| // Copyright 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/chromeos/app_mode/startup_app_launcher.h" |
| |
| #include "base/command_line.h" |
| #include "base/files/file_path.h" |
| #include "base/json/json_file_value_serializer.h" |
| #include "base/path_service.h" |
| #include "base/time/time.h" |
| #include "base/values.h" |
| #include "chrome/browser/chrome_notification_types.h" |
| #include "chrome/browser/chromeos/app_mode/app_session_lifetime.h" |
| #include "chrome/browser/chromeos/app_mode/kiosk_app_manager.h" |
| #include "chrome/browser/chromeos/login/user_manager.h" |
| #include "chrome/browser/extensions/extension_service.h" |
| #include "chrome/browser/extensions/extension_system.h" |
| #include "chrome/browser/extensions/webstore_startup_installer.h" |
| #include "chrome/browser/lifetime/application_lifetime.h" |
| #include "chrome/browser/signin/profile_oauth2_token_service.h" |
| #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" |
| #include "chrome/browser/ui/extensions/application_launch.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "content/public/browser/browser_thread.h" |
| #include "content/public/browser/notification_service.h" |
| #include "extensions/common/extension.h" |
| #include "extensions/common/manifest_handlers/kiosk_mode_info.h" |
| #include "google_apis/gaia/gaia_auth_consumer.h" |
| #include "google_apis/gaia/gaia_constants.h" |
| |
| using content::BrowserThread; |
| using extensions::Extension; |
| using extensions::WebstoreStartupInstaller; |
| |
| namespace chromeos { |
| |
| namespace { |
| |
| const char kOAuthRefreshToken[] = "refresh_token"; |
| const char kOAuthClientId[] = "client_id"; |
| const char kOAuthClientSecret[] = "client_secret"; |
| |
| const base::FilePath::CharType kOAuthFileName[] = |
| FILE_PATH_LITERAL("kiosk_auth"); |
| |
| bool IsAppInstalled(Profile* profile, const std::string& app_id) { |
| return extensions::ExtensionSystem::Get(profile)->extension_service()-> |
| GetInstalledExtension(app_id); |
| } |
| |
| } // namespace |
| |
| |
| StartupAppLauncher::StartupAppLauncher(Profile* profile, |
| const std::string& app_id, |
| StartupAppLauncher::Delegate* delegate) |
| : profile_(profile), |
| app_id_(app_id), |
| delegate_(delegate), |
| install_attempted_(false), |
| ready_to_launch_(false) { |
| DCHECK(profile_); |
| DCHECK(Extension::IdIsValid(app_id_)); |
| } |
| |
| StartupAppLauncher::~StartupAppLauncher() { |
| // StartupAppLauncher can be deleted at anytime during the launch process |
| // through a user bailout shortcut. |
| ProfileOAuth2TokenServiceFactory::GetForProfile(profile_) |
| ->RemoveObserver(this); |
| } |
| |
| void StartupAppLauncher::Initialize() { |
| StartLoadingOAuthFile(); |
| } |
| |
| void StartupAppLauncher::ContinueWithNetworkReady() { |
| // Starts install if it is not started. |
| if (!install_attempted_) { |
| install_attempted_ = true; |
| BeginInstall(); |
| } |
| } |
| |
| void StartupAppLauncher::StartLoadingOAuthFile() { |
| delegate_->OnLoadingOAuthFile(); |
| |
| KioskOAuthParams* auth_params = new KioskOAuthParams(); |
| BrowserThread::PostBlockingPoolTaskAndReply( |
| FROM_HERE, |
| base::Bind(&StartupAppLauncher::LoadOAuthFileOnBlockingPool, |
| auth_params), |
| base::Bind(&StartupAppLauncher::OnOAuthFileLoaded, |
| AsWeakPtr(), |
| base::Owned(auth_params))); |
| } |
| |
| // static. |
| void StartupAppLauncher::LoadOAuthFileOnBlockingPool( |
| KioskOAuthParams* auth_params) { |
| int error_code = JSONFileValueSerializer::JSON_NO_ERROR; |
| std::string error_msg; |
| base::FilePath user_data_dir; |
| CHECK(PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)); |
| base::FilePath auth_file = user_data_dir.Append(kOAuthFileName); |
| scoped_ptr<JSONFileValueSerializer> serializer( |
| new JSONFileValueSerializer(user_data_dir.Append(kOAuthFileName))); |
| scoped_ptr<base::Value> value( |
| serializer->Deserialize(&error_code, &error_msg)); |
| base::DictionaryValue* dict = NULL; |
| if (error_code != JSONFileValueSerializer::JSON_NO_ERROR || |
| !value.get() || !value->GetAsDictionary(&dict)) { |
| LOG(WARNING) << "Can't find auth file at " << auth_file.value(); |
| return; |
| } |
| |
| dict->GetString(kOAuthRefreshToken, &auth_params->refresh_token); |
| dict->GetString(kOAuthClientId, &auth_params->client_id); |
| dict->GetString(kOAuthClientSecret, &auth_params->client_secret); |
| } |
| |
| void StartupAppLauncher::OnOAuthFileLoaded(KioskOAuthParams* auth_params) { |
| auth_params_ = *auth_params; |
| // Override chrome client_id and secret that will be used for identity |
| // API token minting. |
| if (!auth_params_.client_id.empty() && !auth_params_.client_secret.empty()) { |
| UserManager::Get()->SetAppModeChromeClientOAuthInfo( |
| auth_params_.client_id, |
| auth_params_.client_secret); |
| } |
| |
| // If we are restarting chrome (i.e. on crash), we need to initialize |
| // OAuth2TokenService as well. |
| InitializeTokenService(); |
| } |
| |
| void StartupAppLauncher::InitializeNetwork() { |
| delegate_->InitializeNetwork(); |
| } |
| |
| void StartupAppLauncher::InitializeTokenService() { |
| delegate_->OnInitializingTokenService(); |
| |
| ProfileOAuth2TokenService* profile_token_service = |
| ProfileOAuth2TokenServiceFactory::GetForProfile(profile_); |
| if (profile_token_service->RefreshTokenIsAvailable( |
| profile_token_service->GetPrimaryAccountId()) || |
| auth_params_.refresh_token.empty()) { |
| InitializeNetwork(); |
| } else { |
| // Pass oauth2 refresh token from the auth file. |
| // TODO(zelidrag): We should probably remove this option after M27. |
| // TODO(fgorski): This can go when we have persistence implemented on PO2TS. |
| // Unless the code is no longer needed. |
| // TODO(rogerta): Now that this CL implements token persistence in PO2TS, is |
| // this code still needed? See above two TODOs. |
| // |
| // ProfileOAuth2TokenService triggers either OnRefreshTokenAvailable or |
| // OnRefreshTokensLoaded. Given that we want to handle exactly one event, |
| // whichever comes first, both handlers call RemoveObserver on PO2TS. |
| // Handling any of the two events is the only way to resume the execution |
| // and enable Cleanup method to be called, self-invoking a destructor. |
| profile_token_service->AddObserver(this); |
| |
| profile_token_service->UpdateCredentials( |
| "kiosk_mode@localhost", |
| auth_params_.refresh_token); |
| } |
| } |
| |
| void StartupAppLauncher::OnRefreshTokenAvailable( |
| const std::string& account_id) { |
| ProfileOAuth2TokenServiceFactory::GetForProfile(profile_) |
| ->RemoveObserver(this); |
| InitializeNetwork(); |
| } |
| |
| void StartupAppLauncher::OnRefreshTokensLoaded() { |
| ProfileOAuth2TokenServiceFactory::GetForProfile(profile_) |
| ->RemoveObserver(this); |
| InitializeNetwork(); |
| } |
| |
| void StartupAppLauncher::OnLaunchSuccess() { |
| delegate_->OnLaunchSucceeded(); |
| } |
| |
| void StartupAppLauncher::OnLaunchFailure(KioskAppLaunchError::Error error) { |
| LOG(ERROR) << "App launch failed, error: " << error; |
| DCHECK_NE(KioskAppLaunchError::NONE, error); |
| |
| delegate_->OnLaunchFailed(error); |
| } |
| |
| void StartupAppLauncher::LaunchApp() { |
| if (!ready_to_launch_) { |
| NOTREACHED(); |
| LOG(ERROR) << "LaunchApp() called but launcher is not initialized."; |
| } |
| |
| const Extension* extension = extensions::ExtensionSystem::Get(profile_)-> |
| extension_service()->GetInstalledExtension(app_id_); |
| CHECK(extension); |
| |
| if (!extensions::KioskModeInfo::IsKioskEnabled(extension)) { |
| OnLaunchFailure(KioskAppLaunchError::NOT_KIOSK_ENABLED); |
| return; |
| } |
| |
| // Always open the app in a window. |
| OpenApplication(AppLaunchParams(profile_, extension, |
| extensions::LAUNCH_CONTAINER_WINDOW, |
| NEW_WINDOW)); |
| InitAppSession(profile_, app_id_); |
| |
| UserManager::Get()->SessionStarted(); |
| |
| content::NotificationService::current()->Notify( |
| chrome::NOTIFICATION_KIOSK_APP_LAUNCHED, |
| content::NotificationService::AllSources(), |
| content::NotificationService::NoDetails()); |
| |
| OnLaunchSuccess(); |
| } |
| |
| void StartupAppLauncher::BeginInstall() { |
| delegate_->OnInstallingApp(); |
| |
| if (IsAppInstalled(profile_, app_id_)) { |
| OnReadyToLaunch(); |
| return; |
| } |
| |
| installer_ = new WebstoreStartupInstaller( |
| app_id_, |
| profile_, |
| false, |
| base::Bind(&StartupAppLauncher::InstallCallback, AsWeakPtr())); |
| installer_->BeginInstall(); |
| } |
| |
| void StartupAppLauncher::InstallCallback(bool success, |
| const std::string& error) { |
| installer_ = NULL; |
| if (success) { |
| // Finish initialization after the callback returns. |
| // So that the app finishes its installation. |
| BrowserThread::PostTask( |
| BrowserThread::UI, |
| FROM_HERE, |
| base::Bind(&StartupAppLauncher::OnReadyToLaunch, |
| AsWeakPtr())); |
| return; |
| } |
| |
| LOG(ERROR) << "App install failed: " << error; |
| OnLaunchFailure(KioskAppLaunchError::UNABLE_TO_INSTALL); |
| } |
| |
| void StartupAppLauncher::OnReadyToLaunch() { |
| ready_to_launch_ = true; |
| delegate_->OnReadyToLaunch(); |
| } |
| |
| } // namespace chromeos |