Commit e7f340e5 authored by Daniel Vogelheim's avatar Daniel Vogelheim Committed by Commit Bot

Clarify doc string for UnsafelyTreatInsecureOriginAsSecure policy.

Bug: 
Change-Id: I8cae31aaf14516949aa812f2fd65db7503bfeeb2
Reviewed-on: https://chromium-review.googlesource.com/823963
Commit-Queue: Daniel Vogelheim <vogelheim@chromium.org>
Reviewed-by: default avatarDrew Wilson <atwilson@chromium.org>
Cr-Commit-Position: refs/heads/master@{#524136}
parent 67d99280
...@@ -10714,12 +10714,10 @@ ...@@ -10714,12 +10714,10 @@
'caption': '''Origins to be treated as secure context.''', 'caption': '''Origins to be treated as secure context.''',
'tags': ['system-security'], 'tags': ['system-security'],
'desc': ''' 'desc': '''
The policy specifies a list of origins (URLs) to be treated as secure The policy specifies a list of origins (URLs) to be treated as secure context. The intent is to allow organizations to set up a staging server for internal web development, so that their developers can test out features requiring secure contexts without having to deploy TLS on the staging server.
context. The intent is to allow organizations to set up a staging server Setting a list of URLs in this policy has the same effect as setting the command-line flag '--unsafely-treat-insecure-origin-as-secure' to a comma-separated list of the same URLs. If the policy is set, it will override the command-line flag.
for internal web developments. For more information on secure contexts, see https://www.w3.org/TR/secure-contexts/
This is the same as the --unsafely-treat-insecure-origin-as-secure flag. '''
For more information on secure contexts, see https://www.w3.org/TR/secure-contexts/
'''
}, },
{ {
'name': 'DefaultDownloadDirectory', 'name': 'DefaultDownloadDirectory',
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment