Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
L
libvmod-hoailona
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
uplex-varnish
libvmod-hoailona
Commits
c8358237
Commit
c8358237
authored
Feb 02, 2019
by
Nils Goroll
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adjust event function name due to vmodtool change in varnish-cache
Ref d8ae26b5a0b4a1102360a61a145e4730e52d68bc
parent
469e3c19
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
9 additions
and
11 deletions
+9
-11
README.rst
README.rst
+8
-10
vmod_hoailona.c
src/vmod_hoailona.c
+1
-1
No files found.
README.rst
View file @
c8358237
...
...
@@ -6,8 +6,6 @@
.. role:: ref(emphasis)
.. _vmod_hoailona(3):
=============
vmod_hoailona
=============
...
...
@@ -243,7 +241,7 @@ subroutines, subsequent calls to ``.token()`` and ``.secret()`` in the
same backend transaction are based on the policy that was determined
by that call.
.. _
obj_
policy:
.. _
vmod_hoailona.
policy:
new xpolicy = hoailona.policy(ENUM type, DURATION ttl, STRING description, BLOB secret, INT start_offset)
---------------------------------------------------------------------------------------------------------
...
...
@@ -311,7 +309,7 @@ Examples::
# A policy for "access denied"
new forbid = hoailona.policy(DENY, description="access denied");
.. _
obj_
hosts:
.. _
vmod_hoailona.
hosts:
new xhosts = hoailona.hosts()
-----------------------------
...
...
@@ -321,7 +319,7 @@ that associates with policies with hostnames, and optionally with
path patterns. The constructor has no parameters; the object only
becomes useful by calling the ``.add()`` method.
.. _
func_
hosts.add:
.. _
vmod_hoailona.
hosts.add:
VOID xhosts.add(STRING host, STRING policy, STRING path, STRING description)
----------------------------------------------------------------------------
...
...
@@ -466,7 +464,7 @@ Examples::
h.add("evil.org", "deny", description="no access to evil.org");
}
.. _
func_
hosts.policy:
.. _
vmod_hoailona.
hosts.policy:
INT xhosts.policy(STRING host=0, STRING path=0)
-----------------------------------------------
...
...
@@ -533,7 +531,7 @@ with parameters.
Calling ``.policy()`` with only one of the ``host`` and ``path``
parameters empty is an error.
.. _
func_
hosts.token:
.. _
vmod_hoailona.
hosts.token:
STRING xhosts.token(STRING acl, DURATION ttl, STRING data)
----------------------------------------------------------
...
...
@@ -594,7 +592,7 @@ Examples::
# needed for SecureHD authorization.
}
.. _
func_
hosts.secret:
.. _
vmod_hoailona.
hosts.secret:
BLOB xhosts.secret()
--------------------
...
...
@@ -637,7 +635,7 @@ Examples::
}
}
.. _
func_
hosts.explain:
.. _
vmod_hoailona.
hosts.explain:
STRING xhosts.explain()
-----------------------
...
...
@@ -671,7 +669,7 @@ Example::
std.log("Policy determination: " + config.explain());
}
.. _
func_
version:
.. _
vmod_hoailona.
version:
STRING version()
----------------
...
...
src/vmod_hoailona.c
View file @
c8358237
...
...
@@ -122,7 +122,7 @@ errmsg(VRT_CTX, const char *fmt, ...)
/* Event function */
int
v_matchproto_
(
vmod_event_f
)
event
(
VRT_CTX
,
struct
vmod_priv
*
priv
,
enum
vcl_event_e
e
)
vmod_
event
(
VRT_CTX
,
struct
vmod_priv
*
priv
,
enum
vcl_event_e
e
)
{
(
void
)
ctx
;
(
void
)
priv
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment