 136const char kErrorReasonUpdate[] = "update"; 137const char kErrorReasonFrameError[] = "frame error"; 138 139const char* NetworkStateStatusString(NetworkStateInformer::State state) { 140 switch (state) { 141 case NetworkStateInformer::OFFLINE: 142 return kNetworkStateOffline; 143 case NetworkStateInformer::ONLINE: 144 return kNetworkStateOnline; 145 case NetworkStateInformer::CAPTIVE_PORTAL: 146 return kNetworkStateCaptivePortal; 147 case NetworkStateInformer::CONNECTING: 148 return kNetworkStateConnecting; 149 case NetworkStateInformer::PROXY_AUTH_REQUIRED: 150 return kNetworkStateProxyAuthRequired; 151 default: 152 NOTREACHED(); 153 return NULL; 154 } 155} 156 157const char* ErrorReasonString(ErrorScreenActor::ErrorReason reason) { 158 switch (reason) { 159 case ErrorScreenActor::ERROR_REASON_PROXY_AUTH_CANCELLED: 160 return kErrorReasonProxyAuthCancelled; 161 case ErrorScreenActor::ERROR_REASON_PROXY_AUTH_SUPPLIED: 162 return kErrorReasonProxyAuthSupplied; 163 case ErrorScreenActor::ERROR_REASON_PROXY_CONNECTION_FAILED: 164 return kErrorReasonProxyConnectionFailed; 165 case ErrorScreenActor::ERROR_REASON_PROXY_CONFIG_CHANGED: 166 return kErrorReasonProxyConfigChanged; 167 case ErrorScreenActor::ERROR_REASON_LOADING_TIMEOUT: 168 return kErrorReasonLoadingTimeout; 169 case ErrorScreenActor::ERROR_REASON_PORTAL_DETECTED: 170 return kErrorReasonPortalDetected; 171 case ErrorScreenActor::ERROR_REASON_NETWORK_STATE_CHANGED: 172 return kErrorReasonNetworkStateChanged; 173 case ErrorScreenActor::ERROR_REASON_UPDATE: 174 return kErrorReasonUpdate; 175 case ErrorScreenActor::ERROR_REASON_FRAME_ERROR: 176 return kErrorReasonFrameError; 177 default: 178 NOTREACHED(); 179 return NULL; 180 } 181} 182 183// Updates params dictionary passed to the auth extension with related 184// preferences from CrosSettings. 185void UpdateAuthParamsFromSettings(DictionaryValue* params, 186 const CrosSettings* cros_settings) { 187 bool allow_new_user = true; 188 cros_settings->GetBoolean(kAccountsPrefAllowNewUser, &allow_new_user); 189 bool allow_guest = true; 190 cros_settings->GetBoolean(kAccountsPrefAllowGuest, &allow_guest); 191 // Account creation depends on Guest sign-in (http://crosbug.com/24570). 192 params->SetBoolean("createAccount", allow_new_user && allow_guest); 193 params->SetBoolean("guestSignin", allow_guest); 194} 195 196bool IsOnline(NetworkStateInformer::State state, 197 ErrorScreenActor::ErrorReason reason) { 198 return state == NetworkStateInformer::ONLINE && 199 reason != ErrorScreenActor::ERROR_REASON_PORTAL_DETECTED && 200 reason != ErrorScreenActor::ERROR_REASON_LOADING_TIMEOUT; 201} 202 203bool IsUnderCaptivePortal(NetworkStateInformer::State state, 204 ErrorScreenActor::ErrorReason reason) { 205 return state == NetworkStateInformer::CAPTIVE_PORTAL || 206 reason == ErrorScreenActor::ERROR_REASON_PORTAL_DETECTED; 207} 208 209bool IsProxyError(NetworkStateInformer::State state, 210 ErrorScreenActor::ErrorReason reason, 211 net::Error frame_error) { 212 return state == NetworkStateInformer::PROXY_AUTH_REQUIRED || 213 reason == ErrorScreenActor::ERROR_REASON_PROXY_AUTH_CANCELLED || 214 reason == ErrorScreenActor::ERROR_REASON_PROXY_CONNECTION_FAILED || 215 (reason == ErrorScreenActor::ERROR_REASON_FRAME_ERROR && 216 (frame_error == net::ERR_PROXY_CONNECTION_FAILED || 217 frame_error == net::ERR_TUNNEL_CONNECTION_FAILED)); 218} 219 220bool IsSigninScreen(const OobeUI::Screen screen) { 221 return screen == OobeUI::SCREEN_GAIA_SIGNIN || 222 screen == OobeUI::SCREEN_ACCOUNT_PICKER; 223} 224 225bool IsSigninScreenError(ErrorScreen::ErrorState error_state) { 226 return error_state == ErrorScreen::ERROR_STATE_PORTAL || 227 error_state == ErrorScreen::ERROR_STATE_OFFLINE || 228 error_state == ErrorScreen::ERROR_STATE_PROXY || 229 error_state == ErrorScreen::ERROR_STATE_AUTH_EXT_TIMEOUT; 230} 231 232// Returns network name by service path. 233std::string GetNetworkName(const std::string& service_path) { 234 const NetworkState* network = NetworkHandler::Get()->network_state_handler()-> 235 GetNetworkState(service_path); 236 if (!network) 237 return std::string(); 238 return network->name(); 239} 240 241// Returns captive portal state for a network by its service path. 242NetworkPortalDetector::CaptivePortalState GetCaptivePortalState( 243 const std::string& service_path) { 244 NetworkPortalDetector* detector = NetworkPortalDetector::GetInstance(); 245 const NetworkState* network = NetworkHandler::Get()->network_state_handler()-> 246 GetNetworkState(service_path); 247 if (!detector || !network) 248 return NetworkPortalDetector::CaptivePortalState(); 249 return detector->GetCaptivePortalState(network); 250} 251 252void RecordDiscrepancyWithShill( 253 const NetworkState* network, 254 const NetworkPortalDetector::CaptivePortalStatus status) { 255 if (network->connection_state() == shill::kStateOnline) { 256 UMA_HISTOGRAM_ENUMERATION( 257 "CaptivePortal.OOBE.DiscrepancyWithShill_Online", 258 status, 259 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_COUNT); 260 } else if (network->connection_state() == shill::kStatePortal) { 261 UMA_HISTOGRAM_ENUMERATION( 262 "CaptivePortal.OOBE.DiscrepancyWithShill_RestrictedPool", 263 status, 264 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_COUNT); 265 } else { 266 UMA_HISTOGRAM_ENUMERATION( 267 "CaptivePortal.OOBE.DiscrepancyWithShill_Offline", 268 status, 269 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_COUNT); 270 } 271} 272 273// Record state and descripancies with shill (e.g. shill thinks that 274// network is online but NetworkPortalDetector claims that it's behind 275// portal) for the network identified by |service_path|. 276void RecordNetworkPortalDetectorStats(const std::string& service_path) { 277 const NetworkState* network = NetworkHandler::Get()->network_state_handler()-> 278 GetNetworkState(service_path); 279 if (!network) 280 return; 281 NetworkPortalDetector::CaptivePortalState state = 282 GetCaptivePortalState(service_path); 283 if (state.status == NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_UNKNOWN) 284 return; 285 286 UMA_HISTOGRAM_ENUMERATION("CaptivePortal.OOBE.DetectionResult", 287 state.status, 288 NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_COUNT); 289 290 switch (state.status) { 291 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_UNKNOWN: 292 NOTREACHED(); 293 break; 294 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_OFFLINE: 295 if (network->connection_state() == shill::kStateOnline || 296 network->connection_state() == shill::kStatePortal) 297 RecordDiscrepancyWithShill(network, state.status); 298 break; 299 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_ONLINE: 300 if (network->connection_state() != shill::kStateOnline) 301 RecordDiscrepancyWithShill(network, state.status); 302 break; 303 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PORTAL: 304 if (network->connection_state() != shill::kStatePortal) 305 RecordDiscrepancyWithShill(network, state.status); 306 break; 307 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_PROXY_AUTH_REQUIRED: 308 if (network->connection_state() != shill::kStateOnline) 309 RecordDiscrepancyWithShill(network, state.status); 310 break; 311 case NetworkPortalDetector::CAPTIVE_PORTAL_STATUS_COUNT: 312 NOTREACHED(); 313 break; 314 } 315} 316 317static bool SetUserInputMethodImpl( 318 const std::string& username, 319 chromeos::input_method::InputMethodManager* manager) { 320 PrefService* const local_state = g_browser_process->local_state(); 321 322 const base::DictionaryValue* users_lru_input_methods = 323 local_state->GetDictionary(prefs::kUsersLRUInputMethod); 324 325 if (users_lru_input_methods == NULL) { 326 DLOG(WARNING) << "SetUserInputMethod('" << username 327 << "'): no kUsersLRUInputMethod"; 328 return false; 329 } 330 331 std::string input_method; 332 333 if (!users_lru_input_methods->GetStringWithoutPathExpansion(username, 334 &input_method)) { 335 DLOG(INFO) << "SetUserInputMethod('" << username 336 << "'): no input method for this user"; 337 return false; 338 } 339 340 if (input_method.empty()) 341 return false; 342 343 if (!manager->IsLoginKeyboard(input_method)) { 344 LOG(WARNING) << "SetUserInputMethod('" << username 345 << "'): stored user LRU input method '" << input_method 346 << "' is no longer Full Latin Keyboard Language" 347 << " (entry dropped). Use hardware default instead."; 348 349 DictionaryPrefUpdate updater(local_state, prefs::kUsersLRUInputMethod); 350 351 base::DictionaryValue* const users_lru_input_methods = updater.Get(); 352 if (users_lru_input_methods != NULL) { 353 users_lru_input_methods->SetStringWithoutPathExpansion(username, ""); 354 } 355 return false; 356 } 357 358 if (!Contains(manager->GetActiveInputMethodIds(), input_method)) { 359 if (!manager->EnableInputMethod(input_method)) { 360 DLOG(ERROR) << "SigninScreenHandler::SetUserInputMethod('" << username 361 << "'): user input method '" << input_method 362 << "' is not enabled and enabling failed (ignored!)."; 363 } 364 } 365 manager->ChangeInputMethod(input_method); 366 367 return true; 368} 369 370} // namespace 371 372// SigninScreenHandler implementation ------------------------------------------ 373 374SigninScreenHandler::SigninScreenHandler( 375 const scoped_refptr<NetworkStateInformer>& network_state_informer, 376 ErrorScreenActor* error_screen_actor, 377 CoreOobeActor* core_oobe_actor) 378 : ui_state_(UI_STATE_UNKNOWN), 379 frame_state_(FRAME_STATE_UNKNOWN), 380 frame_error_(net::OK), 381 delegate_(NULL), 382 native_window_delegate_(NULL), 383 show_on_init_(false), 384 oobe_ui_(false), 385 focus_stolen_(false), 386 gaia_silent_load_(false), 387 is_account_picker_showing_first_time_(false), 388 dns_cleared_(false), 389 dns_clear_task_running_(false), 390 cookies_cleared_(false), 391 network_state_informer_(network_state_informer), 392 test_expects_complete_login_(false), 393 weak_factory_(this), 394 webui_visible_(false), 395 preferences_changed_delayed_(false), 396 error_screen_actor_(error_screen_actor), 397 core_oobe_actor_(core_oobe_actor), 398 is_first_update_state_call_(true), 399 offline_login_active_(false), 400 last_network_state_(NetworkStateInformer::UNKNOWN), 401 has_pending_auth_ui_(false) { 402 DCHECK(network_state_informer_.get()); 403 DCHECK(error_screen_actor_); 404 DCHECK(core_oobe_actor_); 405 network_state_informer_->AddObserver(this); 406 allow_new_user_subscription_ = CrosSettings::Get()->AddSettingsObserver( 407 kAccountsPrefAllowNewUser, 408 base::Bind(&SigninScreenHandler::UserSettingsChanged, 409 base::Unretained(this))); 410 allow_guest_subscription_ = CrosSettings::Get()->AddSettingsObserver( 411 kAccountsPrefAllowGuest, 412 base::Bind(&SigninScreenHandler::UserSettingsChanged, 413 base::Unretained(this))); 414 415 registrar_.Add(this, 416 chrome::NOTIFICATION_AUTH_NEEDED, 417 content::NotificationService::AllSources()); 418 registrar_.Add(this, 419 chrome::NOTIFICATION_AUTH_SUPPLIED, 420 content::NotificationService::AllSources()); 421 registrar_.Add(this, 422 chrome::NOTIFICATION_AUTH_CANCELLED, 423 content::NotificationService::AllSources()); 424} 425 426SigninScreenHandler::~SigninScreenHandler() { 427 weak_factory_.InvalidateWeakPtrs(); 428 SystemKeyEventListener* key_event_listener = 429 SystemKeyEventListener::GetInstance(); 430 if (key_event_listener) 431 key_event_listener->RemoveCapsLockObserver(this); 432 if (delegate_) 433 delegate_->SetWebUIHandler(NULL); 434 network_state_informer_->RemoveObserver(this); 435} 436 437void SigninScreenHandler::DeclareLocalizedValues( 438 LocalizedValuesBuilder* builder) { 439 builder->Add("signinScreenTitle", IDS_SIGNIN_SCREEN_TITLE); 440 builder->Add("signinScreenPasswordChanged", 441 IDS_SIGNIN_SCREEN_PASSWORD_CHANGED); 442 builder->Add("passwordHint", IDS_LOGIN_POD_EMPTY_PASSWORD_TEXT); 443 builder->Add("podMenuButtonAccessibleName", 444 IDS_LOGIN_POD_MENU_BUTTON_ACCESSIBLE_NAME); 445 builder->Add("podMenuRemoveItemAccessibleName", 446 IDS_LOGIN_POD_MENU_REMOVE_ITEM_ACCESSIBLE_NAME); 447 builder->Add("passwordFieldAccessibleName", 448 IDS_LOGIN_POD_PASSWORD_FIELD_ACCESSIBLE_NAME); 449 builder->Add("signedIn", IDS_SCREEN_LOCK_ACTIVE_USER); 450 builder->Add("signinButton", IDS_LOGIN_BUTTON); 451 builder->Add("shutDown", IDS_SHUTDOWN_BUTTON); 452 builder->Add("addUser", IDS_ADD_USER_BUTTON); 453 builder->Add("browseAsGuest", IDS_GO_INCOGNITO_BUTTON); 454 builder->Add("cancel", IDS_CANCEL); 455 builder->Add("signOutUser", IDS_SCREEN_LOCK_SIGN_OUT); 456 builder->Add("createAccount", IDS_CREATE_ACCOUNT_HTML); 457 builder->Add("guestSignin", IDS_BROWSE_WITHOUT_SIGNING_IN_HTML); 458 builder->Add("createLocallyManagedUser", 459 IDS_CREATE_LOCALLY_MANAGED_USER_HTML); 460 builder->Add("createManagedUserFeatureName", 461 IDS_CREATE_LOCALLY_MANAGED_USER_FEATURE_NAME); 462 builder->Add("offlineLogin", IDS_OFFLINE_LOGIN_HTML); 463 builder->Add("ownerUserPattern", IDS_LOGIN_POD_OWNER_USER); 464 builder->Add("removeUser", IDS_LOGIN_POD_REMOVE_USER); 465 builder->Add("errorTpmFailureTitle", IDS_LOGIN_ERROR_TPM_FAILURE_TITLE); 466 builder->Add("errorTpmFailureReboot", IDS_LOGIN_ERROR_TPM_FAILURE_REBOOT); 467 builder->Add("errorTpmFailureRebootButton", 468 IDS_LOGIN_ERROR_TPM_FAILURE_REBOOT_BUTTON); 469 builder->Add( 470 "disabledAddUserTooltip", 471 g_browser_process->browser_policy_connector()->IsEnterpriseManaged() ? 472 IDS_DISABLED_ADD_USER_TOOLTIP_ENTERPRISE : 473 IDS_DISABLED_ADD_USER_TOOLTIP); 474 builder->Add("supervisedUserExpiredTokenWarning", 475 IDS_SUPERVISED_USER_EXPIRED_TOKEN_WARNING); 476 builder->Add("multiple-signin-banner-text", IDS_LOGIN_USER_ADDING_BANNER); 477 478 // Strings used by password changed dialog. 479 builder->Add("passwordChangedTitle", IDS_LOGIN_PASSWORD_CHANGED_TITLE); 480 builder->Add("passwordChangedDesc", IDS_LOGIN_PASSWORD_CHANGED_DESC); 481 builder->AddF("passwordChangedMoreInfo", 482 IDS_LOGIN_PASSWORD_CHANGED_MORE_INFO, 483 IDS_SHORT_PRODUCT_OS_NAME); 484 485 builder->Add("oldPasswordHint", IDS_LOGIN_PASSWORD_CHANGED_OLD_PASSWORD_HINT); 486 builder->Add("oldPasswordIncorrect", 487 IDS_LOGIN_PASSWORD_CHANGED_INCORRECT_OLD_PASSWORD); 488 builder->Add("passwordChangedCantRemember", 489 IDS_LOGIN_PASSWORD_CHANGED_CANT_REMEMBER); 490 builder->Add("passwordChangedBackButton", 491 IDS_LOGIN_PASSWORD_CHANGED_BACK_BUTTON); 492 builder->Add("passwordChangedsOkButton", IDS_OK); 493 builder->Add("passwordChangedProceedAnyway", 494 IDS_LOGIN_PASSWORD_CHANGED_PROCEED_ANYWAY); 495 builder->Add("proceedAnywayButton", 496 IDS_LOGIN_PASSWORD_CHANGED_PROCEED_ANYWAY_BUTTON); 497 builder->Add("publicAccountInfoFormat", IDS_LOGIN_PUBLIC_ACCOUNT_INFO_FORMAT); 498 builder->Add("publicAccountReminder", 499 IDS_LOGIN_PUBLIC_ACCOUNT_SIGNOUT_REMINDER); 500 builder->Add("publicAccountEnter", IDS_LOGIN_PUBLIC_ACCOUNT_ENTER); 501 builder->Add("publicAccountEnterAccessibleName", 502 IDS_LOGIN_PUBLIC_ACCOUNT_ENTER_ACCESSIBLE_NAME); 503 builder->AddF("removeUserWarningText", 504 IDS_LOGIN_POD_USER_REMOVE_WARNING, 505 UTF8ToUTF16(chrome::kSupervisedUserManagementDisplayURL)); 506 builder->Add("removeUserWarningButtonTitle", 507 IDS_LOGIN_POD_USER_REMOVE_WARNING_BUTTON); 508 509 // Strings used by confirm password dialog. 510 builder->Add("confirmPasswordTitle", IDS_LOGIN_CONFIRM_PASSWORD_TITLE); 511 builder->Add("confirmPasswordHint", IDS_LOGIN_CONFIRM_PASSWORD_HINT); 512 builder->Add("confirmPasswordConfirmButton", 513 IDS_LOGIN_CONFIRM_PASSWORD_CONFIRM_BUTTON); 514 515 // Strings used by no password warning dialog. 516 builder->Add("noPasswordWarningTitle", IDS_LOGIN_NO_PASSWORD_WARNING_TITLE); 517 builder->Add("noPasswordWarningBody", IDS_LOGIN_NO_PASSWORD_WARNING); 518 builder->Add("noPasswordWarningOkButton", 519 IDS_LOGIN_NO_PASSWORD_WARNING_DISMISS_BUTTON); 520 521 if (chromeos::KioskModeSettings::Get()->IsKioskModeEnabled()) 522 builder->Add("demoLoginMessage", IDS_KIOSK_MODE_LOGIN_MESSAGE); 523} 524 525void SigninScreenHandler::Show(bool oobe_ui) { 526 CHECK(delegate_); 527 oobe_ui_ = oobe_ui; 528 if (!page_is_ready()) { 529 show_on_init_ = true; 530 return; 531 } 532 533 if (oobe_ui) { 534 // Shows new user sign-in for OOBE. 535 HandleShowAddUser(NULL); 536 } else { 537 // Populates account picker. Animation is turned off for now until we 538 // figure out how to make it fast enough. 539 SendUserList(false); 540 541 // Reset Caps Lock state when login screen is shown. 542 input_method::InputMethodManager::Get()->GetXKeyboard()-> 543 SetCapsLockEnabled(false); 544 545 DictionaryValue params; 546 params.SetBoolean("disableAddUser", AllWhitelistedUsersPresent()); 547 UpdateUIState(UI_STATE_ACCOUNT_PICKER, ¶ms); 548 } 549} 550 551void SigninScreenHandler::ShowRetailModeLoginSpinner() { 552 CallJS("showLoginSpinner"); 553} 554 555void SigninScreenHandler::SetDelegate(SigninScreenHandlerDelegate* delegate) { 556 delegate_ = delegate; 557 if (delegate_) 558 delegate_->SetWebUIHandler(this); 559} 560 561void SigninScreenHandler::SetNativeWindowDelegate( 562 NativeWindowDelegate* native_window_delegate) { 563 native_window_delegate_ = native_window_delegate; 564} 565 566void SigninScreenHandler::OnNetworkReady() { 567 MaybePreloadAuthExtension(); 568} 569 570void SigninScreenHandler::UpdateState(ErrorScreenActor::ErrorReason reason) { 571 UpdateStateInternal(reason, false); 572} 573 574// SigninScreenHandler, private: ----------------------------------------------- 575 576void SigninScreenHandler::UpdateUIState(UIState ui_state, 577 DictionaryValue* params) { 578 switch (ui_state) { 579 case UI_STATE_GAIA_SIGNIN: 580 ui_state_ = UI_STATE_GAIA_SIGNIN; 581 ShowScreen(OobeUI::kScreenGaiaSignin, params); 582 break; 583 case UI_STATE_ACCOUNT_PICKER: 584 ui_state_ = UI_STATE_ACCOUNT_PICKER; 585 ShowScreen(OobeUI::kScreenAccountPicker, params); 586 break; 587 default: 588 NOTREACHED(); 589 break; 590 } 591} 592 593// TODO (ygorshenin@): split this method into small parts. 594void SigninScreenHandler::UpdateStateInternal( 595 ErrorScreenActor::ErrorReason reason, 596 bool force_update) { 597 // Do nothing once user has signed in or sign in is in progress. 598 // TODO(ygorshenin): We will end up here when processing network state 599 // notification but no ShowSigninScreen() was called so delegate_ will be 600 // NULL. Network state processing logic does not belong here. 601 if (delegate_ && 602 (delegate_->IsUserSigninCompleted() || delegate_->IsSigninInProgress())) { 603 return; 604 } 605 606 NetworkStateInformer::State state = network_state_informer_->state(); 607 const std::string network_path = network_state_informer_->network_path(); 608 const std::string network_name = GetNetworkName(network_path); 609 610 // Skip "update" notification about OFFLINE state from 611 // NetworkStateInformer if previous notification already was 612 // delayed. 613 if ((state == NetworkStateInformer::OFFLINE || has_pending_auth_ui_) && 614 !force_update && 615 !update_state_closure_.IsCancelled()) { 616 return; 617 } 618 619 // TODO (ygorshenin@): switch log level to INFO once signin screen 620 // will be tested well. 621 LOG(WARNING) << "SigninScreenHandler::UpdateStateInternal(): " 622 << "state=" << NetworkStateStatusString(state) << ", " 623 << "network_name=" << network_name << ", " 624 << "reason=" << ErrorReasonString(reason) << ", " 625 << "force_update=" << force_update; 626 update_state_closure_.Cancel(); 627 628 if ((state == NetworkStateInformer::OFFLINE && !force_update) || 629 has_pending_auth_ui_) { 630 update_state_closure_.Reset( 631 base::Bind( 632 &SigninScreenHandler::UpdateStateInternal, 633 weak_factory_.GetWeakPtr(), reason, true)); 634 base::MessageLoop::current()->PostDelayedTask( 635 FROM_HERE, 636 update_state_closure_.callback(), 637 base::TimeDelta::FromSeconds(kOfflineTimeoutSec)); 638 return; 639 } 640 641 // Don't show or hide error screen if we're in connecting state. 642 if (state == NetworkStateInformer::CONNECTING && !force_update) { 643 if (connecting_closure_.IsCancelled()) { 644 // First notification about CONNECTING state. 645 connecting_closure_.Reset( 646 base::Bind(&SigninScreenHandler::UpdateStateInternal, 647 weak_factory_.GetWeakPtr(), reason, true)); 648 base::MessageLoop::current()->PostDelayedTask( 649 FROM_HERE, 650 connecting_closure_.callback(), 651 base::TimeDelta::FromSeconds(kConnectingTimeoutSec)); 652 } 653 return; 654 } 655 connecting_closure_.Cancel(); 656 657 const bool is_online = IsOnline(state, reason); 658 const bool is_under_captive_portal = IsUnderCaptivePortal(state, reason); 659 const bool is_gaia_loading_timeout = 660 (reason == ErrorScreenActor::ERROR_REASON_LOADING_TIMEOUT); 661 const bool is_gaia_error = frame_error_ != net::OK && 662 frame_error_ != net::ERR_NETWORK_CHANGED; 663 const bool is_gaia_signin = IsGaiaVisible() || IsGaiaHiddenByError(); 664 const bool error_screen_should_overlay = 665 !offline_login_active_ && IsGaiaVisible(); 666 const bool from_not_online_to_online_transition = 667 is_online && last_network_state_ != NetworkStateInformer::ONLINE; 668 last_network_state_ = state; 669 670 if (is_online || !is_under_captive_portal) 671 error_screen_actor_->HideCaptivePortal(); 672 673 // Hide offline message (if needed) and return if current screen is 674 // not a Gaia frame. 675 if (!is_gaia_signin) { 676 if (!IsSigninScreenHiddenByError()) 677 HideOfflineMessage(state, reason); 678 return; 679 } 680 681 // Reload frame if network state is changed from {!ONLINE} -> ONLINE state. 682 if (reason == ErrorScreenActor::ERROR_REASON_NETWORK_STATE_CHANGED && 683 from_not_online_to_online_transition) { 684 // Schedules a immediate retry. 685 LOG(WARNING) << "Retry page load since network has been changed."; 686 ReloadGaiaScreen(); 687 } 688 689 if (reason == ErrorScreenActor::ERROR_REASON_PROXY_CONFIG_CHANGED && 690 error_screen_should_overlay) { 691 // Schedules a immediate retry. 692 LOG(WARNING) << "Retry page load since proxy settings has been changed."; 693 ReloadGaiaScreen(); 694 } 695 696 if (reason == ErrorScreenActor::ERROR_REASON_FRAME_ERROR && 697 !IsProxyError(state, reason, frame_error_)) { 698 LOG(WARNING) << "Retry page load due to reason: " 699 << ErrorReasonString(reason); 700 ReloadGaiaScreen(); 701 } 702 703 if ((!is_online || is_gaia_loading_timeout || is_gaia_error) && 704 !offline_login_active_) { 705 SetupAndShowOfflineMessage(state, reason); 706 } else { 707 HideOfflineMessage(state, reason); 708 } 709} 710 711void SigninScreenHandler::SetupAndShowOfflineMessage( 712 NetworkStateInformer:: State state, 713 ErrorScreenActor::ErrorReason reason) { 714 const std::string network_path = network_state_informer_->network_path(); 715 const bool is_under_captive_portal = IsUnderCaptivePortal(state, reason); 716 const bool is_proxy_error = IsProxyError(state, reason, frame_error_); 717 const bool is_gaia_loading_timeout = 718 (reason == ErrorScreenActor::ERROR_REASON_LOADING_TIMEOUT); 719 720 // Record portal detection stats only if we're going to show or 721 // change state of the error screen. 722 RecordNetworkPortalDetectorStats(network_path); 723 724 if (is_proxy_error) { 725 error_screen_actor_->SetErrorState(ErrorScreen::ERROR_STATE_PROXY, 726 std::string()); 727 } else if (is_under_captive_portal) { 728 // Do not bother a user with obsessive captive portal showing. This 729 // check makes captive portal being shown only once: either when error 730 // screen is shown for the first time or when switching from another 731 // error screen (offline, proxy). 732 if (IsGaiaVisible() || 733 (error_screen_actor_->error_state() != 734 ErrorScreen::ERROR_STATE_PORTAL)) { 735 error_screen_actor_->FixCaptivePortal(); 736 } 737 const std::string network_name = GetNetworkName(network_path); 738 error_screen_actor_->SetErrorState(ErrorScreen::ERROR_STATE_PORTAL, 739 network_name); 740 } else if (is_gaia_loading_timeout) { 741 error_screen_actor_->SetErrorState( 742 ErrorScreen::ERROR_STATE_AUTH_EXT_TIMEOUT, std::string()); 743 } else { 744 error_screen_actor_->SetErrorState(ErrorScreen::ERROR_STATE_OFFLINE, 745 std::string()); 746 } 747 748 const bool guest_signin_allowed = IsGuestSigninAllowed() && 749 IsSigninScreenError(error_screen_actor_->error_state()); 750 error_screen_actor_->AllowGuestSignin(guest_signin_allowed); 751 752 const bool offline_login_allowed = IsOfflineLoginAllowed() && 753 IsSigninScreenError(error_screen_actor_->error_state()) && 754 error_screen_actor_->error_state() != 755 ErrorScreen::ERROR_STATE_AUTH_EXT_TIMEOUT; 756 error_screen_actor_->AllowOfflineLogin(offline_login_allowed); 757 758 if (GetCurrentScreen() != OobeUI::SCREEN_ERROR_MESSAGE) { 759 DictionaryValue params; 760 const std::string network_type = network_state_informer_->network_type(); 761 params.SetString("lastNetworkType", network_type); 762 error_screen_actor_->SetUIState(ErrorScreen::UI_STATE_SIGNIN); 763 error_screen_actor_->Show(OobeUI::SCREEN_GAIA_SIGNIN, ¶ms); 764 } 765} 766 767void SigninScreenHandler::HideOfflineMessage( 768 NetworkStateInformer::State state, 769 ErrorScreenActor::ErrorReason reason) { 770 if (!IsSigninScreenHiddenByError()) 771 return; 772 773 error_screen_actor_->Hide(); 774 775 // Forces a reload for Gaia screen on hiding error message. 776 if (IsGaiaVisible() || IsGaiaHiddenByError()) 777 ReloadGaiaScreen(); 778} 779 780void SigninScreenHandler::ReloadGaiaScreen() { 781 if (frame_state_ == FRAME_STATE_LOADING) 782 return; 783 NetworkStateInformer::State state = network_state_informer_->state(); 784 if (state != NetworkStateInformer::ONLINE) { 785 LOG(WARNING) << "Skipping reload of auth extension frame since " 786 << "network state=" << NetworkStateStatusString(state); 787 return; 788 } 789 LOG(WARNING) << "Reload auth extension frame."; 790 frame_state_ = FRAME_STATE_LOADING; 791 CallJS("login.GaiaSigninScreen.doReload"); 792} 793 794void SigninScreenHandler::Initialize() { 795 // If delegate_ is NULL here (e.g. WebUIScreenLocker has been destroyed), 796 // don't do anything, just return. 797 if (!delegate_) 798 return; 799 800 // Register for Caps Lock state change notifications; 801 SystemKeyEventListener* key_event_listener = 802 SystemKeyEventListener::GetInstance(); 803 if (key_event_listener) 804 key_event_listener->AddCapsLockObserver(this); 805 806 if (show_on_init_) { 807 show_on_init_ = false; 808 Show(oobe_ui_); 809 } 810} 811 812gfx::NativeWindow SigninScreenHandler::GetNativeWindow() { 813 if (native_window_delegate_) 814 return native_window_delegate_->GetNativeWindow(); 815 return NULL; 816} 817 818void SigninScreenHandler::RegisterMessages() { 819 AddCallback("authenticateUser", &SigninScreenHandler::HandleAuthenticateUser); 820 AddCallback("completeLogin", &SigninScreenHandler::HandleCompleteLogin); 821 AddCallback("completeAuthentication", 822 &SigninScreenHandler::HandleCompleteAuthentication); 823 AddCallback("getUsers", &SigninScreenHandler::HandleGetUsers); 824 AddCallback("launchDemoUser", &SigninScreenHandler::HandleLaunchDemoUser); 825 AddCallback("launchIncognito", &SigninScreenHandler::HandleLaunchIncognito); 826 AddCallback("showLocallyManagedUserCreationScreen", 827 &SigninScreenHandler::HandleShowLocallyManagedUserCreationScreen); 828 AddCallback("launchPublicAccount", 829 &SigninScreenHandler::HandleLaunchPublicAccount); 830 AddRawCallback("offlineLogin", &SigninScreenHandler::HandleOfflineLogin); 831 AddCallback("rebootSystem", &SigninScreenHandler::HandleRebootSystem); 832 AddRawCallback("showAddUser", &SigninScreenHandler::HandleShowAddUser); 833 AddCallback("shutdownSystem", &SigninScreenHandler::HandleShutdownSystem); 834 AddCallback("loadWallpaper", &SigninScreenHandler::HandleLoadWallpaper); 835 AddCallback("removeUser", &SigninScreenHandler::HandleRemoveUser); 836 AddCallback("toggleEnrollmentScreen", 837 &SigninScreenHandler::HandleToggleEnrollmentScreen); 838 AddCallback("toggleKioskEnableScreen", 839 &SigninScreenHandler::HandleToggleKioskEnableScreen); 840 AddCallback("toggleResetScreen", 841 &SigninScreenHandler::HandleToggleResetScreen); 842 AddCallback("launchHelpApp", &SigninScreenHandler::HandleLaunchHelpApp); 843 AddCallback("createAccount", &SigninScreenHandler::HandleCreateAccount); 844 AddCallback("accountPickerReady", 845 &SigninScreenHandler::HandleAccountPickerReady); 846 AddCallback("wallpaperReady", &SigninScreenHandler::HandleWallpaperReady); 847 AddCallback("loginWebuiReady", &SigninScreenHandler::HandleLoginWebuiReady); 848 AddCallback("signOutUser", &SigninScreenHandler::HandleSignOutUser); 849 AddCallback("networkErrorShown", 850 &SigninScreenHandler::HandleNetworkErrorShown); 851 AddCallback("openProxySettings", 852 &SigninScreenHandler::HandleOpenProxySettings); 853 AddCallback("loginVisible", &SigninScreenHandler::HandleLoginVisible); 854 AddCallback("cancelPasswordChangedFlow", 855 &SigninScreenHandler::HandleCancelPasswordChangedFlow); 856 AddCallback("cancelUserAdding", 857 &SigninScreenHandler::HandleCancelUserAdding); 858 AddCallback("migrateUserData", &SigninScreenHandler::HandleMigrateUserData); 859 AddCallback("resyncUserData", &SigninScreenHandler::HandleResyncUserData); 860 AddCallback("loginUIStateChanged", 861 &SigninScreenHandler::HandleLoginUIStateChanged); 862 AddCallback("unlockOnLoginSuccess", 863 &SigninScreenHandler::HandleUnlockOnLoginSuccess); 864 AddCallback("frameLoadingCompleted", 865 &SigninScreenHandler::HandleFrameLoadingCompleted); 866 AddCallback("showLoadingTimeoutError", 867 &SigninScreenHandler::HandleShowLoadingTimeoutError); 868 AddCallback("updateOfflineLogin", 869 &SigninScreenHandler::HandleUpdateOfflineLogin); 870 AddCallback("focusPod", &SigninScreenHandler::HandleFocusPod); 871 872 // This message is sent by the kiosk app menu, but is handled here 873 // so we can tell the delegate to launch the app. 874 AddCallback("launchKioskApp", &SigninScreenHandler::HandleLaunchKioskApp); 875} 876 877void SigninScreenHandler::RegisterPrefs(PrefRegistrySimple* registry) { 878 registry->RegisterDictionaryPref(prefs::kUsersLRUInputMethod); 879} 880 881void SigninScreenHandler::HandleGetUsers() { 882 SendUserList(false); 883} 884 885void SigninScreenHandler::ClearAndEnablePassword() { 886 core_oobe_actor_->ResetSignInUI(false); 887} 888 889void SigninScreenHandler::ClearUserPodPassword() { 890 core_oobe_actor_->ClearUserPodPassword(); 891} 892 893void SigninScreenHandler::RefocusCurrentPod() { 894 core_oobe_actor_->RefocusCurrentPod(); 895} 896 897void SigninScreenHandler::OnLoginSuccess(const std::string& username) { 898 core_oobe_actor_->OnLoginSuccess(username); 899} 900 901void SigninScreenHandler::OnUserRemoved(const std::string& username) { 902 SendUserList(false); 903} 904 905void SigninScreenHandler::OnUserImageChanged(const User& user) { 906 if (page_is_ready()) 907 CallJS("login.AccountPickerScreen.updateUserImage", user.email()); 908} 909 910void SigninScreenHandler::OnPreferencesChanged() { 911 // Make sure that one of the login UI is fully functional now, otherwise 912 // preferences update would be picked up next time it will be shown. 913 if (!webui_visible_) { 914 LOG(WARNING) << "Login UI is not active - postponed prefs change."; 915 preferences_changed_delayed_ = true; 916 return; 917 } 918 919 if (delegate_ && !delegate_->IsShowUsers()) { 920 HandleShowAddUser(NULL); 921 } else { 922 SendUserList(false); 923 UpdateUIState(UI_STATE_ACCOUNT_PICKER, NULL); 924 } 925 preferences_changed_delayed_ = false; 926} 927 928void SigninScreenHandler::ResetSigninScreenHandlerDelegate() { 929 SetDelegate(NULL); 930} 931 932void SigninScreenHandler::ShowError(int login_attempts, 933 const std::string& error_text, 934 const std::string& help_link_text, 935 HelpAppLauncher::HelpTopic help_topic_id) { 936 core_oobe_actor_->ShowSignInError(login_attempts, error_text, help_link_text, 937 help_topic_id); 938} 939 940void SigninScreenHandler::ShowErrorScreen(LoginDisplay::SigninError error_id) { 941 switch (error_id) { 942 case LoginDisplay::TPM_ERROR: 943 core_oobe_actor_->ShowTpmError(); 944 break; 945 default: 946 NOTREACHED() << "Unknown sign in error"; 947 break; 948 } 949} 950 951void SigninScreenHandler::ShowSigninUI(const std::string& email) { 952 core_oobe_actor_->ShowSignInUI(email); 953} 954 955void SigninScreenHandler::ShowGaiaPasswordChanged(const std::string& username) { 956 email_ = username; 957 password_changed_for_.insert(email_); 958 core_oobe_actor_->ShowSignInUI(email_); 959 CallJS("login.AccountPickerScreen.updateUserGaiaNeeded", email_); 960} 961 962void SigninScreenHandler::ShowPasswordChangedDialog(bool show_password_error) { 963 core_oobe_actor_->ShowPasswordChangedScreen(show_password_error); 964} 965 966void SigninScreenHandler::ShowSigninScreenForCreds( 967 const std::string& username, 968 const std::string& password) { 969 VLOG(2) << "ShowSigninScreenForCreds for user " << username 970 << ", frame_state=" << frame_state_; 971 972 test_user_ = username; 973 test_pass_ = password; 974 test_expects_complete_login_ = true; 975 976 // Submit login form for test if gaia is ready. If gaia is loading, login 977 // will be attempted in HandleLoginWebuiReady after gaia is ready. Otherwise, 978 // reload gaia then follow the loading case. 979 if (frame_state_ == FRAME_STATE_LOADED) 980 SubmitLoginFormForTest(); 981 else if (frame_state_ != FRAME_STATE_LOADING) 982 HandleShowAddUser(NULL); 983} 984 985void SigninScreenHandler::OnCookiesCleared(base::Closure on_clear_callback) { 986 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 987 cookies_cleared_ = true; 988 on_clear_callback.Run(); 989} 990 991void SigninScreenHandler::OnCapsLockChange(bool enabled) { 992 if (page_is_ready()) 993 CallJS("login.AccountPickerScreen.setCapsLockState", enabled); 994} 995 996void SigninScreenHandler::Observe(int type, 997 const content::NotificationSource& source, 998 const content::NotificationDetails& details) { 999 switch (type) { 1000 case chrome::NOTIFICATION_AUTH_NEEDED: { 1001 has_pending_auth_ui_ = true; 1002 break; 1003 } 1004 case chrome::NOTIFICATION_AUTH_SUPPLIED: 1005 has_pending_auth_ui_ = false; 1006 if (IsSigninScreenHiddenByError()) { 1007 // Hide error screen and reload auth extension. 1008 HideOfflineMessage(network_state_informer_->state(), 1009 ErrorScreenActor::ERROR_REASON_PROXY_AUTH_SUPPLIED); 1010 } else if (ui_state_ == UI_STATE_GAIA_SIGNIN) { 1011 // Reload auth extension as proxy credentials are supplied. 1012 ReloadGaiaScreen(); 1013 } 1014 break; 1015 case chrome::NOTIFICATION_AUTH_CANCELLED: { 1016 // Don't reload auth extension if proxy auth dialog was cancelled. 1017 has_pending_auth_ui_ = false; 1018 break; 1019 } 1020 default: 1021 NOTREACHED() << "Unexpected notification " << type; 1022 } 1023} 1024 1025void SigninScreenHandler::OnDnsCleared() { 1026 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 1027 dns_clear_task_running_ = false; 1028 dns_cleared_ = true; 1029 ShowSigninScreenIfReady(); 1030} 1031 1032// Update keyboard layout to least recently used by the user. 1033void SigninScreenHandler::SetUserInputMethod(const std::string& username) { 1034 UserManager* user_manager = UserManager::Get(); 1035 if (user_manager->IsUserLoggedIn()) { 1036 // We are on sign-in screen inside user session (adding new user to 1037 // the session or on lock screen), don't switch input methods in this case. 1038 // TODO(dpolukhin): adding user and sign-in should be consistent 1039 // crbug.com/292774 1040 return; 1041 } 1042 1043 chromeos::input_method::InputMethodManager* const manager = 1044 chromeos::input_method::InputMethodManager::Get(); 1045 1046 const bool succeed = SetUserInputMethodImpl(username, manager); 1047 1048 // This is also a case when LRU layout is set only for a few local users, 1049 // thus others need to be switched to default locale. 1050 // Otherwise they will end up using another user's locale to log in. 1051 if (!succeed) { 1052 DLOG(INFO) << "SetUserInputMethod('" << username 1053 << "'): failed to set user layout. Switching to default."; 1054 1055 manager->SetInputMethodDefault(); 1056 } 1057} 1058 1059void SigninScreenHandler::ShowSigninScreenIfReady() { 1060 if (!dns_cleared_ || !cookies_cleared_ || !delegate_) 1061 return; 1062 1063 std::string active_network_path = network_state_informer_->network_path(); 1064 if (gaia_silent_load_ && 1065 (network_state_informer_->state() != NetworkStateInformer::ONLINE || 1066 gaia_silent_load_network_ != active_network_path)) { 1067 // Network has changed. Force Gaia reload. 1068 gaia_silent_load_ = false; 1069 // Gaia page will be realoded, so focus isn't stolen anymore. 1070 focus_stolen_ = false; 1071 } 1072 1073 // Note that LoadAuthExtension clears |email_|. 1074 if (email_.empty()) 1075 delegate_->LoadSigninWallpaper(); 1076 else 1077 delegate_->LoadWallpaper(email_); 1078 1079 // Set Least Recently Used input method for the user. 1080 if (!email_.empty()) 1081 SetUserInputMethod(email_); 1082 1083 LoadAuthExtension(!gaia_silent_load_, false, false); 1084 UpdateUIState(UI_STATE_GAIA_SIGNIN, NULL); 1085 1086 if (gaia_silent_load_) { 1087 // The variable is assigned to false because silently loaded Gaia page was 1088 // used. 1089 gaia_silent_load_ = false; 1090 if (focus_stolen_) 1091 HandleLoginWebuiReady(); 1092 } 1093 1094 UpdateState(ErrorScreenActor::ERROR_REASON_UPDATE); 1095} 1096 1097 1098void SigninScreenHandler::UpdateAuthParams(DictionaryValue* params) { 1099 if (!delegate_) 1100 return; 1101 1102 UpdateAuthParamsFromSettings(params, CrosSettings::Get()); 1103 1104 // Allow locally managed user creation only if: 1105 // 1. Enterprise managed device > is allowed by policy. 1106 // 2. Consumer device > owner exists. 1107 // 3. New users are allowed by owner. 1108 1109 CrosSettings* cros_settings = CrosSettings::Get(); 1110 bool allow_new_user = false; 1111 cros_settings->GetBoolean(kAccountsPrefAllowNewUser, &allow_new_user); 1112 1113 bool managed_users_allowed = 1114 UserManager::Get()->AreLocallyManagedUsersAllowed(); 1115 bool managed_users_can_create = true; 1116 int message_id = -1; 1117 if (delegate_->GetUsers().size() == 0) { 1118 managed_users_can_create = false; 1119 message_id = IDS_CREATE_LOCALLY_MANAGED_USER_NO_MANAGER_TEXT; 1120 } 1121 if (!allow_new_user) { 1122 managed_users_can_create = false; 1123 message_id = IDS_CREATE_LOCALLY_MANAGED_USER_CREATION_RESTRICTED_TEXT; 1124 } 1125 1126 params->SetBoolean("managedUsersEnabled", managed_users_allowed); 1127 params->SetBoolean("managedUsersCanCreate", managed_users_can_create); 1128 if (!managed_users_can_create) { 1129 params->SetString("managedUsersRestrictionReason", 1130 l10n_util::GetStringUTF16(message_id)); 1131 } 1132} 1133 1134void SigninScreenHandler::LoadAuthExtension( 1135 bool force, bool silent_load, bool offline) { 1136 DictionaryValue params; 1137 1138 params.SetBoolean("forceReload", force); 1139 params.SetBoolean("silentLoad", silent_load); 1140 params.SetBoolean("isLocal", offline); 1141 params.SetBoolean("passwordChanged", 1142 !email_.empty() && password_changed_for_.count(email_)); 1143 if (delegate_) 1144 params.SetBoolean("isShowUsers", delegate_->IsShowUsers()); 1145 params.SetBoolean("useOffline", offline); 1146 params.SetString("email", email_); 1147 email_.clear(); 1148 1149 UpdateAuthParams(¶ms); 1150 1151 if (!offline) { 1152 const std::string app_locale = g_browser_process->GetApplicationLocale(); 1153 if (!app_locale.empty()) 1154 params.SetString("hl", app_locale); 1155 } else { 1156 base::DictionaryValue *localized_strings = new base::DictionaryValue(); 1157 localized_strings->SetString("stringEmail", 1158 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_EMAIL)); 1159 localized_strings->SetString("stringPassword", 1160 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_PASSWORD)); 1161 localized_strings->SetString("stringSignIn", 1162 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_SIGNIN)); 1163 localized_strings->SetString("stringEmptyEmail", 1164 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_EMPTY_EMAIL)); 1165 localized_strings->SetString("stringEmptyPassword", 1166 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_EMPTY_PASSWORD)); 1167 localized_strings->SetString("stringError", 1168 l10n_util::GetStringUTF16(IDS_LOGIN_OFFLINE_ERROR)); 1169 params.Set("localizedStrings", localized_strings); 1170 } 1171 1172 const GURL gaia_url = 1173 CommandLine::ForCurrentProcess()->HasSwitch(::switches::kGaiaUrl) ? 1174 GURL(CommandLine::ForCurrentProcess()->GetSwitchValueASCII( 1175 ::switches::kGaiaUrl)) : 1176 GaiaUrls::GetInstance()->gaia_url(); 1177 params.SetString("gaiaUrl", gaia_url.spec()); 1178 1179 frame_state_ = FRAME_STATE_LOADING; 1180 CallJS("login.GaiaSigninScreen.loadAuthExtension", params); 1181} 1182 1183void SigninScreenHandler::UserSettingsChanged() { 1184 UpdateAuthExtension(); 1185 UpdateAddButtonStatus(); 1186} 1187 1188void SigninScreenHandler::UpdateAuthExtension() { 1189 DictionaryValue params; 1190 UpdateAuthParams(¶ms); 1191 CallJS("login.GaiaSigninScreen.updateAuthExtension", params); 1192} 1193 1194void SigninScreenHandler::UpdateAddButtonStatus() { 1195 CallJS("cr.ui.login.DisplayManager.updateAddUserButtonStatus", 1196 AllWhitelistedUsersPresent()); 1197} 1198 1199void SigninScreenHandler::HandleCompleteLogin(const std::string& typed_email, 1200 const std::string& password) { 1201 if (!delegate_) 1202 return; 1203 const std::string sanitized_email = gaia::SanitizeEmail(typed_email); 1204 delegate_->SetDisplayEmail(sanitized_email); 1205 delegate_->CompleteLogin(UserContext(sanitized_email, 1206 password, 1207 std::string())); // auth_code 1208 1209 if (test_expects_complete_login_) { 1210 VLOG(2) << "Complete test login for " << typed_email 1211 << ", requested=" << test_user_; 1212 1213 test_expects_complete_login_ = false; 1214 test_user_.clear(); 1215 test_pass_.clear(); 1216 } 1217} 1218 1219void SigninScreenHandler::HandleCompleteAuthentication( 1220 const std::string& email, 1221 const std::string& password, 1222 const std::string& auth_code) { 1223 if (!delegate_) 1224 return; 1225 const std::string sanitized_email = gaia::SanitizeEmail(email); 1226 delegate_->SetDisplayEmail(sanitized_email); 1227 delegate_->CompleteLogin(UserContext(sanitized_email, password, auth_code)); 1228} 1229 1230void SigninScreenHandler::HandleAuthenticateUser(const std::string& username, 1231 const std::string& password) { 1232 if (!delegate_) 1233 return; 1234 delegate_->Login(UserContext(gaia::SanitizeEmail(username), 1235 password, 1236 std::string())); // auth_code 1237} 1238 1239void SigninScreenHandler::HandleLaunchDemoUser() { 1240 if (delegate_) 1241 delegate_->LoginAsRetailModeUser(); 1242} 1243 1244void SigninScreenHandler::HandleLaunchIncognito() { 1245 if (delegate_) 1246 delegate_->LoginAsGuest(); 1247} 1248 1249void SigninScreenHandler::HandleShowLocallyManagedUserCreationScreen() { 1250 if (!UserManager::Get()->AreLocallyManagedUsersAllowed()) { 1251 LOG(ERROR) << "Managed users not allowed."; 1252 return; 1253 } 1254 scoped_ptr<DictionaryValue> params(new DictionaryValue()); 1255 LoginDisplayHostImpl::default_host()-> 1256 StartWizard(WizardController::kLocallyManagedUserCreationScreenName, 1257 params.Pass()); 1258} 1259 1260void SigninScreenHandler::HandleLaunchPublicAccount( 1261 const std::string& username) { 1262 if (delegate_) 1263 delegate_->LoginAsPublicAccount(username); 1264} 1265 1266void SigninScreenHandler::HandleOfflineLogin(const base::ListValue* args) { 1267 if (!delegate_ || delegate_->IsShowUsers()) { 1268 NOTREACHED(); 1269 return; 1270 } 1271 if (!args->GetString(0, &email_)) 1272 email_.clear(); 1273 // Load auth extension. Parameters are: force reload, do not load extension in 1274 // background, use offline version. 1275 LoadAuthExtension(true, false, true); 1276 UpdateUIState(UI_STATE_GAIA_SIGNIN, NULL); 1277} 1278 1279void SigninScreenHandler::HandleShutdownSystem() { 1280 ash::Shell::GetInstance()->lock_state_controller()->RequestShutdown(); 1281} 1282 1283void SigninScreenHandler::HandleLoadWallpaper(const std::string& email) { 1284 if (delegate_) 1285 delegate_->LoadWallpaper(email); 1286} 1287 1288void SigninScreenHandler::HandleRebootSystem() { 1289 chromeos::DBusThreadManager::Get()->GetPowerManagerClient()->RequestRestart(); 1290} 1291 1292void SigninScreenHandler::HandleRemoveUser(const std::string& email) { 1293 if (!delegate_) 1294 return; 1295 delegate_->RemoveUser(email); 1296 UpdateAddButtonStatus(); 1297} 1298 1299void SigninScreenHandler::HandleShowAddUser(const base::ListValue* args) { 1300 email_.clear(); 1301 // |args| can be null if it's OOBE. 1302 if (args) 1303 args->GetString(0, &email_); 1304 is_account_picker_showing_first_time_ = false; 1305 1306 if (gaia_silent_load_ && email_.empty()) { 1307 dns_cleared_ = true; 1308 cookies_cleared_ = true; 1309 ShowSigninScreenIfReady(); 1310 } else { 1311 StartClearingDnsCache(); 1312 StartClearingCookies(base::Bind( 1313 &SigninScreenHandler::ShowSigninScreenIfReady, 1314 weak_factory_.GetWeakPtr())); 1315 } 1316} 1317 1318void SigninScreenHandler::HandleToggleEnrollmentScreen() { 1319 if (delegate_) 1320 delegate_->ShowEnterpriseEnrollmentScreen(); 1321} 1322 1323void SigninScreenHandler::HandleToggleKioskEnableScreen() { 1324 if (delegate_ && 1325 !g_browser_process->browser_policy_connector()->IsEnterpriseManaged()) { 1326 delegate_->ShowKioskEnableScreen(); 1327 } 1328} 1329 1330void SigninScreenHandler::HandleToggleResetScreen() { 1331 if (delegate_ && 1332 !g_browser_process->browser_policy_connector()->IsEnterpriseManaged()) { 1333 delegate_->ShowResetScreen(); 1334 } 1335} 1336 1337void SigninScreenHandler::HandleToggleKioskAutolaunchScreen() { 1338 if (delegate_ && 1339 !g_browser_process->browser_policy_connector()->IsEnterpriseManaged()) { 1340 delegate_->ShowKioskAutolaunchScreen(); 1341 } 1342} 1343 1344void SigninScreenHandler::HandleLaunchHelpApp(double help_topic_id) { 1345 if (!delegate_) 1346 return; 1347 if (!help_app_.get()) 1348 help_app_ = new HelpAppLauncher(GetNativeWindow()); 1349 help_app_->ShowHelpTopic( 1350 static_cast<HelpAppLauncher::HelpTopic>(help_topic_id)); 1351} 1352 1353void SigninScreenHandler::FillUserDictionary(User* user, 1354 bool is_owner, 1355 DictionaryValue* user_dict) { 1356 const std::string& email = user->email(); 1357 bool is_public_account = 1358 user->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT; 1359 bool is_locally_managed_user = 1360 user->GetType() == User::USER_TYPE_LOCALLY_MANAGED; 1361 User::OAuthTokenStatus token_status = user->oauth_token_status(); 1362 1363 // If supervised user has unknown token status consider that as valid token. 1364 // It will be invalidated inside session in case it has been revoked. 1365 if (is_locally_managed_user && 1366 token_status == User::OAUTH_TOKEN_STATUS_UNKNOWN) { 1367 token_status = User::OAUTH2_TOKEN_STATUS_VALID; 1368 } 1369 1370 user_dict->SetString(kKeyUsername, email); 1371 user_dict->SetString(kKeyEmailAddress, user->display_email()); 1372 user_dict->SetString(kKeyDisplayName, user->GetDisplayName()); 1373 user_dict->SetBoolean(kKeyPublicAccount, is_public_account); 1374 user_dict->SetBoolean(kKeyLocallyManagedUser, is_locally_managed_user); 1375 user_dict->SetInteger(kKeyOauthTokenStatus, token_status); 1376 user_dict->SetBoolean(kKeySignedIn, user->is_logged_in()); 1377 user_dict->SetBoolean(kKeyIsOwner, is_owner); 1378 1379 if (is_public_account) { 1380 policy::BrowserPolicyConnector* policy_connector = 1381 g_browser_process->browser_policy_connector(); 1382 1383 if (policy_connector->IsEnterpriseManaged()) { 1384 user_dict->SetString(kKeyEnterpriseDomain, 1385 policy_connector->GetEnterpriseDomain()); 1386 } 1387 } 1388} 1389 1390void SigninScreenHandler::SendUserList(bool animated) { 1391 if (!delegate_) 1392 return; 1393 1394 size_t max_non_owner_users = kMaxUsers - 1; 1395 size_t non_owner_count = 0; 1396 1397 ListValue users_list; 1398 const UserList& users = delegate_->GetUsers(); 1399 1400 // TODO(nkostylev): Show optional intro dialog about multi-profiles feature 1401 // based on user preferences. http://crbug.com/230862 1402 1403 // TODO(nkostylev): Move to a separate method in UserManager. 1404 // http://crbug.com/230852 1405 bool is_signin_to_add = LoginDisplayHostImpl::default_host() && 1406 UserManager::Get()->IsUserLoggedIn(); 1407 1408 bool single_user = users.size() == 1; 1409 for (UserList::const_iterator it = users.begin(); it != users.end(); ++it) { 1410 const std::string& email = (*it)->email(); 1411 1412 std::string owner; 1413 chromeos::CrosSettings::Get()->GetString(chromeos::kDeviceOwner, &owner); 1414 bool is_owner = (email == owner); 1415 1416 if (non_owner_count < max_non_owner_users || is_owner) { 1417 DictionaryValue* user_dict = new DictionaryValue(); 1418 FillUserDictionary(*it, is_owner, user_dict); 1419 bool is_public_account = 1420 ((*it)->GetType() == User::USER_TYPE_PUBLIC_ACCOUNT); 1421 bool signed_in = (*it)->is_logged_in(); 1422 // Single user check here is necessary because owner info might not be 1423 // available when running into login screen on first boot. 1424 // See http://crosbug.com/12723 1425 user_dict->SetBoolean(kKeyCanRemove, 1426 !single_user && 1427 !email.empty() && 1428 !is_owner && 1429 !is_public_account && 1430 !signed_in && 1431 !is_signin_to_add); 1432 1433 users_list.Append(user_dict); 1434 if (!is_owner) 1435 ++non_owner_count; 1436 } 1437 } 1438 1439 CallJS("login.AccountPickerScreen.loadUsers", users_list, animated, 1440 delegate_->IsShowGuest()); 1441} 1442 1443void SigninScreenHandler::HandleAccountPickerReady() { 1444 LOG(INFO) << "Login WebUI >> AccountPickerReady"; 1445 1446 if (delegate_ && !ScreenLocker::default_screen_locker() && 1447 !chromeos::IsMachineHWIDCorrect() && 1448 !oobe_ui_) { 1449 delegate_->ShowWrongHWIDScreen(); 1450 return; 1451 } 1452 1453 PrefService* prefs = g_browser_process->local_state(); 1454 if (prefs->GetBoolean(prefs::kFactoryResetRequested)) { 1455 prefs->SetBoolean(prefs::kFactoryResetRequested, false); 1456 prefs->CommitPendingWrite(); 1457 HandleToggleResetScreen(); 1458 return; 1459 } 1460 1461 is_account_picker_showing_first_time_ = true; 1462 MaybePreloadAuthExtension(); 1463 1464 if (ScreenLocker::default_screen_locker()) 1465 ScreenLocker::default_screen_locker()->delegate()->OnLockWebUIReady(); 1466 1467 if (delegate_) 1468 delegate_->OnSigninScreenReady(); 1469} 1470 1471void SigninScreenHandler::HandleWallpaperReady() { 1472 if (ScreenLocker::default_screen_locker()) { 1473 ScreenLocker::default_screen_locker()->delegate()-> 1474 OnLockBackgroundDisplayed(); 1475 } 1476} 1477 1478void SigninScreenHandler::HandleLoginWebuiReady() { 1479 if (focus_stolen_) { 1480 // Set focus to the Gaia page. 1481 // TODO(altimofeev): temporary solution, until focus parameters are 1482 // implemented on the Gaia side. 1483 // Do this only once. Any subsequent call would relod GAIA frame. 1484 focus_stolen_ = false; 1485 const char code[] = "gWindowOnLoad();"; 1486 RenderViewHost* rvh = web_ui()->GetWebContents()->GetRenderViewHost(); 1487 rvh->ExecuteJavascriptInWebFrame( 1488 ASCIIToUTF16("//iframe[@id='signin-frame']\n//iframe"), 1489 ASCIIToUTF16(code)); 1490 } 1491 if (!gaia_silent_load_) { 1492 content::NotificationService::current()->Notify( 1493 chrome::NOTIFICATION_LOGIN_WEBUI_LOADED, 1494 content::NotificationService::AllSources(), 1495 content::NotificationService::NoDetails()); 1496 } else { 1497 focus_stolen_ = true; 1498 // Prevent focus stealing by the Gaia page. 1499 // TODO(altimofeev): temporary solution, until focus parameters are 1500 // implemented on the Gaia side. 1501 const char code[] = "var gWindowOnLoad = window.onload; " 1502 "window.onload=function() {};"; 1503 RenderViewHost* rvh = web_ui()->GetWebContents()->GetRenderViewHost(); 1504 rvh->ExecuteJavascriptInWebFrame( 1505 ASCIIToUTF16("//iframe[@id='signin-frame']\n//iframe"), 1506 ASCIIToUTF16(code)); 1507 // As we could miss and window.onload could already be called, restore 1508 // focus to current pod (see crbug/175243). 1509 RefocusCurrentPod(); 1510 } 1511 HandleFrameLoadingCompleted(0); 1512 1513 if (test_expects_complete_login_) 1514 SubmitLoginFormForTest(); 1515} 1516 1517void SigninScreenHandler::HandleSignOutUser() { 1518 if (delegate_) 1519 delegate_->Signout(); 1520} 1521 1522void SigninScreenHandler::HandleNetworkErrorShown() { 1523 content::NotificationService::current()->Notify( 1524 chrome::NOTIFICATION_LOGIN_NETWORK_ERROR_SHOWN, 1525 content::NotificationService::AllSources(), 1526 content::NotificationService::NoDetails()); 1527} 1528 1529void SigninScreenHandler::HandleCreateAccount() { 1530 if (delegate_) 1531 delegate_->CreateAccount(); 1532} 1533 1534void SigninScreenHandler::HandleOpenProxySettings() { 1535 LoginDisplayHostImpl::default_host()->OpenProxySettings(); 1536} 1537 1538void SigninScreenHandler::HandleLoginVisible(const std::string& source) { 1539 LOG(WARNING) << "Login WebUI >> loginVisible, src: " << source << ", " 1540 << "webui_visible_: " << webui_visible_; 1541 if (!webui_visible_) { 1542 // There might be multiple messages from OOBE UI so send notifications after 1543 // the first one only. 1544 content::NotificationService::current()->Notify( 1545 chrome::NOTIFICATION_LOGIN_OR_LOCK_WEBUI_VISIBLE, 1546 content::NotificationService::AllSources(), 1547 content::NotificationService::NoDetails()); 1548 TRACE_EVENT_ASYNC_END0( 1549 "ui", "ShowLoginWebUI", LoginDisplayHostImpl::kShowLoginWebUIid); 1550 } 1551 webui_visible_ = true; 1552 if (preferences_changed_delayed_) 1553 OnPreferencesChanged(); 1554} 1555 1556void SigninScreenHandler::HandleCancelPasswordChangedFlow() { 1557 StartClearingCookies(base::Bind( 1558 &SigninScreenHandler::CancelPasswordChangedFlowInternal, 1559 weak_factory_.GetWeakPtr())); 1560} 1561 1562void SigninScreenHandler::HandleCancelUserAdding() { 1563 if (delegate_) 1564 delegate_->CancelUserAdding(); 1565} 1566 1567void SigninScreenHandler::HandleMigrateUserData( 1568 const std::string& old_password) { 1569 if (delegate_) 1570 delegate_->MigrateUserData(old_password); 1571} 1572 1573void SigninScreenHandler::HandleResyncUserData() { 1574 if (delegate_) 1575 delegate_->ResyncUserData(); 1576} 1577 1578void SigninScreenHandler::HandleLoginUIStateChanged(const std::string& source, 1579 bool new_value) { 1580 LOG(INFO) << "Login WebUI >> active: " << new_value << ", " 1581 << "source: " << source; 1582 1583 if (!KioskAppManager::Get()->GetAutoLaunchApp().empty() && 1584 KioskAppManager::Get()->IsAutoLaunchRequested()) { 1585 LOG(INFO) << "Showing auto-launch warning"; 1586 HandleToggleKioskAutolaunchScreen(); 1587 return; 1588 } 1589 1590 if (source == kSourceGaiaSignin) { 1591 ui_state_ = UI_STATE_GAIA_SIGNIN; 1592 } else if (source == kSourceAccountPicker) { 1593 ui_state_ = UI_STATE_ACCOUNT_PICKER; 1594 } else { 1595 NOTREACHED(); 1596 return; 1597 } 1598} 1599 1600void SigninScreenHandler::HandleUnlockOnLoginSuccess() { 1601 DCHECK(UserManager::Get()->IsUserLoggedIn()); 1602 if (ScreenLocker::default_screen_locker()) 1603 ScreenLocker::default_screen_locker()->UnlockOnLoginSuccess(); 1604} 1605 1606void SigninScreenHandler::HandleFrameLoadingCompleted(int status) { 1607 const net::Error frame_error = static_cast<net::Error>(-status); 1608 if (frame_error == net::ERR_ABORTED) { 1609 LOG(WARNING) << "Ignore gaia frame error: " << frame_error; 1610 return; 1611 } 1612 frame_error_ = frame_error; 1613 if (frame_error == net::OK) { 1614 LOG(INFO) << "Gaia frame is loaded"; 1615 frame_state_ = FRAME_STATE_LOADED; 1616 } else { 1617 LOG(WARNING) << "Gaia frame error: " << frame_error_; 1618 frame_state_ = FRAME_STATE_ERROR; 1619 } 1620 1621 if (network_state_informer_->state() != NetworkStateInformer::ONLINE) 1622 return; 1623 if (frame_state_ == FRAME_STATE_LOADED) 1624 UpdateState(ErrorScreenActor::ERROR_REASON_UPDATE); 1625 else if (frame_state_ == FRAME_STATE_ERROR) 1626 UpdateState(ErrorScreenActor::ERROR_REASON_FRAME_ERROR); 1627} 1628 1629void SigninScreenHandler::HandleShowLoadingTimeoutError() { 1630 UpdateState(ErrorScreenActor::ERROR_REASON_LOADING_TIMEOUT); 1631} 1632 1633void SigninScreenHandler::HandleUpdateOfflineLogin(bool offline_login_active) { 1634 offline_login_active_ = offline_login_active; 1635} 1636 1637void SigninScreenHandler::HandleFocusPod(const std::string& user_id) { 1638 SetUserInputMethod(user_id); 1639} 1640 1641void SigninScreenHandler::HandleLaunchKioskApp(const std::string& app_id) { 1642 delegate_->LoginAsKioskApp(app_id); 1643} 1644 1645void SigninScreenHandler::StartClearingDnsCache() { 1646 if (dns_clear_task_running_ || !g_browser_process->io_thread()) 1647 return; 1648 1649 dns_cleared_ = false; 1650 BrowserThread::PostTaskAndReply( 1651 BrowserThread::IO, FROM_HERE, 1652 base::Bind(&ClearDnsCache, g_browser_process->io_thread()), 1653 base::Bind(&SigninScreenHandler::OnDnsCleared, 1654 weak_factory_.GetWeakPtr())); 1655 dns_clear_task_running_ = true; 1656} 1657 1658void SigninScreenHandler::StartClearingCookies( 1659 const base::Closure& on_clear_callback) { 1660 cookies_cleared_ = false; 1661 ProfileHelper* profile_helper = 1662 g_browser_process->platform_part()->profile_helper(); 1663 LOG_ASSERT( 1664 Profile::FromWebUI(web_ui()) == profile_helper->GetSigninProfile()); 1665 profile_helper->ClearSigninProfile(base::Bind( 1666 &SigninScreenHandler::OnCookiesCleared, 1667 weak_factory_.GetWeakPtr(), on_clear_callback)); 1668} 1669 1670void SigninScreenHandler::MaybePreloadAuthExtension() { 1671 // Fetching of the extension is not started before account picker page is 1672 // loaded because it can affect the loading speed. Also if cookies clearing 1673 // was initiated or |dns_clear_task_running_| then auth extension showing has 1674 // already been initiated and preloading is senseless. 1675 // Do not load the extension for the screen locker, see crosbug.com/25018. 1676 if (is_account_picker_showing_first_time_ && 1677 !gaia_silent_load_ && 1678 !ScreenLocker::default_screen_locker() && 1679 !cookies_cleared_ && 1680 !dns_clear_task_running_ && 1681 network_state_informer_->state() == NetworkStateInformer::ONLINE) { 1682 gaia_silent_load_ = true; 1683 gaia_silent_load_network_ = network_state_informer_->network_path(); 1684 LoadAuthExtension(true, true, false); 1685 } 1686} 1687 1688bool SigninScreenHandler::AllWhitelistedUsersPresent() { 1689 CrosSettings* cros_settings = CrosSettings::Get(); 1690 bool allow_new_user = false; 1691 cros_settings->GetBoolean(kAccountsPrefAllowNewUser, &allow_new_user); 1692 if (allow_new_user) 1693 return false; 1694 UserManager* user_manager = UserManager::Get(); 1695 const UserList& users = user_manager->GetUsers(); 1696 if (!delegate_ || users.size() > kMaxUsers) { 1697 return false; 1698 } 1699 const base::ListValue* whitelist = NULL; 1700 if (!cros_settings->GetList(kAccountsPrefUsers, &whitelist) || !whitelist) 1701 return false; 1702 for (size_t i = 0; i < whitelist->GetSize(); ++i) { 1703 std::string whitelisted_user; 1704 // NB: Wildcards in the whitelist are also detected as not present here. 1705 if (!whitelist->GetString(i, &whitelisted_user) || 1706 !user_manager->IsKnownUser(whitelisted_user)) { 1707 return false; 1708 } 1709 } 1710 return true; 1711} 1712 1713void SigninScreenHandler::CancelPasswordChangedFlowInternal() { 1714 if (delegate_) { 1715 Show(oobe_ui_); 1716 delegate_->CancelPasswordChangedFlow(); 1717 } 1718} 1719 1720OobeUI::Screen SigninScreenHandler::GetCurrentScreen() const { 1721 OobeUI::Screen screen = OobeUI::SCREEN_UNKNOWN; 1722 OobeUI* oobe_ui = static_cast<OobeUI*>(web_ui()->GetController()); 1723 if (oobe_ui) 1724 screen = oobe_ui->current_screen(); 1725 return screen; 1726} 1727 1728bool SigninScreenHandler::IsGaiaVisible() const { 1729 return IsSigninScreen(GetCurrentScreen()) && 1730 ui_state_ == UI_STATE_GAIA_SIGNIN; 1731} 1732 1733bool SigninScreenHandler::IsGaiaHiddenByError() const { 1734 return IsSigninScreenHiddenByError() && 1735 ui_state_ == UI_STATE_GAIA_SIGNIN; 1736} 1737 1738bool SigninScreenHandler::IsSigninScreenHiddenByError() const { 1739 return (GetCurrentScreen() == OobeUI::SCREEN_ERROR_MESSAGE) && 1740 (IsSigninScreen(error_screen_actor_->parent_screen())); 1741} 1742 1743bool SigninScreenHandler::IsGuestSigninAllowed() const { 1744 CrosSettings* cros_settings = CrosSettings::Get(); 1745 if (!cros_settings) 1746 return false; 1747 bool allow_guest; 1748 cros_settings->GetBoolean(kAccountsPrefAllowGuest, &allow_guest); 1749 return allow_guest; 1750} 1751 1752bool SigninScreenHandler::IsOfflineLoginAllowed() const { 1753 CrosSettings* cros_settings = CrosSettings::Get(); 1754 if (!cros_settings) 1755 return false; 1756 1757 // Offline login is allowed only when user pods are hidden. 1758 bool show_pods; 1759 cros_settings->GetBoolean(kAccountsPrefShowUserNamesOnSignIn, &show_pods); 1760 return !show_pods; 1761} 1762 1763void SigninScreenHandler::SubmitLoginFormForTest() { 1764 VLOG(2) << "Submit login form for test, user=" << test_user_; 1765 1766 std::string code; 1767 code += "document.getElementById('Email').value = '" + test_user_ + "';"; 1768 code += "document.getElementById('Passwd').value = '" + test_pass_ + "';"; 1769 code += "document.getElementById('signIn').click();"; 1770 1771 RenderViewHost* rvh = web_ui()->GetWebContents()->GetRenderViewHost(); 1772 rvh->ExecuteJavascriptInWebFrame( 1773 ASCIIToUTF16("//iframe[@id='signin-frame']\n//iframe"), 1774 ASCIIToUTF16(code)); 1775 1776 // Test properties are cleared in HandleCompleteLogin because the form 1777 // submission might fail and login will not be attempted after reloading 1778 // if they are cleared here. 1779} 1780 1781} // namespace chromeos 1782