------------------------------------------------------------ revno: 13401 revision-id: squidadm@squid-cache.org-20140507144005-hdwjmfjo5vtu0ljq parent: squid3@treenet.co.nz-20140507101042-9toxwq1997f7178l committer: Automatic source maintenance branch nick: trunk timestamp: Wed 2014-05-07 08:40:05 -0600 message: SourceFormat Enforcement ------------------------------------------------------------ # Bazaar merge directive format 2 (Bazaar 0.90) # revision_id: squidadm@squid-cache.org-20140507144005-\ # hdwjmfjo5vtu0ljq # target_branch: http://bzr.squid-cache.org/bzr/squid3/trunk/ # testament_sha1: 9c218c26d0300c54720e0884ad095b0e5f9992b3 # timestamp: 2014-05-07 14:53:49 +0000 # source_branch: http://bzr.squid-cache.org/bzr/squid3/trunk/ # base_revision_id: squid3@treenet.co.nz-20140507101042-\ # 9toxwq1997f7178l # # Begin patch === modified file 'errors/language.list' --- errors/language.list 2013-09-29 18:37:10 +0000 +++ errors/language.list 2014-05-07 14:40:05 +0000 @@ -20,6 +20,7 @@ id.lang \ it.lang \ ja.lang \ + ka.lang \ ko.lang \ lt.lang \ lv.lang \ === modified file 'helpers/basic_auth/NIS/basic_nis_auth.cc' --- helpers/basic_auth/NIS/basic_nis_auth.cc 2014-03-23 02:56:12 +0000 +++ helpers/basic_auth/NIS/basic_nis_auth.cc 2014-05-07 14:40:05 +0000 @@ -73,7 +73,8 @@ /* Password incorrect */ printf("ERR Wrong password\n"); #else - } else { + } + else { /* Password incorrect */ printf("BH message=\"Missing crypto capability\"\n"); #endif === modified file 'src/FwdState.cc' --- src/FwdState.cc 2014-04-30 10:50:09 +0000 +++ src/FwdState.cc 2014-05-07 14:40:05 +0000 @@ -64,8 +64,8 @@ #include "mgr/Registration.h" #include "neighbors.h" #include "pconn.h" +#include "PeerPoolMgr.h" #include "PeerSelectState.h" -#include "PeerPoolMgr.h" #include "SquidConfig.h" #include "SquidTime.h" #include "Store.h" @@ -104,13 +104,14 @@ typedef void (FwdState::*Method)(Ssl::PeerConnectorAnswer &); FwdStatePeerAnswerDialer(Method method, FwdState *fwd): - method_(method), fwd_(fwd), answer_() {} + method_(method), fwd_(fwd), answer_() {} /* CallDialer API */ virtual bool canDial(AsyncCall &call) { return fwd_.valid(); } void dial(AsyncCall &call) { ((&(*fwd_))->*method_)(answer_); } virtual void print(std::ostream &os) const { - os << '(' << fwd_.get() << ", " << answer_ << ')'; } + os << '(' << fwd_.get() << ", " << answer_ << ')'; + } /* Ssl::PeerConnector::CbDialer API */ virtual Ssl::PeerConnectorAnswer &answer() { return answer_; } @@ -122,7 +123,6 @@ }; #endif - void FwdState::abort(void* d) { @@ -707,8 +707,8 @@ HttpRequest::Pointer requestPointer = request; AsyncCall::Pointer callback = asyncCall(17,4, - "FwdState::ConnectedToPeer", - FwdStatePeerAnswerDialer(&FwdState::connectedToPeer, this)); + "FwdState::ConnectedToPeer", + FwdStatePeerAnswerDialer(&FwdState::connectedToPeer, this)); Ssl::PeerConnector *connector = new Ssl::PeerConnector(requestPointer, serverConnection(), callback); AsyncJob::Start(connector); // will call our callback === modified file 'src/PeerPoolMgr.cc' --- src/PeerPoolMgr.cc 2014-04-30 10:50:09 +0000 +++ src/PeerPoolMgr.cc 2014-05-07 14:40:05 +0000 @@ -26,7 +26,7 @@ { public: MyAnswerDialer(const JobPointer &aJob, Method aMethod): - UnaryMemFunT(aJob, aMethod, Ssl::PeerConnectorAnswer()) {} + UnaryMemFunT(aJob, aMethod, Ssl::PeerConnectorAnswer()) {} /* Ssl::PeerConnector::CbDialer API */ virtual Ssl::PeerConnectorAnswer &answer() { return arg1; } @@ -68,7 +68,8 @@ } bool -PeerPoolMgr::validPeer() const { +PeerPoolMgr::validPeer() const +{ return peer && cbdataReferenceValid(peer) && peer->standby.pool; } === modified file 'src/PeerPoolMgr.h' --- src/PeerPoolMgr.h 2014-04-30 10:50:09 +0000 +++ src/PeerPoolMgr.h 2014-05-07 14:40:05 +0000 @@ -9,8 +9,9 @@ class CommConnectCbParams; #if USE_OPENSSL -namespace Ssl { - class PeerConnectorAnswer; +namespace Ssl +{ +class PeerConnectorAnswer; } #endif === modified file 'src/acl/Ip.cc' --- src/acl/Ip.cc 2014-04-12 09:11:20 +0000 +++ src/acl/Ip.cc 2014-05-07 14:40:05 +0000 @@ -111,7 +111,6 @@ return SBuf(tmpbuf); } - /* * aclIpAddrNetworkCompare - The guts of the comparison for IP ACLs * matching checks. The first argument (p) is a "host" address, === modified file 'src/cache_cf.cc' --- src/cache_cf.cc 2014-04-30 10:50:09 +0000 +++ src/cache_cf.cc 2014-05-07 14:40:05 +0000 @@ -4828,7 +4828,7 @@ bool ftpEpsvIsDeprecatedRule = false; char *t = ConfigParser::PeekAtToken(); - if (!t){ + if (!t) { self_destruct(); return; } @@ -4848,7 +4848,7 @@ // 2) if this line is "ftp_epsv on|off" and already exist rules of "ftp_epsv allow|deny ..." // then abort if ((!ftpEpsvIsDeprecatedRule && FtpEspvDeprecated) || - (ftpEpsvIsDeprecatedRule && !FtpEspvDeprecated && *ftp_epsv != NULL)) { + (ftpEpsvIsDeprecatedRule && !FtpEspvDeprecated && *ftp_epsv != NULL)) { debugs(3, DBG_CRITICAL, "FATAL: do not mix \"ftp_epsv on|off\" cfg lines with \"ftp_epsv allow|deny ...\" cfg lines. Update your ftp_epsv rules."); self_destruct(); } === modified file 'src/cbdata.cc' --- src/cbdata.cc 2014-02-21 10:46:19 +0000 +++ src/cbdata.cc 2014-05-07 14:40:05 +0000 @@ -48,9 +48,9 @@ #include "squid.h" #include "cbdata.h" +#include "Generic.h" #include "mgr/Registration.h" #include "Store.h" -#include "Generic.h" #include #if USE_CBDATA_DEBUG === modified file 'src/cf_gen.cc' --- src/cf_gen.cc 2014-03-15 02:50:12 +0000 +++ src/cf_gen.cc 2014-05-07 14:40:05 +0000 @@ -874,11 +874,11 @@ for (int i = 0; i < var.length(); ++i) { switch (var[i]) { - case '"': - case '\\': - esc += '\\'; - default: - esc += var[i]; + case '"': + case '\\': + esc += '\\'; + default: + esc += var[i]; } } === modified file 'src/errorpage.cc' --- src/errorpage.cc 2014-04-27 07:59:17 +0000 +++ src/errorpage.cc 2014-05-07 14:40:05 +0000 @@ -573,7 +573,7 @@ { assert(request); const Http::StatusCode status = request->flags.needValidation ? - Http::scGatewayTimeout : Http::scServiceUnavailable; + Http::scGatewayTimeout : Http::scServiceUnavailable; return new ErrorState(type, status, request); } @@ -950,8 +950,8 @@ case 'M': if (request) { - const SBuf &m = request->method.image(); - mb.append(m.rawContent(), m.length()); + const SBuf &m = request->method.image(); + mb.append(m.rawContent(), m.length()); } else if (!building_deny_info_url) p = "[unknown method]"; break; === modified file 'src/eui/Eui64.cc' --- src/eui/Eui64.cc 2014-04-14 06:50:31 +0000 +++ src/eui/Eui64.cc 2014-05-07 14:40:05 +0000 @@ -19,8 +19,8 @@ Eui::Eui64::decode(const char *asc) { if (eui64_aton(asc, (struct eui64 *)eui) != 0) { - debugs(28, 4, "id=" << (void*)this << " decode fail on " << asc); - return false; + debugs(28, 4, "id=" << (void*)this << " decode fail on " << asc); + return false; } debugs(28, 4, "id=" << (void*)this << " ATON decoded " << asc); === modified file 'src/external_acl.cc' --- src/external_acl.cc 2014-05-07 10:05:58 +0000 +++ src/external_acl.cc 2014-05-07 14:40:05 +0000 @@ -990,13 +990,12 @@ str = request->urlpath.termedBuf(); break; - case Format::LFT_CLIENT_REQ_METHOD: - { - const SBuf &s = request->method.image(); - sb.append(s.rawContent(), s.length()); - } - str = sb.termedBuf(); - break; + case Format::LFT_CLIENT_REQ_METHOD: { + const SBuf &s = request->method.image(); + sb.append(s.rawContent(), s.length()); + } + str = sb.termedBuf(); + break; case Format::LFT_ADAPTED_REQUEST_HEADER: if (format->header_id == -1) === modified file 'src/format/Format.cc' --- src/format/Format.cc 2014-05-07 10:05:58 +0000 +++ src/format/Format.cc 2014-05-07 14:40:05 +0000 @@ -1185,10 +1185,10 @@ out = "%"; break; - // XXX: external_acl_type format tokens which are not output by logformat. - // They are listed here because the switch requires - // every ByteCode_t to be explicitly enumerated. - // But do not output due to lack of access to the values. + // XXX: external_acl_type format tokens which are not output by logformat. + // They are listed here because the switch requires + // every ByteCode_t to be explicitly enumerated. + // But do not output due to lack of access to the values. case LFT_EXT_ACL_USER_CERT_RAW: case LFT_EXT_ACL_USER_CERTCHAIN_RAW: case LFT_EXT_ACL_USER_CERT: === modified file 'src/format/Token.cc' --- src/format/Token.cc 2014-05-07 10:05:58 +0000 +++ src/format/Token.cc 2014-05-07 14:40:05 +0000 @@ -549,24 +549,22 @@ } Format::Token::Token() : type(LFT_NONE), - label(NULL), - widthMin(-1), - widthMax(-1), - quote(LOG_QUOTE_NONE), - left(false), - space(false), - zero(false), - divisor(1), - next(NULL) + label(NULL), + widthMin(-1), + widthMax(-1), + quote(LOG_QUOTE_NONE), + left(false), + space(false), + zero(false), + divisor(1), + next(NULL) { data.string = NULL; - data.header.header = NULL; + data.header.header = NULL; data.header.element = NULL; data.header.separator = ','; } - - Format::Token::~Token() { label = NULL; // drop reference to global static. === modified file 'src/ftp.cc' --- src/ftp.cc 2014-04-27 07:59:17 +0000 +++ src/ftp.cc 2014-05-07 14:40:05 +0000 @@ -2590,7 +2590,7 @@ } } } - break; + break; } ftpState->writeCommand(cbuf); === modified file 'src/http/StatusCode.cc' --- src/http/StatusCode.cc 2014-03-31 06:57:27 +0000 +++ src/http/StatusCode.cc 2014-05-07 14:40:05 +0000 @@ -7,12 +7,12 @@ { switch (status) { - // 000 + // 000 case Http::scNone: return "Init"; /* we init .status with code 0 */ break; - // 100-199 + // 100-199 case Http::scContinue: return "Continue"; break; @@ -25,7 +25,7 @@ return "Processing"; break; - // 200-299 + // 200-299 case Http::scOkay: return "OK"; break; @@ -66,7 +66,7 @@ return "IM Used"; break; - // 300-399 + // 300-399 case Http::scMultipleChoices: return "Multiple Choices"; break; @@ -99,7 +99,7 @@ return "Permanent Redirect"; break; - // 400-499 + // 400-499 case Http::scBadRequest: return "Bad Request"; break; @@ -200,7 +200,7 @@ return "Request Header Fields Too Large"; break; - // 500-599 + // 500-599 case Http::scInternalServerError: return "Internal Server Error"; break; @@ -245,7 +245,7 @@ return "Network Authentication Required"; break; - // 600+ + // 600+ case Http::scInvalidHeader: case Http::scHeaderTooLarge: // fall through to default. === modified file 'src/main.cc' --- src/main.cc 2014-04-21 05:13:31 +0000 +++ src/main.cc 2014-05-07 14:40:05 +0000 @@ -497,7 +497,7 @@ fatal("Need to add -DMALLOC_DBG when compiling to use -mX option"); #endif - } + } break; case 'n': === modified file 'src/pconn.h' --- src/pconn.h 2014-04-30 10:50:09 +0000 +++ src/pconn.h 2014-05-07 14:40:05 +0000 @@ -120,7 +120,7 @@ * A caller with a non-retriable transaction should set keepOpen to false * and call pop() anyway, even though the caller does not want a pconn. * This forces us to close an available persistent connection, avoiding - * creating a growing number of open connections when many transactions + * creating a growing number of open connections when many transactions * create (and push) persistent connections but are not retriable and, * hence, do not need to pop a connection. */ === modified file 'src/ssl/PeerConnector.cc' --- src/ssl/PeerConnector.cc 2014-04-30 13:41:39 +0000 +++ src/ssl/PeerConnector.cc 2014-05-07 14:40:05 +0000 @@ -14,6 +14,7 @@ #include "globals.h" #include "HttpRequest.h" #include "neighbors.h" +#include "SquidConfig.h" #include "ssl/cert_validate_message.h" #include "ssl/Config.h" #include "ssl/ErrorDetail.h" @@ -21,7 +22,6 @@ #include "ssl/PeerConnector.h" #include "ssl/ServerBump.h" #include "ssl/support.h" -#include "SquidConfig.h" CBDATA_NAMESPACED_CLASS_INIT(Ssl, PeerConnector); @@ -29,10 +29,10 @@ HttpRequestPointer &aRequest, const Comm::ConnectionPointer &aServerConn, AsyncCall::Pointer &aCallback): - AsyncJob("Ssl::PeerConnector"), - request(aRequest), - serverConn(aServerConn), - callback(aCallback) + AsyncJob("Ssl::PeerConnector"), + request(aRequest), + serverConn(aServerConn), + callback(aCallback) { // if this throws, the caller's cb dialer is not our CbDialer Must(dynamic_cast(callback->getDialer())); @@ -378,38 +378,38 @@ int ssl_error = SSL_get_error(ssl, ret); #ifdef EPROTO - int sysErrNo = EPROTO; + int sysErrNo = EPROTO; #else - int sysErrNo = EACCES; + int sysErrNo = EACCES; #endif - switch (ssl_error) { - - case SSL_ERROR_WANT_READ: - Comm::SetSelect(fd, COMM_SELECT_READ, &NegotiateSsl, this, 0); - return; - - case SSL_ERROR_WANT_WRITE: - Comm::SetSelect(fd, COMM_SELECT_WRITE, &NegotiateSsl, this, 0); - return; - - case SSL_ERROR_SSL: - case SSL_ERROR_SYSCALL: - ssl_lib_error = ERR_get_error(); - - // store/report errno when ssl_error is SSL_ERROR_SYSCALL, ssl_lib_error is 0, and ret is -1 - if (ssl_error == SSL_ERROR_SYSCALL && ret == -1 && ssl_lib_error == 0) - sysErrNo = errno; - - debugs(83, DBG_IMPORTANT, "Error negotiating SSL on FD " << fd << - ": " << ERR_error_string(ssl_lib_error, NULL) << " (" << - ssl_error << "/" << ret << "/" << errno << ")"); - - break; // proceed to the general error handling code - - default: - break; // no special error handling for all other errors - } + switch (ssl_error) { + + case SSL_ERROR_WANT_READ: + Comm::SetSelect(fd, COMM_SELECT_READ, &NegotiateSsl, this, 0); + return; + + case SSL_ERROR_WANT_WRITE: + Comm::SetSelect(fd, COMM_SELECT_WRITE, &NegotiateSsl, this, 0); + return; + + case SSL_ERROR_SSL: + case SSL_ERROR_SYSCALL: + ssl_lib_error = ERR_get_error(); + + // store/report errno when ssl_error is SSL_ERROR_SYSCALL, ssl_lib_error is 0, and ret is -1 + if (ssl_error == SSL_ERROR_SYSCALL && ret == -1 && ssl_lib_error == 0) + sysErrNo = errno; + + debugs(83, DBG_IMPORTANT, "Error negotiating SSL on FD " << fd << + ": " << ERR_error_string(ssl_lib_error, NULL) << " (" << + ssl_error << "/" << ret << "/" << errno << ")"); + + break; // proceed to the general error handling code + + default: + break; // no special error handling for all other errors + } ErrorState *const anErr = ErrorState::NewForwarding(ERR_SECURE_CONNECT_FAIL, request.getRaw()); anErr->xerrno = sysErrNo; @@ -501,7 +501,6 @@ ScheduleCallHere(cb); } - void Ssl::PeerConnector::swanSong() { === modified file 'src/ssl/PeerConnector.h' --- src/ssl/PeerConnector.h 2014-04-30 13:41:39 +0000 +++ src/ssl/PeerConnector.h 2014-05-07 14:40:05 +0000 @@ -29,22 +29,24 @@ #ifndef SQUID_SSL_PEER_CONNECTOR_H #define SQUID_SSL_PEER_CONNECTOR_H +#include "base/AsyncCbdataCalls.h" #include "base/AsyncJob.h" -#include "base/AsyncCbdataCalls.h" #include "ssl/support.h" #include class HttpRequest; class ErrorState; -namespace Ssl { +namespace Ssl +{ class ErrorDetail; class CertValidationResponse; /// PeerConnector results (supplied via a callback). /// The connection to peer was secured if and only if the error member is nil. -class PeerConnectorAnswer { +class PeerConnectorAnswer +{ public: ~PeerConnectorAnswer(); ///< deletes error if it is still set Comm::ConnectionPointer conn; ///< peer connection (secured on success) @@ -80,12 +82,13 @@ \par * This job never closes the connection, even on errors. If a 3rd-party * closes the connection, this job simply quits without informing the caller. -*/ +*/ class PeerConnector: virtual public AsyncJob { public: /// Callback dialier API to allow PeerConnector to set the answer. - class CbDialer { + class CbDialer + { public: virtual ~CbDialer() {} /// gives PeerConnector access to the in-dialer answer @@ -137,7 +140,7 @@ /// mimics FwdState to minimize changes to FwdState::initiate/negotiateSsl Comm::ConnectionPointer const &serverConnection() const { return serverConn; } - void bail(ErrorState *error); ///< Return an error to the PeerConnector caller + void bail(ErrorState *error); ///< Return an error to the PeerConnector caller /// Callback the caller class, and pass the ready to communicate secure /// connection or an error if PeerConnector failed. === modified file 'src/tests/Stub.list' --- src/tests/Stub.list 2014-02-08 13:36:42 +0000 +++ src/tests/Stub.list 2014-05-07 14:40:05 +0000 @@ -54,6 +54,7 @@ tests/stub_mem.cc \ tests/stub_mem_node.cc \ tests/stub_mime.cc \ + tests/stub_neighbors.cc \ tests/stub_pconn.cc \ tests/stub_redirect.cc \ tests/stub_stat.cc \ === modified file 'src/tunnel.cc' --- src/tunnel.cc 2014-04-25 13:38:22 +0000 +++ src/tunnel.cc 2014-05-07 14:40:05 +0000 @@ -175,13 +175,14 @@ typedef void (TunnelStateData::*Method)(Ssl::PeerConnectorAnswer &); MyAnswerDialer(Method method, TunnelStateData *tunnel): - method_(method), tunnel_(tunnel), answer_() {} + method_(method), tunnel_(tunnel), answer_() {} /* CallDialer API */ virtual bool canDial(AsyncCall &call) { return tunnel_.valid(); } void dial(AsyncCall &call) { ((&(*tunnel_))->*method_)(answer_); } virtual void print(std::ostream &os) const { - os << '(' << tunnel_.get() << ", " << answer_ << ')'; } + os << '(' << tunnel_.get() << ", " << answer_ << ')'; + } /* Ssl::PeerConnector::CbDialer API */ virtual Ssl::PeerConnectorAnswer &answer() { return answer_; } @@ -947,15 +948,16 @@ } void -TunnelStateData::connectToPeer() { +TunnelStateData::connectToPeer() +{ const Comm::ConnectionPointer &srv = server.conn; #if USE_OPENSSL if (CachePeer *p = srv->getPeer()) { if (p->use_ssl) { AsyncCall::Pointer callback = asyncCall(5,4, - "TunnelStateData::ConnectedToPeer", - MyAnswerDialer(&TunnelStateData::connectedToPeer, this)); + "TunnelStateData::ConnectedToPeer", + MyAnswerDialer(&TunnelStateData::connectedToPeer, this)); Ssl::PeerConnector *connector = new Ssl::PeerConnector(request, srv, callback); AsyncJob::Start(connector); // will call our callback === modified file 'src/url.cc' --- src/url.cc 2014-04-27 07:59:17 +0000 +++ src/url.cc 2014-05-07 14:40:05 +0000 @@ -508,21 +508,20 @@ snprintf(urlbuf, MAX_URL, "%s:%d", request->GetHost(), request->port); break; - default: - { - portbuf[0] = '\0'; - - if (request->port != urlDefaultPort(request->url.getScheme())) - snprintf(portbuf, 32, ":%d", request->port); - - snprintf(urlbuf, MAX_URL, "%s://%s%s%s%s" SQUIDSTRINGPH, - request->url.getScheme().c_str(), - request->login, - *request->login ? "@" : null_string, - request->GetHost(), - portbuf, - SQUIDSTRINGPRINT(request->urlpath)); - } + default: { + portbuf[0] = '\0'; + + if (request->port != urlDefaultPort(request->url.getScheme())) + snprintf(portbuf, 32, ":%d", request->port); + + snprintf(urlbuf, MAX_URL, "%s://%s%s%s%s" SQUIDSTRINGPH, + request->url.getScheme().c_str(), + request->login, + *request->login ? "@" : null_string, + request->GetHost(), + portbuf, + SQUIDSTRINGPRINT(request->urlpath)); + } } } @@ -551,36 +550,35 @@ snprintf(buf, MAX_URL, "%s:%d", request->GetHost(), request->port); break; - default: - { - portbuf[0] = '\0'; - - if (request->port != urlDefaultPort(request->url.getScheme())) - snprintf(portbuf, 32, ":%d", request->port); - - loginbuf[0] = '\0'; - - if ((int) strlen(request->login) > 0) { - strcpy(loginbuf, request->login); - - if ((t = strchr(loginbuf, ':'))) - *t = '\0'; - - strcat(loginbuf, "@"); - } - - snprintf(buf, MAX_URL, "%s://%s%s%s" SQUIDSTRINGPH, - request->url.getScheme().c_str(), - loginbuf, - request->GetHost(), - portbuf, - SQUIDSTRINGPRINT(request->urlpath)); - - // strip arguments AFTER a question-mark - if (Config.onoff.strip_query_terms) - if ((t = strchr(buf, '?'))) - *(++t) = '\0'; + default: { + portbuf[0] = '\0'; + + if (request->port != urlDefaultPort(request->url.getScheme())) + snprintf(portbuf, 32, ":%d", request->port); + + loginbuf[0] = '\0'; + + if ((int) strlen(request->login) > 0) { + strcpy(loginbuf, request->login); + + if ((t = strchr(loginbuf, ':'))) + *t = '\0'; + + strcat(loginbuf, "@"); } + + snprintf(buf, MAX_URL, "%s://%s%s%s" SQUIDSTRINGPH, + request->url.getScheme().c_str(), + loginbuf, + request->GetHost(), + portbuf, + SQUIDSTRINGPRINT(request->urlpath)); + + // strip arguments AFTER a question-mark + if (Config.onoff.strip_query_terms) + if ((t = strchr(buf, '?'))) + *(++t) = '\0'; + } } } === modified file 'tools/squidclient/Transport.h' --- tools/squidclient/Transport.h 2014-04-18 15:47:24 +0000 +++ tools/squidclient/Transport.h 2014-05-07 14:40:05 +0000 @@ -17,12 +17,11 @@ { public: TheConfig() : - ioTimeout(120), - localHost(NULL), - port(CACHE_HTTP_PORT), - tlsEnabled(false), - tlsAnonymous(false) - { + ioTimeout(120), + localHost(NULL), + port(CACHE_HTTP_PORT), + tlsEnabled(false), + tlsAnonymous(false) { params = "NORMAL"; hostname = "localhost"; } === modified file 'tools/squidclient/squidclient.cc' --- tools/squidclient/squidclient.cc 2014-04-19 12:12:06 +0000 +++ tools/squidclient/squidclient.cc 2014-05-07 14:40:05 +0000 @@ -122,13 +122,13 @@ << "Usage: " << progname << " [Basic Options] [HTTP Options]" << std::endl << std::endl; std::cerr - << " -s | --quiet Silent. Do not print response message to stdout." << std::endl - << " -v | --verbose Verbose debugging. Repeat (-vv) to increase output level." << std::endl - << " Levels:" << std::endl - << " 1 - Print outgoing request message to stderr." << std::endl - << " 2 - Print action trace to stderr." << std::endl - << " --help Display this help text." << std::endl - << std::endl; + << " -s | --quiet Silent. Do not print response message to stdout." << std::endl + << " -v | --verbose Verbose debugging. Repeat (-vv) to increase output level." << std::endl + << " Levels:" << std::endl + << " 1 - Print outgoing request message to stderr." << std::endl + << " 2 - Print action trace to stderr." << std::endl + << " --help Display this help text." << std::endl + << std::endl; Transport::Config.usage(); Ping::Config.usage(); std::cerr