Documentation Source Text

Check-in [b0c5406903]
Login

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview
Comment:Fix typo in comment.
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA3-256: b0c540690380202239c5678387069d89bc43009d1e5d54ea39081fb57a8030e8
User & Date: mistachkin 2019-08-07 21:59:31
Context
2019-08-14
16:54
Merge the test dashboard development line into trunk. check-in: ed6e0d08a7 user: drh tags: trunk
2019-08-07
21:59
Fix typo in comment. check-in: b0c5406903 user: mistachkin tags: trunk
2019-08-05
20:39
Back out the previous change. We are instead going to modify the code to match the documentation. check-in: e16ada80d6 user: drh tags: trunk
Changes
Hide Diffs Side-by-Side Diffs Ignore Whitespace Patch

Changes to misc/althttpd.c.

    31     31   **        corresponding host directory does not exist, then the
    32     32   **        "default.website" is used.  If the HTTP_HOST header contains any
    33     33   **        charaters other than [a-zA-Z0-9_.,*~/] then a 403 error is
    34     34   **        generated.
    35     35   **
    36     36   **    (3) Any file or directory whose name begins with "." or "-" is ignored,
    37     37   **        except for /.well-known/ at the top-level.  The exception is for
    38         -**        RFC-5785 to allow letsencrypt or certbot to generate a TSL cert
           38  +**        RFC-5785 to allow letsencrypt or certbot to generate a TLS cert
    39     39   **        using webroot.
    40     40   **
    41     41   **    (4) Characters other than [0-9a-zA-Z,-./:_~] and any %HH characters
    42     42   **        escapes in the filename are all translated into "_".  This is
    43     43   **        a defense against cross-site scripting attacks and other mischief.
    44     44   **
    45     45   **    (5) Executable files are run as CGI.  Files whose name ends with ".scgi"