Skip to content

Instantly share code, notes, and snippets.

getPlaces: function(){
var _this = this;
var timeout = 0;
var index = 0;
loopRequest();
function loopRequest(){
// create request object
var request = {
@walkermalling
walkermalling / varnish-jsonp.vcl
Created March 7, 2016 18:41 — forked from simonw/varnish-jsonp.vcl
Get Varnish to handle JSON-P requests for you
backend default {
.host = "127.0.0.1";
.port = "8000";
}
# We go BACK to varnish to get it to generate an ESI template that
# generates a JSON-P response.
backend jsonp_template_backend {
.host = "127.0.0.1";
.port = "8070";
@walkermalling
walkermalling / next-npmls
Created October 26, 2016 05:05
output of npm ls for next.js deps (because it overruns the scroll limit on my terminal)
next@1.0.0 /Users/walkermalling/dev/eichs/node_modules/next
├─┬ babel-core@6.17.0
│ ├─┬ babel-code-frame@6.16.0
│ │ ├─┬ chalk@1.1.3
│ │ │ ├── ansi-styles@2.2.1
│ │ │ ├── escape-string-regexp@1.0.5
│ │ │ ├─┬ has-ansi@2.0.0
│ │ │ │ └── ansi-regex@2.0.0
│ │ │ └── supports-color@2.0.0
│ │ ├── esutils@2.0.2
@walkermalling
walkermalling / keybase.md
Created February 10, 2017 18:49
keybase proof

Keybase proof

I hereby claim:

  • I am walkermalling on github.
  • I am redcedar (https://keybase.io/redcedar) on keybase.
  • I have a public key ASCJol_87967TCNmF4CDlQrKo1KEnRM2Ya7G9PVtfHzcUgo

To claim this, I am signing this object:

@walkermalling
walkermalling / emacs.el
Created March 1, 2017 00:32
config emacs grep
(eval-after-load 'grep
'(progn
(add-to-list 'grep-files-aliases
'("js" . "*.js *.json"))
(add-to-list 'grep-files-aliases
'("hbs" . "*.hbs"))
(grep-apply-setting 'grep-command "grep -nrH")))
@walkermalling
walkermalling / fp-notes.org
Created June 2, 2017 05:09
Notes on Intro to Functional Programming

FP Study Group

Overview of Functional Programming

What Makes a Language “Functional”

Higher Order Functions

Purity

Immutable Data

Referential Transparency

Lazy Evaluation

Control of Side-Effects

@walkermalling
walkermalling / luks-encrypted-root-on-nixos.org
Last active April 7, 2024 22:29
Nix Setup with LUKS encrypted root

Setting up NixOs with LUKS encrypted root

Here are my working notes on getting a system up and running.

WARNING: You can run into a hidden problem that will prevent a correct partition setup and /etc/nixos/configuration.nix from working: if you are setting up a UEFI system, then you need to make sure you boot into the NixOS installation from the UEFI partition of the bootable media. You may have to enter your BIOS boot selection menu to verify this. For example, if you setup a NixOS installer image on a flash drive, your BIOS menu may display several boot options from that flash drive: choose the one explicitly labeled with “UEFI”.

References

I used these resources: