A web server can be configured to start when starting the Inets
    application, or dynamically in runtime by calling the
    Inets application API inets:start(httpd, ServiceConfig) or
    inets:start(httpd, ServiceConfig, How),
    see inets(3).
    The configuration options, also called
    properties, are as follows:
    
    File Properties
    When the web server is started at application start time, the
    properties are to be fetched from a configuration file that can
    consist of a regular Erlang property list, that is, [{Option,
    Value}], where  Option = property()  and Value =
    term(), followed by a full stop. If the web server is started
    dynamically at runtime, a file can still be specified but also the
    complete property list.
    
    
      - {proplist_file, path()}
- 
	If this property is defined, Inets expects to find
	all other properties defined in this file. The
	file must include all properties listed under mandatory
	properties. 
Note
	
Note support for legacy configuration file with Apache syntax is dropped in OTP-23.
     
    
    Mandatory Properties
    
      - {port, integer()} 
-  
	The port that the HTTP server listen to.
	If zero is specified as port, an arbitrary available port
	is picked and function httpd:info/2 can be used to
	determine which port was picked. 
- {server_name, string()}
- 
	The name of your server, normally a fully qualified domain name. 
- {server_root, path()}
-  
	Defines the home directory of the server, where log files, and so on, 
	can be stored. Relative paths specified in other properties refer
	to this directory. 
-  {document_root, path()}
- 
	Defines the top directory for the documents that
	are available on the HTTP server. 
Communication Properties
    
      - {bind_address, ip_address() | hostname() | any}
- 
	Default is any 
- {profile, atom()}
- 
        Used together with bind_address
	and port to uniquely identify
	a HTTP server. This can be useful in a virtualized environment,
	where there can
	be more that one server that has the same bind_address and port.
	If this property is not explicitly set, it is assumed that the
	bind_address and
	port uniquely identifies the HTTP server.
	 
- {socket_type, ip_comm | {ip_comm,  Config::proplist()} | {essl, Config::proplist()}}
- 
	For ip_comm configuration options, see 
	gen_tcp:listen/2, some options
	that are used internally by httpd cannot be set. For SSL configuration options, see 
	ssl:listen/2. Default is ip_comm. 
- {ipfamily, inet | inet6}
- 
	Default is inet, legacy option inet6fb4 no longer makes sense and will be translated
	to inet. 
- {minimum_bytes_per_second, integer()}
- 
	If given, sets a minimum of bytes per second value for connections. If the value is unreached, the socket closes for that connection. The option is good for reducing the risk of "slow DoS" attacks. 
Erlang Web Server API Modules 
    
      - {modules, [atom()]} 
- 
	Defines which modules the HTTP server uses when handling
	requests. Default is [mod_alias, mod_auth, mod_esi,
	mod_actions, mod_cgi, mod_dir, mod_get, mod_head, mod_log,
	mod_disk_log]. 
	Notice that some mod-modules are dependent on
	others, so the order cannot be entirely arbitrary. See the
	Inets Web Server Modules in the
	User's Guide for details. 
Limit properties 
    
      - {customize, atom()}
-  
	A callback module to customize the inets HTTP servers behaviour
	see  httpd_custom_api  
- {disable_chunked_transfer_encoding_send, boolean()}
-  
	Allows you to disable chunked
	transfer-encoding when sending a response to an HTTP/1.1
	client. Default is false. 
- {keep_alive, boolean()}
- 
	Instructs the server whether to use persistent
	connections when the client claims to be HTTP/1.1
	compliant. Default is true. 
- {keep_alive_timeout, integer()}
- 
	The number of seconds the server waits for a
	subsequent request from the client before closing the
	connection. Default is 150. 
- {max_body_size, integer()}
- 
	Limits the size of the message body of an HTTP request.
	Default is no limit. 
- {max_clients, integer()}
-  
	Limits the number of simultaneous requests that can be
	supported. Default is 150. 
- {max_header_size, integer()}
- 
	Limits the size of the message header of an HTTP request.
	Default is 10240. 
- {max_content_length, integer()}
- 
	Maximum content-length in an incoming request, in bytes. Requests
	with content larger than this are answered with status 413.
	Default is 100000000 (100 MB).
	 
- {max_uri_size, integer()}
- 
	Limits the size of the HTTP request URI.
	Default is no limit. 
- {max_keep_alive_request, integer()}
- 
	The number of requests that a client can do on one
	connection. When the server has responded to the number of
	requests defined by max_keep_alive_requests, the server 
	closes the connection. The server closes it even if there are 
	queued request. Default is no limit. 
- {max_client_body_chunk, integer()}
- 
	Enforces chunking of a HTTP PUT or POST body data to be delivered
	to the mod_esi callback. Note this is not supported for mod_cgi. 
	Default is no limit e.i the whole body is delivered as one entity, which could
	be very memory consuming. mod_esi(3).
	 
Administrative Properties
     
      - {mime_types, [{MimeType, Extension}] | path()}
- 
	MimeType = string() and Extension = string().
	  Files delivered to the client are MIME typed according to RFC
          1590. File suffixes are mapped to MIME types before file delivery.
          The mapping between file suffixes and MIME types can be specified
	  as an Apache-like file or directly in the property list. Such
        a file can look like the following: 
# MIME type	Extension  
text/html	html htm
text/plain	asc txt 
Default is [{"html","text/html"},{"htm","text/html"}]. 
- {mime_type, string()}
- 
	When the server is asked to provide a document type that
	cannot be determined by the MIME Type Settings, the server
	uses this default type. 
- {server_admin, string()}
- 
	Defines the email-address of the server
	administrator to be included in any error messages returned by
	the server. 
- {server_tokens, none|prod|major|minor|minimal|os|full|{private, string()}}
- 
	Defines the look of the value of the server header. Example: Assuming the version of Inets is 5.8.1, 
	the server header string can look as follows for
	the different values of server-tokens: 
       - none
- ""  % A Server: header will not be generated 
- prod
- "inets" 
- major
- "inets/5" 
- minor
- "inets/5.8" 
- minimal
- "inets/5.8.1" 
- os
- "inets/5.8.1 (unix)" 
- full
- "inets/5.8.1 (unix/linux) OTP/R15B" 
- {private, "foo/bar"}
- "foo/bar" 
 By default, the value is as before, that is, minimal. 
- {logger, Options::list()}
- 
	Currently only one option is supported:  
	  - {error, ServerID::atom()}
- 	    Produces  
	    logger events
	    on logger level error
	    under the hierarchical logger domain: [otp, inets, httpd, ServerID, error]
	    The built in logger formatting 
	    function produces log entries from the
	    error reports: #{server_name => string()
  protocol => internal | 'TCP' | 'TLS' | 'HTTP',
  transport => "TCP "| "TLS", %% Present when protocol = 'HTTP'
  uri => string(), %% Present when protocol = 'HTTP' and URI is valid
  peer => inet:peername(),
  host => inet:hostname(),
  reason => term()
}
An example of a log entry with only default settings of logger =ERROR REPORT==== 9-Oct-2019::09:33:27.350235 ===
   Server: My Server
 Protocol: HTTP
Transport: TLS
      URI: /not_there
     Host: 127.0.1.1:80
     Peer: 127.0.0.1:45253
   Reason: [{statuscode,404},{description,"Object Not Found"}]
Using this option makes mod_log and mod_disk_log error logs redundant. Add the filter {fun logger_filters:domain/2,
	{log,equal,[otp,inets, httpd, ServerID, error]}
[{kernel,
 [{logger,
  [{handler, http_error_test, logger_std_h,
    #{config => #{ file => "log/http_error.log" },
      filters => [{inets_httpd, {fun logger_filters:domain/2,
                                 {log, equal,
                                  [otp, inets, httpd, my_server, error]
                                 }}}],
      filter_default => stop }}]}]}].
or if you want to add it to the default logger via an API: logger:add_handler_filter(default,
                          inets_httpd,
                          {fun logger_filters:domain/2,
                           {log, equal,
                            [otp, inets, httpd, my_server, error]}}).
 
- {log_format, common | combined}
- 
	Defines if access logs are to be written according to the common
	log format or the extended common log format.
	The common format is one line looking like this:
        remotehost rfc931 authuser [date] "request" status bytes. Here: 
	  - remotehost
- Remote.
- rfc931
- The remote username of the client (RFC 931).
- authuser
- The username used for authentication.
- [date]
- Date and time of the request (RFC 1123).
- "request"
- The request line as it came from the client  (RFC 1945).
- status
- The HTTP status code returned to the client (RFC 1945).
- bytes
- The content-length of the document transferred.
 The combined format is one line looking like this:
	remotehost rfc931 authuser [date] "request" status bytes "referer" "user_agent"  In addition to the earlier: 
	  - "referer"
- The URL the client was on before
	requesting the URL (if it could not be determined, 
	a minus sign is placed in this field).
- "user_agent"
- The software the client claims to be using (if it
	could not be determined, a minus sign is placed in
	this field).
 This affects the access logs written by mod_log and 
	mod_disk_log.
	 
- {error_log_format, pretty | compact}
- 
	Default is pretty. If the error log is meant to be read
	directly by a human, pretty is the best option. pretty has a format corresponding to: io:format("[~s] ~s, reason: ~n ~p ~n~n", [Date, Msg, Reason]).
compact has a format corresponding to: io:format("[~s] ~s, reason: ~w ~n", [Date, Msg, Reason]).
This affects the error logs written by mod_log and 
	mod_disk_log.
	 
URL Aliasing Properties - Requires mod_alias
    
      - {alias, {Alias, RealName}}
- 
	Alias = string() and RealName = string(). 
	alias allows documents to be stored in the local file
	system instead of the document_root location. URLs with a path
	beginning with url-path is mapped to local files beginning with
	directory-filename, for example: {alias, {"/image", "/ftp/pub/image"}}
Access to http://your.server.org/image/foo.gif would refer to
	the file /ftp/pub/image/foo.gif. 
- {re_write, {Re, Replacement}}
- 
	Re = string() and Replacement = string(). 
	re_write allows documents to be stored in the local file
	system instead of the document_root location. URLs are rewritten
        by re:replace/3 to produce a path in the local file-system,
        for example: {re_write, {"^/[~]([^/]+)(.*)$", "/home/\\1/public\\2"}}
Access to http://your.server.org/~bob/foo.gif would refer to
	the file /home/bob/public/foo.gif.  
- {directory_index, [string()]}
-  
	directory_index specifies a list of resources to look for
	if a client requests a directory using a / at the end of the
	directory name. file depicts the name of a file in the
	directory. Several files can be given, in which case the server
	returns the first it finds, for example: {directory_index, ["index.html", "welcome.html"]}
Access to http://your.server.org/docs/ would return
	http://your.server.org/docs/index.html or
	http://your.server.org/docs/welcome.html if index.html does not
	exist. 
CGI Properties - Requires mod_cgi
     
      - {script_alias, {Alias, RealName}}
- 
	Alias = string() and RealName = string().
	Have the same behavior as property alias, except that
	they also mark the target directory as containing CGI
	scripts. URLs with a path beginning with url-path are mapped to
	scripts beginning with directory-filename, for example: {script_alias, {"/cgi-bin/", "/web/cgi-bin/"}}
Access to http://your.server.org/cgi-bin/foo would cause
	the server to run the script /web/cgi-bin/foo. 
- {script_re_write, {Re, Replacement}}
- 
	Re = string() and Replacement = string().
	Have the same behavior as property re_write, except that
	they also mark the target directory as containing CGI
	scripts. URLs with a path beginning with url-path are mapped to
	scripts beginning with directory-filename, for example: {script_re_write, {"^/cgi-bin/(\\d+)/", "/web/\\1/cgi-bin/"}}
Access to http://your.server.org/cgi-bin/17/foo would cause
	the server to run the script /web/17/cgi-bin/foo. 
- {script_nocache, boolean()}
-  
	If script_nocache is set to true, the HTTP server by
	default adds the header fields necessary to prevent proxies from
	caching the page. Generally this is preferred. 
	Default to false. 
- {script_timeout, integer()}
- 
	The time in seconds the web server waits between each
	chunk of data from the script. If the CGI script does not deliver
	any data before the timeout, the connection to the client is
	closed. Default is 15. 
- {action, {MimeType, CgiScript}} - requires mod_action
- 
	MimeType = string() and CgiScript = string().
	action adds an action activating a CGI script
	whenever a file of a certain MIME type is requested. It
	propagates the URL and file path of the requested document using
	the standard CGI PATH_INFO and PATH_TRANSLATED environment
	variables. Example: {action, {"text/plain", "/cgi-bin/log_and_deliver_text"}}
- {script, {Method, CgiScript}} - requires mod_action
- 
	Method = string() and CgiScript = string().
	script adds an action activating a CGI script
	whenever a file is requested using a certain HTTP method. The
	method is either GET or POST, as defined in RFC 1945. It
	propagates the URL and file path of the requested document using
	the standard CGI PATH_INFO and PATH_TRANSLATED environment
	variables. Example: {script, {"PUT", "/cgi-bin/put"}}
ESI Properties - Requires mod_esi
    
      - {erl_script_alias, {URLPath, [AllowedModule]}}
- 
	URLPath = string() and AllowedModule = atom().
	erl_script_alias marks all URLs matching url-path as erl
	scheme scripts. A matching URL is mapped into a specific module
	and function, for example: {erl_script_alias, {"/cgi-bin/example", [httpd_example]}}
A request to
	http://your.server.org/cgi-bin/example/httpd_example:yahoo
	would refer to httpd_example:yahoo/3 or, if that does not exist,
	httpd_example:yahoo/2 and
	http://your.server.org/cgi-bin/example/other:yahoo would
	not be allowed to execute. 
- {erl_script_nocache, boolean()}
- 
	If erl_script_nocache is set to true, the server adds
	HTTP header fields preventing proxies from caching the
	page. This is generally a good idea for dynamic content, as
	the content often varies between each request. 
	Default is false. 
- {erl_script_timeout, integer()}
- 
	If erl_script_timeout sets the time in seconds the server
	waits between each chunk of data to be delivered through
	mod_esi:deliver/2. Default is 15. This is only relevant
	for scripts that use the erl scheme. 
Log Properties - Requires mod_log
    
      - {error_log, path()}
- 
	Defines the filename of the error log file to be used to log
	server errors. If the filename does not begin with a slash (/),
	it is assumed to be relative to the server_root. 
- {security_log, path()}
- 
	Defines the filename of the access log file to be used to
	log security events. If the filename does not begin with a slash
	(/), it is assumed to be relative to the server_root. 
- {transfer_log, path()}
-  
	Defines the filename of the access log file to be used to
	log incoming requests. If the filename does not begin with a
	slash (/), it is assumed to be relative to the server_root. 
Disk Log Properties - Requires mod_disk_log
    
      - {disk_log_format, internal | external}
- 
	Defines the file format of the log files. See disk_log for
	details. If the internal file format is used, the
	log file is repaired after a crash. When a log file is
	repaired, data can disappear. When the external file format is
	used, httpd does not start if the log file is broken. Default is
	external. 
- {error_disk_log, path()}
- 
	Defines the filename of the (disk_log(3)) error log file
	to be used to log server errors. If the filename does not begin
	with a slash (/), it is assumed to be relative to the server_root. 
- {error_disk_log_size, {MaxBytes, MaxFiles}}
- 
	MaxBytes = integer() and MaxFiles = integer().
	Defines the properties of the (disk_log(3)) error log
	file. This file is of type wrap log and
	max bytes is written to each file and max files is
	used before the first file is truncated and reused. 
- {security_disk_log, path()}
- 
	Defines the filename of the (disk_log(3)) access log file
	logging incoming security events, that is, authenticated
	requests. If the filename does not begin with a slash (/), it
	is assumed to be relative to the server_root. 
- {security_disk_log_size, {MaxBytes, MaxFiles}}
- 
	MaxBytes = integer() and MaxFiles = integer(). 
	Defines the properties of the disk_log(3) access log
	file. This file is of type wrap log and
	max bytes is written to each file and max files is
	used before the first file is truncated and reused. 
- {transfer_disk_log, path()}
- 
	Defines the filename of the (disk_log(3)) access log file
	logging incoming requests. If the filename does not begin
	with a slash (/), it is assumed to be relative to the
	server_root. 
- {transfer_disk_log_size, {MaxBytes, MaxFiles}}
- 
	MaxBytes = integer() and MaxFiles = integer().  
	Defines the properties of the disk_log(3) access log
	file. This file is of type wrap log and
	max bytes is written to each file and max files is
	used before the first file is truncated and reused. 
Authentication Properties - Requires mod_auth
    
    {directory, {path(), [{property(), term()}]}}
    
    The properties for directories are as follows:
    
    
      - {allow_from, all | [RegxpHostString]}
- 
	Defines a set of hosts to be granted access to a
	given directory, for example: {allow_from, ["123.34.56.11", "150.100.23"]}
The host 123.34.56.11 and all machines on the 150.100.23
	subnet are allowed access. 
- {deny_from, all | [RegxpHostString]}
- 
	Defines a set of hosts
	to be denied access to a given directory, for example: {deny_from, ["123.34.56.11", "150.100.23"]}
The host 123.34.56.11 and all machines on the 150.100.23
	subnet are not allowed access. 
- {auth_type, plain | dets | mnesia}
- 
	Sets the type of authentication database that is used for the
	directory. The key difference between the different methods is
	that dynamic data can be saved when Mnesia and Dets
	are used. 
- {auth_user_file, path()}
- 
	Sets the name of a file containing the list of users and
	passwords for user authentication. The filename can be either
	absolute or relative to the server_root. If using the
	plain storage method, this file is a plain text file where
	each line contains a username followed by a colon, followed
	by the non-encrypted password. If usernames are duplicated,
	the behavior is undefined. Example:  ragnar:s7Xxv7
 edward:wwjau8  
If the Dets storage method is used, the user database is
	maintained by Dets and must not be edited by hand. Use the
	API functions in module mod_auth to create/edit the user
	database. This directive is ignored if the Mnesia
	storage method is used. For security reasons, ensure that
	auth_user_file is stored outside the document tree of the web
	server. If it is placed in the directory that it protects,
	clients can download it. 
- {auth_group_file, path()}
- 
	Sets the name of a file containing the list of user
	groups for user authentication. The filename can be either
	absolute or relative to the server_root. If the plain
	storage method is used, the group file is a plain text file, where
	each line contains a group name followed by a colon, followed
	by the members usernames separated by spaces. Example: If the Dets storage method is used, the group database is
	maintained by Dets and must not be edited by hand. Use the
	API for module mod_auth to create/edit the group database.
	This directive is ignored if the Mnesia storage method is used.
	For security reasons, ensure that the auth_group_file is
	stored outside the document tree of the web server. If it is
	placed in the directory that it protects, clients
	can download it. 
- {auth_name, string()}
-  
	Sets the name of the authorization realm (auth-domain) for
	a directory. This string informs the client about which 
	username and password to use. 
- {auth_access_password, string()}
- 
	If set to other than "NoPassword", the password is required
	for all API calls. If the password is set to "DummyPassword", the
	password must be changed before any other API calls. To secure
	the authenticating data, the password must be changed after the
	web server is started. Otherwise it is written in clear
	text in the configuration file. 
- {require_user, [string()]}
-  
	Defines users to grant access to a given
	directory using a secret password. 
- {require_group, [string()]}
- 
	Defines users to grant access to a given
	directory using a secret password. 
Security Properties - Requires mod_security
 
    
    {security_directory, {path(), [{property(), term()}]}}
       
    
    The properties for the security directories are as follows:
    
      - {data_file, path()}
- 
	Name of the security data file. The filename can either be
	absolute or relative to the server_root. This file is used to
	store persistent data for module mod_security. 
- {max_retries, integer()}
- 
	Specifies the maximum number of attempts to authenticate a
	user before the user is blocked out. If a user
	successfully authenticates while blocked, the
	user receives a 403 (Forbidden) response from the
	server. If the user makes a failed attempt while blocked, the
	server returns 401 (Unauthorized), for security
	reasons. 
	Default is 3. Can be set to infinity. 
- {block_time, integer()}
- 
	Specifies the number of minutes a user is blocked. After
	this time has passed, the user automatically regains access.
	Default is 60. 
- {fail_expire_time, integer()}
- 
	Specifies the number of minutes a failed user authentication
	is remembered. If a user authenticates after this
	time has passed, the previous failed authentications are
	forgotten. 
	Default is 30. 
- {auth_timeout, integer()}
- 
	Specifies the number of seconds a successful user
	authentication is remembered. After this time has passed, the
	authentication is no longer reported. Default is 30.