My Profile Photo

Cory Kelly


CoryPlusPlus - Cory with classes


A blog documenting solutions to some interesting problems


  1. Certificates


  2. Integrate Spring Boot with Aws Parameter Store

    If you are looking for a centralized configuration solution for your distributed system, then look no further! Amazon System Manager’s Parameter Store is here to save the day. …


  3. How to build a jar from third party jars

    Have you ever been given an “api” but instead of having everything packaged into a single jar, you were give 20 different jar files and expected to integrate those into your system? …


  4. Foreign Key on Non Primary Column

    Recently I encountered an exception that was thrown in our production environment when creating a new foriegn key constraint using liquibase on a mysql db. I was perplexed because the upgrade was successful in both our development and staging environments. After debugging to make sure the database settings were the same in production (verify column types were the same, verify that the database engine the same on all columns) …


  5. Read File From S3

    Recently I spent the better part of 8 hours trying to read a file from s3 and send the byte array contents to our UI for consumption and display. …


  6. SLF4J vs Log4j

    During a recent refactor of a relatively large code base, I found myself in logging hell. There were multiple log implementations and jar files on the classpath being imported from many different maven dependencies. That coupled with my lack of full comprehension on logger implementations made the task very difficult for me. This post will hopefully save you some time and headache. …


  7. IdP Initiated SSO

    Recently I was tasked with allowing our existing customers to navigate to a third party website after login with our system. It was obvious that the solution would implement SAML, but I started work on this task with no previous information/experience with SAML. …


  8. Java Mutual Authentication

    Recently I had the opportunity to implement 2 way authentication between a java server and third party. This post will document the steps necessary to implement two way authentication when your java server is acting as the “client”. …


  9. When You Finally Realize the Power of a Well Designed Interface

    Coming Soon. …


  10. Know The Difference Between A Hard Problem and a Bad Design

    Coming Soon. …