Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1667)

Unified Diff: net/http/http_security_headers_unittest.cc

Issue 2906633003: Add a build flag to configure bundling of HSTS preload list (Closed)
Patch Set: address sleevi comments Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/http/http_security_headers_unittest.cc
diff --git a/net/http/http_security_headers_unittest.cc b/net/http/http_security_headers_unittest.cc
index 7f1148a170979031440bfff7f94126fa172754e1..fc26a3a64c7b6d9f85604e29884314a3eec8e65f 100644
--- a/net/http/http_security_headers_unittest.cc
+++ b/net/http/http_security_headers_unittest.cc
@@ -652,7 +652,11 @@ TEST_F(HttpSecurityHeadersTest, ValidPKPHeadersSHA256) {
TestValidPKPHeaders(HASH_VALUE_SHA256);
}
+#if !BUILDFLAG(INCLUDE_TRANSPORT_SECURITY_STATE_PRELOAD_LIST)
+TEST_F(HttpSecurityHeadersTest, DISABLED_UpdateDynamicPKPOnly) {
+#else
TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) {
+#endif
TransportSecurityState state;
TransportSecurityState::STSState static_sts_state;
TransportSecurityState::PKPState static_pkp_state;
@@ -721,7 +725,11 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) {
base::ContainsValue(new_dynamic_pkp_state.spki_hashes, backup_hash));
}
+#if !BUILDFLAG(INCLUDE_TRANSPORT_SECURITY_STATE_PRELOAD_LIST)
+TEST_F(HttpSecurityHeadersTest, DISABLED_UpdateDynamicPKPMaxAge0) {
+#else
TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) {
+#endif
TransportSecurityState state;
TransportSecurityState::STSState static_sts_state;
TransportSecurityState::PKPState static_pkp_state;
@@ -799,7 +807,11 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) {
// Tests that when a static HSTS and a static HPKP entry are present, adding a
// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a
// dynamic HPKP entry could not affect the HSTS entry for the site.
+#if !BUILDFLAG(INCLUDE_TRANSPORT_SECURITY_STATE_PRELOAD_LIST)
+TEST_F(HttpSecurityHeadersTest, DISABLED_NoClobberPins) {
+#else
TEST_F(HttpSecurityHeadersTest, NoClobberPins) {
+#endif
TransportSecurityState state;
TransportSecurityState::STSState sts_state;
TransportSecurityState::PKPState pkp_state;

Powered by Google App Engine
This is Rietveld 408576698