Chromium Code Reviews| Index: chromeos/network/onc/onc_certificate_importer_unittest.cc |
| diff --git a/chromeos/network/onc/onc_certificate_importer_unittest.cc b/chromeos/network/onc/onc_certificate_importer_unittest.cc |
| index 1fbb633a9056f7532cbb7daf95b55f55ba0cdfec..3db4eea418a599c9c8ee62affb0577a76a5a6096 100644 |
| --- a/chromeos/network/onc/onc_certificate_importer_unittest.cc |
| +++ b/chromeos/network/onc/onc_certificate_importer_unittest.cc |
| @@ -155,14 +155,16 @@ TEST_F(ONCCertificateImporterTest, MultipleCertificates) { |
| EXPECT_EQ(onc_certificates_->GetSize(), result_list_.size()); |
| } |
| -TEST_F(ONCCertificateImporterTest, MultipleCertificatesWithFailures) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
|
Paweł Hajdan Jr.
2013/05/08 16:32:25
Please find a good owner for this bug, and let the
Robert Sesek
2013/05/08 16:42:11
Done. I think the net win outweighs the importance
|
| +TEST_F(ONCCertificateImporterTest, DISABLED_MultipleCertificatesWithFailures) { |
| AddCertificatesFromFile("toplevel_partially_invalid.onc", |
| CertificateImporter::IMPORT_INCOMPLETE); |
| EXPECT_EQ(2ul, onc_certificates_->GetSize()); |
| EXPECT_EQ(1ul, result_list_.size()); |
| } |
| -TEST_F(ONCCertificateImporterTest, AddClientCertificate) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_F(ONCCertificateImporterTest, DISABLED_AddClientCertificate) { |
| std::string guid; |
| AddCertificateFromFile("certificate-client.onc", net::USER_CERT, &guid); |
| EXPECT_TRUE(web_trust_certificates_.empty()); |
| @@ -199,7 +201,8 @@ TEST_F(ONCCertificateImporterTest, AddClientCertificate) { |
| } |
| } |
| -TEST_F(ONCCertificateImporterTest, AddServerCertificate) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_F(ONCCertificateImporterTest, DISABLED_AddServerCertificate) { |
| std::string guid; |
| AddCertificateFromFile("certificate-server.onc", net::SERVER_CERT, &guid); |
| @@ -217,7 +220,8 @@ TEST_F(ONCCertificateImporterTest, AddServerCertificate) { |
| web_trust_certificates_[0]->os_cert_handle())); |
| } |
| -TEST_F(ONCCertificateImporterTest, AddWebAuthorityCertificate) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_F(ONCCertificateImporterTest, DISABLED_AddWebAuthorityCertificate) { |
| std::string guid; |
| AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, &guid); |
| @@ -235,7 +239,9 @@ TEST_F(ONCCertificateImporterTest, AddWebAuthorityCertificate) { |
| web_trust_certificates_[0]->os_cert_handle())); |
| } |
| -TEST_F(ONCCertificateImporterTest, AddAuthorityCertificateWithoutWebTrust) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_F(ONCCertificateImporterTest, |
| + DISABLED_AddAuthorityCertificateWithoutWebTrust) { |
| std::string guid; |
| AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, &guid); |
| EXPECT_TRUE(web_trust_certificates_.empty()); |
| @@ -267,7 +273,8 @@ class ONCCertificateImporterTestWithParam : |
| public testing::WithParamInterface<CertParam> { |
| }; |
| -TEST_P(ONCCertificateImporterTestWithParam, UpdateCertificate) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_P(ONCCertificateImporterTestWithParam, DISABLED_UpdateCertificate) { |
| // First we import a certificate. |
| { |
| SCOPED_TRACE("Import original certificate"); |
| @@ -286,7 +293,8 @@ TEST_P(ONCCertificateImporterTestWithParam, UpdateCertificate) { |
| } |
| } |
| -TEST_P(ONCCertificateImporterTestWithParam, ReimportCertificate) { |
| +// Doesn't work with singleton isolation <http://crbug.com/238654>. |
| +TEST_P(ONCCertificateImporterTestWithParam, DISABLED_ReimportCertificate) { |
| // Verify that reimporting a client certificate works. |
| for (int i = 0; i < 2; ++i) { |
| SCOPED_TRACE("Import certificate, iteration " + base::IntToString(i)); |