OLD | NEW |
1 { | 1 { |
2 "-- Template --": { | 2 "-- Template --": { |
3 "intro": "Top-level entries map a policy name to its test parameters, descri
bed below. The name of the top level entry should be of the form <policy name>[.
suffix]. The optional suffix is used for defining multiple test cases for a sing
le policy.", | 3 "intro": "Top-level entries map a policy name to its test parameters, descri
bed below. The name of the top level entry should be of the form <policy name>[.
suffix]. The optional suffix is used for defining multiple test cases for a sing
le policy.", |
4 | 4 |
5 "os": ["List of operating systems that support this policy. Valid values:",
"win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], | 5 "os": ["List of operating systems that support this policy. Valid values:",
"win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], |
6 "official_only": "Whether this policy exists in official builds only. Defaul
ts to |false| if not specified.", | 6 "official_only": "Whether this policy exists in official builds only. Defaul
ts to |false| if not specified.", |
7 "can_be_recommended": "Whether a recommended value may be set for the policy
. Defaults to |false| if not specified.", | 7 "can_be_recommended": "Whether a recommended value may be set for the policy
. Defaults to |false| if not specified.", |
8 "test_policy": "A policy dictionary that should make the preferences affecte
d by this policy become policy-controlled. Usually just sets the current policy.
Defaults to an empty dictionary if not specified.", | 8 "test_policy": "A policy dictionary that should make the preferences affecte
d by this policy become policy-controlled. Usually just sets the current policy.
Defaults to an empty dictionary if not specified.", |
9 "note": "If the policy affects any preferences, the following array should b
e specified with one entry per such preference.", | 9 "note": "If the policy affects any preferences, the following array should b
e specified with one entry per such preference.", |
10 "pref_mappings": [ | 10 "pref_mappings": [ |
(...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
197 { "pref": "history.deleting_enabled" } | 197 { "pref": "history.deleting_enabled" } |
198 ] | 198 ] |
199 }, | 199 }, |
200 | 200 |
201 "RemoteAccessClientFirewallTraversal": { | 201 "RemoteAccessClientFirewallTraversal": { |
202 }, | 202 }, |
203 | 203 |
204 "RemoteAccessHostFirewallTraversal": { | 204 "RemoteAccessHostFirewallTraversal": { |
205 "os": [], | 205 "os": [], |
206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, | 206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, |
207 "pref_mappings": [ | |
208 { "pref": "remote_access.host_firewall_traversal" } | |
209 ], | |
210 | 207 |
211 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." | 208 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." |
212 }, | 209 }, |
213 | 210 |
214 "RemoteAccessHostRequireTwoFactor": { | 211 "RemoteAccessHostRequireTwoFactor": { |
215 "os": [], | 212 "os": [], |
216 "test_policy": { "RemoteAccessHostRequireTwoFactor": false }, | 213 "test_policy": { "RemoteAccessHostRequireTwoFactor": false } |
217 "pref_mappings": [ | |
218 { "pref": "remote_access.host_require_two_factor" } | |
219 ] | |
220 }, | 214 }, |
221 | 215 |
222 "RemoteAccessHostDomain": { | 216 "RemoteAccessHostDomain": { |
223 "os": [], | 217 "os": [], |
224 "test_policy": { "RemoteAccessHostDomain": "" }, | 218 "test_policy": { "RemoteAccessHostDomain": "" } |
225 "pref_mappings": [ | |
226 { "pref": "remote_access.host_domain" } | |
227 ] | |
228 }, | 219 }, |
229 | 220 |
230 "RemoteAccessHostTalkGadgetPrefix": { | 221 "RemoteAccessHostTalkGadgetPrefix": { |
231 "os": [], | 222 "os": [], |
232 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" }, | 223 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" } |
233 "pref_mappings": [ | |
234 { "pref": "remote_access.host_talkgadget_prefix" } | |
235 ] | |
236 }, | 224 }, |
237 | 225 |
238 "RemoteAccessHostRequireCurtain": { | 226 "RemoteAccessHostRequireCurtain": { |
239 "os": [], | 227 "os": [], |
240 "test_policy": { "RemoteAccessHostRequireCurtain": false }, | 228 "test_policy": { "RemoteAccessHostRequireCurtain": false } |
241 "pref_mappings": [ | |
242 { "pref": "remote_access.host_require_curtain" } | |
243 ] | |
244 }, | 229 }, |
245 | 230 |
246 "RemoteAccessHostAllowClientPairing": { | 231 "RemoteAccessHostAllowClientPairing": { |
247 "os": [], | 232 "os": [], |
248 "test_policy": { "RemoteAccessHostAllowClientPairing": true }, | 233 "test_policy": { "RemoteAccessHostAllowClientPairing": true } |
249 "pref_mappings": [ | |
250 { "pref": "remote_access.host_allow_client_pairing" } | |
251 ] | |
252 }, | 234 }, |
253 | 235 |
254 "RemoteAccessHostAllowGnubbyAuth": { | 236 "RemoteAccessHostAllowGnubbyAuth": { |
255 "os": [], | 237 "os": [], |
256 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true }, | 238 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true } |
257 "pref_mappings": [ | |
258 { "pref": "remote_access.host_allow_gnubby_auth" } | |
259 ] | |
260 }, | 239 }, |
261 | 240 |
262 "RemoteAccessHostAllowRelayedConnection": { | 241 "RemoteAccessHostAllowRelayedConnection": { |
263 "os": [], | 242 "os": [], |
264 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true }, | 243 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true } |
265 "pref_mappings": [ | |
266 { "pref": "remote_access.host_allow_relayed_connection" } | |
267 ] | |
268 }, | 244 }, |
269 | 245 |
270 "RemoteAccessHostUdpPortRange": { | 246 "RemoteAccessHostUdpPortRange": { |
271 "os": [], | 247 "os": [], |
272 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }, | 248 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" } |
273 "pref_mappings": [ | 249 }, |
274 { "pref": "remote_access.host_udp_port_range" } | 250 |
275 ] | 251 "RemoteAccessHostMatchUsername": { |
| 252 "os": [], |
| 253 "test_policy": { "RemoteAccessHostMatchUsername": true } |
| 254 }, |
| 255 |
| 256 "RemoteAccessHostTokenUrl": { |
| 257 "os": [], |
| 258 "test_policy": { "RemoteAccessHostTokenUrl": "https://example.com/issue" } |
| 259 }, |
| 260 |
| 261 "RemoteAccessHostTokenValidationUrl": { |
| 262 "os": [], |
| 263 "test_policy": { "RemoteAccessHostTokenValidationUrl": "https://example.com/
validate" } |
| 264 }, |
| 265 |
| 266 "RemoteAccessHostTokenValidationCertificateIssuer": { |
| 267 "os": [], |
| 268 "test_policy": { "RemoteAccessHostTokenValidationCertificateIssuer": "Exampl
e Certificate Authority" } |
| 269 }, |
| 270 |
| 271 "RemoteAccessHostDebugOverridePolicies": { |
| 272 "os": [], |
| 273 "test_policy": { "RemoteAccessHostDebugOverridePolicies": "{ \"RemoteAccessH
ostMatchUsername\": true }" } |
276 }, | 274 }, |
277 | 275 |
278 "PrintingEnabled": { | 276 "PrintingEnabled": { |
279 "os": ["win", "linux", "mac", "chromeos"], | 277 "os": ["win", "linux", "mac", "chromeos"], |
280 "test_policy": { "PrintingEnabled": false }, | 278 "test_policy": { "PrintingEnabled": false }, |
281 "pref_mappings": [ | 279 "pref_mappings": [ |
282 { "pref": "printing.enabled" } | 280 { "pref": "printing.enabled" } |
283 ] | 281 ] |
284 }, | 282 }, |
285 | 283 |
(...skipping 2166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2452 | 2450 |
2453 "AdditionalLaunchParameters": { | 2451 "AdditionalLaunchParameters": { |
2454 }, | 2452 }, |
2455 | 2453 |
2456 "SuppressChromeFrameTurndownPrompt": { | 2454 "SuppressChromeFrameTurndownPrompt": { |
2457 }, | 2455 }, |
2458 | 2456 |
2459 "SkipMetadataCheck": { | 2457 "SkipMetadataCheck": { |
2460 } | 2458 } |
2461 } | 2459 } |
OLD | NEW |