Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(103)

Side by Side Diff: remoting/host/policy_watcher.cc

Issue 2252243002: Adding a policy for using the uiAccess enabled It2Me binary on Windows (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Merging with ToT Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Most of this code is copied from: 5 // Most of this code is copied from:
6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} 6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc}
7 7
8 #include "remoting/host/policy_watcher.h" 8 #include "remoting/host/policy_watcher.h"
9 9
10 #include <utility> 10 #include <utility>
(...skipping 177 matching lines...) Expand 10 before | Expand all | Expand 10 after
188 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); 188 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string());
189 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, 189 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl,
190 std::string()); 190 std::string());
191 default_values_->SetString( 191 default_values_->SetString(
192 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); 192 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string());
193 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); 193 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true);
194 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); 194 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true);
195 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, 195 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection,
196 true); 196 true);
197 default_values_->SetString(key::kRemoteAccessHostUdpPortRange, ""); 197 default_values_->SetString(key::kRemoteAccessHostUdpPortRange, "");
198 default_values_->SetBoolean(
199 key::kRemoteAccessHostAllowUiAccessForRemoteAssistance, false);
198 } 200 }
199 201
200 PolicyWatcher::~PolicyWatcher() { 202 PolicyWatcher::~PolicyWatcher() {
201 // Stop observing |policy_service_| if StartWatching() has been called. 203 // Stop observing |policy_service_| if StartWatching() has been called.
202 if (!policy_updated_callback_.is_null()) { 204 if (!policy_updated_callback_.is_null()) {
203 policy_service_->RemoveObserver(policy::POLICY_DOMAIN_CHROME, this); 205 policy_service_->RemoveObserver(policy::POLICY_DOMAIN_CHROME, this);
204 } 206 }
205 207
206 if (owned_policy_provider_) { 208 if (owned_policy_provider_) {
207 owned_policy_provider_->Shutdown(); 209 owned_policy_provider_->Shutdown();
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after
382 CreateSchemaRegistry())); 384 CreateSchemaRegistry()));
383 #else 385 #else
384 #error OS that is not yet supported by PolicyWatcher code. 386 #error OS that is not yet supported by PolicyWatcher code.
385 #endif 387 #endif
386 388
387 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); 389 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader));
388 #endif // !(OS_CHROMEOS) 390 #endif // !(OS_CHROMEOS)
389 } 391 }
390 392
391 } // namespace remoting 393 } // namespace remoting
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698