Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 534d60f

Browse files
committed
fix(#229): /blog/tag/[tag] not showing
1 parent 7501bb0 commit 534d60f

File tree

5 files changed

+22
-14
lines changed

5 files changed

+22
-14
lines changed

next.config.js

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,9 @@ const nextConfig = {
2323
port: '',
2424
pathname: '/**',
2525
},
26-
{
27-
protocol: 'https',
28-
hostname: 'avatars.githubusercontent.com',
29-
port: '',
30-
pathname: '/**',
31-
},
3226
],
3327
},
34-
productionBrowserSourceMaps: process.env.NODE_ENV !== 'production',
28+
productionBrowserSourceMaps: true,
3529
pageExtensions: ['js', 'ts', 'jsx', 'tsx', 'mdx'],
3630
};
3731

@@ -59,8 +53,8 @@ const securityHeaders = [
5953
value: 'max-age=63072000; includeSubDomains; preload',
6054
},
6155
{
62-
key: 'Permissions-Policy', // even tho I won't need em, prolly
63-
value: 'camera=(), speaker=(), microphone=(), geolocation=()',
56+
key: 'Permissions-Policy',
57+
value: 'camera=(), microphone=(), geolocation=()',
6458
},
6559
{
6660
key: 'Server',

public/blogs/csrf-mitigation.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ On the server side, when handling incoming requests, the server decodes or decry
140140
If the UUIDs extracted from the JWT/JWE and the HMAC-CSRF token do not match, it may indicate tampering or unauthorized access. In this case, the server logs the event and blocks the request.
141141
</C>
142142
<C>
143-
You might ask why not block immediately. The reason is that understanding the type of attack is crucial. By verifying the integrity of the tokens first, you can determine what the attacker attempted to do. If the cookie exists but its integrity is compromised, it suggests the attacker managed to swap the JWT cookie but couldn't sign it with the secret key.
143+
You might ask why not block immediately. The reason is that understanding the type of attack is needed. By verifying the integrity of the tokens first, you can determine what the attacker attempted to do. If the cookie exists but its integrity is compromised, it suggests the attacker managed to swap the JWT cookie but couldn't sign it with the secret key.
144144
A worse scenario is if the attacker already knows the secret key but is unaware of the random that's supposed to exist in both the CSRF token and the JWT/JWE. This information is vital for understanding the extent of the breach and implementing appropriate countermeasures.
145145
</C>
146146

@@ -288,7 +288,7 @@ Read about `Lax` and `Strict` from the official <L href='https://datatracker.iet
288288
<H2>User Interaction-Based CSRF Defense</H2>
289289

290290
<C>
291-
Requiring users to authenticate using their password, biometric data, security questions, or <L href="https://en.wikipedia.org/wiki/One-time_password">OTP</L> is a highly effective security measure. However, it can significantly impact user experience, so it's typically used only for critical operations like changing passwords or conducting financial transactions. Avoid using CAPTCHA for this purpose, as it's primarily aimed at preventing automated bot attacks and doesn't provide the necessary level of security for these sensitive activities.
291+
Requiring users to authenticate using their password, biometric data, security questions, or <L href="https://en.wikipedia.org/wiki/One-time_password">OTP</L> is a highly effective security measure. But, it can significantly impact user experience, so it's typically used only for critical operations like changing passwords or conducting financial transactions. Avoid using CAPTCHA for this purpose, as it's primarily aimed at preventing automated bot attacks and doesn't provide the necessary level of security for these sensitive activities.
292292
</C>
293293
<H2>HTTP Methods</H2>
294294
<C>

src/app/(pages)/blog/[post]/page.tsx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ export async function generateMetadata({
3636

3737
const postImageWidth = 1200; // in pixels
3838
const postImageHeight = 630;
39-
const postImageUrl = `https://via.placeholder.com/${postImageWidth}x${postImageHeight}.png/000000/ffffff/?text=${seoTitle}`;
39+
const postImageUrl = `https://via.placeholder.com/${postImageWidth}x${postImageHeight}.png/000000/ffffff/?text=${description}`;
4040
return {
4141
title,
4242
description,
@@ -60,7 +60,7 @@ export async function generateMetadata({
6060
twitter: {
6161
card: 'summary_large_image',
6262
title,
63-
description,
63+
description: seoTitle,
6464
images: [postImageUrl],
6565
},
6666
creator: 'Ashref Gwader',
@@ -79,7 +79,7 @@ export async function generateMetadata({
7979
},
8080
},
8181
manifest: pub.SITE_URL_PROD + '/manifest.json',
82-
category: 'everything',
82+
category: 'tech',
8383
};
8484
}
8585

src/app/components/protos/hero-section.tsx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,10 @@ import { Button } from '../ui/button';
125125

126126
/* eslint-disable */
127127

128+
/* eslint-disable */
129+
130+
/* eslint-disable */
131+
128132
function TypingAnimation() {
129133
const el = useRef(null);
130134

src/app/components/reusables/code/code-block.tsx

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -306,6 +306,16 @@ import CopyButton from './copy-code';
306306
/* eslint-disable */
307307
// @ts-nocheck
308308

309+
// react-syntax-highlighter has no types
310+
311+
/* eslint-disable */
312+
// @ts-nocheck
313+
314+
// react-syntax-highlighter has no types
315+
316+
/* eslint-disable */
317+
// @ts-nocheck
318+
309319
// react-syntax-highlighter has no types
310320
/* eslint-disable */
311321
// @ts-nocheck

0 commit comments

Comments
 (0)