view release on metacpan or search on metacpan
lib/Dancer2/Plugin/Auth/OAuth/Provider/Twitter.pm view on Meta::CPAN
my $request = Net::OAuth->request("protected resource")->new(
$self->_default_args_v1,
token => $session_data->{twitter}{access_token},
token_secret => $session_data->{twitter}{access_token_secret},
request_method => 'GET',
request_url => 'https://api.twitter.com/1.1/account/verify_credentials.json',
);
$request->sign;
my $resp = $self->ua->request(GET $request->to_url);
if ($resp->is_success) {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dancer2/Plugin/GraphQL.pm view on Meta::CPAN
Object.assign(headers, extra_headers);
return fetch(fetchURL, {
method: 'post',
headers: headers,
body: JSON.stringify(graphQLParams),
credentials: 'include',
}).then(function (response) {
return response.text();
}).then(function (responseBody) {
try {
return JSON.parse(responseBody);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dancer2/Plugin/Growler.pm view on Meta::CPAN
use Dancer2::Plugin::Growler;
â¦
my $error = locale->maketext('Invalid login credentials.'); # locale() is from L<Dancer2::Plugin::Locale>
growl_error($error);
redirect '/login';
â¦
view all matches for this distribution
view release on metacpan or search on metacpan
t/30-authenticate_Basic.t view on Meta::CPAN
$req->authorization_basic ( 'foo', 'bar');
my $res = $cb->( $req );
is (
$res->code,
401,
'Status 401: without proper credentials'
);
is (
$res->headers->header('WWW-Authenticate'),
qq|Basic realm="some_realm"|,
'HTTP-field: WWW-Authentication without proper credentials'
);
isnt ( # negative testing, we should not get this content
$res->content,
qq|Access granted for default realm|,
'Delivering: without proper credentials'
);
};
test_psgi $app, sub {
my $cb = shift;
t/30-authenticate_Basic.t view on Meta::CPAN
$req->authorization_basic ( 'dave', 'beer');
my $res = $cb->( $req );
is (
$res->code,
200,
'Status 200: with the right credentials'
);
isnt ( # negative testing, we should not be required to authenticate
$res->headers->header('WWW-Authenticate'),
qq|Basic realm="some_realm"|,
'HTTP-field: WWW-Authentication with the right credentials'
);
is (
$res->content,
qq|Access granted for default realm|,
'Delivering: with the right credentials'
);
};
#
# Roles
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dancer2/Plugin/SPID.pm view on Meta::CPAN
dance;
=head1 ABSTRACT
This Perl module is a plugin for the L<Dancer2> web framework. It allows developers of SPID Service Providers to easily add SPID authentication to their Dancer2 applications. L<SPID|https://www.spid.gov.it/> is the Italian digital identity system, wh...
This module provides the highest level of abstraction and ease of use for integration of SPID in a Dancer2 web application. Just set a few configuration options and you'll be able to generate the HTML markup for the SPID button on the fly (to be comp...
See the F<example/> directory for a demo application.
view all matches for this distribution
view release on metacpan or search on metacpan
share/assets/dash_core_components/async~plotlyjs.js view on Meta::CPAN
(window.webpackJsonpdash_core_components=window.webpackJsonpdash_core_components||[]).push([[5],{685:function(t,e){!function(r){"object"==typeof e&&void 0!==t?t.exports=r():"function"==typeof define&&define.amd?define([],r):("undefined"!=typeof windo...
view all matches for this distribution
view release on metacpan or search on metacpan
examples/babel.pl view on Meta::CPAN
# open and possibly create AutoDB database
my %db_params=(create=>$OPTIONS{create},database=>$OPTIONS{database},host=>$OPTIONS{host},
user=>$OPTIONS{user},password=>$OPTIONS{password});
my $autodb=new Class::AutoDB(%db_params);
unless ($autodb->is_connected) {
my $errstr='Cannot connect to AutoDB database using supplied credentials: '.
join(', ',map {"$_=$OPTIONS{$_}"} (qw(database host user password)));
confess $errstr;
}
# set autodb class attribute in Babel
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/Downloader/Feed.pm view on Meta::CPAN
my ($xp,$context,$xpath) = @_;
my $xpc = XML::LibXML::XPathContext->new($context);
$xpc->registerNs(default => $defaultNamespaceURI) if $defaultNamespaceURI;
my $value = $xpc->findvalue($xpath);
TRACE "got $value from $xpath";
LOGDIE "Got 'Bad credentials' for feed ".$self->name if $value && $value eq "Bad credentials";
return $value;
}
sub _make_unique_filename {
my $self = shift;
lib/Data/Downloader/Feed.pm view on Meta::CPAN
Refreshing a feed may also :
- remove files which are now obolete (because the feed has a urn for a different file)
- update the symlinks for files whose metadata has changed
Also if both "user" and "password" are passed, they are treated specially
and sent as HTTP Basic auth credentials for the rss feed.
=cut
sub refresh {
my $self = shift;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/Mirror.pm view on Meta::CPAN
=head2 $UA
This is an L<LWP::UserAgent> object used to retrieve remote resources. You
may wish to use this variable to configure various aspects of its behaviour,
such as credentials, user agent string, TLS options, etc.
=head2 $JSON
This is a L<JSON::XS> object used for JSON decoding. You may wish to use this
variable to change how it processes JSON data.
view all matches for this distribution
view release on metacpan or search on metacpan
scripts/passphrase-test view on Meta::CPAN
use Readonly;
use Test::More;
Readonly my $DEFAULT_RULES_FILE => '/etc/passphrase_rules';
# subclass of LWP::UserAgent that grabs credentials
my $Username = $ENV{LOGNAME};
my $Password;
package MyAgent;
use base qw(LWP::UserAgent);
sub get_basic_credentials { ($Username, $Password) };
package main;
# parse command line
my ($debug, $help, $location);
my $file = $DEFAULT_RULES_FILE;
view all matches for this distribution
view release on metacpan or search on metacpan
share/dictionary.txt view on Meta::CPAN
creatures
credence
credence's
credential
credential's
credentials
credenza
credenza's
credenzas
credibility
credibility's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/Password/zxcvbn/RankedDictionaries/English.pm view on Meta::CPAN
'creations' => 3051,
'creatively' => 17321,
'creature' => 1948,
'creatures' => 2868,
'credence' => 12853,
'credentials' => 4343,
'credenza' => 18359,
'credibility' => 4342,
'credible' => 7015,
'credit' => 945,
'credo' => 13306,
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/Random/Contact/Language/EN.pm view on Meta::CPAN
creatures
credence
credence's
credential
credential's
credentials
credenza
credenza's
credenzas
credibility
credibility's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/TagDB/Tutorial/Conventions.pod view on Meta::CPAN
In contrast an entity (natural or legal) should have roles including
C<entity> (C<09ade47e-b049-436b-bf10-8357f4b6bc05>).
Entities also include some amount of profile data. However this should be limited
to such data that is directly linked to the entity and is valid indefinitely
(e.g. names, cultural background, locations, and important events).
An entity never contain any technical data such as login credentials.
Such data is a clear sign that it is in fact an account.
Legal entities are entities that are created by legal means. Most commonly
companies. In order for them to be legal entities registration and legal
documentation is needed.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Data/Transpose/PasswordPolicy.pm view on Meta::CPAN
=head1 SYNOPSIS
use Data::Transpose::PasswordPolicy;
my %credentials = (username => "marco",
password => "My.very.very.5strong.pzwd"
);
my $pv = Data::Transpose::PasswordPolicy->new(\%credentials)
if (my $password = $pv->is_valid) {
print "$password is OK";
}
else {
lib/Data/Transpose/PasswordPolicy.pm view on Meta::CPAN
=head1 METHODS
=cut
=head2 new(%credentials)
Create a new Data::Transpose::PasswordPolicy object using the
credentials provided to the constructor.
=cut
has username => (is => 'rw',
isa => Str);
view all matches for this distribution
view release on metacpan or search on metacpan
Sets the timeout for waiting for a response from a node. Default: 12000 milliseconds
Return: undef
=head3 cluster_set_credentials
$cass->cluster_set_credentials($username, $password);
Sets credentials for plain text authentication.
Return: undef
=head3 cluster_set_load_balance_round_robin
view all matches for this distribution
view release on metacpan or search on metacpan
docker/README.md view on Meta::CPAN
- `HUB_USERNAME` â your Docker Hub username
- `HUB_TOKEN` â a Personal Access Token (PAT)
These are needed because tag deletion uses the Docker Hub web API, which
authenticates separately from `docker push` (which uses `docker login`
credentials). To create a PAT:
1. Go to <https://hub.docker.com/settings/security>
2. Click **Personal access tokens** and then **Generate new token**
3. Give it **Read, Write & Delete** permissions
4. Copy the token and export it as `HUB_TOKEN`
view all matches for this distribution
view release on metacpan or search on metacpan
eg/cd-LWP.html view on Meta::CPAN
<table border="0" width="100%" cellpadding="5">
<tbody>
<tr>
<td class="tdOperation">
credentials
</td>
</tr>
</tbody>
</table>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Developer/Dashboard.pm view on Meta::CPAN
values into the visible request URL, headers, and body fields, renders a
hide/show C<Request Credentials> section in the workspace with
Postman-compatible C<Basic>, C<API Token>, C<API Key>, C<OAuth2>,
C<Apple Login>, C<Amazon Login>, C<Facebook Login>, and C<Microsoft Login>
presets, hydrates imported Postman C<request.auth> data back into that
credentials panel, exports saved request auth back into valid Postman JSON,
and applies the configured auth to outgoing headers or query strings when the
request is sent. The OAuth-style provider presets fill common authorize/token
URLs, but the actual access token and client details remain values the user
enters for that request. The bookmark also tightens project-local
F<config/api-dashboard> to C<0700> and each saved collection JSON file there
lib/Developer/Dashboard.pm view on Meta::CPAN
connection profiles as separate concepts so the same saved SQL can run
against different connections. Share URLs only carry the DSN-plus-user
connection id without a password; if another machine already has a matching
saved profile with a saved password, the bookmark reruns the shared SQL
there, otherwise it opens a draft connection profile built from that
connection id so the other user can add any required local credentials and
run it. Passwordless profiles such as SQLite may keep the user blank, and a
matching blank-user shared route auto-runs without inventing a password
warning when the DSN does not need one. The profile editor now renders the
driver field as a dropdown of installed C<DBD::*> modules, shows
driver-specific connection guidance beside that dropdown, seeds a usable DSN
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Device/Cisco/NXAPI.pm view on Meta::CPAN
my $uri = URI->new($self->uri);
croak "Only http:// or https:// supported." if !($uri->scheme eq 'http' or $uri->scheme eq 'https');
$self->http_request(HTTP::Request->new(POST => $uri->scheme()."://".$uri->host_port()."/ins"));
$self->http_request()->content_type("application/json-rpc");
$self->user_agent()->credentials($uri->host_port(), 'Secure Zone', $self->username, $self->password);
}
=head1 METHODS
=head2 tester()
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Device/Firewall/PaloAlto.pm view on Meta::CPAN
=head2 auth
my $fw = $fw->auth;
This function authenticates the credentials passed to new against the firewall.
If successful, it returns the object itself to all method calls to be chains. If unsuccessful, it returns a L<Class::Error> object.
=head2 debug
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Device/Neurio.pm view on Meta::CPAN
# Submit request for authentiaction token.
my $response = $self->{'ua'}->post($self->{'base_url'}.'/oauth2/token',
{ basic_authentication => $self->{'base64'},
Content_Type => 'application/x-www-form-urlencoded',
grant_type => 'client_credentials',
client_id => $self->{'key'},
client_secret => $self->{'secret'},
}
);
view all matches for this distribution
view release on metacpan or search on metacpan
t/000-http_errors.t view on Meta::CPAN
),
HTTP::Response->new(
403,
"403 Response",
undef,
q{<response status = 'error' code = '403'><result><msg>Invalid credentials.</msg></result></response>}
),
HTTP::Response->new(
500,
"500 Response",
undef,
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Device/TPLink/Kasa.pm view on Meta::CPAN
unless ($self->username && $self->password) {
Carp::croak "Username and/or password not set!";
}
# We have a username, password, and UUID - everything we need to get a new token
my $credentials = {
appType => 'Kasa_Android',
cloudUserName => $self->username,
cloudPassword => $self->password,
terminalUUID => $self->uuid
};
my $request_object = {
method => 'login',
params => $credentials
};
my $user_agent = LWP::UserAgent::JSON->new;
# Uncomment the next two lines if you need to debug...
#$user_agent->add_handler("request_send", sub { shift->dump; return });
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
isa => Str,
default => sub {'dezi-spider http://dezi.org/'},
);
has 'authn_callback' => ( is => 'rw', isa => CodeRef );
has 'credential_timeout' => ( is => 'rw', isa => Int, default => sub {30} );
has 'credentials' => ( is => 'rw', isa => Str );
has 'delay' => ( is => 'rw', isa => Int, default => sub {5} );
has 'email' => (
is => 'rw',
isa => Str,
default => sub {'dezi@user.failed.to.set.email.invalid'},
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
Get/set the number of seconds to wait before considering the remote
server unresponsive. The default is 10.
=item authn_callback I<code_ref>
CODE reference to fetch username/password credentials when necessary. See also
C<credentials>.
=item credential_timeout I<n>
Number of seconds to wait before skipping manual prompt for username/password.
=item credentials I<user:pass>
String with C<username>:C<password> pair to be used when prompted by
the server.
=item follow_redirects I<1|0>
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
}
}
# otherwise, prompt (over and over)
if ( !$user_pass ) {
$user_pass = $self->_get_basic_credentials( $uri, $realm );
}
if ($user_pass) {
$uri->userinfo($user_pass);
$self->{cur_realm} = $realm; # save so we can cache if it's valid
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
return 0;
}
# From spider.pl
sub _get_basic_credentials {
my ( $self, $uri, $realm ) = @_;
# Exists but undefined means don't ask.
return
if exists $self->{credential_timeout}
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
}
=head2 get_authorized_doc( I<uri>, I<response> )
Called internally when the server returns a 401 or 403 response.
Will attempt to determine the correct credentials for I<uri>
based on the previous attempt in I<response> and what you
have configured in B<credentials>, B<authn_callback> or when
manually prompted.
=cut
sub get_authorized_doc {
my $self = shift;
my $uri = shift or croak "uri required";
my $response = shift or croak "response required";
# set up credentials
$self->_authorize( $uri, $response->http_response ) or return;
return $self->_make_request($uri);
}
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
content => ( $encoding =~ m/utf-8/i ? to_utf8($buf) : $buf ),
size => $headers->content_length || length( pack 'C0a*', $buf ),
charset => $encoding,
);
# cache whatever credentials were used so we can re-use
if ( $self->{cur_realm} and $uri->userinfo ) {
my $key = $uri->canonical->host_port . ':' . $self->{cur_realm};
$self->{_auth_cache}->add( $key => $uri->userinfo );
# not too sure of the best logic here
lib/Dezi/Aggregator/Spider.pm view on Meta::CPAN
sub _get_user_pass {
my $self = shift;
my $uri = shift;
# Set basic auth if defined - use URI specific first, then credentials.
# this doesn't track what should have authorization
my $last_auth;
if ( $self->{last_auth} ) {
my $path = $uri->path;
$path =~ s!/[^/]*$!!;
$last_auth = $self->{last_auth}->{auth}
if $self->{last_auth}->{path} eq $path;
}
my ( $user, $pass ) = split /:/,
( $last_auth || $uri->userinfo || $self->credentials || '' );
return ( $user, $pass );
}
=head2 looks_like_feed( I<http_response> )
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dezi/Client.pm view on Meta::CPAN
=item username I<username>
=item password I<password>
If present, the username and password credentials will
be set in each internal HTTP::Request object for any
non-idempotent action (delete(), index(), commit(), rollback()).
=back
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dezi/Config.pm view on Meta::CPAN
}
else {
%args = @_;
}
# save credentials in a closure but not plain in args
my $username = delete $args{username};
my $password = delete $args{password};
my $authenticator = ( defined $username and defined $password )
? sub {
my ( $u, $p ) = @_;
lib/Dezi/Config.pm view on Meta::CPAN
server_class => 'Dezi::Server',
# authentication for non-idempotent requests.
# if both username && password are defined,
# then /index, /commit and /rollback require
# basic authentication credentials.
username => 'someone',
password => 'somesecret',
# optional
# see Dezi::Stats
view all matches for this distribution
view release on metacpan or search on metacpan
dcdb-query.perl view on Meta::CPAN
-ll # score by 1-sided log-likelihood ratio (Evert 2008)
-eps EPS # smoothing constant (default=0)
-diff DIFFOP # diff operation (adiff|diff|sum|min|max|avg|havg|gavg; default=adiff)
I/O Options:
-user USER[:PASSWD] # user credentials for HTTP queries
-text # use text output (default)
-json # use json output
-null # don't output profile at all
-[no]pretty # do/don't pretty-print json output (default=do)
-log-level LEVEL # set minimum DiaColloDB log-level
dcdb-query.perl view on Meta::CPAN
=over 4
=item -user USER[:PASSWD]
Specify user credentials for HTTP queries
=item -text
generate text output (default).
view all matches for this distribution
view release on metacpan or search on metacpan
will have to edit your copy of the module.
The underlying object is an array containing the Net::FTP
connection object and the absolute path to
the directory, modulo any chrooting the FTP server might do
based on the provided credentials, of course.
Keys are names within the directory, values
are the contents of the files.
A leading space is used as an escape character, the empty
view all matches for this distribution