OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Most of this code is copied from: | 5 // Most of this code is copied from: |
6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} | 6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} |
7 | 7 |
8 #include "remoting/host/policy_watcher.h" | 8 #include "remoting/host/policy_watcher.h" |
9 | 9 |
10 #include <utility> | 10 #include <utility> |
(...skipping 177 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
188 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); | 188 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); |
189 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, | 189 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, |
190 std::string()); | 190 std::string()); |
191 default_values_->SetString( | 191 default_values_->SetString( |
192 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); | 192 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); |
193 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); | 193 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); |
194 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); | 194 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); |
195 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, | 195 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, |
196 true); | 196 true); |
197 default_values_->SetString(key::kRemoteAccessHostUdpPortRange, ""); | 197 default_values_->SetString(key::kRemoteAccessHostUdpPortRange, ""); |
| 198 default_values_->SetBoolean( |
| 199 key::kRemoteAccessHostAllowUiAccessForRemoteAssistance, false); |
198 } | 200 } |
199 | 201 |
200 PolicyWatcher::~PolicyWatcher() { | 202 PolicyWatcher::~PolicyWatcher() { |
201 // Stop observing |policy_service_| if StartWatching() has been called. | 203 // Stop observing |policy_service_| if StartWatching() has been called. |
202 if (!policy_updated_callback_.is_null()) { | 204 if (!policy_updated_callback_.is_null()) { |
203 policy_service_->RemoveObserver(policy::POLICY_DOMAIN_CHROME, this); | 205 policy_service_->RemoveObserver(policy::POLICY_DOMAIN_CHROME, this); |
204 } | 206 } |
205 | 207 |
206 if (owned_policy_provider_) { | 208 if (owned_policy_provider_) { |
207 owned_policy_provider_->Shutdown(); | 209 owned_policy_provider_->Shutdown(); |
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
382 CreateSchemaRegistry())); | 384 CreateSchemaRegistry())); |
383 #else | 385 #else |
384 #error OS that is not yet supported by PolicyWatcher code. | 386 #error OS that is not yet supported by PolicyWatcher code. |
385 #endif | 387 #endif |
386 | 388 |
387 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); | 389 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); |
388 #endif // !(OS_CHROMEOS) | 390 #endif // !(OS_CHROMEOS) |
389 } | 391 } |
390 | 392 |
391 } // namespace remoting | 393 } // namespace remoting |
OLD | NEW |