| OLD | NEW |
| 1 { | 1 { |
| 2 "-- Template --": { | 2 "-- Template --": { |
| 3 "intro": "Top-level entries map a policy name to its test parameters, descri
bed below. The name of the top level entry should be of the form <policy name>[.
suffix]. The optional suffix is used for defining multiple test cases for a sing
le policy.", | 3 "intro": "Top-level entries map a policy name to its test parameters, descri
bed below. The name of the top level entry should be of the form <policy name>[.
suffix]. The optional suffix is used for defining multiple test cases for a sing
le policy.", |
| 4 | 4 |
| 5 "os": ["List of operating systems that support this policy. Valid values:",
"win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], | 5 "os": ["List of operating systems that support this policy. Valid values:",
"win", "linux", "mac", "chromeos", "Defaults to empty if not specified."], |
| 6 "official_only": "Whether this policy exists in official builds only. Defaul
ts to |false| if not specified.", | 6 "official_only": "Whether this policy exists in official builds only. Defaul
ts to |false| if not specified.", |
| 7 "can_be_recommended": "Whether a recommended value may be set for the policy
. Defaults to |false| if not specified.", | 7 "can_be_recommended": "Whether a recommended value may be set for the policy
. Defaults to |false| if not specified.", |
| 8 "test_policy": "A policy dictionary that should make the preferences affecte
d by this policy become policy-controlled. Usually just sets the current policy.
Defaults to an empty dictionary if not specified.", | 8 "test_policy": "A policy dictionary that should make the preferences affecte
d by this policy become policy-controlled. Usually just sets the current policy.
Defaults to an empty dictionary if not specified.", |
| 9 "note": "If the policy affects any preferences, the following array should b
e specified with one entry per such preference.", | 9 "note": "If the policy affects any preferences, the following array should b
e specified with one entry per such preference.", |
| 10 "pref_mappings": [ | 10 "pref_mappings": [ |
| (...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 197 { "pref": "history.deleting_enabled" } | 197 { "pref": "history.deleting_enabled" } |
| 198 ] | 198 ] |
| 199 }, | 199 }, |
| 200 | 200 |
| 201 "RemoteAccessClientFirewallTraversal": { | 201 "RemoteAccessClientFirewallTraversal": { |
| 202 }, | 202 }, |
| 203 | 203 |
| 204 "RemoteAccessHostFirewallTraversal": { | 204 "RemoteAccessHostFirewallTraversal": { |
| 205 "os": [], | 205 "os": [], |
| 206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, | 206 "test_policy": { "RemoteAccessHostFirewallTraversal": true }, |
| 207 "pref_mappings": [ | |
| 208 { "pref": "remote_access.host_firewall_traversal" } | |
| 209 ], | |
| 210 | 207 |
| 211 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." | 208 "note": "TODO(frankf): Enable on all OS after crbug.com/121066 is fixed." |
| 212 }, | 209 }, |
| 213 | 210 |
| 214 "RemoteAccessHostRequireTwoFactor": { | 211 "RemoteAccessHostRequireTwoFactor": { |
| 215 "os": [], | 212 "os": [], |
| 216 "test_policy": { "RemoteAccessHostRequireTwoFactor": false }, | 213 "test_policy": { "RemoteAccessHostRequireTwoFactor": false } |
| 217 "pref_mappings": [ | |
| 218 { "pref": "remote_access.host_require_two_factor" } | |
| 219 ] | |
| 220 }, | 214 }, |
| 221 | 215 |
| 222 "RemoteAccessHostDomain": { | 216 "RemoteAccessHostDomain": { |
| 223 "os": [], | 217 "os": [], |
| 224 "test_policy": { "RemoteAccessHostDomain": "" }, | 218 "test_policy": { "RemoteAccessHostDomain": "" } |
| 225 "pref_mappings": [ | |
| 226 { "pref": "remote_access.host_domain" } | |
| 227 ] | |
| 228 }, | 219 }, |
| 229 | 220 |
| 230 "RemoteAccessHostTalkGadgetPrefix": { | 221 "RemoteAccessHostTalkGadgetPrefix": { |
| 231 "os": [], | 222 "os": [], |
| 232 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" }, | 223 "test_policy": { "RemoteAccessHostTalkGadgetPrefix": "chromoting-host" } |
| 233 "pref_mappings": [ | |
| 234 { "pref": "remote_access.host_talkgadget_prefix" } | |
| 235 ] | |
| 236 }, | 224 }, |
| 237 | 225 |
| 238 "RemoteAccessHostRequireCurtain": { | 226 "RemoteAccessHostRequireCurtain": { |
| 239 "os": [], | 227 "os": [], |
| 240 "test_policy": { "RemoteAccessHostRequireCurtain": false }, | 228 "test_policy": { "RemoteAccessHostRequireCurtain": false } |
| 241 "pref_mappings": [ | |
| 242 { "pref": "remote_access.host_require_curtain" } | |
| 243 ] | |
| 244 }, | 229 }, |
| 245 | 230 |
| 246 "RemoteAccessHostAllowClientPairing": { | 231 "RemoteAccessHostAllowClientPairing": { |
| 247 "os": [], | 232 "os": [], |
| 248 "test_policy": { "RemoteAccessHostAllowClientPairing": true }, | 233 "test_policy": { "RemoteAccessHostAllowClientPairing": true } |
| 249 "pref_mappings": [ | |
| 250 { "pref": "remote_access.host_allow_client_pairing" } | |
| 251 ] | |
| 252 }, | 234 }, |
| 253 | 235 |
| 254 "RemoteAccessHostAllowGnubbyAuth": { | 236 "RemoteAccessHostAllowGnubbyAuth": { |
| 255 "os": [], | 237 "os": [], |
| 256 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true }, | 238 "test_policy": { "RemoteAccessHostAllowGnubbyAuth": true } |
| 257 "pref_mappings": [ | |
| 258 { "pref": "remote_access.host_allow_gnubby_auth" } | |
| 259 ] | |
| 260 }, | 239 }, |
| 261 | 240 |
| 262 "RemoteAccessHostAllowRelayedConnection": { | 241 "RemoteAccessHostAllowRelayedConnection": { |
| 263 "os": [], | 242 "os": [], |
| 264 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true }, | 243 "test_policy": { "RemoteAccessHostAllowRelayedConnection": true } |
| 265 "pref_mappings": [ | |
| 266 { "pref": "remote_access.host_allow_relayed_connection" } | |
| 267 ] | |
| 268 }, | 244 }, |
| 269 | 245 |
| 270 "RemoteAccessHostUdpPortRange": { | 246 "RemoteAccessHostUdpPortRange": { |
| 271 "os": [], | 247 "os": [], |
| 272 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" }, | 248 "test_policy": { "RemoteAccessHostUdpPortRange": "12400-12409" } |
| 273 "pref_mappings": [ | 249 }, |
| 274 { "pref": "remote_access.host_udp_port_range" } | 250 |
| 275 ] | 251 "RemoteAccessHostMatchUsername": { |
| 252 "os": [], |
| 253 "test_policy": { "RemoteAccessHostMatchUsername": true } |
| 254 }, |
| 255 |
| 256 "RemoteAccessHostTokenUrl": { |
| 257 "os": [], |
| 258 "test_policy": { "RemoteAccessHostTokenUrl": "https://example.com/issue" } |
| 259 }, |
| 260 |
| 261 "RemoteAccessHostTokenValidationUrl": { |
| 262 "os": [], |
| 263 "test_policy": { "RemoteAccessHostTokenValidationUrl": "https://example.com/
validate" } |
| 264 }, |
| 265 |
| 266 "RemoteAccessHostTokenValidationCertificateIssuer": { |
| 267 "os": [], |
| 268 "test_policy": { "RemoteAccessHostTokenValidationCertificateIssuer": "Exampl
e Certificate Authority" } |
| 269 }, |
| 270 |
| 271 "RemoteAccessHostDebugOverridePolicies": { |
| 272 "os": [], |
| 273 "test_policy": { "RemoteAccessHostDebugOverridePolicies": "{ \"RemoteAccessH
ostMatchUsername\": true }" } |
| 276 }, | 274 }, |
| 277 | 275 |
| 278 "PrintingEnabled": { | 276 "PrintingEnabled": { |
| 279 "os": ["win", "linux", "mac", "chromeos"], | 277 "os": ["win", "linux", "mac", "chromeos"], |
| 280 "test_policy": { "PrintingEnabled": false }, | 278 "test_policy": { "PrintingEnabled": false }, |
| 281 "pref_mappings": [ | 279 "pref_mappings": [ |
| 282 { "pref": "printing.enabled" } | 280 { "pref": "printing.enabled" } |
| 283 ] | 281 ] |
| 284 }, | 282 }, |
| 285 | 283 |
| (...skipping 2166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2452 | 2450 |
| 2453 "AdditionalLaunchParameters": { | 2451 "AdditionalLaunchParameters": { |
| 2454 }, | 2452 }, |
| 2455 | 2453 |
| 2456 "SuppressChromeFrameTurndownPrompt": { | 2454 "SuppressChromeFrameTurndownPrompt": { |
| 2457 }, | 2455 }, |
| 2458 | 2456 |
| 2459 "SkipMetadataCheck": { | 2457 "SkipMetadataCheck": { |
| 2460 } | 2458 } |
| 2461 } | 2459 } |
| OLD | NEW |