httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From n.@apache.org
Subject cvs commit: httpd-2.0/docs/manual/mod mod_access.html.en mod_access.xml quickreference.html.en
Date Thu, 12 Dec 2002 05:14:53 GMT
nd          2002/12/11 21:14:53

  Modified:    docs/manual/mod Tag: APACHE_2_0_BRANCH mod_access.html.en
                        mod_access.xml quickreference.html.en
  Log:
  markup and little reformatting
  
  Revision  Changes    Path
  No                   revision
  
  
  No                   revision
  
  
  1.11.2.3  +35 -22    httpd-2.0/docs/manual/mod/Attic/mod_access.html.en
  
  Index: mod_access.html.en
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/mod/Attic/mod_access.html.en,v
  retrieving revision 1.11.2.2
  retrieving revision 1.11.2.3
  diff -u -r1.11.2.2 -r1.11.2.3
  --- mod_access.html.en	11 Dec 2002 21:53:34 -0000	1.11.2.2
  +++ mod_access.html.en	12 Dec 2002 05:14:52 -0000	1.11.2.3
  @@ -98,38 +98,52 @@
       <dl>
         <dt>A (partial) domain-name</dt>
   
  -      <dd>Example: <code>Allow from apache.org</code><br />
  -       Hosts whose names match, or end in, this string are allowed
  +      <dd>
  +      <div class="example"><h3>Example:</h3><p><code>
  +        Allow from apache.org
  +      </code></p></div>
  +      <p>Hosts whose names match, or end in, this string are allowed
         access. Only complete components are matched, so the above
         example will match <code>foo.apache.org</code> but it will
         not match <code>fooapache.org</code>. This configuration will
         cause the server to perform a reverse DNS lookup on the
         client IP address, regardless of the setting of the <code class="directive"><a
href="../mod/core.html#hostnamelookups">HostnameLookups</a></code>
  -      directive.</dd>
  +      directive.</p></dd>
   
         <dt>A full IP address</dt>
   
  -      <dd>Example: <code>Allow from 10.1.2.3</code><br />
  -       An IP address of a host allowed access</dd>
  +      <dd>
  +      <div class="example"><h3>Example:</h3><p><code>
  +        Allow from 10.1.2.3
  +      </code></p></div>
  +      <p>An IP address of a host allowed access</p></dd>
   
         <dt>A partial IP address</dt>
   
  -      <dd>Example: <code>Allow from 10.1</code><br />
  -       The first 1 to 3 bytes of an IP address, for subnet
  -      restriction.</dd>
  +      <dd>
  +      <div class="example"><h3>Example:</h3><p><code>
  +        Allow from 10.1
  +      </code></p></div>
  +      <p>The first 1 to 3 bytes of an IP address, for subnet
  +      restriction.</p></dd>
   
         <dt>A network/netmask pair</dt>
   
  -      <dd>Example: <code>Allow from
  -      10.1.0.0/255.255.0.0</code><br />
  -       A network a.b.c.d, and a netmask w.x.y.z. For more
  -      fine-grained subnet restriction.</dd>
  +      <dd>
  +      <div class="example"><h3>Example:</h3><p><code>
  +        Allow from 10.1.0.0/255.255.0.0
  +      </code></p></div>
  +      <p>A network a.b.c.d, and a netmask w.x.y.z. For more
  +      fine-grained subnet restriction.</p></dd>
   
         <dt>A network/nnn CIDR specification</dt>
   
  -      <dd>Example: <code>Allow from 10.1.0.0/16</code><br />
  -       Similar to the previous case, except the netmask consists of
  -      nnn high-order 1 bits.</dd>
  +      <dd>
  +      <div class="example"><h3>Example:</h3><p><code>
  +        Allow from 10.1.0.0/16
  +      </code></p></div>
  +      <p>Similar to the previous case, except the netmask consists of
  +      nnn high-order 1 bits.</p></dd>
       </dl>
   
       <p>Note that the last three examples above match exactly the
  @@ -177,9 +191,8 @@
   <table class="directive">
   <tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Controls
which hosts are denied access to the
   server</td></tr>
  -<tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>
Deny from
  -    all|<var>host</var>|env=<var>env-variable</var>
  -    [<var>host</var>|env=<var>env-variable</var>] ...</code></td></tr>
  +<tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>
Deny from all|<var>host</var>|env=<var>env-variable</var>
  +[<var>host</var>|env=<var>env-variable</var>] ...</code></td></tr>
   <tr><th><a href="directive-dict.html#Context">Context:</a></th><td>directory,
.htaccess</td></tr>
   <tr><th><a href="directive-dict.html#Override">Override:</a></th><td>Limit</td></tr>
   <tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Base</td></tr>
  @@ -210,7 +223,7 @@
       <var>Ordering</var> is one of</p>
   
       <dl>
  -      <dt>Deny,Allow</dt>
  +      <dt><code>Deny,Allow</code></dt>
   
         <dd>The <code class="directive"><a href="#deny">Deny</a></code>
directives
         are evaluated before the <code class="directive"><a href="#allow">Allow</a></code>
directives. Access is
  @@ -219,7 +232,7 @@
         match an <code class="directive"><a href="#allow">Allow</a></code>
         directive will be allowed access to the server.</dd>
   
  -      <dt>Allow,Deny</dt>
  +      <dt><code>Allow,Deny</code></dt>
   
         <dd>The <code class="directive"><a href="#allow">Allow</a></code>
         directives are evaluated before the <code class="directive"><a href="#deny">Deny</a></code>
directives. Access is denied
  @@ -227,7 +240,7 @@
         <code class="directive"><a href="#deny">Deny</a></code> directive
will be
         denied access to the server.</dd>
   
  -      <dt>Mutual-failure</dt>
  +      <dt><code>Mutual-failure</code></dt>
   
         <dd>Only those hosts which appear on the <code class="directive"><a
href="#allow">Allow</a></code> list and do not appear on
         the <code class="directive"><a href="#deny">Deny</a></code>
list are
  @@ -236,7 +249,7 @@
         configuration.</dd>
       </dl>
   
  -    <p>Keywords may only be separated by a comma; no whitespace is
  +    <p>Keywords may only be separated by a comma; <em>no whitespace</em>
is
       allowed between them. Note that in all cases every <code class="directive"><a
href="#allow">Allow</a></code> and <code class="directive"><a href="#deny">Deny</a></code>
statement is evaluated.</p>
   
       <p>In the following example, all hosts in the apache.org domain
  
  
  
  1.7.2.2   +35 -27    httpd-2.0/docs/manual/mod/Attic/mod_access.xml
  
  Index: mod_access.xml
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/mod/Attic/mod_access.xml,v
  retrieving revision 1.7.2.1
  retrieving revision 1.7.2.2
  diff -u -r1.7.2.1 -r1.7.2.2
  --- mod_access.xml	2 Dec 2002 19:32:07 -0000	1.7.2.1
  +++ mod_access.xml	12 Dec 2002 05:14:52 -0000	1.7.2.2
  @@ -79,39 +79,53 @@
       <dl>
         <dt>A (partial) domain-name</dt>
   
  -      <dd>Example: <code>Allow from apache.org</code><br />
  -       Hosts whose names match, or end in, this string are allowed
  +      <dd>
  +      <example><title>Example:</title>
  +        Allow from apache.org
  +      </example>
  +      <p>Hosts whose names match, or end in, this string are allowed
         access. Only complete components are matched, so the above
         example will match <code>foo.apache.org</code> but it will
         not match <code>fooapache.org</code>. This configuration will
         cause the server to perform a reverse DNS lookup on the
         client IP address, regardless of the setting of the <directive
         module="core">HostnameLookups</directive>
  -      directive.</dd>
  +      directive.</p></dd>
   
         <dt>A full IP address</dt>
   
  -      <dd>Example: <code>Allow from 10.1.2.3</code><br />
  -       An IP address of a host allowed access</dd>
  +      <dd>
  +      <example><title>Example:</title>
  +        Allow from 10.1.2.3
  +      </example>
  +      <p>An IP address of a host allowed access</p></dd>
   
         <dt>A partial IP address</dt>
   
  -      <dd>Example: <code>Allow from 10.1</code><br />
  -       The first 1 to 3 bytes of an IP address, for subnet
  -      restriction.</dd>
  +      <dd>
  +      <example><title>Example:</title>
  +        Allow from 10.1
  +      </example>
  +      <p>The first 1 to 3 bytes of an IP address, for subnet
  +      restriction.</p></dd>
   
         <dt>A network/netmask pair</dt>
   
  -      <dd>Example: <code>Allow from
  -      10.1.0.0/255.255.0.0</code><br />
  -       A network a.b.c.d, and a netmask w.x.y.z. For more
  -      fine-grained subnet restriction.</dd>
  +      <dd>
  +      <example><title>Example:</title>
  +        Allow from 10.1.0.0/255.255.0.0
  +      </example>
  +      <p>A network a.b.c.d, and a netmask w.x.y.z. For more
  +      fine-grained subnet restriction.</p></dd>
   
         <dt>A network/nnn CIDR specification</dt>
   
  -      <dd>Example: <code>Allow from 10.1.0.0/16</code><br />
  -       Similar to the previous case, except the netmask consists of
  -      nnn high-order 1 bits.</dd>
  +      <dd>
  +      <example><title>Example:</title>
  +        Allow from 10.1.0.0/16
  +      </example>
  +      <p>Similar to the previous case, except the netmask consists of
  +      nnn high-order 1 bits.</p></dd>
       </dl>
   
       <p>Note that the last three examples above match exactly the
  @@ -154,19 +168,14 @@
       with <code>KnockKnock/2.0</code> will be allowed access, and all
       others will be denied.</p>
   </usage>
  -
   </directivesynopsis>
   
   <directivesynopsis>
  -
   <name>Deny</name>
  -
   <description>Controls which hosts are denied access to the
   server</description>
  -
  -<syntax> Deny from
  -    all|<var>host</var>|env=<var>env-variable</var>
  -    [<var>host</var>|env=<var>env-variable</var>] ...</syntax>
  +<syntax> Deny from all|<var>host</var>|env=<var>env-variable</var>
  +[<var>host</var>|env=<var>env-variable</var>] ...</syntax>
   <contextlist><context>directory</context><context>.htaccess</context>
   </contextlist>
   <override>Limit</override>
  @@ -185,7 +194,6 @@
   <description>Controls the default access state and the order in which
   <directive>Allow</directive> and <directive>Deny</directive> are
   evaluated.</description>
  -
   <syntax> Order <var>ordering</var></syntax>
   <default>Order Deny,Allow</default>
   <contextlist><context>directory</context><context>.htaccess</context>
  @@ -201,7 +209,7 @@
       <var>Ordering</var> is one of</p>
   
       <dl>
  -      <dt>Deny,Allow</dt>
  +      <dt><code>Deny,Allow</code></dt>
   
         <dd>The <directive module="mod_access">Deny</directive> directives
         are evaluated before the <directive
  @@ -211,7 +219,7 @@
         match an <directive module="mod_access">Allow</directive>
         directive will be allowed access to the server.</dd>
   
  -      <dt>Allow,Deny</dt>
  +      <dt><code>Allow,Deny</code></dt>
   
         <dd>The <directive module="mod_access">Allow</directive>
         directives are evaluated before the <directive
  @@ -221,7 +229,7 @@
         <directive module="mod_access">Deny</directive> directive will be
         denied access to the server.</dd>
   
  -      <dt>Mutual-failure</dt>
  +      <dt><code>Mutual-failure</code></dt>
   
         <dd>Only those hosts which appear on the <directive
         module="mod_access">Allow</directive> list and do not appear on
  @@ -231,7 +239,7 @@
         configuration.</dd>
       </dl>
   
  -    <p>Keywords may only be separated by a comma; no whitespace is
  +    <p>Keywords may only be separated by a comma; <em>no whitespace</em>
is
       allowed between them. Note that in all cases every <directive
       module="mod_access">Allow</directive> and <directive
       module="mod_access">Deny</directive> statement is evaluated.</p>
  
  
  
  1.47.2.7  +2 -3      httpd-2.0/docs/manual/mod/quickreference.html.en
  
  Index: quickreference.html.en
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/docs/manual/mod/quickreference.html.en,v
  retrieving revision 1.47.2.6
  retrieving revision 1.47.2.7
  diff -u -r1.47.2.6 -r1.47.2.7
  --- quickreference.html.en	11 Dec 2002 22:27:05 -0000	1.47.2.6
  +++ quickreference.html.en	12 Dec 2002 05:14:52 -0000	1.47.2.7
  @@ -256,9 +256,8 @@
   <tr class="odd"><td><a href="mod_deflate.html#deflatefilternote">DeflateFilterNote
<var>notename</var></a></td><td /><td>sv</td><td>E</td></tr><tr
class="odd"><td class="descr" colspan="4">Places the compression ratio in a note
for logging</td></tr>
   <tr><td><a href="mod_deflate.html#deflatememlevel">DeflateMemLevel <var>value</var></a></td><td>
9 </td><td>sv</td><td>E</td></tr><tr><td class="descr"
colspan="4">How much memory should be used by zlib for compression</td></tr>
   <tr class="odd"><td><a href="mod_deflate.html#deflatewindowsize">DeflateWindowSize
<var>value</var></a></td><td> 15 </td><td>sv</td><td>E</td></tr><tr
class="odd"><td class="descr" colspan="4">Zlib compression window size</td></tr>
  -<tr><td><a href="mod_access.html#deny"> Deny from
  -    all|<var>host</var>|env=<var>env-variable</var>
  -    [<var>host</var>|env=<var>env-variable</var>] ...</a></td><td
/><td>dh</td><td>B</td></tr><tr><td class="descr"
colspan="4">Controls which hosts are denied access to the
  +<tr><td><a href="mod_access.html#deny"> Deny from all|<var>host</var>|env=<var>env-variable</var>
  +[<var>host</var>|env=<var>env-variable</var>] ...</a></td><td
/><td>dh</td><td>B</td></tr><tr><td class="descr"
colspan="4">Controls which hosts are denied access to the
   server</td></tr>
   <tr class="odd"><td><a href="core.html#directory">&lt;Directory <var>directory-path</var>&gt;
   ... &lt;/Directory&gt;</a></td><td /><td>sv</td><td>C</td></tr><tr
class="odd"><td class="descr" colspan="4">Enclose a group of directives that apply
only to the
  
  
  

Mime
View raw message