Index: chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.cc |
diff --git a/chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.cc b/chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.cc |
index 13f49924d0341885f241cab5b2d543751189915c..5e0727ae34487517ef31520bf7dcd02e368442b2 100644 |
--- a/chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.cc |
+++ b/chrome/browser/chromeos/policy/device_cloud_policy_store_chromeos.cc |
@@ -26,7 +26,7 @@ DeviceCloudPolicyStoreChromeOS::DeviceCloudPolicyStoreChromeOS( |
: device_settings_service_(device_settings_service), |
install_attributes_(install_attributes), |
background_task_runner_(background_task_runner), |
- first_update_(true), |
+ enrollment_validation_done_(false), |
weak_factory_(this) { |
device_settings_service_->AddObserver(this); |
} |
@@ -138,13 +138,21 @@ void DeviceCloudPolicyStoreChromeOS::UpdateFromService() { |
return; |
} |
- // Fill UMA histogram once per session. Skip temp validation error because it |
- // is not a definitive result (policy load will be retried). |
+ // Once per session, validate internal consistency of enrollment state (DM |
+ // token must be present on enrolled devices) and in case of failure set flag |
+ // to indicate that recovery is required. Since UpdateFromService() is called |
+ // upon completion of any kind of SessionManagerOperation, validation is only |
+ // performed for the first time a status codes is encountered that may |
+ // correspond to completing a read request. |
const chromeos::DeviceSettingsService::Status status = |
device_settings_service_->status(); |
- if (first_update_ && |
- status != chromeos::DeviceSettingsService::STORE_TEMP_VALIDATION_ERROR) { |
- first_update_ = false; |
+ if ((status == chromeos::DeviceSettingsService::STORE_SUCCESS || |
+ status == chromeos::DeviceSettingsService::STORE_KEY_UNAVAILABLE || |
+ status == chromeos::DeviceSettingsService::STORE_NO_POLICY || |
+ status == chromeos::DeviceSettingsService::STORE_INVALID_POLICY || |
+ status == chromeos::DeviceSettingsService::STORE_VALIDATION_ERROR) |
pastarmovj
2014/07/18 10:14:54
I would suggest to change this to a switch to guar
Thiemo Nagel
2014/07/18 11:54:04
Done.
|
+ && !enrollment_validation_done_) { |
+ enrollment_validation_done_ = true; |
const bool has_dm_token = |
status == chromeos::DeviceSettingsService::STORE_SUCCESS && |
device_settings_service_->policy_data() && |
@@ -156,7 +164,7 @@ void DeviceCloudPolicyStoreChromeOS::UpdateFromService() { |
// upon policy load on machines requiring recovery, a flag is stored in |
// prefs which is accessed by LoginDisplayHostImpl early during (next) boot. |
if (!has_dm_token) { |
- LOG(ERROR) << "Policy read on enrolled device yields no DM token! " |
+ LOG(ERROR) << "Device policy read on enrolled device yields no DM token! " |
<< "Status: " << status << "."; |
chromeos::StartupUtils::MarkEnrollmentRecoveryRequired(); |
} |