Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
index 47cf1f4c181c552c97b3989a57f5ba20037fa93b..aee8a388494efb471916fd76119f0c845f62a715 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc |
@@ -91,7 +91,7 @@ class PhishingDOMFeatureExtractorTest : public RenderViewFakeResourcesTest { |
base::WeakPtrFactory<PhishingDOMFeatureExtractorTest> weak_factory_; |
}; |
-TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_FormFeatures) { |
+TEST_F(PhishingDOMFeatureExtractorTest, FormFeatures) { |
// This test doesn't exercise the extraction timing. |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
responses_["http://host.com/"] = |
@@ -149,7 +149,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_FormFeatures) { |
EXPECT_THAT(features.features(), ContainerEq(expected_features.features())); |
} |
-TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_LinkFeatures) { |
+TEST_F(PhishingDOMFeatureExtractorTest, LinkFeatures) { |
// This test doesn't exercise the extraction timing. |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
responses_["http://www.host.com/"] = |
@@ -191,7 +191,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_LinkFeatures) { |
EXPECT_THAT(features.features(), ContainerEq(expected_features.features())); |
} |
-TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_ScriptAndImageFeatures) { |
+TEST_F(PhishingDOMFeatureExtractorTest, ScriptAndImageFeatures) { |
// This test doesn't exercise the extraction timing. |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
responses_["http://host.com/"] = |
@@ -222,7 +222,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_ScriptAndImageFeatures) { |
EXPECT_THAT(features.features(), ContainerEq(expected_features.features())); |
} |
-TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_SubFrames) { |
+TEST_F(PhishingDOMFeatureExtractorTest, SubFrames) { |
// This test doesn't exercise the extraction timing. |
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now())); |
@@ -357,7 +357,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, Continuation) { |
EXPECT_FALSE(ExtractFeatures(&features)); |
} |
-TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_SubframeRemoval) { |
+TEST_F(PhishingDOMFeatureExtractorTest, SubframeRemoval) { |
// In this test, we'll advance the feature extractor so that it is positioned |
// inside an iframe, and have it pause due to exceeding the chunk time limit. |
// Then, prior to continuation, the iframe is removed from the document. |