David Vassallo's Blog

If at first you don't succeed; call it version 1.0

Nugget post : using Angular JS with Mustache Templating

In a recent consolidation exersize, 6PM has decided to follow the design trend of using Google’s Material Design in it’s front-ends, and we now encourage the use of Angular JS to power these front-ends. It would seem that Angular Material (https://material.angularjs.org/latest/) is a perfect fit for this type of scenario. In many respects, it is… extremely well documented and with working code snippets, generating Material websites using familiar Angular JS directives.

However, being a complete design n00b, I quickly started hunting for Material templates that I could use, and hopefully plug in Angular Material without too much hassle. Google MDL to the rescue: Google Material Design Lite (https://www.getmdl.io/) is a fantastic and easy to use framework that let’s you get started with Material websites extremely quickly. Simple websites become really easy to build, especially with common operations like alerts, modals, cards (and not-so-common like android style toasts and snackbars!!) baked into the framework.

Since MDL doesn’t depend on any javascript frameworks, it’s very easy to simply drop in Angular Material, which I did do in some situations where MDL was unweildy (like popup menus). It’s brilliant to be able to mix and match where required.

That said, I did not want to depend on Angular JS completely, especially when it comes to building long lists of objects. Angular’s ng-repeat is notoriously slow when it comes to iterating over large lists [1]. One way of tacking this if you have predominantly static content is to render as much of the HTML page on the server. Doing this easily is where a templating engine comes in. MEAN stack developers are probably familiar with the Jade templating engine – however I am a big fan of the Moustache engine, I find it much more natural to embed logic into the HTML page – PHP / ERB style (https://mustache.github.io/).

Integrating Mustache into the MEAN stack is straightforward using “moustache-express” (https://www.npmjs.com/package/mustache-express)m and having something like the following in your package.json file:

"dependencies": {
"express": "~4.13.4",

However, we end up with our pages not rendering correctly. It seems like Angular JS is “switched off” as soon as we add mustache-express. This is because moustache by default uses the same delimeters as Angular uses for it’s variables – i.e. “{{” and “}}”. The solution to this is to change the delimeter used by moustache, by adding the following to the very beginning of your HTML files:

<!doctype html>
<!-- change default mustache delimiter so as not to interfere with angular-->
{{=<< >>=}}

Now we can use ERB-style delimeters to control Mustache, such as:

<title><< title >></title>

The <<title>> is now a mustache variable, which we can populate via Express by using something like:

res.render('index',  {title: 'My Demo Title'});

Resulting in:

<title> My Demo Title </title>

Since moustache supports conditionals and loops, it allows the server to pre-render the HTML page, avoiding having Angular’s ng-repeat having to do all the work (assuming you dont need to attach Angular watches to all the items in your list…)

PS – for some reason using ERB style delimiters (“<% %>”) didn’t work with mustache…. “<<” and “>>” work fine though…


[1] http://stackoverflow.com/questions/17348058/how-to-improve-performance-of-ngrepeat-over-a-huge-dataset-angular-js

Using Let’s Encrypt manual mode

Let’s Encrypt is a service sponsored by web giants such as Facebook, Google Chrome, and Cisco (https://letsencrypt.org/). Let’s Encrypt has recently gone into public beta and is extremely easy to use. It has some modules already built in to integrate directly with popular webservers like Apache. In my case, I had two use cases where I needed to use manual mode – Installing the certificate on a Citrix Netscaler and on an NGINX reverse proxy. This necessitates using let’s encrypt in manual, standalone mode, which is still very easy to use. First, make sure you have the following requirements installed (I was using a linux machine):

  • Git client
  • Python 2.7

The process from here is very simple:

  1. Install letsencrypt-auto (the command line client for let’s encrypt) by using the git clone command as specified here: https://letsencrypt.readthedocs.org/en/latest/intro.html#about-the-let-s-encrypt-client
  2. Cd into the “letsencrypt” folder and run the following command:
    ./letsencrypt-auto certonly --manual

This will set off a text based wizard which will guide you through the process. It will first ask for the domain you wish to encrypt:

dvas0004@dvas0004-HP-ProBook-450-G2: ~-letsencrypt_349

Next, it will give instructions on how to write a simple script that will run a simple python-based webserver. The purpose of this is so that the let’s encrypt system can verify that you do really own the servers that respond to the domain just entered. As you can see from the code below, this simply creates a randomly generated filename under the url “http://your-domain.com/.well-known/acme-challenge&#8221;

dvas0004@dvas0004-HP-ProBook-450-G2: ~-letsencrypt_350

Pretty simple and elegant. You run the above command on your webserver – so obviously make sure your DNS hosts and NAT forwarding is setup correctly. You do not necessarily have to run the python webserver, if another webserver like IIS is already setup, you can manually copy/paste the contents into the file in the .well-known/acme-challenge folder.

PS, another tip that will avoid you thinking you went crazy, when importing the certificates into Netscaler, it wont recognize the private key without some OpenSSL magic. First off, to install the certificate, I used: Traffic Management > SSL > Certificates


And click the “install” button. From here you can upload the “fullcertchain.pem” and “privkey.pem” files, however, first please transform the privkey.pem file using the following:

All that said, it took 2 minutes to generate a free, 90 day SSL certificate… much easier, cheaper, and trustworthy than the normal SSL providers in my opinion… Kudos to Let’s Encrypt!!

Get every new post delivered to your Inbox.

Join 261 other followers