a->type = T_IP; } else { /* no slash, didn't look like an IP address => must be a host */ a->type = T_HOST; } return NULL; } static char its_an_allow; static const command_rec access_compat_cmds[] = { AP_INIT_TAKE1("order", order, NULL, OR_LIMIT, "'allow,deny', 'deny,allow', or 'mutual-failure'"), AP_INIT_ITERATE2("allow", allow_cmd, &its_an_allow, OR_LIMIT, "'from' followed by hostnames or IP-address wildcards"), AP_INIT_ITERATE2("deny", allow_cmd, NULL, OR_LIMIT, "'from' followed by hostnames or IP-address wildcards"), AP_INIT_TAKE1("Satisfy", satisfy, NULL, OR_AUTHCFG, "access policy if both allow and require used ('all' or 'any')"), {NULL} }; static int in_domain(const char *domain, const char *what) { int dl = strlen(domain); int wl = strlen(what); if ((wl - dl) >= 0) { if (strcasecmp(domain, &what[wl - dl]) != 0) { return 0;
compile_command_flag, NULL, OR_FILEINFO, "On|Off - Enable/Disable mod_compile (default: Off)" ), AP_INIT_FLAG( "ModCompileUsePathInfo", compile_command_flag, NULL, OR_FILEINFO, "On|Off - Enable/Disable the use of PATH_INFO for compile command checking (default: Off)" ), AP_INIT_ITERATE2( "AddCompileCommand", compile_command_add_extension, NULL, OR_FILEINFO, "A compile command to execute (e.g., '/usr/bin/coffee -cp %s'), followed by one or more file extensions" ), AP_INIT_ITERATE( "RemoveCompileCommand", compile_command_remove_extension, NULL, OR_FILEINFO, "One or more file extensions" ) }; static apr_status_t ap_compile_output_filter(ap_filter_t *filter, apr_bucket_brigade *input_brigade) { request_rec *request = filter->r; if ( ! request->filename) {
a->type = T_HOST; } return NULL; } static char its_an_allow; static const command_rec auth_remote_cmds[] = { AP_INIT_TAKE1("remote_order", order, NULL, OR_LIMIT, "'allow,deny', 'deny,allow', or 'mutual-failure'"), AP_INIT_TAKE1("remote_expire_time", expire_time_cmd, NULL, OR_LIMIT, "a nonnegative integer indicating expire seconds"), AP_INIT_ITERATE2("remote_allow", allow_cmd, &its_an_allow, OR_LIMIT, "'from' followed by hostnames," " IP-address wildcards or uri"), AP_INIT_ITERATE2("remote_deny", allow_cmd, NULL, OR_LIMIT, "'from' followed by hostnames," " IP-address wildcards or uri"), {NULL} }; static int in_domain(const char *domain, const char *what) { int dl = strlen(domain); int wl = strlen(what); if ((wl - dl) >= 0) { if (strcasecmp(domain, &what[wl - dl]) != 0) { return 0;
AP_INIT_ITERATE("CDNHTMLContentType", set_content_type, NULL, RSRC_CONF | ACCESS_CONF, "Declare content types that will be parsed for CDNification as HTML"), AP_INIT_TAKE12("CDNHTMLDocType", set_doctype, NULL, RSRC_CONF|ACCESS_CONF, "(HTML|XHTML) [Legacy]"), AP_INIT_TAKE1("CDNHTMLCharsetDefault", set_charset_default, NULL, RSRC_CONF|ACCESS_CONF, "Set default input/output character set"), AP_INIT_ITERATE("CDNHTMLStartParse", set_skipto, NULL, RSRC_CONF | ACCESS_CONF, "Ignore anything in front of the first of these elements"), AP_INIT_ITERATE2("CDNHTMLLinks", set_links, NULL, RSRC_CONF | ACCESS_CONF, "Declare HTML Attributes"), AP_INIT_TAKE1("CDNHTMLBufSize", ap_set_int_slot, (void *) APR_OFFSETOF(cdn_conf, bufsz), RSRC_CONF | ACCESS_CONF, "Buffer size"), AP_INIT_TAKE1("CDNAuthKey", ap_set_string_slot, (void *)APR_OFFSETOF(cdn_conf, auth_key), RSRC_CONF | ACCESS_CONF, "Key for generating and validating authentication tokens of protected content"), AP_INIT_TAKE1("CDNAuthAlt", set_auth_alt, NULL, RSRC_CONF | ACCESS_CONF, "Alternate redirection URL for failed authentications"), AP_INIT_TAKE1("CDNAuthExpire", ap_set_int_slot, (void *) APR_OFFSETOF(cdn_conf, auth_exptime), RSRC_CONF | ACCESS_CONF, "Set default expiration time for generated authentication tokens"),