Config::Identity(3pm) | User Contributed Perl Documentation | Config::Identity(3pm) |
Config::Identity - Load (and optionally decrypt via GnuPG) user/pass identity information
version 0.0019
PAUSE:
use Config::Identity::PAUSE; # 1. Find either $HOME/.pause-identity or $HOME/.pause # 2. Decrypt the found file (if necessary), read, and parse it # 3. Throw an exception unless %identity has 'user' and 'password' defined my %identity = Config::Identity::PAUSE->load_check; print "user: $identity{user} password: $identity{password}\n";
GitHub API:
use Config::Identity::GitHub; # 1. Find either $HOME/.github-identity or $HOME/.github # 2. Decrypt the found file (if necessary) read, and parse it # 3. Throw an exception unless %identity has 'login' and 'token' defined my %identity = Config::Identity::PAUSE->load_check; print "login: $identity{login} token: $identity{token}\n";
Config::Identity is a tool for loading (and optionally decrypting via GnuPG) user/pass identity information
For GitHub API access, an identity is a "login"/"token" pair
For PAUSE access, an identity is a "user"/"password" pair
First attempt to load an identity from $HOME/.<stub>-identity
If that file does not exist, then attempt to load an identity from $HOME/.<stub>
The file may be optionally GnuPG encrypted
%identity will be populated like so:
<key> <value>
For example:
username alice password hunter2
If an identity file can't be found or read, the method croaks.
Works like "load_best" but also checks for required keys. The "checker" argument must be an array reference of required keys or a code reference that takes a hashref of key/value pairs from the identity file and returns a list of missing keys. For convenience, the hashref will also be placed in $_.
If any keys are found missing, the method croaks.
You can specify a custom "gpg" executable by setting the CI_GPG environment variable
export CI_GPG="$HOME/bin/gpg"
You can pass custom arguments by setting the CI_GPG_ARGUMENTS environment variable
export CI_GPG_ARGUMENTS="--no-secmem-warning"
If you've never used GnuPG before, first initialize it:
# Follow the prompts to create a new key for yourself gpg --gen-key
To encrypt your GitHub identity with GnuPG using the above key:
# Follow the prompts, using the above key as the "recipient" # Use ^D once you've finished typing out your authentication information gpg -ea > $HOME/.github
Put the following in your .*rc
if which gpg-agent 1>/dev/null then if test -f $HOME/.gpg-agent-info && \ kill -0 `cut -d: -f 2 $HOME/.gpg-agent-info` 2>/dev/null then . "${HOME}/.gpg-agent-info" export GPG_AGENT_INFO else eval `gpg-agent --daemon --write-env-file "${HOME}/.gpg-agent-info"` fi else fi
user <user> password <password>
"username" can also be used as alias for "user"
login <login> token <token>
Please report any bugs or feature requests through the issue tracker at <http://rt.cpan.org/Public/Dist/Display.html?Name=Config-Identity>. You will be notified automatically of any progress on your issue.
This is open source software. The code repository is available for public review and contribution under the terms of the license.
<https://github.com/dagolden/Config-Identity>
git clone https://github.com/dagolden/Config-Identity.git
Robert Krimen <robertkrimen@gmail.com>
David Golden <dagolden@cpan.org>
This software is copyright (c) 2010 by Robert Krimen.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
2022-12-08 | perl v5.36.0 |