| Index: content/browser/loader/cross_site_resource_handler_browsertest.cc
|
| diff --git a/content/browser/loader/cross_site_resource_handler_browsertest.cc b/content/browser/loader/cross_site_resource_handler_browsertest.cc
|
| index 4d66c1a9812275603c130aec7420c5b0d091de3a..ba0f3cc307e6e65ac6a61cf8a5964c7565dc03e0 100644
|
| --- a/content/browser/loader/cross_site_resource_handler_browsertest.cc
|
| +++ b/content/browser/loader/cross_site_resource_handler_browsertest.cc
|
| @@ -239,8 +239,10 @@ void SimulateMaliciousFrameDetachOnUIThread(int render_process_id,
|
|
|
| // Regression test for https://crbug.com/538784 -- ensures that one can't
|
| // sidestep CrossSiteResourceHandler by detaching a frame mid-request.
|
| +//
|
| +// TODO(nick): Disabled until we re-land the fix for https://crbug.com/538784.
|
| IN_PROC_BROWSER_TEST_F(CrossSiteResourceHandlerTest,
|
| - NoDeliveryToDetachedFrame) {
|
| + DISABLED_NoDeliveryToDetachedFrame) {
|
| GURL attacker_page = embedded_test_server()->GetURL(
|
| "evil.com", "/cross_site_iframe_factory.html?evil(evil)");
|
| EXPECT_TRUE(NavigateToURL(shell(), attacker_page));
|
|
|