On 26.02.13 21:56, Amos Jeffries wrote:
> I'm happy with the use-case too now. If the code adjusted to 3.HEAD
> still looks good I think it could go in.
I've attached a patch against 3.HEAD. I've tested it, although I would
appreciate it if you could double check that I'm using
HttpRequest::Pointer correctly in client_side.cc.
As well as the spoof_client_ip ACL, this introduces a new request flag
called interceptTproxy, which is set for all TPROXY requests. The
spoofClientIp flag is now only set for TPROXY requests that we want to
spoof.
Many thanks.
-- - Steve Hill Technical Director Opendium Limited http://www.opendium.com Direct contacts: Instant messager: xmpp:steve_at_opendium.com Email: steve_at_opendium.com Phone: sip:steve_at_opendium.com Sales / enquiries contacts: Email: sales_at_opendium.com Phone: +44-844-9791439 / sip:sales_at_opendium.com Support contacts: Email: support_at_opendium.com Phone: +44-844-4844916 / sip:support_at_opendium.com
This archive was generated by hypermail 2.2.0 : Fri Mar 01 2013 - 12:00:07 MST