Skip to content

Commit 42d11cd

Browse files
committed
docs: copy
1 parent 5e87276 commit 42d11cd

File tree

2 files changed

+31
-10
lines changed

2 files changed

+31
-10
lines changed

posts/lab.md

+20
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,26 @@ The simplest git collaboration service
99

1010
[Source code](https://github.com/picosh/git-pr)
1111

12+
# pubsub
13+
14+
A generic pubsub library written using Go.
15+
16+
[Source code](https://github.com/picosh/pubsub)
17+
18+
# tunmgr
19+
20+
Manage [tuns](https://pico.sh/tuns) tunnels using docker with supervision to
21+
keep them active.
22+
23+
[Source code](https://github.com/picosh/tunmgr)
24+
25+
# pipemgr
26+
27+
Send docker container logs to [pipe](https://pipe.pico.sh) with supervision to
28+
keep them active.
29+
30+
[Source code](https://github.com/picosh/pipemgr)
31+
1232
# pobj
1333

1434
rsync, scp, sftp for your object store.

posts/tuns.md

+11-10
Original file line numberDiff line numberDiff line change
@@ -126,8 +126,8 @@ autossh -M 0 -R dev:80:localhost:8000 tuns.sh
126126
## Easy (`-o Tunnel=point-to-point`)
127127

128128
Using `tuns`, you have the ability to tunnel UDP traffic without any external
129-
binary, meaning all using SSH. This makes use of the SSH tunneling
130-
functionality and a `tun` interface. To get started, you need to follow a few steps:
129+
binary, meaning all using SSH. This makes use of the SSH tunneling functionality
130+
and a `tun` interface. To get started, you need to follow a few steps:
131131

132132
1. Start some UDP service that you want to forward. For example, a simple socat
133133
echo server:
@@ -136,8 +136,8 @@ functionality and a `tun` interface. To get started, you need to follow a few st
136136
socat -v PIPE udp-recvfrom:5553,fork
137137
```
138138

139-
2. SSH into tuns requesting a `tun` interface with the information of where
140-
the service is running. This needs to be done as root. Replace
139+
2. SSH into tuns requesting a `tun` interface with the information of where the
140+
service is running. This needs to be done as root. Replace
141141
`local-ip-of-machines-main-interface` with the ip address of the main
142142
interface for proper routing.
143143

@@ -161,10 +161,11 @@ functionality and a `tun` interface. To get started, you need to follow a few st
161161

162162
## Hard (`-o Tunnel=ethernet`)
163163

164-
You can also use an ethernet tunnel for UDP forwarding. This makes a `tap` interface.
165-
This is considered "hard mode" since you'll also need to handle ARP. We don't process
166-
ARP packets, but we expect you to be an expert to be able to make this work! The `SRC`
167-
interface `MAC` is `00:00:00:00:00:01`, while the `DST` interface `MAC` is `00:00:00:00:00:02`
164+
You can also use an ethernet tunnel for UDP forwarding. This makes a `tap`
165+
interface. This is considered "hard mode" since you'll also need to handle ARP.
166+
We don't process ARP packets, but we expect you to be an expert to be able to
167+
make this work! The `SRC` interface `MAC` is `00:00:00:00:00:01`, while the
168+
`DST` interface `MAC` is `00:00:00:00:00:02`
168169

169170
1. Start some UDP service that you want to forward. For example, a simple socat
170171
echo server:
@@ -173,8 +174,8 @@ interface `MAC` is `00:00:00:00:00:01`, while the `DST` interface `MAC` is `00:0
173174
socat -v PIPE udp-recvfrom:5553,fork
174175
```
175176

176-
2. SSH into tuns requesting a `tap` interface with the information of where
177-
the service is running. This needs to be done as root. Replace
177+
2. SSH into tuns requesting a `tap` interface with the information of where the
178+
service is running. This needs to be done as root. Replace
178179
`local-ip-of-machines-main-interface` with the ip address of the main
179180
interface for proper routing.
180181

0 commit comments

Comments
 (0)