| Index: chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| index 3cd98ca1e11174431995382b62bedf4d8191f491..ca2331d233787e1ef7e3248a842871cc0158acd7 100644
|
| --- a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| +++ b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| @@ -992,8 +992,16 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
|
|
| // Visit a valid HTTPS page, then a broken HTTPS page, and then go back,
|
| // and test that the observed security style matches.
|
| +#if defined(OS_CHROMEOS)
|
| +// Flaky on Chrome OS. See https://crbug.com/638576.
|
| +#define MAYBE_SecurityStyleChangedObserverGoBack \
|
| + DISABLED_SecurityStyleChangedObserverGoBack
|
| +#else
|
| +#define MAYBE_SecurityStyleChangedObserverGoBack \
|
| + SecurityStyleChangedObserverGoBack
|
| +#endif
|
| IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest,
|
| - SecurityStyleChangedObserverGoBack) {
|
| + MAYBE_SecurityStyleChangedObserverGoBack) {
|
| ASSERT_TRUE(https_server_.Start());
|
|
|
| net::EmbeddedTestServer https_test_server_expired(
|
|
|