Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(95)

Side by Side Diff: chrome/test/data/policy/policy_test_cases.json

Issue 820133002: Reusing names of policy keys from policy_constants.h (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Tweaks to policy_templates.json as suggested by Sergey and Bartosz. Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 { 1 {
2 "-- Template --": { 2 "-- Template --": {
3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.", 3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.",
4 4
5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], 5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."],
6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.", 6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.",
7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.", 7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.",
8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.", 8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.",
9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.", 9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.",
10 "pref_mappings": [ 10 "pref_mappings": [
(...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after
197 { "pref": "history.deleting_enabled" } 197 { "pref": "history.deleting_enabled" }
198 ] 198 ]
199 }, 199 },
200 200
201 "RemoteAccessClientFirewallTraversal": { 201 "RemoteAccessClientFirewallTraversal": {
202 }, 202 },
203 203
204 "RemoteAccessHostFirewallTraversal": { 204 "RemoteAccessHostFirewallTraversal": {
205 "os": [], 205 "os": [],
206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, 206 "test_policy": { "RemoteAccessHostFirewallTraversal": true },
207 "pref_mappings": [
208 { "pref": "remote_access.host_firewall_traversal" }
209 ],
210 207
211 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." 208 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed."
212 }, 209 },
213 210
214 "RemoteAccessHostRequireTwoFactor": { 211 "RemoteAccessHostRequireTwoFactor": {
215 "os": [], 212 "os": [],
216 "test_policy": { "RemoteAccessHostRequireTwoFactor": false }, 213 "test_policy": { "RemoteAccessHostRequireTwoFactor": false }
217 "pref_mappings": [
218 { "pref": "remote_access.host_require_two_factor" }
219 ]
220 }, 214 },
221 215
222 "RemoteAccessHostDomain": { 216 "RemoteAccessHostDomain": {
223 "os": [], 217 "os": [],
224 "test_policy": { "RemoteAccessHostDomain": "" }, 218 "test_policy": { "RemoteAccessHostDomain": "" }
225 "pref_mappings": [
226 { "pref": "remote_access.host_domain" }
227 ]
228 }, 219 },
229 220
230 "RemoteAccessHostTalkGadgetPrefix": { 221 "RemoteAccessHostTalkGadgetPrefix": {
231 "os": [], 222 "os": [],
232 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" }, 223 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" }
233 "pref_mappings": [
234 { "pref": "remote_access.host_talkgadget_prefix" }
235 ]
236 }, 224 },
237 225
238 "RemoteAccessHostRequireCurtain": { 226 "RemoteAccessHostRequireCurtain": {
239 "os": [], 227 "os": [],
240 "test_policy": { "RemoteAccessHostRequireCurtain": false }, 228 "test_policy": { "RemoteAccessHostRequireCurtain": false }
241 "pref_mappings": [
242 { "pref": "remote_access.host_require_curtain" }
243 ]
244 }, 229 },
245 230
246 "RemoteAccessHostAllowClientPairing": { 231 "RemoteAccessHostAllowClientPairing": {
247 "os": [], 232 "os": [],
248 "test_policy": { "RemoteAccessHostAllowClientPairing": true }, 233 "test_policy": { "RemoteAccessHostAllowClientPairing": true }
249 "pref_mappings": [
250 { "pref": "remote_access.host_allow_client_pairing" }
251 ]
252 }, 234 },
253 235
254 "RemoteAccessHostAllowGnubbyAuth": { 236 "RemoteAccessHostAllowGnubbyAuth": {
255 "os": [], 237 "os": [],
256 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true }, 238 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true }
257 "pref_mappings": [
258 { "pref": "remote_access.host_allow_gnubby_auth" }
259 ]
260 }, 239 },
261 240
262 "RemoteAccessHostAllowRelayedConnection": { 241 "RemoteAccessHostAllowRelayedConnection": {
263 "os": [], 242 "os": [],
264 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true }, 243 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true }
265 "pref_mappings": [
266 { "pref": "remote_access.host_allow_relayed_connection" }
267 ]
268 }, 244 },
269 245
270 "RemoteAccessHostUdpPortRange": { 246 "RemoteAccessHostUdpPortRange": {
271 "os": [], 247 "os": [],
272 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }, 248 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }
273 "pref_mappings": [ 249 },
274 { "pref": "remote_access.host_udp_port_range" } 250
275 ] 251 "RemoteAccessHostMatchUsername": {
252 "os": [],
253 "test_policy": { "RemoteAccessHostMatchUsername": true }
254 },
255
256 "RemoteAccessHostTokenUrl": {
257 "os": [],
258 "test_policy": { "RemoteAccessHostTokenUrl": "https://example.com/issue" }
259 },
260
261 "RemoteAccessHostTokenValidationUrl": {
262 "os": [],
263 "test_policy": { "RemoteAccessHostTokenValidationUrl": "https://example.com/ validate" }
264 },
265
266 "RemoteAccessHostTokenValidationCertificateIssuer": {
267 "os": [],
268 "test_policy": { "RemoteAccessHostTokenValidationCertificateIssuer": "Exampl e Certificate Authority" }
269 },
270
271 "RemoteAccessHostDebugOverridePolicies": {
272 "os": [],
273 "test_policy": { "RemoteAccessHostDebugOverridePolicies": "{ \"RemoteAccessH ostMatchUsername\": true }" }
276 }, 274 },
277 275
278 "PrintingEnabled": { 276 "PrintingEnabled": {
279 "os": ["win", "linux", "mac", "chromeos"], 277 "os": ["win", "linux", "mac", "chromeos"],
280 "test_policy": { "PrintingEnabled": false }, 278 "test_policy": { "PrintingEnabled": false },
281 "pref_mappings": [ 279 "pref_mappings": [
282 { "pref": "printing.enabled" } 280 { "pref": "printing.enabled" }
283 ] 281 ]
284 }, 282 },
285 283
(...skipping 2166 matching lines...) Expand 10 before | Expand all | Expand 10 after
2452 2450
2453 "AdditionalLaunchParameters": { 2451 "AdditionalLaunchParameters": {
2454 }, 2452 },
2455 2453
2456 "SuppressChromeFrameTurndownPrompt": { 2454 "SuppressChromeFrameTurndownPrompt": {
2457 }, 2455 },
2458 2456
2459 "SkipMetadataCheck": { 2457 "SkipMetadataCheck": {
2460 } 2458 }
2461 } 2459 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698