Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(231)

Side by Side Diff: components/policy/proto/device_management_backend.proto

Issue 500013002: Drop 64 character limit in DeviceManagementRequest |agent| parameter (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/browser/policy/test/policy_testserver.py ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 syntax = "proto2"; 5 syntax = "proto2";
6 6
7 option optimize_for = LITE_RUNTIME; 7 option optimize_for = LITE_RUNTIME;
8 8
9 package enterprise_management; 9 package enterprise_management;
10 10
(...skipping 307 matching lines...) Expand 10 before | Expand all | Expand 10 after
318 318
319 // If new_public_key is specified, this field contains a signature 319 // If new_public_key is specified, this field contains a signature
320 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only 320 // of a PolicyPublicKeyAndDomain protobuf, signed using a key only
321 // available to DMServer. The public key portion of this well-known key is 321 // available to DMServer. The public key portion of this well-known key is
322 // embedded into the Chrome binary. The hash of that embedded key is passed 322 // embedded into the Chrome binary. The hash of that embedded key is passed
323 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer 323 // to DMServer as verification_key_hash field in PolicyFetchRequest. DMServer
324 // will pick a private key on the server which matches the hash (matches 324 // will pick a private key on the server which matches the hash (matches
325 // public key on the client). If DMServer is unable to find matching key, it 325 // public key on the client). If DMServer is unable to find matching key, it
326 // will return an error instead of policy data. 326 // will return an error instead of policy data.
327 // In case hash was not specified, DMServer will leave verification signature 327 // In case hash was not specified, DMServer will leave verification signature
328 // field empty (legacy behavior). 328 // field empty (legacy behavior).
329 // In addition to the checks between new_public_key 329 // In addition to the checks between new_public_key
330 // and new_public_key_signature described above, Chrome also verifies 330 // and new_public_key_signature described above, Chrome also verifies
331 // new_public_key with the embedded public key and 331 // new_public_key with the embedded public key and
332 // new_public_key_verification_signature. 332 // new_public_key_verification_signature.
333 optional bytes new_public_key_verification_signature = 7; 333 optional bytes new_public_key_verification_signature = 7;
334 } 334 }
335 335
336 // Protobuf used to generate the new_public_key_verification_signature field. 336 // Protobuf used to generate the new_public_key_verification_signature field.
337 message PolicyPublicKeyAndDomain { 337 message PolicyPublicKeyAndDomain {
338 // The public key to sign (taken from the |new_public_key| field in 338 // The public key to sign (taken from the |new_public_key| field in
339 // PolicyFetchResponse). 339 // PolicyFetchResponse).
340 optional bytes new_public_key = 1; 340 optional bytes new_public_key = 1;
341 341
(...skipping 294 matching lines...) Expand 10 before | Expand all | Expand 10 after
636 // * ping 636 // * ping
637 // * policy 637 // * policy
638 // * register 638 // * register
639 // * status 639 // * status
640 // * unregister 640 // * unregister
641 // * api_authorization 641 // * api_authorization
642 // 642 //
643 // * devicetype: MUST BE "1" for Android or "2" for Chrome OS. 643 // * devicetype: MUST BE "1" for Android or "2" for Chrome OS.
644 // * apptype: MUST BE Android or Chrome. 644 // * apptype: MUST BE Android or Chrome.
645 // * deviceid: MUST BE no more than 64-char in [\x21-\x7E]. 645 // * deviceid: MUST BE no more than 64-char in [\x21-\x7E].
646 // * agent: MUST BE no more than 64-char long. 646 // * agent: MUST BE a string of characters.
647 // * HTTP Authorization header MUST be in the following formats: 647 // * HTTP Authorization header MUST be in the following formats:
648 // * For register and ping requests 648 // * For register and ping requests
649 // Authorization: GoogleLogin auth=<auth cookie for Mobile Sync> 649 // Authorization: GoogleLogin auth=<auth cookie for Mobile Sync>
650 // 650 //
651 // * For unregister, policy, status, and cert_upload requests 651 // * For unregister, policy, status, and cert_upload requests
652 // Authorization: GoogleDMToken token=<dm token from register> 652 // Authorization: GoogleDMToken token=<dm token from register>
653 // 653 //
654 // * The Authorization header isn't used for enterprise_check 654 // * The Authorization header isn't used for enterprise_check
655 // request, nor for register requests using OAuth. In the latter case, 655 // request, nor for register requests using OAuth. In the latter case,
656 // the OAuth token is passed in the "oauth" parameter. 656 // the OAuth token is passed in the "oauth" parameter.
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after
738 738
739 // EMCert upload response. 739 // EMCert upload response.
740 optional DeviceCertUploadResponse cert_upload_response = 9; 740 optional DeviceCertUploadResponse cert_upload_response = 9;
741 741
742 // Response to OAuth2 authorization code request. 742 // Response to OAuth2 authorization code request.
743 optional DeviceServiceApiAccessResponse service_api_access_response = 10; 743 optional DeviceServiceApiAccessResponse service_api_access_response = 10;
744 744
745 // Device-state retrieval. 745 // Device-state retrieval.
746 optional DeviceStateRetrievalResponse device_state_retrieval_response = 11; 746 optional DeviceStateRetrievalResponse device_state_retrieval_response = 11;
747 } 747 }
OLDNEW
« no previous file with comments | « chrome/browser/policy/test/policy_testserver.py ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698