Hacker Newsnew | past | comments | ask | show | jobs | submit | ponytech's commentslogin

I don´t understand how you could use this new tasks system in production if there is no real workers when it's released? Are there any 3rd party yet?


My understanding is that if you just need to return a response to the client as quickly as possible, but are ok with then processing your task directly after that, then it's still usable today.

But if you want to schedule a task further in the future, then a new backend will be needed for that.


I think the bigger use case is being able to (backoff) retry failing API calls to 3rd party services. AFAIUI the new tasks package doesnt offer this in v1 which is a deal breaker for my project, at least.


For me I think it works well as is because my use case is sending several different emails after POST'ing to a view, which, there is no need to make the user wait for in my case, as they don't care about the status of the mail delivery.

But I realize there are many other usecases too that will need proper workers.


I guess the idea is first to provide a generic interface to connect various backends to and let the community develop those. Users of Django should then be able to swap one out for another. Maybe one will emerge as a quasi-standard or maybe it will be like database backends where different backends serve different purposes.

At leas that's my guess.


I have been an Evernote, then Notion and now a Jopplin user. A feature I used a lot in these apps is the browser extension that allows me to quickly bookmark a web page into a note. Would you consider such a feature?


edit: Credentials for modifying the piepline were found in the .git/config file


With Bitbucket, as well as Gitlab and likely others that I haven't used, the CI pipelines are stored as a plaintext configuration in the repo itself. So, repo commit access automatically gives you the ability to modify the pipeline.


This is why things like codeowners files are so important


It's right at the start of the post - the git remote including credentials was exposed via the .git directory


I thought the same :)


I rent a bare metal server for $50/month with unlimited bandwith...


Where?


OVH: https://us.ovhcloud.com/bare-metal/prices/ (prices are a little higher now)


Probably Hetzner


There is no such thing as unlimited bandwidth.

What I'm aware of are services which do not charge extra for egress but severely limit your egress bandwidth (like 10 Gbit peak, 100 Mbit avg)

And limiting egress bandwidth is better is better done in the service per client than by the hoster for your system


https://getdeploying.com/reference/data-egress

Check this out. You _almost_ use the most expensive service.

I think you should expand your awareness. Hetzner for instance doesn't mention anywhere that they throttle your 10gbit uplink, but they limit to 20TB/month, with ~1EUR for every TB over. Seems like you wouldn't even have noticed what you described in your article.


20 TB/month is significantly less than 100 Mbit/s

Sure there are cheaper options then GCS but, there is no one providing unlimited free bandwidth


Here the Wikipedia page (in French): https://fr.wikipedia.org/wiki/Perdu.com

For the past 26 years the page only displayed a message like:

Lost on the Internet?

No worries, we will help

* <--- you are here


It had been up since 1998. It show a 404 error today. So sad :'-(


Maybe I'm getting old but I just use HTML tables every time. :-D


My preference: using traditional incremental numeric IDs and obfuscate them with Hashids (https://hashids.org) when exposed publicly


This looks amazing.

I'm wondering about the security of using a random alphabet with this instead of the default one. In my mind this amounts to a form of cryptography, but I have no idea how to analyse how much security it gives.

EDIT: Reading the faq I see that they insist that sqids cannot provide any encryption. This does not fit with my understanding of the word. Using unique random alphabet is probably the oldest form of encryption. Whether or not it is secure enough depends on your threat model. What I want and what I need is a way to calculate the security provided by a random alphabet.


I'd love this too!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: