OLD | NEW |
---|---|
1 { | 1 { |
2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
3 # | 3 # |
4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
5 # | 5 # |
6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
8 # | 8 # |
9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
(...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
132 # templates and documentation. The policy definition list that Chrome sees | 132 # templates and documentation. The policy definition list that Chrome sees |
133 # will include policies marked with 'future'. If a WIP policy isn't meant to | 133 # will include policies marked with 'future'. If a WIP policy isn't meant to |
134 # be seen by the policy providers either, the 'supported_on' key should be set | 134 # be seen by the policy providers either, the 'supported_on' key should be set |
135 # to an empty list. | 135 # to an empty list. |
136 # | 136 # |
137 # IDs: | 137 # IDs: |
138 # Since a Protocol Buffer definition is generated from this file, unique and | 138 # Since a Protocol Buffer definition is generated from this file, unique and |
139 # persistent IDs for all fields (but not for groups!) are needed. These are | 139 # persistent IDs for all fields (but not for groups!) are needed. These are |
140 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 140 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
141 # because doing so would break the deployed wire format! | 141 # because doing so would break the deployed wire format! |
142 # For your editing convenience: highest ID currently used: 360 | 142 # For your editing convenience: highest ID currently used: 362 |
143 # And don't forget to also update the EnterprisePolicies enum of | 143 # And don't forget to also update the EnterprisePolicies enum of |
144 # histograms.xml. | 144 # histograms.xml. |
145 # | 145 # |
146 # Placeholders: | 146 # Placeholders: |
147 # The following placeholder strings are automatically substituted: | 147 # The following placeholder strings are automatically substituted: |
148 # $1 -> Google Chrome / Chromium | 148 # $1 -> Google Chrome / Chromium |
149 # $2 -> Google Chrome OS / Chromium OS | 149 # $2 -> Google Chrome OS / Chromium OS |
150 # $3 -> Google Chrome Frame / Chromium Frame | 150 # $3 -> Google Chrome Frame / Chromium Frame |
151 # $6 is reserved for doc_writer | 151 # $6 is reserved for doc_writer |
152 # | 152 # |
(...skipping 621 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
774 'example_value': 'my-awesome-domain.com', | 774 'example_value': 'my-awesome-domain.com', |
775 'id': 316, | 775 'id': 316, |
776 'caption': '''Configure the required domain name for remote access cli ents''', | 776 'caption': '''Configure the required domain name for remote access cli ents''', |
777 'tags': [], | 777 'tags': [], |
778 'desc': '''Configures the required client domain name that will be imp osed on remote access clients and prevents users from changing it. | 778 'desc': '''Configures the required client domain name that will be imp osed on remote access clients and prevents users from changing it. |
779 | 779 |
780 If this setting is enabled, then only clients from the specified domai n can connect to the host. | 780 If this setting is enabled, then only clients from the specified domai n can connect to the host. |
781 | 781 |
782 If this setting is disabled or not set, then the default policy for th e connection type is applied. For remote assistance, this allows clients from an y domain can connect to the host; for anytime remote access, only the host owner can connect. | 782 If this setting is disabled or not set, then the default policy for th e connection type is applied. For remote assistance, this allows clients from an y domain can connect to the host; for anytime remote access, only the host owner can connect. |
783 | 783 |
784 This setting will not override RemoteAccessHostClientDomainList. If bo th are set, a client can only connect if accepted by both policies. | |
785 | |
784 See also RemoteAccessHostDomain.''', | 786 See also RemoteAccessHostDomain.''', |
785 }, | 787 }, |
786 { | 788 { |
789 'name': 'RemoteAccessHostClientDomainList', | |
790 'type': 'list', | |
791 'schema': { | |
792 'type': 'array', | |
793 'items': { 'type': 'string' }, | |
794 }, | |
795 'supported_on': ['chrome.*:58-', 'chrome_os:58-'], | |
796 'features': { | |
797 'dynamic_refresh': True, | |
798 'per_profile': False, | |
799 }, | |
800 'example_value': ['my-awesome-domain.com', 'my-auxiliary-domain.com'], | |
801 'id': 362, | |
802 'caption': '''Configure the required domain names for remote access cl ients''', | |
803 'tags': [], | |
804 'desc': '''Configures the required client domain names that will be im posed on remote access clients and prevents users from changing it. | |
805 | |
806 This setting is similar to RemoteAccessHostClientDomain, but allows mu ltiple allowed domains to be specified. | |
807 | |
808 If this setting is enabled, then only clients from one of the specifie d domains can connect to the host. | |
809 | |
810 If this setting is disabled or not set, then the default policy for th e connection type is applied. For remote assistance, this allows clients from an y domain can connect to the host; for anytime remote access, only the host owner can connect. | |
811 | |
812 This setting will not override RemoteAccessHostClientDomain. If both a re set, a client can only connect if accepted by both policies. | |
813 | |
814 See also RemoteAccessHostDomainList.''', | |
815 }, | |
816 { | |
787 'name': 'RemoteAccessHostFirewallTraversal', | 817 'name': 'RemoteAccessHostFirewallTraversal', |
788 'type': 'main', | 818 'type': 'main', |
789 'schema': { 'type': 'boolean' }, | 819 'schema': { 'type': 'boolean' }, |
790 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], | 820 'supported_on': ['chrome.*:14-', 'chrome_os:41-'], |
791 'features': { | 821 'features': { |
792 'dynamic_refresh': True, | 822 'dynamic_refresh': True, |
793 'per_profile': False, | 823 'per_profile': False, |
794 }, | 824 }, |
795 'example_value': False, | 825 'example_value': False, |
796 'id': 95, | 826 'id': 95, |
(...skipping 19 matching lines...) Expand all Loading... | |
816 'example_value': 'my-awesome-domain.com', | 846 'example_value': 'my-awesome-domain.com', |
817 'id': 154, | 847 'id': 154, |
818 'caption': '''Configure the required domain name for remote access hos ts''', | 848 'caption': '''Configure the required domain name for remote access hos ts''', |
819 'tags': [], | 849 'tags': [], |
820 'desc': '''Configures the required host domain name that will be impos ed on remote access hosts and prevents users from changing it. | 850 'desc': '''Configures the required host domain name that will be impos ed on remote access hosts and prevents users from changing it. |
821 | 851 |
822 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name. | 852 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name. |
823 | 853 |
824 If this setting is disabled or not set, then hosts can be shared using any account. | 854 If this setting is disabled or not set, then hosts can be shared using any account. |
825 | 855 |
856 This setting will not override RemoteAccessHostDomainList. If both are set, a host can be shared by an account satisfying both policies. | |
857 | |
826 See also RemoteAccessHostClientDomain.''', | 858 See also RemoteAccessHostClientDomain.''', |
827 }, | 859 }, |
828 { | 860 { |
861 'name': 'RemoteAccessHostDomainList', | |
Sergey Ulanov
2017/02/10 22:25:13
Instead of adding new policy can we just extend Re
rkjnsn
2017/02/11 00:50:11
Personally, I don't like the idea of parsing our o
Sergey Ulanov
2017/02/11 01:03:48
I agree it's not ideal, but having two policies fo
| |
862 'type': 'list', | |
863 'schema': { | |
864 'type': 'array', | |
865 'items': {'type': 'string' }, | |
866 }, | |
867 'supported_on': ['chrome.*:58-', 'chrome_os:58-'], | |
868 'features': { | |
869 'dynamic_refresh': True, | |
870 'per_profile': False, | |
871 }, | |
872 'example_value': ['my-awesome-domain.com', 'my-auxiliary-domain.com'], | |
873 'id': 361, | |
874 'caption': '''Configure the required domain names for remote access ho sts''', | |
875 'tags': [], | |
876 'desc': '''Configures the required host domain names that will be impo sed on remote access hosts and prevents users from changing it. | |
877 | |
878 This setting is similar to RemoteAccessHostDomain, but allows multiple allowed domains to be specified. | |
879 | |
880 If this setting is enabled, then hosts can be shared only using accoun ts registered on one of the specified domain names. | |
881 | |
882 If this setting is disabled or not set, then hosts can be shared using any account. | |
883 | |
884 This setting will not override RemoteAccessHostDomain. If both are set , a host can be shared by an account satisfying both policies. | |
885 | |
886 See also RemoteAccessHostClientDomainList.''', | |
887 }, | |
888 { | |
829 'name': 'RemoteAccessHostRequireTwoFactor', | 889 'name': 'RemoteAccessHostRequireTwoFactor', |
830 'type': 'main', | 890 'type': 'main', |
831 'schema': { 'type': 'boolean' }, | 891 'schema': { 'type': 'boolean' }, |
832 'supported_on': ['chrome.*:22-22'], | 892 'supported_on': ['chrome.*:22-22'], |
833 'features': { | 893 'features': { |
834 'dynamic_refresh': True, | 894 'dynamic_refresh': True, |
835 'per_profile': False, | 895 'per_profile': False, |
836 }, | 896 }, |
837 # Mark this 'removed' when https://crbug.com/100216 is resolved. | 897 # Mark this 'removed' when https://crbug.com/100216 is resolved. |
838 'deprecated': True, | 898 'deprecated': True, |
(...skipping 8738 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
9577 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 9637 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
9578 'text': 'Default Settings (users can override)', | 9638 'text': 'Default Settings (users can override)', |
9579 }, | 9639 }, |
9580 'doc_complex_policies_on_windows': { | 9640 'doc_complex_policies_on_windows': { |
9581 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', | 9641 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', |
9582 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', | 9642 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">https://www.chromium.org/administrators/complex-policies-on-windows<e x>https://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>' '', |
9583 }, | 9643 }, |
9584 }, | 9644 }, |
9585 'placeholders': [], | 9645 'placeholders': [], |
9586 } | 9646 } |
OLD | NEW |