Removed the old policy protobufs location.
The policy protobufs were duplicated at chrome/browser/policy/proto
so that the protofiles ebuild of ChromeOS could still fetch them.
That ebuild has been fixed in a separate CL at:
https://chromium-review.googlesource.com/#/c/182300/
BUG=327345
Review URL: https://codereview.chromium.org/137903004
git-svn-id: http://src.chromium.org/svn/trunk/src/chrome/browser/policy/proto@245133 4ff67af0-8c30-449e-8e8b-ad334ec8d88c
diff --git a/PRESUBMIT.py b/PRESUBMIT.py
deleted file mode 100644
index 50d1314..0000000
--- a/PRESUBMIT.py
+++ /dev/null
@@ -1,67 +0,0 @@
-# Copyright 2013 The Chromium Authors. All rights reserved.
-# Use of this source code is governed by a BSD-style license that can be
-# found in the LICENSE file.
-
-# TODO(joaodasilva): remove this file. http://crbug.com/327345
-
-import itertools
-
-def _CheckPolicyProtobufs(input_api, output_api):
- # List of pairs (A, B) where A should equal B.
- file_pairs = [
- ( 'chrome/browser/policy/proto/chromeos/chrome_device_policy.proto',
- 'chrome/browser/chromeos/policy/proto/chrome_device_policy.proto' ),
- ( 'chrome/browser/policy/proto/chromeos/install_attributes.proto',
- 'chrome/browser/chromeos/policy/proto/install_attributes.proto' ),
- ( 'chrome/browser/policy/proto/cloud/chrome_extension_policy.proto',
- 'components/policy/proto/chrome_extension_policy.proto' ),
- ( 'chrome/browser/policy/proto/cloud/device_management_backend.proto',
- 'components/policy/proto/device_management_backend.proto' ),
- ( 'chrome/browser/policy/proto/cloud/device_management_local.proto',
- 'components/policy/proto/device_management_local.proto' ),
- ( 'chrome/browser/policy/proto/PRESUBMIT.py',
- 'components/policy/proto/PRESUBMIT.py' ),
- ( 'chrome/browser/chromeos/policy/proto/PRESUBMIT.py',
- 'components/policy/proto/PRESUBMIT.py' ),
- ]
-
- root = input_api.change.RepositoryRoot()
- results = []
-
- for file_a, file_b in file_pairs:
- path_a = input_api.os_path.join(root, *file_a.split('/'))
- path_b = input_api.os_path.join(root, *file_b.split('/'))
- with open(path_a, 'r') as f_a:
- content_a = f_a.readlines()[3:]
- with open(path_b, 'r') as f_b:
- content_b = f_b.readlines()[3:]
- if content_a != content_b:
- # If you get this error then check |file_pairs| and make sure that the
- # contents of the files in each pair match.
- results.append(output_api.PresubmitError(
- '%s must equal %s. This is temporary until http://crbug.com/327345 '
- 'is fixed.' % (file_a, file_b)))
-
- # If new files are added then |file_pairs| must be updated.
- existing = frozenset(itertools.chain(*file_pairs))
- for f in input_api.AffectedFiles():
- if f.LocalPath() not in existing:
- # If you get this error then add an entry for the new files to
- # |file_pairs|.
- results.append(output_api.PresubmitError(
- 'Please add an entry for %s to %s/PRESUBMIT.py' %
- (f.LocalPath(), input_api.PresubmitLocalPath())))
-
- return results
-
-
-def _CommonChecks(input_api, output_api):
- return _CheckPolicyProtobufs(input_api, output_api)
-
-
-def CheckChangeOnUpload(input_api, output_api):
- return _CommonChecks(input_api, output_api)
-
-
-def CheckChangeOnCommit(input_api, output_api):
- return _CommonChecks(input_api, output_api)
diff --git a/chromeos/chrome_device_policy.proto b/chromeos/chrome_device_policy.proto
deleted file mode 100644
index b841f1f..0000000
--- a/chromeos/chrome_device_policy.proto
+++ /dev/null
@@ -1,585 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-syntax = "proto2";
-
-option optimize_for = LITE_RUNTIME;
-
-package enterprise_management;
-
-message DevicePolicyRefreshRateProto {
- // In milliseconds.
- optional int64 device_policy_refresh_rate = 1;
-}
-
-message UserWhitelistProto {
- // If a UserWhitelistProto is included in the ChromeDeviceSettingsProto but
- // the user_whitelist field is empty then no user can sign-in.
- repeated string user_whitelist = 1;
-}
-
-message AllowNewUsersProto {
- // Determines whether we allow arbitrary users to log into the device.
- // This interacts with the UserWhitelistProto as follows:
- // allow_new_users | user_whitelist | anyone can log in
- //-----------------+--------------------+------------------
- // present, true | not present | Yes
- //-----------------+--------------------+------------------
- // present, true | present | Yes
- //-----------------+--------------------+------------------
- // present, false | not present | (Broken) Yes
- //-----------------+--------------------+------------------
- // present, false | present | No, W/L enforced
- //-----------------+--------------------+------------------
- // not present | not present | Yes
- //-----------------+--------------------+------------------
- // not present | present, empty | Yes
- //-----------------+--------------------+------------------
- // not present | present, non-empty | No, W/L enforced
- //-----------------+--------------------+------------------
- optional bool allow_new_users = 1 [default = true];
-}
-
-message GuestModeEnabledProto {
- // Determines if guests are allowed to log in to the device.
- optional bool guest_mode_enabled = 1 [default = true];
-}
-
-message ShowUserNamesOnSigninProto {
- // Determines if we show pods for existing users on the sign in screen.
- optional bool show_user_names = 1 [default = true];
-}
-
-message DataRoamingEnabledProto {
- // Determines if cellular data roaming is enabled.
- optional bool data_roaming_enabled = 1 [default = false];
-}
-
-message DeviceProxySettingsProto {
- // One of "direct", "auto_detect", "pac_script", "fixed_servers", "system"
- optional string proxy_mode = 1;
- optional string proxy_server = 2;
- optional string proxy_pac_url = 3;
- optional string proxy_bypass_list = 4;
-}
-
-// This is used by chromeos, make sure to do cleanup there before marking it as
-// obsolette.
-message CameraEnabledProto {
- optional bool camera_enabled = 1;
-}
-
-message MetricsEnabledProto {
- optional bool metrics_enabled = 1;
-}
-
-message ReleaseChannelProto {
- // One of "stable-channel", "beta-channel", or "dev-channel"
- optional string release_channel = 1;
-
- // If |release_channel_delegated| is set to true and the |release_channel|
- // field is not set or left empty, the user can select the channel. If the
- // |release_channel| is specified it will always override users choice!
- optional bool release_channel_delegated = 2;
-}
-
-message DeviceOpenNetworkConfigurationProto {
- // The network configuration blob. This is a JSON string as specified by ONC.
- optional string open_network_configuration = 1;
-}
-
-// Policies to turn on portions of the device status reports.
-message DeviceReportingProto {
- optional bool report_version_info = 1;
- optional bool report_activity_times = 2;
- optional bool report_boot_mode = 3;
- optional bool report_location = 4;
- optional bool report_network_interfaces = 5;
- optional bool report_users = 6;
-}
-
-message EphemeralUsersEnabledProto {
- // Determines whether users should be treated as ephemeral. In ephemeral users
- // mode, no cryptohome is created for the user, but a tmpfs mount is used
- // instead such that upon logout all user state is discarded.
- optional bool ephemeral_users_enabled = 1;
-}
-
-// Details of an extension to install as part of the AppPack.
-message AppPackEntryProto {
- optional string extension_id = 1;
- optional string update_url = 2;
-
- // This field was added but never used and there are no plans to support it
- // eventually either.
- optional bool OBSOLETE_online_only = 3 [deprecated = true];
-}
-
-message AppPackProto {
- // List of extensions to install as part of the AppPack.
- repeated AppPackEntryProto app_pack = 1;
-}
-
-// This is a special policy for kiosk/retail mode that specifies what apps
-// should be pinned to the launcher. For regular accounts, pinned apps are
-// controlled through user policy.
-message PinnedAppsProto {
- // App IDs for the apps to pin.
- repeated string app_id = 1;
-}
-
-message ForcedLogoutTimeoutsProto {
- // All timeouts are specified in milliseconds.
-
- // Specifies the timeout before an idle user session is terminated.
- // If this field is omitted or set to 0, no logout on idle will be performed.
- optional int64 idle_logout_timeout = 1;
-
- // Specifies the duration of a warning countdown before the user is logged out
- // because of idleness as specified by the |idle_logout_timeout| value.
- // This field is only used if |idle_logout_timeout| != 0 is specified.
- optional int64 idle_logout_warning_duration = 2;
-}
-
-message ScreenSaverProto {
- // Specifies the extension ID which is to be used as a screen saver on the
- // login screen if no user activity is present. Only respected if the device
- // is in RETAIL mode.
- optional string screen_saver_extension_id = 1;
-
- // Specifies the timeout before the screen saver is activated. If this field
- // is omitted or set to 0, no screen-saver will be started.
- // Measured in milliseconds.
- optional int64 screen_saver_timeout = 2;
-}
-
-// Enterprise controls for auto-update behavior of Chrome OS.
-message AutoUpdateSettingsProto {
- // True if we don't want the device to auto-update (target_version_prefix is
- // ignored in this case).
- optional bool update_disabled = 1;
-
- // Specifies the prefix of the target version we want the device to
- // update to, if it's on a older version. If the device is already on
- // a version with the given prefix, then there's no effect. If the device is
- // on a higher version, it will remain on the higher version as we
- // don't support rollback yet. The format of this version can be one
- // of the following:
- // ---------------------------------------------------------------------
- // "" (or not set at all): update to latest version available.
- // 1412.: update to any minor version of 1412 (e.g. 1412.24.34 or 1412.60.2)
- // 1412.2.: update to any minor version of 1412.2 (e.g. 1412.2.34 or 1412.2.2)
- // 1412.24.34: update to this specific version only
- // ---------------------------------------------------------------------
- optional string target_version_prefix = 2;
-
- // The Chrome browser version (e.g. "17.*") corresponding to the
- // target_version_prefix above. The target_version_prefix is the internal OS
- // version that external users normally are not aware of. This display_name
- // can be used by the devices to display a message to end-users about the auto
- // update setting.
- optional string target_version_display_name = 3;
-
- // Specifies the number of seconds up to which a device may randomly
- // delay its download of an update from the time the update was first pushed
- // out to the server. The device may wait a portion of this time in terms
- // of wall-clock-time and the remaining portion in terms of the number of
- // update checks. In any case, the scatter is upper bounded by a constant
- // amount of time so that a device does not ever get stuck waiting to download
- // an update forever.
- optional int64 scatter_factor_in_seconds = 4;
-
- // Enumerates network connection types.
- enum ConnectionType {
- CONNECTION_TYPE_ETHERNET = 0;
- CONNECTION_TYPE_WIFI = 1;
- CONNECTION_TYPE_WIMAX = 2;
- CONNECTION_TYPE_BLUETOOTH = 3;
- CONNECTION_TYPE_CELLULAR = 4;
- }
-
- // The types of connections that are OK to use for OS updates. OS updates
- // potentially put heavy strain on the connection due to their size and may
- // incur additional cost. Therefore, they are by default not enabled for
- // connection types that are considered expensive, which include WiMax,
- // Bluetooth and Cellular at the moment.
- repeated ConnectionType allowed_connection_types = 5;
-
- // This has been replaced by |reboot_after_update| below.
- optional bool OBSOLETE_reboot_after_update = 6 [deprecated = true];
-
- // True if AU payloads can be downloaded via HTTP. False otherwise.
- optional bool http_downloads_enabled = 7 [default = false];
-
- // True if the device should reboot automatically when an update has been
- // applied and a reboot is required to complete the update process.
- //
- // Note: Currently, automatic reboots are only enabled while the login screen
- // is being shown or a kiosk app session is in progress. This will change in
- // the future and the policy will always apply, regardless of whether a
- // session of any particular type is in progress or not.
- optional bool reboot_after_update = 8;
-
- // True if AU payloads may be shared with and consumed from other devices
- // on the LAN, using p2p. False otherwise.
- optional bool p2p_enabled = 9 [default = false];
-}
-
-message StartUpUrlsProto {
- // Specifies the URLs to be loaded on login to the anonymous account used if
- // the device is in RETAIL mode.
- repeated string start_up_urls = 1;
-}
-
-message SystemTimezoneProto {
- // Specifies an owner-determined timezone that applies to the login screen and
- // all users. Valid values are listed in "timezone_settings.cc". Additionally,
- // timezones from the "IANA Time Zone Database" (e.g. listed on wikipedia)
- // that are equivalent to one of the timezones in "timezone_settings.cc" are
- // valid. In case of an invalid value, the setting is still activated with a
- // fallback timezone (currently "GMT"). In case of an empty string or if no
- // value is provided, the timezone device setting is inactive. In that case,
- // the currently active timezone will remain in use however users can change
- // the timezone and the change is persistent. Thus a change by one user
- // affects the login-screen and all other users.
- optional string timezone = 1;
-}
-
-message SystemUse24HourClockProto {
- // Specifies an owner-determined clock format that applies to the login
- // screen and is used as a default for all user sessions. Users can still
- // override the format to use for their account.
- //
- // True and false select a 24 and 12 hour clock format, respectively. The
- // default format for the case the setting is not present is 24 hour clock.
- optional bool use_24hour_clock = 1;
-}
-
-// Parameters for Kiosk App device-local accounts.
-message KioskAppInfoProto {
- // Indicates the Kiosk App for the corresponding device-local account. The
- // string value should be a valid 32-character Chrome App identifier and
- // specifies the Kiosk App to download and run.
- optional string app_id = 1;
-
- // Obsolete: Kiosk Apps can only be installed from the Chrome Web Store.
- optional string OBSOLETE_update_url = 2 [deprecated = true];
-}
-
-// Describes a single device-local account.
-message DeviceLocalAccountInfoProto {
- // Deprecated: Account identifier for a public session device-local account.
- // Old code didn't have the |type| field, so it can't handle new types of
- // device-local accounts gracefully (i.e. ignoring unsupported types). New
- // code should instead set type to ACCOUNT_TYPE_PUBLIC_SESSION and write the
- // identifier to the |account_id| field below. If the |type| field is present,
- // |deprecated_public_session_id| will be ignored.
- optional string deprecated_public_session_id = 1;
-
- // Identifier for the device-local account. This is an opaque identifier that
- // is used to distinguish different device-local accounts configured. All
- // configured accounts on a device must have unique identifiers.
- optional string account_id = 2;
-
- // Indicates the type of device-local account.
- enum AccountType {
- // A login-less, policy-configured browsing session.
- ACCOUNT_TYPE_PUBLIC_SESSION = 0;
- // An account that serves as a container for a single full-screen app.
- ACCOUNT_TYPE_KIOSK_APP = 1;
- };
-
- // The account type.
- optional AccountType type = 3;
-
- // Kiosk App parameters, relevant if |type| is ACCOUNT_TYPE_KIOSK_APP.
- optional KioskAppInfoProto kiosk_app = 4;
-}
-
-message DeviceLocalAccountsProto {
- // The list of device-local accounts (i.e. accounts without an associated
- // cloud-backed profile) that are available on the device.
- repeated DeviceLocalAccountInfoProto account = 1;
-
- // The identifier of the device-local account to which the device
- // should be logged in automatically. Should be equal to one of the
- // ids in DeviceLocalAccountInfoProto.
- optional string auto_login_id = 2;
-
- // The amount of time, in milliseconds, that should elapse at the signin
- // screen without user interaction before automatically logging in.
- optional int64 auto_login_delay = 3;
-
- // Whether the keyboard shortcut to prevent zero-delay auto-login should be
- // enabled or not. If this keyboard shortcut is engaged, the auto-login will
- // be delayed by 3 seconds so administrators can log in or make configuration
- // changes.
- optional bool enable_auto_login_bailout = 4 [default = true];
-
- // Whether network configuration should be offered or not when the device
- // does not have access to the Internet. If the policy is omitted or set to
- // true, the network configuration will be offered. Otherwise, only an error
- // message is displayed.
- // Note: If both this policy and enable_auto_login_bailout policy above is
- // set to false, there are chances that the device might become totally
- // unusable when there is no Internet access and has to go through the
- // recovery process.
- optional bool prompt_for_network_when_offline = 5 [default = true];
-}
-
-message AllowRedeemChromeOsRegistrationOffersProto {
- // Chrome OS Registration service provides way for chromeos device users
- // to redeem electronic offers provided by service provider.
- // This value determines if users are allowed to redeem offers through
- // Chrome OS Registration service.
- optional bool allow_redeem_offers = 1 [default = true];
-}
-
-message StartUpFlagsProto {
- // The list of flags to be applied to chrome on start-up (back up store for
- // owner set flags in about:flags).
- repeated string flags = 1;
-}
-
-message UptimeLimitProto {
- // This has been replaced by |uptime_limit| below.
- optional int64 OBSOLETE_uptime_limit = 1 [deprecated = true];
-
- // Sets the length of device uptime after which an automatic reboot is
- // scheduled. An automatic reboot is scheduled at the selected time but may be
- // delayed on the device by up to 24 hours, e.g. if a user is currently using
- // the device or an app/extension has requested reboots to be inhibited
- // temporarily. The policy value should be specified in seconds.
- //
- // Note: Currently, automatic reboots are only enabled while the login screen
- // is being shown or a kiosk app session is in progress. This will change in
- // the future and the policy will always apply, regardless of whether a
- // session of any particular type is in progress or not.
- optional int64 uptime_limit = 2;
-}
-
-message VariationsParameterProto {
- // The string for the restrict parameter to be appended to the Variations URL
- // when pinging the Variations server.
- optional string parameter = 1;
-}
-
-message AttestationSettingsProto {
- // Attestation involves proving that a cryptographic key is protected by a
- // legitimate Chrome OS TPM and reporting the operating mode of the platform.
- // This setting enables enterprise attestation features at a device level. If
- // this is enabled a machine key will be generated and certified by the Chrome
- // OS CA. If this setting is disabled, even users with attestation settings
- // enabled will not be able to use those features on the device.
- optional bool attestation_enabled = 1 [default = false];
-
- // Chrome OS devices can use remote attestation (Verified Access) to get a
- // certificate issued by the Chrome OS CA that asserts the device is eligible
- // to play protected content. This process involves sending hardware
- // endorsement information to the Chrome OS CA which uniquely identifies the
- // device. This setting allows this feature to be disabled for the device
- // regardless of any user-specific settings.
- optional bool content_protection_enabled = 2 [default = true];
-}
-
-message AccessibilitySettingsProto {
- // Sets the default state of the large cursor accessibility feature on the
- // login screen. If this policy is set to true, the large cursor will be
- // enabled when the login screen is shown. If this policy is set to false, the
- // large cursor will be disabled when the login screen is shown. Users can
- // temporarily override this setting by enabling or disabling the large
- // cursor. However, the user's choice is not persistent and the default is
- // restored whenever the login screen is shown anew or the user remains idle
- // on the login screen for a minute. If this policy is left unset, the large
- // cursor is disabled when the login screen is first shown. Users can enable
- // or disable the large cursor anytime and its status on the login screen is
- // persisted between users.
- optional bool login_screen_default_large_cursor_enabled = 1;
-
- // Sets the default state of the spoken feedback accessibility feature on the
- // login screen. If this policy is set to true, spoken feedback will be
- // enabled when the login screen is shown. If this policy is set to false,
- // spoken feedback will be disabled when the login screen is shown. Users can
- // temporarily override this setting by enabling or disabling spoken feedback.
- // However, the user's choice is not persistent and the default is restored
- // whenever the login screen is shown anew or the user remains idle on the
- // login screen for a minute. If this policy is left unset, spoken feedback is
- // disabled when the login screen is first shown. Users can enable or disable
- // spoken feedback anytime and its status on the login screen is persisted
- // between users.
- optional bool login_screen_default_spoken_feedback_enabled = 2;
-
- // Sets the default state of the high contrast mode accessibility feature on
- // the login screen. If this policy is set to true, high contrast mode will be
- // enabled when the login screen is shown. If this policy is set to false,
- // high contrast mode will be disabled when the login screen is shown. Users
- // can temporarily override this setting by enabling or disabling high
- // contrast mode. However, the user's choice is not persistent and the default
- // is restored whenever the login screen is shown anew or the user remains
- // idle on the login screen for a minute. If this policy is left unset, high
- // contrast mode is disabled when the login screen is first shown. Users can
- // enable or disable high contrast mode anytime and its status on the login
- // screen is persisted between users.
- optional bool login_screen_default_high_contrast_enabled = 3;
-
- // Enumerates the screen magnifier types.
- enum ScreenMagnifierType {
- // Screen magnifier disabled.
- SCREEN_MAGNIFIER_TYPE_NONE = 0;
- // Full-screen magnifier enabled.
- SCREEN_MAGNIFIER_TYPE_FULL = 1;
- };
-
- // Sets the default type of screen magnifier that is enabled on the login
- // screen. If this policy is set, it controls the type of screen magnifier
- // that is enabled when the login screen is shown. Users can temporarily
- // override this setting by enabling or disabling the screen magnifier.
- // However, the user's choice is not persistent and the default is restored
- // whenever the login screen is shown anew or the user remains idle on the
- // login screen for a minute. If this policy is left unset, the screen
- // magnifier is disabled when the login screen is first shown. Users can
- // enable or disable the screen magnifier anytime and its status on the login
- // screen is persisted between users.
- optional ScreenMagnifierType login_screen_default_screen_magnifier_type = 4;
-}
-
-message SupervisedUsersSettingsProto {
- // Defines whether supervised users can be created on the device.
- optional bool supervised_users_enabled = 1;
-}
-
-message LoginScreenPowerManagementProto {
- // Configures power management on the login screen. The policy should be
- // specified as a string that expresses the individual settings in JSON
- // format, conforming to the following schema:
- // {
- // "type": "object",
- // "properties": {
- // "AC": {
- // "description": "Power management settings applicable only when
- // running on AC power",
- // "type": "object",
- // "properties": {
- // "Delays": {
- // "type": "object",
- // "properties": {
- // "ScreenDim": {
- // "description": "The length of time without user input after
- // which the screen is dimmed, in milliseconds",
- // "type": "integer",
- // "minimum": 0
- // },
- // "ScreenOff": {
- // "description": "The length of time without user input after
- // which the screen is turned off, in
- // milliseconds",
- // "type": "integer",
- // "minimum": 0
- // },
- // "Idle": {
- // "description": "The length of time without user input after
- // which the idle action is taken, in
- // milliseconds",
- // "type": "integer",
- // "minimum": 0
- // }
- // }
- // },
- // "IdleAction": {
- // "description": "Action to take when the idle delay is reached",
- // "enum": [ "Suspend", "Shutdown", "DoNothing" ]
- // }
- // }
- // },
- // "Battery": {
- // "description": "Power management settings applicable only when
- // running on battery power",
- // "type": "object",
- // "properties": {
- // "Delays": {
- // "type": "object",
- // "properties": {
- // "ScreenDim": {
- // "description": "The length of time without user input after
- // which the screen is dimmed, in milliseconds",
- // "type": "integer",
- // "minimum": 0
- // },
- // "ScreenOff": {
- // "description": "The length of time without user input after
- // which the screen is turned off, in
- // milliseconds",
- // "type": "integer",
- // "minimum": 0
- // },
- // "Idle": {
- // "description": "The length of time without user input after
- // which the idle action is taken, in
- // milliseconds",
- // "type": "integer",
- // "minimum": 0
- // }
- // }
- // },
- // "IdleAction": {
- // "description": "Action to take when the idle delay is reached",
- // "enum": [ "Suspend", "Shutdown", "DoNothing" ]
- // }
- // }
- // },
- // "LidCloseAction": {
- // "description": "Action to take when the lid is closed",
- // "enum": [ "Suspend", "Shutdown", "DoNothing" ]
- // },
- // "UserActivityScreenDimDelayScale": {
- // "description": "Percentage by which the screen dim delay is scaled
- // when user activity is observed while the screen is
- // dimmed or soon after the screen has been turned off",
- // "type": "integer",
- // "minimum": 0
- // }
- // }
- // }
- optional string login_screen_power_management = 1;
-}
-
-message AutoCleanupSettigsProto {
- // Configures strategy for automatic clean-up process that is run when device
- // runs out of free disk space. One of "remove-lru", "remove-lru-if-dormant".
- optional string clean_up_strategy = 1;
-}
-
-message ChromeDeviceSettingsProto {
- optional DevicePolicyRefreshRateProto device_policy_refresh_rate = 1;
- optional UserWhitelistProto user_whitelist = 2;
- optional GuestModeEnabledProto guest_mode_enabled = 3;
- optional DeviceProxySettingsProto device_proxy_settings = 4;
- optional CameraEnabledProto camera_enabled = 5;
- optional ShowUserNamesOnSigninProto show_user_names = 6;
- optional DataRoamingEnabledProto data_roaming_enabled = 7;
- optional AllowNewUsersProto allow_new_users = 8;
- optional MetricsEnabledProto metrics_enabled = 9;
- optional ReleaseChannelProto release_channel = 10;
- optional DeviceOpenNetworkConfigurationProto open_network_configuration = 11;
- optional DeviceReportingProto device_reporting = 12;
- optional EphemeralUsersEnabledProto ephemeral_users_enabled = 13;
- optional AppPackProto app_pack = 14;
- optional ForcedLogoutTimeoutsProto forced_logout_timeouts = 15;
- optional ScreenSaverProto login_screen_saver = 16;
- optional AutoUpdateSettingsProto auto_update_settings = 17;
- optional StartUpUrlsProto start_up_urls = 18;
- optional PinnedAppsProto pinned_apps = 19;
- optional SystemTimezoneProto system_timezone = 20;
- optional DeviceLocalAccountsProto device_local_accounts = 21;
- optional AllowRedeemChromeOsRegistrationOffersProto allow_redeem_offers = 22;
- optional StartUpFlagsProto start_up_flags = 23;
- optional UptimeLimitProto uptime_limit = 24;
- optional VariationsParameterProto variations_parameter = 25;
- optional AttestationSettingsProto attestation_settings = 26;
- optional AccessibilitySettingsProto accessibility_settings = 27;
- optional SupervisedUsersSettingsProto supervised_users_settings = 28;
- optional LoginScreenPowerManagementProto login_screen_power_management = 29;
- optional SystemUse24HourClockProto use_24hour_clock = 30;
- optional AutoCleanupSettigsProto auto_clean_up_settings = 31;
-}
diff --git a/chromeos/install_attributes.proto b/chromeos/install_attributes.proto
deleted file mode 100644
index f1442f4..0000000
--- a/chromeos/install_attributes.proto
+++ /dev/null
@@ -1,20 +0,0 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-syntax = "proto2";
-
-option optimize_for = LITE_RUNTIME;
-
-package cryptohome;
-
-// This must match install_attributes.proto in the Chromium OS cryptohome
-// repository. Only the fields that are relevant to the browser are present
-// here.
-message SerializedInstallAttributes {
- message Attribute {
- required string name = 1;
- required bytes value = 2;
- }
- repeated Attribute attributes = 2;
-}
diff --git a/cloud/chrome_extension_policy.proto b/cloud/chrome_extension_policy.proto
deleted file mode 100644
index 27da746..0000000
--- a/cloud/chrome_extension_policy.proto
+++ /dev/null
@@ -1,43 +0,0 @@
-// Copyright (c) 2013 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-syntax = "proto2";
-
-option optimize_for = LITE_RUNTIME;
-
-package enterprise_management;
-
-// Describes how to retrieve policy data for a particular extension. The
-// extension ID is in the |settings_entity_id| field of the PolicyData message
-// that contains the ExternalPolicyData in its |policy_value| field.
-message ExternalPolicyData {
- // A URL where the policy data can be downloaded from.
- optional string download_url = 1;
-
- // SHA-1 hash of the data at |download_url|. This is used to verify the
- // integrity of the data, and to detect updates on the client side: the client
- // downloads the data when its local hash does not match |secure_hash|.
- optional bytes secure_hash = 2;
-
- // An authentication method that can be used to verify that the client is
- // authorized to download |download_url|.
- enum AuthMethod {
- // No authentication is performed; knowledge of the URL is enough to
- // authorize its download.
- NONE = 0;
-
- // The HTTP GET request sent to |download_url| must include an
- // "Authorization: " HTTP header of the GoogleDMToken type. Its value is the
- // same as the DMToken used for the policy fetch.
- DMTOKEN = 1;
-
- // The HTTP GET request sent to |download_url| must include an
- // "Authorization: " HTTP header of the "OAuth" type. Its value is a valid
- // Google Accounts OAuth access token.
- OAUTH = 2;
- }
-
- // The authentication method that the client must use to fetch |download_url|.
- optional AuthMethod download_auth_method = 3 [default = NONE];
-}
diff --git a/cloud/device_management_backend.proto b/cloud/device_management_backend.proto
deleted file mode 100644
index 7bda9e6..0000000
--- a/cloud/device_management_backend.proto
+++ /dev/null
@@ -1,630 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-syntax = "proto2";
-
-option optimize_for = LITE_RUNTIME;
-
-package enterprise_management;
-
-// Request from device to server to register device.
-message DeviceRegisterRequest {
- // Reregister device without erasing server state. It can be used
- // to refresh dmtoken etc. Client MUST set this value to true if it
- // reuses an existing device id.
- optional bool reregister = 1;
-
- // Device register type. This field does not exist for TT release.
- // When a client requests for policies, server should verify the
- // client has been registered properly. For example, a client must
- // register with type DEVICE in order to retrieve device policies.
- enum Type {
- TT = 0; // Register for TT release.
- USER = 1; // Register for Chrome OS user polices.
- DEVICE = 2; // Register for device policies.
- BROWSER = 3; // Register for Chrome user policies.
- ANDROID_BROWSER = 4; // Register for Android Chrome browser user policies.
- IOS_BROWSER = 5; // Register for iOS Chrome browser user policies.
- }
- // NOTE: we also use this field to detect client version. If this
- // field is missing, then the request comes from TT. We will remove
- // Chrome OS TT support once it is over.
- optional Type type = 2 [default = TT];
-
- // Machine hardware id, such as serial number.
- // This field is required if register type == DEVICE.
- optional string machine_id = 3;
-
- // Machine model name, such as "ZGA", "Cr-48", "Nexus One". If the
- // model name is not available, client SHOULD send generic name like
- // "Android", or "Chrome OS".
- optional string machine_model = 4;
-
- // When true, indicates that the |machine_id| has been identified as auto-
- // enrollment candidate on the client and the server can use it to verify
- // that the client is to be enrolled in the correct mode.
- // Defaults to false when not present.
- optional bool auto_enrolled = 5;
-
- // Indicates a requisition of the registering entity that the server can act
- // upon. This allows clients to pass hints e.g. at device enrollment time
- // about the intended use of the device.
- optional string requisition = 6;
-}
-
-// Response from server to device register request.
-message DeviceRegisterResponse {
- // Device management token for this registration. This token MUST be
- // part of HTTP Authorization header for all future requests from
- // device to server.
- required string device_management_token = 1;
-
- // Device display name. By default, server generates the name in
- // the format of "Machine Model - Machine Id". However, domain
- // admin can update it using CPanel, so do NOT treat it as constant.
- optional string machine_name = 2;
-
- // Enum listing the possible modes the device should be locked into when the
- // registration is finished.
- enum DeviceMode {
- // In ENTERPRISE mode the device has no local owner and device settings are
- // controlled through the cloud policy infrastructure. Auto-enrollment is
- // supported in that mode.
- ENTERPRISE = 0;
- // Devices in RETAIL mode also have no local owner and get their device
- // settings from the cloud, but additionally this mode enables the demo
- // account on the device.
- RETAIL = 1;
- }
- optional DeviceMode enrollment_type = 3 [default = ENTERPRISE];
-}
-
-// Request from device to server to unregister device.
-// GoogleDMToken MUST be in HTTP Authorization header.
-message DeviceUnregisterRequest {
-}
-
-// Response from server to device for unregister request.
-message DeviceUnregisterResponse {
-}
-
-// Request from device to server to upload device EMCert
-// (enteprise machine cert used for remote attestation).
-// GoogleDMToken MUST be in HTTP Authorization header.
-message DeviceCertUploadRequest {
- // EMCert in X.509 format.
- optional bytes device_certificate = 1;
-}
-
-// Response from server to device for cert upload request.
-message DeviceCertUploadResponse {
-}
-
-// Request to access a Google service with the given scope.
-message DeviceServiceApiAccessRequest {
- // The list of auth scopes the device requests from DMServer.
- repeated string auth_scope = 1;
-
- // OAuth2 client ID to which the returned authorization code is bound.
- optional string oauth2_client_id = 2;
-}
-
-message DeviceServiceApiAccessResponse {
- // The OAuth2 authorization code for the requested scope(s).
- // This can be exchanged for a refresh token.
- optional string auth_code = 1;
-}
-
-message PolicyFetchRequest {
- // This is the policy type, which maps to D3 policy type internally.
- // By convention, we use "/" as separator to create policy namespace.
- // The policy type names are case insensitive.
- //
- // Possible values for Chrome OS are:
- // google/chromeos/device => ChromeDeviceSettingsProto
- // google/chromeos/user => ChromeSettingsProto
- // google/chromeos/publicaccount => ChromeSettingsProto
- // google/chrome/extension => ExternalPolicyData
- // google/android/user => ChromeSettingsProto
- // google/ios/user => ChromeSettingsProto
- optional string policy_type = 1;
-
- // This is the last policy timestamp that client received from server.
- optional int64 timestamp = 2;
-
- // Tell server what kind of security signature is required.
- enum SignatureType {
- NONE = 0;
- SHA1_RSA = 1;
- }
- optional SignatureType signature_type = 3 [default = NONE];
-
- // The version number of the public key that is currently stored
- // on the client. This should be the last number the server had
- // supplied as new_public_key_version in PolicyData.
- // This field is unspecified if the client does not yet have a
- // public key.
- optional int32 public_key_version = 4;
-
- // Machine hardware id, such as serial number.
- // This field is should be set only if the serial number for the device is
- // missing from the server, as indicated by the valid_serial_number_missing
- // field in the last policy fetch response.
- optional string machine_id = 5;
-
- // This field is used for devices to send the additional ID to fetch settings.
- // Retrieving some settings requires more than just device or user ID.
- // For example, to retrieve public account, devices need to pass in
- // public account ID in addition to device ID. To retrieve extension or
- // plug-in settings, devices need to pass in extension/plug-in ID in
- // addition to user ID.
- // policy_type represents the type of settings (e.g. public account,
- // extension) devices request to fetch.
- optional string settings_entity_id = 6;
-
- // If this fetch is due to a policy invalidation, this field contains the
- // version provided with the invalidation. The server interprets this value
- // and the value of invalidation_payload to fetch the up-to-date policy.
- optional int64 invalidation_version = 7;
-
- // If this fetch is due to a policy invalidation, this field contains the
- // payload delivered with the invalidation. The server interprets this value
- // and the value of invalidation_version to fetch the up-to-date policy.
- optional bytes invalidation_payload = 8;
-}
-
-// This message is included in serialized form in PolicyFetchResponse
-// below. It may also be signed, with the signature being created for
-// the serialized form.
-message PolicyData {
- // See PolicyFetchRequest.policy_type.
- optional string policy_type = 1;
-
- // [timestamp] is milliseconds since Epoch in UTC timezone. It is
- // included here so that the time at which the server issued this
- // response cannot be faked (as protection against replay attacks).
- // It is the timestamp generated by DMServer, NOT the time admin
- // last updated the policy or anything like that.
- optional int64 timestamp = 2;
-
- // The DM token that was used by the client in the HTTP POST header
- // for authenticating the request. It is included here again so that
- // the client can verify that the response is meant for him (and not
- // issued by a replay or man-in-the-middle attack).
- optional string request_token = 3;
-
- // The serialized value of the actual policy protobuf. This can be
- // deserialized to an instance of, for example, ChromeSettingsProto,
- // ChromeDeviceSettingsProto, or ExternalPolicyData.
- optional bytes policy_value = 4;
-
- // The device display name assigned by the server. It is only
- // filled if the display name is available.
- //
- // The display name of the machine as generated by the server or set
- // by the Administrator in the CPanel GUI. This is the same thing as
- // |machine_name| in DeviceRegisterResponse but it might have
- // changed since then.
- optional string machine_name = 5;
-
- // Version number of the server's current public key. (The key that
- // was used to sign this response. Numbering should start at 1 and be
- // increased by 1 at each key rotation.)
- optional int32 public_key_version = 6;
-
- // The user this policy is intended for. In case of device policy, the name
- // of the owner (who registered the device).
- optional string username = 7;
-
- // In this field the DMServer should echo back the "deviceid" HTTP parameter
- // from the request.
- optional string device_id = 8;
-
- // Indicates which state this association with DMServer is in. This can be
- // used to tell the client that it is not receiving policy even though the
- // registration with the server is kept active.
- enum AssociationState {
- // Association is active and policy is pushed.
- ACTIVE = 0;
- // Association is alive, but the corresponding domain is not managed.
- UNMANAGED = 1;
- // Client got dropped on the server side.
- DEPROVISIONED = 2;
- }
- optional AssociationState state = 9 [default = ACTIVE];
-
- // Indicates if the the server cannot find a valid serial number for the
- // device. If this flag is set, the device should send the valid serial
- // number with a device policy fetch request. Note that this only
- // applies to device policy.
- optional bool valid_serial_number_missing = 10;
-
- // Indicates which public account or extension/plug-in this policy data is
- // for. See PolicyFetchRequest.settings_entity_id for more details.
- optional string settings_entity_id = 11;
-
- // Indicates the identity the device service account is associated with.
- // This is only sent as part of device policy fetch.
- optional string service_account_identity = 12;
-
- // The object source which hosts policy objects within the invalidation
- // service. This value is combined with invalidation_name to form the object
- // id used to register for invalidations to this policy.
- optional int32 invalidation_source = 13;
-
- // The name which uniquely identifies this policy within the invalidation
- // service object source. This value is combined with invalidation_source to
- // form the object id used to register for invalidations to this policy.
- optional bytes invalidation_name = 14;
-}
-
-message PolicyFetchResponse {
- // Since a single policy request may ask for multiple policies, we
- // provide separate error code for each individual policy fetch.
-
- // We will use standard HTTP Status Code as error code.
- optional int32 error_code = 1;
-
- // Human readable error message for customer support purpose.
- optional string error_message = 2;
-
- // This is a serialized |PolicyData| protobuf (defined above).
- optional bytes policy_data = 3;
-
- // Signature of the policy data above.
- optional bytes policy_data_signature = 4;
-
- // If the public key has been rotated on the server, the new public
- // key is sent here. It is already used for |policy_data_signature|
- // above, whereas |new_public_key_signature| is created using the
- // old key (so the client can trust the new key). If this is the
- // first time when the client requests policies (so it doesn't have
- // on old public key), then |new_public_key_signature| is empty.
- optional bytes new_public_key = 5;
- optional bytes new_public_key_signature = 6;
-}
-
-// Request from device to server for reading policies.
-message DevicePolicyRequest {
- // The policy fetch request. If this field exists, the request must
- // comes from a non-TT client. The repeated field allows client to
- // request multiple policies for better performance.
- repeated PolicyFetchRequest request = 3;
-}
-
-// Response from server to device for reading policies.
-message DevicePolicyResponse {
- // The policy fetch response.
- repeated PolicyFetchResponse response = 3;
-}
-
-message TimePeriod {
- // [timestamp] is milli seconds since Epoch in UTC timezone.
- optional int64 start_timestamp = 1;
- optional int64 end_timestamp = 2;
-}
-
-message ActiveTimePeriod {
- optional TimePeriod time_period = 1;
-
- // The active duration during the above time period.
- // The unit is milli-second.
- optional int32 active_duration = 2;
-}
-
-// This captures launch events for one app/extension or other installments.
-message InstallableLaunch {
- optional string install_id = 1;
-
- // Time duration where this report covers. These are required
- // and the record will be ignored if not set.
- optional TimePeriod duration = 2;
-
- // Client will send at most 50 timestamps to DM. All the rest
- // launch activities will be summed into the total count.
- // We will distribute the count evenly among the time span when
- // doing time based aggregation.
- repeated int64 timestamp = 3;
- optional int64 total_count = 4;
-}
-
-// Used to report the device location.
-message DeviceLocation {
- enum ErrorCode {
- ERROR_CODE_NONE = 0;
- ERROR_CODE_POSITION_UNAVAILABLE = 1;
- }
-
- // Latitude in decimal degrees north (WGS84 coordinate frame).
- optional double latitude = 1;
-
- // Longitude in decimal degrees west (WGS84 coordinate frame).
- optional double longitude = 2;
-
- // Altitude in meters (above WGS84 datum).
- optional double altitude = 3;
-
- // Accuracy of horizontal position in meters.
- optional double accuracy = 4;
-
- // Accuracy of altitude in meters.
- optional double altitude_accuracy = 5;
-
- // Heading in decimal degrees clockwise from true north.
- optional double heading = 6;
-
- // Horizontal component of device velocity in meters per second.
- optional double speed = 7;
-
- // Time of position measurement in milisecons since Epoch in UTC time.
- optional int64 timestamp = 8;
-
- // Error code, see enum above.
- optional ErrorCode error_code = 9;
-
- // Human-readable error message.
- optional string error_message = 10;
-}
-
-// Details about a network interface.
-message NetworkInterface {
- // Indicates the type of network device.
- enum NetworkDeviceType {
- TYPE_ETHERNET = 0;
- TYPE_WIFI = 1;
- TYPE_WIMAX = 2;
- TYPE_BLUETOOTH = 3;
- TYPE_CELLULAR = 4;
- }
-
- // Network device type.
- optional NetworkDeviceType type = 1;
-
- // MAC address (if applicable) of the corresponding network device. This is
- // formatted as an ASCII string with 12 hex digits. Example: A0B1C2D3E4F5.
- optional string mac_address = 2;
-
- // MEID (if applicable) of the corresponding network device. Formatted as
- // ASCII string composed of 14 hex digits. Example: A10000009296F2.
- optional string meid = 3;
-
- // IMEI (if applicable) of the corresponding network device. 15-16 decimal
- // digits encoded as ASCII string. Example: 355402040158759.
- optional string imei = 4;
-}
-
-// Details about a device user.
-message DeviceUser {
- // Types of device users which can be reported.
- enum UserType {
- // A user managed by the same domain as the device.
- USER_TYPE_MANAGED = 0;
-
- // A user not managed by the same domain as the device.
- USER_TYPE_UNMANAGED = 1;
- }
-
- // The type of the user.
- required UserType type = 1;
-
- // Email address of the user. Present only if the user type is managed.
- optional string email = 2;
-}
-
-// Report device level status.
-message DeviceStatusReportRequest {
- // The OS version reported by the device is a platform version
- // e.g. 1435.0.2011_12_16_1635.
- optional string os_version = 1;
- optional string firmware_version = 2;
-
- // "Verified", "Dev". Same as verified mode.
- // If the mode is unknown, this field should not be set.
- optional string boot_mode = 3;
-
- // Device active times collection since last report rpc call.
- // No longer used -- use active_period instead.
- repeated TimePeriod active_time = 4 [deprecated = true];
-
- // The browser version string as shown in the About dialog.
- // e.g. 17.0.963.18.
- optional string browser_version = 5;
-
- // A list of periods when the device was active, aggregated by day.
- repeated ActiveTimePeriod active_period = 6;
-
- // The device location.
- optional DeviceLocation device_location = 7;
-
- // List of network interfaces.
- repeated NetworkInterface network_interface = 8;
-
- // List of recent device users, in descending order by last login time.
- repeated DeviceUser user = 9;
-}
-
-// Report session (a user on one device) level status.
-message SessionStatusReportRequest {
- // Installed apps for this user on this device.
- repeated string installed_app_id = 1;
-
- // Installed extensions for this user on this device.
- repeated string installed_extension_id = 2;
-
- // One stat per app for top 30 apps.
- repeated InstallableLaunch app_launch_stat = 3;
-}
-
-// Response from DMServer to update devices' status.
-// It is possible that status report fails but policy request succeed. In such
-// case, the DeviceStatusReportResponse will contain an error code and the
-// device should re-send status report data in the next policy request. The
-// device should re-send report data if policy request fails, even if
-// DeviceStatusReportResponse contains no error code.
-message DeviceStatusReportResponse {
- optional int32 error_code = 1;
-
- // Human readable error message for customer support purpose.
- optional string error_message = 2;
-}
-
-// Response from DMServer to update user devices' status.
-// It is possible that status report fails but policy request succeed. In such
-// case, the SessionStatusReportResponse will contain an error code and the
-// device should re-send status report data in the next policy request. The
-// device should re-send report data if policy request fails, even if
-// SessionStatusReportResponse contains no error code.
-message SessionStatusReportResponse {
- optional int32 error_code = 1;
-
- // Human readable error message for customer support purpose.
- optional string error_message = 2;
-}
-
-// Request from device to server to determine whether the device should
-// go through enterprise enrollment. Unlike the other requests, this request is
-// not authenticated.
-message DeviceAutoEnrollmentRequest {
- // SHA-256 hash of the device's serial number, mod |modulus|.
- // Should always be present.
- optional int64 remainder = 1;
-
- // Modulus of the hash used by the client. Should always be present. This
- // is the number of buckets the client thinks the server has. For now,
- // it is a power of 2, but due to the strict constraint on how many serial
- // numbers a bucket can contain, it may become non power of 2. If that
- // happens, client-side needs to change its assumption.
- optional int64 modulus = 2;
-}
-
-// Response from server to auto-enrollment detection request.
-message DeviceAutoEnrollmentResponse {
- // If this field is present, the other fields are ignored and the client
- // should send a new DeviceAutoEnrollmentRequest with a new |remainder|
- // computed using this new |modulus|. If this field is empty, the client's
- // request was accepted.
- // DMServer guarantees that if the modulus sent by client in
- // DeviceAutoEnrollmentRequest matches server's expectation, this field
- // is unset.
- optional int64 expected_modulus = 1;
-
- // List of hashes in the client's hash bucket. If the client's hash matches
- // any in this list, the client device should do enterprise enrollment.
- // If it matches none, enrollment should be optional.
- // Each entry has exactly 256 bits (32 bytes).
- repeated bytes hash = 2;
-}
-
-// Request from the DMAgent on the device to the DMServer. This is
-// container for all requests from device to server. The overall HTTP
-// request MUST be in the following format:
-//
-// * HTTP method is POST
-// * Data mime type is application/x-protobuffer
-// * HTTP parameters are (all required, all case sensitive):
-// * request: MUST BE one of
-// * cert_upload
-// * enterprise_check
-// * ping
-// * policy
-// * register
-// * status
-// * unregister
-// * api_authorization
-//
-// * devicetype: MUST BE "1" for Android or "2" for Chrome OS.
-// * apptype: MUST BE Android or Chrome.
-// * deviceid: MUST BE no more than 64-char in [\x21-\x7E].
-// * agent: MUST BE no more than 64-char long.
-// * HTTP Authorization header MUST be in the following formats:
-// * For register and ping requests
-// Authorization: GoogleLogin auth=<auth cookie for Mobile Sync>
-//
-// * For unregister, policy, status, and cert_upload requests
-// Authorization: GoogleDMToken token=<dm token from register>
-//
-// * The Authorization header isn't used for enterprise_check
-// request, nor for register requests using OAuth. In the latter case,
-// the OAuth token is passed in the "oauth" parameter.
-//
-// DeviceManagementRequest should only contain one request which matches the
-// HTTP query parameter - request, as listed below. Other requests within the
-// container will be ignored.
-// cert_upload: cert_upload_request
-// enterprise_check: auto_enrollment_request
-// ping: policy_request
-// policy: policy_request
-// register: register_request
-// status: device_status_report_request or session_status_report_request
-// unregister: unregister_request
-//
-//
-message DeviceManagementRequest {
- // Register request.
- optional DeviceRegisterRequest register_request = 1;
-
- // Unregister request.
- optional DeviceUnregisterRequest unregister_request = 2;
-
- // Policy request.
- optional DevicePolicyRequest policy_request = 3;
-
- // Update status.
- optional DeviceStatusReportRequest device_status_report_request = 4;
- optional SessionStatusReportRequest session_status_report_request = 5;
-
- // Auto-enrollment detection.
- optional DeviceAutoEnrollmentRequest auto_enrollment_request = 6;
-
- // EMCert upload (for remote attestation)
- optional DeviceCertUploadRequest cert_upload_request = 7;
-
- // Request for OAuth2 authorization codes to access Google services.
- optional DeviceServiceApiAccessRequest service_api_access_request = 8;
-}
-
-// Response from server to device.
-//
-// The server uses the following numbers as HTTP status codes
-// to report top-level errors.
-//
-// 200 OK: valid response is returned to client.
-// 400 Bad Request: invalid argument.
-// 401 Unauthorized: invalid auth cookie or DM token.
-// 403 Forbidden: device management is not allowed.
-// 404 Not Found: the request URL is invalid.
-// 410 Device Not Found: the device id is not found.
-// 491 Request Pending: the request is pending approval.
-// 500 Internal Server Error: most likely a bug in DM server.
-// 503 Service Unavailable: most likely a backend error.
-// 901 Device Not Found: the device id is not found.
-// 902 Policy Not Found: the policy is not found.
-message DeviceManagementResponse {
- // Error message.
- optional string error_message = 2;
-
- // Register response
- optional DeviceRegisterResponse register_response = 3;
-
- // Unregister response
- optional DeviceUnregisterResponse unregister_response = 4;
-
- // Policy response.
- optional DevicePolicyResponse policy_response = 5;
-
- // Device status report response.
- optional DeviceStatusReportResponse device_status_report_response = 6;
-
- // Session status report response.
- optional SessionStatusReportResponse session_status_report_response = 7;
-
- // Auto-enrollment detection response.
- optional DeviceAutoEnrollmentResponse auto_enrollment_response = 8;
-
- // EMCert upload response.
- optional DeviceCertUploadResponse cert_upload_response = 9;
-
- // Response to OAuth2 authorization code request.
- optional DeviceServiceApiAccessResponse service_api_access_response = 10;
-}
diff --git a/cloud/device_management_local.proto b/cloud/device_management_local.proto
deleted file mode 100644
index 122e863..0000000
--- a/cloud/device_management_local.proto
+++ /dev/null
@@ -1,31 +0,0 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-syntax = "proto2";
-
-option optimize_for = LITE_RUNTIME;
-
-package enterprise_management;
-
-import "device_management_backend.proto";
-
-// Wrapper around CloudPolicyResponse/DevicePolicyResponse for caching on disk.
-message CachedCloudPolicyResponse {
- // The DevicePolicyResponse wrapped by this message.
- optional DevicePolicyResponse device_policy = 1;
- // Timestamp noting when the |unmanaged| flag was set. The meaning is
- // milliseconds since 1970. When caching (deprecated) DevicePolicyResponses,
- // this timestamp also notes when the response was cached.
- optional uint64 timestamp = 2;
- // Flag that is set to true if this device is not managed.
- optional bool unmanaged = 3;
- // The PolicyFetchResponse wrapped by this message.
- optional PolicyFetchResponse cloud_policy = 4;
-}
-
-// Encapsulates a device ID and the associated device token.
-message DeviceCredentials {
- optional string device_id = 1;
- optional string device_token = 2;
-}