Search directive in the configuration file:
Search /search/script/pathname
This script is called with the vital information in the following
CGI environment
variables:
PATH_INFO
PATH_TRANSLATED
PATH_INFO.
QUERY_STRING
argv[1], argv[2], ...
Location: field,
or a Content-Type: field, typically:
Content-Type: text/html
if the document is an HTML document.
POST requests are handled by calling the script defined
by POST-Script directive:
POST-Script /absolute/path/post-handler
POST handler script is called in the normal CGI manner, and its output must be CGI
compliant.
Only such POST
requests are handled by the POST handler that haven't already matched
an Exec rule (which causes
a specified script to be called).
PUT requests are handled by calling the script defined by
PUT-Script configuration directive:
PUT-Script /absolute/path/put-handler
PUT handler script is called in the normal CGI manner, and its output must be CGI
compliant.
By default PUT
method is disabled; you must explicitly enable it in the configuration
file:
Enable PUT
This is to enhance security.
Since PUT can
be a very dangerous method because it allows files to be written back to
the server, it is not possible to use PUT without access
authorization module being activated. This means that you have to
have at least a DefProt
rule specifying a default protection setup, which then in turn defines
the PutMask containing the list of allowed users and
hosts to perform PUT operation.
DELETE requests are handled by calling the script defined by
DELETE-Script configuration directive:
DELETE-Script /absolute/path/put-handler
DELETE handler script is called in the normal CGI manner, and its output must be CGI
compliant.
By default DELETE
method is disabled; you must explicitly enable it in the configuration
file:
Enable DELETE
This is to enhance security.
Since DELETE can
be a very dangerous method because it allows files to be deleted from
the server, it is not possible to use DELETE without access
authorization module being activated. This means that you have to
have at least a DefProt
rule specifying a default protection setup, which then in turn defines
the DeleteMask containing the list of allowed users and
hosts to perform DELETE operation.