RubyFlow The Ruby and Rails community linklog

×

The Ruby and Rails community linklog

Made a library? Written a blog post? Found a useful tutorial? Share it with the Ruby community here or just enjoy what everyone else has found!

Submit a post

You can use basic HTML markup (e.g. <a>) or Markdown.
Note that your post may be edited to suit the format of the site.

As you are not logged in, you will be
directed via GitHub to signup or sign in

Post Preview

Note: Only the first pargraph is shown on the front page and overly long paragraphs may be broken up.

Serialization by example

https://railsexamples.com/serializers-in-rails/ When building APIs with Ruby on Rails, serializers play a pivotal role in data transformation and presentation. They serve as the crucial intermediary between complex Ruby objects and the streamlined JSON that your API serves to clients. Let’s take deep dive -

Hi, there’s a gem called Alba (https://github.com/okuramasafumi/alba) that’s fa…

Best practices for Ruby on Rails data migrations

The blog post “Best Practices for Ruby on Rails Data Migrations” https://www.monterail.com/blog/best-practices-for-ruby-on-rails-data-migrations offers practical advice on handling data migrations in Ruby on Rails applications. It covers key strategies for ensuring smooth, reliable migrations, including techniques for minimizing downtime, managing large datasets, and maintaining data integrity. The post provides actionable tips and best practices to help developers execute migrations effectively while avoiding common pitfalls.

Grepfruit: Codebase Search with Regex

If you’ve been looking for a way to search your codebase with regex patterns, here it is: Grepfruit. Ideal for CI/CD pipelines and beyond, Grepfruit lets you search for, e.g., TODO comments, excluding files or directories, truncating the output, and providing colorized results for easy readability.

War Against Bots

War Against Bots is an article I wrote after I had launched www.whoishiring.jobs. I immediately got hit by form spam and automatic vulnerability scans. I investigated the problem and promptly employed a few simple defense mechanisms that reduced the incidence of these attacks to almost zero.

Loading older posts