Index: components/arc/arc_util_unittest.cc |
diff --git a/components/arc/arc_util_unittest.cc b/components/arc/arc_util_unittest.cc |
index 51b8a41b6da4e649f4c50b639b528de784d2eb39..99c4b99f7e16c454af623c0337d407f027b80cbd 100644 |
--- a/components/arc/arc_util_unittest.cc |
+++ b/components/arc/arc_util_unittest.cc |
@@ -212,7 +212,7 @@ TEST_F(ArcUtilTest, IsArcAllowedForUser) { |
} const kTestCases[] = { |
{user_manager::USER_TYPE_REGULAR, true}, |
{user_manager::USER_TYPE_GUEST, false}, |
- {user_manager::USER_TYPE_PUBLIC_ACCOUNT, false}, |
+ {user_manager::USER_TYPE_PUBLIC_ACCOUNT, true}, |
{user_manager::USER_TYPE_SUPERVISED, false}, |
{user_manager::USER_TYPE_KIOSK_APP, false}, |
{user_manager::USER_TYPE_CHILD, true}, |
@@ -235,8 +235,8 @@ TEST_F(ArcUtilTest, IsArcAllowedForUser) { |
ASSERT_TRUE(fake_user_manager.IsUserCryptohomeDataEphemeral( |
ephemeral_user->GetAccountId())); |
- // Ephemeral user is not allowed for ARC. |
- EXPECT_FALSE(IsArcAllowedForUser(ephemeral_user)); |
+ // Ephemeral user is also allowed for ARC. |
+ EXPECT_TRUE(IsArcAllowedForUser(ephemeral_user)); |
} |
TEST_F(ArcUtilTest, ArcStartModeDefault) { |