Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(98)

Side by Side Diff: components/safe_browsing/csd.proto

Issue 2905343002: Show interstitial on a password on focus ping with PHISHING verdict. (Closed)
Patch Set: nit Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // This proto file includes: 5 // This proto file includes:
6 // (1) Client side phishing and malware detection request and response 6 // (1) Client side phishing and malware detection request and response
7 // protocol buffers. Those protocol messages should be kept in sync 7 // protocol buffers. Those protocol messages should be kept in sync
8 // with the server implementation. 8 // with the server implementation.
9 // 9 //
10 // (2) Safe Browsing reporting protocol buffers. 10 // (2) Safe Browsing reporting protocol buffers.
(...skipping 244 matching lines...) Expand 10 before | Expand all | Expand 10 after
255 // www.google.com/foo/bar?param=val -> google.com 255 // www.google.com/foo/bar?param=val -> google.com
256 // www.geocities.com/foo/bar.html -> geocities.com/foo 256 // www.geocities.com/foo/bar.html -> geocities.com/foo
257 // adwords.blogspot.com/index.html -> adwords.blogspot.com 257 // adwords.blogspot.com/index.html -> adwords.blogspot.com
258 // 258 //
259 // The pattern will always match the page_url of the request, and will be 259 // The pattern will always match the page_url of the request, and will be
260 // a substring of page_url. 260 // a substring of page_url.
261 optional string cache_expression = 3; 261 optional string cache_expression = 3;
262 262
263 // Deprecated. 263 // Deprecated.
264 optional bool DEPRECATED_cache_expression_exact_match = 4 [deprecated = true]; 264 optional bool DEPRECATED_cache_expression_exact_match = 4 [deprecated = true];
265
266 // A token unique to each request which correlates response and post-warning
267 // actions.
268 optional bytes verdict_token = 5;
265 } 269 }
266 270
267 message ClientMalwareResponse { 271 message ClientMalwareResponse {
268 required bool blacklist = 1; 272 required bool blacklist = 1;
269 // The confirmed blacklisted bad IP and its url, which will be shown in 273 // The confirmed blacklisted bad IP and its url, which will be shown in
270 // malware warning, if the blacklist verdict is true. 274 // malware warning, if the blacklist verdict is true.
271 // This IP string could be either in IPv4 or IPv6 format, which is the same 275 // This IP string could be either in IPv4 or IPv6 format, which is the same
272 // as the ones client sent to server. 276 // as the ones client sent to server.
273 optional string bad_ip = 2; 277 optional string bad_ip = 2;
274 optional string bad_url = 3; 278 optional string bad_url = 3;
(...skipping 622 matching lines...) Expand 10 before | Expand all | Expand 10 after
897 enum ReportType { 901 enum ReportType {
898 UNKNOWN = 0; 902 UNKNOWN = 0;
899 URL_PHISHING = 1; 903 URL_PHISHING = 1;
900 URL_MALWARE = 2; 904 URL_MALWARE = 2;
901 URL_UNWANTED = 3; 905 URL_UNWANTED = 3;
902 CLIENT_SIDE_PHISHING_URL = 4; 906 CLIENT_SIDE_PHISHING_URL = 4;
903 CLIENT_SIDE_MALWARE_URL = 5; 907 CLIENT_SIDE_MALWARE_URL = 5;
904 DANGEROUS_DOWNLOAD_RECOVERY = 6; 908 DANGEROUS_DOWNLOAD_RECOVERY = 6;
905 DANGEROUS_DOWNLOAD_WARNING = 7; 909 DANGEROUS_DOWNLOAD_WARNING = 7;
906 DANGEROUS_DOWNLOAD_BY_API = 10; 910 DANGEROUS_DOWNLOAD_BY_API = 10;
911 PASSWORD_PROTECTION_PHISHING_URL = 12;
907 } 912 }
908 913
909 message HTTPHeader { 914 message HTTPHeader {
910 required bytes name = 1; 915 required bytes name = 1;
911 optional bytes value = 2; 916 optional bytes value = 2;
912 } 917 }
913 918
914 message HTTPRequest { 919 message HTTPRequest {
915 message FirstLine { 920 message FirstLine {
916 optional bytes verb = 1; 921 optional bytes verb = 1;
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after
977 // csd_frontend 982 // csd_frontend
978 repeated string client_asn = 6; 983 repeated string client_asn = 6;
979 optional string client_country = 7; 984 optional string client_country = 7;
980 985
981 // Whether user chose to proceed. 986 // Whether user chose to proceed.
982 optional bool did_proceed = 8; 987 optional bool did_proceed = 8;
983 988
984 // Whether user visited this origin before. 989 // Whether user visited this origin before.
985 optional bool repeat_visit = 9; 990 optional bool repeat_visit = 9;
986 991
987 // The same token in ClientDownloadResponse. This field is only set if its 992 // The same token in ClientDownloadResponse or LoginReputationClientResponse.
988 // report type is DANGEROUS_DOWNLOAD_RECOVERY, DANGEROUS_DOWNLOAD_WARNING or 993 // This field is only set if its report type is DANGEROUS_DOWNLOAD_RECOVERY,
989 // DANGEROUS_DOWNLOAD_BY_API. 994 // DANGEROUS_DOWNLOAD_WARNING, DANGEROUS_DOWNLOAD_BY_API or
995 // PASSWORD_PROTECTION_PHISHING_URL.
990 optional bytes token = 15; 996 optional bytes token = 15;
991 } 997 }
992 998
993 // An HTML Element on the page (eg: iframe, div, script, etc). 999 // An HTML Element on the page (eg: iframe, div, script, etc).
994 message HTMLElement { 1000 message HTMLElement {
995 // Id of this element. 1001 // Id of this element.
996 optional int32 id = 1; 1002 optional int32 id = 1;
997 1003
998 // The tag type of this element (eg: iframe, div, script, etc). 1004 // The tag type of this element (eg: iframe, div, script, etc).
999 optional string tag = 2; 1005 optional string tag = 2;
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
1036 // There is no response (an empty body) to this request. 1042 // There is no response (an empty body) to this request.
1037 message NotificationImageReportRequest { 1043 message NotificationImageReportRequest {
1038 optional string notification_origin = 1; // Src-origin of the notification. 1044 optional string notification_origin = 1; // Src-origin of the notification.
1039 optional ImageData image = 2; // The bitmap of the image. 1045 optional ImageData image = 2; // The bitmap of the image.
1040 1046
1041 // Note that the image URL is deliberately omitted as it would be untrusted, 1047 // Note that the image URL is deliberately omitted as it would be untrusted,
1042 // since the notification image fetch may be intercepted by a Service Worker 1048 // since the notification image fetch may be intercepted by a Service Worker
1043 // (even if the image URL is cross-origin). Otherwise a website could mislead 1049 // (even if the image URL is cross-origin). Otherwise a website could mislead
1044 // Safe Browsing into associating phishing image bitmaps with safe image URLs. 1050 // Safe Browsing into associating phishing image bitmaps with safe image URLs.
1045 } 1051 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698