0

Disabled flaky EarlyDataReasonReadServerHello test

TBR=davidben@chromium.org

Bug: 1057921
Change-Id: I82cdabeecb65feb6283ed6c2028af18bdec727e1
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2575893
Commit-Queue: Sergey Ulanov <sergeyu@chromium.org>
Auto-Submit: Sergey Ulanov <sergeyu@chromium.org>
Reviewed-by: David Van Cleve <davidvc@chromium.org>
Cr-Commit-Position: refs/heads/master@{#833964}
This commit is contained in:
Sergey Ulanov
2020-12-05 01:51:59 +00:00
committed by Chromium LUCI CQ
parent 2f3934ac8a
commit 5a58e05e80

@ -5841,7 +5841,8 @@ TEST_F(SSLClientSocketZeroRTTTest, EarlyDataReasonZeroRTT) {
// Check that we're correctly logging 0-rtt success when the handshake
// concludes during a Read.
TEST_F(SSLClientSocketZeroRTTTest, EarlyDataReasonReadServerHello) {
// Disabled due to flake, see crbug.com/1057921 .
TEST_F(SSLClientSocketZeroRTTTest, DISABLED_EarlyDataReasonReadServerHello) {
const char kReasonHistogram[] = "Net.SSLHandshakeEarlyDataReason";
ASSERT_TRUE(StartServer());
ASSERT_TRUE(RunInitialConnection());