Skip to content

Instantly share code, notes, and snippets.

View sodiumjoe's full-sized avatar
💭
probably playing Zelda with the kids

Joe Moon sodiumjoe

💭
probably playing Zelda with the kids
View GitHub Profile
~ ➤ curl https://feeds.megaphone.fm/HSW9972842155 -vvv 15:18:21
* Trying 69.16.175.42:443...
* Connected to feeds.megaphone.fm (69.16.175.42) port 443 (#0)
* ALPN, offering http/1.1
* TLS 1.2 connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* ALPN, server did not agree to a protocol
* Server certificate: *.megaphone.fm
* Server certificate: Sectigo RSA Domain Validation Secure Server CA
* Server certificate: USERTrust RSA Certification Authority

Keybase proof

I hereby claim:

  • I am sodiumjoe on github.
  • I am sodiumjoe (https://keybase.io/sodiumjoe) on keybase.
  • I have a public key ASCAUFW71ObKqi9PrxMx0IJ14xQyZW8tqTq9jLmXvG1GOQo

To claim this, I am signing this object:

Keybase proof

I hereby claim:

  • I am sodiumjoe on github.
  • I am sodiumjoe (https://keybase.io/sodiumjoe) on keybase.
  • I have a public key whose fingerprint is CF16 E0EB BAD5 2C0B ACA5 E754 FD56 3E29 AD62 449C

To claim this, I am signing this object:

extern crate reqwest;
fn main() {
foo(String::from("foo"));
}
fn foo(s: String) -> Result<(), ()> {
let _ = reqwest::multipart::Part::reader(s.as_bytes());
Ok(())
}
pub fn fetch(self) -> impl Future<Item = Data, Error = Error> {
let req = Request::get(self.uri)
.body(Body::empty())
.unwrap();
let https = HttpsConnector::new(4).expect("tls initialization error");
let client = Client::builder().build::<_, Body>(https);
client
.request(req)
2018-03-14 22:35:02,279 [DEBUG @ msgpack_stream.py:send:34] 84790 - sent [0, 1, b'vim_get_api_info', ()]
2018-03-14 22:35:02,279 [DEBUG @ base.py:send:117] 84790 - Sending 'b'\x94\x00\x01\xb0vim_get_api_info\x90''
2018-03-14 22:35:02,279 [DEBUG @ base.py:run:142] 84790 - Entering event loop
2018-03-14 22:35:02,280 [DEBUG @ msgpack_stream.py:_on_data:59] 84790 - waiting for message...
2018-03-14 22:35:02,280 [DEBUG @ msgpack_stream.py:_on_data:61] 84790 - received message: [0, 1, b'poll', []]
2018-03-14 22:35:02,280 [DEBUG @ async_session.py:_on_request:91] 84790 - received request: b'poll', []
2018-03-14 22:35:02,280 [DEBUG @ msgpack_stream.py:_on_data:59] 84790 - waiting for message...
2018-03-14 22:35:02,280 [DEBUG @ msgpack_stream.py:_on_data:64] 84790 - unpacker needs more data...
2018-03-14 22:35:02,281 [DEBUG @ msgpack_stream.py:_on_data:59] 84790 - waiting for message...
2018-03-14 22:35:02,281 [DEBUG @ msgpack_stream.py:_on_data:64] 84790 - unpacker needs more data...
/*
* Current pattern in console code
* does not leverage the power of promises
* may as well use callbacks
*/
var _val1;
var _val2;
function apiCall() {

Keybase proof

I hereby claim:

  • I am joebadmo on github.
  • I am joebadmo (https://keybase.io/joebadmo) on keybase.
  • I have a public key whose fingerprint is E1B1 EE05 37A4 4BE8 F921 B646 2949 C5C2 C72F A6CE

To claim this, I am signing this object:

<textarea rows='20' className='form-control' value={value} onChange={this.handleChange} />
<textarea
rows='20'
className='form-control'
value={value}
onChange={this.handleChange}
/>
<button
module.exports = {
provideAndSpy: function provideAndSpy($provide, spy, inj, name, methods) {
'use strict';
var mock = _(methods)
.map(function(method) { return [method, function() {
var key = [name, method].join('.');
return inj[key];
}]})