Geek Logbook

Tech sea log book

Automating OAuth 2.0 in Postman: storing and refreshing access tokens without copy-paste

Introduction When working with APIs protected by OAuth 2.0, Postman is commonly used for development and testing. A frequent pain point is manual token handling: requesting an access token, copying it, pasting it into headers, and repeating the process every time it expires.This article explains how to fully automate OAuth 2.0 token management in Postman,

How to Keep a Docker Container Running Persistently

When working with Docker, you may have noticed that some containers stop as soon as you exit the shell. This is because Docker considers the container’s main process to have finished. In this post, we will explain why this happens and how to keep your container running persistently, so you can reconnect whenever you need.

Fixing Cursor Login Issues on Linux (AppImage)

When running Cursor on Linux, especially with the AppImage version, you might encounter a situation where you can’t log in. This usually happens because Cursor stores its session state locally, and sometimes that state gets corrupted. In this article, we’ll walk through how to diagnose the issue and reset your session state without losing your

Resolving ‘index.lock’ Issue in Git

When working with Git, you may encounter an error preventing you from switching branches or performing other operations. A common issue is the following: This typically happens when another Git process is running or if a previous operation was interrupted, leaving a stale index.lock file. How to Fix the ‘index.lock’ Error 1. Check for Running

How to Rename a Git Branch Locally and Remotely

Renaming Git branches can be necessary when adhering to naming conventions or correcting errors. This guide will walk you through the process of renaming a branch locally and remotely. Scenario: You accidentally pushed a branch named old-branch-name to the remote repository but realize it should follow the convention feature/new-branch-name. Steps to Rename the Branch 1.

Route Summarization and Subnetting

We will walk through the process of subnetting a network and performing route summarization using an example. Subnetting Example Let’s consider the following four subnets: Binary Representation To better understand these subnets, let’s convert the IP addresses to their binary form: Common Bits With a subnet mask of /22, we need to consider the first

SODA: SSL: CERTIFICATE_VERIFY_FAILED – Solved

When you tried to connect to soda it is possible you find this error: SSL: CERTIFICATE_VERIFY_FAILED. All the message look like similar to this one: This happens because there is a conflict between the permissions your machine have to connect to other places in the network and the usage statistics that SODA does. In fact,

SODA: Connect SQL Server without Password

When you do your first steps using soda, it is possible you want to connect to an SQL Server database. In that case you can create an specific user and give him the proper rights I wrote about that in the following post: Connect Soda to SQL Server. But, Is it possible to use the