Chromium Code Reviews| Index: remoting/host/policy_hack/policy_watcher.cc |
| diff --git a/remoting/host/policy_hack/policy_watcher.cc b/remoting/host/policy_hack/policy_watcher.cc |
| index fd1a37b07b7926894deefdac15139f915f949ec5..3855500941bb100c683b3651a95bc3c490c174bc 100644 |
| --- a/remoting/host/policy_hack/policy_watcher.cc |
| +++ b/remoting/host/policy_hack/policy_watcher.cc |
| @@ -77,6 +77,12 @@ scoped_ptr<base::DictionaryValue> CopyGoodValuesAndAddDefaults( |
| const char PolicyWatcher::kNatPolicyName[] = |
| "RemoteAccessHostFirewallTraversal"; |
| +const char PolicyWatcher::kRelayPolicyName[] = |
|
Sergey Ulanov
2014/03/24 23:37:12
The new policies also need to be added in chrome/a
dcaiafa
2014/03/26 15:29:16
Done.
|
| + "RemoteAccessHostAllowRelayedConnection"; |
| + |
| +const char PolicyWatcher::kUdpPortRangePolicyName[] = |
| + "RemoteAccessHostUdpPortRange"; |
| + |
| const char PolicyWatcher::kHostRequireTwoFactorPolicyName[] = |
| "RemoteAccessHostRequireTwoFactor"; |
| @@ -118,6 +124,8 @@ PolicyWatcher::PolicyWatcher( |
| weak_factory_(this) { |
| // Initialize the default values for each policy. |
| default_values_->SetBoolean(kNatPolicyName, true); |
| + default_values_->SetBoolean(kRelayPolicyName, true); |
| + default_values_->SetString(kUdpPortRangePolicyName, ""); |
| default_values_->SetBoolean(kHostRequireTwoFactorPolicyName, false); |
| default_values_->SetBoolean(kHostRequireCurtainPolicyName, false); |
| default_values_->SetBoolean(kHostMatchUsernamePolicyName, false); |
| @@ -138,6 +146,7 @@ PolicyWatcher::PolicyWatcher( |
| // For most policies these match the defaults. |
| bad_type_values_.reset(default_values_->DeepCopy()); |
| bad_type_values_->SetBoolean(kNatPolicyName, false); |
| + bad_type_values_->SetBoolean(kRelayPolicyName, false); |
| } |
| PolicyWatcher::~PolicyWatcher() { |