Search
directive in the configuration file:
Search /search/script/pathnameThis script is called with the vital information in the following CGI environment variables:
PATH_INFO
PATH_TRANSLATED
PATH_INFO
.
QUERY_STRING
argv[1]
, argv[2]
, ...
Location:
field,
or a Content-Type:
field, typically:
Content-Type: text/htmlif the document is an HTML document.
POST
requests are handled by calling the script defined
by POST-Script
directive:
POST-Script /absolute/path/post-handlerPOST handler script is called in the normal CGI manner, and its output must be CGI compliant.
Only such POST
requests are handled by the POST handler that haven't already matched
an Exec
rule (which causes
a specified script to be called).
PUT
requests are handled by calling the script defined by
PUT-Script
configuration directive:
PUT-Script /absolute/path/put-handlerPUT handler script is called in the normal CGI manner, and its output must be CGI compliant.
By default PUT
method is disabled; you must explicitly enable it in the configuration
file:
Enable PUTThis is to enhance security.
Since PUT
can
be a very dangerous method because it allows files to be written back to
the server, it is not possible to use PUT
without access
authorization module being activated. This means that you have to
have at least a DefProt
rule specifying a default protection setup, which then in turn defines
the PutMask
containing the list of allowed users and
hosts to perform PUT operation.
DELETE
requests are handled by calling the script defined by
DELETE-Script
configuration directive:
DELETE-Script /absolute/path/put-handlerDELETE handler script is called in the normal CGI manner, and its output must be CGI compliant.
By default DELETE
method is disabled; you must explicitly enable it in the configuration
file:
Enable DELETEThis is to enhance security.
Since DELETE
can
be a very dangerous method because it allows files to be deleted from
the server, it is not possible to use DELETE
without access
authorization module being activated. This means that you have to
have at least a DefProt
rule specifying a default protection setup, which then in turn defines
the DeleteMask
containing the list of allowed users and
hosts to perform DELETE operation.