iTP Secure WebServer System Administrator's Guide (iTPWebSvr 6.0+)

Configuring the iTP Secure WebServer
iTP Secure WebServer System Administrator’s Guide523346-002
7-53
Setting Up a Server-Side Include (SSI)
file
gives a pathname relative to the directory in which the document with the
#include occurs. The path ./ cannot be used in this pathname, nor can
absolute paths be used. As for the virtual option, you can access other static
documents, but not CGI scripts. For example:
<!--#include file="text.html"-->
echo
The echo command prints the value of the specified CGI environment variable or
SSI variable (see Table 11-2, Region Directive Variables for Anonymous Sessions,
on page 11-16). Dates are printed using the currently configured timefmt value.
The only valid tag for this command is var, whose value is the name of the variable
you want to echo. For example:
<!--#echo var="DOCUMENT_NAME"-->
exec
The exec command executes a given shell command or CGI script and inserts the
results in the document. Any included file specified as CGI is subject to the region
commands that apply to its URL. The exec command is enabled only if the
-restricted option of the EnableIncludes directive is set. The exec command
accepts the following tags:
cmd
executes a given command string using /bin/sh (the Bourne shell) and inserts
the results in the document. All of the variables listed in Table 7-2, Region
Directive Variables, on page 7-39 can be accessed by parsed documents. For
example:
<!--#exec cmd="ls -l var=DOCUMENT_NAME"-->
cgi
executes a given CGI script (specified by virtual pathname and access control)
and inserts the results into the document. The pathname is relative to the
location of generic-cgi.pway. For example, if generic-cgi.pway is in the
directory /usr/tandem/webserver/bin, the command
<!--#exec cgi="/test/test.cgi"-->
executes the CGI program stored at
/usr/tandem/webserver/bin/test/test.cgi.
The server does not perform error checking to ensure that the specified
generated HTML output is valid; therefore, you should use this tag with
caution.