Skip to content

Instantly share code, notes, and snippets.

View dydx's full-sized avatar
🎯
Focusing

Josh Sandlin dydx

🎯
Focusing
View GitHub Profile
❯ docker run -it ruby:alpine /bin/sh
/ # apk add build-base
fetch http://dl-cdn.alpinelinux.org/alpine/v3.10/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/v3.10/community/x86_64/APKINDEX.tar.gz
(1/15) Installing binutils (2.32-r0)
(2/15) Installing libmagic (5.37-r1)
(3/15) Installing file (5.37-r1)
(4/15) Installing isl (0.18-r0)
(5/15) Installing libgomp (8.3.0-r0)
(6/15) Installing libatomic (8.3.0-r0)
### Keybase proof
I hereby claim:
* I am dydx on github.
* I am jpsandlin (https://keybase.io/jpsandlin) on keybase.
* I have a public key ASDMPl37aLQF-PzznNDYPkNOysDEfohlOvVER1HQi6f3ago
To claim this, I am signing this object:
kill $(ps aux | grep ruby | awk '{ print $2 }')
<?php
namespace App\Http\Controllers;
use Illuminate\Http\Request;
use App\Todo;
class TodosController extends Controller
{
@dydx
dydx / .vimrc
Last active January 31, 2018 18:23
" LAUNCH CONFIG
execute pathogen#infect()
" EDIT VIMRC
nmap ,ev :tabedit $MYVIMRC<cr>
" Auto Commands
augroup autosourcing
autocmd!
autocmd BufWritePost .vimrc source %
jQuery.globalEval((jQuery.proxy()+jQuery.parseHTML()[(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+([jQuery.isPlainObject()]+jQuery.proxy())[+!+jQuery.parseHTML()+[+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]])[!+jQuery.parseHTML()+!+jQuery.parseHTML()+[!+jQuery.parseHTML()+!+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+(jQuery.proxy()+jQuery.parseHTML())[+jQuery.parseHTML()]+(jQuery.proxy()+jQuery.parseHTML())[+!+jQuery.parseHTML()]+(jQuery.parseHTML()[(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+([jQuery.isPlainObject()]+jQuery.proxy())[+!+jQuery.parseHTML()+[+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]]+jQuery.parseHTML())[!+jQuery
" LAUNCH CONFIG
execute pathogen#infect()
" EDIT VIMRC
nmap ,ev :tabedit $MYVIMRC<cr>
" Auto Commands
augroup autosourcing
autocmd!
autocmd BufWritePost .vimrc source %
Mockery\Exception\NoMatchingExpectationException: No matching handler found for Mockery_0_Illuminate_Cache_CacheManager::get("key", 60, object(Closure)). Either the method was unexpected or its arguments matched no expected argument list for this method
'use strict';
var ffmpeg = require('fluent-ffmpeg');
var fs = require('fs');
var config = {
input: 'files',
output: 'files/encoded'
}
'use strict';
module.exports = (model) => {
/**
* @verb: GET
* @method: index
*
* Renders a list of all users
*/
const index = (req, res, next) =>