Index: chrome/browser/policy/policy_browsertest.cc |
diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc |
index 968217e1f00c4a5b7f27ba3016620aecb1dcdfd6..a41e99a98248369a44deef928e1a38993e9a4956 100644 |
--- a/chrome/browser/policy/policy_browsertest.cc |
+++ b/chrome/browser/policy/policy_browsertest.cc |
@@ -1335,26 +1335,6 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, Disable3DAPIs) { |
EXPECT_TRUE(IsWebGLEnabled(contents)); |
} |
-IN_PROC_BROWSER_TEST_F(PolicyTest, DisableSpdy) { |
- // Verifies that SPDY can be disable by policy. |
- EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); |
- PolicyMap policies; |
- policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- POLICY_SOURCE_CLOUD, |
- base::WrapUnique(new base::FundamentalValue(true)), nullptr); |
- UpdateProviderPolicy(policies); |
- content::RunAllPendingInMessageLoop(); |
- EXPECT_FALSE(net::HttpStreamFactory::spdy_enabled()); |
- // Verify that it can be force-enabled too. |
- browser()->profile()->GetPrefs()->SetBoolean(prefs::kDisableSpdy, true); |
- policies.Set(key::kDisableSpdy, POLICY_LEVEL_MANDATORY, POLICY_SCOPE_USER, |
- POLICY_SOURCE_CLOUD, |
- base::WrapUnique(new base::FundamentalValue(false)), nullptr); |
- UpdateProviderPolicy(policies); |
- content::RunAllPendingInMessageLoop(); |
- EXPECT_TRUE(net::HttpStreamFactory::spdy_enabled()); |
-} |
- |
namespace { |
// The following helpers retrieve whether https:// URL stripping is |