Index: net/http/http_security_headers_unittest.cc |
diff --git a/net/http/http_security_headers_unittest.cc b/net/http/http_security_headers_unittest.cc |
index 234c5f076ece48c8bc597cb5f3cf9868ec5334dc..ec8f3f4a53f9e7c96ecd62544a9fb07e48b092f5 100644 |
--- a/net/http/http_security_headers_unittest.cc |
+++ b/net/http/http_security_headers_unittest.cc |
@@ -593,13 +593,7 @@ TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) { |
EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash); |
} |
-// Failing on win_chromium_rel. crbug.com/375538 |
-#if defined(OS_WIN) |
-#define MAYBE_UpdateDynamicPKPMaxAge0 DISABLED_UpdateDynamicPKPMaxAge0 |
-#else |
-#define MAYBE_UpdateDynamicPKPMaxAge0 UpdateDynamicPKPMaxAge0 |
-#endif |
-TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) { |
+TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPMaxAge0) { |
TransportSecurityState state; |
TransportSecurityState::DomainState static_domain_state; |
@@ -677,7 +671,6 @@ TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) { |
&failure_log)); |
EXPECT_NE(0UL, failure_log.length()); |
} |
-#undef MAYBE_UpdateDynamicPKPMaxAge0 |
// Tests that when a static HSTS and a static HPKP entry are present, adding a |
// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a |