view release on metacpan or search on metacpan
lib/Amazon/SES.pm view on Meta::CPAN
$self->call( 'SendEmail', \%call_args );
}
method verify_email(Str $email) {
return $self->call( 'VerifyEmailIdentity', { EmailAddress => $email } );
}
method delete_domain(Str $identity) {
return $self->call( 'DeleteIdentity', { Identity => $identity } );
lib/Amazon/SES.pm view on Meta::CPAN
"xmlns": "http://ses.amazonaws.com/doc/2010-12-01/",
"RequestId":"0d04b41a-20dd-11e3-b01b-51d07c103915"
}
=head2 verify_email($email)
Verifies a given C<$email> with AWS SES. This results a verification e-mail be sent from AWS to the e-mail with a verification link, which must be clicked before this e-mail address appears in C<From> header. Returns a L<Response|Amazon::SES::Respons...
Sample successful response:
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Ambrosia/Validator.pm view on Meta::CPAN
sub prepare_validate :Abstract
{
}
sub verify
{
my $self = shift;
$self->prepare_validate;
if ( $self->_violations->count > 0 )
view all matches for this distribution
view release on metacpan or search on metacpan
Amethyst/Brain/Infobot/Module/Excuse.pm view on Meta::CPAN
U.S. Postal Service
Your Flux Capacitor has gone bad.
The Dilithium Cyrstals need to be rotated.
The static electricity routing is acting up...
Traceroute says that there is a routing problem in the backbone. It's not our problem.
The co-locator cannot verify the frame-relay gateway to the ISDN server.
High altitude condensation from U.S.A.F prototype aircraft has contaminated the primary subnet mask. Turn off your computer for 9 days to avoid damaging it.
Lawn mower blade in your fan need sharpening
Electrons on a bender
Telecommunications is upgrading.
Telecommunications is downgrading.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
is => 'ro',
isa => 'Str',
default => 'https://api.line.me/oauth2/v2.1/token',
);
has verify_url => (
is => 'ro',
isa => 'Str',
default => 'https://api.line.me/oauth2/v2.1/verify',
);
has profile_url => (
is => 'ro',
isa => 'Str',
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
$token_data = decode_json($res->content);
%api_response = (%api_response, %$token_data);
}
# verify access token
my $verify_data;
{
my $uri = URI->new($self->verify_url);
$uri->query_form(access_token => $token_data->{access_token});
my $res = $self->ua->get($uri->as_string);
unless ($res->is_success) {
warn $res->decoded_content;
return $callback->{on_error}->($res->status_line);
}
$verify_data = decode_json($res->content);
if ($verify_data->{client_id} ne $self->client_id) {
return $callback->{on_error}->('client_id mismatch');
}
push @args, $token_data->{access_token};
%api_response = (%api_response, %$verify_data);
}
# get user profile
if ($self->user_info && $verify_data->{scope} =~ /\bprofile\b/) {
my $uri = URI->new($self->profile_url);
my $res = $self->ua->get(
$uri->as_string,
Authorization => 'Bearer ' . $token_data->{access_token},
);
lib/Amon2/Auth/Site/LINE.pm view on Meta::CPAN
my ($c, $access_token, $api_response) = @_;
...
}
C<< $api_response >> contains an issued access token, a verified access token validity, and a gotten user profile. And they are all merged into one hash-ref.
This code contains a information like L<https://developers.line.biz/en/reference/line-login/#issue-token-response>, L<https://developers.line.biz/en/reference/line-login/#verify-access-token-response> and L<https://developers.line.biz/en/reference/li...
If you set C<< $auth->user_info >> as a false value and/or you don't set C<< profile >> as the C<< scope >> attribute, authentication engine does not pass a gotten user profile.
=back
=back
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.80.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/Android/Build.pm view on Meta::CPAN
"for keystore:\n$keyStoreFile\n".
"Specify the correct password via the keyStorePwd() method\n";
$s =~ /jar signed/s or confess "Unable to sign $apkFile\n";
if ($android->verifyApk) # Optional verify
{my $v = zzz("jarsigner -verify $apkFile");
$v =~ /jar verified/s or confess "Unable to verify $apkFile\n";
}
}
sub make
{my ($android) = @_;
lib/Android/Build.pm view on Meta::CPAN
genLValueScalarMethods(qw(platformTools)); # Folder containing L<adb|https://developer.android.com/studio/command-line/adb.html>
genLValueArrayMethods (qw(sdkLevels)); # [minSdkVersion, targetSdkVersion], default is [15, 25]
genLValueArrayMethods (qw(src)); # A reference to an array of java source files to be compiled to create this app.
genLValueScalarMethods(qw(title)); # Title of app, the default is the L<package|/package> name of the app.
genLValueScalarMethods(qw(titles)); # A hash of translated titles: {ISO::639 2 digit language code=>title in that language}* for this app.
genLValueScalarMethods(qw(verifyApk)); # Verify the signed apk if this is true.
genLValueScalarMethods(qw(version)); # The version number of the app. Default is today's date, formatted as B<YYYYMMDD>
}
sub compile($) # Compile the app.
{my ($android) = @_; # Android build
view all matches for this distribution
view release on metacpan or search on metacpan
tt/new_user.html view on Meta::CPAN
<tr>
<td>password</td>
<td><input type="password" name="passwd"></td>
</tr>
<tr>
<td>verify password</td>
<td><input type="password" name="passwd2"></td>
</tr>
<tr>
<td></td>
<td><input type="submit" value="create account"></td>
view all matches for this distribution
view release on metacpan or search on metacpan
t/30-util-vars-testset1.t view on Meta::CPAN
my $vars = Ansible::Util::Vars->new;
isa_ok( $vars, 'Ansible::Util::Vars' );
#
# verify default cache setting is enabled
#
ok($vars->cacheEnabled);
ok($vars->Cache->enabled);
#
view all matches for this distribution
view release on metacpan or search on metacpan
src/ppport.h view on Meta::CPAN
F<ppport.h> on your source code. See the next section for
details.
=head1 EXAMPLES
To verify whether F<ppport.h> is needed for your module, whether you
should make any changes to your code, and whether any special defines
should be used, F<ppport.h> can be run as a Perl script to check your
source code. Simply say:
perl ppport.h
src/ppport.h view on Meta::CPAN
vmess||5.006000|
vnewSVpvf|5.006000|5.004000|p
vnormal||5.009002|
vnumify||5.009000|
vstringify||5.009000|
vverify||5.009003|
vwarner||5.006000|
vwarn||5.006000|
wait4pid|||
warn_nocontext|||vn
warn_sv||5.013001|
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.66.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.61.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
=head2 GitHub Attestations
This distribution now uses
L<GitHub Attestations|https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/>,
which allow you to verify that the archive file you have was made from
the official repo.
You need a GitHub account and the L<gh tool|https://github.com/larsks/ghcli>.
# download the distro file from GitHub, MetaCPAN, or a CPAN mirror
$ gh auth login
...follow instructions...
$ gh attestation verify Antsy-1.23.tar.gz --owner briandfoy
=head2 Getting help
Although I'm happy to hear from module users in private email,
that's the best way for me to forget to do something.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyData/Storage/TiedHash.pm view on Meta::CPAN
PERMS => $perms,
};
return bless $self, $class;
}
sub verify_columns {
my $col_names = shift;
my $val = shift;
my %is_col = map {$_ => 1} @$col_names;
my $errstr = "ERROR: XXX is not a column in the table!\n";
$errstr .= scalar @$col_names
lib/AnyData/Storage/TiedHash.pm view on Meta::CPAN
#my @c = caller 1;
$self->{errstr} = "Can't store: file is opened in 'r' read-only mode!"
if $self->{PERMS} eq 'r';
return undef if $self->{errstr};
my @colnames = @{ $self->{ad}->col_names };
verify_columns(\@colnames,$value);
return $self->{ad}->update_multiple_rows($key,$value)
if ref $key eq 'HASH';
$self->{ad}->seek(0,2);
my @newrow;
for my $i(0..$#colnames) {
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.81.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.68.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.68.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/Curl/Multi.pm view on Meta::CPAN
versions pertaining to host resolution and accurate timeouts. In addition,
subsecond timeouts were not available prior to version 7.16.2.
B<libcurl should be compiled with c-ares support.> Otherwise, the DNS
resolution phase that occurs at the beginning of each request will block your
program, which could significantly compromise its concurrency. (You can verify
whether your libcurl has been built with c-ares support by running C<curl -V>
and looking for "AsynchDNS" in the features list.)
libcurl's internal hostname resolution cache is disabled by this module (among
other problems, it does not honor DNS TTL values). If you need fast hostname
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/FDpasser.pm view on Meta::CPAN
=head2 Bidirectional
A passer is bidirectional and can be used to both send and receive descriptors, even simultaneously.
There are tests (basic_socketpair.t and basic_filesystem.t) to verify this.
=head2 Non-blocking
A process may initiate push_recv_fh on a passer and this process will not block while it is waiting for the other end to call push_send_fh (and vice versa).
There are tests (recv_before_send.t and send_before_recv.t) to verify this.
=head2 FIFO ordering
The order descriptors are sent with push_send_fh is the same order that they are received on at the other end with push_recv_fh.
There is a test (buffer_exercise.t) to verify this and some other basic buffering properties.
=head2 Preserves blocking status
After a fork, the non-blocking status of a descriptor is preserved so if you are doing a socketpair followed by a fork it is acceptable to set the non-blocking status of both descriptors in the parent.
Also, the non-blocking status of a descriptor passed with this module is preserved after it is passed so it is not necessary to reset nonblocking status on descriptors.
There is a test (non_blocking_fhs.t) to verify this and some other assumptions for any given system.
=head2 Passing passers
Passing a descriptor and then using this descriptor as an argument to the existing_fh mode of this module to construct another passer is supported.
There is a test (send_passer_over_passer.t) to verify this assumption for any given system.
=head2 Descriptor table full
Even when the descriptor table fills up intermittently, no descriptors being passed should be lost.
There is a test (full_descriptor_table.t) to verify this.
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
sub clearsign_cb {
my $self = shift;
$self->sign_cb( @_, clearsign => 1 );
}
sub verify {
shift->verify_cb(@_)->recv;
}
sub verify_cb {
my ( $self, %args ) = @_;
my $cv = _condvar( delete $args{cb} );
return _croak( $cv, "missing signature argument" ) unless $args{signature};
my $files = [];
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
if defined $args{"auto-key-locate"};
push @$options, "--keyserver", $args{"keyserver"}
if defined $args{"keyserver"};
my @verify_options = ();
push @verify_options => 'pka-lookups' if $args{'pka-loopups'};
push @verify_options => 'pka-trust-increase' if $args{'pka-trust-increase'};
push @$options => ( '--verify-options' => join( ',' => @verify_options ) )
if @verify_options;
$self->_command("verify");
$self->_options($options);
$self->_args($files);
my $proc = $self->_run_gnupg($cv);
$proc->finish unless $self->{input};
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
output => "file.txt.asc",
passphrase => $secret,
armor => 1,
);
$gpg->verify(
signature => "file.txt.asc",
file => "file.txt"
);
$gpg->gen_key(
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
=head2 clearsign_cb(%params[, cb => $callback|$condvar])
Asynchronous variant of L</clearsign>.
=head2 verify(%params)
This method verifies a signature against the signed message. The methods croaks if the signature is invalid or an error is encountered. If the signature is valid, it returns an hash with the signature parameters. Here are the method's parameters:
=over 4
lib/AnyEvent/GnuPG.pm view on Meta::CPAN
=back
Example:
my $sig = $gpg->verify(
signature => "file.txt.asc",
file => "file.txt"
);
=head2 verify_cb(%params[, cb => $callback|$condvar])
Asynchronous variant of L</verify>.
=head2 decrypt(%params)
This method decrypts an encrypted message. It croaks, if there is an error while decrypting the message. If the message was signed, this method also verifies the signature. If decryption is sucessful, the method either returns the valid signature par...
view all matches for this distribution
view release on metacpan or search on metacpan
# http_get
our $qr_nlnl = qr{(?<![^\012])\015?\012};
our $TLS_CTX_LOW = { cache => 1, sslv2 => 1 };
our $TLS_CTX_HIGH = { cache => 1, verify => 1, verify_peername => "https" };
# maybe it should just become a normal object :/
sub _destroy_state(\%) {
my ($state) = @_;
view all matches for this distribution
view release on metacpan or search on metacpan
bin/itm_read_nocolor view on Meta::CPAN
itm_read_nocolor openocd.itmlog
or directly run openocd with it:
itm_read_nocolor openocd.itmlog openocd.itmlog openocd -c "program main.bin verify reset 0x08000000; reset run;"
In the openocd.cfg (for a 72MHz ARM)
itm ports on
tpiu config internal openocd.itmlog uart off 72000000
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/InfluxDB.pm view on Meta::CPAN
parameter with any options accepted by L<AnyEvent::TLS>.
my $db = AnyEvent::InfluxDB->new(
...
ssl_options => {
verify => 1,
verify_peername => 'https',
ca_file => '/path/to/cacert.pem',
}
);
As an debugging aid the C<on_request> code reference may also be provided. It will
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.55.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
inc/Module/Install/CPANfile.pm view on Meta::CPAN
$self->configure_requires("CPAN::Meta");
if ($self->is_admin) {
if (eval { require CPAN::Meta::Check; 1 }) {
my $prereqs = Module::CPANfile->load->prereqs;
my @err = CPAN::Meta::Check::verify_dependencies($prereqs, [qw/runtime build test develop/], 'requires');
for (@err) {
warn "Warning: $_\n";
}
} else {
warn "CPAN::Meta::Check is not installed. Skipping dependencies check for the author.\n";
view all matches for this distribution
view release on metacpan or search on metacpan
MP/Transport.pm view on Meta::CPAN
if (exists $config->{cert}) {
$self->{tls_ctx} = {
sslv2 => 0,
sslv3 => 0,
tlsv1 => 1,
verify => 1,
cert => $config->{cert},
ca_cert => $config->{cert},
verify_require_client_cert => 1,
};
}
$self->{hdl} = new AnyEvent::Handle
+($self->{fh} ? (fh => $self->{fh}) : (connect => $self->{connect})),
view all matches for this distribution
view release on metacpan or search on metacpan
- use AE::postpone instead of "instant timer" hack (Stanislaw Pusep)
0.026 2012-09-05T21:24:33
- updated t/42-loopback-retry.t to use internal POST retry mechanism
(Stanislaw Pusep)
- attempt double GET at t/30-queued-single.t (to verify queue
deduplication) (Stanislaw Pusep)
- stripped dead code from AE::N::C::Q::Stats (Stanislaw Pusep)
- fixed AE::N::C::Const cache typo (Stanislaw Pusep)
- split queue accessors POD (Stanislaw Pusep)
- correctly reenqueue POST requests (Stanislaw Pusep)
view all matches for this distribution
view release on metacpan or search on metacpan
Porttracker.pm view on Meta::CPAN
Enables or disables TLS (default: disables). When enabled, then the
connection will try to handshake a TLS connection before logging in. If
unsuccessful a fatal error will be raised.
Since most Porttracker/PortIQ boxes will not have a sensible/verifiable
certificate, no attempt at verifying it will be done (which means
man-in-the-middle-attacks will be trivial). If you want some form of
verification you need to provide your own C<tls_ctx> object with C<<
verify => 1, verify_peername => [1, 1, 1] >> or whatever verification mode
you wish to use.
=item tls_ctx => $tls_ctx
The L<AnyEvent::TLS> object to use. See C<tls>, above.
view all matches for this distribution
view release on metacpan or search on metacpan
This file contains message digests of all files listed in MANIFEST,
signed via the Module::Signature module, version 0.73.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
% cpansign -v
It will check each file's integrity, as well as the signature's
view all matches for this distribution
view release on metacpan or search on metacpan
share/fixed_amqp0-8.xml view on Meta::CPAN
full separation of exchanges, queues, and all associated entities
per virtual host. An application, connected to a specific virtual
host, MUST NOT be able to access resources of another virtual host.
</rule>
<rule implement="SHOULD">
The server SHOULD verify that the client has permission to access
the specified virtual host.
</rule>
<rule implement="MAY">
The server MAY configure arbitrary limits per virtual host, such
as the number of each type of entity that may be used, per
view all matches for this distribution
view release on metacpan or search on metacpan
lib/AnyEvent/DNS.pm view on Meta::CPAN
8482, are officially deprecated.
=item AnyEvent::DNS::ptr $domain, $cb->(@hostnames)
Tries to make a PTR lookup on the given domain. See C<reverse_lookup>
and C<reverse_verify> if you want to resolve an IP address to a hostname
instead.
=item AnyEvent::DNS::reverse_lookup $ipv4_or_6, $cb->(@hostnames)
Tries to reverse-resolve the given IPv4 or IPv6 address (in textual form)
into its hostname(s). Handles V4MAPPED and V4COMPAT IPv6 addresses
transparently.
=item AnyEvent::DNS::reverse_verify $ipv4_or_6, $cb->(@hostnames)
The same as C<reverse_lookup>, but does forward-lookups to verify that
the resolved hostnames indeed point to the address, which makes spoofing
harder.
If you want to resolve an address into a hostname, this is the preferred
method: The DNS records could still change, but at least this function
verified that the hostname, at one point in the past, pointed at the IP
address you originally resolved.
Example:
AnyEvent::DNS::reverse_verify "2001:500:2f::f", sub { print shift };
# => f.root-servers.net
=cut
sub MAX_PKT() { 4096 } # max packet size we advertise and accept
lib/AnyEvent/DNS.pm view on Meta::CPAN
resolver->resolve ($ip => "ptr", sub {
$cb->(map $_->[4], @_);
});
}
sub reverse_verify($$) {
my ($ip, $cb) = @_;
my $ipn = AnyEvent::Socket::parse_address ($ip)
or return $cb->();
view all matches for this distribution