]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
Fix the directive name used in <usage> of 'RemoteIPProxyProtocolExceptions'.
authorChristophe Jaillet <jailletc36@apache.org>
Sun, 11 Aug 2019 06:19:01 +0000 (06:19 +0000)
committerChristophe Jaillet <jailletc36@apache.org>
Sun, 11 Aug 2019 06:19:01 +0000 (06:19 +0000)
Fix some style (there is no need to have a link to the directive within its <directivesynopsis> block)

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1864913 13f79535-47bb-0310-9956-ffa450edef68

docs/manual/mod/mod_remoteip.xml

index bc4a74b3fbb5947ca165bc70cd31207c05d3e34f..c825b0df4074016eeae6b901b8e0be7aad09ebd0 100644 (file)
@@ -115,7 +115,7 @@ via the request headers.
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPHeader</directive> directive triggers
+    <p>The <directive>RemoteIPHeader</directive> directive triggers
     <module>mod_remoteip</module> to treat the value of the specified
     <var>header-field</var> header as the useragent IP address, or list
     of intermediate useragent IP addresses, subject to further configuration
@@ -124,7 +124,7 @@ via the request headers.
 
     <note type="warning"> Unless these other directives are used, <module>mod_remoteip</module> 
     will trust all hosts presenting a non internal address in the 
-    <directive module="mod_remoteip">RemoteIPHeader</directive> header value.
+    <directive>RemoteIPHeader</directive> header value.
     </note>
 
     <example><title>Internal (Load Balancer) Example</title>
@@ -148,7 +148,7 @@ via the request headers.
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPInternalProxy</directive> directive adds one
+    <p>The <directive>RemoteIPInternalProxy</directive> directive adds one
     or more addresses (or address blocks) to trust as presenting a valid
     RemoteIPHeader value of the useragent IP.  Unlike the
     <directive module="mod_remoteip">RemoteIPTrustedProxy</directive> directive, any IP address
@@ -172,7 +172,7 @@ RemoteIPInternalProxy gateway.localdomain
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPInternalProxyList</directive> directive specifies
+    <p>The <directive>RemoteIPInternalProxyList</directive> directive specifies
     a file parsed at startup, and builds a list of addresses (or address blocks)
     to trust as presenting a valid RemoteIPHeader value of the useragent IP.</p>
 
@@ -204,7 +204,7 @@ gateway.localdomain #The front end balancer
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPProxiesHeader</directive> directive specifies
+    <p>The <directive>RemoteIPProxiesHeader</directive> directive specifies
     a header into which <module>mod_remoteip</module> will collect a list of
     all of the intermediate client IP addresses trusted to resolve the useragent
     IP of the request. Note that intermediate
@@ -283,7 +283,7 @@ Listen 8080
 <compatibility>RemoteIPProxyProtocolExceptions is only available in httpd 2.4.31 and newer</compatibility>
 
 <usage>
-    <p>The <directive>RemoteIPProxyProtocol</directive> directive enables or
+    <p>The <directive>RemoteIPProxyProtocolExceptions</directive> directive enables or
     disables the reading and handling of the PROXY protocol connection header.
     Sometimes it is desirable to require clients to provide the PROXY header, but
     permit other clients to connect without it. This directive allows a server 
@@ -299,7 +299,7 @@ Listen 8080
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPTrustedProxy</directive> 
+    <p>The <directive>RemoteIPTrustedProxy</directive> 
     directive restricts which peer IP addresses (or address blocks) will be
     trusted to present  a valid RemoteIPHeader value of the useragent IP.</p>
   
@@ -331,7 +331,7 @@ RemoteIPTrustedProxy proxy.example.com
 <contextlist><context>server config</context><context>virtual host</context></contextlist>
 
 <usage>
-    <p>The <directive module="mod_remoteip">RemoteIPTrustedProxyList</directive> directive specifies
+    <p>The <directive>RemoteIPTrustedProxyList</directive> directive specifies
     a file parsed at startup, and builds a list of addresses (or address blocks)
     to trust as presenting a valid RemoteIPHeader value of the useragent IP.</p>