blob: eedffa8bf27421d5c51c1763d0f052717e503fad [file] [log] [blame]
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef IOS_CHROME_BROWSER_SIGNIN_AUTHENTICATION_SERVICE_H_
#define IOS_CHROME_BROWSER_SIGNIN_AUTHENTICATION_SERVICE_H_
#include <string>
#include <vector>
#import "base/ios/block_types.h"
#include "base/memory/weak_ptr.h"
#include "base/scoped_observation.h"
#include "components/keyed_service/core/keyed_service.h"
#include "components/pref_registry/pref_registry_syncable.h"
#include "components/signin/public/base/consent_level.h"
#include "components/signin/public/base/signin_metrics.h"
#include "components/signin/public/identity_manager/identity_manager.h"
#import "ios/chrome/browser/signin/chrome_account_manager_service.h"
#import "ios/chrome/browser/signin/user_approved_account_list_manager.h"
namespace syncer {
class SyncService;
}
class AuthenticationServiceDelegate;
class AuthenticationServiceObserver;
class FakeAuthenticationService;
class PrefService;
class SyncSetupService;
@protocol RefreshAccessTokenError;
@protocol SystemIdentity;
// AuthenticationService is the Chrome interface to the iOS shared
// authentication library.
class AuthenticationService : public KeyedService,
public signin::IdentityManager::Observer,
public ChromeAccountManagerService::Observer {
public:
// The service status for AuthenticationService.
enum class ServiceStatus {
// Sign-in forced by enterprise policy.
SigninForcedByPolicy = 0,
// Sign-in is possible.
SigninAllowed = 1,
// Sign-in disabled by user.
SigninDisabledByUser = 2,
// Sign-in disabled by enterprise policy.
SigninDisabledByPolicy = 3,
// Sign-in disabled for internal reason (probably running Chromium).
SigninDisabledByInternal = 4,
};
// Initializes the service.
AuthenticationService(PrefService* pref_service,
SyncSetupService* sync_setup_service,
ChromeAccountManagerService* account_manager_service,
signin::IdentityManager* identity_manager,
syncer::SyncService* sync_service);
AuthenticationService(const AuthenticationService&) = delete;
AuthenticationService& operator=(const AuthenticationService&) = delete;
~AuthenticationService() override;
// Registers the preferences used by AuthenticationService;
static void RegisterPrefs(user_prefs::PrefRegistrySyncable* registry);
// Returns whether the AuthenticationService has been initialized. It is
// a fatal error to invoke any method on this object except Initialize()
// if this method returns false.
bool initialized() const { return initialized_; }
// Initializes the AuthenticationService.
void Initialize(std::unique_ptr<AuthenticationServiceDelegate> delegate);
// KeyedService
void Shutdown() override;
// Adds and removes observers.
void AddObserver(AuthenticationServiceObserver* observer);
void RemoveObserver(AuthenticationServiceObserver* observer);
// Returns the service status, see ServiceStatus. This value can be observed
// using AuthenticationServiceObserver::OnServiceStatusChanged().
ServiceStatus GetServiceStatus();
// Reminds user to Sign in and sync to Chrome when a new tab is opened.
void SetReauthPromptForSignInAndSync();
// Clears the reminder to Sign in and sync to Chrome when a new tab is opened.
void ResetReauthPromptForSignInAndSync();
// Returns whether user should be prompted to Sign in and sync to Chrome.
bool ShouldReauthPromptForSignInAndSync() const;
// Returns whether the current account list has been approved by the user.
// This method should only be called when there is a primary account.
//
// TODO(crbug.com/1084491): To make sure IsAccountListApprovedByUser()
// a non-stale value, an notification need to be implemented when the SSO
// keychain is reloaded. The user can add/remove an account while Chrome
// is in foreground (with split screen on iPad).
bool IsAccountListApprovedByUser() const;
// Saves the current account list in Chrome as being approved by the user.
// This method should only be called when there is a primary account.
void ApproveAccountList();
// SystemIdentity management
// Returns true if the user is signed in.
// While the AuthenticationService is in background, this will reload the
// credentials to ensure the value is up to date.
bool HasPrimaryIdentity(signin::ConsentLevel consent_level) const;
// Returns true if the user is signed in and the identity is considered
// managed.
// Virtual for testing.
virtual bool HasPrimaryIdentityManaged(
signin::ConsentLevel consent_level) const;
// Retrieves the identity of the currently authenticated user or `nil` if
// either the user is not authenticated, or is authenticated through
// ClientLogin.
// Virtual for testing.
virtual id<SystemIdentity> GetPrimaryIdentity(
signin::ConsentLevel consent_level) const;
// Grants signin::ConsentLevel::kSignin to `identity` and records the signin
// at `accessPoint`. This method does not set up Sync-the-feature for the
// identity. Virtual for testing.
virtual void SignIn(id<SystemIdentity> identity,
signin_metrics::AccessPoint access_point);
// Grants signin::ConsentLevel::kSync to `identity` and records the event at
// `access_point`. This starts setting up Sync-the-feature, but the setup will
// only complete once SyncUserSettings::SetInitialSyncFeatureSetupComplete()
// is called. This method is used for testing. Virtual for testing.
virtual void GrantSyncConsent(id<SystemIdentity> identity,
signin_metrics::AccessPoint access_point);
// Signs the authenticated user out of Chrome and clears the browsing
// data if the account is managed. If force_clear_browsing_data is true,
// clears the browsing data unconditionally.
// Sync consent is automatically removed from all signed-out accounts.
// Virtual for testing.
virtual void SignOut(signin_metrics::ProfileSignout signout_source,
bool force_clear_browsing_data,
ProceduralBlock completion);
// Returns whether there is a cached associated MDM error for `identity`.
bool HasCachedMDMErrorForIdentity(id<SystemIdentity> identity);
// Shows the MDM Error dialog for `identity` if it has an associated MDM
// error. Returns true if `identity` had an associated error, false otherwise.
bool ShowMDMErrorDialogForIdentity(id<SystemIdentity> identity);
// Returns a weak pointer of this.
base::WeakPtr<AuthenticationService> GetWeakPtr();
// This needs to be invoked when the application enters foreground to
// sync the accounts between the IdentityManager and the SSO library.
void OnApplicationWillEnterForeground();
private:
friend class FakeAuthenticationService;
friend class AuthenticationServiceTest;
friend class FakeAuthenticationService;
// Returns the cached MDM errors associated with `identity`. If the cache
// is stale for `identity`, the entry might be removed.
id<RefreshAccessTokenError> GetCachedMDMError(id<SystemIdentity> identity);
// Handles an MDM error `error` associated with `identity`.
// Returns whether the notification associated with `user_info` was fully
// handled.
bool HandleMDMError(id<SystemIdentity> identity,
id<RefreshAccessTokenError> error);
// Invoked when the MDM error associated with `identity` has been handled.
void MDMErrorHandled(id<SystemIdentity> identity, bool is_blocked);
// Verifies that the authenticated user is still associated with a valid
// SystemIdentity. This method must only be called when the user is
// authenticated with the shared authentication library. If there is no valid
// SystemIdentity associated with the currently authenticated user, or the
// identity is `invalid_identity`, this method will sign the user out.
//
// `invalid_identity` is an additional identity to consider invalid. It can be
// nil if there is no such additional identity to ignore.
//
// `should_prompt` indicates whether the user should be prompted with the
// resign-in infobar if the method signs out.
// `device_restore` should be true only when called from `Initialize()` and
// Chrome is started after a device restore.
void HandleForgottenIdentity(id<SystemIdentity> invalid_identity,
bool should_prompt,
bool device_restore);
// Checks if the authenticated identity was removed by calling
// `HandleForgottenIdentity`. Reloads the OAuth2 token service accounts if the
// authenticated identity is still present.
// `keychain_reload` indicates if the identity list has to be reloaded because
// the keychain has changed.
void ReloadCredentialsFromIdentities(bool keychain_reload);
// signin::IdentityManager::Observer implementation.
void OnPrimaryAccountChanged(
const signin::PrimaryAccountChangeEvent& event_details) override;
// ChromeAccountManagerService::Observer implementation.
void OnIdentityListChanged(bool need_user_approval) override;
void OnAccessTokenRefreshFailed(id<SystemIdentity> identity,
id<RefreshAccessTokenError> error) override;
// Fires `OnPrimaryAccountRestricted` on all observers.
void FirePrimaryAccountRestricted();
// Notification for prefs::kSigninAllowed.
void OnSigninAllowedChanged(const std::string& name);
// Notification for prefs::kBrowserSigninPolicy.
void OnBrowserSigninPolicyChanged(const std::string& name);
// Fires `OnServiceStatusChanged` on all observers.
void FireServiceStatusNotification();
// The delegate for this AuthenticationService. It is invalid to call any
// method on this object except Initialize() or Shutdown() if this pointer
// is null.
std::unique_ptr<AuthenticationServiceDelegate> delegate_;
// Pointer to the KeyedServices used by AuthenticationService.
PrefService* pref_service_ = nullptr;
SyncSetupService* sync_setup_service_ = nullptr;
ChromeAccountManagerService* account_manager_service_ = nullptr;
signin::IdentityManager* identity_manager_ = nullptr;
syncer::SyncService* sync_service_ = nullptr;
base::ObserverList<AuthenticationServiceObserver, true> observer_list_;
// Whether Initialized has been called.
bool initialized_ = false;
// Manager for the approved account list.
UserApprovedAccountListManager user_approved_account_list_manager_;
// Whether the AuthenticationService is currently reloading credentials, used
// to avoid an infinite reloading loop.
bool is_reloading_credentials_ = false;
// Whether the primary account was logged out because it became restricted.
// It is used to respond to late observers.
bool primary_account_was_restricted_ = false;
// Map between account IDs and their associated MDM error.
std::map<CoreAccountId, id<RefreshAccessTokenError>> cached_mdm_errors_;
base::ScopedObservation<signin::IdentityManager,
signin::IdentityManager::Observer>
identity_manager_observation_{this};
base::ScopedObservation<ChromeAccountManagerService,
ChromeAccountManagerService::Observer>
account_manager_service_observation_{this};
// Registrar for prefs::kSigninAllowed.
PrefChangeRegistrar pref_change_registrar_;
// Registrar for prefs::kBrowserSigninPolicy.
PrefChangeRegistrar local_pref_change_registrar_;
base::WeakPtrFactory<AuthenticationService> weak_pointer_factory_;
};
#endif // IOS_CHROME_BROWSER_SIGNIN_AUTHENTICATION_SERVICE_H_