Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(302)

Side by Side Diff: components/policy/resources/policy_templates.json

Issue 820133002: Reusing names of policy keys from policy_constants.h (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 12 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after
116 # templates and documentation. The policy definition list that Chrome sees 116 # templates and documentation. The policy definition list that Chrome sees
117 # will include policies marked with 'future'. If a WIP policy isn't meant to 117 # will include policies marked with 'future'. If a WIP policy isn't meant to
118 # be seen by the policy providers either, the 'supported_on' key should be set 118 # be seen by the policy providers either, the 'supported_on' key should be set
119 # to an empty list. 119 # to an empty list.
120 # 120 #
121 # IDs: 121 # IDs:
122 # Since a Protocol Buffer definition is generated from this file, unique and 122 # Since a Protocol Buffer definition is generated from this file, unique and
123 # persistent IDs for all fields (but not for groups!) are needed. These are 123 # persistent IDs for all fields (but not for groups!) are needed. These are
124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
125 # because doing so would break the deployed wire format! 125 # because doing so would break the deployed wire format!
126 # For your editing convenience: highest ID currently used: 283 126 # For your editing convenience: highest ID currently used: 288
127 # 127 #
128 # Placeholders: 128 # Placeholders:
129 # The following placeholder strings are automatically substituted: 129 # The following placeholder strings are automatically substituted:
130 # $1 -> Google Chrome / Chromium 130 # $1 -> Google Chrome / Chromium
131 # $2 -> Google Chrome OS / Chromium OS 131 # $2 -> Google Chrome OS / Chromium OS
132 # $3 -> Google Chrome Frame / Chromium Frame 132 # $3 -> Google Chrome Frame / Chromium Frame
133 # $6 is reserved for doc_writer 133 # $6 is reserved for doc_writer
134 # 134 #
135 # Device Policy: 135 # Device Policy:
136 # An additional flag device_only (optional, defaults to False) indicates 136 # An additional flag device_only (optional, defaults to False) indicates
(...skipping 601 matching lines...) Expand 10 before | Expand all | Expand 10 after
738 'dynamic_refresh': True, 738 'dynamic_refresh': True,
739 'per_profile': False, 739 'per_profile': False,
740 }, 740 },
741 'example_value': '12400-12409', 741 'example_value': '12400-12409',
742 'id': 264, 742 'id': 264,
743 'caption': '''Restrict the UDP port range used by the remote access ho st''', 743 'caption': '''Restrict the UDP port range used by the remote access ho st''',
744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine.
745 745
746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''',
747 }, 747 },
748 {
749 'name': 'RemoteAccessHostMatchUsername',
750 'type': 'main',
751 'schema': { 'type': 'boolean' },
752 'supported_on': ['chrome.*:36-'],
753 'supported_on DO NOT SUBMIT': 'simonmorris@chromium.org 2012-10-30 22: 31:12 52ba3ea',
754 'features': {
755 'dynamic_refresh': True,
756 'per_profile': False,
757 },
758 'example_value': False,
759 'id': 284,
760 'caption': '''Requires that username of the local user and the host ow ner match''',
761 'desc': '''Requires that username of the local user and the host owner match.
762
763 If this setting is enabled, then the host will not start if the name o f the host owner is different from the name of the local user that the host is a ssociated with.
764
765 If this setting is disabled or not set, then the host can be associate d with any local user.
766
767 This policy is ignored on Windows.''',
Łukasz Anforowicz 2014/12/24 00:58:09 policy_watcher.h used to say: // This policy is
768 },
769 {
770 'name': 'RemoteAccessHostTokenUrl',
771 'type': 'string',
772 'schema': { 'type': 'string' },
773 'supported_on': ['chrome.*:36-'],
774 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2013-04-06 04:50:4 3 4386f0a',
Łukasz Anforowicz 2014/12/24 00:58:09 Can I please get some help or hints with mapping a
775 'features': {
776 'dynamic_refresh': True,
777 'per_profile': False,
778 },
779 'example_value': 'DO NOT SUBMIT',
780 'id': 285,
781 'caption': '''DO NOT SUBMIT''',
Łukasz Anforowicz 2014/12/24 00:58:09 For the 3 RemoteAccessHostTokenXxx policies, I wil
782 'desc': '''DO NOT SUBMIT
783
784 DO NOT SUBMIT''',
785 },
786 {
787 'name': 'RemoteAccessHostTokenValidationUrl',
788 'type': 'string',
789 'schema': { 'type': 'string' },
790 'supported_on': ['chrome.*:36-'],
791 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2013-04-06 04:50:4 3 4386f0a',
792 'features': {
793 'dynamic_refresh': True,
794 'per_profile': False,
795 },
796 'example_value': 'DO NOT SUBMIT',
797 'id': 286,
798 'caption': '''DO NOT SUBMIT''',
799 'desc': '''DO NOT SUBMIT
800
801 DO NOT SUBMIT''',
802 },
803 {
804 'name': 'RemoteAccessHostTokenValidationCertificateIssuer',
805 'type': 'string',
806 'schema': { 'type': 'string' },
807 'supported_on': ['chrome.*:36-'],
808 'supported_on DO NOT SUBMIT': 'rmsousa@chromium.org 2014-01-25 01:46:0 3 7181799',
809 'features': {
810 'dynamic_refresh': True,
811 'per_profile': False,
812 },
813 'example_value': 'DO NOT SUBMIT',
814 'id': 287,
815 'caption': '''DO NOT SUBMIT''',
816 'desc': '''DO NOT SUBMIT
817
818 DO NOT SUBMIT''',
819 },
820 {
821 'name': 'RemoteAccessHostDebugOverridePolicies',
822 'type': 'string',
823 'schema': { 'type': 'string' },
824 'supported_on': ['chrome.*:36-'],
825 'supported_on DO NOT SUBMIT': 'wez@chromium.org 2012-11-13 10:08:38 15 8b287',
826 'features': {
827 'dynamic_refresh': True,
828 'per_profile': False,
829 },
830 'example_value': '{ "RemoteAccessHostMatchUsername": true }',
831 'id': 288,
832 'caption': '''Policy overrides for Debug builds of the host''',
833 'desc': '''Overrides policies on Debug builds of the host.
834
835 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''',
836 },
Łukasz Anforowicz 2014/12/24 00:58:09 I think it is ok to include RemoteAccessHostDebugO
748 ], 837 ],
749 }, 838 },
750 { 839 {
751 'name': 'PrintingEnabled', 840 'name': 'PrintingEnabled',
752 'type': 'main', 841 'type': 'main',
753 'schema': { 'type': 'boolean' }, 842 'schema': { 'type': 'boolean' },
754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], 843 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'],
755 'features': { 844 'features': {
756 'dynamic_refresh': True, 845 'dynamic_refresh': True,
757 'per_profile': True, 846 'per_profile': True,
(...skipping 6381 matching lines...) Expand 10 before | Expand all | Expand 10 after
7139 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 7228 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
7140 'text': 'Default Settings (users can override)', 7229 'text': 'Default Settings (users can override)',
7141 }, 7230 },
7142 'doc_complex_policies_on_windows': { 7231 'doc_complex_policies_on_windows': {
7143 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', 7232 'desc': '''Text pointing the user to a help article for complex policies o n Windows''',
7144 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , 7233 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' ,
7145 }, 7234 },
7146 }, 7235 },
7147 'placeholders': [], 7236 'placeholders': [],
7148 } 7237 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698