view release on metacpan or search on metacpan
- Update autogenerated git readme
- Add localization for spread message, only fr (default) or en!
- Use config objects to test targets, using directly targets may lead to
undef
- Add SEE ALSO section in all modules pods
- Fix nb tests in freenode_fake_credentials to pass Test::NoWarnings
0.05 2019-03-07T08:01:25Z
- Move test no authentication to Freenode with fake credentials in xt
- Fix escaping of greater than sign in pod formatting code
- Use warnings in App::SpreadRevolutionaryDate::Config
0.04 2019-03-06T22:24:19Z
- Add clean-namespace and unused-vars tests in MANIFEST
testing multiple Freenode bots
- Add documentation about optional argument to
App::SpreadRevolutionaryDate constructor
- Add tests for spreading to Mastodon
- Add tests for spreading to Twitter
- Test authentication to Freenode with actual credentials in user config
- Test no authentication on Freenode with fake credentials
- Test no authentication on Mastodon with fake credentials
- Move authentication to Freenode to spread method
- Move subclass of Bot::BasicBot outside of
App::SpreadRevolutionaryDate::Freenode
- Disable coerce_entities since Mastodon::Client has trouble coercing
Account
- Fix Bot::BasicBot methods calls
- Add abstract for subclasses
- Test Freenode configuration options
- Test Mastodon configuration options
- Test setting explicit target as command line argument
- Rename authentication test with actual credentials in user config
- Test authentication to Mastodon with actual credentials in user config
- Test setting option as command line argument
- Add pod documentation for methods
- Disable pod coverage tests for now
- Add tests for spreading objects with actual credentials in user config
- Test no authentication on Twitter with fake credentials
- Add fake configuration for tests
- Rename test file
- Switch to ExtUtils::MakeMaker instead of Module::Build::Tiny
- Add no warnings test for spreading objects
- Add tests for spreading objects
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Sqitch/Engine/clickhouse.pm view on Meta::CPAN
return $val eq 'true' || $val eq 'yes' || $val eq 'on' || 0;
}
# Connection name defaults to host name from url, or else hostname from config
# or else localhost. Then look for that name in a connection under
# `connections_credentials`. If it exists, copy/overwrite `hostname`, `port`,
# `secure`, `user`, `password`, and `database`. Fall back on root object
# values `host` (not `hostname`) `port`, `secure`, `user`, `password`, and
# `database`.
#
# https://github.com/ClickHouse/ClickHouse/blob/d0facf0/programs/client/Client.cpp#L139-L212
lib/App/Sqitch/Engine/clickhouse.pm view on Meta::CPAN
# Copy client TLS config if exists.
if (my $tls = $cfg->{openSSL}) {
$conn->{tls} = $tls->{client} if $tls->{client};
}
# Copy connection credentials for this host if they exists.
$host ||= $cfg->{host} || 'localhost';
my $creds = $cfg->{connections_credentials} or return $conn;
my $conns = $creds->{connection} or return $conn;
for my $c (@{ ref $conns eq 'ARRAY' ? $conns : [$conns] }) {
next unless ($c->{name} || '') eq $host;
if (exists $c->{secure}) {
$conn->{secure} = _is_true $c->{secure}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/TimeTracker/Command/Jira.pm view on Meta::CPAN
Username to connect with.
=head3 password [OPTIONAL]
Password to connect with. Beware: This is stored in clear text! Better use authentication via C<Config::Identity> via C<JIRA::REST> where the credentials can be stored GPG encrypted.
=head3 token [OPTIONAL]
Token to authenticate with. Can be generated in Jira user profile.
See L<https://confluence.atlassian.com/enterprise/using-personal-access-tokens-1026032365.html>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Toot/Config.pm view on Meta::CPAN
Returns a hashref of the loaded config for the defined section name.
=head1 CONFIGURATION
To post to Mastodon, you need to provide the account's oauth credentials in the file C<config.ini>.
An example is provided as part of this distribution. The user running the L<toot> script, for example through cron, will need access to the configuration file.
To set up the configuration file, copy C<config.ini.example> into one of the following locations:
lib/App/Toot/Config.pm view on Meta::CPAN
=item C</etc/toot/config.ini>
=back
After creating the file, edit and update the values in the C<default> section to match the account's oauth credentials.
[default]
instance = mastodon.social
username = youruser
client_id = OKE98_kdno_NOTAREALCLIENTID
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/TypecastTemplates.pm view on Meta::CPAN
if (!keys %$templates) {
read_templates(\*DATA);
}
}
open(my $handle, '<' . $fn)
or die "can't open credentials file '$fn'";
if ($columns) {
$csv->column_names( split(/,/,$columns) );
}
else {
my @cols = $csv->getline( $handle );
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/Validation/Automation/Web.pm view on Meta::CPAN
Stores utilities that perform web based validation
=head1 SYNOPSIS
App::Validation::Automation::Web browses the web urls stored in config or passed as arguments using WWW::Mechanize Logs into the web urls using the credentials stored in attributes.Handles password expiry and authentication failure along with DNS rou...
=head1 ATTRIBUTES
user_name houses the login name needed to login into the web url.password stores the decrypted password.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/WatchLater/YouTube.pm view on Meta::CPAN
=head1 SYNOPSIS
This is a simple module for making requests to the YouTube Data API.
Authorization is required, and can be obtained by registering for an API key
from the Google Developer L<API
Console|https://console.developers.google.com/apis/credentials>. Alternatively,
obtain user authorization through OAuth2 using the yt-oauth(1) script.
my $api = App::WatchLater::YouTube->new(
access_token => ...,
api_key => ...,
view all matches for this distribution
view release on metacpan or search on metacpan
script/wp-tools view on Meta::CPAN
$database =~ s/^[\r\n]+//;
chomp $username;
chomp $password;
chomp $database;
if ($username =~ /[\r\n]/ || $password =~ /[\r\n]/ || $database =~ /[\r\n]/) {
die "Multiple credentials found in $args->{'path'}/wp-config.php. Cannot determine which to use. Backup operation halted.";
}
open (my $fh, '>', $defaults_file) or die "Cannot write to $defaults_file: $!";
close $fh;
chmod(0600, $defaults_file) or die "Cannot chmod $defaults_file: $!";
write_text($defaults_file,"[client]\nuser=$username\npassword=$password");
script/wp-tools view on Meta::CPAN
$database =~ s/^[\r\n]+//;
chomp $username;
chomp $password;
chomp $database;
if ($username =~ /[\r\n]/ || $password =~ /[\r\n]/ || $database =~ /[\r\n]/) {
die "Multiple credentials found in $args->{'path'}/wp-config.php. Cannot determine which to use. Restoration operation halted.";
}
open (my $fh, '>', $defaults_file) or die "Cannot write to $defaults_file: $!";
close $fh;
chmod(0600, $defaults_file) or die "Cannot chmod $defaults_file: $!";
write_text($defaults_file,"[client]\nuser=$username\npassword=$password");
script/wp-tools view on Meta::CPAN
$database =~ s/^[\r\n]+//;
chomp $username;
chomp $password;
chomp $database;
if ($username =~ /[\r\n]/ || $password =~ /[\r\n]/ || $database =~ /[\r\n]/) {
die "Multiple credentials found in $args->{'path'}/wp-config.php. Cannot determine which to use. Upgrade operation halted.";
}
if ($prefix =~ /[\r\n]/) {
die "Multiple database prefixes found in $args->{'path'}/wp-config.php. Cannot determine which to use. Upgrade operation halted.";
}
open (my $fh, '>', $defaults_file) or die "Cannot write to $defaults_file: $!";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/ZofCMS/Plugin/UserLogin.pm view on Meta::CPAN
B<Optional>. Takes a scalar as a value that represents a query parameter
name into which to store the URI of the page that not-logged-in user
attempted to access. This option works only when C<redirect_on_login> is
specified. When specified, plugin enables the magic to "remember" the page
that a not-logged-in user tried to access, and once the user enters correct
login credentials, he is redirected to said page automatically; thereby
making the login process transparent. B<By default> is not specified.
=head2 C<preserve_login>
preserve_login => 'my_site_login',
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/coinbasepro/lite.pm view on Meta::CPAN
schema => 'str*',
default => 'GET',
},
);
my %args_credentials = (
key => {
schema => ['str*'],
req => 1,
},
secret => {
lib/App/coinbasepro/lite.pm view on Meta::CPAN
$SPEC{private} = {
v => 1.1,
summary => 'Perform a public API request',
args => {
%args_credentials,
%args_common,
},
};
sub private {
my %args = @_;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/cryp/Role/Exchange.pm view on Meta::CPAN
You have to specify one of base_size or quote_size, but not both.
=back
Some specific exchanges might require more credentials or arguments (e.g.
C<api_passphrase> on Coinbase Pro); please check with the specific drivers.
When successful, payload in response must be a hashref which contains at least
these keys: C<type> ("buy" or "sell"), C<pair>, C<order_id> (str, usually a
number, can also be a UUID, etc), C<price> (number, actual price of the order),
lib/App/cryp/Role/Exchange.pm view on Meta::CPAN
String. Required.
=back
Some specific exchanges might require more credentials or arguments (e.g.
C<api_passphrase> on GDAX); please check with the specific drivers.
Method must return object.
=head1 HOMEPAGE
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/gcal.pm view on Meta::CPAN
require Net::Netrc;
my $netrc = Net::Netrc->lookup('google.com');
unless ($netrc) {
die(
'Error. Could not find your credentials in your .netrc file'
);
}
$username = $netrc->login;
$password = $netrc->password;
lib/App/gcal.pm view on Meta::CPAN
=head1 DESCRIPTION
The C<gcal> command provides a quick and easy interface to Google Calendar from the command line.
Before using the C<gcal> command, you need to provide your Google credentials. The most convenient way to do this is by using your C<~.netrc> file and supplying credentials for the C<google.com> machine. For example:
machine google.com
login bill
password 1234
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/gh/Command/Fork.pm view on Meta::CPAN
my $gh_id = App::gh->config->github_id;
my $gh_token = App::gh->config->github_token
|| App::gh->config->github_password;
unless( $gh_id && $gh_token ) {
die "Github credentials not found. Cannot fork repository.\n";
}
unless ( $repo ) {
# detect .git directory
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/gist.pm view on Meta::CPAN
around _request_for => sub {
my ($orig, $self, @args) = @_;
my $req = $self -> $orig(@args);
my ($login, $passwd) = App::gist::_get_credentials();
$req -> headers -> remove_header('Authorization');
$req -> headers -> authorization_basic($login, $passwd);
return $req;
lib/App/gist.pm view on Meta::CPAN
}
}
);
}
sub _get_credentials {
my ($login, $pass, $token);
my %identity = Config::Identity::GitHub -> load
if try_load_class('Config::Identity::GitHub');
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/git/ship.pm view on Meta::CPAN
The main focus is to automate away the boring steps, but at the same time not
get in your (or any random contributor's) way. Problems should be solved with
sane defaults according to standard rules instead of enforcing more rules.
L<App::git::ship> differs from other tools like L<dzil|Dist::Zilla> by I<NOT>
requiring any configuration except for a file containing the credentials for
uploading to CPAN.
=head2 Supported project types
Currently, only L<App::git::ship::perl> is supported.
view all matches for this distribution
view release on metacpan or search on metacpan
script/git_log_ch_usrdata view on Meta::CPAN
my ($Old_Mail, $New_Mail, $New_User, $No_Credentials);
GetOptions('old_email|oe=s' => \$Old_Mail,
'new_email|ne=s' => \$New_Mail,
'new_user|nu=s' => \$New_User,
'no_credentials|nc' => \$No_Credentials
) or pod2usage(2);
$Old_Mail // die("'--old_email' missing.");
$New_Mail // die("'--new_email' missing.");
$New_User // die("'--new_user' missing.");
script/git_log_ch_usrdata view on Meta::CPAN
'git gc --prune=now --aggressive',
'echo "--- push changes to github ---"',
"git push --force --tags origin 'refs/heads/*'",
$No_Credentials ? () : (
'echo "--- Set credentials ---"',
'git config credential.helper store',
"git config user.email $New_Mail",
"git config user.name \$New_User"
)
);
script/git_log_ch_usrdata view on Meta::CPAN
=head1 SYNOPSIS
git_log_ch_usrdata --old_email OLD_EMAIL --new_email NEW_EMAIL \
--new_user NEW_USER [--no_credentials]
git_log_ch_usrdata --help | --version
or, shorter:
script/git_log_ch_usrdata view on Meta::CPAN
git_log_ch_usrdata --oe OLD_EMAIL --ne NEW_EMAIL --nu NEW_USER
By default, the script also stores I<C<NEW_EMAIL>> and I<C<NEW_USER>> via
C<git config credential.helper store>. This can be switched off by specifying
the B<C<--no_credentials>> (or B<C<--nc>>) option.
=head1 SEE ALSO
L<App::ghmulti>, L<App::git_log_ch_usrdata>
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/html2wp.pm view on Meta::CPAN
v => 1.1,
summary => 'Publish HTML document to WordPress as blog post',
description => <<'_',
To use this program, first create `~/html2wp.conf` containing the API
credentials, e.g.:
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
lib/App/html2wp.pm view on Meta::CPAN
html2wp(%args) -> [status, msg, payload, meta]
Publish HTML document to WordPress as blog post.
To use this program, first create C<~/html2wp.conf> containing the API
credentials, e.g.:
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/org2wp.pm view on Meta::CPAN
This is originally a quick hack because I couldn't make
[org2blog](https://github.com/punchagan/org2blog) on my Emacs installation to
work after some update. `org2wp` uses the same format as `org2blog`, but instead
of being an Emacs package, it is a CLI script written in Perl.
First, create `~/org2wp.conf` containing the API credentials, e.g.:
; use INI (IOD) format for this file
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
lib/App/org2wp.pm view on Meta::CPAN
server, which can be hosted on `wordpress.com` or on other server, including
your own. It has nothing to do with HTTP/HTTPS proxy; the term "proxy" is used
by the <pm:XMLRPC::Lite> and <pm:SOAP::Lite> Perl libraries and `org2wp` simply
uses the same terminology.
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
; use INI (IOD) format for this file
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
lib/App/org2wp.pm view on Meta::CPAN
This is originally a quick hack because I couldn't make
LL<https://github.com/punchagan/org2blog> on my Emacs installation to
work after some update. C<org2wp> uses the same format as C<org2blog>, but instead
of being an Emacs package, it is a CLI script written in Perl.
First, create C<~/org2wp.conf> containing the API credentials, e.g.:
; use INI (IOD) format for this file
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
lib/App/org2wp.pm view on Meta::CPAN
server, which can be hosted on C<wordpress.com> or on other server, including
your own. It has nothing to do with HTTP/HTTPS proxy; the term "proxy" is used
by the L<XMLRPC::Lite> and L<SOAP::Lite> Perl libraries and C<org2wp> simply
uses the same terminology.
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
; use INI (IOD) format for this file
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/pepper.pm view on Meta::CPAN
my $handlers = {
'timeout' => \&handle_timeout,
'ssl' => \&handle_ssl,
'host' => \&handle_host,
'port' => \&handle_port,
'credentials' => \&handle_credentials,
'id' => \&handle_id,
'pw' => \&handle_pw,
'newpw' => \&handle_newpw,
'connect' => \&handle_connect,
'login' => \&handle_login,
lib/App/pepper.pm view on Meta::CPAN
}
return $result;
}
}
sub handle_credentials {
if ($_[0] eq '') {
return error('Missing client ID');
} elsif ($_[1] eq '') {
return error('Missing password');
lib/App/pepper.pm view on Meta::CPAN
} elsif ($epp->{'host'} eq '') {
return error('No host specified');
} elsif ($epp->{'user'} eq '' || $epp->{'pass'} eq '') {
return error('No credentials specified');
} else {
note("Attempting to login as '%s'...", $epp->{'user'});
$epp->{'quiet'} = ($verbose ? 0 : 1);
my $result = $epp->_login;
lib/App/pepper.pm view on Meta::CPAN
my %map = (
'timeout' => 'SYNTAX/Connection Management',
'ssl' => 'SYNTAX/Connection Management',
'host' => 'SYNTAX/Connection Management',
'port' => 'SYNTAX/Connection Management',
'credentials' => 'SYNTAX/Session Management',
'id' => 'SYNTAX/Session Management',
'pw' => 'SYNTAX/Session Management',
'newpw' => 'SYNTAX/Session Management',
'connect' => 'SYNTAX/Connection Management',
'login' => 'SYNTAX/Session Management',
view all matches for this distribution
view release on metacpan or search on metacpan
t/features/step_definitions/basic.pl~ view on Meta::CPAN
use warnings;
use lib 't/lib';
use Test::Helper qw(testmojo create_user testschema);
use Test::StepsHelper
qw(a_login_request_with_invalid_credentials get_result api_base );
use Test::Net::LDAP::Util qw(ldap_mockify);
use Test::More;
use Test::BDD::Cucumber::StepFile;
t/features/step_definitions/basic.pl~ view on Meta::CPAN
create_user( context => $context );
};
};
When qr{the client tries to login without providing a user name} => sub {
my $request = a_login_request_with_invalid_credentials();
delete $request->{username};
$t->post_ok( $route => $accept_header => json => $request );
};
When qr{the client tries to login without providing a password} => sub {
my $request = a_login_request_with_invalid_credentials();
delete $request->{password};
$t->post_ok( $route => $accept_header => json => $request );
};
When
qr{the client tries to log in providing correct password for this existing user}
=> sub {
my $request = a_login_request_with_invalid_credentials();
$request->{username} = C->stash->{scenario}->{username};
$request->{password} = C->stash->{scenario}->{password};
# deep within this login there's a bind() which we have to mock
ldap_mockify {
$t->post_ok( $route => $accept_header => json => $request );
}
};
When qr{the client tries to login providing name of non-existing user} => sub {
my $request = a_login_request_with_invalid_credentials();
$request->{username} = 'I do not exist';
$t->post_ok( $route => $accept_header => json => $request );
};
When
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/pod2wp.pm view on Meta::CPAN
This is like <prog:org2wp> except that instead of Org as the document format,
this program uses POD.
To use this program, first create `~/pod2wp.conf` containing the API
credentials, e.g.:
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
lib/App/pod2wp.pm view on Meta::CPAN
This is like L<org2wp> except that instead of Org as the document format,
this program uses POD.
To use this program, first create C<~/pod2wp.conf> containing the API
credentials, e.g.:
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
You can also put multiple credentials in the configuration file using profile
sections, e.g.:
[profile=blog1]
proxy=https://YOURBLOG1NAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/rdapper.pm view on Meta::CPAN
=item * C<--short> - omit remarks, notices, links and redactions.
=item * C<--bypass-cache> - disable local cache of RDAP objects.
=item * C<--auth=USER:PASS> - HTTP Basic Authentication credentials to be used
when accessing the specified resource. This option B<SHOULD NOT> be used unless
you explicitly specify a URL, otherwise your credentials may be sent to servers
you aren't expecting them to.
=item * C<--nocolor> - disable ANSI colors in the formatted output.
=item * C<--debug> -run in debugging mode.
view all matches for this distribution
view release on metacpan or search on metacpan
=item B<smtp://>[I<USER>[B<:>I<PASS>]B<@>]I<HOSTNAME>[B<:>I<PORT>]
Send mail using SMTP. I<HOSTNAME> is the hostname or IP address of the mail
relay to use. I<PORT>, if supplied, is the port number to use instead of the
default 25. Optional I<USER> and I<PASS> provide credentials, if the relay
requires authentication.
=back
=item B<-n>, B<--dry-run>
view all matches for this distribution
view release on metacpan or search on metacpan
bin/wp-xmlrpc view on Meta::CPAN
This document describes version 0.003 of wp-xmlrpc (from Perl distribution App-wp-xmlrpc), released on 2017-04-24.
=head1 SYNOPSIS
In C<~/wp-xmlrpc.conf>, put your API credentials:
proxy=https://YOURBLOGNAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
Then:
% wp-xmlrpc wp.getPost 13
You can also put multiple credentials in the config file via profiles:
[profile=blog1]
proxy=https://BLOG1NAME.wordpress.com/xmlrpc.php
username=YOURUSERNAME
password=YOURPASSWORD
view all matches for this distribution
view release on metacpan or search on metacpan
lib/App/wsgetmail.pm view on Meta::CPAN
=over
=item Client Credentials
This method uses shared secrets and is preferred by Microsoft.
(See L<Client credentials|https://docs.microsoft.com/en-us/azure/active-directory/develop/msal-authentication-flows#client-credentials>)
=item Username/password
This method is more like previous connections via IMAP. It is currently
supported by Microsoft, but not recommended. (See L<Username/password|https://docs.microsoft.com/en-us/azure/active-directory/develop/msal-authentication-flows#usernamepassword>)
lib/App/wsgetmail.pm view on Meta::CPAN
wsgetmail --config=wsgetmail.json --options='{"folder": "Inbox"}'
wsgetmail --config=wsgetmail.json --options='{"folder": "Other Folder"}'
NOTE: Setting C<secret> or C<user_password> with C<--options> is not secure
and may expose your credentials to other users on the local system. If you
need to set these options, or just change a lot of settings in your
configuration, just run wsgetmail with different configurations:
wsgetmail --config=account01.json
wsgetmail --config=account02.json
view all matches for this distribution
view release on metacpan or search on metacpan
lib/ArangoDB2.pm view on Meta::CPAN
{
my($self, $name) = @_;
# default database for arango is _system
$name ||= "_system";
# only create one instance per ArangoDB2 per database, each ArangoDB2
# keeps its own instances since they may have different credentials
return $self->databases->{$name} ||= ArangoDB2::Database->new($self, $name);
}
# databases
#
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Arepa/Web/Auth.pm view on Meta::CPAN
use MojoX::Session;
# Let session cookies live one week
use constant TTL_SESSION_COOKIE => 60 * 60 * 24 * 7;
sub _check_credentials {
my ($self, $username, $password, $auth_type) = @_;
if (defined $auth_type && $auth_type eq 'file_md5') {
my $user_file_path =
$self->config->get_key('web_ui:authentication:user_file');
lib/Arepa/Web/Auth.pm view on Meta::CPAN
if (defined $self->param('username') &&
defined $self->param('password')) {
my $valid_creds;
eval {
$valid_creds =
$self->_check_credentials($self->param('username'),
$self->param('password'),
$auth_type);
};
if ($EVAL_ERROR) {
$self->vars("error" => $EVAL_ERROR);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Armadito/Agent/HTTP/Client.pm view on Meta::CPAN
if ( !$result->is_success() ) {
# authentication required
if ( $result->code() == 401 ) {
if ( $self->{user} && $self->{password} ) {
$logger->debug( $log_prefix . "authentication required, submitting credentials" );
my $header = $result->header('www-authenticate');
my ($realm) = $header =~ /^Basic realm="(.*)"/;
my $host = $url->host();
my $port = $url->port()
|| ( $scheme eq 'https' ? 443 : 80 );
$self->{ua}->credentials( "$host:$port", $realm, $self->{user}, $self->{password} );
# replay request
eval {
if ( $OSNAME eq 'MSWin32' && $scheme eq 'https' ) {
alarm $self->{ua}->{timeout};
}
$result = $self->{ua}->request( $request, $file );
alarm 0;
};
if ( !$result->is_success() ) {
$logger->error( $log_prefix . "authentication required, wrong credentials" );
}
}
else {
# abort
$logger->error( $log_prefix . "authentication required, no credentials available" );
}
}
else {
$logger->error( $log_prefix . "communication error: " . $result->status_line() );
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/ArrayData/Lingua/Word/EN/Enable.pm view on Meta::CPAN
credentialing
credentialism
credentialisms
credentialled
credentialling
credentials
credenza
credenzas
credibilities
credibility
credible
view all matches for this distribution