Details
-
AboutFull stack Web Developer, with a bit of knowledge about devops, CI/CD and automated tests. Trying not to go crazy with project changes after client's approval.
-
Skillspython, javascript, java, groovy
-
LocationSP, Brazil
Joined devRant on 2/21/2018
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
*stares at `is-even` npm package*
-
@AlgoRythm in my company we have this kind of formatting suggestions configured as a hybrid level: during local development it's treated as warnings (and you can even disable those). In our pipelines this becomes an error.
However, when you commit your code a git hook will autofix the formatting, so nowdays this pipeline only fails if you try to commit with --no-verify -
Don't you know you should use `aStartDate` to prevent that?
/s -
@galena believe it or not, someone in the past (before I started this job) introduced this testing culture to the company and quality actually improved! Then tests became part of our definition of done and most of the codebase is covered by tests (specially new code).
But now that "doing the right thing" is getting in the way of "finishing this project fast" this manager tried to bypass it. I expressed my concern and then I got backed up by the Engineering Manager. I think we're going to keep the tests for now :) -
@electrineer and make sure it's out of focus hahahaha
-
Don't share a snippet, share a screenshot, just to annoy them a bit.
If possible, add compression artifacts for "better" results -
Start to end every sentence with "do you agree?" until he notices (if ever) why you're doing that 😆
-
If you have time (and the will) to help them sorting the tasks, I suggest you to use an Insertion Sort, so your manager only have to look at one task at time and compare with the list that will come out sorted at the end.
You can do it directly in one column of the kanban board. -
Once upon a time, when I worked in a software house, I was on a call with my boss and a client. The client sent an Excel file with a list of bugs to fix and some small changes to add to the system, all of them marked as priority 0 (the maximum one).
Boss: - I see every task here has the same priority. Can you prioritize them properly, please?
Client: - Oh, everything there is urgent and should be done as soon as possible.
My boss insisted on his demand and the client gave about the same answer again.
Boss: - Ok. Then we will start from the top and will work it down the list--
Client: - No way! We need this task on line XX to be done first, then the task on the line YY could be the next--
Boss: - So there IS some tasks more important than others, then?
(A moment of silence)
Client: - Yes...
Boss: - Then could you prioritize them for us?
(Another silence)
Client: - ok, I'll do that
----------
And this, my friends, is how you get your priorities sorted out :D -
I agree, but also recommend to see a doctor.
I used to use earplugs to sleep, and sometimes I combined that with the noise canceling headphones to be able to work (I lived near a construction site that was driving me crazy). I scheduled an appointment and discovered that my ear canal didn't had reflexes good enough to protect against sudden high sounds.
I've tried some tricks to reduce that effect, like white/brown noise, but everything solved once the construction was done.
I'm not turning mad anymore. I think. -
WordPress is also one of the most useless "feature" I had to implement to a project Hahahaha
Oh, wait... Wrong week question -
@AnxiousADHDGuy oops, I didn't notice you asked for remote specifically 😅
I believe they _post_ positions to relocate only, but is a good place to find companies looking for employees aboard, so maybe they have remote positions as well (check these companies directly in LinkedIn) -
I got a new job from relocate.me (never heard about this site before 😊)
-
I spent 1 year opening tickets to allow gitbub subdomains trough our VPN. We couldn't even access the docs.github.com and neither *.github.io which some projects uses for documentation or demos.
Every time they closed the ticket with "done" (after 2 weeks or so "working on it") it was actually not solved and I had to open another ticket 🙄
I believe it's because some of those subdomains uses TLSv1.3 and the VPN wasn't prepared to handle that.
Now I don't open those tickets anymore because I'm out of that place \o/ -
- ok, I copied everything I needed and you can now format that computer.
(After formatting...)
- Where's the documents I copied to the clipboard before you format the computer??? -
@aadilp Yes! I even converted to our local currency to help.
It's very strange indeed. -
Does it matter? 😆
-
If you're ashamed of your old code, means that you grew as a developer.
Keep improving yourself and soon the code you write today will ashame your future self too :D -
That's why devs should be building (and maintaining) their own pipelines
-
Why are you describing me???
-
GH Copilot is blocked by company VPN :(
-
In Portuguese we have the expression "ué". That's an alternative to Japanese ;)
-
@Humanoid- @Codex404 I told him that one of the classes is a Singleton, so he could store some value in a class property and it will be accessible in all other classes that this service is injected
-
Once upon a time one of our clients asked us to put a "Caps Lock is On" sign in a web form, but it should be shown before the user typed anything.
We had to find articles explaining that the browser don't provide this information.
It wasn't a smart client. -
Traefik?
-
@ymas At least on the proposed application, the backends will have access to the authentication service, and they will be allowed to request information using Basic Authenatication AND the communication between them will occur inside a VPC. Since the JWT contains his own signature, to every request we could check if the signature is valid, if it's not expired and if it's not on the blacklist. The information on the token's payload could be minimal, like an user_id that stores an uuid (or in the worst case, the actual numeric id of the user on Users table)
-
@ymas On the database, but at least the user can login in multiple devices.
(but the rant is more about the use of JWT to accomplish the old model of authentication) -
@ymas usually you put an expiration date on the token and create a blacklist to the compromised ones. This way you can verify the token against this list, and to avoid the blacklist to grow indefinitely you only need to keep the blacklisted tokens until their expiration date, when they will become invalid from that moment forward.
-
@myss I also have a story with the same company and tokens... they asked us to generate a long secret token so the backends could communicate in a secure way. We asked them if they have any kind of limitations or format for the token, and they said that they didn't have any besides the token wold be sent on the header 'Authorization'.
So we create a string with 128 chars and every request from them we checked if they sent this string on the header (if no, we returned HTTP 401).
On their first test they said that we were answering 401 for every request. Obviously we told them to check the token, and they said that everything was ok.
Since we're already used to their common "we are SO right that we will not even check" behavior, we implemented a Log feature, to log their entire request.
The 'Authorization' header value was "Bearer <64-char string>". We told them. They said "oh... yeah... we only accept 64-char tokens, and we always send "Bearer "on the beginning. -
@hidden it's not supposed to run those lines. He could have just commented the lines, but nooo...