CLEANUP: http: rename the misleading http_check_access_rule

Several bugs were introduced recently due to a misunderstanding of how
this function works and what it was supposed to do. Since it's supposed
to only return the pointer to a rule which aborts further processing of
the request, let's rename it to avoid further issues.

The function was also slightly cleaned up without any functional change.
diff --git a/src/proto_http.c b/src/proto_http.c
index be26442..6470efd 100644
--- a/src/proto_http.c
+++ b/src/proto_http.c
@@ -3063,61 +3063,69 @@
 }
 
 /* Executes the http-request rules <rules> for session <s>, proxy <px> and
- * transaction <txn>. Returns NULL if it executed all rules, or a pointer to
- * the last rule if it had to stop before the end (auth, deny). It may set
- * the TX_CLDENY on txn->flags if it encounters a deny rule.
+ * transaction <txn>. Returns the first rule that prevents further processing
+ * of the request (auth, deny, ...) or NULL if it executed all rules or stopped
+ * on an allow. It may set the TX_CLDENY on txn->flags if it encounters a deny
+ * rule.
  */
 static struct http_req_rule *
-http_check_access_rule(struct proxy *px, struct list *rules, struct session *s, struct http_txn *txn)
+http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct session *s, struct http_txn *txn)
 {
 	struct http_req_rule *rule;
 	struct hdr_ctx ctx;
 
 	list_for_each_entry(rule, rules, list) {
-		int ret = 1;
-
 		if (rule->action >= HTTP_REQ_ACT_MAX)
 			continue;
 
-		/* check condition, but only if attached */
+		/* check optional condition */
 		if (rule->cond) {
+			int ret;
+
 			ret = acl_exec_cond(rule->cond, px, s, txn, SMP_OPT_DIR_REQ|SMP_OPT_FINAL);
 			ret = acl_pass(ret);
 
 			if (rule->cond->pol == ACL_COND_UNLESS)
 				ret = !ret;
+
+			if (!ret) /* condition not matched */
+				continue;
 		}
 
-		if (ret) {
-			switch (rule->action) {
-			case HTTP_REQ_ACT_ALLOW:
-				return NULL;
-			case HTTP_REQ_ACT_DENY:
-				txn->flags |= TX_CLDENY;
-				return rule;
-			case HTTP_REQ_ACT_AUTH:
-				return rule;
-			case HTTP_REQ_ACT_SET_HDR:
-				ctx.idx = 0;
-				/* remove all occurrences of the header */
-				while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
-				                         txn->req.chn->buf->p, &txn->hdr_idx, &ctx)) {
-					http_remove_header2(&txn->req, &txn->hdr_idx, &ctx);
-				}
-				/* now fall through to header addition */
 
-			case HTTP_REQ_ACT_ADD_HDR:
-				chunk_printf(&trash, "%s: ", rule->arg.hdr_add.name);
-				memcpy(trash.str, rule->arg.hdr_add.name, rule->arg.hdr_add.name_len);
-				trash.len = rule->arg.hdr_add.name_len;
-				trash.str[trash.len++] = ':';
-				trash.str[trash.len++] = ' ';
-				trash.len += build_logline(s, trash.str + trash.len, trash.size - trash.len, &rule->arg.hdr_add.fmt);
-				http_header_add_tail2(&txn->req, &txn->hdr_idx, trash.str, trash.len);
-				break;
+		switch (rule->action) {
+		case HTTP_REQ_ACT_ALLOW:
+			return NULL; /* "allow" rules are OK */
+
+		case HTTP_REQ_ACT_DENY:
+			txn->flags |= TX_CLDENY;
+			return rule;
+
+		case HTTP_REQ_ACT_AUTH:
+			return rule;
+
+		case HTTP_REQ_ACT_SET_HDR:
+			ctx.idx = 0;
+			/* remove all occurrences of the header */
+			while (http_find_header2(rule->arg.hdr_add.name, rule->arg.hdr_add.name_len,
+						 txn->req.chn->buf->p, &txn->hdr_idx, &ctx)) {
+				http_remove_header2(&txn->req, &txn->hdr_idx, &ctx);
 			}
+			/* now fall through to header addition */
+
+		case HTTP_REQ_ACT_ADD_HDR:
+			chunk_printf(&trash, "%s: ", rule->arg.hdr_add.name);
+			memcpy(trash.str, rule->arg.hdr_add.name, rule->arg.hdr_add.name_len);
+			trash.len = rule->arg.hdr_add.name_len;
+			trash.str[trash.len++] = ':';
+			trash.str[trash.len++] = ' ';
+			trash.len += build_logline(s, trash.str + trash.len, trash.size - trash.len, &rule->arg.hdr_add.fmt);
+			http_header_add_tail2(&txn->req, &txn->hdr_idx, trash.str, trash.len);
+			break;
 		}
 	}
+
+	/* we reached the end of the rules, nothing to report */
 	return NULL;
 }
 
@@ -3178,13 +3186,13 @@
 	session_inc_be_http_req_ctr(s);
 
 	/* evaluate http-request rules */
-	http_req_last_rule = http_check_access_rule(px, &px->http_req_rules, s, txn);
+	http_req_last_rule = http_req_get_intercept_rule(px, &px->http_req_rules, s, txn);
 
 	/* evaluate stats http-request rules only if http-request is OK */
 	if (!http_req_last_rule) {
 		do_stats = stats_check_uri(s->rep->prod, txn, px);
 		if (do_stats)
-			http_req_last_rule = http_check_access_rule(px, &px->uri_auth->http_req_rules, s, txn);
+			http_req_last_rule = http_req_get_intercept_rule(px, &px->uri_auth->http_req_rules, s, txn);
 	}
 	else
 		do_stats = 0;