OLD | NEW |
---|---|
1 { | 1 { |
2 "-- Template --": { | 2 "-- Template --": { |
3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.", | 3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.", |
4 | 4 |
5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], | 5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], |
6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.", | 6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.", |
7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.", | 7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.", |
8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.", | 8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.", |
9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.", | 9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.", |
10 "pref_mappings": [ | 10 "pref_mappings": [ |
(...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
194 "os": [], | 194 "os": [], |
195 "test_policy": { "AllowDeletingBrowserHistory": false }, | 195 "test_policy": { "AllowDeletingBrowserHistory": false }, |
196 "pref_mappings": [ | 196 "pref_mappings": [ |
197 { "pref": "history.deleting_enabled" } | 197 { "pref": "history.deleting_enabled" } |
198 ] | 198 ] |
199 }, | 199 }, |
200 | 200 |
201 "RemoteAccessClientFirewallTraversal": { | 201 "RemoteAccessClientFirewallTraversal": { |
202 }, | 202 }, |
203 | 203 |
204 "RemoteAccessHostFirewallTraversal": { | 204 "RemoteAccessHostFirewallTraversal": { |
bartfab (slow)
2015/01/14 11:09:02
Since none of these policies are actually processe
Łukasz Anforowicz
2015/01/14 19:35:12
Done.
| |
205 "os": [], | 205 "os": [], |
206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, | 206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, |
207 "pref_mappings": [ | |
208 { "pref": "remote_access.host_firewall_traversal" } | |
209 ], | |
210 | 207 |
211 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." | 208 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." |
Łukasz Anforowicz
2015/01/14 19:35:12
I will remove this comment as well - crbug.com/121
| |
212 }, | 209 }, |
213 | 210 |
214 "RemoteAccessHostRequireTwoFactor": { | 211 "RemoteAccessHostRequireTwoFactor": { |
215 "os": [], | 212 "os": [], |
216 "test_policy": { "RemoteAccessHostRequireTwoFactor": false }, | 213 "test_policy": { "RemoteAccessHostRequireTwoFactor": false } |
217 "pref_mappings": [ | |
218 { "pref": "remote_access.host_require_two_factor" } | |
219 ] | |
220 }, | 214 }, |
221 | 215 |
222 "RemoteAccessHostDomain": { | 216 "RemoteAccessHostDomain": { |
223 "os": [], | 217 "os": [], |
224 "test_policy": { "RemoteAccessHostDomain": "" }, | 218 "test_policy": { "RemoteAccessHostDomain": "" } |
225 "pref_mappings": [ | |
226 { "pref": "remote_access.host_domain" } | |
227 ] | |
228 }, | 219 }, |
229 | 220 |
230 "RemoteAccessHostTalkGadgetPrefix": { | 221 "RemoteAccessHostTalkGadgetPrefix": { |
231 "os": [], | 222 "os": [], |
232 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" }, | 223 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" } |
233 "pref_mappings": [ | |
234 { "pref": "remote_access.host_talkgadget_prefix" } | |
235 ] | |
236 }, | 224 }, |
237 | 225 |
238 "RemoteAccessHostRequireCurtain": { | 226 "RemoteAccessHostRequireCurtain": { |
239 "os": [], | 227 "os": [], |
240 "test_policy": { "RemoteAccessHostRequireCurtain": false }, | 228 "test_policy": { "RemoteAccessHostRequireCurtain": false } |
241 "pref_mappings": [ | |
242 { "pref": "remote_access.host_require_curtain" } | |
243 ] | |
244 }, | 229 }, |
245 | 230 |
246 "RemoteAccessHostAllowClientPairing": { | 231 "RemoteAccessHostAllowClientPairing": { |
247 "os": [], | 232 "os": [], |
248 "test_policy": { "RemoteAccessHostAllowClientPairing": true }, | 233 "test_policy": { "RemoteAccessHostAllowClientPairing": true } |
249 "pref_mappings": [ | |
250 { "pref": "remote_access.host_allow_client_pairing" } | |
251 ] | |
252 }, | 234 }, |
253 | 235 |
254 "RemoteAccessHostAllowGnubbyAuth": { | 236 "RemoteAccessHostAllowGnubbyAuth": { |
255 "os": [], | 237 "os": [], |
256 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true }, | 238 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true } |
257 "pref_mappings": [ | |
258 { "pref": "remote_access.host_allow_gnubby_auth" } | |
259 ] | |
260 }, | 239 }, |
261 | 240 |
262 "RemoteAccessHostAllowRelayedConnection": { | 241 "RemoteAccessHostAllowRelayedConnection": { |
263 "os": [], | 242 "os": [], |
264 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true }, | 243 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true } |
265 "pref_mappings": [ | |
266 { "pref": "remote_access.host_allow_relayed_connection" } | |
267 ] | |
268 }, | 244 }, |
269 | 245 |
270 "RemoteAccessHostUdpPortRange": { | 246 "RemoteAccessHostUdpPortRange": { |
271 "os": [], | 247 "os": [], |
272 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }, | 248 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" } |
273 "pref_mappings": [ | 249 }, |
274 { "pref": "remote_access.host_udp_port_range" } | 250 |
275 ] | 251 "RemoteAccessHostMatchUsername": { |
252 "os": [], | |
253 "test_policy": { "RemoteAccessHostMatchUsername": true } | |
254 }, | |
255 | |
256 "RemoteAccessHostTokenUrl": { | |
257 "os": [], | |
258 "test_policy": { "RemoteAccessHostTokenUrl": "https://example.com/issue" } | |
259 }, | |
260 | |
261 "RemoteAccessHostTokenValidationUrl": { | |
262 "os": [], | |
263 "test_policy": { "RemoteAccessHostTokenValidationUrl": "https://example.com/ validate" } | |
264 }, | |
265 | |
266 "RemoteAccessHostTokenValidationCertificateIssuer": { | |
267 "os": [], | |
268 "test_policy": { "RemoteAccessHostTokenValidationCertificateIssuer": "Exampl e Certificate Authority" } | |
269 }, | |
270 | |
271 "RemoteAccessHostDebugOverridePolicies": { | |
272 "os": [], | |
273 "test_policy": { "RemoteAccessHostDebugOverridePolicies": "{ \"RemoteAccessH ostMatchUsername\": true }" } | |
276 }, | 274 }, |
277 | 275 |
278 "PrintingEnabled": { | 276 "PrintingEnabled": { |
279 "os": ["win", "linux", "mac", "chromeos"], | 277 "os": ["win", "linux", "mac", "chromeos"], |
280 "test_policy": { "PrintingEnabled": false }, | 278 "test_policy": { "PrintingEnabled": false }, |
281 "pref_mappings": [ | 279 "pref_mappings": [ |
282 { "pref": "printing.enabled" } | 280 { "pref": "printing.enabled" } |
283 ] | 281 ] |
284 }, | 282 }, |
285 | 283 |
(...skipping 2166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2452 | 2450 |
2453 "AdditionalLaunchParameters": { | 2451 "AdditionalLaunchParameters": { |
2454 }, | 2452 }, |
2455 | 2453 |
2456 "SuppressChromeFrameTurndownPrompt": { | 2454 "SuppressChromeFrameTurndownPrompt": { |
2457 }, | 2455 }, |
2458 | 2456 |
2459 "SkipMetadataCheck": { | 2457 "SkipMetadataCheck": { |
2460 } | 2458 } |
2461 } | 2459 } |
OLD | NEW |