view release on metacpan or search on metacpan
lib/Apache2/WebApp/Plugin/Session.pm view on Meta::CPAN
also be used to set a customized session cookie.
my $session_id = $c->plugin('Session')->create($c, 'login',
{
username => 'foo',
password => 'bar',
}
);
=head2 get
lib/Apache2/WebApp/Plugin/Session.pm view on Meta::CPAN
my ($self, $c) = @_;
$c->plugin('Session')->create($c, 'login',
{
username => 'foo',
password => 'bar',
}
);
$c->plugin('CGI')->redirect($c, '/app/example/verify');
}
lib/Apache2/WebApp/Plugin/Session.pm view on Meta::CPAN
my $data_ref = $c->plugin('Session')->get($c, 'login');
$c->request->content_type('text/html');
print $data_ref->{username} . '-' . $data_ref->{password}; # outputs 'foo-bar'
}
1;
=head1 SUPPORTED TYPES
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/WebApp.pm view on Meta::CPAN
E) Password file used for restricting access to a specified path (see C<httpd.conf>).
The login information below is currently set-up by default.
User Name admin
Password password
You can change the login password using the C<htpasswd> command-line script.
$ htpasswd /var/www/project/conf/htpasswd admin
F) Apache server I<Virtual Host> configuration.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2/reCaptcha.pm view on Meta::CPAN
# reCaptcha.conf
PerlModule Apache2::reCaptcha
PerlSetVar reCaptchaTicketDB DBI:mysql:database=sessions;host=mysql.example.com
PerlSetVar reCaptchaTicketDBUser session
PerlSetVar reCaptchaTicketDBPassword supersecret password
PerlSetVar reCaptchaTicketTable tickets:ticket_hash:ts
PerlSetVar reCaptchaTicketLoginHandler /reCaptchalogin
#This is the path for the cookie
PerlSetVar reCaptchaPath /
PerlSetVar reCaptchaDomain www.example.com
lib/Apache2/reCaptcha.pm view on Meta::CPAN
The Database username to login
=head3 B<reCaptchaTicketDBPassword>
The database password
=head3 B<reCaptchaTicketTable>
This is the path to where to store tickets the fomat is table:column1:column2
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
DBI_SecretKey => undef,
DBI_User => undef,
DBI_Password => undef,
DBI_UsersTable => 'users',
DBI_UserField => 'user',
DBI_PasswordField => 'password',
DBI_UserActiveField => EMPTY_STRING, # Default is don't use this feature
DBI_CryptType => 'none',
DBI_GroupsTable => 'groups',
DBI_GroupField => 'grp',
DBI_GroupUserField => 'user',
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
PerlSetVar WhatEverDBI_DSN "DBI:mysql:database=test"
PerlSetVar WhatEverDBI_SecretKey "489e5eaad8b3208f9ad8792ef4afca73598ae666b0206a9c92ac877e73ce835c"
# These are optional, the module sets sensible defaults.
PerlSetVar WhatEverDBI_User "nobody"
PerlSetVar WhatEverDBI_Password "password"
PerlSetVar WhatEverDBI_UsersTable "users"
PerlSetVar WhatEverDBI_UserField "user"
PerlSetVar WhatEverDBI_PasswordField "password"
PerlSetVar WhatEverDBI_UserActiveField "" # Default is skip this feature
PerlSetVar WhatEverDBI_CryptType "none"
PerlSetVar WhatEverDBI_GroupsTable "groups"
PerlSetVar WhatEverDBI_GroupField "grp"
PerlSetVar WhatEverDBI_GroupUserField "user"
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
=head1 DESCRIPTION
This module is an authentication handler that uses the basic mechanism provided
by Apache2_4::AuthCookie with a DBI database for ticket-based protection. Actually
it is modified version of L<Apache2::AuthCookieDBI> for apache 2.4. It
is based on two tokens being provided, a username and password, which can
be any strings (there are no illegal characters for either). The username is
used to set the remote user as if Basic Authentication was used.
On an attempt to access a protected location without a valid cookie being
provided, the module prints an HTML login form (produced by a CGI or any
other handler; this can be a static file if you want to always send people
to the same entry page when they log in). This login form has fields for
username and password. On submitting it, the username and password are looked
up in the DBI database. The supplied password is checked against the password
in the database; the password in the database can be plaintext, or a crypt()
or md5_hex() checksum of the password. If this succeeds, the user is issued
a ticket. This ticket contains the username, an issue time, an expire time,
and an MD5 checksum of those and a secret key for the server. It can
optionally be encrypted before returning it to the client in the cookie;
encryption is only useful for preventing the client from seeing the expire
time. If you wish to protect passwords in transport, use an SSL-encrypted
connection. The ticket is given in a cookie that the browser stores.
After a login the user is redirected to the location they originally wished
to view (or to a fixed page if the login "script" was really a static file).
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
# If we used encryption we need to pull in Crypt::CBC.
if ( $c{'DBI_EncryptionType'} ne 'none' ) {
require Crypt::CBC;
}
# Compile module for password encryption, if needed.
if ( $c{'DBI_CryptType'} =~ '^sha') {
require Digest::SHA;
}
return %c;
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
my %c = $self->_dbi_config_vars($r);
my $auth_name = $r->auth_name;
# get the crypted password from the users database for this user.
my $dbh = DBI->connect_cached( $c{'DBI_DSN'}, $c{'DBI_User'}, $c{'DBI_Password'} );
if ( !defined $dbh ) {
my $error_message = "${self} => couldn't connect to $c{'DBI_DSN'} for auth realm $auth_name";
$r->server->log_error( $error_message );
return;
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
return $dbh;
}
#-------------------------------------------------------------------------------
# _get_crypted_password -- Get the users' password from the database
#
sub _get_crypted_password ($$\@) {
my $self = shift;
my $r = shift;
my $user = shift;
my $dbh = $self->_dbi_connect($r) || return;
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
= "${self}\tUser '$user' is not active for auth realm $auth_name.";
$r->server->log_error( $message );
return;
}
my $crypted_password = EMPTY_STRING;
my $sql_query = <<"SQL";
SELECT `$c{'DBI_PasswordField'}`
FROM `$c{'DBI_UsersTable'}`
WHERE `$c{'DBI_UserField'}` = ?
AND (`$c{'DBI_PasswordField'}` != ''
AND `$c{'DBI_PasswordField'}` IS NOT NULL)
SQL
my $sth = $dbh->prepare_cached($sql_query);
$sth->execute($user);
($crypted_password) = $sth->fetchrow_array();
$sth->finish();
if ( _is_empty($crypted_password) ) {
my $message
= "${self}\tCould not select password using SQL query '$sql_query'";
$r->server->log_error( $message );
return;
}
return $crypted_password;
}
#-------------------------------------------------------------------------------
# _now_year_month_day_hour_minute_second -- Return a string with the time in
# this order separated by dashes.
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
sub _now_year_month_day_hour_minute_second {
return sprintf '%04d-%02d-%02d-%02d-%02d-%02d', Today_and_Now;
}
#-------------------------------------------------------------------------------
# _check_password -- password checking
#
sub _check_password {
my ( $self, $password, $crypted_password, $crypt_type ) = @_;
return
if not $crypted_password
; # https://rt.cpan.org/Public/Bug/Display.html?id=62470
my %password_checker = (
'none' => sub { return $password eq $crypted_password; },
'crypt' => sub {
$self->_crypt_digest( $password, $crypted_password ) eq
$crypted_password;
},
'md5' => sub { return md5_hex($password) eq $crypted_password; },
'sha256' => sub {
return Digest::SHA::sha256_hex($password) eq $crypted_password;
},
'sha384' => sub {
return Digest::SHA::sha384_hex($password) eq $crypted_password;
},
'sha512' => sub {
return Digest::SHA::sha512_hex($password) eq $crypted_password;
},
);
return $password_checker{$crypt_type}->();
}
#-------------------------------------------------------------------------------
# _get_expire_time -- calculating expire time
#
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
#
sub authen_cred ($$\@) {
my $self = shift;
my $r = shift;
my $user = shift;
my $password = shift;
my @extra_data = @_;
my $auth_name = $r->auth_name;
( $user, $password ) = _defined_or_empty( $user, $password );
$user = trim($user);
if ( !length $user ) {
$r->server->log_error( "${self} no username supplied for auth realm $auth_name" );
return;
}
if ( !length $password ) {
$r->server->log_error( "${self} no password supplied for auth realm $auth_name" );
return;
}
if ( !$self->user_is_active( $r, $user ) ) {
my $message
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
}
# get the configuration information.
my %c = $self->_dbi_config_vars($r);
# get the crypted password from the users database for this user.
my $crypted_password = $self->_get_crypted_password( $r, $user, \%c );
# now return unless the passwords match.
my $crypt_type = lc $c{'DBI_CryptType'};
if ( !$self->_check_password( $password, $crypted_password, $crypt_type ) )
{
my $message = "${self} crypt_type: '$crypt_type' - passwords didn't match for user '$user' for auth realm $auth_name";
$r->server->log_error( $message );
return;
}
# Successful login
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
# time and the session id (if any) together to make the public part
# of the session key:
my $current_time = _now_year_month_day_hour_minute_second;
my $public_part = "$enc_user:$current_time:$expire_time:$session_id";
$public_part
.= $self->extra_session_info( $r, $user, $password, @extra_data );
# Now we calculate the hash of this and the secret key and then
# calculate the hash of *that* and the secret key again.
my $secretkey = $c{'DBI_SecretKey'};
if ( !defined $secretkey ) {
lib/Apache2_4/AuthCookieMultiDBI.pm view on Meta::CPAN
# return $r->dir_config("${auth_name}Path") . "$client/";
# }
sub extra_session_info {
my ( $self, $r, $user, $password, @extra_data ) = @_;
return EMPTY_STRING;
}
=head1 EXPORTS
view all matches for this distribution
view release on metacpan or search on metacpan
lib/HTTPD/Bench/ApacheBench.pm view on Meta::CPAN
If you are running in perl's taint-checking mode, and you pass tainted data
to ApacheBench (e.g. a tainted URL), it will barf. Don't ask me why.
HTTP Proxy support needs to be expanded to allow for a username and
password.
=head1 AUTHORS
The ApacheBench Perl API is based on code from
Apache 1.3.12 ab (src/support/ab.c), by the Apache group.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apigee/Edge.pm view on Meta::CPAN
use Apigee::Edge;
my $apigee = Apigee::Edge->new(
org => 'apigee_org',
usr => 'your_email',
pwd => 'your_password'
);
=head1 DESCRIPTION
Apigee::Edge is an object-oriented interface to facilitate management of Developers and Apps using the Apigee.com 'Edge' management API. see L<http://apigee.com/docs/api-services/content/api-reference-getting-started>
lib/Apigee/Edge.pm view on Meta::CPAN
required. login email
=item * pwd
required. login password
=item * endpoint
optional. default to https://api.enterprise.apigee.com/v1
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
script/acme-cpanauthors view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>
Do not use any configuration file.
script/acme-cpanauthors view on Meta::CPAN
# pos => {},
# slurpy => {},
# greedy => {}, # old alias for slurpy, will be removed in Rinci 1.2
# partial => {},
# stream => {},
# is_password => {},
# cmdline_aliases => {
# _value_prop => {
# summary => {},
# description => {},
# schema => {},
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
script/ap-backup view on Meta::CPAN
ap-backup - Backup an ActivityPub account
=head1 SYNOPSIS
B<ap-backup.pl> <-u user:password|-o OAuth-Bearer-Token> <url>
=head1 DESCRIPTION
ap-backup is used to backup an ActivityPub account, authentication is required.
script/ap-backup view on Meta::CPAN
}
getopts("u:o:", \%options);
if ($#ARGV != 0) {
print "usage: ap-backup.pl <-u user:password|-o OAuth-Bearer-Token> <url>\n";
exit 1;
}
if (defined $options{u}) {
$auth = "Basic " . encode_base64($options{u});
view all matches for this distribution
view release on metacpan or search on metacpan
-j
junk session cookies (refresh cookie-based session)
<-u $username:$password>
HTTP basic authentication
<-H $header>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Alice/HTTPD.pm view on Meta::CPAN
if (!$self->app->auth_enabled or $self->is_logged_in($req)) {
$res->redirect("/");
return $res->finalize;
}
elsif (my $user = $req->param("username")
and my $pass = $req->param("password")) {
if ($self->app->authenticate($user, $pass)) {
$req->env->{"psgix.session"}->{is_logged_in} = 1;
$res->redirect("/");
return $res->finalize;
}
$res->body($self->app->render("login", "bad username or password"));
}
else {
$res->body($self->app->render("login"));
}
$res->status(200);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/AltSQL.pm view on Meta::CPAN
App::AltSQL - A drop in replacement to the MySQL prompt with a pluggable Perl interface
=head1 SYNOPSIS
./altsql -h <host> -u <username> -D <database> -p<password>
altsql> select * from film limit 4;
âââââââââââ¤âââââââââââââââââââ¤ââââââââââââââââââââââââââââ
â film_id â title â description
âââââââââââªâââââââââââââââââââªââââââââââââââââââââââââââââ
lib/App/AltSQL.pm view on Meta::CPAN
=item -h HOSTNAME | --host HOSTNAME
=item -u USERNAME | --user USERNAME
=item -p | --password=PASSWORD | -pPASSWORD
=item --port PORT
=item -D DATABASE | --database DATABASE
lib/App/AltSQL.pm view on Meta::CPAN
}
# Password is a special case
foreach my $i (0..$#argv) {
my $arg = $argv[$i];
next unless $arg =~ m{^(?:-p|--password=)(.*)$};
splice @argv, $i, 1;
if (length $1) {
$args{_model_password} = $1;
# Remove the password from the program name so people can't see it in process listings
$0 = join ' ', $0, @argv;
}
else {
# Prompt the user for the password
require Term::ReadKey;
Term::ReadKey::ReadMode('noecho');
print "Enter password: ";
$args{_model_password} = Term::ReadKey::ReadLine(0);
Term::ReadKey::ReadMode('normal');
print "\n";
chomp $args{_model_password};
}
last; # I've found what I was looking for
}
GetOptionsFromArray(\@argv, %opts_spec);
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/AutoCRUD.pm view on Meta::CPAN
connect:
# arguments that will be passed to DBI->connect(...)
# for example :
- dbi:SQLite:dbname=some_file
- "" # user
- "" # password
- RaiseError : 1
sqlite_unicode: 1
Create a file F<crud.psgi> like this :
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Automaton.pm view on Meta::CPAN
As you can see, these are all geared towards downloading videos. It's the first real world use case that I felt I could really do well.
The plugins can be appear multiple times in a config file, or left out completely. This allows you to download YouTube videos to multiple locations, for instance.
In the future, I picture giving it input that could tell it to do more interesting things. However, as long as commands are coming in over email, I'll leave the security implications minimal.
Obviously, you don't have to use that plugin. If you do, I certainly suggest not using your primary email since the password must be in the config file.
=head1 INSTALLATION
If you are working directly from source, this module can be installed using the Dist::Zilla tools:
lib/App/Automaton.pm view on Meta::CPAN
bypass: 1
type: IMAP
server: imap.gmail.com
port: 993
account: notyourprimary@emailaccount.com
password: 123456
ssl: yes
delete: 0
file1:
type: File
path: ../input.txt
lib/App/Automaton.pm view on Meta::CPAN
delete: 0 # OPTIONAL; if true, messages will be deleted after reading, defaults to false
# These are passed on to the plugin and have obvious purposes
server: imap.gmail.com
port: 993
account: notyourprimary@emailaccount.com
password: 123456
ssl: yes
The plugins work in generally the same way. They should all respect the bypass flag and, if applicable, the delete flag.
Action plugins will usually have a "target" flag to specify where the downloaded files should be put.
In my personal config, I have my NZB files dropped into my news reader's "watch" folder which will execute that download.
view all matches for this distribution
view release on metacpan or search on metacpan
script/bpom-show-nutrition-facts view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
script/bpom-show-nutrition-facts view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
our $config = {
sql => {
source => $ENV{BS_DBSRC},
username => '',
password => ''
}
};
die "No database source provided! Please set `sql.source` in your config file"
. " or the BS_DBSRC env variable." unless $config->{sql}{source};
"<>" => \&handle_barearg);
$repo_addpkg = 1 if $repo_copypkgarch;
our $conn = DBIx::Connector->new($$config{sql}
->@{qw(source username password)}, {
sqlite_unicode => 1
});
$dispatch{$currcmd}->();
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/BambooCli/Config.pm view on Meta::CPAN
has bamboo => (
is => 'rw',
lazy => 1,
builder => '_bamboo',
);
has [qw/ hostname username password debug /] => (
is => 'rw',
);
sub _bamboo {
my ($self) = @_;
my $bamboo = new Net::Bamboo;
$bamboo->hostname($self->hostname);
$bamboo->debug($self->debug);
if ($self->username && $self->password) {
$bamboo->username($self->username);
$bamboo->password($self->password);
}
return $bamboo;
}
lib/App/BambooCli/Config.pm view on Meta::CPAN
=head2 C<hostname>
=head2 C<username>
=head2 C<password>
=head2 C<debug>
=head2 C<_bamboo>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/BarnesNoble/WishListMinder.pm view on Meta::CPAN
die "$config_file is a directory!\n" if $config_file->is_dir;
$config_file->spew_utf8(<<'END CONFIG');
; -*-conf-windows-*-
; Your credentials for logging in to the Barnes & Noble website go here:
email = YOUR EMAIL HERE
password = YOUR PASSWORD HERE
; If you want the Price Drop Alert emails to go to a different address,
; uncomment the next line and set the email address.
;report = EMAIL ADDRESS FOR ALERTS
lib/App/BarnesNoble/WishListMinder.pm view on Meta::CPAN
#path("/tmp/login.html")->spew_utf8($m->content);
$m->submit_form(
with_fields => {
'login.email' => $config->{email},
'login.password' => $config->{password},
},
);
} # end login
#---------------------------------------------------------------------
view all matches for this distribution
view release on metacpan or search on metacpan
script/delete-bash-history-entries view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Basis/Email.pm view on Meta::CPAN
# SSL needs a user
has user => (
is => 'ro',
default => sub { '' },
);
# SSL user needs a password
has passwd => (
is => 'ro',
default => sub { '' },
);
lib/App/Basis/Email.pm view on Meta::CPAN
B<Parameters>
host ip address or hotsname of your SMTP server
port optional port number for SMTP, defaults to 25
ssl use SSL mode
user user for ssl
passwd password for ssl
testing flag to show testing mode, prevents sending of email
=cut
sub BUILD {
lib/App/Basis/Email.pm view on Meta::CPAN
my $transport = $self->transport;
$transport = 'SMTP' if ( $self->host );
die "You need either host or transport Sendmail defined" if ( !$transport );
die "You need username/password for SSL" if ( $self->ssl && !( $self->user && $self->passwd ) );
# its sendmail or SMTP
if ( $transport =~ /sendmail/i ) {
die "sendmail_path should be passed to new when using transport => 'sendmail" if( !$self->sendmail_path) ;
$sender = Email::Sender::Transport::Sendmail->new( { sendmail => $self->sendmail_path } );
lib/App/Basis/Email.pm view on Meta::CPAN
{
host => $self->host,
port => $self->port,
ssl => $self->ssl,
sasl_username => $self->user,
sasl_password => $self->passwd
}
);
}
# make sure we set this, as it can be tested for in our test code
$self->_set_transport($transport);
view all matches for this distribution
view release on metacpan or search on metacpan
bin/qpubsub view on Meta::CPAN
abq:
queue:
dsn: dbi:SQLite:/tmp/abq.sqlite
user:
password:
The queue entry holds information about the queue database that you want to connect to, this is
obviously a perl DBI style connection
bin/qpubsub view on Meta::CPAN
# update the config if it needs it
$cfg->store() ;
my $q = $cfg->get("/abq/queue") ;
$q->{prefix} ||= "/" ;
my $theq = connect_queue( $q->{dsn}, $q->{user}, $q->{password},
$q->{prefix} . $queue ) ;
if ( !$theq ) {
msg_exit( "Could not connect to queue $q->{dsn}", 2 ) ;
}
view all matches for this distribution
view release on metacpan or search on metacpan
bin/appbasis view on Meta::CPAN
# lets have the config named after this program
my $cfg = App::Basis::Config->new( filename => "~/.$program" ) ;
# example of using an app specifc config
my $user = $cfg->get('/appbasis/name') ;
my $pass = $cfg->get('/appbasis/password') ;
if ( $opt{verbose} ) {
debug( "INFO", "Started");
}
view all matches for this distribution
view release on metacpan or search on metacpan
public/javascripts/jquery.js view on Meta::CPAN
fix:function(a){if(a[G])return a;var b=a;a=c.Event(b);for(var d=this.props.length,f;d;){f=this.props[--d];a[f]=b[f]}if(!a.target)a.target=a.srcElement||s;if(a.target.nodeType===3)a.target=a.target.parentNode;if(!a.relatedTarget&&a.fromElement)a.relat...
d&&d.scrollTop||0)-(b&&b.clientTop||d&&d.clientTop||0)}if(!a.which&&(a.charCode||a.charCode===0?a.charCode:a.keyCode))a.which=a.charCode||a.keyCode;if(!a.metaKey&&a.ctrlKey)a.metaKey=a.ctrlKey;if(!a.which&&a.button!==w)a.which=a.button&1?1:a.button&2...
"events").live||[],function(){if(d===this.origType.replace(O,""))return b=false});b&&c.event.remove(this,a.origType,oa)}},beforeunload:{setup:function(a,b,d){if(this.setInterval)this.onbeforeunload=d;return false},teardown:function(a,b){if(this.onbef...
a;this.type=a.type}else this.type=a;this.timeStamp=J();this[G]=true};c.Event.prototype={preventDefault:function(){this.isDefaultPrevented=Z;var a=this.originalEvent;if(a){a.preventDefault&&a.preventDefault();a.returnValue=false}},stopPropagation:func...
isImmediatePropagationStopped:Y};var Da=function(a){var b=a.relatedTarget;try{for(;b&&b!==this;)b=b.parentNode;if(b!==this){a.type=a.data;c.event.handle.apply(this,arguments)}}catch(d){}},Ea=function(a){a.type=a.data;c.event.handle.apply(this,argumen...
{setup:function(){if(this.nodeName.toLowerCase()!=="form"){c.event.add(this,"click.specialSubmit",function(a){var b=a.target,d=b.type;if((d==="submit"||d==="image")&&c(b).closest("form").length)return na("submit",this,arguments)});c.event.add(this,"k...
if(!c.support.changeBubbles){var da=/textarea|input|select/i,ea,Fa=function(a){var b=a.type,d=a.value;if(b==="radio"||b==="checkbox")d=a.checked;else if(b==="select-multiple")d=a.selectedIndex>-1?c.map(a.options,function(f){return f.selected}).join("...
e);if(!(f===w||e===f))if(f!=null||e){a.type="change";return c.event.trigger(a,b,d)}}};c.event.special.change={filters:{focusout:fa,click:function(a){var b=a.target,d=b.type;if(d==="radio"||d==="checkbox"||b.nodeName.toLowerCase()==="select")return fa...
"_change_data",Fa(a))}},setup:function(){if(this.type==="file")return false;for(var a in ea)c.event.add(this,a+".specialChange",ea[a]);return da.test(this.nodeName)},teardown:function(){c.event.remove(this,".specialChange");return da.test(this.nodeNa...
d,true)},teardown:function(){this.removeEventListener(a,d,true)}}});c.each(["bind","one"],function(a,b){c.fn[b]=function(d,f,e){if(typeof d==="object"){for(var j in d)this[b](j,f,d[j],e);return this}if(c.isFunction(f)){e=f;f=w}var i=b==="one"?c.proxy...
!a.preventDefault)for(var d in a)this.unbind(d,a[d]);else{d=0;for(var f=this.length;d<f;d++)c.event.remove(this[d],a,b)}return this},delegate:function(a,b,d,f){return this.live(b,d,f,a)},undelegate:function(a,b,d){return arguments.length===0?this.unb...
public/javascripts/jquery.js view on Meta::CPAN
relative:{"+":function(g,h){var l=typeof h==="string",m=l&&!/\W/.test(h);l=l&&!m;if(m)h=h.toLowerCase();m=0;for(var q=g.length,p;m<q;m++)if(p=g[m]){for(;(p=p.previousSibling)&&p.nodeType!==1;);g[m]=l||p&&p.nodeName.toLowerCase()===h?p||false:p===h}l&...
l?p.parentNode:p.parentNode===h;l&&k.filter(h,g,true)}},"":function(g,h,l){var m=e++,q=d;if(typeof h==="string"&&!/\W/.test(h)){var p=h=h.toLowerCase();q=b}q("parentNode",h,m,g,p,l)},"~":function(g,h,l){var m=e++,q=d;if(typeof h==="string"&&!/\W/.tes...
h=h.getElementsByName(g[1]);for(var m=0,q=h.length;m<q;m++)h[m].getAttribute("name")===g[1]&&l.push(h[m]);return l.length===0?null:l}},TAG:function(g,h){return h.getElementsByTagName(g[1])}},preFilter:{CLASS:function(g,h,l,m,q,p){g=" "+g[1].replace(/...
CHILD:function(g){if(g[1]==="nth"){var h=/(-?)(\d*)n((?:\+|-)?\d*)/.exec(g[2]==="even"&&"2n"||g[2]==="odd"&&"2n+1"||!/\D/.test(g[2])&&"0n+"+g[2]||g[2]);g[2]=h[1]+(h[2]||1)-0;g[3]=h[3]-0}g[0]=e++;return g},ATTR:function(g,h,l,m,q,p){h=g[1].replace(/\\...
g);return false}else if(n.match.POS.test(g[0])||n.match.CHILD.test(g[0]))return true;return g},POS:function(g){g.unshift(true);return g}},filters:{enabled:function(g){return g.disabled===false&&g.type!=="hidden"},disabled:function(g){return g.disable...
text:function(g){return"text"===g.type},radio:function(g){return"radio"===g.type},checkbox:function(g){return"checkbox"===g.type},file:function(g){return"file"===g.type},password:function(g){return"password"===g.type},submit:function(g){return"submit...
setFilters:{first:function(g,h){return h===0},last:function(g,h,l,m){return h===m.length-1},even:function(g,h){return h%2===0},odd:function(g,h){return h%2===1},lt:function(g,h,l){return h<l[3]-0},gt:function(g,h,l){return h>l[3]-0},nth:function(g,h,...
h[3];l=0;for(m=h.length;l<m;l++)if(h[l]===g)return false;return true}else k.error("Syntax error, unrecognized expression: "+q)},CHILD:function(g,h){var l=h[1],m=g;switch(l){case "only":case "first":for(;m=m.previousSibling;)if(m.nodeType===1)return f...
m.nextSibling)if(m.nodeType===1)m.nodeIndex=++v;p.sizcache=h}g=g.nodeIndex-q;return l===0?g===0:g%l===0&&g/l>=0}},ID:function(g,h){return g.nodeType===1&&g.getAttribute("id")===h},TAG:function(g,h){return h==="*"&&g.nodeType===1||g.nodeName.toLowerCa...
"="?l===h:m==="*="?l.indexOf(h)>=0:m==="~="?(" "+l+" ").indexOf(h)>=0:!h?l&&g!==false:m==="!="?l!==h:m==="^="?l.indexOf(h)===0:m==="$="?l.substr(l.length-h.length)===h:m==="|="?l===h||l.substr(0,h.length+1)===h+"-":false},POS:function(g,h,l,m){var q=...
h){return"\\"+(h-0+1)}))}var z=function(g,h){g=Array.prototype.slice.call(g,0);if(h){h.push.apply(h,g);return h}return g};try{Array.prototype.slice.call(s.documentElement.childNodes,0)}catch(C){z=function(g,h){h=h||[];if(j.call(g)==="[object Array]")...
public/javascripts/jquery.js view on Meta::CPAN
c.event.remove(o,k):Ca(o,k,b.handle);if(j)delete o[c.expando];else o.removeAttribute&&o.removeAttribute(c.expando);delete f[d]}}});var kb=/z-?index|font-?weight|opacity|zoom|line-?height/i,Na=/alpha\([^)]*\)/,Oa=/opacity=([^)]*)/,ha=/float/i,ia=/-([a...
function(a,b){return b.toUpperCase()};c.fn.css=function(a,b){return X(this,a,b,true,function(d,f,e){if(e===w)return c.curCSS(d,f);if(typeof e==="number"&&!kb.test(f))e+="px";c.style(d,f,e)})};c.extend({style:function(a,b,d){if(!a||a.nodeType===3||a.n...
Na.test(a)?a.replace(Na,b):b}return f.filter&&f.filter.indexOf("opacity=")>=0?parseFloat(Oa.exec(f.filter)[1])/100+"":""}if(ha.test(b))b=Pa;b=b.replace(ia,ja);if(e)f[b]=d;return f[b]},css:function(a,b,d,f){if(b==="width"||b==="height"){var e,j=b==="w...
"border"+this+"Width",true))||0})}a.offsetWidth!==0?i():c.swap(a,ob,i);return Math.max(0,Math.round(e))}return c.curCSS(a,b,d)},curCSS:function(a,b,d){var f,e=a.style;if(!c.support.opacity&&b==="opacity"&&a.currentStyle){f=Oa.test(a.currentStyle.filt...
a.getPropertyValue(b);if(b==="opacity"&&f==="")f="1"}else if(a.currentStyle){d=b.replace(ia,ja);f=a.currentStyle[b]||a.currentStyle[d];if(!mb.test(f)&&nb.test(f)){b=e.left;var j=a.runtimeStyle.left;a.runtimeStyle.left=a.currentStyle.left;e.left=d==="...
a.offsetWidth,d=a.offsetHeight,f=a.nodeName.toLowerCase()==="tr";return b===0&&d===0&&!f?true:b>0&&d>0&&!f?false:c.curCSS(a,"display")==="none"};c.expr.filters.visible=function(a){return!c.expr.filters.hidden(a)}}var sb=J(),tb=/<script(.|\s)*?\/scrip...
"string")return zb.call(this,a);else if(!this.length)return this;var f=a.indexOf(" ");if(f>=0){var e=a.slice(f,a.length);a=a.slice(0,f)}f="GET";if(b)if(c.isFunction(b)){d=b;b=null}else if(typeof b==="object"){b=c.param(b,c.ajaxSettings.traditional);f...
serialize:function(){return c.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?c.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||ub.test(this.no...
function(a,b){c.fn[b]=function(d){return this.bind(b,d)}});c.extend({get:function(a,b,d,f){if(c.isFunction(b)){f=f||d;d=b;b=null}return c.ajax({type:"GET",url:a,data:b,success:d,dataType:f})},getScript:function(a,b){return c.get(a,null,b,"script")},g...
global:true,type:"GET",contentType:"application/x-www-form-urlencoded",processData:true,async:true,xhr:A.XMLHttpRequest&&(A.location.protocol!=="file:"||!A.ActiveXObject)?function(){return new A.XMLHttpRequest}:function(){try{return new A.ActiveXObje...
e.success.call(k,o,i,x);e.global&&f("ajaxSuccess",[x,e])}function d(){e.complete&&e.complete.call(k,x,i);e.global&&f("ajaxComplete",[x,e]);e.global&&!--c.active&&c.event.trigger("ajaxStop")}function f(q,p){(e.context?c(e.context):c.event).trigger(q,p...
"&":"?")+(e.jsonp||"callback")+"=?");else if(!e.data||!N.test(e.data))e.data=(e.data?e.data+"&":"")+(e.jsonp||"callback")+"=?";e.dataType="json"}if(e.dataType==="json"&&(e.data&&N.test(e.data)||N.test(e.url))){j=e.jsonpCallback||"jsonp"+sb++;if(e.dat...
false&&n==="GET"){var r=J(),u=e.url.replace(wb,"$1_="+r+"$2");e.url=u+(u===e.url?(ka.test(e.url)?"&":"?")+"_="+r:"")}if(e.data&&n==="GET")e.url+=(ka.test(e.url)?"&":"?")+e.data;e.global&&!c.active++&&c.event.trigger("ajaxStart");r=(r=xb.exec(e.url))&...
false;C.onload=C.onreadystatechange=function(){if(!B&&(!this.readyState||this.readyState==="loaded"||this.readyState==="complete")){B=true;b();d();C.onload=C.onreadystatechange=null;z&&C.parentNode&&z.removeChild(C)}}}z.insertBefore(C,z.firstChild);r...
c.lastModified[e.url]);c.etag[e.url]&&x.setRequestHeader("If-None-Match",c.etag[e.url])}r||x.setRequestHeader("X-Requested-With","XMLHttpRequest");x.setRequestHeader("Accept",e.dataType&&e.accepts[e.dataType]?e.accepts[e.dataType]+", */*":e.accepts._...
d();E=true;if(x)x.onreadystatechange=c.noop}else if(!E&&x&&(x.readyState===4||q==="timeout")){E=true;x.onreadystatechange=c.noop;i=q==="timeout"?"timeout":!c.httpSuccess(x)?"error":e.ifModified&&c.httpNotModified(x,e.url)?"notmodified":"success";var ...
g("abort")}}catch(l){}e.async&&e.timeout>0&&setTimeout(function(){x&&!E&&g("timeout")},e.timeout);try{x.send(n==="POST"||n==="PUT"||n==="DELETE"?e.data:null)}catch(m){c.handleError(e,x,null,m);d()}e.async||g();return x}},handleError:function(a,b,d,f)...
1223||a.status===0}catch(b){}return false},httpNotModified:function(a,b){var d=a.getResponseHeader("Last-Modified"),f=a.getResponseHeader("Etag");if(d)c.lastModified[b]=d;if(f)c.etag[b]=f;return a.status===304||a.status===0},httpData:function(a,b,d){...
"json"||!b&&f.indexOf("json")>=0)a=c.parseJSON(a);else if(b==="script"||!b&&f.indexOf("javascript")>=0)c.globalEval(a);return a},param:function(a,b){function d(i,o){if(c.isArray(o))c.each(o,function(k,n){b||/\[\]$/.test(i)?f(i,n):d(i+"["+(typeof n===...
view all matches for this distribution
view release on metacpan or search on metacpan
script/bencher-code view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/BigQuery/Importer/MySQL.pm view on Meta::CPAN
our $VERSION = "0.024";
sub new {
my ($class, $args) = @_;
my @required_list = qw/ src dst mysqlhost mysqluser mysqlpassword project_id progs /;
my $obj_data = +{};
for my $required (@required_list) {
if( ! defined $args->{$required} ) { croak "$required is required"};
$obj_data->{$required} = $args->{$required};
}
lib/App/BigQuery/Importer/MySQL.pm view on Meta::CPAN
my $db_host = $self->{'mysqlhost'};
my ($src_schema, $src_table) = split /\./, $self->{'src'};
my ($dst_schema, $dst_table) = split /\./, $self->{'dst'};
# check the table does not have BLOB or TEXT
my $dbh = DBI->connect("dbi:mysql:${src_schema}:${db_host}", $self->{'mysqluser'}, $self->{'mysqlpassword'});
$self->_check_columns(
+{
dbh => $dbh,
src_schema => $src_schema,
lib/App/BigQuery/Importer/MySQL.pm view on Meta::CPAN
die "${mb_command} : failed";
}
}
# dump table data
my $dump_command = "$self->{'progs'}->{'mysql'} -u$self->{'mysqluser'} -p'$self->{'mysqlpassword'}' -h$self->{'mysqlhost'} ${src_schema} -Bse'SELECT * FROM ${src_table}'";
my $dump_result = `$dump_command`;
if ($? != 0) {
die "${dump_command} : failed";
}
$dump_result =~ s/\"//g;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/BitBucketCli/Command/Branches.pm view on Meta::CPAN
??
-t --test ??
CONFIGURATION:
-h --host[=]str Specify the Stash/Bitbucket Servier host name
-P --password[=]str
The password to connect to the server as
-u --username[=]str
The username to connect to the server as
-v --verbose Show more detailed option
--version Prints the version information
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Bitcoin/PaperWallet.pm view on Meta::CPAN
=head1 SYNOPSIS
use App::Bitcoin::PaperWallet;
my $hash = App::Bitcoin::PaperWallet->generate($entropy, $password, {
entropy_length => 128,
});
my $mnemonic = $hash->{mnemonic};
my $addresses = $hash->{addresses};
lib/App/Bitcoin/PaperWallet.pm view on Meta::CPAN
=head1 FUNCTIONS
=head2 generate
my $hash = $class->generate($entropy, $password, \%opts);
Not exported, should be used as a class method. Returns a hash containing two
keys: C<mnemonic> (string) and C<addresses> (array reference of strings).
C<$entropy> is meant to be user-defined entropy (string) that will be passed
through sha256 to obtain wallet seed. Can be passed C<undef> explicitly to use
cryptographically secure random number generator instead.
C<$password> is a password that will be used to secure the generated mnemonic.
Passing empty string will disable the password protection. Note that password
does not have to be strong, since it will only secure the mnemonic in case
someone obtained physical access to your mnemonic. Using a hard, long password
increases the possibility you will not be able to claim your bitcoins in the
future.
C<\%opts> can take following values:
lib/App/Bitcoin/PaperWallet.pm view on Meta::CPAN
This module should properly handle unicode in command line, but for in-Perl
usage it is required to pass UTF8-decoded strings to it (like with C<use
utf8;>).
Internally, passwords are handled as-is, while seeds are encoded into UTF8
before passing them to SHA256.
=item
An extra care should be taken when using this module on Windows command line.
lib/App/Bitcoin/PaperWallet.pm view on Meta::CPAN
funds.
=item
Versions 1.02 and older incorrectly handled unicode. If you generated a wallet
with unicode password in the past, open an issue in the bug tracker.
=back
=head1 SEE ALSO
view all matches for this distribution