CodeWithYou

Latest

Everything about Web Development and Cloud Computing.

Using husky and git-secrets to prevent committing sensitive information to a git repository.
securityhusky

Using husky and git-secrets to prevent committing sensitive information to a git repository.

This blog post will show you how to use husky and git-secrets to prevent committing passwords and other sensitive information to a git repository. This is a good idea because it reduces the risk of your API key and secret being exposed to your code.

CloudScape Design with NextJS
cloudscapenextjs

CloudScape Design with NextJS

As of July 19th, 2022 Amazon Web Services released their Design System as open-source along with a library of React components that implement the design system. This blog post is a quick overview of the design system and how it can be used with NextJS.

Save text file from S3 using aws-sdk v3
aws-sdk-js-v3s3

Save text file from S3 using aws-sdk v3

AWS SDK v3 now stable and recommended for general use. AWS SDK for JavaScript(V2) is deprecated. This article is serries of tips and tricks to use aws-sdk v3. The first article is about how to save text file from S3 using aws-sdk v3.

Use Route53 + S3 to forward your domain to absolute URLs.
route53s3

Use Route53 + S3 to forward your domain to absolute URLs.

This is a simple example of how to use Route53 and S3 to forward your domain to absolute URLs.

AWS SES sends mails with a custom Reference header
aws-ses

AWS SES sends mails with a custom Reference header

Sometimes you want mail clients to group emails into threads. For example, if you have a group of emails that are related to the same topic, you want to mail clients to group them together when the user views the list of emails in threaded view, the email client will show the thread.

Cloudfront restrict user access by signed URLs
cdkcloudfront

Cloudfront restrict user access by signed URLs

A signed URL includes additional information, for example, an expiration date and time, that gives you more control over access to your content. This additional information appears in a policy statement, which is based on either a canned policy or a custom policy.

Show a progress bar when downloading files in Node.js
axiosnodejs

Show a progress bar when downloading files in Node.js

Sometimes you want to show a progress bar while downloading a file in Node.js. This article will show you how to do that.

AWS Backup resources assignment by Tag using AWS CDK
aws-backupcdk

AWS Backup resources assignment by Tag using AWS CDK

AWS Backup is a service that provides backup and restore of your AWS resources. This is an example of how to use the AWS Backup API to assign resources to a backup plan.

API Gateway Authorizer Function for Auth0 or AWS Cognito using the JWKS method.
CognitoAuth0

API Gateway Authorizer Function for Auth0 or AWS Cognito using the JWKS method.

Custom Authorizers allow you to run an AWS Lambda Function via API Gateway before your targeted AWS Lambda Function is run. This is useful for Microservice Architectures or when you simply want to do some Authorization before running your business logic.

Configuring Amazon Cognito authentication for OpenSearch Dashboards in AWS CDK
cdkElasticsearch

Configuring Amazon Cognito authentication for OpenSearch Dashboards in AWS CDK

You can authenticate and protect your Amazon OpenSearch Service default installation of OpenSearch Dashboards using Amazon Cognito. This article will show you how to do this using the AWS CDK.

How to use parameters in AWS CDK?
cdkParameters

How to use parameters in AWS CDK?

AWS CloudFormation templates can contain parameters—custom values that are supplied at deployment time and incorporated into the template. Since the AWS CDK synthesizes AWS CloudFormation templates, it too offers support for deployment-time parameters. Using the AWS CDK, you can both define parameters, which can then be used in the properties of constructs you create, and you can also deploy stacks containing parameters.

Improve the Security of API Keys [Checklist included]
checklistapi

Improve the Security of API Keys [Checklist included]

Storing and managing secrets like API keys and other credentials can be challenging. Your API key is valuable information and an accidental leak could result in unwanted calls, app blockage, or worse. Publicly exposing your API keys can lead to unexpected charges on your account

Subscribe to the newsletter