From: Fabian Keil Date: Wed, 7 Feb 2007 10:55:20 +0000 (+0000) Subject: - Save the reason for generating http_responses. X-Git-Tag: v_3_0_7~345 X-Git-Url: http://www.privoxy.org/gitweb/%40user-manual%40%40actions-help-prefix%40HIDE-IF-MODIFIED-SINCE?a=commitdiff_plain;h=8e9b7d6f9a01a15f2e71dd86f258a7b1e0596bd5;p=privoxy.git - Save the reason for generating http_responses. - Block (+block) with status code 403 instead of 404. - Use a different kludge to remember a failed decompression. --- diff --git a/filters.c b/filters.c index c9383993..e58d7197 100644 --- a/filters.c +++ b/filters.c @@ -1,4 +1,4 @@ -const char filters_rcs[] = "$Id: filters.c,v 1.78 2007/01/28 13:41:18 fabiankeil Exp $"; +const char filters_rcs[] = "$Id: filters.c,v 1.79 2007/01/31 16:21:38 fabiankeil Exp $"; /********************************************************************* * * File : $Source: /cvsroot/ijbswa/current/filters.c,v $ @@ -13,7 +13,7 @@ const char filters_rcs[] = "$Id: filters.c,v 1.78 2007/01/28 13:41:18 fabiankeil * `jpeg_inspect_response', `execute_single_pcrs_command', * `rewrite_url', `get_last_url' * - * Copyright : Written by and Copyright (C) 2001, 2004-2006 the SourceForge + * Copyright : Written by and Copyright (C) 2001, 2004-2007 the SourceForge * Privoxy team. http://www.privoxy.org/ * * Based on the Internet Junkbuster originally written @@ -40,6 +40,11 @@ const char filters_rcs[] = "$Id: filters.c,v 1.78 2007/01/28 13:41:18 fabiankeil * * Revisions : * $Log: filters.c,v $ + * Revision 1.79 2007/01/31 16:21:38 fabiankeil + * Search for Max-Forwards headers case-insensitive, + * don't generate the "501 unsupported" message for invalid + * Max-Forwards values and don't increase negative ones. + * * Revision 1.78 2007/01/28 13:41:18 fabiankeil * - Add HEAD support to finish_http_response. * - Add error favicon to internal HTML error messages. @@ -978,7 +983,7 @@ struct http_response *block_url(struct client_state *csp) } else { - rsp->status = strdup("404 Request for blocked URL"); + rsp->status = strdup("403 Request for blocked URL"); } if (rsp->status == NULL) @@ -1021,6 +1026,7 @@ struct http_response *block_url(struct client_state *csp) return cgi_error_memory(); } } + rsp->reason = RSP_REASON_BLOCKED; return finish_http_response(csp, rsp); @@ -1168,6 +1174,7 @@ struct http_response *trust_url(struct client_state *csp) free_http_response(rsp); return cgi_error_memory(); } + rsp->reason = RSP_REASON_UNTRUSTED; return finish_http_response(csp, rsp); } @@ -1470,7 +1477,9 @@ struct http_response *redirect_url(struct client_state *csp) free_http_response(rsp); return cgi_error_memory(); } + rsp->reason = RSP_REASON_REDIRECTED; freez(new_url); + return finish_http_response(csp, rsp); } } @@ -1660,6 +1669,7 @@ int is_untrusted_url(const struct client_state *csp) return 0; } } + return 1; } #endif /* def FEATURE_TRUST */ @@ -1753,19 +1763,24 @@ char *pcrs_filter_response(struct client_state *csp) * uncompress it first, adjusting size and iob->eod. * Note that decompression occurs after de-chunking. */ - if (csp->content_type & CT_GZIP || csp->content_type & CT_DEFLATE) + if (csp->content_type & (CT_GZIP | CT_DEFLATE)) { /* Notice that we at least tried to decompress. */ if (JB_ERR_OK != decompress_iob(csp)) { /* * We failed to decompress the data; there's no point - * in continuing since we can't filter. This is - * slightly tricky because we need to remember not to - * modify the Content-Encoding header later; using - * CT_TABOO flag is a kludge for this purpose. + * in continuing since we can't filter. + * + * XXX: Actually the Accept-Encoding header may + * just be incorrect in which case we could continue + * with filtering. + * + * Unset CT_GZIP and CT_DEFLATE to remember not + * to modify the Content-Encoding header later. */ - csp->content_type |= CT_TABOO; + csp->content_type &= ~CT_GZIP; + csp->content_type &= ~CT_DEFLATE; return(NULL); } log_error(LOG_LEVEL_RE_FILTER, "Decompressing successful"); @@ -2277,6 +2292,8 @@ struct http_response *direct_response(struct client_state *csp) } rsp->is_static = 1; + rsp->reason = RSP_REASON_UNSUPPORTED; + return(finish_http_response(csp, rsp)); } }