Index: net/http/http_security_headers_unittest.cc |
diff --git a/net/http/http_security_headers_unittest.cc b/net/http/http_security_headers_unittest.cc |
index ce919ff81f39455739be69855779f1f2f5f96bed..bf1bcfbe750539c6ab4d1f5ae9a94b56517c54f0 100644 |
--- a/net/http/http_security_headers_unittest.cc |
+++ b/net/http/http_security_headers_unittest.cc |
@@ -572,13 +572,7 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) { |
EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash); |
} |
-// Failing on win_chromium_rel. crbug.com/375538 |
-#if defined(OS_WIN) |
-#define MAYBE_UpdateDynamicPKPMaxAge0 DISABLED_UpdateDynamicPKPMaxAge0 |
-#else |
-#define MAYBE_UpdateDynamicPKPMaxAge0 UpdateDynamicPKPMaxAge0 |
-#endif |
-TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) { |
+TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { |
TransportSecurityState state; |
TransportSecurityState::DomainState static_domain_state; |
@@ -652,7 +646,6 @@ TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) { |
domain, true, new_static_domain_state2.pkp.spki_hashes, &failure_log)); |
EXPECT_NE(0UL, failure_log.length()); |
} |
-#undef MAYBE_UpdateDynamicPKPMaxAge0 |
// Tests that when a static HSTS and a static HPKP entry are present, adding a |
// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a |