2012-07-17 18:54:07 +00:00
|
|
|
// -*- mode: js; js-indent-level: 4; indent-tabs-mode: nil -*-
|
|
|
|
|
2013-02-06 19:18:26 +00:00
|
|
|
const Clutter = imports.gi.Clutter;
|
2012-07-17 18:54:07 +00:00
|
|
|
const Gio = imports.gi.Gio;
|
2013-03-18 04:59:56 +00:00
|
|
|
const GLib = imports.gi.GLib;
|
2012-07-17 18:54:07 +00:00
|
|
|
const Lang = imports.lang;
|
2012-08-07 14:49:22 +00:00
|
|
|
const Mainloop = imports.mainloop;
|
2012-07-17 18:54:07 +00:00
|
|
|
const Signals = imports.signals;
|
2013-07-15 21:56:44 +00:00
|
|
|
const St = imports.gi.St;
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
const Batch = imports.gdm.batch;
|
|
|
|
const Fprint = imports.gdm.fingerprint;
|
|
|
|
const Main = imports.ui.main;
|
2012-08-03 15:10:45 +00:00
|
|
|
const Params = imports.misc.params;
|
2013-07-18 18:40:10 +00:00
|
|
|
const ShellEntry = imports.ui.shellEntry;
|
2012-07-17 18:54:07 +00:00
|
|
|
const Tweener = imports.ui.tweener;
|
|
|
|
|
|
|
|
const PASSWORD_SERVICE_NAME = 'gdm-password';
|
|
|
|
const FINGERPRINT_SERVICE_NAME = 'gdm-fingerprint';
|
|
|
|
const FADE_ANIMATION_TIME = 0.16;
|
2013-02-06 19:18:26 +00:00
|
|
|
const CLONE_FADE_ANIMATION_TIME = 0.25;
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
const LOGIN_SCREEN_SCHEMA = 'org.gnome.login-screen';
|
|
|
|
const FINGERPRINT_AUTHENTICATION_KEY = 'enable-fingerprint-authentication';
|
|
|
|
const BANNER_MESSAGE_KEY = 'banner-message-enable';
|
|
|
|
const BANNER_MESSAGE_TEXT_KEY = 'banner-message-text';
|
2012-08-07 14:49:22 +00:00
|
|
|
const ALLOWED_FAILURES_KEY = 'allowed-failures';
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
const LOGO_KEY = 'logo';
|
2012-10-30 17:26:30 +00:00
|
|
|
const DISABLE_USER_LIST_KEY = 'disable-user-list';
|
2012-07-17 18:54:07 +00:00
|
|
|
|
2013-03-18 04:59:56 +00:00
|
|
|
// Give user 16ms to read each character of a PAM message
|
|
|
|
const USER_READ_TIME = 16
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
function fadeInActor(actor) {
|
|
|
|
if (actor.opacity == 255 && actor.visible)
|
|
|
|
return null;
|
|
|
|
|
|
|
|
let hold = new Batch.Hold();
|
|
|
|
actor.show();
|
|
|
|
let [minHeight, naturalHeight] = actor.get_preferred_height(-1);
|
|
|
|
|
|
|
|
actor.opacity = 0;
|
|
|
|
actor.set_height(0);
|
|
|
|
Tweener.addTween(actor,
|
|
|
|
{ opacity: 255,
|
|
|
|
height: naturalHeight,
|
|
|
|
time: FADE_ANIMATION_TIME,
|
|
|
|
transition: 'easeOutQuad',
|
|
|
|
onComplete: function() {
|
|
|
|
this.set_height(-1);
|
|
|
|
hold.release();
|
|
|
|
},
|
|
|
|
});
|
|
|
|
|
|
|
|
return hold;
|
|
|
|
}
|
|
|
|
|
|
|
|
function fadeOutActor(actor) {
|
|
|
|
if (!actor.visible || actor.opacity == 0) {
|
|
|
|
actor.opacity = 0;
|
|
|
|
actor.hide();
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
let hold = new Batch.Hold();
|
|
|
|
Tweener.addTween(actor,
|
|
|
|
{ opacity: 0,
|
|
|
|
height: 0,
|
|
|
|
time: FADE_ANIMATION_TIME,
|
|
|
|
transition: 'easeOutQuad',
|
|
|
|
onComplete: function() {
|
|
|
|
this.hide();
|
|
|
|
this.set_height(-1);
|
|
|
|
hold.release();
|
|
|
|
},
|
|
|
|
});
|
|
|
|
return hold;
|
|
|
|
}
|
|
|
|
|
2013-02-06 19:18:26 +00:00
|
|
|
function cloneAndFadeOutActor(actor) {
|
|
|
|
// Immediately hide actor so its sibling can have its space
|
|
|
|
// and position, but leave a non-reactive clone on-screen,
|
|
|
|
// so from the user's point of view it smoothly fades away
|
|
|
|
// and reveals its sibling.
|
|
|
|
actor.hide();
|
|
|
|
|
|
|
|
let clone = new Clutter.Clone({ source: actor,
|
|
|
|
reactive: false });
|
|
|
|
|
|
|
|
Main.uiGroup.add_child(clone);
|
|
|
|
|
|
|
|
let [x, y] = actor.get_transformed_position();
|
|
|
|
clone.set_position(x, y);
|
|
|
|
|
|
|
|
let hold = new Batch.Hold();
|
|
|
|
Tweener.addTween(clone,
|
|
|
|
{ opacity: 0,
|
|
|
|
time: CLONE_FADE_ANIMATION_TIME,
|
|
|
|
transition: 'easeOutQuad',
|
|
|
|
onComplete: function() {
|
|
|
|
clone.destroy();
|
|
|
|
hold.release();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
return hold;
|
|
|
|
}
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
const ShellUserVerifier = new Lang.Class({
|
|
|
|
Name: 'ShellUserVerifier',
|
|
|
|
|
2012-08-03 15:10:45 +00:00
|
|
|
_init: function(client, params) {
|
|
|
|
params = Params.parse(params, { reauthenticationOnly: false });
|
|
|
|
this._reauthOnly = params.reauthenticationOnly;
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
this._client = client;
|
|
|
|
|
|
|
|
this._settings = new Gio.Settings({ schema: LOGIN_SCREEN_SCHEMA });
|
|
|
|
|
|
|
|
this._fprintManager = new Fprint.FprintManager();
|
2013-03-18 04:59:56 +00:00
|
|
|
this._messageQueue = [];
|
|
|
|
this._messageQueueTimeoutId = 0;
|
|
|
|
this.hasPendingMessages = false;
|
2013-07-22 14:59:57 +00:00
|
|
|
this.reauthenticating = false;
|
2012-08-07 14:49:22 +00:00
|
|
|
|
|
|
|
this._failCounter = 0;
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
begin: function(userName, hold) {
|
2012-08-26 12:54:02 +00:00
|
|
|
this._cancellable = new Gio.Cancellable();
|
2012-07-17 18:54:07 +00:00
|
|
|
this._hold = hold;
|
|
|
|
this._userName = userName;
|
2013-07-22 14:59:57 +00:00
|
|
|
this.reauthenticating = false;
|
2012-07-17 18:54:07 +00:00
|
|
|
|
2012-08-26 12:54:02 +00:00
|
|
|
this._checkForFingerprintReader();
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
if (userName) {
|
|
|
|
// If possible, reauthenticate an already running session,
|
|
|
|
// so any session specific credentials get updated appropriately
|
|
|
|
this._client.open_reauthentication_channel(userName, this._cancellable,
|
|
|
|
Lang.bind(this, this._reauthenticationChannelOpened));
|
|
|
|
} else {
|
|
|
|
this._client.get_user_verifier(this._cancellable, Lang.bind(this, this._userVerifierGot));
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
cancel: function() {
|
2012-08-26 12:54:02 +00:00
|
|
|
if (this._cancellable)
|
|
|
|
this._cancellable.cancel();
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
if (this._userVerifier)
|
|
|
|
this._userVerifier.call_cancel_sync(null);
|
|
|
|
},
|
|
|
|
|
|
|
|
clear: function() {
|
2012-08-26 12:54:02 +00:00
|
|
|
if (this._cancellable) {
|
|
|
|
this._cancellable.cancel();
|
|
|
|
this._cancellable = null;
|
|
|
|
}
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
if (this._userVerifier) {
|
|
|
|
this._userVerifier.run_dispose();
|
|
|
|
this._userVerifier = null;
|
|
|
|
}
|
2013-03-18 04:59:56 +00:00
|
|
|
|
|
|
|
this._clearMessageQueue();
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
answerQuery: function(serviceName, answer) {
|
2013-07-16 19:48:27 +00:00
|
|
|
if (!this.hasPendingMessages) {
|
2013-03-18 04:59:56 +00:00
|
|
|
this._userVerifier.call_answer_query(serviceName, answer, this._cancellable, null);
|
|
|
|
} else {
|
2013-07-17 17:06:10 +00:00
|
|
|
let signalId = this.connect('no-more-messages',
|
|
|
|
Lang.bind(this, function() {
|
|
|
|
this.disconnect(signalId);
|
|
|
|
this._userVerifier.call_answer_query(serviceName, answer, this._cancellable, null);
|
|
|
|
}));
|
2013-03-18 04:59:56 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_getIntervalForMessage: function(message) {
|
|
|
|
// We probably could be smarter here
|
|
|
|
return message.length * USER_READ_TIME;
|
|
|
|
},
|
|
|
|
|
|
|
|
finishMessageQueue: function() {
|
|
|
|
if (!this.hasPendingMessages)
|
|
|
|
return;
|
|
|
|
|
|
|
|
this._messageQueue = [];
|
2012-10-29 16:39:00 +00:00
|
|
|
|
2013-03-18 04:59:56 +00:00
|
|
|
this.hasPendingMessages = false;
|
|
|
|
this.emit('no-more-messages');
|
|
|
|
},
|
|
|
|
|
|
|
|
_queueMessageTimeout: function() {
|
|
|
|
if (this._messageQueue.length == 0) {
|
|
|
|
this.finishMessageQueue();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this._messageQueueTimeoutId != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
let message = this._messageQueue.shift();
|
|
|
|
this.emit('show-message', message.text, message.iconName);
|
|
|
|
|
|
|
|
this._messageQueueTimeoutId = GLib.timeout_add(GLib.PRIORITY_DEFAULT,
|
|
|
|
message.interval,
|
|
|
|
Lang.bind(this, function() {
|
|
|
|
this._messageQueueTimeoutId = 0;
|
|
|
|
this._queueMessageTimeout();
|
|
|
|
}));
|
|
|
|
},
|
|
|
|
|
|
|
|
_queueMessage: function(message, iconName) {
|
|
|
|
let interval = this._getIntervalForMessage(message);
|
|
|
|
|
|
|
|
this.hasPendingMessages = true;
|
|
|
|
this._messageQueue.push({ text: message, interval: interval, iconName: iconName });
|
|
|
|
this._queueMessageTimeout();
|
|
|
|
},
|
|
|
|
|
|
|
|
_clearMessageQueue: function() {
|
|
|
|
this.finishMessageQueue();
|
|
|
|
|
|
|
|
if (this._messageQueueTimeoutId != 0) {
|
|
|
|
GLib.source_remove(this._messageQueueTimeoutId);
|
|
|
|
this._messageQueueTimeoutId = 0;
|
|
|
|
}
|
|
|
|
this.emit('show-message', null, null);
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
_checkForFingerprintReader: function() {
|
|
|
|
this._haveFingerprintReader = false;
|
|
|
|
|
|
|
|
if (!this._settings.get_boolean(FINGERPRINT_AUTHENTICATION_KEY))
|
|
|
|
return;
|
|
|
|
|
|
|
|
this._fprintManager.GetDefaultDeviceRemote(Gio.DBusCallFlags.NONE, this._cancellable, Lang.bind(this,
|
|
|
|
function(device, error) {
|
|
|
|
if (!error && device)
|
|
|
|
this._haveFingerprintReader = true;
|
|
|
|
}));
|
|
|
|
},
|
|
|
|
|
2012-09-06 14:40:13 +00:00
|
|
|
_reportInitError: function(where, error) {
|
|
|
|
logError(error, where);
|
2012-10-03 19:25:49 +00:00
|
|
|
this._hold.release();
|
2012-09-06 14:40:13 +00:00
|
|
|
|
2013-03-18 04:59:56 +00:00
|
|
|
this._queueMessage(_("Authentication error"), 'login-dialog-message-warning');
|
2012-09-06 14:40:13 +00:00
|
|
|
this._verificationFailed(false);
|
|
|
|
},
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
_reauthenticationChannelOpened: function(client, result) {
|
|
|
|
try {
|
|
|
|
this._userVerifier = client.open_reauthentication_channel_finish(result);
|
2012-09-06 14:40:13 +00:00
|
|
|
} catch(e if e.matches(Gio.IOErrorEnum, Gio.IOErrorEnum.CANCELLED)) {
|
|
|
|
return;
|
|
|
|
} catch(e if e.matches(Gio.DBusError, Gio.DBusError.ACCESS_DENIED) &&
|
|
|
|
!this._reauthOnly) {
|
|
|
|
// Gdm emits org.freedesktop.DBus.Error.AccessDenied when there is
|
|
|
|
// no session to reauthenticate. Fall back to performing verification
|
|
|
|
// from this login session
|
2012-07-17 18:54:07 +00:00
|
|
|
client.get_user_verifier(this._cancellable, Lang.bind(this, this._userVerifierGot));
|
2012-09-06 14:40:13 +00:00
|
|
|
return;
|
|
|
|
} catch(e) {
|
|
|
|
this._reportInitError('Failed to open reauthentication channel', e);
|
|
|
|
return;
|
2012-07-17 18:54:07 +00:00
|
|
|
}
|
2012-09-06 14:40:13 +00:00
|
|
|
|
2013-07-22 14:59:57 +00:00
|
|
|
this.reauthenticating = true;
|
2012-09-06 14:40:13 +00:00
|
|
|
this._connectSignals();
|
|
|
|
this._beginVerification();
|
|
|
|
this._hold.release();
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
_userVerifierGot: function(client, result) {
|
2012-08-26 12:54:02 +00:00
|
|
|
try {
|
|
|
|
this._userVerifier = client.get_user_verifier_finish(result);
|
2012-09-06 14:40:13 +00:00
|
|
|
} catch(e if e.matches(Gio.IOErrorEnum, Gio.IOErrorEnum.CANCELLED)) {
|
|
|
|
return;
|
|
|
|
} catch(e) {
|
|
|
|
this._reportInitError('Failed to obtain user verifier', e);
|
2012-08-26 12:54:02 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
this._connectSignals();
|
|
|
|
this._beginVerification();
|
|
|
|
this._hold.release();
|
|
|
|
},
|
|
|
|
|
|
|
|
_connectSignals: function() {
|
|
|
|
this._userVerifier.connect('info', Lang.bind(this, this._onInfo));
|
|
|
|
this._userVerifier.connect('problem', Lang.bind(this, this._onProblem));
|
|
|
|
this._userVerifier.connect('info-query', Lang.bind(this, this._onInfoQuery));
|
|
|
|
this._userVerifier.connect('secret-info-query', Lang.bind(this, this._onSecretInfoQuery));
|
|
|
|
this._userVerifier.connect('conversation-stopped', Lang.bind(this, this._onConversationStopped));
|
|
|
|
this._userVerifier.connect('reset', Lang.bind(this, this._onReset));
|
|
|
|
this._userVerifier.connect('verification-complete', Lang.bind(this, this._onVerificationComplete));
|
|
|
|
},
|
|
|
|
|
|
|
|
_beginVerification: function() {
|
|
|
|
this._hold.acquire();
|
|
|
|
|
|
|
|
if (this._userName) {
|
|
|
|
this._userVerifier.call_begin_verification_for_user(PASSWORD_SERVICE_NAME,
|
|
|
|
this._userName,
|
|
|
|
this._cancellable,
|
|
|
|
Lang.bind(this, function(obj, result) {
|
2012-08-26 12:54:02 +00:00
|
|
|
try {
|
|
|
|
obj.call_begin_verification_for_user_finish(result);
|
|
|
|
} catch(e if e.matches(Gio.IOErrorEnum, Gio.IOErrorEnum.CANCELLED)) {
|
|
|
|
return;
|
2012-09-06 14:40:13 +00:00
|
|
|
} catch(e) {
|
|
|
|
this._reportInitError('Failed to start verification for user', e);
|
|
|
|
return;
|
2012-08-26 12:54:02 +00:00
|
|
|
}
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
this._hold.release();
|
|
|
|
}));
|
|
|
|
|
|
|
|
if (this._haveFingerprintReader) {
|
|
|
|
this._hold.acquire();
|
|
|
|
|
|
|
|
this._userVerifier.call_begin_verification_for_user(FINGERPRINT_SERVICE_NAME,
|
|
|
|
this._userName,
|
|
|
|
this._cancellable,
|
|
|
|
Lang.bind(this, function(obj, result) {
|
2012-08-26 12:54:02 +00:00
|
|
|
try {
|
|
|
|
obj.call_begin_verification_for_user_finish(result);
|
|
|
|
} catch(e if e.matches(Gio.IOErrorEnum, Gio.IOErrorEnum.CANCELLED)) {
|
|
|
|
return;
|
2012-09-06 14:40:13 +00:00
|
|
|
} catch(e) {
|
|
|
|
this._reportInitError('Failed to start fingerprint verification for user', e);
|
|
|
|
return;
|
2012-08-26 12:54:02 +00:00
|
|
|
}
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
this._hold.release();
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
this._userVerifier.call_begin_verification(PASSWORD_SERVICE_NAME,
|
|
|
|
this._cancellable,
|
|
|
|
Lang.bind(this, function(obj, result) {
|
2012-08-26 12:54:02 +00:00
|
|
|
try {
|
|
|
|
obj.call_begin_verification_finish(result);
|
|
|
|
} catch(e if e.matches(Gio.IOErrorEnum, Gio.IOErrorEnum.CANCELLED)) {
|
|
|
|
return;
|
2012-09-06 14:40:13 +00:00
|
|
|
} catch(e) {
|
|
|
|
this._reportInitError('Failed to start verification', e);
|
|
|
|
return;
|
2012-08-26 12:54:02 +00:00
|
|
|
}
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
this._hold.release();
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_onInfo: function(client, serviceName, info) {
|
|
|
|
// We don't display fingerprint messages, because they
|
|
|
|
// have words like UPEK in them. Instead we use the messages
|
|
|
|
// as a cue to display our own message.
|
|
|
|
if (serviceName == FINGERPRINT_SERVICE_NAME &&
|
|
|
|
this._haveFingerprintReader) {
|
2012-08-20 00:15:18 +00:00
|
|
|
|
|
|
|
// Translators: this message is shown below the password entry field
|
|
|
|
// to indicate the user can swipe their finger instead
|
|
|
|
this.emit('show-login-hint', _("(or swipe finger)"));
|
2012-07-17 18:54:07 +00:00
|
|
|
} else if (serviceName == PASSWORD_SERVICE_NAME) {
|
2013-03-18 04:59:56 +00:00
|
|
|
this._queueMessage(info, 'login-dialog-message-info');
|
2012-07-17 18:54:07 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
_onProblem: function(client, serviceName, problem) {
|
|
|
|
// we don't want to show auth failed messages to
|
|
|
|
// users who haven't enrolled their fingerprint.
|
|
|
|
if (serviceName != PASSWORD_SERVICE_NAME)
|
|
|
|
return;
|
2013-03-18 04:59:56 +00:00
|
|
|
this._queueMessage(problem, 'login-dialog-message-warning');
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
|
|
|
|
_onInfoQuery: function(client, serviceName, question) {
|
|
|
|
// We only expect questions to come from the main auth service
|
|
|
|
if (serviceName != PASSWORD_SERVICE_NAME)
|
|
|
|
return;
|
|
|
|
|
|
|
|
this.emit('ask-question', serviceName, question, '');
|
|
|
|
},
|
|
|
|
|
|
|
|
_onSecretInfoQuery: function(client, serviceName, secretQuestion) {
|
|
|
|
// We only expect secret requests to come from the main auth service
|
|
|
|
if (serviceName != PASSWORD_SERVICE_NAME)
|
|
|
|
return;
|
|
|
|
|
|
|
|
this.emit('ask-question', serviceName, secretQuestion, '\u25cf');
|
|
|
|
},
|
|
|
|
|
|
|
|
_onReset: function() {
|
2012-08-07 14:49:22 +00:00
|
|
|
// Clear previous attempts to authenticate
|
|
|
|
this._failCounter = 0;
|
2012-07-17 18:54:07 +00:00
|
|
|
|
|
|
|
this.emit('reset');
|
|
|
|
},
|
|
|
|
|
|
|
|
_onVerificationComplete: function() {
|
|
|
|
this.emit('verification-complete');
|
|
|
|
},
|
|
|
|
|
2013-03-18 04:59:56 +00:00
|
|
|
_cancelAndReset: function() {
|
|
|
|
this.cancel();
|
|
|
|
this._onReset();
|
|
|
|
},
|
|
|
|
|
|
|
|
_retry: function() {
|
|
|
|
this.begin(this._userName, new Batch.Hold());
|
|
|
|
},
|
|
|
|
|
2012-09-06 14:40:13 +00:00
|
|
|
_verificationFailed: function(retry) {
|
2012-08-07 14:49:22 +00:00
|
|
|
// For Not Listed / enterprise logins, immediately reset
|
|
|
|
// the dialog
|
|
|
|
// Otherwise, we allow ALLOWED_FAILURES attempts. After that, we
|
|
|
|
// go back to the welcome screen.
|
|
|
|
|
2012-10-29 16:40:55 +00:00
|
|
|
this._failCounter++;
|
2012-09-06 14:40:13 +00:00
|
|
|
let canRetry = retry && this._userName &&
|
|
|
|
this._failCounter < this._settings.get_int(ALLOWED_FAILURES_KEY);
|
|
|
|
|
|
|
|
if (canRetry) {
|
2013-07-16 19:48:27 +00:00
|
|
|
if (!this.hasPendingMessages) {
|
2013-03-18 04:59:56 +00:00
|
|
|
this._retry();
|
|
|
|
} else {
|
2013-07-17 17:06:10 +00:00
|
|
|
let signalId = this.connect('no-more-messages',
|
|
|
|
Lang.bind(this, function() {
|
|
|
|
this.disconnect(signalId);
|
|
|
|
this._retry();
|
|
|
|
}));
|
2013-03-18 04:59:56 +00:00
|
|
|
}
|
2012-09-06 14:40:13 +00:00
|
|
|
} else {
|
2013-07-16 19:48:27 +00:00
|
|
|
if (!this.hasPendingMessages) {
|
2013-03-18 04:59:56 +00:00
|
|
|
this._cancelAndReset();
|
|
|
|
} else {
|
2013-07-17 17:06:10 +00:00
|
|
|
let signalId = this.connect('no-more-messages',
|
|
|
|
Lang.bind(this, function() {
|
|
|
|
this.disconnect(signalId);
|
|
|
|
this._cancelAndReset();
|
|
|
|
}));
|
2013-03-18 04:59:56 +00:00
|
|
|
}
|
2012-08-07 14:49:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
this.emit('verification-failed');
|
|
|
|
},
|
|
|
|
|
2012-07-17 18:54:07 +00:00
|
|
|
_onConversationStopped: function(client, serviceName) {
|
|
|
|
// if the password service fails, then cancel everything.
|
|
|
|
// But if, e.g., fingerprint fails, still give
|
|
|
|
// password authentication a chance to succeed
|
|
|
|
if (serviceName == PASSWORD_SERVICE_NAME) {
|
2012-09-06 14:40:13 +00:00
|
|
|
this._verificationFailed(true);
|
2012-08-20 01:37:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
this.emit('hide-login-hint');
|
2012-07-17 18:54:07 +00:00
|
|
|
},
|
|
|
|
});
|
|
|
|
Signals.addSignalMethods(ShellUserVerifier.prototype);
|