|
Write Ahead Ahead Log Log
|
# ? Apr 23, 2019 11:20 |
|
|
# ? Dec 5, 2024 15:58 |
|
Feisty-Cadaver posted:what in the fuckin world It was all part of a trading system written on Eclipse RCP. Being a trading system it was extremely time sensitive and it would regularly poo poo the bed and cost that tens of millions of dollar in incomplete or late trades.
|
# ? Apr 23, 2019 11:25 |
|
Aramoro posted:It was all part of a trading system written on Eclipse RCP. Being a trading system it was extremely time sensitive and it would regularly poo poo the bed and cost that tens of millions of dollar in incomplete or late trades. as well it should the people who lost out on tens of millions should be rewarded with a trip to the guillotine
|
# ? Apr 23, 2019 11:43 |
|
Aramoro posted:It was all part of a trading system written on Eclipse RCP I have made some poor decisions in my life, but good golly that's something else edit: and I like eclipse for the most part
|
# ? Apr 23, 2019 12:07 |
|
I love every time you download some dev environment for some piece of hardware and it's a modified version of eclipse that was forked 10 years ago.
|
# ? Apr 23, 2019 12:13 |
|
My second favorite thing is when you download a dev environment and it's a custom written thing that stores all source code files as a single XML file making source control impossible.
|
# ? Apr 23, 2019 12:14 |
|
CRIP EATIN BREAD posted:My second favorite thing is when you download a dev environment and it's a custom written thing that stores all source code files as a single XML file making source control impossible. the company I worked for had both, one IDE which was based on heavily-modified equinox (eclipse) backend and another written in C# which used megabyte-sized XML blobs to store the code. I was not involved with either decision
|
# ? Apr 23, 2019 12:21 |
|
Private Speech posted:the company I worked for had both, one IDE which was based on heavily-modified equinox (eclipse) backend and another written in C# which used megabyte-sized XML blobs to store the code. did that company supply units for in-vehicle satellite+cellular comms?
|
# ? Apr 23, 2019 12:24 |
|
CRIP EATIN BREAD posted:did that company supply units for in-vehicle satellite+cellular comms? humm, aus army? otherwise no it's not the primary use, that's the only place that used it like that that I can think of e: i'm sure there's plenty other similar devices though Private Speech fucked around with this message at 12:30 on Apr 23, 2019 |
# ? Apr 23, 2019 12:27 |
|
Aramoro posted:I mean what else could 'uses the permissions of the user who generated the link' mean? I assumed it meant it used his permissions _to access the linked resource_. Not to do anything else. That is, if John's access to the resource is revoked by the owner, all the shareable links he generated stop working. As opposed to a more naive implementation where the resource _itself_ is marked as "accessible to anybody who knows this url", and it keeps working even after John is fired.
|
# ? Apr 23, 2019 12:30 |
|
Private Speech posted:humm, aus army? otherwise no well the description of a c# ide with xml sources AND an eclipse based one hit it on the nose for a product from a vendor
|
# ? Apr 23, 2019 12:32 |
|
CRIP EATIN BREAD posted:well the description of a c# ide with xml sources AND an eclipse based one hit it on the nose for a product from a vendor you can hate me for it when it breaks anyway, but it's something of a lovely industry semi-standard so I don't think it's us e: the army thing is on the website it's not a secret, just to be clear Private Speech fucked around with this message at 12:45 on Apr 23, 2019 |
# ? Apr 23, 2019 12:34 |
|
Feisty-Cadaver posted:I have made some poor decisions in my life, but good golly that's something else I should say I did not write either of these systems, just worked on them. It was kinda the fascinating result of a whole bunch on contractors, pretty much everyone there was a contractor, and hard delineation between the teams. The Database cluster was garbage but the core application team could not talk to them at all, so the txt file buffering system was invented because otherwise they could not guarantee writes to the database.
|
# ? Apr 23, 2019 12:43 |
|
Progressive JPEG posted:haven't hit that specific issue with asio but I did find that teardown is the single hardest part to get right AWS load balancers hitting the app on mass every second for health checks, each one causing a small leak per connection. I was expecting the razor tooth pattern early as AWS was not following HTTP/1.1 keep alive at all but surprised it is happening now at max usage. TCMalloc may be making things funky
|
# ? Apr 23, 2019 12:55 |
|
CPColin posted:
we had this issue using some unnamed vendor's printer software
|
# ? Apr 23, 2019 13:00 |
|
NihilCredo posted:I assumed it meant it used his permissions _to access the linked resource_. Not to do anything else. That is, if John's access to the resource is revoked by the owner, all the shareable links he generated stop working. if there's less than 50 keys total it implies to me that it's just a plaintext login for a given user but maybe its not that bad
|
# ? Apr 23, 2019 13:08 |
|
gonadic io posted:I've been thinking about this for my dumbass website. The entry point after twitter oauth redirect is butt.com/twitter-redirect?apikey=123&API-secret=456 i don't think your apikey or secret are supposed to be in the url like that? It should be like butt.com/twitter-redirect or w/e and that endpoint takes the auth response from twitter and handles it. but yes once you get that response and determine it to be a successful authentication you issue a cookie and store the auth token in the session details for the user. then you can use the token in future calls to twitter. However, if you only need to make a single call to twitter to grab user details you can do that during the response handling and then throw away the token.
|
# ? Apr 23, 2019 13:37 |
|
Aramoro posted:I should say I did not write either of these systems, just worked on them. oh for sure, not meaning to place any blame in your direction. I've worked on some impressively horrific systems, just like everyone else
|
# ? Apr 23, 2019 14:13 |
|
NihilCredo posted:probably demonstrating my tp status here, but isn't this basically what google docs and similar web apps do when you choose 'create shareable link' to a document? generate an auth token tied to the user who created the link, embed it in the link, when someone clicks the link the token is checked for non-revocation? seems pretty safe to me Sadly, that's exactly what I meant. Fortunately, I don't think anybody in our current crop of users is savvy enough to recognize the token for what it is or try to use it for anything malicious. I'd definitely rather fix the issue now than after we open the application to a much larger set of users. I'm planning to change it so the tokens are single-use and don't just hang around for an hour, but I just know some user out there is relying on the current ability to share links, so I'm gonna have to rework some things so sharing links becomes less attractive (like switch the GET to a POST). Ideally, the token exchange would happen entirely behind the scenes and we'd just pipe the vendor application response straight to the user. I'm trying to get the stakeholders to conclude this is the best idea, despite the extra development time.
|
# ? Apr 23, 2019 14:35 |
|
well that was an afternoon wasted trying to establish what the cname for our domain controllers is as the answer is nobody knows including the team that supports them, however it was irrelevant because instead of manually performing a bind to a controller to do a global catalog lookup I could have just pulled the dns forest info from the current context and used that to get the gc ofc every other result for "ad search across multiple domains" returns useless info because literally everybody seems to have gone down the same route as me of "write process to handle one domain, discover it doesn't work for anyone in other regions during testing, fiddle with connection strings then give up and post about it online" also pretty sure our AD environment is a clusterfuck of two or three different variations that may or may not have any commonality between them depending on what you query
|
# ? Apr 23, 2019 17:55 |
|
domainname.tld should point to the list of domain controllers. if you want global catalogs you can lookup SRV records for _gc._tcp.domainname.tld. Or better yet just use System.DirectoryServices.ActiveDirectory which has ez tools for handling all of this for you.
|
# ? Apr 23, 2019 18:11 |
|
Shaggar posted:domainname.tld should point to the list of domain controllers. if you want global catalogs you can lookup SRV records for _gc._tcp.domainname.tld. yeah that's what i ended up with after spending hours banging my head on the wall trying to work out why I could query the gc manually from a local tool but not from app code (something involving binding one domain lower than the root I thinkl also all our internal infra docs are useless, the best one I found said "our ad topography is a mix of several the future aspiration state is..." that was dated like 2015 and never done lol
|
# ? Apr 23, 2019 19:05 |
|
gonadic io posted:I've been thinking about this for my dumbass website. The entry point after twitter oauth redirect is butt.com/twitter-redirect?apikey=123&API-secret=456 that url looks real bad It should be something like butt.com/twitter-redirect?code=xzy then you do a post request from your server to twitter to verify the code, which gives you an access token to get stuff from twitter.
|
# ? Apr 23, 2019 19:07 |
|
aaaaaaaand im hired
|
# ? Apr 23, 2019 19:42 |
|
Zaxxon posted:that url looks real bad It should be something like butt.com/twitter-redirect?code=xzy https://developer.twitter.com/en/docs/basics/authentication/overview/3-legged-oauth posted:Step 2: GET oauth/authorize e: i was dumb and it's not secrets. i should make sure that my site validates the verifier token before issuing any cookies, and then if somebody else takes that url and visits it, twitter won't verify the code twice (or maybe it's time limited?) and there's no issue gonadic io fucked around with this message at 20:02 on Apr 23, 2019 |
# ? Apr 23, 2019 19:59 |
|
HoboMan posted:aaaaaaaand im hired
|
# ? Apr 23, 2019 20:16 |
|
HoboMan posted:aaaaaaaand im hired initially read this as "tired", but
|
# ? Apr 23, 2019 20:32 |
|
HoboMan posted:aaaaaaaand im hired
|
# ? Apr 24, 2019 01:27 |
|
i'm a TA for a programming class and the professor's code is worse than most of the students he doesn't seem to know what a naming convention is on the other hand, he has a research position for me next year, so im not gonna say anything about it
|
# ? Apr 24, 2019 02:50 |
HoboMan posted:aaaaaaaand im hired Congrats!
|
|
# ? Apr 24, 2019 05:12 |
|
animist posted:i'm a TA for a programming class and the professor's code is worse than most of the students Welcome to academia
|
# ? Apr 24, 2019 06:52 |
|
animist posted:i'm a TA for a programming class and the professor's code is worse than most of the students the correct naming convention for academic code is single letters. greek letter names permitted where used in the accompanying paper
|
# ? Apr 24, 2019 08:06 |
|
Soricidus posted:the correct naming convention for academic code is single letters. greek letter names permitted where used in the accompanying paper I prefer 2 letter abbreviations of Greek letter names myself. Ep, de, al, be, ga
|
# ? Apr 24, 2019 08:20 |
|
unicode source is truly a great boon
|
# ? Apr 24, 2019 08:22 |
|
Soricidus posted:the correct naming convention for academic code is single letters. greek letter names permitted where used in the accompanying paper should i put all the variables and constants at the top of my code text?
|
# ? Apr 24, 2019 08:28 |
|
Jabor posted:unicode source is truly a great boon quote:struct DormandالمكاوىPrince1986RKN434FM : gotta spell proper names correctly e: can't put the code in a [code] block because SA does html entity escaping, lol e2: чебышёв_series.hpp posted:// A Чебышёв series with values in the vector space |Vector|. The argument is TheFluff fucked around with this message at 08:36 on Apr 24, 2019 |
# ? Apr 24, 2019 08:32 |
|
Jabor posted:unicode source is truly a great boon that snack overflow post where someone implemented a preprocessor for templates in go with utf brackets
|
# ? Apr 24, 2019 09:44 |
|
second to terrible single letter or Greek variable names is myThing
|
# ? Apr 24, 2019 11:54 |
|
cheburashka series
|
# ? Apr 24, 2019 15:46 |
|
|
# ? Dec 5, 2024 15:58 |
|
Boiled Water posted:should i put all the variables and constants at the top of my code text? yes. this makes it easier to reuse them all for several different things, names don’t grow on trees
|
# ? Apr 24, 2019 17:46 |