From b8c2ed65c91a2e9975921ff8d14b369cbe81bc54 Mon Sep 17 00:00:00 2001 From: Robin Kloppe Date: Fri, 18 Aug 2023 22:27:55 +0200 Subject: [PATCH] Replaced mydomain with example - RFC2606, RFC6761 --- docs/admin/config-cheat-sheet.md | 2 +- docs/user/authentication.md | 14 +++++++------- docs/user/webhooks.md | 2 +- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/docs/admin/config-cheat-sheet.md b/docs/admin/config-cheat-sheet.md index 5ecbe481..18600c01 100644 --- a/docs/admin/config-cheat-sheet.md +++ b/docs/admin/config-cheat-sheet.md @@ -682,7 +682,7 @@ Define allowed algorithms and their minimum key length (use -1 to disable a type - `external`: A valid non-private unicast IP, you can access all hosts on public internet. - `*`: All hosts are allowed. - CIDR list: `1.2.3.0/8` for IPv4 and `2001:db8::/32` for IPv6 - - Wildcard hosts: `*.mydomain.com`, `192.168.100.*` + - Wildcard hosts: `*.example.com`, `192.168.100.*` - `SKIP_TLS_VERIFY`: **false**: Allow insecure certification. - `PAGING_NUM`: **10**: Number of webhook history events that are shown in one page. - `PROXY_URL`: **\**: Proxy server URL, support http://, https//, socks://, blank will follow environment http_proxy/https_proxy. If not given, will use global proxy setting. diff --git a/docs/user/authentication.md b/docs/user/authentication.md index 96c40929..82b3c64a 100644 --- a/docs/user/authentication.md +++ b/docs/user/authentication.md @@ -15,7 +15,7 @@ Both the LDAP via BindDN and the simple auth LDAP share the following fields: - Host **(required)** - The address where the LDAP server can be reached. - - Example: `mydomain.com` + - Example: `example.com` - Port **(required)** @@ -70,7 +70,7 @@ Adds the following fields: - The DN to bind to the LDAP server with when searching for the user. This may be left blank to perform an anonymous search. - - Example: `cn=Search,dc=mydomain,dc=com` + - Example: `cn=Search,dc=example,dc=com` - Bind Password (optional) @@ -81,7 +81,7 @@ Adds the following fields: - User Search Base **(required)** - The LDAP base at which user accounts will be searched for. - - Example: `ou=Users,dc=mydomain,dc=com` + - Example: `ou=Users,dc=example,dc=com` - User Filter **(required)** - An LDAP filter declaring how to find the user record that is attempting to @@ -113,13 +113,13 @@ Adds the following fields: - A template to use as the user's DN. The `%s` matching parameter will be substituted with login name given on sign-in form. - - Example: `cn=%s,ou=Users,dc=mydomain,dc=com` - - Example: `uid=%s,ou=Users,dc=mydomain,dc=com` + - Example: `cn=%s,ou=Users,dc=example,dc=com` + - Example: `uid=%s,ou=Users,dc=example,dc=com` - User Search Base (optional) - The LDAP base at which user accounts will be searched for. - - Example: `ou=Users,dc=mydomain,dc=com` + - Example: `ou=Users,dc=example,dc=com` - User Filter **(required)** - An LDAP filter declaring when a user should be allowed to log in. The `%s` @@ -135,7 +135,7 @@ Uses the following fields: - Group Search Base (optional) - The LDAP DN used for groups. - - Example: `ou=group,dc=mydomain,dc=com` + - Example: `ou=group,dc=example,dc=com` - Group Name Filter (optional) diff --git a/docs/user/webhooks.md b/docs/user/webhooks.md index 45013b1d..8934bccf 100644 --- a/docs/user/webhooks.md +++ b/docs/user/webhooks.md @@ -112,7 +112,7 @@ X-Gitea-Event: push This is an example of how to use webhooks to run a php script upon push requests to the repository. In your repository Settings, under Webhooks, Setup a Forgejo webhook as follows: -- Target URL: http://mydomain.com/webhook.php +- Target URL: http://example.com/webhook.php - HTTP Method: POST - POST Content Type: application/json - Secret: 123