This guide covers configuring Laravel Reverb for production using services like Laravel Forge or Ploi.
Add this to your nginx site configuration's server block:
location /app {| // @ts-ignore | |
| import { default as nacl } from 'tweetnacl-sealedbox-js'; | |
| import { webcrypto } from 'crypto'; | |
| function decodeUTF8(str: string): Uint8Array { | |
| if (typeof str !== "string") | |
| throw new TypeError("expected string"); | |
| return new Uint8Array(unescape(encodeURIComponent(str)).split("").map(char => char.charCodeAt(0))); | |
| } |
| # see https://httptoolkit.tech/blog/chrome-android-certificate-transparency/ | |
| # put your Burp cacert.der in the current working directory! | |
| FINGERPRINT=`openssl x509 -in cacert.der -inform der -pubkey -noout | openssl pkey -pubin -outform der | openssl dgst -sha256 -binary | openssl enc -base64` | |
| echo "chrome --ignore-certificate-errors-spki-list=$FINGERPRINT" > chrome.sh | |
| adb push chrome.sh /data/local/tmp/chrome.sh | |
| adb shell su -c cp /data/local/tmp/chrome.sh /data/local/chrome-command-line | |
| adb shell su -c cp /data/local/tmp/chrome.sh /data/local/android-webview-command-line |
| <!DOCTYPE html> | |
| <html> | |
| <head> | |
| <meta charset='utf-8'> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/core-min.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/sha256.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/components/enc-base64.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/rollups/aes.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.2/rollups/pbkdf2.js"></script> |
| function toLower(str){ | |
| var result = ''; | |
| for (var i = 0, len = str.length; i < len; i++) { | |
| var charAtLocation = str.charCodeAt(i); | |
| if(charAtLocation > 64 && charAtLocation < 91) //ASCII for upper-case | |
| result += String.fromCharCode(charAtLocation + 32); | |
| else | |
| result += str[i]; | |
| } | |
| return result; |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)