Package Centre > Docker > Install
/docker/gitea/postgresql
/docker/gitea/gitea
| import os | |
| import sys | |
| sys.path.append(os.path.join(os.path.dirname(__file__), '..')) | |
| import cyglfw3 as glfw | |
| import time | |
| import math | |
| if not glfw.Init(): | |
| exit() |
| from __future__ import absolute_import | |
| from contextlib import contextmanager | |
| from random import choice | |
| from urlparse import urljoin | |
| import traceback | |
| import re | |
| import time | |
| import numpy | |
| import ujson as json | |
| import os |
| These URLs were redirected to when I attempted to download Malware Bytes. | |
| It attempted to download a similarly named (mb2...) executable (.exe) instead. | |
| http://www.reimagemac.com/mac/?tracking=revz2&banner=ak%20efix%20ron%20au%20cpi%204&adgroup=direct&ads_name=direct&keyword=malwarebytes.com&context=591a431e025ed400135f9163 | |
| http://7spzz.detect.005732.xyz/PCV816advancedmacALL.html | |
| http://7spzz.detect.005732.xyz/?sov=87986171&hid=bfndfdftfppfhfhn&&redid=39705&gsid=453&campaign_id=12&p_id=12255&id=XNSX.glob-r39705-t453&impid=de69b3ca-39cb-11e7-b4a4-12c26be3c49e | |
| http://www.advancedmactools.com//ytz/1/?x-context=M212EVOCLQD8D83Y&utm_source=mytzcps1&utm_campaign=mytzcps1&pxl=MYT1698_MYT1663_RUNT&utm_pubid=39705&x-at=de69b3ca-39cb-11e7-b4a4-12c26be3c49e | |
| http://eflzz.alldownloads.hapc.gdn/?sov=87986171&hid=brdndfdrtfppfhfhn&&redid=39705&gsid=453&campaign_id=12&p_id=12255&id=XNSX.glob-r39705-t453&impid=ea076c86-39cb-11e7-8b24-aa1f778d2780 | |
| http://all.shipyards.xyz/?sov=87986171&id=XNSX.glob-r39705-t453-&tov=637816&v=& |
| -----> Fetching set buildpack https://github.com/ddollar/heroku-buildpack-multi.git... done | |
| -----> Multipack app detected | |
| =====> Downloading Buildpack: https://github.com/heroku/heroku-buildpack-ruby.git | |
| =====> Detected Framework: Ruby | |
| -----> Compiling Ruby | |
| -----> Using Ruby version: ruby-2.2.2 | |
| -----> Installing dependencies using bundler 1.11.2 | |
| Your app was upgraded to bundler 1.11.2. | |
| Previously you had a successful deploy with bundler 1.9.7. | |
| from __future__ import absolute_import, print_function, unicode_literals | |
| from django.db import models, transaction | |
| from django.utils import six | |
| from django.apps import apps | |
| from django.core.exceptions import FieldDoesNotExist | |
| try: | |
| # Django 1.7 | |
| from django.contrib.admin.utils import NestedObjects | |
| except ImportError: | |
| # Django < 1.7 |
| var loadScript = function(url, callback) { | |
| /* | |
| JavaScript that will load the jQuery library on Google's CDN. | |
| We recommend this code: http://snipplr.com/view/18756/loadscript/. | |
| Once the jQuery library is loaded, the function passed as argument, | |
| callback, will be executed. | |
| */ | |
| var script = document.createElement("script"); | |
| script.type = "text/javascript"; |
| var IOS_NamePlayer = cc.Scene.extend({ | |
| layer: null, | |
| next_scene: null, | |
| text_field: null, | |
| placeholder: "Input text here", | |
| ctor: function() { | |
| this._super(); | |
| this.layer = cc.Layer.create(); |
| Process: python2.7 [557] | |
| Path: /Users/USER/*/python | |
| Identifier: python2.7 | |
| Version: ??? | |
| Code Type: X86-64 (Native) | |
| Parent Process: bash [443] | |
| Responsible: iTerm [427] | |
| User ID: 501 | |
| Date/Time: 2014-06-13 03:16:45.990 +1000 |
| from flask import Flask, Blueprint, Response, request, request_finished, request_started | |
| from flask.views import MethodView | |
| from flask.ext.security import Security, MongoEngineUserDatastore, UserMixin, RoleMixin, current_user, auth_required, login_required | |
| from flask.ext.security.utils import login_user, verify_password, encrypt_password | |
| from flask.ext.security.decorators import _check_token | |
| import mongoengine | |
| from mongoengine import StringField, BooleanField, DateTimeField, ListField, ReferenceField, LongField, ObjectIdField | |
| from flask.ext.mongoengine import MongoEngine, Document | |
| import json |