Index: components/policy/resources/policy_templates.json |
diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json |
index e4ff7bc34e655cae84b919a15cf1d92142828d9d..cc79b8ea7a9dd2409f5f6b8fa5478a1a1bcd971b 100644 |
--- a/components/policy/resources/policy_templates.json |
+++ b/components/policy/resources/policy_templates.json |
@@ -137,7 +137,7 @@ |
# persistent IDs for all fields (but not for groups!) are needed. These are |
# specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
# because doing so would break the deployed wire format! |
-# For your editing convenience: highest ID currently used: 332 |
+# For your editing convenience: highest ID currently used: 333 |
# |
# Placeholders: |
# The following placeholder strings are automatically substituted: |
@@ -8599,6 +8599,21 @@ |
When the policy is set to false, this security feature is disabled, and PAC scripts are granted the ability to view the full URL. This setting applies to all PAC scripts regardless of origin. For instance it applies to PAC scripts obtained through WPAD as well as those fetched over an insecure transport.''', |
}, |
+ { |
+ 'name': 'WebRestrictionsAuthority', |
+ 'id': 333, |
+ 'type': 'string', |
+ 'schema' : { 'type': 'string' }, |
+ 'tags': [], |
Thiemo Nagel
2016/06/08 12:24:59
Please add 'filtering'.
aberent
2016/07/12 18:48:24
Done.
|
+ 'supported_on': ['webview_android:53-'], |
+ 'caption': '''Set an external source of URL restrictions''', |
+ 'desc' : '''When this policy is set to a non-empty string the WebView will read URL restrictions from the content provider with the given authority name.''', |
+ 'features': { |
+ 'dynamic_refresh': True, |
+ 'per_profile': False, |
+ }, |
+ 'example_value': 'com.android.chrome.SupervisedUserProvider' |
+ }, |
], |
'messages': { |
# Messages that are not associated to any policies. |