based on a patch from Saleem Abdulrasool.
https://bugzilla.gnome.org/show_bug.cgi?id=609489
do_callback_unref_test (void)
{
SoupServer *bad_server;
+ SoupAddress *addr;
SoupSession *session;
SoupMessage *one, *two;
GMainLoop *loop;
debug_printf (1, "\nCallback unref handling\n");
/* Get a guaranteed-bad URI */
- bad_server = soup_server_new (NULL, NULL);
+ addr = soup_address_new ("127.0.0.1", SOUP_ADDRESS_ANY_PORT);
+ soup_address_resolve_sync (addr, NULL);
+ bad_server = soup_server_new (SOUP_SERVER_INTERFACE, addr,
+ NULL);
+
bad_uri = g_strdup_printf ("http://127.0.0.1:%u/",
soup_server_get_port (bad_server));
g_object_unref (bad_server);
memset (&sin, 0, sizeof (sin));
sin.sin_family = AF_INET;
- sin.sin_addr.s_addr = INADDR_ANY;
+ sin.sin_addr.s_addr = ntohl (INADDR_LOOPBACK);
if (bind (listener, (struct sockaddr *) &sin, sizeof (sin)) == -1) {
SOCKET_PRINT_ERROR ("binding listening socket");
{
GMainContext *async_context;
const char *ssl_cert_file, *ssl_key_file;
+ SoupAddress *addr;
if (test_server)
test_server_shutdown ();
} else
ssl_cert_file = ssl_key_file = NULL;
- test_server = soup_server_new (SOUP_SERVER_ASYNC_CONTEXT, async_context,
+ addr = soup_address_new ("127.0.0.1", SOUP_ADDRESS_ANY_PORT);
+ soup_address_resolve_sync (addr, NULL);
+
+ test_server = soup_server_new (SOUP_SERVER_INTERFACE, addr,
+ SOUP_SERVER_ASYNC_CONTEXT, async_context,
SOUP_SERVER_SSL_CERT_FILE, ssl_cert_file,
SOUP_SERVER_SSL_KEY_FILE, ssl_key_file,
NULL);