Dimas Maulana

Dimas Maulana

Developer

Welcome to my website! I am a developer with a current focus on React and Go. My experience encompasses both front-end and back-end development, enabling me to design and develop seamless and efficient applications.

Using Terminal Completion on ITerm2

iTerm2 is a popular terminal emulator for macOS that comes with a variety of features to enhance your command-line experience. One such feature is Terminal Completion, which allows you to quickly and efficiently complete commands, file paths, and more using keyboard shortcuts. In this article, we’ll explore how to use Terminal Completion in iTerm2 using the Cmd + ; shortcut.

What is Terminal Completion?

Terminal Completion, also known as tab completion, is a feature that helps you save time when typing commands in the terminal. It works by automatically suggesting and completing commands, file paths, directory names, and more as you type. This can be especially useful when working with long and complex commands or navigating through a directory structure with many nested folders.

Storing GIT Credentials Locally

When working with Git repositories, it’s often convenient to store your credentials locally to avoid repeatedly entering your username and password or personal access token. Git provides several methods for managing credentials, including caching and using credential helpers. Here, we’ll discuss how to store Git credentials locally on different operating systems and how to set a token for each project folder.

Storing Git Credentials Locally

On Linux

To store Git credentials locally on a Linux system, you can use the git config command with the credential.helper setting set to cache. This will cache your credentials for a specified period, typically 15 minutes, before requiring you to re-enter them.

Understanding Command Line Syntax

When working with command line interfaces (CLI), it’s essential to understand the syntax and formatting used to create and execute commands. The command line syntax can include special characters and conventions that dictate how commands should be structured and what elements are required or optional. Let’s break down the common command line syntax elements using examples from both a general explanation and a specific CLI usage sample.

Command Line Syntax Elements

Square Brackets [ ]

The square brackets ( [ ] ) in command line syntax indicate that the enclosed element, which can be a parameter, value, or information, is optional. Users have the choice to include one or more items within the square brackets or omit them entirely. It’s important not to type the square brackets themselves in the actual command line.

List SSH Config Host

In SSH configuration files, you can define multiple hosts with different settings. To list all the defined hosts in your SSH config file using the sed command, you can use the following command:

1
2
```bash
sed -n '/^#/!s/Host //p' ~/.ssh/config

Here's what this command does:

- `sed` is a stream editor for filtering and transforming text.
- `-n` tells `sed` to suppress automatic printing.
- `/^#/!s/Host //p` is a `sed` expression:
  - `/^#/` matches lines that start with `#`, which are comments in the SSH config file.
  - `!` negates the match, so it selects lines that do not start with `#`.
  - `s/Host //` replaces the word "Host" with an empty string, effectively removing it from the line.
  - `p` instructs `sed` to print the modified lines.

When you run this command, it will display a list of host names defined in your SSH config file, excluding any commented-out entries. This can be useful to quickly see the configured hosts on your system.

SSH Proxy Jump: Simplifying Secure SSH Connections

Secure Shell (SSH) is a widely-used protocol for securely connecting to remote servers over an untrusted network, such as the internet. SSH ensures the confidentiality and integrity of data exchanged between the client and server. However, managing SSH connections to servers with complex network configurations can be challenging. This is where SSH Proxy Jump, also known as SSH Jump Host or SSH Bastion Host, comes in handy.

SSH Proxy Jump allows you to connect to a target server through an intermediate server, known as a jump host or bastion host. This intermediate server acts as a gateway, helping you traverse complex network topologies while maintaining security. In this article, we’ll explore how to use SSH Proxy Jump both via the command line and through SSH configuration files.

Essential Vim Commands for Log Messages and Plugin Mapping Details

Vim is a powerful text editor that offers a wide range of features and commands to enhance your productivity. In this article, we will explore two essential Vim commands that will help you manage log messages and check mapping details with plugins.

1. Viewing Log Messages

In Vim, log messages can be useful for debugging or understanding the history of your editing session. To view all log messages, you can use the :messages command. Here’s how it works:

0%