| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/basictypes.h" | 5 #include "base/basictypes.h" |
| 6 #include "base/bind.h" | 6 #include "base/bind.h" |
| 7 #include "base/message_loop.h" | 7 #include "base/message_loop.h" |
| 8 #include "base/synchronization/waitable_event.h" | 8 #include "base/synchronization/waitable_event.h" |
| 9 #include "remoting/host/dns_blackhole_checker.h" | 9 #include "remoting/host/dns_blackhole_checker.h" |
| 10 #include "remoting/host/policy_hack/fake_policy_watcher.h" | 10 #include "remoting/host/policy_hack/fake_policy_watcher.h" |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 115 | 115 |
| 116 private: | 116 private: |
| 117 void SetDefaults(base::DictionaryValue& dict) { | 117 void SetDefaults(base::DictionaryValue& dict) { |
| 118 dict.SetBoolean(PolicyWatcher::kNatPolicyName, true); | 118 dict.SetBoolean(PolicyWatcher::kNatPolicyName, true); |
| 119 dict.SetBoolean(PolicyWatcher::kHostRequireTwoFactorPolicyName, false); | 119 dict.SetBoolean(PolicyWatcher::kHostRequireTwoFactorPolicyName, false); |
| 120 dict.SetString(PolicyWatcher::kHostDomainPolicyName, ""); | 120 dict.SetString(PolicyWatcher::kHostDomainPolicyName, ""); |
| 121 dict.SetBoolean(PolicyWatcher::kHostMatchUsernamePolicyName, false); | 121 dict.SetBoolean(PolicyWatcher::kHostMatchUsernamePolicyName, false); |
| 122 dict.SetString(PolicyWatcher::kHostTalkGadgetPrefixPolicyName, | 122 dict.SetString(PolicyWatcher::kHostTalkGadgetPrefixPolicyName, |
| 123 kDefaultHostTalkGadgetPrefix); | 123 kDefaultHostTalkGadgetPrefix); |
| 124 dict.SetBoolean(PolicyWatcher::kHostRequireCurtainPolicyName, false); | 124 dict.SetBoolean(PolicyWatcher::kHostRequireCurtainPolicyName, false); |
| 125 dict.SetString(PolicyWatcher::kHostTokenUrlPolicyName, ""); |
| 126 dict.SetString(PolicyWatcher::kHostTokenValidationUrlPolicyName, ""); |
| 125 #if !defined(NDEBUG) | 127 #if !defined(NDEBUG) |
| 126 dict.SetString(PolicyWatcher::kHostDebugOverridePoliciesName, ""); | 128 dict.SetString(PolicyWatcher::kHostDebugOverridePoliciesName, ""); |
| 127 #endif | 129 #endif |
| 128 } | 130 } |
| 129 }; | 131 }; |
| 130 | 132 |
| 131 const char* PolicyWatcherTest::kHostDomain = "google.com"; | 133 const char* PolicyWatcherTest::kHostDomain = "google.com"; |
| 132 | 134 |
| 133 MATCHER_P(IsPolicies, dict, "") { | 135 MATCHER_P(IsPolicies, dict, "") { |
| 134 return arg->Equals(dict); | 136 return arg->Equals(dict); |
| (...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 297 OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_))); | 299 OnPolicyUpdatePtr(IsPolicies(&nat_true_others_default_))); |
| 298 #endif | 300 #endif |
| 299 | 301 |
| 300 StartWatching(); | 302 StartWatching(); |
| 301 policy_watcher_->SetPolicies(&nat_true_and_overridden_); | 303 policy_watcher_->SetPolicies(&nat_true_and_overridden_); |
| 302 StopWatching(); | 304 StopWatching(); |
| 303 } | 305 } |
| 304 | 306 |
| 305 } // namespace policy_hack | 307 } // namespace policy_hack |
| 306 } // namespace remoting | 308 } // namespace remoting |
| OLD | NEW |