Download http or https files using curl openssl under ios
To ensure compatibility of mobile terminals
urlsession that cannot use ios
The curl Library of C language can be used to implement the download operation.Compilation of curl in ios environment
Because I compiled openssl before, I took it directly and used it.
openssl is used to increase https support
After compilation is passed, ...
Posted by Dizzee15 on Wed, 23 Jan 2019 01:15:14 -0800
Processing of es-sql ES Error Result window is too large
In the process of using Elastic search for search queries, I encountered the problem of Result window is too big. Here's a simple revenge:
In [1]: import requests
In [2]: requests.get('http://127.0.0.1:9200/cmdb-now/_search?page=1&size=10000000').json()
Out[2]:
{
u'error': {
u'failed_shards': [
{
...
Posted by greenberry on Tue, 22 Jan 2019 22:33:13 -0800
k8s uses kube-router to expose pod s and SVCS in clusters to the outside
brief introduction
Using kube-router to expose pod ip and cluter i in the k8s cluster to the outside of the cluster and realize direct access to pod and svc of k8s by nodes outside the cluster
Environmental description
This experiment is based on the k8s cluster which has been installed and configured. k8s installation refers to other blog art ...
Posted by Davo on Mon, 21 Jan 2019 14:00:13 -0800
Several Ways for Spring to Receive web Request Parameters
1 Query parameter
Request format: url? Parameter 1 = value 1 & parameter 2 = value 2...Suitable for both GET and POSTspring can handle query parameters in several ways:
Method 1:Method parameter name is the request parameter name
// Query parameter 1
@RequestMapping(value = "/test/query1", method = RequestMethod.GET)
public String te ...
Posted by Scud on Sat, 19 Jan 2019 06:24:12 -0800
LAMP Configuration Anti-theft Chain Access Control Directory FilesMatch prohibits PHP from parsing PHP-related configuration PHP extension module installation
1. Configuration of anti-theft chain
To prevent people from using the function of file upload, put some static media resources on our website, and then set up the links of these resources on their website to our website. When users of their website visit these resources, they will jump to our server, resulting in an abnormal in ...
Posted by Dark[NSF] on Sat, 12 Jan 2019 18:27:11 -0800
LNMP architecture (Nginx installation, Nginx default virtual host, Nginx user authentication, Nginx domain name redirection)
Nginx installation
1. Enter the / usr/local/src / directory to download the installation package
cd /usr/local/src/
wget http://nginx.org/download/nginx-1.6.3.tar.gz
2. Unzip installation package
tar zxf nginx-1.6.3.tar.gz
3. Enter the source directory for compilation, and do not add too many plug-ins here for the time being. Later, ssl may b ...
Posted by zildjohn01 on Tue, 08 Jan 2019 15:36:10 -0800
Nginx Load Balancing, ssl Principle, Generation of ssl Key Pairs, Configuration of ssl in LNMP Architecture (5)
1. Nginx load balancing
Nginx load balancing means that when a proxy server resolves a customized domain name to multiple specified IP, the upstream module ensures that users can access each IP normally through the proxy server (reverse proxy multiple servers is load balancing).
1.1 Load Balancing Configuration Parameters
[root@host ~]# vim /us ...
Posted by candy2126 on Mon, 07 Jan 2019 01:42:09 -0800
LAMP architecture (access control restriction PHP parsing, user_agent restriction, php-related configuration)
Access control restriction php parsing
Some files uploaded by users may be abnormally placed in the runnable files, so what we need to do is set up in advance to prohibit the parsing of executable php or other files in these directories, so as to avoid loss.
Editing Virtual Machine Profile
vim /usr/local/apache2.4/conf/extra/httpd-vhosts.c ...
Posted by karnegyhall on Sat, 05 Jan 2019 09:21:09 -0800
The pool, slow execution log, open_basedir, process management of php-fpm in LNMP architecture (6)
1. pool of php-fpm
In order to avoid the problem of using the same pool for multiple sites, which is caused by the failure of one site, and then affects the normal operation of other sites using the same pool, it is necessary to set up a separate pool for each site.
1.1 Configure multiple pool s for php-fpm
Edit the php-fpm configuration file:
...
Posted by Virtuali on Fri, 04 Jan 2019 22:18:09 -0800
Spring Cloud Config - RSA Profile and Using RSA Encryption Profile
brief introduction
RSA asymmetric encryption has very strong security. HTTPS's SSL encryption uses this method to encrypt HTTPS requests. RSA algorithm is called asymmetric encryption because it involves Private Key and Public Key, which are used for encryption and decryption respectively. Private Key and Public Key are interoperable, i.e. thos ...
Posted by ams007 on Thu, 03 Jan 2019 15:03:10 -0800