view release on metacpan or search on metacpan
t/auth-refund.t view on Meta::CPAN
use Data::Dumper;
use File::Spec;
use LWP::UserAgent;
# to prevent the following error on older Perls
# Can't locate object method "new" via package "LWP::Protocol::https::Socket"
use IO::Socket::SSL;
use URI;
use POSIX qw/strftime/;
use Business::OnlinePayment::IPayment;
view all matches for this distribution
view release on metacpan or search on metacpan
"Business::OnlinePayment::HTTPS" : "0",
"Carp" : "0",
"Data::Dumper" : "0",
"Exporter" : "0",
"HTTP::Tiny" : "0.022",
"IO::Socket::SSL" : "1.56",
"IO::String" : "0",
"Log::Scrubber" : "0.14",
"MIME::Base64" : "0",
"Net::SFTP::Foreign" : "1.57",
"Net::SSLeay" : "0",
view all matches for this distribution
view release on metacpan or search on metacpan
requires:
Business::CreditCard: '0'
Business::OnlinePayment: '3'
Carp: '0'
HTTP::Tiny: '0.022'
IO::Socket::SSL: '1.56'
IO::String: '0'
List::MoreUtils: '0'
Log::Scrubber: '0.14'
Net::SFTP::Foreign: '1.57'
Net::SSLeay: '0'
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Business/PayPal/API.pm view on Meta::CPAN
$ENV{HTTPS_CERT_FILE} = '/var/path/to/cert.pem';
## create our paypal object
my $pp = Business::PayPal::API->new(...)
* if you have already loaded Net::SSLeay (or IO::Socket::SSL), then
Net::HTTPS will prefer to use IO::Socket::SSL. I don't know how
to get SOAP::Lite to work with IO::Socket::SSL (e.g.,
Crypt::SSLeay uses HTTPS_* environment variables), so until then,
you can use this hack:
local $IO::Socket::SSL::VERSION = undef;
$pp->DoExpressCheckoutPayment(...);
This will tell Net::HTTPS to ignore the fact that IO::Socket::SSL
is already loaded for this scope and import Net::SSL (part of the
Crypt::SSLeay package) for its 'configure()' method.
* if you receive a message like "500 Can't connect to
api.sandbox.paypal.com:443 (Illegal seek)", you'll need to make
view all matches for this distribution
view release on metacpan or search on metacpan
"Crypt::OpenSSL::Bignum" : "0.09",
"Crypt::OpenSSL::RSA" : "0.33",
"Crypt::PK::ECC" : "0.068",
"Data::GUID" : "0.049",
"DateTime::Format::DateParse" : "0.05",
"IO::Socket::SSL" : "2.009",
"JSON" : "0",
"Mojo::JWT" : "0.09",
"Mojolicious" : "8.52",
"Moose" : "2.1400",
"MooseX::Aliases" : "0.11",
view all matches for this distribution
view release on metacpan or search on metacpan
Makefile.PL view on Meta::CPAN
requires 'LWP::UserAgent' => 0;
requires 'Text::SimpleTable' => 0;
requires 'MooseX::Getopt' => '0.30';
requires 'Path::Class' => 0;
requires 'Encode' => 0;
unless (can_use('Crypt::SSLeay') || can_use('IO::Socket::SSL')) {
requires 'Crypt::SSLeay' => 0;
}
requires 'XML::LibXML' => 0;
requires 'Try::Tiny' => 0;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Business/eWAY/RapidAPI.pm view on Meta::CPAN
use Business::eWAY::RapidAPI::CreateAccessCodeRequest;
use Business::eWAY::RapidAPI::GetAccessCodeResultRequest;
use Business::eWAY::RapidAPI::TransactionRequest;
use Data::Dumper;
use WWW::Mechanize;
use IO::Socket::SSL qw( SSL_VERIFY_NONE );
with 'Business::eWAY::RapidAPI::Role::Parser';
with 'Business::eWAY::RapidAPI::Role::ErrorCodeMap';
has 'mode' => ( is => 'rw', default => sub { 'live' } );
view all matches for this distribution
view release on metacpan or search on metacpan
corpus/dists/Business-PayPal-API.changes view on Meta::CPAN
----------------------------
revision 1.3
date: 2006/03/21 22:05:19; author: scott; state: Exp; lines: +55 -31
- minor debugging changes
- documentation update for developers
- note about using IO::Socket::SSL (don't)
----------------------------
revision 1.2
date: 2006/03/16 23:33:49; author: scott; state: Exp; lines: +184 -26
- initial checkin of API and subclasses
- all tests working, documentation done
view all matches for this distribution
view release on metacpan or search on metacpan
data/tiddlers.json view on Meta::CPAN
"modified": "20250728223140626",
"created": "20240706052320581"
},
{
"created": "20240717002307158",
"text": "\"\"\"\no Author:\n- Ron Savage\n- Melbourne, Victoria, Australia\n- http://savage.net.au. Has links to various wikis\n- https://metacpan.org/author/RSAVAGE\n\no V 1.44:\n- 2026-04-06\n- Add CALDAV, ECDLP, iCalandar, IDN, LCCN, LCSAJ...
"title": "ChangeLog",
"modified": "20260406012402824"
},
{
"created": "20210729071550324",
data/tiddlers.json view on Meta::CPAN
"title": "DFA",
"modified": "20260222015246254",
"created": "20250108060633490"
},
{
"text": "\"\"\"\no See also:\n- DomainNames\n- EventStuff\n- [[HTTPHandling]]\n- WebServices\n- https://dnsrobot.net - For DNS Robot: 53 free online DNS and network tools\n\no App::sdseasydyn:\n- EasyDNS DDNS updater (CLI-first App distributi...
"title": "DnsStuff",
"modified": "20260325065550510",
"created": "20240206231240082"
},
{
data/tiddlers.json view on Meta::CPAN
"modified": "20251016231649084",
"created": "20230612012815961"
},
{
"created": "20231009225516915",
"text": "\"\"\"\no See also:\n- AiEngines\n- AlgorithmicStuff - For retry mechanisms\n- ArchiveFiles\n- ChildProcesses\n- DatabaseAndSQL - For Async::Redis, DBD::PgAsync etc\n- DataTraversal - For CSV handling\n- DatesAndTimes\n- DnsStuff\n- ...
"title": "EventStuff",
"modified": "20260404212244763"
},
{
"created": "20220308004358235",
data/tiddlers.json view on Meta::CPAN
"title": "SpreadsheetStuff",
"modified": "20260225223507290",
"created": "20230907071706610"
},
{
"text": "\"\"\"\no See also:\n- https://github.com/yuki-kimoto/SPVM/wiki\n- https://go.dev/\n\no SPVM:\n- The SPVM Language\n- https://metacpan.org/pod/SPVM\n\no SPVM::Compress::Raw::Zlib:\n- Low-Level Interface to zlib compression library\n-...
"title": "SpvmLanguage",
"modified": "20260223003237482",
"created": "20260117061518342"
},
{
view all matches for this distribution
view release on metacpan or search on metacpan
lib/CPAN/Plugin/Sysdeps/Mapping.pm view on Meta::CPAN
[package => 'libmcrypt-dev']],
[like_fedora,
[package => [qw(libmcrypt-devel libtool-ltdl-devel)]]],
],
[cpanmod => ['Crypt::OpenSSL::DSA', 'Crypt::OpenSSL::PKCS12', 'Crypt::OpenSSL::Random', 'Crypt::OpenSSL::RSA', 'Crypt::OpenSSL::X509', 'IO::Socket::SSL'],
# freebsd has all libssl in the base system
[like_debian,
[package => ['libssl-dev', 'zlib1g-dev']]],
[like_fedora,
[package => 'openssl-devel']],
view all matches for this distribution
view release on metacpan or search on metacpan
lib/t/cpan/authors/id/G/GA/GAAS/libwww-perl-5.800.readme view on Meta::CPAN
Digest-MD5
These packages should be available on CPAN (see below).
If you want to access sites using the https protocol, then you need to
install the Crypt::SSLeay or the IO::Socket::SSL module. The
README.SSL file will tell you more about how libwww-perl supports SSL.
INSTALLATION
view all matches for this distribution
view release on metacpan or search on metacpan
"Carp" : "0",
"File::Basename" : "0",
"Getopt::Long" : "0",
"HTTP::Tiny" : "0",
"HTTP::Tiny::Multipart" : "0",
"IO::Socket::SSL" : "1.56",
"MIME::Base64" : "0",
"Mozilla::CA" : "0",
"Net::SSLeay" : "1.49",
"Pod::Usage" : "0",
"Term::ReadKey" : "0",
view all matches for this distribution
view release on metacpan or search on metacpan
t/data/build.fresh.log view on Meta::CPAN
Entering LWP-Protocol-https-6.06
Checking configure dependencies from META.yml
Checking if you have ExtUtils::MakeMaker 0 ... Yes (7.04)
Configuring LWP-Protocol-https-6.06
Running Makefile.PL
Warning: prerequisite IO::Socket::SSL 1.54 not found.
Warning: prerequisite Mozilla::CA 20110101 not found.
Checking if your kit is complete...
Looks good
Generating a Unix-style Makefile
Writing Makefile for LWP::Protocol::https
Writing MYMETA.yml and MYMETA.json
-> OK
Checking dependencies from MYMETA.json ...
Checking if you have LWP::UserAgent 6.06 ... Yes (6.13)
Checking if you have IO::Socket::SSL 1.54 ... No
Checking if you have Net::HTTPS 6 ... Yes (6.04)
Checking if you have ExtUtils::MakeMaker 0 ... Yes (7.04)
Checking if you have Mozilla::CA 20110101 ... No
==> Found dependencies: IO::Socket::SSL, Mozilla::CA
Searching IO::Socket::SSL on mirror http://mirrors.gossamer-threads.com/CPAN ...
--> Working on IO::Socket::SSL
Fetching http://mirrors.gossamer-threads.com/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-2.012.tar.gz
-> OK
Unpacking IO-Socket-SSL-2.012.tar.gz
Entering IO-Socket-SSL-2.012
Checking configure dependencies from META.json
t/data/build.fresh.log view on Meta::CPAN
Checking if your kit is complete...
Looks good
Warning: prerequisite Mozilla::CA 0 not found.
Warning: prerequisite Net::SSLeay 1.46 not found.
Generating a Unix-style Makefile
Writing Makefile for IO::Socket::SSL
Writing MYMETA.yml and MYMETA.json
-> OK
Checking dependencies from MYMETA.json ...
Checking if you have Scalar::Util 0 ... Yes (1.41)
Checking if you have Net::SSLeay 1.46 ... No
t/data/build.fresh.log view on Meta::CPAN
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/IO/Socket/SSL.pm
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/IO/Socket/SSL.pod
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/IO/Socket/SSL/Intercept.pm
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/IO/Socket/SSL/PublicSuffix.pm
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/IO/Socket/SSL/Utils.pm
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/man/man3/IO::Socket::SSL.0
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/man/man3/IO::Socket::SSL::Intercept.0
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/man/man3/IO::Socket::SSL::PublicSuffix.0
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/man/man3/IO::Socket::SSL::Utils.0
Appending installation info to /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/darwin-2level/perllocal.pod
-> OK
Successfully installed IO-Socket-SSL-2.012
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/darwin-2level/.meta/IO-Socket-SSL-2.012/MYMETA.json
Installing /Volumes/amaretto/Users/ether/.perlbrew/libs/21.11@std/lib/perl5/darwin-2level/.meta/IO-Socket-SSL-2.012/install.json
view all matches for this distribution
view release on metacpan or search on metacpan
lib/CPAN.pm view on Meta::CPAN
}
},
sub {require Net::FTP},
sub {require Net::Config},
],
'IO::Socket::SSL' => [
sub {
require IO::Socket::SSL;
unless (CPAN::Version->vge(IO::Socket::SSL::->VERSION,1.56)) {
for ("Will not use IO::Socket::SSL, need 1.56\n") {
$CPAN::Frontend->mywarn($_);
die $_;
}
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
#pod will be 599.
#pod * C<verify_SSL> â A boolean that indicates whether to validate the TLS/SSL
#pod certificate of an C<https> â connection (default is true). Changed from false
#pod to true in version 0.083.
#pod * C<SSL_options> â A hashref of C<SSL_*> â options to pass through to
#pod L<IO::Socket::SSL>
#pod * C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default
#pod certificate verification behavior to not check server identity if set to 1.
#pod Only effective if C<verify_SSL> is not set. Added in version 0.083.
#pod
#pod
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
#pod $ok = HTTP::Tiny->can_ssl;
#pod ($ok, $why) = HTTP::Tiny->can_ssl;
#pod ($ok, $why) = $http->can_ssl;
#pod
#pod Indicates if SSL support is available. When called as a class object, it
#pod checks for the correct version of L<Net::SSLeay> and L<IO::Socket::SSL>.
#pod When called as an object methods, if C<SSL_verify> is true or if C<SSL_verify_mode>
#pod is set in C<SSL_options>, it checks that a CA file is available.
#pod
#pod In scalar context, returns a boolean indicating if SSL is available.
#pod In list context, returns the boolean and a (possibly multi-line) string of
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
sub can_ssl {
my ($self) = @_;
my($ok, $reason) = (1, '');
# Need IO::Socket::SSL 1.968 for default_ca()
local @INC = @INC;
pop @INC if $INC[-1] eq '.';
unless (eval {require IO::Socket::SSL; IO::Socket::SSL->VERSION(1.968)}) {
$ok = 0;
$reason .= qq/IO::Socket::SSL 1.968 or later must be installed for https support\n/;
}
# Need Net::SSLeay 1.49 for MODE_AUTO_RETRY
unless (eval {require Net::SSLeay; Net::SSLeay->VERSION(1.49)}) {
$ok = 0;
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
my ($self, $host) = @_;
# As this might be used via CONNECT after an SSL session
# to a proxy, we shut down any existing SSL before attempting
# the handshake
if ( ref($self->{fh}) eq 'IO::Socket::SSL' ) {
unless ( $self->{fh}->stop_SSL ) {
my $ssl_err = IO::Socket::SSL->errstr;
die(qq/Error halting prior SSL connection: $ssl_err/);
}
}
my $ssl_args = $self->_ssl_args($host);
IO::Socket::SSL->start_SSL(
$self->{fh},
%$ssl_args,
SSL_create_ctx_callback => sub {
my $ctx = shift;
Net::SSLeay::CTX_set_mode($ctx, Net::SSLeay::MODE_AUTO_RETRY());
},
);
unless ( ref($self->{fh}) eq 'IO::Socket::SSL' ) {
my $ssl_err = IO::Socket::SSL->errstr;
die(qq/SSL connection failed for $host: $ssl_err\n/);
}
}
sub close {
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
}
sub can_read {
@_ == 1 || @_ == 2 || die(q/Usage: $handle->can_read([timeout])/ . "\n");
my $self = shift;
if ( ref($self->{fh}) eq 'IO::Socket::SSL' ) {
return 1 if $self->{fh}->pending;
}
return $self->_do_timeout('read', @_)
}
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
die qq/SSL_ca_file '$ca_file' not found or not readable\n/;
}
return ( SSL_ca_file => $ca_file );
}
# Return default_ca() parameters from IO::Socket::SSL. It looks for the
# default bundle and directory from Net::SSLeay, handles $ENV{SSL_CERT_FILE}
# and $ENV{SSL_CERT_DIR}, and finally fails over to Mozilla::CA
#
my %default_ca = IO::Socket::SSL::default_ca();
return %default_ca if %default_ca;
# If IO::Socket::SSL::default_ca() was unable to find a CA bundle, look for
# one in well known locations as a last resort. Cert list copied from golang
# src/crypto/x509/root_unix.go
#
foreach my $ca_bundle (
"/etc/ssl/certs/ca-certificates.crt", # Debian/Ubuntu/Gentoo etc.
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
sub _ssl_args {
my ($self, $host) = @_;
my %ssl_args;
# This test reimplements IO::Socket::SSL::can_client_sni(), which wasn't
# added until IO::Socket::SSL 1.84
if ( Net::SSLeay::OPENSSL_VERSION_NUMBER() >= 0x01000000 ) {
$ssl_args{SSL_hostname} = $host, # Sane SNI support
}
if ($self->{verify_SSL}) {
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
C<verify_SSL> â A boolean that indicates whether to validate the TLS/SSL certificate of an C<https> â connection (default is true). Changed from false to true in version 0.083.
=item *
C<SSL_options> â A hashref of C<SSL_*> â options to pass through to L<IO::Socket::SSL>
=item *
C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default certificate verification behavior to not check server identity if set to 1. Only effective if C<verify_SSL> is not set. Added in version 0.083.
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
$ok = HTTP::Tiny->can_ssl;
($ok, $why) = HTTP::Tiny->can_ssl;
($ok, $why) = $http->can_ssl;
Indicates if SSL support is available. When called as a class object, it
checks for the correct version of L<Net::SSLeay> and L<IO::Socket::SSL>.
When called as an object methods, if C<SSL_verify> is true or if C<SSL_verify_mode>
is set in C<SSL_options>, it checks that a CA file is available.
In scalar context, returns a boolean indicating if SSL is available.
In list context, returns the boolean and a (possibly multi-line) string of
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
timeout
verify_SSL
=head1 TLS/SSL SUPPORT
Direct C<https> connections are supported only if L<IO::Socket::SSL> 1.56 or
greater and L<Net::SSLeay> 1.49 or greater are installed. An error will occur
if new enough versions of these modules are not installed or if the TLS
encryption fails. You can also use C<HTTP::Tiny::can_ssl()> utility function
that returns boolean to see if the required modules are installed.
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
attacks|http://en.wikipedia.org/wiki/Machine-in-the-middle_attack>.
Certificate verification requires a file or directory containing trusted CA
certificates.
C<IO::Socket::SSL::default_ca()> is called to detect the default location of
your CA certificates. This also supports the environment variables
C<SSL_CERT_FILE> and C<SSL_CERT_DIR>, and will fail over to L<Mozilla::CA> if no
certs are found.
If C<IO::Socket::SSL::default_ca()> is not able to find usable CA certificates,
HTTP::Tiny will search several well-known system-specific default locations for
a CA certificate file as a last resort:
=over 4
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
An error will be occur if C<verify_SSL> is true and no CA certificate file
is available.
If you desire complete control over TLS/SSL connections, the C<SSL_options>
attribute lets you provide a hash reference that will be passed through to
C<IO::Socket::SSL::start_SSL()>, overriding any options set by HTTP::Tiny. For
example, to provide your own trusted CA file:
SSL_options => {
SSL_ca_file => $file_path,
}
The C<SSL_options> attribute could also be used for such things as providing a
client certificate for authentication to a server or controlling the choice of
cipher used for the TLS/SSL connection. See L<IO::Socket::SSL> documentation for
details.
=head1 PROXY SUPPORT
HTTP::Tiny can proxy both C<http> and C<https> requests. Only Basic proxy
inc/bundle/HTTP/Tiny.pm view on Meta::CPAN
L<IO::Socket::IP> - Required for IPv6 support
=item *
L<IO::Socket::SSL> - Required for SSL support
=item *
L<LWP::UserAgent> - If HTTP::Tiny isn't enough for you, this is the "standard" way to do things
view all matches for this distribution
view release on metacpan or search on metacpan
lib/CPAN/Audit/DB.pm view on Meta::CPAN
use warnings;
our $VERSION = '20260419.002';
sub db {
{"dists" => {"ActivePerl" => {"advisories" => [{"affected_versions" => ["==5.16.1.1601"],"cves" => ["CVE-2012-5377"],"description" => "Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in...
}
__PACKAGE__;
view all matches for this distribution
view release on metacpan or search on metacpan
t/data/Haineko-cpanfile view on Meta::CPAN
requires 'Class::Accessor::Lite', '0.05';
requires 'Crypt::SaltedHash', '0.05';
requires 'Digest::SHA', '5.61';
requires 'Email::MIME', '1.910';
requires 'Furl', '2.17';
requires 'IO::Socket::SSL', '1.94';
requires 'JSON::Syck', '1.18';
requires 'Net::DNS', '0.68';
requires 'Net::SMTPS', '0.03';
requires 'Net::CIDR::Lite', '0.21';
requires 'Parallel::Prefork', '0.14';
view all matches for this distribution
view release on metacpan or search on metacpan
lib/CalDAV/Simple.pm view on Meta::CPAN
has ua => (
is => 'ro',
default => sub {
require HTTP::Tiny;
require IO::Socket::SSL;
return HTTP::Tiny->new(agent => __PACKAGE__.'/'.$VERSION);
},
);
has calendar => (is => 'ro');
view all matches for this distribution
view release on metacpan or search on metacpan
}
},
"runtime" : {
"requires" : {
"HTTP::Tiny" : "0",
"IO::Socket::SSL" : "1.56",
"JSON::PP" : "0",
"Net::SSLeay" : "1.49",
"strict" : "0",
"warnings" : "0"
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Captive/Portal/TestServer.pm view on Meta::CPAN
my $self = $class->SUPER::new();
# build accept_hook on demand for SSL request
# see perldoc HTTP::Server::Simple and below for the hook definition
if ($ssl) {
require IO::Socket::SSL;
#IO::Socket::SSL->import('debug3');
{
no strict 'refs';
*{ __PACKAGE__ . '::accept_hook' } = \&_ssl_accept_hook;
}
lib/Captive/Portal/TestServer.pm view on Meta::CPAN
my $self = shift;
my $fh = $self->stdio_handle;
$self->SUPER::accept_hook(@_);
my $newfh = IO::Socket::SSL->start_SSL(
$fh,
SSL_server => 1,
SSL_cert_file => './etc/test-cert.pem',
SSL_key_file => './etc/test-priv-key.pem',
)
or die "problem setting up SSL socket: "
. IO::Socket::SSL::errstr();
if ($newfh) {
# help HTTP::Server::Simple::CGI with ENV setup()
$ENV{HTTPS} = 'on';
view all matches for this distribution
view release on metacpan or search on metacpan
- 'Keerati Thiwanruk <keerati.th@gmail.com>'
build_requires:
Catalyst: 0
Catalyst::Controller: 0
FindBin: 0
IO::Socket::SSL: 0
Test::Fake::HTTPD: 0
Test::More: 0
Test::TCP: 0
Test::WWW::Mechanize::Catalyst: 0
namespace::autoclean: 0
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Catalyst/Plugin/Session/Store/Redis.pm view on Meta::CPAN
redis_db => 5, # or 0 by default
redis_ssl => 1, # or 0
redis_name => 'name',
redis_username => 'username', # or default user
redis_password => 'password',
redis_ssl_verify_mode => SSL_VERIFY_PEER, # IO::Socket::SSL
};
# ... in an action:
$c->session->{foo} = 'bar'; # will be saved
lib/Catalyst/Plugin/Session/Store/Redis.pm view on Meta::CPAN
Boolean flag. Default: 0, i.e. off.
You can connect to Redis over SSL/TLS by setting this flag if the
target Redis server or cluster has been setup to support SSL/TLS.
This requires L<IO::Socket::SSL> to be installed on the client. It's off by default.
=head3 redis_ssl_verify_mode
This parameter will be applied when C<redis_ssl> flag is set. It sets
the verification mode for the peer certificate. It's compatible with
the parameter with the same name in L<IO::Socket::SSL>.
=head3 redis_name
Setting a different name for the connection.
view all matches for this distribution
view release on metacpan or search on metacpan
"requires" => {
"Catmandu" => "1.09",
"Catmandu::Identifier" => "0.06",
"Catmandu::XML" => "0.16",
"Furl" => "3.07",
"IO::Socket::SSL" => "2.059",
"Moo" => 0,
"URI" => 0,
"XML::LibXML" => 0,
"XML::LibXSLT" => 0,
"perl" => "v5.10.1"
view all matches for this distribution
view release on metacpan or search on metacpan
}
},
"runtime" : {
"requires" : {
"Catmandu" : "1.2001",
"IO::Socket::SSL" : "1.993",
"JSON::MaybeXS" : "1.003005",
"Moo" : "0",
"REST::Client" : "0",
"URI::Escape" : "0",
"perl" : "v5.10.1"
view all matches for this distribution
view release on metacpan or search on metacpan
"requires" : {
"Catmandu" : "0.9301",
"Data::Validate::Type" : "v1.5.1",
"Data::Validate::URI" : "0.06",
"HTTP::Request::Common" : "6.04",
"IO::Socket::SSL" : "2.015",
"RDF::Trine" : "1.014",
"Test::JSON" : "0.11",
"XML::LibXML" : "2.0121",
"perl" : "v5.14.0"
}
view all matches for this distribution
view release on metacpan or search on metacpan
"Catmandu" : "1.06",
"Date::Parse" : "0",
"Getopt::Long" : "0",
"HTTP::Request" : "0",
"IO" : "0",
"IO::Socket::SSL" : "2.015",
"JSON" : "0",
"Moo" : "0",
"REST::Client" : "0",
"perl" : "v5.14.0"
}
view all matches for this distribution
view release on metacpan or search on metacpan
cpanfile.snapshot view on Meta::CPAN
requirements:
Catmandu 0.9301
Data::Validate::Type v1.5.1
Data::Validate::URI 0.06
HTTP::Request::Common 6.04
IO::Socket::SSL 2.015
Module::Build::Tiny 0.039
RDF::Trine 1.014
Test::JSON 0.11
XML::LibXML 2.0121
perl v5.14.0
cpanfile.snapshot view on Meta::CPAN
asa 0
parent 0
IO-Socket-SSL-2.020
pathname: S/SU/SULLR/IO-Socket-SSL-2.020.tar.gz
provides:
IO::Socket::SSL 2.020
IO::Socket::SSL::Intercept 2.014
IO::Socket::SSL::OCSP_Cache 2.020
IO::Socket::SSL::OCSP_Resolver 2.020
IO::Socket::SSL::PublicSuffix undef
IO::Socket::SSL::SSL_Context 2.020
IO::Socket::SSL::SSL_HANDLE 2.020
IO::Socket::SSL::Session_Cache 2.020
IO::Socket::SSL::Utils 2.014
requirements:
ExtUtils::MakeMaker 0
Net::SSLeay 1.46
Scalar::Util 0
IO-String-1.08
view all matches for this distribution
view release on metacpan or search on metacpan
"runtime" : {
"requires" : {
"Catmandu" : "1.0306",
"Catmandu::XML" : "0.16",
"HTTP::OAI" : "4.03",
"IO::Socket::SSL" : "1.993",
"IO::String" : "0",
"MODS::Record" : "0.11",
"Moo" : "1.0",
"URI" : "0",
"XML::LibXML" : "0",
view all matches for this distribution
view release on metacpan or search on metacpan
}
},
"runtime" : {
"requires" : {
"Catmandu" : ">= 0.9, != 0.9402, != 0.9401",
"IO::Socket::SSL" : "1.993",
"WWW::Zotero" : "0.03",
"perl" : "v5.10.1"
}
},
"test" : {
view all matches for this distribution
view release on metacpan or search on metacpan
t/admin_ops.tape view on Meta::CPAN
'client-peer' => 'Client-Peer'
},
'content-type' => 'application/json',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
'date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
'client-transfer-encoding' => [
'chunked'
],
t/admin_ops.tape view on Meta::CPAN
'client-ssl-cert-subject' => 'Client-SSL-Cert-Subject',
'client-ssl-socket-class' => 'Client-SSL-Socket-Class',
'client-date' => 'Client-Date',
'client-response-num' => 'Client-Response-Num'
},
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
t/admin_ops.tape view on Meta::CPAN
'client-ssl-cert-issuer' => 'Client-SSL-Cert-Issuer',
'client-peer' => 'Client-Peer',
'client-ssl-warning' => 'Client-SSL-Warning'
},
'client-date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-ssl-cipher' => 'AES128-SHA',
'client-transfer-encoding' => [
'chunked'
t/admin_ops.tape view on Meta::CPAN
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-cipher' => 'AES128-SHA',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:55 GMT',
'client-ssl-warning' => 'Peer certificate not verified',
'::std_case' => {
'client-ssl-cert-subject' => 'Client-SSL-Cert-Subject',
'client-transfer-encoding' => 'Client-Transfer-Encoding',
t/admin_ops.tape view on Meta::CPAN
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-cipher' => 'AES128-SHA',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:56 GMT',
'::std_case' => {
'client-peer' => 'Client-Peer',
'client-ssl-cert-issuer' => 'Client-SSL-Cert-Issuer',
'client-ssl-warning' => 'Client-SSL-Warning',
t/admin_ops.tape view on Meta::CPAN
'client-ssl-warning' => 'Client-SSL-Warning',
'client-peer' => 'Client-Peer',
'client-ssl-cert-issuer' => 'Client-SSL-Cert-Issuer'
},
'client-date' => 'Mon, 15 Dec 2014 22:45:56 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-ssl-cipher' => 'AES128-SHA',
'client-transfer-encoding' => [
'chunked'
t/admin_ops.tape view on Meta::CPAN
}, 'HTTP::Headers' )
}, 'HTTP::Request' ),
'_msg' => 'OK',
'_headers' => bless( {
'client-date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
t/admin_ops.tape view on Meta::CPAN
'client-peer' => '10.30.77.228:443',
'accept-ranges' => 'bytes',
'client-ssl-cipher' => 'AES128-SHA',
'date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
'content-length' => '20',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)'
}, 'HTTP::Headers' ),
t/admin_ops.tape view on Meta::CPAN
'client-ssl-cipher' => 'Client-SSL-Cipher',
'client-ssl-cert-subject' => 'Client-SSL-Cert-Subject'
},
'connection' => 'close',
'client-date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'content-length' => '20',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
t/admin_ops.tape view on Meta::CPAN
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
'chunked'
],
'date' => 'Mon, 15 Dec 2014 22:45:57 GMT',
t/admin_ops.tape view on Meta::CPAN
'_msg' => 'OK',
'_content' => '{"user_id":"test_user5","display_name":"display","email":"","suspended":0,"max_buckets":1000,"subusers":[],"keys":[{"user":"test_user5","access_key":"FHDPPL8SX6E9EQ7482GF","secret_key":"PDiQy1l5R9A8uD...
'_rc' => 200,
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
t/admin_ops.tape view on Meta::CPAN
'_content' => '',
'_msg' => 'OK',
'_request' => {},
'_rc' => 200,
'_headers' => bless( {
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
t/admin_ops.tape view on Meta::CPAN
'client-transfer-encoding' => [
'chunked'
],
'date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:45:58 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)'
}, 'HTTP::Headers' ),
'_protocol' => 'HTTP/1.1'
}, 'HTTP::Response' ),
t/admin_ops.tape view on Meta::CPAN
'chunked'
],
'client-ssl-cipher' => 'AES128-SHA',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:59 GMT',
'::std_case' => {
'client-ssl-cert-issuer' => 'Client-SSL-Cert-Issuer',
'client-peer' => 'Client-Peer',
'client-ssl-warning' => 'Client-SSL-Warning',
t/admin_ops.tape view on Meta::CPAN
'response' => bless( {
'_headers' => bless( {
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-date' => 'Mon, 15 Dec 2014 22:45:59 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
'chunked'
],
'date' => 'Mon, 15 Dec 2014 22:45:59 GMT',
t/admin_ops.tape view on Meta::CPAN
'response' => bless( {
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:45:59 GMT',
'date' => 'Mon, 15 Dec 2014 22:45:59 GMT',
'client-transfer-encoding' => [
'chunked'
],
t/admin_ops.tape view on Meta::CPAN
'_rc' => 200,
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
'chunked'
t/admin_ops.tape view on Meta::CPAN
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-transfer-encoding' => [
'chunked'
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
t/admin_ops.tape view on Meta::CPAN
'chunked'
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'content-type' => 'application/json',
'client-ssl-warning' => 'Peer certificate not verified',
'connection' => 'close',
t/admin_ops.tape view on Meta::CPAN
'client-ssl-cert-subject' => 'Client-SSL-Cert-Subject'
},
'content-type' => 'application/json',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'date' => 'Mon, 15 Dec 2014 22:46:00 GMT',
'client-transfer-encoding' => [
'chunked'
],
t/admin_ops.tape view on Meta::CPAN
'client-response-num' => 'Client-Response-Num',
'client-ssl-socket-class' => 'Client-SSL-Socket-Class',
'client-date' => 'Client-Date'
},
'client-date' => 'Mon, 15 Dec 2014 22:46:01 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
t/admin_ops.tape view on Meta::CPAN
},
{
'response' => bless( {
'_headers' => bless( {
'client-date' => 'Mon, 15 Dec 2014 22:46:01 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'client-transfer-encoding' => [
'chunked'
t/admin_ops.tape view on Meta::CPAN
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-cipher' => 'AES128-SHA',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:01 GMT'
}, 'HTTP::Headers' ),
'_protocol' => 'HTTP/1.1'
}, 'HTTP::Response' )
},
t/admin_ops.tape view on Meta::CPAN
'chunked'
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'content-type' => 'application/json',
'connection' => 'close',
'client-ssl-warning' => 'Peer certificate not verified',
t/admin_ops.tape view on Meta::CPAN
'date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-ssl-cipher' => 'AES128-SHA',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'connection' => 'close',
'client-ssl-warning' => 'Peer certificate not verified',
'::std_case' => {
'client-ssl-warning' => 'Client-SSL-Warning',
'client-peer' => 'Client-Peer',
t/admin_ops.tape view on Meta::CPAN
'date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
'chunked'
],
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:02 GMT',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)'
}, 'HTTP::Headers' ),
'_protocol' => 'HTTP/1.1'
t/admin_ops.tape view on Meta::CPAN
'client-peer' => 'Client-Peer',
'client-ssl-cert-issuer' => 'Client-SSL-Cert-Issuer',
'client-ssl-warning' => 'Client-SSL-Warning'
},
'client-date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-ssl-cipher' => 'AES128-SHA',
'client-transfer-encoding' => [
'chunked'
t/admin_ops.tape view on Meta::CPAN
'chunked'
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'content-type' => 'application/json',
'client-ssl-warning' => 'Peer certificate not verified',
'connection' => 'close',
t/admin_ops.tape view on Meta::CPAN
},
'connection' => 'close',
'content-type' => 'application/json',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'client-transfer-encoding' => [
'chunked'
],
t/admin_ops.tape view on Meta::CPAN
'response' => bless( {
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'date' => 'Mon, 15 Dec 2014 22:46:03 GMT',
'client-transfer-encoding' => [
'chunked'
],
t/admin_ops.tape view on Meta::CPAN
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-cipher' => 'AES128-SHA',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:04 GMT'
}, 'HTTP::Headers' ),
'_content' => '{"entries":[],"summary":[]}',
'_msg' => 'OK',
'_request' => {},
t/admin_ops.tape view on Meta::CPAN
'client-transfer-encoding' => [
'chunked'
],
'date' => 'Mon, 15 Dec 2014 22:46:04 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:46:04 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'content-type' => 'application/json',
'::std_case' => {
'client-ssl-warning' => 'Client-SSL-Warning',
t/admin_ops.tape view on Meta::CPAN
],
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-ssl-cipher' => 'AES128-SHA',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:04 GMT'
}, 'HTTP::Headers' ),
'_protocol' => 'HTTP/1.1'
}, 'HTTP::Response' ),
'request' => {}
t/admin_ops.tape view on Meta::CPAN
'client-transfer-encoding' => [
'chunked'
],
'date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1
}, 'HTTP::Headers' ),
'_protocol' => 'HTTP/1.1',
'_content' => '{"user_id":"test_user11","display_name":"display","email":"","suspended":0,"max_buckets":1000,"subusers":[],"keys":[{"user":"test_user11","access_key":"EMHDR5Y3PT5VGB3F0VNI","secret_key":"\\/P0OkCs6dG...
t/admin_ops.tape view on Meta::CPAN
'date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-ssl-cipher' => 'AES128-SHA',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-ssl-socket-class' => 'IO::Socket::SSL',
'connection' => 'close',
'client-ssl-warning' => 'Peer certificate not verified',
'::std_case' => {
'client-transfer-encoding' => 'Client-Transfer-Encoding',
'client-ssl-cert-subject' => 'Client-SSL-Cert-Subject',
t/admin_ops.tape view on Meta::CPAN
}, 'HTTP::Headers' )
}, 'HTTP::Request' ),
'_msg' => 'OK',
'_protocol' => 'HTTP/1.1',
'_headers' => bless( {
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-response-num' => 1,
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-ssl-cipher' => 'AES128-SHA',
'date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
t/admin_ops.tape view on Meta::CPAN
'date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'client-ssl-cert-subject' => '/OU=Domain Control Validated/CN=*.rados2.dev.liquidweb.com',
'client-transfer-encoding' => [
'chunked'
],
'client-ssl-socket-class' => 'IO::Socket::SSL',
'client-date' => 'Mon, 15 Dec 2014 22:46:05 GMT',
'server' => 'Apache/2.2.22 (Ubuntu)',
'client-response-num' => 1,
'content-type' => 'application/json',
'client-ssl-warning' => 'Peer certificate not verified',
view all matches for this distribution