[phpBB Debug] PHP Warning: in file [ROOT]/includes/crs/crs_misc_functions.php on line 37: mime_content_type(): Empty filename or path
[phpBB Debug] PHP Warning: in file [ROOT]/includes/crs/crs_misc_functions.php on line 37: mime_content_type(): Empty filename or path
Zen Cart 源代码 .htaccess

Zen Cart 源代码 .htaccess




下载文件

文件名: .htaccess
文件类型: Apache HTACCESS文件
文件大小: 2.93 KiB
MD5: 2c67ea04cbb0797f29ba9932f866be8f

.htaccess - 关闭高亮
  1. #
  2. # @copyright Copyright 2003-2013 Zen Cart Development Team
  3. # @license http://www.zen-cart.com/license/2_0.txt GNU Public License V2.0
  4. # @version GIT: $Id: Author: IronLady  Thu Aug 1 16:10:02 2013 +0100 Modified in v1.5.2 $
  5. #
  6. # This is used with Apache WebServers
  7. #
  8. # The following blocks direct HTTP requests to all filetypes in this directory recursively, except certain approved exceptions
  9. # It also prevents the ability of any scripts to run. No type of script, be it PHP, PERL or whatever, can normally be executed if ExecCGI is disabled.
  10. # Will also prevent people from seeing what is in the dir. and any sub-directories
  11. #
  12. # For this to work, you must include either 'All' or at least: 'Limit' and 'Indexes' parameters to the AllowOverride configuration in your apache/conf/httpd.conf file.
  13. # Additionally, if you want the added protection offered by the OPTIONS directive below, you'll need to add 'Options' to the AllowOverride list, if 'All' is not specified.
  14. # Example:
  15. #<Directory "/usr/local/apache/htdocs">
  16. #  AllowOverride Limit Options Indexes
  17. #</Directory>
  18. ###############################
  19.  
  20. # deny *everything*
  21. <FilesMatch ".*">
  22.   Order Allow,Deny
  23.   Deny from all
  24. </FilesMatch>
  25.  
  26. # but now allow just *certain* necessary files:
  27. <FilesMatch "(?i).*\.(js|css|html?|ico|jpe?g|gif|webp|png|swf|flv|xml|xsl|otf|ttf|woff|eot|svg)$">
  28.   Order Allow,Deny
  29.   Allow from all
  30. </FilesMatch>
  31.  
  32. IndexIgnore */*
  33.  
  34. <limit POST PUT>
  35. order deny,allow
  36. deny from All
  37. </limit>
  38.  
  39.  
  40. ## NOTE: If you want even greater security to prevent hackers from running scripts in this folder, uncomment the following line (if your hosting company will allow you to use OPTIONS):
  41. # OPTIONS -Indexes -ExecCGI
  42.  
  43.  
  44.  
  45. ##################
  46. ## Optional caching improvements
  47. ## Requires mod_header and mod_deflate to be enabled within Apache
  48. ##################
  49. <IfModule mod_headers.c>
  50.   Header unset Pragma
  51.   FileETag None
  52.   Header unset ETag
  53.   #Header set Cache-Control "no-transform"
  54.   <FilesMatch "(?i).*\.(ico|jpe?g|gif|webp|png|otf|swf|flv|ttf|woff|eot|svg)$">
  55.     Header set Cache-control "max-age=864000, public, must-revalidate"
  56.     Header unset Last-Modified
  57.   </FilesMatch>
  58.   <FilesMatch "(?i).*\.(html|htm|xml|txt|xsl)$">
  59.     Header set Cache-control "max-age=7200, must-revalidate"
  60.   </FilesMatch>
  61. </IfModule>
  62. <IfModule mod_deflate.c>
  63.   <FilesMatch "(?i)\.(js|css)$">
  64.     SetOutputFilter DEFLATE
  65.   </FilesMatch>
  66. </IfModule>
  67.  
  68. ##################
  69. ## Optional improvements
  70. ## Requires mod_expires to be enabled within Apache
  71. ##################
  72. <ifmodule mod_expires.c>
  73.   ExpiresActive On
  74.   ExpiresDefault A300
  75.   ExpiresByType application/x-javascript A3600
  76.   ExpiresByType text/css A3600
  77.   ExpiresByType image/gif A604800
  78.   ExpiresByType video/x-flv A604800
  79.   ExpiresByType application/pdf A604800
  80.   ExpiresByType text/html A300
  81.   ExpiresByType image/x-icon A86400
  82.   ExpiresByType image/jpeg A2592000
  83.   ExpiresByType image/png A2592000
  84. </ifmodule>
  85.