Mailing List Archive

cvs commit: httpd-docs-2.0/htdocs/manual/mod mod_access.html index-bytype.html index.html
slive 00/09/23 13:14:32

Modified: htdocs/manual/mod mod_access.html index-bytype.html
index.html
Log:
Conversion of mod_access.html to new format. Note that this includes
removal of all the "introduced in 1.x.x" stuff.

Revision Changes Path
1.22 +55 -33 httpd-docs-2.0/htdocs/manual/mod/mod_access.html

Index: mod_access.html
===================================================================
RCS file: /home/cvs/httpd-docs-2.0/htdocs/manual/mod/mod_access.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -r1.21 -r1.22
--- mod_access.html 2000/09/12 15:16:51 1.21
+++ mod_access.html 2000/09/23 20:14:32 1.22
@@ -16,11 +16,29 @@

<H1 ALIGN="CENTER">Module mod_access</H1>
<P>
-This module is contained in the <CODE>mod_access.c</CODE> file, and
-is compiled in by default. It provides access control based on client
-hostname or IP address.
+This module provides access control based on client hostname or IP
+address.
</P>

+<P><A
+HREF="module-dict.html#Status"
+REL="Help"
+><STRONG>Status:</STRONG></A> Base
+<BR>
+<A
+HREF="module-dict.html#SourceFile"
+REL="Help"
+><STRONG>Source File:</STRONG></A> mod_access.c
+<BR>
+<A
+HREF="module-dict.html#ModuleIdentifier"
+REL="Help"
+><STRONG>Module Identifier:</STRONG></A> access_module
+</P>
+
+
+<H2>Directives</H2>
+
<UL>
<LI><A HREF="#allow">Allow</A>
<LI><A HREF="#allowfromenv">Allow from env=</A>
@@ -28,10 +46,10 @@
<LI><A HREF="#denyfromenv">Deny from env=</A>
<LI><A HREF="#order">Order</A>
</UL>
-<DL>
-<DD>See also <A HREF="core.html#satisfy">Satisfy</A>
+
+<P>See also <A HREF="core.html#satisfy">Satisfy</A>
and <A HREF="core.html#require">Require</A>.
-</DL>
+
<HR>


@@ -72,10 +90,10 @@
<DD>An IP address of a host allowed access
<DT>A partial IP address
<DD>The first 1 to 3 bytes of an IP address, for subnet restriction.
-<DT>A network/netmask pair (<STRONG>Apache 1.3 and later</STRONG>)
+<DT>A network/netmask pair
<DD>A network a.b.c.d, and a netmask w.x.y.z. For more fine-grained subnet
restriction. (<EM>i.e.</EM>, 10.1.0.0/255.255.0.0)
-<DT>A network/nnn CIDR specification (<STRONG>Apache 1.3 and later</STRONG>)
+<DT>A network/nnn CIDR specification
<DD>Similar to the previous case, except the netmask consists of nnn
high-order 1 bits. (<EM>i.e.</EM>, 10.1.0.0/16 is the same as 10.1.0.0/255.255.0.0)
</DL>
@@ -91,13 +109,17 @@
would not match <CODE>foobar.edu</CODE>.
</P>
<P>
-See also <A HREF="#deny">Deny</A>, <A HREF="#order">Order</A>, and
-<A HREF="mod_browser.html#browsermatch">BrowserMatch</A>.
+See also <A HREF="#allowfromenv">Allow from env=</A>, <A
+HREF="#deny">Deny</A> and <A HREF="#order">Order</A>.
</P>

+<HR>
+
+<H2><A NAME="allowfromenv">Allow from env= directive</A></H2>
+
<P>
-<A NAME="allowfromenv"><STRONG>Syntax:</STRONG> Allow from
- env=<EM>variablename</EM></A><BR>
+<STRONG>Syntax:</STRONG> Allow from
+ env=<EM>variablename</EM><BR>
<A
HREF="directive-dict.html#Context"
REL="Help"
@@ -113,11 +135,7 @@
<A
HREF="directive-dict.html#Module"
REL="Help"
-><STRONG>Module:</STRONG></A> mod_access<BR>
-<A
- HREF="directive-dict.html#Compatibility"
- REL="Help"
-><STRONG>Compatibility:</STRONG></A> Apache 1.2 and above
+><STRONG>Module:</STRONG></A> mod_access
</P>
<P>
The <CODE>Allow from env</CODE> directive controls access to a directory by the
@@ -127,7 +145,7 @@
Example:
</P>
<BLOCKQUOTE><PRE>
-BrowserMatch ^KnockKnock/2.0 let_me_in
+SetEnvIf User-Agent ^KnockKnock/2.0 let_me_in
&lt;Directory /docroot&gt;
Order Deny,Allow
Deny from all
@@ -137,8 +155,8 @@
In this case browsers with the user-agent string <TT>KnockKnock/2.0</TT> will
be allowed access, and all others will be denied.
<P>
-See also <A HREF="#denyfromenv">Deny from env</A>
-and <A HREF="#order">Order</A>.
+See also <A HREF="#denyfromenv">Deny from env=</A>, <A HREF="#order">Order</A>
+and <A HREF="mod_setenvif.html#SetEnvIf">SetEnvIf</A>.
</P>
<HR>

@@ -179,10 +197,10 @@
<DD>An IP address of a host denied access
<DT>A partial IP address
<DD>The first 1 to 3 bytes of an IP address, for subnet restriction.
-<DT>A network/netmask pair (<STRONG>Apache 1.3 and later</STRONG>)
+<DT>A network/netmask pair
<DD>A network a.b.c.d, and a netmask w.x.y.z. For more fine-grained subnet
restriction. (<EM>i.e.</EM>, 10.1.0.0/255.255.0.0)
-<DT>A network/nnn CIDR specification (<STRONG>Apache 1.3 and later</STRONG>)
+<DT>A network/nnn CIDR specification
<DD>Similar to the previous case, except the netmask consists of nnn
high-order 1 bits. (<EM>i.e.</EM>, 10.1.0.0/16 is the same as 10.1.0.0/255.255.0.0)
</DL>
@@ -198,12 +216,17 @@
would not match <CODE>foobar.edu</CODE>.
</P>
<P>
-See also <A HREF="#allow">Allow</A> and <A HREF="#order">Order</A>.
+See also <A HREF="#denyfromenv">Deny from env=</A>, <A
+HREF="#allow">Allow</A> and <A HREF="#order">Order</A>.
</P>

+<HR>
+
+<H2><A NAME="denfromenv">Deny from env= directive</A></H2>
+
<P>
-<A NAME="denyfromenv"><STRONG>Syntax:</STRONG> Deny from
- env=<EM>variablename</EM></A><BR>
+<STRONG>Syntax:</STRONG> Deny from
+ env=<EM>variablename</EM><BR>
<A
HREF="directive-dict.html#Context"
REL="Help"
@@ -218,12 +241,8 @@
><STRONG>Status:</STRONG></A> Base<BR>
<A
HREF="directive-dict.html#Module"
- REL="Help"
-><STRONG>Module:</STRONG></A> mod_access<BR>
-<A
- HREF="directive-dict.html#Compatibility"
REL="Help"
-><STRONG>Compatibility:</STRONG></A> Apache 1.2 and above
+><STRONG>Module:</STRONG></A> mod_access
</P>
<P>
The <CODE>Deny from env</CODE> directive controls access to a directory by the
@@ -233,7 +252,7 @@
Example:
</P>
<BLOCKQUOTE><PRE>
-BrowserMatch ^BadRobot/0.9 go_away
+SetEnvIf User-Agent ^BadRobot/0.9 go_away
&lt;Directory /docroot&gt;
Order Allow,Deny
Allow from all
@@ -244,8 +263,9 @@
be denied access, and all others will be allowed.

<P>
-See also <A HREF="#allowfromenv">Allow from env</A>
-and <A HREF="#order">Order</A>.
+See also <A HREF="#allowfromenv">Allow from env=</A>, <A
+HREF="#order">Order</A> and <A
+HREF="mod_setenvif.html#SetEnvIf">SetEnvIf</A>.
</P>
<HR>

@@ -313,6 +333,8 @@
Hosts in the ncsa.uiuc.edu domain are allowed access; all other hosts are
denied access.
</P>
+
+<P>See also: <A HREF="#deny">Deny</A> and <A HREF="#allow">Allow</A>.
<!--#include virtual="footer.html" -->
</BODY>
</HTML>



1.2 +1 -1 httpd-docs-2.0/htdocs/manual/mod/index-bytype.html

Index: index-bytype.html
===================================================================
RCS file: /home/cvs/httpd-docs-2.0/htdocs/manual/mod/index-bytype.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- index-bytype.html 2000/09/08 23:28:24 1.1
+++ index-bytype.html 2000/09/23 20:14:32 1.2
@@ -82,7 +82,7 @@

<DL>
<DT><A HREF="mod_access.html">mod_access</A>
-<DD>Host based access control.
+<DD>Access control based on client hostname or IP address.
<DT><A HREF="mod_auth.html">mod_auth</A>
<DD>User authentication using text files.
<DT><A HREF="mod_auth_dbm.html">mod_auth_dbm</A>



1.34 +1 -1 httpd-docs-2.0/htdocs/manual/mod/index.html

Index: index.html
===================================================================
RCS file: /home/cvs/httpd-docs-2.0/htdocs/manual/mod/index.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -r1.33 -r1.34
--- index.html 2000/09/08 23:34:20 1.33
+++ index.html 2000/09/23 20:14:32 1.34
@@ -28,7 +28,7 @@
<DT><A HREF="core.html">Core</A>
<DD>Core Apache features.
<DT><A HREF="mod_access.html">mod_access</A>
-<DD>Host based access control.
+<DD>Access control based on client hostname or IP address.
<DT><A HREF="mod_actions.html">mod_actions</A> Apache 1.1 and later.
<DD>Filetype/method-based script execution
<DT><A HREF="mod_alias.html">mod_alias</A>