Index: chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
diff --git a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
index 3cd98ca1e11174431995382b62bedf4d8191f491..ca2331d233787e1ef7e3248a842871cc0158acd7 100644 |
--- a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
+++ b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
@@ -992,8 +992,16 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
// Visit a valid HTTPS page, then a broken HTTPS page, and then go back, |
// and test that the observed security style matches. |
+#if defined(OS_CHROMEOS) |
+// Flaky on Chrome OS. See https://crbug.com/638576. |
+#define MAYBE_SecurityStyleChangedObserverGoBack \ |
+ DISABLED_SecurityStyleChangedObserverGoBack |
+#else |
+#define MAYBE_SecurityStyleChangedObserverGoBack \ |
+ SecurityStyleChangedObserverGoBack |
+#endif |
IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, |
- SecurityStyleChangedObserverGoBack) { |
+ MAYBE_SecurityStyleChangedObserverGoBack) { |
ASSERT_TRUE(https_server_.Start()); |
net::EmbeddedTestServer https_test_server_expired( |