diff --git a/src/lib/layouts/blog.svelte b/src/lib/layouts/blog.svelte index 026afaa..a2f65d7 100644 --- a/src/lib/layouts/blog.svelte +++ b/src/lib/layouts/blog.svelte @@ -17,7 +17,7 @@ // svelte-ignore unused-export-let export let data; // svelte-ignore unused-export-let - export let errors; + export let form; export let title; // svelte-ignore unused-export-let diff --git a/src/routes/+page.svelte b/src/routes/+page.svelte index 18a8b59..a2c0b51 100644 --- a/src/routes/+page.svelte +++ b/src/routes/+page.svelte @@ -3,10 +3,6 @@ import ListItem from '$components/ListItem.svelte'; import Link from '$components/Link.svelte'; import type { Skill } from '$lib/utils/types'; - // svelte-ignore unused-export-let - export let data; - // svelte-ignore unused-export-let - export let errors; let _SKILLS = [ { name: 'Web development (React/Svelte)', started: 2019 }, diff --git a/src/routes/blog/lldap-caddy/+page.md b/src/routes/blog/lldap-caddy/+page.md index b79e532..ee4fa3e 100644 --- a/src/routes/blog/lldap-caddy/+page.md +++ b/src/routes/blog/lldap-caddy/+page.md @@ -46,7 +46,7 @@ bridge for networking so that I can resolve my other services with DNS. After th navigate to http://IP:17170 and are presented with the administration panel, where we can create users and groups. - +LLDAP Userinterface ## Integration with Caddy diff --git a/src/routes/blog/site2sitewireguard/+page.md b/src/routes/blog/site2sitewireguard/+page.md index f2a5a2f..d39dfe6 100644 --- a/src/routes/blog/site2sitewireguard/+page.md +++ b/src/routes/blog/site2sitewireguard/+page.md @@ -24,7 +24,7 @@ cloud provider probably organizes good routing to both sides. Since I meant to t Oracles free tier anyway, it seemed like a good opportunity to learn ansible properly and develop with IaC scripts to set up a reverse proxy in the cloud. - +Architecture of the site two site wireguard setup 1. Create Wireguard keys. If the CLI is not an option [this website](https://www.wireguardconfig.com/) is cool too (keys are client-sided generated) @@ -34,7 +34,7 @@ develop with IaC scripts to set up a reverse proxy in the cloud. 3. Create a new peer as follows. Important is the entry to allow the IP address of the cloud wg endpoint, otherwise the cloud cant ping back home.
- + Mikrotik router peer setup
4. I had to adjust the firewall rules to allow communication with the tunnel network. 5. On the proxy server we use similar settings. Interestingly enough, the Mikrotik wg