|
7 | 7 | Chrome Galvanizer
|
8 | 8 | </h1>
|
9 | 9 | <i>Harden your Chrome browser via enterprise policy.</i>
|
| 10 | + <br /> |
| 11 | + <div style="font-size: 32px; margin-bottom: -15px"> |
| 12 | + <a href="https://twitter.com/IAmMandatory" target="_blank"> |
| 13 | + <font-awesome-icon :icon="['fab', 'twitter']" class="icon alt mr-1 ml-1" /> |
| 14 | + </a> |
| 15 | + <a href="https://github.com/mandatoryprogrammer/ChromeGalvanizer" target="_blank"> |
| 16 | + <font-awesome-icon :icon="['fab', 'github']" class="icon alt mr-1 ml-1" /> |
| 17 | + </a> |
| 18 | + </div> |
10 | 19 | </template>
|
11 | 20 | <b-card-body>
|
12 | 21 | <b-input-group prepend="Policy Type to Add" class="mb-2 mr-sm-2 mb-sm-0">
|
|
28 | 37 | </b-form-invalid-feedback>
|
29 | 38 | </b-input-group>
|
30 | 39 | <b-alert show class="mt-1 mb-2">
|
31 |
| - <font-awesome-icon :icon="['fas', 'info-circle']" class="icon alt" /> <i>Multiple extension IDs should be comma-separated. To disable a permission for all extensions, just enter <code>*</code> above.</i> |
| 40 | + <font-awesome-icon :icon="['fas', 'info-circle']" class="icon alt" /> <i>Multiple extension IDs should be comma-separated. To disable access to a URL for all extensions, just enter <code>*</code> above.</i> |
32 | 41 | </b-alert>
|
33 | 42 | <b-input-group prepend="URL Pattern to Block" class="mb-2 mr-sm-2 mb-sm-0">
|
34 | 43 | <b-input id="runtime_blocked_hosts_url_pattern_input" class="mb-2 mr-sm-2 mb-sm-0" placeholder="*://mail.google.com" v-model="policy_settings.runtime_blocked_hosts.url_pattern" :state="runtime_blocked_hosts_url_pattern_valid"></b-input>
|
@@ -88,18 +97,15 @@ export default {
|
88 | 97 | name: 'HelloWorld',
|
89 | 98 | props: {},
|
90 | 99 | data() {
|
91 |
| - // Make debugging suck less |
92 |
| - window.app = this; |
93 |
| -
|
94 | 100 | return {
|
95 | 101 | policy_settings: {
|
96 | 102 | runtime_blocked_hosts: {
|
97 | 103 | extension_id: '',
|
98 | 104 | url_pattern: '',
|
99 |
| - } |
| 105 | + }, |
100 | 106 | },
|
101 | 107 | policy_rules: [],
|
102 |
| - policy_type_selected: 'runtime_blocked_hosts', |
| 108 | + policy_type_selected: 'null', |
103 | 109 | policy_type_options_select: [{
|
104 | 110 | value: null,
|
105 | 111 | text: '-- Please select a policy type to add --'
|
@@ -329,9 +335,6 @@ function add_runtime_blocked_hosts_to_xml_from_policy_list(policy_xml_doc, polic
|
329 | 335 | policy_rules
|
330 | 336 | );
|
331 | 337 |
|
332 |
| - console.log(`Policy object: `); |
333 |
| - console.log(policy_object); |
334 |
| -
|
335 | 338 | // Iterate through policy_object and add appropriate elements
|
336 | 339 | Object.keys(policy_object).map(extension_id => {
|
337 | 340 | // First append <key> element
|
|
0 commit comments