Fueling Curiosity, One Insight at a Time

At Codemancers, we believe every day is an opportunity to grow. This section is where our team shares bite-sized discoveries, technical breakthroughs and fascinating nuggets of wisdom we've stumbled upon in our work.

Feb 16, 2024
To delete a Docker image we can use a command docker rmi [IMAGE_ID or REPOSITORY:TAG] and ,
To remove all dangling images that consume disk space , can use docker image prune
soniya.rayabagi
soniya.rayabagi
Feb 16, 2024
forms in rails 7 are now submitted with turbo_stream format.
for eg: from the logs:
Started POST "/books" for 127.0.0.1 at 2024-02-16 14:44:16 +0530
Processing by BooksController#create as TURBO_STREAM
satya
satya
Feb 16, 2024
push a new version of your gem to https://rubygems.org|rubygems.org using bundle exec rake release
satya
satya
Feb 16, 2024
To remove rvm and its traces, you can use the rvm command itself:
rvm implode
This command will remove all traces of rvm from your system.
nisanth
nisanth
Feb 16, 2024
difference between oauth/v2/authorize & openid/connect/authorize
I am taking the example in context of Slack .
1. OAuth 2.0 (/oauth/v2/authorize):
Usage: When a third-party application needs to access a user's resources in Slack, it uses the /oauth/v2/authorize endpoint.
Process: The user is prompted to grant the application permission to access their resources. Upon consent, Slack returns an authorization code to the application. This code is then exchanged for an access token, which the application uses to access the user's resources on Slack.
Focus: Purely on granting access to resources (authorization).
2. OpenID Connect (/openid/connect/authorize):
Usage: When an application not only needs to access resources but also verify the identity of the Slack user, it uses the /openid/connect/authorize endpoint.
Process: Similar to OAuth 2.0, but in addition to granting access, this process authenticates the user and returns an ID token along with an authorization code. The ID token contains claims about the user's identity, which can be used by the application to verify who the user is.
Focus: On both verifying user identity (authentication) and granting access to resources (authorization).
satya
satya
Feb 16, 2024
Launching an NGINX pod imperatively (directly from the command line) can be done using the
kubectl run nginx-pod --image=nginx --restart=Never
sagar.ghorse
sagar.ghorse
Feb 15, 2024
Ensure that Docker Desktop is running before executing the docker build command.
nisanth
nisanth
Feb 15, 2024
Redis Cache : One of the most common use cases for Redis is caching frequently accessed data to reduce the load on databases and speed up response times
nisanth
nisanth
Feb 14, 2024
export TF_LOG=DEBUG this sets the TF_LOG environment variable to DEBUG, instructing Terraform to output detailed debug logs during its execution( Terraform apply ).
unset TF_LOG this unsets (removes) the TF_LOG environment variable, effectively turning off debug logging for Terraform execution.
soniya.rayabagi
soniya.rayabagi
Feb 13, 2024
terraform workspace show command is used to display the name of the current workspace.
terraform workspace new <name> command is used when you want to create new workspace.
terraform workspace list command used to list all the workspaces.
terraform workspace select example1 can switch between the workspaces.
soniya.rayabagi
soniya.rayabagi

Showing 25 to 27 of 77 results

Ready to Build Something Amazing?

Codemancers can bring your vision to life and help you achieve your goals