Skip to content

Instantly share code, notes, and snippets.

Felix Sargent fsargent

Block or report user

Report or block fsargent

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile


  "actions": [
      "say": "Hello! Who would you like to call?"
      "listen": true
View generate_ld_secure_hash.js
const app = new (require('express'))();
const wt = require('webtask-tools');
const crypto = require('crypto');
// Be sure to specify your SDK key for your environment!
app.get('/', (req, res) => {
const hmac = crypto.createHmac('sha256', req.webtaskContext.secrets.LD_SDK_KEY);
req.user.ld_hash = hmac.digest('hex');
fsargent /
Last active Aug 23, 2019
JWT Validation with Auth0 and Kong

To get setup with Auth0 and Kong.

Kong is pretty cool. Auth0 is pretty cool. They should work together. This guide details the fastest way to get your APIs protected using JWT tokens issued by Auth0.


  • Create a Auth0 account. Account name is referred to "COMPANYNAME" for the sake of the guide.
  • Setup a Kong instance on your machine. This guide assumes a brand new blank instance.
  • Install httpie - a http command line utility built for humans (unlike curl).
fsargent /
Created Aug 13, 2014
Cut your Backlog

Cut your backlog.

Your backlog is too long. You know it, your team knows it. There are things in there from two years ago, collecting dust, feeling neglected. Issues that may or may not have been fixed, long forgotten festering in the unprioritized dungeon of your backlog. Delete them.

"As a database, I would like to support Acme Standard ZXY 2.17-3" No value, no stakeholder. What does ZXY 2.17-3 do? What does that even mean? Delete it.

Product Managers often use the Backlog as a notepad. A place to jot down tasks before they slip from consciousness into a vaguely nagging feeling of necessity as you grab a soda. Stop. Realize that every item in your backlog has to be sorted, and you are a human bubblesort - so inefficient your primary purpose is to show computer science students how not to sort lists. The fewer stories you have, the more meaningful they can be.


Keybase proof

I hereby claim:

  • I am fsargent on github.
  • I am fsargent ( on keybase.
  • I have a public key whose fingerprint is 98A8 104A C5FA C13C 44FE F469 C127 0AB7 79B9 942F

To claim this, I am signing this object:

View gist:8323367
# some more ls aliases
alias ll='ls -alF'
alias la='ls -A'
alias l='ls -CF'
# enable color support of ls and also add handy aliases
if [ -x /usr/bin/dircolors ]; then
test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)"
alias ls='ls --color=auto'
#alias dir='dir --color=auto'
#alias vdir='vdir --color=auto'
View gist:7014466
$ middleman build
create build/apple-touch-icon-precomposed.png
create build/img/logo.png
create build/img/social-sa760cfa992.png
create build/img/cards/card1.png
create build/img/cards/card5.png
create build/img/social/blog.png
create build/img/social/facebook.png
create build/img/social/twitter.png
create build/img/cards/card2.png
View gist:2364492
C:\NS2>Server.exe -map ns2_tram -limit 8 -lan false
Changing setting 'lanGame' to: 'false'...
Changing setting 'mapName' to: 'ns2_tram'...
Changing setting 'playerLimit' to: '8'...
Press Tab to open the console window
Press Ctrl-C to exit
Build 204
Starting Natural Selection 2
You can’t perform that action at this time.