From: Amos Jeffries Date: Tue, 27 May 2008 13:23:13 +0000 (-0600) Subject: Bootstrap and build test fallout X-Git-Tag: SQUID_3_0_STABLE7~24 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=4d18a5b92c4e21be38a5eb00124cefc4685f2c5b;p=thirdparty%2Fsquid.git Bootstrap and build test fallout --- diff --git a/src/cache_cf.cc b/src/cache_cf.cc index 42814a8110..8756b4a9bc 100644 --- a/src/cache_cf.cc +++ b/src/cache_cf.cc @@ -2877,16 +2877,16 @@ parse_http_port_option(http_port_list * s, char *token) } else if (strcmp(token, "transparent") == 0) { s->transparent = 1; /* Log information regarding the port modes under interception. */ - debugs(3, 1, "Starting Authentication on port " << s->s); - debugs(3, 1, "Disabling Authentication on port " << s->s << " (interception enabled)"); + debugs(3, 1, "Starting Authentication on port " << inet_ntoa(s->s.sin_addr) << ":" << s->s.sin_port); + debugs(3, 1, "Disabling Authentication on port " << inet_ntoa(s->s.sin_addr) << ":" << s->s.sin_port << " (interception enabled)"); #if LINUX_TPROXY } else if (strcmp(token, "tproxy") == 0) { s->tproxy = 1; need_linux_tproxy = 1; /* Log information regarding the port modes under transparency. */ - debugs(3, 1, "Starting IP Spoofing on port " << s->s); - debugs(3, 1, "Disabling Authentication on port " << s->s << " (IP spoofing enabled)"); + debugs(3, 1, "Starting IP Spoofing on port " << inet_ntoa(s->s.sin_addr) << ":" << s->s.sin_port); + debugs(3, 1, "Disabling Authentication on port " << inet_ntoa(s->s.sin_addr) << ":" << s->s.sin_port << " (IP spoofing enabled)"); #endif } else { diff --git a/test-suite/Makefile.in b/test-suite/Makefile.in index 6e10c7a12c..a5c22091c7 100644 --- a/test-suite/Makefile.in +++ b/test-suite/Makefile.in @@ -379,6 +379,7 @@ AUTOMAKE_OPTIONS = subdir-objects AM_CFLAGS = @SQUID_CFLAGS@ AM_CXXFLAGS = @SQUID_CXXFLAGS@ INCLUDES = -I. -I$(srcdir) -I$(top_builddir)/include -I$(top_srcdir)/include -I$(top_srcdir)/src +EXTRA_DIST = testheaders.sh ESI_ALL_TESTS = \ ESIExpressions