Skip to content

Commit c144707

Browse files
eseyffarthMattias Schlenker
authored andcommitted
pick-24 specify apache file type where clearly appropriate
1 parent 93058ae commit c144707

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

src/onprem/de/omd_https.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ Lediglich bei einer internen CA, wo direkt mit dem CA-Schlüssel signiert wird,
355355
Viele kommerzielle Anbieter verwenden eher generische Dateinamen, wenn Sie diese übernehmen, wird die Konfiguration ähnlich zu der Folgenden aussehen:
356356

357357
./etc/apache2/sites-enabled/default-ssl.conf
358-
[source,apache]
358+
[{apache}]
359359
----
360360
SSLEngine on
361361
SSLCertificateKeyFile /etc/certs/checkmk.mydomain.com.key
@@ -366,7 +366,7 @@ SSLCertificateFile /etc/certs/certificate.crt
366366
Wenn Sie Let's Encrypt verwendet haben, um Zertifikate zu generieren, aber die Konfiguration manuell aktualisieren wollen, finden Sie die Pfade unterhalb `/etc/letsencrypt/live` heraus und tragen Sie diese ein:
367367

368368
./etc/apache2/sites-enabled/default-ssl.conf
369-
[source,apache]
369+
[{apache}]
370370
----
371371
SSLEngine on
372372
SSLCertificateKeyFile /etc/letsencrypt/live/checkmk.mydomain.com/privkey.pem
@@ -394,7 +394,7 @@ In diesem Fall ergänzen Sie im Abschnitt für den `VirtualHost` folgende Zeilen
394394
// MFS: Siehe auch: https://forum.checkmk.com/t/include-apache-config-for-x-forwarded-proto/29869
395395

396396
./etc/apache2/sites-enabled/000-default
397-
[source,apache]
397+
[{apache}]
398398
----
399399
RewriteEngine On
400400
# Never forward request for .well-known (important when using Let's Encrypt)
@@ -455,7 +455,7 @@ Um die Option zu setzen, fügen Sie den folgenden Eintrag der HTTPS-Konfiguratio
455455
Unter Debian/Ubuntu ist das standardmäßig die Datei `default-ssl.conf`:
456456

457457
./etc/apache2/sites-enabled/default-ssl.conf
458-
[source,apache]
458+
[{apache}]
459459
----
460460
Header always set Strict-Transport-Security "max-age=43200"
461461
----

src/onprem/en/omd_https.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@ This is only omitted for an internal CA where the CA key is used directly for si
355355
Many commercial vendors use rather generic filenames, so if you adopt these the configuration will look similar to the following:
356356

357357
./etc/apache2/sites-enabled/default-ssl.conf
358-
[source,apache]
358+
[{apache}]
359359
----
360360
SSLEngine on
361361
SSLCertificateKeyFile /etc/certs/checkmk.mydomain.com.key
@@ -366,7 +366,7 @@ SSLCertificateFile /etc/certs/certificate.crt
366366
If you have used Let's Encrypt to generate certificates but want to update the configuration manually, identify the file paths stored under `/etc/letsencrypt/live` and enter them:
367367

368368
./etc/apache2/sites-enabled/default-ssl.conf
369-
[source,apache]
369+
[{apache}]
370370
----
371371
SSLEngine on
372372
SSLCertificateKeyFile /etc/letsencrypt/live/checkmk.mydomain.com/privkey.pem
@@ -395,7 +395,7 @@ The following example assumes that you use a single configuration file for unenc
395395
In this case, add the following lines to the `VirtualHost` section:
396396

397397
./etc/apache2/sites-enabled/000-default
398-
[source,apache]
398+
[{apache}]
399399
----
400400
RewriteEngine On
401401
# Never forward request for .well-known (important when using Let's Encrypt)
@@ -455,7 +455,7 @@ To set the option, add the following entry to the HTTPS configuration.
455455
Under Debian/Ubuntu, by default this is the file `default-ssl.conf`:
456456

457457
./etc/apache2/sites-enabled/default-ssl.conf
458-
[source,apache]
458+
[{apache}]
459459
----
460460
Header always set Strict-Transport-Security "max-age=43200"
461461
----

0 commit comments

Comments
 (0)