Take a look at the comments and code in update.sh
.
Requires a working version of Java 1.8.
I use create_tarball.sh
to make a copy of the build to share.
OpenJDK 1.7 builds for Mac OS X:
ALPHABET = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" | |
def base62_encode(num, alphabet=ALPHABET) | |
return alphabet[0] if num == 0 | |
arr = [] | |
base = alphabet.size | |
while num > 0 do | |
rem = num % base | |
num = num / base | |
arr << alphabet[rem] |
require 'benchmark' | |
require 'time' | |
string = "2010-11-10 23:00:00 UTC" | |
n = 100_000 | |
(ARGV[0] || 5).to_i.times do | |
Benchmark.bm(20) do |b| | |
b.report 'Time.parse' do | |
n.times do |
Originally: | |
https://gist.github.com/7565976a89d5da1511ce | |
Hi Donald (and Martin), | |
Thanks for pinging me; it's nice to know Typesafe is keeping tabs on this, and I | |
appreciate the tone. This is a Yegge-long response, but given that you and | |
Martin are the two people best-situated to do anything about this, I'd rather | |
err on the side of giving you too much to think about. I realize I'm being very | |
critical of something in which you've invested a great deal (both financially |
# Java's JCE requires extra JVM config download named Jurisdiction Policy Files where AES keysize > 128bit. | |
# You can do encrypt/decrypt using BouncyCastle via JRuby's Java integration like this. | |
# Use this at your own risk. | |
require 'java' | |
require 'openssl' | |
java_import 'org.bouncycastle.crypto.BlockCipher' | |
java_import 'org.bouncycastle.crypto.engines.AESLightEngine' | |
java_import 'org.bouncycastle.crypto.modes.CBCBlockCipher' |
require 'rubygems' | |
require 'mechanize' | |
require 'httparty' | |
# Ugly code, for an ugly hack. | |
# Hey, if Lighthouse didn't suck then none of this would happen. | |
# It's been lotsa fun coding it though, so I suppose I should be thankful for the "opportunity" |