3 /*********************************************************************
5 * File : $Source: /cvsroot/ijbswa/current/acconfig.h,v $
7 * Purpose : This file should be the first thing included in every
8 * .c file. (Before even system headers). It contains
9 * #define statements for various features. It was
10 * introduced because the compile command line started
11 * getting ludicrously long with feature defines.
13 * Copyright : Written by and Copyright (C) 2001 the SourceForge
14 * IJBSWA team. http://ijbswa.sourceforge.net
16 * Based on the Internet Junkbuster originally written
17 * by and Copyright (C) 1997 Anonymous Coders and
18 * Junkbusters Corporation. http://www.junkbusters.com
20 * This program is free software; you can redistribute it
21 * and/or modify it under the terms of the GNU General
22 * Public License as published by the Free Software
23 * Foundation; either version 2 of the License, or (at
24 * your option) any later version.
26 * This program is distributed in the hope that it will
27 * be useful, but WITHOUT ANY WARRANTY; without even the
28 * implied warranty of MERCHANTABILITY or FITNESS FOR A
29 * PARTICULAR PURPOSE. See the GNU General Public
30 * License for more details.
32 * The GNU General Public License should be included with
33 * this file. If not, you can view it at
34 * http://www.gnu.org/copyleft/gpl.html
35 * or write to the Free Software Foundation, Inc., 59
36 * Temple Place - Suite 330, Boston, MA 02111-1307, USA.
39 * $Log: acconfig.h,v $
40 * Revision 1.1.1.1 2001/05/15 13:58:45 oes
41 * Initial import of version 2.9.3 source tree
44 *********************************************************************/
49 * Version number - Major (X._._)
54 * Version number - Minor (_.X._)
59 * Version number - Point (_._.X)
64 * Version number, as a string
69 * Regular expression matching for URLs. (Highly recommended). If this is
70 * not defined then you can ony use prefix matching.
75 * Allow JunkBuster to be "disabled" so it is just a normal non-blocking
76 * non-anonymizing proxy. This is useful if you're trying to access a
77 * blocked or broken site - just change the setting in the config file
78 * and send a SIGHUP (UN*X), or use the handy "Disable" menu option (Windows
84 * Enables arbitrary content modification regexps
89 * If a stream is compressed via gzip (Netscape specific I think), then
90 * it cannot be modified with Perl regexps. This forces it to be
96 * Enables statistics function.
101 * Bypass filtering for 1 page only
106 * Locally redirect remote script-redirect URLs
108 #undef FAST_REDIRECTS
111 * Split the show-proxy-args page into a page for each config file.
113 #undef SPLIT_PROXY_ARGS
116 * Kills JavaScript popups - window.open, onunload, etc.
121 * Support for webDAV - e.g. so Microsoft Outlook can access HotMail e-mail
126 * Detect image requests automatically for MSIE. Will fall back to
127 * other image-detection methods (i.e. USE_IMAGE_LIST) for other
130 * It detects the following header pair as an image request:
132 * User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
135 * And the following as a HTML request:
137 * User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)
138 * Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, * / *
140 * And no, I haven't got that backwards - IE is being wierd.
143 * 1) If you press shift-reload on a blocked HTML page, you get
144 * the image "blocked" page, not the HTML "blocked" page.
145 * 2) Once an image "blocked" page has been sent, viewing it
146 * in it's own browser window *should* bring up the HTML
147 * "blocked" page, but it doesn't. You need to clear the
148 * browser cache to get the HTML version again.
150 * These limitations are due to IE making inconsistent choices
151 * about which "Accept:" header to send.
153 #undef DETECT_MSIE_IMAGES
156 * Use image list to detect images.
157 * If you do not define this then everything is treated as HTML.
159 * Whatever the setting of this value, DETECT_MSIE_IMAGES will
160 * override it for people using Internet Explorer.
162 #undef USE_IMAGE_LIST
165 * Allows the use of ACL files to control access to the proxy by IP address.
170 * Allows the use of trust files.
175 * Allows the use of jar files to capture cookies.
180 * Use PCRE rather than GNU Regex
186 #endif /* _CONFIG_H */