Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2831)

Unified Diff: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc

Issue 10388190: Disable 12 phishing tests (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 8 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
index aee8a388494efb471916fd76119f0c845f62a715..47cf1f4c181c552c97b3989a57f5ba20037fa93b 100644
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor_browsertest.cc
@@ -91,7 +91,7 @@ class PhishingDOMFeatureExtractorTest : public RenderViewFakeResourcesTest {
base::WeakPtrFactory<PhishingDOMFeatureExtractorTest> weak_factory_;
};
-TEST_F(PhishingDOMFeatureExtractorTest, FormFeatures) {
+TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_FormFeatures) {
// This test doesn't exercise the extraction timing.
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now()));
responses_["http://host.com/"] =
@@ -149,7 +149,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, FormFeatures) {
EXPECT_THAT(features.features(), ContainerEq(expected_features.features()));
}
-TEST_F(PhishingDOMFeatureExtractorTest, LinkFeatures) {
+TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_LinkFeatures) {
// This test doesn't exercise the extraction timing.
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now()));
responses_["http://www.host.com/"] =
@@ -191,7 +191,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, LinkFeatures) {
EXPECT_THAT(features.features(), ContainerEq(expected_features.features()));
}
-TEST_F(PhishingDOMFeatureExtractorTest, ScriptAndImageFeatures) {
+TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_ScriptAndImageFeatures) {
// This test doesn't exercise the extraction timing.
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now()));
responses_["http://host.com/"] =
@@ -222,7 +222,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, ScriptAndImageFeatures) {
EXPECT_THAT(features.features(), ContainerEq(expected_features.features()));
}
-TEST_F(PhishingDOMFeatureExtractorTest, SubFrames) {
+TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_SubFrames) {
// This test doesn't exercise the extraction timing.
EXPECT_CALL(clock_, Now()).WillRepeatedly(Return(base::TimeTicks::Now()));
@@ -357,7 +357,7 @@ TEST_F(PhishingDOMFeatureExtractorTest, Continuation) {
EXPECT_FALSE(ExtractFeatures(&features));
}
-TEST_F(PhishingDOMFeatureExtractorTest, SubframeRemoval) {
+TEST_F(PhishingDOMFeatureExtractorTest, DISABLED_SubframeRemoval) {
// In this test, we'll advance the feature extractor so that it is positioned
// inside an iframe, and have it pause due to exceeding the chunk time limit.
// Then, prior to continuation, the iframe is removed from the document.
« no previous file with comments | « chrome/renderer/safe_browsing/phishing_classifier_delegate_browsertest.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698