Link from where most of this info came from
Here is a simple tutorial to use Letsencrypt SSL Certs with Subsonic. This is on a Debian Server
Link from where most of this info came from
Here is a simple tutorial to use Letsencrypt SSL Certs with Subsonic. This is on a Debian Server
| SELECT name,organization,orgid,associateid FROM client JOIN client_key WHERE client.client_ident = client_key.client_ident INTO OUTFILE '/tmp/clients.csv' FIELDS TERMINATED BY ',' ENCLOSED BY '"' LINES TERMINATED BY '\n'; |
| <?php | |
| /** | |
| * The base configurations of the WordPress. | |
| * | |
| * This file has the following configurations: MySQL settings, Table Prefix, | |
| * Secret Keys, WordPress Language, and ABSPATH. You can find more information | |
| * by visiting {@link http://codex.wordpress.org/Editing_wp-config.php Editing | |
| * wp-config.php} Codex page. You can get the MySQL settings from your web host. | |
| * | |
| * This file is used by the wp-config.php creation script during the |
| # Source it on .bash_profile | |
| # run with "encrypt a.file" or "decrypt a.file.aes-128-cbc" | |
| # You can adjust encryption cipher (say aes-256-cbc) to your needs | |
| function encrypt() { | |
| if [ $# -eq 0 ]; then | |
| echo "Provide a filename to encrypt" | |
| exit 1 | |
| fi | |
| # SHA256 the given file | |
| openssl dgst -sha256 "$1" > "$1.sha256" |
| # Has XFF header with a value | |
| acl has-xff req_header X-Forwarded-For ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[([0-9a-f]+)?:([0-9a-f:]+)?:([0-9a-f]+|0-9\.]+)?\])) | |
| # default logformat | |
| logformat squid %ts.%03tu %6tr %>a %Ss/%03>Hs %<st %rm %ru %[un %Sh/%<a %mt | |
| # default logformat using XFF instead of client IP address | |
| logformat squid-xff %ts.%03tu %6tr %{X-Forwarded-For}>h %Ss/%03>Hs %<st %rm %ru %[un %Sh/%<a %mt |
| # Get number of running containers of a service | |
| aws --profile saml --output json ecs describe-services --cluster DIT-DMZ --service adp-e-bot-kafka | jq '.services[]|.desiredCount' | |
| # Get a list of all task definitions | |
| aws --profile saml --output text ecs list-task-definition-families | |
| # Get the JSONs of a task definition | |
| aws --profile saml --output json ecs describe-task-definition --task-def DIT-adp-e-bot | jq '.taskDefinition|if .networkMode then {family: .family, volumes: .volumes, containerDefinitions: .containerDefinitions, networkMode: .networkMode} else {family: .family, volumes: .volumes, containerDefinitions: .containerDefinitions} end' | |
| # Get all task definition and save each as a JSON |
| # Log the X-Forwarded-For client IP address or the real client ip address if the X-Forwarded-For header does not exist. | |
| LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined | |
| LogFormat "%{X-Forwarded-For}i %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" proxy | |
| SetEnvIf X-Forwarded-For "^.*\..*\..*\..*" forwarded | |
| CustomLog "logs/access_log" combined env=!forwarded | |
| CustomLog "logs/access_log" proxy env=forwarded |
| */15 * * * * alvaro /usr/bin/curl -q https://USERNAME:[email protected]/nic/update?hostname=TUNNELID -o /dev/null |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>Label</key> | |
| <string>regulya.local</string> | |
| <key>Program</key> | |
| <string>/Users/regulya/bin/boot-up-actions.sh</string> | |
| <key>RunAtLoad</key> | |
| <true/> |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <!-- copy to /Library/LaunchDaemons/extra.loopback.alias.plist --> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>Label</key> | |
| <string>Loopback Alias</string> | |
| <key>ProgramArguments</key> | |
| <array> | |
| <string>/sbin/ifconfig</string> |