view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amazon/CloudFront/Thin.pm view on Meta::CPAN
aws_secret_access_key => 'my_key_secret',
distribution_id => 'my-cloudfront-distribution-id',
# optional
ua => Furl->new(
ssl_opts => { SSL_verify_mode => SSL_VERIFY_PEER()
},
);
Available arguments are:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amazon/S3.pm view on Meta::CPAN
}
########################################################################
sub buckets {
########################################################################
my ( $self, $verify_region ) = @_;
# The "default" region for Amazon is us-east-1
# This is the region to set it to for listing buckets
# You may need to reset the signer's endpoint to 'us-east-1'
lib/Amazon/S3.pm view on Meta::CPAN
Amazon::S3::Bucket->new(
{ bucket => $node->{Name},
creation_date => $node->{CreationDate},
account => $self,
buffer_size => $self->buffer_size,
verify_region => $verify_region // $FALSE,
},
);
}
}
lib/Amazon/S3.pm view on Meta::CPAN
########################################################################
sub bucket {
########################################################################
my ( $self, @args ) = @_;
my ( $bucketname, $region, $verify_region );
if ( ref $args[0] && reftype( $args[0] ) eq 'HASH' ) {
( $bucketname, $region, $verify_region )
= @{ $args[0] }{qw(bucket region verify_region)};
}
else {
( $bucketname, $region ) = @args;
}
# only set to default region if a region wasn't passed or region
# verification not requested
if ( !$region && !$verify_region ) {
$region = $self->region;
}
return Amazon::S3::Bucket->new(
{ bucket => $bucketname,
account => $self,
region => $region,
verify_region => $verify_region,
},
);
}
########################################################################
lib/Amazon/S3.pm view on Meta::CPAN
# trigger that code
$self->turn_off_special_retry();
# If the bucket name has a period in it, the certificate validation
# will fail since it will expect a certificate for a subdomain.
# Setting it to verify against the expected host guards against
# that while still being secure since we will have verified
# the response as coming from the expected server.
$self->ua->ssl_opts( SSL_verifycn_name => $self->host );
my $response = $self->_do_http($request);
# Turn this off, since all other requests have the bucket after
# the host in the URL, and the host may change depending on the region
$self->ua->ssl_opts( SSL_verifycn_name => undef );
$self->turn_on_special_retry();
# If No error, then nothing to do
return $TRUE
lib/Amazon/S3.pm view on Meta::CPAN
########################################################################
my ( $self, @args ) = @_;
my $parameters = get_parameters(@args);
my ( $bucketname, $region, $verify_region )
= @{$parameters}{qw(bucket region verify_region)};
# only set to default region if a region wasn't passed or region
# verification not requested
if ( !$region && !$verify_region ) {
$region = $self->region;
}
return Amazon::S3::BucketV2->new(
{ bucket => $bucketname,
account => $self,
region => $region,
verify_region => $verify_region,
},
);
}
########################################################################
lib/Amazon/S3.pm view on Meta::CPAN
=item aws_secret_access_key
Since your Access Key ID is not encrypted in requests to AWS, it
could be discovered and used by anyone. Services that are not free
require you to provide additional information, a request signature,
to verify that a request containing your unique Access Key ID could
only have come from you.
B<DO NOT INCLUDE THIS IN SCRIPTS OR APPLICATIONS YOU
DISTRIBUTE. YOU'LL BE SORRY.>
lib/Amazon/S3.pm view on Meta::CPAN
=head2 region
Sets the region for the API calls. This will also be the
default when instantiating the bucket object unless you pass the
region parameter in the C<bucket> method or use the C<verify_region>
flag that will I<always> verify the region of the bucket using the
C<get_location_constraint> method.
default: us-east-1
=head2 buckets
buckets([verify-region])
=over
=item verify-region (optional)
C<verify-region> is a boolean value that indicates if the
bucket's region should be verified when the bucket object is
instantiated.
If set to true, this method will call the C<bucket> method with
C<verify_region> set to true causing the constructor to call the
C<get_location_constraint> for each bucket to set the bucket's
region. This will cause a significant decrease in the peformance of
the C<buckets()> method. Setting the region for each bucket is
necessary since API operations on buckets require the region of the
bucket when signing API requests. If all of your buckets are in the
lib/Amazon/S3.pm view on Meta::CPAN
=head2 bucket
bucket(bucket, [region])
bucket({ bucket => bucket-name, verify_region => boolean, region => region });
Takes a scalar argument or refernce to a hash of arguments.
You can pass the region or set C<verify_region> indicating that
you want the bucket constructor to detemine the bucket region.
If you do not pass the region or set the C<verify_region> value, the
region will be set to the default region set in your C<Amazon::S3>
object.
See L<Amazon::S3::Bucket> for a complete description of the C<bucket>
method.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amazon/SES.pm view on Meta::CPAN
$self->call( 'SendEmail', \%call_args );
}
method verify_email(Str $email) {
return $self->call( 'VerifyEmailIdentity', { EmailAddress => $email } );
}
method delete_domain(Str $identity) {
return $self->call( 'DeleteIdentity', { Identity => $identity } );
lib/Amazon/SES.pm view on Meta::CPAN
"xmlns": "http://ses.amazonaws.com/doc/2010-12-01/",
"RequestId":"0d04b41a-20dd-11e3-b01b-51d07c103915"
}
=head2 verify_email($email)
Verifies a given C<$email> with AWS SES. This results a verification e-mail be sent from AWS to the e-mail with a verification link, which must be clicked before this e-mail address appears in C<From> header. Returns a L<Response|Amazon::SES::Respons...
Sample successful response:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Ambrosia/Validator.pm view on Meta::CPAN
sub prepare_validate :Abstract
{
}
sub verify
{
my $self = shift;
$self->prepare_validate;
if ( $self->_violations->count > 0 )
view all matches for this distribution
view release on metacpan or search on metacpan
Amethyst/Brain/Infobot/Module/Excuse.pm view on Meta::CPAN
U.S. Postal Service
Your Flux Capacitor has gone bad.
The Dilithium Cyrstals need to be rotated.
The static electricity routing is acting up...
Traceroute says that there is a routing problem in the backbone. It's not our problem.
The co-locator cannot verify the frame-relay gateway to the ISDN server.
High altitude condensation from U.S.A.F prototype aircraft has contaminated the primary subnet mask. Turn off your computer for 9 days to avoid damaging it.
Lawn mower blade in your fan need sharpening
Electrons on a bender
Telecommunications is upgrading.
Telecommunications is downgrading.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
is => 'ro',
isa => 'Str',
default => 'https://api.line.me/oauth2/v2.1/token',
);
has verify_url => (
is => 'ro',
isa => 'Str',
default => 'https://api.line.me/oauth2/v2.1/verify',
);
has profile_url => (
is => 'ro',
isa => 'Str',
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
$token_data = decode_json($res->content);
%api_response = (%api_response, %$token_data);
}
# verify access token
my $verify_data;
{
my $uri = URI->new($self->verify_url);
$uri->query_form(access_token => $token_data->{access_token});
my $res = $self->ua->get($uri->as_string);
unless ($res->is_success) {
warn $res->decoded_content;
return $callback->{on_error}->($res->status_line);
}
$verify_data = decode_json($res->content);
if ($verify_data->{client_id} ne $self->client_id) {
return $callback->{on_error}->('client_id mismatch');
}
push @args, $token_data->{access_token};
%api_response = (%api_response, %$verify_data);
}
# get user profile
if ($self->user_info && $verify_data->{scope} =~ /\bprofile\b/) {
my $uri = URI->new($self->profile_url);
my $res = $self->ua->get(
$uri->as_string,
Authorization => 'Bearer ' . $token_data->{access_token},
);
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
my ($c, $access_token, $api_response) = @_;
...
}
C<< $api_response >> contains an issued access token, a verified access token validity, and a gotten user profile. And they are all merged into one hash-ref.
This code contains a information like L<https://developers.line.biz/en/reference/line-login/#issue-token-response>, L<https://developers.line.biz/en/reference/line-login/#verify-access-token-response> and L<https://developers.line.biz/en/reference/li...
If you set C<< $auth->user_info >> as a false value and/or you don't set C<< profile >> as the C<< scope >> attribute, authentication engine does not pass a gotten user profile.
=back
=back
view all matches for this distribution
view release on metacpan or search on metacpan
t/2024-doubly-fork.t view on Meta::CPAN
is($list->length, 9, 'list has 9 items');
my $pid = fork();
if ($pid == 0) {
# Child - verify copy is intact
my $len = $list->length;
# Do more operations in child
$list->add(999);
$list->remove_from_start;
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.80.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Android/Build.pm view on Meta::CPAN
"for keystore:\n$keyStoreFile\n".
"Specify the correct password via the keyStorePwd() method\n";
$s =~ /jar signed/s or confess "Unable to sign $apkFile\n";
if ($android->verifyApk) # Optional verify
{my $v = zzz("jarsigner -verify $apkFile");
$v =~ /jar verified/s or confess "Unable to verify $apkFile\n";
}
}
sub make
{my ($android) = @_;
lib/Android/Build.pm view on Meta::CPAN
genLValueScalarMethods(qw(platformTools)); # Folder containing L<adb|https://developer.android.com/studio/command-line/adb.html>
genLValueArrayMethods (qw(sdkLevels)); # [minSdkVersion, targetSdkVersion], default is [15, 25]
genLValueArrayMethods (qw(src)); # A reference to an array of java source files to be compiled to create this app.
genLValueScalarMethods(qw(title)); # Title of app, the default is the L<package|/package> name of the app.
genLValueScalarMethods(qw(titles)); # A hash of translated titles: {ISO::639 2 digit language code=>title in that language}* for this app.
genLValueScalarMethods(qw(verifyApk)); # Verify the signed apk if this is true.
genLValueScalarMethods(qw(version)); # The version number of the app. Default is today's date, formatted as B<YYYYMMDD>
}
sub compile($) # Compile the app.
{my ($android) = @_; # Android build
view all matches for this distribution
view release on metacpan or search on metacpan
tt/new_user.html view on Meta::CPAN
<tr>
<td>password</td>
<td><input type="password" name="passwd"></td>
</tr>
<tr>
<td>verify password</td>
<td><input type="password" name="passwd2"></td>
</tr>
<tr>
<td></td>
<td><input type="submit" value="create account"></td>
view all matches for this distribution
view release on metacpan or search on metacpan
t/30-util-vars-testset1.t view on Meta::CPAN
my $vars = Ansible::Util::Vars->new;
isa_ok( $vars, 'Ansible::Util::Vars' );
#
# verify default cache setting is enabled
#
ok($vars->cacheEnabled);
ok($vars->Cache->enabled);
#
view all matches for this distribution
view release on metacpan or search on metacpan
src/ppport.h view on Meta::CPAN
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
src/ppport.h view on Meta::CPAN
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warn_sv||5.013001|
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.66.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.61.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
=head2 GitHub Attestations
This distribution now uses
L<GitHub Attestations|https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/>,
which allow you to verify that the archive file you have was made from
the official repo.
You need a GitHub account and the L<gh tool|https://github.com/larsks/ghcli>.
# download the distro file from GitHub, MetaCPAN, or a CPAN mirror
$ gh auth login
...follow instructions...
$ gh attestation verify Antsy-1.23.tar.gz --owner briandfoy
=head2 Getting help
Although I'm happy to hear from module users in private email,
that's the best way for me to forget to do something.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyData/Storage/TiedHash.pm view on Meta::CPAN
PERMS => $perms,
};
return bless $self, $class;
}
sub verify_columns {
my $col_names = shift;
my $val = shift;
my %is_col = map {$_ => 1} @$col_names;
my $errstr = "ERROR: XXX is not a column in the table!\n";
$errstr .= scalar @$col_names
lib/AnyData/Storage/TiedHash.pm view on Meta::CPAN
#my @c = caller 1;
$self->{errstr} = "Can't store: file is opened in 'r' read-only mode!"
if $self->{PERMS} eq 'r';
return undef if $self->{errstr};
my @colnames = @{ $self->{ad}->col_names };
verify_columns(\@colnames,$value);
return $self->{ad}->update_multiple_rows($key,$value)
if ref $key eq 'HASH';
$self->{ad}->seek(0,2);
my @newrow;
for my $i(0..$#colnames) {
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.81.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.68.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.68.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/Curl/Multi.pm view on Meta::CPAN
versions pertaining to host resolution and accurate timeouts. In addition,
subsecond timeouts were not available prior to version 7.16.2.
B<libcurl should be compiled with c-ares support.> Otherwise, the DNS
resolution phase that occurs at the beginning of each request will block your
program, which could significantly compromise its concurrency. (You can verify
whether your libcurl has been built with c-ares support by running C<curl -V>
and looking for "AsynchDNS" in the features list.)
libcurl's internal hostname resolution cache is disabled by this module (among
other problems, it does not honor DNS TTL values). If you need fast hostname
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/FDpasser.pm view on Meta::CPAN
=head2 Bidirectional
A passer is bidirectional and can be used to both send and receive descriptors, even simultaneously.
There are tests (basic_socketpair.t and basic_filesystem.t) to verify this.
=head2 Non-blocking
A process may initiate push_recv_fh on a passer and this process will not block while it is waiting for the other end to call push_send_fh (and vice versa).
There are tests (recv_before_send.t and send_before_recv.t) to verify this.
=head2 FIFO ordering
The order descriptors are sent with push_send_fh is the same order that they are received on at the other end with push_recv_fh.
There is a test (buffer_exercise.t) to verify this and some other basic buffering properties.
=head2 Preserves blocking status
After a fork, the non-blocking status of a descriptor is preserved so if you are doing a socketpair followed by a fork it is acceptable to set the non-blocking status of both descriptors in the parent.
Also, the non-blocking status of a descriptor passed with this module is preserved after it is passed so it is not necessary to reset nonblocking status on descriptors.
There is a test (non_blocking_fhs.t) to verify this and some other assumptions for any given system.
=head2 Passing passers
Passing a descriptor and then using this descriptor as an argument to the existing_fh mode of this module to construct another passer is supported.
There is a test (send_passer_over_passer.t) to verify this assumption for any given system.
=head2 Descriptor table full
Even when the descriptor table fills up intermittently, no descriptors being passed should be lost.
There is a test (full_descriptor_table.t) to verify this.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
sub clearsign_cb {
my $self = shift;
$self->sign_cb( @_, clearsign => 1 );
}
sub verify {
shift->verify_cb(@_)->recv;
}
sub verify_cb {
my ( $self, %args ) = @_;
my $cv = _condvar( delete $args{cb} );
return _croak( $cv, "missing signature argument" ) unless $args{signature};
my $files = [];
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
if defined $args{"auto-key-locate"};
push @$options, "--keyserver", $args{"keyserver"}
if defined $args{"keyserver"};
my @verify_options = ();
push @verify_options => 'pka-lookups' if $args{'pka-loopups'};
push @verify_options => 'pka-trust-increase' if $args{'pka-trust-increase'};
push @$options => ( '--verify-options' => join( ',' => @verify_options ) )
if @verify_options;
$self->_command("verify");
$self->_options($options);
$self->_args($files);
my $proc = $self->_run_gnupg($cv);
$proc->finish unless $self->{input};
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
output => "file.txt.asc",
passphrase => $secret,
armor => 1,
);
$gpg->verify(
signature => "file.txt.asc",
file => "file.txt"
);
$gpg->gen_key(
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
=head2 clearsign_cb(%params[, cb => $callback|$condvar])
Asynchronous variant of L</clearsign>.
=head2 verify(%params)
This method verifies a signature against the signed message. The methods croaks if the signature is invalid or an error is encountered. If the signature is valid, it returns an hash with the signature parameters. Here are the method's parameters:
=over 4
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
=back
Example:
my $sig = $gpg->verify(
signature => "file.txt.asc",
file => "file.txt"
);
=head2 verify_cb(%params[, cb => $callback|$condvar])
Asynchronous variant of L</verify>.
=head2 decrypt(%params)
This method decrypts an encrypted message. It croaks, if there is an error while decrypting the message. If the message was signed, this method also verifies the signature. If decryption is sucessful, the method either returns the valid signature par...
view all matches for this distribution
view release on metacpan or search on metacpan
# http_get
our $qr_nlnl = qr{(?<![^\012])\015?\012};
our $TLS_CTX_LOW = { cache => 1, sslv2 => 1 };
our $TLS_CTX_HIGH = { cache => 1, verify => 1, verify_peername => "https" };
# maybe it should just become a normal object :/
sub _destroy_state(\%) {
my ($state) = @_;
view all matches for this distribution
view release on metacpan or search on metacpan
bin/itm_read_nocolor view on Meta::CPAN
itm_read_nocolor openocd.itmlog
or directly run openocd with it:
itm_read_nocolor openocd.itmlog openocd.itmlog openocd -c "program main.bin verify reset 0x08000000; reset run;"
In the openocd.cfg (for a 72MHz ARM)
itm ports on
tpiu config internal openocd.itmlog uart off 72000000
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/InfluxDB.pm view on Meta::CPAN
parameter with any options accepted by L<AnyEvent::TLS>.
my $db = AnyEvent::InfluxDB->new(
...
ssl_options => {
verify => 1,
verify_peername => 'https',
ca_file => '/path/to/cacert.pem',
}
);
As an debugging aid the C<on_request> code reference may also be provided. It will
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/CPANfile.pm view on Meta::CPAN
$self->configure_requires("CPAN::Meta");
if ($self->is_admin) {
if (eval { require CPAN::Meta::Check; 1 }) {
my $prereqs = Module::CPANfile->load->prereqs;
my @err = CPAN::Meta::Check::verify_dependencies($prereqs, [qw/runtime build test develop/], 'requires');
for (@err) {
warn "Warning: $_\n";
}
} else {
warn "CPAN::Meta::Check is not installed. Skipping dependencies check for the author.\n";
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/DNS.pm view on Meta::CPAN
8482, are officially deprecated.
=item AnyEvent::DNS::ptr $domain, $cb->(@hostnames)
Tries to make a PTR lookup on the given domain. See C<reverse_lookup>
and C<reverse_verify> if you want to resolve an IP address to a hostname
instead.
=item AnyEvent::DNS::reverse_lookup $ipv4_or_6, $cb->(@hostnames)
Tries to reverse-resolve the given IPv4 or IPv6 address (in textual form)
into its hostname(s). Handles V4MAPPED and V4COMPAT IPv6 addresses
transparently.
=item AnyEvent::DNS::reverse_verify $ipv4_or_6, $cb->(@hostnames)
The same as C<reverse_lookup>, but does forward-lookups to verify that
the resolved hostnames indeed point to the address, which makes spoofing
harder.
If you want to resolve an address into a hostname, this is the preferred
method: The DNS records could still change, but at least this function
verified that the hostname, at one point in the past, pointed at the IP
address you originally resolved.
Example:
AnyEvent::DNS::reverse_verify "2001:500:2f::f", sub { print shift };
# => f.root-servers.net
=cut
sub MAX_PKT() { 4096 } # max packet size we advertise and accept
lib/AnyEvent/DNS.pm view on Meta::CPAN
resolver->resolve ($ip => "ptr", sub {
$cb->(map $_->[4], @_);
});
}
sub reverse_verify($$) {
my ($ip, $cb) = @_;
my $ipn = AnyEvent::Socket::parse_address ($ip)
or return $cb->();
view all matches for this distribution