Chromium Code Reviews| Index: components/policy/resources/policy_templates.json |
| diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json |
| index cc0afffef700320be2a56e60eb161c2df3d76269..ca8deb9d077cd82e72a4dea69812269bcde84ad7 100644 |
| --- a/components/policy/resources/policy_templates.json |
| +++ b/components/policy/resources/policy_templates.json |
| @@ -137,7 +137,7 @@ |
| # persistent IDs for all fields (but not for groups!) are needed. These are |
| # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
| # because doing so would break the deployed wire format! |
| -# For your editing convenience: highest ID currently used: 327 |
| +# For your editing convenience: highest ID currently used: 328 |
| # |
| # Placeholders: |
| # The following placeholder strings are automatically substituted: |
| @@ -8480,6 +8480,27 @@ |
| 'tags': [], |
| 'id': 327, |
| }, |
| + { |
| + 'name': 'LoginVideoCaptureAllowedUrls', |
| + 'type': 'list', |
| + 'schema': { |
| + 'type': 'array', |
| + 'items': { 'type': 'string' }, |
| + }, |
| + 'supported_on': ['chrome_os:52-'], |
| + 'device_only': True, |
| + 'features': { |
| + 'dynamic_refresh': True, |
| + }, |
| + 'example_value': [ "https://example.com" ], |
| + 'id': 328, |
| + 'caption': '''URLs that will be granted access to video capture devices on SAML login pages''', |
| + 'tags': [], |
|
bartfab (slow)
2016/05/02 10:30:29
Nit: Definitely "website-sharing", maybe more?
Kevin Cernekee
2016/05/02 20:02:29
Done.
|
| + 'desc': '''Patterns in this list will be matched against the security |
| + origin of the requesting URL. If a match is found, access to video |
| + capture devices will be granted on SAML login pages. If no match is |
| + found, access will be automatically denied.''' |
|
bartfab (slow)
2016/05/02 10:30:29
Nit: Document that wildcard patterns are not allow
Kevin Cernekee
2016/05/02 20:02:29
Done.
|
| + }, |
| ], |
| 'messages': { |
| # Messages that are not associated to any policies. |