• 9 Posts
  • 235 Comments
Joined 3 years ago
cake
Cake day: June 23rd, 2023

help-circle
  • However, what is stopping a malicious actor from bypassing the API gateway and communicating directly to the micro services ? Do we solve this problem using a firewall, so only trusted traffic reaches the micro services ?

    Kind of - sort of

    With this kind of setup, usually you’d put all your micro services inside a VPC. The micro services wouldn’t even be directly accessible from the internet. So it wouldn’t really be a “firewall” - but a nat gateway.

    Though conceptually a little bit the same. The API gateway is kind of acting as a firewall







  • It depends on the registrar. By the rules of icann:

    At least annually, a registrar must present to the registrant the current Whois information, and remind the registrant that provision of false Whois information can be grounds for cancellation of their domain name registration. Registrants must review their Whois data, and make any corrections.

    So if the FBI concludes that the provided WHOIS data is false, they could potentially still use that as reason to seize the domains





  • Are there existing tools you love (or hate) that do something similar?

    This sounds similar to “Static code analysis” tools. Especially now that these code analysis tools are getting AI integrations.

    For example we use coderabbit.ai. That does a code review on PRs in github, and reviews these sort of things. Especially the simpler things that you’ve mentioned like poor naming conventions, violations of language-specific best practices, and readability issues. I’m not sure if it will automatically come up with “large refactoring opportunities” by default - but maybe you can custom-prompt configure it to try, I guess

    (Comment) Why have a separate webpage if such of helper can be built into IDE/editor?

    Coderabbit also has IDE extensions: https://www.coderabbit.ai/ide - I think the separate webpage exists for org level configurations and overviews. These “best practices” are probably defined on a team level to ensure everyone uses the same code-style and things like that

    I’m not sure if “just a website to copypaste code and get reviews” is really a good idea. Maybe for juniors that want to review one class or method or something. But usually code is spread across multiple files, and structural refactor opportunities are on a larger scale then just a couple files


  • On September 19, Ruby Central, a nonprofit organization that manages RubyGems.org, a platform for sharing Ruby code and libraries, asserted control over several GitHub repositories for Ruby Gems as well as other critical Ruby open source projects that the rest of the Ruby development community relies on.

    Uhm, so how does this happen? If some people create Ruby Gems and host them under their own github account, how would Ruby Central suddenly assert control over them?