OLD | NEW |
---|---|
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 94 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
105 # templates and documentation. The policy definition list that Chrome sees | 105 # templates and documentation. The policy definition list that Chrome sees |
106 # will include policies marked with 'future'. If a WIP policy isn't meant to | 106 # will include policies marked with 'future'. If a WIP policy isn't meant to |
107 # be seen by the policy providers either, the 'supported_on' key should be set | 107 # be seen by the policy providers either, the 'supported_on' key should be set |
108 # to an empty list. | 108 # to an empty list. |
109 # | 109 # |
110 # IDs: | 110 # IDs: |
111 # Since a Protocol Buffer definition is generated from this file, unique and | 111 # Since a Protocol Buffer definition is generated from this file, unique and |
112 # persistent IDs for all fields (but not for groups!) are needed. These are | 112 # persistent IDs for all fields (but not for groups!) are needed. These are |
113 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 113 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
114 # because doing so would break the deployed wire format! | 114 # because doing so would break the deployed wire format! |
115 # For your editing convenience: highest ID currently used: 153 | 115 # For your editing convenience: highest ID currently used: 156 |
116 # | 116 # |
117 # Placeholders: | 117 # Placeholders: |
118 # The following placeholder strings are automatically substituted: | 118 # The following placeholder strings are automatically substituted: |
119 # $1 -> Google Chrome / Chromium | 119 # $1 -> Google Chrome / Chromium |
120 # $2 -> Google Chrome OS / Chromium OS | 120 # $2 -> Google Chrome OS / Chromium OS |
121 # $3 -> Google Chrome Frame / Chromium Frame | 121 # $3 -> Google Chrome Frame / Chromium Frame |
122 # $6 is reserved for doc_writer | 122 # $6 is reserved for doc_writer |
123 # | 123 # |
124 # Device Policy: | 124 # Device Policy: |
125 # An additional flag device_only (optional, defaults to False) indicates | 125 # An additional flag device_only (optional, defaults to False) indicates |
(...skipping 321 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
447 'id': 95, | 447 'id': 95, |
448 'caption': '''Enable firewall traversal from remote access host''', | 448 'caption': '''Enable firewall traversal from remote access host''', |
449 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. | 449 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. |
450 | 450 |
451 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall. | 451 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall. |
452 | 452 |
453 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network. | 453 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network. |
454 | 454 |
455 If this policy is left not set the setting will be enabled.''', | 455 If this policy is left not set the setting will be enabled.''', |
456 }, | 456 }, |
457 { | |
458 'name': 'RemoteAccessHostDomain', | |
459 'type': 'string', | |
460 'schema': { 'type': 'string' }, | |
461 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'], | |
462 'features': {'dynamic_refresh': True}, | |
463 'example_value': 'my-awesome-domain.com', | |
464 'id': 154, | |
465 'caption': '''Configure the required host domain name''', | |
Mattias Nissler (ping if slow)
2012/08/03 09:05:52
Can you add "for Chromoting" or something alike so
garykac
2012/08/03 17:28:24
I don't think this is necessary because all of the
Mattias Nissler (ping if slow)
2012/08/06 08:49:45
No. The grouping is nice, but unfortunately only s
garykac
2012/08/06 14:36:32
Ah. That's unfortunate.
I've updated the captions
| |
466 'desc': '''Configures the required host domain name and prevents users from changing it. | |
467 | |
468 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name. | |
Mattias Nissler (ping if slow)
2012/08/03 09:05:52
Same here. If you don't have the Chromoting contex
garykac
2012/08/03 17:28:24
same
| |
469 | |
470 If this setting is disabled or not set, then hosts can be shared using any account.''', | |
471 }, | |
472 { | |
473 'name': 'RemoteAccessHostRequireTwoFactor', | |
474 'type': 'main', | |
475 'schema': { 'type': 'boolean' }, | |
476 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'], | |
477 'features': {'dynamic_refresh': True}, | |
478 'example_value': False, | |
479 'id': 155, | |
480 'caption': '''Enable two-factor authentication on host''', | |
Mattias Nissler (ping if slow)
2012/08/03 09:05:52
ditto
garykac
2012/08/03 17:28:24
same
| |
481 'desc': '''Enables two-factor authentication on the host instead of a user-specified PIN. | |
482 | |
483 If this setting is enabled, then users must provide a valid two-factor code when accessing the host. | |
484 | |
485 If this setting is disabled or not set, then two-factor will not be en abled and the default behavior of having a user-defined PIN will be used.''', | |
486 }, | |
487 { | |
488 'name': 'RemoteAccessHostTalkGadgetPrefix', | |
489 'type': 'string', | |
490 'schema': { 'type': 'string' }, | |
491 'supported_on': ['chrome.*:22-', 'chrome_os:0.22-'], | |
492 'features': {'dynamic_refresh': True}, | |
493 'example_value': 'chromoting-host', | |
494 'id': 156, | |
495 'caption': '''Configure the TalkGadget prefix for hosts''', | |
496 'desc': '''Configures the host TalkGadget prefix and prevents users fr om changing it. | |
Mattias Nissler (ping if slow)
2012/08/03 09:05:52
ditto
garykac
2012/08/03 17:28:25
same
| |
497 | |
498 If specified, this prefix is prepended to the base TalkGadget name to create a full domain name for the TalkGadget. The base TalkGadget domain name is '.talkgadget.google.com'. | |
499 | |
500 If this setting is enabled, then hosts will use the custom domain name when accessing the TalkGadget instead of the default domain name. | |
501 | |
502 If this setting is disabled or not set, then the default TalkGadget do main name ('chromoting-host.talkgadget.google.com') will be used. | |
503 | |
504 Remote access clients are not affected by this policy setting. They wi ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget .''', | |
505 }, | |
457 ], | 506 ], |
458 }, | 507 }, |
459 { | 508 { |
460 'name': 'PrintingEnabled', | 509 'name': 'PrintingEnabled', |
461 'type': 'main', | 510 'type': 'main', |
462 'schema': { 'type': 'boolean' }, | 511 'schema': { 'type': 'boolean' }, |
463 'supported_on': ['chrome.*:8-', 'chrome_os:0.11-'], | 512 'supported_on': ['chrome.*:8-', 'chrome_os:0.11-'], |
464 'features': {'dynamic_refresh': True}, | 513 'features': {'dynamic_refresh': True}, |
465 'example_value': True, | 514 'example_value': True, |
466 'id': 12, | 515 'id': 12, |
(...skipping 2724 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
3191 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''', | 3240 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''', |
3192 'text': 'deprecated', | 3241 'text': 'deprecated', |
3193 }, | 3242 }, |
3194 'doc_recommended': { | 3243 'doc_recommended': { |
3195 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 3244 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
3196 'text': 'Recommended', | 3245 'text': 'Recommended', |
3197 }, | 3246 }, |
3198 }, | 3247 }, |
3199 'placeholders': [], | 3248 'placeholders': [], |
3200 } | 3249 } |
OLD | NEW |