next.js, nginx, reverse-proxy, ssl
$ sudo apt-get update
$ sudo apt-get install nginx letsencrypt
#!/usr/bin/env bash | |
# | |
# Certbot Nginx Reload | |
# | |
# Let's Encrypt Certbot post hook command for Nginx which checks the updated | |
# configuration files and reloads the server if everything validates. | |
# | |
# Author : Justin Hartman <code@justinhartman.co> | |
# Version : 1.0.1 | |
# License : MIT <https://opensource.org/licenses/MIT> |
deb http://ports.ubuntu.com/ubuntu-ports focal main restricted universe multiverse | |
deb-src http://ports.ubuntu.com/ubuntu-ports focal main restricted universe multiverse | |
deb http://ports.ubuntu.com/ubuntu-ports focal-updates main restricted universe multiverse | |
deb-src http://ports.ubuntu.com/ubuntu-ports focal-updates main restricted universe multiverse | |
deb http://ports.ubuntu.com/ubuntu-ports focal-backports main restricted universe multiverse | |
deb-src http://ports.ubuntu.com/ubuntu-ports focal-backports main restricted universe multiverse | |
deb http://ports.ubuntu.com/ubuntu-ports focal-security main restricted universe multiverse |
-- Made by Jairo Tylera | |
-- (github.com/Tylerian) | |
-- (c) 2019 - present | |
-- Released under MIT X11 License | |
CREATE | |
DEFINER=`root`@`localhost` | |
FUNCTION | |
`ST_Epgs3857_DWithin`(p1 POINT, p2 POINT, distance_mts FLOAT) | |
RETURNS |
<?php // Don't use this line. | |
/* | |
* Add the script below to wherever you store custom code snippets | |
* in your site, whether that's your child theme's functions.php, | |
* a custom plugin file, or through a code snippet plugin. | |
*/ | |
/** | |
* This function will connect wp_mail to your authenticated |
This is a small write up about how to migrate your pritunl install between servers. It's not especially detailed because I'm lazy and your migration story will most likely be different. All this can be avoided by using a remote/hosted mongo instance(compose.io, mongolab, etc.) and simply pointing your pritunl instance at that. If you want more details ask, and I'll do my best to answer and update this write-up accordingly. Also, feel free to criticize my grammar and spelling.
mainly used in start-up script
When we play with iptables aka firewall we might end up in situation, where we execute rule, which has unforseen impact - lock yourself out. Recovering from this situation is necessity.
How to:
- Enable reboot via SMS.
- Test all commands in shell first before putting them into Start-up script. This way the command will be wiped out, when unit is rebooted.
# config to don't allow the browser to render the page inside an frame or iframe | |
# and avoid clickjacking http://en.wikipedia.org/wiki/Clickjacking | |
# if you need to allow [i]frames, you can use SAMEORIGIN or even set an uri with ALLOW-FROM uri | |
# https://developer.mozilla.org/en-US/docs/HTTP/X-Frame-Options | |
add_header X-Frame-Options SAMEORIGIN; | |
# when serving user-supplied content, include a X-Content-Type-Options: nosniff header along with the Content-Type: header, | |
# to disable content-type sniffing on some browsers. | |
# https://www.owasp.org/index.php/List_of_useful_HTTP_headers | |
# currently suppoorted in IE > 8 http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx |
#FOR MULTIPLE REDIS INSTANCE INSTALLATION ON RHEL7+ USE THE FOLLOWING PATHS AND SETUP PROCESS:
$ cp /etc/redis.conf /etc/redis-xxx.conf