view release on metacpan or search on metacpan
lib/FIDO/Raw/Assert.pm view on Meta::CPAN
Create a new instance.
=head2 allow_cred( $cred )
Append the credential C<$cred> to the list of credentials allowed for this
assertion.
=head2 authdata( [$index = 0, $data] )
Get/set the authenticator data. C<$data> must be a CBOR-encoded byte
view all matches for this distribution
view release on metacpan or search on metacpan
lib/FWS/Lite.pm view on Meta::CPAN
This module provides basic input and output to a FrameWork Sites installation or can be used independently using the methodologies of FrameWork Sites data structures and file handling in a small package.
=head1 CONSTRUCTOR
Most uses of FWS::Lite are accessing data from live FWS installations and do not require anything but the database credentials. All non-required settings can be set for completeness or for the ability to run native FWS Code via FWS::Lite for testin...
=head2 new
my $fws = $fws->new(
DBName => "DBNameOrSQLitePathAndFile", # MySQL required
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Facebook/OpenGraph.pm view on Meta::CPAN
# Document does not mention what grant_type is all about or what values can
# be set, but RFC 6749 covers the basic idea of grant types and its Section
# 4.4 describes Client Credentials Grant.
# http://tools.ietf.org/html/rfc6749#section-4.4
return $self->_get_token(+{grant_type => 'client_credentials'});
}
# Manually Build a Login Flow > Confirming identity > Exchanging code for an access token
# https://developers.facebook.com/docs/facebook-login/manually-build-a-login-flow
sub get_user_token_by_code {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Farabi/files/public/assets/codemirror/addon/hint/html-hint.js view on Meta::CPAN
article: s,
aside: s,
audio: {
attrs: {
src: null, mediagroup: null,
crossorigin: ["anonymous", "use-credentials"],
preload: ["none", "metadata", "auto"],
autoplay: ["", "autoplay"],
loop: ["", "loop"],
controls: ["", "controls"]
}
lib/Farabi/files/public/assets/codemirror/addon/hint/html-hint.js view on Meta::CPAN
}
},
img: {
attrs: {
alt: null, src: null, ismap: null, usemap: null, width: null, height: null,
crossorigin: ["anonymous", "use-credentials"]
}
},
input: {
attrs: {
alt: null, dirname: null, form: null, formaction: null,
lib/Farabi/files/public/assets/codemirror/addon/hint/html-hint.js view on Meta::CPAN
ul: s,
"var": s,
video: {
attrs: {
src: null, poster: null, width: null, height: null,
crossorigin: ["anonymous", "use-credentials"],
preload: ["auto", "metadata", "none"],
autoplay: ["", "autoplay"],
mediagroup: ["movie"],
muted: ["", "muted"],
controls: ["", "controls"]
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AptFetch.pm view on Meta::CPAN
I<(disclaimer)>
Right now, B<F::AF> is in "proof-of-concept" state.
It surely works with local methods (F<file> and F<copy>);
I hope it will work with trivial cases of remote methods
(I<v0.1.9> I've left to hope, it totally does;
no manual interaction (credentials and/or tray closing) provided).
(B<F::AF> has no means to accept (not talking about to pass along)
authentication credentials;
So if your upstream needs authentication, B<F::AF> is of no help here.)
And one more warning:
you're supposed to do all the dirty work of managing --
B<F::AF> is only for comunication.
Hopefully, there will be someday a kind of super-module what would simplify all
view all matches for this distribution
view release on metacpan or search on metacpan
lib/File/Dropbox.pm view on Meta::CPAN
=head1 SYNOPSIS
use File::Dropbox;
use Fcntl;
# Application credentials
my %app = (
oauth2 => 1,
access_token => $access_token,
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/File/KDBX/Key.pm view on Meta::CPAN
version 0.906
=head1 DESCRIPTION
A master key is one or more credentials that can protect a KDBX database. When you encrypt a database with
a master key, you will need the master key to decrypt it. B<Keep your master key safe!> If someone gains
access to your master key, they can open your database. If you forget or lose any part of your master key, all
data in the database is lost.
There are several different types of keys, each implemented as a subclass:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/File/RsyncP.pm view on Meta::CPAN
returns undef.
=item serverService(module, authUser, authPasswd, authRequired)
Specify which module to use (a "module" is the symbolic name that
appears inside "[...]" /etc/rsyncd.conf), the user's credentials
(authUser and authPasswd) and whether authorization is mandatory
(authRequired). If set to a non-zero value, authRequired ensures
that the remote Rsync daemon requires authentication. If necessary,
this is to ensure that you don't connect to an insecure Rsync daemon.
The auth arguments are optional if the selected rsyncd module doesn't
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Alpaca/DataStream.pm view on Meta::CPAN
=item C<402>
{ T => 'error', code => 402, msg => 'auth failed' }
You have provided invalid authentication credentials.
=item C<403>
{ T => 'error', code => 403, msg => 'already authenticated' }
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Bank/Bankwest/Error/NotLoggedIn/SubsequentLogin.pm view on Meta::CPAN
=head1 DESCRIPTION
This exception may be thrown on calls to various methods of
L<Finance::Bank::Bankwest::Session> when the Bankwest Online Banking
session has been terminated due to another session being established
with the same credentials.
=head1 SEE ALSO
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Bank/Cahoot.pm view on Meta::CPAN
sub new
{
my ($class, %opts) = @_;
croak 'Must provide a credentials handler' if not exists $opts{credentials};
my $self = { _mech => new WWW::Mechanize(autocheck => 1),
_credentials => $opts{credentials},
_connected => 0,
};
$self->{_mech}->agent_alias('Mac Safari');
bless $self, $class;
$self->_set_credentials(%opts);
return $self;
}
sub _set_credentials
{
my ($self, %opts) = @_;
croak 'Must provide either a premade credentials object or a class name together with options'
if not exists $opts{credentials};
if (ref $opts{credentials}) {
croak 'Not a valid credentials object'
if not $self->_isa_credentials($opts{credentials});
croak 'Can\'t accept credential options if supplying a premade credentials object'
if exists $opts{credentials_options};
$self->{_credentials} = $opts{credentials};
} else {
croak 'Must provide credential options unless suppying a premade credentials object'
if not exists $opts{credentials_options};
$self->{_credentials} =
$self->_new_credentials($opts{credentials}, $opts{credentials_options});
}
return $self;
}
sub _new_credentials
{
my ($self, $class, $options) = @_;
croak 'Invalid class name'
if $class !~ /^(?:\w|::)+$/;
my $full_class = 'Finance::Bank::Cahoot::CredentialsProvider::'.$class;
eval "local \$SIG{'__DIE__'}; local \$SIG{'__WARN__'}; require $full_class;"; ## no critic
croak 'Not a valid credentials class - not found' if $EVAL_ERROR;
my $credentials;
{
local $Carp::CarpLevel = $Carp::CarpLevel + 1; ## no critic
$credentials = $full_class->new(credentials => [@REQUIRED_SUBS],
options => $options);
}
croak 'Not a valid credentials class - incomplete' if not $self->_isa_credentials($credentials);
return $credentials;
}
sub _isa_credentials
{
my ($self, $credentials) = @_;
foreach my $sub (@REQUIRED_SUBS) {
return unless defined eval {
local $SIG{'__DIE__'}; ## no critic
local $SIG{'__WARN__'}; ## no critic
$credentials->can($sub);
};
}
return 1;
}
lib/Finance/Bank/Cahoot.pm view on Meta::CPAN
my ($self) = @_;
return if $self->{_connected};
$self->_get('https://securebank.cahoot.com/AquariusSecurity/bks/web/en/core_banking/log_in/frameset_top_log_in.jsp');
my %fields = (inputuserid => $self->{_credentials}->username());
my $content = $self->{_mech}->content;
foreach my $input ($self->{_mech}->find_all_inputs()) {
my $name = $input->name();
next if not defined $name;
next if defined $fields{$name};
$fields{$name} = $self->{_credentials}->place() if $content =~ /address or place:/i;
$fields{$name} = $self->{_credentials}->date() if $content =~ /memorable year:/i;
$fields{$name} = $self->{_credentials}->maiden() if $content =~ /maiden name:/i;
}
$self->_submit_form(fields => \%fields);
my %chars;
my $label;
lib/Finance/Bank/Cahoot.pm view on Meta::CPAN
{
# We submit a form, modifying hidden fields - WWW::Mechanize does not like
# this (see FAQ).
local $^W = 0; ## no critic
$self->_submit_form(fields => { passwordChar1Hidden => $self->{_credentials}->password($chars{1}),
passwordChar2Hidden => $self->{_credentials}->password($chars{2}),
passwordChar1 => q{*},
passwordChar2 => q{*} });
}
$self->{_connected} = 1;
return $self;
lib/Finance/Bank/Cahoot.pm view on Meta::CPAN
either C<Crypt::SSLeay> or C<IO::Socket::SSL> installed for HTTPS
support to work with WWW::Mechanize.
=head1 SYNOPSIS
my $cahoot = Finance::Bank::Cahoot->new(credentials => 'Constant',
credentials_options => {
account => '12345678',
password => 'verysecret',
place => 'London',
date => '01/01/1906',
username => 'dummy',
lib/Finance/Bank/Cahoot.pm view on Meta::CPAN
=item B<new>
Create a new instance of a connection to the Cahoot server.
C<new> can be called in two different ways. It can take a single parameter,
C<credentials>, which will accept an already created credentials object, of type
C<Finance::Bank::Cahoot::CredentialsProvider::*>. Alternatively, it can take two
parameters, C<credentials> and C<credentials_options>. In this case
C<credentials> is the name of a credentials class to create an instance of, and
C<credentials_options> is a hash of the options to pass-through to the
constructor of the chosen class.
If the second form of C<new> is being used, and the chosen class is I<not> one
of the ones supplied as standard then it will need to be C<required> first.
If any errors occur then C<new> will C<croak>.
my $cahoot = Finance::Bank::Cahoot->new(credentials => 'Constant',
credentials_options => {
account => '12345678',
password => 'verysecret',
place => 'London',
date => '01/01/1906',
username => 'dummy',
maiden => 'Smith' } );
# Or create the credentials object ourselves
my $credentials = Finance::Bank::Cahoot::CredentialsProvider::Constant->new(
account => '12345678', password => 'verysecret', place => 'London',
date => '01/01/1906', username => 'dummy', maiden => 'Smith' } );
my $cahoot = Finance::Bank::Cahoot->new(credentials => $credentials);
=item B<login>
Login to the Cahoot server using the credentials supplied to C<new>. This method
is implicit for all data access methods, so typically does not need to be called
explicitly. The method takes no arguments and will only call one of memorable
place, date or mother's maiden name as expected by the Cahoot portal.
=item B<accounts>
Returns a list reference containing a summary of any accounts available from
the supplied credentials. If a login has yet to occur C<accounts> will
automatically do this.
my $accounts = $cahoot->accounts;
Each item in the list is a hash reference that holds summary information for a
view all matches for this distribution
view release on metacpan or search on metacpan
CreateCard.pm view on Meta::CPAN
$self->{password} = $password;
}
sub get_basic_credentials {
my($self, $realm, $uri) = @_;
my $netloc = $uri->host_port;
view all matches for this distribution
view release on metacpan or search on metacpan
DeutscheBank.pm view on Meta::CPAN
=back
=head2 login()
Closes the current session and logs in to the website using
the credentials given at construction time.
=head2 close_session()
Closes the session and invalidates it on the server.
view all matches for this distribution
view release on metacpan or search on metacpan
t/methods/live/login.t view on Meta::CPAN
my $account = Finance::Bank::DE::NetBank->new(%config);
ok( defined($account->login()), 'login with offical demo login works');
$account->CUSTOMER_ID("broken");
ok( !defined($account->login()), 'broken credentials must not work' );
ok( !defined($account->statement()), 'statement() must not work with broken credentials' );
ok( !defined($account->saldo()), 'saldo() must not work with broken credentials' );
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Bank/IE/BankOfIreland.pm view on Meta::CPAN
}
=item * $self->_set_creds_fields( $config )
Parse the last received page for credentials entry fields, and populate them with the data from C<$config>. Also injects the missing 'form:continue' hidden field.
=cut
sub _set_creds_fields {
my $self = shift;
my $confref = shift;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Bank/Natwest.pm view on Meta::CPAN
either C<Crypt::SSLeay> or C<IO::Socket::SSL> installed for HTTPS
support to work with LWP.
=head1 SYNOPSIS
my $nw = Finance::Bank::Natwest->new( credentials => 'Constant',
credentials_options => {
dob => '010179',
uid => '0001',
password => 'Password',
pin => '4321' } );
lib/Finance/Bank/Natwest.pm view on Meta::CPAN
=over 4
=item B<new>
my $nw = Finance::Bank::Natwest->new( credentials => 'Constant',
credentials_options => {
dob => '010179',
uid => '0001',
password => 'Password',
pin => '4321' }
);
# Or create the credentials object ourselves
my $credentials = Finance::Bank::Natwest::CredentialsProvider::Constant->new(
dob => '010179', uid => '0001', password => 'Password', pin => '4321' );
my $nw = Finance::Bank::Natwest->new( credentials => $credentials );
C<new> can be called in two different ways. It can take a single parameter,
C<credentials>, which will accept an already created credentials object, of type
C<Finance::Bank::Natwest::CredentialsProvider::*>. Alternatively, it can take two
parameters, C<credentials> and C<credentials_options>. In this case
C<credentials> is the name of a credentials class to create an instance of, and
C<credentials_options> is a hash of the options to pass-through to the
constructor of the chosen class.
If the second form of C<new> is being used, and the chosen class is I<not> one
of the ones supplied as standard then it will need to be C<required> first.
lib/Finance/Bank/Natwest.pm view on Meta::CPAN
# Or get a list ref instead
my $accounts = $nw->accounts;
Returns a list containing a summary of any accounts available from the
supplied credentials. Each item in the list is a hash reference that holds
summary information for a single account, and contains this data:
=over 4
=item B<name> - the name of the account
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/Bank/Postbank_de.pm view on Meta::CPAN
=back
=head2 $account->new_session
Closes the current session and logs in to the website using
the credentials given at construction time.
=head2 $account->close_session
Closes the session and invalidates it on the server.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/BankVal/UK.pm view on Meta::CPAN
}
}
sub loadContent {
$json =
"{'credentials':{'uname':'$uid','pin':'$pin'},'account':{'account':'$account','sortcode':'$sortcode'}}";
}
#sub to format the error message in the correct expected format with all nodes etc
sub formatErrorMsg {
if ( substr( $responseString, 0, 7 ) eq 'INVALID' ) {
view all matches for this distribution
view release on metacpan or search on metacpan
IPN.pm is not tested and likely doesnt fully work.
- find a way to test this.
Setup a test webserver so it can send fake BitPay responses when requested.
- this allows the class methods to be tested without the need for BitPay merchant credentials.
view all matches for this distribution
view release on metacpan or search on metacpan
bin/coinbasepro.pl view on Meta::CPAN
secret => $config->{coinbasepro}{api_secret} || $ENV{GDAX_API_SECRET} || "",
passphrase => $config->{coinbasepro}{api_passphrase} || $ENV{GDAX_API_PASSPHRASE} || "",
debug => 0
);
if ( !$creds[0] || !$creds[1] || !$creds[2] ) {
warn "$prog: no credentials in " . join(", ", get_possible_config_filenames()) . " or env vars GDAX_API_(KEY|SECRET|PASSPHRASE)\n";
}
$SIG{__DIE__} = \&Carp::confess;
$SIG{__WARN__} = \&Carp::confess;
view all matches for this distribution
view release on metacpan or search on metacpan
CompanyNames/TextSupport.pm view on Meta::CPAN
crease creased creases creasing
create created creater creates creating creation creationism creations creative creatively creativeness creatives creativity creator creators
creationist creationists
creature creatures
creche creches
credential credentialed credentialing credentials
credentialled credentialling
credenza credenzas
credibility credible credibly
credit creditability creditable creditably credited crediting credits
creditor creditors
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/FXCM/Simple.pm view on Meta::CPAN
Your FXCM account password
=item C<$type>
The account type the login credentials apply to. Either 'Demo' or 'Real'.
=item C<$url>
The url to connect to, typically this will be 'http://www.fxcorporate.com/Hosts.jsp'
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/GDAX/API.pm view on Meta::CPAN
passphrase:andTHisiSMypassPhraSE
There can be comments ("#" beginning a line), and blank lines.
In other words, for exmple, if you cryptographically store your API
credentials, you can create a small callable program that will decrypt
them and provide them, so that they never live on disk unencrypted,
and never show up in process listings:
my $request = Finance::GDAX::API->new;
$request->external_secret('/path/to/my_decryptor', 1);
view all matches for this distribution
view release on metacpan or search on metacpan
Testing/test-record.pl view on Meta::CPAN
# This file needs a valid account to do anything useful.
# This will be your account, not mine!
# You can hardcode here or use a credential fiie.
# Running this script will allow you to generate
# new canned test data for new test scripts.
if ( eval (require "credentials.pl") )
{
$ig=Finance::IG->new(cred());
}
else
{
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/MtGox.pm view on Meta::CPAN
=head1 BASIC METHODS
=head2 new
Create a new C<Finance::MtGox> object with your MtGox credentials provided
in the C<key> and C<secret> arguments.
=cut
sub new {
my ( $class, $args ) = @_;
$args->{key} && $args->{secret}
or croak "You must provide 'key' and 'secret' credentials.";
$args->{json} = JSON::Any->new;
$args->{mech} = WWW::Mechanize->new(stack_depth => 0);
return bless $args, $class;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Finance/PaycheckRecords/Fetcher.pm view on Meta::CPAN
mech => WWW::Mechanize->new,
}, $class;
} # end new
#---------------------------------------------------------------------
# Get a URL, automatically supplying login credentials if needed:
sub _get
{
my ($self, $url) = @_;
view all matches for this distribution
view release on metacpan or search on metacpan
YahooQuote.pm view on Meta::CPAN
my $self = LWP::UserAgent::new(@_);
$self->agent("Finance-YahooQuote/0.18");
$self;
}
sub get_basic_credentials {
my $self = @_;
if (defined($PROXYUSER) and defined($PROXYPASSWD) and
$PROXYUSER ne "" and $PROXYPASSWD ne "") {
return ($PROXYUSER, $PROXYPASSWD);
} else {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Firefox/Marionette.pm view on Meta::CPAN
$authenticator = $self->webauthn_authenticator();
}
return $authenticator;
}
sub webauthn_credentials {
my ( $self, $parameter_authenticator ) = @_;
my $authenticator = $self->_get_webauthn_authenticator(
authenticator => $parameter_authenticator );
my $message_id = $self->_new_message_id();
$self->_send_request(
lib/Firefox/Marionette.pm view on Meta::CPAN
MIME::Base64::decode_base64url( $credential->{userHandle} );
}
return $credential;
}
sub delete_webauthn_all_credentials {
my ( $self, $parameter_authenticator ) = @_;
my $authenticator = $self->_get_webauthn_authenticator(
authenticator => $parameter_authenticator );
my $message_id = $self->_new_message_id();
$self->_send_request(
lib/Firefox/Marionette.pm view on Meta::CPAN
accepts a hash of the following keys;
=over 4
=item * has_resident_key - boolean value to indicate if the authenticator will support L<client side discoverable credentials|https://www.w3.org/TR/webauthn-2/#client-side-discoverable-credential>
=item * has_user_verification - boolean value to determine if the L<authenticator|https://www.w3.org/TR/webauthn-2/#virtual-authenticators> supports L<user verification|https://www.w3.org/TR/webauthn-2/#user-verification>.
=item * is_user_consenting - boolean value to determine the result of all L<user consent|https://www.w3.org/TR/webauthn-2/#user-consent> L<authorization gestures|https://www.w3.org/TR/webauthn-2/#authorization-gesture>, and by extension, any L<test o...
lib/Firefox/Marionette.pm view on Meta::CPAN
$firefox->find_id('input-email')->type($user_name);
$firefox->find_id('register-button')->click();
$firefox->await(sub { sleep 1; $firefox->find_class('alert-success'); });
$firefox->find_id('login-button')->click();
$firefox->await(sub { sleep 1; $firefox->find_class('hero confetti'); });
foreach my $credential ($firefox->webauthn_credentials()) {
$firefox->delete_webauthn_credential($credential);
# ... time passes ...
$firefox->add_webauthn_credential(
lib/Firefox/Marionette.pm view on Meta::CPAN
will remove the L<User-Agent|https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent>, L<Accept|https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Accept> and L<Accept-Encoding|https://developer.mozilla.org/en-US/docs/Web/HTTP/Hea...
This method returns L<itself|Firefox::Marionette> to aid in chaining methods.
=head2 delete_webauthn_all_credentials
This method accepts an optional L<authenticator|Firefox::Marionette::WebAuthn::Authenticator>, in which case it will delete all L<credentials|Firefox::Marionette::WebAuthn::Credential> from this authenticator. If no parameter is supplied, the defaul...
my $firefox = Firefox::Marionette->new();
my $authenticator = $firefox->add_webauthn_authenticator( transport => Firefox::Marionette::WebAuthn::Authenticator::INTERNAL(), protocol => Firefox::Marionette::WebAuthn::Authenticator::CTAP2() );
$firefox->delete_webauthn_all_credentials($authenticator);
$firefox->delete_webauthn_all_credentials();
=head2 delete_webauthn_authenticator
This method accepts an optional L<authenticator|Firefox::Marionette::WebAuthn::Authenticator>, in which case it will delete this authenticator from the current Firefox instance. If no parameter is supplied, the default authenticator will be deleted.
lib/Firefox/Marionette.pm view on Meta::CPAN
use Firefox::Marionette();
my $firefox = Firefox::Marionette->new();
my $authenticator = $firefox->add_webauthn_authenticator( transport => Firefox::Marionette::WebAuthn::Authenticator::INTERNAL(), protocol => Firefox::Marionette::WebAuthn::Authenticator::CTAP2() );
foreach my $credential ($firefox->webauthn_credentials($authenticator)) {
$firefox->delete_webauthn_credential($credential, $authenticator);
}
just a L<credential|Firefox::Marionette::WebAuthn::Credential>, in which case it will remove the credential from the default authenticator.
use Firefox::Marionette();
my $firefox = Firefox::Marionette->new();
...
foreach my $credential ($firefox->webauthn_credentials()) {
$firefox->delete_webauthn_credential($credential);
}
This method returns L<itself|Firefox::Marionette> to aid in chaining methods.
lib/Firefox/Marionette.pm view on Meta::CPAN
=head2 webauthn_authenticator
returns the default L<WebAuthn authenticator|Firefox::Marionette::WebAuthn::Authenticator> created when the L<new|/new> method was called.
=head2 webauthn_credentials
This method accepts an optional L<authenticator|Firefox::Marionette::WebAuthn::Authenticator>, in which case it will return all the L<credentials|Firefox::Marionette::WebAuthn::Credential> attached to this authenticator. If no parameter is supplied,...
use Firefox::Marionette();
use v5.10;
my $firefox = Firefox::Marionette->new();
foreach my $credential ($firefox->webauthn_credentials()) {
say "Credential host is " . $credential->host();
}
# OR
my $authenticator = $firefox->add_webauthn_authenticator( transport => Firefox::Marionette::WebAuthn::Authenticator::INTERNAL(), protocol => Firefox::Marionette::WebAuthn::Authenticator::CTAP2() );
foreach my $credential ($firefox->webauthn_credentials($authenticator)) {
say "Credential host is " . $credential->host();
}
=head2 webauthn_set_user_verified
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Firefox/Sync/Client.pm view on Meta::CPAN
my ($self, $url) = @_;
# Initialize LWP
my $ua = LWP::UserAgent->new;
$ua->agent ("FFsyncClient/0.1 ");
$ua->credentials ( $self->{'hostname'} . ':' . $self->{'port'}, 'Sync', $self->{'username'} => $self->{'password'} );
# Do the request
my $res = $ua->get($url);
die $res->{'_msg'} if ($res->{'_rc'} != '200');
view all matches for this distribution
view release on metacpan or search on metacpan
doc/examples/petmarket/petmarket/api/userservice.pm view on Meta::CPAN
sub methodTable
{
return {
"addUser" => {
"description" => "Add a user with the given credentials",
"access" => "remote",
},
"getUser" => {
"description" => "Add a user with the given credentials",
"access" => "remote",
},
"updateUser" => {
"description" => "Add a user with the given credentials",
"access" => "remote",
},
};
}
view all matches for this distribution