trafficserver-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bc...@apache.org
Subject [trafficserver] branch master updated: Ran clang-tidy over the code to use nullptr
Date Thu, 13 Apr 2017 03:59:45 GMT
This is an automated email from the ASF dual-hosted git repository.

bcall pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficserver.git

The following commit(s) were added to refs/heads/master by this push:
       new  a2f4cb9   Ran clang-tidy over the code to use nullptr
a2f4cb9 is described below

commit a2f4cb94cea4420cad3ac235ef6b3b19fb8d030a
Author: Bryan Call <bcall@apache.org>
AuthorDate: Thu Apr 6 08:30:03 2017 -0700

    Ran clang-tidy over the code to use nullptr
---
 cmd/traffic_cop/traffic_cop.cc                      | 8 ++++----
 example/replace-protoset/replace-protoset.cc        | 4 ++--
 iocore/net/UnixNet.cc                               | 2 +-
 lib/bindings/bindings.cc                            | 2 +-
 lib/ts/ink_cap.cc                                   | 2 +-
 mgmt/LocalManager.cc                                | 4 ++--
 mgmt/RecordsConfig.cc                               | 2 +-
 plugins/experimental/buffer_upload/buffer_upload.cc | 4 ++--
 plugins/experimental/mysql_remap/mysql_remap.cc     | 4 ++--
 plugins/header_rewrite/conditions.cc                | 2 +-
 plugins/tcpinfo/tcpinfo.cc                          | 8 ++++----
 proxy/CoreUtils.cc                                  | 2 +-
 proxy/InkAPI.cc                                     | 2 +-
 proxy/Main.cc                                       | 6 +++---
 proxy/ParentConsistentHash.cc                       | 2 +-
 proxy/ParentRoundRobin.cc                           | 2 +-
 proxy/http/HttpBodyFactory.cc                       | 2 +-
 proxy/http/HttpSM.cc                                | 6 +++---
 proxy/http/HttpTransact.cc                          | 2 +-
 proxy/http2/Http2ConnectionState.cc                 | 6 +++---
 proxy/http2/Http2Stream.cc                          | 2 +-
 proxy/logging/LogHost.cc                            | 2 +-
 22 files changed, 38 insertions(+), 38 deletions(-)

diff --git a/cmd/traffic_cop/traffic_cop.cc b/cmd/traffic_cop/traffic_cop.cc
index 9aaf88b..1154062 100644
--- a/cmd/traffic_cop/traffic_cop.cc
+++ b/cmd/traffic_cop/traffic_cop.cc
@@ -935,7 +935,7 @@ getaddrinfo_error:
 }
 
 static int
-test_port(int port, const char *request, char *buffer, int bufsize, int64_t test_timeout,
const char *ip = NULL,
+test_port(int port, const char *request, char *buffer, int bufsize, int64_t test_timeout,
const char *ip = nullptr,
           const char *ip_to_bind = nullptr)
 {
   int64_t start_time, timeout;
@@ -1520,11 +1520,11 @@ check_memory()
     if ((fp = fopen("/proc/meminfo", "r"))) {
       while (fgets(buf, sizeof buf, fp)) {
         if (strncmp(buf, "MemFree:", sizeof "MemFree:" - 1) == 0)
-          memfree = strtoll(buf + sizeof "MemFree:" - 1, 0, 10);
+          memfree = strtoll(buf + sizeof "MemFree:" - 1, nullptr, 10);
         else if (strncmp(buf, "SwapFree:", sizeof "SwapFree:" - 1) == 0)
-          swapfree = strtoll(buf + sizeof "SwapFree:" - 1, 0, 10);
+          swapfree = strtoll(buf + sizeof "SwapFree:" - 1, nullptr, 10);
         else if (strncmp(buf, "SwapTotal:", sizeof "SwapTotal:" - 1) == 0)
-          swapsize = strtoll(buf + sizeof "SwapTotal:" - 1, 0, 10);
+          swapsize = strtoll(buf + sizeof "SwapTotal:" - 1, nullptr, 10);
       }
       fclose(fp);
       // simple heuristic for linux
diff --git a/example/replace-protoset/replace-protoset.cc b/example/replace-protoset/replace-protoset.cc
index bfd4dbc..2f2bbe9 100644
--- a/example/replace-protoset/replace-protoset.cc
+++ b/example/replace-protoset/replace-protoset.cc
@@ -118,8 +118,8 @@ TSPluginInit(int argc, char const *argv[])
     _table.emplace(std::string(argv[i], strlen(argv[i])));
   }
   // This should not modify any state so no lock is needed.
-  TSCont cb_sni    = TSContCreate(&CB_SNI, NULL);
-  TSCont cb_netacc = TSContCreate(&CB_NetAcceptReady, NULL);
+  TSCont cb_sni    = TSContCreate(&CB_SNI, nullptr);
+  TSCont cb_netacc = TSContCreate(&CB_NetAcceptReady, nullptr);
 
   TSHttpHookAdd(TS_SSL_SERVERNAME_HOOK, cb_sni);
   TSLifecycleHookAdd(TS_LIFECYCLE_PORTS_READY_HOOK, cb_netacc);
diff --git a/iocore/net/UnixNet.cc b/iocore/net/UnixNet.cc
index c7f1798..b574032 100644
--- a/iocore/net/UnixNet.cc
+++ b/iocore/net/UnixNet.cc
@@ -243,7 +243,7 @@ initialize_thread_for_net(EThread *thread)
   thread->ep          = (EventIO *)ats_malloc(sizeof(EventIO));
   thread->ep->type    = EVENTIO_ASYNC_SIGNAL;
 #if HAVE_EVENTFD
-  thread->ep->start(pd, thread->evfd, 0, EVENTIO_READ);
+  thread->ep->start(pd, thread->evfd, nullptr, EVENTIO_READ);
 #else
   thread->ep->start(pd, thread->evpipe[0], nullptr, EVENTIO_READ);
 #endif
diff --git a/lib/bindings/bindings.cc b/lib/bindings/bindings.cc
index 02d273b..a50e951 100644
--- a/lib/bindings/bindings.cc
+++ b/lib/bindings/bindings.cc
@@ -265,7 +265,7 @@ BindingInstance::require(const char *path)
 bool
 BindingInstance::eval(const char *chunk)
 {
-  ink_release_assert(this->lua != NULL);
+  ink_release_assert(this->lua != nullptr);
 
   if (luaL_dostring(this->lua, chunk) != 0) {
     const char *w = lua_tostring(this->lua, -1);
diff --git a/lib/ts/ink_cap.cc b/lib/ts/ink_cap.cc
index 758cad9..f458d60 100644
--- a/lib/ts/ink_cap.cc
+++ b/lib/ts/ink_cap.cc
@@ -423,7 +423,7 @@ ElevateAccess::ElevateAccess(unsigned lvl)
     level(lvl)
 #if TS_USE_POSIX_CAP
     ,
-    cap_state(0)
+    cap_state(nullptr)
 #endif
 {
   elevate(level);
diff --git a/mgmt/LocalManager.cc b/mgmt/LocalManager.cc
index cbef7f7..8c0cfbe 100644
--- a/mgmt/LocalManager.cc
+++ b/mgmt/LocalManager.cc
@@ -244,7 +244,7 @@ LocalManager::LocalManager(bool proxy_on) : BaseManager(), run_proxy(proxy_on),
   proxy_name                   = REC_readString("proxy.config.proxy_name", &found);
   proxy_binary                 = REC_readString("proxy.config.proxy_binary", &found);
   env_prep                     = REC_readString("proxy.config.env_prep", &found);
-  proxy_options                = NULL;
+  proxy_options                = nullptr;
 
   // Calculate proxy_binary from the absolute bin_path
   absolute_proxy_binary = Layout::relative_to(bindir, proxy_binary);
@@ -946,7 +946,7 @@ LocalManager::startProxy(const char *onetime_options)
     }
 
     // Make sure we're starting the proxy in mgmt mode
-    if (strstr(real_proxy_options, MGMT_OPT) == 0) {
+    if (strstr(real_proxy_options, MGMT_OPT) == nullptr) {
       ink_strlcat(real_proxy_options, " ", OPTIONS_SIZE);
       ink_strlcat(real_proxy_options, MGMT_OPT, OPTIONS_SIZE);
     }
diff --git a/mgmt/RecordsConfig.cc b/mgmt/RecordsConfig.cc
index 1a911b1..f129af3 100644
--- a/mgmt/RecordsConfig.cc
+++ b/mgmt/RecordsConfig.cc
@@ -757,7 +757,7 @@ static const RecordElement RecordsConfig[] =
   ,
   {RECT_CONFIG, "proxy.config.body_factory.template_sets_dir", RECD_STRING, "body_factory",
RECU_DYNAMIC, RR_NULL, RECC_STR, "^[^[:space:]]+$", RECA_NULL}
   ,
-  {RECT_CONFIG, "proxy.config.body_factory.response_max_size", RECD_INT, "8192", RECU_DYNAMIC,
RR_NULL, RECC_NULL, NULL, RECA_NULL}
+  {RECT_CONFIG, "proxy.config.body_factory.response_max_size", RECD_INT, "8192", RECU_DYNAMIC,
RR_NULL, RECC_NULL, nullptr, RECA_NULL}
   ,
   //# 0 - never suppress generated responses
   //# 1 - always suppress generated responses
diff --git a/plugins/experimental/buffer_upload/buffer_upload.cc b/plugins/experimental/buffer_upload/buffer_upload.cc
index f80977d..f91d9f9 100644
--- a/plugins/experimental/buffer_upload/buffer_upload.cc
+++ b/plugins/experimental/buffer_upload/buffer_upload.cc
@@ -427,7 +427,7 @@ pvc_process_n_write(TSCont contp, TSEvent event, pvc_state *my_state)
   /* FALL THROUGH */
   case TS_EVENT_VCONN_WRITE_COMPLETE:
     /* We should have already shutdown read pvc side */
-    TSAssert(my_state->p_read_vio == NULL);
+    TSAssert(my_state->p_read_vio == nullptr);
     TSVConnShutdown(my_state->net_vc, 0, 1);
     my_state->req_finished = 1;
 
@@ -512,7 +512,7 @@ pvc_process_p_write(TSCont contp, TSEvent event, pvc_state *my_state)
   /* FALL THROUGH */
   case TS_EVENT_VCONN_WRITE_COMPLETE:
     /* We should have already shutdown read net side */
-    TSAssert(my_state->n_read_vio == NULL);
+    TSAssert(my_state->n_read_vio == nullptr);
     TSVConnShutdown(my_state->p_vc, 0, 1);
     my_state->resp_finished = 1;
     pvc_check_done(contp, my_state);
diff --git a/plugins/experimental/mysql_remap/mysql_remap.cc b/plugins/experimental/mysql_remap/mysql_remap.cc
index f0818b1..da035df 100644
--- a/plugins/experimental/mysql_remap/mysql_remap.cc
+++ b/plugins/experimental/mysql_remap/mysql_remap.cc
@@ -208,8 +208,8 @@ TSPluginInit(int argc, const char *argv[])
 
   host     = iniparser_getstring(ini, "mysql_remap:mysql_host", (char *)"localhost");
   port     = iniparser_getint(ini, "mysql_remap:mysql_port", 3306);
-  username = iniparser_getstring(ini, "mysql_remap:mysql_username", NULL);
-  password = iniparser_getstring(ini, "mysql_remap:mysql_password", NULL);
+  username = iniparser_getstring(ini, "mysql_remap:mysql_username", nullptr);
+  password = iniparser_getstring(ini, "mysql_remap:mysql_password", nullptr);
   db       = iniparser_getstring(ini, "mysql_remap:mysql_database", (char *)"mysql_remap");
 
   if (mysql_library_init(0, NULL, NULL)) {
diff --git a/plugins/header_rewrite/conditions.cc b/plugins/header_rewrite/conditions.cc
index b1e0269..5efbf18 100644
--- a/plugins/header_rewrite/conditions.cc
+++ b/plugins/header_rewrite/conditions.cc
@@ -973,7 +973,7 @@ const char *
 ConditionGeo::get_geo_string(const sockaddr *addr) const
 {
   TSError("[%s] No Geo library available!", PLUGIN_NAME);
-  return NULL;
+  return nullptr;
 }
 
 int64_t
diff --git a/plugins/tcpinfo/tcpinfo.cc b/plugins/tcpinfo/tcpinfo.cc
index 013a411..5de5815 100644
--- a/plugins/tcpinfo/tcpinfo.cc
+++ b/plugins/tcpinfo/tcpinfo.cc
@@ -104,13 +104,13 @@ log_tcp_info(Config *config, const char *event_name, TSHttpSsn ssnp)
   socklen_t tcp_info_len = sizeof(info);
   int fd;
 
-  TSReleaseAssert(config->log != NULL);
+  TSReleaseAssert(config->log != nullptr);
 
-  if (ssnp != NULL && (TSHttpSsnClientFdGet(ssnp, &fd) != TS_SUCCESS || fd <=
0)) {
+  if (ssnp != nullptr && (TSHttpSsnClientFdGet(ssnp, &fd) != TS_SUCCESS || fd
<= 0)) {
     TSDebug("tcpinfo", "error getting the client socket fd from ssn");
     return;
   }
-  if (ssnp == NULL) {
+  if (ssnp == nullptr) {
     TSDebug("tcpinfo", "ssn is not specified");
     return;
   }
@@ -123,7 +123,7 @@ log_tcp_info(Config *config, const char *event_name, TSHttpSsn ssnp)
   client_addr.sa = TSHttpSsnClientAddrGet(ssnp);
   server_addr.sa = TSHttpSsnIncomingAddrGet(ssnp);
 
-  if (client_addr.sa == NULL || server_addr.sa == NULL) {
+  if (client_addr.sa == nullptr || server_addr.sa == nullptr) {
     return;
   }
 
diff --git a/proxy/CoreUtils.cc b/proxy/CoreUtils.cc
index b13d2e2..1071138 100644
--- a/proxy/CoreUtils.cc
+++ b/proxy/CoreUtils.cc
@@ -307,7 +307,7 @@ CoreUtils::get_next_frame(core_stack_state *coress)
     if ((frameoff = (void **)ats_malloc(sizeof(long)))) {
       if (fread(frameoff, 4, 1, fp) == 1) {
         coress->framep = (intptr_t)*frameoff;
-        if (*frameoff == NULL) {
+        if (*frameoff == nullptr) {
           ats_free(frameoff);
           return 0;
         }
diff --git a/proxy/InkAPI.cc b/proxy/InkAPI.cc
index 0d157d5..3f02193 100644
--- a/proxy/InkAPI.cc
+++ b/proxy/InkAPI.cc
@@ -4627,7 +4627,7 @@ TSHttpTxnHookAdd(TSHttpTxn txnp, TSHttpHookID id, TSCont contp)
   APIHook *hook = sm->txn_hook_get(id);
 
   // Traverse list of hooks and add a particular hook only once
-  while (hook != NULL) {
+  while (hook != nullptr) {
     if (hook->m_cont == (INKContInternal *)contp) {
       return;
     }
diff --git a/proxy/Main.cc b/proxy/Main.cc
index b65f563..b251557 100644
--- a/proxy/Main.cc
+++ b/proxy/Main.cc
@@ -216,7 +216,7 @@ static ArgumentDescription argument_descriptions[] = {
   {"bind_stdout", '-', "Regular file to bind stdout to", "S512", &bind_stdout, "PROXY_BIND_STDOUT",
nullptr},
   {"bind_stderr", '-', "Regular file to bind stderr to", "S512", &bind_stderr, "PROXY_BIND_STDERR",
nullptr},
 #if defined(linux)
-  {"read_core", 'c', "Read Core file", "S255", &core_file, NULL, NULL},
+  {"read_core", 'c', "Read Core file", "S255", &core_file, nullptr, nullptr},
 #endif
 
   {"accept_mss", '-', "MSS for client connections", "I", &accept_mss, nullptr, nullptr},
@@ -357,7 +357,7 @@ public:
     memset(&_usage, 0, sizeof(_usage));
     SET_HANDLER(&MemoryLimit::periodic);
   }
-  ~MemoryLimit() { mutex = NULL; }
+  ~MemoryLimit() { mutex = nullptr; }
   int
   periodic(int event, Event *e)
   {
@@ -1791,7 +1791,7 @@ main(int /* argc ATS_UNUSED */, const char **argv)
   eventProcessor.schedule_every(new DiagsLogContinuation, HRTIME_SECOND, ET_TASK);
   eventProcessor.schedule_every(new MemoryLimit, HRTIME_SECOND, ET_TASK);
   REC_RegisterConfigUpdateFunc("proxy.config.dump_mem_info_frequency", init_memory_tracker,
nullptr);
-  init_memory_tracker(NULL, RECD_NULL, RecData(), nullptr);
+  init_memory_tracker(nullptr, RECD_NULL, RecData(), nullptr);
 
   // log initialization moved down
 
diff --git a/proxy/ParentConsistentHash.cc b/proxy/ParentConsistentHash.cc
index 4d82601..645798f 100644
--- a/proxy/ParentConsistentHash.cc
+++ b/proxy/ParentConsistentHash.cc
@@ -292,7 +292,7 @@ ParentConsistentHash::markParentDown(const ParentSelectionPolicy *policy,
Parent
 
   } else {
     int old_count = 0;
-    now           = time(NULL);
+    now           = time(nullptr);
 
     // if the last failure was outside the retry window, set the failcount to 1
     // and failedAt to now.
diff --git a/proxy/ParentRoundRobin.cc b/proxy/ParentRoundRobin.cc
index 82b3aae..dfa804d 100644
--- a/proxy/ParentRoundRobin.cc
+++ b/proxy/ParentRoundRobin.cc
@@ -233,7 +233,7 @@ ParentRoundRobin::markParentDown(const ParentSelectionPolicy *policy,
ParentResu
 
   } else {
     int old_count = 0;
-    now           = time(NULL);
+    now           = time(nullptr);
 
     // if the last failure was outside the retry window, set the failcount to 1
     // and failedAt to now.
diff --git a/proxy/http/HttpBodyFactory.cc b/proxy/http/HttpBodyFactory.cc
index 12285ee..ed0bb8f 100644
--- a/proxy/http/HttpBodyFactory.cc
+++ b/proxy/http/HttpBodyFactory.cc
@@ -384,7 +384,7 @@ HttpBodyFactory::fabricate(StrList *acpt_language_list, StrList *acpt_charset_li
   char *buffer;
   const char *pType = context->txn_conf->body_factory_template_base;
   const char *set;
-  HttpBodyTemplate *t = NULL;
+  HttpBodyTemplate *t = nullptr;
   HttpBodySet *body_set;
   char template_base[PATH_NAME_MAX];
 
diff --git a/proxy/http/HttpSM.cc b/proxy/http/HttpSM.cc
index 6ad2c96..464b628 100644
--- a/proxy/http/HttpSM.cc
+++ b/proxy/http/HttpSM.cc
@@ -2783,7 +2783,7 @@ HttpSM::tunnel_handler_post(int event, void *data)
     if (ua_entry->write_buffer) {
       free_MIOBuffer(ua_entry->write_buffer);
       ua_entry->write_buffer = nullptr;
-      ua_entry->vc->do_io_write(this, 0, NULL);
+      ua_entry->vc->do_io_write(this, 0, nullptr);
     }
     // The if statement will always true since these codes are all for HTTP 408 response
sending. - by oknet xu
     if (p->handler_state == HTTP_SM_POST_UA_FAIL) {
@@ -4823,7 +4823,7 @@ HttpSM::do_http_server_open(bool raw)
   }
 
   // Congestion Check
-  if (t_state.pCongestionEntry != NULL) {
+  if (t_state.pCongestionEntry != nullptr) {
     if (t_state.pCongestionEntry->F_congested() &&
         (!t_state.pCongestionEntry->proxy_retry(milestones[TS_MILESTONE_SERVER_CONNECT])))
{
       t_state.congestion_congested_or_failed = 1;
@@ -7317,7 +7317,7 @@ HttpSM::set_next_state()
       DebugSM("dns", "[HttpTransact::HandleRequest] Skipping DNS lookup for %s because it's
loopback",
               t_state.dns_info.lookup_name);
       t_state.dns_info.lookup_success = true;
-      call_transact_and_set_next_state(NULL);
+      call_transact_and_set_next_state(nullptr);
       break;
     } else if (url_remap_mode == HttpTransact::URL_REMAP_FOR_OS && t_state.first_dns_lookup)
{
       DebugSM("cdn", "Skipping DNS Lookup");
diff --git a/proxy/http/HttpTransact.cc b/proxy/http/HttpTransact.cc
index cd9d5de..877c2db 100644
--- a/proxy/http/HttpTransact.cc
+++ b/proxy/http/HttpTransact.cc
@@ -576,7 +576,7 @@ HttpTransact::Forbidden(State *s)
                          "IpAllow marked request forbidden");
   bootstrap_state_variables_from_request(s, &s->hdr_info.client_request);
   build_error_response(s, HTTP_STATUS_FORBIDDEN, "Access Denied", "access#denied");
-  TRANSACT_RETURN(SM_ACTION_SEND_ERROR_CACHE_NOOP, NULL);
+  TRANSACT_RETURN(SM_ACTION_SEND_ERROR_CACHE_NOOP, nullptr);
 }
 
 void
diff --git a/proxy/http2/Http2ConnectionState.cc b/proxy/http2/Http2ConnectionState.cc
index 6c7d35b..350e836 100644
--- a/proxy/http2/Http2ConnectionState.cc
+++ b/proxy/http2/Http2ConnectionState.cc
@@ -85,7 +85,7 @@ rcv_data_frame(Http2ConnectionState &cstate, const Http2Frame &frame)
   if (stream == nullptr) {
     if (cstate.is_valid_streamid(id)) {
       // This error occurs fairly often, and is probably innocuous (SM initiates the shutdown)
-      return Http2Error(Http2ErrorClass::HTTP2_ERROR_CLASS_STREAM, Http2ErrorCode::HTTP2_ERROR_STREAM_CLOSED,
NULL);
+      return Http2Error(Http2ErrorClass::HTTP2_ERROR_CLASS_STREAM, Http2ErrorCode::HTTP2_ERROR_STREAM_CLOSED,
nullptr);
     } else {
       return Http2Error(Http2ErrorClass::HTTP2_ERROR_CLASS_CONNECTION, Http2ErrorCode::HTTP2_ERROR_PROTOCOL_ERROR,
                         "recv data stream freed with invalid id");
@@ -985,7 +985,7 @@ Http2ConnectionState::create_stream(Http2StreamId new_id, Http2Error &error)
   Http2Stream *new_stream = THREAD_ALLOC_INIT(http2StreamAllocator, this_ethread());
   new_stream->init(new_id, client_settings.get(HTTP2_SETTINGS_INITIAL_WINDOW_SIZE));
 
-  ink_assert(NULL != new_stream);
+  ink_assert(nullptr != new_stream);
   ink_assert(!stream_list.in(new_stream));
 
   stream_list.push(new_stream);
@@ -1061,7 +1061,7 @@ Http2ConnectionState::cleanup_streams()
 bool
 Http2ConnectionState::delete_stream(Http2Stream *stream)
 {
-  ink_assert(NULL != stream);
+  ink_assert(nullptr != stream);
 
   // If stream has already been removed from the list, just go on
   if (!stream_list.in(stream)) {
diff --git a/proxy/http2/Http2Stream.cc b/proxy/http2/Http2Stream.cc
index d95f3b2..981d8e6 100644
--- a/proxy/http2/Http2Stream.cc
+++ b/proxy/http2/Http2Stream.cc
@@ -138,7 +138,7 @@ Http2Stream::main_event_handler(int event, void *edata)
 Http2ErrorCode
 Http2Stream::decode_header_blocks(HpackHandle &hpack_handle)
 {
-  return http2_decode_header_blocks(&_req_header, (const uint8_t *)header_blocks, header_blocks_length,
NULL, hpack_handle,
+  return http2_decode_header_blocks(&_req_header, (const uint8_t *)header_blocks, header_blocks_length,
nullptr, hpack_handle,
                                     trailing_header);
 }
 
diff --git a/proxy/logging/LogHost.cc b/proxy/logging/LogHost.cc
index 64d0396..68eeff7 100644
--- a/proxy/logging/LogHost.cc
+++ b/proxy/logging/LogHost.cc
@@ -312,7 +312,7 @@ LogHost::display(FILE *fd)
   fprintf(fd, "LogHost: %s:%u, %s\n", name(), port(), (connected(NOPING)) ? "connected" :
"not connected");
 
   LogHost *host = this;
-  while (host->failover_link.next != NULL) {
+  while (host->failover_link.next != nullptr) {
     fprintf(fd, "Failover: %s:%u, %s\n", host->name(), host->port(), (host->connected(NOPING))
? "connected" : "not connected");
     host = host->failover_link.next;
   }

-- 
To stop receiving notification emails like this one, please contact
['"commits@trafficserver.apache.org" <commits@trafficserver.apache.org>'].

Mime
View raw message