8
8
9
9
static uv_loop_t loop;
10
10
11
+ static const char HOST[] = " 127.0.0.1" ;
12
+
11
13
static const char CLIENT_CLOSE_FRAME[] = " \x88\x80\x2D\x0E\x1E\xFA " ;
12
14
static const char SERVER_CLOSE_FRAME[] = " \x88\x00 " ;
13
15
@@ -249,7 +251,7 @@ class SocketWrapper {
249
251
}
250
252
251
253
static void Connected_ (uv_connect_t * connect, int status) {
252
- EXPECT_EQ (0 , status);
254
+ EXPECT_EQ (0 , status) << " Unable to connect: " << uv_strerror (status) ;
253
255
SocketWrapper* wrapper =
254
256
node::ContainerOf (&SocketWrapper::connect_, connect);
255
257
wrapper->connected_ = true ;
@@ -301,7 +303,7 @@ class ServerHolder {
301
303
template <typename Delegate>
302
304
ServerHolder (Delegate* delegate, int port, FILE* out = NULL )
303
305
: closed(false ), paused(false ), sessions_terminated(false ),
304
- server_ (delegate, port, out) {
306
+ server_ (delegate, HOST, port, out) {
305
307
delegate->Connect (&server_);
306
308
}
307
309
@@ -362,7 +364,7 @@ class ServerDelegateNoTargets : public SocketServerDelegate {
362
364
static void TestHttpRequest (int port, const std::string& path,
363
365
const std::string& expected_body) {
364
366
SocketWrapper socket (&loop);
365
- socket.Connect (" 0.0.0.0 " , port);
367
+ socket.Connect (HOST , port);
366
368
socket.TestHttpRequest (path, expected_body);
367
369
socket.Close ();
368
370
}
@@ -385,7 +387,7 @@ TEST_F(InspectorSocketServerTest, InspectorSessions) {
385
387
386
388
SocketWrapper well_behaved_socket (&loop);
387
389
// Regular connection
388
- well_behaved_socket.Connect (" 0.0.0.0 " , server.port ());
390
+ well_behaved_socket.Connect (HOST , server.port ());
389
391
well_behaved_socket.Write (WsHandshakeRequest (MAIN_TARGET_ID));
390
392
well_behaved_socket.Expect (WS_HANDSHAKE_RESPONSE);
391
393
@@ -408,7 +410,7 @@ TEST_F(InspectorSocketServerTest, InspectorSessions) {
408
410
409
411
// Declined connection
410
412
SocketWrapper declined_target_socket (&loop);
411
- declined_target_socket.Connect (" 127.0.0.1 " , server.port ());
413
+ declined_target_socket.Connect (HOST , server.port ());
412
414
declined_target_socket.Write (WsHandshakeRequest (UNCONNECTABLE_TARGET_ID));
413
415
declined_target_socket.Expect (" HTTP/1.0 400 Bad Request" );
414
416
declined_target_socket.ExpectEOF ();
@@ -417,7 +419,7 @@ TEST_F(InspectorSocketServerTest, InspectorSessions) {
417
419
418
420
// Bogus target - start session callback should not even be invoked
419
421
SocketWrapper bogus_target_socket (&loop);
420
- bogus_target_socket.Connect (" 127.0.0.1 " , server.port ());
422
+ bogus_target_socket.Connect (HOST , server.port ());
421
423
bogus_target_socket.Write (WsHandshakeRequest (" bogus_target" ));
422
424
bogus_target_socket.Expect (" HTTP/1.0 400 Bad Request" );
423
425
bogus_target_socket.ExpectEOF ();
@@ -426,7 +428,7 @@ TEST_F(InspectorSocketServerTest, InspectorSessions) {
426
428
427
429
// Drop connection (no proper close frames)
428
430
SocketWrapper dropped_connection_socket (&loop);
429
- dropped_connection_socket.Connect (" 127.0.0.1 " , server.port ());
431
+ dropped_connection_socket.Connect (HOST , server.port ());
430
432
dropped_connection_socket.Write (WsHandshakeRequest (MAIN_TARGET_ID));
431
433
dropped_connection_socket.Expect (WS_HANDSHAKE_RESPONSE);
432
434
@@ -440,7 +442,7 @@ TEST_F(InspectorSocketServerTest, InspectorSessions) {
440
442
441
443
// Reconnect regular connection
442
444
SocketWrapper stays_till_termination_socket (&loop);
443
- stays_till_termination_socket.Connect (" 127.0.0.1 " , server.port ());
445
+ stays_till_termination_socket.Connect (HOST , server.port ());
444
446
stays_till_termination_socket.Write (WsHandshakeRequest (MAIN_TARGET_ID));
445
447
stays_till_termination_socket.Expect (WS_HANDSHAKE_RESPONSE);
446
448
@@ -484,7 +486,7 @@ TEST_F(InspectorSocketServerTest, ServerWithoutTargets) {
484
486
485
487
// Declined connection
486
488
SocketWrapper socket (&loop);
487
- socket.Connect (" 0.0.0.0 " , server.port ());
489
+ socket.Connect (HOST , server.port ());
488
490
socket.Write (WsHandshakeRequest (UNCONNECTABLE_TARGET_ID));
489
491
socket.Expect (" HTTP/1.0 400 Bad Request" );
490
492
socket.ExpectEOF ();
@@ -512,7 +514,7 @@ TEST_F(InspectorSocketServerTest, StoppingServerDoesNotKillConnections) {
512
514
ServerHolder server (&delegate, 0 );
513
515
ASSERT_TRUE (server->Start (&loop));
514
516
SocketWrapper socket1 (&loop);
515
- socket1.Connect (" 0.0.0.0 " , server.port ());
517
+ socket1.Connect (HOST , server.port ());
516
518
socket1.TestHttpRequest (" /json/list" , " [ ]" );
517
519
server->Stop (ServerHolder::CloseCallback);
518
520
SPIN_WHILE (!server.closed );
0 commit comments