content stringlengths 1 103k ⌀ | path stringlengths 8 216 | filename stringlengths 2 179 | language stringclasses 15
values | size_bytes int64 2 189k | quality_score float64 0.5 0.95 | complexity float64 0 1 | documentation_ratio float64 0 1 | repository stringclasses 5
values | stars int64 0 1k | created_date stringdate 2023-07-10 19:21:08 2025-07-09 19:11:45 | license stringclasses 4
values | is_test bool 2
classes | file_hash stringlengths 32 32 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
---\nservices:\n authelia-backend:\n build:\n context: 'example/compose/authelia'\n dockerfile: 'Dockerfile.backend'\n args:\n USER_ID: '${USER_ID}'\n GROUP_ID: '${GROUP_ID}'\n security_opt:\n - 'seccomp:unconfined'\n - 'apparmor:unconfined'\n command: '/resources/entrypoint-backend.sh'\n working_dir: '/app'\n cap_add:\n - 'SYS_PTRACE'\n volumes:\n - './example/compose/authelia/resources:/resources'\n - '../..:/app'\n - '${GOPATH}:/go'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_backend.rule: 'Host(`login.example.com`) && PathPrefix(`/.well-known`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/.well-known`) || Host(`login.example.com`) && PathPrefix(`/api`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/api`) || Host(`login.example.com`) && PathPrefix(`/devworkflow`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/devworkflow`) || Host(`login.example.com`) && PathPrefix(`/locales`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/locales`) || Host(`login.example.com`) && Path(`/jwks.json`) || Host(`login.example.com`) && Path(`${PathPrefix}/jwks.json`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_backend.entrypoints: 'https'\n traefik.http.routers.authelia_backend.tls: 'true'\n traefik.http.services.authelia_backend.loadbalancer.server.scheme: 'https'\n environment:\n ENVIRONMENT: 'dev'\n networks:\n authelianet:\n ipv4_address: 192.168.240.50\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.backend.dev.yml | compose.backend.dev.yml | YAML | 1,564 | 0.8 | 0 | 0 | node-utils | 939 | 2023-11-11T08:34:33.831081 | GPL-3.0 | false | a818bab31644572d338e404d660a4067 |
---\nservices:\n authelia-backend:\n image: 'authelia:dist'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_backend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_backend.entrypoints: 'https'\n traefik.http.routers.authelia_backend.tls: 'true'\n traefik.http.services.authelia_backend.loadbalancer.server.scheme: 'https'\n healthcheck:\n disable: true\n volumes:\n - '../..:/authelia'\n environment:\n ENVIRONMENT: 'dev'\n restart: 'always'\n networks:\n authelianet:\n ipv4_address: 192.168.240.50\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.backend.dist.yml | compose.backend.dist.yml | YAML | 699 | 0.8 | 0 | 0 | python-kit | 431 | 2023-12-19T13:27:59.853443 | MIT | false | 53e6eeb9c3d3721e8a744b64c25d6930 |
---\nservices:\n authelia-frontend:\n build:\n context: 'example/compose/authelia'\n dockerfile: 'Dockerfile.frontend'\n args:\n USER_ID: '${USER_ID}'\n GROUP_ID: '${GROUP_ID}'\n command: '/resources/entrypoint-frontend.sh'\n working_dir: '/app'\n stdin_open: true\n volumes:\n - './example/compose/authelia/resources/:/resources'\n - '../../web:/app'\n - '~/.local/share/pnpm/store:/app/.pnpm-store'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_frontend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_frontend.entrypoints: 'https'\n traefik.http.routers.authelia_frontend.tls: 'true'\n environment:\n VITE_BASEPATH: '${PathPrefix}'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.frontend.dev.yml | compose.frontend.dev.yml | YAML | 886 | 0.8 | 0 | 0 | awesome-app | 724 | 2023-07-31T07:44:44.676626 | BSD-3-Clause | false | d45f041f7e6ba0c38f7a6f7766611bd2 |
---\nservices:\n authelia-frontend:\n image: 'nginx:1.27.5-alpine'\n volumes:\n - './example/compose/authelia/resources/nginx.conf:/etc/nginx/nginx.conf'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_frontend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_frontend.entrypoints: 'https'\n traefik.http.routers.authelia_frontend.tls: 'true'\n traefik.http.services.authelia_frontend.loadbalancer.server.port: '3000'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.frontend.dist.yml | compose.frontend.dist.yml | YAML | 626 | 0.8 | 0 | 0 | vue-tools | 3 | 2024-12-07T08:46:15.997211 | Apache-2.0 | false | e997e074c99de44c476ed5f424093286 |
---\nservices:\n caddy:\n # build: ./example/compose/caddy/ # used for debugging\n image: caddy:2.10.0-alpine\n volumes:\n - './example/compose/caddy/Caddyfile:/etc/caddy/Caddyfile'\n - './common/pki:/pki'\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\caddy\compose.yml | compose.yml | YAML | 294 | 0.8 | 0.083333 | 0.083333 | python-kit | 325 | 2023-11-12T03:50:04.217548 | MIT | false | 1dd066a14a035acb5ba62f28522e82bd |
---\nservices:\n duo-api:\n image: 'authelia/integration-duo'\n volumes:\n - './example/compose/duo-api/duo_api.js:/usr/app/src/duo_api.js'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\duo-api\compose.yml | compose.yml | YAML | 187 | 0.7 | 0 | 0 | node-utils | 931 | 2025-01-28T02:26:16.775892 | Apache-2.0 | false | 1d9eee0d74dd26000823c730466d1d74 |
---\nservices:\n envoy:\n image: envoyproxy/envoy:v1.34.0\n volumes:\n - ./example/compose/envoy/envoy.yaml:/etc/envoy/envoy.yaml\n - ./common/pki:/pki\n ports:\n - 9901:9901\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\envoy\compose.yml | compose.yml | YAML | 267 | 0.7 | 0 | 0 | python-kit | 984 | 2025-07-08T08:05:05.997242 | MIT | false | c0b4b40deacb5ccd87c69eb57f620686 |
---\nservices:\n haproxy:\n image: authelia/integration-haproxy\n volumes:\n - './example/compose/haproxy/haproxy.cfg:/usr/local/etc/haproxy/haproxy.cfg'\n - './example/compose/haproxy/http.lua:/usr/local/etc/haproxy/haproxy-lua-http/http.lua'\n - './example/compose/haproxy/auth-request.lua:/usr/local/etc/haproxy/auth-request.lua'\n - './common/pki:/pki'\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\haproxy\compose.yml | compose.yml | YAML | 451 | 0.7 | 0 | 0 | node-utils | 246 | 2024-03-29T07:31:32.499218 | Apache-2.0 | false | 0f94b2e2aa2911f983c6b3aa32be3039 |
---\nservices:\n httpbin:\n image: citizenstig/httpbin\n networks:\n authelianet: {}\n labels:\n traefik.enable: 'true'\n traefik.http.routers.httpbin.rule: 'Host(`public.example.com`) && Path(`/headers`)'\n traefik.http.routers.httpbin.priority: '1000'\n traefik.http.routers.httpbin.tls: 'true'\n traefik.http.routers.httpbin.middlewares: 'authelia@docker'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\httpbin\compose.yml | compose.yml | YAML | 392 | 0.7 | 0 | 0 | vue-tools | 428 | 2024-10-31T10:18:08.409347 | GPL-3.0 | false | fa57966590fc0da4ec540a200b75902d |
---\nservices:\n k3d:\n image: ghcr.io/k3d-io/k3d:5.8.3-dind\n volumes:\n - './example/kube:/authelia'\n - './example/kube/authelia/configs/configuration.yml:/configmaps/authelia/configuration.yml'\n - './common/pki:/configmaps/authelia/ssl'\n - './example/compose/ldap/ldif:/configmaps/ldap'\n - './example/compose/nginx/backend:/configmaps/nginx-backend'\n - '../../coverage:/coverage'\n privileged: true\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n - login.example.com\n - admin.example.com\n - dev.example.com\n - mail.example.com\n - kubernetes.example.com\n - traefik.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\k3d\compose.yml | compose.yml | YAML | 827 | 0.8 | 0 | 0.038462 | vue-tools | 248 | 2025-03-05T08:34:52.640685 | MIT | false | d2bd8f671bab604ddd2b46e094886ec5 |
---\nservices:\n openldap-admin:\n image: 'osixia/phpldapadmin:0.9.0'\n ports:\n - '9090:80'\n environment:\n PHPLDAPADMIN_LDAP_HOSTS: 'openldap'\n PHPLDAPADMIN_HTTPS: 'false'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\ldap\compose.admin.yml | compose.admin.yml | YAML | 233 | 0.7 | 0 | 0 | python-kit | 147 | 2024-01-02T01:23:59.009779 | MIT | false | 08235973676ba43a6c5f136a5fdab39c |
---\nservices:\n openldap:\n image: 'osixia/openldap:1.5.0'\n hostname: 'ldap.example.com'\n environment:\n LDAP_ORGANISATION: 'MyCompany'\n LDAP_DOMAIN: 'example.com'\n LDAP_ADMIN_PASSWORD: 'password'\n LDAP_CONFIG_PASSWORD: 'password'\n LDAP_ADDITIONAL_MODULES: 'memberof'\n LDAP_ADDITIONAL_SCHEMAS: 'openldap'\n LDAP_FORCE_RECONFIGURE: 'true'\n LDAP_TLS_VERIFY_CLIENT: 'try'\n volumes:\n - './example/compose/ldap/ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom'\n command:\n - '--copy-service'\n - '--loglevel'\n - 'debug'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\ldap\compose.yml | compose.yml | YAML | 642 | 0.7 | 0.043478 | 0 | python-kit | 502 | 2024-12-29T00:29:49.449860 | MIT | false | da2a8d00e30c7166e4ed8352e4ac25d2 |
---\nservices:\n mariadb:\n image: 'mariadb:11.7.2'\n environment:\n MARIADB_ROOT_PASSWORD: 'rootpassword'\n MARIADB_USER: 'admin'\n MARIADB_PASSWORD: 'password'\n MARIADB_DATABASE: 'authelia'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\mariadb\compose.yml | compose.yml | YAML | 252 | 0.7 | 0 | 0 | awesome-app | 511 | 2024-01-02T11:33:34.331816 | BSD-3-Clause | false | 940bb08eedfc45dc6dc8ad23db1dedae |
---\nservices:\n mysql:\n image: 'mysql:9.3'\n environment:\n MYSQL_ROOT_PASSWORD: 'rootpassword'\n MYSQL_USER: 'admin'\n MYSQL_PASSWORD: 'password'\n MYSQL_DATABASE: 'authelia'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\mysql\compose.yml | compose.yml | YAML | 237 | 0.7 | 0 | 0 | vue-tools | 204 | 2024-09-21T10:38:03.565928 | BSD-3-Clause | false | 60d8d2846d827747428426df077eec86 |
---\nservices:\n nginx-backend:\n image: 'nginx:1.27.5-alpine'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.protectedapps.rule: 'Host(`admin.example.com`) || Host(`deny.example.com`) || Host(`home.example.com`) || Host(`public.example.com`) || Host(`secure.example.com`) || Host(`singlefactor.example.com`)' # yamllint disable-line rule:line-length\n traefik.http.routers.protectedapps.entrypoints: 'https'\n traefik.http.routers.protectedapps.tls: 'true'\n traefik.http.routers.protectedapps.middlewares: 'authelia@docker'\n volumes:\n - './example/compose/nginx/backend/html:/usr/share/nginx/html'\n - './example/compose/nginx/backend/nginx.conf:/etc/nginx/nginx.conf'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\backend\compose.yml | compose.yml | YAML | 758 | 0.8 | 0 | 0 | awesome-app | 684 | 2024-09-16T18:39:41.681695 | MIT | false | 129b85fba832465dc903c25c020e94ed |
---\nservices:\n nginx-cli:\n image: nginx:1.27.5-alpine\n volumes:\n - ./example/compose/nginx/cli/nginx.conf:/etc/nginx/nginx.conf\n - ./common/pki:/pki\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\cli\compose.yml | compose.yml | YAML | 373 | 0.8 | 0 | 0.066667 | awesome-app | 594 | 2025-03-06T22:04:23.118922 | Apache-2.0 | false | 0bccbc18f5570738ccadec61231e4816 |
---\nservices:\n nginx-portal:\n image: nginx:1.27.5-alpine\n volumes:\n - ./example/compose/nginx/portal/nginx.conf:/etc/nginx/nginx.conf\n - ./common/pki:/pki\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n - login.example.com\n - duo.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\portal\compose.yml | compose.yml | YAML | 437 | 0.8 | 0 | 0.058824 | react-lib | 733 | 2023-08-11T02:08:40.919824 | BSD-3-Clause | false | e3920f60d3781fb546cdabc837d34a78 |
---\nservices:\n oidc-client:\n image: 'ghcr.io/authelia/oidc-tester-app:master-c3235cd'\n command: '/entrypoint.sh'\n depends_on:\n - 'authelia-backend'\n volumes:\n - './example/compose/oidc-client/entrypoint.sh:/entrypoint.sh'\n expose:\n - 8080\n labels:\n traefik.enable: 'true'\n traefik.http.routers.oidc.rule: 'Host(`oidc.example.com`)'\n traefik.http.routers.oidc.priority: '1000'\n traefik.http.routers.oidc.tls: 'true'\n traefik.http.routers.oidc.middlewares: 'authelia@docker'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\oidc-client\compose.yml | compose.yml | YAML | 572 | 0.7 | 0 | 0 | python-kit | 612 | 2023-12-16T11:01:52.269668 | Apache-2.0 | false | 409e3c9846dbdd5d15511b8fda54d652 |
---\nservices:\n postgres:\n image: 'postgres:17'\n environment:\n POSTGRES_PASSWORD: 'password'\n POSTGRES_USER: 'admin'\n POSTGRES_DB: 'authelia'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\postgres\compose.yml | compose.yml | YAML | 203 | 0.7 | 0 | 0 | node-utils | 78 | 2024-08-16T02:00:05.223009 | Apache-2.0 | false | e08ec0a84a5dd0b20164c9c1e6be267f |
---\nservices:\n redis:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh master'\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\redis\compose.yml | compose.yml | YAML | 321 | 0.7 | 0 | 0 | python-kit | 679 | 2024-01-17T09:43:07.197119 | BSD-3-Clause | false | e6a6fe290f9f725c01ddb65fd9332526 |
---\nservices:\n redis-node-0:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh master'\n healthcheck: &node-health\n test: ['CMD-SHELL', 'redis-cli ping || exit 1']\n interval: '3s'\n timeout: '5s'\n retries: 5\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-0.example.com'\n ipv4_address: 192.168.240.110\n redis-node-1:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh slave'\n depends_on: &deps\n redis-node-0:\n condition: 'service_healthy'\n healthcheck: *node-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-1.example.com'\n ipv4_address: 192.168.240.111\n redis-node-2:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh slave'\n depends_on: *deps\n healthcheck: *node-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-2.example.com'\n ipv4_address: 192.168.240.112\n redis-sentinel-0:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: &deps-sentinel\n <<: *deps\n redis-node-1:\n condition: 'service_healthy'\n redis-node-2:\n condition: 'service_healthy'\n healthcheck: &sentinel-health\n test: [ 'CMD-SHELL', 'redis-cli -p 26379 -a sentinel-server-password ping || exit 1' ]\n interval: '3s'\n timeout: '5s'\n retries: 5\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-0.example.com'\n ipv4_address: 192.168.240.120\n redis-sentinel-1:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: *deps-sentinel\n healthcheck: *sentinel-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-1.example.com'\n ipv4_address: 192.168.240.121\n redis-sentinel-2:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: *deps-sentinel\n healthcheck: *sentinel-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-2.example.com'\n ipv4_address: 192.168.240.122\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\redis-sentinel\compose.yml | compose.yml | YAML | 3,051 | 0.7 | 0 | 0 | awesome-app | 398 | 2025-03-25T17:25:13.426056 | GPL-3.0 | false | 5d7673fbefadb7a6e9ee82c840042e53 |
---\nservices:\n sambaldap:\n image: 'authelia/integration-samba'\n volumes:\n - './example/compose/samba/init.sh:/init.sh'\n cap_add:\n - 'SYS_ADMIN'\n hostname: 'ldap.example.com'\n healthcheck:\n test: ['CMD-SHELL', 'env LDAPTLS_REQCERT=never ldapsearch -x -LLL -D "CN=Administrator,CN=Users,DC=example,DC=com" -b "CN=john,OU=Users,DC=example,DC=com" -H ldap://localhost -ZZ -w password memberof | grep -q ^memberOf: || exit 1']\n interval: 10s\n timeout: 15s\n retries: 5\n environment:\n DOMAIN: 'example.com'\n DOMAINPASS: 'Password1'\n NOCOMPLEXITY: 'true'\n networks:\n authelianet: {}\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\samba\compose.yml | compose.yml | YAML | 651 | 0.8 | 0 | 0 | awesome-app | 350 | 2025-04-05T05:58:13.324725 | Apache-2.0 | false | 3fbeca15e8b880327116449418e7d87b |
---\nservices:\n smtp:\n environment:\n MP_SMTP_AUTH: 'authelia:mailer'\n MP_SMTP_AUTH_ACCEPT_ANY: '0'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\smtp\compose.auth.yml | compose.auth.yml | YAML | 116 | 0.7 | 0 | 0 | awesome-app | 273 | 2025-06-28T09:48:41.458094 | Apache-2.0 | false | 45d9e889edd20bda7d8b6bc907f939e2 |
---\nservices:\n smtp:\n image: 'axllent/mailpit'\n volumes:\n - './common/pki:/pki'\n environment:\n MP_SMTP_TLS_CERT: '/pki/public.crt'\n MP_SMTP_TLS_KEY: '/pki/private.pem'\n MP_SMTP_AUTH_ACCEPT_ANY: '1'\n labels:\n traefik.frontend.rule: 'Host:mail.example.com'\n traefik.port: '8025'\n traefik.enable: 'true'\n traefik.http.routers.mail.rule: 'Host(`mail.example.com`)'\n traefik.http.routers.mail.entrypoints: 'https'\n traefik.http.routers.mail.tls: 'true'\n traefik.http.services.mail.loadbalancer.server.port: '8025'\n healthcheck:\n disable: true\n networks:\n authelianet:\n aliases:\n - 'mail.example.com'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\smtp\compose.yml | compose.yml | YAML | 699 | 0.7 | 0 | 0 | python-kit | 829 | 2024-08-16T04:38:14.399920 | GPL-3.0 | false | 63643a8a6fe9df0acadd5d4b86a9722c |
---\nservices:\n # Simulates client 1.\n client-1:\n image: sameersbn/squid:3.5.27-1\n volumes:\n - ./example/compose/squid/squid.conf:/etc/squid/squid.conf\n networks:\n authelianet:\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.201\n client-2:\n image: sameersbn/squid:3.5.27-1\n volumes:\n - ./example/compose/squid/squid.conf:/etc/squid/squid.conf\n networks:\n authelianet:\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.202\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\squid\compose.yml | compose.yml | YAML | 542 | 0.8 | 0 | 0.15 | vue-tools | 829 | 2024-04-25T17:43:32.544606 | MIT | false | b074c96a9ad8197531126a2e5ee1aebc |
---\nservices:\n traefik:\n volumes:\n - '/var/run/docker.sock:/var/run/docker.sock'\n - './example/compose/traefik/config:/config'\n - './common/pki:/pki'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.api.rule: 'Host(`traefik.example.com`)'\n traefik.http.routers.api.entrypoints: 'https'\n traefik.http.routers.api.service: 'api@internal'\n traefik.http.routers.api.tls: 'true'\n traefik.http.middlewares.authelia.forwardauth.address: 'https://authelia-backend:9091${PathPrefix}/api/authz/forward-auth' # yamllint disable-line rule:line-length\n traefik.http.middlewares.authelia.forwardauth.tls.insecureSkipVerify: 'true'\n traefik.http.middlewares.authelia.forwardauth.trustForwardHeader: 'true'\n traefik.http.middlewares.authelia.forwardauth.authResponseHeaders: 'Authorization,Proxy-Authorization,Remote-User,Remote-Groups,Remote-Email,Remote-Name' # yamllint disable-line rule:line-length\n command:\n - '--configFile=/config/static.yml'\n networks:\n authelianet:\n aliases:\n - login.example.com\n ipv4_address: 192.168.240.100\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\compose.yml | compose.yml | YAML | 1,139 | 0.8 | 0 | 0 | python-kit | 226 | 2025-03-21T13:45:04.843010 | MIT | false | 2c9e5d3d214713a9fb25242e77dfa4f6 |
---\n# yaml-language-server: $schema=v\napi:\n dashboard: true\n debug: false\n insecure: false\n\nlog:\n level: DEBUG\n\naccessLog: {}\n\npilot:\n dashboard: false\n\nglobal:\n sendAnonymousUsage: false\n checkNewVersion: false\n\nentryPoints:\n https:\n address: ":8080/tcp"\n\nserversTransport:\n insecureSkipVerify: true\n\nproviders:\n docker:\n exposedByDefault: false\n file:\n directory: /config/dynamic/\n watch: true\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\config\static.yml | static.yml | YAML | 423 | 0.8 | 0 | 0.038462 | python-kit | 164 | 2023-10-20T08:09:07.376749 | GPL-3.0 | false | f5892612b922050aee398507d39091a8 |
---\n# yaml-language-server: $schema=https://json.schemastore.org/traefik-v2-file-provider.json\ntls:\n stores:\n default:\n defaultCertificate:\n certFile: /pki/public.crt\n keyFile: /pki/private.pem\n certificates:\n - certFile: /pki/public.crt\n keyFile: /pki/private.pem\n stores:\n - default\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\config\dynamic\tls.yml | tls.yml | YAML | 333 | 0.8 | 0 | 0.071429 | vue-tools | 232 | 2024-07-15T17:29:41.290787 | MIT | false | e925a72ecc81e749d8a4374337fcc9b6 |
# Kubernetes Dashboard\n---\napiVersion: v1\nkind: Namespace\nmetadata:\n name: kubernetes-dashboard\n...\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\nkind: Service\napiVersion: v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nspec:\n ports:\n - port: 443\n targetPort: 8443\n selector:\n k8s-app: kubernetes-dashboard\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-certs\n namespace: kubernetes-dashboard\ntype: Opaque\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-csrf\n namespace: kubernetes-dashboard\ntype: Opaque\ndata:\n csrf: ""\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-key-holder\n namespace: kubernetes-dashboard\ntype: Opaque\n...\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-settings\n namespace: kubernetes-dashboard\n...\n---\nkind: Role\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nrules:\n # Allow Dashboard to get, update and delete Dashboard exclusive secrets.\n - apiGroups: [""]\n resources: ["secrets"]\n resourceNames: ["kubernetes-dashboard-key-holder", "kubernetes-dashboard-certs", "kubernetes-dashboard-csrf"]\n verbs: ["get", "update", "delete"]\n # Allow Dashboard to get and update 'kubernetes-dashboard-settings' config map.\n - apiGroups: [""]\n resources: ["configmaps"]\n resourceNames: ["kubernetes-dashboard-settings"]\n verbs: ["get", "update"]\n # Allow Dashboard to get metrics.\n - apiGroups: [""]\n resources: ["services"]\n resourceNames: ["heapster", "dashboard-metrics-scraper"]\n verbs: ["proxy"]\n - apiGroups: [""]\n resources: ["services/proxy"]\n resourceNames: ["heapster", "http:heapster:", "https:heapster:", "dashboard-metrics-scraper", "http:dashboard-metrics-scraper"] # yamllint disable-line rule:line-length\n verbs: ["get"]\n...\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\nrules:\n # Allow Metrics Scraper to get metrics from the Metrics server\n - apiGroups: ["metrics.k8s.io"]\n resources: ["pods", "nodes"]\n verbs: ["get", "list", "watch"]\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: kubernetes-dashboard\nsubjects:\n - kind: ServiceAccount\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kubernetes-dashboard\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kubernetes-dashboard\nsubjects:\n - kind: ServiceAccount\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\nkind: Deployment\napiVersion: apps/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nspec:\n replicas: 1\n revisionHistoryLimit: 10\n selector:\n matchLabels:\n k8s-app: kubernetes-dashboard\n template:\n metadata:\n labels:\n k8s-app: kubernetes-dashboard\n spec:\n securityContext:\n seccompProfile:\n type: RuntimeDefault\n containers:\n - name: kubernetes-dashboard\n image: kubernetesui/dashboard:v2.7.0\n imagePullPolicy: Always\n ports:\n - containerPort: 8443\n protocol: TCP\n args:\n - --auto-generate-certificates\n - --namespace=kubernetes-dashboard\n # Uncomment the following line to manually specify Kubernetes API server Host\n # If not specified, Dashboard will attempt to auto discover the API server and connect\n # to it. Uncomment only if the default does not work.\n # - --apiserver-host=http://my-address:port\n volumeMounts:\n - name: kubernetes-dashboard-certs\n mountPath: /certs\n # Create on-disk volume to store exec logs\n - mountPath: /tmp\n name: tmp-volume\n livenessProbe:\n httpGet:\n scheme: HTTPS\n path: /\n port: 8443\n initialDelaySeconds: 30\n timeoutSeconds: 30\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n runAsUser: 1001\n runAsGroup: 2001\n volumes:\n - name: kubernetes-dashboard-certs\n secret:\n secretName: kubernetes-dashboard-certs\n - name: tmp-volume\n emptyDir: {}\n serviceAccountName: kubernetes-dashboard\n nodeSelector:\n "kubernetes.io/os": linux\n # Comment the following tolerations if Dashboard must not be deployed on master\n tolerations:\n - key: node-role.kubernetes.io/master\n effect: NoSchedule\n...\n---\nkind: Service\napiVersion: v1\nmetadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n name: dashboard-metrics-scraper\n namespace: kubernetes-dashboard\nspec:\n ports:\n - port: 8000\n targetPort: 8000\n selector:\n k8s-app: dashboard-metrics-scraper\n...\n---\nkind: Deployment\napiVersion: apps/v1\nmetadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n name: dashboard-metrics-scraper\n namespace: kubernetes-dashboard\nspec:\n replicas: 1\n revisionHistoryLimit: 10\n selector:\n matchLabels:\n k8s-app: dashboard-metrics-scraper\n template:\n metadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n spec:\n securityContext:\n seccompProfile:\n type: RuntimeDefault\n containers:\n - name: dashboard-metrics-scraper\n image: kubernetesui/metrics-scraper:v1.0.9\n ports:\n - containerPort: 8000\n protocol: TCP\n livenessProbe:\n httpGet:\n scheme: HTTP\n path: /\n port: 8000\n initialDelaySeconds: 30\n timeoutSeconds: 30\n volumeMounts:\n - mountPath: /tmp\n name: tmp-volume\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n runAsUser: 1001\n runAsGroup: 2001\n serviceAccountName: kubernetes-dashboard\n nodeSelector:\n "kubernetes.io/os": linux\n # Comment the following tolerations if Dashboard must not be deployed on master\n tolerations:\n - key: node-role.kubernetes.io/master\n effect: NoSchedule\n volumes:\n - name: tmp-volume\n emptyDir: {}\n...\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: admin-user\n namespace: kubernetes-dashboard\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: admin-user\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cluster-admin\nsubjects:\n - kind: ServiceAccount\n name: admin-user\n namespace: kubernetes-dashboard\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: IngressRouteTCP\nmetadata:\n name: kubernetes-dashboard-ingress\n namespace: kubernetes-dashboard\nspec:\n entryPoints:\n - websecure\n routes:\n - match: HostSNI(`kubernetes.example.com`)\n services:\n - name: kubernetes-dashboard\n port: 443\n tls:\n passthrough: true\n...\n# Traefik Dashboard\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: IngressRoute\nmetadata:\n name: traefik-dashboard-ingress\n namespace: authelia\nspec:\n entryPoints:\n - websecure\n routes:\n - match: Host(`traefik.example.com`)\n kind: Rule\n services:\n - name: api@internal\n kind: TraefikService\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: ServersTransport\nmetadata:\n name: skipverify\n namespace: authelia\nspec:\n insecureSkipVerify: true\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\dashboards.yml | dashboards.yml | YAML | 8,366 | 0.8 | 0.008671 | 0.037572 | node-utils | 577 | 2025-05-04T20:45:11.157765 | Apache-2.0 | false | 99aa5a46a7303d235bd6d37d4781e9f4 |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: nginx-backend\n namespace: authelia\n labels:\n app: nginx-backend\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: nginx-backend\n template:\n metadata:\n labels:\n app: nginx-backend\n spec:\n containers:\n - name: nginx-backend\n image: nginx:alpine\n ports:\n - containerPort: 80\n volumeMounts:\n - name: nginx-config\n mountPath: /etc/nginx/nginx.conf\n - name: nginx-html\n mountPath: /usr/share/nginx/html\n volumes:\n - name: nginx-config\n hostPath:\n path: /configmaps/nginx-backend/nginx.conf\n type: File\n - name: nginx-html\n hostPath:\n path: /configmaps/nginx-backend/html\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: nginx-backend-service\n namespace: authelia\n labels:\n app: nginx-backend\nspec:\n selector:\n app: nginx-backend\n ports:\n - port: 80\n name: http\n - port: 443\n name: https\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: nginx-backend-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\n traefik.ingress.kubernetes.io/router.middlewares: authelia-forwardauth-authelia@kubernetescrd\nspec:\n rules:\n - host: home.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: public.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: admin.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: deny.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: dev.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: mx1.mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: mx2.mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: singlefactor.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\apps\nginx.yml | nginx.yml | YAML | 3,426 | 0.7 | 0.006757 | 0 | node-utils | 670 | 2024-07-21T04:13:38.940547 | MIT | false | 85a603a94b93c90395c95a5278a654e6 |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: authelia\n namespace: authelia\n labels:\n app: authelia\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: authelia\n template:\n metadata:\n labels:\n app: authelia\n spec:\n containers:\n - name: authelia\n image: authelia:dist\n ports:\n - containerPort: 443\n readinessProbe:\n httpGet:\n scheme: HTTPS\n path: /api/health\n port: 443\n initialDelaySeconds: 3\n periodSeconds: 3\n volumeMounts:\n - name: authelia-config\n mountPath: /config/configuration.yml\n readOnly: true\n - name: authelia-ssl\n mountPath: /pki\n readOnly: true\n - name: authelia-ssl-public\n mountPath: /certs/public.crt\n readOnly: true\n - name: authelia-coverage\n mountPath: /authelia/coverage\n - name: secrets\n mountPath: /config/secrets\n readOnly: true\n env:\n # We set secrets directly here for ease of deployment but all secrets\n # should be stored in the Kube Vault in production.\n - name: AUTHELIA_JWT_SECRET_FILE\n value: /config/secrets/jwt_secret\n - name: AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE\n value: /config/secrets/ldap_password\n - name: AUTHELIA_SESSION_SECRET_FILE\n value: /config/secrets/session\n - name: AUTHELIA_STORAGE_MYSQL_PASSWORD_FILE\n value: /config/secrets/sql_password\n - name: AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE\n value: /config/secrets/encryption_key\n - name: ENVIRONMENT\n value: dev\n volumes:\n - name: authelia-config\n hostPath:\n path: /configmaps/authelia/configuration.yml\n type: File\n - name: authelia-ssl\n hostPath:\n path: /configmaps/authelia/ssl\n type: Directory\n - name: authelia-ssl-public\n hostPath:\n path: /configmaps/authelia/ssl/public.crt\n type: File\n - name: authelia-coverage\n hostPath:\n path: /coverage\n type: Directory\n - name: secrets\n secret:\n secretName: authelia\n items:\n - key: jwt_secret\n path: jwt_secret\n - key: session\n path: session\n - key: sql_password\n path: sql_password\n - key: ldap_password\n path: ldap_password\n - key: encryption_key\n path: encryption_key\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: authelia-service\n namespace: authelia\n annotations:\n traefik.ingress.kubernetes.io/service.serverstransport: authelia-skipverify@kubernetescrd\nspec:\n selector:\n app: authelia\n ports:\n - protocol: TCP\n port: 443\n targetPort: 443\n...\n---\napiVersion: v1\nkind: Secret\ntype: Opaque\nmetadata:\n name: authelia\n namespace: authelia\n labels:\n app: authelia\ndata:\n jwt_secret: YW5fdW5zZWN1cmVfc2VjcmV0 # an_unsecure_secret\n ldap_password: cGFzc3dvcmQ= # password\n session: dW5zZWN1cmVfcGFzc3dvcmQ= # unsecure_password\n sql_password: cGFzc3dvcmQ= # password\n encryption_key: YV9ub3Rfc29fc2VjdXJlX2VuY3J5cHRpb25fa2V5\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: authelia-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\nspec:\n rules:\n - host: login.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: authelia-service\n port:\n number: 443\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: Middleware\nmetadata:\n name: forwardauth-authelia\n namespace: authelia\n labels:\n app.kubernetes.io/instance: authelia\n app.kubernetes.io/name: authelia\nspec:\n forwardAuth:\n address: 'https://authelia-service.authelia.svc.cluster.local/api/authz/forward-auth'\n trustForwardHeader: true\n authResponseHeaders:\n - 'Authorization'\n - 'Proxy-Authorization'\n - 'Remote-User'\n - 'Remote-Groups'\n - 'Remote-Email'\n - 'Remote-Name'\n tls:\n insecureSkipVerify: true\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\authelia\authelia.yml | authelia.yml | YAML | 4,541 | 0.8 | 0.011834 | 0.011834 | python-kit | 777 | 2024-11-16T15:04:52.871929 | GPL-3.0 | false | b97de200c3eea240f4420e2c9672ee7b |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:443'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n mysql:\n address: 'tcp://mariadb-service:3306'\n database: 'authelia'\n username: 'admin'\n\nnotifier:\n smtp:\n address: 'smtp://mailpit-service:1025'\n username: 'authelia'\n password: 'mailer'\n sender: 'admin@example.com'\n tls:\n server_name: 'mail.example.com'\n\nregulation:\n max_retries: 3\n find_time: '2 minutes'\n ban_time: '5 minutes'\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis-service'\n port: 6379\n\nauthentication_backend:\n ldap:\n address: 'ldaps://ldap-service'\n tls:\n skip_verify: true\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&({username_attribute}={input})(objectClass=person))'\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=admin,dc=example,dc=com'\n attributes:\n distinguished_name: ''\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: example.com\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\authelia\configs\configuration.yml | configuration.yml | YAML | 2,455 | 0.95 | 0 | 0 | awesome-app | 251 | 2025-02-16T16:33:15.461101 | MIT | false | 2bc116a6b387c7e5cbd15fc3a8adca8b |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: ldap\n namespace: authelia\n labels:\n app: ldap\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: ldap\n template:\n metadata:\n labels:\n app: ldap\n spec:\n containers:\n - name: ldap\n image: osixia/openldap:1.5.0\n ports:\n - containerPort: 389\n - containerPort: 636\n args: ["--copy-service", "--loglevel", "debug"]\n env:\n - name: LDAP_ORGANISATION\n value: MyCompany\n - name: LDAP_DOMAIN\n value: example.com\n - name: LDAP_ADMIN_PASSWORD\n value: password\n - name: LDAP_CONFIG_PASSWORD\n value: password\n - name: LDAP_ADDITIONAL_MODULES\n value: memberof\n - name: LDAP_ADDITIONAL_SCHEMAS\n value: openldap\n - name: LDAP_FORCE_RECONFIGURE\n value: "true"\n - name: LDAP_TLS_VERIFY_CLIENT\n value: try\n volumeMounts:\n - name: ldap-config\n mountPath: /container/service/slapd/assets/config/bootstrap/ldif/custom\n volumes:\n - name: ldap-config\n hostPath:\n path: /configmaps/ldap\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: ldap-service\n namespace: authelia\nspec:\n selector:\n app: ldap\n ports:\n - protocol: TCP\n port: 636\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\ldap\ldap.yml | ldap.yml | YAML | 1,478 | 0.7 | 0.015625 | 0 | node-utils | 800 | 2025-04-04T12:21:52.592147 | GPL-3.0 | false | 3b84666e861f9dd6d087e05ff6ea50a0 |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: mailpit\n namespace: authelia\n labels:\n app: mailpit\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: mailpit\n template:\n metadata:\n labels:\n app: mailpit\n spec:\n containers:\n - name: mailpit\n image: axllent/mailpit\n ports:\n - containerPort: 1025\n - containerPort: 8025\n volumeMounts:\n - name: authelia-ssl\n mountPath: /pki\n readOnly: true\n env:\n - name: MP_SMTP_TLS_CERT\n value: /pki/public.crt\n - name: MP_SMTP_TLS_KEY\n value: /pki/private.pem\n - name: MP_SMTP_AUTH\n value: authelia:mailer\n volumes:\n - name: authelia-ssl\n hostPath:\n path: /configmaps/authelia/ssl\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: mailpit-service\n namespace: authelia\nspec:\n selector:\n app: mailpit\n ports:\n - protocol: TCP\n port: 8025\n name: ui\n - protocol: TCP\n port: 1025\n name: smtp\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: mailpit-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\nspec:\n rules:\n - host: mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: mailpit-service\n port:\n number: 8025\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\mail\mail.yml | mail.yml | YAML | 1,632 | 0.7 | 0.0125 | 0 | python-kit | 245 | 2024-04-05T19:28:15.620966 | Apache-2.0 | false | cce1c97873441802f3858d3a121e6248 |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: mariadb\n namespace: authelia\n labels:\n app: mariadb\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: mariadb\n template:\n metadata:\n labels:\n app: mariadb\n spec:\n containers:\n - name: mariadb\n image: mariadb:11.7.2\n ports:\n - containerPort: 3306\n readinessProbe:\n tcpSocket:\n port: 3306\n periodSeconds: 1\n env:\n - name: MYSQL_ROOT_PASSWORD\n value: rootpassword\n - name: MYSQL_USER\n value: admin\n - name: MYSQL_PASSWORD\n value: password\n - name: MYSQL_DATABASE\n value: authelia\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: mariadb-service\n namespace: authelia\nspec:\n selector:\n app: mariadb\n ports:\n - protocol: TCP\n port: 3306\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\storage\mariadb.yml | mariadb.yml | YAML | 938 | 0.7 | 0 | 0 | vue-tools | 150 | 2023-12-12T17:57:53.953468 | MIT | false | 889e52746a2a3bb87a17277c2a5808ad |
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: redis\n namespace: authelia\n labels:\n app: redis\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: redis\n template:\n metadata:\n labels:\n app: redis\n spec:\n containers:\n - name: redis\n image: redis:7.4-alpine\n ports:\n - containerPort: 6379\n readinessProbe:\n tcpSocket:\n port: 6379\n periodSeconds: 1\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: redis-service\n namespace: authelia\nspec:\n selector:\n app: redis\n ports:\n - protocol: TCP\n port: 6379\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\storage\redis.yml | redis.yml | YAML | 649 | 0.7 | 0 | 0 | node-utils | 441 | 2023-07-20T18:27:13.188997 | GPL-3.0 | false | 10318bd0c8f955ad04ed7cc6e2e4bd14 |
---\nservices:\n authelia-backend:\n volumes:\n - './HAProxy/configuration.yml:/config/configuration.yml'\n - './HAProxy/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\compose.yml | compose.yml | YAML | 243 | 0.7 | 0 | 0 | node-utils | 55 | 2024-12-09T11:06:32.761759 | BSD-3-Clause | false | 564993b3905b157007e01602b9cb2a01 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\configuration.yml | configuration.yml | YAML | 1,766 | 0.95 | 0 | 0 | react-lib | 129 | 2025-05-31T16:27:49.591656 | GPL-3.0 | false | 668cda09f197ec5703c5e9668f45d0ce |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | vue-tools | 698 | 2024-07-25T11:59:26.283609 | GPL-3.0 | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './HighAvailability/configuration.yml:/config/configuration.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\HighAvailability\compose.yml | compose.yml | YAML | 204 | 0.7 | 0 | 0 | vue-tools | 388 | 2025-06-06T06:29:35.664368 | GPL-3.0 | false | 8461927295a21ab079871d78de3e37b9 |
---\ncertificates_directory: '/certs/'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mariadb:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n username: 'authelia'\n password: 'redis-user-password'\n high_availability:\n sentinel_name: 'authelia'\n sentinel_password: 'sentinel-server-password'\n nodes:\n - host: 'redis-sentinel-0'\n port: 26379\n - host: 'redis-sentinel-1'\n port: 26379\n - host: 'redis-sentinel-2'\n port: 26379\n\nauthentication_backend:\n ldap:\n address: 'ldap://openldap'\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&({username_attribute}={input})(objectClass=person))'\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=admin,dc=example,dc=com'\n password: 'password'\n attributes:\n distinguished_name: 'distinguishedName'\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: 'authelia.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'mx2.mail.example.com'\n subject: 'group:admins'\n policy: 'deny'\n - domain: '*.example.com'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/groups/dev/.*$'\n subject: 'group:dev'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\HighAvailability\configuration.yml | configuration.yml | YAML | 3,488 | 0.95 | 0 | 0 | vue-tools | 44 | 2023-07-20T17:06:32.707170 | Apache-2.0 | false | e0a878243ff6a776018e185f11d686ac |
---\nservices:\n authelia-backend:\n volumes:\n - './LDAP/configuration.yml:/config/configuration.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\LDAP\compose.yml | compose.yml | YAML | 192 | 0.7 | 0 | 0 | python-kit | 876 | 2023-11-13T23:33:06.686681 | GPL-3.0 | false | 3966059cfd40260b498e0766fbc58bf1 |
---\ncertificates_directory: '/certs/'\ntheme: 'dark'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n ldap:\n address: 'ldaps://openldap'\n pooling:\n enable: true\n count: 4\n retries: 3\n timeout: 10s\n tls:\n skip_verify: true\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person)(objectClass=inetOrgPerson))' # yamllint disable-line rule:line-length\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=pwmanager,dc=example,dc=com'\n password: 'password'\n attributes:\n distinguished_name: ''\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\LDAP\configuration.yml | configuration.yml | YAML | 3,095 | 0.95 | 0 | 0 | node-utils | 151 | 2024-05-12T12:08:38.664558 | GPL-3.0 | false | 748d03243f2938dc81f6fb2b413e47ab |
---\nservices:\n authelia-backend:\n volumes:\n - './MariaDB/configuration.yml:/config/configuration.yml'\n - './MariaDB/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\compose.yml | compose.yml | YAML | 243 | 0.7 | 0 | 0 | awesome-app | 866 | 2025-03-12T19:14:52.887592 | MIT | false | 8fd2c15f9eed0edc0558c7a84addfa80 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mariadb:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\configuration.yml | configuration.yml | YAML | 2,008 | 0.95 | 0 | 0 | node-utils | 239 | 2024-12-04T03:58:21.472164 | GPL-3.0 | false | 3e34c4542875119d85a0d122f0064141 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | vue-tools | 521 | 2025-02-11T19:02:37.351726 | MIT | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './MultiCookieDomain/configuration.yml:/config/configuration.yml'\n - './MultiCookieDomain/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\compose.yml | compose.yml | YAML | 263 | 0.7 | 0 | 0 | vue-tools | 84 | 2023-09-25T08:01:15.921947 | Apache-2.0 | false | b6492a156b095b9f90e0a830edf053f7 |
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: 3s\n disable_startup_check: false\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n elevated_session:\n code_lifespan: '5 minutes'\n elevation_lifespan: '10 minutes'\n characters: 8\n require_second_factor: true\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n secret: 'unsecure_session_secret'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n cookies:\n - name: 'authelia_session'\n domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n - name: 'example2_session'\n domain: 'example2.com'\n authelia_url: 'https://login.example2.com:8080'\n remember_me: -1\n - name: 'authelia_session'\n domain: 'example3.com'\n authelia_url: 'https://login.example3.com:8080'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n allowed_algorithms:\n - 'SHA1'\n - 'SHA256'\n - 'SHA512'\n allowed_digits:\n - 6\n - 8\n allowed_periods:\n - 30\n - 60\n - 90\n - 120\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'singlefactor.example2.com'\n policy: 'one_factor'\n - domain: 'public.example2.com'\n policy: 'bypass'\n - domain: 'secure.example2.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example2.com'\n policy: 'two_factor'\n - domain: '*.example2.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example2.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'singlefactor.example3.com'\n policy: 'one_factor'\n - domain: 'public.example3.com'\n policy: 'bypass'\n - domain: 'secure.example3.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example3.com'\n policy: 'two_factor'\n - domain: '*.example3.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example3.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\configuration.yml | configuration.yml | YAML | 5,094 | 0.95 | 0 | 0 | vue-tools | 500 | 2024-05-28T16:53:16.438227 | BSD-3-Clause | false | 2ef444db230fbe2fabc88aa5f0845796 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | awesome-app | 782 | 2023-11-18T15:05:33.419469 | BSD-3-Clause | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './MySQL/configuration.yml:/config/configuration.yml'\n - './MySQL/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\compose.yml | compose.yml | YAML | 239 | 0.7 | 0 | 0 | python-kit | 442 | 2025-06-17T10:00:43.698638 | GPL-3.0 | false | 2ece3c1b8bf808e718633f151d871d01 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mysql:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\configuration.yml | configuration.yml | YAML | 2,008 | 0.95 | 0 | 0 | python-kit | 96 | 2025-02-02T10:10:55.160168 | Apache-2.0 | false | 21feaeddb7cd56b6533a55faf4fe8a56 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | node-utils | 275 | 2024-02-03T10:51:34.298982 | GPL-3.0 | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './NetworkACL/configuration.yml:/config/configuration.yml'\n - './NetworkACL/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\compose.yml | compose.yml | YAML | 249 | 0.7 | 0 | 0 | python-kit | 801 | 2023-12-11T19:17:43.706506 | BSD-3-Clause | false | b959957c4f456e716d361cc0a97a0ff3 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n networks:\n - name: 'Clients'\n networks:\n - '192.168.240.202/32'\n - '192.168.240.203/32'\n rules:\n - domain: 'secure.example.com'\n policy: 'one_factor'\n networks:\n - '192.168.240.201/32'\n - domain: 'secure.example.com'\n policy: 'bypass'\n networks:\n - 'Clients'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\configuration.yml | configuration.yml | YAML | 1,898 | 0.95 | 0 | 0 | node-utils | 936 | 2024-12-13T21:17:27.854171 | Apache-2.0 | false | cbddf8cb8294da14cfba86435ca28225 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | node-utils | 818 | 2024-11-01T13:29:04.212273 | BSD-3-Clause | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n environment:\n X_AUTHELIA_CONFIG_FILTERS: 'template'\n volumes:\n - './OIDC/configuration.yml:/config/configuration.yml'\n - './OIDC/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\compose.yml | compose.yml | YAML | 298 | 0.7 | 0 | 0 | awesome-app | 368 | 2024-10-25T21:33:37.129838 | Apache-2.0 | false | 47494f25139aebf2372cca7ea3465c07 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'unsecure_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_providers:\n oidc:\n enable_client_debug_messages: true\n hmac_secret: 'IVPWBkAdJHje3uz7LtFTDU2pFUfh39Xm'\n jwks:\n - key: {{ secret "/pki/private.oidc.pem" | mindent 10 "|" | msquote }}\n certificate_chain: {{ secret "/pki/public.oidc.chain.pem" | mindent 10 "|" | msquote }}\n clients:\n - client_id: 'oidc-tester-app'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'two_factor'\n redirect_uris:\n - 'https://oidc.example.com:8080/oauth2/callback'\n - client_id: 'oidc-tester-app-public'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'one_factor'\n redirect_uris:\n - 'https://oidc-public.example.com:8080/oauth2/callback'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'oidc.example.com'\n policy: 'two_factor'\n - domain: 'oidc-public.example.com'\n policy: 'bypass'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\configuration.yml | configuration.yml | YAML | 2,957 | 0.95 | 0 | 0 | react-lib | 166 | 2024-09-21T16:45:34.103674 | Apache-2.0 | false | cdea03cb30093cc083c90b4063674569 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | node-utils | 181 | 2025-03-15T15:24:26.914598 | BSD-3-Clause | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n environment:\n X_AUTHELIA_CONFIG_FILTERS: 'template'\n volumes:\n - './OIDCTraefik/configuration.yml:/config/configuration.yml'\n - './OIDCTraefik/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\compose.yml | compose.yml | YAML | 312 | 0.7 | 0 | 0 | awesome-app | 105 | 2024-07-01T15:53:18.392975 | BSD-3-Clause | false | 890658e3fd0f84a235f71ab6850e4d53 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'unsecure_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_providers:\n oidc:\n enable_client_debug_messages: true\n hmac_secret: 'IVPWBkAdJHje3uz7LtFTDU2pFUfh39Xm'\n jwks:\n - key: {{ secret "/pki/private.oidc.pem" | mindent 10 "|" | msquote }}\n certificate_chain: {{ secret "/pki/public.oidc.chain.pem" | mindent 10 "|" | msquote }}\n clients:\n - client_id: 'oidc-tester-app'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'two_factor'\n redirect_uris:\n - 'https://oidc.example.com:8080/oauth2/callback'\n - client_id: 'oidc-tester-app-public'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'one_factor'\n redirect_uris:\n - 'https://oidc-public.example.com:8080/oauth2/callback'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'oidc.example.com'\n policy: 'two_factor'\n - domain: 'oidc-public.example.com'\n policy: 'bypass'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\configuration.yml | configuration.yml | YAML | 2,957 | 0.95 | 0 | 0 | react-lib | 311 | 2024-06-06T11:53:09.358106 | GPL-3.0 | false | cdea03cb30093cc083c90b4063674569 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | vue-tools | 997 | 2024-10-14T12:58:16.775942 | MIT | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './OneFactorOnly/configuration.yml:/config/configuration.yml'\n - './OneFactorOnly/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\compose.yml | compose.yml | YAML | 255 | 0.7 | 0 | 0 | vue-tools | 0 | 2024-08-14T07:11:48.077546 | MIT | false | 47006a058aef66bb2b3ede56b92ec737 |
---\ncertificates_directory: '/certs/'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n filesystem:\n filename: '/config/notifier.html'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'unsafe.local'\n policy: 'bypass'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\configuration.yml | configuration.yml | YAML | 1,707 | 0.95 | 0 | 0 | react-lib | 185 | 2024-10-02T18:57:38.881946 | MIT | false | 09f3c3edf8b94b28ae6075c3daf33921 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | awesome-app | 584 | 2024-09-23T21:32:52.510923 | MIT | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './PathPrefix/configuration.yml:/config/configuration.yml'\n - './PathPrefix/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\compose.yml | compose.yml | YAML | 249 | 0.7 | 0 | 0 | vue-tools | 242 | 2024-04-12T05:34:55.897876 | Apache-2.0 | false | 98d662a602f5d5616f1f9580c6be9780 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091/auth'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080/auth/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\configuration.yml | configuration.yml | YAML | 2,223 | 0.95 | 0 | 0 | vue-tools | 405 | 2025-06-18T21:27:41.109970 | MIT | false | bcda819bbb674976d61ac144fde6c40c |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | vue-tools | 383 | 2025-01-07T19:11:09.492287 | BSD-3-Clause | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './Postgres/configuration.yml:/config/configuration.yml'\n - './Postgres/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\compose.yml | compose.yml | YAML | 245 | 0.7 | 0 | 0 | node-utils | 930 | 2024-08-26T13:21:20.099745 | BSD-3-Clause | false | 4a0dad3f760a64ff2338ca45dfd46438 |
---\ncertificates_directory: /certs/\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: /pki/public.backend.crt\n key: /pki/private.backend.pem\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n postgres:\n address: 'tcp://postgres:5432'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\configuration.yml | configuration.yml | YAML | 2,008 | 0.95 | 0 | 0 | awesome-app | 227 | 2023-07-17T10:40:58.039167 | MIT | false | bbb3382165ba5367d2d0f47d3e493132 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | python-kit | 797 | 2024-03-28T19:25:13.886888 | GPL-3.0 | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './ShortTimeouts/configuration.yml:/config/configuration.yml'\n - './ShortTimeouts/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\compose.yml | compose.yml | YAML | 255 | 0.7 | 0 | 0 | python-kit | 569 | 2024-01-14T11:03:31.568972 | GPL-3.0 | false | 3e5510a9976ef4c97d8fcc24682e322c |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - name: 'authelia_sessin'\n domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '10 seconds'\n inactivity: '7 seconds'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\configuration.yml | configuration.yml | YAML | 2,283 | 0.95 | 0 | 0 | vue-tools | 780 | 2025-04-18T22:57:16.797418 | Apache-2.0 | false | 5d8d569846daea96369d18b43da39f0a |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | vue-tools | 312 | 2024-03-04T17:00:01.138662 | BSD-3-Clause | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n environment:\n AUTHELIA_JWT_SECRET_FILE: '/tmp/authelia/StandaloneSuite/jwt'\n AUTHELIA_SESSION_SECRET_FILE: '/tmp/authelia/StandaloneSuite/session'\n volumes:\n - './Standalone/configuration.yml:/config/configuration.yml'\n - './Standalone/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n - '/tmp:/tmp'\n - './Standalone/locales:/config/locales'\n user: '${USER_ID}:${GROUP_ID}'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\compose.yml | compose.yml | YAML | 512 | 0.7 | 0 | 0 | awesome-app | 638 | 2024-01-08T00:05:17.901487 | GPL-3.0 | false | 275c97c0fcf09243410f4ca59e9e4e3f |
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n session_elevation_finish:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://0.0.0.0:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/tmp/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: '3 seconds'\n disable_startup_check: false\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\configuration.yml | configuration.yml | YAML | 2,836 | 0.95 | 0 | 0 | react-lib | 629 | 2024-04-01T13:28:36.592679 | GPL-3.0 | false | 1e6e4ef24455aa7f821783bbed477e1b |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | react-lib | 716 | 2024-08-03T06:34:27.215487 | GPL-3.0 | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './Traefik/configuration.yml:/config/configuration.yml'\n - './Traefik/users.yml:/config/users.yml'\n - './Traefik/favicon.ico:/config/assets/favicon.ico'\n - './Traefik/logo.png:/config/assets/logo.png'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\compose.yml | compose.yml | YAML | 355 | 0.7 | 0 | 0 | node-utils | 340 | 2025-05-18T10:37:12.200324 | MIT | false | a4f40272b6603ded3bb2e11ccb290dd8 |
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n asset_path: '/config/assets/'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n authz:\n forward-auth:\n implementation: 'ForwardAuth'\n authn_strategies: []\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n version: 3\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n username: 'authelia'\n password: 'redis-user-password'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\configuration.yml | configuration.yml | YAML | 2,251 | 0.95 | 0 | 0 | node-utils | 442 | 2024-02-20T16:41:11.404647 | GPL-3.0 | false | a56d3d8ed229b281034228272b5161bb |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | awesome-app | 495 | 2023-07-22T02:34:19.205110 | GPL-3.0 | false | f776ae223ecd0228e03175588a362930 |
---\nservices:\n authelia-backend:\n volumes:\n - './TwoFactor/configuration.yml:/config/configuration.yml'\n - './TwoFactor/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\compose.yml | compose.yml | YAML | 247 | 0.7 | 0 | 0 | vue-tools | 363 | 2024-12-22T09:09:58.473975 | GPL-3.0 | false | e25cc71b696ac827c96c25d1b40720c4 |
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n second_factor_totp:\n buckets:\n - period: '2 minutes'\n requests: 50\n session_elevation_start:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n session_elevation_finish:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://0.0.0.0:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/tmp/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n username: 'authelia'\n password: 'mailer'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: '3s'\n disable_startup_check: false\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n allowed_algorithms:\n - 'SHA1'\n - 'SHA256'\n - 'SHA512'\n allowed_digits:\n - 6\n - 8\n allowed_periods:\n - 30\n - 60\n - 90\n - 120\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: true\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\configuration.yml | configuration.yml | YAML | 3,008 | 0.95 | 0 | 0 | react-lib | 326 | 2023-11-08T20:09:46.452274 | GPL-3.0 | false | 022e6bc752a368e2334c1721d9f15e72 |
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n | dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\users.yml | users.yml | YAML | 1,103 | 0.8 | 0 | 0 | python-kit | 190 | 2024-06-04T15:52:19.259243 | MIT | false | f776ae223ecd0228e03175588a362930 |
version: "2"\n\nbuild:\n os: "ubuntu-22.04"\n tools:\n python: "3.10"\n\npython:\n install:\n - requirements: docs/requirements.txt\n\nsphinx:\n configuration: docs/source/conf.py | dataset_sample\yaml\AutoMapper_AutoMapper\.readthedocs.yml | .readthedocs.yml | YAML | 177 | 0.85 | 0 | 0 | react-lib | 279 | 2025-03-24T11:21:16.032186 | GPL-3.0 | false | 7b1f750fb491eecd34b7e19117560333 |
jobs:\n\n- job: GetPRNumber\n pool:\n vmImage: 'ubuntu-20.04'\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: ./build.sh --target OutputVersion --version-output-dir $(Build.ArtifactStagingDirectory)\n - task: PublishBuildArtifacts@1\n inputs:\n PathtoPublish: '$(Build.ArtifactStagingDirectory)'\n ArtifactName: 'PRNumber'\n publishLocation: 'Container'\n \n- job: Linux\n pool:\n vmImage: 'ubuntu-20.04'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android macos wasm-tools\n\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: |\n dotnet --info\n printenv\n ./build.sh --target CiAzureLinux --configuration=Release\n\n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n \n\n- job: macOS\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n pool:\n vmImage: 'macos-13'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android ios macos wasm-tools\n \n - task: CmdLine@2\n displayName: 'Generate avalonia-native'\n inputs:\n script: |\n export COREHOST_TRACE=0\n export DOTNET_SKIP_FIRST_TIME_EXPERIENCE=1\n export DOTNET_CLI_TELEMETRY_OPTOUT=1\n ./build.sh --target GenerateCppHeaders --configuration Release \n\n - task: Xcode@5\n inputs:\n actions: 'build'\n scheme: ''\n sdk: 'macosx13.0'\n configuration: 'Release'\n xcWorkspacePath: '**/*.xcodeproj/project.xcworkspace'\n xcodeVersion: 'specifyPath' # Options: 8, 9, default, specifyPath\n xcodeDeveloperDir: '/Applications/Xcode_14.1.app/Contents/Developer'\n args: '-derivedDataPath ./'\n\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: |\n export COREHOST_TRACE=0\n export DOTNET_SKIP_FIRST_TIME_EXPERIENCE=1\n export DOTNET_CLI_TELEMETRY_OPTOUT=1\n which dotnet\n dotnet --info\n printenv\n ./build.sh --target CiAzureOSX --configuration Release --skip-previewer\n\n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n \n - task: PublishBuildArtifacts@1\n inputs:\n pathToPublish: '$(Build.SourcesDirectory)/Build/Products/Release/'\n artifactName: 'Avalonia.Native.OSX'\n condition: succeeded()\n \n - task: PublishBuildArtifacts@1\n inputs:\n pathtoPublish: '$(Build.SourcesDirectory)/artifacts/nuget'\n artifactName: 'NuGetOSX'\n condition: succeeded()\n\n- job: Windows\n pool:\n vmImage: 'windows-2022'\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android ios tvos wasm-tools\n\n - task: CmdLine@2\n displayName: 'Install Nuke'\n inputs:\n script: |\n dotnet tool install --global Nuke.GlobalTool --version 6.2.1 \n\n - task: CmdLine@2\n displayName: 'Run Nuke'\n inputs:\n script: |\n set PATH=%PATH%;%USERPROFILE%\.dotnet\tools\n nuke --target CiAzureWindows --configuration Release\n \n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n\n - task: PublishBuildArtifacts@1\n inputs:\n pathtoPublish: '$(Build.SourcesDirectory)/artifacts/nuget'\n artifactName: 'NuGet'\n condition: succeeded()\n\n - task: PublishBuildArtifacts@1\n inputs:\n pathToPublish: '$(Build.SourcesDirectory)/artifacts/zip'\n artifactName: 'Samples'\n condition: succeeded()\n\n | dataset_sample\yaml\AvaloniaUI_Avalonia\azure-pipelines.yml | azure-pipelines.yml | YAML | 4,851 | 0.8 | 0 | 0 | vue-tools | 550 | 2024-01-27T19:38:39.898424 | BSD-3-Clause | false | 9784e65edbdd502b8e76b8de46eea744 |
version: '1.1.0'\ninvalidStatus: "pending"\nlabelRule:\n values:\n - "bug"\n - "feature"\n - "enhancement"\n - "area-infrastructure"\n | dataset_sample\yaml\AvaloniaUI_Avalonia\.github\pr_labels.yml | pr_labels.yml | YAML | 139 | 0.7 | 0 | 0 | react-lib | 800 | 2024-02-13T02:24:57.147505 | MIT | false | 909ae5d58114b7333606326f575e1bf9 |
name: Bug Report\ndescription: File a bug report\nlabels: ["bug"]\nbody:\n - type: textarea\n id: what-happened\n attributes:\n label: Describe the bug\n description: A clear and concise description of what the bug is.\n validations:\n required: true\n - type: textarea\n id: steps\n attributes:\n label: To Reproduce\n description: Steps to reproduce the behavior.\n validations:\n required: true\n - type: textarea\n id: what-expected\n attributes:\n label: Expected behavior\n description: A clear and concise description of what you expected to happen.\n - type: input\n id: avalonia-version\n attributes:\n label: Avalonia version\n description: |\n Let us know which version you have tested. Please make sure to test latest stable version available. \n If you could test [nightly builds](https://github.com/AvaloniaUI/Avalonia/wiki/Using-nightly-build-feed) in addition, this would be of great help. \n placeholder: e.g. 11.2.0, 11.1.0\n validations:\n required: true\n - type: dropdown\n id: os\n attributes:\n label: OS\n multiple: true\n options: \n - Windows\n - macOS\n - Linux\n - WebAssembly\n - Android\n - iOS\n - Tizen\n - type: textarea\n id: additional-info\n attributes:\n label: Additional context\n description: |\n Add any other context about the problem here.\n If applicable, add screenshots to help explain your problem. \n | dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\bug_report.yml | bug_report.yml | YAML | 1,523 | 0.95 | 0 | 0 | vue-tools | 221 | 2023-12-29T14:51:30.706775 | BSD-3-Clause | false | c922ae7e70d73cdbd8f253891c706988 |
blank_issues_enabled: false\ncontact_links:\n - name: Questions, Discussions, Ideas\n url: https://github.com/AvaloniaUI/Avalonia/discussions/new\n about: Please ask and answer questions here.\n - name: Avalonia Community Support on Telegram\n url: https://t.me/Avalonia\n about: Please ask and answer questions here.\n | dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\config.yml | config.yml | YAML | 325 | 0.8 | 0 | 0 | python-kit | 19 | 2024-08-23T12:16:19.743452 | GPL-3.0 | false | f5c3ff0dfc53fdb6de037602dd42e9bb |
name: Feature request\ndescription: Suggest an idea for this project\nlabels: ["enhancement"]\nbody:\n - type: textarea\n id: problem\n attributes:\n label: Is your feature request related to a problem? Please describe.\n description: A clear and concise description of what the problem is.\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Describe the solution you'd like\n description: A clear and concise description of what you want to happen.\n validations:\n required: true\n - type: textarea\n id: alternatives\n attributes:\n label: Describe alternatives you've considered\n description: A clear and concise description of any alternative solutions or features you've considered.\n - type: textarea\n id: additional-context\n attributes:\n label: Additional context\n description: Add any other context or screenshots about the feature request here.\n | dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\feature_request.yml | feature_request.yml | YAML | 955 | 0.85 | 0.035714 | 0 | python-kit | 939 | 2024-07-06T03:55:22.184178 | GPL-3.0 | false | 0c0cf47f40079677f68b2ddf7bb72631 |
name: "Avalonia CLA Bot"\non:\n issue_comment:\n types: [created]\n pull_request_target:\n types: [opened,closed,synchronize]\n\njobs:\n Runner:\n runs-on: ubuntu-latest\n steps:\n - name: 'Clone bot repo'\n if: github.event.issue.pull_request && ((github.event.comment.user.login != 'cla-avalonia') || github.event_name == 'pull_request_target')\n run : |\n rm -rf ./github-action/\n git clone https://${{ secrets.CLA_PAT }}:@github.com/AvaloniaUI/AvaloniaCLABot --branch=main --depth=1 --recursive CLABot\n\n - name: "Run CLA bot"\n if: github.event.issue.pull_request && ((github.event.comment.user.login != 'cla-avalonia') || github.event_name == 'pull_request_target')\n uses: ./CLABot\n env:\n PERSONAL_ACCESS_TOKEN: ${{ secrets.CLA_PAT }} \n | dataset_sample\yaml\AvaloniaUI_Avalonia\.github\workflows\CLA.yml | CLA.yml | YAML | 813 | 0.8 | 0.090909 | 0 | awesome-app | 556 | 2023-11-23T21:27:13.546899 | GPL-3.0 | false | 7729e7123d5b2227e02eea0e8ef25150 |
default:\n suites:\n smoke:\n paths: [ "%paths.base%/features/smoke" ]\n contexts: [ Aws\Test\Integ\SmokeContext ]\n performance:\n paths: [ "%paths.base%/features/performance" ]\n contexts: [ Aws\Test\PerformanceContext ]\n multipart:\n paths: [ "%paths.base%/features/multipart" ]\n contexts: [ Aws\Test\Integ\MultipartContext ]\n batching:\n paths: [ "%paths.base%/features/batching" ]\n contexts: [ Aws\Test\Integ\BatchingContext ]\n blocking:\n paths: [ "%paths.base%/features/blocking" ]\n contexts: [ Aws\Test\Integ\BlockingContext ]\n clientSideMonitoring:\n paths: [ "%paths.base%/features/clientSideMonitoring" ]\n contexts: [ Aws\Test\Integ\ClientSideMonitoringContext ]\n concurrency:\n paths: [ "%paths.base%/features/concurrency" ]\n contexts: [ Aws\Test\Integ\ConcurrencyContext ]\n crt:\n paths: [ "%paths.base%/features/crt" ]\n contexts: [ Aws\Test\Integ\CrtContext ]\n credentials:\n paths: [ "%paths.base%/features/credentials" ]\n contexts: [ Aws\Test\Integ\CredentialsContext ]\n streams:\n paths: [ "%paths.base%/features/streams" ]\n contexts: [ Aws\Test\Integ\NativeStreamContext ]\n s3:\n paths: [ "%paths.base%/features/s3" ]\n contexts: [ Aws\Test\Integ\S3Context ]\n s3Encryption:\n paths: [ "%paths.base%/features/s3Encryption" ]\n contexts: [ Aws\Test\Integ\S3EncryptionContext ]\n s3EncryptionV2:\n paths: [ "%paths.base%/features/s3EncryptionV2" ]\n contexts: [ Aws\Test\Integ\S3EncryptionContextV2 ]\n | dataset_sample\yaml\aws_aws-sdk-php\behat.yml | behat.yml | YAML | 1,774 | 0.7 | 0 | 0 | vue-tools | 974 | 2024-07-15T18:01:37.534109 | MIT | false | 0ef65c61fa069c3fd14a42dc9885ee0f |
codecov:\n notify:\n after_n_builds: 2\n\ncoverage:\n status:\n project:\n default:\n target: 91%\n | dataset_sample\yaml\aws_aws-sdk-php\codecov.yml | codecov.yml | YAML | 110 | 0.7 | 0 | 0 | node-utils | 277 | 2024-12-18T01:10:53.536209 | GPL-3.0 | false | d499dd4202ed6baa3a84f481587df5a0 |
version: 2\nupdates:\n - package-ecosystem: "github-actions"\n directory: "/"\n schedule:\n interval: "weekly"\n | dataset_sample\yaml\aws_aws-sdk-php\.github\dependabot.yml | dependabot.yml | YAML | 118 | 0.7 | 0 | 0 | awesome-app | 697 | 2025-05-02T22:13:07.010091 | BSD-3-Clause | false | 4334132ba6bcd78670bf574b6b4236f4 |
---\nname: "🐛 Bug Report"\ndescription: Report a bug\ntitle: "(short issue description)"\nlabels: [bug, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the bug\n description: What is the problem? A clear and concise description of the bug.\n validations:\n required: true\n - type: checkboxes\n id: regression\n attributes:\n label: Regression Issue\n description: What is a regression? If it worked in a previous version but doesn't in the latest version, it's considered a regression. In this case, please provide specific version number in the report.\n options:\n - label: Select this option if this issue appears to be a regression.\n required: false\n - type: textarea\n id: expected\n attributes:\n label: Expected Behavior\n description: |\n What did you expect to happen?\n validations:\n required: true\n - type: textarea\n id: current\n attributes:\n label: Current Behavior\n description: |\n What actually happened?\n \n Please include full errors, uncaught exceptions, stack traces, and relevant logs.\n If service responses are relevant, please include wire logs.\n validations:\n required: true\n - type: textarea\n id: reproduction\n attributes:\n label: Reproduction Steps\n description: |\n Provide a self-contained, concise snippet of code that can be used to reproduce the issue.\n For more complex issues provide a repo with the smallest sample that reproduces the bug.\n \n Avoid including business logic or unrelated code, it makes diagnosis more difficult.\n The code sample should be an SSCCE. See http://sscce.org/ for details. In short, please provide a code sample that we can copy/paste, run and reproduce.\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Possible Solution\n description: |\n Suggest a fix/reason for the bug\n validations:\n required: false\n - type: textarea\n id: context\n attributes:\n label: Additional Information/Context\n description: |\n Anything else that might be relevant for troubleshooting this bug. Providing context helps us come up with a solution that is most useful in the real world.\n validations:\n required: false\n - type: input\n id: sdk-version\n attributes:\n label: SDK version used\n validations:\n required: true\n - type: input\n id: environment\n attributes:\n label: Environment details (Version of PHP (`php -v`)? OS name and version, etc.)\n validations:\n required: true\n | dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\bug-report.yml | bug-report.yml | YAML | 2,689 | 0.95 | 0.049383 | 0 | react-lib | 365 | 2025-02-15T12:29:22.954197 | BSD-3-Clause | false | ac8f4f2d34b455cc3c7b1c5385374a91 |
---\nblank_issues_enabled: false\ncontact_links:\n - name: 💬 General Question\n url: https://github.com/aws/aws-sdk-php/discussions/categories/q-a\n about: Please ask and answer questions as a discussion thread | dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\config.yml | config.yml | YAML | 215 | 0.8 | 0 | 0 | vue-tools | 296 | 2023-09-09T09:15:05.329697 | MIT | false | 20285f694b6debcfcb1dcbcf83f29d4b |
---\nname: "📕 Documentation Issue"\ndescription: Report an issue in the API Reference documentation or Developer Guide\ntitle: "(short issue description)"\nlabels: [documentation, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the issue\n description: A clear and concise description of the issue.\n validations:\n required: true\n\n - type: textarea\n id: links\n attributes:\n label: Links\n description: |\n Include links to affected documentation page(s).\n validations:\n required: true\n | dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\documentation.yml | documentation.yml | YAML | 588 | 0.85 | 0 | 0 | vue-tools | 264 | 2025-04-18T01:04:34.726852 | Apache-2.0 | false | afec36c0d9b3288cd59fe715361a20c3 |
---\nname: 🚀 Feature Request\ndescription: Suggest an idea for this project\ntitle: "(short issue description)"\nlabels: [feature-request, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the feature\n description: A clear and concise description of the feature you are proposing.\n validations:\n required: true\n - type: textarea\n id: use-case\n attributes:\n label: Use Case\n description: |\n Why do you need this feature? For example: "I'm always frustrated when..."\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Proposed Solution\n description: |\n Suggest how to implement the addition or change. Please include prototype/workaround/sketch/reference implementation.\n validations:\n required: false\n - type: textarea\n id: other\n attributes:\n label: Other Information\n description: |\n Any alternative solutions or features you considered, a more detailed explanation, stack traces, related issues, links for context, etc.\n validations:\n required: false\n - type: checkboxes\n id: ack\n attributes:\n label: Acknowledgements\n options:\n - label: I may be able to implement this feature request\n required: false\n - label: This feature might incur a breaking change\n required: false\n - type: input\n id: sdk-version\n attributes:\n label: SDK version used\n validations:\n required: true\n - type: input\n id: environment\n attributes:\n label: Environment details (Version of PHP (`php -v`)? OS name and version, etc.)\n validations:\n required: true\n | dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\feature-request.yml | feature-request.yml | YAML | 1,727 | 0.85 | 0.033898 | 0 | python-kit | 95 | 2024-06-04T04:08:05.427894 | Apache-2.0 | false | e1d290f39c23e7cf020244703d579876 |
name: Closed Issue Message\non:\n issues:\n types: [closed]\npermissions: {}\njobs:\n auto_comment:\n permissions:\n issues: write # to comment on issues (aws-actions/closed-issue-message)\n\n runs-on: ubuntu-latest\n steps:\n - uses: aws-actions/closed-issue-message@v2\n with:\n # These inputs are both required\n repo-token: "${{ secrets.GITHUB_TOKEN }}"\n message: |\n This issue is now closed. Comments on closed issues are hard for our team to see.\n If you need more assistance, please open a new issue that references this one.\n | dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\closed-issue-message.yml | closed-issue-message.yml | YAML | 598 | 0.95 | 0.052632 | 0.055556 | awesome-app | 405 | 2024-03-19T17:42:39.950594 | BSD-3-Clause | false | 60f1d124989d68ad58b75f8651a6f20d |
name: Build API documentation\non:\n pull_request:\n branches:\n - master\njobs:\n build_docs:\n runs-on: ubuntu-latest\n strategy:\n matrix:\n php-versions: ['8.1']\n name: Build API documentation for PHP ${{ matrix.php-versions }}\n steps:\n - name: Setup PHP with Xdebug\n uses: shivammathur/setup-php@v2\n with:\n coverage: xdebug\n php-version: ${{ matrix.php-versions }}\n ini-values: xdebug.overload_var_dump=0, memory_limit=4G, phar.readonly=false\n\n - name: Checkout CodeBase\n uses: actions/checkout@v4\n\n - name: Validate composer.json and composer.lock\n run: composer validate\n\n - name: Install dependencies\n run: composer update --no-interaction --prefer-source\n\n - name: Prepare OS environment\n run: |\n sudo sed -i s/deb.debian.org/archive.debian.org/g /etc/apt/sources.list\n sudo sed -i 's|security.debian.org|archive.debian.org/|g' /etc/apt/sources.list\n sudo sed -i '/stretch-updates/d' /etc/apt/sources.list\n\n sudo apt-get -y update && \\n sudo apt-get -y install git wget zip unzip libzip-dev libssl-dev libtidy-dev python3 cmake python3-distutils-extra python3-apt\n\n PHP_CONF_DIR=$(php -i | grep "Scan this dir for additional .ini files" | awk '{print $9}')\n sudo touch "$PHP_CONF_DIR"/memory.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/memory.ini \\n && sudo echo "memory_limit = 5048M;" >> "$PHP_CONF_DIR"/memory.ini\n\n sudo touch "$PHP_CONF_DIR"/phar.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/phar.ini \\n && sudo echo "phar.readonly = Off;" >> "$PHP_CONF_DIR"/phar.ini\n\n sudo touch "$PHP_CONF_DIR"/timezone.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/timezone.ini \\n && sudo echo "date.timezone ='America/New_York'" >> "$PHP_CONF_DIR"/timezone.ini\n\n - name: Run API docs build\n run: |\n make api\n | dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\docs-build.yml | docs-build.yml | YAML | 1,971 | 0.7 | 0.037037 | 0 | python-kit | 130 | 2024-06-19T11:15:05.265338 | MIT | false | ee00c8e4c15f840088b974d77805d399 |
name: Git Secrets Scan\n\non:\n pull_request:\n branches:\n - master\n\njobs:\n git-secrets-scan:\n runs-on: ubuntu-latest\n\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n\n - name: Set up Git Secrets\n run: |\n sudo apt-get update\n sudo apt-get install -y git\n git clone https://github.com/awslabs/git-secrets.git\n cd git-secrets\n sudo make install\n cd ..\n git secrets --install\n git secrets --register-aws\n\n - name: Fetch previous commit\n run: |\n git fetch origin +refs/heads/${{ github.base_ref }}:refs/remotes/origin/${{ github.base_ref }}\n export DIFF=$(git diff origin/${{ github.base_ref }} HEAD)\n echo "${DIFF}" > diff.txt\n\n - name: Filter out skipped patterns\n run: |\n skippedPrefixes=(\n 'src/data/s3control/2018-08-20/endpoint-tests-1.json.php'\n 'src/data/dynamodb/2011-12-05/endpoint-tests-1.json.php'\n 'src/data/dynamodb/2012-08-10/endpoint-tests-1.json.php'\n 'tests/DynamoDb/MarshalerTest.php'\n '- '\n '\[ERROR\]'\n '\\n'\n 'PHP_EOL'\n 'Possible'\n '/usr/local/bin/git-secrets:'\n 'tests/S3Control'\n 'tests/Arn'\n )\n\n skippedRegexes=(\n '/examples-/'\n '/UpdateDataSourceRequest\$Credentials/'\n '/"AccountId": "123456789012"/'\n '/"AccountId": "999999999999"/'\n '/"AccountId": "012345678901"/'\n '/"AWS::Auth::AccountId": "012345678901"/'\n '/123456789012/'\n '/999999999999/'\n '/"Username": "username"/'\n '/"Password": "password"/'\n '/RegisterUserResponse\$UserInvitationUrl/'\n )\n\n # Filter out lines matching skipped prefixes\n for prefix in "${skippedPrefixes[@]}"; do\n sed -i "\|${prefix}|d" diff.txt\n done\n\n # Filter out lines matching skipped regexes\n for regex in "${skippedRegexes[@]}"; do\n sed -i -E "${regex}d" diff.txt\n done\n\n - name: Run Git Secrets scan on filtered diff\n run: |\n if [ -s diff.txt ]; then\n cat diff.txt | git secrets --scan - 2>&1\n status=$?\n if [ $status -ne 0 ]; then\n exit $status\n fi\n else\n echo "No differences found."\n fi\n | dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\git-secrets-scan.yml | git-secrets-scan.yml | YAML | 2,490 | 0.8 | 0.047619 | 0.027027 | vue-tools | 109 | 2024-11-07T05:16:05.219667 | MIT | false | ea9ecf2369617fd5e558d89678e83ec0 |
name: HandleStaleDiscussions\non:\n schedule:\n - cron: '0 */4 * * *'\n discussion_comment:\n types: [created]\n\njobs:\n handle-stale-discussions:\n if: github.repository_owner == 'aws'\n name: Handle stale discussions\n runs-on: ubuntu-latest\n permissions:\n discussions: write\n steps:\n - name: Stale discussions action\n uses: aws-github-ops/handle-stale-discussions@v1\n env:\n GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}\n | dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\handle-stale-discussions.yml | handle-stale-discussions.yml | YAML | 464 | 0.7 | 0.052632 | 0 | python-kit | 160 | 2024-11-21T04:21:28.120234 | GPL-3.0 | false | d976bf8207e837149f94929c157d4ddb |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.