Index: webrtc/api/peerconnection_unittest.cc |
diff --git a/webrtc/api/peerconnection_unittest.cc b/webrtc/api/peerconnection_unittest.cc |
index b213ecb00f70effed4f3209958fb5ac8a0b3f412..4876b40bc844ff925c00de81cfb302b45894512c 100644 |
--- a/webrtc/api/peerconnection_unittest.cc |
+++ b/webrtc/api/peerconnection_unittest.cc |
@@ -40,6 +40,7 @@ |
#include "webrtc/base/virtualsocketserver.h" |
#include "webrtc/media/engine/fakewebrtcvideoengine.h" |
#include "webrtc/p2p/base/p2pconstants.h" |
+#include "webrtc/p2p/base/portinterface.h" |
#include "webrtc/p2p/base/sessiondescription.h" |
#include "webrtc/p2p/base/testturnserver.h" |
#include "webrtc/p2p/client/basicportallocator.h" |
@@ -2619,11 +2620,21 @@ class IceServerParsingTest : public testing::Test { |
bool ParseUrl(const std::string& url, |
const std::string& username, |
const std::string& password) { |
+ return ParseUrl( |
+ url, username, password, |
+ PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicySecure); |
+ } |
+ |
+ bool ParseUrl(const std::string& url, |
+ const std::string& username, |
+ const std::string& password, |
+ PeerConnectionInterface::TlsCertPolicy tls_certificate_policy) { |
PeerConnectionInterface::IceServers servers; |
PeerConnectionInterface::IceServer server; |
server.urls.push_back(url); |
server.username = username; |
server.password = password; |
+ server.tls_cert_policy = tls_certificate_policy; |
servers.push_back(server); |
return webrtc::ParseIceServers(servers, &stun_servers_, &turn_servers_); |
} |
@@ -2655,6 +2666,18 @@ TEST_F(IceServerParsingTest, ParseStunPrefixes) { |
EXPECT_EQ(0U, stun_servers_.size()); |
EXPECT_EQ(1U, turn_servers_.size()); |
EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto); |
+ EXPECT_TRUE(turn_servers_[0].tls_cert_policy == |
+ cricket::TlsCertPolicy::TLS_CERT_POLICY_SECURE); |
+ turn_servers_.clear(); |
+ |
+ EXPECT_TRUE(ParseUrl( |
+ "turns:hostname", "", "", |
+ PeerConnectionInterface::TlsCertPolicy::kTlsCertPolicyInsecureNoCheck)); |
+ EXPECT_EQ(0U, stun_servers_.size()); |
+ EXPECT_EQ(1U, turn_servers_.size()); |
+ EXPECT_TRUE(turn_servers_[0].tls_cert_policy == |
+ cricket::TlsCertPolicy::TLS_CERT_POLICY_INSECURE_NO_CHECK); |
+ EXPECT_EQ(cricket::PROTO_TLS, turn_servers_[0].ports[0].proto); |
turn_servers_.clear(); |
// invalid prefixes |