Exactly that. It's not an arbitrary dated threshold that lead to "growing up". It was the event of having kids. I'm still able to look at my current life through the lenses of a 25 year old me and hell, that looks bleak. But I can say with confidence that I'm content. Of course there are little things here and there but mostly everything is fine.
I only wonder if there is going to be a next stage, the magical "midlife crisis", where I'm going to question all my decisions up to that point and I'm curious how I'm going to handle that.
Good luck managing the whole day-2 operations and the application layer on top of your VPS. You're just shuffling around your spending. For you it's not on compute anymore but manpower to manage that mess.
VPC peering becomes ugly fast, once your network architecture becomes more complex. Because transitive peering doesn't work you're building a mesh of networks.
> Meeting minutes - I have yet to see one that didn’t miss something important while creating a lot of junk that no one ever read.
Especially that one. In the beginning for very structured meetings with a low number of participants it seemed to be ok but once they got more crowded, maybe not all are native speakers and took longer than 30 minutes (like workshops) it went bad.
Not true. They can remove you from the company grounds and block access to all systems the moment you get fired or you hand in your resignation. But they have to pay you (if there is no "good reason" for firing you) for a varying amount of time (depending on your contract and some minimums by law).
Of course, most of the time, you can / need to stay at the company for that above mentioned varying amount of time.
Does anybody know something like Directus (building REST APIs on top of Postgres) with the ability to hook in custom authorization logic? (E.g. to do FGA checks before returning data)
But honestly, depending on the complexity of your logic you may not even need custom hooks. You can get really granular with the built-in access policies and permissions.
As long as you have relationships configured with the user collection you can reference those in your permissions.
Here's an example rule for accessing items within a `projects` table that hides any projects that don't belong to the current agency partner.
I wrote my own extension in version 9 some time ago where I used hooks to track changes and sync our Full-Text Search engine (Meilisearch). I just remembered some of the difficulties dealing with hooks, because their payload differed in structure depending on how data entries were mutated (update via Web-UI VS creation via API VS import via API /utils/import). Has that improved?
There are things like Tailscale that are free for private use and make managing / connecting to a VPN as easy as possible. The connection is only limited by your own home connection. You also don’t need to route all your traffic through it.
Put a reverse proxy in front of it for basic auth and path rewrite if you think that are the ultimate security mechanism for you (I don’t think so).
Personally I host all my applications behind a VPN because I don’t trust any software and don’t want to provide any attack surface or even the possibility to being made a possible target because someone scanned me.
This plus my own domain that points to the different local IP addresses makes it as convenient as surfing the public web.
I only wonder if there is going to be a next stage, the magical "midlife crisis", where I'm going to question all my decisions up to that point and I'm curious how I'm going to handle that.