A free utility to help web developers watch and manipulate network traffic from their AJAX applications.
WebPerfDays Selenium Code
Webapp to store and analyze HAR files.
Java utilities for running Selenium tests in parallel using Selenium Grid or Sauce Labs
A simple tool to help manage software project roadmaps
TimeCloud is a JSON-enabled database of RRD databases
Able is a modern Java web development stack
Mirror of Google Closure Templates (Soy) w/ Maven support
Sitebricks: A fast, light platform for web development.
Last release was almost a year ago. We've been running off a fork of 0.12-SNAPSHOT, but all our contributions are merged and I'd love to depend on a regular 1.13 release :)
created time in 5 days
Currently we're using the distributed configuration feature to keep our database password and OAuth client secrets out of the config files. But the way the AWS Secrets Manager distributed config is written, the secret must be in a specific pattern, such as:
In other words, the current integration asks you to store the secrets (name + kv pairs) in a Micronaut-friendly way. What you're asking for, given the rigidity of RDS's password rotation and secret storage solution, is for Micronaut to adapt to it rather than the other way around.
I would very much like support for this, or something like this :)
comment created time in 3 months