Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(78)

Side by Side Diff: trunk/src/components/policy/resources/policy_templates.json

Issue 268483003: Revert 267234 "New policies: enable/disable relay; port range" (Closed) Base URL: svn://svn.chromium.org/chrome/
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after
111 # templates and documentation. The policy definition list that Chrome sees 111 # templates and documentation. The policy definition list that Chrome sees
112 # will include policies marked with 'future'. If a WIP policy isn't meant to 112 # will include policies marked with 'future'. If a WIP policy isn't meant to
113 # be seen by the policy providers either, the 'supported_on' key should be set 113 # be seen by the policy providers either, the 'supported_on' key should be set
114 # to an empty list. 114 # to an empty list.
115 # 115 #
116 # IDs: 116 # IDs:
117 # Since a Protocol Buffer definition is generated from this file, unique and 117 # Since a Protocol Buffer definition is generated from this file, unique and
118 # persistent IDs for all fields (but not for groups!) are needed. These are 118 # persistent IDs for all fields (but not for groups!) are needed. These are
119 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 119 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
120 # because doing so would break the deployed wire format! 120 # because doing so would break the deployed wire format!
121 # For your editing convenience: highest ID currently used: 264 121 # For your editing convenience: highest ID currently used: 262
122 # 122 #
123 # Placeholders: 123 # Placeholders:
124 # The following placeholder strings are automatically substituted: 124 # The following placeholder strings are automatically substituted:
125 # $1 -> Google Chrome / Chromium 125 # $1 -> Google Chrome / Chromium
126 # $2 -> Google Chrome OS / Chromium OS 126 # $2 -> Google Chrome OS / Chromium OS
127 # $3 -> Google Chrome Frame / Chromium Frame 127 # $3 -> Google Chrome Frame / Chromium Frame
128 # $6 is reserved for doc_writer 128 # $6 is reserved for doc_writer
129 # 129 #
130 # Device Policy: 130 # Device Policy:
131 # An additional flag device_only (optional, defaults to False) indicates 131 # An additional flag device_only (optional, defaults to False) indicates
(...skipping 403 matching lines...) Expand 10 before | Expand all | Expand 10 after
535 'type': 'main', 535 'type': 'main',
536 'schema': { 'type': 'boolean' }, 536 'schema': { 'type': 'boolean' },
537 'supported_on': ['chrome.*:14-'], 537 'supported_on': ['chrome.*:14-'],
538 'features': { 538 'features': {
539 'dynamic_refresh': True, 539 'dynamic_refresh': True,
540 'per_profile': False, 540 'per_profile': False,
541 }, 541 },
542 'example_value': False, 542 'example_value': False,
543 'id': 95, 543 'id': 95,
544 'caption': '''Enable firewall traversal from remote access host''', 544 'caption': '''Enable firewall traversal from remote access host''',
545 'desc': '''Enables usage of STUN servers when remote clients are tryin g to establish a connection to this machine. 545 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine.
546 546
547 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall. 547 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall.
548 548
549 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network. 549 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network.
550 550
551 If this policy is left not set the setting will be enabled.''', 551 If this policy is left not set the setting will be enabled.''',
552 }, 552 },
553 { 553 {
554 'name': 'RemoteAccessHostDomain', 554 'name': 'RemoteAccessHostDomain',
555 'type': 'string', 555 'type': 'string',
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after
651 'dynamic_refresh': True, 651 'dynamic_refresh': True,
652 'per_profile': False, 652 'per_profile': False,
653 }, 653 },
654 'example_value': True, 654 'example_value': True,
655 'id': 257, 655 'id': 257,
656 'caption': '''Allow gnubby authentication''', 656 'caption': '''Allow gnubby authentication''',
657 'desc': '''If this setting is enabled, then gnubby authentication requ ests will be proxied across a remote host connection. 657 'desc': '''If this setting is enabled, then gnubby authentication requ ests will be proxied across a remote host connection.
658 658
659 If this setting is disabled or not configured, gnubby authentication r equests will not be proxied.''', 659 If this setting is disabled or not configured, gnubby authentication r equests will not be proxied.''',
660 }, 660 },
661 {
662 'name': 'RemoteAccessHostAllowRelayedConnection',
663 'type': 'main',
664 'schema': { 'type': 'boolean' },
665 'supported_on': ['chrome.*:36-'],
666 'features': {
667 'dynamic_refresh': True,
668 'per_profile': False,
669 },
670 'example_value': False,
671 'id': 263,
672 'caption': '''Enable the use of relay servers by the remote access hos t''',
673 'desc': '''Enables usage of relay servers when remote clients are tryi ng to establish a connection to this machine.
674
675 If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due t o firewall restrictions).
676
677 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will be ignored.
678
679 If this policy is left not set the setting will be enabled.''',
680 },
681 {
682 'name': 'RemoteAccessHostUdpPortRange',
683 'type': 'string',
684 'schema': { 'type': 'string' },
685 'supported_on': ['chrome.*:36-'],
686 'features': {
687 'dynamic_refresh': True,
688 'per_profile': False,
689 },
690 'example_value': '12400-12409',
691 'id': 264,
692 'caption': '''Restrict the UDP port range used by the remote access ho st''',
693 'desc': '''Restricts the UDP port range used by the remote access host in this machine.
694
695 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''',
696 },
697 ], 661 ],
698 }, 662 },
699 { 663 {
700 'name': 'PrintingEnabled', 664 'name': 'PrintingEnabled',
701 'type': 'main', 665 'type': 'main',
702 'schema': { 'type': 'boolean' }, 666 'schema': { 'type': 'boolean' },
703 'supported_on': ['chrome.*:8-', 'chrome_os:11-'], 667 'supported_on': ['chrome.*:8-', 'chrome_os:11-'],
704 'features': { 668 'features': {
705 'dynamic_refresh': True, 669 'dynamic_refresh': True,
706 'per_profile': True, 670 'per_profile': True,
(...skipping 5759 matching lines...) Expand 10 before | Expand all | Expand 10 after
6466 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''', 6430 'desc': '''Text appended in parentheses to the policy name to indicate tha t it has been deprecated''',
6467 'text': 'deprecated', 6431 'text': 'deprecated',
6468 }, 6432 },
6469 'doc_recommended': { 6433 'doc_recommended': {
6470 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 6434 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
6471 'text': 'Default Settings (users can override)', 6435 'text': 'Default Settings (users can override)',
6472 }, 6436 },
6473 }, 6437 },
6474 'placeholders': [], 6438 'placeholders': [],
6475 } 6439 }
OLDNEW
« no previous file with comments | « trunk/src/chrome/test/data/policy/policy_test_cases.json ('k') | trunk/src/remoting/client/jni/chromoting_jni_instance.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698