My tools radar
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // Unfortunately there's no global unhandledResolve handler :-( | |
| process.on('unhandledRejection', error => { | |
| console.error('unhandledRejection', error); | |
| throw new Error('unhandledRejection' + error); | |
| }); | |
| beforeEach(() => expect.hasAssertions()); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env sh | |
| # On Amazon Linux | |
| sudo yum groupinstall 'development tools' | |
| sudo yum install gmp-devel zlib-devel | |
| # Everywhere | |
| curl -sSL https://get.haskellstack.org/ | sh | |
| stack config set system-ghc --global true |
I hereby claim:
- I am pokle on github.
- I am poklet (https://keybase.io/poklet) on keybase.
- I have a public key ASASDjK9RkNJYIwYJwMonYejDqhbWHNl-wcupbDO_lnAsgo
To claim this, I am signing this object:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env stack | |
| -- stack --resolver lts-9.2 script | |
| main = putStrLn "Hello" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // Try this with: seq 1 10 | node ndjson.js | |
| // Don't forget to npm install ndjson | |
| const ndjson = require('ndjson') | |
| const parser = ndjson.parse(); | |
| const printer = ndjson.serialize(); | |
| printer.pipe(process.stdout); | |
| process.stdin |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| TS = $(shell date) | |
| # TS := $(shell date) | |
| a: b | |
| @sleep 1 | |
| @echo $(TS) | |
| touch a | |
| b: c |
- React
- Clojure (for the backend)
- Firebase (Great for quick web prototypes and large web scale apps)
- Cassandra (but will I ever host my own cluster again?)
- JVM
- Cloudformation (Yes, the syntax is annoying, but it's nice being able to delete an entire formation of AWS services off in one hit)
(I have had minimal or no experience with these - they sound like a cool idea)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| # | |
| # Based on http://stackoverflow.com/questions/9112979/pipe-stdout-and-stderr-to-two-different-processes-in-shell-script | |
| set -e | |
| function indented() { | |
| echo RUnNINg: $@ | |
| (set -o pipefail; { "$@" 2>&3 | sed >&2 's/^/ | /'; } 3>&1 1>&2 | perl -pe 's/^(.*)$/\e[31m | $1\e[0m/') | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| KEYID=f0f2af05-6530-4dcf-a7ef-602f5bb8f642 | |
| echo hello hello > ExamplePlaintextFile | |
| aws kms encrypt --key-id f0f2af05-6530-4dcf-a7ef-602f5bb8f642 --plaintext fileb://ExamplePlaintextFile --output text --query CiphertextBlob | base64 --decode > ExampleEncryptedFile | |
| aws kms decrypt --ciphertext-blob fileb://ExampleEncryptedFile --output text --query Plaintext | base64 --decode |
NewerOlder