Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 { | 1 { |
| 2 # policy_templates.json - Metafile for policy templates | 2 # policy_templates.json - Metafile for policy templates |
| 3 # | 3 # |
| 4 # The content of this file is evaluated as a Python expression. | 4 # The content of this file is evaluated as a Python expression. |
| 5 # | 5 # |
| 6 # This file is used as input to generate the following policy templates: | 6 # This file is used as input to generate the following policy templates: |
| 7 # ADM, ADMX+ADML, MCX/plist and html documentation. | 7 # ADM, ADMX+ADML, MCX/plist and html documentation. |
| 8 # | 8 # |
| 9 # Policy templates are user interface definitions or documents about the | 9 # Policy templates are user interface definitions or documents about the |
| 10 # policies that can be used to configure Chrome. Each policy is a name-value | 10 # policies that can be used to configure Chrome. Each policy is a name-value |
| (...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 116 # templates and documentation. The policy definition list that Chrome sees | 116 # templates and documentation. The policy definition list that Chrome sees |
| 117 # will include policies marked with 'future'. If a WIP policy isn't meant to | 117 # will include policies marked with 'future'. If a WIP policy isn't meant to |
| 118 # be seen by the policy providers either, the 'supported_on' key should be set | 118 # be seen by the policy providers either, the 'supported_on' key should be set |
| 119 # to an empty list. | 119 # to an empty list. |
| 120 # | 120 # |
| 121 # IDs: | 121 # IDs: |
| 122 # Since a Protocol Buffer definition is generated from this file, unique and | 122 # Since a Protocol Buffer definition is generated from this file, unique and |
| 123 # persistent IDs for all fields (but not for groups!) are needed. These are | 123 # persistent IDs for all fields (but not for groups!) are needed. These are |
| 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, | 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
| 125 # because doing so would break the deployed wire format! | 125 # because doing so would break the deployed wire format! |
| 126 # For your editing convenience: highest ID currently used: 283 | 126 # For your editing convenience: highest ID currently used: 288 |
| 127 # | 127 # |
| 128 # Placeholders: | 128 # Placeholders: |
| 129 # The following placeholder strings are automatically substituted: | 129 # The following placeholder strings are automatically substituted: |
| 130 # $1 -> Google Chrome / Chromium | 130 # $1 -> Google Chrome / Chromium |
| 131 # $2 -> Google Chrome OS / Chromium OS | 131 # $2 -> Google Chrome OS / Chromium OS |
| 132 # $3 -> Google Chrome Frame / Chromium Frame | 132 # $3 -> Google Chrome Frame / Chromium Frame |
| 133 # $6 is reserved for doc_writer | 133 # $6 is reserved for doc_writer |
| 134 # | 134 # |
| 135 # Device Policy: | 135 # Device Policy: |
| 136 # An additional flag device_only (optional, defaults to False) indicates | 136 # An additional flag device_only (optional, defaults to False) indicates |
| (...skipping 601 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 738 'dynamic_refresh': True, | 738 'dynamic_refresh': True, |
| 739 'per_profile': False, | 739 'per_profile': False, |
| 740 }, | 740 }, |
| 741 'example_value': '12400-12409', | 741 'example_value': '12400-12409', |
| 742 'id': 264, | 742 'id': 264, |
| 743 'caption': '''Restrict the UDP port range used by the remote access ho st''', | 743 'caption': '''Restrict the UDP port range used by the remote access ho st''', |
| 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. | 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. |
| 745 | 745 |
| 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', | 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', |
| 747 }, | 747 }, |
| 748 { | |
| 749 'name': 'RemoteAccessHostMatchUsername', | |
| 750 'type': 'main', | |
| 751 'schema': { 'type': 'boolean' }, | |
| 752 'supported_on': ['chrome.*:36-'], | |
| 753 'supported_on DO NOT SUBMIT': 'simonmorris@chromium.org 2012-10-30 22: 31:12 52ba3ea', | |
| 754 'features': { | |
| 755 'dynamic_refresh': True, | |
| 756 'per_profile': False, | |
| 757 }, | |
| 758 'example_value': False, | |
| 759 'id': 284, | |
| 760 'caption': '''Requires that username of the local user and the host ow ner match''', | |
| 761 'desc': '''Requires that username of the local user and the host owner match. | |
| 762 | |
| 763 If this setting is enabled, then the host will not start if the name o f the host owner is different from the name of the local user that the host is a ssociated with. | |
| 764 | |
| 765 If this setting is disabled or not set, then the host can be associate d with any local user. | |
| 766 | |
| 767 This policy is ignored on Windows.''', | |
|
Łukasz Anforowicz
2014/12/24 00:58:09
policy_watcher.h used to say:
// This policy is
| |
| 768 }, | |
| 769 { | |
| 770 'name': 'RemoteAccessHostTokenUrl', | |
| 771 'type': 'string', | |
| 772 'schema': { 'type': 'string' }, | |
| 773 'supported_on': ['chrome.*:36-'], | |
| 774 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2013-04-06 04:50:4 3 4386f0a', | |
|
Łukasz Anforowicz
2014/12/24 00:58:09
Can I please get some help or hints with mapping a
| |
| 775 'features': { | |
| 776 'dynamic_refresh': True, | |
| 777 'per_profile': False, | |
| 778 }, | |
| 779 'example_value': 'DO NOT SUBMIT', | |
| 780 'id': 285, | |
| 781 'caption': '''DO NOT SUBMIT''', | |
|
Łukasz Anforowicz
2014/12/24 00:58:09
For the 3 RemoteAccessHostTokenXxx policies, I wil
| |
| 782 'desc': '''DO NOT SUBMIT | |
| 783 | |
| 784 DO NOT SUBMIT''', | |
| 785 }, | |
| 786 { | |
| 787 'name': 'RemoteAccessHostTokenValidationUrl', | |
| 788 'type': 'string', | |
| 789 'schema': { 'type': 'string' }, | |
| 790 'supported_on': ['chrome.*:36-'], | |
| 791 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2013-04-06 04:50:4 3 4386f0a', | |
| 792 'features': { | |
| 793 'dynamic_refresh': True, | |
| 794 'per_profile': False, | |
| 795 }, | |
| 796 'example_value': 'DO NOT SUBMIT', | |
| 797 'id': 286, | |
| 798 'caption': '''DO NOT SUBMIT''', | |
| 799 'desc': '''DO NOT SUBMIT | |
| 800 | |
| 801 DO NOT SUBMIT''', | |
| 802 }, | |
| 803 { | |
| 804 'name': 'RemoteAccessHostTokenValidationCertificateIssuer', | |
| 805 'type': 'string', | |
| 806 'schema': { 'type': 'string' }, | |
| 807 'supported_on': ['chrome.*:36-'], | |
| 808 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2014-01-25 01:46:0 3 7181799', | |
| 809 'features': { | |
| 810 'dynamic_refresh': True, | |
| 811 'per_profile': False, | |
| 812 }, | |
| 813 'example_value': 'DO NOT SUBMIT', | |
| 814 'id': 287, | |
| 815 'caption': '''DO NOT SUBMIT''', | |
| 816 'desc': '''DO NOT SUBMIT | |
| 817 | |
| 818 DO NOT SUBMIT''', | |
| 819 }, | |
| 820 { | |
| 821 'name': 'RemoteAccessHostDebugOverridePolicies', | |
| 822 'type': 'string', | |
| 823 'schema': { 'type': 'string' }, | |
| 824 'supported_on': ['chrome.*:36-'], | |
| 825 'supported_on DO NOT SUBMIT': 'wez@chromium.org 2012-11-13 10:08:38 15 8b287', | |
| 826 'features': { | |
| 827 'dynamic_refresh': True, | |
| 828 'per_profile': False, | |
| 829 }, | |
| 830 'example_value': '{ "RemoteAccessHostMatchUsername": true }', | |
| 831 'id': 288, | |
| 832 'caption': '''Policy overrides for Debug builds of the host''', | |
| 833 'desc': '''Overrides policies on Debug builds of the host. | |
| 834 | |
| 835 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''', | |
| 836 }, | |
|
Łukasz Anforowicz
2014/12/24 00:58:09
I think it is ok to include RemoteAccessHostDebugO
| |
| 748 ], | 837 ], |
| 749 }, | 838 }, |
| 750 { | 839 { |
| 751 'name': 'PrintingEnabled', | 840 'name': 'PrintingEnabled', |
| 752 'type': 'main', | 841 'type': 'main', |
| 753 'schema': { 'type': 'boolean' }, | 842 'schema': { 'type': 'boolean' }, |
| 754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], | 843 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], |
| 755 'features': { | 844 'features': { |
| 756 'dynamic_refresh': True, | 845 'dynamic_refresh': True, |
| 757 'per_profile': True, | 846 'per_profile': True, |
| (...skipping 6381 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 7139 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', | 7228 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', |
| 7140 'text': 'Default Settings (users can override)', | 7229 'text': 'Default Settings (users can override)', |
| 7141 }, | 7230 }, |
| 7142 'doc_complex_policies_on_windows': { | 7231 'doc_complex_policies_on_windows': { |
| 7143 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', | 7232 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', |
| 7144 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , | 7233 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , |
| 7145 }, | 7234 }, |
| 7146 }, | 7235 }, |
| 7147 'placeholders': [], | 7236 'placeholders': [], |
| 7148 } | 7237 } |
| OLD | NEW |