Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(165)

Side by Side Diff: components/policy/resources/policy_templates.json

Issue 820133002: Reusing names of policy keys from policy_constants.h (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Addressed code review feedback from Bartosz. Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 { 1 {
2 # policy_templates.json - Metafile for policy templates 2 # policy_templates.json - Metafile for policy templates
3 # 3 #
4 # The content of this file is evaluated as a Python expression. 4 # The content of this file is evaluated as a Python expression.
5 # 5 #
6 # This file is used as input to generate the following policy templates: 6 # This file is used as input to generate the following policy templates:
7 # ADM, ADMX+ADML, MCX/plist and html documentation. 7 # ADM, ADMX+ADML, MCX/plist and html documentation.
8 # 8 #
9 # Policy templates are user interface definitions or documents about the 9 # Policy templates are user interface definitions or documents about the
10 # policies that can be used to configure Chrome. Each policy is a name-value 10 # policies that can be used to configure Chrome. Each policy is a name-value
(...skipping 105 matching lines...) Expand 10 before | Expand all | Expand 10 after
116 # templates and documentation. The policy definition list that Chrome sees 116 # templates and documentation. The policy definition list that Chrome sees
117 # will include policies marked with 'future'. If a WIP policy isn't meant to 117 # will include policies marked with 'future'. If a WIP policy isn't meant to
118 # be seen by the policy providers either, the 'supported_on' key should be set 118 # be seen by the policy providers either, the 'supported_on' key should be set
119 # to an empty list. 119 # to an empty list.
120 # 120 #
121 # IDs: 121 # IDs:
122 # Since a Protocol Buffer definition is generated from this file, unique and 122 # Since a Protocol Buffer definition is generated from this file, unique and
123 # persistent IDs for all fields (but not for groups!) are needed. These are 123 # persistent IDs for all fields (but not for groups!) are needed. These are
124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, 124 # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs,
125 # because doing so would break the deployed wire format! 125 # because doing so would break the deployed wire format!
126 # For your editing convenience: highest ID currently used: 284 126 # For your editing convenience: highest ID currently used: 289
127 # 127 #
128 # Placeholders: 128 # Placeholders:
129 # The following placeholder strings are automatically substituted: 129 # The following placeholder strings are automatically substituted:
130 # $1 -> Google Chrome / Chromium 130 # $1 -> Google Chrome / Chromium
131 # $2 -> Google Chrome OS / Chromium OS 131 # $2 -> Google Chrome OS / Chromium OS
132 # $3 -> Google Chrome Frame / Chromium Frame 132 # $3 -> Google Chrome Frame / Chromium Frame
133 # $6 is reserved for doc_writer 133 # $6 is reserved for doc_writer
134 # 134 #
135 # Device Policy: 135 # Device Policy:
136 # An additional flag device_only (optional, defaults to False) indicates 136 # An additional flag device_only (optional, defaults to False) indicates
(...skipping 441 matching lines...) Expand 10 before | Expand all | Expand 10 after
578 Enables usage of STUN and relay servers when connecting to a remote cl ient. 578 Enables usage of STUN and relay servers when connecting to a remote cl ient.
579 579
580 If this setting is enabled, then this machine can discover and connect to remote host machines even if they are separated by a firewall. 580 If this setting is enabled, then this machine can discover and connect to remote host machines even if they are separated by a firewall.
581 581
582 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine can only connect to host machines within the local network.''', 582 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine can only connect to host machines within the local network.''',
583 }, 583 },
584 { 584 {
585 'name': 'RemoteAccessHostFirewallTraversal', 585 'name': 'RemoteAccessHostFirewallTraversal',
586 'type': 'main', 586 'type': 'main',
587 'schema': { 'type': 'boolean' }, 587 'schema': { 'type': 'boolean' },
588 'supported_on': ['chrome.*:14-'], 588 'supported_on': ['chrome.*:14-', 'chrome_os:41-'],
bartfab (slow) 2015/01/14 11:09:02 Here and below: 41 just branched. This should be 4
Łukasz Anforowicz 2015/01/14 19:35:12 I think this is okay - support for Chromoting into
bartfab (slow) 2015/01/15 09:41:44 Chrome OS supports cloud policy only. The cloud po
Łukasz Anforowicz 2015/01/15 17:35:22 You're right. On non-Chrome-OS Chromoting didn't
bartfab (slow) 2015/01/16 09:02:23 We generate the cloud policy protobuf from policy_
589 'features': { 589 'features': {
590 'dynamic_refresh': True, 590 'dynamic_refresh': True,
591 'per_profile': False, 591 'per_profile': False,
592 }, 592 },
593 'example_value': False, 593 'example_value': False,
594 'id': 95, 594 'id': 95,
595 'caption': '''Enable firewall traversal from remote access host''', 595 'caption': '''Enable firewall traversal from remote access host''',
596 'desc': '''Enables usage of STUN servers when remote clients are tryin g to establish a connection to this machine. 596 'desc': '''Enables usage of STUN servers when remote clients are tryin g to establish a connection to this machine.
597 597
598 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall. 598 If this setting is enabled, then remote clients can discover and conne ct to this machines even if they are separated by a firewall.
599 599
600 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network. 600 If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machi nes within the local network.
601 601
602 If this policy is left not set the setting will be enabled.''', 602 If this policy is left not set the setting will be enabled.''',
603 }, 603 },
604 { 604 {
605 'name': 'RemoteAccessHostDomain', 605 'name': 'RemoteAccessHostDomain',
606 'type': 'string', 606 'type': 'string',
607 'schema': { 'type': 'string' }, 607 'schema': { 'type': 'string' },
608 'supported_on': ['chrome.*:22-'], 608 'supported_on': ['chrome.*:22-', 'chrome_os:41-'],
609 'features': { 609 'features': {
610 'dynamic_refresh': True, 610 'dynamic_refresh': True,
611 'per_profile': False, 611 'per_profile': False,
612 }, 612 },
613 'example_value': 'my-awesome-domain.com', 613 'example_value': 'my-awesome-domain.com',
614 'id': 154, 614 'id': 154,
615 'caption': '''Configure the required domain name for remote access hos ts''', 615 'caption': '''Configure the required domain name for remote access hos ts''',
616 'desc': '''Configures the required host domain name that will be impos ed on remote access hosts and prevents users from changing it. 616 'desc': '''Configures the required host domain name that will be impos ed on remote access hosts and prevents users from changing it.
617 617
618 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name. 618 If this setting is enabled, then hosts can be shared only using accoun ts registered on the specified domain name.
619 619
620 If this setting is disabled or not set, then hosts can be shared using any account.''', 620 If this setting is disabled or not set, then hosts can be shared using any account.''',
621 }, 621 },
622 { 622 {
623 'name': 'RemoteAccessHostRequireTwoFactor', 623 'name': 'RemoteAccessHostRequireTwoFactor',
624 'type': 'main', 624 'type': 'main',
625 'schema': { 'type': 'boolean' }, 625 'schema': { 'type': 'boolean' },
626 'supported_on': ['chrome.*:22-'], 626 'supported_on': ['chrome.*:22-', 'chrome_os:41-'],
627 'features': { 627 'features': {
628 'dynamic_refresh': True, 628 'dynamic_refresh': True,
629 'per_profile': False, 629 'per_profile': False,
630 }, 630 },
631 'example_value': False, 631 'example_value': False,
632 'id': 155, 632 'id': 155,
633 'caption': '''Enable two-factor authentication for remote access hosts ''', 633 'caption': '''Enable two-factor authentication for remote access hosts ''',
634 'desc': '''Enables two-factor authentication for remote access hosts i nstead of a user-specified PIN. 634 'desc': '''Enables two-factor authentication for remote access hosts i nstead of a user-specified PIN.
635 635
636 If this setting is enabled, then users must provide a valid two-factor code when accessing a host. 636 If this setting is enabled, then users must provide a valid two-factor code when accessing a host.
637 637
638 If this setting is disabled or not set, then two-factor will not be en abled and the default behavior of having a user-defined PIN will be used.''', 638 If this setting is disabled or not set, then two-factor will not be en abled and the default behavior of having a user-defined PIN will be used.''',
639 }, 639 },
640 { 640 {
641 'name': 'RemoteAccessHostTalkGadgetPrefix', 641 'name': 'RemoteAccessHostTalkGadgetPrefix',
642 'type': 'string', 642 'type': 'string',
643 'schema': { 'type': 'string' }, 643 'schema': { 'type': 'string' },
644 'supported_on': ['chrome.*:22-'], 644 'supported_on': ['chrome.*:22-', 'chrome_os:41-'],
645 'features': { 645 'features': {
646 'dynamic_refresh': True, 646 'dynamic_refresh': True,
647 'per_profile': False, 647 'per_profile': False,
648 }, 648 },
649 'example_value': 'chromoting-host', 649 'example_value': 'chromoting-host',
650 'id': 156, 650 'id': 156,
651 'caption': '''Configure the TalkGadget prefix for remote access hosts' '', 651 'caption': '''Configure the TalkGadget prefix for remote access hosts' '',
652 'desc': '''Configures the TalkGadget prefix that will be used by remot e access hosts and prevents users from changing it. 652 'desc': '''Configures the TalkGadget prefix that will be used by remot e access hosts and prevents users from changing it.
653 653
654 If specified, this prefix is prepended to the base TalkGadget name to create a full domain name for the TalkGadget. The base TalkGadget domain name is '.talkgadget.google.com'. 654 If specified, this prefix is prepended to the base TalkGadget name to create a full domain name for the TalkGadget. The base TalkGadget domain name is '.talkgadget.google.com'.
655 655
656 If this setting is enabled, then hosts will use the custom domain name when accessing the TalkGadget instead of the default domain name. 656 If this setting is enabled, then hosts will use the custom domain name when accessing the TalkGadget instead of the default domain name.
657 657
658 If this setting is disabled or not set, then the default TalkGadget do main name ('chromoting-host.talkgadget.google.com') will be used for all hosts. 658 If this setting is disabled or not set, then the default TalkGadget do main name ('chromoting-host.talkgadget.google.com') will be used for all hosts.
659 659
660 Remote access clients are not affected by this policy setting. They wi ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget .''', 660 Remote access clients are not affected by this policy setting. They wi ll always use 'chromoting-client.talkgadget.google.com' to access the TalkGadget .''',
661 }, 661 },
662 { 662 {
663 'name': 'RemoteAccessHostRequireCurtain', 663 'name': 'RemoteAccessHostRequireCurtain',
664 'type': 'main', 664 'type': 'main',
665 'schema': { 'type': 'boolean' }, 665 'schema': { 'type': 'boolean' },
666 'supported_on': ['chrome.*:23-'], 666 'supported_on': ['chrome.*:23-', 'chrome_os:41-'],
667 'features': { 667 'features': {
668 'dynamic_refresh': True, 668 'dynamic_refresh': True,
669 'per_profile': False, 669 'per_profile': False,
670 }, 670 },
671 'example_value': False, 671 'example_value': False,
672 'id': 157, 672 'id': 157,
673 'caption': '''Enable curtaining of remote access hosts''', 673 'caption': '''Enable curtaining of remote access hosts''',
674 'desc': '''Enables curtaining of remote access hosts while a connectio n is in progress. 674 'desc': '''Enables curtaining of remote access hosts while a connectio n is in progress.
675 675
676 If this setting is enabled, then hosts' physical input and output devi ces are disabled while a remote connection is in progress. 676 If this setting is enabled, then hosts' physical input and output devi ces are disabled while a remote connection is in progress.
677 677
678 If this setting is disabled or not set, then both local and remote use rs can interact with the host when it is being shared.''', 678 If this setting is disabled or not set, then both local and remote use rs can interact with the host when it is being shared.''',
679 }, 679 },
680 { 680 {
681 'name': 'RemoteAccessHostAllowClientPairing', 681 'name': 'RemoteAccessHostAllowClientPairing',
682 'type': 'main', 682 'type': 'main',
683 'schema': { 'type': 'boolean' }, 683 'schema': { 'type': 'boolean' },
684 'supported_on': ['chrome.*:30-'], 684 'supported_on': ['chrome.*:30-', 'chrome_os:41-'],
685 'features': { 685 'features': {
686 'dynamic_refresh': True, 686 'dynamic_refresh': True,
687 'per_profile': False, 687 'per_profile': False,
688 }, 688 },
689 'example_value': False, 689 'example_value': False,
690 'id': 234, 690 'id': 234,
691 'caption': '''Enable or disable PIN-less authentication''', 691 'caption': '''Enable or disable PIN-less authentication for remote acc ess hosts''',
692 'desc': '''If this setting is enabled or not configured, then users ca n opt to pair clients and hosts at connection time, eliminating the need to ente r a PIN every time. 692 'desc': '''If this setting is enabled or not configured, then users ca n opt to pair clients and hosts at connection time, eliminating the need to ente r a PIN every time.
693 693
694 If this setting is disabled, then this feature will not be available.' '', 694 If this setting is disabled, then this feature will not be available.' '',
695 }, 695 },
696 { 696 {
697 'name': 'RemoteAccessHostAllowGnubbyAuth', 697 'name': 'RemoteAccessHostAllowGnubbyAuth',
698 'type': 'main', 698 'type': 'main',
699 'schema': { 'type': 'boolean' }, 699 'schema': { 'type': 'boolean' },
700 'supported_on': ['chrome.*:35-'], 700 'supported_on': ['chrome.*:35-', 'chrome_os:41-'],
701 'features': { 701 'features': {
702 'dynamic_refresh': True, 702 'dynamic_refresh': True,
703 'per_profile': False, 703 'per_profile': False,
704 }, 704 },
705 'example_value': True, 705 'example_value': True,
706 'id': 257, 706 'id': 257,
707 'caption': '''Allow gnubby authentication''', 707 'caption': '''Allow gnubby authentication for remote access hosts''',
708 'desc': '''If this setting is enabled, then gnubby authentication requ ests will be proxied across a remote host connection. 708 'desc': '''If this setting is enabled, then gnubby authentication requ ests will be proxied across a remote host connection.
709 709
710 If this setting is disabled or not configured, gnubby authentication r equests will not be proxied.''', 710 If this setting is disabled or not configured, gnubby authentication r equests will not be proxied.''',
711 }, 711 },
712 { 712 {
713 'name': 'RemoteAccessHostAllowRelayedConnection', 713 'name': 'RemoteAccessHostAllowRelayedConnection',
714 'type': 'main', 714 'type': 'main',
715 'schema': { 'type': 'boolean' }, 715 'schema': { 'type': 'boolean' },
716 'supported_on': ['chrome.*:36-'], 716 'supported_on': ['chrome.*:36-', 'chrome_os:41-'],
717 'features': { 717 'features': {
718 'dynamic_refresh': True, 718 'dynamic_refresh': True,
719 'per_profile': False, 719 'per_profile': False,
720 }, 720 },
721 'example_value': False, 721 'example_value': False,
722 'id': 263, 722 'id': 263,
723 'caption': '''Enable the use of relay servers by the remote access hos t''', 723 'caption': '''Enable the use of relay servers by the remote access hos t''',
724 'desc': '''Enables usage of relay servers when remote clients are tryi ng to establish a connection to this machine. 724 'desc': '''Enables usage of relay servers when remote clients are tryi ng to establish a connection to this machine.
725 725
726 If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due t o firewall restrictions). 726 If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due t o firewall restrictions).
727 727
728 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will be ignored. 728 Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_PO LICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will be ignored.
729 729
730 If this policy is left not set the setting will be enabled.''', 730 If this policy is left not set the setting will be enabled.''',
731 }, 731 },
732 { 732 {
733 'name': 'RemoteAccessHostUdpPortRange', 733 'name': 'RemoteAccessHostUdpPortRange',
734 'type': 'string', 734 'type': 'string',
735 'schema': { 'type': 'string' }, 735 'schema': { 'type': 'string' },
736 'supported_on': ['chrome.*:36-'], 736 'supported_on': ['chrome.*:36-', 'chrome_os:41-'],
737 'features': { 737 'features': {
738 'dynamic_refresh': True, 738 'dynamic_refresh': True,
739 'per_profile': False, 739 'per_profile': False,
740 }, 740 },
741 'example_value': '12400-12409', 741 'example_value': '12400-12409',
742 'id': 264, 742 'id': 264,
743 'caption': '''Restrict the UDP port range used by the remote access ho st''', 743 'caption': '''Restrict the UDP port range used by the remote access ho st''',
744 'desc': '''Restricts the UDP port range used by the remote access host in this machine. 744 'desc': '''Restricts the UDP port range used by the remote access host in this machine.
745 745
746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', 746 If this policy is left not set, or if it is set to an empty string, th e remote access host will be allowed to use any available port, unless the polic y <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirew allTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''',
747 }, 747 },
748 {
749 'name': 'RemoteAccessHostMatchUsername',
750 'type': 'main',
751 'schema': { 'type': 'boolean' },
752 'supported_on': ['chrome_os:41-', 'chrome.linux:25-', 'chrome.mac:25-' ],
bartfab (slow) 2015/01/14 11:09:02 Nit: It is customary to list |chrome| before |chro
Łukasz Anforowicz 2015/01/14 19:35:12 Done.
753 'features': {
754 'dynamic_refresh': True,
755 'per_profile': False,
756 },
757 'example_value': False,
758 'id': 285,
759 'caption': '''Requires that the name of the local user and the remote access host owner match''',
760 'desc': '''Requires that the name of the local user and the remote acc ess host owner match.
761
762 If this setting is enabled, then the remote access host compares the n ame of the local user (that the host is associated with) and the name of the Goo gle account registered as the host owner (i.e. "johndoe" if the host is owned by "johndoe@example.com" Google account). The remote access host will not start i f the name of the host owner is different from the name of the local user that t he host is associated with. RemoteAccessHostMatchUsername policy should be used together with RemoteAccessHostDomain to also enforce that the Google account of the host owner is associated with a specific domain (i.e. "example.com").
763
764 If this setting is disabled or not set, then the remote access host ca n be associated with any local user.''',
765 },
766 {
767 'name': 'RemoteAccessHostTokenUrl',
768 'type': 'string',
769 'schema': { 'type': 'string' },
770 'supported_on': ['chrome.*:28-','chrome_os:41-'],
771 'features': {
772 'dynamic_refresh': True,
773 'per_profile': False,
774 },
775 'example_value': 'https://example.com/issue',
776 'id': 286,
777 'caption': '''URL where remote access clients should obtain their auth entication token''',
778 'desc': '''URL where remote access clients should obtain their authent ication token.
779
780 If this policy is set, the remote access host will require authenticat ing clients to obtain an authentication token from this URL in order to connect. Must be used in conjunction with RemoteAccessHostTokenValidationUrl.
781
782 This feature is currently disabled server-side.''',
783 },
784 {
785 'name': 'RemoteAccessHostTokenValidationUrl',
786 'type': 'string',
787 'schema': { 'type': 'string' },
788 'supported_on': ['chrome.*:28-','chrome_os:41-'],
789 'features': {
790 'dynamic_refresh': True,
791 'per_profile': False,
792 },
793 'example_value': 'https://example.com/validate',
794 'id': 287,
795 'caption': '''URL for validating remote access client authentication t oken''',
796 'desc': '''URL for validating remote access client authentication toke n.
797
798 If this policy is set, the remote access host will use this URL to val idate authentication tokens from remote access clients, in order to accept conne ctions. Must be used in conjunction with RemoteAccessHostTokenUrl.
799
800 This feature is currently disabled server-side.''',
801 },
802 {
803 'name': 'RemoteAccessHostTokenValidationCertificateIssuer',
804 'type': 'string',
805 'schema': { 'type': 'string' },
806 'supported_on': ['chrome.*:28-','chrome_os:41-'],
807 'features': {
808 'dynamic_refresh': True,
809 'per_profile': False,
810 },
811 'example_value': 'Example Certificate Authority',
812 'id': 288,
813 'caption': '''Client certificate for connecting to RemoteAccessHostTok enValidationUrl''',
814 'desc': '''Client certificate for connecting to RemoteAccessHostTokenV alidationUrl.
815
816 If this policy is set, the host will use a client certificate with the given issuer CN to authenticate to RemoteAccessHostTokenValidationUrl. Set it t o "*" to use any available client certificate.
817
818 This feature is currently disabled server-side.''',
819 },
820 {
821 'name': 'RemoteAccessHostDebugOverridePolicies',
822 'type': 'string',
823 'schema': { 'type': 'string' },
824 'supported_on': ['chrome.*:25-','chrome_os:41-'],
825 'features': {
826 'dynamic_refresh': True,
827 'per_profile': False,
828 },
829 'example_value': '{ "RemoteAccessHostMatchUsername": true }',
830 'id': 289,
831 'caption': '''Policy overrides for Debug builds of the remote access h ost''',
832 'desc': '''Overrides policies on Debug builds of the remote access hos t.
833
834 The value is parsed as a JSON dictionary of policy name to policy valu e mappings.''',
835 },
748 ], 836 ],
749 }, 837 },
750 { 838 {
751 'name': 'PrintingEnabled', 839 'name': 'PrintingEnabled',
752 'type': 'main', 840 'type': 'main',
753 'schema': { 'type': 'boolean' }, 841 'schema': { 'type': 'boolean' },
754 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'], 842 'supported_on': ['chrome.*:8-', 'chrome_os:11-', 'android:39-'],
755 'features': { 843 'features': {
756 'dynamic_refresh': True, 844 'dynamic_refresh': True,
757 'per_profile': True, 845 'per_profile': True,
(...skipping 6403 matching lines...) Expand 10 before | Expand all | Expand 10 after
7161 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''', 7249 'desc': '''Text appended in parentheses next to the policies top-level con tainer to indicate that those policies are of the Recommended level''',
7162 'text': 'Default Settings (users can override)', 7250 'text': 'Default Settings (users can override)',
7163 }, 7251 },
7164 'doc_complex_policies_on_windows': { 7252 'doc_complex_policies_on_windows': {
7165 'desc': '''Text pointing the user to a help article for complex policies o n Windows''', 7253 'desc': '''Text pointing the user to a help article for complex policies o n Windows''',
7166 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' , 7254 'text': '''encoded as a JSON string, for details see <ph name="COMPLEX_POL ICIES_URL">http://www.chromium.org/administrators/complex-policies-on-windows<ex >http://www.chromium.org/administrators/complex-policies-on-windows</ex></ph>''' ,
7167 }, 7255 },
7168 }, 7256 },
7169 'placeholders': [], 7257 'placeholders': [],
7170 } 7258 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698