Index: trunk/src/remoting/host/remoting_me2me_host.cc |
=================================================================== |
--- trunk/src/remoting/host/remoting_me2me_host.cc (revision 267240) |
+++ trunk/src/remoting/host/remoting_me2me_host.cc (working copy) |
@@ -36,7 +36,6 @@ |
#include "remoting/base/constants.h" |
#include "remoting/base/logging.h" |
#include "remoting/base/rsa_key_pair.h" |
-#include "remoting/base/util.h" |
#include "remoting/host/branding.h" |
#include "remoting/host/chromoting_host.h" |
#include "remoting/host/chromoting_host_context.h" |
@@ -228,8 +227,6 @@ |
bool OnUsernamePolicyUpdate(bool curtain_required, |
bool username_match_required); |
bool OnNatPolicyUpdate(bool nat_traversal_enabled); |
- bool OnRelayPolicyUpdate(bool allow_relay); |
- bool OnUdpPortPolicyUpdate(const std::string& udp_port_range); |
void OnCurtainPolicyUpdate(bool curtain_required); |
bool OnHostTalkGadgetPrefixPolicyUpdate(const std::string& talkgadget_prefix); |
bool OnHostTokenUrlPolicyUpdate( |
@@ -290,9 +287,6 @@ |
bool use_service_account_; |
scoped_ptr<policy_hack::PolicyWatcher> policy_watcher_; |
bool allow_nat_traversal_; |
- bool allow_relay_; |
- int min_udp_port_; |
- int max_udp_port_; |
std::string talkgadget_prefix_; |
bool allow_pairing_; |
@@ -330,9 +324,6 @@ |
state_(HOST_INITIALIZING), |
use_service_account_(false), |
allow_nat_traversal_(true), |
- allow_relay_(true), |
- min_udp_port_(0), |
- max_udp_port_(0), |
allow_pairing_(true), |
curtain_required_(false), |
enable_gnubby_auth_(false), |
@@ -845,16 +836,6 @@ |
&bool_value)) { |
restart_required |= OnNatPolicyUpdate(bool_value); |
} |
- if (policies->GetBoolean(policy_hack::PolicyWatcher::kRelayPolicyName, |
- &bool_value)) { |
- restart_required |= OnRelayPolicyUpdate(bool_value); |
- } |
- std::string udp_port_range; |
- if (policies->GetString(policy_hack::PolicyWatcher::kUdpPortRangePolicyName, |
- &udp_port_range)) { |
- restart_required |= OnUdpPortPolicyUpdate(udp_port_range); |
- } |
- |
if (policies->GetString( |
policy_hack::PolicyWatcher::kHostTalkGadgetPrefixPolicyName, |
&string_value)) { |
@@ -961,49 +942,6 @@ |
return false; |
} |
-bool HostProcess::OnRelayPolicyUpdate(bool allow_relay) { |
- // Returns true if the host has to be restarted after this policy update. |
- DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); |
- |
- if (allow_relay_ != allow_relay) { |
- if (allow_relay) |
- HOST_LOG << "Policy enables use of relay server."; |
- else |
- HOST_LOG << "Policy disables use of relay server."; |
- allow_relay_ = allow_relay; |
- return true; |
- } |
- return false; |
-} |
- |
-bool HostProcess::OnUdpPortPolicyUpdate(const std::string& udp_port_range) { |
- // Returns true if the host has to be restarted after this policy update. |
- DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); |
- |
- // Use default values if policy setting is empty or invalid. |
- int min_udp_port = 0; |
- int max_udp_port = 0; |
- if (!udp_port_range.empty() && |
- !NetworkSettings::ParsePortRange(udp_port_range, &min_udp_port, |
- &max_udp_port)) { |
- LOG(WARNING) << "Invalid port range policy: \"" << udp_port_range |
- << "\". Using default values."; |
- } |
- |
- if (min_udp_port_ != min_udp_port || max_udp_port_ != max_udp_port) { |
- if (min_udp_port != 0 && max_udp_port != 0) { |
- HOST_LOG << "Policy restricts UDP port range to [" << min_udp_port |
- << ", " << max_udp_port << "]"; |
- } else { |
- HOST_LOG << "Policy does not restrict UDP port range."; |
- } |
- min_udp_port_ = min_udp_port; |
- max_udp_port_ = max_udp_port; |
- return true; |
- } |
- return false; |
-} |
- |
void HostProcess::OnCurtainPolicyUpdate(bool curtain_required) { |
// Returns true if the host has to be restarted after this policy update. |
DCHECK(context_->network_task_runner()->BelongsToCurrentThread()); |
@@ -1149,24 +1087,11 @@ |
signaling_connector_->EnableOAuth(oauth_token_getter_.get()); |
} |
- uint32 network_flags = allow_nat_traversal_ ? |
- NetworkSettings::NAT_TRAVERSAL_STUN : 0; |
- |
- if (allow_relay_) |
- network_flags |= NetworkSettings::NAT_TRAVERSAL_RELAY; |
- |
- if (allow_relay_ || allow_nat_traversal_) |
- network_flags |= NetworkSettings::NAT_TRAVERSAL_OUTGOING; |
- |
- NetworkSettings network_settings(network_flags); |
- |
- if (min_udp_port_ && max_udp_port_) { |
- network_settings.min_port = min_udp_port_; |
- network_settings.max_port = max_udp_port_; |
- } else if (!allow_nat_traversal_) { |
- // For legacy reasons we have to restrict the port range to a set of default |
- // values when nat traversal is disabled, even if the port range was not |
- // set in policy. |
+ NetworkSettings network_settings( |
+ allow_nat_traversal_ ? |
+ NetworkSettings::NAT_TRAVERSAL_ENABLED : |
+ NetworkSettings::NAT_TRAVERSAL_DISABLED); |
+ if (!allow_nat_traversal_) { |
network_settings.min_port = NetworkSettings::kDefaultMinPort; |
network_settings.max_port = NetworkSettings::kDefaultMaxPort; |
} |