<dt><code><var>-A string</var></code></dt>
<dd><p>true if the URL represented by the string is accessible by
- configuration, false otherwise. This test only has an effect if
- <directive>SSIAccessEnable</directive> is on. This is useful
- where content on a page is to be hidden from users who are not
- authorized to view the URL, such as a link to that URL. Note
- that the URL is only tested for whether access would be granted,
- not whether the URL exists.</p>
+ configuration, false otherwise. This is useful where content on a
+ page is to be hidden from users who are not authorized to view the
+ URL, such as a link to that URL. Note that the URL is only tested
+ for whether access would be granted, not whether the URL exists.</p>
<example><title>Example</title>
<!--#if expr="-A /private" --><br />
</usage>
</directivesynopsis>
-<directivesynopsis>
-<name>SSIAccessEnable</name>
-<description>Enable the -A flag in legacy conditional expressions.</description>
-<syntax>SSIAccessEnable on|off</syntax>
-<default>SSIAccessEnable off</default>
-<contextlist><context>directory</context><context>.htaccess</context></contextlist>
-
-<usage>
- <note><directive>SSIAccessEnable</directive> has no effect unless
- <directive module="mod_include">SSILegacyExprParser</directive> is set to
- <code>on</code>.
- </note>
-
- <p>The <directive>SSIAccessEnable</directive> directive controls whether
- the -A test is enabled during conditional flow control processing when
- using the 2.2.x compatible expression parser.
- <directive>SSIAccessEnable</directive> can take on the following values:</p>
-
- <dl>
-
- <dt><code>off</code></dt>
- <dd><!--#if expr="-A /foo"--> will be interpreted as a series
- of string and regular expression tokens, the -A has no special
- meaning.</dd>
-
- <dt><code>on</code></dt>
- <dd><!--#if expr="-A /foo"--> will evaluate to false if the
- URL /foo is inaccessible by configuration, or true otherwise.</dd>
-
- </dl>
-
-</usage>
-</directivesynopsis>
-
<directivesynopsis>
<name>SSIETag</name>
<description>Controls whether ETags are generated by the server.</description>
const char *default_time_fmt;
const char *undefined_echo;
xbithack_t xbithack;
- signed char accessenable;
signed char lastmodified;
signed char etag;
signed char legacy_expr;
const char *undefined_echo;
apr_size_t undefined_echo_len;
- char accessenable; /* is using the access tests allowed? */
char legacy_expr; /* use ap_expr or legacy mod_include
expression parser? */
TYPE_TOKEN(token, TOKEN_LT);
return 0;
case '-':
- if (**parse == 'A' && (ctx->intern->accessenable)) {
+ if (**parse == 'A') {
TYPE_TOKEN(token, TOKEN_ACCESS);
++*parse;
return 0;
if ((ap_allow_options(r) & OPT_INC_WITH_EXEC) == 0) {
ctx->flags |= SSI_FLAG_NO_EXEC;
}
- intern->accessenable = (conf->accessenable > 0);
intern->legacy_expr = (conf->legacy_expr > 0);
intern->expr_eval_ctx = NULL;
intern->expr_err = NULL;
include_dir_config *result = apr_pcalloc(p, sizeof(include_dir_config));
result->xbithack = XBITHACK_UNSET;
- result->accessenable = UNSET;
result->lastmodified = UNSET;
result->etag = UNSET;
result->legacy_expr = UNSET;
MERGE(base, over, new, default_time_fmt, NULL);
MERGE(base, over, new, undefined_echo, NULL);
MERGE(base, over, new, xbithack, XBITHACK_UNSET);
- MERGE(base, over, new, accessenable, UNSET);
MERGE(base, over, new, lastmodified, UNSET);
MERGE(base, over, new, etag, UNSET);
MERGE(base, over, new, legacy_expr, UNSET);
"SSI End String Tag"),
AP_INIT_TAKE1("SSIUndefinedEcho", set_undefined_echo, NULL, OR_ALL,
"String to be displayed if an echoed variable is undefined"),
- AP_INIT_FLAG("SSIAccessEnable", ap_set_flag_slot_char,
- (void *)APR_OFFSETOF(include_dir_config, accessenable),
- OR_LIMIT, "Whether testing access is enabled. Limited to 'on' or 'off'"),
AP_INIT_FLAG("SSILegacyExprParser", ap_set_flag_slot_char,
(void *)APR_OFFSETOF(include_dir_config, legacy_expr),
OR_LIMIT,