Index: webrtc/api/webrtcsession_unittest.cc |
diff --git a/webrtc/api/webrtcsession_unittest.cc b/webrtc/api/webrtcsession_unittest.cc |
index 01db8ffca8a3db5efdf08b7253d44d29ad596ffe..088694cb16b6a07c5be0276be63e9423cf45e02c 100644 |
--- a/webrtc/api/webrtcsession_unittest.cc |
+++ b/webrtc/api/webrtcsession_unittest.cc |
@@ -109,8 +109,6 @@ |
static const char kMediaContentName1[] = "video"; |
static const int kIceCandidatesTimeout = 10000; |
-// STUN timeout with all retransmissions is a total of 9500ms. |
-static const int kStunTimeout = 9500; |
static const char kFakeDtlsFingerprint[] = |
"BB:CD:72:F7:2F:D0:BA:43:F3:68:B1:0C:23:72:B6:4A:" |
@@ -1506,9 +1504,13 @@ |
EXPECT_EQ(8u, observer_.mline_1_candidates_.size()); |
} |
-TEST_F(WebRtcSessionTest, TestStunError) { |
- rtc::ScopedFakeClock clock; |
- |
+// Crashes on Win only. See webrtc:5411. |
+#if defined(WEBRTC_WIN) |
+#define MAYBE_TestStunError DISABLED_TestStunError |
+#else |
+#define MAYBE_TestStunError TestStunError |
+#endif |
+TEST_F(WebRtcSessionTest, MAYBE_TestStunError) { |
AddInterface(rtc::SocketAddress(kClientAddrHost1, kClientAddrPort)); |
AddInterface(rtc::SocketAddress(kClientAddrHost2, kClientAddrPort)); |
fss_->AddRule(false, |
@@ -1519,12 +1521,9 @@ |
SendAudioVideoStream1(); |
InitiateCall(); |
// Since kClientAddrHost1 is blocked, not expecting stun candidates for it. |
- EXPECT_TRUE_SIMULATED_WAIT(observer_.oncandidatesready_, kStunTimeout, clock); |
+ EXPECT_TRUE_WAIT(observer_.oncandidatesready_, kIceCandidatesTimeout); |
EXPECT_EQ(6u, observer_.mline_0_candidates_.size()); |
EXPECT_EQ(6u, observer_.mline_1_candidates_.size()); |
- // Reset session before scoped fake clock goes out of scope to avoid TSan |
- // warning. |
- session_.reset(nullptr); |
} |
TEST_F(WebRtcSessionTest, SetSdpFailedOnInvalidSdp) { |