| OLD | NEW |
| 1 { | 1 { |
| 2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
| 3 # | 3 # |
| 4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
| 5 # | 5 # |
| 6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
| 7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
| 8 # | 8 # |
| 9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
| 10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
| (...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 111 # templates and documentation. The policy definition list that Chrome sees | 111 # templates and documentation. The policy definition list that Chrome sees |
| 112 # will include policies marked with 'future'. If a WIP policy isn't meant to | 112 # will include policies marked with 'future'. If a WIP policy isn't meant to |
| 113 # be seen by the policy providers either, the 'supported_on' key should be set | 113 # be seen by the policy providers either, the 'supported_on' key should be set |
| 114 # to an empty list. | 114 # to an empty list. |
| 115 # | 115 # |
| 116 # IDs: | 116 # IDs: |
| 117 # Since a Protocol Buffer definition is generated from this file, unique and | 117 # Since a Protocol Buffer definition is generated from this file, unique and |
| 118 # persistent IDs for all fields (but not for groups!) are needed. These are | 118 # persistent IDs for all fields (but not for groups!) are needed. These are |
| 119 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 119 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
| 120 # because doing so would break the deployed wire format! | 120 # because doing so would break the deployed wire format! |
| 121 # For your editing convenience: highest ID currently used: 264 | 121 # For your editing convenience: highest ID currently used: 262 |
| 122 # | 122 # |
| 123 # Placeholders: | 123 # Placeholders: |
| 124 # The following placeholder strings are automatically substituted: | 124 # The following placeholder strings are automatically substituted: |
| 125 # $1 -> Google Chrome / Chromium | 125 # $1 -> Google Chrome / Chromium |
| 126 # $2 -> Google Chrome OS / Chromium OS | 126 # $2 -> Google Chrome OS / Chromium OS |
| 127 # $3 -> Google Chrome Frame / Chromium Frame | 127 # $3 -> Google Chrome Frame / Chromium Frame |
| 128 # $6 is reserved for doc_writer | 128 # $6 is reserved for doc_writer |
| 129 # | 129 # |
| 130 # Device Policy: | 130 # Device Policy: |
| 131 # An additional flag device_only (optional, defaults to False) indicates | 131 # An additional flag device_only (optional, defaults to False) indicates |
| (...skipping 403 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 535 'type': 'main', | 535 'type': 'main', |
| 536 'schema': { 'type': 'boolean' }, | 536 'schema': { 'type': 'boolean' }, |
| 537 'supported_on': ['chrome.*:14-'], | 537 'supported_on': ['chrome.*:14-'], |
| 538 'features': { | 538 'features': { |
| 539 'dynamic_refresh': True, | 539 'dynamic_refresh': True, |
| 540 'per_profile': False, | 540 'per_profile': False, |
| 541 }, | 541 }, |
| 542 'example_value': False, | 542 'example_value': False, |
| 543 'id': 95, | 543 'id': 95, |
| 544 'caption': '''Enable firewall traversal from remote access host''', | 544 'caption': '''Enable firewall traversal from remote access host''', |
| 545 'desc': '''Enables usage of STUN servers when remote clients are tryin
g to establish a connection to this machine. | 545 'desc': '''Enables usage of STUN and relay servers when remote clients
are trying to establish a connection to this machine. |
| 546 | 546 |
| 547 If this setting is enabled, then remote clients can discover and conne
ct to this machines even if they are separated by a firewall. | 547 If this setting is enabled, then remote clients can discover and conne
ct to this machines even if they are separated by a firewall. |
| 548 | 548 |
| 549 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine will only allow connections from client machi
nes within the local network. | 549 If this setting is disabled and outgoing UDP connections are filtered
by the firewall, then this machine will only allow connections from client machi
nes within the local network. |
| 550 | 550 |
| 551 If this policy is left not set the setting will be enabled.''', | 551 If this policy is left not set the setting will be enabled.''', |
| 552 }, | 552 }, |
| 553 { | 553 { |
| 554 'name': 'RemoteAccessHostDomain', | 554 'name': 'RemoteAccessHostDomain', |
| 555 'type': 'string', | 555 'type': 'string', |
| (...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 651 'dynamic_refresh': True, | 651 'dynamic_refresh': True, |
| 652 'per_profile': False, | 652 'per_profile': False, |
| 653 }, | 653 }, |
| 654 'example_value': True, | 654 'example_value': True, |
| 655 'id': 257, | 655 'id': 257, |
| 656 'caption': '''Allow gnubby authentication''', | 656 'caption': '''Allow gnubby authentication''', |
| 657 'desc': '''If this setting is enabled, then gnubby authentication requ
ests will be proxied across a remote host connection. | 657 'desc': '''If this setting is enabled, then gnubby authentication requ
ests will be proxied across a remote host connection. |
| 658 | 658 |
| 659 If this setting is disabled or not configured, gnubby authentication r
equests will not be proxied.''', | 659 If this setting is disabled or not configured, gnubby authentication r
equests will not be proxied.''', |
| 660 }, | 660 }, |
| 661 { | |
| 662 'name': 'RemoteAccessHostAllowRelayedConnection', | |
| 663 'type': 'main', | |
| 664 'schema': { 'type': 'boolean' }, | |
| 665 'supported_on': ['chrome.*:36-'], | |
| 666 'features': { | |
| 667 'dynamic_refresh': True, | |
| 668 'per_profile': False, | |
| 669 }, | |
| 670 'example_value': False, | |
| 671 'id': 263, | |
| 672 'caption': '''Enable the use of relay servers by the remote access hos
t''', | |
| 673 'desc': '''Enables usage of relay servers when remote clients are tryi
ng to establish a connection to this machine. | |
| 674 | |
| 675 If this setting is enabled, then remote clients can use relay servers
to connect to this machine when a direct connection is not available (e.g. due t
o firewall restrictions). | |
| 676 | |
| 677 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO
LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will
be ignored. | |
| 678 | |
| 679 If this policy is left not set the setting will be enabled.''', | |
| 680 }, | |
| 681 { | |
| 682 'name': 'RemoteAccessHostUdpPortRange', | |
| 683 'type': 'string', | |
| 684 'schema': { 'type': 'string' }, | |
| 685 'supported_on': ['chrome.*:36-'], | |
| 686 'features': { | |
| 687 'dynamic_refresh': True, | |
| 688 'per_profile': False, | |
| 689 }, | |
| 690 'example_value': '12400-12409', | |
| 691 'id': 264, | |
| 692 'caption': '''Restrict the UDP port range used by the remote access ho
st''', | |
| 693 'desc': '''Restricts the UDP port range used by the remote access host
in this machine. | |
| 694 | |
| 695 If this policy is left not set, or if it is set to an empty string, th
e remote access host will be allowed to use any available port, unless the polic
y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew
allTraversal</ph> is disabled, in which case the remote access host will use UDP
ports in the 12400-12409 range.''', | |
| 696 }, | |
| 697 ], | 661 ], |
| 698 }, | 662 }, |
| 699 { | 663 { |
| 700 'name': 'PrintingEnabled', | 664 'name': 'PrintingEnabled', |
| 701 'type': 'main', | 665 'type': 'main', |
| 702 'schema': { 'type': 'boolean' }, | 666 'schema': { 'type': 'boolean' }, |
| 703 'supported_on': ['chrome.*:8-', 'chrome_os:11-'], | 667 'supported_on': ['chrome.*:8-', 'chrome_os:11-'], |
| 704 'features': { | 668 'features': { |
| 705 'dynamic_refresh': True, | 669 'dynamic_refresh': True, |
| 706 'per_profile': True, | 670 'per_profile': True, |
| (...skipping 5759 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 6466 'desc': '''Text appended in parentheses to the policy name to indicate tha
t it has been deprecated''', | 6430 'desc': '''Text appended in parentheses to the policy name to indicate tha
t it has been deprecated''', |
| 6467 'text': 'deprecated', | 6431 'text': 'deprecated', |
| 6468 }, | 6432 }, |
| 6469 'doc_recommended': { | 6433 'doc_recommended': { |
| 6470 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', | 6434 'desc': '''Text appended in parentheses next to the policies top-level con
tainer to indicate that those policies are of the Recommended level''', |
| 6471 'text': 'Default Settings (users can override)', | 6435 'text': 'Default Settings (users can override)', |
| 6472 }, | 6436 }, |
| 6473 }, | 6437 }, |
| 6474 'placeholders': [], | 6438 'placeholders': [], |
| 6475 } | 6439 } |
| OLD | NEW |