@@ -21749,6 +21749,7 @@ txn.id32 integer
2174921749txn.sess_term_state string
2175021750uuid([<version>]) string
2175121751var(<var-name>[,<default>]) undefined
21752+ wait_end boolean
2175221753waiting_entity string
2175321754-------------------------------------------------+-------------
2175421755
@@ -22259,6 +22260,29 @@ var(<var-name>[,<default>]) : undefined
2225922260 return it as a string. Empty strings are permitted. See section 2.8 about
2226022261 variables for details.
2226122262
22263+ wait_end : boolean
22264+ This fetch either returns true when the inspection period is over, or does
22265+ not fetch. It is only used in ACLs, in conjunction with content analysis to
22266+ avoid returning a wrong verdict early. It may also be used to delay some
22267+ actions, such as a delayed reject for some special addresses. Since it either
22268+ stops the rules evaluation or immediately returns true, it is recommended to
22269+ use this acl as the last one in a rule. Please note that the default ACL
22270+ "WAIT_END" is always usable without prior declaration. This test was designed
22271+ to be used with TCP request content inspection.
22272+
22273+ Examples :
22274+ # delay every incoming request by 2 seconds
22275+ tcp-request inspect-delay 2s
22276+ tcp-request content accept if WAIT_END
22277+
22278+ # don't immediately tell bad guys they are rejected
22279+ tcp-request inspect-delay 10s
22280+ acl goodguys src 10.0.0.0/24
22281+ acl badguys src 10.0.1.0/24
22282+ tcp-request content accept if goodguys
22283+ tcp-request content reject if badguys WAIT_END
22284+ tcp-request content reject
22285+
2226222286waiting_entity : string
2226322287 This returns the identity of the entity that was waiting to continue its
2226422288 processing when an error or a timeout was encountered. It may be the a rule
@@ -24682,7 +24706,6 @@ res.payload(<offset>,<length>) binary
2468224706res.payload_lv(<offset1>,<length>[,<offset2>]) binary
2468324707res.ssl_hello_type integer
2468424708rep_ssl_hello_type integer
24685- wait_end boolean
2468624709----------------------------------------------------+-------------
2468724710
2468824711Detailed list:
@@ -25017,29 +25040,6 @@ rep_ssl_hello_type : integer (deprecated)
2501725040 option. This is mostly used in ACL to detect presence of an SSL hello message
2501825041 that is supposed to contain an SSL session ID usable for stickiness.
2501925042
25020- wait_end : boolean
25021- This fetch either returns true when the inspection period is over, or does
25022- not fetch. It is only used in ACLs, in conjunction with content analysis to
25023- avoid returning a wrong verdict early. It may also be used to delay some
25024- actions, such as a delayed reject for some special addresses. Since it either
25025- stops the rules evaluation or immediately returns true, it is recommended to
25026- use this acl as the last one in a rule. Please note that the default ACL
25027- "WAIT_END" is always usable without prior declaration. This test was designed
25028- to be used with TCP request content inspection.
25029-
25030- Examples :
25031- # delay every incoming request by 2 seconds
25032- tcp-request inspect-delay 2s
25033- tcp-request content accept if WAIT_END
25034-
25035- # don't immediately tell bad guys they are rejected
25036- tcp-request inspect-delay 10s
25037- acl goodguys src 10.0.0.0/24
25038- acl badguys src 10.0.1.0/24
25039- tcp-request content accept if goodguys
25040- tcp-request content reject if badguys WAIT_END
25041- tcp-request content reject
25042-
2504325043
25044250447.3.6. Fetching HTTP samples (Layer 7)
2504525045--------------------------------------
0 commit comments