Skip to main content

Making vanilla web-fontend (project with lit, web component) secured (discussions with chatGpt)

Query: I wn complete seperate .css/.scss and .html template file for my webcomponent.js like in angular. But with complete security. In lit. Use any js lib like domPurify, etc. But I wan complete safety. How? ChatGPT said: Thought for 16s Totally doable. Here’s a secure Lit setup with fully separate .html + .scss files , sanitized with DOMPurify , and rendered into the Shadow DOM without sacrificing performance. Folder layout src / lib/ safe- html .js components/ app-shell .html app-shell .scss app-shell .js 1) Install deps npm i dompurify npm i -D sass Vite will compile .scss . We’ll import the compiled CSS as text and attach it via adoptedStyleSheets (fast + memory-friendly). 2) app-shell.html (pure template file) Put your Carbon UI Shell markup here (no scripts). Example stub: < cds-header aria-label = "My App" > < cds-header-name prefix = "IBM" >[Platform] </ cds-header-name > < cds-header-glo...

How to Add Free SSL Certificate from ZeroSSL int your Java Tomcat / Tomee website?

Assumptions:
1. You are using Linux / Debian Server
2. You are using Compute Engine
3. You are using Google Domains

----------------------------------------------------------------------
Procedure:
1. Set $JAVA_HOME=<path to your java base directory>
2. Set $CATALINA_BASE=<path to your Tomcat / Tomee base directory>

3. Type command: $JAVA_HOME/bin/keytool -genkey -alias <server> -keyalg RSA -keysize <2048> -keystore <path to your keystore file.jks>
 Note: When asked for your first and last name, give your website domain name like www.mohitkrgupta.dev

4. Type command: $JAVA_HOME/bin/keytool -certreq -alias <server> -file <csr.txt> -keystore <path to your keystore file.jks>

This will generate csr.txt key file to be submitted to Certifying Authority (ZeroSSL in this case)

5. Visit ZeroSSL site and copy-pase content of csr.txt and follow processes as mentioned in website to get your SSL keys
6. Your SSL key document will be available from there in .zip format, download and unzip it.
7. It will contain following files:
    certificate.crt, and ca_bundle.crt.
8. Type Command: openssl crl2pkcs7 -nocrl -certfile <certificate.crt> -out <certificate.p7b> -certfile <ca_bundle.crt>
//(you will get certificate.p7b file in this way)
9. Type Command: JAVA_HOME/bin/keytool -import -alias <server> -file <certificate.p7b> -keystore <path to your keystore file.jks>
10. Type Command: sudo nano $CATALINA_BASE/conf/server.xml
11. Provide following lines in server.xml

<Connector port="443" maxHttpHeaderSize="8192" maxThreads="100"
           minSpareThreads="25" maxSpareThreads="75"
           enableLookups="false" disableUploadTimeout="true"
           acceptCount="100" scheme="https" secure="true"
           SSLEnabled="true" clientAuth="false"
           sslProtocol="TLS" keyAlias="server"
           keystoreFile="</home/newmkg/mohitkrgupta.dev.jks>"
           keystorePass="<*************>" />

12. // restart tomc(at/ee) server
13. Check your working https:// website in your domain name

Work Done

Comments

Popular posts from this blog

Ubuntu Notes: Set up autossh as systemd useful-reminder commands

 sudo vim /etc/systemd/system/permanentAutossh.service ======================================== [Unit] Description=Keeps a tunnel to myOciFreeNat open After=network-online.target [Service] User=<username> Environment="AUTOSSH_GATETIME=0" ExecStart=/usr/bin/autossh -M 0 -q -N -o "ServerAliveInterval 60" -o "ServerAliveCountMax 3" -L 4322:127.0.0.1:5432 -i /<ssh_private_key_file_absolute_path> <username>@<ip_address> -p 22 [Install] WantedBy=multi-user.target ======================================== sudo systemctl daemon-reload sudo systemctl enable permanentAutossh sudo systemctl start permanentAutossh ================== sudo systemctl daemon-reload sudo systemctl restart permanentAutossh sudo systemctl status permanentAutossh ====================== sudo systemctl stop permanentAutossh sudo systemctl disable permanentAutossh sudo rm /etc/systemd/system/permanentAutossh.service

C/C++ Postgres libpq execute query with params chatGpt example

PGresult *PQexecParams(PGconn *conn, const char *command, int nParams, const Oid *paramTypes, const char * const *paramValues, const int *paramLengths, const int *paramFormats, int resultFormat); give example ChatGPT said: ChatGPT Here’s a basic example demonstrating how to use PQexecParams in C++ to execute a parameterized query in PostgreSQL. Example: Inserting Data Using PQexecParams Let's assume we are inserting a row into a table called users with the following columns: id (integer) name (text) age (integer) cpp Copy code # include <iostream> # include <libpq-fe.h> # include <memory> # include <string> void checkResult (PGresult* res, PGconn* conn) { if ( PQresultStatus (res) != PGRES_COMMAND_OK) { std::cerr << "Execution failed: " << PQerrorMe...

syslog cpp programming: learning using chatGcp

  Introduction to Syslog C++ August 27, 2024 This conversation may reflect the link creator’s personalized data, which isn’t shared and can meaningfully change how the model responds. You said: I am new to syslog in cpp programming n just starting. Can you teach me ChatGPT said: ChatGPT Sure! syslog is a standard for logging system messages in Unix-like operating systems. It provides a way to send log messages to the system log, which can then be collected and analyzed by various tools. Here's a basic guide to get you started with syslog in C++: 1. Include the Necessary Header To use syslog , you need to include the syslog.h header: cpp Copy code # include <syslog.h> 2. Open the Connection to syslog Before sending log messages, you need to open a connection to the syslog system. This is typically done at the start of your program: cpp Copy code openlog ( "your_program_name" , LOG_PID | LOG_CONS, LOG_USER); "your_program_name" : A string representing ...