| Index: chrome/browser/chromeos/settings/device_settings_service.cc
|
| diff --git a/chrome/browser/chromeos/settings/device_settings_service.cc b/chrome/browser/chromeos/settings/device_settings_service.cc
|
| index d96df945a6f6fbdaa0c3005fcdd4f5f194169017..73cd7567a3d06791ed78d67452bd804b6ba75897 100644
|
| --- a/chrome/browser/chromeos/settings/device_settings_service.cc
|
| +++ b/chrome/browser/chromeos/settings/device_settings_service.cc
|
| @@ -132,6 +132,8 @@ void DeviceSettingsService::Load() {
|
| void DeviceSettingsService::Store(
|
| std::unique_ptr<em::PolicyFetchResponse> policy,
|
| const base::Closure& callback) {
|
| + // On Active Directory managed devices policy is written only by authpolicyd.
|
| + CHECK(device_mode_ != policy::DEVICE_MODE_ENTERPRISE_AD);
|
| Enqueue(linked_ptr<SessionManagerOperation>(new StoreSettingsOperation(
|
| base::Bind(&DeviceSettingsService::HandleCompletedOperation,
|
| weak_factory_.GetWeakPtr(), callback),
|
| @@ -256,9 +258,6 @@ void DeviceSettingsService::HandleCompletedOperation(
|
| const base::Closure& callback,
|
| SessionManagerOperation* operation,
|
| Status status) {
|
| - // Exactly one must be true: Active Directory management or existence of key.
|
| - DCHECK((device_mode_ == policy::DEVICE_MODE_ENTERPRISE_AD) !=
|
| - (operation->public_key() != nullptr));
|
| DCHECK_EQ(operation, pending_operations_.front().get());
|
|
|
| store_status_ = status;
|
|
|