Note
Highlights information that users should take into account, even when skimming.
[!TIP]
Go to URL which has the video, open dev tools (usually F12) / inspect (Right Click > Inspect) in the browser and go to the Network tab.
Then reload the page.
In the network tab, search the following command using the search area. videomanifest?provider
https://github.com/actions/github-script?tab=readme-ov-file#use-esm-import
- uses: actions/github-script@60a0d83039c74a4aee543508d2ffcb1c3799cdea # v7.0.1
with:
github-token: ${{ github.token }}| gh run list --workflow="CodeQL" --limit 100 --json databaseId --jq ".[].databaseId" | ForEach-Object { gh run delete $_ } |
| terraform { | |
| required_version = ">= 1.9.6, < 2.0.0" | |
| required_providers { | |
| azapi = { | |
| source = "Azure/azapi" | |
| version = "2.4.0" | |
| } | |
| } | |
| } |
| # Author: Dariusz Porowski | |
| # GitHub: https://github.com/DariuszPorowski | |
| # License: MIT | |
| # 1. Create SP in Entra https://learn.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/service-principal-managed-identity?view=azure-devops#create-an-application-service-principal | |
| # 2. Add Entra SP to AzDO org https://learn.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/service-principal-managed-identity?view=azure-devops#2-add-and-manage-service-principals-in-an-azure-devops-organization | |
| # SP does not need to be assigned to any Azure Subscription if you do not plan to use it to access Azure Resources but requires extra config on the Azure login step ('allow-no-subscriptions: true') | |
| # 3. Assign Feed permissions in the AzDO Artifacts (via AzDO team, direct assignment not possible so far) https://learn.microsoft.com/en-us/azure/devops/artifacts/feeds/feed-permissions?view=azure-devops | |
| # `Reader` is fine for pulling private packages only | |
| # `Collaborator` if access to public packages |
| # Author: Dariusz Porowski | |
| # GitHub: https://github.com/DariuszPorowski | |
| # License: MIT | |
| # 1. Create SP in Entra https://learn.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/service-principal-managed-identity?view=azure-devops#create-an-application-service-principal | |
| # 2. Add Entra SP to AzDO org https://learn.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/service-principal-managed-identity?view=azure-devops#2-add-and-manage-service-principals-in-an-azure-devops-organization | |
| # SP does not need to be assigned to any Azure Subscription if you do not plan to use it to access Azure Resources but requires extra config on the Azure login step ('allow-no-subscriptions: true') | |
| # 3. Assign Feed permissions in the AzDO Artifacts (via AzDO team, direct assignment not possible so far) https://learn.microsoft.com/en-us/azure/devops/artifacts/feeds/feed-permissions?view=azure-devops | |
| # `Reader` is fine for pulling private packages only | |
| # `Collaborator` if access to public packages |
| git fetch -p; git branch -vv | ?{ $_ -match ': gone]' } | %{ $_.Trim().Split(' ')[0] } | %{ git branch -D $_ } |
| #!/bin/bash | |
| git fetch -p && for branch in `git branch -vv | grep ': gone]' | awk '{print $1}'`; do git branch -D $branch; done |