Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(920)

Side by Side Diff: remoting/host/policy_watcher.cc

Issue 1643793002: Add policy to restrict client domain for Me2Me. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix remoting_perftests compile. Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « remoting/host/it2me/it2me_host.cc ('k') | remoting/host/policy_watcher_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Most of this code is copied from: 5 // Most of this code is copied from:
6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} 6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc}
7 7
8 #include "remoting/host/policy_watcher.h" 8 #include "remoting/host/policy_watcher.h"
9 9
10 #include <utility> 10 #include <utility>
(...skipping 161 matching lines...) Expand 10 before | Expand all | Expand 10 after
172 owned_schema_registry_(std::move(owned_schema_registry)), 172 owned_schema_registry_(std::move(owned_schema_registry)),
173 owned_policy_provider_(std::move(owned_policy_provider)), 173 owned_policy_provider_(std::move(owned_policy_provider)),
174 owned_policy_service_(std::move(owned_policy_service)) { 174 owned_policy_service_(std::move(owned_policy_service)) {
175 DCHECK(policy_service_); 175 DCHECK(policy_service_);
176 DCHECK(owned_schema_registry_); 176 DCHECK(owned_schema_registry_);
177 177
178 // Initialize the default values for each policy. 178 // Initialize the default values for each policy.
179 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); 179 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true);
180 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false); 180 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false);
181 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false); 181 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false);
182 default_values_->SetString(key::kRemoteAccessHostClientDomain, std::string());
182 default_values_->SetString(key::kRemoteAccessHostDomain, std::string()); 183 default_values_->SetString(key::kRemoteAccessHostDomain, std::string());
183 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix, 184 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix,
184 kDefaultHostTalkGadgetPrefix); 185 kDefaultHostTalkGadgetPrefix);
185 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); 186 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string());
186 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, 187 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl,
187 std::string()); 188 std::string());
188 default_values_->SetString( 189 default_values_->SetString(
189 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); 190 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string());
190 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); 191 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true);
191 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); 192 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true);
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after
370 policy::POLICY_SCOPE_MACHINE)); 371 policy::POLICY_SCOPE_MACHINE));
371 #else 372 #else
372 #error OS that is not yet supported by PolicyWatcher code. 373 #error OS that is not yet supported by PolicyWatcher code.
373 #endif 374 #endif
374 375
375 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); 376 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader));
376 #endif // !(OS_CHROMEOS) 377 #endif // !(OS_CHROMEOS)
377 } 378 }
378 379
379 } // namespace remoting 380 } // namespace remoting
OLDNEW
« no previous file with comments | « remoting/host/it2me/it2me_host.cc ('k') | remoting/host/policy_watcher_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698