| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 5 #ifndef REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
| 6 #define REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 6 #define REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
| 7 | 7 |
| 8 #include "base/callback.h" | 8 #include "base/callback.h" |
| 9 #include "base/memory/weak_ptr.h" | 9 #include "base/memory/weak_ptr.h" |
| 10 #include "base/values.h" | 10 #include "base/values.h" |
| (...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 42 virtual void StopWatching(base::WaitableEvent* done); | 42 virtual void StopWatching(base::WaitableEvent* done); |
| 43 | 43 |
| 44 // Implemented by each platform. This message loop should be an IO message | 44 // Implemented by each platform. This message loop should be an IO message |
| 45 // loop. | 45 // loop. |
| 46 static PolicyWatcher* Create( | 46 static PolicyWatcher* Create( |
| 47 scoped_refptr<base::SingleThreadTaskRunner> task_runner); | 47 scoped_refptr<base::SingleThreadTaskRunner> task_runner); |
| 48 | 48 |
| 49 // The name of the NAT traversal policy. | 49 // The name of the NAT traversal policy. |
| 50 static const char kNatPolicyName[]; | 50 static const char kNatPolicyName[]; |
| 51 | 51 |
| 52 // The name of the policy for allowing use of relay servers. |
| 53 static const char kRelayPolicyName[]; |
| 54 |
| 55 // The name of the policy that restricts the range of host UDP ports. |
| 56 static const char kUdpPortRangePolicyName[]; |
| 57 |
| 52 // The name of the policy for requiring 2-factor authentication. | 58 // The name of the policy for requiring 2-factor authentication. |
| 53 static const char kHostRequireTwoFactorPolicyName[]; | 59 static const char kHostRequireTwoFactorPolicyName[]; |
| 54 | 60 |
| 55 // The name of the host domain policy. | 61 // The name of the host domain policy. |
| 56 static const char kHostDomainPolicyName[]; | 62 static const char kHostDomainPolicyName[]; |
| 57 | 63 |
| 58 // The name of the username policy. This policy is ignored on Windows. | 64 // The name of the username policy. This policy is ignored on Windows. |
| 59 // This policy is currently considered 'internal only' and so is not | 65 // This policy is currently considered 'internal only' and so is not |
| 60 // documented in policy_templates.json. | 66 // documented in policy_templates.json. |
| 61 static const char kHostMatchUsernamePolicyName[]; | 67 static const char kHostMatchUsernamePolicyName[]; |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 110 scoped_ptr<base::DictionaryValue> bad_type_values_; | 116 scoped_ptr<base::DictionaryValue> bad_type_values_; |
| 111 | 117 |
| 112 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. | 118 // Allows us to cancel any inflight FileWatcher events or scheduled reloads. |
| 113 base::WeakPtrFactory<PolicyWatcher> weak_factory_; | 119 base::WeakPtrFactory<PolicyWatcher> weak_factory_; |
| 114 }; | 120 }; |
| 115 | 121 |
| 116 } // namespace policy_hack | 122 } // namespace policy_hack |
| 117 } // namespace remoting | 123 } // namespace remoting |
| 118 | 124 |
| 119 #endif // REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ | 125 #endif // REMOTING_HOST_POLICY_HACK_POLICY_WATCHER_H_ |
| OLD | NEW |