1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124
|
syntax = "proto3";
option optimize_for = LITE_RUNTIME;
package remoting.proto;
// Error codes associated with Chromoting that are used across all critical user
// journeys. In this way, we don't need to rewrite error code translation logic
// for the same error for each new user journey.
//
// Changes made in this file should be synced into the internal error code proto
// file.
enum ErrorCode {
// No error was specified when the protobuf was logged. This value should
// never be set explicitly.
UNSPECIFIED_ERROR = 0;
// An error occurred but was not of any type represented by the values below.
UNEXPECTED = 18;
// No errors.
NONE = 1;
// Connection rejected since the host is not started.
SESSION_REJECTED = 3;
// The protocol does not match between host and client.
INCOMPATIBLE_PROTOCOL = 4;
// A local network issue has prevented the remote connection.
NETWORK_FAILURE = 5;
// Authentication has failed for the connection.
AUTHENTICATION_FAILED = 8;
// Connection rejected by the host due to an overload of failed login
// attempts.
HOST_OVERLOAD = 9;
// There has been an issue connecting peer-to-peer.
P2P_FAILURE = 10;
// Maximum session duration has been reached.
MAX_SESSION_LENGTH = 13;
// Host failed to initialize the session.
HOST_CONFIGURATION_ERROR = 14;
// Host security policies do not allow connections from client.
INVALID_ACCOUNT = 16;
// Connection fails due to an error in connecting the signaling channel.
SIGNALING_ERROR = 26;
// Connection fails due to the jingle messages timing out.
SIGNALING_TIMEOUT = 27;
// The user was not authorized to connect to the host (per BeyondCorp policy).
AUTHZ_POLICY_CHECK_FAILED = 40;
// The user was not authorized to connect to the host (not policy related).
UNAUTHORIZED_ACCOUNT = 42;
// The SessionAuthz connection reauthorization failed.
REAUTHORIZATION_FAILED = 43;
// The client has gone offline.
CLIENT_IS_OFFLINE = 44;
// The host failed to launch an elevated process.
ELEVATION_ERROR = 45;
// The host failed to generate a certificate.
HOST_CERTIFICATE_ERROR = 46;
// Host registration failed.
HOST_REGISTRATION_ERROR = 47;
// Failure to start the session as there is an existing admin session ongoing
// on the host device.
EXISTING_ADMIN_SESSION = 48;
// Failed because RemoteAccessHostAllowEnterpriseRemoteSupportConnections
// policy is disabled.
DISALLOWED_BY_POLICY = 49;
// Failure because the client is not authorized to connect to the host device
// based on their current location due to a policy defined by the third party
// auth service.
LOCATION_AUTHZ_POLICY_CHECK_FAILED = 50;
// Operation timed out.
OPERATION_TIMEOUT = 60;
// Failed to find an authentication method that is supported by both the host
// and the client.
NO_COMMON_AUTH_METHOD = 62;
// The connection was rejected because the curtain mode policy is set, which
// does not support the login screen on some platforms.
LOGIN_SCREEN_NOT_SUPPORTED = 63;
// The connection was disconnected because the session policies have changed.
SESSION_POLICIES_CHANGED = 64;
// The connection was rejected because the authenticator has encountered an
// unexpected error.
UNEXPECTED_AUTHENTICATOR_ERROR = 65;
// The application is in an invalid state.
INVALID_STATE = 66;
// The peer has sent an invalid message. E.g. fields are missing in the
// message.
INVALID_ARGUMENT = 67;
// A peer network issue has prevented the remote connection.
PEER_NETWORK_FAILURE = 68;
reserved 2, 6 to 7, 11, 12, 15, 17, 19 to 25, 28 to 39, 41, 51 to 59, 61;
// [400, 699] are reserved for internal errors.
reserved 400 to 699;
}
|