| skipped 77 lines |
78 | 78 | | injected_http = args.get("injected_http_contains") |
79 | 79 | | try: |
80 | 80 | | res = requests.get(url, allow_redirects=False, timeout=3, headers=headers) |
81 | | - | logger.debug("Response from GET request: %s", str(res.text)) |
| 81 | + | text = res.text |
| 82 | + | headers = "\r\n".join([k + ": " + v for k, v in res.headers.items()]) |
| 83 | + | logger.debug("Headers from GET request: %s", str(headers)) |
| 84 | + | logger.debug("Response from GET request: %s", str(text)) |
82 | 85 | | if injected_http: |
83 | | - | logger.debug("Checking for '%s' in censor response", injected_http) |
| 86 | + | logger.debug("Checking for '%s' in response", injected_http) |
84 | 87 | | # If we need to monitor for an injected response, check that here |
85 | | - | if injected_http and injected_http in res.text: |
| 88 | + | if injected_http and injected_http in (headers + text): |
86 | 89 | | fitness -= 90 |
87 | 90 | | else: |
88 | 91 | | fitness += 100 |
| skipped 20 lines |