Everything about Web Development and Cloud Computing.
This blog post will show you how to use husky and git-secrets to prevent committing passwords and other sensitive information to a git repository. This is a good idea because it reduces the risk of your API key and secret being exposed to your code.
This is a simple example of how to use Route53 and S3 to forward your domain to absolute URLs.
Sometimes you want mail clients to group emails into threads. For example, if you have a group of emails that are related to the same topic, you want to mail clients to group them together when the user views the list of emails in threaded view, the email client will show the thread.
A signed URL includes additional information, for example, an expiration date and time, that gives you more control over access to your content. This additional information appears in a policy statement, which is based on either a canned policy or a custom policy.
Sometimes you want to show a progress bar while downloading a file in Node.js. This article will show you how to do that.
AWS Backup is a service that provides backup and restore of your AWS resources. This is an example of how to use the AWS Backup API to assign resources to a backup plan.
Custom Authorizers allow you to run an AWS Lambda Function via API Gateway before your targeted AWS Lambda Function is run. This is useful for Microservice Architectures or when you simply want to do some Authorization before running your business logic.
You can authenticate and protect your Amazon OpenSearch Service default installation of OpenSearch Dashboards using Amazon Cognito. This article will show you how to do this using the AWS CDK.
AWS CloudFormation templates can contain parameters—custom values that are supplied at deployment time and incorporated into the template. Since the AWS CDK synthesizes AWS CloudFormation templates, it too offers support for deployment-time parameters. Using the AWS CDK, you can both define parameters, which can then be used in the properties of constructs you create, and you can also deploy stacks containing parameters.
Storing and managing secrets like API keys and other credentials can be challenging. Your API key is valuable information and an accidental leak could result in unwanted calls, app blockage, or worse. Publicly exposing your API keys can lead to unexpected charges on your account
Subscribe to the newsletter