| Index: remoting/host/policy_hack/policy_watcher_unittest.cc | 
| diff --git a/remoting/host/policy_hack/policy_watcher_unittest.cc b/remoting/host/policy_hack/policy_watcher_unittest.cc | 
| index cb9415485e8bc961f1d9678cfa0f2d9cbaa65a09..0d6c88296955106012a8ff7345bebb928d6336d7 100644 | 
| --- a/remoting/host/policy_hack/policy_watcher_unittest.cc | 
| +++ b/remoting/host/policy_hack/policy_watcher_unittest.cc | 
| @@ -7,6 +7,7 @@ | 
| #include "base/message_loop/message_loop.h" | 
| #include "base/run_loop.h" | 
| #include "base/synchronization/waitable_event.h" | 
| +#include "policy/policy_constants.h" | 
| #include "remoting/host/dns_blackhole_checker.h" | 
| #include "remoting/host/policy_hack/fake_policy_watcher.h" | 
| #include "remoting/host/policy_hack/mock_policy_callback.h" | 
| @@ -31,67 +32,79 @@ class PolicyWatcherTest : public testing::Test { | 
| &MockPolicyCallback::OnPolicyError, | 
| base::Unretained(&mock_policy_callback_)); | 
| policy_watcher_.reset(new FakePolicyWatcher(message_loop_proxy_)); | 
| -    nat_true_.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| -    nat_false_.SetBoolean(PolicyWatcher::kNatPolicyName, false); | 
| -    nat_one_.SetInteger(PolicyWatcher::kNatPolicyName, 1); | 
| -    domain_empty_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| +    nat_true_.SetBoolean(policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| +    nat_false_.SetBoolean(policy::key::kRemoteAccessHostFirewallTraversal, | 
| +                          false); | 
| +    nat_one_.SetInteger(policy::key::kRemoteAccessHostFirewallTraversal, 1); | 
| +    domain_empty_.SetString(policy::key::kRemoteAccessHostDomain, | 
| std::string()); | 
| -    domain_full_.SetString(PolicyWatcher::kHostDomainPolicyName, kHostDomain); | 
| +    domain_full_.SetString(policy::key::kRemoteAccessHostDomain, kHostDomain); | 
| SetDefaults(nat_true_others_default_); | 
| -    nat_true_others_default_.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| +    nat_true_others_default_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| SetDefaults(nat_false_others_default_); | 
| -    nat_false_others_default_.SetBoolean(PolicyWatcher::kNatPolicyName, false); | 
| +    nat_false_others_default_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, false); | 
| SetDefaults(domain_empty_others_default_); | 
| -    domain_empty_others_default_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| +    domain_empty_others_default_.SetString(policy::key::kRemoteAccessHostDomain, | 
| std::string()); | 
| SetDefaults(domain_full_others_default_); | 
| -    domain_full_others_default_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| +    domain_full_others_default_.SetString(policy::key::kRemoteAccessHostDomain, | 
| kHostDomain); | 
| -    nat_true_domain_empty_.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| -    nat_true_domain_empty_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| +    nat_true_domain_empty_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| +    nat_true_domain_empty_.SetString(policy::key::kRemoteAccessHostDomain, | 
| std::string()); | 
| -    nat_true_domain_full_.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| -    nat_true_domain_full_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| -                                   kHostDomain); | 
| -    nat_false_domain_empty_.SetBoolean(PolicyWatcher::kNatPolicyName, false); | 
| -    nat_false_domain_empty_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| -                                      std::string()); | 
| -    nat_false_domain_full_.SetBoolean(PolicyWatcher::kNatPolicyName, false); | 
| -    nat_false_domain_full_.SetString(PolicyWatcher::kHostDomainPolicyName, | 
| +    nat_true_domain_full_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| +    nat_true_domain_full_.SetString(policy::key::kRemoteAccessHostDomain, | 
| kHostDomain); | 
| +    nat_false_domain_empty_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, false); | 
| +    nat_false_domain_empty_.SetString(policy::key::kRemoteAccessHostDomain, | 
| +                                      std::string()); | 
| +    nat_false_domain_full_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, false); | 
| +    nat_false_domain_full_.SetString(policy::key::kRemoteAccessHostDomain, | 
| +                                     kHostDomain); | 
| SetDefaults(nat_true_domain_empty_others_default_); | 
| nat_true_domain_empty_others_default_.SetBoolean( | 
| -        PolicyWatcher::kNatPolicyName, true); | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| nat_true_domain_empty_others_default_.SetString( | 
| -        PolicyWatcher::kHostDomainPolicyName, std::string()); | 
| +        policy::key::kRemoteAccessHostDomain, std::string()); | 
| unknown_policies_.SetString("UnknownPolicyOne", std::string()); | 
| unknown_policies_.SetString("UnknownPolicyTwo", std::string()); | 
|  | 
| const char kOverrideNatTraversalToFalse[] = | 
| "{ \"RemoteAccessHostFirewallTraversal\": false }"; | 
| -    nat_true_and_overridden_.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| +    nat_true_and_overridden_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| nat_true_and_overridden_.SetString( | 
| -        PolicyWatcher::kHostDebugOverridePoliciesName, | 
| +        policy::key::kRemoteAccessHostDebugOverridePolicies, | 
| kOverrideNatTraversalToFalse); | 
| -    pairing_true_.SetBoolean(PolicyWatcher::kHostAllowClientPairing, true); | 
| -    pairing_false_.SetBoolean(PolicyWatcher::kHostAllowClientPairing, false); | 
| -    gnubby_auth_true_.SetBoolean(PolicyWatcher::kHostAllowGnubbyAuthPolicyName, | 
| +    pairing_true_.SetBoolean(policy::key::kRemoteAccessHostAllowClientPairing, | 
| +                             true); | 
| +    pairing_false_.SetBoolean(policy::key::kRemoteAccessHostAllowClientPairing, | 
| +                              false); | 
| +    gnubby_auth_true_.SetBoolean(policy::key::kRemoteAccessHostAllowGnubbyAuth, | 
| true); | 
| -    gnubby_auth_false_.SetBoolean(PolicyWatcher::kHostAllowGnubbyAuthPolicyName, | 
| -                                 false); | 
| -    relay_true_.SetBoolean(PolicyWatcher::kRelayPolicyName, true); | 
| -    relay_false_.SetBoolean(PolicyWatcher::kRelayPolicyName, false); | 
| -    port_range_full_.SetString(PolicyWatcher::kUdpPortRangePolicyName, | 
| +    gnubby_auth_false_.SetBoolean(policy::key::kRemoteAccessHostAllowGnubbyAuth, | 
| +                                  false); | 
| +    relay_true_.SetBoolean(policy::key::kRemoteAccessHostAllowRelayedConnection, | 
| +                           true); | 
| +    relay_false_.SetBoolean( | 
| +        policy::key::kRemoteAccessHostAllowRelayedConnection, false); | 
| +    port_range_full_.SetString(policy::key::kRemoteAccessHostUdpPortRange, | 
| kPortRange); | 
| -    port_range_empty_.SetString(PolicyWatcher::kUdpPortRangePolicyName, | 
| +    port_range_empty_.SetString(policy::key::kRemoteAccessHostUdpPortRange, | 
| std::string()); | 
|  | 
| #if !defined(NDEBUG) | 
| SetDefaults(nat_false_overridden_others_default_); | 
| nat_false_overridden_others_default_.SetBoolean( | 
| -        PolicyWatcher::kNatPolicyName, false); | 
| +        policy::key::kRemoteAccessHostFirewallTraversal, false); | 
| nat_false_overridden_others_default_.SetString( | 
| -        PolicyWatcher::kHostDebugOverridePoliciesName, | 
| +        policy::key::kRemoteAccessHostDebugOverridePolicies, | 
| kOverrideNatTraversalToFalse); | 
| #endif | 
| } | 
| @@ -150,24 +163,25 @@ class PolicyWatcherTest : public testing::Test { | 
|  | 
| private: | 
| void SetDefaults(base::DictionaryValue& dict) { | 
| -    dict.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 
| -    dict.SetBoolean(PolicyWatcher::kRelayPolicyName, true); | 
| -    dict.SetString(PolicyWatcher::kUdpPortRangePolicyName, ""); | 
| -    dict.SetBoolean(PolicyWatcher::kHostRequireTwoFactorPolicyName, false); | 
| -    dict.SetString(PolicyWatcher::kHostDomainPolicyName, std::string()); | 
| -    dict.SetBoolean(PolicyWatcher::kHostMatchUsernamePolicyName, false); | 
| -    dict.SetString(PolicyWatcher::kHostTalkGadgetPrefixPolicyName, | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostFirewallTraversal, true); | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostAllowRelayedConnection, true); | 
| +    dict.SetString(policy::key::kRemoteAccessHostUdpPortRange, ""); | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostRequireTwoFactor, false); | 
| +    dict.SetString(policy::key::kRemoteAccessHostDomain, std::string()); | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostMatchUsername, false); | 
| +    dict.SetString(policy::key::kRemoteAccessHostTalkGadgetPrefix, | 
| kDefaultHostTalkGadgetPrefix); | 
| -    dict.SetBoolean(PolicyWatcher::kHostRequireCurtainPolicyName, false); | 
| -    dict.SetString(PolicyWatcher::kHostTokenUrlPolicyName, std::string()); | 
| -    dict.SetString(PolicyWatcher::kHostTokenValidationUrlPolicyName, | 
| -                   std::string()); | 
| -    dict.SetString(PolicyWatcher::kHostTokenValidationCertIssuerPolicyName, | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostRequireCurtain, false); | 
| +    dict.SetString(policy::key::kRemoteAccessHostTokenUrl, std::string()); | 
| +    dict.SetString(policy::key::kRemoteAccessHostTokenValidationUrl, | 
| std::string()); | 
| -    dict.SetBoolean(PolicyWatcher::kHostAllowClientPairing, true); | 
| -    dict.SetBoolean(PolicyWatcher::kHostAllowGnubbyAuthPolicyName, true); | 
| +    dict.SetString( | 
| +        policy::key::kRemoteAccessHostTokenValidationCertificateIssuer, | 
| +        std::string()); | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostAllowClientPairing, true); | 
| +    dict.SetBoolean(policy::key::kRemoteAccessHostAllowGnubbyAuth, true); | 
| #if !defined(NDEBUG) | 
| -    dict.SetString(PolicyWatcher::kHostDebugOverridePoliciesName, ""); | 
| +    dict.SetString(policy::key::kRemoteAccessHostDebugOverridePolicies, ""); | 
| #endif | 
| } | 
| }; | 
|  |