From: Rich Bowen
Date: Sat, 2 May 2026 20:05:16 +0000 (+0000)
Subject: Bug 69092: Expand Location examples to clarify non-filesystem use (proxy, access...
X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=33daa89d0559b0f8a643a90940f812524d3552bc;p=thirdparty%2Fapache%2Fhttpd.git
Bug 69092: Expand Location examples to clarify non-filesystem use (proxy, access control)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1933722 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/sections.xml b/docs/manual/sections.xml
index e2974aa3a0..d7bd32afa9 100644
--- a/docs/manual/sections.xml
+++ b/docs/manual/sections.xml
@@ -223,15 +223,31 @@ as any other requests starting with the /private string.
The Location
directive need not have anything to do with the filesystem.
For example, the following example shows how to map a particular
-URL to an internal Apache HTTP Server handler provided by mod_status.
-No file called server-status needs to exist in the
+URL to an internal handler provided by mod_status.
+No file called server-status needs to exist on the
filesystem.
+# Map a URL to a built-in handler:
<Location "/server-status">
SetHandler server-status
</Location>
+
+# Map a URL path to a reverse proxy backend:
+<Location "/app">
+ ProxyPass "http://backend.example.com/"
+ ProxyPassReverse "http://backend.example.com/"
+</Location>
+
+# Deny access to a URL path regardless of what serves it:
+<Location "/private">
+ Require all denied
+</Location>
+
+Because Location
+operates on URLs rather than filesystem paths, it is the appropriate
+container for proxy configuration and module-provided endpoints.