view release on metacpan or search on metacpan
lib/App/JESP.pm view on Meta::CPAN
# Settings
## DB Connection attrbutes.
has 'dsn' => ( is => 'ro', isa => 'Str', required => 1 );
has 'username' => ( is => 'ro', isa => 'Maybe[Str]', required => 1);
has 'password' => ( is => 'ro', isa => 'Maybe[Str]', required => 1);
has 'home' => ( is => 'ro', isa => 'Str', required => 1 );
## JESP Attributes
has 'prefix' => ( is => 'ro', isa => 'Str', default => 'jesp_' );
has 'driver_class' => ( is => 'ro', isa => 'Str', lazy_build => 1);
# Operational stuff
has 'get_dbh' => ( is => 'ro', isa => 'CodeRef', default => sub{
my ($self) = @_;
return sub{
return DBI->connect( $self->dsn(), $self->username(), $self->password(),
{ RaiseError => 1,
PrintError => 0,
AutoCommit => 1,
});
};
lib/App/JESP.pm view on Meta::CPAN
my $jesp = App::JESP->new({
interactive => 0, # No ANSI color
home => 'path/to/jesphome',
dsn => ...,
username => ...,
password => ...
});
$jesp->install();
$jesp->deploy();
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/JIRAPrint.pm view on Meta::CPAN
# Operation properties
has 'url' => ( is => 'ro', isa => 'Str', lazy_build => 1 );
has 'username' => ( is => 'ro', isa => 'Str' , lazy_build => 1);
has 'password' => ( is => 'ro', isa => 'Str' , lazy_build => 1);
has 'project' => ( is => 'ro', isa => 'Str' , lazy_build => 1 );
has 'sprint' => ( is => 'ro', isa => 'Str' , lazy_build => 1 );
has 'maxissues' => ( is => 'ro', isa => 'Int' , lazy_build => 1);
lib/App/JIRAPrint.pm view on Meta::CPAN
has 'tt' => ( is => 'ro', isa => 'Template', lazy_build => 1);
sub _build_jira{
my ($self) = @_;
$log->info("Accessing JIRA At ".$self->url()." as '".$self->username()."' (+password)");
return JIRA::REST->new( $self->url() , $self->username() , $self->password() );
}
sub _build_fields{
my ($self) = @_;
return $self->config()->{fields} // [ qw/key status summary assignee issuetype/ ];
lib/App/JIRAPrint.pm view on Meta::CPAN
sub _build_username{
my ($self) = @_;
return $self->config()->{username} // die "Missing username ".$self->config_place()."\n";
}
sub _build_password{
my ($self) = @_;
return $self->config()->{password} // die "Missing password ".$self->config_place()."\n";
}
sub _build_project{
my ($self) = @_;
return $self->config()->{project} // die "Missing project ".$self->config_place()."\n";
lib/App/JIRAPrint.pm view on Meta::CPAN
return $output;
}
=head2 fetch_fields
Returns the list of available fiels at this (url, username, password, project)
Usage:
my $fields = $this->fetch_fields();
lib/App/JIRAPrint.pm view on Meta::CPAN
return $self->jira->GET('/field');
}
=head2 fetch_issues
Fetches issues from JIRA Using this object properties (url, username, password, project, maxissues, fields)
Usage:
my $issues = $this->fetch_issues();
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/JenkinsCli.pm view on Meta::CPAN
The username to access jenkins by
=item api_pass
The password to access jenkins by
=item test
Flag to not actually perform changes
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/KGB/API.pm view on Meta::CPAN
the hash is the hexadecimal representation of the SHA-1 hash calculated over
the following data:
=over
=item Project password
This is the shared password known to the client and the server.
=item project-name
=item request-text
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/KeePass2.pm view on Meta::CPAN
}
);
$self->_fkp->unlock if $self->_fkp->is_locked;
my $master = $self->_get_master_key;
my $confirm = $self->_get_confirm_key;
croak "Your master password is different from the confirm password !"
if $master ne $confirm;
$self->_fkp->save_db( $self->file, $master );
return;
}
lib/App/KeePass2.pm view on Meta::CPAN
=head1 ATTRIBUTES
=head2 file
The password file
=head2 create
Create the keepass2 file
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Koyomi/DataSource/Job/Teng.pm view on Meta::CPAN
my $connector
= $ctx->config->{datasource}{connector}{job}
// $ctx->config->{datasource}{connector};
my $teng = App::Koyomi::DataSource::Job::Teng::Object->new(
connect_info => [
$connector->{dsn}, $connector->{user}, $connector->{password},
+{ RaiseError => 1, PrintError => 0, AutoCommit => 1 },
],
schema => App::Koyomi::DataSource::Job::Teng::Schema->instance,
);
my %obj = (teng => $teng);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/LDAP/Command/Add/User.pm view on Meta::CPAN
);
my $user = App::LDAP::LDIF::User->new(
base => $self->base // config()->{nss_base_passwd}->[0],
uid => $username,
userPassword => encrypt(new_password()),
uidNumber => $uid->get_value("uidNumber"),
gidNumber => $self->gid_of( $self->group ),
sn => $self->surname,
mail => $self->mail,
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/LLEvalBot/CLI.pm view on Meta::CPAN
);
$parser->getoptionsfromarray(\@argv, \my %opt, qw/
host=s
port=s
password=s
channels=s@
nickname=s
enable-ssl
/) or pod2usage(1);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/LXC/Container/Run.pm view on Meta::CPAN
my $re_ids = $self->{user};
# TODO: Should we distinguish UIDs/GIDs? For now we just simply
# add them all. This has the charm that files of other users
# within the same group will be visible with their names in
# directory listings. The disadvantage is making them known by
# name (but the password hashes are always safe):
foreach (@{$self->{uids}}, @{$self->{gids}})
{ $re_ids .= '|' . $_; }
foreach (ACCOUNT_FILES)
{
# remove first to be sure not to overwrite something linked:
lib/App/LXC/Container/Run.pm view on Meta::CPAN
open my $out, '>', $lxc_etc . $_
or fatal 'can_t_open__1__2', $lxc_etc . $_, $!;
while (<$in>)
{
next unless m/(?:^|[:,])(?:$re_ids|root)(?:[:,]|$)/;
# If applicable, remove the encrypted password, as it's
# not needed inside of the container:
s/^([^:]+):([^!:*][^:*][^:]+):/$1:!:/;
print $out $_;
}
close $out;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Lazyd.pm view on Meta::CPAN
use URI::Title qw( title );
sub run {
my (undef, $config, $url, @tags) = @_;
die "Need to set both username and password."
unless defined($config->{username}) && defined($config->{password});
die "You should give me an URL, dude.\n"
unless defined $url;
my $del = Net::Delicious->new({
user => $config->{username},
pswd => $config->{password}
});
my $title = title($url) || "";
$del->add_post({
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/LedgerSMB/Admin.pm view on Meta::CPAN
--path13 /example/path Path to LedgerSMB 1.3 installation
--path14 /example/path2 Path to LedgerSMB 1.4 installation
--port 5432 Database Poart
--dbname database Reload the specified db, overridden by --all
--username postgres Database Superuser to Log In As
--prompt-password Prompt for Password (can use PGPASSWORD instead)
=head2 lsmb_createdb
Due to improper errors, this currently does not work properly with LedgerSMB
lib/App/LedgerSMB/Admin.pm view on Meta::CPAN
--chart us/chart/General Chart of Accounts path (relative to sql)
--gifi ca/gifi/General Path to GIFI
--port 5432 Database Poart
--dbname database Create db with the following name (required)
--username postgres Database Superuser to Log In As
--prompt-password Prompt for Password (can use PGPASSWORD instead)
=head1 Bundled Libraries
=head2 App::LedgerSMB::Admin
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
script/lint-prereqs view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
script/list-software-licenses view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
use Carp;
use CTK::ConfGenUtil;
use CTK::TFVals qw/ :ALL /;
use App::MBUtiny::Collector::DBI;
use App::MBUtiny::Collector::Client;
use App::MBUtiny::Util qw/hide_password/;
use constant {
COLLECTOR_TYPES => {
internal => 0,
external => 1,
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
sub check {
my $self = shift;
$self->error("");
my $dbi = $self->dbi;
return "" unless $self->collectors;
my @ret = (); # List of DSN/URL_wo_password
foreach my $collector ($self->collectors) {
my $type = $collector->{type};
if ($type eq 'internal') { # Internal
if ($dbi->error) {
$self->error($dbi->error());
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
my $check = $client->check;
unless ($client->status) {
$self->error(join("\n", $client->transaction, $client->error));
next;
}
push @ret, hide_password($url);
}
}
return @ret ? join("\n", @ret) : "";
}
sub fixup {
my $self = shift;
my %args = @_;
$self->error("");
my $dbi = $self->dbi;
return "" unless $self->collectors;
my @ret = (); # List of DSN/URL_wo_password
foreach my $collector ($self->collectors) {
my $type = $collector->{type};
my $url = $collector->{url} || "";
my $timeout = $collector->{timeout} || 0;
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
file => $args{file},
) or do {
$self->error(join("\n", $client->transaction, $client->error));
next;
};
push @ret, hide_password($url);
}
} else { # Put (op)
if ($type eq 'internal') { # Internal
$dbi->add(
type => _type2int($type),
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
comment => $comment,
) or do {
$self->error(join("\n", $client->transaction, $client->error));
next;
};
push @ret, hide_password($url);
}
}
}
return @ret ? join("\n", @ret) : "";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/WWW/Dispatch.pm view on Meta::CPAN
$log->debug( "Entering " . __PACKAGE__ . "::validate_user_credentials()" );
my $r = $self->request;
my $session = $r->{'env'}->{'psgix.session'};
my $nick = $body->{'nam'};
my $password = $body->{'pwd'};
my $standalone = $meta->META_WWW_STANDALONE_MODE;
$log->debug( "Employee $nick login attempt" );
my ( $code, $message, $body_json );
lib/App/MFILE/WWW/Dispatch.pm view on Meta::CPAN
my $db = $site->MFILE_WWW_STANDALONE_CREDENTIALS_DATABASE;
$code = 401;
$message = 'Unauthorized';
for my $entry (@$db) {
if ( $nick eq $entry->{'nam'} ) {
if ( $password eq $entry->{'pwd'} ) {
$code = 200;
$message = 'OK';
$body_json = { payload =>
{
emp => { nick => $nick, eid => $entry->{'eid'} },
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/HTTP.pm view on Meta::CPAN
Optionally takes PARAMHASH:
server => [URI OF REST SERVER] default is 'http://0:5000'
method => [HTTP METHOD TO USE] default is 'GET'
nick => [NICK FOR BASIC AUTH] optional
password => [PASSWORD FOR BASIC AUTH] optional
path => [PATH OF REST RESOURCE] default is '/'
req_body => [HASHREF] optional
Returns HASHREF containing:
lib/App/MFILE/HTTP.pm view on Meta::CPAN
die "Bad user agent object" unless ref( $ua ) eq 'LWP::UserAgent';
my %ARGS = validate( @_, {
server => { type => SCALAR, default => 'http://localhost:5000' },
method => { type => SCALAR, default => 'GET', regex => qr/^(GET|POST|PUT|DELETE)$/ },
nick => { type => SCALAR, optional => 1 },
password => { type => SCALAR, default => '' },
path => { type => SCALAR, default => '/' },
req_body => { type => HASHREF, optional => 1 },
} );
$ARGS{'path'} =~ s/^\/*/\//;
lib/App/MFILE/HTTP.pm view on Meta::CPAN
$r = &{ $ARGS{'method'} }( $ARGS{'server'} . encode_utf8( $ARGS{'path'} ),
Accept => 'application/json' );
}
if ( $ARGS{'nick'} ) {
$r->authorization_basic( $ARGS{'nick'}, $ARGS{'password'} );
}
if ( $ARGS{'method'} =~ m/^(POST|PUT)$/ ) {
$r->header( 'Content-Type' => 'application/json' );
if ( my $body = $ARGS{'req_body'} ) {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MPDJ.pm view on Meta::CPAN
sub help {
print <<'HELP';
Usage: mpdj [options]
Options:
--mpd MPD connection string (password@host:port)
-s,--syslog Turns on syslog output (debug, info, notice, warn[ing], error, etc)
-l,--conlog Turns on console output (same choices as --syslog)
--no-daemon Turn off daemonizing
-b,--before Number of songs to keep in playlist before current song
-a,--after Number of songs to keep in playlist after current song
lib/App/MPDJ.pm view on Meta::CPAN
=over 4
=item --mpd
Sets the MPD connection details. Should be a string like password@host:port.
The password and port are both optional.
=item -s, --syslog
Turns on sending of log information to syslog at specified level. Level is a
required parameter can be one of debug, info, notice, warn[ing], err[or],
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
sub is_dead {
my ($self, $dsn) = @_;
my $conf = $self->config->{config};
my $user = $conf->{user} or die "missing user";
my $password = $conf->{password} or die "missing password";
my $qudo = Qudo->new(
databases => [+{
dsn => $dsn,
username => $user,
password => $password,
}],
);
my $exceptions = $qudo->exception_list;
if (scalar(@{$exceptions->{$dsn}}) >= 1) {
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
- module: Agent::Qudo::ExceptionLog
config:
target:
- DBI:mysql:database=foo
user: root
password: ~
=head1 SCHEMA
type: map
mapping:
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
sequence:
- type: str
user:
required: yes
type: str
password:
required: yes
type: str
=head1 SEE ALSO
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Maisha/Plugin/Identica.pm view on Meta::CPAN
consistent Maisha now requires that access to both Twitter and Identica uses
OAuth.
With this new method of authentication, the application will provide a URL,
which the user needs to cut-n-paste into a browser to logging in to the
service, using your regular username/password, then 'Allow' Maisha to access
your account. This will then allow Maisha to post to your account. You will
then be given a PIN, which should then be entered at the prompt on the Maisha
command line.
Once you have completed authentication, the application will then store your
view all matches for this distribution
view release on metacpan or search on metacpan
script/manage-pool-style-repo view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--debug>
Shortcut for --log-level=debug.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/ManiacDownloader.pm view on Meta::CPAN
{
my $ftp = AnyEvent::FTP::Client->new( passive => 1 );
$r->_guard($ftp);
$ftp->connect( $url->host, $url->port )->cb(
sub {
$ftp->login( $url->user, $url->password )->cb(
sub {
$ftp->type('I')->cb(
sub {
$ftp->retr( $self->_file->_url_path,
$seq_on_body, restart => $r->_start, );
lib/App/ManiacDownloader.pm view on Meta::CPAN
if ( $self->_file->_is_ftp )
{
my $ftp = AnyEvent::FTP::Client->new( passive => 1 );
$ftp->connect( $url->host, $url->port )->recv;
$ftp->login( $url->user, $url->password )->recv;
$ftp->type('I')->recv;
$ftp->size( $self->_file->_url_path )->cb(
sub {
my $len = shift->recv;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MatrixClient.pm view on Meta::CPAN
push @{ $self->{components} }, App::MatrixClient::Matrix->new(
loop => $loop,
dist => $dist,
( map { $_ => $args{$_} } qw( server ssl user_id password ) ),
);
{
# Much hackery in here...
my $entry = $console->{entry};
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MatrixTool/Command/client/login.pm view on Meta::CPAN
use base qw( App::MatrixTool::Command::client );
our $VERSION = '0.08';
use constant DESCRIPTION => "Obtain a client authentication token";
use constant ARGUMENTS => ( "user", "password?" );
use constant OPTIONS => ();
=head1 NAME
matrixtool client login - Obtain a client authentication token
lib/App/MatrixTool/Command/client/login.pm view on Meta::CPAN
$ matrixtool client login @me:example.com
=head1 DESCRIPTION
This command performs the C</login> steps of the Matrix client API, obtaining
an access token for the given user ID. This requires a password - either
provided on the commandline as a second argument, or requested interactively
on the terminal.
Once the access token is obtained it is stored in the token cache, which lives
in F<$HOME/.matrix/client-tokens>. This cache will be consulted by other
C<matrixtool client> sub-commands to automatically provide the access token if
required.
Note that the interactive terminal method requires the optional dependency of
L<IO::Termios> to be installed, so that local echo can temporarily be disabled
while the user types in the password.
=cut
sub run
{
my $self = shift;
my ( $opts, $user, $password ) = @_;
$self->{user_id} = $user;
if( !defined $password ) {
require IO::Termios;
my $stdin = IO::Termios->new( \*STDIN );
STDOUT->autoflush(1);
print "Password: ";
$stdin->setflag_echo( 0 );
$password = <$stdin>; chomp $password; print "\n";
$stdin->setflag_echo( 1 );
}
$self->do_json( POST => "/_matrix/client/r0/login",
content => {
type => "m.login.password",
user => $user,
password => $password,
}
)->then( sub {
my ( $body ) = @_;
$self->client_token_store->put(
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Metabase/Relayd/Plugin/IRC.pm view on Meta::CPAN
sub _start_up {
my ($kernel,$heap) = @_[KERNEL,HEAP];
$heap->{nick} = 'relayd' . $$ unless $heap->{nick};
my $irc = POE::Component::IRC->spawn(
( map { ( $_, $heap->{$_} ) } grep { exists $heap->{$_} } qw(server nick ircname username port password flood) ),
);
$heap->{_irc} = $irc;
return;
}
lib/App/Metabase/Relayd/Plugin/IRC.pm view on Meta::CPAN
=item C<username>
Your client's username.
=item C<password>
The password that is required if your ircd is restricted.
=item C<channels>
A comma-separated list of IRC channels to join, default is C<#relayd>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Mimosa.pm view on Meta::CPAN
default_view => 'Mason',
'Plugin::Authentication' => {
default => {
credential => {
class => 'Password',
password_field => 'password',
password_type => 'clear'
},
store => {
class => 'Minimal',
users => {
petunia => {
password => "cUC598",
},
}
}
}
}
view all matches for this distribution