view release on metacpan or search on metacpan
t/10-basic-db.t view on Meta::CPAN
);
eval { $db->drop };
dies_ok { $db->major_version } "can't get major version on nonexistent db";
ok($db = $db->new($db->export), 'Copied db credentials into new object');
ok($db->create, 'Created database');
ok($db->load('0.1'), 'Loaded base schema');
lives_ok {$db->major_version} "Lived when calling major version this time.";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MBUtiny/Util.pm view on Meta::CPAN
my $anode = node2anode({});
Returns array of nodes
=item B<parse_credentials>
my ($user, $password) = parse_credentials( 'http://user:password@example.com' );
my ($user, $password) = parse_credentials( new URI('http://user:password@example.com') );
Returns credentials pair by URL or URI object
=item B<resolv>
my $name = resolv( $IPv4 );
my $ip = resolv( $name );
lib/App/MBUtiny/Util.pm view on Meta::CPAN
filesize sha1sum md5sum
resolv
explain
xcopy
node2anode set2attr
parse_credentials hide_password
/;
sub sha1sum {
my $f = shift;
my $sha1 = new Digest::SHA1;
lib/App/MBUtiny/Util.pm view on Meta::CPAN
my $n = shift;
return [] unless $n && ref($n) =~ /ARRAY|HASH/;
return [$n] if ref($n) eq 'HASH';
return $n;
}
sub parse_credentials {
my $url = shift || return ();
my $uri = (ref($url) eq 'URI') ? $url : URI->new($url);
my $info = $uri->userinfo() // "";
my $user = $info;
my $pass = $info;
lib/App/MBUtiny/Util.pm view on Meta::CPAN
$pass =~ s/^[^:]*://;
return (uri_unescape($user // ''), uri_unescape($pass // ''));
}
sub hide_password {
my $url = shift || return "";
my $full = shift || 0; # 0 - starts, 1 - no_credentials; 2 - user_only
my $uri = new URI($url);
my ($u,$p) = parse_credentials($uri);
return $url unless defined($p) && length($p);
$uri->userinfo($full ? ($full == 1 ? undef : $u) : sprintf("%s:*****", $u));
return $uri->canonical->as_string;
}
sub set2attr {
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/WWW/Dispatch.pm view on Meta::CPAN
# POST is used only for login/logout ATM
if ( $method =~ m/^LOGIN/i ) {
$log->debug( "Incoming login/logout attempt" );
if ( $path =~ m/^login/i ) {
return $self->validate_user_credentials( $body );
} else {
return $self->_logout( $body );
}
}
$log->crit( "Asked to perform an AJAX call, but feature is not implemented!" );
return 0;
}
=head2 validate_user_credentials
Called from C<process_post> to process login requests (special AJAX requests)
originating from the JavaScript side (i.e. the login screen in
login-dialog.js, via login.js).
Returns a status object - OK means the login was successful; all other statuses
mean unsuccessful.
=cut
sub validate_user_credentials {
my ( $self, $body ) = @_;
$log->debug( "Entering " . __PACKAGE__ . "::validate_user_credentials()" );
my $r = $self->request;
my $session = $r->{'env'}->{'psgix.session'};
my $nick = $body->{'nam'};
my $password = $body->{'pwd'};
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MFILE/HTTP.pm view on Meta::CPAN
}
# login bypass
$meta->set('META_LOGIN_BYPASS_STATE', 0) if not defined $meta->META_LOGIN_BYPASS_STATE;
if ( $site->MFILE_WWW_BYPASS_LOGIN_DIALOG and not $meta->META_LOGIN_BYPASS_STATE ) {
$log->notice("Bypassing login dialog! Using default credentials");
$session->{'ip_addr'} = $remote_addr;
$session->{'last_seen'} = time;
my $bypass_result = $self->_login_dialog( {
'nam' => $site->MFILE_WWW_DEFAULT_LOGIN_CREDENTIALS->{'nam'},
'pwd' => $site->MFILE_WWW_DEFAULT_LOGIN_CREDENTIALS->{'pwd'},
view all matches for this distribution
view release on metacpan or search on metacpan
share/public_html/static/music_inc/drflac.js view on Meta::CPAN
return (
async function(moduleArg = {}) {
var moduleRtn;
var Module=moduleArg;var readyPromiseResolve,readyPromiseReject;var readyPromise=new Promise((resolve,reject)=>{readyPromiseResolve=resolve;readyPromiseReject=reject});["_network_drflac_open_mem","_network_drflac_read_pcm_frames_f32_mem","_network_dr...
return moduleRtn;
}
);
view all matches for this distribution
view release on metacpan or search on metacpan
0.026
- Add --trial option to regenerate/upload/dist/distdir
0.025 Sun Dec 16 22:09:12 CET 2018
- Allow fetching credentials from console
- Add SPDX support to meta files
0.024
- Write generated files as binary
- Decode author names when POD is encoded
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/MtAws/GlacierRequest.pm view on Meta::CPAN
my $canonical_url_hash = sha256_hex($canonical_url);
# /getting canonical URL
my $credentials = "$datestr/$self->{region}/$self->{service}/aws4_request";
my $string_to_sign = join("\n", "AWS4-HMAC-SHA256", $date8601, $credentials, $canonical_url_hash);
my ($kSigning, $kSigning_hex) = get_signature_key($self->{secret}, $datestr, $self->{region}, $self->{service});
my $signature = hmac_sha256_hex($string_to_sign, $kSigning);
my $auth = "AWS4-HMAC-SHA256 Credential=$self->{key}/$credentials, SignedHeaders=$signed_headers, Signature=$signature";
push @{$self->{req_headers}}, { name => 'Authorization', value => $auth};
}
view all matches for this distribution
view release on metacpan or search on metacpan
public/javascripts/ace/mode-redshift.js view on Meta::CPAN
var JsonHighlightRules = require("./json_highlight_rules").JsonHighlightRules;
var RedshiftHighlightRules = function() {
var keywords = (
"aes128|aes256|all|allowoverwrite|analyse|analyze|and|any|array|as|asc|authorization|backup|" +
"between|binary|blanksasnull|both|bytedict|bzip2|case|cast|check|collate|column|constraint|create|credentials|" +
"cross|current_date|current_time|current_timestamp|current_user|current_user_id|default|deferrable|deflate|defrag|delta|" +
"delta32k|desc|disable|distinct|do|else|emptyasnull|enable|encode|encrypt|encryption|end|except|explicit|false|for|foreign|" +
"freeze|from|full|globaldict256|globaldict64k|grant|group|gzip|having|identity|ignore|ilike|in|initially|inner|intersect|into|is|" +
"isnull|join|leading|left|like|limit|localtime|localtimestamp|lun|luns|lzo|lzop|minus|mostly13|mostly32|mostly8|natural|new|not|notnull|" +
"null|nulls|off|offline|offset|old|on|only|open|or|order|outer|overlaps|parallel|partition|percent|permissions|placing|primary|raw|readratio|" +
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Netdisco/Util/DeviceAuth.pm view on Meta::CPAN
use Try::Tiny;
use base 'Exporter';
our @EXPORT = ();
our @EXPORT_OK = qw/
fixup_device_auth get_external_credentials
/;
our %EXPORT_TAGS = (all => \@EXPORT_OK);
=head1 NAME
lib/App/Netdisco/Util/DeviceAuth.pm view on Meta::CPAN
}
return @new_stanzas;
}
=head2 get_external_credentials( $device, $mode )
Runs a command to gather SNMP credentials or a C<device_auth> stanza.
Mode can be C<read> or C<write> and defaults to 'read'.
=cut
sub get_external_credentials {
my ($device, $mode) = @_;
my $cmd = (setting('get_credentials') || setting('get_community'));
my $ip = $device->ip;
my $host = ($device->dns || hostname_from_ip($ip) || $ip);
$mode ||= 'read';
if (defined $cmd and length $cmd) {
lib/App/Netdisco/Util/DeviceAuth.pm view on Meta::CPAN
my @lines = split (m/\n/, $result);
foreach my $line (@lines) {
if ($line =~ m/^community\s*=\s*(.*)\s*$/i) {
if (length $1 and $mode eq 'read') {
debug sprintf '[%s] external read credentials added',
$device->ip;
return map {{
read => 1,
only => [$device->ip],
lib/App/Netdisco/Util/DeviceAuth.pm view on Meta::CPAN
}} split(m/\s*,\s*/,$1);
}
}
elsif ($line =~ m/^setCommunity\s*=\s*(.*)\s*$/i) {
if (length $1 and $mode eq 'write') {
debug sprintf '[%s] external write credentials added',
$device->ip;
return map {{
write => 1,
only => [$device->ip],
lib/App/Netdisco/Util/DeviceAuth.pm view on Meta::CPAN
}
else {
my $stanza = undef;
try {
$stanza = from_json( $line );
debug sprintf '[%s] external credentials stanza added',
$device->ip;
}
catch {
info sprintf '[%s] error! failed to parse external credentials stanza',
$device->ip;
};
return $stanza if ref $stanza;
}
}
view all matches for this distribution
view release on metacpan or search on metacpan
share/mib/lldp.mib view on Meta::CPAN
DESCRIPTION
"The value of a management address associated with the LLDP
agent that may be used to reach higher layer entities to
assist discovery by network management.
It should be noted that appropriate security credentials,
such as SNMP engineId, may be required to access the LLDP
agent using a management address. These necessary credentials
should be known by the network management and the objects
associated with the credentials are not included in the
LLDP agent."
SYNTAX OCTET STRING (SIZE (1..31))
LldpSystemCapabilitiesMap ::= TEXTUAL-CONVENTION
STATUS current
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Nopaste/Service/Dancebin.pm view on Meta::CPAN
sub uri { $ENV{DANCEBIN_URL} || 'http://danceb.in/' }
sub get {
my ($self, $mech) = @_;
# Set BasicAuth credentials if needed
$mech->credentials( $self->_credentials ) if $self->_credentials;
return $mech->get($self->uri);
}
sub fill_form {
lib/App/Nopaste/Service/Dancebin.pm view on Meta::CPAN
lang => decode_utf8($args{lang}),
};
my $exp = $ENV{DANCEBIN_EXP};
$content->{expiration} = $exp if $exp;
# Set BasicAuth credentials if needed
$mech->credentials( $self->_credentials ) if $self->_credentials;
my $form = $mech->form_number(1) || return;
# do not follow redirect please
@{$mech->requests_redirectable} = ();
lib/App/Nopaste/Service/Dancebin.pm view on Meta::CPAN
} else {
return ( 0, "Cannot find URL" );
}
}
sub _credentials { ($ENV{DANCEBIN_USER}, $ENV{DANCEBIN_PASS}) }
1;
__END__
lib/App/Nopaste/Service/Dancebin.pm view on Meta::CPAN
$ echo "text" | nopaste -s Dancebin
By default it pastes to L<http://danceb.in/|http://danceb.in/>, but you can
override this be setting the C<DANCEBIN_URL> environment variable.
You can set HTTP Basic Auth credentials to use for the nopaste service
if necessary by using:
DANCEBIN_USER=username
DANCEBIN_PASS=password
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Nopaste/Service/WerePaste.pm view on Meta::CPAN
sub uri { $ENV{WEREPASTE_URL} || 'http://paste.were.space/' }
sub get {
my ($self, $mech) = @_;
# Set BasicAuth credentials if needed
$mech->credentials( $self->_credentials ) if $self->_credentials;
return $mech->get($self->uri);
}
sub fill_form {
lib/App/Nopaste/Service/WerePaste.pm view on Meta::CPAN
title => decode_utf8($args{desc}),
lang => decode_utf8($args{lang}),
};
my $exp = $ENV{WEREPASTE_EXP};
$content->{expiration} = $exp if $exp;
$mech->credentials( $self->_credentials ) if $self->_credentials;
@{$mech->requests_redirectable} = ();
return $mech->submit_form( form_number => 1, fields => $content );
}
lib/App/Nopaste/Service/WerePaste.pm view on Meta::CPAN
my ( $self, $mech ) = @_;
return (1, $mech->response->header('Location')) if $mech->response->is_redirect;
return (0, 'Cannot find URL');
}
sub _credentials { ($ENV{WEREPASTE_USER}, $ENV{WEREPASTE_PASS}) }
1;
__END__
=pod
lib/App/Nopaste/Service/WerePaste.pm view on Meta::CPAN
$ echo "text" | nopaste -s WerePaste
By default it pastes to L<http://paste.were.space>, but you can
override this be setting the C<WEREPASTE_URL> environment variable.
You can set HTTP Basic Auth credentials to use for the nopaste service
if necessary by using:
WEREPASTE_USER=username
WEREPASTE_PASS=password
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Nopaste/Service/Gist.pm view on Meta::CPAN
Alternatively, you can export the C<GITHUB_USER> and C<GITHUB_PASSWORD>
environment variables, just like for the
L<gist|https://github.com/defunkt/gist> utility.
You can also simply store your credentials in plaintext in F<~/.github> as in:
login bob
password ilikeducks
That's it!
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/OTRS/CreateTicket.pm view on Meta::CPAN
=head1 DESCRIPTION
This module contains one script, L<otrs.CreateTicket.pl>, which allows you to create
tickets in OTRS from the command line.
For creating a ticket you'll need to have valid OTRS agent login credentials, as well
as the TicketConnector web service installed on your OTRS machine. In order to use the
GenericTicketConnector you need to use at least OTRS 3.1.
Activating the TicketConnector is easy. Download the yml file from the following URL:
L<https://raw.github.com/mbeijen/App-OTRS-CreateTicket/master/examples/GenericTicketConnector.yml>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Oozie/Deploy/Validate/Spec/Coordinator.pm
lib/App/Oozie/Deploy/Validate/Spec/Workflow.pm
lib/App/Oozie/Deploy/ttlib/common.properties
lib/App/Oozie/Deploy/ttlib/coordinator_config_xml
lib/App/Oozie/Deploy/ttlib/ttree.cfg
lib/App/Oozie/Deploy/ttlib/workflow_credentials
lib/App/Oozie/Deploy/ttlib/workflow_global_xml_end
lib/App/Oozie/Deploy/ttlib/workflow_global_xml_start
lib/App/Oozie/Deploy/ttlib/workflow_parameters_xml_end
lib/App/Oozie/Deploy/ttlib/workflow_parameters_xml_start
lib/App/Oozie/Deploy/ttlib/workflow_sla_xml
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/PAIA/Command.pm view on Meta::CPAN
$self->logger->("deleted session file");
}
my $auth = $self->auth or $self->usage_error("missing PAIA auth server URL");
# take credentials from command line or config file only
my %params = (
username => $self->username,
password => $self->password,
grant_type => 'password',
);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/PAUSE/Comaint.pm view on Meta::CPAN
$self->login_pause;
$self->make_comaint($comaint, \@packages);
}
sub get_credentials {
my $self = shift;
my %rc;
my $file = "$ENV{HOME}/.pause";
if (eval { require Config::Identity }) {
lib/App/PAUSE/Comaint.pm view on Meta::CPAN
}
sub login_pause {
my $self = shift;
$self->mech->credentials($self->get_credentials);
$self->mech->get("https://pause.perl.org/pause/authenquery?ACTION=share_perms");
$self->mech->form_number(1);
$self->mech->click('weaksubmit_pause99_share_perms_makeco');
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/PAUSE/cleanup.pm view on Meta::CPAN
$password = $identity{password} unless defined $password;
usage '! Missing username and/or password' unless
defined $username && defined $password;
$agent->credentials( "pause.perl.org:443", "PAUSE", $username, $password );
print "> Logging in as $username\n";
my $response = $agent->get( 'https://pause.perl.org/pause/authenquery?ACTION=delete_files' );
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/PM/Website/Command/Install.pm view on Meta::CPAN
else
{
warn "Old version of LWP::UserAgent doesn't support ssl_opts"
}
}
my %webdav_credentials = (
-user => $opt->{username},
-pass => $opt->{password},
-url => $opt->{url},
-realm => "groups.perl.org",
);
print Dumper { credentials => \%webdav_credentials };
$webdav->credentials(%webdav_credentials);
$webdav->open( -url => $opt->{url} )
or die sprintf( "failed to open url [%s] : %s\n",
$opt->{url}, $webdav->message() );
my %put_options = (
view all matches for this distribution
view release on metacpan or search on metacpan
$item = first { $_->get_uri->path eq "/raw/" } @list;
ok($item && $item->is_collection, "Found /raw");
$item = first { $_->get_uri->path eq "/file/" } @list;
ok($item && $item->is_collection, "Found /files");
# Attempt to write a file without credentials
my $str = "Ganymede\n";
ok(not($dav->put(-local=>\$str, -url=>"https://$host:$port/raw/M%C3%B6%C3%B6n")),
"Failed to post without token");
# Retry with credentials
$dav->credentials(-user => "alex", -pass => "hello", -realm => "Phoebe");
ok($dav->put(-local=>\$str, -url=>"https://$host:$port/raw/M%C3%B6%C3%B6n"),
"Post gemtext with token");
# /raw
$resource = $dav->propfind(-url=>"/raw", -depth=>1);
view all matches for this distribution
view release on metacpan or search on metacpan
t/04-functional.t view on Meta::CPAN
plan tests => 5;
} else {
plan skip_all => 'These tests require Travis CI';
}
# Local test database credentials
my $host = 'localhost';
my $schema = 'photodb';
my $user = 'photodb';
my $pass = 'photodb';
view all matches for this distribution
view release on metacpan or search on metacpan
t/files/moby11.txt view on Meta::CPAN
*I am aware that down to the present time, the fish styled
Lamatins and Dugongs (Pig-fish and Sow-fish of the Coffins
of Nantucket) are included by many naturalists among the whales.
But as these pig-fish are a noisy, contemptible set,
mostly lurking in the mouths of rivers, and feeding on wet hay,
and especially as they do not spout, I deny their credentials
as whales; and have presented them with their passports to quit
the Kingdom of Cetology.
First: According to magnitude I divide the whales into three primary BOOKS
t/files/moby11.txt view on Meta::CPAN
To produce a mighty book, you must choose a mighty theme.
No great and enduring volume can ever be written on the flea,
though many there be who have tried it.
Ere entering upon the subject of Fossil Whales, I present my
credentials as a geologist, by stating that in my miscellaneous
time I have been a stone-mason, and also a great digger of ditches,
canals and wells, wine-vaults, cellars, and cisterns of all sorts.
Likewise, by way of preliminary, I desire to remind the reader,
that while in the earlier geological strata there are found the fossils
of monsters now almost completely extinct; the subsequent relics
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/RoboBot/Plugin/API/Translate.pm view on Meta::CPAN
my $client = $self->bot->config->plugins->{'translate'}{'client'};
my $secret = $self->bot->config->plugins->{'translate'}{'secret'};
my $response = $self->ua->post('https://datamarket.accesscontrol.windows.net/v2/OAuth2-13',
{ grant_type => 'client_credentials',
client_id => $client,
client_secret => $secret,
scope => 'http://api.microsofttranslator.com' });
return 0 unless $response->is_success;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/SD/ForeignReplica.pm view on Meta::CPAN
$login_args{secret_prompt} = $args{secret_prompt}
if $args{secret_prompt};
# allow prompting for just password if username already specified
# and vice-versa for password
# if both are specified, we still want to loop in case the
# credentials are wrong
$login_args{username} = $args{username} if $args{username};
$login_args{password} = $args{password} if $args{password};
while (!$login_successful) {
( $username, $password ) = $self->prompt_for_login(%login_args);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/SFDC/Role/Credentials.pm view on Meta::CPAN
format => 'i',
default => 34;
option 'credfile',
doc => 'The file from which to read credentials.',
is => 'ro',
format => 's',
lazy => 1,
default => File::HomeDir->my_home."/.salesforce.properties",
isa => sub {
LOGDIE "The credentials file ".$_[0]." doesn't exist!"
unless -e $_[0];
};
option 'environment',
lib/App/SFDC/Role/Credentials.pm view on Meta::CPAN
Config::Properties
->new(file => $self->credfile)
->splitToTree()
};
LOGDIE "Couldn't find credentials for $environment in "
.$self->credfile
unless $environments{$environment};
for (qw'username password url apiversion'){
if (exists($environments{$environment}->{$_})){
lib/App/SFDC/Role/Credentials.pm view on Meta::CPAN
=head2 --credfile
A config file containing details of your enviroments, similar to the ant
deployment.properties file. For each environment, this file may specify the
credentials for that environment as:
envname.username = username@example.com
envname.password = PASSWORDthenTOKEN
envname.url = https://login.salesforce.com
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Smbxfer.pm view on Meta::CPAN
use Filesys::SmbClient;
# Exports...
use base qw( Exporter );
our @EXPORT_OK = qw(
credentials do_smb_transfer parse_smb_spec
create_smb_dir_path create_local_dir_path smb_element_type
smb_upload smb_download
);
__PACKAGE__->run unless caller;
lib/App/Smbxfer.pm view on Meta::CPAN
--usage|help
Command-line options:
--options
Name of file containing credentials (standard smb credentials file):
--cred <credentials-filename>
Transfer directory <local-name>:
--recursive
Create parent directories:
lib/App/Smbxfer.pm view on Meta::CPAN
die usage unless defined $source && defined $dest;
# Ensure that exactly one of source/dest is in "SMB path spec" format...
($dest =~ m|^//|) xor ($source =~ m|^//|) or die usage;
# Get access credentials for SMB connection...
my ($username, $password, $domain) = credentials($cred);
# Prepare SMB connection object...
my $smb = Filesys::SmbClient->new(
username => $username, password => $password, workgroup => $domain
);
lib/App/Smbxfer.pm view on Meta::CPAN
);
}
#########################
sub credentials {
my ($credentials_filename) = @_;
my ($username, $password, $domain);
if ($credentials_filename) {
# Read access credentials from file formatted using standard smbmount
# syntax...
open( my $credentials, '<', "$credentials_filename" )
or croak "cannot open credentials file: $!";
my @lines;
while( <$credentials> ){
my ($value) = (m/.*=\s+?(.*)$/);
push @lines, $value;
}
close $credentials;
($username, $password, $domain) = @lines;
}
else {
# Getting credentials interactively...
$username = prompt( "username? " );
$password = prompt( "password? ", -e => '*' );
$domain = prompt( "domain? " );
}
lib/App/Smbxfer.pm view on Meta::CPAN
=head2 run
"main() method" for running module as a command-line program.
=head2 credentials
my ($username, $password, $domain) = credentials( $credentials_file );
Load SMB access credentials from the specified filename, which should be
formatted as expected by the smb* suite of tools (smbclient, etc.)
=head2 validated_paths
my ($local_path, $remote_smb_path_spec) = validated_paths(
lib/App/Smbxfer.pm view on Meta::CPAN
--usage|help
Command-line options:
--options
Name of file containing credentials (standard smb credentials file):
--cred <credentials-filename>
Transfer directory <local-name>:
--recursive
Create parent directories:
lib/App/Smbxfer.pm view on Meta::CPAN
=head1 PROGRAM: OPTIONS
This program can be given an option, '--cred', that specifies the path to a
filename containing Samba access credentials, explained in the CONFIGURATION AND
ENVIRONMENT section.
For recursive transfers, the '--recursive' flag is supported. The '--parents'
flag causes the entire directory structure from the source path argument to be
replicated at the destination. If the source path argument is a relative path,
lib/App/Smbxfer.pm view on Meta::CPAN
Command-line options were not recognized. C<< --usage >> and C<< --options >> provide
succinct information to resolve.
=item C<< cannot open credentials file: ... >>
The specified Samba access credentials file could not be opened.
=item C<< Error: SMB specification F< smb path spec > not found >>
Could not connect to the indicated Samba server/share/path.
lib/App/Smbxfer.pm view on Meta::CPAN
=back
=head1 PROGRAM: CONFIGURATION AND ENVIRONMENT
The credentials file that can be used via the '--cred' option should be in the
same format used by smbclient. This file looks as follows:
username = <username>
password = <password>
domain = <domain>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/SpamcupNG/Error/LoginFailed.pm view on Meta::CPAN
See L<App::SpamcupNG::Error::Factory> instead of creating it manually.
=head1 DESCRIPTION
A login failed means there is a problem with your Spamcop account credentials.
=head1 METHODS
=head2 new
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Spoor/ApiClient.pm view on Meta::CPAN
my $user_agent = shift;
my $config = shift;
my $uri = $config->{host} . '/api/reports?' . http_build_query({reports => {host => $host}});
my $credentials = 'Basic ' . encode_base64(
$config->{credentials}{api_identifier} . ':' . $config->{credentials}{api_secret}
);
my $response = $user_agent->get(
$uri,
'Authorization' => $credentials,
'HTTP-Accept' => 'application/json'
);
from_json($response->content)->{reports};
}
lib/App/Spoor/ApiClient.pm view on Meta::CPAN
my $user_agent = shift;
my $config = shift;
my $uri = $config->{host} . '/api/mailbox_events?' . http_build_query({mailbox_events => {host => $host}});
my $credentials = 'Basic ' . encode_base64(
$config->{credentials}{api_identifier} . ':' . $config->{credentials}{api_secret}
);
my $response = $user_agent->get(
$uri,
'Authorization' => $credentials,
'HTTP-Accept' => 'application/json'
);
from_json($response->content)->{mailbox_events};
}
view all matches for this distribution
view release on metacpan or search on metacpan
- Update autogenerated git readme
- Add localization for spread message, only fr (default) or en!
- Use config objects to test targets, using directly targets may lead to
undef
- Add SEE ALSO section in all modules pods
- Fix nb tests in freenode_fake_credentials to pass Test::NoWarnings
0.05 2019-03-07T08:01:25Z
- Move test no authentication to Freenode with fake credentials in xt
- Fix escaping of greater than sign in pod formatting code
- Use warnings in App::SpreadRevolutionaryDate::Config
0.04 2019-03-06T22:24:19Z
- Add clean-namespace and unused-vars tests in MANIFEST
testing multiple Freenode bots
- Add documentation about optional argument to
App::SpreadRevolutionaryDate constructor
- Add tests for spreading to Mastodon
- Add tests for spreading to Twitter
- Test authentication to Freenode with actual credentials in user config
- Test no authentication on Freenode with fake credentials
- Test no authentication on Mastodon with fake credentials
- Move authentication to Freenode to spread method
- Move subclass of Bot::BasicBot outside of
App::SpreadRevolutionaryDate::Freenode
- Disable coerce_entities since Mastodon::Client has trouble coercing
Account
- Fix Bot::BasicBot methods calls
- Add abstract for subclasses
- Test Freenode configuration options
- Test Mastodon configuration options
- Test setting explicit target as command line argument
- Rename authentication test with actual credentials in user config
- Test authentication to Mastodon with actual credentials in user config
- Test setting option as command line argument
- Add pod documentation for methods
- Disable pod coverage tests for now
- Add tests for spreading objects with actual credentials in user config
- Test no authentication on Twitter with fake credentials
- Add fake configuration for tests
- Rename test file
- Switch to ExtUtils::MakeMaker instead of Module::Build::Tiny
- Add no warnings test for spreading objects
- Add tests for spreading objects
view all matches for this distribution
view release on metacpan or search on metacpan
lib/sqitch-authentication.pod view on Meta::CPAN
=encoding UTF-8
=head1 Name
sqitch-authentication - Guide to using database authentication credentials with Sqitch
=head1 Description
For database engines that require authentication, Sqitch supports a number
of credential-specification options, and searches for them in a specific
lib/sqitch-authentication.pod view on Meta::CPAN
EXAHOST = localhost:8563
EXAUID = sys
EXAPWD = exasol
AUTHMETHOD = refreshtoken
When combining the above, Sqitch doesn't need to know any credentials; they are
stored somewhat safely in F<~/.exasol/profiles.xml> and F<~/.odbc.ini>:
> sqitch status db:exasol:flipr_test
# On database db:exasol:flipr_test
# Project: flipr
view all matches for this distribution