hexsha stringlengths 40 40 | size int64 5 1.05M | ext stringclasses 588
values | lang stringclasses 305
values | max_stars_repo_path stringlengths 3 363 | max_stars_repo_name stringlengths 5 118 | max_stars_repo_head_hexsha stringlengths 40 40 | max_stars_repo_licenses listlengths 1 10 | max_stars_count float64 1 191k ⌀ | max_stars_repo_stars_event_min_datetime stringdate 2015-01-01 00:00:35 2022-03-31 23:43:49 ⌀ | max_stars_repo_stars_event_max_datetime stringdate 2015-01-01 12:37:38 2022-03-31 23:59:52 ⌀ | max_issues_repo_path stringlengths 3 363 | max_issues_repo_name stringlengths 5 118 | max_issues_repo_head_hexsha stringlengths 40 40 | max_issues_repo_licenses listlengths 1 10 | max_issues_count float64 1 134k ⌀ | max_issues_repo_issues_event_min_datetime stringlengths 24 24 ⌀ | max_issues_repo_issues_event_max_datetime stringlengths 24 24 ⌀ | max_forks_repo_path stringlengths 3 363 | max_forks_repo_name stringlengths 5 135 | max_forks_repo_head_hexsha stringlengths 40 40 | max_forks_repo_licenses listlengths 1 10 | max_forks_count float64 1 105k ⌀ | max_forks_repo_forks_event_min_datetime stringdate 2015-01-01 00:01:02 2022-03-31 23:27:27 ⌀ | max_forks_repo_forks_event_max_datetime stringdate 2015-01-03 08:55:07 2022-03-31 23:59:24 ⌀ | content stringlengths 5 1.05M | avg_line_length float64 1.13 1.04M | max_line_length int64 1 1.05M | alphanum_fraction float64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
10d45ba6d6d1f32b2d7bff663e4945e8faebcb7c | 826 | yml | YAML | conda-forge.yml | regro-cf-autotick-bot/r-npsurv-feedstock | 34d0067dac89a7a0f1442111c6b8944e7ed13df1 | [
"BSD-3-Clause"
] | null | null | null | conda-forge.yml | regro-cf-autotick-bot/r-npsurv-feedstock | 34d0067dac89a7a0f1442111c6b8944e7ed13df1 | [
"BSD-3-Clause"
] | null | null | null | conda-forge.yml | regro-cf-autotick-bot/r-npsurv-feedstock | 34d0067dac89a7a0f1442111c6b8944e7ed13df1 | [
"BSD-3-Clause"
] | null | null | null | travis:
secure:
BINSTAR_TOKEN: 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
appveyor:
secure:
BINSTAR_TOKEN: tumuXLL8PU75WMnRDemRy02ruEq2RpNxeK3dz0MjFssnosPm2v4EFjfNB4PTotA1
| 118 | 703 | 0.940678 |
804d64a3c895b2d47accdf0e36090160890623b1 | 827 | yml | YAML | .github/workflows/dockerimage.yml | Avantika1992/my-deepo | 65b3e6a9071320b2e77769cfaa3e183e4fc23c4a | [
"MIT"
] | null | null | null | .github/workflows/dockerimage.yml | Avantika1992/my-deepo | 65b3e6a9071320b2e77769cfaa3e183e4fc23c4a | [
"MIT"
] | null | null | null | .github/workflows/dockerimage.yml | Avantika1992/my-deepo | 65b3e6a9071320b2e77769cfaa3e183e4fc23c4a | [
"MIT"
] | null | null | null | name: Docker Image CI
on: [push]
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@master
- run: docker build -t ${{ secrets.DOCKER_REPO }}:all-py36-cu100 -t ${{ secrets.DOCKER_REPO }}:all-py36 -t ${{ secrets.DOCKER_REPO }}:all -t ${{ secrets.DOCKER_REPO }}:py36-cu100 -t ${{ secrets.DOCKER_REPO }}:latest -f docker/Dockerfile.all-py36-cu100 .
- run: docker login -u ${{ secrets.DOCKER_USER }} -p ${{ secrets.DOCKER_PASS }}
- run: docker push ${{ secrets.DOCKER_REPO }}:all-py36-cu100
- run: docker push ${{ secrets.DOCKER_REPO }}:all-py36
- run: docker push ${{ secrets.DOCKER_REPO }}:all
- run: docker push ${{ secrets.DOCKER_REPO }}:py36-cu100
- run: docker push ${{ secrets.DOCKER_REPO }}:latest
| 41.35 | 257 | 0.603386 |
59f7e445063566d1e65d0022f6287d281ddfbd40 | 1,014 | yaml | YAML | framework/tlvf/yaml/tlvf/wfa_map/tlvAssociatedStaExtendedLinkMetrics.yaml | SWRT-dev/easymesh | 12d902edde77599e074c0535f7256499b08f7494 | [
"BSD-3-Clause",
"BSD-2-Clause-Patent",
"MIT"
] | null | null | null | framework/tlvf/yaml/tlvf/wfa_map/tlvAssociatedStaExtendedLinkMetrics.yaml | SWRT-dev/easymesh | 12d902edde77599e074c0535f7256499b08f7494 | [
"BSD-3-Clause",
"BSD-2-Clause-Patent",
"MIT"
] | null | null | null | framework/tlvf/yaml/tlvf/wfa_map/tlvAssociatedStaExtendedLinkMetrics.yaml | SWRT-dev/easymesh | 12d902edde77599e074c0535f7256499b08f7494 | [
"BSD-3-Clause",
"BSD-2-Clause-Patent",
"MIT"
] | null | null | null | #
---
_namespace: wfa_map
# implementation of
# v2 specificarion:
# 17.2.62 Associated STA Extended Link Metrics TLV format
tlvAssociatedStaExtendedLinkMetrics:
_type: class
_is_tlv_class : True
type:
_type: eTlvTypeMap
_value_const: TLV_ASSOCIATED_STA_EXTENDED_LINK_METRICS # line 1 (value)
length: uint16_t # line 2 (length)
associated_sta: sMacAddr # line 3 (sta mac)
metrics_list_length: # line 4 (number of BSSIDs)
_type: uint8_t
_length_var: True
metrics_list: # line 10 (list)
_type: sMetrics
_length: [ metrics_list_length ]
sMetrics:
_type: struct
bssid: sMacAddr # line 5 (bssid)
last_data_down_link_rate: uint32_t # line 6
last_data_up_link_rate: uint32_t # line 7
utilization_receive: uint32_t # line 8
utilization_transmit: uint32_t # line 9
| 32.709677 | 87 | 0.592702 |
def62a5a686591092945546bb9e3fd236159164a | 247 | yaml | YAML | manifests/clipgrab/clipgrab.yaml | appget/packages | bb311d7aa072a100a093593ec30891e7dddbdf70 | [
"Apache-2.0"
] | 91 | 2018-05-10T21:10:48.000Z | 2022-03-25T23:30:19.000Z | manifests/clipgrab/clipgrab.yaml | appget/packages | bb311d7aa072a100a093593ec30891e7dddbdf70 | [
"Apache-2.0"
] | 734 | 2018-06-28T00:08:16.000Z | 2021-06-29T12:50:12.000Z | manifests/clipgrab/clipgrab.yaml | appget/packages | bb311d7aa072a100a093593ec30891e7dddbdf70 | [
"Apache-2.0"
] | 100 | 2018-07-03T04:31:01.000Z | 2021-06-06T05:08:22.000Z | id: clipgrab
name: ClipGrab
version: 3.8.13
home: https://clipgrab.org/
installMethod: Inno
installers:
- location: https://download.clipgrab.org/clipgrab-3.8.13-cgorg.exe
sha256: dc28147012e985480f997ca925f4320bd804f560a1275cef86e0b2dda5473d96
| 27.444444 | 74 | 0.817814 |
9aa11545e3237ae1e880400de56214db1e79e13b | 685 | yml | YAML | .travis.yml | xkdcc/kickcmd | 3a4c3a806aed467f2a7922da25fac2890ac65159 | [
"MIT"
] | 1 | 2020-03-17T19:21:49.000Z | 2020-03-17T19:21:49.000Z | .travis.yml | xkdcc/kickcmd | 3a4c3a806aed467f2a7922da25fac2890ac65159 | [
"MIT"
] | null | null | null | .travis.yml | xkdcc/kickcmd | 3a4c3a806aed467f2a7922da25fac2890ac65159 | [
"MIT"
] | null | null | null | # Disable sudo to speed up the build
sudo: false
# Set the build language to Python
language: python
python:
- "3.7"
# Install the codecov pip dependency and my own lib for testing
# pytest-cov is not enough for travis virtual env. It will report codecov not found.
# codecov is still required per https://github.com/codecov/codecov-python/blob/master/README.md#ci-providers
install:
- pip install pytest-cov pytest codecov
- python setup.py bdist_wheel
- pip install dist/kickcmd-*.whl
# And run the pytest with codecov.
script:
- python -m pytest --cov-report term --cov=kickcmd
after_success:
- codecov
env:
- CODECOV_TOKEN="70124566-6be5-4aba-a225-636bd9c1904a" | 26.346154 | 108 | 0.750365 |
9faf30cada6e9ad917a8ec3fc638a4a2ee366ecb | 336 | yml | YAML | .travis.yml | atom/squeegpg-native | 02393a8f805bf420faa56856568252cfc3fadd73 | [
"MIT"
] | 1 | 2021-10-30T14:02:55.000Z | 2021-10-30T14:02:55.000Z | .travis.yml | atom/squeegpg-native | 02393a8f805bf420faa56856568252cfc3fadd73 | [
"MIT"
] | 6 | 2018-03-09T13:28:45.000Z | 2018-03-17T23:33:38.000Z | .travis.yml | atom/squeegpg-native | 02393a8f805bf420faa56856568252cfc3fadd73 | [
"MIT"
] | null | null | null | language: c
before_install:
- rvm install --default 2.4.2
- gem install bundler
install:
- pushd script/ruby && bundle install --path vendor/bundle && popd
script:
- script/build.sh
- script/analyze.sh
- script/package.sh
deploy:
skip_cleanup: true
on:
tags: true
provider: script
script: rvm use 2.4.2 do script/publish.sh
| 19.764706 | 66 | 0.720238 |
0c795d0b070c49f52f774f6a860ff4043c284a30 | 440 | yml | YAML | data/nv/municipalities/Ed-Lawson-cba5a13c-4654-4377-8479-3053ee8fe5d0.yml | Rypo/people | 34cf10bf10313f154f5065dde578bed9b4127ae8 | [
"CC0-1.0"
] | 1 | 2021-04-19T20:42:59.000Z | 2021-04-19T20:42:59.000Z | data/nv/municipalities/Ed-Lawson-cba5a13c-4654-4377-8479-3053ee8fe5d0.yml | Rypo/people | 34cf10bf10313f154f5065dde578bed9b4127ae8 | [
"CC0-1.0"
] | null | null | null | data/nv/municipalities/Ed-Lawson-cba5a13c-4654-4377-8479-3053ee8fe5d0.yml | Rypo/people | 34cf10bf10313f154f5065dde578bed9b4127ae8 | [
"CC0-1.0"
] | null | null | null | id: ocd-person/cba5a13c-4654-4377-8479-3053ee8fe5d0
name: Ed Lawson
given_name: Ed
family_name: Lawson
email: elawson@cityofsparks.us
contact_details:
- note: Primary Office
address: 431 Prater Way;Sparks, NV 89431
voice: 775-353-2311
roles:
- jurisdiction: ocd-jurisdiction/country:us/state:nv/place:sparks/government
type: mayor
end_date: '2022-11-08'
sources:
- url: http://cityofsparks.us/
links:
- url: http://cityofsparks.us/
| 24.444444 | 76 | 0.765909 |
39cf62c2a5df39a365aa052350f93cf57cb25cac | 2,454 | yaml | YAML | tackle.yaml | geometry-labs/substrate-infra-archive | e3ecdd2369af2c75f55af32b70d26b68ff35838e | [
"Apache-2.0"
] | null | null | null | tackle.yaml | geometry-labs/substrate-infra-archive | e3ecdd2369af2c75f55af32b70d26b68ff35838e | [
"Apache-2.0"
] | null | null | null | tackle.yaml | geometry-labs/substrate-infra-archive | e3ecdd2369af2c75f55af32b70d26b68ff35838e | [
"Apache-2.0"
] | null | null | null | ---
# Install Dependencies
settings_:
type: tackle
context_file: scripts/settings.yaml
merge: true
# Action
action_:
type: select
message: What we trying to do now?
choices:
# - install: Install dependencies
- list: List deployments
- create: Create new deployment
- plan: Plan a deployment
- apply: Apply deployment
- destroy: Destroy deployment
# Install Dependencies
#installs_:
# type: tackle
# context_file: scripts/installs.yaml
# when: "{{ 'install' == action_ }}"
# List Deployments
list_:
type: table
column_names:
- Namespace
- Network Name
- Environment
- Provider
- Region
- Stack
- Deployment ID
contents: "{{ deployments_list_ }}"
when: "{{ 'list' == action_ or 'deploy' == action_ }}"
# Create Deployment
create_:
type: tackle
chdir: polkadot
when: "{{ 'create' == action_ }}"
# Plan / Apply / Destroy
tf_actions_:
type: block
when: "{{ action_ in ['plan', 'apply', 'destroy'] }}"
items:
deployment_choice_:
type: select
message: Which deployment would you like to {{ action_ }}?
choices: "{{ deployment_list_ }}"
deployment_path:
type: path_join
paths:
- "{{ deployment_dir }}"
- "{{ deployment_choice_ }}"
symlink_:
type: symlink
src: "{{ deployment_path }}"
dst: run.yml
overwrite: true
chmod_:
type: chmod
path: "{{ deployment_path }}"
mode: 0o644
deployment_read_:
type: yaml
path: "{{ deployment_path }}"
stack:
type: var
input: "{{ deployment_read_['stack'] }}"
provider:
type: var
input: "{{ deployment_read_['provider'] }}"
modules:
type: var
input: "{{ deployment_read_['modules'] }}"
# d:
# type: debug
plan_action_:
type: shell
chdir: "polkadot/{{ stack }}/{{ provider }}/{{ item }}"
loop: "{{ modules }}"
command: "terragrunt plan --terragrunt-non-interactive --terragrunt-source-update"
when: "{{ action_ == 'plan' }}"
run_action_:
type: shell
chdir: "polkadot/{{ stack }}/{{ provider }}/{{ item }}"
loop: "{{ modules }}"
reverse: "{{ action_ == 'destroy' }}"
ignore_error: "{{ action_ == 'destroy' }}"
command: "terragrunt {{ action_ }} --terragrunt-non-interactive --terragrunt-source-update --auto-approve"
when: "{{ action_ in ['apply', 'destroy'] }}"
| 22.513761 | 112 | 0.587205 |
1fd05ba48715b03b339591374ed70b60eb899dcb | 280 | yaml | YAML | src/ros/src/ros_homebot_lrf/config/calibration_320_blank.yaml | chrisspen/homebot | cd1a5a2bddcb90d50a00e67b94297942827fbc61 | [
"MIT"
] | 8 | 2017-11-19T01:42:59.000Z | 2021-02-08T09:18:58.000Z | src/ros/src/ros_homebot_lrf/config/calibration_320_blank.yaml | chrisspen/homebot | cd1a5a2bddcb90d50a00e67b94297942827fbc61 | [
"MIT"
] | 24 | 2017-02-14T16:50:02.000Z | 2017-06-07T18:38:20.000Z | src/ros/src/ros_homebot_lrf/config/calibration_320_blank.yaml | chrisspen/homebot | cd1a5a2bddcb90d50a00e67b94297942827fbc61 | [
"MIT"
] | 6 | 2017-05-17T03:07:05.000Z | 2019-11-14T09:33:06.000Z | # This will be a list of the row at which each column contains the laser light.
readings: []
# This will be a map assocating a column to a distance marker.
distances:
blank1: 50
blank2: 100
blank3: 200
h: 22.5
image_width: 320
image_height: 240
laser_position: bottom
| 23.333333 | 79 | 0.732143 |
287452c6559a9d204cbe1bcc6387199f28d0efd5 | 1,981 | yaml | YAML | .github/workflows/main.yaml | orianac/forest-emissions-tracking | 34aa335ba652b455debb0071b6e124e4c16a1946 | [
"MIT"
] | null | null | null | .github/workflows/main.yaml | orianac/forest-emissions-tracking | 34aa335ba652b455debb0071b6e124e4c16a1946 | [
"MIT"
] | null | null | null | .github/workflows/main.yaml | orianac/forest-emissions-tracking | 34aa335ba652b455debb0071b6e124e4c16a1946 | [
"MIT"
] | null | null | null | name: CI
on:
push:
branches: "*"
pull_request:
branches: "*"
jobs:
test:
name: ${{ matrix.python-version }}-build
runs-on: ubuntu-latest
strategy:
matrix:
python-version: [3.8]
steps:
- uses: actions/checkout@v2.3.4
- name: Setup Python
uses: actions/setup-python@v2.2.2
with:
python-version: ${{ matrix.python-version }}
architecture: x64
- uses: actions/cache@v2.1.5
with:
path: ~/.cache/pip
key: ${{ runner.os }}-pip-${{ hashFiles('**/requirements.txt') }}
restore-keys: |
${{ runner.os }}-pip-
- run: |
python -m pip install -r dev-requirements.txt
python -m pip install --no-deps -e .
python -m pip list
- name: Running Tests
run: |
python -m pytest --verbose
docker:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v2
- name: Docker meta
id: docker_meta
uses: crazy-max/ghaction-docker-meta@v2.3.0
with:
images: |
carbonplan/trace-python-notebook
tag-sha: true
- name: Set up QEMU
uses: docker/setup-qemu-action@v1
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
- name: Login to DockerHub
uses: docker/login-action@v1
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
- name: Build and push
uses: docker/build-push-action@v2
with:
context: envs/python-notebook
push: ${{ github.event_name != 'pull_request' }}
tags: ${{ steps.docker_meta.outputs.tags }}
labels: ${{ steps.docker_meta.outputs.labels }}
lint:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2.3.4
- uses: actions/setup-python@v2.2.2
- uses: pre-commit/action@v2.0.3
| 27.513889 | 75 | 0.551742 |
16649aab33eb73bbf7617aad748464cd6dcf3728 | 1,173 | yml | YAML | .github/workflows/ci.yml | kenodegard/conda-content-trust | 54737519deae12e7c9b1473689887775b9efecec | [
"BSD-3-Clause"
] | 1 | 2022-03-24T12:36:14.000Z | 2022-03-24T12:36:14.000Z | .github/workflows/ci.yml | kenodegard/conda-content-trust | 54737519deae12e7c9b1473689887775b9efecec | [
"BSD-3-Clause"
] | 8 | 2021-03-26T08:09:15.000Z | 2022-03-21T02:59:52.000Z | .github/workflows/ci.yml | kenodegard/conda-content-trust | 54737519deae12e7c9b1473689887775b9efecec | [
"BSD-3-Clause"
] | 4 | 2019-10-09T19:09:19.000Z | 2021-02-18T08:02:29.000Z | name: CI
on:
push:
branches:
- master
pull_request:
jobs:
build:
name: Python ${{ matrix.python-version }} on ${{ matrix.os }}
runs-on: ${{ matrix.os }}
strategy:
fail-fast: false
matrix:
os: ["ubuntu-latest", "macos-latest", "windows-latest"]
python-version: ["3.6", "3.7", "3.8", "3.9"]
steps:
- uses: actions/checkout@v2
- uses: conda-incubator/setup-miniconda@v2
with:
auto-update-conda: false
python-version: ${{ matrix.python-version }}
- name: Conda install dependencies
run: conda install conda-build anaconda-client pytest pytest-cov
- name: Conda build
run: conda build conda.recipe --no-test
- name: Conda install conda-content-trust locally
run: conda install --use-local conda-content-trust
- name: Conda info
run: conda info -a
- name: Conda info
run: conda info -a
- name: Run tests
run: conda run --no-capture-output pytest
- name: Upload coverage
uses: codecov/codecov-action@v1
with:
name: Python ${{ matrix.python-version }}
| 23 | 72 | 0.580563 |
221c93619f74a4951cc823c40d7f8ee4002b117e | 562 | yml | YAML | .travis.yml | esilkensen/yaml | b60a1e4a01979ed447799b07e7f8dd5ff17019f0 | [
"MIT"
] | 16 | 2015-06-18T06:15:02.000Z | 2021-12-12T07:20:51.000Z | .travis.yml | esilkensen/yaml | b60a1e4a01979ed447799b07e7f8dd5ff17019f0 | [
"MIT"
] | 41 | 2015-03-25T21:59:45.000Z | 2021-02-21T07:54:28.000Z | .travis.yml | esilkensen/yaml | b60a1e4a01979ed447799b07e7f8dd5ff17019f0 | [
"MIT"
] | 3 | 2015-03-30T02:00:19.000Z | 2019-07-26T17:56:01.000Z | language: c
sudo: false
env:
global:
- RACKET_DIR=~/racket
matrix:
- RACKET_VERSION=7.4
before_install:
- git clone https://github.com/greghendershott/travis-racket.git ../travis-racket
- cat ../travis-racket/install-racket.sh | bash
- export PATH="${RACKET_DIR}/bin:${PATH}"
install:
- raco pkg install --deps search-auto $TRAVIS_BUILD_DIR cover-codecov
script:
- raco make $TRAVIS_BUILD_DIR/yaml/main.rkt
- raco test $TRAVIS_BUILD_DIR/yaml
after_success:
- raco cover -f codecov -d $TRAVIS_BUILD_DIR/coverage -b $TRAVIS_BUILD_DIR
| 24.434783 | 83 | 0.725979 |
eba37a8d4cf4539ab42f87fdbb8b0da501539a36 | 4,350 | yml | YAML | tests/inheritance/mutual-recursion-with-if-branching1.yml | APotyomkin/awesome-bugs | 3b28c6acf91cc70db8f38ee01b5f502416011db5 | [
"MIT"
] | null | null | null | tests/inheritance/mutual-recursion-with-if-branching1.yml | APotyomkin/awesome-bugs | 3b28c6acf91cc70db8f38ee01b5f502416011db5 | [
"MIT"
] | null | null | null | tests/inheritance/mutual-recursion-with-if-branching1.yml | APotyomkin/awesome-bugs | 3b28c6acf91cc70db8f38ee01b5f502416011db5 | [
"MIT"
] | null | null | null | title: Mutual recursion in if branching
description: >
Simplest branching case, where mutual recursion is obvious (if true/false)
features:
- inheritance
- overriding
- method
- polymorphism
bad:
source.cpp: |
#include <memory>
class Base {
private:
int x = 0;
public:
Base() = default;
virtual ~Base() = default;
virtual void n() {
this->x = 0;
}
void m() {
this->n();
}
void incrX() {
x++;
}
};
class Derived : public Base {
public:
void n() override {
if (true) {
this->m();
}
else {
this->incrX();
}
}
};
auto main() -> int {
std::unique_ptr<Base> derivedInstance = std::make_unique<Derived>();
derivedInstance->n();
}
Test.java: |
class Base {
private int x = 0;
public int getX() { return x; }
public void n() {
x = 0;
}
public void m() {
this.n();
}
public void incrX() {
x++;
}
}
class Derived extends Base {
@Override
public void n() {
if (true) {
this.m();
}
else {
this.incrX();
}
}
}
public class Test {
public static void main(String[] args) {
Base derivedInstance = new Derived();
derivedInstance.n();
}
}
test.eo: |
[] > test
[] > base
memory > x
[self] > n
x.write 0 > @
[self] > m
self.n self > @
[] > derived
base > @
base.x > x
[self] > n
if. > @
TRUE
self.m self
x.write (x.add 1)
test.py: |
class Base:
__x = 0
def n(self):
self.__x = 0
def m(self):
self.n()
def incr_x(self):
self.__x += 1
class Derived(Base):
def n(self):
if True:
self.m()
else:
self.incr_x()
if __name__ == "__main__":
print(Derived().n())
good:
source.cpp: |
#include <memory>
class Base {
private:
int x = 0;
public:
Base() = default;
virtual ~Base() = default;
virtual void n() {
this->x = 0;
}
void m() {
this->n();
}
void incrX() {
x++;
}
};
class Derived : public Base {
public:
void n() override {
if (false) {
this->m();
}
else {
this->incrX();
}
}
};
auto main() -> int {
std::unique_ptr<Base> derivedInstance = std::make_unique<Derived>();
derivedInstance->n();
}
Test.java: |
class Base {
private int x = 0;
public int getX() { return x; }
public void n() {
x = 0;
}
public void m() {
this.n();
}
public void incrX() {
x++;
}
}
class Derived extends Base {
@Override
public void n() {
if (false) {
this.m();
}
else {
this.incrX();
}
}
}
public class Test {
public static void main(String[] args) {
Base derivedInstance = new Derived();
derivedInstance.n();
}
}
test.eo: |
[] > test
[] > base
memory > x
[self] > n
x.write 0 > @
[self] > m
self.n self > @
[] > derived
base > @
base.x > x
[self] > n
if. > @
FALSE
self.m self
x.write (x.add 1)
test.py: |
class Base:
__x = 0
def n(self):
self.__x = 0
def m(self):
self.n()
def incr_x(self):
self.__x += 1
class Derived(Base):
def n(self):
if False:
self.m()
else:
self.incr_x()
if __name__ == "__main__":
print(Derived().n())
| 18.831169 | 76 | 0.384598 |
2368bb260d216a7780722baf05c6e8d48bbc583b | 253 | yml | YAML | shippable.yml | ric03uec/cansible | fcc01345d02c2f64ceb11c58ff79859c51776bc6 | [
"MIT"
] | null | null | null | shippable.yml | ric03uec/cansible | fcc01345d02c2f64ceb11c58ff79859c51776bc6 | [
"MIT"
] | 2 | 2018-05-23T13:52:04.000Z | 2018-05-30T04:20:12.000Z | shippable.yml | ric03uec/cansible | fcc01345d02c2f64ceb11c58ff79859c51776bc6 | [
"MIT"
] | null | null | null | language: python
python:
- 2.7
env:
- HUB_REPO=ric03uec/cansible
build:
ci:
- make
- make build
integrations:
hub:
- integrationName: ric03uec-dockerhub
type: dockerRegistryLogin
branches:
only:
- devel
- master
| 11 | 41 | 0.640316 |
8fe98e2e26090bf6fad821252f14d22850a6b403 | 679 | yml | YAML | config/routes/frontend/product_box.yml | Jedisjeux/Jedisjeux | b3197e8bc81b381cca9b079e840ba9f0b76f1f1a | [
"MIT"
] | 16 | 2017-10-31T13:35:18.000Z | 2020-05-09T14:24:11.000Z | config/routes/frontend/product_box.yml | Jedisjeux/Jedisjeux | b3197e8bc81b381cca9b079e840ba9f0b76f1f1a | [
"MIT"
] | 50 | 2017-10-02T13:14:40.000Z | 2020-11-15T13:52:15.000Z | config/routes/frontend/product_box.yml | Jedisjeux/Jedisjeux | b3197e8bc81b381cca9b079e840ba9f0b76f1f1a | [
"MIT"
] | 2 | 2017-10-01T21:16:00.000Z | 2018-09-25T13:04:08.000Z | app_frontend_product_box_create:
path: /new
methods: [GET, POST]
defaults:
_controller: app.controller.product_box:createAction
_sylius:
template: 'frontend/product_box/create.html.twig'
factory:
method: createForProduct
arguments:
- "expr:notFoundOnNull(service('sylius.repository.product').findOneBySlug(service('sylius.context.locale').getLocaleCode(), $slug))"
redirect:
route: sylius_frontend_product_show
parameters:
slug: resource.product.slug
flash: app.product_box.wait_for_the_acceptation
| 39.941176 | 152 | 0.60972 |
ce26bcbfe6518c96b29e520ae686f58dc0c23149 | 1,967 | yaml | YAML | recipe/meta.yaml | regro-cf-autotick-bot/lfpy-feedstock | 7a4c8e9dedf68dbe40adaf7313f7490638ac35a9 | [
"BSD-3-Clause"
] | null | null | null | recipe/meta.yaml | regro-cf-autotick-bot/lfpy-feedstock | 7a4c8e9dedf68dbe40adaf7313f7490638ac35a9 | [
"BSD-3-Clause"
] | null | null | null | recipe/meta.yaml | regro-cf-autotick-bot/lfpy-feedstock | 7a4c8e9dedf68dbe40adaf7313f7490638ac35a9 | [
"BSD-3-Clause"
] | null | null | null | {% set name = 'LFPy' %}
{% set version = "2.0.2" %}
{% set build = 1 %}
# mpi must be defined for conda-smithy lint
{% if not mpi %}
# conda-smithy misbehaves if mpi is unset
{% set mpi = 'mpich' %}
{% endif %}
package:
name: {{ name | lower }}
version: {{ version }}
source:
url: https://pypi.io/packages/source/l/lfpy/{{name}}-{{ version }}.tar.gz
sha256: ab5103f6fd5fc9fb4005e65033a98d9d67f9ace4bc4b9be6c3462eab65539698
build:
number: {{ build }}
{% set mpi_prefix = "mpi_" + mpi %} # use mpi_mpich_*` neuron variant
string: "{{ mpi_prefix }}_py{{ py }}h{{ PKG_HASH }}_{{ build }}"
script: "{{PYTHON}} -m pip install . --no-deps -vv"
skip: true # [win]
requirements:
build:
- {{ compiler('c') }}
host:
- python
- pip
- cython >=0.20
- numpy >=1.8
- neuron
run:
- python
- setuptools
- cython >=0.20
- {{ pin_compatible('numpy') }}
- scipy >=0.14
- h5py >=2.5
- mpi4py >=1.2
- {{ mpi }}
- neuron >=7.6.7 {{ mpi_prefix }}_*
test:
requires:
# test with mpich instead of openmpi
# mpi4py with openmpi doesn't import on CI
# without extra environment variables set
- mpich
- pytest
imports:
- LFPy
commands:
- py.test -vsx --pyargs LFPy
about:
home: https://github.com/LFPy/LFPy
license: GPL-3.0
license_family: GPL
license_file: LICENSE
summary: 'LFPy is a Python-module for calculation of extracellular potentials from multicompartment neuron models'
description: |
LFPy provides a set of easy-to-use Python classes for setting up your
model, running your simulations and calculating the extracellular
potentials arising from activity in your model neuron. If you have a model
working in NEURON or NeuroML2 already, it is likely that it can be adapted
to work with LFPy.
doc_url: https://lfpy.readthedocs.io
dev_url: https://github.com/LFPy/LFPy
extra:
recipe-maintainers:
- espenhgn
- minrk
| 24.898734 | 116 | 0.641586 |
2cb979b8afbc85d67354d2c6d5dc8b116de2c15d | 1,645 | yaml | YAML | rest-api-spec/test/indices.create/10_basic.yaml | uboness/elasticsearch | b3cb59d0243a33c6dfeda1ff517809a4793a59be | [
"Apache-2.0"
] | 3 | 2016-12-03T23:33:28.000Z | 2018-02-18T01:01:12.000Z | rest-api-spec/test/indices.create/10_basic.yaml | brainbot-com/elasticsearch | c82b231ad80d0efcc9cdf62ff9bd9b1f924735e5 | [
"Apache-2.0"
] | 1 | 2021-06-04T02:56:04.000Z | 2021-06-04T02:56:04.000Z | rest-api-spec/test/indices.create/10_basic.yaml | brainbot-com/elasticsearch | c82b231ad80d0efcc9cdf62ff9bd9b1f924735e5 | [
"Apache-2.0"
] | null | null | null | ---
"Create index with mappings":
- do:
indices.create:
index: test_index
body:
mappings:
type_1: {}
- do:
indices.get_mapping:
index: test_index
- match: { test_index.mappings.type_1.properties: {}}
---
"Create index with settings":
- do:
indices.create:
index: test_index
body:
settings:
number_of_replicas: "0"
- do:
indices.get_settings:
index: test_index
- match: { test_index.settings.index.number_of_replicas: "0"}
---
"Create index with warmers":
- do:
indices.create:
index: test_index
body:
warmers:
test_warmer:
source:
query:
match_all: {}
- do:
indices.get_warmer:
index: test_index
- match: {test_index.warmers.test_warmer.source.query.match_all: {}}
---
"Create index with mappings, settings and warmers":
- do:
indices.create:
index: test_index
body:
mappings:
type_1: {}
settings:
number_of_replicas: "0"
warmers:
test_warmer:
source:
query:
match_all: {}
- do:
indices.get_mapping:
index: test_index
- match: { test_index.mappings.type_1.properties: {}}
- do:
indices.get_settings:
index: test_index
- match: { test_index.settings.index.number_of_replicas: "0"}
- do:
indices.get_warmer:
index: test_index
- match: { test_index.warmers.test_warmer.source.query.match_all: {}}
| 19.127907 | 71 | 0.541641 |
2f7d1978d2d5eb78b35060275582316328d14cdd | 315 | yml | YAML | roles/httpd/tasks/main.yml | jarrodmillman/ansible | 9e0e668fa1a888434a930a58c6f3dc2baa4db011 | [
"BSD-2-Clause"
] | null | null | null | roles/httpd/tasks/main.yml | jarrodmillman/ansible | 9e0e668fa1a888434a930a58c6f3dc2baa4db011 | [
"BSD-2-Clause"
] | null | null | null | roles/httpd/tasks/main.yml | jarrodmillman/ansible | 9e0e668fa1a888434a930a58c6f3dc2baa4db011 | [
"BSD-2-Clause"
] | null | null | null | - name: install packages
yum:
name: httpd
state: present
- name: ensure started httpd service
service:
name: httpd
state: started
enabled: yes
- name: make sure symlink exists
file:
src: /srv/www
dest: /var/www/html
owner: root
group: root
state: link
force: yes
| 15.75 | 36 | 0.625397 |
03412ed22135b33b61374556e4f0f86f7295642d | 476 | yaml | YAML | automations/telegram_bot_cmd_start.yaml | jabastien/Home-AssistantConfig | 8d31b1f34e8f66bb685b356f618e8556af6c74cc | [
"MIT"
] | 12 | 2020-06-07T05:34:48.000Z | 2021-12-03T14:30:02.000Z | automations/telegram_bot_cmd_start.yaml | jabastien/Home-AssistantConfig | 8d31b1f34e8f66bb685b356f618e8556af6c74cc | [
"MIT"
] | 1 | 2020-04-16T05:06:48.000Z | 2020-04-16T05:06:48.000Z | automations/telegram_bot_cmd_start.yaml | jabastien/Home-AssistantConfig | 8d31b1f34e8f66bb685b356f618e8556af6c74cc | [
"MIT"
] | 4 | 2020-05-24T18:01:55.000Z | 2022-02-01T12:54:40.000Z | - alias: "Telegram Start Command"
id: "44"
initial_state: "on"
trigger:
platform: event
event_type: telegram_command
event_data:
command: "/start"
action:
- service: notify.telegram
data:
message: >
{{ [
"Hi",
"Hello",
"Yes Sir!",
"it's a pleasure to see you again"
] | random }}
data:
keyboard:
- "/start, /control_panel" | 22.666667 | 45 | 0.470588 |
a39448a78e56c4c6e4bf346dbc330ab9fa5b4b32 | 836 | yaml | YAML | actions/check-pr-description/action.yaml | aledegano/renku | 4e1910516af1cf53ebfaf448b851474b0d488cef | [
"Apache-2.0"
] | null | null | null | actions/check-pr-description/action.yaml | aledegano/renku | 4e1910516af1cf53ebfaf448b851474b0d488cef | [
"Apache-2.0"
] | null | null | null | actions/check-pr-description/action.yaml | aledegano/renku | 4e1910516af1cf53ebfaf448b851474b0d488cef | [
"Apache-2.0"
] | null | null | null | name: 'check PR description'
description: Check the PR description for a string.
inputs:
string:
description: string to check for
required: true
pr_ref:
description: Pull request ID
required: true
outputs:
pr-contains-string:
description: true/false whether the PR description contains the string
value: ${{ steps.check-string.outputs.pr-contains-string }}
runs:
using: "composite"
steps:
- id: check-string
run: |
pr_contains_string=$(curl -s https://api.github.com/repos/${GITHUB_REPOSITORY}/pulls/${{ inputs.pr_ref }} | jq ".body | test(\"${{ inputs.string }}\")")
echo "::set-output name=pr-contains-string::$pr_contains_string"
echo $pr_contains_string
echo "https://api.github.com/repos/${GITHUB_REPOSITORY}/pulls/${{ inputs.pr_ref }}"
shell: bash
| 34.833333 | 160 | 0.677033 |
d43f4af4ea1894d5549a3034fb51d5f98ea60123 | 3,521 | yml | YAML | example/mc-bedrock-server.yml | saulmaldonado/agones-mc-monitor | 08fe04562afef47272295978c317106170ec8a25 | [
"MIT"
] | 12 | 2021-07-25T13:53:24.000Z | 2022-03-17T09:48:44.000Z | example/mc-bedrock-server.yml | saulmaldonado/agones-mc-monitor | 08fe04562afef47272295978c317106170ec8a25 | [
"MIT"
] | 1 | 2021-07-06T19:47:18.000Z | 2021-07-06T19:47:18.000Z | example/mc-bedrock-server.yml | saulmaldonado/agones-mc-monitor | 08fe04562afef47272295978c317106170ec8a25 | [
"MIT"
] | 1 | 2022-03-14T13:02:17.000Z | 2022-03-14T13:02:17.000Z | apiVersion: 'agones.dev/v1'
kind: GameServer
metadata:
generateName: 'mc-bedrock-' # Generates a unique name for GameServer and Pod
spec:
container: mc-server # Minecraft server container name
ports:
- name: mc
# "Dynamic" (default) the system allocates a free hostPort for the gameserver (default 7000-8000), for game clients to connect to
portPolicy: Dynamic
# The name of the container to open the port on. Defaults to the game server container if omitted or empty.
container: mc-server
# the port that is being opened on the game server process
containerPort: 19132
# Bedrock uses UDP to connect players
protocol: UDP
# Health checking for the running game server
health:
# Number of seconds after the container has started before health check is initiated.
initialDelaySeconds: 60
# If the `Health()` function doesn't get called at least once every period (seconds), then
# the game server is not healthy.
periodSeconds: 12
# Minimum consecutive failures for the health probe to be considered failed after having succeeded.
failureThreshold: 5
template:
spec:
containers:
- name: mc-server
image: itzg/minecraft-bedrock-server # Minecraft bedrock server image
imagePullPolicy: Always
env: # Full list of ENV variables at https://github.com/itzg/docker-minecraft-bedrock-server
- name: EULA
value: "TRUE"
volumeMounts:
- mountPath: /data # shared vol with mc-load and mc-backup
name: world-vol
- name: mc-monitor
image: saulmaldonado/agones-mc
args:
- monitor
env:
- name: INITIAL_DELAY
value: 30s
- name: MAX_ATTEMPTS
value: 5
- name: INTERVAL
value: 10s
- name: TIMEOUT
value: 10s
- name: PORT
value: 19132
- name: EDITION
value: bedrock
imagePullPolicy: Always
- name: mc-backup
image: saulmaldonado/agones-mc # backup
args:
- backup
env:
- name: BUCKET_NAME
value: agones-minecraft-mc-worlds
- name: BACKUP_CRON
value: 0 */6 * * *
- name: INITIAL_DELAY
value: 60s
- name: EDITION
value: bedrock
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name # GameServer ref for naming backup zip files
- name: RCON_PASSWORD
value: minecraft # default rcon password. If provided RCON connection will be used to execute 'save-all' before a backup job.
# Change the rcon password when exposing RCON port outside the pod
imagePullPolicy: Always
volumeMounts:
- mountPath: /data # shared vol with mc-server
name: world-vol
- name: mc-fileserver # fileserver
image: saulmaldonado/agones-mc
args:
- fileserver
env:
- name: VOLUME
value: /data
imagePullPolicy: Always
volumeMounts:
- mountPath: /data # shared vol with mc-server
name: world-vol
volumes:
- name: world-vol # shared vol between containers. will not persist bewteen restarts
emptyDir: {}
| 35.928571 | 139 | 0.583073 |
f9fab885bd5e424bf5800705ca72fd09c35b694a | 846 | yaml | YAML | .github/workflows/publish.yaml | livepeer/task-runner | d4f8ee15c2188680145b15d7d95c3e5057ddde12 | [
"MIT"
] | null | null | null | .github/workflows/publish.yaml | livepeer/task-runner | d4f8ee15c2188680145b15d7d95c3e5057ddde12 | [
"MIT"
] | 10 | 2022-02-07T17:08:24.000Z | 2022-03-28T16:53:35.000Z | .github/workflows/publish.yaml | livepeer/task-runner | d4f8ee15c2188680145b15d7d95c3e5057ddde12 | [
"MIT"
] | 2 | 2022-03-08T01:54:47.000Z | 2022-03-21T07:27:03.000Z | name: Publish
on: push
jobs:
docker:
runs-on: ubuntu-20.04
steps:
- name: Set up Docker Buildx
uses: crazy-max/ghaction-docker-buildx@v1
with:
version: latest
- name: docker login
env:
DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }}
run: |
# docker login
docker version
docker login -u $DOCKER_USERNAME -p $DOCKER_PASSWORD
- name: Check out code
uses: actions/checkout@v1
- name: Tags
id: tags
uses: livepeer/action-gh-release-tags@v0
- name: docker build & push
run: make docker_ci "tags=${{ steps.tags.outputs.tags }}"
- name: notify livepeer-infra
run: curl -X POST https://holy-bread-207a.livepeer.workers.dev
| 24.882353 | 70 | 0.586288 |
999ffcb1a15985d3b7c81936226275bfff6224a4 | 4,815 | yml | YAML | docs-ref-autogen/azure-mgmt-containerservice/azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.yml | SnehaGunda/azure-docs-sdk-python | 3569b3514d11daaf5556512157cdc01769889852 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs-ref-autogen/azure-mgmt-containerservice/azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.yml | SnehaGunda/azure-docs-sdk-python | 3569b3514d11daaf5556512157cdc01769889852 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs-ref-autogen/azure-mgmt-containerservice/azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.yml | SnehaGunda/azure-docs-sdk-python | 3569b3514d11daaf5556512157cdc01769889852 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ### YamlMime:UniversalReference
api_name: []
items:
- children:
- azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.custom
- azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.dcos
- azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.docker_ce
- azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.kubernetes
- azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.swarm
class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
inheritance:
- inheritance:
- type: builtins.object
type: builtins.str
- inheritance:
- type: builtins.object
type: enum.Enum
langs:
- python
module: azure.mgmt.containerservice.models
name: ContainerServiceOrchestratorTypes
source:
id: ContainerServiceOrchestratorTypes
path: azure-mgmt-containerservice\azure\mgmt\containerservice\models\container_service_client_enums.py
remote:
branch: master
path: azure-mgmt-containerservice\azure\mgmt\containerservice\models\container_service_client_enums.py
repo: https://github.com/Azure/azure-sdk-for-python.git
startLine: 199
summary: 'An enumeration.
'
syntax: {}
type: class
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
- class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.custom
langs:
- python
module: azure.mgmt.containerservice.models
name: custom
syntax:
content: custom = 'Custom'
type: attribute
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.custom
- class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.dcos
langs:
- python
module: azure.mgmt.containerservice.models
name: dcos
syntax:
content: dcos = 'DCOS'
type: attribute
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.dcos
- class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.docker_ce
langs:
- python
module: azure.mgmt.containerservice.models
name: docker_ce
syntax:
content: docker_ce = 'DockerCE'
type: attribute
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.docker_ce
- class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.kubernetes
langs:
- python
module: azure.mgmt.containerservice.models
name: kubernetes
syntax:
content: kubernetes = 'Kubernetes'
type: attribute
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.kubernetes
- class: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.swarm
langs:
- python
module: azure.mgmt.containerservice.models
name: swarm
syntax:
content: swarm = 'Swarm'
type: attribute
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.swarm
references:
- fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.custom
isExternal: false
name: custom
parent: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.custom
- fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.dcos
isExternal: false
name: dcos
parent: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.dcos
- fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.docker_ce
isExternal: false
name: docker_ce
parent: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.docker_ce
- fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.kubernetes
isExternal: false
name: kubernetes
parent: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.kubernetes
- fullName: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.swarm
isExternal: false
name: swarm
parent: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes
uid: azure.mgmt.containerservice.models.ContainerServiceOrchestratorTypes.swarm
| 40.805085 | 108 | 0.825337 |
c824af35cdc8b4369fa3860e8ade8c783da11eab | 205 | yaml | YAML | docker-compose-dev.yaml | MooseTheory/dumbot | 8c44e64a9c0afb8e5ac38d84d8f58c7bf891a041 | [
"Apache-2.0"
] | null | null | null | docker-compose-dev.yaml | MooseTheory/dumbot | 8c44e64a9c0afb8e5ac38d84d8f58c7bf891a041 | [
"Apache-2.0"
] | 3 | 2021-08-24T01:04:18.000Z | 2021-08-25T01:46:30.000Z | docker-compose-dev.yaml | MooseTheory/dumbot | 8c44e64a9c0afb8e5ac38d84d8f58c7bf891a041 | [
"Apache-2.0"
] | null | null | null | version: '3.6'
services:
dumbot:
build:
context: .
dockerfile: Dockerfile_bot
image: moosetheory/dumbot:dev
restart: always
volumes:
- "./config.dev.toml:/config.toml"
| 17.083333 | 40 | 0.619512 |
ccac5e6f2c8011cc03923722212073888cfa13e9 | 442 | yaml | YAML | public/cloc-1.82/tests/outputs/test2.lhs.yaml | josema62/Memoria | 93ebd98095434bc76d85d3fe8f32c913ed451e43 | [
"MIT"
] | null | null | null | public/cloc-1.82/tests/outputs/test2.lhs.yaml | josema62/Memoria | 93ebd98095434bc76d85d3fe8f32c913ed451e43 | [
"MIT"
] | null | null | null | public/cloc-1.82/tests/outputs/test2.lhs.yaml | josema62/Memoria | 93ebd98095434bc76d85d3fe8f32c913ed451e43 | [
"MIT"
] | null | null | null | ---
# github.com/AlDanial/cloc
header :
cloc_url : github.com/AlDanial/cloc
cloc_version : 1.67
elapsed_seconds : 0.0049288272857666
n_files : 1
n_lines : 44
files_per_second : 202.888018187975
lines_per_second : 8927.07280027089
report_file : test2.lhs.yaml
Haskell :
nFiles: 1
blank: 12
comment: 11
code: 21
SUM:
blank: 12
comment: 11
code: 21
nFiles: 1
| 20.090909 | 47 | 0.617647 |
6dd9b9bdec0b35d089897ad3b0eb29f6dec63f60 | 1,456 | yml | YAML | .circleci/config.yml | HarvestProfit/harvest-profit-api-core | 45a7d34b9b5205113508ad4a17ad4201c933a701 | [
"MIT"
] | null | null | null | .circleci/config.yml | HarvestProfit/harvest-profit-api-core | 45a7d34b9b5205113508ad4a17ad4201c933a701 | [
"MIT"
] | null | null | null | .circleci/config.yml | HarvestProfit/harvest-profit-api-core | 45a7d34b9b5205113508ad4a17ad4201c933a701 | [
"MIT"
] | null | null | null | version: 2
jobs:
jest:
docker:
- image: circleci/node:latest
steps:
- add_ssh_keys:
fingerprints:
- "69:f9:f4:03:d6:12:18:f3:97:eb:e1:75:7a:1e:65:1a"
# Use the NPM registry
- run:
name: Add NPM_TOKEN
command: echo "//registry.npmjs.org/:_authToken=${NPM_TOKEN}" >> ~/.npmrc
- checkout
# Only necessary if app uses webpacker or yarn in some other way
- restore_cache:
keys:
- harvestprofitapicore-yarn-{{ checksum "yarn.lock" }}
- harvestprofitapicore-yarn-
- run:
name: Yarn Install
command: yarn install --cache-folder ~/.cache/yarn
# Store yarn / webpacker cache
- save_cache:
key: harvestprofitapicore-yarn-{{ checksum "yarn.lock" }}
paths:
- ~/.cache/yarn
# run jest tests
- run:
name: Jest Suite
command: yarn test --ci
environment:
JEST_JUNIT_OUTPUT: "test_results/js-test-results.xml"
# Save test results for timing analysis
- store_test_results:
path: test_results
- run:
name: Upload Coverage
command: ./node_modules/.bin/codecov
# Automatically deploy docs to gh-pages
- deploy:
name: Deploy
command: yarn run authenticate && yarn run publish-docs
workflows:
version: 2
jest:
jobs:
- jest
| 24.266667 | 83 | 0.561126 |
7ee3148d6b8903f18ef47361de62335172e70944 | 1,550 | yml | YAML | .github/workflows/ci_tests.yml | henrysky/tfcannon | d55efa2e7afc6a280a14b1e221539150f252a6ab | [
"MIT"
] | null | null | null | .github/workflows/ci_tests.yml | henrysky/tfcannon | d55efa2e7afc6a280a14b1e221539150f252a6ab | [
"MIT"
] | null | null | null | .github/workflows/ci_tests.yml | henrysky/tfcannon | d55efa2e7afc6a280a14b1e221539150f252a6ab | [
"MIT"
] | null | null | null | name: CI
on: [push]
jobs:
test:
if: "!contains(github.event.head_commit.message, '[ci skip]')" # respect [ci skip] commit
runs-on: ubuntu-latest
env:
SDSS_LOCAL_SAS_MIRROR: ./
GAIA_TOOLS_DATA: ./
LASMOT_DR5_DATA: ./
strategy:
fail-fast: false
matrix:
include:
- { TF_VER: 1.15.5, TFP_VER: 0.8.0, ALLOW_FAILURE: false }
- { TF_VER: 1.15.5, TFP_VER: 0.8.0, ALLOW_FAILURE: false }
steps:
- uses: actions/checkout@v2
- name: Set up Python
uses: actions/setup-python@v2
with:
python-version: 3.7
- name: Install dependencies
run: |
pip install tensorflow==${{ matrix.TF_VER }}
pip install tensorflow-probability==${{ matrix.TFP_VER }}
pip install coveralls pytest pytest-cov extension-helpers
python setup.py install
- name: Test tfcannon
continue-on-error: ${{ matrix.ALLOW_FAILURE }}
if: ${{ matrix.PAPER_MODELS == false}}
# Run almost all tests for latest config
run: >
python -m pytest --cov tfcannon --cov-report=xml tests
- name: Upload coverage reports to Codecov
continue-on-error: ${{ matrix.ALLOW_FAILURE }}
uses: codecov/codecov-action@v1
env:
TF_VER: ${{ matrix.TF_VER }}
TFP_VER: ${{ matrix.TFP_VER }}
with:
flags: unittests
env_vars: TF_VER, TFP_VER
name: codecov-tfcannon
fail_ci_if_error: true
verbose: true
| 31.632653 | 94 | 0.57871 |
4885e2770c2f9c7f0bb07131713a446cc45c2507 | 2,339 | yml | YAML | meetup.yml | oevl/ghpages-python-travisci | 3cfdf74ede618645b88c64d5226be635c06f1330 | [
"CC0-1.0"
] | 1 | 2020-01-12T20:57:36.000Z | 2020-01-12T20:57:36.000Z | meetup.yml | oevl/ghpages-python-travisci | 3cfdf74ede618645b88c64d5226be635c06f1330 | [
"CC0-1.0"
] | 1 | 2020-01-12T00:18:32.000Z | 2020-01-12T00:18:40.000Z | meetup.yml | oevl/ghpages-python-ci | 3cfdf74ede618645b88c64d5226be635c06f1330 | [
"CC0-1.0"
] | 1 | 2020-01-12T02:26:00.000Z | 2020-01-12T02:26:00.000Z | Meetup:
Build: OEVL 2020-01-11 19:12
Vol: 35
Fecha: 18 de diciembre de 2019
Hora: "6:30 PM"
Lugar: New York Bagel Café, Vía Argentina
Foto: python-pa-meetup-photo.jpg
Saludo:
Titulo: ¡Hola a todos!
Texto: >
Somos un grupo de personas interesadas en el lenguaje de programación <strong>Python</strong> o cualquier tecnología relacionada. Organizamos eventos mensuales para compartir conocimiento y hacer networking.
Actividades:
Talks:
- Titulo: Blockchains con Python
Expositor: Marta Maleyka ft. Adriaan Beiertz
- Titulo: Basic Excel Operations with Python
Expositor: Santos Rivera
Workshops:
- Titulo:
Expositor:
Networking: >
Los invitamos a que traigan tarjetas de presentación para intercambiar con otros asistentes y generar nuevas conversaciones y contactos.
Datos:
Fecha: Miércoles 11 de diciembre de 2019
Lugar: Salón 254 Universidad Interamericana de Panamá - Sede Av. Ricardo J. Alfaro
Costo: ¡Libre!
Expositores:
- Nombre: José Arnulfo
Foto: staff/arnulfo.jpg
Actividad: MC
- Nombre: Marta Maleyka
Foto: staff/marta.jpg
Actividad: Blockchains with Python
- Nombre: Adriaan Beiertz
Foto: staff/adriaan.jpg
Actividad: "Reto del mes: Blockchain with Python"
- Nombre: Santos Rivera
Foto: speakers/santos.jpg
Actividad: "Basic Excel Operations with Python"
Patrocinantes:
- Logo: logo-new-york-bagel-cafe.jpg
AlturaLogo: 200
Nombre: "New York Bagel Café"
Testimonios:
- Texto: >
Excelente el entusiasmo de todos los presentadores y las oportunidades que brindan a los que desean ser parte de la comunidad.
Nombre: Carol G. Miranda
- Texto: >
Muy buenos, en cada meetup hay un tema distinto, son precisos con sus charlas a pesar de que son pocas horas, la iniciativa de que algunos estudiantes presenten sus proyectos universitarios es bastante buena, aunque sería excelente también ver proyectos profesionales.
Nombre: Eduardo París
- Texto: >
Son una gran experiencia y la idea de compartir de forma real apoya mucho a la comunidad. Son muy organizados, los lugares que escogen son un lujo. Los temas son interesantes y los presentadores demuestran un gran dominio de su área.
Nombre: Fernando Cutire
MeetupURL: https://www.meetup.com/es-ES/Python-Panama/events/266892502/
| 42.527273 | 274 | 0.74348 |
056e07706fe89d50e2533b263adab208bd33a01c | 311 | yml | YAML | spec/data/rails/locales/models/product/en.yml | zoodles/vocab | 7f4fcde77d00055e8cecdc085897cc9280bf6a09 | [
"MIT"
] | 1 | 2016-07-06T17:58:02.000Z | 2016-07-06T17:58:02.000Z | spec/data/rails/locales/models/product/en.yml | zoodles/vocab | 7f4fcde77d00055e8cecdc085897cc9280bf6a09 | [
"MIT"
] | null | null | null | spec/data/rails/locales/models/product/en.yml | zoodles/vocab | 7f4fcde77d00055e8cecdc085897cc9280bf6a09 | [
"MIT"
] | null | null | null | ---
en:
models:
product:
id_125:
description: Green with megawatts
name: Lazer
id_36:
description: Polarized and lazer resistant
name: This nested value has changed
id_55:
description: A new nested description
name: a new nested name
| 22.214286 | 50 | 0.594855 |
a8487ddb78b8615f85807d01e28a10dfa076ffe8 | 148 | yml | YAML | elasticsearch/src/main/resources/application.yml | konghanghang/spring-shiro | 8cad503b9f094c21113fca10ddff7814a31e1192 | [
"MIT"
] | null | null | null | elasticsearch/src/main/resources/application.yml | konghanghang/spring-shiro | 8cad503b9f094c21113fca10ddff7814a31e1192 | [
"MIT"
] | null | null | null | elasticsearch/src/main/resources/application.yml | konghanghang/spring-shiro | 8cad503b9f094c21113fca10ddff7814a31e1192 | [
"MIT"
] | null | null | null | server:
port: 8080
address: 0.0.0.0
elasticsearch:
host: 127.0.0.1:9300
clusterName: datacenter
pool: 5
rest:
host: 127.0.0.1:9200 | 13.454545 | 25 | 0.648649 |
7ac86080f49f4e855bc65e8b8885d4aba59eda2c | 327 | yml | YAML | .codeclimate.yml | ssfdust/smorest-sfs | 139f6817989ab041c81761d183169de20a26597e | [
"Apache-2.0"
] | 8 | 2020-05-11T07:11:03.000Z | 2022-03-25T01:58:18.000Z | .codeclimate.yml | ssfdust/smorest-sfs | 139f6817989ab041c81761d183169de20a26597e | [
"Apache-2.0"
] | null | null | null | .codeclimate.yml | ssfdust/smorest-sfs | 139f6817989ab041c81761d183169de20a26597e | [
"Apache-2.0"
] | 2 | 2020-05-11T03:53:38.000Z | 2021-03-25T01:11:15.000Z | engines:
bandit:
enabled: true
checks:
assert_used:
enabled: false
blacklist:
enabled: false
duplication:
enabled: true
exclude_patterns:
- "tasks/app/db.py"
- "tests/modules/*/resources/test_general_access.py"
- "migrations/"
| 21.8 | 56 | 0.538226 |
b31c307c2b826b344a6a1158cbe6a420985c21b4 | 128 | yaml | YAML | tests/minimal/altair/ssz_static/SyncAggregate/ssz_lengthy/case_13/value.yaml | ethereum/eth2.0-spec-tests | 94b687328daa52071d05d0262ec0a46961bef504 | [
"MIT"
] | 30 | 2019-04-25T20:14:27.000Z | 2021-04-16T06:08:26.000Z | tests/minimal/altair/ssz_static/SyncAggregate/ssz_lengthy/case_13/value.yaml | ethereum/eth2.0-spec-tests | 94b687328daa52071d05d0262ec0a46961bef504 | [
"MIT"
] | 19 | 2019-05-06T18:05:44.000Z | 2020-12-18T17:04:02.000Z | tests/minimal/altair/ssz_static/SyncAggregate/ssz_lengthy/case_13/value.yaml | ethereum/eth2.0-spec-tests | 94b687328daa52071d05d0262ec0a46961bef504 | [
"MIT"
] | 8 | 2019-05-01T00:05:46.000Z | 2021-03-21T18:36:02.000Z | version https://git-lfs.github.com/spec/v1
oid sha256:0e8d4a8041f77146440d23359e69ce0b6e4a8cd55884fc36c8a5fc4024079751
size 260
| 32 | 75 | 0.882813 |
c2c4398e6e7ef1b4dcf9de091286e291e80f41f0 | 1,332 | yaml | YAML | install/kubernetes/helm/subcharts/certmanager/templates/rbac.yaml | PinZhang/istio | dce455456d77ca5af34ba5848f9704577349c6bd | [
"Apache-2.0"
] | 40 | 2018-10-24T18:56:01.000Z | 2021-12-30T22:05:33.000Z | install/kubernetes/helm/subcharts/certmanager/templates/rbac.yaml | PinZhang/istio | dce455456d77ca5af34ba5848f9704577349c6bd | [
"Apache-2.0"
] | 17 | 2019-01-11T05:57:35.000Z | 2019-08-29T05:33:38.000Z | install/kubernetes/helm/subcharts/certmanager/templates/rbac.yaml | PinZhang/istio | dce455456d77ca5af34ba5848f9704577349c6bd | [
"Apache-2.0"
] | 14 | 2018-11-09T19:17:26.000Z | 2021-12-16T16:36:24.000Z | apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: certmanager
labels:
app: certmanager
chart: {{ template "certmanager.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
rules:
- apiGroups: ["certmanager.k8s.io"]
resources: ["certificates", "issuers", "clusterissuers"]
verbs: ["*"]
- apiGroups: [""]
# TODO: remove endpoints once 0.4 is released. We include it here in case
# users use the 'master' version of the Helm chart with a 0.2.x release of
# certManager that still performs leader election with Endpoint resources.
# We advise users don't do this, but some will anyway and this will reduce
# friction.
resources: ["endpoints", "configmaps", "secrets", "events", "services", "pods"]
verbs: ["*"]
- apiGroups: ["extensions"]
resources: ["ingresses"]
verbs: ["*"]
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: certmanager
labels:
app: certmanager
chart: {{ template "certmanager.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: certmanager
subjects:
- name: certmanager
namespace: {{ .Release.Namespace }}
kind: ServiceAccount
| 30.976744 | 83 | 0.673423 |
1b22ffafd8c8c6b28f8bd26ca1890dc6424af142 | 554 | yaml | YAML | redhat/mec/racing/guangzhou/last.time/zw-rtmp-server-svc.yaml | scwang18/docker_env | 1f2f2f71f897f904be3663e9c13ad3b3f6144460 | [
"Apache-2.0"
] | null | null | null | redhat/mec/racing/guangzhou/last.time/zw-rtmp-server-svc.yaml | scwang18/docker_env | 1f2f2f71f897f904be3663e9c13ad3b3f6144460 | [
"Apache-2.0"
] | 3 | 2020-11-16T20:44:59.000Z | 2022-02-01T01:03:38.000Z | redhat/mec/racing/guangzhou/last.time/zw-rtmp-server-svc.yaml | sphinxs329/OpenShift-Disconn | 65de96990991a595d3de6fb4ad356055d5cc6498 | [
"Apache-2.0"
] | null | null | null | apiVersion: v1
kind: Service
metadata:
creationTimestamp: '2019-09-16T06:38:40Z'
name: zw-rtmp-server
namespace: zhuowang
resourceVersion: '4170549'
selfLink: /api/v1/namespaces/zhuowang/services/zw-rtmp-server
uid: 9ede221f-d84c-11e9-bf41-04fe8dbed9ee
spec:
clusterIP: 172.130.173.152
externalTrafficPolicy: Cluster
ports:
- nodePort: 32022
port: 9999
protocol: TCP
targetPort: 9999
selector:
zw-rtmp-server: 'true'
sessionAffinity: None
type: NodePort
status:
loadBalancer: {}
| 23.083333 | 64 | 0.689531 |
14ba6cd8dba34321cfa435ad929cb4e3b5fd9489 | 412 | yml | YAML | manifest.test.yml | venicegeo/dg-pz-servicecontroller2 | c2583363dca7c00ff3a4bad27706329ce602e343 | [
"Apache-2.0"
] | null | null | null | manifest.test.yml | venicegeo/dg-pz-servicecontroller2 | c2583363dca7c00ff3a4bad27706329ce602e343 | [
"Apache-2.0"
] | null | null | null | manifest.test.yml | venicegeo/dg-pz-servicecontroller2 | c2583363dca7c00ff3a4bad27706329ce602e343 | [
"Apache-2.0"
] | null | null | null | applications:
- name: pz-servicecontroller
host: pz-servicecontroller
path: pz-servicecontroller.jar
buildpack: https://github.com/cloudfoundry/java-buildpack.git
memory: 1024M
instances: 1
timeout: 80
services:
- pz-kafka
- pz-mongodb
- pz-elasticsearch
env:
SPRING_PROFILES_ACTIVE: cloud
JBP_CONFIG_OPEN_JDK_JRE: '{ memory_calculator : { memory_sizes : { heap : 768m } } }'
| 25.75 | 89 | 0.713592 |
af0746d69dc314ae4c2d9a0de7519ec10b878f4f | 252 | yaml | YAML | test/spark/historyserver_3.2.yaml | y0psolo/YAD | 0f1f9c5140687345dee591667793d6f8ed6e29e5 | [
"Apache-2.0"
] | 1 | 2021-11-05T09:13:57.000Z | 2021-11-05T09:13:57.000Z | test/spark/historyserver_3.1.yaml | y0psolo/YAD | 0f1f9c5140687345dee591667793d6f8ed6e29e5 | [
"Apache-2.0"
] | 9 | 2021-12-02T13:25:52.000Z | 2022-01-26T14:24:05.000Z | test/spark/historyserver_3.2.yaml | y0psolo/YAD | 0f1f9c5140687345dee591667793d6f8ed6e29e5 | [
"Apache-2.0"
] | null | null | null | schemaVersion: "2.0.0"
commandTests:
- name: historyserver
command: "/usr/bin/tini"
args: ["--", "/opt/spark/bin/spark-class", "org.apache.spark.deploy.history.HistoryServer", "--help",]
exitCode: 0
metadataTest:
exposedPorts: ["18080"] | 31.5 | 106 | 0.670635 |
7baa1a3611c4e32e77faf8a51430786d214685bb | 130 | yaml | YAML | tests/minimal/altair/ssz_static/LightClientStore/ssz_lengthy/case_6/value.yaml | protolambda/eth2.0-spec-tests | 5be1cdb5c1ae88253f35e59392b21db0dce53620 | [
"MIT"
] | 1 | 2019-04-19T18:50:21.000Z | 2019-04-19T18:50:21.000Z | tests/minimal/altair/ssz_static/LightClientStore/ssz_lengthy/case_6/value.yaml | protolambda/eth2.0-spec-tests | 5be1cdb5c1ae88253f35e59392b21db0dce53620 | [
"MIT"
] | null | null | null | tests/minimal/altair/ssz_static/LightClientStore/ssz_lengthy/case_6/value.yaml | protolambda/eth2.0-spec-tests | 5be1cdb5c1ae88253f35e59392b21db0dce53620 | [
"MIT"
] | null | null | null | version https://git-lfs.github.com/spec/v1
oid sha256:80b1e57d697f9fa8a12d4199c3da7303e1b804ba383b48b2899fbd64b7b62619
size 63047
| 32.5 | 75 | 0.884615 |
6c003940495e6b715618ff795d56684f13ec05bf | 2,071 | yml | YAML | tasks/initialize.yml | sourceshift/ansible-play-hashicorp-vault | 3c727db2677152e3675f1f45dd885db8f4aa2cbc | [
"MIT"
] | null | null | null | tasks/initialize.yml | sourceshift/ansible-play-hashicorp-vault | 3c727db2677152e3675f1f45dd885db8f4aa2cbc | [
"MIT"
] | null | null | null | tasks/initialize.yml | sourceshift/ansible-play-hashicorp-vault | 3c727db2677152e3675f1f45dd885db8f4aa2cbc | [
"MIT"
] | null | null | null | - name: Vault Initialize | Fail if vault is already Initialized
fail:
msg: "Vault is already initialized"
when: pv_vault_health_status.json.initialized
- name: Vault Initialize | Initialize vault
uri:
url: "{{ rv_hashicorp_vault_post_install_action_api_addr }}/v1/sys/init"
method: POST
return_content: yes
body_format: json
validate_certs: false
body:
secret_shares: "{{ rv_hashicorp_vault_post_install_action_initialize_share }}"
secret_threshold: "{{ rv_hashicorp_vault_post_install_action_initialize_threshold }}"
status_code: [200]
register: pv_vault_init_status
- name: Vault Initialize | Get Vault Root Token and Unseal Keys
set_fact:
rv_hashicorp_vault_post_install_action_setup_unseal_keys: "{{ pv_vault_init_status.json['keys'] }}"
rv_hashicorp_vault_post_install_action_setup_privileged_token: "{{ pv_vault_init_status.json['root_token'] }}"
- name: Vault Initialize | Creating Vault Initialize secret directories
file:
path: "{{ rv_hashicorp_vault_post_install_action_initialize_secrets_directory }}"
state: directory
mode: "0755"
owner: "{{ rv_hashicorp_vault_os_user }}"
- name: Vault Initialize | Write Unseal Keys to directory "{{ rv_hashicorp_vault_post_install_action_initialize_secrets_directory }}"
copy:
content: "{{ rv_hashicorp_vault_post_install_action_setup_unseal_keys | to_json }}"
owner: "{{ rv_hashicorp_vault_os_user }}"
group: "{{ rv_hashicorp_vault_os_user }}"
mode: "0755"
dest: "{{ rv_hashicorp_vault_post_install_action_initialize_secrets_directory }}/unseal_keys.json"
- name: Vault Initialize | Write Root Token to directory "{{ rv_hashicorp_vault_post_install_action_initialize_secrets_directory }}"
copy:
content: "{{ rv_hashicorp_vault_post_install_action_setup_privileged_token }}"
owner: "{{ rv_hashicorp_vault_os_user }}"
group: "{{ rv_hashicorp_vault_os_user }}"
mode: "0755"
dest: "{{ rv_hashicorp_vault_post_install_action_initialize_secrets_directory }}/root_token.json"
| 45.021739 | 134 | 0.759054 |
7560188f85157235bbf97c85febab469ebc21162 | 28,234 | yml | YAML | acs-integration-tests/uaa/config/uaa.yml | anubhavi25/keti | 285400fba42c687bb42bf4e537ae6f9eca4bf4df | [
"Apache-2.0"
] | 30 | 2016-05-10T17:47:04.000Z | 2021-06-22T03:52:31.000Z | acs-integration-tests/uaa/config/uaa.yml | anubhavi25/keti | 285400fba42c687bb42bf4e537ae6f9eca4bf4df | [
"Apache-2.0"
] | 126 | 2016-04-21T20:45:51.000Z | 2018-01-18T00:02:19.000Z | acs-integration-tests/uaa/config/uaa.yml | anubhavi25/keti | 285400fba42c687bb42bf4e537ae6f9eca4bf4df | [
"Apache-2.0"
] | 18 | 2016-05-10T17:47:06.000Z | 2020-08-04T21:44:28.000Z | # Configuration in this file ixs overridden by an external file
# if any of these exist:
# [$UAA_CONFIG_URL, $UAA_CONFIG_PATH/uaa.yml, $CLOUD_FOUNDRY_CONFIG_PATH/uaa.yml]
#spring_profiles: mysql,default,ldap
#spring_profiles: postgresql,default
#spring_profiles: ldap,default,hsqldb
#spring_profiles: saml
#spring_profiles: keystone,default,hsqldb
#database:
# driverClassName: org.postgresql.Driver
# url: jdbc:postgresql:uaa
# username: pivotal
# password:
# maxactive: 100
# maxidle: 10
# minidle: 3
# removeabandoned: false
# logabandoned: true
# abandonedtimeout: 300
# evictionintervalms: 15000
# caseinsensitive: false
#note - this is not the place to set these properties
# - they are just here for documentation purposes
#database.driverClassName: org.postgresql.Driver
#database.url: jdbc:postgresql:uaa
#database.username: root
#database.password: changeme
#MS SQL Server Install https://docs.microsoft.com/en-us/sql/linux/sql-server-linux-setup-ubuntu
#sqlserver commands are (first command is to allow contained user authentication for a DB
#sp_configure 'contained database authentication', 1
#go
#RECONFIGURE
#go
#CREATE DATABASE uaa CONTAINMENT = PARTIAL;
#go
#USE uaa;
#go
#CREATE USER root WITH PASSWORD = 'changemeCHANGEME1234!';
#go
#EXEC sp_addrolemember N'db_owner', N'root';
#go
#postgresql commands that were run were
#create database uaa;
#create user root with superuser password 'changeme';
#database:
# driverClassName: org.mariadb.jdbc.Driver
# url: jdbc:mysql://localhost:8080/uaa
# username: root
# password: blabla
#mysql commands that were run
#create database uaa;
#SET PASSWORD FOR 'root'@'localhost' = PASSWORD('changeme');
#CREATE USER 'root'@'127.0.0.1';
#GRANT ALL TO 'root'@'127.0.0.1' WITH GRANT OPTION;
#SET PASSWORD FOR 'root'@'127.0.0.1' = PASSWORD('changeme');
# A comprehensive list of hostnames routed to the UAA default zone. The UAA uses this to resolve subdomains for Identity Zones.
# Defaults to 'localhost'
#zones:
# internal:
# hostnames:
# - host1.domain.com
# - host2
# - testzone3.localhost
# - testzone4.localhost
#authentication:
# policy:
# lockoutAfterFailures: 5
# countFailuresWithinSeconds: 3600
# lockoutPeriodSeconds: 600
# Set this property to true for disabling authentication via the internal IDP. Defaults to false.
#disableInternalAuth: false
# Set this property to true for disabling access to user management endpoints and controllers. Defaults to false.
#disableInternalUserManagement: true
#keystone:
# authentication:
# url: http://localhost:35357/v2.0/tokens
# url: http://localhost:5000/v3/auth/tokens
#ldap:
# profile:
# file: ldap/ldap-simple-bind.xml
# base:
# url: 'ldaps://192.168.3.39:10636/'
# userDnPattern: 'cn={0},ou=Users,dc=test,dc=com;cn={0},ou=OtherUsers,dc=example,dc=com'
# ssl:
# skipverification: false
# sslCertificate: ! '-----BEGIN CERTIFICATE-----
# MIIBfTCCAScCBgFDfaC2yzANBgkqhkiG9w0BAQUFADBCMQswCQYDVQQGEwJVUzEMMAoGA1UEChMD
# QVNGMRIwEAYDVQQLEwlEaXJlY3RvcnkxETAPBgNVBAMTCEFwYWNoZURTMB4XDTE0MDExMDE5Mjg0
# MVoXDTE1MDExMDE5Mjg0MVowTDELMAkGA1UEBhMCVVMxDDAKBgNVBAoTA0FTRjESMBAGA1UECxMJ
# RGlyZWN0b3J5MRswGQYDVQQDExJmaGFuaWstd29ya3N0YXRpb24wXDANBgkqhkiG9w0BAQEFAANL
# ADBIAkEAuA6Nmto6NFCCJ+CwsBnT2cvMxuYgf26iZ3ckIpLhs2V4ZJ4PFinR6JZUsVnRp0RbYoV5
# iW6F91XDTVtAMtDTJwIDAQABMA0GCSqGSIb3DQEBBQUAA0EATFGpEIprKYcnc+JuNcSQ8v2P2J7e
# lQ23NhTaljASF0g8AZ7SZEItU8JFYqf/KnNJ7FPwo4LbMbr7Zg6BRKBvnQ==
# -----END CERTIFICATE-----'
# sslCertificateAlias: ldaps
# tls: <none | simple | external>
# externalGroupsWhitelist:
# - admin
# - user
# emailDomain:
# - example.com
# attributeMappings:
# given_name: givenname
# family_name: sn
# phone_number: telephonenumber
# user.attribute.employeeCostCenter: costCenter
# user.attribute.terribleBosses: uaaManager
# providerDescription: 'Human readable description of this provider'
#ldap:
# profile:
# file: ldap/ldap-search-and-bind.xml
# base:
# url: 'ldap://localhost:389/'
# userDn: 'cn=admin,dc=test,dc=com'
# password: 'password'
# searchBase: 'dc=test,dc=com'
# searchFilter: 'cn={0}'
# referral: follow
# groups:
# file: 'ldap/ldap-groups-map-to-scopes.xml'
# searchBase: 'dc=test,dc=com'
# groupSearchFilter: 'member={0}'
# searchSubtree: true
# maxSearchDepth: 10
# autoAdd: true
# ignorePartialResultException: true
#ldap:
# profile:
# file: ldap/ldap-search-and-compare.xml
# base:
# url: 'ldap://localhost:10389/'
# userDn: 'cn=admin,dc=test,dc=com'
# password: 'password'
# searchBase: ''
# searchFilter: 'cn={0}'
# passwordAttributeName: userPassword
# passwordEncoder: org.cloudfoundry.identity.uaa.provider.ldap.DynamicPasswordComparator
# localPasswordCompare: true
#password:
# policy:
# minLength: 0
# maxLength: 128
# requireUpperCaseCharacter: 0
# requireLowercaseCharacter: 0
# requireDigit: 0
# requireSpecialCharacter: 0
# expirePasswordInMonths: 0
scim:
groups:
zones.read: Read identity zones
zones.write: Create and update identity zones
idps.read: Retrieve identity providers
idps.write: Create and update identity providers
clients.admin: Create, modify and delete OAuth clients
clients.write: Create and modify OAuth clients
clients.read: Read information about OAuth clients
clients.secret: Change the password of an OAuth client
scim.write: Create, modify and delete SCIM entities, i.e. users and groups
scim.read: Read all SCIM entities, i.e. users and groups
scim.create: Create users
scim.userids: Read user IDs and retrieve users by ID
scim.zones: Control a user's ability to manage a zone
scim.invite: Send invitations to users
password.write: Change your password
oauth.approval: Manage approved scopes
oauth.login: Authenticate users outside of the UAA
openid: Access profile information, i.e. email, first and last name, and phone number
groups.update: Update group information and memberships
uaa.user: Act as a user in the UAA
uaa.resource: Serve resources protected by the UAA
uaa.admin: Act as an administrator throughout the UAA
uaa.none: Forbid acting as a user
uaa.offline_token: Allow offline access
oauth:
user:
authorities:
- openid
- scim.me
- cloud_controller.read
- cloud_controller.write
- cloud_controller_service_permissions.read
- password.write
- scim.userids
- uaa.user
- approvals.me
- oauth.approvals
- profile
- roles
- user_attributes
- uaa.offline_token
# List of OAuth clients
clients:
admin:
id: admin
secret: adminsecret
authorized-grant-types: client_credentials
scope: none
authorities: uaa.admin,clients.admin,clients.read,clients.write,clients.secre
# client:
# secret:
# policy:
# minLength: 0
# maxLength: 128
# requireUpperCaseCharacter: 0
# requireLowerCaseCharacter: 0
# requireDigit: 0
# requireSpecialCharacter: 0
# Default token signing key. Each installation MUST provide a unique key
# in order for tokens to be usable only on that installation.
jwt:
token:
verification-key: |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0m59l2u9iDnMbrXHfqkO
rn2dVQ3vfBJqcDuFUK03d+1PZGbVlNCqnkpIJ8syFppW8ljnWweP7+LiWpRoz0I7
fYb3d8TjhV86Y997Fl4DBrxgM6KTJOuE/uxnoDhZQ14LgOU2ckXjOzOdTsnGMKQB
LCl0vpcXBtFLMaSbpv1ozi8h7DJyVZ6EnFQZUWGdgTMhDrmqevfx95U/16c5WBDO
kqwIn7Glry9n9Suxygbf8g5AzpWcusZgDLIIZ7JTUldBb8qU2a0Dl4mvLZOn4wPo
jfj9Cw2QICsc5+Pwf21fP+hzf+1WSRHbnYv8uanRO0gZ8ekGaghM/2H6gqJbo2nI
JwIDAQAB
-----END PUBLIC KEY-----
signing-key: |
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
# claims:
# exclude:
# - authorities
# policy:
# # Will override global validity policies for the default zone only.
# accessTokenValiditySeconds: 3600
# refreshTokenValiditySeconds: 3600
# activeKeyId: key-id-1
# keys:
# key-id-1:
# signingKey: |
# -----BEGIN RSA PRIVATE KEY-----
# MIIEowIBAAKCAQEA0m59l2u9iDnMbrXHfqkOrn2dVQ3vfBJqcDuFUK03d+1PZGbV
# lNCqnkpIJ8syFppW8ljnWweP7+LiWpRoz0I7fYb3d8TjhV86Y997Fl4DBrxgM6KT
# JOuE/uxnoDhZQ14LgOU2ckXjOzOdTsnGMKQBLCl0vpcXBtFLMaSbpv1ozi8h7DJy
# VZ6EnFQZUWGdgTMhDrmqevfx95U/16c5WBDOkqwIn7Glry9n9Suxygbf8g5AzpWc
# usZgDLIIZ7JTUldBb8qU2a0Dl4mvLZOn4wPojfj9Cw2QICsc5+Pwf21fP+hzf+1W
# SRHbnYv8uanRO0gZ8ekGaghM/2H6gqJbo2nIJwIDAQABAoIBAHPV9rSfzllq16op
# zoNetIJBC5aCcU4vJQBbA2wBrgMKUyXFpdSheQphgY7GP/BJTYtifRiS9RzsHAYY
# pAlTQEQ9Q4RekZAdd5r6rlsFrUzL7Xj/CVjNfQyHPhPocNqwrkxp4KrO5eL06qcw
# UzT7UtnoiCdSLI7IL0hIgJZP8J1uPNdXH+kkDEHE9xzU1q0vsi8nBLlim+ioYfEa
# Q/Q/ovMNviLKVs+ZUz+wayglDbCzsevuU+dh3Gmfc98DJw6n6iClpd4fDPqvhxUO
# BDeQT1mFeHxexDse/kH9nygxT6E4wlU1sw0TQANcT6sHReyHT1TlwnWlCQzoR3l2
# RmkzUsECgYEA8W/VIkfyYdUd5ri+yJ3iLdYF2tDvkiuzVmJeA5AK2KO1fNc7cSPK
# /sShHruc0WWZKWiR8Tp3d1XwA2rHMFHwC78RsTds+NpROs3Ya5sWd5mvmpEBbL+z
# cl3AU9NLHVvsZjogmgI9HIMTTl4ld7GDsFMt0qlCDztqG6W/iguQCx8CgYEA3x/j
# UkP45/PaFWd5c1DkWvmfmi9UxrIM7KeyBtDExGIkffwBMWFMCWm9DODw14bpnqAA
# jH5AhQCzVYaXIdp12b+1+eOOckYHwzjWOFpJ3nLgNK3wi067jVp0N0UfgV5nfYw/
# +YoHfYRCGsM91fowh7wLcyPPwmSAbQAKwbOZKfkCgYEAnccDdZ+m2iA3pitdIiVr
# RaDzuoeHx/IfBHjMD2/2ZpS1aZwOEGXfppZA5KCeXokSimj31rjqkWXrr4/8E6u4
# PzTiDvm1kPq60r7qi4eSKx6YD15rm/G7ByYVJbKTB+CmoDekToDgBt3xo+kKeyna
# cUQqUdyieunM8bxja4ca3ukCgYAfrDAhomJ30qa3eRvFYcs4msysH2HiXq30/g0I
# aKQ12FSjyZ0FvHEFuQvMAzZM8erByKarStSvzJyoXFWhyZgHE+6qDUJQOF6ruKq4
# DyEDQb1P3Q0TSVbYRunOWrKRM6xvJvSB4LUVfSvBDsv9TumKqwfZDVFVn9yXHHVq
# b6sjSQKBgDkcyYkAjpOHoG3XKMw06OE4OKpP9N6qU8uZOuA8ZF9ZyR7vFf4bCsKv
# QH+xY/4h8tgL+eASz5QWhj8DItm8wYGI5lKJr8f36jk0JLPUXODyDAeN6ekXY9LI
# fudkijw0dnh28LJqbkFF5wLNtATzyCfzjp+czrPMn9uqLNKt/iVD
# -----END RSA PRIVATE KEY-----
# # Sets the default validity for all zones
# global:
# accessTokenValiditySeconds: 3600
# refreshTokenValiditySeconds: 3600
# # This is a feature flag to turn on/off the refresh token issuance behavior. If set to true, the refresh token is only granted to clients with a scope of refresh_token for offline access.
# refresh:
# restrict_grant: true
# unique: false
# format: jwt
# Configure whitelist for allowing cross-origin XMLHttpRequest requests.
#cors:
# xhr:
# allowed:
# headers:
# - Accept
# - Authorization
# - Content-Type
# - X-Requested-With
# origin:
# - ^localhost$
# - ^.*\.localhost$
# uris:
# - ^/uaa/userinfo$
# - ^/uaa/logout\.do$
# methods:
# - GET
# - OPTIONS
# default:
# allowed:
# headers:
# - Accept
# - Authorization
# - Content-Type
# - X-Requested-With
# origin:
# - ^localhost$
# - ^.*\.localhost$
# uris:
# - ^/uaa/userinfo$
# - ^/uaa/logout\.do$
# methods:
# - GET
# - PUT
# - POST
# - DELETE
# Deprecated: More to follow
# customize static asset source, provides control over visual branding
# (defaults to /resources/oss)
assetBaseUrl: /resources/predix
#tiles:
# - name: Pivotal Network
# login-link: https://network.gopivotal.com/login
# image: /resources/pivotal/images/network-logo-gray.png
# - name: Pivotal Web Services
# login-link: https://console.10.244.0.34.xip.io
# image: /resources/pivotal/images/pws-logo-gray.png
# - name: Pivotal Partners
# login-link: https://partners.gopivotal.com/login
# image: /resources/pivotal/images/partners-logo-gray.png
#links:
# Custom self service links (will only be displayed if selfServiceLinksEnabled is true)
# If selfServiceLinksEnabled is true and these custom links are not provided then the Login Server
# will use internal links.
# passwd: /forgot_password
# signup: /create_account
#notifications:
# url: http://localhost:3001
#logout:
# redirect:
# url: /login
# parameter:
# whitelist:
# - https://url1.domain1.com/logout-success
# - https://url2.domain2.com/logout-success
login:
# Enable create account and forgot password links on the Login Server (enabled by default)
#selfServiceLinksEnabled: true
#base URL that the login server can be reached at
# oauth:
# providers:
# my-oauth-provider:
# type: oauth2.0
# authUrl: http://my-auth.com
# tokenUrl: http://my-token.com
# tokenKey: my-token-key
# tokenKeyUrl:
# issuer: token issuer (iss)
# scopes:
# - openid
# - scope.example
# emailDomain:
# - example.com
# linkText: My Oauth Provider
# showLinkText: true
# addShadowUserOnLogin: false
# relyingPartyId: uaa
# relyingPartySecret: secret
# attributeMappings:
# given_name: firstName
# family_name: lastname
# user_name: username
# external_groups:
# - scopes_example_group
# - roles_example_group
url: http://localhost:8080/uaa
# idpDiscoveryEnabled: true
# accountChooserEnabled: true
# SAML Key Configuration
# The location and credentials of the certificate for this SP
# See README.md for details on how to create this.
serviceProviderKey: |
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
serviceProviderKeyPassword: password
serviceProviderCertificate: |
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
# SAML - The entity base url is the location of this application
# (The host and port of the application that will accept assertions)
entityBaseURL: http://localhost:8080/uaa
# The entityID of this SP
entityID: cloudfoundry-saml-login
saml:
#Entity ID Alias to login at /saml/SSO/alias/{login.saml.entityIDAlias}
#entityIDAlias: cloudfoundry-saml-login
#Default nameID if IDP nameID is not set
nameID: 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'
#Default assertionConsumerIndex if IDP value is not set
assertionConsumerIndex: 0
#Local/SP metadata - sign metadata
signMetaData: true
#Local/SP metadata - requests signed
signRequest: true
#Local/SP metadata - want incoming assertions signed
#wantAssertionSigned: true
#Algorithm for SAML signatures. Defaults to SHA1. Accepts SHA1, SHA256, SHA512
#signatureAlgorithm: SHA256
socket:
# URL metadata fetch - pool timeout
connectionManagerTimeout: 10000
# URL metadata fetch - read timeout
soTimeout: 10000
#BEGIN SAML PROVIDERS
# providers:
# okta-signed-or-encrypted:
# idpMetadata: |
# <?xml version="1.0" encoding="UTF-8"?><md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="http://www.okta.com/k36wkjw6EAEJVZXFFDAU"><md:IDPSSODescriptor WantAuthnRequestsSigned="true" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"><md:KeyDescriptor use="signing"><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:X509Data><ds:X509Certificate>MIICmTCCAgKgAwIBAgIGAUPATqmEMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYDVQQGEwJVUzETMBEG
# A1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEU
# MBIGA1UECwwLU1NPUHJvdmlkZXIxEDAOBgNVBAMMB1Bpdm90YWwxHDAaBgkqhkiG9w0BCQEWDWlu
# Zm9Ab2t0YS5jb20wHhcNMTQwMTIzMTgxMjM3WhcNNDQwMTIzMTgxMzM3WjCBjzELMAkGA1UEBhMC
# VVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNVBAoM
# BE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRAwDgYDVQQDDAdQaXZvdGFsMRwwGgYJKoZIhvcN
# AQkBFg1pbmZvQG9rdGEuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCeil67/TLOiTZU
# WWgW2XEGgFZ94bVO90v5J1XmcHMwL8v5Z/8qjdZLpGdwI7Ph0CyXMMNklpaR/Ljb8fsls3amdT5O
# Bw92Zo8ulcpjw2wuezTwL0eC0wY/GQDAZiXL59npE6U+fH1lbJIq92hx0HJSru/0O1q3+A/+jjZL
# 3tL/SwIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAI5BoWZoH6Mz9vhypZPOJCEKa/K+biZQsA4Zqsuk
# vvphhSERhqk/Nv76Vkl8uvJwwHbQrR9KJx4L3PRkGCG24rix71jEuXVGZUsDNM3CUKnARx4MEab6
# GFHNkZ6DmoT/PFagngecHu+EwmuDtaG0rEkFrARwe+d8Ru0BN558abFb</ds:X509Certificate></ds:X509Data></ds:KeyInfo></md:KeyDescriptor><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</md:NameIDFormat><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://pivotal.oktapreview.com/app/pivotal_cfsamltemplate1_1/k36wkjw6EAEJVZXFFDAU/sso/saml"/><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://pivotal.oktapreview.com/app/pivotal_cfsamltemplate1_1/k36wkjw6EAEJVZXFFDAU/sso/saml"/></md:IDPSSODescriptor></md:EntityDescriptor>
# nameID: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
# assertionConsumerIndex: 0
# metadataTrustCheck: true
# showSamlLoginLink: true
# linkText: 'Okta Preview Signed'
# okta-local:
# idpMetadata: https://pivotal.oktapreview.com/app/k36wkjw6EAEJVZXFFDAU/sso/saml/metadata
# nameID: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
# assertionConsumerIndex: 0
# metadataTrustCheck: true
# showSamlLoginLink: true
# linkText: 'Okta Preview 1'
# iconUrl: 'http://link.to/icon.jpg'
# addShadowUserOnLogin: true
# externalGroupsWhitelist:
# - admin
# - user
# emailDomain:
# - example.com
# attributeMappings:
# given_name: firstName
# family_name: surname
# providerDescription: 'Human readable description of this provider'
# okta-local-2:
# idpMetadata: |
# <?xml version="1.0" encoding="UTF-8"?><md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="http://www.okta.com/k2lw4l5bPODCMIIDBRYZ"><md:IDPSSODescriptor WantAuthnRequestsSigned="true" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"><md:KeyDescriptor use="signing"><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:X509Data><ds:X509Certificate>MIICmTCCAgKgAwIBAgIGAUPATqmEMA0GCSqGSIb3DQEBBQUAMIGPMQswCQYDVQQGEwJVUzETMBEG
# A1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEU
# MBIGA1UECwwLU1NPUHJvdmlkZXIxEDAOBgNVBAMMB1Bpdm90YWwxHDAaBgkqhkiG9w0BCQEWDWlu
# Zm9Ab2t0YS5jb20wHhcNMTQwMTIzMTgxMjM3WhcNNDQwMTIzMTgxMzM3WjCBjzELMAkGA1UEBhMC
# VVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNVBAoM
# BE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRAwDgYDVQQDDAdQaXZvdGFsMRwwGgYJKoZIhvcN
# AQkBFg1pbmZvQG9rdGEuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCeil67/TLOiTZU
# WWgW2XEGgFZ94bVO90v5J1XmcHMwL8v5Z/8qjdZLpGdwI7Ph0CyXMMNklpaR/Ljb8fsls3amdT5O
# Bw92Zo8ulcpjw2wuezTwL0eC0wY/GQDAZiXL59npE6U+fH1lbJIq92hx0HJSru/0O1q3+A/+jjZL
# 3tL/SwIDAQABMA0GCSqGSIb3DQEBBQUAA4GBAI5BoWZoH6Mz9vhypZPOJCEKa/K+biZQsA4Zqsuk
# vvphhSERhqk/Nv76Vkl8uvJwwHbQrR9KJx4L3PRkGCG24rix71jEuXVGZUsDNM3CUKnARx4MEab6
# GFHNkZ6DmoT/PFagngecHu+EwmuDtaG0rEkFrARwe+d8Ru0BN558abFb</ds:X509Certificate></ds:X509Data></ds:KeyInfo></md:KeyDescriptor><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat><md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</md:NameIDFormat><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://pivotal.oktapreview.com/app/pivotal_pivotalcfstaging_1/k2lw4l5bPODCMIIDBRYZ/sso/saml"/><md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://pivotal.oktapreview.com/app/pivotal_pivotalcfstaging_1/k2lw4l5bPODCMIIDBRYZ/sso/saml"/></md:IDPSSODescriptor></md:EntityDescriptor>
# nameID: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
# assertionConsumerIndex: 0
# metadataTrustCheck: true
# showSamlLoginLink: true
# linkText: 'Okta Preview 2'
# addShadowUserOnLogin: true
# vsphere.local:
# idpMetadata: https://win2012-sso2.localdomain:7444/websso/SAML2/Metadata/vsphere.local
# nameID: urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
# assertionConsumerIndex: 0
# showSamlLoginLink: true
# linkText: 'Log in with vCenter SSO'
# addShadowUserOnLogin: true
# groupMappingMode: EXPLICITLY_MAPPED
# openam-local:
# idpMetadata: http://localhost:8081/openam/saml2/jsp/exportmetadata.jsp?entityid=http://localhost:8081/openam
# nameID: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
# assertionConsumerIndex: 0
# signMetaData: false
# signRequest: false
# showSamlLoginLink: true
# linkText: 'Log in with OpenAM'
# addShadowUserOnLogin: true
# groupMappingMode: AS_SCOPES
#END SAML PROVIDERS
authorize:
url: http://localhost:8080/uaa/oauth/authorize
uaa:
# The hostname of the UAA that this login server will connect to
url: http://localhost:8080/uaa
token:
url: http://localhost:8080/uaa/oauth/token
approvals:
url: http://localhost:8080/uaa/approvals
login:
url: http://localhost:8080/uaa/authenticate
limitedFunctionality:
enabled: false
whitelist:
endpoints:
- /oauth/authorize/**
- /oauth/token/**
- /check_token/**
- /login/**
- /login.do
- /logout/**
- /logout.do
- /saml/**
- /autologin/**
- /authenticate/**
- /idp_discovery/**
methods:
- GET
- HEAD
- OPTIONS
issuer:
uri: http://localhost:8080/uaa
# Google Analytics
#analytics:
# code: secret_code
# domain: example.com
#smtp:
# host: localhost
# port: 2525
# user:
# password:
branding:
companyName: Predix
# productLogo: |
# iVBORw0KGgoAAAANSUhEUgAAAR8AAAFoCAYAAABucP80AAAABGdBTUEAALGPC/xhBQAAAAFzUkdCAK7OHOkAAAAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAAZiS0dEAAAAAAAA+UO7fwAAAAlwSFlzAAALEgAACxIB0t1+/AAAZKVJREFUeNrtnXecXkX1/99n5j5lWyqQ0EJHepdeAgHpRZqKKILg15+9IVIEQhMExYJdsQPSVDoCAkrvPfQAARLSk21PuXPO74+7kc1md/PsZpdNmffr9bz22Vtm7tznzufOnDlzBiKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJBKJRCKRSCQSiUQikUgkEolEIpFIJDIAyFBfQGTpZrvz9yGUqwRTMEDJnhrXy0n6/leR7PikkOfxM+4c6uJEliKi+ES6ZdvzJxDKASsrT8+cxGajNiyYWSNKHY4cgiN7fhZ87H8fJQBVM9px2tpUt3K5rTKHpJDgCp7HT79rqIsXWPY92jEwd/quP0D6/vZiS+7SonQE8b9iZ9U08VtGC3fql2znwF/tiqeJECKWUXM4VBFvHOdmSrGW1qxMU4U5BrjHjwYYRSSkB2tp
# squareLogo: |
# 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
footerLegalText: "Copyright © 2017 General Electric Company. All rights reserved."
footerLinks:
#Contact Us: mailto:info@predix.io
#GE Digital: https://www.gesoftware.com
#Legal: https://predix-io.run.asv-sb.ice.predix.io/legal | 45.1744 | 1,052 | 0.759758 |
b90ec6c8649b659d5a7bccc18ac87b42e5e4ed47 | 142 | yml | YAML | templates/download-product-configs/healthwatch.yml | Turbots/pcf-automation-gcp-paving | 17293d7842a2f3f288b74a477cc64c38c212f728 | [
"MIT"
] | 10 | 2019-02-04T15:25:20.000Z | 2019-09-13T15:40:00.000Z | templates/download-product-configs/healthwatch.yml | Turbots/pcf-automation-gcp-paving | 17293d7842a2f3f288b74a477cc64c38c212f728 | [
"MIT"
] | null | null | null | templates/download-product-configs/healthwatch.yml | Turbots/pcf-automation-gcp-paving | 17293d7842a2f3f288b74a477cc64c38c212f728 | [
"MIT"
] | 8 | 2019-01-31T15:34:00.000Z | 2020-02-14T22:32:12.000Z | ---
pivnet-api-token: ((pivnet-api-token))
pivnet-file-glob: "p-healthwatch*pivotal"
pivnet-product-slug: p-healthwatch
product-version: 1.5.2 | 28.4 | 41 | 0.753521 |
137591c68a883005285aa5e5994acba013a0eaf0 | 572 | yml | YAML | scripts/agent-sync.yml | ApsaraDB/PolarDB-Stack-Storage | bbe31815b2484b8dbdb0518ed80113626f1365e8 | [
"Apache-2.0"
] | 8 | 2021-10-18T06:42:40.000Z | 2021-12-15T09:26:47.000Z | scripts/agent-sync.yml | ApsaraDB/PolarDB-Stack-Storage | bbe31815b2484b8dbdb0518ed80113626f1365e8 | [
"Apache-2.0"
] | null | null | null | scripts/agent-sync.yml | ApsaraDB/PolarDB-Stack-Storage | bbe31815b2484b8dbdb0518ed80113626f1365e8 | [
"Apache-2.0"
] | 8 | 2021-10-18T06:42:43.000Z | 2022-03-22T09:49:57.000Z | - hosts: dev
gather_facts: false
tasks:
- set_fact:
sms_dir: /root/ziang.gza/sms
- name: prepare dirs
file:
path: "{{ item }}"
state: directory
mode: '0777'
with_items:
- "{{ sms_dir }}/bin"
- "{{ sms_dir }}/log"
- name: sync binaries
copy:
src: ../bin/agent
dest: "{{ sms_dir }}/bin/sms-agent"
mode: '0777'
- name: kill old server
shell: pkill sms-agent
ignore_errors: true
# - name: run sms-agent
# shell: nohup {{ sms_dir }}/bin/sms-agent > {{ sms_dir }}/log/agent.log 2>&1
| 19.724138 | 80 | 0.550699 |
c4818a6b62e72c262c2b00e26099c928b011a35b | 1,021 | yml | YAML | tests/test.yml | G0f0rward/Ansible-Role-PXE | 10e8d6b2a5d646d74ae00dcbfa58bf503ca1fc32 | [
"MIT"
] | null | null | null | tests/test.yml | G0f0rward/Ansible-Role-PXE | 10e8d6b2a5d646d74ae00dcbfa58bf503ca1fc32 | [
"MIT"
] | null | null | null | tests/test.yml | G0f0rward/Ansible-Role-PXE | 10e8d6b2a5d646d74ae00dcbfa58bf503ca1fc32 | [
"MIT"
] | null | null | null | ---
- hosts: localhost
remote_user: root
roles:
- ansible-role-pxe_config
vars:
- siteDomain: "fgci.csc.fi"
- siteName: "io"
- hosts_file_to_populate: "/tmp/hosts"
- ksBootSrvDir: "/tmp"
- location: "http://www.nic.funet.fi/pub/mirrors/centos.org/7/os/x86_64/"
- repos:
- { name: "EPEL", url: "http://www.nic.funet.fi/pub/mirrors/fedora.redhat.com/pub/epel/7/x86_64", pkgname: "epel-release" }
- { name: "EL Repo", url: "http://elrepo.org/linux/elrepo/el7/x86_64", pkgname: "elrepo-release" }
- { name: "CentOS Extras", url: "http://www.nic.funet.fi/pub/mirrors/centos.org/7/extras/x86_64/" }
- rootpwhash: "SHAFOOO"
- hosts_file_login_group_to_populate: ""
- hosts_file_inventory_location: "/ansible-role-pxe_config/tests/inventory"
- hosts_file_extra_group_to_populate: "{{ groups.switches }}"
pre_tasks:
- name: touch hosts_file_to_populate
file:
path: "{{ hosts_file_to_populate }}"
state: touch
| 37.814815 | 132 | 0.639569 |
049419cc6d19157bf6a7a19a4856e2716cd9e9ca | 586 | yml | YAML | ci/taskcat.yml | DalavanCloud/quickstart-informatica-bdm | 00e5fc5eb3aaa4391e175afdcd275c0a345dfb56 | [
"Apache-2.0"
] | 1 | 2019-01-22T03:19:47.000Z | 2019-01-22T03:19:47.000Z | ci/taskcat.yml | DalavanCloud/quickstart-informatica-bdm | 00e5fc5eb3aaa4391e175afdcd275c0a345dfb56 | [
"Apache-2.0"
] | null | null | null | ci/taskcat.yml | DalavanCloud/quickstart-informatica-bdm | 00e5fc5eb3aaa4391e175afdcd275c0a345dfb56 | [
"Apache-2.0"
] | null | null | null | global:
marketplace-ami: true
owner: quickstart-eng@amazon.com
qsname: quickstart-informatica-bdm
regions:
- ap-northeast-1
- ap-northeast-2
- ap-south-1
- ap-southeast-1
- ap-southeast-2
- eu-central-1
- eu-west-1
- sa-east-1
- us-east-1
- us-west-1
- us-west-2
reporting: true
tests:
master:
parameter_input: informatica-bdm-master.json
template_file: informatica-bdm-master.template
regions:
- ap-northeast-1
- ap-southeast-1
- ap-southeast-2
- eu-west-1
- us-east-1
- us-west-2
| 20.206897 | 50 | 0.609215 |
f496d79dc545b0d4d90009d11ca30f92064f4187 | 2,202 | yaml | YAML | templates/bing_coronavirus_query_set/templates.yaml | TevenLeScao/promptsource | e7fb7db1ecb4e43062e27f64e8262656d47d9ea0 | [
"Apache-2.0"
] | null | null | null | templates/bing_coronavirus_query_set/templates.yaml | TevenLeScao/promptsource | e7fb7db1ecb4e43062e27f64e8262656d47d9ea0 | [
"Apache-2.0"
] | null | null | null | templates/bing_coronavirus_query_set/templates.yaml | TevenLeScao/promptsource | e7fb7db1ecb4e43062e27f64e8262656d47d9ea0 | [
"Apache-2.0"
] | null | null | null | dataset: bing_coronavirus_query_set
templates:
43332782-9e92-4bb2-94bf-28759f3fe181: !Template
id: 43332782-9e92-4bb2-94bf-28759f3fe181
jinja: "This search query talks about the coronavirus and was published on {{Date}}.\
\ In what country was it issued ? \n{{Query}}\n|||\n{{Country}}"
name: 'what_country '
reference: ''
task_template: false
68f9c063-1907-4866-ab1b-756cc57e5695: !Template
id: 68f9c063-1907-4866-ab1b-756cc57e5695
jinja: "The user is searching for coronavirus results on Bing.com. Is the intent\
\ implicit or explicit ? \n{{Query}}\n|||\n{% if IsImplicitIntent == \"True\"\
\ %}\nimplicit\n{% else %}\nexplicit\n{% endif %}"
name: 'is_implicit_or_explicit '
reference: ''
task_template: true
992d541f-9e0c-466d-b4c4-92e9e236f863: !Template
id: 992d541f-9e0c-466d-b4c4-92e9e236f863
jinja: "This search query about coronavirus was issued in {{Country}} on {{Date}}.\
\ Is the intent implicit or explicit ? \n{{Query}}\n|||\n{% if IsImplicitIntent\
\ == \"True\" %}\nimplicit\n{% else %}\nexplicit \n{% endif %}"
name: 'is_explicit_country_date '
reference: ''
task_template: true
d4a251d7-0e23-4feb-8bf2-18e32c553199: !Template
id: d4a251d7-0e23-4feb-8bf2-18e32c553199
jinja: "On what date was this search engine query issued, during the Covid-19\
\ pandemic ? \n{{Query}}\n|||\n{{Date}}"
name: 'what_date '
reference: ''
task_template: false
df53652c-36dc-45fe-a015-d0781e32cd33: !Template
id: df53652c-36dc-45fe-a015-d0781e32cd33
jinja: "Does this search engine query have an indirect relation to Covid-19 ?\
\ \n{{Query}}\n|||\n{% if IsImplicitIntent == \"True\" %}\nYes\n{% else %}\n\
No\n{% endif %}"
name: is_implicit_query
reference: ''
task_template: true
df7bc2ee-686c-4826-ad84-3a056a2da4d4: !Template
id: df7bc2ee-686c-4826-ad84-3a056a2da4d4
jinja: "Does this search query on Bing.com talk about the coronavirus explicitly\
\ ? \n{{Query}}\n|||\n{% if IsImplicitIntent == \"True\" %}\nNo\n{% else %}\n\
Yes\n{% endif %}"
name: is_explicit_query
reference: ''
task_template: true
| 44.938776 | 89 | 0.666213 |
02321a0ba31eeaf03e41ce8c7303a0c51dc9c22d | 144 | yml | YAML | build/istio/istio-config.yml | mike1808/cf-for-k8s | 2e51684c0c4da5c92cd92a2f4a122bd95fba9757 | [
"Apache-2.0"
] | null | null | null | build/istio/istio-config.yml | mike1808/cf-for-k8s | 2e51684c0c4da5c92cd92a2f4a122bd95fba9757 | [
"Apache-2.0"
] | null | null | null | build/istio/istio-config.yml | mike1808/cf-for-k8s | 2e51684c0c4da5c92cd92a2f4a122bd95fba9757 | [
"Apache-2.0"
] | null | null | null | ---
apiVersion: install.istio.io/v1alpha2
kind: IstioControlPlane
spec:
profile: default
values:
global:
mtls:
auto: true
| 14.4 | 37 | 0.659722 |
e7201ac1fbc4a98a1e968f525e22cc0b9c96afa0 | 72 | yaml | YAML | charts/argo-applicationset/ci/leader-election-values.yaml | rory-lamendola/argo-helm | 49211390fd8db0e4c903a63a2f1fcc23780510e6 | [
"Apache-2.0"
] | 1 | 2021-06-08T09:00:13.000Z | 2021-06-08T09:00:13.000Z | charts/argo-applicationset/ci/leader-election-values.yaml | rory-lamendola/argo-helm | 49211390fd8db0e4c903a63a2f1fcc23780510e6 | [
"Apache-2.0"
] | null | null | null | charts/argo-applicationset/ci/leader-election-values.yaml | rory-lamendola/argo-helm | 49211390fd8db0e4c903a63a2f1fcc23780510e6 | [
"Apache-2.0"
] | 1 | 2021-05-20T03:05:23.000Z | 2021-05-20T03:05:23.000Z | args:
enableLeaderElection: true
replicaCount: 3
installCRDs: false
| 10.285714 | 28 | 0.791667 |
70b728b1579f379370dacc073ccae59a4532143d | 33 | yml | YAML | tests/requirements.yml | miarec/ansible-role-nodejs | 65cc16b41bd79b7ae50695d931b0ddc2aa47eeac | [
"MIT"
] | 20 | 2015-01-26T09:22:44.000Z | 2018-01-25T19:39:04.000Z | tests/requirements.yml | miarec/ansible-role-nodejs | 65cc16b41bd79b7ae50695d931b0ddc2aa47eeac | [
"MIT"
] | 21 | 2015-01-15T17:46:41.000Z | 2020-08-31T10:51:49.000Z | tests/requirements.yml | miarec/ansible-role-nodejs | 65cc16b41bd79b7ae50695d931b0ddc2aa47eeac | [
"MIT"
] | 18 | 2015-01-25T00:43:28.000Z | 2018-02-16T21:55:02.000Z | ---
- role: ANXS.build-essential | 11 | 28 | 0.666667 |
81feca73f967c9e96bf08c9196193e102f851acc | 1,198 | yml | YAML | roles/conf/server/tasks/shclustering/shcluster_label.yml | osu-itis/ansible-splunk | 24db92d3b196ec3b82b85c06170b6c9f2f6eaa18 | [
"Apache-2.0"
] | 24 | 2016-05-18T16:30:08.000Z | 2021-03-07T09:57:27.000Z | roles/conf/server/tasks/shclustering/shcluster_label.yml | notbdu/ansible-splunk | e221181bf12bce075f0f34bd50cd6c039158a2eb | [
"Apache-2.0"
] | 10 | 2016-03-07T20:05:25.000Z | 2017-01-26T00:14:36.000Z | roles/conf/server/tasks/shclustering/shcluster_label.yml | notbdu/ansible-splunk | e221181bf12bce075f0f34bd50cd6c039158a2eb | [
"Apache-2.0"
] | 18 | 2016-03-07T18:45:53.000Z | 2020-07-29T01:38:15.000Z | ---
#####################################################################################################################
# Configurations for Splunk server.conf
#####################################################################################################################
#####################################################################################################################
# [shclustering]
#####################################################################################################################
# shcluster_label
- name: "Configure server.conf [shclustering] - shcluster_label state=present"
ini_file: dest={{ splunk_conf_path }}/server.conf
section=shclustering
option=shcluster_label
value="{{ splunk_shcluster_label }}"
state=present
when: splunk_shcluster_label is defined
notify: splunk restart
- name: "Configure server.conf [shclustering] - shcluster_label state=absent (default)"
ini_file: dest={{ splunk_conf_path }}/server.conf
section=shclustering
option=shcluster_label
state=absent
when: splunk_shcluster_label is undefined
notify: splunk restart
| 42.785714 | 117 | 0.422371 |
c7ddacf8637da56a47bd72437fe944e19845fa27 | 497 | yml | YAML | manifest.yml | Erechtheus/sia | 2bc0a970f33893ef91021bf1a40eb5fb90ecf8da | [
"Apache-2.0"
] | 3 | 2017-03-08T10:36:45.000Z | 2019-12-30T21:17:01.000Z | manifest.yml | Erechtheus/sia | 2bc0a970f33893ef91021bf1a40eb5fb90ecf8da | [
"Apache-2.0"
] | null | null | null | manifest.yml | Erechtheus/sia | 2bc0a970f33893ef91021bf1a40eb5fb90ecf8da | [
"Apache-2.0"
] | null | null | null | ---
applications:
- name: seth-tips
buildpack: https://github.com/cloudfoundry/java-buildpack.git
path: target/sia-0.0.1-SNAPSHOT.jar
memory: 1G
services:
- rabbit
- name: sia-backend
buildpack: https://github.com/cloudfoundry/java-buildpack.git
path: target/sia-0.0.1-SNAPSHOT.jar
memory: 2G
no-route: true
health-check-type: process
env:
SPRING_PROFILES_ACTIVE: backend
SPRING.MAIN.WEB-ENVIRONMENT: false
services:
- rabbit | 26.157895 | 65 | 0.668008 |
a7d31abf58bd1588cc23da7b76f6614c51ac9bb4 | 48 | yml | YAML | content/sync/entities/site.uuid.yml | badcamp/badcamp-2020 | 4a4c037d47b90794a38a482052f9107817d66154 | [
"MIT"
] | 2 | 2019-04-15T20:11:04.000Z | 2019-04-22T22:55:34.000Z | content/sync/entities/site.uuid.yml | badcamp/badcamp-2019 | 1907d215df307b7b100a6d8f5ce7fa214c6e7db3 | [
"MIT"
] | 114 | 2019-02-11T21:21:22.000Z | 2022-02-12T09:09:27.000Z | content/sync/entities/site.uuid.yml | badcamp/badcamp-2020 | 4a4c037d47b90794a38a482052f9107817d66154 | [
"MIT"
] | 1 | 2019-04-23T00:19:19.000Z | 2019-04-23T00:19:19.000Z | site_uuid: a008999a-b135-4b4d-9bd2-0a0295d92d90
| 24 | 47 | 0.854167 |
e392e61df89481e3de838dbf4e05e943f22faa51 | 441 | yml | YAML | .travis.yml | wwin3286tw/opencv_with_travis | 13bda19310bf17e52e22ae312f1d31526b3cab83 | [
"BSD-3-Clause"
] | null | null | null | .travis.yml | wwin3286tw/opencv_with_travis | 13bda19310bf17e52e22ae312f1d31526b3cab83 | [
"BSD-3-Clause"
] | null | null | null | .travis.yml | wwin3286tw/opencv_with_travis | 13bda19310bf17e52e22ae312f1d31526b3cab83 | [
"BSD-3-Clause"
] | null | null | null | language: minimal
before_install:
- sudo apt-get install -y cmake git libgtk2.0-dev pkg-config libavcodec-dev libavformat-dev libswscale-dev python-numpy python3-numpy
- sudo apt-get install -y python-dev python-numpy libtbb2 libtbb-dev libjpeg-dev libpng-dev libtiff-dev libjasper-dev libdc1394-22-dev
script:
- lscpu
- mkdir build
- cd build
- cmake -D CMAKE_BUILD_TYPE=Release -D CMAKE_INSTALL_PREFIX=/usr/local ..
- make -j80
| 36.75 | 136 | 0.770975 |
ee90e6d247246c81745da32d1ced655a544e8aaf | 392 | yml | YAML | docs/components/schemas/note.yml | Diabetips/diabetips-api | 42125fe143d2c3ee8ce23f6f53670fcd4cd66f9d | [
"MIT"
] | null | null | null | docs/components/schemas/note.yml | Diabetips/diabetips-api | 42125fe143d2c3ee8ce23f6f53670fcd4cd66f9d | [
"MIT"
] | null | null | null | docs/components/schemas/note.yml | Diabetips/diabetips-api | 42125fe143d2c3ee8ce23f6f53670fcd4cd66f9d | [
"MIT"
] | null | null | null | Note:
type: "object"
properties:
"id":
type: "integer"
description: "The note's ID"
example: 1
readOnly: true
"description":
type: "string"
description: "The note's description"
example: "I woke up"
"time":
type: "string"
format: "date-time"
description: "Time of the note"
example: "2020-07-31T12:28:29.949Z"
| 21.777778 | 43 | 0.563776 |
cf3dfc6dfe59bf1900f23c9150b97084798b7d53 | 449 | yml | YAML | .github/workflows/workflow.yml | siggy/checkout-test | 098602eac976b71de3e27b6b3bbe409e0c5ca22c | [
"Apache-2.0"
] | null | null | null | .github/workflows/workflow.yml | siggy/checkout-test | 098602eac976b71de3e27b6b3bbe409e0c5ca22c | [
"Apache-2.0"
] | null | null | null | .github/workflows/workflow.yml | siggy/checkout-test | 098602eac976b71de3e27b6b3bbe409e0c5ca22c | [
"Apache-2.0"
] | null | null | null | name: CI
on:
pull_request: {}
push:
branches:
- master
tags:
- "*"
jobs:
test_checkout:
runs-on: ubuntu-latest
steps:
- name: git co
uses: actions/checkout@v1
- name: siggy co
uses: siggy/checkout@master
- name: test git
run: |
pwd
echo $GITHUB_WORKSPACE
ls $GITHUB_WORKSPACE
ls /home/runner/work/checkout/checkout
git status
git log -n 4
| 16.62963 | 46 | 0.556793 |
0c3ddec141b5476235db8fd372e5f51f050a4bf1 | 145 | yml | YAML | defaults/main.yml | nemonik/drone-role | f3ded889a896a9cecc9fe51c65a533031cf735d3 | [
"BSD-3-Clause"
] | null | null | null | defaults/main.yml | nemonik/drone-role | f3ded889a896a9cecc9fe51c65a533031cf735d3 | [
"BSD-3-Clause"
] | null | null | null | defaults/main.yml | nemonik/drone-role | f3ded889a896a9cecc9fe51c65a533031cf735d3 | [
"BSD-3-Clause"
] | null | null | null | ---
# defaults file for drone
default_retries: 60
default_delay: 10
docker_timeout: 300
docker_retries: 60
docker_delay: 10
drone_version: 3.0.6
| 16.111111 | 25 | 0.793103 |
94adc738fd15316f853cf68555e11e30dc1f4764 | 838 | yml | YAML | .github/workflows/updating.yml | fossabot/svgo-action | 4ee5fa18da9bcf0b47a24f83dd41492d6ab21dcf | [
"MIT"
] | null | null | null | .github/workflows/updating.yml | fossabot/svgo-action | 4ee5fa18da9bcf0b47a24f83dd41492d6ab21dcf | [
"MIT"
] | null | null | null | .github/workflows/updating.yml | fossabot/svgo-action | 4ee5fa18da9bcf0b47a24f83dd41492d6ab21dcf | [
"MIT"
] | null | null | null | name: Automated Fixes
on:
push:
branches: [develop]
jobs:
lib-index-js:
name: lib/index.js
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v2
- name: Use Node.js 12.x
uses: actions/setup-node@v2
with:
node-version: 12.x
- name: Install dependencies
run: npm ci
- name: Build lib/index.js
run: npm run build
- name: Push updated lib/index.js
uses: stefanzweifel/git-auto-commit-action@v4.8.0
with:
commit_message: "chore: update lib/index.js"
commit_options: "--no-verify"
commit_user_name: github-actions[bot]
commit_user_email: 41898282+github-actions[bot]@users.noreply.github.com
commit_author: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
| 28.896552 | 98 | 0.652745 |
a215e45d56030d89e2a6da6a8e377f4e6d0206c1 | 1,170 | yaml | YAML | src/Resources/config/adapters.yaml | zlikavac32/beanstalkd-lib-bundle | 8115d89896b52f2edc8429c7bb703f4885b6e400 | [
"MIT"
] | null | null | null | src/Resources/config/adapters.yaml | zlikavac32/beanstalkd-lib-bundle | 8115d89896b52f2edc8429c7bb703f4885b6e400 | [
"MIT"
] | null | null | null | src/Resources/config/adapters.yaml | zlikavac32/beanstalkd-lib-bundle | 8115d89896b52f2edc8429c7bb703f4885b6e400 | [
"MIT"
] | null | null | null | services:
_defaults:
autowire: true
autoconfigure: true
public: false
Zlikavac32\BeanstalkdLib\Adapter\PHP\Json\NativePHPJsonSerializer:
arguments:
$objectAsArray: true
tags:
- { name: service_provider.job_serializer, provides: native-json }
Zlikavac32\BeanstalkdLib\Adapter\PHP\Socket\NativePHPSocket:
arguments:
$readTimeout: '%beanstalkd_lib_php_socket_read_timeout%'
tags:
- { name: decorator.socket.exclusive_access }
- { name: decorator.socket.lazy }
Zlikavac32\BeanstalkdLib\Adapter\Symfony\Console\ClearGracefulExitEventListener:
tags:
- { name: kernel.event_listener, event: console.terminate, priority: 9223372036854775807 }
Zlikavac32\BeanstalkdLib\Adapter\Symfony\Console\ManageAlarmSchedulerEventListener:
tags:
- { name: kernel.event_listener, event: console.command, priority: 9223372036854775806 }
- { name: kernel.event_listener, event: console.terminate, priority: -9223372036854775807 }
Zlikavac32\BeanstalkdLib\Adapter\Symfony\Yaml\SymfonyYamlParser: ~
| 39 | 103 | 0.687179 |
365fc40a799cfee4147228757d68f5d27c3082e3 | 418 | yml | YAML | k8s-manifests/demo-app.yml | Atul-devops/python-flask-docker | 853dc0a7b4e17c48c051141b4391eea716205e26 | [
"Apache-2.0"
] | null | null | null | k8s-manifests/demo-app.yml | Atul-devops/python-flask-docker | 853dc0a7b4e17c48c051141b4391eea716205e26 | [
"Apache-2.0"
] | null | null | null | k8s-manifests/demo-app.yml | Atul-devops/python-flask-docker | 853dc0a7b4e17c48c051141b4391eea716205e26 | [
"Apache-2.0"
] | null | null | null | apiVersion: apps/v1
kind: Deployment
metadata:
name: my-demo-app
labels:
app: demo
spec:
replicas: 3
selector:
matchLabels:
app: demo
template:
metadata:
name: my-demo-app
labels:
app: demo
spec:
containers:
- name: my-demo-whoami
image: gcr.io/searce-msp-gcp/whoami-gcp:v1
imagePullPolicy: Always
ports:
- containerPort: 8070
| 17.416667 | 49 | 0.600478 |
36c36b989a0ec5de43c2134a26f66c7f8f8148f0 | 565 | yml | YAML | examples/stack/docker-compose.yml | kcarruth/mariadb-galera-swarm | c33114a85465a6297c2763ee11d43f7c8b17ffbe | [
"Apache-2.0"
] | 195 | 2016-10-02T10:23:51.000Z | 2022-02-18T13:32:10.000Z | examples/stack/docker-compose.yml | jonizen/mariadb-galera-swarm | 6b8d12d859e718a02c64c6c9488bd837ad6f2010 | [
"Apache-2.0"
] | 104 | 2016-10-12T02:31:01.000Z | 2021-10-30T01:13:12.000Z | examples/stack/docker-compose.yml | jonizen/mariadb-galera-swarm | 6b8d12d859e718a02c64c6c9488bd837ad6f2010 | [
"Apache-2.0"
] | 123 | 2016-11-06T14:57:29.000Z | 2022-03-30T03:48:41.000Z | version: '3.7'
services:
node:
image: virtpanel/mariadb-galera-swarm
command: node tasks.galera-seed,galera_node
deploy:
replicas: 4
hostname: "{{.Service.Name}}.{{.Task.Slot}}"
networks:
- galera
- haproxy
volumes:
- type: bind
source: /d/galera/data
target: /var/lib/mysql
- type: bind
source: /mnt/gfs/galera/secrets
target: /run/secrets
read_only: true
networks:
galera:
driver: overlay
external: true
haproxy:
driver: overlay
external: true
| 18.833333 | 48 | 0.59292 |
4d1abc993d6e1840b361ab88d11274713cb70988 | 180 | yml | YAML | web/core/modules/language/language.info.yml | Tuyuyi99/Curso-Drupal | 8bac2824ba9ff5a9a6c6ad90fee58671e41bccb5 | [
"MIT"
] | 4 | 2021-08-06T16:34:11.000Z | 2022-02-12T07:08:16.000Z | web/core/modules/language/language.info.yml | Tuyuyi99/Curso-Drupal | 8bac2824ba9ff5a9a6c6ad90fee58671e41bccb5 | [
"MIT"
] | 36 | 2021-02-18T10:54:08.000Z | 2022-01-21T00:02:10.000Z | web/core/modules/language/language.info.yml | Tuyuyi99/Curso-Drupal | 8bac2824ba9ff5a9a6c6ad90fee58671e41bccb5 | [
"MIT"
] | 4 | 2021-03-13T17:38:24.000Z | 2022-03-15T09:43:09.000Z | name: Language
type: module
description: 'Allows users to configure available languages.'
package: Multilingual
version: VERSION
configure: entity.configurable_language.collection
| 25.714286 | 61 | 0.844444 |
8444c6c244ca7d8a1eb7500360c7227933e32ba2 | 1,160 | yml | YAML | .travis.yml | spjuanjoc/gui_project_cpp | 84af37802371dab4d3b525c7f938cf176114ee32 | [
"MIT"
] | 1 | 2020-08-26T16:43:07.000Z | 2020-08-26T16:43:07.000Z | .travis.yml | spjuanjoc/game_project_cpp | 84af37802371dab4d3b525c7f938cf176114ee32 | [
"MIT"
] | null | null | null | .travis.yml | spjuanjoc/game_project_cpp | 84af37802371dab4d3b525c7f938cf176114ee32 | [
"MIT"
] | null | null | null | language: cpp
os: linux
dist: bionic
compiler: gcc
addons:
apt:
packages:
- libgl1-mesa-dev
- libgl1-mesa-glx
- mesa-utils
- xorg-dev
- libxcb-xkb-dev
- libxcb-render-util0-dev
- libxcb-icccm4-dev
- libxcb-image0-dev
- libxcb-keysyms1-dev
- libxcb-xinerama0-dev
install:
# - pip install --user ninja
- pip install --user conan
- conan user
script:
- conan remote add bincrafters https://api.bintray.com/conan/bincrafters/public-conan
- conan profile list
- conan profile new default --detect
- conan profile update settings.compiler.libcxx=libstdc++11 default
- conan profile show default
- mkdir build
- cd build
- conan install .. --build imgui-sfml -s build_type=Debug
- cmake .. -DENABLE_CONAN=ON -DENABLE_TESTS=ON -O0 -DCMAKE_BUILD_TYPE=Debug
- cmake --build . -- -j2
- ctest -j2
# - conan install .. --build imgui-sfml -s build_type=Release
# - cmake .. -DENABLE_CONAN=ON -G "Ninja" -O3
# - ninja -j8
after_script:
# Upload report to codecov
- bash <(curl -s https://codecov.io/bash)
# - bash <(curl -s https://codecov.io/bash) -x /usr/bin/gcov
| 25.777778 | 87 | 0.656897 |
84d67630085a3c977750d3b454ccd13b8bc64c1a | 242 | yml | YAML | src/test/resources/application.yml | vindell/spring-boot-starter-security-faceid | 04ccc24d248c91527dcadb0684fe406167a3edd8 | [
"Apache-2.0"
] | 2 | 2019-09-05T08:02:45.000Z | 2019-09-17T04:20:01.000Z | src/test/resources/application.yml | vindell/spring-boot-starter-security-faceid | 04ccc24d248c91527dcadb0684fe406167a3edd8 | [
"Apache-2.0"
] | null | null | null | src/test/resources/application.yml | vindell/spring-boot-starter-security-faceid | 04ccc24d248c91527dcadb0684fe406167a3edd8 | [
"Apache-2.0"
] | 1 | 2019-09-17T04:20:02.000Z | 2019-09-17T04:20:02.000Z | server:
port: 7900
spring:
security:
openid:
enabled: true
claimed-identity-field-name: fff
filter-processes-url: 4444
return-to-url-parameters:
d : d
realm-mapping:
sdd : xx | 18.615385 | 39 | 0.553719 |
265fc98a20cc70491e4b7805a469b9673a59dc70 | 43,908 | yaml | YAML | home-assistant/packages/system_monitoring.yaml | twhite96/smart-home-setup | 25222e26b770275b43f227b45cf7e0f8ba749595 | [
"MIT"
] | null | null | null | home-assistant/packages/system_monitoring.yaml | twhite96/smart-home-setup | 25222e26b770275b43f227b45cf7e0f8ba749595 | [
"MIT"
] | null | null | null | home-assistant/packages/system_monitoring.yaml | twhite96/smart-home-setup | 25222e26b770275b43f227b45cf7e0f8ba749595 | [
"MIT"
] | 1 | 2021-09-10T20:40:41.000Z | 2021-09-10T20:40:41.000Z |
################################
# Proxmox for VM running on NUC
################################
proxmoxve:
host: 10.10.5.10
username: !secret pve_user
password: !secret pve_pass
realm: pve
verify_ssl: false
nodes:
- node: pve
vms:
- 102
- 103
- 110
- 120
- 130
###############################
# Monitoring Docker Containers
###############################
monitor_docker:
- name: Docker
containers:
- appdaemon
- esphome-dashboard
- hass
- hass-db
- mopidy_office
- mopidy_bedroom
- mopidy_livingroom
- mopidy_balcony
- mopidy_tts
- mqtt
- influxdb
- grafana
- portainer
- swag
- snapserver
- wud
rename:
appdaemon: AppDaemon
esphome-dashboard: "ESPHome-Dashboard"
hass: Home Assistant
hass-db: Home Assistant DB
mopidy_office: Mopidy Büro
mopidy_bedroom: Mopidy Schlafzimmer
mopidy_livingroom: Mopidy Wohnzimmer
mopidy_balcony: Mopidy Balkon
mopidy_tts: Mopidy TTS
mqtt: Mosquitto
influxdb: InfluxDB
grafana: Grafana
portainer: Portainer
swag: NGINX
snapserver: Snapserver
wud: "What's up Docker"
monitored_conditions:
- version
- status
- cpu_percentage
- memory_percentage
sensor:
################
# Date and Time
################
- platform: time_date
display_options:
- time
- date
- date_time
- date_time_iso
- time_date
- time_utc
- beat
########################
# SystemMonitor for NUC
########################
- platform: systemmonitor
resources:
- type: disk_use_percent
arg: /home
- type: disk_use
arg: /home
- type: disk_free
arg: /home
- type: memory_free
- type: memory_use
- type: memory_use_percent
- type: swap_use_percent
- type: swap_use
- type: swap_free
- type: load_1m
- type: load_5m
- type: load_15m
- type: network_in
arg: ens18
- type: network_out
arg: ens18
- type: throughput_network_in
arg: ens18
- type: throughput_network_out
arg: ens18
- type: packets_in
arg: ens18
- type: packets_out
arg: ens18
- type: processor_use
- type: last_boot
- type: ipv4_address
arg: ens18
##################
# Temperature NUC
##################
- platform: command_line
name: temperature_cpu_nuc
command: 'ssh -i /root/.ssh/id_rsa -o StrictHostKeyChecking=no -q root@10.10.5.10 cat /sys/class/thermal/thermal_zone3/temp'
value_template: "{{ value | int / 1000 }}"
unit_of_measurement: "°C"
###################
# Home Assitant DB Size
###################
- platform: sql
db_url: !secret db_url
queries:
- name: DB size Hass
query: "SELECT (pg_database_size('smart_home')/1024/1024) as db_size;"
column: "db_size"
unit_of_measurement: MB
####################
# Software Versions
####################
# Home Assistant
- platform: version
name: latest_version_homeassistant
source: docker
beta: true
- platform: version
name: current_version_homeassistant
# Pi-hole
## Pi-hole Core
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: latest_version_pihole_core
value_template: "{{ value_json.core_latest[1:] }}"
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: current_version_pihole_core
value_template: "{{ value_json.core_current[1:] }}"
## Pi-hole Web
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: latest_version_pihole_web
value_template: "{{ value_json.web_latest[1:] }}"
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: current_version_pihole_web
value_template: "{{ value_json.web_current[1:] }}"
## Pi-hole FTL
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: latest_version_pihole_ftl
value_template: "{{ value_json.FTL_latest[1:] }}"
- platform: rest
resource: http://10.10.0.19/admin/api.php?versions
name: current_version_pihole_ftl
value_template: "{{ value_json.FTL_current[1:] }}"
# Proxmox
- platform: command_line
name: Version Proxmox VE
command: 'ssh -i /root/.ssh/id_rsa -o StrictHostKeyChecking=no -q root@10.10.5.10 pveversion | cut -f2 -d/'
scan_interval: 3600
###############
# Backup Synology NAS
###############
# Model
- platform: snmp
name: Model Backup NAS
host: 10.10.40.15
community: 'public'
baseoid: 1.3.6.1.4.1.6574.1.5.1.0
# Firmware
- platform: snmp
name: Firmware Backup NAS
host: 10.10.40.15
community: 'public'
baseoid: 1.3.6.1.4.1.6574.1.5.3.0
# Uptime
- platform: snmp
name: Uptime Backup NAS
host: 10.10.40.15
community: 'public'
baseoid: 1.3.6.1.2.1.25.1.1.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
###############
# Main Synology NAS
###############
# Model
- platform: snmp
name: Model NAS
host: 10.10.40.80
community: 'public'
baseoid: 1.3.6.1.4.1.6574.1.5.1.0
# Firmware
- platform: snmp
name: Firmware NAS
host: 10.10.40.80
community: 'public'
baseoid: 1.3.6.1.4.1.6574.1.5.3.0
# Uptime
- platform: snmp
name: Uptime NAS
host: 10.10.40.80
community: 'public'
baseoid: 1.3.6.1.2.1.25.1.1.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
################
# Unifi Devices
################
# AP Livingroom
## Model
- platform: snmp
name: Model AP livingroom
host: 10.10.0.14
community: 'public'
baseoid: 1.3.6.1.4.1.41112.1.6.3.3.0
## Uptime
- platform: snmp
name: Uptime AP livingroom
host: 10.10.0.14
community: 'public'
baseoid: 1.3.6.1.2.1.1.3.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Firmware
- platform: snmp
name: Firmware AP livingroom
host: 10.10.0.14
community: 'public'
baseoid: 1.3.6.1.4.1.41112.1.6.3.6.0
# Switch Livingroom
## Temperature
- platform: snmp
name: Temperature Switch Livingroom
host: 10.10.0.6
community: 'public'
baseoid: 1.3.6.1.4.1.4413.1.1.43.1.8.1.5.1.0
unit_of_measurement: "°C"
## Uptime
- platform: snmp
name: Uptime Switch Livingroom
host: 10.10.0.6
community: 'public'
baseoid: 1.3.6.1.2.1.1.3.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Model
- platform: snmp
name: Model Switch Livingroom
host: 10.10.0.6
community: 'public'
baseoid: 1.3.6.1.4.1.4413.1.1.1.1.1.2.0
## Firmware
- platform: snmp
name: Firmware Switch Livingroom
host: 10.10.0.6
community: 'public'
baseoid: 1.3.6.1.4.1.4413.1.1.1.1.1.13.0
# Switch Storageroom
## Uptime
- platform: snmp
name: Uptime Switch Storageroom
host: 10.10.0.10
community: 'public'
baseoid: 1.3.6.1.2.1.1.3.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Model
- platform: snmp
name: Model Switch Storageroom
host: 10.10.0.10
community: 'public'
baseoid: 1.3.6.1.4.1.4413.1.1.1.1.1.2.0
## Firmware
- platform: snmp
name: Firmware Switch Storageroom
host: 10.10.0.10
community: 'public'
baseoid: 1.3.6.1.4.1.4413.1.1.1.1.1.13.0
# USG Router Livingroom
## CPU 1 min
- platform: snmp
name: cpu_load_1m_usg
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.4.1.2021.10.1.3.1
value_template: "{{ ( value | float * 100 )| int }}"
unit_of_measurement: "%"
## CPU 5 mins
- platform: snmp
name: cpu_load_5m_usg
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.4.1.2021.10.1.3.2
value_template: "{{ ( value | float * 100 )| int }}"
unit_of_measurement: "%"
## CPU 15 mins
- platform: snmp
name: cpu_load_15m_usg
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.4.1.2021.10.1.3.3
value_template: "{{ ( value | float * 100 )| int }}"
unit_of_measurement: "%"
## CPU 0 Load
- platform: snmp
name: cpu_0_load_usg
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.2.1.25.3.3.1.2.196608
unit_of_measurement: "%"
## CPU 1 Load
- platform: snmp
name: cpu_1_load_usg
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.2.1.25.3.3.1.2.196609
unit_of_measurement: "%"
### CPU Load average
- platform: min_max
name: cpu_load_usg
type: mean
entity_ids:
- sensor.cpu_0_load_usg
- sensor.cpu_1_load_usg
## Uptime
- platform: snmp
name: Uptime USG
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.2.1.1.3.0
value_template: >
{%- set time = value | int // 100 %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Firmware
- platform: snmp
name: Firmware USG
host: 10.10.0.1
community: 'public'
baseoid: 1.3.6.1.2.1.1.1.0
value_template: "{{ '.'.join(value.split('.')[:3]) }}"
## WAN In
- platform: snmp
name: WAN In USG
host: 10.10.0.1
baseoid: 1.3.6.1.2.1.31.1.1.1.6.2
community: 'public'
version: '2c'
scan_interval: 10
- platform: derivative
source: sensor.wan_in_usg
unit_time: s
unit: B
name: wan_in_usg_derivative
- platform: template
sensors:
wan_in_usg_mbps:
value_template: "{{ ((states('sensor.wan_in_usg_derivative')|float*8)/1000000)|round(2) }}"
unit_of_measurement: 'Mbps'
friendly_name: WAN In USG Mbps
## WAN Out
- platform: snmp
name: WAN Out USG
host: 10.10.0.1
baseoid: 1.3.6.1.2.1.31.1.1.1.10.2
community: 'public'
version: '2c'
scan_interval: 10
- platform: derivative
source: sensor.wan_out_usg
unit_time: s
unit: B
name: wan_out_usg_derivative
- platform: template
sensors:
wan_out_usg_mbps:
value_template: "{{ ((states('sensor.wan_out_usg_derivative')|float*8)/1000000)|round(2) }}"
unit_of_measurement: 'Mbps'
friendly_name: WAN Out USG Mbps
#####################
# ConBee/DeCONZ
#####################
# ConBee Firmware
- platform: rest
resource: http://10.10.40.50:8080/api/7E79D96650/config
name: current_firmware_conbee
value_template: "{{ value_json.fwversion }}"
scan_interval: 3600
# DeCONZ current
- platform: rest
resource: http://10.10.40.50:8080/api/7E79D96650/config
name: current_version_deconz
value_template: "{{ value_json.swversion }}"
scan_interval: 3600
# DeCONZ latest
- platform: rest
resource: https://api.github.com/repos/dresden-elektronik/deconz-rest-plugin/releases/latest
name: latest_version_deconz
value_template: >
{{ value_json.tag_name.strip('_stable').lstrip('V').replace('_','.').replace('0','')[1:] }}
scan_interval: 3600
######################
# Last Boot to Uptime
######################
# Home Assistant VM
- platform: template
sensors:
uptime_home_assistant_vm:
friendly_name: Uptime Home Assistant VM
value_template: >
{%- set last_boot = states('sensor.last_boot_ha_vm') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
# ZigBee/Z-Wave Pi
- platform: template
sensors:
uptime_pi_zigbee_zwave:
friendly_name: Uptime Pi ZigBee/ZWave
value_template: >
{%- set last_boot = states('sensor.last_boot_pi_zigbee_zwave') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
# Office Pi
- platform: template
sensors:
uptime_pi_office:
friendly_name: Uptime Pi Büro
value_template: >
{%- set last_boot = states('sensor.last_boot_pi_office') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
# Livingroom Pi
- platform: template
sensors:
uptime_pi_livingroom:
friendly_name: Uptime Pi Wohnzimmer
value_template: >
{%- set last_boot = states('sensor.last_boot_pi_livingroom') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
# Dressroom Pi
- platform: template
sensors:
uptime_pi_dressroom:
friendly_name: Uptime Pi Ankleidezimmer
value_template: >
{%- set last_boot = states('sensor.last_boot_pi_dressroom') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
# Small Bathroom Pi
- platform: template
sensors:
uptime_pi_bathroomsmall:
friendly_name: Uptime Pi Kleines Bad
value_template: >
{%- set last_boot = states('sensor.last_boot_pi_bathroomsmall') %}
{%- if last_boot in ['unavailable', 'unknown'] or last_boot is none %}
unknown
{%- else %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
{%- endif %}
#####################
# Healthchecks.io
#####################
# Home Assistant Heartbeat
- platform: rest
resource: !secret healthcheck_heartbeat
name: Home Assistant Heartbeat
scan_interval: 300
# Backups
## Home Assistant VM Backup Status
- platform: rest
resource: !secret healthcheck_daily_backup_ha
name: Daily Backup Home Assistant VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: "{{ value_json.status }}"
## Home Assistant VM Last Backup
- platform: rest
resource: !secret healthcheck_daily_backup_ha
name: Last Backup Home Assistant VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: >
{%- set last_boot = value_json.last_ping %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Cloud VM Backup Status
- platform: rest
resource: !secret healthcheck_daily_backup_cloud
name: Daily Backup Cloud VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: "{{ value_json.status }}"
## Cloud VM Last Backup
- platform: rest
resource: !secret healthcheck_daily_backup_cloud
name: Last Backup Cloud VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: >
{%- set last_boot = value_json.last_ping %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## NAS to NAS Backup Status
- platform: rest
resource: !secret healthcheck_weekly_backup_nas_to_nas
name: Weekly Backup NAS to NAS
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: "{{ value_json.status }}"
## NAS to NAS Last Backup
- platform: rest
resource: !secret healthcheck_weekly_backup_nas_to_nas
name: Last Backup NAS to NAS
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: >
{%- set last_boot = value_json.last_ping %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## Network VM Backup Status
- platform: rest
resource: !secret healthcheck_monthly_backup_network_vm
name: Daily Backup Network VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: "{{ value_json.status }}"
## Network VM Last Backup
- platform: rest
resource: !secret healthcheck_monthly_backup_network_vm
name: Last Backup Network VM
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: >
{%- set last_boot = value_json.last_ping %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
## ZigBee Zwave Pi Backup Status
- platform: rest
resource: !secret healthcheck_monthly_backup_zigbeezwave_pi
name: Monthly Backup ZigBee Zwave Pi
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: "{{ value_json.status }}"
## ZigBee Zwave Pi Last Backup
- platform: rest
resource: !secret healthcheck_monthly_backup_zigbeezwave_pi
name: Last Backup ZigBee Zwave Pi
headers:
X-Api-Key: !secret healthcheck_api_key
scan_interval: 1800
value_template: >
{%- set last_boot = value_json.last_ping %}
{%- set uptime = now().timestamp() - as_timestamp(last_boot) %}
{%- set time = uptime | int %}
{%- set minutes = ((time % 3600) // 60) %}
{%- set minutes = '{}min'.format(minutes) if minutes > 0 else '' %}
{%- set hours = ((time % 86400) // 3600) %}
{%- set hours = '{}hr '.format(hours) if hours > 0 else '' %}
{%- set days = (time // 86400) %}
{%- set days = '{}d '.format(days) if days > 0 else '' %}
{{ 'Less than 1 min' if time < 60 else days + hours + minutes }}
template:
- binary_sensor:
## Firmware Upgrade Switch Storageroom
- name: firmware_upgrade_switch_storageroom
state: >
{{ state_attr('device_tracker.switch_storageroom', 'upgradable') == true }}
## Firmware Upgrade Switch Livingroom
- name: firmware_upgrade_switch_livingroom
state: >
{{ state_attr('device_tracker.switch_livingroom', 'upgradable') == true }}
## Firmware Upgrade AP Livingroom
- name: firmware_upgrade_ap_livingroom
state: >
{{ state_attr('device_tracker.ap_livingroom', 'upgradable') == true }}
## Firmware Upgrade Switch Storageroom
- name: firmware_upgrade_usg_router
state: >
{{ state_attr('device_tracker.usg_router', 'upgradable') == true }}
#####################
# Logger integration
#####################
logger:
default: warning
input_select:
####################
# Default Log Level
####################
default_log_level:
name: Log Level
options:
- critical
- fatal
- error
- warning
- warn
- info
- debug
- notset
icon: mdi:math-log
automation:
# Set Default Log Level
- alias: "Set Default Log Level"
initial_state: true
trigger:
platform: state
entity_id: input_select.default_log_level
action:
service: logger.set_default_level
data:
level: "{{ trigger.to_state.state }}"
mode: single
# Notify on update available
- id: notify_on_update_available
alias: "Benachrichtigung wenn ein Update verfügbar ist"
mode: parallel
trigger:
- platform: state
entity_id:
- binary_sensor.firmware_upgrade_usg_router
- binary_sensor.firmware_upgrade_ap_livingroom
- binary_sensor.firmware_upgrade_switch_livingroom
- binary_sensor.firmware_upgrade_switch_storageroom
- binary_sensor.backup_nas_update_available
- binary_sensor.nas_update_available
to: 'on'
id: UpdateBinary
- platform: numeric_state
entity_id:
- sensor.updates_pi_bathroomsmall
- sensor.updates_pi_livingroom
- sensor.updates_pi_dressroom
- sensor.updates_pi_zigbee_zwave
- sensor.updates_pi_office
- sensor.hacs
above: 0
id: UpdateNumber
- platform: state
entity_id:
- binary_sensor.wud_container_cloud_calibre
- binary_sensor.wud_container_cloud_nextcloud
- binary_sensor.wud_container_local_appdaemon
- binary_sensor.wud_container_local_esphome_dashboard
- binary_sensor.wud_container_local_grafana
- binary_sensor.wud_container_local_hass
- binary_sensor.wud_container_local_influxdb
- binary_sensor.wud_container_local_mqtt
- binary_sensor.wud_container_local_portainer
- binary_sensor.wud_container_local_swag
- binary_sensor.wud_container_local_wud
to: 'on'
id: UpdateVersion
# - platform: template
# value_template: >
# {{ states('sensor.latest_version_deconz') > states('sensor.current_version_deconz') or
# states('sensor.latest_version_pihole_core') > states('sensor.current_version_pihole_core') or
# states('sensor.latest_version_pihole_ftl') > states('sensor.current_version_pihole_ftl') or
# states('sensor.latest_version_pihole_web') > states('sensor.current_version_pihole_web') }}
# id: UpdateBinary
condition:
- "{{ trigger.from_state.state != trigger.to_state.state }}"
- "{{ trigger.from_state.state not in ['unavailable', 'unknown', 'None'] }}"
- "{{ trigger.to_state.state not in ['unavailable', 'unknown', 'None'] }}"
action:
- variables:
id: "{{ trigger.id }}"
name: "{{ trigger.to_state.name }}"
state: "{{ trigger.to_state.state }}"
- choose:
- conditions:
- "{{ id == UpdateBinary }}"
sequence:
- service: notify.mobile_app_phone_dimitri
data:
title: "{{ name }}"
message: "📥 Update verfügbar"
- conditions:
- "{{ id == UpdateNumber }}"
sequence:
- service: notify.mobile_app_phone_dimitri
data:
title: "{{ name }}"
message: >
📥 Es {{'ist' if state|int == 1 else 'sind' }} {{ trigger.to_state.state }}
Update{{'s' if state|int == 1 else ''}} verfügbar.
- conditions:
- "{{ id == UpdateVersion }}"
sequence:
- service: notify.mobile_app_phone_dimitri
data:
title: "{{ name }}"
message: >
📥 Neue Version {{ state_attr(trigger.entity_id, 'result_tag') }} ist verfügbar.
# Notify on low battery level
- id: notify_on_low_battery_level
alias: "Benachrichtigung wenn Batterien bald leer sind"
mode: parallel
trigger:
- platform: numeric_state
entity_id:
- sensor.battery_level_door_bathroomlarge
- sensor.battery_level_door_bathroomsmall
- sensor.battery_level_door_bedroom
- sensor.battery_level_door_dressroom
- sensor.battery_level_door_kitchen
- sensor.battery_level_door_livingroom
- sensor.battery_level_door_main
- sensor.battery_level_door_office
- sensor.battery_level_door_storageroom
- sensor.battery_level_lux_office
- sensor.battery_level_lux_outside
- sensor.battery_level_motion_livingroom
- sensor.battery_level_multisensor_bathroomsmall
- sensor.battery_level_multisensor_bedroom
- sensor.battery_level_multisensor_dressroom
- sensor.battery_level_remote_dimitri
- sensor.battery_level_remote_light_bedroom
- sensor.battery_level_remote_light_dressroom
- sensor.battery_level_remote_light_livingroom
- sensor.battery_level_remote_light_office
- sensor.battery_level_remote_sabrina
- sensor.battery_level_temperature_bathroomsmall
- sensor.battery_level_temperature_livingroom
- sensor.battery_level_temperature_storageroom
- sensor.battery_level_window_bathroomlarge
- sensor.battery_level_window_bedroom
- sensor.battery_level_window_dressroom
- sensor.battery_level_window_kitchen
- sensor.battery_level_window_livingroom
- sensor.battery_level_window_office
- sensor.battery_level_water_leak_bathroomsmall
- sensor.battery_level_water_leak_bathroomlarge
- sensor.battery_level_water_leak_kitchen
- sensor.battery_level_water_leak_storageroom
below: 20
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Batterien wechseln"
message: >
🔋 Batterien für {{ trigger.to_state.name }} sind fast leer.
Batteriestand: {{ trigger.to_state.state }}
data:
channel: System
# Notify on high CPU usage
- id: notify_on_high_cpu_usage
alias: "Benachrichtigung wenn CPU Last hoch ist"
mode: parallel
trigger:
- platform: numeric_state
entity_id:
- sensor.cpu_load_ha
- sensor.cpu_load_nas
- sensor.cpu_load_backup_nas
- sensor.cpu_load_pi_bathroomsmall
- sensor.cpu_load_pi_livingroom
- sensor.cpu_load_pi_office
- sensor.cpu_load_pi_dressroom
- sensor.cpu_load_pi_zigbee_zwave
above: 60
for:
hours: 2
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Hohe CPU Last!"
message: >
Die CPU Last für {{ trigger.to_state.name }} ist seit 2 Stunden über 60%!
data:
channel: System
# Notify on high Disk usage
- id: notify_on_high_disk_usage
alias: "Benachrichtigung wenn Speicher fast voll ist"
mode: parallel
trigger:
- platform: numeric_state
entity_id:
- sensor.disk_use_pct_ha
- sensor.disk_use_pct_nas
- sensor.disk_use_pct_backup_nas
- sensor.disk_use_pct_pi_bathroomsmall
- sensor.disk_use_pct_pi_livingroom
- sensor.disk_use_pct_pi_office
- sensor.disk_use_pct_pi_dressroom
- sensor.disk_use_pct_pi_zigbee_zwave
above: 95
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Speicher fast voll!"
message: >
💽 Der Speicher für {{ trigger.to_state.name }} ist 95% voll!
data:
channel: System
# Reminder for Workstation Backups
- id: remind_workstation_backups
alias: "Workstation Backup Erinnerung"
mode: single
trigger:
- platform: time
at: "20:00:00"
condition:
- "{{ now().day == 1 and now().month in [1, 4, 7, 10] }}"
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Backup Workstations"
message: >
💽 Es ist Zeit ein Backup aller PCs durchzuführen.
data:
channel: System
# Reminder for NAS to USB Backup
- id: remind_nas_to_usb_backups
alias: "NAS USB Backup Erinnerung"
mode: single
trigger:
- platform: time
at: "19:30:00"
condition:
- "{{ now().day == 1 }}"
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Backup NAS zu USB"
message: >
💽 Es ist Zeit die USB Festplatte ins Haupt NAS zu stecken.
data:
channel: System
# Notify on high CPU Temp
- id: notify_on_high_cpu_temp
alias: "Benachrichtigung wenn CPU Temperatur hoch ist"
mode: parallel
trigger:
- platform: numeric_state
entity_id:
- sensor.temperature_cpu_nuc
- sensor.temperature_pi_bathroomsmall
- sensor.temperature_pi_livingroom
- sensor.temperature_pi_dressroom
- sensor.temperature_pi_office
- sensor.temperature_pi_zigbee_zwave
- sensor.temperature_switch_livingroom
above: 70
for:
hours: 2
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Hohe CPU Temperatur!"
message: >
🌡️Die CPU Temperatur für {{ trigger.to_state.name }} ist seit 2 Stunden über 70°!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on undervoltage
- id: notify_on_undervoltage
alias: "Benachrichtigung bei Unterspannung"
mode: parallel
trigger:
- platform: state
entity_id:
- binary_sensor.undervoltage_pi_bathroomsmall
- binary_sensor.undervoltage_pi_livingroom
- binary_sensor.undervoltage_pi_dressroom
- binary_sensor.undervoltage_pi_office
- binary_sensor.undervoltage_pi_zigbee_zwave
to: 'on'
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Unterspannung!"
message: >
⚡ Unterspannung für {{ trigger.to_state.name }} entdeckt!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on failed Backup
- id: notify_on_failed_backup
alias: "Benachrichtigung bei Backup Fehler"
mode: parallel
trigger:
- platform: state
entity_id:
- sensor.daily_backup_home_assistant_vm
- sensor.daily_backup_cloud_vm
- sensor.daily_backup_network_vm
- sensor.weekly_backup_nas_to_nas
- sensor.monthly_backup_zigbee_zwave_pi
to: 'down'
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Backup fehlgeschlagen!"
message: >
❌ {{ trigger.to_state.name }} ist fehlgeschlagen!
data:
channel: System
# Notify on insecure NAS
- id: notify_on_insecure_nas
alias: "Benachrichtigung bei unsicherem NAS"
mode: parallel
trigger:
- platform: state
entity_id:
- binary_sensor.security_status_backup_nas
- binary_sensor.security_status_nas
to: 'on'
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "NAS unsicher!"
message: >
👮 Das {{ 'Backup-' if 'backup' in trigger.to_state.entity_id else ''}}NAS ist unsicher!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on high Disk Temp
- id: notify_on_high_disk_temp
alias: "Benachrichtigung wenn Festplatten Temperatur hoch ist"
mode: parallel
trigger:
- platform: numeric_state
entity_id:
- sensor.temperature_backup_nas_drive_1
- sensor.temperature_backup_nas_drive_2
- sensor.temperature_nas_drive_1
- sensor.temperature_nas_drive_2
- sensor.temperature_nas_drive_3
- sensor.temperature_nas_drive_4
above: 50
for:
hours: 2
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Hohe Festplatten Temperatur!"
message: >
🌡️Die Festplatte {{ trigger.to_state.entity_id[-1] }} im
{{ 'Backup-' if 'backup' in trigger.to_state.entity_id else ''}}NAS ist seit 2 Stunden über 50°!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on HDD crash in NAS
- id: notify_on_hdd_crash_nas
alias: "Benachrichtigung bei NAS Festplatten Crash"
mode: parallel
trigger:
- platform: state
entity_id:
- sensor.status_backup_nas_drive_1
- sensor.status_backup_nas_drive_2
- sensor.status_nas_drive_1
- sensor.status_nas_drive_2
- sensor.status_nas_drive_3
- sensor.status_nas_drive_4
to: 'crashed'
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Festplatten Crash!"
message: >
💥 Festplatte {{ trigger.to_state.entity_id[-1] }} im
{{ 'Backup-' if 'backup' in trigger.to_state.entity_id else ''}}NAS ist ausgefallen!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on Bad login attempt
- id: notify_on_bad_login_attempt
alias: "Benachrichtigung bei Falschem Loginversuch"
mode: parallel
trigger:
- platform: state
entity_id: "persistent_notification.http_login"
to: "notifying"
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Falscher Loginversuch!"
message: >
👮 {{ state_attr('persistent_notification.http_login', 'message') }}
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Notify on Device Offline
- id: notify_on_device_offline
alias: "Benachrichtigung bei Gerät offline"
mode: parallel
trigger:
- platform: state
entity_id:
- device_tracker.ap_livingroom
- device_tracker.bed_sensor_bedroom
- device_tracker.backup_nas
- device_tracker.nas
- device_tracker.pi_bathroomsmall
- device_tracker.pi_dressroom
- device_tracker.pi_livingroom
- device_tracker.pi_office
- device_tracker.pi_zigbee_zwave
- device_tracker.plug_dishwasher
- device_tracker.kodi_livingroom
- device_tracker.music_bedroom
- device_tracker.music_office
#- device_tracker.music_balcony
- device_tracker.receiver_livingroom
#- device_tracker.receiver_office
- device_tracker.remote_livingroom
#- device_tracker.server_nuc
- device_tracker.smart_home_vm
- device_tracker.investment_vm
- device_tracker.nextcloud_vm
- device_tracker.network_vm
- device_tracker.switch_livingroom
- device_tracker.switch_storageroom
- device_tracker.usg_router
- device_tracker.vacuum_livingroom
from: "home"
to: "not_home"
for:
minutes: 5
- platform: state
entity_id:
- sensor.battery_level_remote_light_livingroom
- sensor.battery_level_remote_light_dressroom
- sensor.battery_level_remote_light_bedroom
- sensor.battery_level_remote_light_office
- sensor.battery_level_remote_sabrina
- sensor.battery_level_remote_dimitri
- binary_sensor.motion_livingroom
- binary_sensor.motion_dressroom
- binary_sensor.motion_bedroom
- binary_sensor.motion_office
- sensor.temperature_bathroomsmall
- sensor.temperature_livingroom
- sensor.temperature_storageroom
- sensor.lux_outside
- sensor.lux_office
- binary_sensor.door_bathroomlarge
- binary_sensor.door_bathroomsmall
- binary_sensor.door_office
- binary_sensor.door_bedroom
- binary_sensor.door_dressroom
- binary_sensor.door_storageroom
- binary_sensor.door_kitchen
- binary_sensor.door_livingroom
- binary_sensor.door_main
- binary_sensor.window_bathroomlarge
- binary_sensor.window_office
- binary_sensor.window_dressroom
- binary_sensor.window_bedroom
- binary_sensor.window_kitchen
- binary_sensor.window_livingroom
- binary_sensor.water_leak_bathroomsmall
- binary_sensor.water_leak_bathroomlarge
- binary_sensor.water_leak_kitchen
- binary_sensor.water_leak_storageroom
to: "unavailable"
for:
minutes: 5
action:
- service: notify.mobile_app_phone_dimitri
data:
title: "Gerät offline!"
message: >
📵 {{ state_attr(trigger.to_state.entity_id, 'friendly_name') }} ist seit 5 Minuten offline!
data:
channel: Notfall
priority: high
ttl: 0
color: red
# Entity Customization
homeassistant:
customize:
# Lights
binary_sensor.pve_hass_prod_running:
friendly_name: HA Prod VM
binary_sensor.pve_cloud_running:
friendly_name: Cloud VM
binary_sensor.pve_investment_running:
friendly_name: Investment VM
binary_sensor.pve_network_running:
friendly_name: Network VM
binary_sensor.pve_hass_dev_running:
friendly_name: HA Dev VM
| 34.464678 | 128 | 0.585747 |
693492d82ab3ffd938b1e7189aad2f31a50f1cee | 1,699 | yaml | YAML | docker-compose.yaml | Ofadiman/eslint-configs-monorepo | d4904715f74c854c6de49c1dd30fd6e4d86df086 | [
"MIT"
] | null | null | null | docker-compose.yaml | Ofadiman/eslint-configs-monorepo | d4904715f74c854c6de49c1dd30fd6e4d86df086 | [
"MIT"
] | null | null | null | docker-compose.yaml | Ofadiman/eslint-configs-monorepo | d4904715f74c854c6de49c1dd30fd6e4d86df086 | [
"MIT"
] | null | null | null | version: '3.7'
services:
eslint-configs-nest-demo:
container_name: eslint-configs-nest-demo
networks:
eslint-configs:
ipv4_address: 172.28.0.3
build:
context: .
dockerfile: dev.Dockerfile
args:
- user_id=$UID
- group_id=$GID
- user=$USER
ports:
- "3001:3001"
volumes:
- .:/app
depends_on:
- eslint-configs-mongo-dev
links:
- eslint-configs-mongo-dev
environment:
MONGO_HOST: eslint-configs-mongo-dev
MONGO_INITDB_DATABASE: eslint-configs-db
MONGO_INITDB_ROOT_PASSWORD: password
MONGO_INITDB_ROOT_USERNAME: root
MONGO_PORT: 27017
SERVER_PORT: 3001
NODE_ENV: development
working_dir: /app/packages/nest-demo
command: yarn start-dev
eslint-configs-react-demo:
container_name: eslint-configs-react-demo
networks:
eslint-configs:
ipv4_address: 172.28.0.4
build:
context: .
dockerfile: dev.Dockerfile
args:
- uid=$UID
- gid=$GID
- user=$USER
volumes:
- .:/app
ports:
- "3000:3000"
environment:
TSC_COMPILE_ON_ERROR: "true"
DISABLE_ESLINT_PLUGIN: "true"
API_URL: "http://localhost:3001"
working_dir: /app/packages/react-demo
command: yarn start
eslint-configs-mongo-dev:
container_name: eslint-configs-mongo-dev
image: mongo:5.0.2
networks:
eslint-configs:
ipv4_address: 172.28.0.5
environment:
MONGO_INITDB_ROOT_PASSWORD: password
MONGO_INITDB_ROOT_USERNAME: root
networks:
eslint-configs:
name: eslint-configs
ipam:
config:
- subnet: 172.28.0.0/16
| 22.959459 | 46 | 0.623308 |
695b2cbc486c68a1cf36cb7b2b20896d2d6ee648 | 447 | yml | YAML | roles/juju-finish/handlers/main.yml | zdw/platform-install | e0a808925f8d3d1f35e5b3ed9a918c54f565f9da | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | roles/juju-finish/handlers/main.yml | zdw/platform-install | e0a808925f8d3d1f35e5b3ed9a918c54f565f9da | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | roles/juju-finish/handlers/main.yml | zdw/platform-install | e0a808925f8d3d1f35e5b3ed9a918c54f565f9da | [
"ECL-2.0",
"Apache-2.0"
] | null | null | null | - name: update-ca-certificates
become: yes
command: update-ca-certificates
- name: Move cert to all service VMs
command: ansible services -b -u ubuntu -m copy -a "src={{ ansible_user_dir }}/keystone_juju_ca_cert.crt dest=/usr/local/share/ca-certificates/keystone_juju_ca_cert.crt owner=root group=root mode=0644"
- name: update-ca-certificates in service VMs
command: ansible services -b -u ubuntu -m command -a "update-ca-certificates"
| 44.7 | 202 | 0.765101 |
f57956617230cfb35d98ebe55a4ff9082f8c1d14 | 496 | yml | YAML | meta/main.yml | nl2go/ansible-role-ip-route | df8624eb76b3bfd70a3618fd2f49a1bfac2385c2 | [
"MIT"
] | null | null | null | meta/main.yml | nl2go/ansible-role-ip-route | df8624eb76b3bfd70a3618fd2f49a1bfac2385c2 | [
"MIT"
] | null | null | null | meta/main.yml | nl2go/ansible-role-ip-route | df8624eb76b3bfd70a3618fd2f49a1bfac2385c2 | [
"MIT"
] | null | null | null | ---
galaxy_info:
author: nl2go
role_name: ip_route
description: Manages IP routes.
company: Newsletter2go GmbH
issue_tracker_url: https://github.com/nl2go/ansible-role-ip-route/issues
license: MIT
min_ansible_version: 2.8
github_branch: master
platforms:
- name: Ubuntu
versions:
- trusty
- xenial
- bionic
- name: Debian
versions:
- stretch
- buster
galaxy_tags:
- network
- ip
- route
dependencies: []
| 19.076923 | 74 | 0.629032 |
fbe70a4dea822a3a896b6b62b116367ee0e5d86f | 3,414 | yml | YAML | helmfile/ingress/jumppod-ingress-nginx.yml | devopscorner/devopscorner-helm | 005e1c9a6fa8c0adc71238b1a979d24bddc77fe8 | [
"Apache-2.0"
] | 1 | 2022-03-27T15:50:39.000Z | 2022-03-27T15:50:39.000Z | helmfile/ingress/jumppod-ingress-nginx.yml | devopscorner/devopscorner-helm | 005e1c9a6fa8c0adc71238b1a979d24bddc77fe8 | [
"Apache-2.0"
] | null | null | null | helmfile/ingress/jumppod-ingress-nginx.yml | devopscorner/devopscorner-helm | 005e1c9a6fa8c0adc71238b1a979d24bddc77fe8 | [
"Apache-2.0"
] | null | null | null | replicaCount: 1
secret:
enabled: false
name: ""
mountPath: {}
subPath: {}
readOnly: true
data: {}
configMap:
enabled: true
name: "jumppod"
mountPath: /app/core/config
readOnly: true
data:
.app.config.json : |-
{
"AppName": "Commons Service",
"GRPCTimeout": 10,
"CacheExpiry": 300,
"CacheCleanup": 600,
"DefaultPageLimit": 3,
"ClientTimeout": 10
}
image:
repository: devopscorner/cicd:alpine
pullPolicy: Always
tag: "latest"
imagePullSecrets: []
nameOverride: ""
fullnameOverride: "jumppod-nginx"
serviceAccount:
create: true
annotations: {}
name: jumppod
namespace: devops-tools
service:
enabled: true
type: ClusterIP
ports:
- name: http
port: 80
targetPort: 80
protocol: TCP
- name: ssh
port: 2222
targetPort: 22
protocol: TCP
containers:
ports:
- name: http
containerPort: 80
protocol: TCP
- name: ssh
containerPort: 22
protocol: TCP
envFrom:
enabled: true
envFrom:
- configMapRef:
name: jumppod-config
ingress:
enabled: true
annotations:
ingress.kubernetes.io/whitelist-source-range: 32.0.0.0/32
kubernetes.io/ingress.class: nginx
meta.helm.sh/release-name: jumppod-nginx
meta.helm.sh/release-namespace: devops-tools
nginx.ingress.kubernetes.io/affinity: cookie
nginx.ingress.kubernetes.io/client-max-body-size: 512M
nginx.ingress.kubernetes.io/cors-allow-headers: '*'
nginx.ingress.kubernetes.io/cors-allow-methods: '*'
nginx.ingress.kubernetes.io/cors-allow-origin: '*'
nginx.ingress.kubernetes.io/enable-cors: 'true'
nginx.ingress.kubernetes.io/force-ssl-redirect: 'true'
nginx.ingress.kubernetes.io/from-to-www-redirect: 'true'
nginx.ingress.kubernetes.io/proxy-connect-timeout: '30'
nginx.ingress.kubernetes.io/proxy-read-timeout: '3600'
nginx.ingress.kubernetes.io/proxy-send-timeout: '3600'
nginx.ingress.kubernetes.io/secure-backends: 'true'
nginx.ingress.kubernetes.io/server-snippets: |
location / {
proxy_http_version 1.1;
proxy_set_header X-Forwarded-Host $http_host;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-For $remote_addr;
proxy_set_header Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
proxy_cache_bypass $http_upgrade;
}
nginx.ingress.kubernetes.io/ssl-redirect: 'true'
nginx.ingress.kubernetes.io/use-proxy-protocol: 'true'
nginx.ingress.kubernetes.io/use-regex: 'true'
nginx.org/websocket-services: 'jumppod-nginx'
hosts:
- host: jumppods-nginx.awscb.id
http:
paths:
- path: /
backend:
serviceName: jumppod-nginx
servicePort: 80
tls: []
application:
enabled: true
env:
- name: HELM_TEMPLATE_NAME
value: api
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 140m
memory: 170Mi
autoscaling:
enabled: true
minReplicas: 1
maxReplicas: 5
targetCPUUtilizationPercentage: 80
targetMemoryUtilizationPercentage: 80
nodeSelector:
enabled: true
select:
node: "devops-tools" # DEV/UAT Cluster
tolerations: []
affinity: {}
podAnnotations: {}
podSecurityContext: {}
securityContext: {} | 23.067568 | 61 | 0.659344 |
aac98afe29f4d078a2031e30d2c0ed50d495bee3 | 521 | yml | YAML | Drupal_8.3/Drupal 8.3 + Commerce 2/commerce_payment_interkassa/commerce_payment_ik.routing.yml | CMSInterkassa/Drupal | 8641641e80b48360da4895808f202166cc3c0890 | [
"MIT"
] | 1 | 2017-04-08T07:20:04.000Z | 2017-04-08T07:20:04.000Z | Drupal_8.3/Drupal 8.3 + Commerce 2/commerce_payment_interkassa/commerce_payment_ik.routing.yml | CMSInterkassa/Drupal | 8641641e80b48360da4895808f202166cc3c0890 | [
"MIT"
] | 2 | 2020-08-30T13:25:16.000Z | 2020-09-15T07:47:22.000Z | Drupal_8.3/Drupal 8.3 + Commerce 2/commerce_payment_interkassa/commerce_payment_ik.routing.yml | CMSInterkassa/Drupal | 8641641e80b48360da4895808f202166cc3c0890 | [
"MIT"
] | 2 | 2017-04-08T07:20:07.000Z | 2020-09-22T12:21:23.000Z | commerce_payment_ik.sendSign:
path: '/interkassa/sendSign'
defaults:
_title: 'Send payment sign'
_controller: '\Drupal\commerce_payment_ik\Controller\InterkassaController::sendSign'
requirements:
_permission: 'access content'
commerce_payment_ik.open_modal_payment:
path: '/interkassa/open_modal_payment'
defaults:
_title: 'Send payment request'
_controller: '\Drupal\commerce_payment_ik\Controller\InterkassaController::open_modal_payment'
requirements:
_permission: 'access content' | 34.733333 | 98 | 0.785029 |
2b1b76dadc6593ff42b7107d072c36f0661f2f9c | 1,696 | yml | YAML | tasks/main.yml | svendewindt/ansible-role-omsagent.linux | fe4b76d41d9ca3ab475f88247bbd7fb4ef058ffb | [
"BSD-2-Clause"
] | 4 | 2020-02-28T11:04:31.000Z | 2020-12-04T15:10:51.000Z | tasks/main.yml | svendewindt/ansible-role-omsagent-linux | fe4b76d41d9ca3ab475f88247bbd7fb4ef058ffb | [
"BSD-2-Clause"
] | 2 | 2020-11-18T14:38:22.000Z | 2020-11-18T14:39:24.000Z | tasks/main.yml | svendewindt/ansible-role-omsagent.linux | fe4b76d41d9ca3ab475f88247bbd7fb4ef058ffb | [
"BSD-2-Clause"
] | 2 | 2021-02-10T18:06:24.000Z | 2021-09-06T08:38:23.000Z | ---
# tasks file for omsagentlinux
- name: Check whether OMS agent is already installed
stat:
path: "{{ oms_agent_path }}"
register: oms_agent_installed
- name: Download OMS agent
get_url:
url: "{{ url_omsagent }}"
dest: /tmp/
mode: 0755
when: not oms_agent_installed.stat.exists or purge_oms_config
- name: Purge any existing configuration for the OMS agent
command: "/tmp/onboard_agent.sh --purge"
when: purge_oms_config
- name: Install OMS agent
command: "/tmp/onboard_agent.sh -w {{ workspace_id }} -s {{ workspace_key }}"
when: not oms_agent_installed.stat.exists or purge_oms_config
- name: Install deamon
command: "/opt/microsoft/omsagent/bin/service_control restart {{ workspace_id }}"
when: not oms_agent_installed.stat.exists or purge_oms_config
- name: Remove OMS agent installer
file: path=/tmp/onboard_agent.sh state=absent
- name: Check wheter Dependency agent is already installed
stat:
path: "{{ dependency_agent_path }}"
register: dependency_agent_installed
- name: Download dependency agent
get_url:
url: "{{ url_dependencyagent }}"
dest: /tmp/InstallDependencyAgent-Linux64.bin
mode: 0755
when: not dependency_agent_installed.stat.exists and install_dependencyagent
- name: Install dependency agent
command: "/tmp/InstallDependencyAgent-Linux64.bin -s"
when: not dependency_agent_installed.stat.exists and install_dependencyagent
- name: Remove dependency agent
yum:
name: dependency-agent
state: absent
when: dependency_agent_installed.stat.exists and not install_dependencyagent
- name: Remove Dependency agent installer
file: path=/tmp/InstallDependencyAgent-Linux64.bin state=absent | 32 | 83 | 0.757075 |
784b10c27a6e1f28d85836014c617819726d2487 | 99 | yml | YAML | config/system.theme.yml | josh-feinstein/nl-v2 | c946c73ef66ec8c7b62b15cb1f45d4c481af8330 | [
"MIT"
] | null | null | null | config/system.theme.yml | josh-feinstein/nl-v2 | c946c73ef66ec8c7b62b15cb1f45d4c481af8330 | [
"MIT"
] | 8 | 2021-09-04T00:13:17.000Z | 2021-09-29T00:14:58.000Z | config/system.theme.yml | josh-feinstein/nl-v2 | c946c73ef66ec8c7b62b15cb1f45d4c481af8330 | [
"MIT"
] | null | null | null | _core:
default_config_hash: fOjer9hADYYnbCJVZMFZIIM1azTFWyg84ZkFDHfAbUg
admin: seven
default: nl
| 19.8 | 66 | 0.868687 |
f73f9424ba9061baf2c25d5eb0f8a7f96f75f08b | 837 | yml | YAML | data/fl/people/Delores-D-D-Hogan-Johnson-3db4ffc1-3340-41c8-977a-9d32152fef74.yml | mikiec84/people | 559e4e802e757dfc617784e2a38eb2832e977141 | [
"CC0-1.0"
] | 1 | 2019-12-11T17:38:21.000Z | 2019-12-11T17:38:21.000Z | data/fl/people/Delores-D-D-Hogan-Johnson-3db4ffc1-3340-41c8-977a-9d32152fef74.yml | mikiec84/people | 559e4e802e757dfc617784e2a38eb2832e977141 | [
"CC0-1.0"
] | 4 | 2021-06-08T22:04:56.000Z | 2022-01-13T03:03:18.000Z | data/fl/people/Delores-D-D-Hogan-Johnson-3db4ffc1-3340-41c8-977a-9d32152fef74.yml | gaybro8777/people | 559e4e802e757dfc617784e2a38eb2832e977141 | [
"CC0-1.0"
] | null | null | null | id: ocd-person/3db4ffc1-3340-41c8-977a-9d32152fef74
name: Delores D. "D" Hogan Johnson
party:
- name: Democratic
roles:
- district: '84'
jurisdiction: ocd-jurisdiction/country:us/state:fl/government
type: lower
contact_details:
- address: 1302 The Capitol;402 South Monroe Street;Tallahassee, FL 32399-1300
note: capitol
voice: 850-717-5084
- address: 100 North US Highway 1;Fort Pierce, FL 34950-4205
note: district
voice: 772-595-1391
links:
- url: http://www.myfloridahouse.gov/Sections/Representatives/details.aspx?MemberId=4726&LegislativeTermId=88
sources:
- url: http://www.myfloridahouse.gov/Sections/Representatives/details.aspx?MemberId=4726&LegislativeTermId=88
- url: http://www.myfloridahouse.gov/Sections/Representatives/representatives.aspx
image: http://www.flhouse.gov/FileStores/Web/Imaging/Member/4726.jpg
| 38.045455 | 109 | 0.789725 |
f755df00b1f01c3c0264ac34f4a53c58bbb6ccb4 | 338 | yml | YAML | .github/workflows/lighthouse.yml | RandellDawson/portfolio | e3125f4a0d85c84c9460daf8c90219cc2e34c78f | [
"ISC"
] | null | null | null | .github/workflows/lighthouse.yml | RandellDawson/portfolio | e3125f4a0d85c84c9460daf8c90219cc2e34c78f | [
"ISC"
] | null | null | null | .github/workflows/lighthouse.yml | RandellDawson/portfolio | e3125f4a0d85c84c9460daf8c90219cc2e34c78f | [
"ISC"
] | null | null | null | name: Lighthouse
on: pull_request
jobs:
audit:
runs-on: ubuntu-latest
steps:
- name: Audit Netlify deploy preview
uses: jakejarvis/lighthouse-action@master
with:
netlify_site: 'raisedadead.netlify.com'
- uses: actions/upload-artifact@master
with:
name: report
path: './report'
| 21.125 | 47 | 0.642012 |
e5bc3783d4cff9fb968c669766b259afc491468e | 74 | yaml | YAML | egs/must_c/st1/conf/tuning/decode_pytorch_transformer.en-pt.yaml | texpomru13/espnet | 7ef005e832e2fb033f356c16f54e0f08762fb4b0 | [
"Apache-2.0"
] | 5,053 | 2017-12-13T06:21:41.000Z | 2022-03-31T13:38:29.000Z | egs/must_c/st1/conf/tuning/decode_pytorch_transformer.en-pt.yaml | texpomru13/espnet | 7ef005e832e2fb033f356c16f54e0f08762fb4b0 | [
"Apache-2.0"
] | 3,666 | 2017-12-14T05:58:50.000Z | 2022-03-31T22:11:49.000Z | egs/must_c/st1/conf/tuning/decode_pytorch_transformer.en-pt.yaml | texpomru13/espnet | 7ef005e832e2fb033f356c16f54e0f08762fb4b0 | [
"Apache-2.0"
] | 1,709 | 2017-12-13T01:02:42.000Z | 2022-03-31T11:57:45.000Z | batchsize: 0
beam-size: 10
penalty: 0.5
maxlenratio: 0.3
minlenratio: 0.0
| 12.333333 | 16 | 0.743243 |
f9cbd57aa8e2d93bcc40516e7a108adfaad2695e | 129 | yml | YAML | test/test.yml | ansible-middleware/ansible-middleware-ee | a44ae3d3711145046b409fa035f66e6048145428 | [
"Apache-2.0"
] | null | null | null | test/test.yml | ansible-middleware/ansible-middleware-ee | a44ae3d3711145046b409fa035f66e6048145428 | [
"Apache-2.0"
] | null | null | null | test/test.yml | ansible-middleware/ansible-middleware-ee | a44ae3d3711145046b409fa035f66e6048145428 | [
"Apache-2.0"
] | null | null | null | ---
- import_playbook: amq.yml
- import_playbook: keycloak.yml
- import_playbook: infinispan.yml
- import_playbook: wildfly.yml
| 18.428571 | 33 | 0.775194 |
e64e5b3ccb857aed11b285d9fb783b6d02397bab | 1,168 | yml | YAML | src/main/resources/config.yml | Leymooo/SimpleSkin | 2658694691414dd80a8b69f96c6935739074a0de | [
"MIT"
] | 7 | 2021-07-07T10:15:50.000Z | 2022-03-28T19:55:53.000Z | src/main/resources/config.yml | Leymooo/SimpleSkin | 2658694691414dd80a8b69f96c6935739074a0de | [
"MIT"
] | 2 | 2021-07-08T10:43:45.000Z | 2022-01-21T23:23:07.000Z | src/main/resources/config.yml | Leymooo/SimpleSkin | 2658694691414dd80a8b69f96c6935739074a0de | [
"MIT"
] | 1 | 2019-01-11T18:46:30.000Z | 2019-01-11T18:46:30.000Z | messages:
no-permission: "&4You don't have the permission to set skin"
skin-not-found: "&4No skin with provided name was found."
#If player does not have skin or default is used
skin-update-error: "&4Can't update your skin."
skin-changed: "&2You received your new skin! Please rejoin to server to see your new skin"
help: "&f--------------- &aSimpleSkins &f--------------- \n
&6/skin &a<name> &r- &6Set skin\n
&6/skin &aupdate &r - &6Update your skin\n
&6/skin &areset &r - &6Reset your skin//"
working: "&4We already working to get your skin. Please wait"
fetching: "&aFetching new skin. Please wait"
#If true player need to have 'simpleskins.skin' permission to use /skin command
use-permission: false
# Here you can specify default skins for player who do not have a skin
# The entries from this list will be selected in random order.
#
# This list should either contain the UUID or UserName of the skin owner.
#
# Lists are created like this:
#default-skins:
# - 0aaa2c13-922a-411b-b655-9b8c08404695
# - 069a79f4-44e9-4726-a5be-fca90e38aaf5
# - Leymooo
#
# If this list is empty no skin will be selected
default-skins: [] | 43.259259 | 92 | 0.695205 |
fb209ae15ba31617cd1a9b140016704b950dcc0b | 2,867 | yaml | YAML | packages/th/th-utilities.yaml | justinwoo/all-cabal-metadata | e973c904ffc2d570a79ec86de868edac4abdb5e0 | [
"MIT"
] | null | null | null | packages/th/th-utilities.yaml | justinwoo/all-cabal-metadata | e973c904ffc2d570a79ec86de868edac4abdb5e0 | [
"MIT"
] | null | null | null | packages/th/th-utilities.yaml | justinwoo/all-cabal-metadata | e973c904ffc2d570a79ec86de868edac4abdb5e0 | [
"MIT"
] | null | null | null | homepage: https://github.com/fpco/th-utilities#readme
changelog-type: markdown
hash: fbbb48b4e8d52153bda04f4e4e0c755506696125dee1f9278044e1c50b5eda7f
test-bench-deps:
th-utilities: -any
bytestring: -any
base: ! '>=4.7 && <5'
hspec: -any
text: -any
th-orphans: -any
syb: -any
filepath: -any
containers: -any
template-haskell: ! '>=2.7'
primitive: -any
vector: -any
directory: -any
maintainer: Michael Sloan <sloan@fpcomplete.com>
synopsis: Collection of useful functions for use with Template Haskell
changelog: ! "# ChangeLog\n\n## 0.2.0.0\n\n* Adds TH.ReifySimple, which supports reifying
most of the information TH users\n care about.\n\n* Adds some utilities based on
SYB, which is often useful for TH.\n\n* Makes relative path stuff less noisyi with
GHCi.\n\n## 0.1.0.0\n\n* First public release\n"
basic-deps:
bytestring: -any
base: ! '>=4.7 && <5'
text: -any
th-orphans: -any
syb: -any
filepath: -any
containers: -any
template-haskell: ! '>=2.7'
primitive: -any
directory: -any
all-versions:
- '0.1.0.0'
- '0.1.0.1'
- '0.1.1.0'
- '0.1.1.1'
- '0.2.0.0'
- '0.2.0.1'
author: ''
latest: '0.2.0.1'
description-type: markdown
description: ! "# th-utilities\n\n[](https://travis-ci.org/fpco/th-utilities)\n\nThe
'th-utilities' package provides a number of useful utilities for\n[Template Haskell](https://hackage.haskell.org/package/template-haskell-2.10.0.0).\nIn
particular:\n\n* [`TH.Derive`](https://github.com/fpco/th-utilities/blob/master/src/TH/Derive.hs)\n
\ provides a convenient system for using TH to derive typeclass instances. It\n
\ allows for open registration of TH derivers, and reuses instance syntax for\n
\ invoking them.\n\n - [`TH.Derive.Storable`](https://github.com/fpco/th-utilities/blob/master/src/TH/Derive/Storable.hs)\n
\ defines derivation of Storable for ADTs.\n\n* [`TH.ReifyDataType`](https://github.com/fpco/th-utilities/blob/master/src/TH/ReifyDataType.hs)\n
\ provides utilities for reifying simplified datatype info. It omits details\n that
you don't usually want to handle, making it much more straightforward to\n generate
code based on datatype structure.\n\n* [`TH.RelativePaths`](https://github.com/fpco/th-utilities/blob/master/src/TH/RelativePaths.hs)\n
\ provides utilities for loading files based on paths relative to the cabal\n file.
This is particularly handy for loading code into ghci even when its\n current dir
isn't the package dir. Ideally, this module would be used by\n everyone who currently
uses `qAddDependentFile`.\n\n* [`TH.Utilities`](https://github.com/fpco/th-utilities/blob/master/src/TH/Utilities.hs)\n
\ provides a miscellaneous set of utilities that are useful within this package\n
\ and elsewhere.\n"
license-name: MIT
| 46.241935 | 171 | 0.726543 |
c136d493e3905281326098d5d20a94fd48a4b9bc | 79 | yaml | YAML | .prettierrc.yaml | Askadar/half-a-joke-bot | aeb531c99d705b77a64ee1ed0c490e1a081d5a91 | [
"WTFPL"
] | null | null | null | .prettierrc.yaml | Askadar/half-a-joke-bot | aeb531c99d705b77a64ee1ed0c490e1a081d5a91 | [
"WTFPL"
] | null | null | null | .prettierrc.yaml | Askadar/half-a-joke-bot | aeb531c99d705b77a64ee1ed0c490e1a081d5a91 | [
"WTFPL"
] | null | null | null | singleQuote: true
trailingComma: all
semi: false
useTabs: true
printWidth: 100
| 13.166667 | 18 | 0.810127 |
822589451f1668c04fdfa68a607dad82c3563e05 | 22 | yml | YAML | ansible/roles/ssh_config/default/main.yml | sylvainmetayer/dotfiles | e52b4e5602f5c0fd5bd7b118988cfb4fc2a98957 | [
"MIT"
] | null | null | null | ansible/roles/ssh_config/default/main.yml | sylvainmetayer/dotfiles | e52b4e5602f5c0fd5bd7b118988cfb4fc2a98957 | [
"MIT"
] | 36 | 2020-02-16T17:35:13.000Z | 2022-02-08T09:15:29.000Z | ansible/roles/ssh_config/default/main.yml | sylvainmetayer/dotfiles | e52b4e5602f5c0fd5bd7b118988cfb4fc2a98957 | [
"MIT"
] | null | null | null | ---
github_token: xxx
| 7.333333 | 17 | 0.681818 |
82335508528b37151c79cf0fdc84f532ba9aa568 | 626 | yml | YAML | gcb-builder/vendor/github.com/opencontainers/runc/.travis.yml | OskarStark/continuouspipe | 11926aa48938c01bd76f9f397e1759154d163ecb | [
"Apache-2.0"
] | 172 | 2018-02-20T08:10:54.000Z | 2022-01-01T13:20:17.000Z | gcb-builder/vendor/github.com/opencontainers/runc/.travis.yml | OskarStark/continuouspipe | 11926aa48938c01bd76f9f397e1759154d163ecb | [
"Apache-2.0"
] | 38 | 2018-02-20T09:44:05.000Z | 2019-05-29T22:43:04.000Z | gcb-builder/vendor/github.com/opencontainers/runc/.travis.yml | OskarStark/continuouspipe | 11926aa48938c01bd76f9f397e1759154d163ecb | [
"Apache-2.0"
] | 13 | 2018-02-20T09:31:13.000Z | 2019-12-09T16:46:57.000Z | language: go
go:
- 1.7.x
- 1.8.x
- tip
matrix:
allow_failures:
- go: tip
# `make ci` uses Docker.
sudo: required
services:
- docker
env:
global:
- BUILDTAGS="seccomp apparmor selinux ambient"
before_install:
- sudo apt-get -qq update
- sudo apt-get install -y libseccomp-dev libapparmor-dev
- go get -u github.com/golang/lint/golint
- go get -u github.com/vbatts/git-validation
- go get -u github.com/mvdan/sh/cmd/shfmt
script:
- git-validation -run DCO,short-subject -v -range ${TRAVIS_COMMIT_RANGE}
- make BUILDTAGS="${BUILDTAGS}"
- make BUILDTAGS="${BUILDTAGS}" clean validate test
| 20.193548 | 74 | 0.686901 |
cc20807f0790a84f7199f07ee71f8437ccd42279 | 1,005 | yaml | YAML | src/test/resources/betamax/tapes/bulk_delete.yaml | alienhunter3010/rundeck-api-java-client | 10f567088be7dd5d93e4650131324813840db241 | [
"Apache-2.0"
] | 12 | 2015-02-26T16:58:47.000Z | 2019-10-24T18:37:58.000Z | src/test/resources/betamax/tapes/bulk_delete.yaml | alienhunter3010/rundeck-api-java-client | 10f567088be7dd5d93e4650131324813840db241 | [
"Apache-2.0"
] | 18 | 2015-02-26T16:25:32.000Z | 2019-03-28T14:24:58.000Z | src/test/resources/betamax/tapes/bulk_delete.yaml | alienhunter3010/rundeck-api-java-client | 10f567088be7dd5d93e4650131324813840db241 | [
"Apache-2.0"
] | 19 | 2015-02-10T08:18:47.000Z | 2020-06-17T07:25:21.000Z | !tape
name: bulk_delete
interactions:
- recorded: 2012-10-02T21:48:08.746Z
request:
method: POST
uri: http://rundeck.local:4440/api/5/jobs/delete
headers:
Content-Length: '40'
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Host: rundeck.local:4440
Proxy-Connection: Keep-Alive
User-Agent: Rundeck API Java Client 5
X-Rundeck-Auth-Token: PP4s4SdCRO6KUoNPd1D303Dc304ORN87
body: ''
response:
status: 200
headers:
Content-Type: text/xml; charset=utf-8
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Server: Jetty(6.1.21)
Set-Cookie: JSESSIONID=g2vkkp7li3rh;Path=/
body: '<result success=''true'' apiversion=''5''><deleteJobs requestCount=''1'' allsuccessful=''true''><succeeded count=''1''><deleteJobResult id=''0ce457b5-ba84-41ca-812e-02b31da355a4''><message>Job was successfully deleted: [0ce457b5-ba84-41ca-812e-02b31da355a4]
/blah test</message></deleteJobResult></succeeded></deleteJobs></result>'
| 40.2 | 268 | 0.694527 |
77e6349ddf2823905a557c05bcabba84f0019120 | 3,231 | yml | YAML | reference-docs/identity/identity/azure-identity/latest-stable/UsernamePasswordCredential.yml | MicrosoftDocs/azure-sdk-docs-demo | 615e7bc6bce0ea44da2912eed6ef54fd0db8d775 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | reference-docs/identity/identity/azure-identity/latest-stable/UsernamePasswordCredential.yml | MicrosoftDocs/azure-sdk-docs-demo | 615e7bc6bce0ea44da2912eed6ef54fd0db8d775 | [
"CC-BY-4.0",
"MIT"
] | 5 | 2021-02-04T17:24:50.000Z | 2021-09-11T05:42:47.000Z | reference-docs/identity/identity/azure-identity/latest-stable/UsernamePasswordCredential.yml | MicrosoftDocs/azure-sdk-docs-demo | 615e7bc6bce0ea44da2912eed6ef54fd0db8d775 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ### YamlMime:TSType
name: UsernamePasswordCredential
uid: '@azure/identity.UsernamePasswordCredential|latest-stable'
package: '@azure/identity|latest-stable'
summary: |-
Enables authentication to Azure Active Directory with a user's
username and password. This credential requires a high degree of
trust so you should only use it when other, more secure credential
types can't be used.
fullName: UsernamePasswordCredential
remarks: ''
isPreview: false
isDeprecated: false
type: class
constructors:
- name: >-
UsernamePasswordCredential(string, string, string, string,
UsernamePasswordCredentialOptions)
uid: '@azure/identity.UsernamePasswordCredential.constructor|latest-stable'
package: '@azure/identity|latest-stable'
summary: |-
Creates an instance of the UsernamePasswordCredential with the details
needed to authenticate against Azure Active Directory with a username
and password.
remarks: ''
isPreview: false
isDeprecated: false
syntax:
content: >-
new UsernamePasswordCredential(tenantId: string, clientId: string,
username: string, password: string, options?:
UsernamePasswordCredentialOptions)
parameters:
- id: tenantId
type: string
description: The Azure Active Directory tenant (directory).
- id: clientId
type: string
description: The client (application) ID of an App Registration in the tenant.
- id: username
type: string
description: The user account's e-mail address (user name).
- id: password
type: string
description: The user account's account password
- id: options
type: >-
<xref
uid="@azure/identity.UsernamePasswordCredentialOptions|latest-stable"
/>
description: >
Options for configuring the client which makes the authentication
request.
methods:
- name: getToken(string | string[], GetTokenOptions)
uid: '@azure/identity.UsernamePasswordCredential.getToken|latest-stable'
package: '@azure/identity|latest-stable'
summary: >
Authenticates with Azure Active Directory and returns an access token if
successful.
If authentication fails, a
<xref:@azure/identity.CredentialUnavailableError> will be thrown with the
details of the failure.
If the user provided the option `disableAutomaticAuthentication`,
once the token can't be retrieved silently,
this method won't attempt to request user interaction to retrieve the
token.
remarks: ''
isPreview: false
isDeprecated: false
syntax:
content: 'function getToken(scopes: string | string[], options?: GetTokenOptions)'
parameters:
- id: scopes
type: string | string[]
description: The list of scopes for which the token will have access.
- id: options
type: GetTokenOptions
description: |
The options used to configure any requests this
TokenCredential implementation might make.
return:
type: Promise<AccessToken>
description: ''
| 36.303371 | 88 | 0.675023 |
6d2684a5a7dc20fd72496e42db5c1ea255dcd696 | 294 | yaml | YAML | _data/convert_rotate_rotate_scale_widthx_height_modulate_brightness_contras.yaml | zjjott/commandlinefu.cn | b142a24d852553f74b13f1aa68b4d92a15139c6b | [
"Unlicense"
] | 1 | 2017-01-24T21:38:09.000Z | 2017-01-24T21:38:09.000Z | _data/convert_rotate_rotate_scale_widthx_height_modulate_brightness_contras.yaml | zjjott/commandlinefu.cn | b142a24d852553f74b13f1aa68b4d92a15139c6b | [
"Unlicense"
] | null | null | null | _data/convert_rotate_rotate_scale_widthx_height_modulate_brightness_contras.yaml | zjjott/commandlinefu.cn | b142a24d852553f74b13f1aa68b4d92a15139c6b | [
"Unlicense"
] | null | null | null | commandlinefu_id: 2105
translator:
weibo: ''
hide: true
command: |-
convert -rotate $rotate -scale $Widthx$Height -modulate $brightness -contrast $contrast -colorize $red%,$green%,$blue% $filter file_in.png file_out.png
summary: |-
Scale,Rotate, brightness, contrast,...with Image Magick
| 32.666667 | 153 | 0.741497 |
6d695cee66527d9f8d007def29122cdfdd8c45a6 | 437 | yml | YAML | config/locales/en.yml | emptyflask/doorkeeper-device_authorization_grant | bc891339aaf9e0bb1b2e40678054bb9092bb0681 | [
"MIT"
] | 1 | 2021-02-23T20:45:11.000Z | 2021-02-23T20:45:11.000Z | config/locales/en.yml | dgraham/doorkeeper-device_authorization_grant | bc891339aaf9e0bb1b2e40678054bb9092bb0681 | [
"MIT"
] | null | null | null | config/locales/en.yml | dgraham/doorkeeper-device_authorization_grant | bc891339aaf9e0bb1b2e40678054bb9092bb0681 | [
"MIT"
] | null | null | null | en:
doorkeeper:
device_authorization_grant:
device_authorizations:
index:
title: 'Authorize device'
user_code: 'User code'
authorize: 'Authorize'
cancel: 'Cancel'
flash:
device_codes:
authorize:
invalid_user_code: 'The user code is invalid'
expired_user_code: 'The user code is expired'
success: 'Device successfully authorized'
| 27.3125 | 55 | 0.608696 |
3a7b34ee937809af630df1904e96a1258822fd76 | 1,031 | yaml | YAML | cves/2019/CVE-2019-16332.yaml | affilares/nuclei-templates | 40077029e8f3e456fe1375138752b101fa45db8d | [
"MIT"
] | 1 | 2021-09-23T20:02:36.000Z | 2021-09-23T20:02:36.000Z | cves/2019/CVE-2019-16332.yaml | affilares/nuclei-templates | 40077029e8f3e456fe1375138752b101fa45db8d | [
"MIT"
] | null | null | null | cves/2019/CVE-2019-16332.yaml | affilares/nuclei-templates | 40077029e8f3e456fe1375138752b101fa45db8d | [
"MIT"
] | null | null | null | id: CVE-2019-16332
info:
name: API Bearer Auth <= 20181229 - Reflected Cross-Site Scripting (XSS)
author: daffainfo
severity: medium
description: In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
reference: |
- https://plugins.trac.wordpress.org/changeset/2152730
- https://wordpress.org/plugins/api-bearer-auth/#developers
tags: cve,cve2019,wordpress,xss,wp-plugin
requests:
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/api-bearer-auth/swagger/swagger-config.yaml.php?&server=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
| 31.242424 | 214 | 0.671193 |
5b015411f1fd861f17a9467a2134c5f22cca4729 | 957 | yaml | YAML | releasenotes/notes/improve-compute-data-model-b427c85e4ed2b6fb.yaml | ajaytikoo/watcher | 6dbac1f6ae7f3e10dfdcef5721fa4af7af54e159 | [
"Apache-2.0"
] | 64 | 2015-10-18T02:57:24.000Z | 2022-01-13T11:27:51.000Z | releasenotes/notes/improve-compute-data-model-b427c85e4ed2b6fb.yaml | ajaytikoo/watcher | 6dbac1f6ae7f3e10dfdcef5721fa4af7af54e159 | [
"Apache-2.0"
] | null | null | null | releasenotes/notes/improve-compute-data-model-b427c85e4ed2b6fb.yaml | ajaytikoo/watcher | 6dbac1f6ae7f3e10dfdcef5721fa4af7af54e159 | [
"Apache-2.0"
] | 35 | 2015-12-25T13:53:21.000Z | 2021-07-19T15:50:16.000Z | ---
features:
- |
Watcher can get resource information such as total, allocation ratio and
reserved information from Placement API.
Now we add some new fields to the Watcher Data Model:
* vcpu_reserved: The amount of cpu a node has reserved for its own use.
* vcpu_ratio: CPU allocation ratio.
* memory_mb_reserved: The amount of memory a node has reserved for
its own use.
* memory_ratio: Memory allocation ratio.
* disk_gb_reserved: The amount of disk a node has reserved for its own use.
* disk_ratio: Disk allocation ratio.
We also add some new propeties:
* vcpu_capacity: The amount of vcpu, take allocation ratio into account,
but do not include reserved.
* memory_mb_capacity: The amount of memory, take allocation ratio into
account, but do not include reserved.
* disk_gb_capacity: The amount of disk, take allocation ratio into
account, but do not include reserved.
| 39.875 | 79 | 0.722048 |
5571b5748f2e203ceb4dded4271a49f9b5863329 | 1,327 | yml | YAML | .github/workflows/go.yml | yangfan16/common | 39596137f51a3b40d8ed007f4d5c2c8d067e6652 | [
"MIT"
] | null | null | null | .github/workflows/go.yml | yangfan16/common | 39596137f51a3b40d8ed007f4d5c2c8d067e6652 | [
"MIT"
] | null | null | null | .github/workflows/go.yml | yangfan16/common | 39596137f51a3b40d8ed007f4d5c2c8d067e6652 | [
"MIT"
] | null | null | null | name: GoCommon
on:
push:
branches: [ master ]
jobs:
build:
name: Build
runs-on: ubuntu-latest
steps:
- name: Set up Go 1.14
uses: actions/setup-go@v2
with:
go-version: ^1.14
id: go
- name: Check out code into the Go module directory
uses: actions/checkout@v2
- name: Get dependencies
run: |
go get -v -t -d ./...
if [ -f Gopkg.toml ]; then
curl https://raw.githubusercontent.com/golang/dep/master/install.sh | sh
dep ensure
fi
- name: Cache Primes
uses: actions/cache@v1
with:
path: ~/go/pkg/mod
key: ${{ runner.os }}-go-${{ hashFiles('**/go.sum') }}
restore-keys: |
${{ runner.os }}-go-
# - name: Build
# 这里build 时交叉编译并设置使用所有内置库静态编译程序
# 方便最后一步做出的Docker镜像小一些
# run: CGO_ENABLED=0 GOOS=linux go build -a -ldflags '-extldflags "-static"' -o main .
- name: Staticcheck
run: |
# https://github.com/actions/setup-go/issues/14
# 已经修复这个问题,直接go get 就行
# export PATH=${PATH}:`go env GOPATH`/bin
go get -u honnef.co/go/tools/cmd/staticcheck
staticcheck ./...
- name: Test
run: |
go get -u github.com/smartystreets/goconvey
go test -v ./...
| 23.280702 | 91 | 0.539563 |
14f1f2b05db0c21b5040635ce32527ee7f93f241 | 588 | yaml | YAML | manifests/v/valinet/ExplorerPatcher/Prerelease/22000.493.42.31/valinet.ExplorerPatcher.Prerelease.installer.yaml | A-i-Evolution-MHZ/winget-pkgs | 07a182b07c96a99ec4d06d2a4d1019461ee56cf6 | [
"MIT"
] | 1 | 2022-03-16T01:49:39.000Z | 2022-03-16T01:49:39.000Z | manifests/v/valinet/ExplorerPatcher/Prerelease/22000.493.42.31/valinet.ExplorerPatcher.Prerelease.installer.yaml | A-i-Evolution-MHZ/winget-pkgs | 07a182b07c96a99ec4d06d2a4d1019461ee56cf6 | [
"MIT"
] | 16 | 2021-10-06T19:47:34.000Z | 2021-11-18T19:41:35.000Z | manifests/v/valinet/ExplorerPatcher/Prerelease/22000.493.42.31/valinet.ExplorerPatcher.Prerelease.installer.yaml | A-i-Evolution-MHZ/winget-pkgs | 07a182b07c96a99ec4d06d2a4d1019461ee56cf6 | [
"MIT"
] | 1 | 2022-02-23T10:45:32.000Z | 2022-02-23T10:45:32.000Z | # Created with YamlCreate.ps1 v2.1.0 $debug=QUSU.5-1-22567-1
# yaml-language-server: $schema=https://aka.ms/winget-manifest.installer.1.1.0.schema.json
PackageIdentifier: valinet.ExplorerPatcher.Prerelease
PackageVersion: 22000.493.42.31
MinimumOSVersion: 10.0.0.0
InstallerType: inno
UpgradeBehavior: install
Installers:
- Architecture: x64
InstallerUrl: https://github.com/valinet/ExplorerPatcher/releases/download/22000.493.42.31_80106bb/ep_setup.exe
InstallerSha256: F369A449F1BAE8C86E57E7C61AFEA050289651FD58464FE74A7B4B46C830194F
ManifestType: installer
ManifestVersion: 1.1.0
| 39.2 | 113 | 0.829932 |
092c7974d72940ae6a4ae8f544173f778deb74ad | 822 | yaml | YAML | charts/cloudinfo/templates/secret.yaml | mrsheepuk/cloudinfo | 8b401ae3b2377147f49fec2d15dd14db06205d5c | [
"Apache-2.0"
] | 188 | 2018-09-20T12:36:40.000Z | 2022-03-21T09:00:20.000Z | charts/cloudinfo/templates/secret.yaml | mrsheepuk/cloudinfo | 8b401ae3b2377147f49fec2d15dd14db06205d5c | [
"Apache-2.0"
] | 596 | 2021-04-26T16:03:10.000Z | 2022-02-18T23:13:31.000Z | charts/cloudinfo/templates/secret.yaml | EarthlyAlien/cloudinfo | 9c935d4270f740419f3e4b521ac3dbcb9da923b5 | [
"Apache-2.0"
] | 32 | 2018-12-12T21:59:34.000Z | 2022-02-23T12:48:42.000Z | apiVersion: v1
kind: Secret
metadata:
name: {{ template "cloudinfo.fullname" . }}
labels:
app.kubernetes.io/name: {{ include "cloudinfo.name" . }}
helm.sh/chart: {{ include "cloudinfo.chart" . }}
app.kubernetes.io/instance: {{ .Release.Name }}
app.kubernetes.io/managed-by: {{ .Release.Service }}
type: Opaque
stringData:
config.yaml: |
app:
basePath: {{ .Values.app.basePath }}
log:
level: {{ .Values.app.logLevel }}
metrics:
enabled: {{ .Values.metrics.enabled }}
config:
vault:
{{ toYaml .Values.app.vault | indent 8 }}
store:
redis:
enabled: {{ .Values.store.redis.enabled }}
host: {{ include "cloudinfo.redis.host" . }}
port: {{ include "cloudinfo.redis.port" . }}
provider:
{{ toYaml .Values.providers | indent 6 }}
| 28.344828 | 60 | 0.604623 |
07ac12cc2a17bb120672792e71704b83a1b15a3a | 1,226 | yml | YAML | content/Unreal Tournament/Maps/DeathMatch/M/f/b/bbb2b5/dm-mirvick_[fbbbb2b5].yml | acrinym/unreal-archive-data | ac9f151af3b401c10970839e7c5eb594e181e74a | [
"Unlicense"
] | 20 | 2019-02-05T15:09:30.000Z | 2022-03-06T02:04:19.000Z | content/Unreal Tournament/Maps/DeathMatch/M/f/b/bbb2b5/dm-mirvick_[fbbbb2b5].yml | acrinym/unreal-archive-data | ac9f151af3b401c10970839e7c5eb594e181e74a | [
"Unlicense"
] | 496 | 2019-02-17T20:07:27.000Z | 2022-03-28T10:35:41.000Z | content/Unreal Tournament/Maps/DeathMatch/M/f/b/bbb2b5/dm-mirvick_[fbbbb2b5].yml | acrinym/unreal-archive-data | ac9f151af3b401c10970839e7c5eb594e181e74a | [
"Unlicense"
] | 15 | 2019-02-02T14:06:44.000Z | 2022-02-24T22:40:18.000Z | --- !<MAP>
contentType: "MAP"
firstIndex: "2018-10-19 23:04"
game: "Unreal Tournament"
name: "DM-mirvick"
author: "A-AlkazeX-X"
description: "Welcome on Mirvick space base"
releaseDate: "2002-07"
attachments: []
originalFilename: "dm-mirvick.zip"
hash: "fbbbb2b53d6484493a4fad49f2fb1f29258646cd"
fileSize: 408099
files:
- name: "DM-mirvick.unr"
fileSize: 1361028
hash: "563a9f8a731fea63cfc1de36eb81c67bbbc6aba1"
otherFiles: 0
dependencies: {}
downloads:
- url: "http://medor.no-ip.org/index.php?dir=Maps/DeathMatch&file=dm-mirvick.zip"
main: false
repack: false
state: "OK"
- url: "https://f002.backblazeb2.com/file/unreal-archive-files/Unreal%20Tournament/Maps/DeathMatch/M/dm-mirvick.zip"
main: true
repack: false
state: "OK"
- url: "https://files.vohzd.com/unrealarchive/Unreal%20Tournament/Maps/DeathMatch/M/f/b/bbb2b5/dm-mirvick.zip"
main: false
repack: false
state: "OK"
- url: "https://unreal-archive-files.eu-central-1.linodeobjects.com/Unreal%20Tournament/Maps/DeathMatch/M/f/b/bbb2b5/dm-mirvick.zip"
main: false
repack: false
state: "OK"
deleted: false
gametype: "DeathMatch"
title: "Mirvick"
playerCount: "2-4"
themes:
Skaarj Crypt: 0.3
Industrial: 0.1
Skaarj Tech: 0.5
bots: true
| 27.244444 | 132 | 0.739804 |
07d68fef923dbb9d30b3a00ef1804ddd84a87868 | 389 | yml | YAML | reference-docs/app-service/azure-arm-appservice/stable/WebAppsGetAuthSettingsResponse.yml | MicrosoftDocs/azure-sdk-docs-demo-2 | 080636441276afa13b3bfefa9cb5971f7f3ebcc3 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2022-02-27T20:08:19.000Z | 2022-02-27T20:08:19.000Z | reference-docs/app-service/azure-arm-appservice/stable/WebAppsGetAuthSettingsResponse.yml | MicrosoftDocs/azure-sdk-docs-demo-2 | 080636441276afa13b3bfefa9cb5971f7f3ebcc3 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | reference-docs/app-service/azure-arm-appservice/stable/WebAppsGetAuthSettingsResponse.yml | MicrosoftDocs/azure-sdk-docs-demo-2 | 080636441276afa13b3bfefa9cb5971f7f3ebcc3 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ### YamlMime:TSTypeAlias
name: WebAppsGetAuthSettingsResponse
uid: '@azure/arm-appservice.WebAppsGetAuthSettingsResponse|stable'
package: '@azure/arm-appservice|stable'
summary: Contains response data for the getAuthSettings operation.
fullName: WebAppsGetAuthSettingsResponse
remarks: ''
isPreview: false
isDeprecated: false
syntax: type WebAppsGetAuthSettingsResponse = SiteAuthSettings
| 35.363636 | 66 | 0.848329 |
7bcceb0aacda160a7c1c93200757c97bc254886c | 95 | yaml | YAML | components/central-config/kustomization.yaml | AlexeyALeonov/argocd | ed33b1d6f8ac2e55643bbe53a82fe552d89ac921 | [
"Apache-2.0"
] | null | null | null | components/central-config/kustomization.yaml | AlexeyALeonov/argocd | ed33b1d6f8ac2e55643bbe53a82fe552d89ac921 | [
"Apache-2.0"
] | null | null | null | components/central-config/kustomization.yaml | AlexeyALeonov/argocd | ed33b1d6f8ac2e55643bbe53a82fe552d89ac921 | [
"Apache-2.0"
] | null | null | null | apiVersion: kustomize.config.k8s.io/v1alpha1
kind: Component
patchesStrategicMerge:
- map.yaml
| 19 | 44 | 0.831579 |
f174cf439e0bb4a52c166c0af3a27e441bbe9c34 | 4,000 | yml | YAML | terraform/modules/http-tor/cloud-init/http.yml | bavarianledger/esplora | f0e5c113900859e0350f3b6eef47e07d645d758f | [
"MIT"
] | 680 | 2018-12-06T17:13:14.000Z | 2022-03-27T23:35:24.000Z | terraform/modules/http-tor/cloud-init/http.yml | bavarianledger/esplora | f0e5c113900859e0350f3b6eef47e07d645d758f | [
"MIT"
] | 299 | 2018-12-07T04:16:15.000Z | 2022-03-29T12:20:59.000Z | terraform/modules/http-tor/cloud-init/http.yml | bavarianledger/esplora | f0e5c113900859e0350f3b6eef47e07d645d758f | [
"MIT"
] | 294 | 2018-12-06T17:13:19.000Z | 2022-03-30T08:11:11.000Z | users:
- name: bs
uid: 2000
write_files:
- path: /home/bs/nginx.conf
permissions: 0644
owner: root
content: |
user root;
worker_processes 1;
error_log /var/log/nginx/error.log;
events {
worker_connections 1024;
}
http {
# this nginx server is used just to redirect http to https
include mime.types;
default_type application/octet-stream;
log_format combined_host '$remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent" "$http_x_forwarded_for" "$host" "$http_x_real_ip';
access_log /var/log/nginx/access.log combined_host;
sendfile on;
keepalive_timeout 65;
server {
listen 80;
server_name explorer.greenaddress.it explorer.blockstream.com blockstream.info;
location /lbtest {
return 200;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 80 default_server;
server_name _;
location /lbtest {
return 200;
}
location / {
return 301 https://blockstream.info$request_uri;
}
}
}
- path: /etc/systemd/system/nginx.service
permissions: 0644
owner: root
content: |
[Unit]
Description=Nginx LB instance
Wants=gcr-online.target docker.service
After=gcr-online.service docker.service
[Service]
Restart=always
RestartSec=1
Environment=HOME=/home/bs
ExecStartPre=/usr/bin/docker-credential-gcr configure-docker
ExecStartPre=/usr/bin/docker pull ${docker_tag_nginx}
ExecStartPre=/sbin/iptables -A INPUT -m tcp -p tcp --dport 80 -j ACCEPT
ExecStart=/usr/bin/docker run \
--log-driver=gcplogs \
--network=host \
--pid=host \
--name=nginx \
--tmpfs /tmp/ \
-v /home/bs/nginx.conf:/etc/nginx/nginx.conf:ro \
"${docker_tag_nginx}"
ExecStop=/usr/bin/docker stop nginx
ExecStopPost=/usr/bin/docker rm nginx
ExecStopPost=/sbin/iptables -D INPUT -m tcp -p tcp --dport 80 -j ACCEPT
[Install]
WantedBy=multi-user.target
- path: /etc/systemd/system/node-exporter.service
permissions: 0644
owner: root
content: |
[Unit]
Description=prometheus node-exporter
Wants=gcr-online.target docker.service
After=gcr-online.service docker.service
[Service]
Restart=always
RestartSec=1
Environment=HOME=/home/bs
ExecStartPre=/usr/bin/docker-credential-gcr configure-docker
ExecStartPre=/usr/bin/docker pull ${docker_tag_node_exporter}
ExecStartPre=/sbin/iptables -A INPUT -m tcp -p tcp --dport 9100 -j ACCEPT
ExecStart=/usr/bin/docker run \
--log-driver=gcplogs \
--name=node-exporter \
--network=host \
--read-only \
-v /proc:/host/proc:ro \
-v /sys:/host/sys:ro \
-v /:/rootfs:ro \
-v metrics:/metrics:ro \
-v /var/run/dbus/system_bus_socket:/var/run/dbus/system_bus_socket:ro \
"${docker_tag_node_exporter}" --path.procfs /host/proc --path.sysfs /host/sys --collector.textfile.directory /metrics --collector.filesystem.ignored-mount-points "^/(sys|proc|dev|host|etc($|/))" --collector.systemd
ExecStop=/usr/bin/docker stop node-exporter
ExecStopPost=/usr/bin/docker rm node-exporter
ExecStopPost=/sbin/iptables -D INPUT -m tcp -p tcp --dport 9100 -j ACCEPT
[Install]
WantedBy=multi-user.target
runcmd:
- systemctl daemon-reload
- systemctl start nginx.service
- systemctl enable nginx.service
- systemctl start node-exporter.service
- systemctl enable node-exporter.service
| 32.258065 | 226 | 0.59975 |
b5d5afee58b368afc913b4377c92bda62bb7fb1b | 742 | yml | YAML | src/main/resources/language.yml | caneva20/CNVDumpingGround | 995ccb6aa77e43aa8c46a3f79a6f607eddd651ae | [
"MIT"
] | null | null | null | src/main/resources/language.yml | caneva20/CNVDumpingGround | 995ccb6aa77e43aa8c46a3f79a6f607eddd651ae | [
"MIT"
] | null | null | null | src/main/resources/language.yml | caneva20/CNVDumpingGround | 995ccb6aa77e43aa8c46a3f79a6f607eddd651ae | [
"MIT"
] | null | null | null | YOU_HAVENT_SELECTED_AN_AREA: 'You haven''t selected an area'
DUMPING_GROUND_AREA_SUCCESSFULLY_SAVED: 'Dumping ground area successfully saved!'
DUMPING_GROUND_AREA_SUCCESSFULLY_CLEANED: 'Dumping ground area successfully cleaned based on main configuration'
DUMPING_GROUND_AREA_SUCCESSFULLY_CLEANED_AND_CHESTS_REMOVED: 'Dumping ground area successfully cleaned and all chests were removed'
DUMPING_GROUND_AREA_SUCCESSFULLY_CLEANED_AND_CHESTS_KEPT: 'Dumping ground area successfully cleaned and all chests were kept'
ITEM_IN_HAND_SUCCESSFULLY_DUMPED: 'Item in hand successfully dumped'
ITEMS_IN_INVENTORY_SUCCESSFULLY_DUMPED: 'All items on your inventory were dumped successfully'
ALL_CONFIG_FILES_WERE_RELOADED: 'All config files were reloaded' | 92.75 | 131 | 0.877358 |
7a7cd8bb437de873c926fae8c938a73f47a2c77d | 31,406 | yml | YAML | spec/fixtures/vcr_cassettes/Auth0_Api_V2_Users/_users/should_have_at_least_one_user.yml | danimal141/ruby-auth0 | 3473f3ee0b353cf11ec4e3d4b816e3cef6a11e29 | [
"MIT"
] | 151 | 2015-02-03T21:58:35.000Z | 2022-03-18T10:44:09.000Z | spec/fixtures/vcr_cassettes/Auth0_Api_V2_Users/_users/should_have_at_least_one_user.yml | danimal141/ruby-auth0 | 3473f3ee0b353cf11ec4e3d4b816e3cef6a11e29 | [
"MIT"
] | 164 | 2015-02-03T18:59:20.000Z | 2022-03-25T17:49:51.000Z | spec/fixtures/vcr_cassettes/Auth0_Api_V2_Users/_users/should_have_at_least_one_user.yml | danimal141/ruby-auth0 | 3473f3ee0b353cf11ec4e3d4b816e3cef6a11e29 | [
"MIT"
] | 137 | 2015-01-16T15:04:03.000Z | 2022-03-30T11:42:45.000Z | ---
http_interactions:
- request:
method: get
uri: https://auth0-sdk-tests.auth0.com/api/v2/users
body:
encoding: US-ASCII
string: ''
headers:
Accept:
- "*/*"
User-Agent:
- rest-client/2.1.0 (darwin19.6.0 x86_64) ruby/2.7.0p0
Content-Type:
- application/json
Auth0-Client:
- eyJuYW1lIjoicnVieS1hdXRoMCIsInZlcnNpb24iOiI1LjUuMCIsImVudiI6eyJydWJ5IjoiMi43LjAifX0=
Authorization:
- Bearer API_TOKEN
Accept-Encoding:
- gzip;q=1.0,deflate;q=0.6,identity;q=0.3
Host:
- auth0-sdk-tests.auth0.com
response:
status:
code: 200
message: OK
headers:
Date:
- Fri, 03 Sep 2021 20:16:46 GMT
Content-Type:
- application/json; charset=utf-8
Transfer-Encoding:
- chunked
Connection:
- keep-alive
Cf-Ray:
- 6891a8608e3a5307-LAX
Cache-Control:
- no-cache
Strict-Transport-Security:
- max-age=31536000
Vary:
- origin,accept-encoding
Cf-Cache-Status:
- DYNAMIC
Expect-Ct:
- max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Ot-Baggage-Auth0-Request-Id:
- 6891a8608e3a5307
Ot-Tracer-Sampled:
- 'true'
Ot-Tracer-Spanid:
- 1ff91cca787820b1
Ot-Tracer-Traceid:
- 45ff116b3f577c98
X-Content-Type-Options:
- nosniff
X-Ratelimit-Limit:
- '50'
X-Ratelimit-Remaining:
- '49'
X-Ratelimit-Reset:
- '1630700207'
Server:
- cloudflare
Alt-Svc:
- h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443";
ma=86400
body:
encoding: ASCII-8BIT
string: '[{"created_at":"2021-09-03T07:07:20.288Z","email":"rubytest-210903-username-1@auth0.com","email_verified":false,"identities":[{"user_id":"6131c9a8460fa0006a17e4b8","provider":"auth0","connection":"Username-Password-Authentication","isSocial":false}],"name":"rubytest-210903-username-1@auth0.com","nickname":"rubytest-210903-username-1","picture":"https://s.gravatar.com/avatar/fdd07a60850553d36e9a6360bea6fe72?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","updated_at":"2021-09-03T07:08:20.562Z","user_id":"auth0|6131c9a8460fa0006a17e4b8","last_login":"2021-09-03T07:08:20.562Z","last_ip":"2603:9008:1a05:f179:b872:5281:13d6:5758","logins_count":3},{"email":"test-ro-login@auth0.com","email_verified":false,"updated_at":"2019-06-28T19:01:41.270Z","picture":"https://s.gravatar.com/avatar/bb7512278de17e1d813d3e8155d75fef?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","user_id":"auth0|5bc7713e30533f47d4764a99","nickname":"test-ro-login","identities":[{"user_id":"5bc7713e30533f47d4764a99","provider":"auth0","connection":"Username-Password-Authentication","isSocial":false}],"created_at":"2018-10-17T17:28:30.976Z","name":"test-ro-login@auth0.com","multifactor_last_modified":"2019-06-28T19:01:41.270Z","last_login":"2018-10-17T17:28:52.681Z","last_ip":"71.212.126.28","logins_count":1},{"created_at":"2021-09-03T20:16:45.624Z","email":"rubytest-210908-rubytest-210908-username-secondary@auth0.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"613282ad45244d0069782b56","provider":"auth0","isSocial":false}],"name":"rubytest-210908-username-secondary","nickname":"rubytest-210908-rubytest-210908-username-secondary","picture":"https://s.gravatar.com/avatar/c2a0e9c069b78548d21aefff897d2897?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","updated_at":"2021-09-03T20:16:45.624Z","user_id":"auth0|613282ad45244d0069782b56"},{"created_at":"2021-09-03T20:16:45.288Z","email":"rubytest-210908-rubytest-210908-username@auth0.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"613282adac819400692c0dd9","provider":"auth0","isSocial":false}],"name":"rubytest-210908-username","nickname":"rubytest-210908-rubytest-210908-username","picture":"https://s.gravatar.com/avatar/28607929c5bdf4954ee65d055fea6e69?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","updated_at":"2021-09-03T20:16:45.288Z","user_id":"auth0|613282adac819400692c0dd9"},{"created_at":"2021-09-03T20:16:29.747Z","email":"rubytest-210908herbert@example.net","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6132829d2f7d3d006a216aad","provider":"auth0","isSocial":false}],"name":"herbert","nickname":"rubytest-210908herbert","picture":"https://s.gravatar.com/avatar/cd0b06c3c11c846ad51bc8f7ee15ee70?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fhe.png","updated_at":"2021-09-03T20:16:29.747Z","user_id":"auth0|6132829d2f7d3d006a216aad"},{"created_at":"2021-09-03T20:16:29.160Z","email":"rubytest-210908byron_schaden@example.org","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6132829d7b569700698af981","provider":"auth0","isSocial":false}],"name":"byron.schaden","nickname":"rubytest-210908byron_schaden","picture":"https://s.gravatar.com/avatar/32658f9d62513c10242821f682c242c8?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fby.png","updated_at":"2021-09-03T20:16:29.160Z","user_id":"auth0|6132829d7b569700698af981"},{"email":"rubytest-210908aaron_spencer@example.org","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T20:16:28.047Z","updated_at":"2021-09-03T20:16:28.047Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6132829cde90c20019937a21"}],"user_id":"auth0|6132829cde90c20019937a21","name":"rubytest-210908aaron_spencer@example.org","picture":"https://secure.gravatar.com/avatar/c5f74fac7ce98eac0ad11c2a76b5ce4a?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210908aaron_spencer","app_metadata":{"roles":["admin"]}},{"email":"rubytest-210908marleen_hagenes@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T20:16:27.622Z","updated_at":"2021-09-03T20:16:27.622Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6132829b11c9b7001aa8341b"}],"user_id":"auth0|6132829b11c9b7001aa8341b","name":"rubytest-210908marleen_hagenes@example.net","picture":"https://secure.gravatar.com/avatar/54ab4835d808c4b61596ef2363c45543?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210908marleen_hagenes","app_metadata":{"roles":["admin"]}},{"created_at":"2021-09-03T20:01:13.591Z","email":"rubytest-210906denver_bruen@example.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"61327f09edc2ea0071b2426f","provider":"auth0","isSocial":false}],"name":"denver_bruen","nickname":"rubytest-210906denver_bruen","picture":"https://s.gravatar.com/avatar/c5ec8b5f2e8cee993e32afd3f10900d8?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fde.png","updated_at":"2021-09-03T20:01:13.591Z","user_id":"auth0|61327f09edc2ea0071b2426f"},{"created_at":"2021-09-03T20:01:12.972Z","email":"rubytest-210906archie@example.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"61327f08abfba0006b03b3d7","provider":"auth0","isSocial":false}],"name":"archie","nickname":"rubytest-210906archie","picture":"https://s.gravatar.com/avatar/86d5ed6c6761cbfe1112c17cf3f2fd9d?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Far.png","updated_at":"2021-09-03T20:01:12.972Z","user_id":"auth0|61327f08abfba0006b03b3d7"},{"email":"rubytest-210906mason@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T20:01:11.781Z","updated_at":"2021-09-03T20:01:11.781Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"61327f072e2864001dc12601"}],"user_id":"auth0|61327f072e2864001dc12601","name":"rubytest-210906mason@example.net","picture":"https://secure.gravatar.com/avatar/1d39f745501648e4d7487e5346c0450c?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210906mason","app_metadata":{"roles":["admin"]}},{"email":"rubytest-210906cara@example.com","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T20:01:10.982Z","updated_at":"2021-09-03T20:01:10.982Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"61327f072ed876001b025dc6"}],"user_id":"auth0|61327f072ed876001b025dc6","name":"rubytest-210906cara@example.com","picture":"https://secure.gravatar.com/avatar/92e8c05b2f387e96c53ff23ae266684b?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210906cara","app_metadata":{"roles":["admin"]}},{"created_at":"2021-09-03T19:18:38.407Z","email":"rubytest-210904luther@example.org","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6132750e45244d006977c46b","provider":"auth0","isSocial":false}],"name":"luther","nickname":"rubytest-210904luther","picture":"https://s.gravatar.com/avatar/50a066a0bae1722eff20ffe54b538438?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Flu.png","updated_at":"2021-09-03T19:18:38.407Z","user_id":"auth0|6132750e45244d006977c46b"},{"created_at":"2021-09-03T19:18:37.820Z","email":"rubytest-210904aaron@example.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6132750df1bd890069a76fb8","provider":"auth0","isSocial":false}],"name":"aaron","nickname":"rubytest-210904aaron","picture":"https://s.gravatar.com/avatar/c111cb31980aa6e9d0f6f787fb97c76c?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Faa.png","updated_at":"2021-09-03T19:18:37.820Z","user_id":"auth0|6132750df1bd890069a76fb8"},{"email":"rubytest-210904champlin.jacques@example.org","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T19:18:36.736Z","updated_at":"2021-09-03T19:18:36.736Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6132750c2e2864001dc125ff"}],"user_id":"auth0|6132750c2e2864001dc125ff","name":"rubytest-210904champlin.jacques@example.org","picture":"https://secure.gravatar.com/avatar/d6a7aeeb1f12d411d8fbcc7c6a8eb7bc?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210904champlin.jacques","app_metadata":{"roles":["admin"]}},{"email":"rubytest-210904elijah_reichel@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T19:18:36.275Z","updated_at":"2021-09-03T19:18:36.275Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6132750c2ed876001b025dc4"}],"user_id":"auth0|6132750c2ed876001b025dc4","name":"rubytest-210904elijah_reichel@example.net","picture":"https://secure.gravatar.com/avatar/6e86b26551a6cdb0aa36d5447f67cd00?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210904elijah_reichel","app_metadata":{"roles":["admin"]}},{"created_at":"2021-09-03T06:39:58.991Z","email":"rubytest-210903buckridge.gustavo@example.org","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6131c33e45244d006973063a","provider":"auth0","isSocial":false}],"name":"gustavo.buckridge","nickname":"rubytest-210903buckridge.gustavo","picture":"https://s.gravatar.com/avatar/fda2a25e0ea2112dc39730592d43525b?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fgu.png","updated_at":"2021-09-03T06:39:58.991Z","user_id":"auth0|6131c33e45244d006973063a"},{"created_at":"2021-09-03T06:39:58.378Z","email":"rubytest-210903minh.bergstrom@example.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6131c33e9afcea00689ec2f1","provider":"auth0","isSocial":false}],"name":"minh.bergstrom","nickname":"rubytest-210903minh.bergstrom","picture":"https://s.gravatar.com/avatar/a03b740bbb8c79ea35b6a5b8c6543fe9?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fmi.png","updated_at":"2021-09-03T06:39:58.378Z","user_id":"auth0|6131c33e9afcea00689ec2f1"},{"email":"rubytest-210903aisha@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T06:39:57.152Z","updated_at":"2021-09-03T06:39:57.152Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131c33d2ed876001b025d02"}],"user_id":"auth0|6131c33d2ed876001b025d02","name":"rubytest-210903aisha@example.net","picture":"https://secure.gravatar.com/avatar/e004541ab8cd86b27d465670885214d9?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210903aisha","app_metadata":{"roles":["admin"]}},{"email":"rubytest-210903darnell@example.com","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T06:39:56.533Z","updated_at":"2021-09-03T06:39:56.533Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131c33cdf44f100194e6baf"}],"user_id":"auth0|6131c33cdf44f100194e6baf","name":"rubytest-210903darnell@example.com","picture":"https://secure.gravatar.com/avatar/8c8e9fb54bdb424bf0fc9565a113028f?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210903darnell","app_metadata":{"roles":["admin"]}},{"created_at":"2021-09-03T06:29:47.961Z","email":"rubytest-210902-rubytest-210902-username@auth0.com","email_verified":true,"identities":[{"connection":"Username-Password-Authentication","user_id":"6131c0dbce67b00071910e02","provider":"auth0","isSocial":false},{"profileData":{"email":"rubytest-210902-rubytest-210902-username-secondary@auth0.com","email_verified":false},"connection":"Username-Password-Authentication","user_id":"6131c0dc148a95006b32b614","provider":"auth0","isSocial":false}],"name":"rubytest-210902-rubytest-210902-username@auth0.com","nickname":"rubytest-210902-rubytest-210902-username","picture":"https://s.gravatar.com/avatar/18b1ec8cbc12623d9e2e14697a8dd355?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","updated_at":"2021-09-03T06:29:52.303Z","user_id":"auth0|6131c0dbce67b00071910e02","user_metadata":{"addresses":{"home_address":"742
Evergreen Terrace"}},"multifactor_last_modified":"2021-09-03T06:29:52.053Z"},{"created_at":"2021-09-03T05:20:18.802Z","email":"rubytest-210902-rubytest-210902-username22@auth0.com","email_verified":false,"identities":[{"connection":"Username-Password-Authentication","user_id":"6131b092ce67b0007190b9c0","provider":"auth0","isSocial":false}],"name":"rubytest-210902-rubytest-210902-username22@auth0.com","nickname":"rubytest-210902-rubytest-210902-username22","picture":"https://s.gravatar.com/avatar/4b4badb46e332f00d3ecacd62ee8d24e?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","updated_at":"2021-09-03T05:20:18.802Z","user_id":"auth0|6131b092ce67b0007190b9c0"},{"email":"rubytest-210902calvin@example.org","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T04:58:19.502Z","updated_at":"2021-09-03T04:58:19.502Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131ab6b2ed876001b025cf8"}],"user_id":"auth0|6131ab6b2ed876001b025cf8","name":"rubytest-210902calvin@example.org","picture":"https://secure.gravatar.com/avatar/ee110d5f18d8e757a98b86cc53762096?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-210902calvin","app_metadata":{"roles":["admin"]}},{"email":"rubytestrex@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T04:49:20.466Z","updated_at":"2021-09-03T04:49:20.466Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131a950de90c20019937a17"}],"user_id":"auth0|6131a950de90c20019937a17","name":"rubytestrex@example.net","picture":"https://secure.gravatar.com/avatar/d4a8822294f3dd34443edf4fb6379720?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytestrex","app_metadata":{"roles":["admin"]}},{"email":"rubytest-1kendrick_cronin@example.com","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T04:31:49.871Z","updated_at":"2021-09-03T04:31:49.871Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131a5352ed876001b025cf6"}],"user_id":"auth0|6131a5352ed876001b025cf6","name":"rubytest-1kendrick_cronin@example.com","picture":"https://secure.gravatar.com/avatar/3432729ae9d7cfa111f51995771c860b?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytest-1kendrick_cronin","app_metadata":{"roles":["admin"]}},{"email":"rubytestjerold_kuphal@example.net","email_verified":false,"user_metadata":{"theme":"light"},"created_at":"2021-09-03T04:27:29.728Z","updated_at":"2021-09-03T04:27:29.728Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"6131a4318ba681001f662fc1"}],"user_id":"auth0|6131a4318ba681001f662fc1","name":"rubytestjerold_kuphal@example.net","picture":"https://secure.gravatar.com/avatar/5da920774a75331a850de6ac1cfec5f0?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fru.png","nickname":"rubytestjerold_kuphal","app_metadata":{"roles":["admin"]}},{"email":"php-sdk-test-import-user-job@auth0.com","email_verified":true,"user_metadata":{"theme":"dark"},"created_at":"2019-09-17T19:59:38.548Z","updated_at":"2021-03-19T20:04:30.105Z","identities":[{"provider":"auth0","connection":"Username-Password-Authentication","isSocial":false,"user_id":"5d813b2a8fb547038b0f037e"}],"user_id":"auth0|5d813b2a8fb547038b0f037e","name":"php-sdk-test-import-user-job@auth0.com","picture":"https://secure.gravatar.com/avatar/948d2dbfe9cdc074e496fa0557716d41?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fph.png","nickname":"php-sdk-test-import-user-job","app_metadata":{"roles":["admin","super"],"plan":"premium"}},{"created_at":"2021-03-19T20:04:20.278Z","email":"test-dbconnections-user2017503941@test.com","email_verified":false,"identities":[{"user_id":"605503c4c2426c006a696e35","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user2017503941@test.com","nickname":"test-dbconnections-user2017503941","picture":"https://s.gravatar.com/avatar/d81bc35d9eb004293cc7ceb3c35ea6c9?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-03-19T20:04:20.278Z","user_id":"auth0|605503c4c2426c006a696e35"},{"created_at":"2021-03-19T19:35:59.958Z","email":"test-dbconnections-user2116979931@test.com","email_verified":false,"identities":[{"user_id":"6054fd1f6ab9840069a33698","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user2116979931@test.com","nickname":"test-dbconnections-user2116979931","picture":"https://s.gravatar.com/avatar/c891fc768532a5494874ebc480ef40fd?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-03-19T19:35:59.958Z","user_id":"auth0|6054fd1f6ab9840069a33698"},{"created_at":"2021-03-18T20:36:28.383Z","email":"test-dbconnections-user588315854@test.com","email_verified":false,"identities":[{"user_id":"6053b9ccbda5a40070d44974","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user588315854@test.com","nickname":"test-dbconnections-user588315854","picture":"https://s.gravatar.com/avatar/9123ee20439d398ddab1ff57f99792f1?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-03-18T20:36:28.383Z","user_id":"auth0|6053b9ccbda5a40070d44974"},{"created_at":"2021-02-01T15:04:16.447Z","email":"test-dbconnections-user1652912635@test.com","email_verified":false,"identities":[{"user_id":"60181870acec2b006ab07eef","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1652912635@test.com","nickname":"test-dbconnections-user1652912635","picture":"https://s.gravatar.com/avatar/fd96339eb3f45fe689e67a9fc2cd51ec?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-02-01T15:04:16.447Z","user_id":"auth0|60181870acec2b006ab07eef"},{"created_at":"2021-01-26T14:53:00.455Z","email":"test-dbconnections-user1504417331@test.com","email_verified":false,"identities":[{"user_id":"60102ccc1ccc72006aca2c78","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1504417331@test.com","nickname":"test-dbconnections-user1504417331","picture":"https://s.gravatar.com/avatar/ae10bb4fda9a0d97c9be48758cb20a1d?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-01-26T14:53:00.456Z","user_id":"auth0|60102ccc1ccc72006aca2c78"},{"created_at":"2021-01-14T14:47:38.859Z","email":"test-dbconnections-user1891034975@test.com","email_verified":false,"identities":[{"user_id":"6000598a93324d0076dc8946","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1891034975@test.com","nickname":"test-dbconnections-user1891034975","picture":"https://s.gravatar.com/avatar/e30468e9f277d0e77924fd2954ddc077?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-01-14T14:47:38.859Z","user_id":"auth0|6000598a93324d0076dc8946"},{"created_at":"2021-01-05T17:18:58.985Z","email":"test-dbconnections-user1209381820@test.com","email_verified":false,"identities":[{"user_id":"5ff49f82cf30c8006985ef43","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1209381820@test.com","nickname":"test-dbconnections-user1209381820","picture":"https://s.gravatar.com/avatar/1e385faccf24a108523cae6444ae1b9a?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-01-05T17:18:58.985Z","user_id":"auth0|5ff49f82cf30c8006985ef43"},{"created_at":"2021-01-04T21:50:05.778Z","email":"test-dbconnections-user1938776465@test.com","email_verified":false,"identities":[{"user_id":"5ff38d8d197152006fba9cdb","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1938776465@test.com","nickname":"test-dbconnections-user1938776465","picture":"https://s.gravatar.com/avatar/a46be601bec90abd5f2fb8f7ec16ebf7?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-01-04T21:50:05.779Z","user_id":"auth0|5ff38d8d197152006fba9cdb"},{"created_at":"2021-01-04T16:49:10.830Z","email":"test-dbconnections-user1754595567@test.com","email_verified":false,"identities":[{"user_id":"5ff347065b204f006fe229ac","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1754595567@test.com","nickname":"test-dbconnections-user1754595567","picture":"https://s.gravatar.com/avatar/6c4e19b910d2977339a949ceeffc1b30?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2021-01-04T16:49:10.830Z","user_id":"auth0|5ff347065b204f006fe229ac"},{"created_at":"2020-12-29T18:01:51.030Z","email":"test-dbconnections-user763703690@test.com","email_verified":false,"identities":[{"user_id":"5feb6f0fcb8d8e00762ed0dc","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user763703690@test.com","nickname":"test-dbconnections-user763703690","picture":"https://s.gravatar.com/avatar/b32a99d7bccd2efe3e7471da88e0fd15?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-12-29T18:01:51.030Z","user_id":"auth0|5feb6f0fcb8d8e00762ed0dc"},{"created_at":"2020-12-29T17:52:32.257Z","email":"test-dbconnections-user1191665289@test.com","email_verified":false,"identities":[{"user_id":"5feb6ce089f2700069ebe351","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1191665289@test.com","nickname":"test-dbconnections-user1191665289","picture":"https://s.gravatar.com/avatar/a00528579c353fcf600d4d04722959fe?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-12-29T17:52:32.257Z","user_id":"auth0|5feb6ce089f2700069ebe351"},{"created_at":"2020-11-18T13:59:22.049Z","email":"test-dbconnections-user110194348@test.com","email_verified":false,"identities":[{"user_id":"5fb528bae6dfa60069c47412","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user110194348@test.com","nickname":"test-dbconnections-user110194348","picture":"https://s.gravatar.com/avatar/6392f339896eb0f92e93c2196ad6f92c?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-18T13:59:22.049Z","user_id":"auth0|5fb528bae6dfa60069c47412"},{"created_at":"2020-11-16T13:02:14.177Z","email":"test-dbconnections-user474330142@test.com","email_verified":false,"identities":[{"user_id":"5fb2785607583d0071ac55f5","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user474330142@test.com","nickname":"test-dbconnections-user474330142","picture":"https://s.gravatar.com/avatar/701bce9987f1b6dd02670f78fa1b696b?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-16T13:02:14.177Z","user_id":"auth0|5fb2785607583d0071ac55f5"},{"created_at":"2020-11-13T20:31:14.588Z","email":"test-dbconnections-user1905761359@test.com","email_verified":false,"identities":[{"user_id":"5faeed1259a0970078af1469","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1905761359@test.com","nickname":"test-dbconnections-user1905761359","picture":"https://s.gravatar.com/avatar/e6f5012cc5e6d070aac0af855f0ef1ce?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-13T20:31:14.588Z","user_id":"auth0|5faeed1259a0970078af1469"},{"created_at":"2020-11-09T19:51:24.370Z","email":"test-dbconnections-user880960561@test.com","email_verified":false,"identities":[{"user_id":"5fa99dbc6408fc006e32421d","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user880960561@test.com","nickname":"test-dbconnections-user880960561","picture":"https://s.gravatar.com/avatar/dee47500ae1c025c511ef33b806927da?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-09T19:51:24.370Z","user_id":"auth0|5fa99dbc6408fc006e32421d"},{"created_at":"2020-11-09T17:30:39.312Z","email":"test-dbconnections-user2061341363@test.com","email_verified":false,"identities":[{"user_id":"5fa97cbf04cfe0006fec1e81","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user2061341363@test.com","nickname":"test-dbconnections-user2061341363","picture":"https://s.gravatar.com/avatar/d364933e3a0928007675a9f1e3c291fc?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-09T17:30:39.312Z","user_id":"auth0|5fa97cbf04cfe0006fec1e81"},{"created_at":"2020-11-08T20:44:58.375Z","email":"test-dbconnections-user1836636391@test.com","email_verified":false,"identities":[{"user_id":"5fa858cae0383d00758c1ab9","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1836636391@test.com","nickname":"test-dbconnections-user1836636391","picture":"https://s.gravatar.com/avatar/19e66d911ecea0714d801415d3be8f7f?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-11-08T20:44:58.375Z","user_id":"auth0|5fa858cae0383d00758c1ab9"},{"created_at":"2020-10-27T12:28:32.125Z","email":"test-dbconnections-user896156406@test.com","email_verified":false,"identities":[{"user_id":"5f981270ea53e500759ef2b0","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user896156406@test.com","nickname":"test-dbconnections-user896156406","picture":"https://s.gravatar.com/avatar/c499fcc75ae77ebefb24a4a0c1ee9c25?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-10-27T12:28:32.125Z","user_id":"auth0|5f981270ea53e500759ef2b0"},{"created_at":"2020-10-27T11:58:03.557Z","email":"test-dbconnections-user2003113662@test.com","email_verified":false,"identities":[{"user_id":"5f980b4b9991bd0068d03c06","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user2003113662@test.com","nickname":"test-dbconnections-user2003113662","picture":"https://s.gravatar.com/avatar/92f2c19befae7abba1a323db74412625?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-10-27T11:58:03.557Z","user_id":"auth0|5f980b4b9991bd0068d03c06"},{"created_at":"2020-09-28T14:42:22.345Z","email":"test-dbconnections-user1309284199@test.com","email_verified":false,"identities":[{"user_id":"5f71f64e3b5e8f00695ea2d6","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1309284199@test.com","nickname":"test-dbconnections-user1309284199","picture":"https://s.gravatar.com/avatar/3683950004bc05f32b132e6359f26abe?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-09-28T14:42:22.345Z","user_id":"auth0|5f71f64e3b5e8f00695ea2d6"},{"created_at":"2020-09-25T14:25:01.734Z","email":"test-dbconnections-user297240722@test.com","email_verified":false,"identities":[{"user_id":"5f6dfdbdd0ea9d00689ea1fa","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user297240722@test.com","nickname":"test-dbconnections-user297240722","picture":"https://s.gravatar.com/avatar/91949ad95749c03e5749cd8659a41f65?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-09-25T14:25:01.734Z","user_id":"auth0|5f6dfdbdd0ea9d00689ea1fa"},{"created_at":"2020-09-09T18:41:35.346Z","email":"test-dbconnections-user10294259@test.com","email_verified":false,"identities":[{"user_id":"5f5921df1e076c007979f096","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user10294259@test.com","nickname":"test-dbconnections-user10294259","picture":"https://s.gravatar.com/avatar/d912727d6bef1d31706e53649d40fc58?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-09-09T18:41:35.346Z","user_id":"auth0|5f5921df1e076c007979f096"},{"created_at":"2020-08-27T18:36:39.308Z","email":"test-dbconnections-user1920028867@test.com","email_verified":false,"identities":[{"user_id":"5f47fd37e7ef8c0068deb388","connection":"Username-Password-Authentication","provider":"auth0","isSocial":false}],"name":"test-dbconnections-user1920028867@test.com","nickname":"test-dbconnections-user1920028867","picture":"https://s.gravatar.com/avatar/840e7c1970b9424680ac63a0f2238593?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png","updated_at":"2020-08-27T18:36:39.308Z","user_id":"auth0|5f47fd37e7ef8c0068deb388"}]'
recorded_at: Fri, 03 Sep 2021 20:16:46 GMT
recorded_with: VCR 6.0.0
| 413.236842 | 16,947 | 0.769503 |
bb14d21a74063e6f8a8cb182d609cbfb553153da | 298 | yml | YAML | roles/aws-greengrass-iot/vars/main.yml | gillouche/ansible-raspberrypi | 5b7618a8ac41d29f11b523d1bdd2a422180a1fdc | [
"MIT"
] | null | null | null | roles/aws-greengrass-iot/vars/main.yml | gillouche/ansible-raspberrypi | 5b7618a8ac41d29f11b523d1bdd2a422180a1fdc | [
"MIT"
] | 1 | 2021-09-23T23:29:39.000Z | 2021-09-23T23:29:39.000Z | roles/aws-greengrass-iot/vars/main.yml | gillouche/ansible-raspberrypi | 5b7618a8ac41d29f11b523d1bdd2a422180a1fdc | [
"MIT"
] | null | null | null | ---
# vars file for aws-greengrass-iot
greengrass_dependency_checker_version: GGCv1.10.x
nodejs_bin_version: nodejs12.x
java_bin_version: java8
dlr_url: https://neo-ai-dlr-release.s3-us-west-2.amazonaws.com/v1.1.0/pi-armv7l-raspbian4.14.71-glibc2_24-libstdcpp3_4/dlr-1.1.0-py2.py3-none-any.whl
... | 37.25 | 149 | 0.791946 |
bb8f6a96e466b9b56eb7381ceeabbdd0a5e10bd0 | 1,639 | yml | YAML | docs-ref-autogen/@azure/arm-iothub/EnrichmentProperties.yml | MicrosoftDocs/azure-docs-sdk-node.pt-BR | 5e3d05c262cc3842b08f3cce4c1b23dcdb985071 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2017-08-28T07:38:16.000Z | 2021-04-20T21:12:49.000Z | docs-ref-autogen/@azure/arm-iothub/EnrichmentProperties.yml | MicrosoftDocs/azure-docs-sdk-node.pt-BR | 5e3d05c262cc3842b08f3cce4c1b23dcdb985071 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2018-01-17T16:49:37.000Z | 2018-01-17T16:49:37.000Z | docs-ref-autogen/@azure/arm-iothub/EnrichmentProperties.yml | MicrosoftDocs/azure-docs-sdk-node.pt-BR | 5e3d05c262cc3842b08f3cce4c1b23dcdb985071 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2019-10-13T20:23:44.000Z | 2021-11-18T12:06:21.000Z | ### YamlMime:UniversalReference
items:
- uid: '@azure/arm-iothub.EnrichmentProperties'
name: EnrichmentProperties
fullName: EnrichmentProperties
children:
- '@azure/arm-iothub.EnrichmentProperties.endpointNames'
- '@azure/arm-iothub.EnrichmentProperties.key'
- '@azure/arm-iothub.EnrichmentProperties.value'
langs:
- typeScript
type: interface
summary: As propriedades de um aprimoramento que seu hub IoT se aplica a mensagens entregues aos pontos de extremidade.
package: '@azure/arm-iothub'
- uid: '@azure/arm-iothub.EnrichmentProperties.endpointNames'
name: endpointNames
fullName: endpointNames
children: []
langs:
- typeScript
type: property
summary: A lista de pontos de extremidade para o qual o enriquecimento é aplicado à mensagem.
syntax:
content: 'endpointNames: string[]'
return:
type:
- 'string[]'
package: '@azure/arm-iothub'
- uid: '@azure/arm-iothub.EnrichmentProperties.key'
name: key
fullName: key
children: []
langs:
- typeScript
type: property
summary: A chave ou um nome para a propriedade de enriquecimento.
syntax:
content: 'key: string'
return:
type:
- string
package: '@azure/arm-iothub'
- uid: '@azure/arm-iothub.EnrichmentProperties.value'
name: value
fullName: value
children: []
langs:
- typeScript
type: property
summary: O valor da propriedade enriquecimento.
syntax:
content: 'value: string'
return:
type:
- string
package: '@azure/arm-iothub' | 29.267857 | 123 | 0.654057 |
c25b266c8df6a88bbfe8c3f8988e109726f9bcf9 | 3,242 | yml | YAML | docker-compose.yml | rgfaber/compose-dev-stack | 94471ce5b15c74bb522b26b74ad752b09784c90f | [
"MIT"
] | null | null | null | docker-compose.yml | rgfaber/compose-dev-stack | 94471ce5b15c74bb522b26b74ad752b09784c90f | [
"MIT"
] | null | null | null | docker-compose.yml | rgfaber/compose-dev-stack | 94471ce5b15c74bb522b26b74ad752b09784c90f | [
"MIT"
] | null | null | null | version: '3.5'
services:
couch:
image: couchdb
hostname: couch
container_name: couch
networks:
- dev-net
eventstore:
# image: eventstore/eventstore:release-5.0.8
image: eventstore/eventstore:latest
hostname: eventstore
container_name: eventstore
networks:
- dev-net
nats:
image: local/nats
build:
context: ./backend/nats
hostname: nats
container_name: nats
networks:
- dev-net
- monitor-net
es01:
image: local/elastic
build:
context: ./backend/elastic
container_name: es01
ulimits:
memlock:
soft: -1
hard: -1
networks:
- elastic
es02:
image: local/elastic
build:
context: ./backend/elastic
container_name: es02
ulimits:
memlock:
soft: -1
hard: -1
networks:
- elastic
es03:
image: local/elastic
build:
context: ./backend/elastic
container_name: es03
ulimits:
memlock:
soft: -1
hard: -1
networks:
- elastic
kib01:
image: local/kibana
build:
context: ./backend/kibana
container_name: kib01
# env_file:
# - ./kibana/.env
ports:
- 5601:5601
environment:
ELASTICSEARCH_URL: http://es01:9200
ELASTICSEARCH_HOSTS: '["http://es01:9200","http://es02:9200","http://es03:9200"]'
networks:
- elastic
# natsboard:
# image: local/natsboard
# build:
# context: ./natsboard/natsboard
# hostname: natsboard
# container_name: natsboard
# networks:
# - dev-net
# - monitor-net
# surveyor:
# image: synadia/nats-surveyor:${SURVEYOR_DOCKER_TAG}
# container_name: nats-surveyor
# restart: always
# volumes:
# - $NATS_SURVEYOR_CREDS:/etc/surveyor/SYS.creds
# - ./observations:/observations
# - ./jetstream:/jetstream
# entrypoint: /nats-surveyor
# command: -c ${NATS_SURVEYOR_SERVER_COUNT} -creds /etc/surveyor/SYS.creds -s "${NATS_SURVEYOR_SERVERS}" -observe /observations
# networks:
# - monitor-net
# labels:
# org.label-schema.group: "nats-monitoring"
# prometheus:
# image: prom/prometheus:${PROMETHEUS_DOCKER_TAG}
# container_name: prometheus
# restart: always
# volumes:
# - ./prometheus/:/etc/prometheus/
# - $PROMETHEUS_STORAGE:/usr/local/share/prometheus
# command: --config.file=/etc/prometheus/prometheus.yml --storage.tsdb.path=/usr/local/share/prometheus
# networks:
# - monitor-net
# labels:
# org.label-schema.group: "nats-monitoring"
# depends_on:
# - surveyor
# grafana:
# image: grafana/grafana:${GRAFANA_DOCKER_TAG}
# container_name: grafana
# restart: always
# ports:
# - "3000:3000"
# volumes:
# - ./grafana/dashboards:/var/lib/grafana/dashboards
# - ./grafana/provisioning:/etc/grafana/provisioning
# networks:
# - monitor-net
# labels:
# org.label-schema.group: "nats-monitoring"
# depends_on:
# - prometheus
networks:
dev-net:
driver: bridge
monitor-net:
driver: bridge
elastic:
driver: bridge | 21.905405 | 131 | 0.597779 |
5b90cb62322870750366db4a018f1cb03f732fe9 | 2,994 | yml | YAML | docs-ref-autogen/com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.yml | azure-sdk/azure-docs-sdk-java | 66cc376be8bb1e1246731b879cc1f8fba76ea946 | [
"CC-BY-4.0",
"MIT"
] | 5 | 2021-08-20T15:24:19.000Z | 2022-02-20T17:06:14.000Z | docs-ref-autogen/com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.yml | azure-sdk/azure-docs-sdk-java | 66cc376be8bb1e1246731b879cc1f8fba76ea946 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs-ref-autogen/com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.yml | azure-sdk/azure-docs-sdk-java | 66cc376be8bb1e1246731b879cc1f8fba76ea946 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2021-08-20T15:24:21.000Z | 2021-08-20T15:24:21.000Z | ### YamlMime:JavaType
uid: "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract"
fullName: "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract"
name: "UserContract"
nameWithType: "UserContract"
summary: "Type representing UserContract."
syntax: "public interface UserContract extends HasInner<UserContractInner>, Indexable, Updatable<UserContract.Update>, HasManager<ApiManagementManager>"
methods:
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.email()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.firstName()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.groups()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.id()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.identities()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.lastName()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.name()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.note()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.registrationDate()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.state()"
- "com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.type()"
type: "interface"
implements:
- "<xref href=\"com.microsoft.azure.arm.model.HasInner?alt=com.microsoft.azure.arm.model.HasInner&text=HasInner\" data-throw-if-not-resolved=\"False\" /><<xref href=\"com.microsoft.azure.management.apimanagement.v2019_01_01.implementation.UserContractInner?alt=com.microsoft.azure.management.apimanagement.v2019_01_01.implementation.UserContractInner&text=UserContractInner\" data-throw-if-not-resolved=\"False\" />>"
- "<xref href=\"com.microsoft.azure.arm.model.Indexable?alt=com.microsoft.azure.arm.model.Indexable&text=Indexable\" data-throw-if-not-resolved=\"False\" />"
- "<xref href=\"com.microsoft.azure.arm.model.Updatable?alt=com.microsoft.azure.arm.model.Updatable&text=Updatable\" data-throw-if-not-resolved=\"False\" /><<xref href=\"com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.Update?alt=com.microsoft.azure.management.apimanagement.v2019_01_01.UserContract.Update&text=Update\" data-throw-if-not-resolved=\"False\" />>"
- "<xref href=\"com.microsoft.azure.arm.resources.models.HasManager?alt=com.microsoft.azure.arm.resources.models.HasManager&text=HasManager\" data-throw-if-not-resolved=\"False\" /><<xref href=\"com.microsoft.azure.management.apimanagement.v2019_01_01.implementation.ApiManagementManager?alt=com.microsoft.azure.management.apimanagement.v2019_01_01.implementation.ApiManagementManager&text=ApiManagementManager\" data-throw-if-not-resolved=\"False\" />>"
metadata: {}
package: "com.microsoft.azure.management.apimanagement.v2019_01_01"
artifact: com.microsoft.azure.apimanagement.v2019_01_01:azure-mgmt-apimanagement:1.0.0-beta-1
| 103.241379 | 460 | 0.817969 |
f8e0fb10615005792434aed0b274e56949ce0832 | 113 | yml | YAML | test/fixtures/comfy/cms/snippets.yml | gremz/comfortable-mexican-sofa | eb911c58d77d9637809d90911b245cde21643028 | [
"MIT"
] | 1,384 | 2015-01-03T19:36:10.000Z | 2022-03-28T06:58:54.000Z | test/fixtures/comfy/cms/snippets.yml | gremz/comfortable-mexican-sofa | eb911c58d77d9637809d90911b245cde21643028 | [
"MIT"
] | 371 | 2015-01-02T03:56:28.000Z | 2022-03-30T20:04:49.000Z | test/fixtures/comfy/cms/snippets.yml | gremz/comfortable-mexican-sofa | eb911c58d77d9637809d90911b245cde21643028 | [
"MIT"
] | 406 | 2015-01-03T00:32:12.000Z | 2022-03-28T05:02:49.000Z | default:
site: default
label: Default Snippet
identifier: default
content: snippet content
position: 0
| 16.142857 | 26 | 0.743363 |
71b86c0099c94bd8ff97ef300385abdd17a74f84 | 400 | yml | YAML | .travis.yml | rvflash/gomod | 6b0badec673fc9815b8f1db7e9f5c1b9c126fcf4 | [
"MIT"
] | 37 | 2020-02-13T10:13:24.000Z | 2020-08-26T06:36:01.000Z | .travis.yml | rvflash/gomod | 6b0badec673fc9815b8f1db7e9f5c1b9c126fcf4 | [
"MIT"
] | 2 | 2020-02-27T01:24:50.000Z | 2020-03-08T19:16:54.000Z | .travis.yml | rvflash/gomod | 6b0badec673fc9815b8f1db7e9f5c1b9c126fcf4 | [
"MIT"
] | 3 | 2020-02-25T23:47:28.000Z | 2020-12-03T01:55:43.000Z | language: go
go:
- 1.13
- 1.14
env:
- GO111MODULE=on
- CGO_ENABLED=1
before_install:
- go get -t -v ./...
- curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | bash -s -- -b $GOPATH/bin v1.25.0
script:
- go test -race -coverprofile=coverage.txt -covermode=atomic ./...
- golangci-lint run ./...
after_success:
- bash <(curl -s https://codecov.io/bash) | 20 | 117 | 0.6475 |
d314520ada7d14982ff90fc974f2de5d5b3847f6 | 44 | yml | YAML | src/staging-config.yml | revidian-auto/www.revidianauto.com | 27b3d2d39abd5bfeb936d0b5cd42f645c8f5055c | [
"MIT"
] | 1 | 2020-12-13T03:01:45.000Z | 2020-12-13T03:01:45.000Z | src/staging-config.yml | revidian-auto/www.revidianauto.com | 27b3d2d39abd5bfeb936d0b5cd42f645c8f5055c | [
"MIT"
] | 5 | 2020-12-12T21:49:13.000Z | 2020-12-18T04:48:07.000Z | src/staging-config.yml | strawberryssg/www.strawberryssg.com | b4cd90af8879d7973633957eef8092f078856eda | [
"MIT"
] | null | null | null | baseurl: "http://www.staging.GothamHQ.com/"
| 22 | 43 | 0.727273 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.