Skip to content

Instantly share code, notes, and snippets.

View kalepail's full-sized avatar
🦐
Work, and stuff will happen.

Tyler van der Hoeven kalepail

🦐
Work, and stuff will happen.
View GitHub Profile
@kalepail
kalepail / prompt-1.md
Created March 16, 2023 21:17
ChatGPT-4 WASM vs JS test

Creating a complete Rust-based WebAssembly app to calculate the nth prime number involves several steps. First, you'll need to create the Rust code for the prime number calculation, then compile it to WebAssembly, and finally, create an HTML file that uses the compiled WebAssembly module.

Install Rust and its WebAssembly target:

curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
rustup target add wasm32-unknown-unknown

Create a new Rust library:

@kalepail
kalepail / rollup.config.js
Last active December 16, 2021 17:26
txFunction-rollup.config.js
import resolve from '@rollup/plugin-node-resolve'
import babel from '@rollup/plugin-babel'
import { terser } from 'rollup-plugin-terser'
import cleaner from 'rollup-plugin-cleaner'
import multiInput from 'rollup-plugin-multi-input';
export default {
input: 'src/**/txFunction.js',
output: {
dir: 'dist',
@kalepail
kalepail / eval.js
Last active December 3, 2020 17:35
/* runkit-eval */
const { sum } = require('lodash')
try {
res.set('Content-Type', 'text/plain')
return JSON.stringify(
sum([5, 5])
)
@kalepail
kalepail / boilerplate-contract.js
Last active August 25, 2023 04:11
A really easy way to get started with smart contracts on Turing Sign Servers is to upload the code below changing the `hostname` to link to an endpoint where your actual contract logic lives. This allows you to change and modify your contract logic freely. Great for testing before locking in a more immutable contract state.
const { request } = require('https')
module.exports = (body) =>
new Promise((resolve, reject) => {
try {
body = JSON.stringify(body)
const options = {
hostname: 'contract-logic-endpoint.io', // runkit and glitch are my goto services
port: 443,
Fund Submissions Open Submissions Close / Panel Review Begins Panel Review Finishes / Community Discussion Begins Community Voting Opens Round Ends
Lab 1 2020-08-31 (3 weeks) 2020-09-21 (3 weeks) 2020-10-12 (2 weeks) 2020-10-26 (1 week) 2020-11-02
Seed 1 2020-08-31 (2 weeks) 2021-01-18 (8 weeks) 2021-03-15 (6 weeks) 2021-04-26 (2 weeks) 2021-05-10
Lab 2 2021-01-01 (3 weeks) 2021-01-25 (3 weeks) 2021-02-15 (2 weeks) 2021-03-01 (1 week) 2021-03-08
Lab 3 2021-04-05 (3 weeks) 2021-04-26 (3 weeks) 2021-05-17 (2 weeks) 2021-05-31 (1 week) 2021-06-07
Seed 2 2021-06-28 (2 weeks) 2021-07-12 (8 weeks) 2021-09-06 (6 weeks) 2021-10-18 (2 weeks) 2021-11-01
Lab 4 2021-07-05 (3 weeks) 2021-07-26 (3 weeks) 2021-08-16 (2 weeks) 2021-08-30 (1 week) 2021-09-06
Lab 5 2021-10-04 (3 weeks) 2021-10-25 (3 weeks) 2021-11-15 (2 weeks) 2021-09-29 (1 week) 2021-12-06
!function(e){var t={};function r(n){if(t[n])return t[n].exports;var o=t[n]={i:n,l:!1,exports:{}};return e[n].call(o.exports,o,o.exports,r),o.l=!0,o.exports}r.m=e,r.c=t,r.d=function(e,t,n){r.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:n})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,t){if(1&t&&(e=r(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var n=Object.create(null);if(r.r(n),Object.defineProperty(n,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var o in e)r.d(n,o,function(t){return e[t]}.bind(null,o));return n},r.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return r.d(t,"a",t),t},r.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},r.p="",r(r.s=492)}([function(e,t,r){"use strict";r.r(t),r.d(t,"__extends",(function(){return o})),r.d(t,"__assign",(function(){ret
Verifying my Blockstack ID is secured with the address 1Jkhv6Ckaq3H3rX42axojWwfPxkJihDFrr https://explorer.blockstack.org/address/1Jkhv6Ckaq3H3rX42axojWwfPxkJihDFrr

Keybase proof

I hereby claim:

  • I am tyvdh on github.
  • I am tyvdh (https://keybase.io/tyvdh) on keybase.
  • I have a public key ASDmNsybRlUSADtXQziIoNC7Wy-uRyZc50ZPglrpY8xNZQo

To claim this, I am signing this object:

openssl req -x509 -out cert.pem -keyout key.pem \
-newkey rsa:2048 -nodes -sha256 \
-subj '/CN=localhost' -extensions EXT -config <( \
printf "[dn]\nCN=localhost\n[req]\ndistinguished_name = dn\n[EXT]\nsubjectAltName=DNS:localhost\nkeyUsage=digitalSignature\nextendedKeyUsage=serverAuth")
// After running this place the cert.pem in your SYSTEM keys in Keychain Access
// Once added be sure and trust that cert for use from Keychain Access as well
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width">
<title>JS Bin</title>
</head>
<body>
<script src="https://cdn.jsdelivr.net/lodash/4/lodash.min.js"></script>