OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Most of this code is copied from: | 5 // Most of this code is copied from: |
6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} | 6 // src/chrome/browser/policy/asynchronous_policy_loader.{h,cc} |
7 | 7 |
8 #include "remoting/host/policy_watcher.h" | 8 #include "remoting/host/policy_watcher.h" |
9 | 9 |
10 #include <utility> | 10 #include <utility> |
(...skipping 164 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
175 owned_policy_provider_(std::move(owned_policy_provider)), | 175 owned_policy_provider_(std::move(owned_policy_provider)), |
176 owned_policy_service_(std::move(owned_policy_service)) { | 176 owned_policy_service_(std::move(owned_policy_service)) { |
177 DCHECK(policy_service_); | 177 DCHECK(policy_service_); |
178 DCHECK(owned_schema_registry_); | 178 DCHECK(owned_schema_registry_); |
179 | 179 |
180 // Initialize the default values for each policy. | 180 // Initialize the default values for each policy. |
181 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); | 181 default_values_->SetBoolean(key::kRemoteAccessHostFirewallTraversal, true); |
182 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false); | 182 default_values_->SetBoolean(key::kRemoteAccessHostRequireCurtain, false); |
183 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false); | 183 default_values_->SetBoolean(key::kRemoteAccessHostMatchUsername, false); |
184 default_values_->SetString(key::kRemoteAccessHostClientDomain, std::string()); | 184 default_values_->SetString(key::kRemoteAccessHostClientDomain, std::string()); |
| 185 default_values_->Set(key::kRemoteAccessHostClientDomainList, |
| 186 base::MakeUnique<base::ListValue>()); |
185 default_values_->SetString(key::kRemoteAccessHostDomain, std::string()); | 187 default_values_->SetString(key::kRemoteAccessHostDomain, std::string()); |
| 188 default_values_->Set(key::kRemoteAccessHostDomainList, |
| 189 base::MakeUnique<base::ListValue>()); |
186 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix, | 190 default_values_->SetString(key::kRemoteAccessHostTalkGadgetPrefix, |
187 kDefaultHostTalkGadgetPrefix); | 191 kDefaultHostTalkGadgetPrefix); |
188 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); | 192 default_values_->SetString(key::kRemoteAccessHostTokenUrl, std::string()); |
189 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, | 193 default_values_->SetString(key::kRemoteAccessHostTokenValidationUrl, |
190 std::string()); | 194 std::string()); |
191 default_values_->SetString( | 195 default_values_->SetString( |
192 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); | 196 key::kRemoteAccessHostTokenValidationCertificateIssuer, std::string()); |
193 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); | 197 default_values_->SetBoolean(key::kRemoteAccessHostAllowClientPairing, true); |
194 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); | 198 default_values_->SetBoolean(key::kRemoteAccessHostAllowGnubbyAuth, true); |
195 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, | 199 default_values_->SetBoolean(key::kRemoteAccessHostAllowRelayedConnection, |
(...skipping 188 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
384 CreateSchemaRegistry())); | 388 CreateSchemaRegistry())); |
385 #else | 389 #else |
386 #error OS that is not yet supported by PolicyWatcher code. | 390 #error OS that is not yet supported by PolicyWatcher code. |
387 #endif | 391 #endif |
388 | 392 |
389 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); | 393 return PolicyWatcher::CreateFromPolicyLoader(std::move(policy_loader)); |
390 #endif // !(OS_CHROMEOS) | 394 #endif // !(OS_CHROMEOS) |
391 } | 395 } |
392 | 396 |
393 } // namespace remoting | 397 } // namespace remoting |
OLD | NEW |