| Index: components/policy/core/common/policy_loader_win.cc
|
| diff --git a/components/policy/core/common/policy_loader_win.cc b/components/policy/core/common/policy_loader_win.cc
|
| index 1854f97503cea5b5c1546ba23f5bfe73b20d50f7..28910d8b8a2ce929fc2d5c30fb6dacd59ccd74bb 100644
|
| --- a/components/policy/core/common/policy_loader_win.cc
|
| +++ b/components/policy/core/common/policy_loader_win.cc
|
| @@ -92,10 +92,14 @@ enum DomainCheckErrors {
|
| DOMAIN_CHECK_ERROR_SIZE, // Not a DomainCheckError. Must be last.
|
| };
|
|
|
| +bool ShouldHonorPolicies() {
|
| + return base::win::IsEnterpriseUser();
|
| +}
|
| +
|
| // Verifies that untrusted policies contain only safe values. Modifies the
|
| // |policy| in place.
|
| void FilterUntrustedPolicy(PolicyMap* policy) {
|
| - if (base::win::IsEnrolledToDomain())
|
| + if (ShouldHonorPolicies())
|
| return;
|
|
|
| int invalid_policies = 0;
|
| @@ -293,8 +297,7 @@ void CollectEnterpriseUMAs() {
|
| base::win::OSInfo::GetInstance()->version_type(),
|
| base::win::SUITE_LAST);
|
|
|
| - bool in_domain = base::win::IsEnrolledToDomain();
|
| - UMA_HISTOGRAM_BOOLEAN("EnterpriseCheck.InDomain", in_domain);
|
| + UMA_HISTOGRAM_BOOLEAN("EnterpriseCheck.InDomain", ShouldHonorPolicies());
|
| }
|
|
|
| } // namespace
|
| @@ -368,9 +371,9 @@ std::unique_ptr<PolicyBundle> PolicyLoaderWin::Load() {
|
| { POLICY_SCOPE_USER, HKEY_CURRENT_USER },
|
| };
|
|
|
| - bool is_enterprise = base::win::IsEnrolledToDomain();
|
| + bool honor_policies = ShouldHonorPolicies();
|
| VLOG(1) << "Reading policy from the registry is "
|
| - << (is_enterprise ? "enabled." : "disabled.");
|
| + << (honor_policies ? "enabled." : "disabled.");
|
|
|
| // Load policy data for the different scopes/levels and merge them.
|
| std::unique_ptr<PolicyBundle> bundle(new PolicyBundle());
|
| @@ -398,7 +401,7 @@ std::unique_ptr<PolicyBundle> PolicyLoaderWin::Load() {
|
| // timeout on it more aggressively. For now, there's no justification for
|
| // the additional effort this would introduce.
|
|
|
| - bool is_registry_forced = is_enterprise || gpo_provider_ == nullptr;
|
| + bool is_registry_forced = honor_policies || gpo_provider_ == nullptr;
|
| if (is_registry_forced || !ReadPolicyFromGPO(scope, &gpo_dict, &status)) {
|
| VLOG_IF(1, !is_registry_forced) << "Failed to read GPO files for "
|
| << scope << " falling back to registry.";
|
|
|