view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/Authority.pm view on Meta::CPAN
}
}
close $fh or $self->log_fatal( "Unable to close $file - $!" );
$self->log_fatal( 'PAUSE user not found in ~/.pause' );
} else {
$self->log_fatal( 'PAUSE credentials not found in "config.ini" or "dist.ini" or "~/.pause"! Please set it or specify an authority for this plugin.' );
}
}
},
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/Bitbucket.pm view on Meta::CPAN
die "Unknown local repository type!";
}
},
);
sub _get_credentials {
my ($self, $nopass) = @_;
# TODO I'm so lazy...
## no critic (InputOutput::ProhibitBacktickOperators)
lib/Dist/Zilla/Plugin/Bitbucket.pm view on Meta::CPAN
}
}
# Make sure we return full path including user
if ($repo !~ /.*\/.*/) {
($login, undef) = $self->_get_credentials(1);
$repo = "$login/$repo";
}
} else {
# Get it from .hgrc
if ( -f '.hg/hgrc' ) {
lib/Dist/Zilla/Plugin/Bitbucket.pm view on Meta::CPAN
=back
=head2 Configuration
Configure git with your Bitbucket credentials:
$ git config --global bitbucket.user LoginName
$ git config --global bitbucket.password MySecretPassword
Alternatively you can install L<Config::Identity> and write your credentials
in the (optionally GPG-encrypted) C<~/.bitbucket> file as follows:
login LoginName
password MySecretPassword
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/GitHub/CreateRelease.pm view on Meta::CPAN
There are numerous combinations of Dist::Zilla plugins that can perform those
functions.
=head1 GITHUB API AUTHENTICATION
This module uses Config::Identity::GitHub to access the GitHub API credentials.
You need to create a file in your home directory named B<.github-identity>. It
requires the following fields:
login github_username OR github_organization
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/GitHub/UploadRelease.pm view on Meta::CPAN
$self->log_debug("$method $url");
$headers //= {};
my ($login, $pass, $otp) = $self->_get_credentials(0);
if ($pass) {
my $basic = encode_base64("$login:$pass", '');
$headers->{Authorization} = "Basic $basic";
}
lib/Dist/Zilla/Plugin/GitHub/UploadRelease.pm view on Meta::CPAN
sub after_release {
my ($self, $archive) = @_;
my $dist_name = $self->zilla->name;
my ($login) = $self->_get_credentials(1);
return unless $login;
my $repo_name = $self->_get_repo_name($login);
my $git_tag_plugin = $self->zilla->plugin_named('Git::Tag') // $self->log_fatal('Plugin Git::Tag not found');
lib/Dist/Zilla/Plugin/GitHub/UploadRelease.pm view on Meta::CPAN
version 0.002
=head1 SYNOPSIS
Configure git with your GitHub credentials:
git config --global github.user LoginName
git config --global github.password GitHubPassword
Alternatively you can install L<Config::Identity> and write your credentials in the (optionally GPG-encrypted) C<~/.github> file as follows:
login LoginName
password GitHubpassword
(if only the login name is set, the password will be asked interactively)
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/GitHub.pm view on Meta::CPAN
isa => 'Maybe[Str]',
lazy => 1,
builder => '_build_login',
);
has _credentials => (
is => 'ro',
isa => 'HashRef',
lazy => 1,
builder => '_build_credentials',
);
#pod =head1 DESCRIPTION
#pod
#pod B<Dist-Zilla-Plugin-GitHub> is a set of plugins for L<Dist::Zilla> intended
lib/Dist/Zilla/Plugin/GitHub.pm view on Meta::CPAN
}
return $login;
}
sub _build_credentials {
my $self = shift;
my ($login, $pass, $token);
$login = $self->_login;
lib/Dist/Zilla/Plugin/GitHub.pm view on Meta::CPAN
}
return { login => $login, pass => $pass, token => $token };
}
sub _has_credentials {
my $self = shift;
return keys %{$self->_credentials};
}
sub _auth_headers {
my $self = shift;
my $credentials = $self->_credentials;
my %headers = ( Accept => 'application/vnd.github.v3+json' );
if ($credentials->{pass}) {
require MIME::Base64;
my $basic = MIME::Base64::encode_base64("$credentials->{login}:$credentials->{pass}", '');
$headers{Authorization} = "Basic $basic";
}
elsif ($credentials->{token}) {
$headers{Authorization} = "token $credentials->{token}";
}
# This can't be done at object creation because we autodetect the
# need for 2FA when GitHub says we need it, so we won't know to
# prompt at object creation time.
if ($self->prompt_2fa) {
my $otp = $self->zilla->chrome->prompt_str(
"GitHub two-factor authentication code for '$credentials->{login}'",
{ noecho => 1 },
);
$headers{'X-GitHub-OTP'} = $otp;
$self->log([ "Using two-factor authentication" ]);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/NexusRelease.pm view on Meta::CPAN
$self->{'Dist::Zilla'}{plugin}->log(@_);
}
}
has credentials_stash => (
is => 'ro',
isa => 'Str',
default => '%Nexus'
);
has _credentials_stash_obj => (
is => 'ro',
isa => maybe_type( class_type('Dist::Zilla::Stash::Nexus') ),
lazy => 1,
init_arg => undef,
default => sub { $_[0]->zilla->stash_named( $_[0]->credentials_stash ) },
);
sub _credential {
my ( $self, $name ) = @_;
return unless my $stash = $self->_credentials_stash_obj;
return $stash->$name;
}
has username => (
lib/Dist/Zilla/Plugin/NexusRelease.pm view on Meta::CPAN
The Nexus Artefact is set to the Perl distribution name (C<name> in F<dist.ini>, and the version is set to the Perl distribution version.
=head1 ATTRIBUTES
=head2 credentials_stash
This attribute holds the name of a L<Nexus stash|Dist::Zilla::Stash::Nexus>
that will contain the credentials to be used for the upload. By default,
NexusRelease will look for a C<%Nexus> stash.
=head2 username
This is the Nexus user to log in with.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/PERLANCAR/Authority.pm view on Meta::CPAN
}
}
close $fh or $self->log_fatal( "Unable to close $file - $!" );
$self->log_fatal( 'PAUSE user not found in ~/.pause' );
} else {
$self->log( 'PAUSE credentials not found in "config.ini" or "dist.ini" or "~/.pause", will be using "cpan:<none>" as the AUTHORITY' );
return 'cpan:<none>';
}
}
},
);
lib/Dist/Zilla/Plugin/PERLANCAR/Authority.pm view on Meta::CPAN
=head1 DESCRIPTION
B<Fork note>: This plugin is a fork of L<Dist::Zilla::Plugin::Authority>. When
PAUSE credential is not found, this plugin will set C<$AUTHORITY> to C<<
cpan:<none> >> instead of bailing out. TODO: bail if PAUSE credentials is not
found and we are doing a release (instead of just 'dzil test' or 'dzil build').
The rest is Dist::Zilla::Plugin::Authority's documentation.
This plugin adds the authority data to your distribution. It adds the data to
your modules and metadata. Normally it looks for the PAUSE author id in your
view all matches for this distribution
view release on metacpan or search on metacpan
before, you'll need to replace it with "recurse = 0" in your
dist.ini file.
[BUG FIXES]
- The plugin was ignoring your authentication credentials when
using a remote repository [GitHub #7]. Thanks @hstaugaard.
0.085 2014-01-13 14:48:42 America/Los_Angeles
[BUG FIXES]
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Role/Subversion.pm view on Meta::CPAN
=head1 ATTRIBUTES
=head2 svn_user
Your Subversion user ID. Defaults to the cached credentials for your
distribution's working copy.
=head2 svn_password
Your Subversion password. Defaults to the cached credentials for your
distribution's working copy.
=head2 working_url
URL for the directory currently holding your distribution. Defaults to your
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/UploadToCPAN/WWWPAUSESimple.pm view on Meta::CPAN
use Scalar::Util qw(weaken);
use Try::Tiny;
use namespace::autoclean;
has credentials_stash => (
is => 'ro',
isa => 'Str',
default => '%PAUSE'
);
has _credentials_stash_obj => (
is => 'ro',
isa => maybe_type( class_type('Dist::Zilla::Stash::PAUSE') ),
lazy => 1,
init_arg => undef,
default => sub { $_[0]->zilla->stash_named( $_[0]->credentials_stash ) },
);
sub _credential {
my ($self, $name) = @_;
return unless my $stash = $self->_credentials_stash_obj;
return $stash->$name;
}
sub mvp_aliases {
return { user => 'username' };
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/UploadToGoogleCode.pm view on Meta::CPAN
If loaded, this plugin will allow the F<release> command to upload to Google Code.
=head1 DESCRIPTION
This plugin looks for the Google Code project name in F<dist.ini>, and gets your
Google Code credentials from F<~/.googlecode-identity> (which can be
GnuPG-encrypted; see L<Config::Identity>).
If any configuration is missing, it will prompt you to enter your
username and password during the BeforeRelease phase. Entering a
blank username or password will abort the release.
view all matches for this distribution
view release on metacpan or search on metacpan
0.28 2012-06-14
- Only do post-release stuff if it was a real release
- Require @GitHub 0.22
- bug related to finding a fork's parent repo
- Now uses Config::Identity to get credentials
0.27 2012-05-25
- Add SchwartzRatio plugin
- Allow setting github = 0 to disable GitHub::Meta and GitHub::Update
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/PluginBundle/Author/ETHER.pm view on Meta::CPAN
unless File::Spec->file_name_is_absolute($file);
return {} unless -e $file && -r _;
my $cfg = try {
CPAN::Uploader->read_config_file($file)
} catch {
warn "[\@Author::ETHER] Couldn't load credentials from '$file': $_";
{};
};
return $cfg;
}
view all matches for this distribution
view release on metacpan or search on metacpan
# Claude Code â commit: skills/, agents/, hooks/, settings.json
# Ignore: local overrides, credentials, session data
# Tracked: shared config & extensibility
!/.claude/
.claude/*
!.claude/settings.json
# Local overrides (machine-specific)
.claude/*.local.*
.claude/local/
# Credentials & session state (never track)
.claude/.credentials.json
.claude/statsig/
.claude/todos/
.claude/projects/
Dist-Zilla-PluginBundle-Author-GETTY-*
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/PluginBundle/Author/GSG.pm view on Meta::CPAN
local $git_tag_plugin->{plugin_name} = 'Git::Tag';
return $self->$orig(@args);
};
sub _get_credentials {
my ($self, $login_only) = @_;
my $creds = $self->_credentials;
# return $creds->{login} if $login_only;
my $otp;
$otp = $self->zilla->chrome->prompt_str(
"GitHub two-factor authentication code for '$creds->{login}'",
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/GitLab.pm view on Meta::CPAN
has repo => (
is => 'ro',
isa => 'Maybe[Str]',
);
has _credentials => (
is => 'ro',
isa => 'HashRef',
lazy => 1,
builder => '_build_credentials',
);
has _login => (
is => 'ro',
isa => 'Maybe[Str]',
lib/Dist/Zilla/Plugin/GitLab.pm view on Meta::CPAN
}
return $login;
}
sub _build_credentials {
my $self = shift;
my ( $login, $token );
$login = $self->_login;
lib/Dist/Zilla/Plugin/GitLab.pm view on Meta::CPAN
}
return { login => $login, token => $token };
}
sub _has_credentials {
my $self = shift;
return keys %{ $self->_credentials };
}
sub _auth_headers {
my $self = shift;
my $credentials = $self->_credentials;
my %headers = ();
if ( $credentials->{token} ) {
$headers{'PRIVATE-TOKEN'} = $credentials->{token};
}
return \%headers;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Role/EnsureStash.pm view on Meta::CPAN
This is a L<Dist::Zilla> role designed to ensure that if a plugin needs access
to a stash, and that stash does not already exist, then it is automatically
created and returned.
This is more intended for helping plugins that need to share common data do so
via stashes, rather than specific information (e.g. PAUSE credentials and the
like). As such, the stash instances created here are expected to largely be
able to do their thing without much (preferably any) external input.
=head1 REQUIRED METHODS
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Stash/OnePasswordLogin.pm view on Meta::CPAN
package Dist::Zilla::Stash::OnePasswordLogin 0.002;
# ABSTRACT: get login credentials from 1Password
#pod =head1 OVERVIEW
#pod
#pod This is a stash class, one of the less-often seen kinds of Dist::Zilla
#pod components. It's expected that you'll use it for things that expect a "Login"
lib/Dist/Zilla/Stash/OnePasswordLogin.pm view on Meta::CPAN
=encoding UTF-8
=head1 NAME
Dist::Zilla::Stash::OnePasswordLogin - get login credentials from 1Password
=head1 VERSION
version 0.002
view all matches for this distribution
view release on metacpan or search on metacpan
Revision history for Dist-Zilla-Stash-PAUSE-Encrypted
0.003 2012-07-13 11:42:38 America/Los_Angeles
- replace BUILD with identity. This lets us lazy-load our credentials
0.002 2012-07-07 11:17:44 America/Los_Angeles
- change doc -- don't alter UploadToCPAN's credential_stash option, rename
our stash
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Util/RoleDB/Items/Core.pm view on Meta::CPAN
_add_entry( q[-MutableFile] => q[something that can act like a file with changeable contents] );
_add_entry( q[-PPI] => q[a role for plugins which use PPI] );
_add_entry( q[-PluginBundle::Easy] => q[something that bundles a bunch of plugins easily] );
_add_entry( q[-Plugin] => q[something that gets plugged in to Dist::Zilla] );
_add_entry( q[-Stash::Authors] => q[a stash that provides a list of author strings] );
_add_entry( q[-Stash::Login] => q[a stash with username/password credentials] );
_add_entry( q[-Stash] => q[something that stores options or data for later reference] );
_add_entry( q[-StubBuild] => q[provides an empty BUILD methods] );
_add_entry( q[-TextTemplate] => q[something that renders a Text::Template template string] );
return;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dist/Zilla/Plugin/UploadToCPAN.pm view on Meta::CPAN
my $self = shift;
$self->{'Dist::Zilla'}{plugin}->log(@_);
}
}
#pod =attr credentials_stash
#pod
#pod This attribute holds the name of a L<PAUSE stash|Dist::Zilla::Stash::Login>
#pod that will contain the credentials to be used for the upload. By default,
#pod UploadToCPAN will look for a C<%PAUSE> stash.
#pod
#pod =cut
has credentials_stash => (
is => 'ro',
isa => 'Str',
default => '%PAUSE'
);
has _credentials_stash_obj => (
is => 'ro',
isa => maybe_type( role_type('Dist::Zilla::Role::Stash::Login') ),
lazy => 1,
init_arg => undef,
default => sub { $_[0]->zilla->stash_named( $_[0]->credentials_stash ) },
);
sub _credential {
my ($self, $name) = @_;
return unless my $stash = $self->_credentials_stash_obj;
return $stash->$name;
}
sub mvp_aliases {
return { user => 'username' };
lib/Dist/Zilla/Plugin/UploadToCPAN.pm view on Meta::CPAN
},
);
#pod =attr pause_cfg_file
#pod
#pod This is the name of the file containing your pause credentials. It defaults
#pod F<.pause>. If you give a relative path, it is taken to be relative to
#pod L</pause_cfg_dir>.
#pod
#pod =cut
lib/Dist/Zilla/Plugin/UploadToCPAN.pm view on Meta::CPAN
unless File::Spec->file_name_is_absolute($file);
return {} unless -e $file && -r _;
my $cfg = try {
CPAN::Uploader->read_config_file($file)
} catch {
$self->log("Couldn't load credentials from '$file': $_");
{};
};
return $cfg;
},
);
lib/Dist/Zilla/Plugin/UploadToCPAN.pm view on Meta::CPAN
for any reason, and there is no promise that patches will be accepted to
lower the minimum required perl.
=head1 ATTRIBUTES
=head2 credentials_stash
This attribute holds the name of a L<PAUSE stash|Dist::Zilla::Stash::Login>
that will contain the credentials to be used for the upload. By default,
UploadToCPAN will look for a C<%PAUSE> stash.
=head2 username
This option supplies the user's PAUSE username.
lib/Dist/Zilla/Plugin/UploadToCPAN.pm view on Meta::CPAN
F<dist.ini>. It will be looked for in the user's PAUSE configuration; if not
found, the user will be prompted.
=head2 pause_cfg_file
This is the name of the file containing your pause credentials. It defaults
F<.pause>. If you give a relative path, it is taken to be relative to
L</pause_cfg_dir>.
=head2 pause_cfg_dir
view all matches for this distribution
view release on metacpan or search on metacpan
lib/DocRaptor.pm view on Meta::CPAN
sub create
{
my $self = shift;
my $options = shift; # a DocRaptor::DocOptions object
my %request_options = $self->_coerce_options_to_request_format( $options );
$request_options{'user_credentials'} = $self->api_key;
my $request = POST( $DOC_RAPTOR_URL, [%request_options] );
return $self->_user_agent->request($request);
}
sub _user_agent
view all matches for this distribution
view release on metacpan or search on metacpan
share/specs/v1.25.yaml view on Meta::CPAN
}
```
The `serveraddress` is a domain/IP without a protocol. Throughout this structure, double quotes are required.
If you have already got an identity token from the [`/auth` endpoint](#operation/SystemAuth), you can just pass this instead of credentials:
```
{
"identitytoken": "9cbaf023786cd7..."
}
share/specs/v1.25.yaml view on Meta::CPAN
$ref: "#/definitions/ErrorResponse"
tags: ["Image"]
/auth:
post:
summary: "Check auth configuration"
description: "Validate credentials for a registry and, if available, get an identity token for accessing the registry without password."
operationId: "SystemAuth"
consumes: ["application/json"]
produces: ["application/json"]
responses:
200:
share/specs/v1.25.yaml view on Meta::CPAN
type: "integer"
- name: "registryAuthFrom"
in: "query"
type: "string"
description: "If the X-Registry-Auth header is not specified, this
parameter indicates where to find registry authorization credentials. The
valid values are `spec` and `previous-spec`."
default: "spec"
- name: "X-Registry-Auth"
in: "header"
description: "A base64-encoded auth configuration for pulling from private registries. [See the authentication section for details.](#section/Authentication)"
view all matches for this distribution
view release on metacpan or search on metacpan
examples/gce_sa_explicit.pl view on Meta::CPAN
use Docker::Registry::GCE;
use Docker::Registry::Auth::GCEServiceAccount;
my $ce = $ENV{ CLIENT_EMAIL } // die "Please set ENV CLIENT_EMAIL";
my $pk = $ENV{ PRIVATE_KEY } // die "Please set ENV PRIVATE_KEY";
#passing a repo is because sometimes your credentials don't let you list
#the repositories, but you can see the tags of a repo if you know its name
my $repo = $ARGV[0];
my $sa = Docker::Registry::Auth::GCEServiceAccount->new(
client_email => $ce,
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Document/eSign/Docusign/buildCredentials.pm view on Meta::CPAN
use strict;
use warnings;
use XML::LibXML;
use JSON;
# Builds the auth credentials.
=head1 NAME
Document::eSign::Docusign::buildCredentials - Builds the credentials object.
=head1 VERSION
Version 0.02
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Dokuwiki/RPC/XML/Client.pm view on Meta::CPAN
my $wiki =
Dokuwiki::RPC::XML::Client
-> reach('https://wiki.example.com/');
my $credentials = Net::Netrc->lookup($host)
or die "please add a fake $host machine in your ~/.netrc";
my ( $l, $p ) = $credentials->lpa;
$wiki->login( $l, $p )->value
or die "can't authenticate with $l";
say $wiki->getVersion->value;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Domain/Register/DomainShare.pm view on Meta::CPAN
=head1 SUBROUTINES/METHODS
An object of this class represents a potential dialogue with Dot TK's servers,
and as such needs correct log in credentials to do anything useful.
Standard usage is to create an object and perform an arbitrary number of
transactions with the remote server. There is a ping transaction which does not
require parameters, that should be used to test if a connection is still possible.
No state is saved by the remote server between transactions, so it is not
necessary to log on or log off separately, as long as valid credentials are
supplied.
A full list of available functions is available via the technical documentation
available via http://domainshare.tk.
view all matches for this distribution
view release on metacpan or search on metacpan
examples/basic.pl view on Meta::CPAN
print "Ping was successful.\n";
# Tell the object about your identity with the Dot TK servers.
# Note:if you want this to actually run, you need to change these values.
$api->credentials('email@tk_reseller.com', 'reseller_passsword');
my @domains_to_check = qw{ DOT.TK TESTDOMAIN-0001.TK DONALD-DUCK.TK};
foreach my $domain (@domains_to_check) {
# check if the domain is available, with prices for 3 years
view all matches for this distribution
view release on metacpan or search on metacpan
Open an association to the DSA specified in dsa and
running on the port specified by port. If no port is
specified, then duaperl will use the default port
number. duaperl will bind to the DSA as dn, using the
credentials supplied in passwd. Currently, only simple
authentication is supported.
$dua->error()
This routine returns a description of the problem when an error
view all matches for this distribution
view release on metacpan or search on metacpan
my $ip = $dc->get_ip('eth0');
ok($ip);
SKIP: {
skip "No credentials provided", 1 unless $Username;
ok( $dc->update(
-username => $Username,
-password => $Password,
-hostname => $Host,
-domain => $Domain,
view all matches for this distribution