content
stringlengths
1
103k
path
stringlengths
8
216
filename
stringlengths
2
179
language
stringclasses
15 values
size_bytes
int64
2
189k
quality_score
float64
0.5
0.95
complexity
float64
0
1
documentation_ratio
float64
0
1
repository
stringclasses
5 values
stars
int64
0
1k
created_date
stringdate
2023-07-10 19:21:08
2025-07-09 19:11:45
license
stringclasses
4 values
is_test
bool
2 classes
file_hash
stringlengths
32
32
---\nservices:\n authelia-backend:\n build:\n context: 'example/compose/authelia'\n dockerfile: 'Dockerfile.backend'\n args:\n USER_ID: '${USER_ID}'\n GROUP_ID: '${GROUP_ID}'\n security_opt:\n - 'seccomp:unconfined'\n - 'apparmor:unconfined'\n command: '/resources/entrypoint-backend.sh'\n working_dir: '/app'\n cap_add:\n - 'SYS_PTRACE'\n volumes:\n - './example/compose/authelia/resources:/resources'\n - '../..:/app'\n - '${GOPATH}:/go'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_backend.rule: 'Host(`login.example.com`) && PathPrefix(`/.well-known`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/.well-known`) || Host(`login.example.com`) && PathPrefix(`/api`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/api`) || Host(`login.example.com`) && PathPrefix(`/devworkflow`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/devworkflow`) || Host(`login.example.com`) && PathPrefix(`/locales`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/locales`) || Host(`login.example.com`) && Path(`/jwks.json`) || Host(`login.example.com`) && Path(`${PathPrefix}/jwks.json`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_backend.entrypoints: 'https'\n traefik.http.routers.authelia_backend.tls: 'true'\n traefik.http.services.authelia_backend.loadbalancer.server.scheme: 'https'\n environment:\n ENVIRONMENT: 'dev'\n networks:\n authelianet:\n ipv4_address: 192.168.240.50\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.backend.dev.yml
compose.backend.dev.yml
YAML
1,564
0.8
0
0
node-utils
939
2023-11-11T08:34:33.831081
GPL-3.0
false
a818bab31644572d338e404d660a4067
---\nservices:\n authelia-backend:\n image: 'authelia:dist'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_backend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_backend.entrypoints: 'https'\n traefik.http.routers.authelia_backend.tls: 'true'\n traefik.http.services.authelia_backend.loadbalancer.server.scheme: 'https'\n healthcheck:\n disable: true\n volumes:\n - '../..:/authelia'\n environment:\n ENVIRONMENT: 'dev'\n restart: 'always'\n networks:\n authelianet:\n ipv4_address: 192.168.240.50\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.backend.dist.yml
compose.backend.dist.yml
YAML
699
0.8
0
0
python-kit
431
2023-12-19T13:27:59.853443
MIT
false
53e6eeb9c3d3721e8a744b64c25d6930
---\nservices:\n authelia-frontend:\n build:\n context: 'example/compose/authelia'\n dockerfile: 'Dockerfile.frontend'\n args:\n USER_ID: '${USER_ID}'\n GROUP_ID: '${GROUP_ID}'\n command: '/resources/entrypoint-frontend.sh'\n working_dir: '/app'\n stdin_open: true\n volumes:\n - './example/compose/authelia/resources/:/resources'\n - '../../web:/app'\n - '~/.local/share/pnpm/store:/app/.pnpm-store'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_frontend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_frontend.entrypoints: 'https'\n traefik.http.routers.authelia_frontend.tls: 'true'\n environment:\n VITE_BASEPATH: '${PathPrefix}'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.frontend.dev.yml
compose.frontend.dev.yml
YAML
886
0.8
0
0
awesome-app
724
2023-07-31T07:44:44.676626
BSD-3-Clause
false
d45f041f7e6ba0c38f7a6f7766611bd2
---\nservices:\n authelia-frontend:\n image: 'nginx:1.27.5-alpine'\n volumes:\n - './example/compose/authelia/resources/nginx.conf:/etc/nginx/nginx.conf'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.authelia_frontend.rule: 'Host(`login.example.com`) || Host(`login.example.com`) && PathPrefix(`${PathPrefix}/`)' # yamllint disable-line rule:line-length\n traefik.http.routers.authelia_frontend.entrypoints: 'https'\n traefik.http.routers.authelia_frontend.tls: 'true'\n traefik.http.services.authelia_frontend.loadbalancer.server.port: '3000'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\authelia\compose.frontend.dist.yml
compose.frontend.dist.yml
YAML
626
0.8
0
0
vue-tools
3
2024-12-07T08:46:15.997211
Apache-2.0
false
e997e074c99de44c476ed5f424093286
---\nservices:\n caddy:\n # build: ./example/compose/caddy/ # used for debugging\n image: caddy:2.10.0-alpine\n volumes:\n - './example/compose/caddy/Caddyfile:/etc/caddy/Caddyfile'\n - './common/pki:/pki'\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\caddy\compose.yml
compose.yml
YAML
294
0.8
0.083333
0.083333
python-kit
325
2023-11-12T03:50:04.217548
MIT
false
1dd066a14a035acb5ba62f28522e82bd
---\nservices:\n duo-api:\n image: 'authelia/integration-duo'\n volumes:\n - './example/compose/duo-api/duo_api.js:/usr/app/src/duo_api.js'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\duo-api\compose.yml
compose.yml
YAML
187
0.7
0
0
node-utils
931
2025-01-28T02:26:16.775892
Apache-2.0
false
1d9eee0d74dd26000823c730466d1d74
---\nservices:\n envoy:\n image: envoyproxy/envoy:v1.34.0\n volumes:\n - ./example/compose/envoy/envoy.yaml:/etc/envoy/envoy.yaml\n - ./common/pki:/pki\n ports:\n - 9901:9901\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\envoy\compose.yml
compose.yml
YAML
267
0.7
0
0
python-kit
984
2025-07-08T08:05:05.997242
MIT
false
c0b4b40deacb5ccd87c69eb57f620686
---\nservices:\n haproxy:\n image: authelia/integration-haproxy\n volumes:\n - './example/compose/haproxy/haproxy.cfg:/usr/local/etc/haproxy/haproxy.cfg'\n - './example/compose/haproxy/http.lua:/usr/local/etc/haproxy/haproxy-lua-http/http.lua'\n - './example/compose/haproxy/auth-request.lua:/usr/local/etc/haproxy/auth-request.lua'\n - './common/pki:/pki'\n networks:\n authelianet:\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\haproxy\compose.yml
compose.yml
YAML
451
0.7
0
0
node-utils
246
2024-03-29T07:31:32.499218
Apache-2.0
false
0f94b2e2aa2911f983c6b3aa32be3039
---\nservices:\n httpbin:\n image: citizenstig/httpbin\n networks:\n authelianet: {}\n labels:\n traefik.enable: 'true'\n traefik.http.routers.httpbin.rule: 'Host(`public.example.com`) && Path(`/headers`)'\n traefik.http.routers.httpbin.priority: '1000'\n traefik.http.routers.httpbin.tls: 'true'\n traefik.http.routers.httpbin.middlewares: 'authelia@docker'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\httpbin\compose.yml
compose.yml
YAML
392
0.7
0
0
vue-tools
428
2024-10-31T10:18:08.409347
GPL-3.0
false
fa57966590fc0da4ec540a200b75902d
---\nservices:\n k3d:\n image: ghcr.io/k3d-io/k3d:5.8.3-dind\n volumes:\n - './example/kube:/authelia'\n - './example/kube/authelia/configs/configuration.yml:/configmaps/authelia/configuration.yml'\n - './common/pki:/configmaps/authelia/ssl'\n - './example/compose/ldap/ldif:/configmaps/ldap'\n - './example/compose/nginx/backend:/configmaps/nginx-backend'\n - '../../coverage:/coverage'\n privileged: true\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n - login.example.com\n - admin.example.com\n - dev.example.com\n - mail.example.com\n - kubernetes.example.com\n - traefik.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\k3d\compose.yml
compose.yml
YAML
827
0.8
0
0.038462
vue-tools
248
2025-03-05T08:34:52.640685
MIT
false
d2bd8f671bab604ddd2b46e094886ec5
---\nservices:\n openldap-admin:\n image: 'osixia/phpldapadmin:0.9.0'\n ports:\n - '9090:80'\n environment:\n PHPLDAPADMIN_LDAP_HOSTS: 'openldap'\n PHPLDAPADMIN_HTTPS: 'false'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\ldap\compose.admin.yml
compose.admin.yml
YAML
233
0.7
0
0
python-kit
147
2024-01-02T01:23:59.009779
MIT
false
08235973676ba43a6c5f136a5fdab39c
---\nservices:\n openldap:\n image: 'osixia/openldap:1.5.0'\n hostname: 'ldap.example.com'\n environment:\n LDAP_ORGANISATION: 'MyCompany'\n LDAP_DOMAIN: 'example.com'\n LDAP_ADMIN_PASSWORD: 'password'\n LDAP_CONFIG_PASSWORD: 'password'\n LDAP_ADDITIONAL_MODULES: 'memberof'\n LDAP_ADDITIONAL_SCHEMAS: 'openldap'\n LDAP_FORCE_RECONFIGURE: 'true'\n LDAP_TLS_VERIFY_CLIENT: 'try'\n volumes:\n - './example/compose/ldap/ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom'\n command:\n - '--copy-service'\n - '--loglevel'\n - 'debug'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\ldap\compose.yml
compose.yml
YAML
642
0.7
0.043478
0
python-kit
502
2024-12-29T00:29:49.449860
MIT
false
da2a8d00e30c7166e4ed8352e4ac25d2
---\nservices:\n mariadb:\n image: 'mariadb:11.7.2'\n environment:\n MARIADB_ROOT_PASSWORD: 'rootpassword'\n MARIADB_USER: 'admin'\n MARIADB_PASSWORD: 'password'\n MARIADB_DATABASE: 'authelia'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\mariadb\compose.yml
compose.yml
YAML
252
0.7
0
0
awesome-app
511
2024-01-02T11:33:34.331816
BSD-3-Clause
false
940bb08eedfc45dc6dc8ad23db1dedae
---\nservices:\n mysql:\n image: 'mysql:9.3'\n environment:\n MYSQL_ROOT_PASSWORD: 'rootpassword'\n MYSQL_USER: 'admin'\n MYSQL_PASSWORD: 'password'\n MYSQL_DATABASE: 'authelia'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\mysql\compose.yml
compose.yml
YAML
237
0.7
0
0
vue-tools
204
2024-09-21T10:38:03.565928
BSD-3-Clause
false
60d8d2846d827747428426df077eec86
---\nservices:\n nginx-backend:\n image: 'nginx:1.27.5-alpine'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.protectedapps.rule: 'Host(`admin.example.com`) || Host(`deny.example.com`) || Host(`home.example.com`) || Host(`public.example.com`) || Host(`secure.example.com`) || Host(`singlefactor.example.com`)' # yamllint disable-line rule:line-length\n traefik.http.routers.protectedapps.entrypoints: 'https'\n traefik.http.routers.protectedapps.tls: 'true'\n traefik.http.routers.protectedapps.middlewares: 'authelia@docker'\n volumes:\n - './example/compose/nginx/backend/html:/usr/share/nginx/html'\n - './example/compose/nginx/backend/nginx.conf:/etc/nginx/nginx.conf'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\backend\compose.yml
compose.yml
YAML
758
0.8
0
0
awesome-app
684
2024-09-16T18:39:41.681695
MIT
false
129b85fba832465dc903c25c020e94ed
---\nservices:\n nginx-cli:\n image: nginx:1.27.5-alpine\n volumes:\n - ./example/compose/nginx/cli/nginx.conf:/etc/nginx/nginx.conf\n - ./common/pki:/pki\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\cli\compose.yml
compose.yml
YAML
373
0.8
0
0.066667
awesome-app
594
2025-03-06T22:04:23.118922
Apache-2.0
false
0bccbc18f5570738ccadec61231e4816
---\nservices:\n nginx-portal:\n image: nginx:1.27.5-alpine\n volumes:\n - ./example/compose/nginx/portal/nginx.conf:/etc/nginx/nginx.conf\n - ./common/pki:/pki\n networks:\n authelianet:\n aliases:\n - public.example.com\n - secure.example.com\n - login.example.com\n - duo.example.com\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\nginx\portal\compose.yml
compose.yml
YAML
437
0.8
0
0.058824
react-lib
733
2023-08-11T02:08:40.919824
BSD-3-Clause
false
e3920f60d3781fb546cdabc837d34a78
---\nservices:\n oidc-client:\n image: 'ghcr.io/authelia/oidc-tester-app:master-c3235cd'\n command: '/entrypoint.sh'\n depends_on:\n - 'authelia-backend'\n volumes:\n - './example/compose/oidc-client/entrypoint.sh:/entrypoint.sh'\n expose:\n - 8080\n labels:\n traefik.enable: 'true'\n traefik.http.routers.oidc.rule: 'Host(`oidc.example.com`)'\n traefik.http.routers.oidc.priority: '1000'\n traefik.http.routers.oidc.tls: 'true'\n traefik.http.routers.oidc.middlewares: 'authelia@docker'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\oidc-client\compose.yml
compose.yml
YAML
572
0.7
0
0
python-kit
612
2023-12-16T11:01:52.269668
Apache-2.0
false
409e3c9846dbdd5d15511b8fda54d652
---\nservices:\n postgres:\n image: 'postgres:17'\n environment:\n POSTGRES_PASSWORD: 'password'\n POSTGRES_USER: 'admin'\n POSTGRES_DB: 'authelia'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\postgres\compose.yml
compose.yml
YAML
203
0.7
0
0
node-utils
78
2024-08-16T02:00:05.223009
Apache-2.0
false
e08ec0a84a5dd0b20164c9c1e6be267f
---\nservices:\n redis:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh master'\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\redis\compose.yml
compose.yml
YAML
321
0.7
0
0
python-kit
679
2024-01-17T09:43:07.197119
BSD-3-Clause
false
e6a6fe290f9f725c01ddb65fd9332526
---\nservices:\n redis-node-0:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh master'\n healthcheck: &node-health\n test: ['CMD-SHELL', 'redis-cli ping || exit 1']\n interval: '3s'\n timeout: '5s'\n retries: 5\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-0.example.com'\n ipv4_address: 192.168.240.110\n redis-node-1:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh slave'\n depends_on: &deps\n redis-node-0:\n condition: 'service_healthy'\n healthcheck: *node-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-1.example.com'\n ipv4_address: 192.168.240.111\n redis-node-2:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh slave'\n depends_on: *deps\n healthcheck: *node-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/users.acl:/data/users.acl'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-node-2.example.com'\n ipv4_address: 192.168.240.112\n redis-sentinel-0:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: &deps-sentinel\n <<: *deps\n redis-node-1:\n condition: 'service_healthy'\n redis-node-2:\n condition: 'service_healthy'\n healthcheck: &sentinel-health\n test: [ 'CMD-SHELL', 'redis-cli -p 26379 -a sentinel-server-password ping || exit 1' ]\n interval: '3s'\n timeout: '5s'\n retries: 5\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-0.example.com'\n ipv4_address: 192.168.240.120\n redis-sentinel-1:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: *deps-sentinel\n healthcheck: *sentinel-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-1.example.com'\n ipv4_address: 192.168.240.121\n redis-sentinel-2:\n image: 'redis:7.4-alpine'\n command: '/entrypoint.sh sentinel'\n depends_on: *deps-sentinel\n healthcheck: *sentinel-health\n volumes:\n - './example/compose/redis/templates:/templates'\n - './example/compose/redis/entrypoint.sh:/entrypoint.sh'\n networks:\n authelianet:\n aliases:\n - 'redis-sentinel-2.example.com'\n ipv4_address: 192.168.240.122\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\redis-sentinel\compose.yml
compose.yml
YAML
3,051
0.7
0
0
awesome-app
398
2025-03-25T17:25:13.426056
GPL-3.0
false
5d7673fbefadb7a6e9ee82c840042e53
---\nservices:\n sambaldap:\n image: 'authelia/integration-samba'\n volumes:\n - './example/compose/samba/init.sh:/init.sh'\n cap_add:\n - 'SYS_ADMIN'\n hostname: 'ldap.example.com'\n healthcheck:\n test: ['CMD-SHELL', 'env LDAPTLS_REQCERT=never ldapsearch -x -LLL -D "CN=Administrator,CN=Users,DC=example,DC=com" -b "CN=john,OU=Users,DC=example,DC=com" -H ldap://localhost -ZZ -w password memberof | grep -q ^memberOf: || exit 1']\n interval: 10s\n timeout: 15s\n retries: 5\n environment:\n DOMAIN: 'example.com'\n DOMAINPASS: 'Password1'\n NOCOMPLEXITY: 'true'\n networks:\n authelianet: {}\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\samba\compose.yml
compose.yml
YAML
651
0.8
0
0
awesome-app
350
2025-04-05T05:58:13.324725
Apache-2.0
false
3fbeca15e8b880327116449418e7d87b
---\nservices:\n smtp:\n environment:\n MP_SMTP_AUTH: 'authelia:mailer'\n MP_SMTP_AUTH_ACCEPT_ANY: '0'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\smtp\compose.auth.yml
compose.auth.yml
YAML
116
0.7
0
0
awesome-app
273
2025-06-28T09:48:41.458094
Apache-2.0
false
45d9e889edd20bda7d8b6bc907f939e2
---\nservices:\n smtp:\n image: 'axllent/mailpit'\n volumes:\n - './common/pki:/pki'\n environment:\n MP_SMTP_TLS_CERT: '/pki/public.crt'\n MP_SMTP_TLS_KEY: '/pki/private.pem'\n MP_SMTP_AUTH_ACCEPT_ANY: '1'\n labels:\n traefik.frontend.rule: 'Host:mail.example.com'\n traefik.port: '8025'\n traefik.enable: 'true'\n traefik.http.routers.mail.rule: 'Host(`mail.example.com`)'\n traefik.http.routers.mail.entrypoints: 'https'\n traefik.http.routers.mail.tls: 'true'\n traefik.http.services.mail.loadbalancer.server.port: '8025'\n healthcheck:\n disable: true\n networks:\n authelianet:\n aliases:\n - 'mail.example.com'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\smtp\compose.yml
compose.yml
YAML
699
0.7
0
0
python-kit
829
2024-08-16T04:38:14.399920
GPL-3.0
false
63643a8a6fe9df0acadd5d4b86a9722c
---\nservices:\n # Simulates client 1.\n client-1:\n image: sameersbn/squid:3.5.27-1\n volumes:\n - ./example/compose/squid/squid.conf:/etc/squid/squid.conf\n networks:\n authelianet:\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.201\n client-2:\n image: sameersbn/squid:3.5.27-1\n volumes:\n - ./example/compose/squid/squid.conf:/etc/squid/squid.conf\n networks:\n authelianet:\n # Set the IP to be able to query on port 443\n ipv4_address: 192.168.240.202\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\squid\compose.yml
compose.yml
YAML
542
0.8
0
0.15
vue-tools
829
2024-04-25T17:43:32.544606
MIT
false
b074c96a9ad8197531126a2e5ee1aebc
---\nservices:\n traefik:\n volumes:\n - '/var/run/docker.sock:/var/run/docker.sock'\n - './example/compose/traefik/config:/config'\n - './common/pki:/pki'\n labels:\n traefik.enable: 'true'\n traefik.http.routers.api.rule: 'Host(`traefik.example.com`)'\n traefik.http.routers.api.entrypoints: 'https'\n traefik.http.routers.api.service: 'api@internal'\n traefik.http.routers.api.tls: 'true'\n traefik.http.middlewares.authelia.forwardauth.address: 'https://authelia-backend:9091${PathPrefix}/api/authz/forward-auth' # yamllint disable-line rule:line-length\n traefik.http.middlewares.authelia.forwardauth.tls.insecureSkipVerify: 'true'\n traefik.http.middlewares.authelia.forwardauth.trustForwardHeader: 'true'\n traefik.http.middlewares.authelia.forwardauth.authResponseHeaders: 'Authorization,Proxy-Authorization,Remote-User,Remote-Groups,Remote-Email,Remote-Name' # yamllint disable-line rule:line-length\n command:\n - '--configFile=/config/static.yml'\n networks:\n authelianet:\n aliases:\n - login.example.com\n ipv4_address: 192.168.240.100\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\compose.yml
compose.yml
YAML
1,139
0.8
0
0
python-kit
226
2025-03-21T13:45:04.843010
MIT
false
2c9e5d3d214713a9fb25242e77dfa4f6
---\n# yaml-language-server: $schema=v\napi:\n dashboard: true\n debug: false\n insecure: false\n\nlog:\n level: DEBUG\n\naccessLog: {}\n\npilot:\n dashboard: false\n\nglobal:\n sendAnonymousUsage: false\n checkNewVersion: false\n\nentryPoints:\n https:\n address: ":8080/tcp"\n\nserversTransport:\n insecureSkipVerify: true\n\nproviders:\n docker:\n exposedByDefault: false\n file:\n directory: /config/dynamic/\n watch: true\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\config\static.yml
static.yml
YAML
423
0.8
0
0.038462
python-kit
164
2023-10-20T08:09:07.376749
GPL-3.0
false
f5892612b922050aee398507d39091a8
---\n# yaml-language-server: $schema=https://json.schemastore.org/traefik-v2-file-provider.json\ntls:\n stores:\n default:\n defaultCertificate:\n certFile: /pki/public.crt\n keyFile: /pki/private.pem\n certificates:\n - certFile: /pki/public.crt\n keyFile: /pki/private.pem\n stores:\n - default\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\compose\traefik\config\dynamic\tls.yml
tls.yml
YAML
333
0.8
0
0.071429
vue-tools
232
2024-07-15T17:29:41.290787
MIT
false
e925a72ecc81e749d8a4374337fcc9b6
# Kubernetes Dashboard\n---\napiVersion: v1\nkind: Namespace\nmetadata:\n name: kubernetes-dashboard\n...\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\nkind: Service\napiVersion: v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nspec:\n ports:\n - port: 443\n targetPort: 8443\n selector:\n k8s-app: kubernetes-dashboard\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-certs\n namespace: kubernetes-dashboard\ntype: Opaque\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-csrf\n namespace: kubernetes-dashboard\ntype: Opaque\ndata:\n csrf: ""\n...\n---\napiVersion: v1\nkind: Secret\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-key-holder\n namespace: kubernetes-dashboard\ntype: Opaque\n...\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard-settings\n namespace: kubernetes-dashboard\n...\n---\nkind: Role\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nrules:\n # Allow Dashboard to get, update and delete Dashboard exclusive secrets.\n - apiGroups: [""]\n resources: ["secrets"]\n resourceNames: ["kubernetes-dashboard-key-holder", "kubernetes-dashboard-certs", "kubernetes-dashboard-csrf"]\n verbs: ["get", "update", "delete"]\n # Allow Dashboard to get and update 'kubernetes-dashboard-settings' config map.\n - apiGroups: [""]\n resources: ["configmaps"]\n resourceNames: ["kubernetes-dashboard-settings"]\n verbs: ["get", "update"]\n # Allow Dashboard to get metrics.\n - apiGroups: [""]\n resources: ["services"]\n resourceNames: ["heapster", "dashboard-metrics-scraper"]\n verbs: ["proxy"]\n - apiGroups: [""]\n resources: ["services/proxy"]\n resourceNames: ["heapster", "http:heapster:", "https:heapster:", "dashboard-metrics-scraper", "http:dashboard-metrics-scraper"] # yamllint disable-line rule:line-length\n verbs: ["get"]\n...\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\nrules:\n # Allow Metrics Scraper to get metrics from the Metrics server\n - apiGroups: ["metrics.k8s.io"]\n resources: ["pods", "nodes"]\n verbs: ["get", "list", "watch"]\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: kubernetes-dashboard\nsubjects:\n - kind: ServiceAccount\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kubernetes-dashboard\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kubernetes-dashboard\nsubjects:\n - kind: ServiceAccount\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\n...\n---\nkind: Deployment\napiVersion: apps/v1\nmetadata:\n labels:\n k8s-app: kubernetes-dashboard\n name: kubernetes-dashboard\n namespace: kubernetes-dashboard\nspec:\n replicas: 1\n revisionHistoryLimit: 10\n selector:\n matchLabels:\n k8s-app: kubernetes-dashboard\n template:\n metadata:\n labels:\n k8s-app: kubernetes-dashboard\n spec:\n securityContext:\n seccompProfile:\n type: RuntimeDefault\n containers:\n - name: kubernetes-dashboard\n image: kubernetesui/dashboard:v2.7.0\n imagePullPolicy: Always\n ports:\n - containerPort: 8443\n protocol: TCP\n args:\n - --auto-generate-certificates\n - --namespace=kubernetes-dashboard\n # Uncomment the following line to manually specify Kubernetes API server Host\n # If not specified, Dashboard will attempt to auto discover the API server and connect\n # to it. Uncomment only if the default does not work.\n # - --apiserver-host=http://my-address:port\n volumeMounts:\n - name: kubernetes-dashboard-certs\n mountPath: /certs\n # Create on-disk volume to store exec logs\n - mountPath: /tmp\n name: tmp-volume\n livenessProbe:\n httpGet:\n scheme: HTTPS\n path: /\n port: 8443\n initialDelaySeconds: 30\n timeoutSeconds: 30\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n runAsUser: 1001\n runAsGroup: 2001\n volumes:\n - name: kubernetes-dashboard-certs\n secret:\n secretName: kubernetes-dashboard-certs\n - name: tmp-volume\n emptyDir: {}\n serviceAccountName: kubernetes-dashboard\n nodeSelector:\n "kubernetes.io/os": linux\n # Comment the following tolerations if Dashboard must not be deployed on master\n tolerations:\n - key: node-role.kubernetes.io/master\n effect: NoSchedule\n...\n---\nkind: Service\napiVersion: v1\nmetadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n name: dashboard-metrics-scraper\n namespace: kubernetes-dashboard\nspec:\n ports:\n - port: 8000\n targetPort: 8000\n selector:\n k8s-app: dashboard-metrics-scraper\n...\n---\nkind: Deployment\napiVersion: apps/v1\nmetadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n name: dashboard-metrics-scraper\n namespace: kubernetes-dashboard\nspec:\n replicas: 1\n revisionHistoryLimit: 10\n selector:\n matchLabels:\n k8s-app: dashboard-metrics-scraper\n template:\n metadata:\n labels:\n k8s-app: dashboard-metrics-scraper\n spec:\n securityContext:\n seccompProfile:\n type: RuntimeDefault\n containers:\n - name: dashboard-metrics-scraper\n image: kubernetesui/metrics-scraper:v1.0.9\n ports:\n - containerPort: 8000\n protocol: TCP\n livenessProbe:\n httpGet:\n scheme: HTTP\n path: /\n port: 8000\n initialDelaySeconds: 30\n timeoutSeconds: 30\n volumeMounts:\n - mountPath: /tmp\n name: tmp-volume\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n runAsUser: 1001\n runAsGroup: 2001\n serviceAccountName: kubernetes-dashboard\n nodeSelector:\n "kubernetes.io/os": linux\n # Comment the following tolerations if Dashboard must not be deployed on master\n tolerations:\n - key: node-role.kubernetes.io/master\n effect: NoSchedule\n volumes:\n - name: tmp-volume\n emptyDir: {}\n...\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: admin-user\n namespace: kubernetes-dashboard\n...\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: admin-user\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cluster-admin\nsubjects:\n - kind: ServiceAccount\n name: admin-user\n namespace: kubernetes-dashboard\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: IngressRouteTCP\nmetadata:\n name: kubernetes-dashboard-ingress\n namespace: kubernetes-dashboard\nspec:\n entryPoints:\n - websecure\n routes:\n - match: HostSNI(`kubernetes.example.com`)\n services:\n - name: kubernetes-dashboard\n port: 443\n tls:\n passthrough: true\n...\n# Traefik Dashboard\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: IngressRoute\nmetadata:\n name: traefik-dashboard-ingress\n namespace: authelia\nspec:\n entryPoints:\n - websecure\n routes:\n - match: Host(`traefik.example.com`)\n kind: Rule\n services:\n - name: api@internal\n kind: TraefikService\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: ServersTransport\nmetadata:\n name: skipverify\n namespace: authelia\nspec:\n insecureSkipVerify: true\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\dashboards.yml
dashboards.yml
YAML
8,366
0.8
0.008671
0.037572
node-utils
577
2025-05-04T20:45:11.157765
Apache-2.0
false
99aa5a46a7303d235bd6d37d4781e9f4
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: nginx-backend\n namespace: authelia\n labels:\n app: nginx-backend\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: nginx-backend\n template:\n metadata:\n labels:\n app: nginx-backend\n spec:\n containers:\n - name: nginx-backend\n image: nginx:alpine\n ports:\n - containerPort: 80\n volumeMounts:\n - name: nginx-config\n mountPath: /etc/nginx/nginx.conf\n - name: nginx-html\n mountPath: /usr/share/nginx/html\n volumes:\n - name: nginx-config\n hostPath:\n path: /configmaps/nginx-backend/nginx.conf\n type: File\n - name: nginx-html\n hostPath:\n path: /configmaps/nginx-backend/html\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: nginx-backend-service\n namespace: authelia\n labels:\n app: nginx-backend\nspec:\n selector:\n app: nginx-backend\n ports:\n - port: 80\n name: http\n - port: 443\n name: https\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: nginx-backend-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\n traefik.ingress.kubernetes.io/router.middlewares: authelia-forwardauth-authelia@kubernetescrd\nspec:\n rules:\n - host: home.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: public.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: admin.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: deny.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: dev.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: mx1.mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: mx2.mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n - host: singlefactor.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: nginx-backend-service\n port:\n number: 80\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\apps\nginx.yml
nginx.yml
YAML
3,426
0.7
0.006757
0
node-utils
670
2024-07-21T04:13:38.940547
MIT
false
85a603a94b93c90395c95a5278a654e6
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: authelia\n namespace: authelia\n labels:\n app: authelia\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: authelia\n template:\n metadata:\n labels:\n app: authelia\n spec:\n containers:\n - name: authelia\n image: authelia:dist\n ports:\n - containerPort: 443\n readinessProbe:\n httpGet:\n scheme: HTTPS\n path: /api/health\n port: 443\n initialDelaySeconds: 3\n periodSeconds: 3\n volumeMounts:\n - name: authelia-config\n mountPath: /config/configuration.yml\n readOnly: true\n - name: authelia-ssl\n mountPath: /pki\n readOnly: true\n - name: authelia-ssl-public\n mountPath: /certs/public.crt\n readOnly: true\n - name: authelia-coverage\n mountPath: /authelia/coverage\n - name: secrets\n mountPath: /config/secrets\n readOnly: true\n env:\n # We set secrets directly here for ease of deployment but all secrets\n # should be stored in the Kube Vault in production.\n - name: AUTHELIA_JWT_SECRET_FILE\n value: /config/secrets/jwt_secret\n - name: AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE\n value: /config/secrets/ldap_password\n - name: AUTHELIA_SESSION_SECRET_FILE\n value: /config/secrets/session\n - name: AUTHELIA_STORAGE_MYSQL_PASSWORD_FILE\n value: /config/secrets/sql_password\n - name: AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE\n value: /config/secrets/encryption_key\n - name: ENVIRONMENT\n value: dev\n volumes:\n - name: authelia-config\n hostPath:\n path: /configmaps/authelia/configuration.yml\n type: File\n - name: authelia-ssl\n hostPath:\n path: /configmaps/authelia/ssl\n type: Directory\n - name: authelia-ssl-public\n hostPath:\n path: /configmaps/authelia/ssl/public.crt\n type: File\n - name: authelia-coverage\n hostPath:\n path: /coverage\n type: Directory\n - name: secrets\n secret:\n secretName: authelia\n items:\n - key: jwt_secret\n path: jwt_secret\n - key: session\n path: session\n - key: sql_password\n path: sql_password\n - key: ldap_password\n path: ldap_password\n - key: encryption_key\n path: encryption_key\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: authelia-service\n namespace: authelia\n annotations:\n traefik.ingress.kubernetes.io/service.serverstransport: authelia-skipverify@kubernetescrd\nspec:\n selector:\n app: authelia\n ports:\n - protocol: TCP\n port: 443\n targetPort: 443\n...\n---\napiVersion: v1\nkind: Secret\ntype: Opaque\nmetadata:\n name: authelia\n namespace: authelia\n labels:\n app: authelia\ndata:\n jwt_secret: YW5fdW5zZWN1cmVfc2VjcmV0 # an_unsecure_secret\n ldap_password: cGFzc3dvcmQ= # password\n session: dW5zZWN1cmVfcGFzc3dvcmQ= # unsecure_password\n sql_password: cGFzc3dvcmQ= # password\n encryption_key: YV9ub3Rfc29fc2VjdXJlX2VuY3J5cHRpb25fa2V5\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: authelia-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\nspec:\n rules:\n - host: login.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: authelia-service\n port:\n number: 443\n...\n---\napiVersion: traefik.containo.us/v1alpha1\nkind: Middleware\nmetadata:\n name: forwardauth-authelia\n namespace: authelia\n labels:\n app.kubernetes.io/instance: authelia\n app.kubernetes.io/name: authelia\nspec:\n forwardAuth:\n address: 'https://authelia-service.authelia.svc.cluster.local/api/authz/forward-auth'\n trustForwardHeader: true\n authResponseHeaders:\n - 'Authorization'\n - 'Proxy-Authorization'\n - 'Remote-User'\n - 'Remote-Groups'\n - 'Remote-Email'\n - 'Remote-Name'\n tls:\n insecureSkipVerify: true\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\authelia\authelia.yml
authelia.yml
YAML
4,541
0.8
0.011834
0.011834
python-kit
777
2024-11-16T15:04:52.871929
GPL-3.0
false
b97de200c3eea240f4420e2c9672ee7b
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:443'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n mysql:\n address: 'tcp://mariadb-service:3306'\n database: 'authelia'\n username: 'admin'\n\nnotifier:\n smtp:\n address: 'smtp://mailpit-service:1025'\n username: 'authelia'\n password: 'mailer'\n sender: 'admin@example.com'\n tls:\n server_name: 'mail.example.com'\n\nregulation:\n max_retries: 3\n find_time: '2 minutes'\n ban_time: '5 minutes'\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis-service'\n port: 6379\n\nauthentication_backend:\n ldap:\n address: 'ldaps://ldap-service'\n tls:\n skip_verify: true\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&({username_attribute}={input})(objectClass=person))'\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=admin,dc=example,dc=com'\n attributes:\n distinguished_name: ''\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: example.com\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\authelia\configs\configuration.yml
configuration.yml
YAML
2,455
0.95
0
0
awesome-app
251
2025-02-16T16:33:15.461101
MIT
false
2bc116a6b387c7e5cbd15fc3a8adca8b
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: ldap\n namespace: authelia\n labels:\n app: ldap\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: ldap\n template:\n metadata:\n labels:\n app: ldap\n spec:\n containers:\n - name: ldap\n image: osixia/openldap:1.5.0\n ports:\n - containerPort: 389\n - containerPort: 636\n args: ["--copy-service", "--loglevel", "debug"]\n env:\n - name: LDAP_ORGANISATION\n value: MyCompany\n - name: LDAP_DOMAIN\n value: example.com\n - name: LDAP_ADMIN_PASSWORD\n value: password\n - name: LDAP_CONFIG_PASSWORD\n value: password\n - name: LDAP_ADDITIONAL_MODULES\n value: memberof\n - name: LDAP_ADDITIONAL_SCHEMAS\n value: openldap\n - name: LDAP_FORCE_RECONFIGURE\n value: "true"\n - name: LDAP_TLS_VERIFY_CLIENT\n value: try\n volumeMounts:\n - name: ldap-config\n mountPath: /container/service/slapd/assets/config/bootstrap/ldif/custom\n volumes:\n - name: ldap-config\n hostPath:\n path: /configmaps/ldap\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: ldap-service\n namespace: authelia\nspec:\n selector:\n app: ldap\n ports:\n - protocol: TCP\n port: 636\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\ldap\ldap.yml
ldap.yml
YAML
1,478
0.7
0.015625
0
node-utils
800
2025-04-04T12:21:52.592147
GPL-3.0
false
3b84666e861f9dd6d087e05ff6ea50a0
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: mailpit\n namespace: authelia\n labels:\n app: mailpit\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: mailpit\n template:\n metadata:\n labels:\n app: mailpit\n spec:\n containers:\n - name: mailpit\n image: axllent/mailpit\n ports:\n - containerPort: 1025\n - containerPort: 8025\n volumeMounts:\n - name: authelia-ssl\n mountPath: /pki\n readOnly: true\n env:\n - name: MP_SMTP_TLS_CERT\n value: /pki/public.crt\n - name: MP_SMTP_TLS_KEY\n value: /pki/private.pem\n - name: MP_SMTP_AUTH\n value: authelia:mailer\n volumes:\n - name: authelia-ssl\n hostPath:\n path: /configmaps/authelia/ssl\n type: Directory\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: mailpit-service\n namespace: authelia\nspec:\n selector:\n app: mailpit\n ports:\n - protocol: TCP\n port: 8025\n name: ui\n - protocol: TCP\n port: 1025\n name: smtp\n...\n---\napiVersion: networking.k8s.io/v1\nkind: Ingress\nmetadata:\n name: mailpit-ingress\n namespace: authelia\n annotations:\n kubernetes.io/ingress.class: traefik\n traefik.ingress.kubernetes.io/router.entrypoints: websecure\nspec:\n rules:\n - host: mail.example.com\n http:\n paths:\n - path: /\n pathType: Prefix\n backend:\n service:\n name: mailpit-service\n port:\n number: 8025\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\mail\mail.yml
mail.yml
YAML
1,632
0.7
0.0125
0
python-kit
245
2024-04-05T19:28:15.620966
Apache-2.0
false
cce1c97873441802f3858d3a121e6248
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: mariadb\n namespace: authelia\n labels:\n app: mariadb\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: mariadb\n template:\n metadata:\n labels:\n app: mariadb\n spec:\n containers:\n - name: mariadb\n image: mariadb:11.7.2\n ports:\n - containerPort: 3306\n readinessProbe:\n tcpSocket:\n port: 3306\n periodSeconds: 1\n env:\n - name: MYSQL_ROOT_PASSWORD\n value: rootpassword\n - name: MYSQL_USER\n value: admin\n - name: MYSQL_PASSWORD\n value: password\n - name: MYSQL_DATABASE\n value: authelia\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: mariadb-service\n namespace: authelia\nspec:\n selector:\n app: mariadb\n ports:\n - protocol: TCP\n port: 3306\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\storage\mariadb.yml
mariadb.yml
YAML
938
0.7
0
0
vue-tools
150
2023-12-12T17:57:53.953468
MIT
false
889e52746a2a3bb87a17277c2a5808ad
---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: redis\n namespace: authelia\n labels:\n app: redis\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: redis\n template:\n metadata:\n labels:\n app: redis\n spec:\n containers:\n - name: redis\n image: redis:7.4-alpine\n ports:\n - containerPort: 6379\n readinessProbe:\n tcpSocket:\n port: 6379\n periodSeconds: 1\n...\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: redis-service\n namespace: authelia\nspec:\n selector:\n app: redis\n ports:\n - protocol: TCP\n port: 6379\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\example\kube\storage\redis.yml
redis.yml
YAML
649
0.7
0
0
node-utils
441
2023-07-20T18:27:13.188997
GPL-3.0
false
10318bd0c8f955ad04ed7cc6e2e4bd14
---\nservices:\n authelia-backend:\n volumes:\n - './HAProxy/configuration.yml:/config/configuration.yml'\n - './HAProxy/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\compose.yml
compose.yml
YAML
243
0.7
0
0
node-utils
55
2024-12-09T11:06:32.761759
BSD-3-Clause
false
564993b3905b157007e01602b9cb2a01
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\configuration.yml
configuration.yml
YAML
1,766
0.95
0
0
react-lib
129
2025-05-31T16:27:49.591656
GPL-3.0
false
668cda09f197ec5703c5e9668f45d0ce
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\HAProxy\users.yml
users.yml
YAML
1,103
0.8
0
0
vue-tools
698
2024-07-25T11:59:26.283609
GPL-3.0
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './HighAvailability/configuration.yml:/config/configuration.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\HighAvailability\compose.yml
compose.yml
YAML
204
0.7
0
0
vue-tools
388
2025-06-06T06:29:35.664368
GPL-3.0
false
8461927295a21ab079871d78de3e37b9
---\ncertificates_directory: '/certs/'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mariadb:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n username: 'authelia'\n password: 'redis-user-password'\n high_availability:\n sentinel_name: 'authelia'\n sentinel_password: 'sentinel-server-password'\n nodes:\n - host: 'redis-sentinel-0'\n port: 26379\n - host: 'redis-sentinel-1'\n port: 26379\n - host: 'redis-sentinel-2'\n port: 26379\n\nauthentication_backend:\n ldap:\n address: 'ldap://openldap'\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&({username_attribute}={input})(objectClass=person))'\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=admin,dc=example,dc=com'\n password: 'password'\n attributes:\n distinguished_name: 'distinguishedName'\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: 'authelia.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'mx2.mail.example.com'\n subject: 'group:admins'\n policy: 'deny'\n - domain: '*.example.com'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/groups/dev/.*$'\n subject: 'group:dev'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\HighAvailability\configuration.yml
configuration.yml
YAML
3,488
0.95
0
0
vue-tools
44
2023-07-20T17:06:32.707170
Apache-2.0
false
e0a878243ff6a776018e185f11d686ac
---\nservices:\n authelia-backend:\n volumes:\n - './LDAP/configuration.yml:/config/configuration.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\LDAP\compose.yml
compose.yml
YAML
192
0.7
0
0
python-kit
876
2023-11-13T23:33:06.686681
GPL-3.0
false
3966059cfd40260b498e0766fbc58bf1
---\ncertificates_directory: '/certs/'\ntheme: 'dark'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n ldap:\n address: 'ldaps://openldap'\n pooling:\n enable: true\n count: 4\n retries: 3\n timeout: 10s\n tls:\n skip_verify: true\n base_dn: 'dc=example,dc=com'\n additional_users_dn: 'ou=users'\n users_filter: '(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person)(objectClass=inetOrgPerson))' # yamllint disable-line rule:line-length\n additional_groups_dn: 'ou=groups'\n groups_filter: '(&(member={dn})(objectClass=groupOfNames))'\n user: 'cn=pwmanager,dc=example,dc=com'\n password: 'password'\n attributes:\n distinguished_name: ''\n username: 'uid'\n display_name: 'displayName'\n mail: 'mail'\n member_of: 'memberOf'\n group_name: 'cn'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\LDAP\configuration.yml
configuration.yml
YAML
3,095
0.95
0
0
node-utils
151
2024-05-12T12:08:38.664558
GPL-3.0
false
748d03243f2938dc81f6fb2b413e47ab
---\nservices:\n authelia-backend:\n volumes:\n - './MariaDB/configuration.yml:/config/configuration.yml'\n - './MariaDB/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\compose.yml
compose.yml
YAML
243
0.7
0
0
awesome-app
866
2025-03-12T19:14:52.887592
MIT
false
8fd2c15f9eed0edc0558c7a84addfa80
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mariadb:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\configuration.yml
configuration.yml
YAML
2,008
0.95
0
0
node-utils
239
2024-12-04T03:58:21.472164
GPL-3.0
false
3e34c4542875119d85a0d122f0064141
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MariaDB\users.yml
users.yml
YAML
1,103
0.8
0
0
vue-tools
521
2025-02-11T19:02:37.351726
MIT
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './MultiCookieDomain/configuration.yml:/config/configuration.yml'\n - './MultiCookieDomain/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\compose.yml
compose.yml
YAML
263
0.7
0
0
vue-tools
84
2023-09-25T08:01:15.921947
Apache-2.0
false
b6492a156b095b9f90e0a830edf053f7
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: 3s\n disable_startup_check: false\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n elevated_session:\n code_lifespan: '5 minutes'\n elevation_lifespan: '10 minutes'\n characters: 8\n require_second_factor: true\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n secret: 'unsecure_session_secret'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n cookies:\n - name: 'authelia_session'\n domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n - name: 'example2_session'\n domain: 'example2.com'\n authelia_url: 'https://login.example2.com:8080'\n remember_me: -1\n - name: 'authelia_session'\n domain: 'example3.com'\n authelia_url: 'https://login.example3.com:8080'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n allowed_algorithms:\n - 'SHA1'\n - 'SHA256'\n - 'SHA512'\n allowed_digits:\n - 6\n - 8\n allowed_periods:\n - 30\n - 60\n - 90\n - 120\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'singlefactor.example2.com'\n policy: 'one_factor'\n - domain: 'public.example2.com'\n policy: 'bypass'\n - domain: 'secure.example2.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example2.com'\n policy: 'two_factor'\n - domain: '*.example2.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example2.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example2.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'singlefactor.example3.com'\n policy: 'one_factor'\n - domain: 'public.example3.com'\n policy: 'bypass'\n - domain: 'secure.example3.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'secure.example3.com'\n policy: 'two_factor'\n - domain: '*.example3.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example3.com'\n subject: 'user:bob'\n policy: 'two_factor'\n - domain: 'dev.example3.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\configuration.yml
configuration.yml
YAML
5,094
0.95
0
0
vue-tools
500
2024-05-28T16:53:16.438227
BSD-3-Clause
false
2ef444db230fbe2fabc88aa5f0845796
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MultiCookieDomain\users.yml
users.yml
YAML
1,103
0.8
0
0
awesome-app
782
2023-11-18T15:05:33.419469
BSD-3-Clause
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './MySQL/configuration.yml:/config/configuration.yml'\n - './MySQL/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\compose.yml
compose.yml
YAML
239
0.7
0
0
python-kit
442
2025-06-17T10:00:43.698638
GPL-3.0
false
2ece3c1b8bf808e718633f151d871d01
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n mysql:\n address: 'tcp://mysql:3306'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '8 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\configuration.yml
configuration.yml
YAML
2,008
0.95
0
0
python-kit
96
2025-02-02T10:10:55.160168
Apache-2.0
false
21feaeddb7cd56b6533a55faf4fe8a56
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\MySQL\users.yml
users.yml
YAML
1,103
0.8
0
0
node-utils
275
2024-02-03T10:51:34.298982
GPL-3.0
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './NetworkACL/configuration.yml:/config/configuration.yml'\n - './NetworkACL/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\compose.yml
compose.yml
YAML
249
0.7
0
0
python-kit
801
2023-12-11T19:17:43.706506
BSD-3-Clause
false
b959957c4f456e716d361cc0a97a0ff3
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n networks:\n - name: 'Clients'\n networks:\n - '192.168.240.202/32'\n - '192.168.240.203/32'\n rules:\n - domain: 'secure.example.com'\n policy: 'one_factor'\n networks:\n - '192.168.240.201/32'\n - domain: 'secure.example.com'\n policy: 'bypass'\n networks:\n - 'Clients'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\configuration.yml
configuration.yml
YAML
1,898
0.95
0
0
node-utils
936
2024-12-13T21:17:27.854171
Apache-2.0
false
cbddf8cb8294da14cfba86435ca28225
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\NetworkACL\users.yml
users.yml
YAML
1,103
0.8
0
0
node-utils
818
2024-11-01T13:29:04.212273
BSD-3-Clause
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n environment:\n X_AUTHELIA_CONFIG_FILTERS: 'template'\n volumes:\n - './OIDC/configuration.yml:/config/configuration.yml'\n - './OIDC/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\compose.yml
compose.yml
YAML
298
0.7
0
0
awesome-app
368
2024-10-25T21:33:37.129838
Apache-2.0
false
47494f25139aebf2372cca7ea3465c07
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'unsecure_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_providers:\n oidc:\n enable_client_debug_messages: true\n hmac_secret: 'IVPWBkAdJHje3uz7LtFTDU2pFUfh39Xm'\n jwks:\n - key: {{ secret "/pki/private.oidc.pem" | mindent 10 "|" | msquote }}\n certificate_chain: {{ secret "/pki/public.oidc.chain.pem" | mindent 10 "|" | msquote }}\n clients:\n - client_id: 'oidc-tester-app'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'two_factor'\n redirect_uris:\n - 'https://oidc.example.com:8080/oauth2/callback'\n - client_id: 'oidc-tester-app-public'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'one_factor'\n redirect_uris:\n - 'https://oidc-public.example.com:8080/oauth2/callback'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'oidc.example.com'\n policy: 'two_factor'\n - domain: 'oidc-public.example.com'\n policy: 'bypass'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\configuration.yml
configuration.yml
YAML
2,957
0.95
0
0
react-lib
166
2024-09-21T16:45:34.103674
Apache-2.0
false
cdea03cb30093cc083c90b4063674569
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDC\users.yml
users.yml
YAML
1,103
0.8
0
0
node-utils
181
2025-03-15T15:24:26.914598
BSD-3-Clause
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n environment:\n X_AUTHELIA_CONFIG_FILTERS: 'template'\n volumes:\n - './OIDCTraefik/configuration.yml:/config/configuration.yml'\n - './OIDCTraefik/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\compose.yml
compose.yml
YAML
312
0.7
0
0
awesome-app
105
2024-07-01T15:53:18.392975
BSD-3-Clause
false
890658e3fd0f84a235f71ab6850e4d53
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'unsecure_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_providers:\n oidc:\n enable_client_debug_messages: true\n hmac_secret: 'IVPWBkAdJHje3uz7LtFTDU2pFUfh39Xm'\n jwks:\n - key: {{ secret "/pki/private.oidc.pem" | mindent 10 "|" | msquote }}\n certificate_chain: {{ secret "/pki/public.oidc.chain.pem" | mindent 10 "|" | msquote }}\n clients:\n - client_id: 'oidc-tester-app'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'two_factor'\n redirect_uris:\n - 'https://oidc.example.com:8080/oauth2/callback'\n - client_id: 'oidc-tester-app-public'\n client_secret: '$pbkdf2-sha512$310000$EniFUo2z8Yjw3op3lrtuyA$xhopyOyffx2TqsQvEhoMSo1sxywIvJV8HZw/zdf62xtyryY/nkNkdcUV82r.xtd5NuyvZo7DPkOlcffM/Wvsmw' # yamllint disable-line rule:line-length\n authorization_policy: 'one_factor'\n redirect_uris:\n - 'https://oidc-public.example.com:8080/oauth2/callback'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'oidc.example.com'\n policy: 'two_factor'\n - domain: 'oidc-public.example.com'\n policy: 'bypass'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\configuration.yml
configuration.yml
YAML
2,957
0.95
0
0
react-lib
311
2024-06-06T11:53:09.358106
GPL-3.0
false
cdea03cb30093cc083c90b4063674569
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OIDCTraefik\users.yml
users.yml
YAML
1,103
0.8
0
0
vue-tools
997
2024-10-14T12:58:16.775942
MIT
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './OneFactorOnly/configuration.yml:/config/configuration.yml'\n - './OneFactorOnly/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\compose.yml
compose.yml
YAML
255
0.7
0
0
vue-tools
0
2024-08-14T07:11:48.077546
MIT
false
47006a058aef66bb2b3ede56b92ec737
---\ncertificates_directory: '/certs/'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n filesystem:\n filename: '/config/notifier.html'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: 'public.example.com'\n policy: 'bypass'\n - domain: 'home.example.com'\n policy: 'bypass'\n - domain: 'unsafe.local'\n policy: 'bypass'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\configuration.yml
configuration.yml
YAML
1,707
0.95
0
0
react-lib
185
2024-10-02T18:57:38.881946
MIT
false
09f3c3edf8b94b28ae6075c3daf33921
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\OneFactorOnly\users.yml
users.yml
YAML
1,103
0.8
0
0
awesome-app
584
2024-09-23T21:32:52.510923
MIT
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './PathPrefix/configuration.yml:/config/configuration.yml'\n - './PathPrefix/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\compose.yml
compose.yml
YAML
249
0.7
0
0
vue-tools
242
2024-04-12T05:34:55.897876
Apache-2.0
false
98d662a602f5d5616f1f9580c6be9780
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091/auth'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080/auth/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\configuration.yml
configuration.yml
YAML
2,223
0.95
0
0
vue-tools
405
2025-06-18T21:27:41.109970
MIT
false
bcda819bbb674976d61ac144fde6c40c
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\PathPrefix\users.yml
users.yml
YAML
1,103
0.8
0
0
vue-tools
383
2025-01-07T19:11:09.492287
BSD-3-Clause
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './Postgres/configuration.yml:/config/configuration.yml'\n - './Postgres/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\compose.yml
compose.yml
YAML
245
0.7
0
0
node-utils
930
2024-08-26T13:21:20.099745
BSD-3-Clause
false
4a0dad3f760a64ff2338ca45dfd46438
---\ncertificates_directory: /certs/\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: /pki/public.backend.crt\n key: /pki/private.backend.pem\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n postgres:\n address: 'tcp://postgres:5432'\n database: 'authelia'\n username: 'admin'\n password: 'password'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\configuration.yml
configuration.yml
YAML
2,008
0.95
0
0
awesome-app
227
2023-07-17T10:40:58.039167
MIT
false
bbb3382165ba5367d2d0f47d3e493132
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Postgres\users.yml
users.yml
YAML
1,103
0.8
0
0
python-kit
797
2024-03-28T19:25:13.886888
GPL-3.0
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './ShortTimeouts/configuration.yml:/config/configuration.yml'\n - './ShortTimeouts/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\compose.yml
compose.yml
YAML
255
0.7
0
0
python-kit
569
2024-01-14T11:03:31.568972
GPL-3.0
false
3e5510a9976ef4c97d8fcc24682e322c
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 seconds'\n ban_time: '10 seconds'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - name: 'authelia_sessin'\n domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n default_redirection_url: 'https://home.example.com:8080/'\n expiration: '10 seconds'\n inactivity: '7 seconds'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n - domain: '*.example.com'\n subject: 'group:admins'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/john/.*$'\n subject: 'user:john'\n policy: 'two_factor'\n - domain: 'dev.example.com'\n resources:\n - '^/users/harry/.*$'\n subject: 'user:harry'\n policy: 'two_factor'\n - domain: '*.mail.example.com'\n subject: 'user:bob'\n policy: 'two_factor'\n\n - domain: 'dev.example.com'\n resources:\n - '^/users/bob/.*$'\n subject: 'user:bob'\n policy: 'two_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\configuration.yml
configuration.yml
YAML
2,283
0.95
0
0
vue-tools
780
2025-04-18T22:57:16.797418
Apache-2.0
false
5d8d569846daea96369d18b43da39f0a
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\ShortTimeouts\users.yml
users.yml
YAML
1,103
0.8
0
0
vue-tools
312
2024-03-04T17:00:01.138662
BSD-3-Clause
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n environment:\n AUTHELIA_JWT_SECRET_FILE: '/tmp/authelia/StandaloneSuite/jwt'\n AUTHELIA_SESSION_SECRET_FILE: '/tmp/authelia/StandaloneSuite/session'\n volumes:\n - './Standalone/configuration.yml:/config/configuration.yml'\n - './Standalone/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n - '/tmp:/tmp'\n - './Standalone/locales:/config/locales'\n user: '${USER_ID}:${GROUP_ID}'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\compose.yml
compose.yml
YAML
512
0.7
0
0
awesome-app
638
2024-01-08T00:05:17.901487
GPL-3.0
false
275c97c0fcf09243410f4ca59e9e4e3f
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n session_elevation_start:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n session_elevation_finish:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://0.0.0.0:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/tmp/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: '3 seconds'\n disable_startup_check: false\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\configuration.yml
configuration.yml
YAML
2,836
0.95
0
0
react-lib
629
2024-04-01T13:28:36.592679
GPL-3.0
false
1e6e4ef24455aa7f821783bbed477e1b
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Standalone\users.yml
users.yml
YAML
1,103
0.8
0
0
react-lib
716
2024-08-03T06:34:27.215487
GPL-3.0
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './Traefik/configuration.yml:/config/configuration.yml'\n - './Traefik/users.yml:/config/users.yml'\n - './Traefik/favicon.ico:/config/assets/favicon.ico'\n - './Traefik/logo.png:/config/assets/logo.png'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\compose.yml
compose.yml
YAML
355
0.7
0
0
node-utils
340
2025-05-18T10:37:12.200324
MIT
false
a4f40272b6603ded3bb2e11ccb290dd8
---\ncertificates_directory: '/certs/'\n\nserver:\n address: 'tcp://:9091'\n asset_path: '/config/assets/'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n authz:\n forward-auth:\n implementation: 'ForwardAuth'\n authn_strategies: []\n rate_limits:\n reset_password_start:\n buckets:\n - period: '2 minutes'\n requests: 20\n reset_password_finish:\n buckets:\n - period: '2 minutes'\n requests: 20\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/config/db.sqlite'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n sender: 'admin@example.com'\n\nntp:\n version: 3\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nsession:\n secret: 'unsecure_session_secret'\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n redis:\n host: 'redis'\n port: 6379\n username: 'authelia'\n password: 'redis-user-password'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n disable_reuse_security_policy: true\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: false\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: deny\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\configuration.yml
configuration.yml
YAML
2,251
0.95
0
0
node-utils
442
2024-02-20T16:41:11.404647
GPL-3.0
false
a56d3d8ed229b281034228272b5161bb
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\Traefik\users.yml
users.yml
YAML
1,103
0.8
0
0
awesome-app
495
2023-07-22T02:34:19.205110
GPL-3.0
false
f776ae223ecd0228e03175588a362930
---\nservices:\n authelia-backend:\n volumes:\n - './TwoFactor/configuration.yml:/config/configuration.yml'\n - './TwoFactor/users.yml:/config/users.yml'\n - './common/pki:/pki'\n - './common/pki/public.crt:/certs/public.crt'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\compose.yml
compose.yml
YAML
247
0.7
0
0
vue-tools
363
2024-12-22T09:09:58.473975
GPL-3.0
false
e25cc71b696ac827c96c25d1b40720c4
---\ncertificates_directory: '/certs/'\ntheme: 'auto'\n\nserver:\n address: 'tcp://:9091'\n tls:\n certificate: '/pki/public.backend.crt'\n key: '/pki/private.backend.pem'\n endpoints:\n rate_limits:\n second_factor_totp:\n buckets:\n - period: '2 minutes'\n requests: 50\n session_elevation_start:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n session_elevation_finish:\n buckets:\n - period: '20 seconds'\n requests: 20\n - period: '30 seconds'\n requests: 30\n\ntelemetry:\n metrics:\n enabled: true\n address: 'tcp://0.0.0.0:9959'\n\nlog:\n level: 'debug'\n\nstorage:\n encryption_key: 'a_not_so_secure_encryption_key'\n local:\n path: '/tmp/db.sqlite3'\n\nnotifier:\n smtp:\n address: 'smtp://mail.example.com:1025'\n username: 'authelia'\n password: 'mailer'\n sender: 'admin@example.com'\n\nntp:\n address: 'udp://time.cloudflare.com:123'\n version: 4\n max_desync: '3s'\n disable_startup_check: false\n\nidentity_validation:\n reset_password:\n jwt_secret: 'a_very_important_secret'\n\nregulation:\n max_retries: 3\n find_time: '5 minutes'\n ban_time: '15 minutes'\n\npassword_policy:\n standard:\n enabled: false\n min_length: 8\n max_length: 0\n require_uppercase: true\n require_lowercase: true\n require_number: true\n require_special: true\n zxcvbn:\n enabled: false\n\nsession:\n cookies:\n - domain: 'example.com'\n authelia_url: 'https://login.example.com:8080'\n expiration: '1 hour'\n inactivity: '5 minutes'\n remember_me: '1 year'\n\nauthentication_backend:\n file:\n path: '/config/users.yml'\n\ntotp:\n issuer: 'example.com'\n disable_reuse_security_policy: true\n allowed_algorithms:\n - 'SHA1'\n - 'SHA256'\n - 'SHA512'\n allowed_digits:\n - 6\n - 8\n allowed_periods:\n - 30\n - 60\n - 90\n - 120\n\nwebauthn:\n disable: false\n enable_passkey_login: true\n display_name: 'Authelia'\n attestation_conveyance_preference: 'indirect'\n timeout: '60 seconds'\n filtering:\n permitted_aaguids: []\n prohibited_aaguids: []\n prohibit_backup_eligibility: false\n selection_criteria:\n attachment: ''\n discoverability: 'required'\n user_verification: 'preferred'\n metadata:\n enabled: true\n validate_trust_anchor: true\n validate_entry: false\n validate_entry_permit_zero_aaguid: true\n validate_status: true\n validate_status_permitted: []\n validate_status_prohibited: []\n\naccess_control:\n default_policy: 'deny'\n rules:\n - domain: ['home.example.com', 'public.example.com']\n policy: 'bypass'\n - domain: 'secure.example.com'\n policy: 'bypass'\n methods:\n - 'OPTIONS'\n - domain: 'deny.example.com'\n policy: 'deny'\n - domain: 'admin.example.com'\n policy: 'two_factor'\n - domain: 'secure.example.com'\n policy: 'two_factor'\n - domain: 'singlefactor.example.com'\n policy: 'one_factor'\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\configuration.yml
configuration.yml
YAML
3,008
0.95
0
0
react-lib
326
2023-11-08T20:09:46.452274
GPL-3.0
false
022e6bc752a368e2334c1721d9f15e72
---\nusers:\n john:\n displayname: "John Doe"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: john.doe@authelia.com\n groups:\n - admins\n - dev\n\n harry:\n displayname: "Harry Potter"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: harry.potter@authelia.com\n groups: []\n\n bob:\n displayname: "Bob Dylan"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: bob.dylan@authelia.com\n groups:\n - dev\n\n james:\n displayname: "James Dean"\n password: "$6$rounds=500000$jgiCMRyGXzoqpxS3$w2pJeZnnH8bwW3zzvoMWtTRfQYsHbWbD/hquuQ5vUeIyl9gdwBIt6RWk2S6afBA0DPakbeWgD/4SZPiS0hYtU/" # yamllint disable-line rule:line-length\n email: james.dean@authelia.com\n...\n
dataset_sample\yaml\authelia_authelia\internal\suites\TwoFactor\users.yml
users.yml
YAML
1,103
0.8
0
0
python-kit
190
2024-06-04T15:52:19.259243
MIT
false
f776ae223ecd0228e03175588a362930
version: "2"\n\nbuild:\n os: "ubuntu-22.04"\n tools:\n python: "3.10"\n\npython:\n install:\n - requirements: docs/requirements.txt\n\nsphinx:\n configuration: docs/source/conf.py
dataset_sample\yaml\AutoMapper_AutoMapper\.readthedocs.yml
.readthedocs.yml
YAML
177
0.85
0
0
react-lib
279
2025-03-24T11:21:16.032186
GPL-3.0
false
7b1f750fb491eecd34b7e19117560333
jobs:\n\n- job: GetPRNumber\n pool:\n vmImage: 'ubuntu-20.04'\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: ./build.sh --target OutputVersion --version-output-dir $(Build.ArtifactStagingDirectory)\n - task: PublishBuildArtifacts@1\n inputs:\n PathtoPublish: '$(Build.ArtifactStagingDirectory)'\n ArtifactName: 'PRNumber'\n publishLocation: 'Container'\n \n- job: Linux\n pool:\n vmImage: 'ubuntu-20.04'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android macos wasm-tools\n\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: |\n dotnet --info\n printenv\n ./build.sh --target CiAzureLinux --configuration=Release\n\n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n \n\n- job: macOS\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n pool:\n vmImage: 'macos-13'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android ios macos wasm-tools\n \n - task: CmdLine@2\n displayName: 'Generate avalonia-native'\n inputs:\n script: |\n export COREHOST_TRACE=0\n export DOTNET_SKIP_FIRST_TIME_EXPERIENCE=1\n export DOTNET_CLI_TELEMETRY_OPTOUT=1\n ./build.sh --target GenerateCppHeaders --configuration Release \n\n - task: Xcode@5\n inputs:\n actions: 'build'\n scheme: ''\n sdk: 'macosx13.0'\n configuration: 'Release'\n xcWorkspacePath: '**/*.xcodeproj/project.xcworkspace'\n xcodeVersion: 'specifyPath' # Options: 8, 9, default, specifyPath\n xcodeDeveloperDir: '/Applications/Xcode_14.1.app/Contents/Developer'\n args: '-derivedDataPath ./'\n\n - task: CmdLine@2\n displayName: 'Run Build'\n inputs:\n script: |\n export COREHOST_TRACE=0\n export DOTNET_SKIP_FIRST_TIME_EXPERIENCE=1\n export DOTNET_CLI_TELEMETRY_OPTOUT=1\n which dotnet\n dotnet --info\n printenv\n ./build.sh --target CiAzureOSX --configuration Release --skip-previewer\n\n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n \n - task: PublishBuildArtifacts@1\n inputs:\n pathToPublish: '$(Build.SourcesDirectory)/Build/Products/Release/'\n artifactName: 'Avalonia.Native.OSX'\n condition: succeeded()\n \n - task: PublishBuildArtifacts@1\n inputs:\n pathtoPublish: '$(Build.SourcesDirectory)/artifacts/nuget'\n artifactName: 'NuGetOSX'\n condition: succeeded()\n\n- job: Windows\n pool:\n vmImage: 'windows-2022'\n variables:\n SolutionDir: '$(Build.SourcesDirectory)'\n steps:\n - task: UseDotNet@2\n displayName: 'Use .NET 6.0 Runtime'\n inputs:\n packageType: runtime\n version: 6.0.x\n\n - task: UseDotNet@2\n displayName: 'Use .NET 8.0 SDK'\n inputs:\n packageType: sdk\n useGlobalJson: true\n\n - task: CmdLine@2\n displayName: 'Install Workloads'\n inputs:\n script: |\n dotnet workload install android ios tvos wasm-tools\n\n - task: CmdLine@2\n displayName: 'Install Nuke'\n inputs:\n script: |\n dotnet tool install --global Nuke.GlobalTool --version 6.2.1 \n\n - task: CmdLine@2\n displayName: 'Run Nuke'\n inputs:\n script: |\n set PATH=%PATH%;%USERPROFILE%\.dotnet\tools\n nuke --target CiAzureWindows --configuration Release\n \n - task: PublishTestResults@2\n inputs:\n testResultsFormat: 'VSTest'\n testResultsFiles: '$(Build.SourcesDirectory)/artifacts/test-results/*.trx'\n condition: not(canceled())\n\n - task: PublishBuildArtifacts@1\n inputs:\n pathtoPublish: '$(Build.SourcesDirectory)/artifacts/nuget'\n artifactName: 'NuGet'\n condition: succeeded()\n\n - task: PublishBuildArtifacts@1\n inputs:\n pathToPublish: '$(Build.SourcesDirectory)/artifacts/zip'\n artifactName: 'Samples'\n condition: succeeded()\n\n
dataset_sample\yaml\AvaloniaUI_Avalonia\azure-pipelines.yml
azure-pipelines.yml
YAML
4,851
0.8
0
0
vue-tools
550
2024-01-27T19:38:39.898424
BSD-3-Clause
false
9784e65edbdd502b8e76b8de46eea744
version: '1.1.0'\ninvalidStatus: "pending"\nlabelRule:\n values:\n - "bug"\n - "feature"\n - "enhancement"\n - "area-infrastructure"\n
dataset_sample\yaml\AvaloniaUI_Avalonia\.github\pr_labels.yml
pr_labels.yml
YAML
139
0.7
0
0
react-lib
800
2024-02-13T02:24:57.147505
MIT
false
909ae5d58114b7333606326f575e1bf9
name: Bug Report\ndescription: File a bug report\nlabels: ["bug"]\nbody:\n - type: textarea\n id: what-happened\n attributes:\n label: Describe the bug\n description: A clear and concise description of what the bug is.\n validations:\n required: true\n - type: textarea\n id: steps\n attributes:\n label: To Reproduce\n description: Steps to reproduce the behavior.\n validations:\n required: true\n - type: textarea\n id: what-expected\n attributes:\n label: Expected behavior\n description: A clear and concise description of what you expected to happen.\n - type: input\n id: avalonia-version\n attributes:\n label: Avalonia version\n description: |\n Let us know which version you have tested. Please make sure to test latest stable version available. \n If you could test [nightly builds](https://github.com/AvaloniaUI/Avalonia/wiki/Using-nightly-build-feed) in addition, this would be of great help. \n placeholder: e.g. 11.2.0, 11.1.0\n validations:\n required: true\n - type: dropdown\n id: os\n attributes:\n label: OS\n multiple: true\n options: \n - Windows\n - macOS\n - Linux\n - WebAssembly\n - Android\n - iOS\n - Tizen\n - type: textarea\n id: additional-info\n attributes:\n label: Additional context\n description: |\n Add any other context about the problem here.\n If applicable, add screenshots to help explain your problem. \n
dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\bug_report.yml
bug_report.yml
YAML
1,523
0.95
0
0
vue-tools
221
2023-12-29T14:51:30.706775
BSD-3-Clause
false
c922ae7e70d73cdbd8f253891c706988
blank_issues_enabled: false\ncontact_links:\n - name: Questions, Discussions, Ideas\n url: https://github.com/AvaloniaUI/Avalonia/discussions/new\n about: Please ask and answer questions here.\n - name: Avalonia Community Support on Telegram\n url: https://t.me/Avalonia\n about: Please ask and answer questions here.\n
dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\config.yml
config.yml
YAML
325
0.8
0
0
python-kit
19
2024-08-23T12:16:19.743452
GPL-3.0
false
f5c3ff0dfc53fdb6de037602dd42e9bb
name: Feature request\ndescription: Suggest an idea for this project\nlabels: ["enhancement"]\nbody:\n - type: textarea\n id: problem\n attributes:\n label: Is your feature request related to a problem? Please describe.\n description: A clear and concise description of what the problem is.\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Describe the solution you'd like\n description: A clear and concise description of what you want to happen.\n validations:\n required: true\n - type: textarea\n id: alternatives\n attributes:\n label: Describe alternatives you've considered\n description: A clear and concise description of any alternative solutions or features you've considered.\n - type: textarea\n id: additional-context\n attributes:\n label: Additional context\n description: Add any other context or screenshots about the feature request here.\n
dataset_sample\yaml\AvaloniaUI_Avalonia\.github\ISSUE_TEMPLATE\feature_request.yml
feature_request.yml
YAML
955
0.85
0.035714
0
python-kit
939
2024-07-06T03:55:22.184178
GPL-3.0
false
0c0cf47f40079677f68b2ddf7bb72631
name: "Avalonia CLA Bot"\non:\n issue_comment:\n types: [created]\n pull_request_target:\n types: [opened,closed,synchronize]\n\njobs:\n Runner:\n runs-on: ubuntu-latest\n steps:\n - name: 'Clone bot repo'\n if: github.event.issue.pull_request && ((github.event.comment.user.login != 'cla-avalonia') || github.event_name == 'pull_request_target')\n run : |\n rm -rf ./github-action/\n git clone https://${{ secrets.CLA_PAT }}:@github.com/AvaloniaUI/AvaloniaCLABot --branch=main --depth=1 --recursive CLABot\n\n - name: "Run CLA bot"\n if: github.event.issue.pull_request && ((github.event.comment.user.login != 'cla-avalonia') || github.event_name == 'pull_request_target')\n uses: ./CLABot\n env:\n PERSONAL_ACCESS_TOKEN: ${{ secrets.CLA_PAT }} \n
dataset_sample\yaml\AvaloniaUI_Avalonia\.github\workflows\CLA.yml
CLA.yml
YAML
813
0.8
0.090909
0
awesome-app
556
2023-11-23T21:27:13.546899
GPL-3.0
false
7729e7123d5b2227e02eea0e8ef25150
default:\n suites:\n smoke:\n paths: [ "%paths.base%/features/smoke" ]\n contexts: [ Aws\Test\Integ\SmokeContext ]\n performance:\n paths: [ "%paths.base%/features/performance" ]\n contexts: [ Aws\Test\PerformanceContext ]\n multipart:\n paths: [ "%paths.base%/features/multipart" ]\n contexts: [ Aws\Test\Integ\MultipartContext ]\n batching:\n paths: [ "%paths.base%/features/batching" ]\n contexts: [ Aws\Test\Integ\BatchingContext ]\n blocking:\n paths: [ "%paths.base%/features/blocking" ]\n contexts: [ Aws\Test\Integ\BlockingContext ]\n clientSideMonitoring:\n paths: [ "%paths.base%/features/clientSideMonitoring" ]\n contexts: [ Aws\Test\Integ\ClientSideMonitoringContext ]\n concurrency:\n paths: [ "%paths.base%/features/concurrency" ]\n contexts: [ Aws\Test\Integ\ConcurrencyContext ]\n crt:\n paths: [ "%paths.base%/features/crt" ]\n contexts: [ Aws\Test\Integ\CrtContext ]\n credentials:\n paths: [ "%paths.base%/features/credentials" ]\n contexts: [ Aws\Test\Integ\CredentialsContext ]\n streams:\n paths: [ "%paths.base%/features/streams" ]\n contexts: [ Aws\Test\Integ\NativeStreamContext ]\n s3:\n paths: [ "%paths.base%/features/s3" ]\n contexts: [ Aws\Test\Integ\S3Context ]\n s3Encryption:\n paths: [ "%paths.base%/features/s3Encryption" ]\n contexts: [ Aws\Test\Integ\S3EncryptionContext ]\n s3EncryptionV2:\n paths: [ "%paths.base%/features/s3EncryptionV2" ]\n contexts: [ Aws\Test\Integ\S3EncryptionContextV2 ]\n
dataset_sample\yaml\aws_aws-sdk-php\behat.yml
behat.yml
YAML
1,774
0.7
0
0
vue-tools
974
2024-07-15T18:01:37.534109
MIT
false
0ef65c61fa069c3fd14a42dc9885ee0f
codecov:\n notify:\n after_n_builds: 2\n\ncoverage:\n status:\n project:\n default:\n target: 91%\n
dataset_sample\yaml\aws_aws-sdk-php\codecov.yml
codecov.yml
YAML
110
0.7
0
0
node-utils
277
2024-12-18T01:10:53.536209
GPL-3.0
false
d499dd4202ed6baa3a84f481587df5a0
version: 2\nupdates:\n - package-ecosystem: "github-actions"\n directory: "/"\n schedule:\n interval: "weekly"\n
dataset_sample\yaml\aws_aws-sdk-php\.github\dependabot.yml
dependabot.yml
YAML
118
0.7
0
0
awesome-app
697
2025-05-02T22:13:07.010091
BSD-3-Clause
false
4334132ba6bcd78670bf574b6b4236f4
---\nname: "🐛 Bug Report"\ndescription: Report a bug\ntitle: "(short issue description)"\nlabels: [bug, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the bug\n description: What is the problem? A clear and concise description of the bug.\n validations:\n required: true\n - type: checkboxes\n id: regression\n attributes:\n label: Regression Issue\n description: What is a regression? If it worked in a previous version but doesn't in the latest version, it's considered a regression. In this case, please provide specific version number in the report.\n options:\n - label: Select this option if this issue appears to be a regression.\n required: false\n - type: textarea\n id: expected\n attributes:\n label: Expected Behavior\n description: |\n What did you expect to happen?\n validations:\n required: true\n - type: textarea\n id: current\n attributes:\n label: Current Behavior\n description: |\n What actually happened?\n \n Please include full errors, uncaught exceptions, stack traces, and relevant logs.\n If service responses are relevant, please include wire logs.\n validations:\n required: true\n - type: textarea\n id: reproduction\n attributes:\n label: Reproduction Steps\n description: |\n Provide a self-contained, concise snippet of code that can be used to reproduce the issue.\n For more complex issues provide a repo with the smallest sample that reproduces the bug.\n \n Avoid including business logic or unrelated code, it makes diagnosis more difficult.\n The code sample should be an SSCCE. See http://sscce.org/ for details. In short, please provide a code sample that we can copy/paste, run and reproduce.\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Possible Solution\n description: |\n Suggest a fix/reason for the bug\n validations:\n required: false\n - type: textarea\n id: context\n attributes:\n label: Additional Information/Context\n description: |\n Anything else that might be relevant for troubleshooting this bug. Providing context helps us come up with a solution that is most useful in the real world.\n validations:\n required: false\n - type: input\n id: sdk-version\n attributes:\n label: SDK version used\n validations:\n required: true\n - type: input\n id: environment\n attributes:\n label: Environment details (Version of PHP (`php -v`)? OS name and version, etc.)\n validations:\n required: true\n
dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\bug-report.yml
bug-report.yml
YAML
2,689
0.95
0.049383
0
react-lib
365
2025-02-15T12:29:22.954197
BSD-3-Clause
false
ac8f4f2d34b455cc3c7b1c5385374a91
---\nblank_issues_enabled: false\ncontact_links:\n - name: 💬 General Question\n url: https://github.com/aws/aws-sdk-php/discussions/categories/q-a\n about: Please ask and answer questions as a discussion thread
dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\config.yml
config.yml
YAML
215
0.8
0
0
vue-tools
296
2023-09-09T09:15:05.329697
MIT
false
20285f694b6debcfcb1dcbcf83f29d4b
---\nname: "📕 Documentation Issue"\ndescription: Report an issue in the API Reference documentation or Developer Guide\ntitle: "(short issue description)"\nlabels: [documentation, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the issue\n description: A clear and concise description of the issue.\n validations:\n required: true\n\n - type: textarea\n id: links\n attributes:\n label: Links\n description: |\n Include links to affected documentation page(s).\n validations:\n required: true\n
dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\documentation.yml
documentation.yml
YAML
588
0.85
0
0
vue-tools
264
2025-04-18T01:04:34.726852
Apache-2.0
false
afec36c0d9b3288cd59fe715361a20c3
---\nname: 🚀 Feature Request\ndescription: Suggest an idea for this project\ntitle: "(short issue description)"\nlabels: [feature-request, needs-triage]\nassignees: []\nbody:\n - type: textarea\n id: description\n attributes:\n label: Describe the feature\n description: A clear and concise description of the feature you are proposing.\n validations:\n required: true\n - type: textarea\n id: use-case\n attributes:\n label: Use Case\n description: |\n Why do you need this feature? For example: "I'm always frustrated when..."\n validations:\n required: true\n - type: textarea\n id: solution\n attributes:\n label: Proposed Solution\n description: |\n Suggest how to implement the addition or change. Please include prototype/workaround/sketch/reference implementation.\n validations:\n required: false\n - type: textarea\n id: other\n attributes:\n label: Other Information\n description: |\n Any alternative solutions or features you considered, a more detailed explanation, stack traces, related issues, links for context, etc.\n validations:\n required: false\n - type: checkboxes\n id: ack\n attributes:\n label: Acknowledgements\n options:\n - label: I may be able to implement this feature request\n required: false\n - label: This feature might incur a breaking change\n required: false\n - type: input\n id: sdk-version\n attributes:\n label: SDK version used\n validations:\n required: true\n - type: input\n id: environment\n attributes:\n label: Environment details (Version of PHP (`php -v`)? OS name and version, etc.)\n validations:\n required: true\n
dataset_sample\yaml\aws_aws-sdk-php\.github\ISSUE_TEMPLATE\feature-request.yml
feature-request.yml
YAML
1,727
0.85
0.033898
0
python-kit
95
2024-06-04T04:08:05.427894
Apache-2.0
false
e1d290f39c23e7cf020244703d579876
name: Closed Issue Message\non:\n issues:\n types: [closed]\npermissions: {}\njobs:\n auto_comment:\n permissions:\n issues: write # to comment on issues (aws-actions/closed-issue-message)\n\n runs-on: ubuntu-latest\n steps:\n - uses: aws-actions/closed-issue-message@v2\n with:\n # These inputs are both required\n repo-token: "${{ secrets.GITHUB_TOKEN }}"\n message: |\n This issue is now closed. Comments on closed issues are hard for our team to see.\n If you need more assistance, please open a new issue that references this one.\n
dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\closed-issue-message.yml
closed-issue-message.yml
YAML
598
0.95
0.052632
0.055556
awesome-app
405
2024-03-19T17:42:39.950594
BSD-3-Clause
false
60f1d124989d68ad58b75f8651a6f20d
name: Build API documentation\non:\n pull_request:\n branches:\n - master\njobs:\n build_docs:\n runs-on: ubuntu-latest\n strategy:\n matrix:\n php-versions: ['8.1']\n name: Build API documentation for PHP ${{ matrix.php-versions }}\n steps:\n - name: Setup PHP with Xdebug\n uses: shivammathur/setup-php@v2\n with:\n coverage: xdebug\n php-version: ${{ matrix.php-versions }}\n ini-values: xdebug.overload_var_dump=0, memory_limit=4G, phar.readonly=false\n\n - name: Checkout CodeBase\n uses: actions/checkout@v4\n\n - name: Validate composer.json and composer.lock\n run: composer validate\n\n - name: Install dependencies\n run: composer update --no-interaction --prefer-source\n\n - name: Prepare OS environment\n run: |\n sudo sed -i s/deb.debian.org/archive.debian.org/g /etc/apt/sources.list\n sudo sed -i 's|security.debian.org|archive.debian.org/|g' /etc/apt/sources.list\n sudo sed -i '/stretch-updates/d' /etc/apt/sources.list\n\n sudo apt-get -y update && \\n sudo apt-get -y install git wget zip unzip libzip-dev libssl-dev libtidy-dev python3 cmake python3-distutils-extra python3-apt\n\n PHP_CONF_DIR=$(php -i | grep "Scan this dir for additional .ini files" | awk '{print $9}')\n sudo touch "$PHP_CONF_DIR"/memory.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/memory.ini \\n && sudo echo "memory_limit = 5048M;" >> "$PHP_CONF_DIR"/memory.ini\n\n sudo touch "$PHP_CONF_DIR"/phar.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/phar.ini \\n && sudo echo "phar.readonly = Off;" >> "$PHP_CONF_DIR"/phar.ini\n\n sudo touch "$PHP_CONF_DIR"/timezone.ini \\n && sudo chmod 666 "$PHP_CONF_DIR"/timezone.ini \\n && sudo echo "date.timezone ='America/New_York'" >> "$PHP_CONF_DIR"/timezone.ini\n\n - name: Run API docs build\n run: |\n make api\n
dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\docs-build.yml
docs-build.yml
YAML
1,971
0.7
0.037037
0
python-kit
130
2024-06-19T11:15:05.265338
MIT
false
ee00c8e4c15f840088b974d77805d399
name: Git Secrets Scan\n\non:\n pull_request:\n branches:\n - master\n\njobs:\n git-secrets-scan:\n runs-on: ubuntu-latest\n\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n\n - name: Set up Git Secrets\n run: |\n sudo apt-get update\n sudo apt-get install -y git\n git clone https://github.com/awslabs/git-secrets.git\n cd git-secrets\n sudo make install\n cd ..\n git secrets --install\n git secrets --register-aws\n\n - name: Fetch previous commit\n run: |\n git fetch origin +refs/heads/${{ github.base_ref }}:refs/remotes/origin/${{ github.base_ref }}\n export DIFF=$(git diff origin/${{ github.base_ref }} HEAD)\n echo "${DIFF}" > diff.txt\n\n - name: Filter out skipped patterns\n run: |\n skippedPrefixes=(\n 'src/data/s3control/2018-08-20/endpoint-tests-1.json.php'\n 'src/data/dynamodb/2011-12-05/endpoint-tests-1.json.php'\n 'src/data/dynamodb/2012-08-10/endpoint-tests-1.json.php'\n 'tests/DynamoDb/MarshalerTest.php'\n '- '\n '\[ERROR\]'\n '\\n'\n 'PHP_EOL'\n 'Possible'\n '/usr/local/bin/git-secrets:'\n 'tests/S3Control'\n 'tests/Arn'\n )\n\n skippedRegexes=(\n '/examples-/'\n '/UpdateDataSourceRequest\$Credentials/'\n '/"AccountId": "123456789012"/'\n '/"AccountId": "999999999999"/'\n '/"AccountId": "012345678901"/'\n '/"AWS::Auth::AccountId": "012345678901"/'\n '/123456789012/'\n '/999999999999/'\n '/"Username": "username"/'\n '/"Password": "password"/'\n '/RegisterUserResponse\$UserInvitationUrl/'\n )\n\n # Filter out lines matching skipped prefixes\n for prefix in "${skippedPrefixes[@]}"; do\n sed -i "\|${prefix}|d" diff.txt\n done\n\n # Filter out lines matching skipped regexes\n for regex in "${skippedRegexes[@]}"; do\n sed -i -E "${regex}d" diff.txt\n done\n\n - name: Run Git Secrets scan on filtered diff\n run: |\n if [ -s diff.txt ]; then\n cat diff.txt | git secrets --scan - 2>&1\n status=$?\n if [ $status -ne 0 ]; then\n exit $status\n fi\n else\n echo "No differences found."\n fi\n
dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\git-secrets-scan.yml
git-secrets-scan.yml
YAML
2,490
0.8
0.047619
0.027027
vue-tools
109
2024-11-07T05:16:05.219667
MIT
false
ea9ecf2369617fd5e558d89678e83ec0
name: HandleStaleDiscussions\non:\n schedule:\n - cron: '0 */4 * * *'\n discussion_comment:\n types: [created]\n\njobs:\n handle-stale-discussions:\n if: github.repository_owner == 'aws'\n name: Handle stale discussions\n runs-on: ubuntu-latest\n permissions:\n discussions: write\n steps:\n - name: Stale discussions action\n uses: aws-github-ops/handle-stale-discussions@v1\n env:\n GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}\n
dataset_sample\yaml\aws_aws-sdk-php\.github\workflows\handle-stale-discussions.yml
handle-stale-discussions.yml
YAML
464
0.7
0.052632
0
python-kit
160
2024-11-21T04:21:28.120234
GPL-3.0
false
d976bf8207e837149f94929c157d4ddb