If you’re building a large enterprise application or a one that is publicly available you may want to introduce a concept of users, so that they will be able login to their accounts, put their information and do some stuff with your app, if they’re allowed to. With this blog post I would like to show how it could be implemented in Angular application using OAuth 2.0 and OpenID Connect frameworks an integrate it with a popular, open source identity provider — Keycloak.

Photo by Kelly Sikkema on Unsplash

This is a fourth and the last part of my series on OAuth 2.0. If you’re not…

Would you like to know some basic concepts of Spring Security that can be implemented in a modern, micorservice application? If so this article is for you! In it I’ll guide you how to add step-by-step OAuth 2.0 access token validation to REST API endpoints of your Spring Boot application.

Photo by Lucas Gallone on Unsplash

This is part 3 of my series on OAuth 2.0 in which I’m describing how OAuth 2.0 works and give an example implementations of key actors. If you’re looking for theoretical introduction to it, go check my first blog post — Introduction to OAuth 2.0.

In a second article of…

If you want to know how to set up and configure Keycloak as an authorization server (for OAuth 2.0 framework) with Docker this article is for you.

Photo by Bradford Nicolas on Unsplash

This blog post is a second part of my series on OAuth 2.0 framework. In previous article I’ve briefly described what OAuth 2.0 is, so if you’re not familiar with it I would advise to check it first, before diving into Keycloak setup.

My previous article was very theoretical, but this time it will change. This one and two upcoming are more practical because we will build a small project in which we…

Authorization framework — OAuth 2.0 — is a very popular nowadays. With this blog post I try to explain how it works and its basic concepts so in following article I could show how to implement it in a full stack app.

Photo by Franck on Unsplash

Love it or hate it. No matter how to you feel about security, it plays an important role in any application. As developers we usually focus on bringing new features that users wants, or trying out new tools rather than thinking of security. …

This blog post is all about introduction to another, very popular test framework used in Java ecosystem. I would like to share with you how combination of almost natural Groovy language and cool Spock test framework could bring joy while writing tests.

Photo by Lucas Sankey on Unsplash

Writing tests might be hard. There are several reasons why it could be. Maybe a person who is writing them lacks experience. Maybe a code base is written in a way that it is almost impossible to test it. Or developer thinks that writing them takes more time than coding real implementation.

Today I want to share with…

Nowadays Kubernetes is one of the most popular tool which is used to build large, distributed system in the cloud. Many companies decide to use it in their new projects or are migrating already existing one. Despite of that, if you still don’t know what Kubernetes is, this blog post is definitely for you.

Photo by Manuel Nägeli on Unsplash

Let’s imagine that we know use a time machine and go back in time to 2000s (to help you with that, try to remind what music band you’ve listened then or what clothes you’ve been wearing). We’re working in a big company, in a software development…

Ever wonder how to prepare nice looking test execution report with videos in Cypress? If so this blog post is for you! I will explain how to step-by-step configure Cypress project to generate beautiful HTML report and how to automatically publish it on GitHub Pages using GitHub Actions.

Photo by Osman Rana on Unsplash

Cypress is one of the most popular test automation framework nowadays. It’s open source, easy to learn and has lots of nice features that can accelerate your testing.

But it’s not what I would like to talk about today. I would like to show how to set up Cypress project so that…

How you can write your application accordingly to Ports & Adapters (aka Hexagonal) architecture and why you should give it a try.

Photo by Bonniebel B on Unsplash


Let’s assume that you’re a freshman at university and you’ve just got first internship in a software engineer company. Or maybe you’re more experience developer who have joined a new company. It doesn’t matter.

Following story is written from the perspective of a newcomer, who makes her/his first steps into new project. Probably it’s a very common for you and I would like to introduce you in this as a way into the Ports & Adapters architecture pattern.

Have you ever wonder how to achieve fully Infrastructure as a Code approach for deployment of your applications on Kubernetes cluster? No matter if you’ve already achieve it or just started to looking for the best tool, helmfile might be the answer for you. In this blog post I’ll present how you can set up your first helmfile.

Photo by Kevin Ku on Unsplash

This post is a third, and the last, from my series on Kubernetes. In each one of them I present how to deploy applications on a Kubernetes cluster using one of the approaches:

In this blog post I present step-by-step how to deploy multiple applications on Kubernetes cluster using Helm.

Photo by Andrew Neel on Unsplash

This is a second part of my series on Kubernetes. It compares three approaches of deploying applications:

If you haven’t read it first one, I would advise to do that and then go back to this post. …

Wojciech Krzywiec

Java Software Developer, DevOps newbie, constant learner, podcast enthusiast.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store