| Index: chrome/browser/policy/policy_browsertest.cc
|
| diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
|
| index 968217e1f00c4a5b7f27ba3016620aecb1dcdfd6..a41e99a98248369a44deef928e1a38993e9a4956 100644
|
| --- a/chrome/browser/policy/policy_browsertest.cc
|
| +++ b/chrome/browser/policy/policy_browsertest.cc
|
| @@ -1335,26 +1335,6 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) {
|
| EXPECT_TRUE(IsWebGLEnabled(contents));
|
| }
|
|
|
| -IN_PROC_BROWSER_TEST_F(PolicyTest, DisableSpdy) {
|
| - // Verifies that SPDY can be disable by policy.
|
| - EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled());
|
| - PolicyMap policies;
|
| - policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(true)), nullptr);
|
| - UpdateProviderPolicy(policies);
|
| - content::RunAllPendingInMessageLoop();
|
| - EXPECT_FALSE(net::HttpStreamFactory::spdy_enabled());
|
| - // Verify that it can be force-enabled too.
|
| - browser()->profile()->GetPrefs()->SetBoolean(prefs::kDisableSpdy, true);
|
| - policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER,
|
| - POLICY_SOURCE_CLOUD,
|
| - base::WrapUnique(new base::FundamentalValue(false)), nullptr);
|
| - UpdateProviderPolicy(policies);
|
| - content::RunAllPendingInMessageLoop();
|
| - EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled());
|
| -}
|
| -
|
| namespace {
|
|
|
| // The following helpers retrieve whether https:// URL stripping is
|
|
|