summaryrefslogtreecommitdiff
path: root/test/cctest
diff options
context:
space:
mode:
authorEugene Ostroukhov <eostroukhov@chromium.org>2017-06-19 10:37:27 -0700
committerEugene Ostroukhov <eostroukhov@chromium.org>2017-06-21 11:20:22 -0700
commit3d0ef562640d6dfb8da10653ba2fec3ebcb98cf3 (patch)
treed1cc05a2ba1c639a62ef9441970e1301f9f9438f /test/cctest
parent32c7f114c54190dbdfb5f21f1432cf6626777341 (diff)
downloadandroid-node-v8-3d0ef562640d6dfb8da10653ba2fec3ebcb98cf3.tar.gz
android-node-v8-3d0ef562640d6dfb8da10653ba2fec3ebcb98cf3.tar.bz2
android-node-v8-3d0ef562640d6dfb8da10653ba2fec3ebcb98cf3.zip
inspector, test: Fix test bug detected by Coverity
Error value was not checked. Turns out, uv_ip6_addr was actually called on malformed IP (square brackets should not have been included). PR-URL: https://github.com/nodejs/node/pull/13799 Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com>
Diffstat (limited to 'test/cctest')
-rw-r--r--test/cctest/test_inspector_socket_server.cc10
1 files changed, 6 insertions, 4 deletions
diff --git a/test/cctest/test_inspector_socket_server.cc b/test/cctest/test_inspector_socket_server.cc
index cd9e8f1cfc..a8c3bcd2f7 100644
--- a/test/cctest/test_inspector_socket_server.cc
+++ b/test/cctest/test_inspector_socket_server.cc
@@ -172,12 +172,14 @@ class SocketWrapper {
contents_.clear();
uv_tcp_init(loop_, &socket_);
union {sockaddr generic; sockaddr_in v4; sockaddr_in6 v6;} addr;
+ int err = 0;
if (v6) {
- uv_ip6_addr(host.c_str(), port, &addr.v6);
+ err = uv_ip6_addr(host.c_str(), port, &addr.v6);
} else {
- uv_ip4_addr(host.c_str(), port, &addr.v4);
+ err = uv_ip4_addr(host.c_str(), port, &addr.v4);
}
- int err = uv_tcp_connect(&connect_, &socket_, &addr.generic, Connected_);
+ ASSERT_EQ(0, err);
+ err = uv_tcp_connect(&connect_, &socket_, &addr.generic, Connected_);
ASSERT_EQ(0, err);
SPIN_WHILE(!connected_)
uv_read_start(reinterpret_cast<uv_stream_t*>(&socket_), AllocCallback,
@@ -618,7 +620,7 @@ TEST_F(InspectorSocketServerTest, BindsToIpV6) {
ASSERT_TRUE(server->Start());
SocketWrapper socket1(&loop);
- socket1.Connect("[::]", server.port(), true);
+ socket1.Connect("::", server.port(), true);
socket1.Write(WsHandshakeRequest(MAIN_TARGET_ID));
socket1.Expect(WS_HANDSHAKE_RESPONSE);
server->Stop(ServerHolder::CloseCallback);