Index: net/http/http_security_headers_unittest.cc |
diff --git a/net/http/http_security_headers_unittest.cc b/net/http/http_security_headers_unittest.cc |
index bf1bcfbe750539c6ab4d1f5ae9a94b56517c54f0..ce919ff81f39455739be69855779f1f2f5f96bed 100644 |
--- a/net/http/http_security_headers_unittest.cc |
+++ b/net/http/http_security_headers_unittest.cc |
@@ -572,7 +572,13 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) { |
EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash); |
} |
-TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { |
+// Failing on win_chromium_rel. crbug.com/375538 |
+#if defined(OS_WIN) |
+#define MAYBE_UpdateDynamicPKPMaxAge0 DISABLED_UpdateDynamicPKPMaxAge0 |
+#else |
+#define MAYBE_UpdateDynamicPKPMaxAge0 UpdateDynamicPKPMaxAge0 |
+#endif |
+TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) { |
TransportSecurityState state; |
TransportSecurityState::DomainState static_domain_state; |
@@ -646,6 +652,7 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { |
domain, true, new_static_domain_state2.pkp.spki_hashes, &failure_log)); |
EXPECT_NE(0UL, failure_log.length()); |
} |
+#undef MAYBE_UpdateDynamicPKPMaxAge0 |
// Tests that when a static HSTS and a static HPKP entry are present, adding a |
// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a |