I hereby claim:
- I am chandima on github.
- I am chandi (https://keybase.io/chandi) on keybase.
- I have a public key ASCcONJmxcmCwzXAS8iXwWvK0OtRZCoUNRNoeC20EomnCAo
To claim this, I am signing this object:
{ | |
"@context": [ | |
"https://www.w3.org/ns/did/v1", | |
"https://w3id.org/security/suites/ed25519-2020/v1", | |
"https://w3id.org/security/suites/x25519-2020/v1" | |
], | |
"id": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | |
"verificationMethod": [{ | |
"id": "did:key:z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK#z6MkhaXgBZDvotDkL5257faiztiGiC2QtKLGpbnnEGta2doK", | |
"type": "Ed25519VerificationKey2020", |
{ | |
"issuer": { | |
"type": [ | |
"Profile" | |
], | |
"id": "did:key:z6Mkn957Vwed2zBLLZkYiDgoha3cm1KtSE3PeAryJf3T7Vwz", | |
"name": "K-Pop" | |
}, | |
"type": [ | |
"VerifiableCredential", |
// Core interfaces | |
import { | |
createAgent, | |
IDIDManager, | |
IResolver, | |
IDataStore, | |
IDataStoreORM, | |
IKeyManager, | |
ICredentialPlugin, | |
} from '@veramo/core' |
{ | |
"id": "did:key:z6MkuKADVvfkyVFLgk5MrbBfmvWE1EdiaBuS6vv5QSHdTm2n", | |
"verificationMethod": [ | |
{ | |
"id": "did:key:z6MkuKADVvfkyVFLgk5MrbBfmvWE1EdiaBuS6vv5QSHdTm2n#z6MkuKADVvfkyVFLgk5MrbBfmvWE1EdiaBuS6vv5QSHdTm2n", | |
"type": "Ed25519VerificationKey2018", | |
"controller": "did:key:z6MkuKADVvfkyVFLgk5MrbBfmvWE1EdiaBuS6vv5QSHdTm2n", | |
"publicKeyBase58": "FruAugRKdwksaFEfB2DpvpxEBfMsAJf5Qv19aAKcYYFQ" | |
} | |
], |
openapi: 3.0.3 | |
info: | |
title: Identity Provider API | |
description: This API set implements identity provider methods | |
including searching for persons and creating principals. | |
contact: | |
name: Chandi Cumaranatunge | |
email: iamchandi@asu.edu | |
version: 0.9.0 |
// Available variables: | |
// - Machine | |
// - interpret | |
// - assign | |
// - send | |
// - sendParent | |
// - spawn | |
// - raise | |
// - actions |
// Available variables: | |
// - Machine | |
// - interpret | |
// - assign | |
// - send | |
// - sendParent | |
// - spawn | |
// - raise | |
// - actions |
I hereby claim:
To claim this, I am signing this object:
// create named tracker | |
ga('create', 'UA-141599-1', 'auto', {'name': 'commerceTracker'}); | |
ga('commerceTracker.require', 'ecommerce'); | |
// push custom dimensions | |
ga('commerceTracker.set', { | |
'ASUOID': <asuoid>, // Push ASUOID | |
'RFI': 'asuo-rfi' // Push For segmenting on users who have submitted an RFI. | |
}); | |
// push e-commerce | |
ga('commerceTracker.ecommerce:addTransaction', { |
#!/bin/bash | |
# This deploy hook gets executed after dependencies are resolved and the | |
# build hook has been run but before the application has been started back | |
# up again. This script gets executed directly, so it could be python, php, | |
# ruby, etc. | |
# Bash help: http://www.panix.com/~elflord/unix/bash-tute.html | |
# For information about action hooks supported by OpenShift, consult the documentation: | |
# http://openshift.github.io/documentation/oo_user_guide.html#the-openshift-directory |