Authentication and authorization with JSON technologies can be a confusing mess of of acronyms, so this post is an attempt to sort these out. This post including the title, is very similar to Red Thunder: JWTs? JWKs? ‘kid’s? ‘x5t’s? Oh...
Hi! My name is Andy and this is my website, blog and portfolio. Please take a look around and thanks for stopping by!
Rack Attack is a Rack middleware developed at Kickstarter that can be used to throttle endpoints and temporarily ban bad actors.
Authentication is a bit tricky with HTTP as it is a stateless protocol. This means that the client plays a role in identifying the user, working with the server.
In Rails API Serialization with JSON:API - Part 1 we looked at using the Sparse Fieldsets functionality of the JSON:API specification.
For a Rails 6 API app I’m working on, there is an API endpoint that provides data to clients, formatted as JSON.
The purpose of this article is to link together some of the tools we use to build and test Java microservices at Groupon.
Learning a new codebase can be a challenging task. Unfortunately at times the original developers are no longer around and the documentation may be outdated or missing entirely.
I have worked remotely for 5 years now both at home and as a part-time member at a few coworking places.
A recent work project involved persisting user data in Redis. We wanted to estimate the amount of memory we expected to use to determine whether the infrastructure currently available would be appropriately sized.
When switching between multiple Ruby applications, rbenv makes it easy to find, install, and use the appropriate version for the project. Let’s take a look at how it is used.