Index: chrome/browser/sync/test/integration/two_client_sessions_sync_test.cc |
diff --git a/chrome/browser/sync/test/integration/two_client_sessions_sync_test.cc b/chrome/browser/sync/test/integration/two_client_sessions_sync_test.cc |
index 8748125be735b7d921036c918a053ac78047375f..2b762e42705a94fa9961c0352a097623f42218b6 100644 |
--- a/chrome/browser/sync/test/integration/two_client_sessions_sync_test.cc |
+++ b/chrome/browser/sync/test/integration/two_client_sessions_sync_test.cc |
@@ -256,21 +256,19 @@ IN_PROC_BROWSER_TEST_F(TwoClientSessionsSyncTest, |
client1_windows.GetMutable())); |
// At this point we enter the passphrase, triggering a resync, in which the |
- // local changes of client 1 get overwritten for now. |
+ // local changes of client 1 get sent to client 0. |
GetClient(1)->service()->SetPassphrase(kValidPassphrase, true); |
ASSERT_TRUE(GetClient(1)->AwaitPassphraseAccepted()); |
ASSERT_TRUE(GetClient(1)->WaitForTypeEncryption(syncable::SESSIONS)); |
+ ASSERT_TRUE(GetClient(1)->AwaitMutualSyncCycleCompletion(GetClient(0))); |
ASSERT_EQ(0, GetClient(1)->GetLastSessionSnapshot()-> |
num_conflicting_updates); |
ASSERT_TRUE(IsEncrypted(0, syncable::SESSIONS)); |
ASSERT_TRUE(IsEncrypted(1, syncable::SESSIONS)); |
- // The session data from client 1 got overwritten. As a result, client 0 |
- // should have no foreign session data. TODO(zea): update this once bug 76596 |
- // is resolved and we don't choose server wins on encryption conflicts. |
SyncedSessionVector sessions0; |
SyncedSessionVector sessions1; |
- ASSERT_FALSE(GetSessionData(0, &sessions0)); |
+ ASSERT_TRUE(GetSessionData(0, &sessions0)); |
ASSERT_FALSE(GetSessionData(1, &sessions1)); |
} |