dyld: Library not loaded: /usr/local/opt/readline/lib/libreadline.6.dylib Referenced from: /Users/sebas/.phpbrew/php/php-7.0.9/bin/php Reason: image not found Abort trap: 6
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ ssh-add -D #remove existing identities | |
$ ssh-agent #copy the lines & run them | |
$ ssh-add #uses the output from above |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ -r /etc/bashrc ] && source /etc/bashrc | |
[ -r /etc/bash_completion ] && source /etc/bash_completion | |
[ -r ~/.git-completion.bash ] && source ~/.git-completion.bash | |
[ -r ~/.git-prompt.sh ] && source ~/.git-prompt.sh | |
[ -r /usr/local/rvm/scripts/rvm ] && source /usr/local/rvm/scripts/rvm | |
__has_parent_dir () { | |
# Utility function so we can test for things like .git/.hg without firing up a | |
# separate process | |
test -d "$1" && return 0; |
I hereby claim:
- I am sebacruz on github.
- I am cruz (https://keybase.io/cruz) on keybase.
- I have a public key ASCNw37TXnd-e5E54mrLFFfE_2s88iClIl73PQjSP42M5go
To claim this, I am signing this object:
https://github.com/djvirgen/virgen-acl Simple and elegant, create your own checks. No middleware?
https://github.com/OptimalBits/node_acl Use as middleware, create your own roles and access. Great choice.
https://github.com/tschaub/authorized Similar to connect roles... but a bit more robust? you can create roles and action, and associate many roles with that action
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
class ColorGenerator { | |
private static $startColor; | |
private static $endColor; | |
private static $steps; | |
private static $colors; | |
private static function interpolate( |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ... | |
namespace :deploy do | |
task :upload_assets, :roles => :web do | |
capifony_pretty_print "--> Uploading compiled assets" | |
run_locally "gulp build --production --disable-fail" | |
run "mkdir -p #{release_path}/#{assets_folder}" | |
top.upload assets_folder, "#{release_path}/#{web_path}".to_s, {:via => :scp, :recursive => true} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* Convert a comma separated file into an associated array. | |
* The first row should contain the array keys. | |
* | |
* Example: | |
* | |
* @param string $filename Path to the CSV file | |
* @param string $delimiter The separator used in the file | |
* @return array |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
function parse_signed_request($signed_request) { | |
list($encoded_sig, $payload) = explode('.', $signed_request, 2); | |
// decode the data | |
$sig = base64_url_decode($encoded_sig); | |
$data = json_decode(base64_url_decode($payload), TRUE); | |
// confirm the signature | |
$expected_sig = hash_hmac('sha256', $payload, $secret, $raw = TRUE); |