This code snippet was extracted from an AWS Step Functions example.
It can ben found in the AWS Console for the Step Functions service.
Follow the instructions on this documentation page
Date: 2019-10-16
The code in this gist (async_lambda.py) is licensed under the following terms: | |
MIT License | |
Copyright (c) 2019 Renato Byrro | |
Permission is hereby granted, free of charge, to any person obtaining a copy | |
of this software and associated documentation files (the "Software"), to deal | |
in the Software without restriction, including without limitation the rights | |
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
This code snippet was extracted from an AWS Step Functions example.
It can ben found in the AWS Console for the Step Functions service.
Follow the instructions on this documentation page
Date: 2019-10-16
I start with a list and plan to create a comparison table.
http://www.w3.org/TR/WebCryptoAPI/
This specification describes a JavaScript API for performing basic cryptographic operations in web applications, such as hashing, signature generation and verification, and encryption and decryption. Additionally, it describes an API for applications to generate and/or manage the keying material necessary to perform these operations. Uses for this API range from user or service authentication, document or code signing, and the confidentiality and integrity of communications.
extends Node | |
func merge_array(array_1: Array, array_2: Array, deep_merge: bool = false) -> Array: | |
var new_array = array_1.duplicate(true) | |
var compare_array = new_array | |
var item_exists | |
if deep_merge: | |
compare_array = [] |
extends TextEdit | |
export var expand = true | |
export var min_line = 3 | |
export var max_line = 6 | |
var scroll_bar | |
var font = get_font("") | |
var line_spacing |
Copyright 2022 Renato Byrro | |
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: | |
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. | |
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. | |
3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. |