From 4ee8fa1c5adedd462ee15c352c1f86d97dd0b8e0 Mon Sep 17 00:00:00 2001 From: Joshua Slive Date: Sat, 24 Aug 2002 18:26:19 +0000 Subject: [PATCH] Convert to xml and do a MAJOR revision and expansion of the sections (, , etc) docs. Further review by config-merging experts would be appreciated. Reviewed by: Rich Bowen, Andre Malo git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@96522 13f79535-47bb-0310-9956-ffa450edef68 --- docs/manual/sections.html.en | 494 ++++++++++++++++++++++++++--------- docs/manual/sections.xml | 467 +++++++++++++++++++++++++++++++++ 2 files changed, 838 insertions(+), 123 deletions(-) create mode 100644 docs/manual/sections.xml diff --git a/docs/manual/sections.html.en b/docs/manual/sections.html.en index 2324296576..bb0c114783 100644 --- a/docs/manual/sections.html.en +++ b/docs/manual/sections.html.en @@ -1,151 +1,399 @@ - - - - - - - How Directory, Location and Files sections work - - - - - - -

How Directory, Location and Files sections - work

- -

The sections <Directory>, - <Location> - and <Files> can - contain directives which only apply to specified directories, - URLs or files respectively. Also htaccess files can be used - inside a directory to apply directives to that directory. This - document explains how these different sections differ and how - they relate to each other when Apache decides which directives - apply for a particular directory or request URL.

- -

Directives allowed in the sections

- -

Everything that is syntactically allowed in - <Directory> is also allowed in - <Location> (except a - sub-<Files> section). Semantically, however - some things, most notably AllowOverride and the - two options FollowSymLinks and - SymLinksIfOwnerMatch, make no sense in - <Location>, - <LocationMatch> or - <DirectoryMatch>. The same for - <Files> -- syntactically everything is fine, - but semantically some things are different.

- -

How the sections are merged

+Configuration Sections - Apache HTTP Server
[APACHE DOCUMENTATION]

Apache HTTP Server Version 2.0

Configuration Sections

Directives in the configuration files may apply to the +entire server, or they may be restricted to apply only to particular +directories, files, hosts, or URLs. This document describes how to +use configuration section containers or .htaccess files +to change the scope of other configuration directives.

+

Types of Configuration Section Containers

-

The order of merging is:

+
Related Modules

core
mod_proxy
Related Directives

<Directory>
<DirectoryMatch>
<Files>
<FilesMatch>
<IfDefine>
<IfModule>
<Location>
<LocationMatch>
<Proxy>
<VirtualHost>
-
    -
  1. <Directory> (except regular - expressions) and .htaccess done simultaneously (with - .htaccess, if allowed, overriding - <Directory>)
  2. +

    There are two basic types of containers. Most containers are +evaluated for each request. The enclosed directives are applied only +for those requests that match the containers. The <IfDefine> and <IfModule> containers, on the +other hand, are evaluated only at server startup and restart. If +their conditions are true at startup, then the enclosed directives +will apply to all requests. If the conditions are not true, the +enclosed directives will be ignored.

    -
  3. <DirectoryMatch>, and - <Directory> with regular expressions
  4. +

    The <IfDefine> directive +encloses directives that will only be applied if an appropriate +parameter is defined on the httpd command line. For example, +with the following configuration, all requests will be redirected +to another site only if the server is started using +httpd -DClosedForNow:

    -
  5. <Files> and - <FilesMatch> done simultaneously
  6. +
    +<IfDefine ClosedForNow>
    +Redirect / http://otherserver.example.com/
    +</IfDefine> +
    -
  7. <Location> and - <LocationMatch> done simultaneously
  8. -
+

The <IfModule> +directive is very similar, except it encloses directives that will +only be applied if a particular module is available in the server. +The module must either be statically compiled in the server, or it +must be dynamically compiled and its LoadModule line must be earlier in the +configuration file. This directive should only be used if you need +your configuration file to work whether or not certain modules are +installed. It should not be used to enclose directives that you want +to work all the time, because it can suppress useful error messages +about missing modules.

-

Apart from <Directory>, each group is - processed in the order that they appear in the configuration - files. <Directory> (group 1 above) is - processed in the order shortest directory component to longest. - If multiple <Directory> sections apply to - the same directory they are processed in the configuration - file order. Configurations included - via the Include directive will be treated as if - they were inside the including file at the location of the - Include directive.

+

In the following example, the MimeMagicFiles directive will be +applied only if mod_mime_magic is available.

-

Sections inside <VirtualHost> sections - are applied after the corresponding sections outside - the virtual host definition. This allows virtual hosts to - override the main server configuration.

+
+<IfModule mod_mime_magic.c>
+MimeMagicFile conf/magic
+</IfModule> +
-

Later sections override earlier ones.

+

Both <IfDefine> +and <IfModule> +can apply negative conditions by preceding their test with "!". +Also, these sections can be nested to achieve more complex +restrictions.

+

Filesystem and Webspace

+ +

The most commonly used configuration section containers are the +ones that change the configuration of particular places in the +filesystem or webspace. First, it is important to understand the +difference between the two. The filesystem is the view of your disks +as seen by your operating system. For example, in a default install, +Apache resides at /usr/local/apache2 in the Unix +filesystem or "c:/Program Files/Apache Group/Apache2" in +the Windows filesystem. (Note that forward slashes should always be +used as the path separator in Apache, even for Windows.) In contrast, +the webspace is the view of your site as delivered by the web server +and seen by the client. So the path /dir/ in the +webspace corresponds to the path +/usr/local/apache2/htdocs/dir/ in the filesystem of a +default Apache install on Unix. The webspace need not map directly to +the filesystem, since webpages may be generated dynamically +from databases or other locations.

+ +

Filesystem Containers

+ +

The <Directory> +and <Files> +directives, along with their regex counterparts, apply directives to +parts of the filesystem. Directives enclosed in a <Directory> section apply to +the named filesystem directory and all subdirectories of that +directory. The same effect can be obtained using .htaccess files. For example, in the +following configuration, directory indexes will be enabled for the +/var/web/dir1 directory and all subdirectories.

+ +
+<Directory /var/web/dir1>
+Options +Indexes
+</Directory> +
+ +

Directives enclosed in a <Files> section apply to any file with +the specified name, regardless of what directory it lies in. +So for example, the following configuration directives will, +when placed in the main section of the configuration file, +deny access to any file named private.html regardless +of where it is found.

+ +
+<Files private.html>
+Order allow,deny
+Deny from all
+</Files> +
+ +

To address files found in a particular part of the filesystem, the +<Files> and +<Directory> sections +can be combined. For example, the following configuration will deny +access to /var/web/dir1/private.html, +/var/web/dir1/subdir2/private.html, +/var/web/dir1/subdir3/private.html, and any other instance +of private.html found under the /var/web/dir1/ +directory.

+ +
+<Directory /var/web/dir1>
+<Files private.html>
+Order allow,deny
+Deny from all
+</Files>
+</Directory> +
+ + +

Webspace Containers

+ +

The <Location> +directive and its regex counterpart, on the other hand, change the +configuration for content in the webspace. For example, the following +configuration prevents access to any URL-path that begins in /private. +In particular, it will apply to requests for +http://yoursite.example.com/private, +http://yoursite.example.com/private123, and +http://yoursite.example.com/private/dir/file.html as well +as any other requests starting with the /private string.

+ +
+<Location /private>
+Order Allow,Deny
+Deny from all
+</Location> +
+ +

The <Location> +directive need not have anything to do with the filesystem. +For example, the following example shows how to map a particular +URL to an internal Apache handler provided by mod_status. +No file called server-status needs to exist in the +filesystem.

+ +
+<Location /server-status>
+SetHandler server-status
+</Location> +
+ + +

Wildcards and Regular Expressions

+ +

The <Directory>, +<Files>, and +<Location> +directives can each use the shell-style wildcard characters "?" to +match any single character, "*" to match any set of characters, and +character classes like [a-zA-Z] to match particular characters. This +is useful to apply the same configuration to a group of filesystem or +webspace locations. If even more flexible matching is required, each +container has a regular-expression (regex) counterpart <DirectoryMatch>, <FilesMatch>, and <LocationMatch> that allow +perl-compatibleregular expressions +to be used in choosing the matches. But see the section below on +configuration merging to find out how using regex sections will change +how directives are applied.

+ +

A non-regex wildcard section that changes the configuration of +all user directories could look as follows:

+ +
+<Directory /home/*/public_html>
+Options Indexes
+</Directory> +
+ +

Using regex sections, we can deny access to many types of image files +at once:

+
+<FilesMatch \.(?i:gif|jpe?g|png)$>
+Order allow,deny
+Deny from all
+</FilesMatch> +
-

Notes about using sections

-

The general guidelines are:

-
    -
  • If you are attempting to match objects at the filesystem - level then you must use <Directory> and/or - <Files>.
  • +

    What to use When

    -
  • If you are attempting to match objects at the URL level - then you must use <Location>
  • -
+

Choosing between filesystem containers and webspace containers is +actually quite easy. When applying directives to objects that reside +in the filesystem always use <Directory> or <Files>. When applying directives to objects +that do not reside in the filesystem (such as a webpage generated from +a database), use <Location>.

-

But a notable exception is:

+

It is important to never use <Location> when trying to restrict +access to objects in the filesystem. This is because many +different webspace locations (URLs) could map to the same filesystem +location, allowing your restrictions to be circumvented. +For example, consider the following configuration:

-
    -
  • proxy control is done via <Directory>. - This is a legacy mistake because the proxy existed prior to - <Location>. A future version of the config - language should probably switch this to - <Location>.
  • -
+
+<Location /dir/>
+Order allow,deny
+Deny from all
+</Location> +
-

Note about .htaccess parsing:

+

This works fine if the request is for +http://yoursite.example.com/dir/. But what if you are on +a case-insensitive filesystem? Then your restriction could be easily +circumvented by requesting +http://yoursite.example.com/DIR/. The <Directory> directive, in +contrast, will apply to any content served from that location, +regardless of how it is called. (An exception is filesystem links. +The same directory can be placed in more than one part of the +filesystem using symbolic links. The <Directory> directive will follow the symbolic +link without resetting the pathname. Therefore, for the highest level +of security, symbolic links should be disabled with the appropriate +Options directive.)

-
    -
  • Modifying .htaccess parsing during Location doesn't do - anything because .htaccess parsing has already occurred.
  • -
+

If you are, perhaps, thinking that none of this applies to you +because you use a case-sensitive filesystem, remember that there are +many other ways to map multiple webspace locations to the same +filesystem location. Therefore you should always use the filesystem +containers when you can. There is, however, one exception to this +rule. Putting configuration restrictions in a <Location +/> section is perfectly safe because this section will apply +to all requests regardless of the specific URL.

-

<Location> and symbolic links:

-
    -
  • It is not possible to use "Options - FollowSymLinks" or "Options - SymLinksIfOwnerMatch" inside a - <Location>, - <LocationMatch> or - <DirectoryMatch> section (the options are - simply ignored). Using the options in question is only - possible inside a <Directory> section (or - a .htaccess file).
  • -
+

Virtual Hosts

-

<Files> and Options:

+

The <VirtualHost> +container encloses directives that apply to specific hosts. +This is useful when serving multiple hosts from the same machine +with a different configuration for each. For more information, +see the Virtual Host Documentation.

+

Proxy

-
    -
  • Apache won't check for it, but using an - Options directive inside a - <Files> section has no effect.
  • -
+

The <Proxy> +container applies enclosed configuration directives only +to sites accessed through mod_proxy's proxy server +that match the specified URL. For example, the following configuration +will prevent the proxy server from being used to access the +cnn.com website.

-

Another note:

+
+<Proxy http://cnn.com/*>
+Order allow,deny
+Deny from all
+</Proxy> +
+

What Directives are Allowed?

-
    -
  • There is actually a +

    To find out what directives are allowed in what types of +configuration sections, check the Context of the directive. +Everything that is allowed in +<Directory> +sections is also syntactically allowed in +<DirectoryMatch>, +<Files>, +<FilesMatch>, +<Location>, +<LocationMatch>, +and +<Proxy> +sections. There are some exceptions, however.

    + + +

    How the sections are merged

    + +

    The configuration sections are applied in a very particular order. +Since this can have important effects on how configuration directives +are interpreted, it is important to understand how this works.

    + +

    The order of merging is:

    + +
      +
    1. <Directory> (except regular expressions) + and .htaccess done simultaneously (with .htaccess, if allowed, + overriding <Directory>)
    2. + +
    3. <DirectoryMatch> + (and <Directory ~>)
    4. + +
    5. <Files> and <FilesMatch> done + simultaneously
    6. + +
    7. <Location> + and <LocationMatch> done simultaneously
    8. +
    + +

    Apart from <Directory>, each group is processed in + the order that they appear in the configuration files. <Directory> (group 1 above) + is processed in the order shortest directory component to longest. + So for example, <Directory /var/web/dir> will + be processed before <Directory + /var/web/dir/subdir>. If multiple <Directory> sections apply + to the same directory they are processed in the configuration file + order. Configurations included via the Include directive will be treated as if + they were inside the including file at the location of the + Include directive.

    + +

    Sections inside <VirtualHost> sections + are applied after the corresponding sections outside + the virtual host definition. This allows virtual hosts to + override the main server configuration.

    + +

    Later sections override earlier ones.

    + +

    Technical Note

    + There is actually a <Location>/<LocationMatch> sequence performed just before the name translation phase (where Aliases and DocumentRoots are used to map URLs to filenames). The results of this sequence are completely thrown away after the translation has - completed. - - - - + completed. +
    + +

    Some Examples

    + +

    Below is an artificial example to show the order of +merging. Assuming they all apply to the request, the directives in +this example will be applied in the order A > B > C > D > +E.

    + +
    +<Location />
    +E
    +</Location>
    +
    +<Files f.html>
    +D
    +</Files>
    +
    +<VirtualHost *>
    +<Directory /a/b>
    +B
    +</Directory>
    +</VirtualHost>
    +
    +<DirectoryMatch "^.*b$">
    +C
    +</DirectoryMatch>
    +
    +<Directory /a/b>
    +A
    +</Directory>
    +
    +
    + +

    For a more concrete example, consider the following. Regardless of +any access restrictions placed in <Directory> sections, the <Location> section will be +evaluated last and will allow unrestricted access to the server. In +other words, order of merging is important, so be careful!

    + +
    +<Location />
    +Order deny,allow
    +Allow from all
    +</Location>
    +
    +# Woops! This <Directory> section will have no effect
    +<Directory />
    +Order allow,deny
    +Allow from all
    +Deny from badguy.example.com
    +</Directory> +
    + + +

Apache HTTP Server Version 2.0

IndexHome \ No newline at end of file diff --git a/docs/manual/sections.xml b/docs/manual/sections.xml new file mode 100644 index 0000000000..8b0d3a8fc2 --- /dev/null +++ b/docs/manual/sections.xml @@ -0,0 +1,467 @@ + + + + + + + +Configuration Sections + +

Directives in the configuration files may apply to the +entire server, or they may be restricted to apply only to particular +directories, files, hosts, or URLs. This document describes how to +use configuration section containers or .htaccess files +to change the scope of other configuration directives.

+
+ +
Types of Configuration Section Containers + + + +core +mod_proxy + + +Directory +DirectoryMatch +Files +FilesMatch +IfDefine +IfModule +Location +LocationMatch +Proxy +VirtualHost + + + +

There are two basic types of containers. Most containers are +evaluated for each request. The enclosed directives are applied only +for those requests that match the containers. The IfDefine and IfModule containers, on the +other hand, are evaluated only at server startup and restart. If +their conditions are true at startup, then the enclosed directives +will apply to all requests. If the conditions are not true, the +enclosed directives will be ignored.

+ +

The IfDefine directive +encloses directives that will only be applied if an appropriate +parameter is defined on the httpd command line. For example, +with the following configuration, all requests will be redirected +to another site only if the server is started using +httpd -DClosedForNow:

+ + +<IfDefine ClosedForNow>
+Redirect / http://otherserver.example.com/
+</IfDefine> +
+ +

The IfModule +directive is very similar, except it encloses directives that will +only be applied if a particular module is available in the server. +The module must either be statically compiled in the server, or it +must be dynamically compiled and its LoadModule line must be earlier in the +configuration file. This directive should only be used if you need +your configuration file to work whether or not certain modules are +installed. It should not be used to enclose directives that you want +to work all the time, because it can suppress useful error messages +about missing modules.

+ +

In the following example, the MimeMagicFiles directive will be +applied only if mod_mime_magic is available.

+ + +<IfModule mod_mime_magic.c>
+MimeMagicFile conf/magic
+</IfModule> +
+ +

Both IfDefine +and IfModule +can apply negative conditions by preceding their test with "!". +Also, these sections can be nested to achieve more complex +restrictions.

+
+ +
Filesystem and Webspace + +

The most commonly used configuration section containers are the +ones that change the configuration of particular places in the +filesystem or webspace. First, it is important to understand the +difference between the two. The filesystem is the view of your disks +as seen by your operating system. For example, in a default install, +Apache resides at /usr/local/apache2 in the Unix +filesystem or "c:/Program Files/Apache Group/Apache2" in +the Windows filesystem. (Note that forward slashes should always be +used as the path separator in Apache, even for Windows.) In contrast, +the webspace is the view of your site as delivered by the web server +and seen by the client. So the path /dir/ in the +webspace corresponds to the path +/usr/local/apache2/htdocs/dir/ in the filesystem of a +default Apache install on Unix. The webspace need not map directly to +the filesystem, since webpages may be generated dynamically +from databases or other locations.

+ +
Filesystem Containers + +

The Directory +and Files +directives, along with their regex counterparts, apply directives to +parts of the filesystem. Directives enclosed in a Directory section apply to +the named filesystem directory and all subdirectories of that +directory. The same effect can be obtained using .htaccess files. For example, in the +following configuration, directory indexes will be enabled for the +/var/web/dir1 directory and all subdirectories.

+ + +<Directory /var/web/dir1>
+Options +Indexes
+</Directory> +
+ +

Directives enclosed in a Files section apply to any file with +the specified name, regardless of what directory it lies in. +So for example, the following configuration directives will, +when placed in the main section of the configuration file, +deny access to any file named private.html regardless +of where it is found.

+ + +<Files private.html>
+Order allow,deny
+Deny from all
+</Files> +
+ +

To address files found in a particular part of the filesystem, the +Files and +Directory sections +can be combined. For example, the following configuration will deny +access to /var/web/dir1/private.html, +/var/web/dir1/subdir2/private.html, +/var/web/dir1/subdir3/private.html, and any other instance +of private.html found under the /var/web/dir1/ +directory.

+ + +<Directory /var/web/dir1>
+<Files private.html>
+Order allow,deny
+Deny from all
+</Files>
+</Directory> +
+
+ +
Webspace Containers + +

The Location +directive and its regex counterpart, on the other hand, change the +configuration for content in the webspace. For example, the following +configuration prevents access to any URL-path that begins in /private. +In particular, it will apply to requests for +http://yoursite.example.com/private, +http://yoursite.example.com/private123, and +http://yoursite.example.com/private/dir/file.html as well +as any other requests starting with the /private string.

+ + +<Location /private>
+Order Allow,Deny
+Deny from all
+</Location> +
+ +

The Location +directive need not have anything to do with the filesystem. +For example, the following example shows how to map a particular +URL to an internal Apache handler provided by mod_status. +No file called server-status needs to exist in the +filesystem.

+ + +<Location /server-status>
+SetHandler server-status
+</Location> +
+
+ +
Wildcards and Regular Expressions + +

The Directory, +Files, and +Location +directives can each use the shell-style wildcard characters "?" to +match any single character, "*" to match any set of characters, and +character classes like [a-zA-Z] to match particular characters. This +is useful to apply the same configuration to a group of filesystem or +webspace locations. If even more flexible matching is required, each +container has a regular-expression (regex) counterpart DirectoryMatch, FilesMatch, and LocationMatch that allow +perl-compatibleregular expressions +to be used in choosing the matches. But see the section below on +configuration merging to find out how using regex sections will change +how directives are applied.

+ +

A non-regex wildcard section that changes the configuration of +all user directories could look as follows:

+ + +<Directory /home/*/public_html>
+Options Indexes
+</Directory> +
+ +

Using regex sections, we can deny access to many types of image files +at once:

+ +<FilesMatch \.(?i:gif|jpe?g|png)$>
+Order allow,deny
+Deny from all
+</FilesMatch> +
+ +
+ +
What to use When + +

Choosing between filesystem containers and webspace containers is +actually quite easy. When applying directives to objects that reside +in the filesystem always use Directory or Files. When applying directives to objects +that do not reside in the filesystem (such as a webpage generated from +a database), use Location.

+ +

It is important to never use Location when trying to restrict +access to objects in the filesystem. This is because many +different webspace locations (URLs) could map to the same filesystem +location, allowing your restrictions to be circumvented. +For example, consider the following configuration:

+ + +<Location /dir/>
+Order allow,deny
+Deny from all
+</Location> +
+ +

This works fine if the request is for +http://yoursite.example.com/dir/. But what if you are on +a case-insensitive filesystem? Then your restriction could be easily +circumvented by requesting +http://yoursite.example.com/DIR/. The Directory directive, in +contrast, will apply to any content served from that location, +regardless of how it is called. (An exception is filesystem links. +The same directory can be placed in more than one part of the +filesystem using symbolic links. The Directory directive will follow the symbolic +link without resetting the pathname. Therefore, for the highest level +of security, symbolic links should be disabled with the appropriate +Options directive.)

+ +

If you are, perhaps, thinking that none of this applies to you +because you use a case-sensitive filesystem, remember that there are +many other ways to map multiple webspace locations to the same +filesystem location. Therefore you should always use the filesystem +containers when you can. There is, however, one exception to this +rule. Putting configuration restrictions in a <Location +/> section is perfectly safe because this section will apply +to all requests regardless of the specific URL.

+
+ +
+ +
Virtual Hosts + +

The VirtualHost +container encloses directives that apply to specific hosts. +This is useful when serving multiple hosts from the same machine +with a different configuration for each. For more information, +see the Virtual Host Documentation.

+
+ +
Proxy + +

The Proxy +container applies enclosed configuration directives only +to sites accessed through mod_proxy's proxy server +that match the specified URL. For example, the following configuration +will prevent the proxy server from being used to access the +cnn.com website.

+ + +<Proxy http://cnn.com/*>
+Order allow,deny
+Deny from all
+</Proxy> +
+
+ +
What Directives are Allowed? + +

To find out what directives are allowed in what types of +configuration sections, check the Context of the directive. +Everything that is allowed in +Directory +sections is also syntactically allowed in +DirectoryMatch, +Files, +FilesMatch, +Location, +LocationMatch, +and +Proxy +sections. There are some exceptions, however.

+ +
    +
  • The AllowOverride directive +works only in Directory +sections.
  • + +
  • The FollowSymLinks and +SymLinksIfOwnerMatch Options work only in Directory sections or +.htaccess files.
  • + +
  • The Options directive cannot +be used in Files +and FilesMatch +sections.
  • +
+
+ +
How the sections are merged + +

The configuration sections are applied in a very particular order. +Since this can have important effects on how configuration directives +are interpreted, it is important to understand how this works.

+ +

The order of merging is:

+ +
    +
  1. Directory (except regular expressions) + and .htaccess done simultaneously (with .htaccess, if allowed, + overriding Directory)
  2. + +
  3. DirectoryMatch + (and <Directory ~>)
  4. + +
  5. Files and FilesMatch done + simultaneously
  6. + +
  7. Location + and LocationMatch done simultaneously
  8. +
+ +

Apart from Directory, each group is processed in + the order that they appear in the configuration files. Directory (group 1 above) + is processed in the order shortest directory component to longest. + So for example, <Directory /var/web/dir> will + be processed before <Directory + /var/web/dir/subdir>. If multiple Directory sections apply + to the same directory they are processed in the configuration file + order. Configurations included via the Include directive will be treated as if + they were inside the including file at the location of the + Include directive.

+ +

Sections inside VirtualHost sections + are applied after the corresponding sections outside + the virtual host definition. This allows virtual hosts to + override the main server configuration.

+ +

Later sections override earlier ones.

+ +Technical Note + There is actually a + <Location>/<LocationMatch> + sequence performed just before the name translation phase + (where Aliases and DocumentRoots + are used to map URLs to filenames). The results of this + sequence are completely thrown away after the translation has + completed. + + +
Some Examples + +

Below is an artificial example to show the order of +merging. Assuming they all apply to the request, the directives in +this example will be applied in the order A > B > C > D > +E.

+ + +<Location />
+E
+</Location>
+
+<Files f.html>
+D
+</Files>
+
+<VirtualHost *>
+<Directory /a/b>
+B
+</Directory>
+</VirtualHost>
+
+<DirectoryMatch "^.*b$">
+C
+</DirectoryMatch>
+
+<Directory /a/b>
+A
+</Directory>
+
+
+ +

For a more concrete example, consider the following. Regardless of +any access restrictions placed in Directory sections, the Location section will be +evaluated last and will allow unrestricted access to the server. In +other words, order of merging is important, so be careful!

+ + +<Location />
+Order deny,allow
+Allow from all
+</Location>
+
+# Woops! This <Directory> section will have no effect
+<Directory />
+Order allow,deny
+Allow from all
+Deny from badguy.example.com
+</Directory> +
+ +
+ +
+
+ -- 2.50.1