--------------------- PatchSet 1466 Date: 2001/02/01 07:36:16 Author: rbcollins Branch: rbcollins_filters Tag: (none) Log: 3 more hooks Members: src/cf.data.pre:1.1.1.3.4.1.4.11.4.4->1.1.1.3.4.1.4.11.4.5 src/structs.h:1.1.1.3.4.1.4.12.2.10->1.1.1.3.4.1.4.12.2.11 Index: squid/src/cf.data.pre =================================================================== RCS file: /cvsroot/squid-sf//squid/src/cf.data.pre,v retrieving revision 1.1.1.3.4.1.4.11.4.4 retrieving revision 1.1.1.3.4.1.4.11.4.5 diff -u -r1.1.1.3.4.1.4.11.4.4 -r1.1.1.3.4.1.4.11.4.5 --- squid/src/cf.data.pre 31 Jan 2001 12:41:51 -0000 1.1.1.3.4.1.4.11.4.4 +++ squid/src/cf.data.pre 1 Feb 2001 07:36:16 -0000 1.1.1.3.4.1.4.11.4.5 @@ -1,6 +1,6 @@ # -# $Id: cf.data.pre,v 1.1.1.3.4.1.4.11.4.4 2001/01/31 12:41:51 rbcollins Exp $ +# $Id: cf.data.pre,v 1.1.1.3.4.1.4.11.4.5 2001/02/01 07:36:16 rbcollins Exp $ # # # SQUID Internet Object Cache http://squid.nlanr.net/Squid/ @@ -2063,6 +2063,60 @@ with an "allow all" or "deny all" entry. DOC_END +NAME: response_filter_access +TYPE: filter_access +LOC: Config.response_filters +DEFAULT: none +DOC_START + Apply filters to http responses recieved from origin servers. + + response_filter_access filtername allow|deny [!]acl ... ... + + NOTE: if there are no access lines present, the default is to never + use the filter. + + If none of the access lines cause a match, then the opposite of the + last line will apply. Thus it is good practice to end the rules + with an "allow all" or "deny all" entry. + + IMPORTANT: The changes made by these filters will be cached by squid, + they are _not_ on a request by request basis. +DOC_END + +NAME: client_request_filter_access +TYPE: filter_access +LOC: Config.client_request_filters +DEFAULT: none +DOC_START + Apply filters to http requests received from clients. + + client_request_filter_access filtername allow|deny [!]acl ... ... + + NOTE: if there are no access lines present, the default is to never + use the filter. + + If none of the access lines cause a match, then the opposite of the + last line will apply. Thus it is good practice to end the rules + with an "allow all" or "deny all" entry. +DOC_END + +NAME: server_request_filter_access +TYPE: filter_access +LOC: Config.server_request_filters +DEFAULT: none +DOC_START + Apply filters to http requests as they are made to servers. + + server_request_filter_access filtername allow|deny [!]acl ... ... + + NOTE: if there are no access lines present, the default is to never + use the filter. + + If none of the access lines cause a match, then the opposite of the + last line will apply. Thus it is good practice to end the rules + with an "allow all" or "deny all" entry. +DOC_END + COMMENT_START ADMINISTRATIVE PARAMETERS ----------------------------------------------------------------------------- Index: squid/src/structs.h =================================================================== RCS file: /cvsroot/squid-sf//squid/src/structs.h,v retrieving revision 1.1.1.3.4.1.4.12.2.10 retrieving revision 1.1.1.3.4.1.4.12.2.11 diff -u -r1.1.1.3.4.1.4.12.2.10 -r1.1.1.3.4.1.4.12.2.11 --- squid/src/structs.h 31 Jan 2001 12:41:52 -0000 1.1.1.3.4.1.4.12.2.10 +++ squid/src/structs.h 1 Feb 2001 07:36:16 -0000 1.1.1.3.4.1.4.12.2.11 @@ -1,6 +1,6 @@ /* - * $Id: structs.h,v 1.1.1.3.4.1.4.12.2.10 2001/01/31 12:41:52 rbcollins Exp $ + * $Id: structs.h,v 1.1.1.3.4.1.4.12.2.11 2001/02/01 07:36:16 rbcollins Exp $ * * * SQUID Internet Object Cache http://squid.nlanr.net/Squid/ @@ -610,6 +610,9 @@ } accessList; acl_deny_info_list *denyInfoList; filterAccessConfig reply_filters; + filterAccessConfig response_filters; + filterAccessConfig client_request_filters; + filterAccessConfig server_request_filters; filterConfig filters; struct _authConfig { authScheme *schemes;