Commit ee64d549 authored by jam@chromium.org's avatar jam@chromium.org

Revert of Reenable UpdateDynamicPKPMaxAge0 test. (https://codereview.chromium.org/293253002/)

Reason for revert:
this is still flaking. more info in bug

TBR=palmer
NOTRY=true

Original issue's description:
> Reenable UpdateDynamicPKPMaxAge0 test.
> 
> BUG=375538
> 
> Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=281863

Review URL: https://codereview.chromium.org/412353006

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@285508 0039d316-1c4b-4281-b951-d872f2087c98
parent 396dbee6
...@@ -572,7 +572,13 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) { ...@@ -572,7 +572,13 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) {
EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash); EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash);
} }
TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { // Failing on win_chromium_rel. crbug.com/375538
#if defined(OS_WIN)
#define MAYBE_UpdateDynamicPKPMaxAge0 DISABLED_UpdateDynamicPKPMaxAge0
#else
#define MAYBE_UpdateDynamicPKPMaxAge0 UpdateDynamicPKPMaxAge0
#endif
TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) {
TransportSecurityState state; TransportSecurityState state;
TransportSecurityState::DomainState static_domain_state; TransportSecurityState::DomainState static_domain_state;
...@@ -646,6 +652,7 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { ...@@ -646,6 +652,7 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) {
domain, true, new_static_domain_state2.pkp.spki_hashes, &failure_log)); domain, true, new_static_domain_state2.pkp.spki_hashes, &failure_log));
EXPECT_NE(0UL, failure_log.length()); EXPECT_NE(0UL, failure_log.length());
} }
#undef MAYBE_UpdateDynamicPKPMaxAge0
// Tests that when a static HSTS and a static HPKP entry are present, adding a // Tests that when a static HSTS and a static HPKP entry are present, adding a
// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a // dynamic HSTS header does not clobber the static HPKP entry. Further, adding a
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment