On 26.02.13 21:56, Amos Jeffries wrote:
> I'm happy with the use-case too now. If the code adjusted to 3.HEAD
> still looks good I think it could go in.
I've attached a patch against 3.HEAD.  I've tested it, although I would 
appreciate it if you could double check that I'm using 
HttpRequest::Pointer correctly in client_side.cc.
As well as the spoof_client_ip ACL, this introduces a new request flag 
called interceptTproxy, which is set for all TPROXY requests.  The 
spoofClientIp flag is now only set for TPROXY requests that we want to 
spoof.
Many thanks.
-- 
  - Steve Hill
    Technical Director
    Opendium Limited     http://www.opendium.com
Direct contacts:
    Instant messager: xmpp:steve_at_opendium.com
    Email:            steve_at_opendium.com
    Phone:            sip:steve_at_opendium.com
Sales / enquiries contacts:
    Email:            sales_at_opendium.com
    Phone:            +44-844-9791439 / sip:sales_at_opendium.com
Support contacts:
    Email:            support_at_opendium.com
    Phone:            +44-844-4844916 / sip:support_at_opendium.com
This archive was generated by hypermail 2.2.0 : Fri Mar 01 2013 - 12:00:07 MST