ayushsrivastava
Mon Feb 19 2024
for tracking emails for analytics purpose sent from mailgun we can use o:tag
parameter along with parameters like subject
and domain
https://www.mailgun.com/blog/email/tags-explained-gaining-useful-insights-from-email-segmentation/
soniya.rayabagi
Fri Feb 16 2024
To delete a Docker image we can use a command docker rmi [IMAGE_ID or REPOSITORY:TAG]
and ,
To remove all dangling images that consume disk space , can use docker image prune
satya
Fri Feb 16 2024
forms in rails 7 are now submitted with turbo_stream
format.
for eg: from the logs:
Started POST "/books" for 127.0.0.1 at 2024-02-16 14:44:16 +0530
Processing by BooksController#create as TURBO_STREAM
satya
Fri Feb 16 2024
push a new version of your gem to http://rubygems.org|rubygems.org using bundle exec rake release
nisanth
Fri Feb 16 2024
To remove rvm and its traces, you can use the rvm command itself:
rvm implode
This command will remove all traces of rvm from your system.
satya
Fri Feb 16 2024
difference between oauth/v2/authorize
& openid/connect/authorize
I am taking the example in context of Slack
.
- OAuth 2.0 (
/oauth/v2/authorize
): • Usage: When a third-party application needs to access a user's resources in Slack, it uses the/oauth/v2/authorize
endpoint. • Process: The user is prompted to grant the application permission to access their resources. Upon consent, Slack returns an authorization code to the application. This code is then exchanged for an access token, which the application uses to access the user's resources on Slack. • Focus: Purely on granting access to resources (authorization). - OpenID Connect (
/openid/connect/authorize
): • Usage: When an application not only needs to access resources but also verify the identity of the Slack user, it uses the/openid/connect/authorize
endpoint. • Process: Similar to OAuth 2.0, but in addition to granting access, this process authenticates the user and returns an ID token along with an authorization code. The ID token contains claims about the user's identity, which can be used by the application to verify who the user is. • Focus: On both verifying user identity (authentication) and granting access to resources (authorization).
sagar.ghorse
Fri Feb 16 2024
Launching an NGINX pod imperatively (directly from the command line) can be done using the kubectl run nginx-pod --image=nginx --restart=Never
nisanth
Thu Feb 15 2024
Ensure that Docker Desktop is running before executing the docker build
command.
nisanth
Thu Feb 15 2024
Redis Cache : One of the most common use cases for Redis is caching frequently accessed data to reduce the load on databases and speed up response times
soniya.rayabagi
Wed Feb 14 2024
export TF_LOG=DEBUG
this sets the TF_LOG
environment variable to DEBUG
, instructing Terraform to output detailed debug logs during its execution( Terraform apply ).
unset TF_LOG
this unsets (removes) the TF_LOG
environment variable, effectively turning off debug logging for Terraform execution.
Showing 14 to 16 of 66 results