Index: components/policy/core/common/policy_loader_win.cc |
diff --git a/components/policy/core/common/policy_loader_win.cc b/components/policy/core/common/policy_loader_win.cc |
index 3516754f1460de3ba8267ca7506f6a07c1ed7ca8..279a936cf9b3d4dab4286d245e8b753b10f2c77c 100644 |
--- a/components/policy/core/common/policy_loader_win.cc |
+++ b/components/policy/core/common/policy_loader_win.cc |
@@ -44,6 +44,7 @@ |
#include "components/policy/core/common/policy_load_status.h" |
#include "components/policy/core/common/policy_map.h" |
#include "components/policy/core/common/policy_namespace.h" |
+#include "components/policy/core/common/policy_types.h" |
#include "components/policy/core/common/preg_parser_win.h" |
#include "components/policy/core/common/registry_dict_win.h" |
#include "components/policy/core/common/schema.h" |
@@ -171,7 +172,7 @@ void FilterUntrustedPolicy(PolicyMap* policy) { |
} |
if (invalid_policies) { |
policy->Set(key::kExtensionInstallForcelist, |
- map_entry->level, map_entry->scope, |
+ map_entry->level, map_entry->scope, map_entry->source, |
filtered_values.release(), |
map_entry->external_data_fetcher); |
@@ -329,7 +330,7 @@ void ParsePolicy(const RegistryDict* gpo_dict, |
return; |
} |
- policy->LoadFrom(policy_dict, level, scope); |
+ policy->LoadFrom(policy_dict, level, scope, POLICY_SOURCE_PLATFORM); |
} |
// Collects stats about the enterprise environment that can be used to decide |