OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Most of this code is copied from: | 5 // Most of this code is copied from: |
6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} | 6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} |
7 | 7 |
8 #include "remoting/host/policy_watcher.h" | 8 #include "remoting/host/policy_watcher.h" |
9 | 9 |
10 #include <utility> | 10 #include <utility> |
(...skipping 161 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
172 owned_schema_registry_(std::move(owned_schema_registry)), | 172 owned_schema_registry_(std::move(owned_schema_registry)), |
173 owned_policy_provider_(std::move(owned_policy_provider)), | 173 owned_policy_provider_(std::move(owned_policy_provider)), |
174 owned_policy_service_(std::move(owned_policy_service)) { | 174 owned_policy_service_(std::move(owned_policy_service)) { |
175 DCHECK(policy_service_); | 175 DCHECK(policy_service_); |
176 DCHECK(owned_schema_registry_); | 176 DCHECK(owned_schema_registry_); |
177 | 177 |
178 // Initialize the default values for each policy. | 178 // Initialize the default values for each policy. |
179 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); | 179 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); |
180 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false); | 180 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false); |
181 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false); | 181 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false); |
| 182 default_values_->SetString(key::kRemoteAccessHostClientDomain, std::string()); |
182 default_values_->SetString(key::kRemoteAccessHostDomain, std::string()); | 183 default_values_->SetString(key::kRemoteAccessHostDomain, std::string()); |
183 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix, | 184 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix, |
184 kDefaultHostTalkGadgetPrefix); | 185 kDefaultHostTalkGadgetPrefix); |
185 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); | 186 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); |
186 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, | 187 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, |
187 std::string()); | 188 std::string()); |
188 default_values_->SetString( | 189 default_values_->SetString( |
189 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); | 190 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); |
190 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); | 191 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); |
191 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); | 192 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); |
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
370 policy::POLICY_SCOPE_MACHINE)); | 371 policy::POLICY_SCOPE_MACHINE)); |
371 #else | 372 #else |
372 #error OS that is not yet supported by PolicyWatcher code. | 373 #error OS that is not yet supported by PolicyWatcher code. |
373 #endif | 374 #endif |
374 | 375 |
375 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); | 376 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); |
376 #endif // !(OS_CHROMEOS) | 377 #endif // !(OS_CHROMEOS) |
377 } | 378 } |
378 | 379 |
379 } // namespace remoting | 380 } // namespace remoting |
OLD | NEW |