Category: Blog

  • How to run a Public Docker Registry in Kubernetes

    Introduction As a member of NearForm’s DevOps team, I spend a lot of my time working with containers in Kubernetes. In the article, I will cover the creation of publicly accessible Docker Registry running in Kubernetes. For the sake of keeping things simple and short, I will use basic authentication for the registry and Kubernetes…

    Petr Kohut
    | 12th September 2018
  • Building Docker images in Go

    For the NearForm Node.js Docker distribution we we wanted to add some flexibility to our build process in order to be quicker to respond to changes in the ecosystem. We are currently using “make” to build the docker images which requires a configure step. Since these images never really get built anywhere else than in…

    Alex Knol
    | 10th September 2018
  • The world is a dangerous place, which is why you need Joi data validation

    Re-joi-ce people! If you have been programming long enough, you know all too well that you can never trust external data. The first thing you will want to do is validate that data before it gets too deep into your program. You may have already heard the saying “don’t roll your own crypto”. Though less…

    Nicolas Morel
  • Wormholes in JavaScript

    Wormholes in JavaScript Computers are interesting machines. From a theoretical point of view, we tend to think of them as automated mathematicians, or put another way, just really good at adding, multiplying, and working with numbers in general. The automated mathematician, however, is a deceptive abstraction. It turns out the computer is much faster at…

    Mathius Buus
    | 3rd September 2018
  • How to manage Node.js sudo free with NVM

    There are many ways to install Node.js, from operating system package managers to single version installers; you can even download and build from source! Unfortunately, the vast majority of installations can put Node.js in a location that requires the need for elevated permissions when using either the node or npm commands on the command line or…

    Dean McDonnell
  • Zed Attack Proxy in a CI Pipeline?

    Adding Automated Penetration Testing to Continuous Integration Pipelines Testing, particularly around security, is a core part of the ethos of all nearForm development teams. In many organisations, penetration testing can often happen just before a product first pushes to production, and periodically thereafter. Penetration testing is performed by external teams and is focused on finding…

  • Leaistic Library Header image

    Leaistic: A Library and Microservice for Managing Elasticsearch Content

    ElasticSearch is a great technology for a wide variety of use cases from autocompletion to log management, and is likely to be part of your stack for many complex projects. In ElasticSearch, you put your data in indices. An index is a collection of documents, that shares the same mapping and settings. We have found that Index management can be hard to manage over time:…

    Florian Traverse
    | 22nd August 2018
  • Terraform Header Image

    Building a Transparent Proxy in AWS VPC with Terraform and Squid

    In this article I’m going to be setting up an example network and deploying a transparent proxy to it. To make this repeatable and to show exactly how it can be deployed in AWS VPC, I am using Terraform. Terraform is an excellent tool for describing and automating cloud infrastructure. All of the terraform code…

    Karl Hopkinson-Turrell
  • Comparing NPM Audit with SNYK

    At nearForm, we specialize in building practical software solutions for our clients. A part of designing and building a modern solution is making it secure. In today’s world where almost everything is connected and operated by computers, adding security on-top, as an afterthought no longer works. As software architects and engineers, we also focus on…

    Igor Shmukler
  • AVOIDING COMMON HURDLES IN UNIT TESTING

    Avoiding Common Hurdles in Unit Testing

    Why do developers skip writing tests for some code? Perhaps because it relies on the file system or an external API. Perhaps because we think it’s too difficult, or a test account to an external API is not guaranteed to be available. Perhaps it’s because an external API may not be accessible from the CI…

    William Riley-Land
    | 16th August 2018
  • Top