Details
-
Aboutstudying working
Joined devRant on 10/13/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
Yes @asgs and i will report the beach to them, thanks
^.^' but
my sensation Is that they do not know how to behave or develope....
since they decided to have an api with user authentication, their users, and then to have us to make a new frontend which parte one: only used their api, part two: wants to call a third service, which is a public one with its authentication..
If they do not share their authentication system in some way to use It like an identity provider or so,
i'm Just gonna usa a filter on top of any endpoint which will actually call some of their endpoints and check of Is a 200 or 401, yay faith in IT Is gone for now 🙈😆 two companies and multiple developers involved and still this Is the status -
@asgs since they control the auth, how do i achieve that dude?
-
@asgs basically out endpoints are Just calling their endpoints, we offload the client by doing some lil elaboration on responses,...
Other endpoints are, for example, a send mail endpoint, which has nothing to do whith the third party thing.
Since the bearer is released by the third party, the only way of protecting the mail endpoint Is to do a check by calling GET /orders of third party api and check It fails or not...
Otherwise we Need to create our own auth system, i hope so, but then we Need to ask the user to login with our account, then whit the third party account so we can call the api, and then ask the user for their id of the other api they want to include.
Another solution Will Be maybe, to have a database where we map our account with their api accounts and then map to the id of the other service....
But since they are the ones controlling accounts and visibility they should be writing all changes to our db...
I'm seriously loosing trak of their thoughts... -
Let my quote <<never trust a computer you can not throw out of a Window>>
-
The new edition🤩
-
📌
-
@Drillan767 is't that the same for a db? If I gain access to the backend I can probably see the db too 😅
Or db credentials more than the db itself -
Some private and public keys and some spare configuration info are more suitable for plain files ..but user credentials, token, sessions, i'm not sure......
-
Realease sources, profit
-
📌
-
📌
-
@purpletoxicrain no internet, and i made them open a cmd but it was painful anyway
-
We Need this community to explain what really is devops
-
@ljiech sir, you made my life easier, thanks
-
Why are you running
-
📌
-
I wonder if they are really from Uganda
My brutha -
Image recognition, algos, they dont have to Watch every frame, easy life
-
Never gonna see 6 zeroes in entire life
-
📌
-
📌
-
📌
-
📌
-
Maybe is Not a sentece
-
📌
-
@Bitwise do you ever write software related to aircraft, or to your previous job in general?
-
Only 2000 alltogether..pleb
:p -
System.out.println('works#1');
-
Hi!
Easy to install if you dont need dual boot, if you do we Just have to talk a lil bit about partitions and swap memory, we are here for you.
Try without install whith a live! (Boot from USB/cd)
If you want to dive in the topic:
-Free ad in freedom, Richard stallman, free ebook
-Linus Torvalds
-MIT license, GPL license
-GNU is not Unix, Unix like systems -
At some moment in your Life you will even gonna remember your first 63char WPA, memory is weird, let the password come.
If you wanna end yourself do it for the fun.
>:)
*Satan laughing*
Jokes aside..
Was It long and complicated? Le's do the math for bruteforcing