| Index: chrome/browser/chromeos/login/saml/saml_browsertest.cc
|
| diff --git a/chrome/browser/chromeos/login/saml/saml_browsertest.cc b/chrome/browser/chromeos/login/saml/saml_browsertest.cc
|
| index 3d57dc549ec83f5da4fd188c0da11ad37f37d868..1785ba20f587486c500d795d0413bb72c6a380d1 100644
|
| --- a/chrome/browser/chromeos/login/saml/saml_browsertest.cc
|
| +++ b/chrome/browser/chromeos/login/saml/saml_browsertest.cc
|
| @@ -528,7 +528,7 @@ IN_PROC_BROWSER_TEST_F(SamlTest, UseAutenticatedUserEmailAddress) {
|
| content::WindowedNotificationObserver(
|
| chrome::NOTIFICATION_SESSION_STARTED,
|
| content::NotificationService::AllSources()).Wait();
|
| - const User* user = UserManager::Get()->GetActiveUser();
|
| + const User* user = GetUserManager()->GetActiveUser();
|
| ASSERT_TRUE(user);
|
| EXPECT_EQ(kFirstSAMLUserEmail, user->email());
|
| }
|
| @@ -644,10 +644,10 @@ void SAMLPolicyTest::SetUpOnMainThread() {
|
| SamlTest::SetUpOnMainThread();
|
|
|
| // Pretend that the test users' OAuth tokens are valid.
|
| - UserManager::Get()->SaveUserOAuthStatus(kFirstSAMLUserEmail,
|
| - User::OAUTH2_TOKEN_STATUS_VALID);
|
| - UserManager::Get()->SaveUserOAuthStatus(kNonSAMLUserEmail,
|
| - User::OAUTH2_TOKEN_STATUS_VALID);
|
| + GetUserManager()->SaveUserOAuthStatus(kFirstSAMLUserEmail,
|
| + User::OAUTH2_TOKEN_STATUS_VALID);
|
| + GetUserManager()->SaveUserOAuthStatus(kNonSAMLUserEmail,
|
| + User::OAUTH2_TOKEN_STATUS_VALID);
|
| }
|
|
|
| void SAMLPolicyTest::SetSAMLOfflineSigninTimeLimitPolicy(int limit) {
|
|
|