| Index: remoting/host/policy_hack/policy_watcher.cc
|
| diff --git a/remoting/host/policy_hack/policy_watcher.cc b/remoting/host/policy_hack/policy_watcher.cc
|
| index 7194bae10e39b9d7d1428414af0eb02e4649ac90..3f0ef7a029c103eacdba0c695495230d835d72de 100644
|
| --- a/remoting/host/policy_hack/policy_watcher.cc
|
| +++ b/remoting/host/policy_hack/policy_watcher.cc
|
| @@ -92,6 +92,12 @@ const char PolicyWatcher::kHostTalkGadgetPrefixPolicyName[] =
|
| const char PolicyWatcher::kHostRequireCurtainPolicyName[] =
|
| "RemoteAccessHostRequireCurtain";
|
|
|
| +const char PolicyWatcher::kHostTokenUrlPolicyName[] =
|
| + "RemoteAccessHostTokenUrl";
|
| +
|
| +const char PolicyWatcher::kHostTokenValidationUrlPolicyName[] =
|
| + "RemoteAccessHostTokenValidationUrl";
|
| +
|
| const char PolicyWatcher::kHostDebugOverridePoliciesName[] =
|
| "RemoteAccessHostDebugOverridePolicies";
|
|
|
| @@ -106,11 +112,13 @@ PolicyWatcher::PolicyWatcher(
|
| default_values_->SetBoolean(kHostRequireTwoFactorPolicyName, false);
|
| default_values_->SetBoolean(kHostRequireCurtainPolicyName, false);
|
| default_values_->SetBoolean(kHostMatchUsernamePolicyName, false);
|
| - default_values_->SetString(kHostDomainPolicyName, "");
|
| + default_values_->SetString(kHostDomainPolicyName, std::string());
|
| default_values_->SetString(kHostTalkGadgetPrefixPolicyName,
|
| kDefaultHostTalkGadgetPrefix);
|
| + default_values_->SetString(kHostTokenUrlPolicyName, std::string());
|
| + default_values_->SetString(kHostTokenValidationUrlPolicyName, std::string());
|
| #if !defined(NDEBUG)
|
| - default_values_->SetString(kHostDebugOverridePoliciesName, "");
|
| + default_values_->SetString(kHostDebugOverridePoliciesName, std::string());
|
| #endif
|
|
|
| // Initialize the fall-back values to use for unreadable policies.
|
|
|