view release on metacpan or search on metacpan
t/testlib/Util.pm view on Meta::CPAN
sub set_timeout {
my ($timeout) = @_;
$timeout ||= 10;
my $w;
$w = AnyEvent->timer(after => $timeout, cb => sub {
fail("Timeout");
undef $w;
exit 2;
});
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/Whois/Raw.pm view on Meta::CPAN
=over
=item timeout => $seconds
Timeout for whois request in seconds
=item on_prepare => $cb
Same as prepare callback from AnyEvent::Socket. So you can bind socket to some ip:
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/XMPP/TestClient.pm view on Meta::CPAN
my ($self) = @_;
$self->{condvar} = AnyEvent->condvar;
$self->{timeout} =
AnyEvent->timer (
after => $self->{timeout}, cb => sub {
$self->{error} .= "Error: Test Timeout\n";
$self->{condvar}->broadcast;
}
);
my $cl = $self->{client} = AnyEvent::XMPP::Client->new (debug => $self->{debug} || 0);
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/Yubico.pm view on Meta::CPAN
Optional. When enabled (enabled by default) requests will be signed, as long
as api_key is also provided.
=item timeout => $seconds
Optional. Timeout parameter sent to the server, see the protocol details for
more information.
=item sl => $level
Optional. Security level parameter sent to the server, see the protocol
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
$cache_dbm->{dbm}->Lock;
if(defined $value) {
my $meta = { ServerID => $ServerID, Creation => time() };
if(defined $expires && ($expires =~ /^\-?\d+$/)) {
$meta->{Expires} = $expires;
$meta->{Timeout} = time + $expires;
};
$self->{dbg} && $self->Debug("storing $checksum in $cache_name cache");
$cache_dbm->STORE($metakey, $meta);
$self->{cache_count_store}++;
$rv = $cache_dbm->STORE($checksum, $value);
if(defined $expires && ($expires =~ /^\-?\d+$/) && ($expires != $meta->{Expires})) {
$self->Debug("new expires $expires, old ".($meta->{Expires} || '')." for $checksum");
$meta->{Expires} = $expires;
# use creation timestamp for expires calculation, not current
# time, or we would refresh the entry
$meta->{Timeout} = $meta->{Creation} + $expires;
$cache_dbm->STORE($metakey, $meta);
};
}
# LastModified calculations
$last_modified = undef;
}
}
# EARLY TIMEOUT CALCULATION
if($meta->{Timeout}) {
# 10% chance to expire early to prevent collision
my $early = ($meta->{Expires} || 0) * rand() * '.1';
$self->{dbg} && $self->Debug("will reduce expires for $meta->{Expires} by random $early seconds, checksum $checksum");
$meta->{Timeout} = $meta->{Timeout} - $early;
}
$self->{dbg} && $self->Debug("meta cache data for checksum $checksum", $meta);
if($new) {
# This will allow for caching in other modes that simply does not reset
# upon server restart
$self->{dbg} && $self->Debug("cache expires new server $ServerID, was $meta->{ServerID}");
$self->{cache_count_restart}++;
$rv = undef;
} elsif($meta->{Timeout} && ($meta->{Timeout} <= time())) {
$self->{dbg} && $self->Debug("cache expires timeout $meta->{Timeout}, checksum $checksum, time ".time);
$self->{cache_count_expires}++;
$rv = undef;
} elsif(defined($last_modified) && ($last_modified >= $meta->{Creation})) {
$self->{dbg} && $self->Debug("cache expires, checksum $checksum, LastModified $last_modified, Creation $meta->{Creation}");
$self->{cache_count_last_modified_expires}++;
# connect to server
{
local $SIG{__WARN__} = sub { $self->Debug('Net::SMTP->new() warning', @_) };
if($mail->{Test}) {
$args{Timeout} = 5;
}
$smtp = Net::SMTP->new(%args);
}
unless($smtp) {
$self->Out("[ERROR] can't connect to SMTP server with args ", \%args);
PerlSetVar StateDir ./.state
=item StateManager
default 10, this number specifies the numbers of times per SessionTimeout
that timed out sessions are garbage collected. The bigger the number,
the slower your system, but the more precise Session_OnEnd's will be
run from global.asa, which occur when a timed out session is cleaned up,
and the better able to withstand Session guessing hacking attempts.
The lower the number, the faster a normal system will run.
The defaults of 20 minutes for SessionTimeout and 10 times for
StateManager, has dead Sessions being cleaned up every 2 minutes.
PerlSetVar StateManager 10
=item StateDB
part to the Set-Cookie: header set for the session-id cookie.
PerlSetVar CookieDomain .your.global.domain
=item SessionTimeout
Default 20 minutes, when a user's session has been inactive for this
period of time, the Session_OnEnd event is run, if defined, for
that session, and the contents of that session are destroyed.
PerlSetVar SessionTimeout 20
=item SecureSession
default 0. Sets the secure tag for the session cookie, so that the cookie
will only be transmitted by the browser under https transmissions.
performs session cleanup. The timing of the Session_OnEnd does not
occur immediately after the session times out, but when the first
script runs after the session expires, and the StateManager allows
for that session to be cleaned up.
So on a busy site with default SessionTimeout (20 minutes) and
StateManager (10 times) settings, the Session_OnEnd for a particular
session should be run near 22 minutes past the last activity that Session saw.
A site infrequently visited will only have the Session_OnEnd run
when a subsequent visit occurs, and theoretically the last session
of an application ever run will never have its Session_OnEnd run.
=item $Session->{SessionID}
SessionID property, returns the id for the current session,
which is exchanged between the client and the server as a cookie.
=item $Session->{Timeout} [= $minutes]
Timeout property, if minutes is being assigned, sets this
default timeout for the user session, else returns
the current session timeout.
If a user session is inactive for the full
timeout, the session is destroyed by the system.
the CreateObject method which allows developers to create instances of
ActiveX components, like the ADO component.
=over
=item $Server->{ScriptTimeout} = $seconds
Not implemented. May never be. Please see the
Apache Timeout configuration option, normally in httpd.conf.
=item $Server->Config($setting)
API extension. Allows a developer to read the CONFIG
settings, like Global, GlobalPackage, StateDir, etc.
at any one time, and try to create this situation with a snazzy
CleanupMaster routine. This is done by having a process register
itself in the internal database with a server key created at
apache start time. If this key gets stale, another process can
become the master, and this period will not exceed the period
SessionTimeout / StateManager.
** Work on session manager sponsored by LRN, http://www.lrn.com. **
** This work was used to deploy a server farm in production with **
** NFS mounted StateDir. Thanks to Craig Samuel for his belief in **
** open source. :) **
than 0.
-Put write locking code around State writes, like $Session
and $Application. I thought I fixed this bug a while ago.
-API change: converted $Session->Timeout() and $Session->SessionID()
methods into $Session->{Timeout} and $Session->{SessionID} properties.
The use of these properties as methods is deprecated, but
backwards compatibility will remain. Updated ./eg/session.asp
to use these new properties.
+Implemented $Response->{PICS} which if set sends out a PICS-Label
from the Global directory, useful for operating systems with caching file
systems.
+StateManager config directive. StateManager specifies how frequently
Sessions are cleaned up, with 10 (default) meaning that old Sessions
will be cleaned up 10 times per SessionTimeout period (default 20 minutes).
+$Application->SessionCount() implemented, non-portable method.
: returns the number of currently active sessions
-STOP button fix. Users may hit STOP button during script
$Session id's are tracked through the use of cookies.
Security
--------
Timeouts any attempt to use a session id that doesn't already
exist. Should stop hackers, since there is no wire speed guessing
cookies.
=head1 LICENSE
view all matches for this distribution
view release on metacpan or search on metacpan
t/httpd.conf-dist view on Meta::CPAN
#
#ResourceConfig conf/srm.conf
#AccessConfig conf/access.conf
#
# Timeout: The number of seconds before receives and sends time out.
#
Timeout 300
#
# KeepAlive: Whether or not to allow persistent connections (more than
# one request per connection). Set to "Off" to deactivate.
#
t/httpd.conf-dist view on Meta::CPAN
# We recommend you leave this number high, for maximum performance.
#
MaxKeepAliveRequests 100
#
# KeepAliveTimeout: Number of seconds to wait for the next request from the
# same client on the same connection.
#
KeepAliveTimeout 15
#
# Server-pool size regulation. Rather than making you guess how many
# server processes you need, Apache dynamically adapts to the load it
# sees --- that is, it tries to maintain enough server processes to
view all matches for this distribution
view release on metacpan or search on metacpan
Mercury/SMTP_Message.pm view on Meta::CPAN
if ($autoforw{$self->{'security'}} eq 'message') {
my $msg = $self->to_mime($self->{'address'});
$self->warn("->send_by_e_mail: sending full message to <".$self->{'address'}.">:");
eval {
$msg->send_by_smtp(SMTP_SERVER, Hello => SMTP_HELLO,
Timeout => SMTP_TIMEOUT, Debug => SMTP_DEBUG);
};
if ($@) {
$self->log_error("->send_by_e_mail: $@");
return 0;
}
Mercury/SMTP_Message.pm view on Meta::CPAN
} elsif ($autoforw{$self->{'security'}} eq 'notify') {
my $msg = $self->mime_notify($self->{'address'});
$self->warn("->send_by_e_mail: sending notify message to <".$self->{'address'}.">:");
eval {
$msg->send_by_smtp(SMTP_SERVER, Hello => SMTP_HELLO,
Timeout => SMTP_TIMEOUT, Debug => SMTP_DEBUG);
};
if ($@) {
$self->log_error("->send_by_e_mail: $@");
return 0;
}
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/AppSamurai.pm view on Meta::CPAN
return undef;
}
}
}
# Set a 1hr Timeout if neither Timeout or Expire are set
unless ($sessconfig->{Timeout} || $sessconfig->{Expire}) {
$sessconfig->{Timeout} = 3600;
}
return $sessconfig;
}
lib/Apache/AppSamurai.pm view on Meta::CPAN
# Store some basics
$sess{'username'} = $username;
$sess{'ctime'} = time();
# Track last access time if Timeout is set
if ($sessconfig->{Timeout}) {
$sess{'atime'} = $sess{'ctime'};
$sess{'Timeout'} = $sessconfig->{Timeout};
}
# Set hard expiration time if Expire is set
if ($sessconfig->{Expire}) {
$sess{'etime'} = $sess{'ctime'} + $sessconfig->{Expire};
lib/Apache/AppSamurai.pm view on Meta::CPAN
}
}
if ($sess->{atime}) {
$tdiff = $time - $sess->{atime};
if ($tdiff < $sess->{Timeout}) {
# We are still valid. Update the time if we are over 60 seconds
# stale.
if ($tdiff >= 60) {
$sess->{atime} = $time;
}
lib/Apache/AppSamurai.pm view on Meta::CPAN
(Default: 0)
The maximum session lifetime in seconds. After a user has been logged in this
long, they are logged out. (Ignores weather the user is idle or not.)
=head3 SessionI<Timeout> C<SECONDS>
(Default: 3600 (1 hour)).
The maximum time a session can be idle before being removed. After a user has
not accessed the protected application for this many seconds, they are logged
out.
lib/Apache/AppSamurai.pm view on Meta::CPAN
## Session storage options ##
# (Note - See L<Apache::AppSamurai::Session> and L<Apache::Session> for
# more information.)
# Inactivity timeout (in seconds)
PerlSetVar ExampleSessionTimeout 1800
# Use the File storage and lock types from Apache::Session
PerlSetVar ExampleSessionStore "File"
PerlSetVar ExampleSessionLock "File"
lib/Apache/AppSamurai.pm view on Meta::CPAN
# Add some local overrides to this directory. (Has
# no affect on other directories/locations)
# Switch from an inactivity timeout to a hard expiration
PerlSetVar ExampleSessionExpire 3600
PerlSetVar ExampleSessionTimeout 0
# In lieu of cookies, calculate the session key using the
# basic auth header from the client, and an argument called
# "Sessionthing" from the request URL. (NOTE - Keysource
# should be used with care! Do not use it unless you are
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/AuthCAS.pm view on Meta::CPAN
Apache->warn("$$: CAS: initialize(): setting CASSessionCookieDomain to $SESSION_COOKIE_DOMAIN") unless ($LOG_LEVEL < $LOG_INFO);
} else {
# default
$SESSION_COOKIE_DOMAIN = $DEFAULT_SESSION_COOKIE_DOMAIN;
}
if ($tmp = $r->dir_config("CASSessionTimeout")) {
$SESSION_TIMEOUT= $tmp;
Apache->warn("$$: CAS: initialize(): setting CASSessionTimeout to $SESSION_TIMEOUT") unless ($LOG_LEVEL < $LOG_INFO);
} else {
# default
$SESSION_TIMEOUT= $DEFAULT_SESSION_TIMEOUT;
}
lib/Apache/AuthCAS.pm view on Meta::CPAN
PerlSetVar CASDatabasePort "5432"
PerlSetVar CASDatabaseDriver "Pg"
PerlSetVar CASDatabaseUser "dbuser"
PerlSetVar CASDatabasePass "dbpass"
PerlSetVar CASSessionCookieName "APACHECAS"
PerlSetVar CASSessionTimeout "1800"
PerlSetVar CASLogLevel "0"
PerlSetVar CASRemoveTicket "false"
require valid-user
lib/Apache/AuthCAS.pm view on Meta::CPAN
PerlSetVar CASDatabasePort "5432"
PerlSetVar CASDatabaseDriver "Pg"
PerlSetVar CASDatabaseUser "dbuser"
PerlSetVar CASDatabasePass "dbpass"
PerlSetVar CASSessionCookieName "APACHECAS"
PerlSetVar CASSessionTimeout "1800"
PerlSetVar CASLogLevel "0"
PerlSetVar CASRemoveTicket "false"
require valid-user
lib/Apache/AuthCAS.pm view on Meta::CPAN
# the name of the cookie that will be used for sessions
PerlSetVar CASSessionCookieName "APACHECAS"
# the max time before a session expires (in seconds)
PerlSetVar CASSessionTimeout "1800"
# not currently able to override through Apache configuration:
# CAS login URI
# CAS logout URI
# CAS proxy URI
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/AuthCookie.pm view on Meta::CPAN
my ($user, @args) = $auth_type->authen_ses_key($r, $cookie);
if (!is_blank($user) and scalar @args == 0) {
$r->log_error("user is $user") if $debug >= 2;
# if SessionTimeout is on, send new cookie with new Expires.
if (my $expires = $r->dir_config("${auth_name}SessionTimeout")) {
$self->send_cookie($cookie, { expires => $expires });
}
$r->connection->user( $self->_encode($r, $user) );
}
lib/Apache/AuthCookie.pm view on Meta::CPAN
$r->connection->auth_type($auth_type);
$r->connection->user( $auth_type->_encode($r, $auth_user) );
$r->log_error("user authenticated as $auth_user") if $debug >= 1;
# if SessionTimeout is on, send cookie with new expires
if (my $expires = $r->dir_config("${auth_name}SessionTimeout")) {
$auth_type->send_cookie($ses_key_cookie,
{ expires => $expires });
}
return OK;
lib/Apache/AuthCookie.pm view on Meta::CPAN
# Use this if you want user session cookies to expire if the user
# doesn't request a auth-required or recognize_user page for some
# time period. If set, a new cookie (with updated expire time)
# is set on every request.
PerlSetVar WhatEverSessionTimeout +30m
# to enable the HttpOnly cookie property, use HttpOnly.
# this is an MS extension. See
# http://msdn.microsoft.com/workshop/author/dhtml/httponly_cookies.asp
PerlSetVar WhatEverHttpOnly 1
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Apache/AuthTicket.pm view on Meta::CPAN
PerlSetVar FooTicketPasswordStyle cleartext
PerlSetVar FooTicketSecretTable ticket_secrets:sec_data:sec_version
PerlSetVar FooTicketExpires 15
PerlSetVar FooTicketLogoutURI /foo/index.html
PerlSetVar FooTicketLoginHandler /foologin
PerlSetVar FooTicketIdleTimeout 1
PerlSetVar FooPath /
PerlSetVar FooDomain .foo.com
PerlSetVar FooSecure 1
PerlSetVar FooLoginScript /foologinform
lib/Apache/AuthTicket.pm view on Meta::CPAN
TicketPasswordStyle => 'cleartext',
TicketSecretTable => 'ticket_secrets:sec_data:sec_version',
TicketExpires => '15',
TicketLogoutURI => '/foo/index.html',
TicketLoginHandler => '/foologin',
TicketIdleTimeout => 5
});
Valid configuration items are:
=over 3
lib/Apache/AuthTicket.pm view on Meta::CPAN
This should not be confused with the inherited AuthCookie setting C<Expire>,
which is the I<cookie> expiration time. C<TicketExpires> controls the
expiration of the ticket, not the cookie.
=item B<TicketIdleTimeout>
This directive specifys the number of minutes of inactivity before a ticket
is considered invalid. Setting this value to 5 for example would force a
re-login if no requests are recieved from the user in a 5 minute period.
lib/Apache/AuthTicket.pm view on Meta::CPAN
This value means that the server secret could not be loaded.
=item idle_timeout
This value means that the user has exceeded the I<TicketIdleTimeout> minutes of
inactivity, and the user must re-login.
=item tampered_hash
This value indicates that the ticket data does not match its cryptographic
view all matches for this distribution
view release on metacpan or search on metacpan
}
elsif (defined $merge{$directive}) {
$merge{$directive} =~ s/^\s+//;
$merge{$directive} =~ s/\s+$//;
}
if ($directive eq 'TKTAuthCookieExpires' || $directive eq 'TKTAuthTimeout') {
$self->{$_} = $self->convert_time_seconds($merge{$directive});
}
# Don't allow TKTAuthDebug to turn on debugging here
elsif ($directive ne 'TKTAuthDebug') {
$self->{$_} = $merge{$directive};
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
smb/smbval/.svn/text-base/rfcnb-error.h.svn-base view on Meta::CPAN
#define RFCNBE_CallRejNLFCN 11 /* Call rejected, not listening for CN */
#define RFCNBE_CallRejCNNP 12 /* Call rejected, called name not present */
#define RFCNBE_CallRejInfRes 13/* Call rejetced, name ok, no resources */
#define RFCNBE_CallRejUnSpec 14/* Call rejected, unspecified error */
#define RFCNBE_BadParam 15/* Bad parameters passed ... */
#define RFCNBE_Timeout 16/* IO Timed out */
/* Text strings for the error responses */
static char *RFCNB_Error_Strings[] = {
smb/smbval/.svn/text-base/rfcnb-error.h.svn-base view on Meta::CPAN
"RFCNBE_CallRejNLFCN: Call rejected. Not listening for called name.",
"RFCNBE_CallRejCNNP: Call rejected. Called name not present.",
"RFCNBE_CallRejInfRes: Call rejected. Name present, but insufficient resources.",
"RFCNBE_CallRejUnSpec: Call rejected. Unspecified error.",
"RFCNBE_BadParam: Bad parameters passed to a routine.",
"RFCNBE_Timeout: IO Operation timed out ..."
};
view all matches for this distribution
view release on metacpan or search on metacpan
AuthenRadius.pm view on Meta::CPAN
my $ip = inet_ntoa(gethost($r->hostname)->addr);
# Shared secret for the host we are running on.
my $secret = $r->dir_config("Auth_Radius_secret") or return DECLINED();
# Timeout to wait for a response from the radius server.
my $timeout = $r->dir_config("Auth_Radius_timeout") || 5;
# Create the radius connection.
my $radius = Authen::Radius->new(
'Host' => "$host:$port",
view all matches for this distribution
view release on metacpan or search on metacpan
AuthzCache.pm view on Meta::CPAN
my $require_groups = undef;
# Get configuration
my $casesensitive = $r->dir_config('AuthzCache_CaseSensitive') || 'on';
my $cache_time_limit = $r->dir_config('AuthzCache_CacheTime') ||
$r->dir_config('AuthzCache_Timeout') || $Cache::Cache::EXPIRES_NEVER;
my $cache_dir = $r->dir_config('AuthzCache_Directory') || '/tmp';
my $cache_umask = $r->dir_config('AuthzCache_Umask') || '007';
my $auth_name = $r->auth_name;
my $requirement = $r->dir_config('AuthzRequire') || 'inAGroup';
$r->log->debug("manage_cache: cache_time_limit=$cache_time_limit, ",
AuthzCache.pm view on Meta::CPAN
}
# Get configuration
my $casesensitive = $r->dir_config('AuthzCache_CaseSensitive') || 'on';
my $cache_time_limit = $r->dir_config('AuthzCache_CacheTime') ||
$r->dir_config('AuthzCache_Timeout') || $Cache::Cache::EXPIRES_NEVER;
my $cache_dir = $r->dir_config('AuthzCache_Directory') || '/tmp';
my $cache_umask = $r->dir_config('AuthzCache_Umask') || '007';
my $auth_name = $r->auth_name;
$r->log->debug("manage_cache: cache_time_limit=$cache_time_limit, ",
"cache_dir=$cache_dir, cache_umask=$cache_umask, ",
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
<dt>Balancer changes will NOT be persisted on restart.</dt><dt>Balancers are inherited from main server.</dt><dt>ProxyPass settings are inherited from main server.</dt></dl>
<hr />
<h3>LoadBalancer Status for <a href="/balancer-manager?b=balancer_name&nonce=488d6558-fe13-6927-de4f-de761f8f7d74">balancer://balancer_name</a> [pdcfd1ba5_balancer_name]</h3>
<table><tr><th>MaxMembers</th><th>StickySession</th><th>DisableFailover</th><th>Timeout</th><th>FailoverAttempts</th><th>Method</th><th>Path</th><th>Active</th></tr>
<tr><td>2 [2 Used]</td>
<td> (None) </td><td>Off</td>
<td>0</td><td>31</td>
<td>byrequests</td>
<td>/</td>
</table>
<hr />
<h3>LoadBalancer Status for <a href="/balancer-manager?b=second_balancer&nonce=0e761cdb-a55e-c0c4-b5f7-16f46e063ca6">balancer://second_balancer</a> [pdcfd1ba5_second_balancer]</h3>
<table><tr><th>MaxMembers</th><th>StickySession</th><th>DisableFailover</th><th>Timeout</th><th>FailoverAttempts</th><th>Method</th><th>Path</th><th>Active</th></tr>
<tr><td>1 [1 Used]</td>
<td> (None) </td><td>Off</td>
<td>0</td><td>0</td>
<td>byrequests</td>
<td>/cert</td>
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/Fetch.pm view on Meta::CPAN
if (eval { require LWP::Simple; 1 }) {
LWP::Simple::mirror($args{url}, $file);
}
elsif (eval { require Net::FTP; 1 }) { eval {
# use Net::FTP to get past firewall
my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
$ftp->login("anonymous", 'anonymous@example.com');
$ftp->cwd($path);
$ftp->binary;
$ftp->get($file) or (warn("$!\n"), return);
$ftp->quit;
view all matches for this distribution
view release on metacpan or search on metacpan
t/01include01.t view on Meta::CPAN
ServerType standalone
ServerRoot "$server_root"
Include conf.d/*.conf
PidFile logs/httpd.pid
!>conf.d/a.conf
Timeout 300
!>conf.d/b.conf
MaxKeepAliveRequests 100
!>conf.d/c
Other Statement
!>conf.d/z.conf
User apache
Group apache
!=
ServerType standalone
ServerRoot "$server_root"
Timeout 300
MaxKeepAliveRequests 100
User apache
Group apache
PidFile logs/httpd.pid
!$
view all matches for this distribution
view release on metacpan or search on metacpan
t/httpd02.conf view on Meta::CPAN
#
#ResourceConfig conf/srm.conf
#AccessConfig conf/access.conf
#
# Timeout: The number of seconds before receives and sends time out.
#
Timeout 300
#
# KeepAlive: Whether or not to allow persistent connections (more than
# one request per connection). Set to "Off" to deactivate.
#
t/httpd02.conf view on Meta::CPAN
# We recommend you leave this number high, for maximum performance.
#
MaxKeepAliveRequests 100
#
# KeepAliveTimeout: Number of seconds to wait for the next request from the
# same client on the same connection.
#
KeepAliveTimeout 15
#
# Server-pool size regulation. Rather than making you guess how many
# server processes you need, Apache dynamically adapts to the load it
# sees --- that is, it tries to maintain enough server processes to
t/httpd02.conf view on Meta::CPAN
# to use and second the expiring timeout (in seconds).
#SSLSessionCache none
#SSLSessionCache shmht:logs/ssl_scache(512000)
#SSLSessionCache shmcb:logs/ssl_scache(512000)
SSLSessionCache shm:logs/ssl_scache(512000)
SSLSessionCacheTimeout 300
# Semaphore:
# Configure the path to the mutual exclusion semaphore the
# SSL engine uses internally for inter-process synchronization.
SSLMutex file:logs/ssl_mutex
view all matches for this distribution
view release on metacpan or search on metacpan
PerlSetVar DnsZoneTicketPasswordStyle cleartext
PerlSetVar DnsZoneTicketSecretTable 'ticketsecrets:sec_data:sec_version'
PerlSetVar DnsZoneTicketExpires 60
PerlSetVar DnsZoneTicketLogoutURI /
PerlSetVar DnsZoneTicketLoginHandler /login
PerlSetVar DnsZoneTicketIdleTimeout 10
PerlSetVar DnsZonePath /
PerlSetVar DnsZoneLoginScript /loginform
<Location /admin>
SetHandler perl-script
PerlHandler Apache::DnsZone
view all matches for this distribution
view release on metacpan or search on metacpan
Sets the root of the gatewayed area on the local server. Generally
matches the C<Location> setting in the B<Apache> config files.
Defaults to "/".
=item GatewayTimeout timeout
Passes timeout (in seconds) to C<LWP::UserAgent>.
=item LocationMatch regexp
$clock_broken{$server} = [ @arg ];
}
elsif(/^GatewayRoot\s*(.*)/) {
$gw_root = $1;
}
elsif(/^GatewayTimeout\s*(.*)/) {
$timeout = $1;
}
else {
$r->log_error('Unrecognized command: ' . $_);
$r->status(HTTP::Status::RC_INTERNAL_SERVER_ERROR);
view all matches for this distribution