Download http or https files using curl openssl under ios

To ensure compatibility of mobile terminals urlsession that cannot use ios The curl Library of C language can be used to implement the download operation.Compilation of curl in ios environment Because I compiled openssl before, I took it directly and used it. openssl is used to increase https support After compilation is passed, ...

Posted by Dizzee15 on Wed, 23 Jan 2019 01:15:14 -0800

Processing of es-sql ES Error Result window is too large

In the process of using Elastic search for search queries, I encountered the problem of Result window is too big. Here's a simple revenge: In [1]: import requests In [2]: requests.get('http://127.0.0.1:9200/cmdb-now/_search?page=1&size=10000000').json() Out[2]: { u'error': { u'failed_shards': [ { ...

Posted by greenberry on Tue, 22 Jan 2019 22:33:13 -0800

k8s uses kube-router to expose pod s and SVCS in clusters to the outside

brief introduction Using kube-router to expose pod ip and cluter i in the k8s cluster to the outside of the cluster and realize direct access to pod and svc of k8s by nodes outside the cluster Environmental description This experiment is based on the k8s cluster which has been installed and configured. k8s installation refers to other blog art ...

Posted by Davo on Mon, 21 Jan 2019 14:00:13 -0800

Several Ways for Spring to Receive web Request Parameters

1 Query parameter Request format: url? Parameter 1 = value 1 & parameter 2 = value 2...Suitable for both GET and POSTspring can handle query parameters in several ways: Method 1:Method parameter name is the request parameter name // Query parameter 1 @RequestMapping(value = "/test/query1", method = RequestMethod.GET) public String te ...

Posted by Scud on Sat, 19 Jan 2019 06:24:12 -0800

LAMP Configuration Anti-theft Chain Access Control Directory FilesMatch prohibits PHP from parsing PHP-related configuration PHP extension module installation

1. Configuration of anti-theft chain To prevent people from using the function of file upload, put some static media resources on our website, and then set up the links of these resources on their website to our website. When users of their website visit these resources, they will jump to our server, resulting in an abnormal in ...

Posted by Dark[NSF] on Sat, 12 Jan 2019 18:27:11 -0800

LNMP architecture (Nginx installation, Nginx default virtual host, Nginx user authentication, Nginx domain name redirection)

Nginx installation 1. Enter the / usr/local/src / directory to download the installation package cd /usr/local/src/ wget http://nginx.org/download/nginx-1.6.3.tar.gz 2. Unzip installation package tar zxf nginx-1.6.3.tar.gz 3. Enter the source directory for compilation, and do not add too many plug-ins here for the time being. Later, ssl may b ...

Posted by zildjohn01 on Tue, 08 Jan 2019 15:36:10 -0800

Nginx Load Balancing, ssl Principle, Generation of ssl Key Pairs, Configuration of ssl in LNMP Architecture (5)

1. Nginx load balancing Nginx load balancing means that when a proxy server resolves a customized domain name to multiple specified IP, the upstream module ensures that users can access each IP normally through the proxy server (reverse proxy multiple servers is load balancing). 1.1 Load Balancing Configuration Parameters [root@host ~]# vim /us ...

Posted by candy2126 on Mon, 07 Jan 2019 01:42:09 -0800

LAMP architecture (access control restriction PHP parsing, user_agent restriction, php-related configuration)

Access control restriction php parsing Some files uploaded by users may be abnormally placed in the runnable files, so what we need to do is set up in advance to prohibit the parsing of executable php or other files in these directories, so as to avoid loss. Editing Virtual Machine Profile vim /usr/local/apache2.4/conf/extra/httpd-vhosts.c ...

Posted by karnegyhall on Sat, 05 Jan 2019 09:21:09 -0800

The pool, slow execution log, open_basedir, process management of php-fpm in LNMP architecture (6)

1. pool of php-fpm In order to avoid the problem of using the same pool for multiple sites, which is caused by the failure of one site, and then affects the normal operation of other sites using the same pool, it is necessary to set up a separate pool for each site. 1.1 Configure multiple pool s for php-fpm Edit the php-fpm configuration file: ...

Posted by Virtuali on Fri, 04 Jan 2019 22:18:09 -0800

Spring Cloud Config - RSA Profile and Using RSA Encryption Profile

brief introduction RSA asymmetric encryption has very strong security. HTTPS's SSL encryption uses this method to encrypt HTTPS requests. RSA algorithm is called asymmetric encryption because it involves Private Key and Public Key, which are used for encryption and decryption respectively. Private Key and Public Key are interoperable, i.e. thos ...

Posted by ams007 on Thu, 03 Jan 2019 15:03:10 -0800