Youtube Channel Website

Overview

Youtube-Page-Generator

Videos-By-Sanjeevi

Youtube Channel Website

YouTube Channel Website Features:

  1. Free Hosting using GitHub Pages and open-source code base in GitHub.
  2. It can update all the videos, title, and description available inside the channel into the website everyday automatically using the GitHub Actions feature.
  3. No need to manually do any step after posting any new video in YouTube, it will be updated in website on next day.

How to Reuse this Template which creates a personal website hosted in Github Pages using Jekyll and Github Actions for free!

  1. Fork this repo: Fork this on github

  2. Create Secret in Github repo and add secret named: "GOOGLEAPIKEY" with value of Google console api id.

  3. Update your channel name in the file workflow - File line : 18

    python ./youtubeChannelVideosFinder.py -k ${{ secrets.GOOGLEAPIKEY }} -c 'your-channel-name-here' --output-file-path index.md

  4. Enable the repo as github pages, your website is ready.

Samples created by this tool:

https://github.com/LKG-in-IT/YoutubeChannelWebsite

Demo 1:

https://lkg-in-it.github.io/YoutubeChannelWebsite/

Demo 2:

https://ssanjeevi.github.io/YoutubeChannelWebsite/

Demo 3

https://tnpscquickies.github.io/YoutubeChannelWebsite/

Detailed Article:

https://lkgforit.com/personal-youtube-channel-videos-website-hosted-in-github-pages-for-free-which-populates-content-by-itself

Reference:

https://github.com/dsebastien/youtubeChannelVideosFinder

https://github.com/nathancy/jekyll-embed-video

Comments
  • Configure WhiteSource Bolt for GitHub

    Configure WhiteSource Bolt for GitHub

    Welcome to WhiteSource Bolt for GitHub! This is an onboarding PR to help you understand and configure settings before WhiteSource starts scanning your repository for security vulnerabilities.

    :vertical_traffic_light: WhiteSource Bolt for GitHub will start scanning your repository only once you merge this Pull Request. To disable WhiteSource Bolt for GitHub, simply close this Pull Request.


    What to Expect

    This PR contains a '.whitesource' configuration file which can be customized to your needs. If no changes were applied to this file, WhiteSource Bolt for GitHub will use the default configuration.

    Before merging this PR, Make sure the Issues tab is enabled. Once you merge this PR, WhiteSource Bolt for GitHub will scan your repository and create a GitHub Issue for every vulnerability detected in your repository.

    If you do not want a GitHub Issue to be created for each detected vulnerability, you can edit the '.whitesource' file and set the 'minSeverityLevel' parameter to 'NONE'.


    :question: Got questions? Check out WhiteSource Bolt for GitHub docs. If you need any further assistance then you can also request help here.

    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 - Medium Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website.

    Publish Date: 2021-02-11

    URL: CVE-2021-22881

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130

    Release Date: 2021-02-11

    Fix Resolution: 6.0.3.5,6.1.2.1


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 - Medium Severity Vulnerability

    Vulnerable Library - actionview-6.0.2.2.gem

    Simple, battle-tested conventions and helpers for building web pages.

    Library home page: https://rubygems.org/gems/actionview-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • actionpack-6.0.2.2.gem
            • :x: actionview-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the t and translate helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.

    Publish Date: 2020-09-11

    URL: CVE-2020-15169

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://rubygems.org/gems/actionview/versions/6.0.3.3

    Release Date: 2020-07-21

    Fix Resolution: 6.0.3.3, 5.2.4.4


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

    Publish Date: 2020-04-29

    URL: CVE-2020-11022

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

    Release Date: 2020-04-29

    Fix Resolution: jQuery - 3.5.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 - High Severity Vulnerability

    Vulnerable Library - addressable-2.7.0.gem

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. It is flexible, offers heuristic parsing, and additionally provides extensive support for IRIs and URI templates.

    Library home page: https://rubygems.org/gems/addressable-2.7.0.gem

    Dependency Hierarchy:

    • jekyll-archives-2.2.1.gem (Root Library)
      • jekyll-4.2.0.gem
        • :x: addressable-2.7.0.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

    Publish Date: 2021-07-06

    URL: CVE-2021-32740

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g

    Release Date: 2021-07-06

    Fix Resolution: addressable - 2.8.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing

    Publish Date: 2020-04-29

    URL: CVE-2020-11023

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440

    Release Date: 2020-04-29

    Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 - High Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses authenticate_or_request_with_http_token or authenticate_with_http_token for request authentication.

    Publish Date: 2021-06-11

    URL: CVE-2021-22904

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/rubysec/ruby-advisory-db/commit/691f9dce9b6ff8f4e9dec8ea459b66c0b7037dac

    Release Date: 2021-01-07

    Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
Releases(Release0.1.2)
Owner
Sanjeevi Subramani
Sanjeevi Subramani
🍞 Create dynamic spreadsheets with arbitrary layouts using Python

🍞 tartine What this is Installation Usage example Fetching some data Getting started Adding a header Linking more cells Cell formatting API reference

Max Halford 11 Apr 16, 2022
Comics/doujinshi reader application. Web-based, will work on desktop and tablet devices with swipe interface.

Yomiko Comics/doujinshi reader application. Web-based, will work on desktop and tablet devices with swipe interface. Scans one or more directories of

Kyubi Systems 26 Aug 10, 2022
Site de gestion de cave à vin utilisant une BDD manipulée avec SQLite3 via Python

cave-vin Site de gestion de cave à vin utilisant une bdd manipulée avec MySQL ACCEDER AU SITE : Pour accéder à votre cave vous aurez besoin de lancer

Elouann Lucas 0 Jul 05, 2022
A collection of simple tools that proved to be needed for hadling large periodic calculations with the VASP software package.

VESTA-tools A collection of simple tools that proved to be needed for handling large periodic calculations with the VASP software package. distTotCalc

Ilia Kichev 2 Dec 14, 2021
Open-source library for analyzing the results produced by ABINIT

Package Continuous Integration Documentation About AbiPy is a python library to analyze the results produced by Abinit, an open-source program for the

ABINIT 91 Dec 09, 2022
Software that extracts spreadsheets from various .pdf files to .csv

Extração de planilhas de diversos arquivos .pdf para .csv O código inteiro foi desenvolvido em Python. Foi utilizado o pacote "tabula" e a biblioteca

Marcos Silva 2 Jan 09, 2022
CalHacks 8 Repo: Megha Jain, Gaurav Bhatnagar, Howard Meng, Vibha Tantry

CalHacks8 CalHacks 8 Repo: Megha Jain, Gaurav Bhatnagar, Howard Meng, Vibha Tantry Setup FE Install React Native via Expo, run App.js. Backend Create

0 Aug 20, 2022
A pypi package details search python module

A pypi package details search python module

Fayas Noushad 5 Nov 30, 2021
Zues Auto Claimer Leaked By bazooka#0001

Zues Auto Claimer Leaked By bazooka#0001 put proxies in prox.txt put ssid in sid.txt put all users you want to target in user.txt for the login just t

1 Jan 15, 2022
Datasets with Softcatalà website content

softcatala-web-dataset This repository contains Sofcatalà web site content (articles and programs descriptions). Dataset are available in the dataset

Softcatalà 2 Dec 26, 2021
Object-oriented programming (OOP) is a method of structuring a program by bundling related properties and behaviors into individual objects. In this tutorial, you’ll learn the basics of object-oriented programming in Python.

06_Python_Object_Class Introduction 👋 Objected oriented programming as a discipline has gained a universal following among developers. Python, an in-

Milaan Parmar / Милан пармар / _米兰 帕尔马 239 Dec 20, 2022
Some Python scripts that fx(hash) users might find useful.

fx_hash_utils Some Python scripts that fx(hash) users might find useful. get_images This script downloads all the static images of the tokens generate

30 Oct 05, 2022
My Dotfiles of Arco Linux

Arco-DotFiles My Dotfiles of Arco Linux Apps Used Htop LightDM lightdm-webkit2-greeter Alacritty Qtile Cava Spotify nitrogen neofetch Spicetify Thunar

$BlueDev5 6 Dec 11, 2022
Decentralized intelligent voting application.

DiVA Decentralized intelligent voting application. Hack the North 2021. Inspiration Following the previous US election, many voters were fearful that

Ali Shariatmadari 4 Jun 05, 2022
Enjoy Discords Unlimited Storage

Discord Storage V.3.5 (Beta) Made by BoKa Enjoy Discords free and unlimited storage... Prepare: Clone this from Github, make sure there either a folde

0 Dec 16, 2021
Random Turkish name generator with realistic probabilities.

trnames Random Turkish name generator with realistic probabilities. Based on Trey Hunner's names package. Installation The package can be installed us

Kaan Öztürk 20 Jan 02, 2023
This script is written with Python for selling steam community items automatically.

SteamCommunityItemAutoSell Description This script is written with Python for selling steam community items automatically. Install git clone https://g

14 Oct 26, 2022
Set named timers for cooking, watering plants, brewing tea and more.

Timer Set named timers for cooking, watering plants, brewing tea and more. About Use Mycroft when your hands are messy or you need more that the one t

OpenVoiceOS 3 Nov 02, 2022
apysc is the Python frontend library to create html and js file, that has ActionScript 3 (as3)-like interface.

apysc apysc is the Python frontend library to create HTML and js files, that has ActionScript 3 (as3)-like interface. Notes: Currently developing and

simonritchie 17 Dec 14, 2022
A novel dual model approach for categorization of unbalanced skin lesion image classes (Presented technical paper 📃)

A novel dual model approach for categorization of unbalanced skin lesion image classes (Presented technical paper 📃)

1 Jan 19, 2022