Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1120)

Side by Side Diff: components/safe_browsing/csd.proto

Issue 2949243004: Distinguish G Suite accounts from regular gmail/googlemail accounts (Closed)
Patch Set: address lpz's comments Created 3 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // This proto file includes: 5 // This proto file includes:
6 // (1) Client side phishing and malware detection request and response 6 // (1) Client side phishing and malware detection request and response
7 // protocol buffers. Those protocol messages should be kept in sync 7 // protocol buffers. Those protocol messages should be kept in sync
8 // with the server implementation. 8 // with the server implementation.
9 // 9 //
10 // (2) Safe Browsing reporting protocol buffers. 10 // (2) Safe Browsing reporting protocol buffers.
(...skipping 198 matching lines...) Expand 10 before | Expand all | Expand 10 after
209 // The message contains fields needed for a password reuse event. 209 // The message contains fields needed for a password reuse event.
210 // Next tag: 4 210 // Next tag: 4
211 message PasswordReuseEvent { 211 message PasswordReuseEvent {
212 reserved 1; 212 reserved 1;
213 213
214 // The frame that the password reuse is detected. 214 // The frame that the password reuse is detected.
215 optional int32 frame_id = 2; 215 optional int32 frame_id = 2;
216 216
217 // Whether the reused password is used for Chrome signin. 217 // Whether the reused password is used for Chrome signin.
218 optional bool is_chrome_signin_password = 3; 218 optional bool is_chrome_signin_password = 3;
219
220 // Sync account type. Only set if |is_chrome_signin_password| is true.
221 enum SyncAccountType {
222 // Not a sign-in user.
223 NOT_SIGNED_IN = 0;
Nathan Parker 2017/06/27 23:06:30 Any idea when/why this could happen? Would we expe
Jialiu Lin 2017/06/28 15:40:30 It covers the case such as we cannot get the sync
224
225 // User signed in with @gmail.com, or @googlemail.com account.
226 GMAIL = 1;
227
228 // User signed in with @google.com account.
229 GOOGLE = 2;
230
231 // User signed in with a G Suite account.
232 GSUITE = 3;
233 }
234 optional SyncAccountType sync_account_type = 4;
219 } 235 }
220 236
221 optional PasswordReuseEvent password_reuse_event = 4; 237 optional PasswordReuseEvent password_reuse_event = 4;
222 238
223 // The number of verdicts stored on the client. 239 // The number of verdicts stored on the client.
224 optional int32 stored_verdict_cnt = 5; 240 optional int32 stored_verdict_cnt = 5;
225 241
226 // Chrome user population. 242 // Chrome user population.
227 optional ChromeUserPopulation population = 6; 243 optional ChromeUserPopulation population = 6;
228 } 244 }
(...skipping 837 matching lines...) Expand 10 before | Expand all | Expand 10 after
1066 // There is no response (an empty body) to this request. 1082 // There is no response (an empty body) to this request.
1067 message NotificationImageReportRequest { 1083 message NotificationImageReportRequest {
1068 optional string notification_origin = 1; // Src-origin of the notification. 1084 optional string notification_origin = 1; // Src-origin of the notification.
1069 optional ImageData image = 2; // The bitmap of the image. 1085 optional ImageData image = 2; // The bitmap of the image.
1070 1086
1071 // Note that the image URL is deliberately omitted as it would be untrusted, 1087 // Note that the image URL is deliberately omitted as it would be untrusted,
1072 // since the notification image fetch may be intercepted by a Service Worker 1088 // since the notification image fetch may be intercepted by a Service Worker
1073 // (even if the image URL is cross-origin). Otherwise a website could mislead 1089 // (even if the image URL is cross-origin). Otherwise a website could mislead
1074 // Safe Browsing into associating phishing image bitmaps with safe image URLs. 1090 // Safe Browsing into associating phishing image bitmaps with safe image URLs.
1075 } 1091 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698