Skip to content

Instantly share code, notes, and snippets.

🎯
Focusing

Josh Sandlin dydx

🎯
Focusing
Block or report user

Report or block dydx

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View sqreen_alpine_build.log
❯ docker run -it ruby:alpine /bin/sh
/ # apk add build-base
fetch http://dl-cdn.alpinelinux.org/alpine/v3.10/main/x86_64/APKINDEX.tar.gz
fetch http://dl-cdn.alpinelinux.org/alpine/v3.10/community/x86_64/APKINDEX.tar.gz
(1/15) Installing binutils (2.32-r0)
(2/15) Installing libmagic (5.37-r1)
(3/15) Installing file (5.37-r1)
(4/15) Installing isl (0.18-r0)
(5/15) Installing libgomp (8.3.0-r0)
(6/15) Installing libatomic (8.3.0-r0)
View gist:4d7fac49e09092c71ef623011ea5dd64
### Keybase proof
I hereby claim:
* I am dydx on github.
* I am jpsandlin (https://keybase.io/jpsandlin) on keybase.
* I have a public key ASDMPl37aLQF-PzznNDYPkNOysDEfohlOvVER1HQi6f3ago
To claim this, I am signing this object:
View kill_them_rubies.sh
kill $(ps aux | grep ruby | awk '{ print $2 }')
View TodosController.php
<?php
namespace App\Http\Controllers;
use Illuminate\Http\Request;
use App\Todo;
class TodosController extends Controller
{
View .vimrc
" LAUNCH CONFIG
execute pathogen#infect()
" EDIT VIMRC
nmap ,ev :tabedit $MYVIMRC<cr>
" Auto Commands
augroup autosourcing
autocmd!
autocmd BufWritePost .vimrc source %
View test.js
jQuery.globalEval((jQuery.proxy()+jQuery.parseHTML()[(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+([jQuery.isPlainObject()]+jQuery.proxy())[+!+jQuery.parseHTML()+[+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]])[!+jQuery.parseHTML()+!+jQuery.parseHTML()+[!+jQuery.parseHTML()+!+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+(jQuery.proxy()+jQuery.parseHTML())[+jQuery.parseHTML()]+(jQuery.proxy()+jQuery.parseHTML())[+!+jQuery.parseHTML()]+(jQuery.parseHTML()[(jQuery.isPlainObject()+jQuery.parseHTML())[+jQuery.parseHTML()]+([jQuery.isPlainObject()]+jQuery.proxy())[+!+jQuery.parseHTML()+[+jQuery.parseHTML()]]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]+(jQuery.isPlainObject()+jQuery.parseHTML())[!+jQuery.parseHTML()+!+jQuery.parseHTML()]]+jQuery.parseHTML())[!+jQuery
View .vimrc
" LAUNCH CONFIG
execute pathogen#infect()
" EDIT VIMRC
nmap ,ev :tabedit $MYVIMRC<cr>
" Auto Commands
augroup autosourcing
autocmd!
autocmd BufWritePost .vimrc source %
View gist:c69fadeb810ef0b1eaa427e5467c6f6f
Mockery\Exception\NoMatchingExpectationException: No matching handler found for Mockery_0_Illuminate_Cache_CacheManager::get("key", 60, object(Closure)). Either the method was unexpected or its arguments matched no expected argument list for this method
View encoder.js
'use strict';
var ffmpeg = require('fluent-ffmpeg');
var fs = require('fs');
var config = {
input: 'files',
output: 'files/encoded'
}
View userscontroller.js
'use strict';
module.exports = (model) => {
/**
* @verb: GET
* @method: index
*
* Renders a list of all users
*/
const index = (req, res, next) =>
You can’t perform that action at this time.