OLD | NEW |
---|---|
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
130 # templates and documentation. The policy definition list that Chrome sees | 130 # templates and documentation. The policy definition list that Chrome sees |
131 # will include policies marked with 'future'. If a WIP policy isn't meant to | 131 # will include policies marked with 'future'. If a WIP policy isn't meant to |
132 # be seen by the policy providers either, the 'supported_on' key should be set | 132 # be seen by the policy providers either, the 'supported_on' key should be set |
133 # to an empty list. | 133 # to an empty list. |
134 # | 134 # |
135 # IDs: | 135 # IDs: |
136 # Since a Protocol Buffer definition is generated from this file, unique and | 136 # Since a Protocol Buffer definition is generated from this file, unique and |
137 # persistent IDs for all fields (but not for groups!) are needed. These are | 137 # persistent IDs for all fields (but not for groups!) are needed. These are |
138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 138 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
139 # because doing so would break the deployed wire format! | 139 # because doing so would break the deployed wire format! |
140 # For your editing convenience: highest ID currently used: 315 | 140 # For your editing convenience: highest ID currently used: 316 |
141 # | 141 # |
142 # Placeholders: | 142 # Placeholders: |
143 # The following placeholder strings are automatically substituted: | 143 # The following placeholder strings are automatically substituted: |
144 # $1 -> Google Chrome / Chromium | 144 # $1 -> Google Chrome / Chromium |
145 # $2 -> Google Chrome OS / Chromium OS | 145 # $2 -> Google Chrome OS / Chromium OS |
146 # $3 -> Google Chrome Frame / Chromium Frame | 146 # $3 -> Google Chrome Frame / Chromium Frame |
147 # $6 is reserved for doc_writer | 147 # $6 is reserved for doc_writer |
148 # | 148 # |
149 # Device Policy: | 149 # Device Policy: |
150 # An additional flag 'device_only' (optional, defaults to False) indicates | 150 # An additional flag 'device_only' (optional, defaults to False) indicates |
(...skipping 543 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
694 'caption': '''Enable firewall traversal from remote access client''', | 694 'caption': '''Enable firewall traversal from remote access client''', |
695 'tags': [], | 695 'tags': [], |
696 'desc': '''This policy is no longer supported. | 696 'desc': '''This policy is no longer supported. |
697 Enables usage of STUN and relay servers when connecting to a remote cl ient. | 697 Enables usage of STUN and relay servers when connecting to a remote cl ient. |
698 | 698 |
699 If this setting is enabled, then this machine can discover and connect to remote host machines even if they are separated by a firewall. | 699 If this setting is enabled, then this machine can discover and connect to remote host machines even if they are separated by a firewall. |
700 | 700 |
701 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine can only connect to host machines within the local network.''', | 701 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine can only connect to host machines within the local network.''', |
702 }, | 702 }, |
703 { | 703 { |
704 'name': 'RemoteAccessHostClientDomain', | |
Jamie
2016/01/28 01:02:22
I'm not a fan of this name, but by convention, all
| |
705 'type': 'string', | |
706 'schema': { 'type': 'string' }, | |
707 'supported_on': ['chrome.*:22-', 'chrome_os:41-'], | |
708 'features': { | |
709 'dynamic_refresh': True, | |
710 'per_profile': False, | |
711 }, | |
712 'example_value': 'my-awesome-domain.com', | |
713 'id': 316, | |
714 'caption': '''Configure the required domain name for remote access cli ents''', | |
715 'tags': [], | |
716 'desc': '''Configures the required client domain name that will be imp osed on remote access clients and prevents users from changing it. | |
717 | |
718 If this setting is enabled, then only clients from the specified domai n can connect to the host. | |
719 | |
720 If this setting is disabled or not set, then client from any domain ca n connect to the host.''', | |
Sergey Ulanov
2016/01/28 19:42:46
For Me2me host only owner can connect. I think it
Jamie
2016/01/29 02:23:27
Done.
| |
721 }, | |
722 { | |
704 'name': 'RemoteAccessHostFirewallTraversal', | 723 'name': 'RemoteAccessHostFirewallTraversal', |
705 'type': 'main', | 724 'type': 'main', |
706 'schema': { 'type': 'boolean' }, | 725 'schema': { 'type': 'boolean' }, |
707 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], | 726 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], |
708 'features': { | 727 'features': { |
709 'dynamic_refresh': True, | 728 'dynamic_refresh': True, |
710 'per_profile': False, | 729 'per_profile': False, |
711 }, | 730 }, |
712 'example_value': False, | 731 'example_value': False, |
713 'id': 95, | 732 'id': 95, |
(...skipping 7563 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
8277 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 8296 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
8278 'text': 'Default Settings (users can override)', | 8297 'text': 'Default Settings (users can override)', |
8279 }, | 8298 }, |
8280 'doc_complex_policies_on_windows': { | 8299 'doc_complex_policies_on_windows': { |
8281 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', | 8300 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', |
8282 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', | 8301 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', |
8283 }, | 8302 }, |
8284 }, | 8303 }, |
8285 'placeholders': [], | 8304 'placeholders': [], |
8286 } | 8305 } |
OLD | NEW |