Squashed commit of the following:
commit
de16cdefb4d6587f116b42a8b992154e059f387b
Author: Nihal Desai <nihdesai@cisco.com>
Date: Thu Dec 5 03:51:54 2019 -0500
http_inspect: support limited response depth
containing malicious JavaScript. As this feature involves actively blocking
traffic it is designed for use with inline mode operation (-Q).
-This feature only functions with response_depth = -1 (unlimited). This
-limitation will be removed in a future version.
-
This feature is off by default. detained_inspection = true will activate
it.
update_depth();
// Limitations on detained inspection will be lifted as the feature is built out
session_data->detained_inspection[source_id] = params->detained_inspection &&
- (source_id == SRC_SERVER) && (session_data->compression[source_id] == CMP_NONE) &&
- (params->request_depth == -1);
+ (source_id == SRC_SERVER) && (session_data->compression[source_id] == CMP_NONE);
if (source_id == SRC_CLIENT)
{
HttpModule::increment_peg_counts(PEG_REQUEST_BODY);