| Index: remoting/host/policy_hack/policy_watcher.cc | 
| diff --git a/remoting/host/policy_hack/policy_watcher.cc b/remoting/host/policy_hack/policy_watcher.cc | 
| index d0f59572c31ed2480d409bea355a8b5e68d89515..8cf2654e44641926b63124298cea04ed40f4d334 100644 | 
| --- a/remoting/host/policy_hack/policy_watcher.cc | 
| +++ b/remoting/host/policy_hack/policy_watcher.cc | 
| @@ -14,6 +14,7 @@ | 
| #include "base/single_thread_task_runner.h" | 
| #include "base/time/time.h" | 
| #include "base/values.h" | 
| +#include "policy/policy_constants.h" | 
| #include "remoting/host/dns_blackhole_checker.h" | 
|  | 
| #if !defined(NDEBUG) | 
| @@ -58,7 +59,7 @@ scoped_ptr<base::DictionaryValue> CopyGoodValuesAndAddDefaults( | 
| #if !defined(NDEBUG) | 
| // Replace values with those specified in DebugOverridePolicies, if present. | 
| std::string policy_overrides; | 
| -  if (from->GetString(PolicyWatcher::kHostDebugOverridePoliciesName, | 
| +  if (from->GetString(policy::key::kRemoteAccessHostDebugOverridePolicies, | 
| &policy_overrides)) { | 
| scoped_ptr<base::Value> value(base::JSONReader::Read(policy_overrides)); | 
| const base::DictionaryValue* override_values; | 
| @@ -73,48 +74,6 @@ scoped_ptr<base::DictionaryValue> CopyGoodValuesAndAddDefaults( | 
|  | 
| }  // namespace | 
|  | 
| -const char PolicyWatcher::kNatPolicyName[] = | 
| -    "RemoteAccessHostFirewallTraversal"; | 
| - | 
| -const char PolicyWatcher::kHostRequireTwoFactorPolicyName[] = | 
| -    "RemoteAccessHostRequireTwoFactor"; | 
| - | 
| -const char PolicyWatcher::kHostDomainPolicyName[] = | 
| -    "RemoteAccessHostDomain"; | 
| - | 
| -const char PolicyWatcher::kHostMatchUsernamePolicyName[] = | 
| -    "RemoteAccessHostMatchUsername"; | 
| - | 
| -const char PolicyWatcher::kHostTalkGadgetPrefixPolicyName[] = | 
| -    "RemoteAccessHostTalkGadgetPrefix"; | 
| - | 
| -const char PolicyWatcher::kHostRequireCurtainPolicyName[] = | 
| -    "RemoteAccessHostRequireCurtain"; | 
| - | 
| -const char PolicyWatcher::kHostTokenUrlPolicyName[] = | 
| -    "RemoteAccessHostTokenUrl"; | 
| - | 
| -const char PolicyWatcher::kHostTokenValidationUrlPolicyName[] = | 
| -    "RemoteAccessHostTokenValidationUrl"; | 
| - | 
| -const char PolicyWatcher::kHostTokenValidationCertIssuerPolicyName[] = | 
| -    "RemoteAccessHostTokenValidationCertificateIssuer"; | 
| - | 
| -const char PolicyWatcher::kHostAllowClientPairing[] = | 
| -    "RemoteAccessHostAllowClientPairing"; | 
| - | 
| -const char PolicyWatcher::kHostAllowGnubbyAuthPolicyName[] = | 
| -    "RemoteAccessHostAllowGnubbyAuth"; | 
| - | 
| -const char PolicyWatcher::kRelayPolicyName[] = | 
| -    "RemoteAccessHostAllowRelayedConnection"; | 
| - | 
| -const char PolicyWatcher::kUdpPortRangePolicyName[] = | 
| -    "RemoteAccessHostUdpPortRange"; | 
| - | 
| -const char PolicyWatcher::kHostDebugOverridePoliciesName[] = | 
| -    "RemoteAccessHostDebugOverridePolicies"; | 
| - | 
| PolicyWatcher::PolicyWatcher( | 
| scoped_refptr<base::SingleThreadTaskRunner> task_runner) | 
| : task_runner_(task_runner), | 
| @@ -123,30 +82,44 @@ PolicyWatcher::PolicyWatcher( | 
| default_values_(new base::DictionaryValue()), | 
| weak_factory_(this) { | 
| // Initialize the default values for each policy. | 
| -  default_values_->SetBoolean(kNatPolicyName, true); | 
| -  default_values_->SetBoolean(kHostRequireTwoFactorPolicyName, false); | 
| -  default_values_->SetBoolean(kHostRequireCurtainPolicyName, false); | 
| -  default_values_->SetBoolean(kHostMatchUsernamePolicyName, false); | 
| -  default_values_->SetString(kHostDomainPolicyName, std::string()); | 
| -  default_values_->SetString(kHostTalkGadgetPrefixPolicyName, | 
| -                               kDefaultHostTalkGadgetPrefix); | 
| -  default_values_->SetString(kHostTokenUrlPolicyName, std::string()); | 
| -  default_values_->SetString(kHostTokenValidationUrlPolicyName, std::string()); | 
| -  default_values_->SetString(kHostTokenValidationCertIssuerPolicyName, | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostFirewallTraversal, | 
| +                              true); | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostRequireTwoFactor, | 
| +                              false); | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostRequireCurtain, | 
| +                              false); | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostMatchUsername, | 
| +                              false); | 
| +  default_values_->SetString(policy::key::kRemoteAccessHostDomain, | 
| +                             std::string()); | 
| +  default_values_->SetString(policy::key::kRemoteAccessHostTalkGadgetPrefix, | 
| +                             kDefaultHostTalkGadgetPrefix); | 
| +  default_values_->SetString(policy::key::kRemoteAccessHostTokenUrl, | 
| +                             std::string()); | 
| +  default_values_->SetString(policy::key::kRemoteAccessHostTokenValidationUrl, | 
| std::string()); | 
| -  default_values_->SetBoolean(kHostAllowClientPairing, true); | 
| -  default_values_->SetBoolean(kHostAllowGnubbyAuthPolicyName, true); | 
| -  default_values_->SetBoolean(kRelayPolicyName, true); | 
| -  default_values_->SetString(kUdpPortRangePolicyName, ""); | 
| +  default_values_->SetString( | 
| +      policy::key::kRemoteAccessHostTokenValidationCertificateIssuer, | 
| +      std::string()); | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostAllowClientPairing, | 
| +                              true); | 
| +  default_values_->SetBoolean(policy::key::kRemoteAccessHostAllowGnubbyAuth, | 
| +                              true); | 
| +  default_values_->SetBoolean( | 
| +      policy::key::kRemoteAccessHostAllowRelayedConnection, true); | 
| +  default_values_->SetString(policy::key::kRemoteAccessHostUdpPortRange, ""); | 
| #if !defined(NDEBUG) | 
| -  default_values_->SetString(kHostDebugOverridePoliciesName, std::string()); | 
| +  default_values_->SetString( | 
| +      policy::key::kRemoteAccessHostDebugOverridePolicies, std::string()); | 
| #endif | 
|  | 
| // Initialize the fall-back values to use for unreadable policies. | 
| // For most policies these match the defaults. | 
| bad_type_values_.reset(default_values_->DeepCopy()); | 
| -  bad_type_values_->SetBoolean(kNatPolicyName, false); | 
| -  bad_type_values_->SetBoolean(kRelayPolicyName, false); | 
| +  bad_type_values_->SetBoolean(policy::key::kRemoteAccessHostFirewallTraversal, | 
| +                               false); | 
| +  bad_type_values_->SetBoolean( | 
| +      policy::key::kRemoteAccessHostAllowRelayedConnection, false); | 
| } | 
|  | 
| PolicyWatcher::~PolicyWatcher() { | 
|  |