diff options
author | sky@chromium.org <sky@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-04-09 15:25:57 +0000 |
---|---|---|
committer | sky@chromium.org <sky@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-04-09 15:25:57 +0000 |
commit | 94d2c4067766e532bfd7b61a9b7f0a0616325642 (patch) | |
tree | b0cf94de1ee72c7b26dbcc321388bef95a097b08 /chrome/browser/ssl/ssl_browser_tests.cc | |
parent | 4d8a64609973f9a92c79244740679b33109ed4ed (diff) | |
download | chromium_src-94d2c4067766e532bfd7b61a9b7f0a0616325642.zip chromium_src-94d2c4067766e532bfd7b61a9b7f0a0616325642.tar.gz chromium_src-94d2c4067766e532bfd7b61a9b7f0a0616325642.tar.bz2 |
Marks handful of ssl ui tests as flaky.
BUG=40932
TEST=none
TBR=jcivelli@chromium.org
Review URL: http://codereview.chromium.org/1605020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@44083 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_browser_tests.cc')
-rw-r--r-- | chrome/browser/ssl/ssl_browser_tests.cc | 18 |
1 files changed, 12 insertions, 6 deletions
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc index 087d5a9..2cad006 100644 --- a/chrome/browser/ssl/ssl_browser_tests.cc +++ b/chrome/browser/ssl/ssl_browser_tests.cc @@ -249,7 +249,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaButton) { } // Visits a page with https error and then goes back using GoToOffset. -IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaMenu) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoBackViaMenu) { scoped_refptr<HTTPTestServer> http_server = PlainServer(); ASSERT_TRUE(http_server.get() != NULL); scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); @@ -401,7 +402,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestMixedContentsRandomizeHash) { // Visits a page with unsafe content and make sure that: // - frames content is replaced with warning // - images and scripts are filtered out entirely -IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContents) { scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); ASSERT_TRUE(good_https_server.get() != NULL); scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); @@ -653,7 +655,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) { } // Visit a page over good https that is a redirect to a page with bad https. -IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectGoodToBadHTTPS) { scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); ASSERT_TRUE(good_https_server.get() != NULL); scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); @@ -717,7 +720,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToBadHTTPS) { // Visit a page over https that is a redirect to a page with http (to make sure // we don't keep the secure state). -IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPSToHTTP) { scoped_refptr<HTTPTestServer> http_server = PlainServer(); ASSERT_TRUE(http_server.get() != NULL); scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); @@ -827,7 +831,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestGoodFrameNavigation) { // From a bad HTTPS top frame: // - navigate to an OK HTTPS frame (expected to be still authentication broken). -IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestBadFrameNavigation) { scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); ASSERT_TRUE(good_https_server.get() != NULL); scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); @@ -908,7 +913,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) { EXPECT_FALSE(is_content_evil); } -IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) { +// Marked as flaky, see bug 40932. +IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorkerFiltered) { scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); ASSERT_TRUE(good_https_server.get() != NULL); scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |