You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ja...@apache.org on 2019/08/11 06:19:01 UTC

svn commit: r1864913 - /httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml

Author: jailletc36
Date: Sun Aug 11 06:19:01 2019
New Revision: 1864913

URL: http://svn.apache.org/viewvc?rev=1864913&view=rev
Log:
Fix the directive name used in <usage> of 'RemoteIPProxyProtocolExceptions'.

Fix some style (there is no need to have a link to the directive within its <directivesynopsis> block)

Modified:
    httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml

Modified: httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml?rev=1864913&r1=1864912&r2=1864913&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_remoteip.xml Sun Aug 11 06:19:01 2019
@@ -115,7 +115,7 @@ via the request headers.
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPHeader</directive> directive triggers
+    <p>The <directive>RemoteIPHeader</directive> directive triggers
     <module>mod_remoteip</module> to treat the value of the specified
     <var>header-field</var> header as the useragent IP address, or list
     of intermediate useragent IP addresses, subject to further configuration
@@ -124,7 +124,7 @@ via the request headers.
 
     <note type="warning"> Unless these other directives are used, <module>mod_remoteip</module> 
     will trust all hosts presenting a non internal address in the 
-    <directive module="mod_remoteip">RemoteIPHeader</directive> header value.
+    <directive>RemoteIPHeader</directive> header value.
     </note>
 
     <example><title>Internal (Load Balancer) Example</title>
@@ -148,7 +148,7 @@ via the request headers.
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPInternalProxy</directive> directive adds one
+    <p>The <directive>RemoteIPInternalProxy</directive> directive adds one
     or more addresses (or address blocks) to trust as presenting a valid
     RemoteIPHeader value of the useragent IP.  Unlike the
     <directive module="mod_remoteip">RemoteIPTrustedProxy</directive> directive, any IP address
@@ -172,7 +172,7 @@ RemoteIPInternalProxy gateway.localdomai
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPInternalProxyList</directive> directive specifies
+    <p>The <directive>RemoteIPInternalProxyList</directive> directive specifies
     a file parsed at startup, and builds a list of addresses (or address blocks)
     to trust as presenting a valid RemoteIPHeader value of the useragent IP.</p>
 
@@ -204,7 +204,7 @@ gateway.localdomain #The front end balan
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPProxiesHeader</directive> directive specifies
+    <p>The <directive>RemoteIPProxiesHeader</directive> directive specifies
     a header into which <module>mod_remoteip</module> will collect a list of
     all of the intermediate client IP addresses trusted to resolve the useragent
     IP of the request. Note that intermediate
@@ -283,7 +283,7 @@ Listen 8080
 <compatibility>RemoteIPProxyProtocolExceptions is only available in httpd 2.4.31 and newer</compatibility>
 
 <usage>
-    <p>The <directive>RemoteIPProxyProtocol</directive> directive enables or
+    <p>The <directive>RemoteIPProxyProtocolExceptions</directive> directive enables or
     disables the reading and handling of the PROXY protocol connection header.
     Sometimes it is desirable to require clients to provide the PROXY header, but
     permit other clients to connect without it. This directive allows a server 
@@ -299,7 +299,7 @@ Listen 8080
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPTrustedProxy</directive> 
+    <p>The <directive>RemoteIPTrustedProxy</directive> 
     directive restricts which peer IP addresses (or address blocks) will be
     trusted to present  a valid RemoteIPHeader value of the useragent IP.</p>
   
@@ -331,7 +331,7 @@ RemoteIPTrustedProxy proxy.example.com
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPTrustedProxyList</directive> directive specifies
+    <p>The <directive>RemoteIPTrustedProxyList</directive> directive specifies
     a file parsed at startup, and builds a list of addresses (or address blocks)
     to trust as presenting a valid RemoteIPHeader value of the useragent IP.</p>