[pmg-devel] [PATCH docs] important service daemons: fix typos and grammar

Aaron Lauterer a.lauterer at proxmox.com
Thu Apr 23 13:30:19 CEST 2020


LGTM

Reviewed-By: Aaron Lauterer <a.lauterer at proxmox.com>

On 4/23/20 10:48 AM, Oguz Bektas wrote:
> Signed-off-by: Oguz Bektas <o.bektas at proxmox.com>
> ---
>   pmg-smtp-filter.adoc | 2 +-
>   pmgmirror.adoc       | 4 ++--
>   pmgpolicy.adoc       | 2 +-
>   pmgproxy.adoc        | 8 ++++----
>   4 files changed, 8 insertions(+), 8 deletions(-)
> 
> diff --git a/pmg-smtp-filter.adoc b/pmg-smtp-filter.adoc
> index a0727f7..153178e 100644
> --- a/pmg-smtp-filter.adoc
> +++ b/pmg-smtp-filter.adoc
> @@ -23,7 +23,7 @@ pmg-smtp-filter - Proxmox SMTP Filter Daemon
>   ============================================
>   endif::manvolnum[]
>   
> -This is the Proxmox SMTP filter daemon, which does the actual SPAM
> +This is the Proxmox SMTP filter daemon, which does the actual spam
>   filtering using the SpamAssassin and the rule database. It listens on
>   127.0.0.1:10023 and 127.0.0.1:10024. The daemon listens to a local
>   address only, so you cannot access it from outside.
> diff --git a/pmgmirror.adoc b/pmgmirror.adoc
> index 9ce93f8..2f2c12d 100644
> --- a/pmgmirror.adoc
> +++ b/pmgmirror.adoc
> @@ -23,8 +23,8 @@ pmgmirror - Database Mirror Daemon
>   ==================================
>   endif::manvolnum[]
>   
> -{pmg} use an application specific asynchronous replication
> -algorythm to replicate the database to all cluster nodes.
> +{pmg} uses an application specific asynchronous replication
> +algorithm to replicate the database to all cluster nodes.
>   
>   The daemon uses the ssh tunnel provided by 'pmgtunnel' to access
>   the database on remote nodes.
> diff --git a/pmgpolicy.adoc b/pmgpolicy.adoc
> index d013047..813ed9e 100644
> --- a/pmgpolicy.adoc
> +++ b/pmgpolicy.adoc
> @@ -24,7 +24,7 @@ pmgpolicy - Proxmox Mail Gateway Policy Daemon
>   endif::manvolnum[]
>   
>   This daemon implements the Postfix SMTP access policy delegation
> -protocol on `127.0.0.1:10022`. The daemon listens to a local address
> +protocol on `127.0.0.1:10022`. It listens to a local address
>   only, so you cannot access it from outside. We configure Postfix to
>   use this service for greylisting and as SPF policy server.
>   
> diff --git a/pmgproxy.adoc b/pmgproxy.adoc
> index 0c088e5..8b1e535 100644
> --- a/pmgproxy.adoc
> +++ b/pmgproxy.adoc
> @@ -44,7 +44,7 @@ certificate with your own (please include the key inside the '.pem' file).
>   Host based Access Control
>   -------------------------
>   
> -It is possible to configure ``apache2''-like access control
> +It is possible to configure Apache2-like access control
>   lists. Values are read from file `/etc/default/pmgproxy`. For example:
>   
>   ----
> @@ -75,10 +75,10 @@ You can define the cipher list in `/etc/default/pmgproxy`, for example
>   
>    CIPHERS="ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256"
>   
> -Above is the default. See the ciphers(1) man page from the openssl
> +Above is the default. See the `ciphers(1)` man page from the `openssl`
>   package for a list of all available options.
>   
> -Additionally you can define that the client choses the used cipher in
> +Additionally you can define the order that the client chooses the used cipher in
>   `/etc/default/pmgproxy` (default is the first cipher in the list available to
>   both client and `pmgproxy`):
>   
> @@ -104,7 +104,7 @@ COMPRESSION
>   -----------
>   
>   By default `pmgproxy` uses gzip HTTP-level compression for compressible
> -content, if the client supports it. This can disabled in `/etc/default/pmgproxy`
> +content if the client supports it. This can be disabled in `/etc/default/pmgproxy`
>   
>    COMPRESSION=0
>   
> 



More information about the pmg-devel mailing list