fix accumulated whitespace and indentation damage

This commit is contained in:
Denis Vlasenko
2007-03-20 11:30:28 +00:00
parent e84aeb5bcb
commit c86e052b81
23 changed files with 145 additions and 145 deletions

View File

@ -16,7 +16,7 @@ The following environment variables are not request-specific and are
set for all requests: </p><p>
</p><ul>
<li> <code>SERVER_SOFTWARE</code> <p>
<li> <code>SERVER_SOFTWARE</code> <p>
The name and version of the information server software answering
the request (and running the gateway). Format: name/version </p><p>
@ -25,7 +25,7 @@ set for all requests: </p><p>
The server's hostname, DNS alias, or IP address as it would appear
in self-referencing URLs. </p><p>
</p></li><li> <code>GATEWAY_INTERFACE</code> <p>
</p></li><li> <code>GATEWAY_INTERFACE</code> <p>
The revision of the CGI specification to which this server
complies. Format: CGI/revision</p><p>
@ -48,7 +48,7 @@ fulfilled by the gateway program: <p>
The method with which the request was made. For HTTP, this is
"GET", "HEAD", "POST", etc. </p><p>
</p></li><li> <code>PATH_INFO</code> <p>
</p></li><li> <code>PATH_INFO</code> <p>
The extra path information, as given by the client. In other
words, scripts can be accessed by their virtual pathname, followed
by extra information at the end of this path. The extra
@ -64,7 +64,7 @@ fulfilled by the gateway program: <p>
A virtual path to the script being executed, used for
self-referencing URLs. </p><p>
</p></li><li> <a name="query"><code>QUERY_STRING</code></a> <p>
</p></li><li> <a name="query"><code>QUERY_STRING</code></a> <p>
The information which follows the ? in the <a href="http://www.ncsa.uiuc.edu/demoweb/url-primer.html">URL</a>
which referenced this script. This is the query information. It
should not be decoded in any fashion. This variable should always
@ -82,7 +82,7 @@ fulfilled by the gateway program: <p>
protects, this is the protocol-specific authentication method used
to validate the user. </p><p>
</p></li><li> <code>REMOTE_USER</code> <p>
</p></li><li> <code>REMOTE_USER</code> <p>
If the server supports user authentication, and the script is
protected, this is the username they have authenticated as. </p><p>
</p></li><li> <code>REMOTE_IDENT</code> <p>