Index: remoting/host/policy_hack/policy_watcher.cc |
diff --git a/remoting/host/policy_hack/policy_watcher.cc b/remoting/host/policy_hack/policy_watcher.cc |
index fd1a37b07b7926894deefdac15139f915f949ec5..e603cf5032459caaea20f88d40671df5d4aaa0cc 100644 |
--- a/remoting/host/policy_hack/policy_watcher.cc |
+++ b/remoting/host/policy_hack/policy_watcher.cc |
@@ -107,6 +107,12 @@ const char PolicyWatcher::kHostAllowClientPairing[] = |
const char PolicyWatcher::kHostAllowGnubbyAuthPolicyName[] = |
"RemoteAccessHostAllowGnubbyAuth"; |
+const char PolicyWatcher::kRelayPolicyName[] = |
+ "RemoteAccessHostAllowRelayedConnection"; |
+ |
+const char PolicyWatcher::kUdpPortRangePolicyName[] = |
+ "RemoteAccessHostUdpPortRange"; |
+ |
const char PolicyWatcher::kHostDebugOverridePoliciesName[] = |
"RemoteAccessHostDebugOverridePolicies"; |
@@ -130,6 +136,8 @@ PolicyWatcher::PolicyWatcher( |
std::string()); |
default_values_->SetBoolean(kHostAllowClientPairing, true); |
default_values_->SetBoolean(kHostAllowGnubbyAuthPolicyName, true); |
+ default_values_->SetBoolean(kRelayPolicyName, true); |
+ default_values_->SetString(kUdpPortRangePolicyName, ""); |
#if !defined(NDEBUG) |
default_values_->SetString(kHostDebugOverridePoliciesName, std::string()); |
#endif |
@@ -138,6 +146,7 @@ PolicyWatcher::PolicyWatcher( |
// For most policies these match the defaults. |
bad_type_values_.reset(default_values_->DeepCopy()); |
bad_type_values_->SetBoolean(kNatPolicyName, false); |
+ bad_type_values_->SetBoolean(kRelayPolicyName, false); |
} |
PolicyWatcher::~PolicyWatcher() { |