Index: chrome/browser/extensions/extension_browsertests_misc.cc |
diff --git a/chrome/browser/extensions/extension_browsertests_misc.cc b/chrome/browser/extensions/extension_browsertests_misc.cc |
index f554d11ed4d3a5b04193aa84eb02a0d32a1f80a6..769bae146afd7db76a63778f6fd1e94aa5ffc6c7 100644 |
--- a/chrome/browser/extensions/extension_browsertests_misc.cc |
+++ b/chrome/browser/extensions/extension_browsertests_misc.cc |
@@ -717,7 +717,10 @@ IN_PROC_BROWSER_TEST_F(ExtensionBrowserTest, WindowOpenInvalidExtension) { |
// gives the new window extension privileges - even though the opening page |
// does not have extension privileges, we break the script connection, so |
// there is no privilege leak. |
-IN_PROC_BROWSER_TEST_F(ExtensionBrowserTest, WindowOpenNoPrivileges) { |
+// TODO(creis): This is disabled until we can restore window.opener if the new |
+// window is navigated back to the same site as the original page. See |
+// http://crbug.com/65953. |
+IN_PROC_BROWSER_TEST_F(ExtensionBrowserTest, DISABLED_WindowOpenNoPrivileges) { |
ASSERT_TRUE(LoadExtension( |
test_data_dir_.AppendASCII("uitest").AppendASCII("window_open"))); |