view release on metacpan or search on metacpan
lib/App/Lazyd.pm view on Meta::CPAN
use URI::Title qw( title );
sub run {
my (undef, $config, $url, @tags) = @_;
die "Need to set both username and password."
unless defined($config->{username}) && defined($config->{password});
die "You should give me an URL, dude.\n"
unless defined $url;
my $del = Net::Delicious->new({
user => $config->{username},
pswd => $config->{password}
});
my $title = title($url) || "";
$del->add_post({
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/LedgerSMB/Admin.pm view on Meta::CPAN
--path13 /example/path Path to LedgerSMB 1.3 installation
--path14 /example/path2 Path to LedgerSMB 1.4 installation
--port 5432 Database Poart
--dbname database Reload the specified db, overridden by --all
--username postgres Database Superuser to Log In As
--prompt-password Prompt for Password (can use PGPASSWORD instead)
=head2 lsmb_createdb
Due to improper errors, this currently does not work properly with LedgerSMB
lib/App/LedgerSMB/Admin.pm view on Meta::CPAN
--chart us/chart/General Chart of Accounts path (relative to sql)
--gifi ca/gifi/General Path to GIFI
--port 5432 Database Poart
--dbname database Create db with the following name (required)
--username postgres Database Superuser to Log In As
--prompt-password Prompt for Password (can use PGPASSWORD instead)
=head1 Bundled Libraries
=head2 App::LedgerSMB::Admin
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
script/list-software-licenses view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--no-config>, B<-C>
Do not use any configuration file.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
use Carp;
use CTK::ConfGenUtil;
use CTK::TFVals qw/ :ALL /;
use App::MBUtiny::Collector::DBI;
use App::MBUtiny::Collector::Client;
use App::MBUtiny::Util qw/hide_password/;
use constant {
COLLECTOR_TYPES => {
internal => 0,
external => 1,
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
sub check {
my $self = shift;
$self->error("");
my $dbi = $self->dbi;
return "" unless $self->collectors;
my @ret = (); # List of DSN/URL_wo_password
foreach my $collector ($self->collectors) {
my $type = $collector->{type};
if ($type eq 'internal') { # Internal
if ($dbi->error) {
$self->error($dbi->error());
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
my $check = $client->check;
unless ($client->status) {
$self->error(join("\n", $client->transaction, $client->error));
next;
}
push @ret, hide_password($url);
}
}
return @ret ? join("\n", @ret) : "";
}
sub fixup {
my $self = shift;
my %args = @_;
$self->error("");
my $dbi = $self->dbi;
return "" unless $self->collectors;
my @ret = (); # List of DSN/URL_wo_password
foreach my $collector ($self->collectors) {
my $type = $collector->{type};
my $url = $collector->{url} || "";
my $timeout = $collector->{timeout} || 0;
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
file => $args{file},
) or do {
$self->error(join("\n", $client->transaction, $client->error));
next;
};
push @ret, hide_password($url);
}
} else { # Put (op)
if ($type eq 'internal') { # Internal
$dbi->add(
type => _type2int($type),
lib/App/MBUtiny/Collector.pm view on Meta::CPAN
comment => $comment,
) or do {
$self->error(join("\n", $client->transaction, $client->error));
next;
};
push @ret, hide_password($url);
}
}
}
return @ret ? join("\n", @ret) : "";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/WWW/Dispatch.pm view on Meta::CPAN
$log->debug( "Entering " . __PACKAGE__ . "::validate_user_credentials()" );
my $r = $self->request;
my $session = $r->{'env'}->{'psgix.session'};
my $nick = $body->{'nam'};
my $password = $body->{'pwd'};
my $standalone = $meta->META_WWW_STANDALONE_MODE;
$log->debug( "Employee $nick login attempt" );
my ( $code, $message, $body_json );
lib/App/MFILE/WWW/Dispatch.pm view on Meta::CPAN
my $db = $site->MFILE_WWW_STANDALONE_CREDENTIALS_DATABASE;
$code = 401;
$message = 'Unauthorized';
for my $entry (@$db) {
if ( $nick eq $entry->{'nam'} ) {
if ( $password eq $entry->{'pwd'} ) {
$code = 200;
$message = 'OK';
$body_json = { payload =>
{
emp => { nick => $nick, eid => $entry->{'eid'} },
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/HTTP.pm view on Meta::CPAN
Optionally takes PARAMHASH:
server => [URI OF REST SERVER] default is 'http://0:5000'
method => [HTTP METHOD TO USE] default is 'GET'
nick => [NICK FOR BASIC AUTH] optional
password => [PASSWORD FOR BASIC AUTH] optional
path => [PATH OF REST RESOURCE] default is '/'
req_body => [HASHREF] optional
Returns HASHREF containing:
lib/App/MFILE/HTTP.pm view on Meta::CPAN
die "Bad user agent object" unless ref( $ua ) eq 'LWP::UserAgent';
my %ARGS = validate( @_, {
server => { type => SCALAR, default => 'http://localhost:5000' },
method => { type => SCALAR, default => 'GET', regex => qr/^(GET|POST|PUT|DELETE)$/ },
nick => { type => SCALAR, optional => 1 },
password => { type => SCALAR, default => '' },
path => { type => SCALAR, default => '/' },
req_body => { type => HASHREF, optional => 1 },
} );
$ARGS{'path'} =~ s/^\/*/\//;
lib/App/MFILE/HTTP.pm view on Meta::CPAN
$r = &{ $ARGS{'method'} }( $ARGS{'server'} . encode_utf8( $ARGS{'path'} ),
Accept => 'application/json' );
}
if ( $ARGS{'nick'} ) {
$r->authorization_basic( $ARGS{'nick'}, $ARGS{'password'} );
}
if ( $ARGS{'method'} =~ m/^(POST|PUT)$/ ) {
$r->header( 'Content-Type' => 'application/json' );
if ( my $body = $ARGS{'req_body'} ) {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MPDJ.pm view on Meta::CPAN
sub help {
print <<'HELP';
Usage: mpdj [options]
Options:
--mpd MPD connection string (password@host:port)
-s,--syslog Turns on syslog output (debug, info, notice, warn[ing], error, etc)
-l,--conlog Turns on console output (same choices as --syslog)
--no-daemon Turn off daemonizing
-b,--before Number of songs to keep in playlist before current song
-a,--after Number of songs to keep in playlist after current song
lib/App/MPDJ.pm view on Meta::CPAN
=over 4
=item --mpd
Sets the MPD connection details. Should be a string like password@host:port.
The password and port are both optional.
=item -s, --syslog
Turns on sending of log information to syslog at specified level. Level is a
required parameter can be one of debug, info, notice, warn[ing], err[or],
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
sub is_dead {
my ($self, $dsn) = @_;
my $conf = $self->config->{config};
my $user = $conf->{user} or die "missing user";
my $password = $conf->{password} or die "missing password";
my $qudo = Qudo->new(
databases => [+{
dsn => $dsn,
username => $user,
password => $password,
}],
);
my $exceptions = $qudo->exception_list;
if (scalar(@{$exceptions->{$dsn}}) >= 1) {
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
- module: Agent::Qudo::ExceptionLog
config:
target:
- DBI:mysql:database=foo
user: root
password: ~
=head1 SCHEMA
type: map
mapping:
lib/App/MadEye/Plugin/Agent/Qudo/ExceptionLog.pm view on Meta::CPAN
sequence:
- type: str
user:
required: yes
type: str
password:
required: yes
type: str
=head1 SEE ALSO
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Maisha/Plugin/Identica.pm view on Meta::CPAN
consistent Maisha now requires that access to both Twitter and Identica uses
OAuth.
With this new method of authentication, the application will provide a URL,
which the user needs to cut-n-paste into a browser to logging in to the
service, using your regular username/password, then 'Allow' Maisha to access
your account. This will then allow Maisha to post to your account. You will
then be given a PIN, which should then be entered at the prompt on the Maisha
command line.
Once you have completed authentication, the application will then store your
view all matches for this distribution
view release on metacpan or search on metacpan
script/manage-pool-style-repo view on Meta::CPAN
[profile=production]
username=bar
pass=honey
When you specify C<--config-profile=dev>, C<username> will be set to C<foo> and
C<password> to C<beaver>. When you specify C<--config-profile=production>,
C<username> will be set to C<bar> and C<password> to C<honey>.
=item B<--debug>
Shortcut for --log-level=debug.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/ManiacDownloader.pm view on Meta::CPAN
{
my $ftp = AnyEvent::FTP::Client->new( passive => 1 );
$r->_guard($ftp);
$ftp->connect( $url->host, $url->port )->cb(
sub {
$ftp->login( $url->user, $url->password )->cb(
sub {
$ftp->type('I')->cb(
sub {
$ftp->retr( $self->_file->_url_path,
$seq_on_body, restart => $r->_start, );
lib/App/ManiacDownloader.pm view on Meta::CPAN
if ( $self->_file->_is_ftp )
{
my $ftp = AnyEvent::FTP::Client->new( passive => 1 );
$ftp->connect( $url->host, $url->port )->recv;
$ftp->login( $url->user, $url->password )->recv;
$ftp->type('I')->recv;
$ftp->size( $self->_file->_url_path )->cb(
sub {
my $len = shift->recv;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MatrixClient.pm view on Meta::CPAN
push @{ $self->{components} }, App::MatrixClient::Matrix->new(
loop => $loop,
dist => $dist,
( map { $_ => $args{$_} } qw( server ssl user_id password ) ),
);
{
# Much hackery in here...
my $entry = $console->{entry};
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MatrixTool/Command/client/login.pm view on Meta::CPAN
use base qw( App::MatrixTool::Command::client );
our $VERSION = '0.08';
use constant DESCRIPTION => "Obtain a client authentication token";
use constant ARGUMENTS => ( "user", "password?" );
use constant OPTIONS => ();
=head1 NAME
matrixtool client login - Obtain a client authentication token
lib/App/MatrixTool/Command/client/login.pm view on Meta::CPAN
$ matrixtool client login @me:example.com
=head1 DESCRIPTION
This command performs the C</login> steps of the Matrix client API, obtaining
an access token for the given user ID. This requires a password - either
provided on the commandline as a second argument, or requested interactively
on the terminal.
Once the access token is obtained it is stored in the token cache, which lives
in F<$HOME/.matrix/client-tokens>. This cache will be consulted by other
C<matrixtool client> sub-commands to automatically provide the access token if
required.
Note that the interactive terminal method requires the optional dependency of
L<IO::Termios> to be installed, so that local echo can temporarily be disabled
while the user types in the password.
=cut
sub run
{
my $self = shift;
my ( $opts, $user, $password ) = @_;
$self->{user_id} = $user;
if( !defined $password ) {
require IO::Termios;
my $stdin = IO::Termios->new( \*STDIN );
STDOUT->autoflush(1);
print "Password: ";
$stdin->setflag_echo( 0 );
$password = <$stdin>; chomp $password; print "\n";
$stdin->setflag_echo( 1 );
}
$self->do_json( POST => "/_matrix/client/r0/login",
content => {
type => "m.login.password",
user => $user,
password => $password,
}
)->then( sub {
my ( $body ) = @_;
$self->client_token_store->put(
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Metabase/Relayd/Plugin/IRC.pm view on Meta::CPAN
sub _start_up {
my ($kernel,$heap) = @_[KERNEL,HEAP];
$heap->{nick} = 'relayd' . $$ unless $heap->{nick};
my $irc = POE::Component::IRC->spawn(
( map { ( $_, $heap->{$_} ) } grep { exists $heap->{$_} } qw(server nick ircname username port password flood) ),
);
$heap->{_irc} = $irc;
return;
}
lib/App/Metabase/Relayd/Plugin/IRC.pm view on Meta::CPAN
=item C<username>
Your client's username.
=item C<password>
The password that is required if your ircd is restricted.
=item C<channels>
A comma-separated list of IRC channels to join, default is C<#relayd>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Mimosa.pm view on Meta::CPAN
default_view => 'Mason',
'Plugin::Authentication' => {
default => {
credential => {
class => 'Password',
password_field => 'password',
password_type => 'clear'
},
store => {
class => 'Minimal',
users => {
petunia => {
password => "cUC598",
},
}
}
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
SECURITY.md view on Meta::CPAN
issues.**
Privately report vulnerabilities to the maintainers listed at the end
of this document. Include as many details as possible to reproduce the
issue, including code samples or test cases. Check that your report
does not expose any of your sensitive data, such as passwords, tokens,
or other secrets.
You do not need to have a solution or fix. Depending on the issue,
CPANSec may be notified. Depending on the issue, CPANSec may be
notified.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MojoSlides/files/public/jquery.min.js view on Meta::CPAN
/*! jQuery v2.0.3 | (c) 2005, 2013 jQuery Foundation, Inc. | jquery.org/license
//@ sourceMappingURL=jquery-2.0.3.min.map
*/
(function(e,undefined){var t,n,r=typeof undefined,i=e.location,o=e.document,s=o.documentElement,a=e.jQuery,u=e.$,l={},c=[],p="2.0.3",f=c.concat,h=c.push,d=c.slice,g=c.indexOf,m=l.toString,y=l.hasOwnProperty,v=p.trim,x=function(e,n){return new x.fn.in...
};"inprogress"===i&&(i=n.shift(),r--),i&&("fx"===t&&n.unshift("inprogress"),delete o.stop,i.call(e,s,o)),!r&&o&&o.empty.fire()},_queueHooks:function(e,t){var n=t+"queueHooks";return q.get(e,n)||q.access(e,n,{empty:x.Callbacks("once memory").add(funct...
},delegate:function(e,t,n,r){return this.on(t,e,n,r)},undelegate:function(e,t,n){return 1===arguments.length?this.off(e,"**"):this.off(t,e||"**",n)}});var Xt,Ut,Yt=x.now(),Vt=/\?/,Gt=/#.*$/,Jt=/([?&])_=[^&]*/,Qt=/^(.*?):[ \t]*([^\r\n]*)$/gm,Kt=/^(?:a...
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MonM/Notifier/Monotifier.pm view on Meta::CPAN
UseMonotifier yes
<MoNotifier>
DSN "DBI:mysql:database=monotifier;host=mysql.example.com"
User username
Password password
Set RaiseError 0
Set PrintError 0
Set mysql_enable_utf8 1
# Expires and timeout values
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MonM/Channel/Email.pm view on Meta::CPAN
# names, use the "Set" directives
# By default will use <Channel SendMail> section of general config file
Set host 192.168.0.1
Set port 25
#Set sasl_username TestUser
#Set sasl_password MyPassword
Set timeout 20
</Channel>
=head1 DESCRIPTION
lib/App/MonM/Channel/Email.pm view on Meta::CPAN
This is sasl_username SMTP attribute. Optional
Contains the username to use for auth
Set sasl_password PASSWORD
This is sasl_password SMTP attribute. Optional
Set ssl 1
This is ssl SMTP attribute: if 'starttls', use STARTTLS;
if 'ssl' (or 1), connect securely; otherwise, no security.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Mowyw/Datasource/DBI.pm view on Meta::CPAN
sub _connect {
my ($self) = @_;
$self->{dbh} = DBI->connect(
$self->{OPTIONS}{dsn},
$self->{OPTIONS}{username},
$self->{OPTIONS}{password},
{ RaiseError => 1, AutoCommit => 1, },
);
}
sub _fetchrow {
view all matches for this distribution
view release on metacpan or search on metacpan
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MultiLanguage/LDAP.pm view on Meta::CPAN
}else{
$self->{_ldap_server} .= (defined $arg_ref->{port})? ":$arg_ref->{port}":':389';
}
$self->{_ldap_base} = $arg_ref->{base};
$self->{_ldap_user} = $arg_ref->{user} if (defined $arg_ref->{user});
$self->{_ldap_pass} = $arg_ref->{password} if (defined $arg_ref->{password});
eval { $self->_connect; };
return undef if($@);
$self;
lib/App/MultiLanguage/LDAP.pm view on Meta::CPAN
sub _bind {
my $self = shift;
my $result = $self->{handler}->bind($self->{_ldap_user},
password => $self->{_ldap_pass},
port => $self->{_ldap_port} );
croak "$!" if $result->code;
}
sub _search {
lib/App/MultiLanguage/LDAP.pm view on Meta::CPAN
Returns a new object or undef on failure. Can accept up to five arguments which are,
host - may be a host name or an IP number. TCP port may be specified after the host name followed by a colon (such as localhost:10389). The default TCP port for LDAP is 389.
port - Port to connect to on the remote server. May be overridden by HOST, for example, 127.0.0.1:389
user - It is a DN used for authentication.
password - Bind LDAP server with the given password.
base - The DN that is the base object entry relative to which the search is to be performed.
There is no scope option can be specified, default one is 'one'.
$object = new App::MultiLanguage::LDAP(
host => '127.0.0.1',
port => '389',
user => 'cn=manager,dc=example,dc=com',
password => 'secret',
base => 'ou=language,dc=example,dc=com'
);
=head2 language()
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MultiModule/Tasks/DocGateway.pm view on Meta::CPAN
local $SIG{ALRM} = sub { die "timed out\n"; };
my $timeout = $self->{config}->{pg_connect_timeout} || 5;
alarm $timeout;
return Postgres::Mongo->new(
userid => $self->{pg_userid},
password => $self->{pg_password},
);
};
alarm 0;
$self->error("App::MultiModule::Tasks::DocGateway::_get_connection failed: $@") if $@;
return $handle;
lib/App/MultiModule/Tasks/DocGateway.pm view on Meta::CPAN
my $self = shift;
my $config = shift;
$self->{config} = $config;
my $state = $self->{state};
$self->{pg_userid} = $config->{pg_userid} || 'testuser1';
$self->{pg_password} = $config->{pg_password} || 'testuser1';
}
=head2 is_stateful
=cut
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Munner/Runner.pm view on Meta::CPAN
sub _build_sys_user_info {
my $self = shift;
my $user = $self->user;
my %info = ();
@info{qw( username password uid gid )} = getpwnam( $self->user )
or die "User ($user) is invalid\n";
return \%info;
}
has sys_uid => (
view all matches for this distribution