From: Rich Bowen Date: Sat, 2 May 2026 20:05:16 +0000 (+0000) Subject: Bug 69092: Expand Location examples to clarify non-filesystem use (proxy, access... X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=33daa89d0559b0f8a643a90940f812524d3552bc;p=thirdparty%2Fapache%2Fhttpd.git Bug 69092: Expand Location examples to clarify non-filesystem use (proxy, access control) git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1933722 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/sections.xml b/docs/manual/sections.xml index e2974aa3a0..d7bd32afa9 100644 --- a/docs/manual/sections.xml +++ b/docs/manual/sections.xml @@ -223,15 +223,31 @@ as any other requests starting with the /private string.

The Location directive need not have anything to do with the filesystem. For example, the following example shows how to map a particular -URL to an internal Apache HTTP Server handler provided by mod_status. -No file called server-status needs to exist in the +URL to an internal handler provided by mod_status. +No file called server-status needs to exist on the filesystem.

+# Map a URL to a built-in handler: <Location "/server-status"> SetHandler server-status </Location> + +# Map a URL path to a reverse proxy backend: +<Location "/app"> + ProxyPass "http://backend.example.com/" + ProxyPassReverse "http://backend.example.com/" +</Location> + +# Deny access to a URL path regardless of what serves it: +<Location "/private"> + Require all denied +</Location> + +

Because Location +operates on URLs rather than filesystem paths, it is the appropriate +container for proxy configuration and module-provided endpoints.

Overlapping Webspace