I hereby claim:
- I am pokle on github.
- I am poklet (https://keybase.io/poklet) on keybase.
- I have a public key ASASDjK9RkNJYIwYJwMonYejDqhbWHNl-wcupbDO_lnAsgo
To claim this, I am signing this object:
| // Unfortunately there's no global unhandledResolve handler :-( | |
| process.on('unhandledRejection', error => { | |
| console.error('unhandledRejection', error); | |
| throw new Error('unhandledRejection' + error); | |
| }); | |
| beforeEach(() => expect.hasAssertions()); |
| #!/usr/bin/env sh | |
| # On Amazon Linux | |
| sudo yum groupinstall 'development tools' | |
| sudo yum install gmp-devel zlib-devel | |
| # Everywhere | |
| curl -sSL https://get.haskellstack.org/ | sh | |
| stack config set system-ghc --global true |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env stack | |
| -- stack --resolver lts-9.2 script | |
| main = putStrLn "Hello" |
| // Try this with: seq 1 10 | node ndjson.js | |
| // Don't forget to npm install ndjson | |
| const ndjson = require('ndjson') | |
| const parser = ndjson.parse(); | |
| const printer = ndjson.serialize(); | |
| printer.pipe(process.stdout); | |
| process.stdin |
| TS = $(shell date) | |
| # TS := $(shell date) | |
| a: b | |
| @sleep 1 | |
| @echo $(TS) | |
| touch a | |
| b: c |
(I have had minimal or no experience with these - they sound like a cool idea)
| #!/usr/bin/env bash | |
| # | |
| # Based on http://stackoverflow.com/questions/9112979/pipe-stdout-and-stderr-to-two-different-processes-in-shell-script | |
| set -e | |
| function indented() { | |
| echo RUnNINg: $@ | |
| (set -o pipefail; { "$@" 2>&3 | sed >&2 's/^/ | /'; } 3>&1 1>&2 | perl -pe 's/^(.*)$/\e[31m | $1\e[0m/') | |
| } |
| #!/usr/bin/env bash | |
| KEYID=f0f2af05-6530-4dcf-a7ef-602f5bb8f642 | |
| echo hello hello > ExamplePlaintextFile | |
| aws kms encrypt --key-id f0f2af05-6530-4dcf-a7ef-602f5bb8f642 --plaintext fileb://ExamplePlaintextFile --output text --query CiphertextBlob | base64 --decode > ExampleEncryptedFile | |
| aws kms decrypt --ciphertext-blob fileb://ExampleEncryptedFile --output text --query Plaintext | base64 --decode |
| #!/usr/bin/env osascript | |
| tell application "Google Chrome" to reload active tab of window 1 |