Index: components/arc/arc_util_unittest.cc |
diff --git a/components/arc/arc_util_unittest.cc b/components/arc/arc_util_unittest.cc |
index 0a52662a6140706d77d386ef2ffd7991c662fc74..46819e8c75058caa1f060163eb0284bf6c397cd8 100644 |
--- a/components/arc/arc_util_unittest.cc |
+++ b/components/arc/arc_util_unittest.cc |
@@ -212,7 +212,7 @@ TEST_F(ArcUtilTest, IsArcAllowedForUser) { |
} const kTestCases[] = { |
{user_manager::USER_TYPE_REGULAR, true}, |
{user_manager::USER_TYPE_GUEST, false}, |
- {user_manager::USER_TYPE_PUBLIC_ACCOUNT, false}, |
+ {user_manager::USER_TYPE_PUBLIC_ACCOUNT, true}, |
{user_manager::USER_TYPE_SUPERVISED, false}, |
{user_manager::USER_TYPE_KIOSK_APP, false}, |
{user_manager::USER_TYPE_CHILD, true}, |
@@ -235,8 +235,8 @@ TEST_F(ArcUtilTest, IsArcAllowedForUser) { |
ASSERT_TRUE(fake_user_manager.IsUserCryptohomeDataEphemeral( |
ephemeral_user->GetAccountId())); |
- // Ephemeral user is not allowed for ARC. |
- EXPECT_FALSE(IsArcAllowedForUser(ephemeral_user)); |
+ // Ephemeral user is also allowed for ARC. |
+ EXPECT_TRUE(IsArcAllowedForUser(ephemeral_user)); |
} |
} // namespace |