Edit: so im done with my preliminary research into this codebase.

Our corporate SSO provider is changing, so I’ve been updating our tools to take advantage of the new badges. I found this in a web application that I started on today. The original developer is long gone, and according to our PaaS, this app has been running for just under 3 years without an update.

There is no CI/CD, blue-green deployment, or back ups. The database is an H2 db with ddl-auto set to create-drop on startup, meaning that this database will delete itself if the app is restaged but thanks to this guys code, it won’t populate itself. 🤷

1 point
*

What’s with lemmy and beans? /s

How are you finding Spring?

permalink
report
reply
2 points

I don’t hate it. The docs are good and it’s very opinionated, which I appreciate. Makes it easier to divy up the work into chunks management can digest.

I wouldn’t use it for a personal project though.

permalink
report
parent
reply
1 point

Underrated comment here lol

permalink
report
parent
reply
2 points
Deleted by creator
permalink
report
reply
30 points

Good Lord, this makes my hands sweaty. Why is your entire prod database leaning on one line of code that’s prone to human error? There should be 20 extra accidental steps taken to do something like this.

permalink
report
reply
4 points

Turns out we were always one copy paste error from a major incident.

Don’t worry, I’m fixing it 🤷

permalink
report
parent
reply
1 point

Heh. That looks like it has decent odds of being a “company ending event” incident, to be specific.

But at least there’s lots of comments. And maybe someone already put a safety net in somewhere else and just forgot to update the 20 comments. It could happen.

permalink
report
parent
reply
1 point

Under different circumstances, sure. As it is, worst they could expect is a fine from our regulators for data retention hits. We could recreate the info easily enough if our suppliers played nicely.

permalink
report
parent
reply
12 points

what do you mean? there’s 20 lines of comments warning about it!

permalink
report
parent
reply
29 points

Look, if you hold the lever tight you can safely put the pin back in the grenade!

permalink
report
parent
reply
10 points
*

^C^C^C^C^C^C

permalink
report
parent
reply
2 points
*
permalink
report
reply
1 point

You get a side effect! You get a side effect! You all get siiiide effffects!!!

permalink
report
parent
reply
56 points

Found this in production while migrating SSO providers. Made me chuckle 🙃

permalink
report
reply
41 points
*

DO NOT RUN IN PROD

Found this in production

Classic

permalink
report
parent
reply
6 points

Actually, this code is also used in their side business manufacturing cattle prods, that line must be excluded from the prods or else they may become sentient and form a cattle prod based skynet.

permalink
report
parent
reply
9 points

When I sat down today I thought I was just going to be updating some properties file with oauth end points.

This is so blatantly stupid that I now have to pick through the code base and write up a change request and incident avoidance report 😕

permalink
report
parent
reply
6 points

Only thing better is finding commented out code below that which would actually prevent it from running in Prod. Bonus if there’s a code comment next to it saying “disabled per email” with no further explanation.

permalink
report
parent
reply