Index: chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
diff --git a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
index 126d6f11c30ce10983e0ecaa437fdf41475099e4..3c180c2fd469407b918669741065d2312a2593b4 100644 |
--- a/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
+++ b/chrome/browser/chromeos/login/users/multi_profile_user_controller_unittest.cc |
@@ -322,23 +322,6 @@ TEST_F(MultiProfileUserControllerTest, PrimaryBehaviorChange) { |
} |
} |
-// Tests that owner could not be a secondary user. |
-// |
-// TODO (ygorshenin@, crbug.com/230018): remove or change the test when the |
-// issue will be fixed. |
-TEST_F(MultiProfileUserControllerTest, DISABLED_NoSecondaryOwner) { |
- LoginUser(0); |
- SetOwner(1); |
- |
- MultiProfileUserController::UserAllowedInSessionReason reason; |
- EXPECT_FALSE(controller()->IsUserAllowedInSession(kUsers[1], &reason)); |
- EXPECT_EQ(MultiProfileUserController::NOT_ALLOWED_OWNER_AS_SECONDARY, reason); |
- |
- EXPECT_EQ(0, user_not_allowed_count()); |
- LoginUser(1); |
- EXPECT_EQ(1, user_not_allowed_count()); |
-} |
- |
TEST_F(MultiProfileUserControllerTest, |
UsedPolicyCertificatesAllowedForPrimary) { |
// Verifies that any user can sign-in as the primary user, regardless of the |