Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(307)

Side by Side Diff: chrome/test/data/policy/policy_test_cases.json

Issue 820133002: Reusing names of policy keys from policy_constants.h (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Marked the 5 "new" policies as chrome_os:42- Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/common/pref_names.cc ('k') | components/policy/resources/policy_templates.json » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 { 1 {
2 "-- Template --": { 2 "-- Template --": {
3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.", 3 "intro": "Top-level entries map a policy name to its test parameters, descri bed below. The name of the top level entry should be of the form <policy name>[. suffix]. The optional suffix is used for defining multiple test cases for a sing le policy.",
4 4
5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], 5 "os": ["List of operating systems that support this policy. Valid values:", "win", "linux", "mac", "chromeos", "Defaults to empty if not specified."],
6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.", 6 "official_only": "Whether this policy exists in official builds only. Defaul ts to |false| if not specified.",
7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.", 7 "can_be_recommended": "Whether a recommended value may be set for the policy . Defaults to |false| if not specified.",
8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.", 8 "test_policy": "A policy dictionary that should make the preferences affecte d by this policy become policy-controlled. Usually just sets the current policy. Defaults to an empty dictionary if not specified.",
9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.", 9 "note": "If the policy affects any preferences, the following array should b e specified with one entry per such preference.",
10 "pref_mappings": [ 10 "pref_mappings": [
(...skipping 184 matching lines...) Expand 10 before | Expand all | Expand 10 after
195 "test_policy": { "AllowDeletingBrowserHistory": false }, 195 "test_policy": { "AllowDeletingBrowserHistory": false },
196 "pref_mappings": [ 196 "pref_mappings": [
197 { "pref": "history.deleting_enabled" } 197 { "pref": "history.deleting_enabled" }
198 ] 198 ]
199 }, 199 },
200 200
201 "RemoteAccessClientFirewallTraversal": { 201 "RemoteAccessClientFirewallTraversal": {
202 }, 202 },
203 203
204 "RemoteAccessHostFirewallTraversal": { 204 "RemoteAccessHostFirewallTraversal": {
205 "os": [],
206 "test_policy": { "RemoteAccessHostFirewallTraversal": true },
207 "pref_mappings": [
208 { "pref": "remote_access.host_firewall_traversal" }
209 ],
210
211 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed."
212 }, 205 },
213 206
214 "RemoteAccessHostRequireTwoFactor": { 207 "RemoteAccessHostRequireTwoFactor": {
215 "os": [],
216 "test_policy": { "RemoteAccessHostRequireTwoFactor": false },
217 "pref_mappings": [
218 { "pref": "remote_access.host_require_two_factor" }
219 ]
220 }, 208 },
221 209
222 "RemoteAccessHostDomain": { 210 "RemoteAccessHostDomain": {
223 "os": [],
224 "test_policy": { "RemoteAccessHostDomain": "" },
225 "pref_mappings": [
226 { "pref": "remote_access.host_domain" }
227 ]
228 }, 211 },
229 212
230 "RemoteAccessHostTalkGadgetPrefix": { 213 "RemoteAccessHostTalkGadgetPrefix": {
231 "os": [],
232 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" },
233 "pref_mappings": [
234 { "pref": "remote_access.host_talkgadget_prefix" }
235 ]
236 }, 214 },
237 215
238 "RemoteAccessHostRequireCurtain": { 216 "RemoteAccessHostRequireCurtain": {
239 "os": [],
240 "test_policy": { "RemoteAccessHostRequireCurtain": false },
241 "pref_mappings": [
242 { "pref": "remote_access.host_require_curtain" }
243 ]
244 }, 217 },
245 218
246 "RemoteAccessHostAllowClientPairing": { 219 "RemoteAccessHostAllowClientPairing": {
247 "os": [],
248 "test_policy": { "RemoteAccessHostAllowClientPairing": true },
249 "pref_mappings": [
250 { "pref": "remote_access.host_allow_client_pairing" }
251 ]
252 }, 220 },
253 221
254 "RemoteAccessHostAllowGnubbyAuth": { 222 "RemoteAccessHostAllowGnubbyAuth": {
255 "os": [],
256 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true },
257 "pref_mappings": [
258 { "pref": "remote_access.host_allow_gnubby_auth" }
259 ]
260 }, 223 },
261 224
262 "RemoteAccessHostAllowRelayedConnection": { 225 "RemoteAccessHostAllowRelayedConnection": {
263 "os": [],
264 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true },
265 "pref_mappings": [
266 { "pref": "remote_access.host_allow_relayed_connection" }
267 ]
268 }, 226 },
269 227
270 "RemoteAccessHostUdpPortRange": { 228 "RemoteAccessHostUdpPortRange": {
271 "os": [], 229 },
272 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }, 230
273 "pref_mappings": [ 231 "RemoteAccessHostMatchUsername": {
274 { "pref": "remote_access.host_udp_port_range" } 232 },
275 ] 233
234 "RemoteAccessHostTokenUrl": {
235 },
236
237 "RemoteAccessHostTokenValidationUrl": {
238 },
239
240 "RemoteAccessHostTokenValidationCertificateIssuer": {
241 },
242
243 "RemoteAccessHostDebugOverridePolicies": {
276 }, 244 },
277 245
278 "PrintingEnabled": { 246 "PrintingEnabled": {
279 "os": ["win", "linux", "mac", "chromeos"], 247 "os": ["win", "linux", "mac", "chromeos"],
280 "test_policy": { "PrintingEnabled": false }, 248 "test_policy": { "PrintingEnabled": false },
281 "pref_mappings": [ 249 "pref_mappings": [
282 { "pref": "printing.enabled" } 250 { "pref": "printing.enabled" }
283 ] 251 ]
284 }, 252 },
285 253
(...skipping 2159 matching lines...) Expand 10 before | Expand all | Expand 10 after
2445 2413
2446 "AdditionalLaunchParameters": { 2414 "AdditionalLaunchParameters": {
2447 }, 2415 },
2448 2416
2449 "SuppressChromeFrameTurndownPrompt": { 2417 "SuppressChromeFrameTurndownPrompt": {
2450 }, 2418 },
2451 2419
2452 "SkipMetadataCheck": { 2420 "SkipMetadataCheck": {
2453 } 2421 }
2454 } 2422 }
OLDNEW
« no previous file with comments | « chrome/common/pref_names.cc ('k') | components/policy/resources/policy_templates.json » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698