Replaces spurious 0xA0 white-space characters by proper spaces

This commit is contained in:
Samuel FORESTIER 2021-08-29 22:48:40 +02:00
parent b55496b9bc
commit adcca12e18
4 changed files with 8 additions and 8 deletions

@ -108,7 +108,7 @@ So as always, it's a mess.
Explanations : Even if you have perfectly followed this walk-through, if you are using **NetworkManager**, it _may_ break anyway next time you reboot or so.
So the workaround (again...), is to tell **NetworkManager** not to handle the DNS configuration, and thus, not overriding the `/etc/resolv.conf` settings, EVER.
So the workaround (again...), is to tell **NetworkManager** not to handle the DNS configuration, and thus, not overriding the `/etc/resolv.conf` settings, EVER.
:warning: If you are counting on **NetworkManager** to handle connection-specific DNS configuration, I regret having to inform you it won't be possible anymore... :warning:

@ -109,7 +109,7 @@ Don't forget to enable the new VHOST :
> For the given configuration above, you'll have to enable some new Apache modules, if they are not already loaded :
> `# a2enmod auth_basic env headers proxy_http ssl`
> `# systemctl restart apache2`
> `# systemctl restart apache2`
Now reload your Apache configuration, and everything is supposed to work... From anywhere (see below) !

@ -56,10 +56,10 @@ chown -R git:nogroup /home/git/.ssh
# Add to the `known_hosts` the public key of the SSH server running within the Gitea container
su - git -c "ssh-keyscan -H -p $SSH_PORT $IP_ADDRESS > /home/git/.ssh/known_hosts 2> /dev/null"
# Generate a keys pair to authenticate the host git session on your Gitea container
# Generate a keys pair to authenticate the host git session on your Gitea container
su - git -c "ssh-keygen"
su - git -c "cat ~/.ssh/id_*.pub"
## --> Copy the public key generated !
## --> Copy the public key generated !
# Mock a fake `/usr/local/bin/gitea` program, forwarding SSH commands to your Gitea container
# (Sorry for this series of ugly shell escapes...)
@ -71,7 +71,7 @@ chmod +x /usr/local/bin/gitea
usermod -a -G ssh git
{% endhighlight %}
Before going back in the Gitea container to polish up the setup, we have to make the host keep the Gitea public identities synchronized within the fake `git` session (to accept incoming connections).
Before going back in the Gitea container to polish up the setup, we have to make the host keep the Gitea public identities synchronized within the fake `git` session (to accept incoming connections).
For this, we _cron_ a specific task (**Proxmox 5** example) :
{% highlight bash %}

@ -80,7 +80,7 @@ table inet filter {
chain output {
type filter hook output priority 0; policy drop;
# ...
# ...
}
}
{% endhighlight %}
@ -151,7 +151,7 @@ A regular anti-DDos rule is to [block new packets that are not `SYN`](https://ja
Well, in order to match "new" packets, we need the help of the `conntrack` Netfilter module.
The problem : It's not available within a chain registered with the `ingress` hook, that's why we gotta use it elsewhere.
Let's then take the firstly encountered other "location" on the Netfilter flow, the `PREROUTING` hook.
Let's then take the firstly encountered other "location" on the Netfilter flow, the `PREROUTING` hook.
> Note : The snippet below [requires a Kernel >= 5.2](https://wiki.nftables.org/wiki-nftables/index.php/Performing_Network_Address_Translation_(NAT)#Inet_family_NAT).
> If that's not the case on your machine, replace `inet` by `ip`, but please notice that incoming IPv6 traffic won't be matched.
@ -241,7 +241,7 @@ table inet filter {
chain output {
type filter hook output priority 0; policy drop;
# ...
# ...
}
}