content stringlengths 1 103k ⌀ | path stringlengths 8 216 | filename stringlengths 2 179 | language stringclasses 15
values | size_bytes int64 2 189k | quality_score float64 0.5 0.95 | complexity float64 0 1 | documentation_ratio float64 0 1 | repository stringclasses 5
values | stars int64 0 1k | created_date stringdate 2023-07-10 19:21:08 2025-07-09 19:11:45 | license stringclasses 4
values | is_test bool 2
classes | file_hash stringlengths 32 32 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
en:\n test_class:\n author_info:\n full: Author %{author} is from %{location}\n has_invalid_argument: Welcome to %{no_matching_method}\n hello_world: Hello world\n nonexistent_test_class:\n never_called: Never called\n | dataset_sample\yaml\gollum_gollum\test\support\locales\en.yml | en.yml | YAML | 229 | 0.7 | 0 | 0 | python-kit | 847 | 2024-10-06T00:42:27.542896 | GPL-3.0 | true | 73ddd62faf0faeebcb9d32e5c942b9ee |
# To get started with Dependabot version updates, you'll need to specify which\n# package ecosystems to update and where the package manifests are located.\n# Please see the documentation for all configuration options:\n# https://help.github.com/github/administering-a-repository/configuration-options-for-dependency-updates\n\nversion: 2\nupdates:\n - package-ecosystem: "gomod"\n directory: "/"\n schedule:\n interval: "weekly"\n\n # Maintain dependencies for GitHub Actions\n - package-ecosystem: "github-actions"\n directory: "/"\n schedule:\n interval: "weekly"\n | dataset_sample\yaml\GoogleCloudPlatform_terraformer\.github\dependabot.yml | dependabot.yml | YAML | 576 | 0.8 | 0.176471 | 0.333333 | react-lib | 321 | 2025-05-01T14:53:21.252076 | Apache-2.0 | false | fb3d398c594cd61e1eedd29c306335b2 |
name: linter\n\non:\n push:\n branches:\n - master\n pull_request:\n branches:\n - master\n\njobs:\n linter:\n name: golangci-lint\n runs-on: ubuntu-latest\n steps:\n - name: Check out code into the Go module directory\n uses: actions/checkout@v4\n - name: golangci-lint\n uses: reviewdog/action-golangci-lint@v2\n with:\n go_version_file: go.mod\n github_token: ${{ secrets.GITHUB_TOKEN }}\n tool_name: golangci-lint\n | dataset_sample\yaml\GoogleCloudPlatform_terraformer\.github\workflows\linter.yml | linter.yml | YAML | 462 | 0.7 | 0 | 0 | react-lib | 326 | 2024-04-12T10:33:59.979768 | Apache-2.0 | false | f5c5f0320dbf1c422f56441bac58309c |
coverage:\n status:\n project:\n default:\n threshold: 10%\n patch:\n default:\n target: 30%\ngithub_checks:\n annotations: false\n | dataset_sample\yaml\GoogleContainerTools_skaffold\codecov.yml | codecov.yml | YAML | 153 | 0.7 | 0 | 0 | python-kit | 238 | 2025-06-29T16:36:11.316382 | MIT | false | 2f6dc001441c757879a6667165f3d8fa |
run:\n timeout: 5m\n linters-settings:\n govet:\n enable-all: true\n gofmt:\n simplify: true\n goimports:\n local-prefixes: github.com/google/cadvisor\nlinters:\n disable-all: true\n enable:\n - govet\n - errcheck\n - staticcheck\n - unused\n - gosimple\n - ineffassign\n - typecheck\n - gofmt\n - goimports\nissues:\n max-issues-per-linter: 0\n max-same-issues: 0\n | dataset_sample\yaml\google_cadvisor\.golangci.yml | .golangci.yml | YAML | 399 | 0.85 | 0 | 0 | vue-tools | 610 | 2024-09-21T02:23:01.242524 | BSD-3-Clause | false | a800d633a43f119adfa3c516f49f324d |
# .readthedocs.yml\n# Read the Docs configuration file\n# See https://docs.readthedocs.io/en/stable/config-file/v2.html for details\n\n# Required\nversion: 2\n\nsphinx:\n configuration: python/docs/conf.py\n fail_on_warning: false\n\n# Setup build requirements for docs.\n# Use conda so that we can install the latest libprotobuf package without\n# having to build from scratch just for docs builds.\nconda:\n environment: python/docs/environment.yml\n\npython:\n version: 3.8\n install:\n - method: setuptools\n path: python\n | dataset_sample\yaml\google_protobuf\.readthedocs.yml | .readthedocs.yml | YAML | 518 | 0.95 | 0.136364 | 0.388889 | react-lib | 612 | 2023-08-13T17:28:29.198865 | MIT | false | 3700eda53b1ed5e1ff909ee17e64f9f1 |
configuration:\n - Debug\n\nenvironment:\n matrix:\n # Only test few combinations: "Visual Studio 2017 (15) + Win64/MinGW + Debug + DLL". We can\n # test more combinations but AppVeyor just takes too long to finish (each\n # combination takes ~15mins).\n - platform: MinGW\n language: cpp\n image: Visual Studio 2017\n\n - platform: Win64\n language: cpp\n image: Visual Studio 2017\n BUILD_DLL: ON\n UNICODE: ON\n\n - platform: Win64\n language: cpp\n image: Visual Studio 2017\n BUILD_DLL: OFF\n UNICODE: ON\n\n - platform: Win64\n language: csharp\n image: Visual Studio 2017\n\n# Our build scripts run tests automatically; we don't want AppVeyor\n# to try to detect them itself.\ntest: off\n\ninstall:\n - git submodule update --init --recursive\n\nbefore_build:\n - if %platform%==MinGW set generator=MinGW Makefiles\n - if %platform%==Win32 set generator=Visual Studio 15\n - if %platform%==Win64 set generator=Visual Studio 15 Win64\n - if %platform%==Win32 set vcplatform=Win32\n - if %platform%==Win64 set vcplatform=x64\n\nbuild_script:\n - CALL appveyor.bat\n\nskip_commits:\n message: /.*\[skip appveyor\].*/\n | dataset_sample\yaml\google_protobuf\appveyor.yml | appveyor.yml | YAML | 1,166 | 0.8 | 0.12766 | 0.131579 | vue-tools | 539 | 2025-03-27T20:54:27.304959 | MIT | false | 1e3c42031c6fa94f336be5560d626787 |
name: CI\non:\n - pull_request\n - push\njobs:\n\n build:\n name: Build\n runs-on: ubuntu-latest\n strategy:\n matrix:\n goVer: [1.21, 1.22, 1.23]\n\n steps:\n - name: Set up Go ${{ matrix.goVer }}\n uses: actions/setup-go@v5\n with:\n go-version: ${{ matrix.goVer }}\n id: go\n\n - name: Check out code into the Go module directory\n uses: actions/checkout@v4\n\n - name: Get dependencies\n run: |\n go get -v -t -d ./...\n go get gopkg.in/check.v1\n\n - name: Build\n run: go build -v .\n \n - name: Format\n run: diff -u <(echo -n) <(gofmt -d .)\n \n - name: Test\n run: go test ./...\n | dataset_sample\yaml\gophish_gophish\.github\workflows\ci.yml | ci.yml | YAML | 665 | 0.7 | 0 | 0 | react-lib | 38 | 2024-02-02T18:58:51.701471 | Apache-2.0 | false | cf5c8ce28f2f5d523324b01943923253 |
name: Build Gophish Release\non:\n release:\n types: [created]\n\njobs:\n build:\n name: Build Binary\n runs-on: ${{ matrix.os }}\n strategy:\n matrix:\n os: [windows-latest, ubuntu-latest, macos-latest]\n arch: ['386', amd64]\n # We sometimes use different verbiage for things (e.g. "darwin"\n # for the GOOS build flag and "osx" in the actual release ZIP).\n # We need to specify those here.\n include:\n - os: windows-latest\n goos: windows\n bin: 'gophish.exe'\n releaseos: windows\n - os: ubuntu-latest\n goos: linux\n bin: 'gophish'\n releaseos: linux\n - os: macos-latest\n goos: darwin\n bin: 'gophish'\n releaseos: osx\n # Don't build windows-32bit due to missing MinGW dependencies\n # Don't build osx-32bit due to eventual drop in Go support\n exclude:\n - os: windows-latest\n arch: '386'\n - os: macos-latest\n arch: '386'\n steps:\n - name: Set up Go\n uses: actions/setup-go@v2\n with:\n go-version: 1.22\n - if: matrix.os == 'ubuntu-latest'\n run: sudo apt-get update && sudo apt-get install -y gcc-multilib\n - if: matrix.arch == '386'\n run: echo "RELEASE=gophish-${{ github.event.release.tag_name }}-${{ matrix.releaseos }}-32bit" >> $GITHUB_ENV\n - if: matrix.arch == 'amd64'\n run: echo "RELEASE=gophish-${{ github.event.release.tag_name }}-${{ matrix.releaseos }}-64bit" >> $GITHUB_ENV\n - if: matrix.os == 'windows-latest'\n run: echo "RELEASE=gophish-${{ github.event.release.tag_name }}-${{ matrix.releaseos }}-64bit" | Out-File -FilePath $env:GITHUB_ENV -Append # https://github.com/actions/runner/issues/1636\n - uses: actions/checkout@v4\n - name: Build ${{ matrix.goos }}/${{ matrix.arch }}\n run: go build -o ${{ matrix.bin }}\n env:\n GOOS: ${{ matrix.goos }}\n GOARCH: ${{ matrix.arch }}\n CGO_ENABLED: 1\n - name: Upload to artifacts\n uses: actions/upload-artifact@v4\n with:\n name: ${{ env.RELEASE }}\n path: ${{ matrix.bin }}\n\n package:\n name: Package Assets\n runs-on: ubuntu-latest\n needs: build\n steps:\n - uses: actions/checkout@v4\n - uses: actions/download-artifact@v4\n with:\n path: bin\n - name: Package Releases\n run: |\n mkdir releases;\n for RELEASE_DIR in bin/*\n do\n echo "Creating release $RELEASE_DIR"\n for BINARY in $RELEASE_DIR/*\n do\n cp $BINARY .;\n zip -r releases/$(basename $RELEASE_DIR).zip \\n $(basename ${BINARY}) \\n static/js/dist \\n static/js/src/vendor/ckeditor \\n static/css/dist \\n static/images \\n static/font \\n static/db \\n db \\n templates \\n README.md \\n VERSION \\n LICENSE \\n config.json;\n rm $BINARY;\n done\n done\n - name: Upload to artifacts\n uses: actions/upload-artifact@v4\n with:\n name: releases\n path: releases/*.zip\n \n upload:\n name: Upload to the Release\n runs-on: ubuntu-latest\n needs: package\n steps:\n - uses: actions/download-artifact@v4\n with:\n name: releases\n path: releases/\n # I would love to use @actions/upload-release-asset, but they don't\n # support wildcards in the asset path. Ref #9, #24, and #47\n - name: Upload Archives to Release\n env:\n UPLOAD_URL: ${{ github.event.release.upload_url }}\n API_HEADER: "Accept: application/vnd.github.v3+json"\n AUTH_HEADER: "Authorization: token ${{ secrets.GITHUB_TOKEN }}"\n run: |\n UPLOAD_URL=$(echo -n $UPLOAD_URL | sed s/\{.*//g)\n for FILE in releases/*\n do\n echo "Uploading ${FILE}";\n curl \\n -H "${API_HEADER}" \\n -H "${AUTH_HEADER}" \\n -H "Content-Type: $(file -b --mime-type ${FILE})" \\n --data-binary "@${FILE}" \\n "${UPLOAD_URL}?name=$(basename ${FILE})";\n done\n - name: Generate SHA256 Hashes\n env:\n API_HEADER: "Accept: application/vnd.github.v3+json"\n AUTH_HEADER: "Authorization: token ${{ secrets.GITHUB_TOKEN }}"\n RELEASE_URL: ${{ github.event.release.url }}\n run: |\n HASH_TABLE="| SHA256 Hash | Filename |"\n HASH_TABLE="${HASH_TABLE}\n|-----|-----|\n"\n for FILE in releases/*\n do\n FILENAME=$(basename ${FILE})\n HASH=$(sha256sum ${FILE} | cut -d ' ' -f 1)\n HASH_TABLE="${HASH_TABLE}|${HASH}|${FILENAME}|\n"\n done\n echo "${HASH_TABLE}"\n curl \\n -XPATCH \\n -H "${API_HEADER}" \\n -H "${AUTH_HEADER}" \\n -H "Content-Type: application/json" \\n -d "{\"body\": \"${HASH_TABLE}\"}" \\n "${RELEASE_URL}";\n | dataset_sample\yaml\gophish_gophish\.github\workflows\release.yml | release.yml | YAML | 6,141 | 0.8 | 0.065359 | 0.046667 | python-kit | 679 | 2023-08-30T03:40:12.693984 | BSD-3-Clause | false | e8a49a1ed31c89a6834ae7c50c64ef3e |
- name: Change /etc/hostname\n hostname:\n name: "{{ hostname }}"\n\n- name: Ensure ufw is installed on the machine\n package:\n name: ufw\n state: present\n\n- name: Allow TCP 22 for SSH.\n ufw:\n rule: allow\n port: "22"\n proto: tcp\n\n- name: Allow TCP 80 for Gophish.\n ufw:\n rule: allow\n port: "80"\n proto: tcp\n\n- name: Allow TCP 443 for Gophish.\n ufw:\n rule: allow\n port: "443"\n proto: tcp\n\n- name: Enable ufw.\n ufw:\n state: enabled\n policy: deny\n when: enable_ufw_firewall\n\n- name: Update APT package cache.\n apt:\n update_cache: yes\n\n- name: Upgrade APT to the latest packages.\n apt:\n upgrade: safe\n\n- name: Ensure /etc/ssl/csr folder exists\n file:\n path: /etc/ssl/csr\n state: directory\n mode: "0755"\n\n- name: Ensure /etc/ssl/private folder exists\n file:\n path: /etc/ssl/private\n state: directory\n mode: "0755"\n\n- name: Ensure /etc/ssl/crt folder exists\n file:\n path: /etc/ssl/crt\n state: directory\n mode: "0755"\n\n- name: Install specified packages.\n apt:\n pkg: "{{ install_packages }}"\n state: latest\n\n- name: adding existing user '{{ gophish_user }}' to group ssl-cert\n user:\n name: "{{ gophish_user }}"\n groups: ssl-cert\n append: yes\n\n- name: Ensure the cryptography Python package is installed\n pip:\n name: cryptography\n\n- name: Generate an OpenSSL private key with the default values (4096 bits, RSA)\n openssl_privatekey:\n path: "{{ gophish_ssl_cert_path }}"\n\n- name: Generate an OpenSSL Certificate Signing Request\n openssl_csr:\n path: "{{ gophish_csr_path }}"\n privatekey_path: "{{ gophish_ssl_cert_path }}"\n common_name: "{{ gophish_domain }}"\n\n- name: Generate a Self Signed OpenSSL certificate\n openssl_certificate:\n path: "{{ gophish_crt_path }}"\n privatekey_path: "{{ gophish_ssl_cert_path }}"\n csr_path: "{{ gophish_csr_path }}"\n provider: selfsigned\n\n- name: Update postfix main.cf configuration file.\n template:\n src: main.cf.j2\n dest: /etc/postfix/main.cf\n backup: yes\n owner: root\n group: root\n mode: 0644\n\n- name: Restart postfix.\n service:\n name: postfix\n state: restarted\n\n- name: Ensure postfix is started and enabled at boot.\n service:\n name: postfix\n state: started\n enabled: yes\n\n- name: get latest release info\n uri:\n url: "https://api.github.com/repos/gophish/gophish/releases/latest"\n return_content: true\n register: latest_json_reponse\n\n- name: Download latest Gophish .zip file.\n get_url:\n validate_certs: True\n url: "https://github.com/gophish/gophish/releases/download/{{ latest_json_reponse.json.tag_name }}/gophish-{{ latest_json_reponse.json.tag_name }}-linux-64bit.zip"\n dest: "/home/{{ gophish_user }}/gophish.zip"\n mode: 0755\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n\n- name: Ensure gophish user has permission for CRT file.\n file:\n path: "{{ gophish_crt_path }}"\n mode: 0755\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n\n- name: Ensure gophish user has permission for SSL certificate.\n file:\n path: "{{ gophish_ssl_cert_path }}"\n mode: 0755\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n\n- name: Create directory for gophish.\n file:\n path: "/home/{{ gophish_user }}/gophish_deploy"\n state: directory\n mode: 0755\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n\n- name: Unzip gophish file.\n unarchive:\n src: "/home/{{ gophish_user }}/gophish.zip"\n dest: "/home/{{ gophish_user }}/gophish_deploy"\n remote_src: True # File is on target server and not locally.\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n\n- name: Change ownership of Gophish folder and files.\n file:\n path: /home/{{ gophish_user }}/gophish_deploy\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n recurse: True\n\n- name: Ensure gophish binary is executable\n file:\n path: /home/{{ gophish_user }}/gophish_deploy/gophish\n mode: 744\n\n- name: Ensure gophish binary is allowed to bind to privileged ports using setcap\n capabilities:\n path: /home/{{ gophish_user }}/gophish_deploy/gophish\n capability: cap_net_bind_service+eip\n state: present\n\n- name: Copy config.json file.\n copy:\n src: files/config.json\n dest: "/home/{{ gophish_user }}/gophish_deploy/config.json"\n owner: "{{ gophish_user }}"\n group: "{{ gophish_user }}"\n mode: 0644\n\n- name: Ensure gophish service file is properly set\n template:\n src: gophish.service.j2\n dest: /etc/systemd/system/gophish.service\n mode: 644\n\n- name: Ensure systemd to reread configs\n systemd:\n daemon_reload: yes\n\n- name: Ensure gophish is properly started\n service:\n name: gophish.service\n state: started\n enabled: yes\n\n- name: Ensure nginx is installed\n package:\n name: nginx\n state: present\n\n- name: Ensure nginx service file is properly set\n template:\n src: nginx.conf.j2\n dest: /etc/nginx/nginx.conf\n mode: 644\n\n- name: Ensure nginx service is restarted\n service:\n name: nginx\n state: reloaded\n enabled: yes\n\n- name: get Gophish log file which contain initial password\n command: cat /home/{{ gophish_user }}/gophish_deploy/gophish.log\n register: gophish_log\n\n- name: display log file\n debug:\n msg: "{{ gophish_log }}"\n\n- name: Reboot the box in 1 minute.\n command: shutdown -r 1\n when: reboot_box\n | dataset_sample\yaml\gophish_gophish\ansible-playbook\roles\gophish\tasks\main.yml | main.yml | YAML | 5,363 | 0.8 | 0.026549 | 0 | python-kit | 719 | 2023-09-24T23:56:47.088974 | BSD-3-Clause | false | bfc4c5ac020de67d6be7e3e64aa4ffbf |
enable_ufw_firewall: true\n\ninstall_packages:\n - postfix\n - unzip\n - libcap2-bin\n - python-is-python3\n - python3-pip\n\nhostname: gophish\ngophish_user: ubuntu\npostfix_hostname: gophish\npostfix_inet_interfaces: 127.0.0.1\ngophish_domain: gophish.local\ngophish_ssl_cert_path: /etc/ssl/private/gophish.pem\ngophish_csr_path: /etc/ssl/csr/gophish.csr\ngophish_crt_path: /etc/ssl/crt/gophish.crt\n# Required if changing /etc/hostname to something different.\nreboot_box: true\n | dataset_sample\yaml\gophish_gophish\ansible-playbook\roles\gophish\vars\main.yml | main.yml | YAML | 468 | 0.8 | 0.052632 | 0.058824 | python-kit | 213 | 2023-10-17T04:59:02.690508 | Apache-2.0 | false | 52b86b6aa02334ed05e3a33b92dc53df |
production:\n driver: mysql \n open: root:@(:3307)/gophish?charset=utf8&parseTime=True&loc=Local\n dialect: mysql\n import: github.com/go-sql-driver/mysql | dataset_sample\yaml\gophish_gophish\db\db_mysql\dbconf.yml | dbconf.yml | YAML | 162 | 0.85 | 0 | 0 | python-kit | 103 | 2025-01-07T22:34:44.170096 | BSD-3-Clause | false | 4985231b0bcbfb02270507b38f825fff |
production:\n driver: sqlite3 \n open: gophish.db\n dialect: sqlite3\n import: github.com/mattn/go-sqlite3 | dataset_sample\yaml\gophish_gophish\db\db_sqlite3\dbconf.yml | dbconf.yml | YAML | 114 | 0.85 | 0 | 0 | vue-tools | 374 | 2023-10-21T22:34:51.524119 | GPL-3.0 | false | d910a9d745d05e5f96afefb60a975478 |
# v1.64.6\n# Please don't remove the first line. It uses in CI to determine the golangci version\nrun:\n timeout: 5m\n\nissues:\n # Maximum issues count per one linter. Set to 0 to disable. Default is 50.\n max-issues-per-linter: 0\n # Maximum count of issues with the same text. Set to 0 to disable. Default is 3.\n max-same-issues: 0\n\n # We want to try and improve the comments in the k6 codebase, so individual\n # non-golint items from the default exclusion list will gradually be added\n # to the exclude-rules below\n exclude-use-default: false\n\n exclude-rules:\n # Exclude duplicate code and function length and complexity checking in test\n # files (due to common repeats and long functions in test code)\n - path: _(test|gen)\.go\n linters:\n - canonicalheader\n - cyclop\n - dupl\n - gocognit\n - funlen\n - lll\n - forcetypeassert\n - path: js\/modules\/k6\/browser\/.*\.go\n linters:\n - revive\n - contextcheck\n - path: js\/modules\/k6\/html\/.*\.go\n text: "exported: exported "\n linters:\n - revive\n - path: js\/modules\/k6\/http\/.*_test\.go\n linters:\n # k6/http module's tests are quite complex because they often have several nested levels.\n # The module is in maintenance mode, so we don't intend to port the tests to a parallel version.\n - paralleltest\n - tparallel\n - linters:\n - forbidigo\n text: 'use of `os\.(SyscallError|Signal|Interrupt)` forbidden'\n\nlinters-settings:\n exhaustive:\n default-signifies-exhaustive: true\n cyclop:\n max-complexity: 25\n dupl:\n threshold: 150\n goconst:\n min-len: 10\n min-occurrences: 4\n funlen:\n lines: 80\n statements: 60\n forbidigo:\n forbid:\n - '^(fmt\\.Print(|f|ln)|print|println)$'\n # Forbid everything in os, except os.Signal and os.SyscalError\n - '^os\.(.*)$(# Using anything except Signal and SyscallError from the os package is forbidden )?'\n # Forbid everything in syscall except the uppercase constants\n - '^syscall\.[^A-Z_]+$(# Using anything except constants from the syscall package is forbidden )?'\n - '^logrus\.Logger$'\n usetesting:\n os-setenv: true\n\nlinters:\n disable-all: true\n enable:\n - asasalint\n - asciicheck\n - bidichk\n - bodyclose\n - canonicalheader\n - contextcheck\n - cyclop\n - dogsled\n - dupl\n - durationcheck\n - errcheck\n - errchkjson\n - errname\n - errorlint\n - exhaustive\n - fatcontext\n - forbidigo\n - forcetypeassert\n - funlen\n - gocheckcompilerdirectives\n - gochecknoglobals\n - gocognit\n - goconst\n - gocritic\n - gofmt\n - gofumpt\n - goimports\n - gomoddirectives\n - goprintffuncname\n - gosec\n - gosimple\n - govet\n - importas\n - ineffassign\n - interfacebloat\n - lll\n - makezero\n - misspell\n - nakedret\n - nestif\n - nilerr\n - nilnil\n - noctx\n - nolintlint\n - nosprintfhostport\n - paralleltest\n - prealloc\n - predeclared\n - promlinter\n - revive\n - reassign\n - rowserrcheck\n - sqlclosecheck\n - staticcheck\n - stylecheck\n - tparallel\n - typecheck\n - unconvert\n - unparam\n - unused\n - usestdlibvars\n - usetesting\n - wastedassign\n - whitespace\n fast: false\n | dataset_sample\yaml\grafana_k6\.golangci.yml | .golangci.yml | YAML | 3,295 | 0.95 | 0.014493 | 0.097744 | node-utils | 991 | 2024-06-17T02:53:20.983958 | GPL-3.0 | false | 15996d6091f6f2cdeda0f95ad84c0bb9 |
- path: github.com/spf13/afero\n minVersion: v1.1.2\n validUntil: 2029-08-04T16:29:18+03:00\n- path: github.com/influxdata/influxdb1-client\n minVersion: v0.0.0-20190402204710-8ff2fc3824fc\n validUntil: 2029-08-04T16:29:55+03:00\n- path: gopkg.in/guregu/null.v3\n minVersion: v3.3.0\n validUntil: 2029-08-04T16:32:44+03:00\n- path: gopkg.in/yaml.v3\n minVersion: v3.0.0-20200313102051-9f266ea9e77c\n validUntil: 2029-08-04T16:32:56+03:00\n- path: github.com/spf13/cobra\n minVersion: v1.4.0\n validUntil: 2049-07-26T17:21:52+03:00\n- path: github.com/spf13/pflag\n minVersion: v1.0.5\n validUntil: 2049-07-26T17:21:57+03:00\n- path: github.com/andybalholm/cascadia\n minVersion: v1.1.0\n validUntil: 2049-07-26T17:24:57+03:00\n | dataset_sample\yaml\grafana_k6\modtools_frozen.yml | modtools_frozen.yml | YAML | 720 | 0.7 | 0 | 0 | node-utils | 749 | 2025-06-07T00:26:43.855865 | Apache-2.0 | false | 307da3fa24efb081b6a3eadc52ee72bb |
# This file contains all available configuration options\n# with their default values.\n\n# options for analysis running\nrun:\n # define go version\n go: "1.24"\n\n # default concurrency is a available CPU number\n concurrency: 16\n\n # timeout for analysis, e.g. 30s, 5m, default is 1m\n timeout: 10m\n\n # exit code when at least one issue was found, default is 1\n issues-exit-code: 1\n\n # include test files or not, default is true\n tests: true\n\n # list of build tags, all linters use it. Default is empty list.\n build-tags:\n - cgo\n - integration\n\n# output configuration options\noutput:\n formats:\n # colored-line-number|line-number|json|tab|checkstyle, default is "colored-line-number"\n - format: colored-line-number\n\n # print lines of code with issue, default is true\n print-issued-lines: true\n\n # print linter name in the end of issue text, default is true\n print-linter-name: true\n\nlinters-settings:\n goimports:\n local-prefixes: github.com/grafana/loki/pkg,github.com/grafana/loki/tools\n\n depguard:\n rules:\n Main:\n deny:\n - desc: "Use github.com/go-kit/log instead of github.com/go-kit/kit/log"\n pkg: github.com/go-kit/kit/log\n\n misspell:\n ignore-words:\n - strat\n\nlinters:\n enable:\n - errcheck\n - goconst\n - revive\n - ineffassign\n - misspell\n - unconvert\n - govet\n - typecheck\n - depguard\n - copyloopvar\n - gofmt\n - goimports\n - gosimple\n - staticcheck\n - gochecksumtype\n disable:\n - unused\n - unparam\n\nissues:\n exclude:\n - Error return value of .*log\.Logger\)\.Log\x60 is not checked\n - Error return value of .*.Log.* is not checked\n - Error return value of `` is not checked\n - Error return value of `.*WriteString` is not checked\n exclude-rules:\n - path: pkg/scheduler/scheduler.go\n text: 'SA1019: msg.GetHttpRequest is deprecated: Do not use'\n - path: '(.+)_test\.go'\n linters:\n - goconst\n fix: true\n # which dirs to skip: they won't be analyzed;\n # can use regexp here: generated.*, regexp is applied on full path;\n # default value is empty list, but next dirs are always skipped independently\n # from this option's value:\n # vendor$, third_party$, testdata$, examples$, Godeps$, builtin$\n exclude-dirs:\n - win_eventlog$\n - operator\n # which files to skip: they will be analyzed, but issues from them\n # won't be reported. Default value is empty list, but there is\n # no need to include all autogenerated files, we confidently recognize\n # autogenerated files. If it's not please let us know.\n exclude-files:\n - .*.pb.go\n - .*.y.go\n - .*.rl.go\n - .*.deepcopy.go\n | dataset_sample\yaml\grafana_loki\.golangci.yml | .golangci.yml | YAML | 2,661 | 0.95 | 0.019417 | 0.247191 | node-utils | 497 | 2024-09-04T20:09:55.902418 | MIT | false | ad86804506e709d0f5e3676ab55f9c7c |
codecov:\n require_ci_to_pass: yes\n\ncoverage:\n precision: 2\n round: down\n range: "70...100"\n status:\n project:\n default:\n informational: true\n patch:\n default:\n informational: true\n\nparsers:\n gcov:\n branch_detection:\n conditional: yes\n loop: yes\n method: no\n macro: no\n\ncomment:\n layout: "reach,diff,flags,tree"\n behavior: default\n require_changes: no\n\nignore:\n - "**/*.pb.go"\n - "**/*.y.go"\n - "**/*.md"\n | dataset_sample\yaml\grafana_loki\codecov.yml | codecov.yml | YAML | 469 | 0.95 | 0 | 0 | vue-tools | 306 | 2024-09-29T16:38:14.588392 | GPL-3.0 | false | 88f38d4a0eb0d66027c0344027857bad |
site_name: Loki\ntheme:\n name: "material"\n palette:\n primary: "grey"\n accent: "amber"\n logo: logo.png\n favicon: logo.png\nmarkdown_extensions:\n - codehilite\n | dataset_sample\yaml\grafana_loki\mkdocs.yml | mkdocs.yml | YAML | 166 | 0.7 | 0 | 0 | vue-tools | 376 | 2023-11-12T22:45:54.598637 | GPL-3.0 | false | 74ceb61f16239e1455311ca7c2d10c9b |
type/docs:\n- changed-files:\n - any-glob-to-any-file: 'docs/**/*'\n - any-glob-to-any-file: 'operator/docs/*'\nsig/operator:\n- changed-files:\n - any-glob-to-any-file: 'operator/**/*'\nkind/feature:\n- changed-files:\n - any-glob-to-any-file: 'operator/docs/enhancements/*'\narea/helm:\n- changed-files:\n - any-glob-to-any-file: 'production/helm/**/*'\n | dataset_sample\yaml\grafana_loki\.github\labeler.yml | labeler.yml | YAML | 348 | 0.8 | 0 | 0 | node-utils | 339 | 2023-09-11T09:01:26.086883 | MIT | false | f779a35837c280a9dd8b1dc52c258bbb |
# Days without any activity until an issue is labeled as stale\ndaysUntilStale: 30\n\n# Days after having the stale label that the issue will be closed\ndaysUntilClose: 7\n\n# Labels that prevent issues from being marked as stale\nexemptLabels:\n - keepalive\n - proposal\n\n# Label to use to identify a stale issue\nstaleLabel: stale\n\n# Comment to post when marking an issue as stale. Leave as false\n# to disable.\nmarkComment: |\n Hi! This issue has been automatically marked as stale because it has not had any\n activity in the past 30 days.\n\n We use a stalebot among other tools to help manage the state of issues in this project.\n A stalebot can be very useful in closing issues in a number of cases; the most common\n is closing issues or PRs where the original reporter has not responded.\n\n Stalebots are also emotionless and cruel and can close issues which are still very relevant.\n\n **If this issue is important to you, please add a comment to keep it open. More importantly, please add a thumbs-up to the original issue entry.**\n\n We regularly sort for closed issues which have a `stale` label sorted by thumbs up.\n\n We may also:\n * Mark issues as `revivable` if we think it's a valid issue but isn't something we are likely\n to prioritize in the future (the issue will still remain closed).\n * Add a `keepalive` label to silence the stalebot if the issue is very common/popular/important.\n\n We are doing our best to respond, organize, and prioritize all issues but it can be a challenging task,\n our sincere apologies if you find yourself at the mercy of the stalebot.\n\n\n# Comment to post when closing a stale issue. Leave as\n# false to disable.\ncloseComment: false\n | dataset_sample\yaml\grafana_loki\.github\stale.yml | stale.yml | YAML | 1,683 | 0.95 | 0.095238 | 0.366667 | python-kit | 736 | 2024-09-28T04:50:32.884708 | Apache-2.0 | false | 5afebeb0e18f82f9dcb019ea57bbc622 |
name: Backport PR Creator\non:\n pull_request_target:\n types:\n - closed\n - labeled\n\njobs:\n main:\n if: github.repository == 'grafana/loki'\n runs-on: ubuntu-latest\n steps:\n - name: Checkout Actions\n uses: actions/checkout@v4\n with:\n repository: "grafana/grafana-github-actions"\n path: ./actions\n ref: main\n - name: Install Actions\n run: npm install --production --prefix ./actions\n - id: "get_github_app_token"\n name: "get github app token"\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - name: Run backport\n uses: ./actions/backport\n with:\n metricsWriteAPIKey: ${{secrets.GRAFANA_MISC_STATS_API_KEY}}\n token: ${{ steps.get_github_app_token.outputs.token }}\n labelsToAdd: "backport"\n title: "{{originalTitle}} (backport {{base}})"\n | dataset_sample\yaml\grafana_loki\.github\workflows\backport.yml | backport.yml | YAML | 1,044 | 0.7 | 0.029412 | 0 | python-kit | 276 | 2024-01-23T21:34:05.746850 | GPL-3.0 | false | a2ee57ccf3b47e679aedb1822d9443f7 |
"jobs":\n "check":\n "uses": "grafana/loki-release/.github/workflows/check.yml@main"\n "with":\n "build_image": "grafana/loki-build-image:0.34.6"\n "golang_ci_lint_version": "v1.64.5"\n "release_lib_ref": "main"\n "skip_validation": false\n "use_github_app_token": true\n"name": "check"\n"on":\n "pull_request": {}\n "push":\n "branches":\n - "main" | dataset_sample\yaml\grafana_loki\.github\workflows\check.yml | check.yml | YAML | 375 | 0.7 | 0 | 0 | awesome-app | 248 | 2025-06-06T06:16:59.155109 | GPL-3.0 | false | f4bbbda1f13798f53af642a569be37a3 |
---\nname: enforce conventional commits\non: [pull_request]\njobs:\n check-title:\n runs-on: ubuntu-latest\n steps:\n - uses: amannn/action-semantic-pull-request@v5\n env:\n GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}\n | dataset_sample\yaml\grafana_loki\.github\workflows\conventional-commits.yml | conventional-commits.yml | YAML | 235 | 0.7 | 0 | 0 | react-lib | 618 | 2025-03-20T21:37:27.356728 | GPL-3.0 | false | 3d9050aaa8a15804fa4206302816db60 |
# Auto-merge as documented in official Github docs\n# https://docs.github.com/en/code-security/dependabot/working-with-dependabot/automating-dependabot-with-github-actions\n\nname: Auto-review Dependabot PRs\non: pull_request\n\npermissions:\n pull-requests: write\n contents: write\n\njobs:\n dependabot-reviewer:\n runs-on: ubuntu-latest\n\n if: ${{ github.event.pull_request.user.login == 'dependabot[bot]' }}\n\n steps:\n - name: Checkout Repository\n uses: actions/checkout@v4\n\n - name: Dependabot metadata\n id: metadata\n uses: dependabot/fetch-metadata@v2.3.0\n with:\n github-token: "${{ secrets.GITHUB_TOKEN }}"\n\n - name: Approve and auto-merge the dependabot PR\n run: |\n gh pr merge --auto --squash "$PR_URL"\n gh pr review $PR_URL \\n --approve -b "Auto approve dependencies bump PR"\n env:\n PR_URL: ${{github.event.pull_request.html_url}}\n GITHUB_TOKEN: "${{ secrets.GH_BOT_ACCESS_TOKEN }}"\n | dataset_sample\yaml\grafana_loki\.github\workflows\dependabot_reviewer.yml | dependabot_reviewer.yml | YAML | 1,002 | 0.8 | 0.029412 | 0.074074 | python-kit | 955 | 2025-03-24T21:55:58.952474 | GPL-3.0 | false | 6c64b05f52ebddb5388e59a34b887180 |
name: Deploy pr preview\n\non:\n pull_request:\n types:\n - opened\n - synchronize\n - closed\n paths:\n - "docs/sources/**"\n\njobs:\n deploy-pr-preview:\n if: "!github.event.pull_request.head.repo.fork"\n uses: grafana/writers-toolkit/.github/workflows/deploy-preview.yml@main\n with:\n branch: ${{ github.head_ref }}\n event_number: ${{ github.event.number }}\n repo: loki\n sha: ${{ github.event.pull_request.head.sha }}\n sources: |\n [\n {\n "index_file": "content/docs/loki/_index.md",\n "relative_prefix": "/docs/loki/latest/",\n "repo": "loki",\n "source_directory": "docs/sources",\n "website_directory": "content/docs/loki/latest"\n }\n ]\n title: ${{ github.event.pull_request.title }}\n | dataset_sample\yaml\grafana_loki\.github\workflows\deploy-pr-preview.yml | deploy-pr-preview.yml | YAML | 822 | 0.8 | 0.032258 | 0 | python-kit | 281 | 2023-08-19T09:43:53.657639 | BSD-3-Clause | false | a438a7d4e6d25cb4dd8734b008c62ec4 |
---\nname: helm-ci\non:\n pull_request:\n paths:\n - "production/helm/**"\n - ".github/workflows/helm-ci.yml"\n\nenv:\n CT_CONFIGFILE: production/helm/ct.yaml\n\njobs:\n call-lint:\n uses: grafana/helm-charts/.github/workflows/linter.yml@main\n with:\n filter_regex_include: .*production/helm/loki/.*\n call-test:\n name: Test Helm Chart\n runs-on: ubuntu-latest\n steps:\n - name: Checkout\n uses: actions/checkout@v4\n with:\n fetch-depth: 0\n\n - name: Set up Helm\n uses: azure/setup-helm@v4\n with:\n version: v3.8.2\n\n # Python is required because `ct lint` runs Yamale (https://github.com/23andMe/Yamale) and\n # yamllint (https://github.com/adrienverge/yamllint) which require Python\n - name: Set up Python\n uses: actions/setup-python@v5\n with:\n python-version: 3.13\n\n - name: Set up chart-testing\n uses: helm/chart-testing-action@v2.7.0\n\n - name: Run chart-testing (list-changed)\n id: list-changed\n run: |\n changed=$(ct list-changed --config "${CT_CONFIGFILE}")\n if [[ -n "$changed" ]]; then\n echo "changed=true" >> $GITHUB_OUTPUT\n fi\n\n - name: Run chart-testing (lint)\n run: ct lint --config "${CT_CONFIGFILE}" --check-version-increment=false\n timeout-minutes: 10\n\n - name: Create kind cluster\n uses: helm/kind-action@v1.12.0\n if: steps.list-changed.outputs.changed == 'true'\n\n - name: Install prometheus operator\n id: install-prometheus\n if: steps.list-changed.outputs.changed == 'true'\n run: |\n kubectl create namespace prometheus\n\n helm repo add prometheus-community https://prometheus-community.github.io/helm-charts\n helm install --debug prometheus prometheus-community/kube-prometheus-stack \\n --namespace prometheus \\n --set grafana.enabled=false \\n --set prometheus.prometheusSpec.serviceMonitorSelector.matchLabels.release=prometheus \\n --set prometheus.prometheusSpec.scrapeConfigNamespaceSelector.matchLabels.release=prometheus\n\n kubectl --namespace prometheus get pods -l "release=prometheus"\n kubectl --namespace prometheus get services -l "release=prometheus"\n\n - name: Run chart-testing (install)\n run: |\n changed=$(ct list-changed --config "${CT_CONFIGFILE}")\n if [[ "$changed" == "charts/enterprise-metrics" ]]; then\n # Do not run `ct install` for enterprise-metrics\n exit 0\n fi\n ct install --config "${CT_CONFIGFILE}"\n | dataset_sample\yaml\grafana_loki\.github\workflows\helm-ci.yml | helm-ci.yml | YAML | 2,639 | 0.95 | 0.0625 | 0.044118 | vue-tools | 268 | 2023-12-15T16:55:56.961097 | Apache-2.0 | false | 103e6ca4f308cb6e162bc2319e7c7c66 |
---\nname: Helm Loki Diff CI\non:\n pull_request:\n paths:\n - "production/helm/loki/**"\n\n# These permissions are needed to assume roles from Github's OIDC.\npermissions:\n contents: read\n pull-requests: write\n\njobs:\n helm-diff:\n name: ${{ matrix.scenario.name }}\n runs-on: ubuntu-latest\n timeout-minutes: 10\n strategy:\n matrix:\n scenario:\n - name: Distributed Scenario\n values_file: default-distributed-values.yaml\n use_k3d: true\n - name: Default Values Scenario\n values_file: default-values.yaml\n use_k3d: true\n - name: Ingress Values Scenario\n values_file: ingress-values.yaml\n use_k3d: true\n - name: Legacy Monitoring Values Scenario\n values_file: legacy-monitoring-values.yaml\n use_k3d: true\n - name: Simple Scalable AWS Kube IRSA Values Scenario\n values_file: simple-scalable-aws-kube-irsa-values.yaml\n use_k3d: false\n - name: Simple Thanos Values Scenario\n values_file: simple-thanos-values.yaml\n use_k3d: false\n\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n\n - name: Setup Helm\n uses: azure/setup-helm@v4\n\n - name: Add required Helm repositories\n run: |\n helm repo add minio https://charts.min.io/\n helm repo add grafana https://grafana.github.io/helm-charts\n helm repo add grafana-operator https://grafana.github.io/helm-charts\n helm repo update\n\n - name: Setup K3D\n if: ${{ matrix.scenario.use_k3d }}\n uses: ./.github/actions/setup-k3d\n\n - name: Setup Helm plugins\n if: ${{ matrix.scenario.use_k3d }}\n run: |\n helm plugin install https://github.com/databus23/helm-diff\n\n - name: Build helm dependencies\n run: |\n helm dependency build production/helm/loki\n\n # Conditional steps based on whether K3D is used\n - name: Run diff with K3D\n if: ${{ matrix.scenario.use_k3d }}\n env:\n HELM_DIFF_USE_UPGRADE_DRY_RUN: true\n run: |\n helm install --create-namespace loki-release grafana/loki -f production/helm/loki/scenarios/${{ matrix.scenario.values_file }}\n helm diff upgrade loki-release -f production/helm/loki/scenarios/${{ matrix.scenario.values_file }} production/helm/loki | tee helm_diff_output.txt\n\n - name: Run diff without K3D\n if: ${{ !matrix.scenario.use_k3d }}\n run: |\n helm template loki-release grafana/loki -f production/helm/loki/scenarios/${{ matrix.scenario.values_file }} > release-manifest.yaml\n helm template loki-release production/helm/loki -f production/helm/loki/scenarios/${{ matrix.scenario.values_file }} > current-manifest.yaml\n diff current-manifest.yaml release-manifest.yaml > helm_diff_output.txt || true\n\n - name: Convert Helm Diff Output to Markdown\n id: convert_diff\n run: |\n cat helm_diff_output.txt >> formatted_diff_output.md\n\n - name: Upload diff output as artifact\n uses: actions/upload-artifact@v4\n id: upload_diff\n with:\n name: ${{ matrix.scenario.name }}-diff-output\n path: formatted_diff_output.md\n retention-days: 2\n\n summary-diff-outputs:\n name: Summary Diffs\n runs-on: ubuntu-latest\n if: github.event.pull_request.head.repo.fork == false\n needs: [helm-diff]\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n with:\n persist-credentials: false\n\n - uses: actions/download-artifact@v4\n\n - name: Combine diff outputs\n run: |\n echo "## Helm Diff Output - Summary" > formatted_diff_output.md\n\n for scenario in */formatted_diff_output.md; do\n scenario_name=$(dirname "$scenario")\n\n echo "<details>" >> formatted_diff_output.md\n echo "" >> formatted_diff_output.md\n echo "<summary>${scenario_name}</summary>" >> formatted_diff_output.md\n echo "" >> formatted_diff_output.md\n echo '```diff' >> formatted_diff_output.md\n cat "$scenario" >> formatted_diff_output.md\n echo '```' >> formatted_diff_output.md\n echo "</details>" >> formatted_diff_output.md\n echo "" >> formatted_diff_output.md\n done\n\n - name: Post diff as PR comment\n uses: marocchino/sticky-pull-request-comment@v2\n with:\n header: "Helm Diff Output - Summary"\n skip_unchanged: true\n hide_and_recreate: true\n append: true\n hide_classify: "OUTDATED"\n path: formatted_diff_output.md\n | dataset_sample\yaml\grafana_loki\.github\workflows\helm-diff-ci.yml | helm-diff-ci.yml | YAML | 4,718 | 0.95 | 0.044444 | 0.017094 | awesome-app | 535 | 2023-10-21T04:15:39.680355 | Apache-2.0 | false | 9efcfb3fca8e1470ae9e9db3fdfbd1f8 |
"jobs":\n "check":\n "uses": "grafana/loki-release/.github/workflows/check.yml@main"\n "with":\n "build_image": "grafana/loki-build-image:0.34.6"\n "golang_ci_lint_version": "v1.64.5"\n "release_lib_ref": "main"\n "skip_validation": false\n "use_github_app_token": true\n "lambda-promtail-image":\n "env":\n "BUILD_TIMEOUT": 60\n "GO_VERSION": "1.24.1"\n "IMAGE_PREFIX": "public.ecr.aws/grafana"\n "RELEASE_LIB_REF": "main"\n "RELEASE_REPO": "grafana/loki"\n "REPO": "loki"\n "needs":\n - "check"\n "outputs":\n "image_digest_linux_amd64": "${{ steps.digest.outputs.digest_linux_amd64 }}"\n "image_digest_linux_arm64": "${{ steps.digest.outputs.digest_linux_arm64 }}"\n "image_name": "${{ steps.weekly-version.outputs.image_name }}"\n "image_tag": "${{ steps.weekly-version.outputs.image_version }}"\n "runs-on": "${{ matrix.runs_on }}"\n "steps":\n - "name": "pull release library code"\n "uses": "actions/checkout@v4"\n "with":\n "path": "lib"\n "ref": "${{ env.RELEASE_LIB_REF }}"\n "repository": "grafana/loki-release"\n - "name": "pull code to release"\n "uses": "actions/checkout@v4"\n "with":\n "path": "release"\n "repository": "${{ env.RELEASE_REPO }}"\n - "name": "setup node"\n "uses": "actions/setup-node@v4"\n "with":\n "node-version": "20"\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "id": "get-secrets"\n "name": "get-secrets"\n "uses": "grafana/shared-workflows/actions/get-vault-secrets@get-vault-secrets-v1.1.0"\n "with":\n "repo_secrets": |\n ECR_ACCESS_KEY=aws-credentials:access_key_id\n ECR_SECRET_KEY=aws-credentials:secret_access_key\n - "name": "Configure AWS credentials"\n "uses": "aws-actions/configure-aws-credentials@v4"\n "with":\n "aws-access-key-id": "${{ env.ECR_ACCESS_KEY }}"\n "aws-region": "us-east-1"\n "aws-secret-access-key": "${{ env.ECR_SECRET_KEY }}"\n - "name": "Login to Amazon ECR Public"\n "uses": "aws-actions/amazon-ecr-login@v2"\n "with":\n "registry-type": "public"\n - "id": "weekly-version"\n "name": "Get weekly version"\n "run": |\n version=$(./tools/image-tag)\n echo "image_version=$version" >> $GITHUB_OUTPUT\n echo "image_name=${{ env.IMAGE_PREFIX }}/lambda-promtail" >> $GITHUB_OUTPUT\n echo "image_full_name=${{ env.IMAGE_PREFIX }}/lambda-promtail:$version" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "prepare-tag"\n "name": "Prepare tag name"\n "run": |\n arch=$(echo ${{ matrix.arch }} | cut -d'/' -f2)\n echo "IMAGE_TAG=${{ steps.weekly-version.outputs.image_name }}:${{ steps.weekly-version.outputs.image_version }}-${arch}" >> $GITHUB_OUTPUT\n - "id": "build-push"\n "name": "Build and push"\n "timeout-minutes": "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n "uses": "docker/build-push-action@v6"\n "with":\n "build-args": |\n IMAGE_TAG=${{ steps.weekly-version.outputs.image_version }}\n GO_VERSION=${{ env.GO_VERSION }}\n "context": "release"\n "file": "release/tools/lambda-promtail/Dockerfile"\n "outputs": "type=image,push=true"\n "platform": "${{ matrix.arch }}"\n "provenance": false\n "tags": "${{ steps.prepare-tag.outputs.IMAGE_TAG }}"\n "strategy":\n "fail-fast": true\n "matrix":\n "include":\n - "arch": "linux/amd64"\n "runs_on":\n - "github-hosted-ubuntu-x64-small"\n - "arch": "linux/arm64"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n "loki-canary-boringcrypto-image":\n "env":\n "BUILD_TIMEOUT": 60\n "GO_VERSION": "1.24.1"\n "IMAGE_PREFIX": "grafana"\n "RELEASE_LIB_REF": "main"\n "RELEASE_REPO": "grafana/loki"\n "needs":\n - "check"\n "outputs":\n "image_digest_linux_amd64": "${{ steps.digest.outputs.digest_linux_amd64 }}"\n "image_digest_linux_arm": "${{ steps.digest.outputs.digest_linux_arm }}"\n "image_digest_linux_arm64": "${{ steps.digest.outputs.digest_linux_arm64 }}"\n "image_name": "${{ steps.weekly-version.outputs.image_name }}"\n "image_tag": "${{ steps.weekly-version.outputs.image_version }}"\n "runs-on": "${{ matrix.runs_on }}"\n "steps":\n - "name": "pull release library code"\n "uses": "actions/checkout@v4"\n "with":\n "path": "lib"\n "ref": "${{ env.RELEASE_LIB_REF }}"\n "repository": "grafana/loki-release"\n - "name": "pull code to release"\n "uses": "actions/checkout@v4"\n "with":\n "path": "release"\n "repository": "${{ env.RELEASE_REPO }}"\n - "name": "setup node"\n "uses": "actions/setup-node@v4"\n "with":\n "node-version": 20\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "id": "weekly-version"\n "name": "Get weekly version"\n "run": |\n version=$(./tools/image-tag)\n echo "image_version=$version" >> $GITHUB_OUTPUT\n echo "image_name=${{ env.IMAGE_PREFIX }}/loki-canary-boringcrypto" >> $GITHUB_OUTPUT\n echo "image_full_name=${{ env.IMAGE_PREFIX }}/loki-canary-boringcrypto:$version" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "platform"\n "name": "Parse image platform"\n "run": |\n platform="$(echo "${{ matrix.arch }}" | sed "s/\(.*\)\/\(.*\)/\1-\2/")"\n echo "platform=${platform}" >> $GITHUB_OUTPUT\n echo "platform_short=$(echo ${{ matrix.arch }} | cut -d / -f 2)" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "build-push"\n "name": "Build and push"\n "timeout-minutes": "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n "uses": "docker/build-push-action@v6"\n "with":\n "build-args": |\n IMAGE_TAG=${{ steps.weekly-version.outputs.image_version }}\n GO_VERSION=${{ env.GO_VERSION }}\n "context": "release"\n "file": "release/cmd/loki-canary-boringcrypto/Dockerfile"\n "outputs": "push-by-digest=true,type=image,name=${{ steps.weekly-version.outputs.image_name }},push=true"\n "platforms": "${{ matrix.arch }}"\n "provenance": true\n "tags": "${{ steps.weekly-version.outputs.image_name }}"\n - "id": "digest"\n "name": "Process image digest"\n "run": |\n arch=$(echo ${{ matrix.arch }} | tr "/" "_")\n echo "digest_$arch=${{ steps.build-push.outputs.digest }}" >> $GITHUB_OUTPUT\n "working-directory": "release"\n "strategy":\n "fail-fast": true\n "matrix":\n "include":\n - "arch": "linux/amd64"\n "runs_on":\n - "github-hosted-ubuntu-x64-small"\n - "arch": "linux/arm64"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n - "arch": "linux/arm"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n "loki-canary-boringcrypto-manifest":\n "env":\n "BUILD_TIMEOUT": 60\n "needs":\n - "loki-canary-boringcrypto-image"\n "runs-on": "ubuntu-latest"\n "steps":\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "name": "Publish multi-arch manifest"\n "run": |\n # Unfortunately there is no better way atm than having a separate named output for each digest\n echo 'linux/arm64 ${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_amd64 }}'\n echo 'linux/amd64 ${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_arm64 }}'\n echo 'linux/arm ${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_arm }}'\n IMAGE=${{ needs.loki-canary-boringcrypto-image.outputs.image_name }}:${{ needs.loki-canary-boringcrypto-image.outputs.image_tag }}\n echo "Create multi-arch manifest for $IMAGE"\n docker buildx imagetools create -t $IMAGE \\n ${{ needs.loki-canary-boringcrypto-image.outputs.image_name }}@${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_amd64 }} \\n ${{ needs.loki-canary-boringcrypto-image.outputs.image_name }}@${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_arm64 }} \\n ${{ needs.loki-canary-boringcrypto-image.outputs.image_name }}@${{ needs.loki-canary-boringcrypto-image.outputs.image_digest_linux_arm }}\n docker buildx imagetools inspect $IMAGE\n "loki-canary-image":\n "env":\n "BUILD_TIMEOUT": 60\n "GO_VERSION": "1.24.1"\n "IMAGE_PREFIX": "grafana"\n "RELEASE_LIB_REF": "main"\n "RELEASE_REPO": "grafana/loki"\n "needs":\n - "check"\n "outputs":\n "image_digest_linux_amd64": "${{ steps.digest.outputs.digest_linux_amd64 }}"\n "image_digest_linux_arm": "${{ steps.digest.outputs.digest_linux_arm }}"\n "image_digest_linux_arm64": "${{ steps.digest.outputs.digest_linux_arm64 }}"\n "image_name": "${{ steps.weekly-version.outputs.image_name }}"\n "image_tag": "${{ steps.weekly-version.outputs.image_version }}"\n "runs-on": "${{ matrix.runs_on }}"\n "steps":\n - "name": "pull release library code"\n "uses": "actions/checkout@v4"\n "with":\n "path": "lib"\n "ref": "${{ env.RELEASE_LIB_REF }}"\n "repository": "grafana/loki-release"\n - "name": "pull code to release"\n "uses": "actions/checkout@v4"\n "with":\n "path": "release"\n "repository": "${{ env.RELEASE_REPO }}"\n - "name": "setup node"\n "uses": "actions/setup-node@v4"\n "with":\n "node-version": 20\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "id": "weekly-version"\n "name": "Get weekly version"\n "run": |\n version=$(./tools/image-tag)\n echo "image_version=$version" >> $GITHUB_OUTPUT\n echo "image_name=${{ env.IMAGE_PREFIX }}/loki-canary" >> $GITHUB_OUTPUT\n echo "image_full_name=${{ env.IMAGE_PREFIX }}/loki-canary:$version" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "platform"\n "name": "Parse image platform"\n "run": |\n platform="$(echo "${{ matrix.arch }}" | sed "s/\(.*\)\/\(.*\)/\1-\2/")"\n echo "platform=${platform}" >> $GITHUB_OUTPUT\n echo "platform_short=$(echo ${{ matrix.arch }} | cut -d / -f 2)" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "build-push"\n "name": "Build and push"\n "timeout-minutes": "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n "uses": "docker/build-push-action@v6"\n "with":\n "build-args": |\n IMAGE_TAG=${{ steps.weekly-version.outputs.image_version }}\n GO_VERSION=${{ env.GO_VERSION }}\n "context": "release"\n "file": "release/cmd/loki-canary/Dockerfile"\n "outputs": "push-by-digest=true,type=image,name=${{ steps.weekly-version.outputs.image_name }},push=true"\n "platforms": "${{ matrix.arch }}"\n "provenance": true\n "tags": "${{ steps.weekly-version.outputs.image_name }}"\n - "id": "digest"\n "name": "Process image digest"\n "run": |\n arch=$(echo ${{ matrix.arch }} | tr "/" "_")\n echo "digest_$arch=${{ steps.build-push.outputs.digest }}" >> $GITHUB_OUTPUT\n "working-directory": "release"\n "strategy":\n "fail-fast": true\n "matrix":\n "include":\n - "arch": "linux/amd64"\n "runs_on":\n - "github-hosted-ubuntu-x64-small"\n - "arch": "linux/arm64"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n - "arch": "linux/arm"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n "loki-canary-manifest":\n "env":\n "BUILD_TIMEOUT": 60\n "needs":\n - "loki-canary-image"\n "runs-on": "ubuntu-latest"\n "steps":\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "name": "Publish multi-arch manifest"\n "run": |\n # Unfortunately there is no better way atm than having a separate named output for each digest\n echo 'linux/arm64 ${{ needs.loki-canary-image.outputs.image_digest_linux_amd64 }}'\n echo 'linux/amd64 ${{ needs.loki-canary-image.outputs.image_digest_linux_arm64 }}'\n echo 'linux/arm ${{ needs.loki-canary-image.outputs.image_digest_linux_arm }}'\n IMAGE=${{ needs.loki-canary-image.outputs.image_name }}:${{ needs.loki-canary-image.outputs.image_tag }}\n echo "Create multi-arch manifest for $IMAGE"\n docker buildx imagetools create -t $IMAGE \\n ${{ needs.loki-canary-image.outputs.image_name }}@${{ needs.loki-canary-image.outputs.image_digest_linux_amd64 }} \\n ${{ needs.loki-canary-image.outputs.image_name }}@${{ needs.loki-canary-image.outputs.image_digest_linux_arm64 }} \\n ${{ needs.loki-canary-image.outputs.image_name }}@${{ needs.loki-canary-image.outputs.image_digest_linux_arm }}\n docker buildx imagetools inspect $IMAGE\n "loki-image":\n "env":\n "BUILD_TIMEOUT": 60\n "GO_VERSION": "1.24.1"\n "IMAGE_PREFIX": "grafana"\n "RELEASE_LIB_REF": "main"\n "RELEASE_REPO": "grafana/loki"\n "needs":\n - "check"\n "outputs":\n "image_digest_linux_amd64": "${{ steps.digest.outputs.digest_linux_amd64 }}"\n "image_digest_linux_arm": "${{ steps.digest.outputs.digest_linux_arm }}"\n "image_digest_linux_arm64": "${{ steps.digest.outputs.digest_linux_arm64 }}"\n "image_name": "${{ steps.weekly-version.outputs.image_name }}"\n "image_tag": "${{ steps.weekly-version.outputs.image_version }}"\n "runs-on": "${{ matrix.runs_on }}"\n "steps":\n - "name": "pull release library code"\n "uses": "actions/checkout@v4"\n "with":\n "path": "lib"\n "ref": "${{ env.RELEASE_LIB_REF }}"\n "repository": "grafana/loki-release"\n - "name": "pull code to release"\n "uses": "actions/checkout@v4"\n "with":\n "path": "release"\n "repository": "${{ env.RELEASE_REPO }}"\n - "name": "setup node"\n "uses": "actions/setup-node@v4"\n "with":\n "node-version": 20\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "id": "weekly-version"\n "name": "Get weekly version"\n "run": |\n version=$(./tools/image-tag)\n echo "image_version=$version" >> $GITHUB_OUTPUT\n echo "image_name=${{ env.IMAGE_PREFIX }}/loki" >> $GITHUB_OUTPUT\n echo "image_full_name=${{ env.IMAGE_PREFIX }}/loki:$version" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "platform"\n "name": "Parse image platform"\n "run": |\n platform="$(echo "${{ matrix.arch }}" | sed "s/\(.*\)\/\(.*\)/\1-\2/")"\n echo "platform=${platform}" >> $GITHUB_OUTPUT\n echo "platform_short=$(echo ${{ matrix.arch }} | cut -d / -f 2)" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "build-push"\n "name": "Build and push"\n "timeout-minutes": "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n "uses": "docker/build-push-action@v6"\n "with":\n "build-args": |\n IMAGE_TAG=${{ steps.weekly-version.outputs.image_version }}\n GO_VERSION=${{ env.GO_VERSION }}\n "context": "release"\n "file": "release/cmd/loki/Dockerfile"\n "outputs": "push-by-digest=true,type=image,name=${{ steps.weekly-version.outputs.image_name }},push=true"\n "platforms": "${{ matrix.arch }}"\n "provenance": true\n "tags": "${{ steps.weekly-version.outputs.image_name }}"\n - "id": "digest"\n "name": "Process image digest"\n "run": |\n arch=$(echo ${{ matrix.arch }} | tr "/" "_")\n echo "digest_$arch=${{ steps.build-push.outputs.digest }}" >> $GITHUB_OUTPUT\n "working-directory": "release"\n "strategy":\n "fail-fast": true\n "matrix":\n "include":\n - "arch": "linux/amd64"\n "runs_on":\n - "github-hosted-ubuntu-x64-small"\n - "arch": "linux/arm64"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n - "arch": "linux/arm"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n "loki-manifest":\n "env":\n "BUILD_TIMEOUT": 60\n "needs":\n - "loki-image"\n "runs-on": "ubuntu-latest"\n "steps":\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "name": "Publish multi-arch manifest"\n "run": |\n # Unfortunately there is no better way atm than having a separate named output for each digest\n echo 'linux/arm64 ${{ needs.loki-image.outputs.image_digest_linux_amd64 }}'\n echo 'linux/amd64 ${{ needs.loki-image.outputs.image_digest_linux_arm64 }}'\n echo 'linux/arm ${{ needs.loki-image.outputs.image_digest_linux_arm }}'\n IMAGE=${{ needs.loki-image.outputs.image_name }}:${{ needs.loki-image.outputs.image_tag }}\n echo "Create multi-arch manifest for $IMAGE"\n docker buildx imagetools create -t $IMAGE \\n ${{ needs.loki-image.outputs.image_name }}@${{ needs.loki-image.outputs.image_digest_linux_amd64 }} \\n ${{ needs.loki-image.outputs.image_name }}@${{ needs.loki-image.outputs.image_digest_linux_arm64 }} \\n ${{ needs.loki-image.outputs.image_name }}@${{ needs.loki-image.outputs.image_digest_linux_arm }}\n docker buildx imagetools inspect $IMAGE\n "promtail-image":\n "env":\n "BUILD_TIMEOUT": 60\n "GO_VERSION": "1.24.1"\n "IMAGE_PREFIX": "grafana"\n "RELEASE_LIB_REF": "main"\n "RELEASE_REPO": "grafana/loki"\n "needs":\n - "check"\n "outputs":\n "image_digest_linux_amd64": "${{ steps.digest.outputs.digest_linux_amd64 }}"\n "image_digest_linux_arm": "${{ steps.digest.outputs.digest_linux_arm }}"\n "image_digest_linux_arm64": "${{ steps.digest.outputs.digest_linux_arm64 }}"\n "image_name": "${{ steps.weekly-version.outputs.image_name }}"\n "image_tag": "${{ steps.weekly-version.outputs.image_version }}"\n "runs-on": "${{ matrix.runs_on }}"\n "steps":\n - "name": "pull release library code"\n "uses": "actions/checkout@v4"\n "with":\n "path": "lib"\n "ref": "${{ env.RELEASE_LIB_REF }}"\n "repository": "grafana/loki-release"\n - "name": "pull code to release"\n "uses": "actions/checkout@v4"\n "with":\n "path": "release"\n "repository": "${{ env.RELEASE_REPO }}"\n - "name": "setup node"\n "uses": "actions/setup-node@v4"\n "with":\n "node-version": 20\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "id": "weekly-version"\n "name": "Get weekly version"\n "run": |\n version=$(./tools/image-tag)\n echo "image_version=$version" >> $GITHUB_OUTPUT\n echo "image_name=${{ env.IMAGE_PREFIX }}/promtail" >> $GITHUB_OUTPUT\n echo "image_full_name=${{ env.IMAGE_PREFIX }}/promtail:$version" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "platform"\n "name": "Parse image platform"\n "run": |\n platform="$(echo "${{ matrix.arch }}" | sed "s/\(.*\)\/\(.*\)/\1-\2/")"\n echo "platform=${platform}" >> $GITHUB_OUTPUT\n echo "platform_short=$(echo ${{ matrix.arch }} | cut -d / -f 2)" >> $GITHUB_OUTPUT\n "working-directory": "release"\n - "id": "build-push"\n "name": "Build and push"\n "timeout-minutes": "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n "uses": "docker/build-push-action@v6"\n "with":\n "build-args": |\n IMAGE_TAG=${{ steps.weekly-version.outputs.image_version }}\n GO_VERSION=${{ env.GO_VERSION }}\n "context": "release"\n "file": "release/clients/cmd/promtail/Dockerfile"\n "outputs": "push-by-digest=true,type=image,name=${{ steps.weekly-version.outputs.image_name }},push=true"\n "platforms": "${{ matrix.arch }}"\n "provenance": true\n "tags": "${{ steps.weekly-version.outputs.image_name }}"\n - "id": "digest"\n "name": "Process image digest"\n "run": |\n arch=$(echo ${{ matrix.arch }} | tr "/" "_")\n echo "digest_$arch=${{ steps.build-push.outputs.digest }}" >> $GITHUB_OUTPUT\n "working-directory": "release"\n "strategy":\n "fail-fast": true\n "matrix":\n "include":\n - "arch": "linux/amd64"\n "runs_on":\n - "github-hosted-ubuntu-x64-small"\n - "arch": "linux/arm64"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n - "arch": "linux/arm"\n "runs_on":\n - "github-hosted-ubuntu-arm64-small"\n "promtail-manifest":\n "env":\n "BUILD_TIMEOUT": 60\n "needs":\n - "promtail-image"\n "runs-on": "ubuntu-latest"\n "steps":\n - "name": "Set up Docker buildx"\n "uses": "docker/setup-buildx-action@v3"\n - "name": "Login to DockerHub (from Vault)"\n "uses": "grafana/shared-workflows/actions/dockerhub-login@main"\n - "name": "Publish multi-arch manifest"\n "run": |\n # Unfortunately there is no better way atm than having a separate named output for each digest\n echo 'linux/arm64 ${{ needs.promtail-image.outputs.image_digest_linux_amd64 }}'\n echo 'linux/amd64 ${{ needs.promtail-image.outputs.image_digest_linux_arm64 }}'\n echo 'linux/arm ${{ needs.promtail-image.outputs.image_digest_linux_arm }}'\n IMAGE=${{ needs.promtail-image.outputs.image_name }}:${{ needs.promtail-image.outputs.image_tag }}\n echo "Create multi-arch manifest for $IMAGE"\n docker buildx imagetools create -t $IMAGE \\n ${{ needs.promtail-image.outputs.image_name }}@${{ needs.promtail-image.outputs.image_digest_linux_amd64 }} \\n ${{ needs.promtail-image.outputs.image_name }}@${{ needs.promtail-image.outputs.image_digest_linux_arm64 }} \\n ${{ needs.promtail-image.outputs.image_name }}@${{ needs.promtail-image.outputs.image_digest_linux_arm }}\n docker buildx imagetools inspect $IMAGE\n"name": "Publish images"\n"on":\n "push":\n "branches":\n - "k[0-9]+*"\n - "main"\n "workflow_dispatch": {}\n"permissions":\n "contents": "write"\n "id-token": "write"\n "pull-requests": "write" | dataset_sample\yaml\grafana_loki\.github\workflows\images.yml | images.yml | YAML | 22,923 | 0.8 | 0.014842 | 0.007407 | react-lib | 387 | 2024-04-15T06:00:07.432112 | Apache-2.0 | false | a4cb6c9b7e39f07c3ef9b7c742573915 |
name: "Pull Request Labeler"\non:\n- pull_request_target\n\njobs:\n triage:\n permissions:\n contents: read\n pull-requests: write\n runs-on: ubuntu-latest\n steps:\n - uses: actions/labeler@v5\n with:\n repo-token: "${{ secrets.GITHUB_TOKEN }}"\n | dataset_sample\yaml\grafana_loki\.github\workflows\labeler.yml | labeler.yml | YAML | 268 | 0.7 | 0 | 0 | awesome-app | 601 | 2024-04-01T12:35:46.366473 | Apache-2.0 | false | d019afaa196616cff60cc71b80fd05e2 |
---\nname: lint-jsonnet\non: [pull_request]\n # pull_request:\n # paths: "production/**"\n\njobs:\n check-mixin:\n name: Check mixin jsonnet files\n runs-on: ubuntu-latest\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n - name: setup go\n uses: actions/setup-go@v5\n with:\n go-version: '1.24.2'\n - name: setup jsonnet\n run: |\n go install github.com/google/go-jsonnet/cmd/jsonnet@v0.20.0\n go install github.com/google/go-jsonnet/cmd/jsonnetfmt@v0.20.0\n go install github.com/google/go-jsonnet/cmd/jsonnet-lint@v0.20.0\n go install github.com/monitoring-mixins/mixtool/cmd/mixtool@16dc166166d91e93475b86b9355a4faed2400c18\n go install github.com/jsonnet-bundler/jsonnet-bundler/cmd/jb@v0.5.1\n - name: run linting\n run: make BUILD_IN_CONTAINER=false lint-jsonnet\n - name: check compiled mixin has been updated\n run: |\n make BUILD_IN_CONTAINER=false loki-mixin-check\n \n\n\n | dataset_sample\yaml\grafana_loki\.github\workflows\lint-jsonnet.yml | lint-jsonnet.yml | YAML | 1,014 | 0.8 | 0 | 0.071429 | react-lib | 616 | 2024-11-21T13:20:24.454907 | GPL-3.0 | false | 80b85710d492dcba2cb54f4071607e1b |
name: LogQL Analyzer\n\non:\n workflow_dispatch:\n release:\n types:\n - released\n\npermissions:\n contents: read\n id-token: write\n\njobs:\n analyze:\n runs-on: ubuntu-latest\n\n env:\n BUILD_TIMEOUT: 60\n IMAGE_PREFIX: "grafana"\n RELEASE_VERSION: "${{ github.event.release.tag_name || 'test' }}"\n steps:\n - uses: actions/checkout@v4\n with:\n fetch-tags: true\n path: loki\n\n - name: prepare\n id: prepare\n env:\n MAJOR_MINOR_VERSION_REGEXP: '([0-9]+\\.[0-9]+)'\n RELEASE_TAG_REGEXP: '^([0-9]+\\.[0-9]+\\.[0-9]+)$'\n working-directory: loki\n run: |\n echo "$(./tools/image-tag)" > .tag\n if [[ "$RELEASE_VERSION" == "test" ]]; then\n echo "RELEASE_VERSION is not set, using image tag"\n RELEASE_VERSION="$(cat .tag)"\n fi\n echo "RELEASE_VERSION: $RELEASE_VERSION"\n\n # if the tag matches the pattern `D.D.D` then RELEASE_NAME="D-D-x", otherwise RELEASE_NAME="next"\n RELEASE_NAME=$([[ $RELEASE_VERSION =~ $RELEASE_TAG_REGEXP ]] && echo $RELEASE_TAG | grep -oE $MAJOR_MINOR_VERSION_REGEXP | sed "s/\\./-/g" | sed "s/$/-x/" || echo "next")\n echo "RELEASE_NAME: $RELEASE_NAME"\n\n echo "release_version=${RELEASE_VERSION}" >> "$GITHUB_OUTPUT"\n echo "release_name=${RELEASE_NAME}" >> "$GITHUB_OUTPUT"\n\n - id: "get-github-app-token"\n name: "get github app token"\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n\n - name: "Set up QEMU"\n uses: "docker/setup-qemu-action@v3"\n - name: "set up docker buildx"\n uses: "docker/setup-buildx-action@v3"\n - name: "Login to DockerHub (from vault)"\n uses: "grafana/shared-workflows/actions/dockerhub-login@main"\n\n - name: "Build and push"\n timeout-minutes: "${{ fromJSON(env.BUILD_TIMEOUT) }}"\n uses: "docker/build-push-action@v6"\n with:\n build-args: "IMAGE_TAG=${{ steps.prepare.outputs.release_version }}"\n context: loki\n file: "loki/cmd/logql-analyzer/Dockerfile"\n platforms: "linux/amd64"\n push: true\n tags: "grafana/logql-analyzer:${{ steps.prepare.outputs.release_version }}"\n\n - name: Log in to Google Artifact Registry\n uses: grafana/shared-workflows/actions/login-to-gar@main\n with:\n registry: "us-docker.pkg.dev"\n environment: "prod"\n\n - name: Update to latest image\n env:\n GITHUB_TOKEN: ${{ steps.get-github-app-token.outputs.token }}\n RELEASE_NAME: ${{ steps.prepare.outputs.release_name }}\n RELEASE_VERSION: ${{ steps.prepare.outputs.release_version }}\n run: |\n set -e -o pipefail\n\n cat << EOF > config.json\n {\n "repo_name": "deployment_tools",\n "destination_branch": "master",\n "git_author_email": "119986603+updater-for-ci[bot]@users.noreply.github.com",\n "git_author_name": "version_bumper[bot]",\n "git_committer_email": "119986603+updater-for-ci[bot]@users.noreply.github.com",\n "git_committer_name": "version_bumper[bot]",\n "pull_request_branch_prefix": "logql-analyzer/updater",\n "pull_request_enabled": true,\n "pull_request_existing_strategy": "replace",\n "pull_request_title_prefix": "[logql-analyzer updater] ",\n "pull_request_message": "Add logql-analyzer version to ${RELEASE_VERSION} to supported versions",\n "update_jsonnet_attribute_configs": [\n {\n "file_path": "ksonnet/environments/logql-analyzer/supported-versions.libsonnet",\n "jsonnet_key": "${RELEASE_NAME}",\n "jsonnet_value": "grafana/logql-analyzer:${RELEASE_VERSION}-amd64",\n "upsert": true\n }\n ]\n }\n EOF\n\n docker run --rm \\n -e GITHUB_TOKEN="$GITHUB_TOKEN" \\n -e CONFIG_JSON="$(cat config.json)" us-docker.pkg.dev/grafanalabs-global/docker-deployment-tools-prod/updater |& tee updater-output.log\n | dataset_sample\yaml\grafana_loki\.github\workflows\logql-analyzer.yml | logql-analyzer.yml | YAML | 4,134 | 0.8 | 0.035088 | 0.01 | python-kit | 431 | 2024-06-02T22:22:40.828381 | BSD-3-Clause | false | 150a917fae2cdf6666e9906f9e88db93 |
name: Github repo and issue stats collection\non:\n schedule:\n - cron: "*/30 * * * *"\n\njobs:\n main:\n if: github.owner == 'grafana'\n runs-on: ubuntu-latest\n steps:\n - name: Checkout Actions\n uses: actions/checkout@v4\n with:\n repository: "grafana/grafana-github-actions"\n path: ./actions\n ref: main\n - name: Install Actions\n run: npm install --production --prefix ./actions\n - name: Run metrics collector\n uses: ./actions/metrics-collector\n with:\n metricsWriteAPIKey: ${{secrets.GRAFANA_MISC_STATS_API_KEY}}\n token: ${{secrets.GH_BOT_ACCESS_TOKEN}}\n | dataset_sample\yaml\grafana_loki\.github\workflows\metrics-collector.yml | metrics-collector.yml | YAML | 654 | 0.7 | 0.043478 | 0 | node-utils | 806 | 2024-05-16T22:54:27.515405 | GPL-3.0 | false | 11e90ea0eac17f3e122545abfd7da7cc |
name: operator-check-prepare-release-commit\n\non:\n pull_request:\n paths:\n - 'operator/**'\n branches:\n - main\n\njobs:\n check-commit:\n runs-on: ubuntu-latest\n if: |\n github.event.pull_request.head.ref == 'release-please--branches--main--components--operator' && \n contains(github.event.pull_request.title, 'chore( operator): community release')\n steps:\n - id: "get_github_app_token"\n name: Get GitHub Token\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n\n - name: Extract release version\n id: pr_semver\n env:\n PR_TITLE: ${{ github.event.pull_request.title }}\n run: |\n SEMVER=$(echo "$PR_TITLE" | sed -n 's/^chore( operator): community release \([0-9]\+\.[0-9]\+\.[0-9]\+\)$/\1/p')\n echo "semver=$SEMVER" >> $GITHUB_OUTPUT\n\n - name: Checkout code\n uses: actions/checkout@v4\n with:\n ref: main\n path: "release"\n\n - name: Check main commits for prepare release commit\n id: check_commit\n env:\n GH_TOKEN: ${{ steps.get_github_app_token.outputs.token }}\n working-directory: "release"\n run: |\n COMMIT=$(gh search commits "chore(operator): prepare community release v${{ steps.pr_semver.outputs.semver }}")\n if [ -n "$COMMIT" ]; then\n echo "Prepare release commit found."\n else\n echo "No prepare release commit found for the release version ${{ steps.pr_semver.outputs.semver }}"\n exit 1\n fi\n | dataset_sample\yaml\grafana_loki\.github\workflows\operator-check-prepare-release-commit.yml | operator-check-prepare-release-commit.yml | YAML | 1,695 | 0.8 | 0.078431 | 0 | node-utils | 926 | 2025-04-02T04:45:53.412724 | MIT | false | 40cad258a9e693865127e96051816c7f |
name: "Publish release on operator hub"\non:\n release:\n types: [published]\n\njobs:\n operator-hub-prod-release:\n if: startsWith(github.event.release.tag_name, 'operator/')\n uses: ./.github/workflows/operator-reusable-hub-release.yml\n with:\n org: redhat-openshift-ecosystem\n repo: community-operators-prod\n secrets:\n APP_ID: ${{ secrets.APP_ID }}\n APP_PRIVATE_KEY: ${{ secrets.APP_PRIVATE_KEY }}\n\n operator-hub-community-release:\n if: startsWith(github.event.release.tag_name, 'operator/')\n uses: ./.github/workflows/operator-reusable-hub-release.yml\n with:\n org: k8s-operatorhub\n repo: community-operators\n secrets:\n APP_ID: ${{ secrets.APP_ID }}\n APP_PRIVATE_KEY: ${{ secrets.APP_PRIVATE_KEY }}\n | dataset_sample\yaml\grafana_loki\.github\workflows\operator-publish-operator-hub.yml | operator-publish-operator-hub.yml | YAML | 763 | 0.7 | 0.08 | 0 | node-utils | 958 | 2025-03-13T16:55:43.142357 | MIT | false | 1fa0428234ea8595d8c03e9ba18517c7 |
name: operator-release-please\n\non:\n push:\n paths:\n - 'operator/**'\n branches:\n - main\n\npermissions:\n contents: write\n pull-requests: write\n # Necessary for grafana/shared-workflows/actions/dockerhub-login@main \n id-token: write\n\njobs:\n releasePlease:\n runs-on: ubuntu-latest\n outputs:\n release_created: ${{ steps.release.outputs.operator--release_created }}\n release_name: ${{ steps.release.outputs.operator--tag_name }}\n release_major: ${{ steps.release.outputs.operator--major }}\n release_minor: ${{ steps.release.outputs.operator--minor }}\n release_patch: ${{ steps.release.outputs.operator--patch }}\n steps:\n - id: "get_github_app_token"\n name: Get GitHub App Token\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - uses: googleapis/release-please-action@v4\n id: release\n with:\n path: operator\n config-file: operator/release-please-config.json\n token: ${{ steps.get_github_app_token.outputs.token }}\n publishImages:\n env:\n BUILD_TIMEOUT: 60\n IMAGE_PREFIX: "grafana"\n needs:\n - "releasePlease"\n runs-on: ubuntu-latest\n steps:\n - name: "Set up QEMU"\n uses: "docker/setup-qemu-action@v3"\n - name: "Set up docker buildx"\n uses: "docker/setup-buildx-action@v3"\n - name: "Login to DockerHub (from vault)"\n uses: "grafana/shared-workflows/actions/dockerhub-login@main"\n - name: "Build and push"\n timeout-minutes: ${{ env.BUILD_TIMEOUT }}\n uses: "docker/build-push-action@v6"\n with:\n context: "operator"\n file: "Dockerfile"\n platforms: "linux/amd64,linux/arm64,linux/arm"\n push: true\n tags: ${{ env.IMAGE_PREFIX }}/loki-operator:${{ needs.releasePlease.outputs.release_major }}.${{ needs.releasePlease.outputs.release_minor }}.${{ needs.releasePlease.outputs.release_patch }}\n publishRelease:\n needs:\n - "releasePlease"\n - "publishImages"\n runs-on: ubuntu-latest\n if: ${{ needs.releasePlease.outputs.release_created }}\n steps:\n - id: "get_github_app_token"\n name: Get GitHub App Token\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n - name: "publish release"\n env:\n GH_TOKEN: ${{ steps.get_github_app_token.outputs.token }}\n working-directory: "release"\n run: |\n gh release edit "${{ needs.releasePlease.outputs.release_name }}" --draft=false --latest=false | dataset_sample\yaml\grafana_loki\.github\workflows\operator-release-please.yml | operator-release-please.yml | YAML | 2,922 | 0.8 | 0.02381 | 0.012195 | react-lib | 351 | 2024-12-12T14:28:49.141827 | MIT | false | a7ac50a4a5c57d03692eafaa3acd68a8 |
name: Reusable - Create operator hub pull request\n\non:\n workflow_call:\n inputs:\n org:\n type: string\n required: true\n repo:\n type: string\n required: true\n secrets:\n APP_ID:\n required: true\n APP_PRIVATE_KEY:\n required: true\n\njobs:\n create-operator-pull-request:\n runs-on: ubuntu-latest\n steps:\n - id: "get_github_app_token"\n name: Get GitHub App Token\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n\n - name: Set redhat-openshift-ecosystem specific variables\n if: ${{ inputs.org == 'redhat-openshift-ecosystem' }}\n env:\n ocpDir: '-openshift'\n ocpSupportedVersions: 'v4.12'\n run: |\n echo "ocpDir=${ocpDir}" >> $GITHUB_ENV\n echo "ocpSupportedVersions=${ocpSupportedVersions}" >> $GITHUB_ENV\n\n - name: Set version as env variable\n env:\n TAG: ${{ github.ref_name }}\n run: |\n echo $TAG\n TAG=${TAG:10} # remove "operator/v" (prefix)\n echo version=${TAG} >> $GITHUB_ENV # update GitHub ENV vars\n\n - name: Sync fork\n env:\n GH_TOKEN: ${{ steps.get_github_app_token.outputs.token }}\n run: |\n # synchronizing the fork is fast, and avoids the need to fetch the full upstream repo\n # (fetching the upstream repo with "--depth 1" would lead to "shallow update not allowed"\n # error when pushing back to the origin repo)\n gh repo sync grafanabot/${{ inputs.repo }} \\n --source ${{ inputs.org }}/${{ inputs.repo }} \\n --force\n\n - name: Checkout operatorhub repo\n uses: actions/checkout@v4\n with:\n repository: grafanabot/${{ inputs.repo }}\n token: ${{ steps.get_github_app_token.outputs.token }}\n\n - name: Checkout loki to tmp/ directory\n uses: actions/checkout@v4\n with:\n repository: grafana/loki\n token: ${{ steps.get_github_app_token.outputs.token }}\n path: tmp/\n\n - name: Update version\n env:\n VERSION: ${{ env.version }}\n OCP_DIR: ${{ env.ocpDir || ''}}\n run: |\n mkdir operators/loki-operator/${VERSION}\n cp -R ./tmp/operator/bundle/community${OCP_DIR}/* operators/loki-operator/${VERSION}\n rm -f "operators/loki-operator/${VERSION}/bundle.Dockerfile"\n rm -rf ./tmp\n\n - name: Add OpenShift Supported versions to redhat catalog\n if: ${{ inputs.org == 'redhat-openshift-ecosystem' }}\n uses: fjogeleit/yaml-update-action@main\n with:\n valueFile: "operators/loki-operator/${{ env.version }}/metadata/annotations.yaml"\n propertyPath: "annotations['com.redhat.openshift.versions']"\n value: ${{ env.ocpSupportedVersions }}\n commitChange: false\n\n - name: Use CLA approved github bot\n run: |\n git config user.name grafanabot\n git config user.email 43478413+grafanabot@users.noreply.github.com\n\n - name: Create pull request against ${{ inputs.org }}/${{ inputs.repo }}\n env:\n VERSION: ${{ env.version }}\n GH_TOKEN: ${{ steps.get_github_app_token.outputs.token }}\n run: |\n message="Update the loki-operator to $VERSION"\n body="Release loki-operator \`$VERSION\`.\n\n cc @periklis @xperimental @JoaoBraveCoding @btaani @shwetaap\n "\n branch="update-loki-operator-to-${VERSION}"\n\n # gh pr create doesn't have a way to explicitly specify different head and base\n # repositories currently, but it will implicitly pick up the head from a different\n # repository if you set up a tracking branch\n\n git checkout -b $branch\n git add -A\n git commit -s -m "$message"\n git push -f --set-upstream origin $branch\n gh pr create --title "$message" \\n --body "$body" \\n --repo ${{ inputs.org }}/${{ inputs.repo }} \\n --base main\n | dataset_sample\yaml\grafana_loki\.github\workflows\operator-reusable-hub-release.yml | operator-reusable-hub-release.yml | YAML | 4,213 | 0.95 | 0.025424 | 0.057692 | vue-tools | 801 | 2024-07-28T13:19:02.205565 | GPL-3.0 | false | dbf26eff11fe41663dbf2572cccc4fc7 |
name: publish-technical-documentation-next\n\non:\n push:\n branches:\n - main\n paths:\n - "docs/sources/**"\n workflow_dispatch:\njobs:\n sync:\n if: github.repository == 'grafana/loki'\n permissions:\n contents: read\n id-token: write\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n - uses: grafana/writers-toolkit/publish-technical-documentation@publish-technical-documentation/v1\n with:\n website_directory: content/docs/loki/next\n | dataset_sample\yaml\grafana_loki\.github\workflows\publish-technical-documentation-next.yml | publish-technical-documentation-next.yml | YAML | 502 | 0.8 | 0.047619 | 0 | node-utils | 652 | 2024-12-31T15:37:44.075873 | GPL-3.0 | false | 80ddf993a19350d1f731efb408611c08 |
name: publish-technical-documentation-release\n\non:\n push:\n branches:\n - "release-*"\n tags:\n - "v[0-9]+.[0-9]+.[0-9]+"\n paths:\n - "docs/sources/**"\n workflow_dispatch:\njobs:\n sync:\n if: github.repository == 'grafana/loki'\n permissions:\n contents: read\n id-token: write\n runs-on: ubuntu-latest\n steps:\n - uses: actions/checkout@v4\n with:\n fetch-depth: 0\n - uses: grafana/writers-toolkit/publish-technical-documentation-release@publish-technical-documentation-release/v1\n with:\n release_tag_regexp: "^v(0|[1-9]\\d*)\\.(0|[1-9]\\d*)\\.(0|[1-9]\\d*)$"\n release_branch_regexp: "^release-(0|[1-9]\\d*)\\.(0|[1-9]\\d*)\\.x$"\n release_branch_with_patch_regexp: "^release-(0|[1-9]\\d*)\\.(0|[1-9]\\d*)\\.(0|[1-9]\\d*)$"\n website_directory: content/docs/loki\n | dataset_sample\yaml\grafana_loki\.github\workflows\publish-technical-documentation-release.yml | publish-technical-documentation-release.yml | YAML | 866 | 0.8 | 0.035714 | 0 | react-lib | 263 | 2024-02-23T21:36:19.552903 | MIT | false | 41b50b8c7685abb957377c3c341815e6 |
concurrency:\n group: "create-release-${{ github.sha }}"\nenv:\n BUILD_ARTIFACTS_BUCKET: "loki-build-artifacts"\n IMAGE_PREFIX: "grafana"\n PUBLISH_TO_GCS: false\n RELEASE_LIB_REF: "main"\n RELEASE_REPO: "grafana/loki"\n USE_GITHUB_APP_TOKEN: true\njobs:\n createRelease:\n if: "${{ fromJSON(needs.shouldRelease.outputs.shouldRelease) }}"\n needs:\n - "shouldRelease"\n outputs:\n draft: "${{ steps.check_release.outputs.draft }}"\n exists: "${{ steps.check_release.outputs.exists }}"\n isLatest: "${{ needs.shouldRelease.outputs.isLatest }}"\n name: "${{ needs.shouldRelease.outputs.name }}"\n sha: "${{ needs.shouldRelease.outputs.sha }}"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n repository: "${{ env.RELEASE_REPO }}"\n - name: "pull release library code"\n uses: "actions/checkout@v4"\n with:\n path: "lib"\n ref: "${{ env.RELEASE_LIB_REF }}"\n repository: "grafana/loki-release"\n - name: "setup node"\n uses: "actions/setup-node@v4"\n with:\n node-version: 20\n - name: "auth gcs"\n uses: "google-github-actions/auth@v2"\n with:\n credentials_json: "${{ secrets.GCS_SERVICE_ACCOUNT_KEY }}"\n - name: "Set up Cloud SDK"\n uses: "google-github-actions/setup-gcloud@v2"\n with:\n version: ">= 452.0.0"\n - id: "get_github_app_token"\n if: "${{ fromJSON(env.USE_GITHUB_APP_TOKEN) }}"\n name: "get github app token"\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - id: "github_app_token"\n name: "set github token"\n run: |\n if [[ "${USE_GITHUB_APP_TOKEN}" == "true" ]]; then\n echo "token=${{ steps.get_github_app_token.outputs.token }}" >> $GITHUB_OUTPUT\n else\n echo "token=${{ secrets.GH_TOKEN }}" >> $GITHUB_OUTPUT\n fi\n - name: "download binaries"\n run: |\n echo "downloading binaries to $(pwd)/dist"\n gsutil cp -r gs://${BUILD_ARTIFACTS_BUCKET}/${{ needs.shouldRelease.outputs.sha }}/dist .\n working-directory: "release"\n - env:\n GH_TOKEN: "${{ steps.github_app_token.outputs.token }}"\n id: "check_release"\n name: "check if release exists"\n run: |\n set +e\n isDraft="$(gh release view --json="isDraft" --jq=".isDraft" ${{ needs.shouldRelease.outputs.name }} 2>&1)"\n set -e\n if [[ "$isDraft" == "release not found" ]]; then\n echo "exists=false" >> $GITHUB_OUTPUT\n else\n echo "exists=true" >> $GITHUB_OUTPUT\n fi\n \n if [[ "$isDraft" == "true" ]]; then\n echo "draft=true" >> $GITHUB_OUTPUT\n fi\n working-directory: "release"\n - id: "release"\n if: "${{ !fromJSON(steps.check_release.outputs.exists) }}"\n name: "create release"\n run: |\n npm install\n npm exec -- release-please github-release \\n --draft \\n --release-type simple \\n --repo-url "${{ env.RELEASE_REPO }}" \\n --target-branch "${{ needs.shouldRelease.outputs.branch }}" \\n --token "${{ steps.github_app_token.outputs.token }}" \\n --shas-to-tag "${{ needs.shouldRelease.outputs.prNumber }}:${{ needs.shouldRelease.outputs.sha }}"\n working-directory: "lib"\n - env:\n GH_TOKEN: "${{ steps.github_app_token.outputs.token }}"\n id: "upload"\n name: "upload artifacts"\n run: |\n gh release upload --clobber ${{ needs.shouldRelease.outputs.name }} dist/*\n working-directory: "release"\n - if: "${{ fromJSON(env.PUBLISH_TO_GCS) }}"\n name: "release artifacts"\n uses: "google-github-actions/upload-cloud-storage@v2"\n with:\n destination: "${{ env.PUBLISH_BUCKET }}"\n parent: false\n path: "release/dist"\n process_gcloudignore: false\n createReleaseBranch:\n needs:\n - "publishRelease"\n outputs:\n branchExists: "${{ steps.create_branch.outputs.branch_exists }}"\n branchName: "${{ steps.create_branch.outputs.branch_name }}"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n repository: "${{ env.RELEASE_REPO }}"\n - id: "extract_branch"\n name: "extract branch name"\n run: |\n echo "branch=${GITHUB_HEAD_REF:-${GITHUB_REF#refs/heads/}}" >> $GITHUB_OUTPUT\n working-directory: "release"\n - id: "get_github_app_token"\n if: "${{ fromJSON(env.USE_GITHUB_APP_TOKEN) }}"\n name: "get github app token"\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - id: "github_app_token"\n name: "set github token"\n run: |\n if [[ "${USE_GITHUB_APP_TOKEN}" == "true" ]]; then\n echo "token=${{ steps.get_github_app_token.outputs.token }}" >> $GITHUB_OUTPUT\n else\n echo "token=${{ secrets.GH_TOKEN }}" >> $GITHUB_OUTPUT\n fi\n - env:\n GH_TOKEN: "${{ steps.github_app_token.outputs.token }}"\n VERSION: "${{ needs.publishRelease.outputs.name }}"\n id: "create_branch"\n name: "create release branch"\n run: |\n # Debug and clean the version variable\n echo "Original VERSION: $VERSION"\n \n # Remove all quotes (both single and double)\n VERSION=$(echo $VERSION | tr -d '"' | tr -d "'")\n echo "After removing quotes: $VERSION"\n \n # Extract version without the 'v' prefix if it exists\n VERSION="${VERSION#v}"\n echo "After removing v prefix: $VERSION"\n \n # Extract major and minor versions\n MAJOR=$(echo $VERSION | cut -d. -f1)\n MINOR=$(echo $VERSION | cut -d. -f2)\n echo "MAJOR: $MAJOR, MINOR: $MINOR"\n \n # Create branch name from template\n BRANCH_TEMPLATE="release-\${major}.\${minor}.x"\n BRANCH_NAME=${BRANCH_TEMPLATE//\$\{major\}/$MAJOR}\n BRANCH_NAME=${BRANCH_NAME//\$\{minor\}/$MINOR}\n \n echo "Checking if branch already exists: $BRANCH_NAME"\n \n # Check if branch exists\n if git ls-remote --heads origin $BRANCH_NAME | grep -q $BRANCH_NAME; then\n echo "Branch $BRANCH_NAME already exists, skipping creation"\n echo "branch_exists=true" >> $GITHUB_OUTPUT\n echo "branch_name=$BRANCH_NAME" >> $GITHUB_OUTPUT\n else\n echo "Creating branch: $BRANCH_NAME from tag: ${{ needs.publishRelease.outputs.name }}"\n \n # Create branch from the tag\n git fetch --tags\n git checkout "${{ steps.extract_branch.outputs.branch }}"\n git checkout -b $BRANCH_NAME\n git push -u origin $BRANCH_NAME\n \n echo "branch_exists=false" >> $GITHUB_OUTPUT\n echo "branch_name=$BRANCH_NAME" >> $GITHUB_OUTPUT\n fi\n working-directory: "release"\n publishDockerPlugins:\n needs:\n - "createRelease"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull release library code"\n uses: "actions/checkout@v4"\n with:\n path: "lib"\n ref: "${{ env.RELEASE_LIB_REF }}"\n repository: "grafana/loki-release"\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n repository: "${{ env.RELEASE_REPO }}"\n - name: "auth gcs"\n uses: "google-github-actions/auth@v2"\n with:\n credentials_json: "${{ secrets.GCS_SERVICE_ACCOUNT_KEY }}"\n - name: "Set up Cloud SDK"\n uses: "google-github-actions/setup-gcloud@v2"\n with:\n version: ">= 452.0.0"\n - name: "Set up QEMU"\n uses: "docker/setup-qemu-action@v3"\n - name: "set up docker buildx"\n uses: "docker/setup-buildx-action@v3"\n - name: "Login to DockerHub (from vault)"\n uses: "grafana/shared-workflows/actions/dockerhub-login@main"\n - name: "download and prepare plugins"\n run: |\n echo "downloading images to $(pwd)/plugins"\n gsutil cp -r gs://${BUILD_ARTIFACTS_BUCKET}/${{ needs.createRelease.outputs.sha }}/plugins .\n mkdir -p "release/clients/cmd/docker-driver"\n - name: "publish docker driver"\n uses: "./lib/actions/push-images"\n with:\n buildDir: "release/clients/cmd/docker-driver"\n imageDir: "plugins"\n imagePrefix: "${{ env.IMAGE_PREFIX }}"\n isLatest: "${{ needs.createRelease.outputs.isLatest }}"\n isPlugin: true\n publishImages:\n needs:\n - "createRelease"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull release library code"\n uses: "actions/checkout@v4"\n with:\n path: "lib"\n ref: "${{ env.RELEASE_LIB_REF }}"\n repository: "grafana/loki-release"\n - name: "auth gcs"\n uses: "google-github-actions/auth@v2"\n with:\n credentials_json: "${{ secrets.GCS_SERVICE_ACCOUNT_KEY }}"\n - name: "Set up Cloud SDK"\n uses: "google-github-actions/setup-gcloud@v2"\n with:\n version: ">= 452.0.0"\n - name: "Set up QEMU"\n uses: "docker/setup-qemu-action@v3"\n - name: "set up docker buildx"\n uses: "docker/setup-buildx-action@v3"\n - name: "Login to DockerHub (from vault)"\n uses: "grafana/shared-workflows/actions/dockerhub-login@main"\n - name: "download images"\n run: |\n echo "downloading images to $(pwd)/images"\n gsutil cp -r gs://${BUILD_ARTIFACTS_BUCKET}/${{ needs.createRelease.outputs.sha }}/images .\n - name: "publish docker images"\n uses: "./lib/actions/push-images"\n with:\n imageDir: "images"\n imagePrefix: "${{ env.IMAGE_PREFIX }}"\n isLatest: "${{ needs.createRelease.outputs.isLatest }}"\n publishRelease:\n needs:\n - "createRelease"\n - "publishImages"\n - "publishDockerPlugins"\n outputs:\n name: "${{ needs.createRelease.outputs.name }}"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n repository: "${{ env.RELEASE_REPO }}"\n - id: "get_github_app_token"\n if: "${{ fromJSON(env.USE_GITHUB_APP_TOKEN) }}"\n name: "get github app token"\n uses: "actions/create-github-app-token@v1"\n with:\n app-id: "${{ secrets.APP_ID }}"\n owner: "${{ github.repository_owner }}"\n private-key: "${{ secrets.APP_PRIVATE_KEY }}"\n - id: "github_app_token"\n name: "set github token"\n run: |\n if [[ "${USE_GITHUB_APP_TOKEN}" == "true" ]]; then\n echo "token=${{ steps.get_github_app_token.outputs.token }}" >> $GITHUB_OUTPUT\n else\n echo "token=${{ secrets.GH_TOKEN }}" >> $GITHUB_OUTPUT\n fi\n - env:\n GH_TOKEN: "${{ steps.github_app_token.outputs.token }}"\n if: "${{ !fromJSON(needs.createRelease.outputs.exists) || (needs.createRelease.outputs.draft && fromJSON(needs.createRelease.outputs.draft)) }}"\n name: "publish release"\n run: |\n gh release edit ${{ needs.createRelease.outputs.name }} --draft=false --latest=${{ needs.createRelease.outputs.isLatest }}\n working-directory: "release"\n shouldRelease:\n outputs:\n branch: "${{ steps.extract_branch.outputs.branch }}"\n isLatest: "${{ steps.should_release.outputs.isLatest }}"\n name: "${{ steps.should_release.outputs.name }}"\n prNumber: "${{ steps.should_release.outputs.prNumber }}"\n sha: "${{ steps.should_release.outputs.sha }}"\n shouldRelease: "${{ steps.should_release.outputs.shouldRelease }}"\n runs-on: "ubuntu-latest"\n steps:\n - name: "pull code to release"\n uses: "actions/checkout@v4"\n with:\n path: "release"\n repository: "${{ env.RELEASE_REPO }}"\n - name: "pull release library code"\n uses: "actions/checkout@v4"\n with:\n path: "lib"\n ref: "${{ env.RELEASE_LIB_REF }}"\n repository: "grafana/loki-release"\n - id: "extract_branch"\n name: "extract branch name"\n run: |\n echo "branch=${GITHUB_HEAD_REF:-${GITHUB_REF#refs/heads/}}" >> $GITHUB_OUTPUT\n working-directory: "release"\n - id: "should_release"\n name: "should a release be created?"\n uses: "./lib/actions/should-release"\n with:\n baseBranch: "${{ steps.extract_branch.outputs.branch }}"\nname: "create release"\n"on":\n push:\n branches:\n - "release-[0-9]+.[0-9]+.x"\n - "k[0-9]+"\n - "main"\npermissions:\n contents: "write"\n id-token: "write"\n pull-requests: "write" | dataset_sample\yaml\grafana_loki\.github\workflows\release.yml | release.yml | YAML | 12,719 | 0.8 | 0.048711 | 0.020528 | python-kit | 53 | 2023-08-11T02:42:44.834953 | BSD-3-Clause | false | b93d6992d515a3eebadcba213b7efc9b |
name: TruffleHog Secrets Scan\non: [pull_request]\njobs:\n TruffleHog:\n runs-on: ubuntu-latest\n steps:\n - name: Checkout code\n uses: actions/checkout@v4\n with:\n fetch-depth: 0\n - name: TruffleHog OSS\n uses: trufflesecurity/trufflehog@main\n with:\n path: ./\n base: ${{ github.event.repository.default_branch }}\n head: HEAD\n extra_args: --debug --only-verified\n | dataset_sample\yaml\grafana_loki\.github\workflows\secret-scanning.yml | secret-scanning.yml | YAML | 445 | 0.7 | 0 | 0 | vue-tools | 198 | 2024-12-17T04:47:07.834598 | GPL-3.0 | false | 11c2d120c7a3a8004e57558821c20212 |
name: Snyk Monitor Scanning\non:\n release:\n types: [published]\n push:\n branches:\n - 'main'\n - 'master'\n - 'release-[0-9]+.[0-9]+.x'\n workflow_dispatch:\n\njobs:\n snyk-scan-ci:\n uses: 'grafana/security-github-actions/.github/workflows/snyk_monitor.yml@main'\n secrets:\n SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}\n | dataset_sample\yaml\grafana_loki\.github\workflows\snyk.yml | snyk.yml | YAML | 335 | 0.7 | 0 | 0 | react-lib | 47 | 2024-07-04T01:42:21.862955 | GPL-3.0 | false | 4f12bac2495543ae40756c2f07d99aed |
name: syft-sbom-ci\n\non:\n release:\n types: [created]\n\njobs:\n syft-sbom:\n\n runs-on: ubuntu-latest\n\n steps:\n - name: Checkout\n uses: actions/checkout@v4\n \n - name: Anchore SBOM Action\n uses: anchore/sbom-action@v0.18.0\n with:\n artifact-name: ${{ github.event.repository.name }}-spdx.json\n\n | dataset_sample\yaml\grafana_loki\.github\workflows\syft-sbom-ci.yml | syft-sbom-ci.yml | YAML | 333 | 0.7 | 0 | 0 | node-utils | 527 | 2024-11-18T02:18:21.516415 | GPL-3.0 | false | f3880326592f738d347fdeb98bb6d25f |
require: rubocop-rspec\n\nAllCops:\n TargetRubyVersion: 2.7\n NewCops: disable\n Exclude:\n - 'bin/**'\n - 'test/**/*.rb'\n\nMetrics/BlockLength:\n Exclude:\n - 'Rakefile'\n - '**/*.rake'\n - 'spec/**/*.rb'\n Max: 60\nMetrics/MethodLength:\n Max: 50\nLayout/LineLength:\n Max: 120\nMetrics/ClassLength:\n Max: 150\nMetrics/AbcSize:\n Max: 35\nStyle/GuardClause:\n Enabled: false\nRSpec/ExampleLength:\n Max: 100\nRSpec/MultipleExpectations:\n Max: 12\nStyle/HashEachMethods:\n Enabled: true\nStyle/HashTransformKeys:\n Enabled: true\nStyle/HashTransformValues:\n Enabled: true\n | dataset_sample\yaml\grafana_loki\clients\cmd\fluentd\.rubocop.yml | .rubocop.yml | YAML | 573 | 0.95 | 0 | 0 | awesome-app | 111 | 2024-08-15T05:37:22.119395 | GPL-3.0 | false | c30e7bd3fff99bdbbcc26409e60365ca |
services:\n loki:\n build:\n context: ../../../../\n dockerfile: ./cmd/loki/Dockerfile\n image: grafana/loki:main\n ports:\n - 3100\n volumes:\n - ./fluentd.conf:/fluentd/etc/fluent.conf\n\n # Receive forwarded logs and send to /fluentd/logs/data.log and loki\n fluentd:\n build:\n context: ../../../../\n dockerfile: ./clients/cmd/fluentd/Dockerfile\n image: grafana/fluent-plugin-loki:main\n volumes:\n - ./fluentd.conf:/fluentd/etc/fluent.conf\n environment:\n - LOKI_URL\n depends_on:\n - loki\n\n # Read /var/log/syslog and send it to fluentd\n fluentbit:\n image: fluent/fluent-bit:4.0\n command: "/fluent-bit/bin/fluent-bit -c /srv/fluent-bit.conf"\n user: root\n volumes:\n - ./fluent-bit.conf:/srv/fluent-bit.conf\n - /var/log/syslog:/var/log/syslog:ro\n depends_on:\n - fluentd\n - loki\n | dataset_sample\yaml\grafana_loki\clients\cmd\fluentd\docker\docker-compose.yml | docker-compose.yml | YAML | 861 | 0.8 | 0 | 0.060606 | node-utils | 508 | 2024-04-13T00:14:26.284043 | Apache-2.0 | false | b93adcbc052f82bec39c5b460c946591 |
server:\n http_listen_port: 9080\n grpc_listen_port: 0\n log_level: "info"\n\npositions:\n filename: /tmp/positions.yaml\n\n# This bit indicates what Loki instance to write the logs to. We’ll inject the\n# details and credentials through environment variables\nclients:\n - url: https://${LOKI_TENANT_ID}:${LOKI_TOKEN}@${LOKI_HOST}/loki/api/v1/push\n\nscrape_configs:\n # Job name, that will be injected in each log line\n - job_name: ${JOB_NAME}\n\n# Apply relabel to keep Heroku internal labels\nrelabel_configs:\n - source_labels: ["__heroku_drain_host"]\n target_label: "host"\n - source_labels: ["__heroku_drain_app"]\n target_label: "app"\n - source_labels: ["__heroku_drain_proc"]\n target_label: "proc"\n\n # Main heroku target configuration\n heroku_drain:\n server:\n http_listen_address: 0.0.0.0\n # $PORT is a special environment variable that Heroku fills with\n # port that’s accessible from outside the container. We indicate promtail\n # to listen for Heroku logs in it.\n http_listen_port: ${PORT}\n log_level: info\n # Tag each log entry with our job name\n labels:\n job: ${JOB_NAME}\n | dataset_sample\yaml\grafana_loki\examples\promtail-heroku\config.yml | config.yml | YAML | 1,159 | 0.8 | 0.026316 | 0.272727 | vue-tools | 19 | 2023-08-20T13:01:45.146887 | BSD-3-Clause | false | 0d062d3b77f418af26aef57743445b2f |
# Heroku application configuration. It indicates heroku what to deploy\nbuild:\n docker:\n web: Dockerfile\n | dataset_sample\yaml\grafana_loki\examples\promtail-heroku\heroku.yml | heroku.yml | YAML | 108 | 0.8 | 0 | 0.25 | node-utils | 454 | 2024-08-15T00:53:29.306192 | GPL-3.0 | false | ad7d91dabdd1d0538d588a4f46014525 |
route:\n receiver: 'default-receiver'\n group_wait: 30s\n group_interval: 30m\n group_by: [ alertname ]\n\nreceivers:\n - name: 'default-receiver' | dataset_sample\yaml\grafana_loki\production\docker\config\alertmanager.yml | alertmanager.yml | YAML | 144 | 0.7 | 0 | 0 | node-utils | 418 | 2024-02-25T23:21:15.714612 | MIT | false | fc1fdd2a6f429570e615945c5716ab1a |
groups:\n - name: Sample Rule Group\n interval: 5s\n rules:\n - record: generated_logs:rate1m\n expr: sum by (http_method) (rate({job="generated-logs"}[1m]))\n labels:\n source: "recording rule"\n - record: scalar\n expr: 10\n labels:\n source: "static"\n - alert: NoGeneratedLogs\n expr: absent_over_time({job="generated-logs"}[1m])\n labels:\n source: "alerting rule"\n - alert: AlwaysFiring\n expr: absent_over_time({job="blah"}[1m])\n labels:\n source: "alerting rule" | dataset_sample\yaml\grafana_loki\production\docker\rules\docker\rules.yml | rules.yml | YAML | 572 | 0.7 | 0 | 0 | react-lib | 246 | 2025-05-10T21:02:56.343861 | MIT | false | 6b4a9b6cdcfe189463b9f38f1d3f115d |
auth_enabled: false\n\nserver:\n log_level: info\n http_listen_port: {{ env "NOMAD_PORT_http" }}\n grpc_listen_port: {{ env "NOMAD_PORT_grpc" }}\n\ncommon:\n replication_factor: 1\n # Tell Loki which address to advertise\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n ring:\n # Tell Loki which address to advertise in ring\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n kvstore:\n store: consul\n prefix: loki/\n consul:\n host: {{ env "attr.unique.network.ip-address" }}:8500\n\ningester:\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/wal\n flush_on_shutdown: true\n replay_memory_ceiling: "1G"\n\nschema_config:\n configs:\n - from: 2022-05-15\n store: tsdb\n object_store: s3\n schema: v13\n index:\n prefix: index_\n period: 24h\n\nstorage_config:\n boltdb_shipper:\n # Nomad ephemeral disk is used to store index and cache\n # it will try to preserve /alloc/data between job updates\n active_index_directory: {{ env "NOMAD_ALLOC_DIR" }}/data/index\n cache_location: {{ env "NOMAD_ALLOC_DIR" }}/data/index-cache\n\n aws:\n endpoint: https://s3.endpoint.com\n bucketnames: loki\n region: us-west-1\n access_key_id: ${S3_ACCESS_KEY_ID}\n secret_access_key: ${S3_SECRET_ACCESS_KEY}\n s3forcepathstyle: true\n\nlimits_config:\n reject_old_samples: true\n reject_old_samples_max_age: 168h\n\ncompactor:\n working_directory: {{ env "NOMAD_ALLOC_DIR" }}/compactor\n compaction_interval: 5m\n delete_request_store: s3\n retention_enabled: true\n\nruler:\n alertmanager_url: https://alertmanager.service.consul\n enable_alertmanager_v2: true\n enable_api: true\n external_url: https://loki.service.consul\n rule_path: {{ env "NOMAD_ALLOC_DIR" }}/tmp/rules\n storage:\n type: local\n local:\n directory: {{ env "NOMAD_TASK_DIR" }}/rules\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/ruler\n | dataset_sample\yaml\grafana_loki\production\nomad\loki\config.yml | config.yml | YAML | 1,840 | 0.8 | 0.013699 | 0.0625 | python-kit | 859 | 2024-02-11T13:27:35.290091 | BSD-3-Clause | false | fe1982cf3d7ba47471ed5013be1ce2f8 |
groups:\n - name: always-firing\n rules:\n - alert: fire\n expr: |\n 1 > 0\n for: 0m\n labels:\n severity: warning\n annotations:\n summary: test\n | dataset_sample\yaml\grafana_loki\production\nomad\loki\rules\fake\alerts.yml | alerts.yml | YAML | 200 | 0.7 | 0.090909 | 0 | python-kit | 147 | 2024-09-28T18:38:15.756473 | Apache-2.0 | false | 54c5b1ae3a28161338c7f436a49e9c4c |
auth_enabled: false\n\nserver:\n log_level: info\n http_listen_port: {{ env "NOMAD_PORT_http" }}\n grpc_listen_port: {{ env "NOMAD_PORT_grpc" }}\n # grpc_tls_config:\n # client_auth_type: "RequireAndVerifyClientCert"\n # client_ca_file: "/secrets/certs/CA.pem"\n # cert_file: "/secrets/certs/cert.pem"\n # key_file: "/secrets/certs/key.pem"\n\ncommon:\n replication_factor: 2\n # Tell Loki which address to advertise\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n # Failure domain\n # Must be the same as specified in job constraints\n instance_availability_zone: {{ env "node.unique.name" }}\n zone_awareness_enabled: true\n ring:\n # Tell Loki which address to advertise in ring\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n kvstore:\n store: consul\n prefix: loki/\n consul:\n host: {{ env "attr.unique.network.ip-address" }}:8500\n\n# ingester_client:\n# grpc_client_config:\n# grpc_compression: snappy\n# tls_enabled: true\n# tls_ca_path: "/secrets/certs/CA.pem"\n# tls_cert_path: "/secrets/certs/cert.pem"\n# tls_key_path: "/secrets/certs/key.pem"\n\ningester:\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/wal\n flush_on_shutdown: true\n replay_memory_ceiling: "1G"\n\n# query_scheduler:\n# grpc_client_config:\n# grpc_compression: snappy\n# tls_enabled: true\n# tls_ca_path: "/secrets/certs/CA.pem"\n# tls_cert_path: "/secrets/certs/cert.pem"\n# tls_key_path: "/secrets/certs/key.pem"\n\nfrontend:\n scheduler_address: loki-query-scheduler.service.consul:9096\n compress_responses: true\n log_queries_longer_than: 5s\n # grpc_client_config:\n # grpc_compression: snappy\n # tls_enabled: true\n # tls_ca_path: "/secrets/certs/CA.pem"\n # tls_cert_path: "/secrets/certs/cert.pem"\n # tls_key_path: "/secrets/certs/key.pem"\n\nfrontend_worker:\n scheduler_address: loki-query-scheduler.service.consul:9096\n # grpc_client_config:\n # grpc_compression: snappy\n # tls_enabled: true\n # tls_ca_path: "/secrets/certs/CA.pem"\n # tls_cert_path: "/secrets/certs/cert.pem"\n # tls_key_path: "/secrets/certs/key.pem"\n\nschema_config:\n configs:\n - from: 2022-05-15\n store: tsdb\n object_store: s3\n schema: v13\n index:\n prefix: index_\n period: 24h\n\nstorage_config:\n boltdb_shipper:\n # Nomad ephemeral disk is used to store index and cache\n # it will try to preserve /alloc/data between job updates\n active_index_directory: {{ env "NOMAD_ALLOC_DIR" }}/data/index\n cache_location: {{ env "NOMAD_ALLOC_DIR" }}/data/index-cache\n index_gateway_client:\n server_address: loki-index-gateway.service.consul:9097\n # grpc_client_config:\n # grpc_compression: snappy\n # tls_enabled: true\n # tls_ca_path: "/secrets/certs/CA.pem"\n # tls_cert_path: "/secrets/certs/cert.pem"\n # tls_key_path: "/secrets/certs/key.pem"\n\n aws:\n endpoint: https://minio.service.consul\n bucketnames: loki\n region: us-west-1\n access_key_id: ${S3_ACCESS_KEY_ID}\n secret_access_key: ${S3_SECRET_ACCESS_KEY}\n s3forcepathstyle: true\n\ncompactor:\n working_directory: {{ env "NOMAD_ALLOC_DIR" }}/compactor\n delete_request_store: s3\n compaction_interval: 24h\n retention_enabled: true\n\nruler:\n alertmanager_url: https://alertmanager.service.consul\n enable_alertmanager_v2: true\n enable_api: true\n external_url: https://loki-ruler.service.consul\n rule_path: {{ env "NOMAD_ALLOC_DIR" }}/tmp/rules\n storage:\n type: local\n local:\n directory: {{ env "NOMAD_TASK_DIR" }}/rules\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/ruler\n\nlimits_config:\n reject_old_samples: true\n reject_old_samples_max_age: 168h\n | dataset_sample\yaml\grafana_loki\production\nomad\loki-distributed\config.yml | config.yml | YAML | 3,649 | 0.8 | 0.007937 | 0.380531 | awesome-app | 575 | 2025-07-03T01:05:00.123228 | BSD-3-Clause | false | e4fee9ffc7a74460b75c5d581c62ca0a |
auth_enabled: false\n\nserver:\n log_level: info\n http_listen_port: {{ env "NOMAD_PORT_http" }}\n grpc_listen_port: {{ env "NOMAD_PORT_grpc" }}\n\ncommon:\n replication_factor: 1\n # Tell Loki which address to advertise\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n ring:\n # Tell Loki which address to advertise in ring\n instance_addr: {{ env "NOMAD_IP_grpc" }}\n kvstore:\n store: consul\n prefix: loki/\n consul:\n host: {{ env "attr.unique.network.ip-address" }}:8500\n\ningester:\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/wal\n flush_on_shutdown: true\n replay_memory_ceiling: "1G"\n\nschema_config:\n configs:\n - from: 2022-05-15\n store: tsdb\n object_store: s3\n schema: v13\n index:\n prefix: index_\n period: 24h\n\nstorage_config:\n boltdb_shipper:\n # Nomad ephemeral disk is used to store index and cache\n # it will try to preserve /alloc/data between job updates\n active_index_directory: {{ env "NOMAD_ALLOC_DIR" }}/data/index\n cache_location: {{ env "NOMAD_ALLOC_DIR" }}/data/index-cache\n\n aws:\n endpoint: https://minio.service.consul\n bucketnames: loki\n region: us-west-1\n access_key_id: ${S3_ACCESS_KEY_ID}\n secret_access_key: ${S3_SECRET_ACCESS_KEY}\n s3forcepathstyle: true\n\nlimits_config:\n reject_old_samples: true\n reject_old_samples_max_age: 168h\n\ncompactor:\n working_directory: {{ env "NOMAD_ALLOC_DIR" }}/compactor\n delete_request_store: s3\n compaction_interval: 5m\n retention_enabled: true\n\nruler:\n alertmanager_url: https://alertmanager.service.consul\n enable_alertmanager_v2: true\n enable_api: true\n external_url: https://loki.service.consul\n rule_path: {{ env "NOMAD_ALLOC_DIR" }}/tmp/rules\n storage:\n type: local\n local:\n directory: {{ env "NOMAD_TASK_DIR" }}/rules\n wal:\n dir: {{ env "NOMAD_ALLOC_DIR" }}/data/ruler\n | dataset_sample\yaml\grafana_loki\production\nomad\loki-simple\config.yml | config.yml | YAML | 1,845 | 0.8 | 0.013699 | 0.0625 | vue-tools | 370 | 2025-02-23T11:27:54.185340 | MIT | false | d26276fe301a0ef80b58ee5713aab04d |
apiVersion: 1\n\ndatasources:\n - name: gdev-testdata\n isDefault: true\n type: testdata\n - name: gdev-loki\n type: loki\n uid: gdev-loki\n access: proxy\n url: http://host.docker.internal:3100\n | dataset_sample\yaml\grafana_loki\tools\dev\kafka\provisioning\datasources\default.yml | default.yml | YAML | 205 | 0.8 | 0 | 0 | awesome-app | 913 | 2025-03-01T04:40:41.100401 | Apache-2.0 | false | 242cfe5efc5b30d7292c7757702acb81 |
services:\n consul:\n logging: &logging\n driver: loki-compose\n options:\n loki-url: "http://localhost:8001/loki/api/v1/push"\n loki-retries: "1"\n loki-tenant-id: "1"\n image: hashicorp/consul\n command: [ "agent", "-dev" ,"-client=0.0.0.0", "-log-level=info" ]\n ports:\n - 8500:8500\n\n minio:\n logging:\n <<: *logging\n image: minio/minio:RELEASE.2024-02-24T17-11-14Z\n entrypoint: sh\n command: -c 'mkdir -p /data/loki && /usr/bin/minio server --console-address :9001 /data'\n environment:\n - MINIO_ACCESS_KEY=loki\n - MINIO_SECRET_KEY=supersecret\n ports:\n - 9000:9000\n - 9001:9001\n volumes:\n - .data-minio:/data:delegated\n\n memcached:\n logging:\n <<: *logging\n image: memcached:1.6.38-alpine\n\n jaeger:\n logging:\n <<: *logging\n image: jaegertracing/all-in-one\n ports:\n - 16686:16686\n - "14268"\n\n distributor:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18001 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=distributor -server.http-listen-port=8001 -server.grpc-listen-port=9001"]\n depends_on:\n - ingester-1\n - ingester-2\n - consul\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=distributor\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8001:8001\n - 18001:18001\n volumes:\n - ./config:/loki/config\n\n ingester-1:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18002 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=ingester -server.http-listen-port=8002 -server.grpc-listen-port=9002"]\n depends_on:\n - consul\n - minio\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=ingester-1\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8002:8002\n - 18002:18002\n volumes:\n - ./config:/loki/config\n - .data-ingester-1:/data:delegated\n\n ingester-2:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18003 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=ingester -server.http-listen-port=8003 -server.grpc-listen-port=9003"]\n depends_on:\n - consul\n - minio\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=ingester-2\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8003:8003\n - 18003:18003\n volumes:\n - ./config:/loki/config\n - .data-ingester-2:/data:delegated\n\n querier:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18004 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=querier -server.http-listen-port=8004 -server.grpc-listen-port=9004 -querier.scheduler-address=query-scheduler:9009"]\n depends_on:\n - consul\n - minio\n - query-frontend\n - query-scheduler\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=querier\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8004:8004\n - 18004:18004\n volumes:\n - ./config:/loki/config\n - .data-querier:/data:delegated\n\n index-gateway:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18008 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=index-gateway -server.http-listen-port=8008 -server.grpc-listen-port=9008 -boltdb.shipper.query-ready-num-days=30"]\n depends_on:\n - consul\n - minio\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=index-gateway\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8008:8008\n - 18008:18008\n volumes:\n - ./config:/loki/config\n\n compactor:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18006 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=compactor -server.http-listen-port=8006 -server.grpc-listen-port=9006"]\n depends_on:\n - consul\n - minio\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=compactor\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8006:8006\n - 18006:18006\n volumes:\n - ./config:/loki/config\n - .data-compactor:/data:delegated\n\n query-frontend:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18007 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=query-frontend -server.http-listen-port=8007 -server.grpc-listen-port=9007 -frontend.scheduler-address=query-scheduler:9009 -log.level=debug"]\n depends_on:\n - consul\n - minio\n - query-scheduler\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=query-frontend\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8007:8007\n - 18007:18007\n volumes:\n - ./config:/loki/config\n\n query-scheduler:\n logging:\n <<: *logging\n build:\n context: .\n dockerfile: dev.dockerfile\n image: loki\n command: ["sh", "-c", "sleep 3 && exec ./dlv exec ./loki --listen=:18009 --headless=true --api-version=2 --accept-multiclient --continue -- -config.file=./config/loki.yaml -target=query-scheduler -server.http-listen-port=8009 -server.grpc-listen-port=9009 -log.level=debug"]\n depends_on:\n - consul\n - minio\n environment:\n - JAEGER_AGENT_HOST=jaeger\n - JAEGER_AGENT_PORT=6831\n - JAEGER_TAGS=app=query-scheduler\n - JAEGER_SAMPLER_TYPE=const\n - JAEGER_SAMPLER_PARAM=1\n ports:\n - 8009:8009\n - 18009:18009\n volumes:\n - ./config:/loki/config\n\n grafana:\n logging:\n <<: *logging\n image: grafana/grafana\n depends_on:\n - query-frontend\n - querier\n environment:\n - GF_PATHS_PROVISIONING=/etc/config/grafana/provisioning\n - GF_AUTH_ANONYMOUS_ENABLED=true\n - GF_AUTH_ANONYMOUS_ORG_ROLE=Admin\n ports:\n - 3000:3000\n volumes:\n - ./config/datasource.yaml:/etc/config/grafana/provisioning/datasources/ds.yaml\n\n log-gen:\n logging:\n <<: *logging\n image: mingrammer/flog\n command: ["-f", "json", "-l", "-d", "2s"]\n depends_on:\n - distributor\n\n log-gen-2:\n logging:\n driver: loki-compose\n options:\n loki-url: "http://localhost:8001/loki/api/v1/push"\n loki-retries: "1"\n loki-tenant-id: "2"\n image: mingrammer/flog\n command: ["-f", "json", "-l", "-d", "2s"]\n depends_on:\n - distributor\n | dataset_sample\yaml\grafana_loki\tools\dev\loki-tsdb-storage-s3\docker-compose.yml | docker-compose.yml | YAML | 7,841 | 0.8 | 0 | 0 | node-utils | 267 | 2024-09-28T06:49:50.280787 | Apache-2.0 | false | 05570f308e26e5de8405136a2089c6ee |
services:\n zookeeper:\n image: wurstmeister/zookeeper\n ports:\n - "2181:2181"\n kafka:\n image: wurstmeister/kafka\n ports:\n - "9092"\n environment:\n DOCKER_API_VERSION: 1.22\n KAFKA_ADVERTISED_HOST_NAME: host.docker.internal\n KAFKA_ZOOKEEPER_CONNECT: zookeeper:2181\n volumes:\n - /var/run/docker.sock:/var/run/docker.sock\n | dataset_sample\yaml\grafana_loki\tools\kafka\plain\docker-compose.yml | docker-compose.yml | YAML | 365 | 0.7 | 0 | 0 | python-kit | 674 | 2024-10-01T15:55:49.272190 | MIT | false | 156eeef54967873affaec7fcd7bb70e6 |
services:\n zookeeper:\n image: confluentinc/cp-zookeeper:latest\n ports:\n - "22181:22181"\n environment:\n ZOOKEEPER_SERVER_ID: 1\n ZOOKEEPER_CLIENT_PORT: 22181\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/secrets/zookeeper.jaas.conf\n -Dzookeeper.authProvider.1=org.apache.zookeeper.server.auth.SASLAuthenticationProvider\n -Dzookeeper.requireClientAuthScheme=sasl\n volumes:\n - ./conf:/etc/kafka/secrets\n\n kafka:\n image: confluentinc/cp-kafka:latest\n depends_on:\n - zookeeper\n ports:\n - "29092:9092"\n environment:\n KAFKA_BROKER_ID: 1\n KAFKA_ZOOKEEPER_CONNECT: zookeeper:22181\n KAFKA_ADVERTISED_LISTENERS: SASL_PLAINTEXT://kafka:9092\n KAFKA_SECURITY_INTER_BROKER_PROTOCOL: SASL_PLAINTEXT\n KAFKA_SASL_MECHANISM_INTER_BROKER_PROTOCOL: PLAIN\n KAFKA_SASL_ENABLED_MECHANISMS: PLAIN\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/secrets/kafka.jaas.conf\n volumes:\n - ./conf:/etc/kafka/secrets\n - /var/run/docker.sock:/var/run/docker.sock\n | dataset_sample\yaml\grafana_loki\tools\kafka\sasl-plain\docker-compose.yml | docker-compose.yml | YAML | 1,072 | 0.95 | 0 | 0 | python-kit | 415 | 2023-12-01T00:28:56.414530 | MIT | false | 824fc4f1c29d5edf11a48c94c38ef9e6 |
services:\n zookeeper:\n image: confluentinc/cp-zookeeper:latest\n ports:\n - "22181:22181"\n environment:\n ZOOKEEPER_SERVER_ID: 1\n ZOOKEEPER_CLIENT_PORT: 22181\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/secrets/zookeeper.jaas.conf\n -Dzookeeper.authProvider.1=org.apache.zookeeper.server.auth.SASLAuthenticationProvider\n -Dzookeeper.requireClientAuthScheme=sasl\n volumes:\n - ./conf:/etc/kafka/secrets\n\n kafka:\n image: confluentinc/cp-kafka:latest\n depends_on:\n - zookeeper\n ports:\n - "29092:9092"\n environment:\n KAFKA_BROKER_ID: 1\n KAFKA_ZOOKEEPER_CONNECT: zookeeper:22181\n KAFKA_ADVERTISED_LISTENERS: SASL_PLAINTEXT://kafka:9092\n KAFKA_SECURITY_INTER_BROKER_PROTOCOL: SASL_PLAINTEXT\n KAFKA_SASL_MECHANISM_INTER_BROKER_PROTOCOL: SCRAM-SHA-512\n KAFKA_SASL_ENABLED_MECHANISMS: SCRAM-SHA-512\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/secrets/kafka.jaas.conf\n volumes:\n - ./conf:/etc/kafka/secrets\n - /var/run/docker.sock:/var/run/docker.sock\n | dataset_sample\yaml\grafana_loki\tools\kafka\sasl-scram\docker-compose.yml | docker-compose.yml | YAML | 1,088 | 0.95 | 0 | 0 | vue-tools | 68 | 2024-10-07T15:22:20.651050 | GPL-3.0 | false | 173e31f048489c252007fc97f7cb6baa |
services:\n zookeeper:\n image: confluentinc/cp-zookeeper:latest\n ports:\n - "22181:22181"\n environment:\n ZOOKEEPER_SERVER_ID: 1\n ZOOKEEPER_CLIENT_PORT: 22181\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/secrets/zookeeper.jaas.conf\n -Dzookeeper.authProvider.1=org.apache.zookeeper.server.auth.SASLAuthenticationProvider\n -Dzookeeper.requireClientAuthScheme=sasl\n volumes:\n - ./conf:/etc/kafka/secrets\n\n kafka:\n image: confluentinc/cp-kafka:latest\n depends_on:\n - zookeeper\n ports:\n - "29092:9092"\n environment:\n KAFKA_BROKER_ID: 1\n KAFKA_ZOOKEEPER_CONNECT: zookeeper:22181\n KAFKA_ADVERTISED_LISTENERS: SASL_SSL://kafka:9092\n KAFKA_SECURITY_INTER_BROKER_PROTOCOL: SASL_SSL\n KAFKA_SASL_MECHANISM_INTER_BROKER_PROTOCOL: PLAIN\n KAFKA_SASL_ENABLED_MECHANISMS: PLAIN\n KAFKA_SSL_KEYSTORE_FILENAME: kafka.broker.keystore.jks\n KAFKA_SSL_KEYSTORE_CREDENTIALS: broker_keystore_creds\n KAFKA_SSL_KEY_CREDENTIALS: broker_sslkey_creds\n KAFKA_SSL_TRUSTSTORE_FILENAME: kafka.broker.truststore.jks\n KAFKA_SSL_TRUSTSTORE_CREDENTIALS: broker_truststore_creds\n KAFKA_SSL_ENDPOINT_IDENTIFICATION_ALGORITHM: " "\n KAFKA_SSL_CLIENT_AUTH: requested\n KAFKA_OPTS: -Djava.security.auth.login.config=/etc/kafka/jaas/kafka.jaas.conf\n volumes:\n - ../secrets:/etc/kafka/secrets\n - ./conf:/etc/kafka/jaas\n | dataset_sample\yaml\grafana_loki\tools\kafka\sasl-ssl\docker-compose.yml | docker-compose.yml | YAML | 1,439 | 0.95 | 0 | 0 | node-utils | 517 | 2023-08-07T05:44:36.566532 | BSD-3-Clause | false | a20cb30e748b62b63958f5a96f7ecf62 |
services:\n zookeeper:\n image: confluentinc/cp-zookeeper:latest\n ports:\n - "22181:22181"\n environment:\n ZOOKEEPER_SERVER_ID: 1\n ZOOKEEPER_CLIENT_PORT: 22181\n\n kafka:\n image: confluentinc/cp-kafka:latest\n depends_on:\n - zookeeper\n ports:\n - "29092:9092"\n environment:\n KAFKA_BROKER_ID: 1\n KAFKA_ZOOKEEPER_CONNECT: zookeeper:22181\n KAFKA_ADVERTISED_LISTENERS: SSL://kafka:9092\n KAFKA_SECURITY_INTER_BROKER_PROTOCOL: SSL\n KAFKA_SSL_KEYSTORE_FILENAME: kafka.broker.keystore.jks\n KAFKA_SSL_KEYSTORE_CREDENTIALS: broker_keystore_creds\n KAFKA_SSL_KEY_CREDENTIALS: broker_sslkey_creds\n KAFKA_SSL_TRUSTSTORE_FILENAME: kafka.broker.truststore.jks\n KAFKA_SSL_TRUSTSTORE_CREDENTIALS: broker_truststore_creds\n KAFKA_SSL_ENDPOINT_IDENTIFICATION_ALGORITHM: " "\n KAFKA_SSL_CLIENT_AUTH: required\n volumes:\n - ../secrets:/etc/kafka/secrets\n | dataset_sample\yaml\grafana_loki\tools\kafka\ssl\docker-compose.yml | docker-compose.yml | YAML | 932 | 0.95 | 0 | 0 | python-kit | 269 | 2024-03-02T01:01:20.520713 | BSD-3-Clause | false | c1c760881d65ad57184488c1cd02706e |
language: go\narch:\n - amd64\n - ppc64le\ninstall:\n - go get -t\n - go get golang.org/x/tools/cmd/cover\n - go get github.com/mattn/goveralls\nscript:\n - go test -race -v ./...\nafter_script:\n - $HOME/gopath/bin/goveralls -service=travis-ci -repotoken $COVERALLS_TOKEN\n | dataset_sample\yaml\grafana_loki\vendor\dario.cat\mergo\.travis.yml | .travis.yml | YAML | 273 | 0.7 | 0 | 0 | python-kit | 702 | 2023-09-15T04:05:54.505475 | MIT | false | 326cc9a952683630b4cdd8b1eb75897f |
run:\n tests: true\n\noutput:\n print-issued-lines: false\n\nlinters:\n enable-all: true\n disable:\n - lll\n - gocyclo\n - dupl\n - gochecknoglobals\n - funlen\n - godox\n - wsl\n - gocognit\n - nolintlint\n - testpackage\n - godot\n - nestif\n - paralleltest\n - nlreturn\n - cyclop\n - gci\n - gofumpt\n - errorlint\n - exhaustive\n - wrapcheck\n - stylecheck\n - thelper\n - nonamedreturns\n - revive\n - dupword\n - exhaustruct\n - varnamelen\n - forcetypeassert\n - ireturn\n - maintidx\n - govet\n - testableexamples\n - musttag\n - depguard\n - goconst\n - perfsprint\n - mnd\n - predeclared\n - recvcheck\n - tenv\n - err113\n\nlinters-settings:\n gocyclo:\n min-complexity: 10\n dupl:\n threshold: 100\n goconst:\n min-len: 8\n min-occurrences: 3\n forbidigo:\n #forbid:\n # - (Must)?NewLexer$\n exclude_godoc_examples: false\n\n\nissues:\n exclude-dirs:\n - _examples\n max-per-linter: 0\n max-same: 0\n exclude-use-default: false\n exclude:\n # Captured by errcheck.\n - '^(G104|G204):'\n # Very commonly not checked.\n - 'Error return value of .(.*\.Help|.*\.MarkFlagRequired|(os\.)?std(out|err)\..*|.*Close|.*Flush|os\.Remove(All)?|.*printf?|os\.(Un)?Setenv). is not checked'\n - 'exported method (.*\.MarshalJSON|.*\.UnmarshalJSON|.*\.EntityURN|.*\.GoString|.*\.Pos) should have comment or be unexported'\n - 'composite literal uses unkeyed fields'\n - 'declaration of "err" shadows declaration'\n - 'should not use dot imports'\n - 'Potential file inclusion via variable'\n - 'should have comment or be unexported'\n - 'comment on exported var .* should be of the form'\n - 'at least one file in a package should have a package comment'\n - 'string literal contains the Unicode'\n - 'methods on the same type should have the same receiver name'\n - '_TokenType_name should be _TokenTypeName'\n - '`_TokenType_map` should be `_TokenTypeMap`'\n - 'rewrite if-else to switch statement'\n | dataset_sample\yaml\grafana_loki\vendor\github.com\alecthomas\chroma\v2\.golangci.yml | .golangci.yml | YAML | 2,023 | 0.95 | 0.022472 | 0.047619 | awesome-app | 461 | 2025-05-26T15:21:07.258288 | MIT | false | 7e4f704ac0d8d1132b26efd83937755c |
project_name: chroma\nrelease:\n github:\n owner: alecthomas\n name: chroma\nbrews:\n - install: bin.install "chroma"\nenv:\n - CGO_ENABLED=0\nbuilds:\n - goos:\n - linux\n - darwin\n - windows\n goarch:\n - arm64\n - amd64\n - "386"\n goarm:\n - "6"\n dir: ./cmd/chroma\n main: .\n ldflags: -s -w -X main.version={{.Version}} -X main.commit={{.Commit}} -X main.date={{.Date}}\n binary: chroma\narchives:\n - format: tar.gz\n name_template: "{{ .Binary }}-{{ .Version }}-{{ .Os }}-{{ .Arch }}{{ if .Arm }}v{{ .Arm }}{{ end }}"\n files:\n - COPYING\n - README*\nsnapshot:\n name_template: SNAPSHOT-{{ .Commit }}\nchecksum:\n name_template: "{{ .ProjectName }}-{{ .Version }}-checksums.txt"\n | dataset_sample\yaml\grafana_loki\vendor\github.com\alecthomas\chroma\v2\.goreleaser.yml | .goreleaser.yml | YAML | 738 | 0.7 | 0.029412 | 0 | python-kit | 964 | 2024-02-29T18:36:40.203373 | BSD-3-Clause | false | eb36c5939cc5f11126196868d7baf70d |
sudo: false\nlanguage: go\ninstall: go get -t -v ./...\ngo:\n - 1.2.x\n - 1.3.x\n - 1.4.x\n - 1.5.x\n - 1.6.x\n - 1.7.x\n - 1.8.x\n - 1.9.x\n - 1.10.x\n - 1.11.x\n | dataset_sample\yaml\grafana_loki\vendor\github.com\alecthomas\kingpin\v2\.travis.yml | .travis.yml | YAML | 179 | 0.7 | 0 | 0 | awesome-app | 488 | 2024-11-23T12:24:34.120010 | MIT | false | 163393f5fb25fc6a0b6dc85e3f0d7ad4 |
language: go\n\ngo:\n - "1.x"\n\nenv:\n - GO111MODULE=on\n\ninstall:\n - go get ./...\n\nscript:\n - go test ./...\n | dataset_sample\yaml\grafana_loki\vendor\github.com\armon\go-metrics\.travis.yml | .travis.yml | YAML | 107 | 0.7 | 0 | 0 | react-lib | 343 | 2023-10-22T08:50:30.132257 | MIT | false | f6c5d59e8922b63e6bd0c153fc7e6e3d |
language: go\ndist: xenial\ngo:\n - '1.10'\n - '1.11'\n - '1.12'\n - '1.13'\n - 'tip'\n\nscript:\n - go test -coverpkg=./... -coverprofile=coverage.info -timeout=5s\n - bash <(curl -s https://codecov.io/bash)\n | dataset_sample\yaml\grafana_loki\vendor\github.com\asaskevich\govalidator\.travis.yml | .travis.yml | YAML | 211 | 0.8 | 0 | 0 | vue-tools | 852 | 2024-01-15T21:16:58.918648 | GPL-3.0 | false | 4fb366cf760148d33c44700fde620a9a |
box: golang\nbuild:\n steps:\n - setup-go-workspace\n\n - script:\n name: go get\n code: |\n go version\n go get -t ./...\n\n - script:\n name: go test\n code: |\n go test -race -v ./...\n | dataset_sample\yaml\grafana_loki\vendor\github.com\asaskevich\govalidator\wercker.yml | wercker.yml | YAML | 238 | 0.7 | 0 | 0 | awesome-app | 839 | 2024-07-15T08:53:24.274945 | Apache-2.0 | false | b0676e8689976b4ad0d5a9347664a743 |
language: go\n\nos:\n - linux\n - osx\n - windows\n\ngo:\n - go1.13.x\n - go1.x\n\nservices:\n - xvfb\n\nbefore_install:\n - export DISPLAY=:99.0\n\nscript:\n - if [ "$TRAVIS_OS_NAME" = "linux" ]; then sudo apt-get install xsel; fi\n - go test -v .\n - if [ "$TRAVIS_OS_NAME" = "linux" ]; then sudo apt-get install xclip; fi\n - go test -v .\n | dataset_sample\yaml\grafana_loki\vendor\github.com\atotto\clipboard\.travis.yml | .travis.yml | YAML | 321 | 0.7 | 0.090909 | 0 | awesome-app | 894 | 2024-10-27T08:41:17.952556 | GPL-3.0 | false | a07df666b82ed543e17afd7ed9f8806f |
language: go\nsudo: true\ndist: bionic\n\nbranches:\n only:\n - main\n\nos:\n - linux\n - osx\n # Travis doesn't work with windows and Go tip\n #- windows\n\ngo:\n - tip\n\nmatrix:\n allow_failures:\n - go: tip\n\nbefore_install:\n - if [ "$TRAVIS_OS_NAME" = "windows" ]; then choco install make; fi\n - (cd /tmp/; go get golang.org/x/lint/golint)\n\nscript:\n - make go test -v ./...;\n\n | dataset_sample\yaml\grafana_loki\vendor\github.com\aws\smithy-go\.travis.yml | .travis.yml | YAML | 377 | 0.8 | 0.035714 | 0.095238 | react-lib | 995 | 2025-05-09T02:53:44.498512 | GPL-3.0 | false | b615be337e1992846d32c080fc02c3fe |
# NOTE: Please refer to https://aka.ms/azsdk/engsys/ci-yaml before editing this file.\ntrigger:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/azcore/\n - eng/\n\npr:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/azcore/\n - eng/\n\nextends:\n template: /eng/pipelines/templates/jobs/archetype-sdk-client.yml\n parameters:\n ServiceDirectory: azcore\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\azure-sdk-for-go\sdk\azcore\ci.yml | ci.yml | YAML | 504 | 0.8 | 0 | 0.037037 | react-lib | 487 | 2023-07-25T21:48:58.267164 | MIT | false | 8c91b6a80332e71c293a8aa5448000f1 |
# NOTE: Please refer to https://aka.ms/azsdk/engsys/ci-yaml before editing this file.\ntrigger:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/azidentity/\n\npr:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/azidentity/\n\nextends:\n template: /eng/pipelines/templates/jobs/archetype-sdk-client.yml\n parameters:\n CloudConfig:\n Public:\n SubscriptionConfigurations:\n - $(sub-config-identity-test-resources)\n EnableRaceDetector: true\n Location: westus2\n RunLiveTests: true\n ServiceDirectory: azidentity\n UsePipelineProxy: false\n\n ${{ if endsWith(variables['Build.DefinitionName'], 'weekly') }}:\n PersistOidcToken: true\n MatrixConfigs:\n - Name: managed_identity_matrix\n GenerateVMJobs: true\n Path: sdk/azidentity/managed-identity-matrix.json\n Selection: sparse\n MatrixReplace:\n - Pool=.*LINUXPOOL.*/azsdk-pool-mms-ubuntu-2204-identitymsi\n - OSVmImage=.*LINUXNEXTVMIMAGE.*/azsdk-pool-mms-ubuntu-2204-1espt\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\azure-sdk-for-go\sdk\azidentity\ci.yml | ci.yml | YAML | 1,201 | 0.8 | 0.021739 | 0.023256 | python-kit | 546 | 2023-10-14T01:24:39.156246 | Apache-2.0 | false | 1a377d92573c3c389b22c94165c1e87b |
# NOTE: Please refer to https://aka.ms/azsdk/engsys/ci-yaml before editing this file.\ntrigger:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/resourcemanager/compute/armcompute/\n\npr:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/resourcemanager/compute/armcompute/\n\nextends:\n template: /eng/pipelines/templates/jobs/archetype-sdk-client.yml\n parameters:\n IncludeRelease: true\n ServiceDirectory: 'resourcemanager/compute/armcompute'\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\azure-sdk-for-go\sdk\resourcemanager\compute\armcompute\v5\ci.yml | ci.yml | YAML | 593 | 0.8 | 0 | 0.038462 | node-utils | 604 | 2024-03-13T17:41:00.838089 | GPL-3.0 | false | e0093fa8c9e5b007b3dc3ba47f41255e |
# NOTE: Please refer to https://aka.ms/azsdk/engsys/ci-yaml before editing this file.\ntrigger:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/resourcemanager/network/armnetwork/\n\npr:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/resourcemanager/network/armnetwork/\n\nstages:\n- template: /eng/pipelines/templates/jobs/archetype-sdk-client.yml\n parameters:\n IncludeRelease: true\n ServiceDirectory: 'resourcemanager/network/armnetwork'\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\azure-sdk-for-go\sdk\resourcemanager\network\armnetwork\v4\ci.yml | ci.yml | YAML | 592 | 0.8 | 0 | 0.038462 | python-kit | 482 | 2024-03-05T07:26:08.980678 | BSD-3-Clause | false | 0a5cfefb9a071850cde6bb79d82f8c62 |
trigger:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/storage/azblob\n\npr:\n branches:\n include:\n - main\n - feature/*\n - hotfix/*\n - release/*\n paths:\n include:\n - sdk/storage/azblob\n\n\nextends:\n template: /eng/pipelines/templates/jobs/archetype-sdk-client.yml\n parameters:\n ServiceDirectory: 'storage/azblob'\n RunLiveTests: true\n UsePipelineProxy: false\n EnvVars:\n AZURE_CLIENT_ID: $(AZBLOB_CLIENT_ID)\n AZURE_TENANT_ID: $(AZBLOB_TENANT_ID)\n AZURE_CLIENT_SECRET: $(AZBLOB_CLIENT_SECRET)\n AZURE_SUBSCRIPTION_ID: $(AZBLOB_SUBSCRIPTION_ID)\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\azure-sdk-for-go\sdk\storage\azblob\ci.yml | ci.yml | YAML | 701 | 0.8 | 0 | 0 | vue-tools | 125 | 2025-03-20T08:55:03.528957 | GPL-3.0 | false | c6a7d61310749dd70aa764d988a0708f |
variables:\n GOPATH: '$(system.defaultWorkingDirectory)/work'\n sdkPath: '$(GOPATH)/src/github.com/$(build.repository.name)'\n\njobs:\n - job: 'goautorest'\n displayName: 'Run go-autorest CI Checks'\n\n strategy:\n matrix:\n Linux_Go113:\n vm.image: 'ubuntu-18.04'\n go.version: '1.13'\n Linux_Go114:\n vm.image: 'ubuntu-18.04'\n go.version: '1.14'\n\n pool:\n vmImage: '$(vm.image)'\n\n steps:\n - task: GoTool@0\n inputs:\n version: '$(go.version)'\n displayName: "Select Go Version"\n\n - script: |\n set -e\n mkdir -p '$(GOPATH)/bin'\n mkdir -p '$(sdkPath)'\n shopt -s extglob\n mv !(work) '$(sdkPath)'\n echo '##vso[task.prependpath]$(GOPATH)/bin'\n displayName: 'Create Go Workspace'\n\n - script: |\n set -e\n curl -sSL https://raw.githubusercontent.com/golang/dep/master/install.sh | sh\n dep ensure -v\n go install ./vendor/golang.org/x/lint/golint\n go get github.com/jstemmer/go-junit-report\n go get github.com/axw/gocov/gocov\n go get github.com/AlekSi/gocov-xml\n go get -u github.com/matm/gocov-html\n workingDirectory: '$(sdkPath)'\n displayName: 'Install Dependencies'\n\n - script: |\n go vet ./autorest/...\n go vet ./logger/...\n go vet ./tracing/...\n workingDirectory: '$(sdkPath)'\n displayName: 'Vet'\n\n - script: |\n go build -v ./autorest/...\n go build -v ./logger/...\n go build -v ./tracing/...\n workingDirectory: '$(sdkPath)'\n displayName: 'Build'\n\n - script: |\n set -e\n go test -race -v -coverprofile=coverage.txt -covermode atomic ./autorest/... ./logger/... ./tracing/... 2>&1 | go-junit-report > report.xml\n gocov convert coverage.txt > coverage.json\n gocov-xml < coverage.json > coverage.xml\n gocov-html < coverage.json > coverage.html\n workingDirectory: '$(sdkPath)'\n displayName: 'Run Tests'\n\n - script: grep -L -r --include *.go --exclude-dir vendor -P "Copyright (\d{4}|\(c\)) Microsoft" ./ | tee >&2\n workingDirectory: '$(sdkPath)'\n displayName: 'Copyright Header Check'\n failOnStderr: true\n condition: succeededOrFailed()\n\n - script: |\n gofmt -s -l -w ./autorest/. >&2\n gofmt -s -l -w ./logger/. >&2\n gofmt -s -l -w ./tracing/. >&2\n workingDirectory: '$(sdkPath)'\n displayName: 'Format Check'\n failOnStderr: true\n condition: succeededOrFailed()\n\n - script: |\n golint ./autorest/... >&2\n golint ./logger/... >&2\n golint ./tracing/... >&2\n workingDirectory: '$(sdkPath)'\n displayName: 'Linter Check'\n failOnStderr: true\n condition: succeededOrFailed()\n\n - task: PublishTestResults@2\n inputs:\n testRunner: JUnit\n testResultsFiles: $(sdkPath)/report.xml\n failTaskOnFailedTests: true\n\n - task: PublishCodeCoverageResults@1\n inputs:\n codeCoverageTool: Cobertura \n summaryFileLocation: $(sdkPath)/coverage.xml\n additionalCodeCoverageFiles: $(sdkPath)/coverage.html\n | dataset_sample\yaml\grafana_loki\vendor\github.com\Azure\go-autorest\azure-pipelines.yml | azure-pipelines.yml | YAML | 3,290 | 0.8 | 0 | 0 | awesome-app | 739 | 2024-12-03T06:29:18.692640 | GPL-3.0 | false | 022982803f7dfe5197a49605b582c4de |
coverage:\n status:\n project:\n default:\n threshold: 1%\n patch:\n default:\n target: 70%\nignore:\n - globoptions.go\n | dataset_sample\yaml\grafana_loki\vendor\github.com\bmatcuk\doublestar\v4\.codecov.yml | .codecov.yml | YAML | 143 | 0.7 | 0 | 0 | vue-tools | 271 | 2025-01-10T23:57:28.969546 | GPL-3.0 | false | eef6bd47bfea08b4d2b429c74f8d8c45 |
language: go\narch:\n - amd64\n - ppc64le\ngo:\n - 1.7.x\n - 1.8.x\n - 1.9.x\n - 1.10.x\n - 1.11.x\nscript: go test -v ./.\n | dataset_sample\yaml\grafana_loki\vendor\github.com\buger\jsonparser\.travis.yml | .travis.yml | YAML | 134 | 0.7 | 0 | 0 | awesome-app | 168 | 2025-04-11T04:00:41.272847 | GPL-3.0 | false | d8fc89aafdbb2c9b3fd06cf119a9df50 |
sudo: false\n\nlanguage: go\ngo:\n - 1.4\n - 1.5\n - 1.6\n - 1.7\n - 1.8\n - 1.9\n - tip\n\nscript:\n - go test -v\n | dataset_sample\yaml\grafana_loki\vendor\github.com\c2h5oh\datasize\.travis.yml | .travis.yml | YAML | 110 | 0.7 | 0 | 0 | python-kit | 256 | 2025-05-07T05:53:31.323701 | MIT | false | 4102c79add1d479eb531621e5651cd49 |
run:\n tests: false\n issues-exit-code: 0\n\nissues:\n include:\n - EXC0001\n - EXC0005\n - EXC0011\n - EXC0012\n - EXC0013\n\n max-issues-per-linter: 0\n max-same-issues: 0\n\nlinters:\n enable:\n - exhaustive\n - goconst\n - godot\n - godox\n - mnd\n - gomoddirectives\n - goprintffuncname\n - misspell\n - nakedret\n - nestif\n - noctx\n - nolintlint\n - prealloc\n - wrapcheck\n\n # disable default linters, they are already enabled in .golangci.yml\n disable:\n - errcheck\n - gosimple\n - govet\n - ineffassign\n - staticcheck\n - unused\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\bubbletea\.golangci-soft.yml | .golangci-soft.yml | YAML | 588 | 0.8 | 0 | 0.027778 | python-kit | 966 | 2024-04-14T22:59:14.911125 | Apache-2.0 | false | d18bb10526a864836e3624e6fdbdbf46 |
run:\n tests: false\n\nissues:\n include:\n - EXC0001\n - EXC0005\n - EXC0011\n - EXC0012\n - EXC0013\n\n max-issues-per-linter: 0\n max-same-issues: 0\n\nlinters:\n enable:\n - bodyclose\n - gofumpt\n - goimports\n - gosec\n - nilerr\n - revive\n - rowserrcheck\n - sqlclosecheck\n - tparallel\n - unconvert\n - unparam\n - whitespace\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\bubbletea\.golangci.yml | .golangci.yml | YAML | 365 | 0.85 | 0 | 0 | react-lib | 789 | 2024-03-25T05:55:19.144685 | MIT | false | 178921308c13a69179d19509003ab8e2 |
# yaml-language-server: $schema=https://goreleaser.com/static/schema-pro.json\nversion: 2\nincludes:\n - from_url:\n url: charmbracelet/meta/main/goreleaser-lib.yaml\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\bubbletea\.goreleaser.yml | .goreleaser.yml | YAML | 168 | 0.8 | 0 | 0.2 | vue-tools | 134 | 2024-12-11T17:12:25.629603 | GPL-3.0 | false | 08d3f964625b98698bdb0cb31718be37 |
run:\n tests: false\n issues-exit-code: 0\n\nissues:\n include:\n - EXC0001\n - EXC0005\n - EXC0011\n - EXC0012\n - EXC0013\n\n max-issues-per-linter: 0\n max-same-issues: 0\n\nlinters:\n enable:\n - exhaustive\n - goconst\n - godot\n - godox\n - mnd\n - gomoddirectives\n - goprintffuncname\n - misspell\n - nakedret\n - nestif\n - noctx\n - nolintlint\n - prealloc\n - wrapcheck\n\n # disable default linters, they are already enabled in .golangci.yml\n disable:\n - errcheck\n - gosimple\n - govet\n - ineffassign\n - staticcheck\n - unused\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\colorprofile\.golangci-soft.yml | .golangci-soft.yml | YAML | 588 | 0.8 | 0 | 0.027778 | vue-tools | 657 | 2023-08-31T15:33:51.513816 | Apache-2.0 | false | d18bb10526a864836e3624e6fdbdbf46 |
run:\n tests: false\n\nissues:\n include:\n - EXC0001\n - EXC0005\n - EXC0011\n - EXC0012\n - EXC0013\n\n max-issues-per-linter: 0\n max-same-issues: 0\n\nlinters:\n enable:\n - bodyclose\n - gofumpt\n - goimports\n - gosec\n - nilerr\n - revive\n - rowserrcheck\n - sqlclosecheck\n - tparallel\n - unconvert\n - unparam\n - whitespace\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\colorprofile\.golangci.yml | .golangci.yml | YAML | 365 | 0.85 | 0 | 0 | python-kit | 675 | 2023-12-09T05:10:20.717297 | Apache-2.0 | false | 178921308c13a69179d19509003ab8e2 |
includes:\n - from_url:\n url: charmbracelet/meta/main/goreleaser-lib.yaml\n\n# yaml-language-server: $schema=https://goreleaser.com/static/schema-pro.json\n\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\colorprofile\.goreleaser.yml | .goreleaser.yml | YAML | 159 | 0.8 | 0 | 0.25 | awesome-app | 966 | 2023-12-02T23:45:52.394893 | BSD-3-Clause | false | 7ff9ab22c2a905170aa831725a4f6c0d |
run:\n tests: false\n\nissues:\n include:\n - EXC0001\n - EXC0005\n - EXC0011\n - EXC0012\n - EXC0013\n\n max-issues-per-linter: 0\n max-same-issues: 0\n\nlinters:\n enable:\n - bodyclose\n - exhaustive\n - goconst\n - godot\n - godox\n - gofumpt\n - goimports\n - gomoddirectives\n - goprintffuncname\n - gosec\n - misspell\n - nakedret\n - nestif\n - nilerr\n - noctx\n - nolintlint\n - prealloc\n - revive\n - rowserrcheck\n - sqlclosecheck\n - tparallel\n - unconvert\n - unparam\n - whitespace\n - wrapcheck\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\lipgloss\.golangci.yml | .golangci.yml | YAML | 568 | 0.85 | 0 | 0 | vue-tools | 915 | 2024-08-19T23:13:14.151404 | BSD-3-Clause | false | d56745ebf392968313bd989c0761e6b6 |
# yaml-language-server: $schema=https://goreleaser.com/static/schema-pro.json\nversion: 2\nincludes:\n - from_url:\n url: charmbracelet/meta/main/goreleaser-lib.yaml\n | dataset_sample\yaml\grafana_loki\vendor\github.com\charmbracelet\lipgloss\.goreleaser.yml | .goreleaser.yml | YAML | 168 | 0.8 | 0 | 0.2 | vue-tools | 693 | 2023-10-10T01:48:00.631921 | BSD-3-Clause | false | 08d3f964625b98698bdb0cb31718be37 |
linters:\n enable:\n - exportloopref # Checks for pointers to enclosing loop variables\n - gofmt\n - goimports\n - gosec\n - ineffassign\n - misspell\n - nolintlint\n - revive\n - staticcheck\n - tenv # Detects using os.Setenv instead of t.Setenv since Go 1.17\n - unconvert\n - unused\n - vet\n - dupword # Checks for duplicate words in the source code\n disable:\n - errcheck\n\nlinters-settings:\n gosec:\n # The following issues surfaced when `gosec` linter\n # was enabled. They are temporarily excluded to unblock\n # the existing workflow, but still to be addressed by\n # future works.\n excludes:\n - G204\n - G305\n - G306\n - G402\n - G404\n\nrun:\n timeout: 3m\n skip-dirs:\n - vendor\n | dataset_sample\yaml\grafana_loki\vendor\github.com\containerd\fifo\.golangci.yml | .golangci.yml | YAML | 755 | 0.95 | 0.055556 | 0.117647 | python-kit | 92 | 2023-11-13T19:41:45.623188 | BSD-3-Clause | false | a258a68e2c3824fb81acf651aac27da2 |
linters:\n enable:\n - exportloopref # Checks for pointers to enclosing loop variables\n - gofmt\n - goimports\n - gosec\n - ineffassign\n - misspell\n - nolintlint\n - revive\n - staticcheck\n - tenv # Detects using os.Setenv instead of t.Setenv since Go 1.17\n - unconvert\n - unused\n - vet\n - dupword # Checks for duplicate words in the source code\n disable:\n - errcheck\n\nrun:\n timeout: 5m\n skip-dirs:\n - api\n - cluster\n - design\n - docs\n - docs/man\n - releases\n - reports\n - test # e2e scripts\n | dataset_sample\yaml\grafana_loki\vendor\github.com\containerd\log\.golangci.yml | .golangci.yml | YAML | 558 | 0.95 | 0.066667 | 0 | python-kit | 323 | 2024-10-03T09:26:38.720479 | BSD-3-Clause | false | b8375607b0dbb7da9b703c9efacd207f |
language: go\n\nos:\n - linux\n\ngo:\n - 1\n - 1.3\n - 1.4\n - 1.5\n - 1.6\n - 1.7.x\n - 1.8.x\n - tip\n\nbefore_install:\n - if ! go get github.com/golang/tools/cmd/cover; then go get golang.org/x/tools/cmd/cover; fi\n - go get github.com/axw/gocov/gocov\n - go get github.com/modocache/gover\n - go get github.com/mattn/goveralls\n\nscript:\n - go test -v -coverprofile=example.coverprofile ./example\n - go test -v -coverprofile=main.coverprofile\n - $HOME/gopath/bin/gover\n - $HOME/gopath/bin/goveralls -service=travis-ci -coverprofile=gover.coverprofile\n | dataset_sample\yaml\grafana_loki\vendor\github.com\d4l3k\messagediff\.travis.yml | .travis.yml | YAML | 552 | 0.7 | 0.038462 | 0 | vue-tools | 280 | 2023-12-23T22:22:38.298092 | MIT | false | b01e481d406ba13bcd2b168937d2bfd2 |
language: go\nsudo: false\n\ngo:\n - 1.10.x\n - 1.11.x\n - 1.12.x \n - 1.13.x\n - 1.14.x\n - 1.15.x\n\ncache:\n directories:\n - $HOME/.cache/go-build\n - $HOME/gopath/pkg/mod\n\nenv:\n global:\n - GO111MODULE=on\n\nbefore_install:\n - go get github.com/mattn/goveralls\n - go get golang.org/x/tools/cmd/cover\n - go get golang.org/x/tools/cmd/goimports\n - go get golang.org/x/lint/golint\nscript:\n - gofiles=$(find ./ -name '*.go') && [ -z "$gofiles" ] || unformatted=$(goimports -l $gofiles) && [ -z "$unformatted" ] || (echo >&2 "Go files must be formatted with gofmt. Following files has problem:\n $unformatted" && false)\n - golint ./... # This won't break the build, just show warnings\n - $HOME/gopath/bin/goveralls -service=travis-ci\n | dataset_sample\yaml\grafana_loki\vendor\github.com\dimchansky\utfbom\.travis.yml | .travis.yml | YAML | 742 | 0.95 | 0 | 0 | python-kit | 718 | 2023-10-04T12:34:46.019913 | Apache-2.0 | false | 3b8947c1a963469c966969cc983aa615 |
linters:\n enable:\n - bodyclose\n - dupword # Checks for duplicate words in the source code\n - gofmt\n - goimports\n - ineffassign\n - misspell\n - revive\n - staticcheck\n - unconvert\n - unused\n - vet\n disable:\n - errcheck\n\nrun:\n deadline: 2m\n | dataset_sample\yaml\grafana_loki\vendor\github.com\distribution\reference\.golangci.yml | .golangci.yml | YAML | 275 | 0.95 | 0.055556 | 0 | awesome-app | 923 | 2024-05-21T13:41:51.042530 | BSD-3-Clause | false | bf3404c60cd0bd42f202dc7ddfd34a58 |
dependencies:\n post:\n # install golint\n - go get golang.org/x/lint/golint\n\ntest:\n pre:\n # run analysis before tests\n - go vet ./...\n - test -z "$(golint ./... | tee /dev/stderr)"\n - test -z "$(gofmt -s -l . | tee /dev/stderr)"\n | dataset_sample\yaml\grafana_loki\vendor\github.com\docker\go-units\circle.yml | circle.yml | YAML | 247 | 0.8 | 0 | 0.2 | react-lib | 523 | 2024-11-05T08:00:27.360971 | BSD-3-Clause | false | c943afaea172b047085823d6e7e87fd8 |
kind: pipeline\nname: default\n\nsteps:\n- name: build\n image: golang:1.11\n commands:\n - go test -v ./...\n | dataset_sample\yaml\grafana_loki\vendor\github.com\drone\envsubst\.drone.yml | .drone.yml | YAML | 105 | 0.7 | 0 | 0 | python-kit | 443 | 2025-02-27T21:12:21.561693 | BSD-3-Clause | false | e52fdb1c97e4ffa9d322e45171a488c5 |
sudo: false\nlanguage: go\ngo_import_path: github.com/dustin/go-humanize\ngo:\n - 1.13.x\n - 1.14.x\n - 1.15.x\n - 1.16.x\n - stable\n - master\nmatrix:\n allow_failures:\n - go: master\n fast_finish: true\ninstall:\n - # Do nothing. This is needed to prevent default install action "go get -t -v ./..." from happening here (we want it to happen inside script step).\nscript:\n - diff -u <(echo -n) <(gofmt -d -s .)\n - go vet .\n - go install -v -race ./...\n - go test -v -race ./...\n | dataset_sample\yaml\grafana_loki\vendor\github.com\dustin\go-humanize\.travis.yml | .travis.yml | YAML | 482 | 0.95 | 0 | 0 | react-lib | 511 | 2023-08-30T22:28:10.508414 | Apache-2.0 | false | 41f052dec02291a32a59e5bc9ae5cd6b |
language: go\n\ngo:\n - 1.x\n\nbefore_install:\n - go test -v\n\nscript:\n - go test -race -coverprofile=coverage.txt -covermode=atomic\n\nafter_success:\n - bash <(curl -s https://codecov.io/bash) | dataset_sample\yaml\grafana_loki\vendor\github.com\emicklei\go-restful\v3\.travis.yml | .travis.yml | YAML | 189 | 0.8 | 0 | 0 | awesome-app | 274 | 2023-09-01T09:10:31.138026 | Apache-2.0 | false | 20ab9ad977d4a5252204f66008d029a1 |
linters:\n enable-all: true\n disable:\n - golint\n - interfacer\n - scopelint\n - maligned\n - rowserrcheck\n - funlen\n - depguard\n - goerr113\n - exhaustivestruct\n - testpackage\n - gochecknoglobals\n - wrapcheck\n - forbidigo\n - ifshort\n - cyclop\n - gomoddirectives\nlinters-settings:\n exhaustive:\n default-signifies-exhaustive: true\nissues:\n exclude-use-default: false\n | dataset_sample\yaml\grafana_loki\vendor\github.com\erikgeiser\coninput\.golangci.yml | .golangci.yml | YAML | 415 | 0.7 | 0 | 0 | vue-tools | 96 | 2024-06-29T15:42:33.533825 | Apache-2.0 | false | d67d01eae48ae3fa3717bf3902f0cd9b |
freebsd_task:\n name: 'FreeBSD'\n freebsd_instance:\n image_family: freebsd-14-2\n install_script:\n - pkg update -f\n - pkg install -y go\n test_script:\n # run tests as user "cirrus" instead of root\n - pw useradd cirrus -m\n - chown -R cirrus:cirrus .\n - FSNOTIFY_BUFFER=4096 sudo --preserve-env=FSNOTIFY_BUFFER -u cirrus go test -parallel 1 -race ./...\n - sudo --preserve-env=FSNOTIFY_BUFFER -u cirrus go test -parallel 1 -race ./...\n - FSNOTIFY_DEBUG=1 sudo --preserve-env=FSNOTIFY_BUFFER -u cirrus go test -parallel 1 -race -v ./...\n | dataset_sample\yaml\grafana_loki\vendor\github.com\fsnotify\fsnotify\.cirrus.yml | .cirrus.yml | YAML | 593 | 0.8 | 0 | 0.071429 | vue-tools | 364 | 2024-12-18T12:38:44.325251 | Apache-2.0 | false | c86faa673982e46351eecc79ccaf7198 |
# Do not delete linter settings. Linters like gocritic can be enabled on the command line.\n\nlinters-settings:\n depguard:\n rules:\n prevent_unmaintained_packages:\n list-mode: strict\n files:\n - $all\n - "!$test"\n allow:\n - $gostd\n - github.com/x448/float16\n deny:\n - pkg: io/ioutil\n desc: "replaced by io and os packages since Go 1.16: https://tip.golang.org/doc/go1.16#ioutil"\n dupl:\n threshold: 100\n funlen:\n lines: 100\n statements: 50\n goconst:\n ignore-tests: true\n min-len: 2\n min-occurrences: 3\n gocritic:\n enabled-tags:\n - diagnostic\n - experimental\n - opinionated\n - performance\n - style\n disabled-checks:\n - commentedOutCode\n - dupImport # https://github.com/go-critic/go-critic/issues/845\n - ifElseChain\n - octalLiteral\n - paramTypeCombine\n - whyNoLint\n gofmt:\n simplify: false\n goimports:\n local-prefixes: github.com/fxamacker/cbor\n golint:\n min-confidence: 0\n govet:\n check-shadowing: true\n lll:\n line-length: 140\n maligned:\n suggest-new: true\n misspell:\n locale: US\n staticcheck:\n checks: ["all"]\n\nlinters:\n disable-all: true\n enable:\n - asciicheck\n - bidichk\n - depguard\n - errcheck\n - exportloopref\n - goconst\n - gocritic\n - gocyclo\n - gofmt\n - goimports\n - goprintffuncname\n - gosec\n - gosimple\n - govet\n - ineffassign\n - misspell\n - nilerr\n - revive\n - staticcheck\n - stylecheck\n - typecheck\n - unconvert\n - unused\n\nissues:\n # max-issues-per-linter default is 50. Set to 0 to disable limit.\n max-issues-per-linter: 0\n # max-same-issues default is 3. Set to 0 to disable limit.\n max-same-issues: 0\n\n exclude-rules:\n - path: decode.go\n text: "string ` overflows ` has (\\d+) occurrences, make it a constant"\n - path: decode.go\n text: "string ` \\(range is \\[` has (\\d+) occurrences, make it a constant"\n - path: decode.go\n text: "string `, ` has (\\d+) occurrences, make it a constant"\n - path: decode.go\n text: "string ` overflows Go's int64` has (\\d+) occurrences, make it a constant"\n - path: decode.go\n text: "string `\\]\\)` has (\\d+) occurrences, make it a constant"\n - path: valid.go\n text: "string ` for type ` has (\\d+) occurrences, make it a constant"\n - path: valid.go\n text: "string `cbor: ` has (\\d+) occurrences, make it a constant"\n | dataset_sample\yaml\grafana_loki\vendor\github.com\fxamacker\cbor\v2\.golangci.yml | .golangci.yml | YAML | 2,505 | 0.95 | 0.009615 | 0.03 | vue-tools | 197 | 2025-05-27T02:26:37.970192 | GPL-3.0 | false | b4b3f828106d5df762e93a8f2c659fe3 |
linters-settings:\n staticcheck:\n checks: [\n "all",\n "-SA1019" # There are valid use cases of strings.Title\n ]\n nakedret:\n max-func-lines: 0 # Disallow any unnamed return statement\n\nlinters:\n enable:\n - deadcode\n - errcheck\n - gosimple\n - govet\n - ineffassign\n - staticcheck\n - structcheck\n - typecheck\n - unused\n - varcheck\n - nakedret\n - gofmt\n - rowserrcheck\n - unconvert\n - goimports\n - unparam\n | dataset_sample\yaml\grafana_loki\vendor\github.com\go-ini\ini\.golangci.yml | .golangci.yml | YAML | 468 | 0.95 | 0 | 0 | vue-tools | 772 | 2024-10-01T00:40:28.253162 | Apache-2.0 | false | 2bf07f311bbeb7f6312adbef335ea0e4 |
coverage:\n range: "60...95"\n status:\n project:\n default:\n threshold: 1%\n informational: true\n patch:\n defualt:\n only_pulls: true\n informational: true\n\ncomment:\n layout: 'diff'\n\ngithub_checks: false\n | dataset_sample\yaml\grafana_loki\vendor\github.com\go-ini\ini\codecov.yml | codecov.yml | YAML | 245 | 0.7 | 0 | 0 | awesome-app | 847 | 2023-10-15T21:34:55.899009 | MIT | false | 9de47d11b8a05b4e8e4eefa73bccb936 |
# Notes:\n# - Minimal appveyor.yml file is an empty file. All sections are optional.\n# - Indent each level of configuration with 2 spaces. Do not use tabs!\n# - All section names are case-sensitive.\n# - Section names should be unique on each level.\n\nversion: "1.3.0.{build}-alpha-{branch}"\n\nos: Visual Studio 2019\n\nbuild: off\n\nskip_tags: true\n\nclone_folder: c:\gopath\src\github.com\go-ole\go-ole\n\nenvironment:\n GOPATH: c:\gopath\n GOROOT: c:\go\n DOWNLOADPLATFORM: "x64"\n\nbefore_test:\n # - Download COM Server\n - ps: Start-FileDownload "https://github.com/go-ole/test-com-server/releases/download/v1.0.2/test-com-server-${env:DOWNLOADPLATFORM}.zip"\n - 7z e test-com-server-%DOWNLOADPLATFORM%.zip -oc:\gopath\src\github.com\go-ole\go-ole > NUL\n - c:\gopath\src\github.com\go-ole\go-ole\build\register-assembly.bat\n\ntest_script:\n - go test -v -cover ./...\n # go vet has false positives on unsafe.Pointer with windows/sys. Disabling since it is recommended to use go test instead.\n # - go vet ./...\n\nbranches:\n only:\n - master\n - v1.2\n - v1.1\n - v1.0\n\nmatrix:\n allow_failures:\n - environment:\n GOROOT: C:\go-x86\n DOWNLOADPLATFORM: "x86"\n - environment:\n GOROOT: C:\go118\n DOWNLOADPLATFORM: "x64"\n - environment:\n GOROOT: C:\go118-x86\n DOWNLOADPLATFORM: "x86"\n\ninstall:\n - go version\n - go env\n - go get -u golang.org/x/tools/cmd/cover\n - go get -u golang.org/x/tools/cmd/godoc\n - go get -u golang.org/x/tools/cmd/stringer\n\nbuild_script:\n - cd c:\gopath\src\github.com\go-ole\go-ole\n - go get -v -t ./...\n - go build\n\n# disable automatic tests\ntest: on\n\n# disable deployment\ndeploy: off\n | dataset_sample\yaml\grafana_loki\vendor\github.com\go-ole\go-ole\appveyor.yml | appveyor.yml | YAML | 1,659 | 0.8 | 0 | 0.185185 | vue-tools | 881 | 2024-12-30T15:48:28.952050 | BSD-3-Clause | false | 05a2874a338ceecd3807d54654cab2f5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.