Skip to content

Instantly share code, notes, and snippets.

@Whateverable
Created February 1, 2019 23:09
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Whateverable/ec450456c67f742083c0beaa86b673cb to your computer and use it in GitHub Desktop.
Save Whateverable/ec450456c67f742083c0beaa86b673cb to your computer and use it in GitHub Desktop.
greppable6
File Code
CHSANCH/Lingua-Stem-Es
…/diffs.txt :18578:
nissho nissh
CTILMES/LibCurl
…/versioninfo.pl6 :34:
say $v.libssh-version;
CTILMES/LibCurl
…/EasyHandle.pm6 :663:
has Str $.libssh-version;
CTILMES/LibGit2
…/Cred.pm6 :29:
sub git_cred_ssh_key_from_agent(Pointer is rw, Str --> int32)
CTILMES/LibGit2
…/Cred.pm6 :32:
method ssh-key-from-agent(Str:D $username --> Git::Cred)
CTILMES/LibGit2
…/Cred.pm6 :35:
check(git_cred_ssh_key_from_agent($ptr, $username));
CTILMES/LibGit2
…/Cred.pm6 :39:
sub git_cred_ssh_key_memory_new(Pointer is rw, Str, Str, Str, Str --> int32)
CTILMES/LibGit2
…/Cred.pm6 :42:
method ssh-key-memory-new(Str:D $username,
CTILMES/LibGit2
…/Cred.pm6 :48:
check(git_cred_ssh_key_memory_new($ptr, $username, $publickey,
CTILMES/LibGit2
…/Cred.pm6 :60:
sub git_cred_ssh_key_new(Pointer is rw, Str, Str, Str, Str --> int32)
CTILMES/LibGit2
…/Cred.pm6 :63:
method ssh-key-new(Str:D $username,
CTILMES/LibGit2
…/Cred.pm6 :69:
check(git_cred_ssh_key_new($ptr, $username, $publickey, $privatekey,
CTILMES/LibGit2
…/34-remote-push.t :11:
my $cred = Git::Cred.ssh-key-from-agent('git');
FRITH/Image-Libexif
…/Raw.pm6 :125:
sub exif_set_sshort(Pointer $data, int16 $order, uint8 $value) is native(LIB) is export { * }
FRITH/Image-Libexif
…/Raw.pm6 :129:
sub exif_get_sshort(Pointer $data, uint8 $value --> int16) is native(LIB) is export { * }
JNTHN/Cro-Core
…/uri.t :264:
'ssh://jnthn@some.secret.host',
JNTHN/Cro-Core
…/uri.t :265:
*.scheme eq 'ssh',
JNTHN/Cro-Core
…/uri.t :275:
'ssh://root@112.34.56.78',
JNTHN/Cro-Core
…/uri.t :276:
*.scheme eq 'ssh',
JNTHN/cro
…/app.js :59273:
overlay: "crosshair",
JSTOWE/URI-Template
…/rfc6570.txt :276:
(Section 1.5), and the crosshatch ("#") operator for expansion of
JSTOWE/URI-Template
…/rfc6570.txt :304:
| # | Fragment expansion, crosshatch-prefixed (Sec 3.2.4) |
JSTOWE/URI-Template
…/rfc6570.txt :1264:
Fragment expansion, as indicated by the crosshatch ("#") operator for
JSTOWE/URI-Template
…/rfc6570.txt :1266:
except that a crosshatch character (fragment delimiter) is appended
KAJI/App-Platform
…/CHANGELOG.md :16:
- Replace run with App::Platform::Command on ssh+ssl
KAJI/App-Platform
…/README.md :27:
ssh Wrapper to ssh* commandds
KAJI/App-Platform
…/advanced_configurations.rst :86:
ssh-keys: available
KAJI/App-Platform
…/getting_started.rst :42:
ssh Wrapper to ssh* commandds
KAJI/App-Platform
…/Platform.pm6 :36:
method ssh('keygen') {
KAJI/App-Platform
…/Platform.pm6 :37:
my $ssh-dir = $.data-path ~ '/' ~ self.domain ~ '/ssh';
KAJI/App-Platform
…/Platform.pm6 :38:
mkdir $ssh-dir if not $ssh-dir.IO.e;
KAJI/App-Platform
…/Platform.pm6 :39:
App::Platform::Command.new(<ssh-keygen -t rsa -q -N>, '', '-f', "$ssh-dir/id_rsa").run;
KAJI/App-Platform
…/Info.pm6 :31:
# has ssh keys generated?
KAJI/App-Platform
…/Info.pm6 :32:
my $ssh-keys = 'unavailable';
KAJI/App-Platform
…/Info.pm6 :33:
my $ssh-path = "$data-path/$domain/ssh";
KAJI/App-Platform
…/Info.pm6 :34:
$ssh-path = $ssh-path.subst(/ '$HOME' /, $*HOME);
KAJI/App-Platform
…/Info.pm6 :35:
if $ssh-path.IO.d and "$ssh-path/id_rsa".IO.e and "$ssh-path/id_rsa.pub".IO.e {
KAJI/App-Platform
…/Info.pm6 :36:
$ssh-keys = color('green') ~ 'available' ~ color('reset');
KAJI/App-Platform
…/Info.pm6 :40:
for <status ssl-certs ssh-keys domain network data-path> {
KAJI/App-Platform
…/SSH.pm6 :12:
#| Wrapper to ssh* commandds
KAJI/App-Platform
…/SSH.pm6 :14:
'ssh',
KAJI/App-Platform
…/SSH.pm6 :26:
App::Platform.new(:$domain, :$network,:$data-path).ssh('keygen');
KAJI/App-Platform
…/SSH.pm6 :31:
'ssh',
KAJI/App-Platform
…/SSH.pm6 :39:
:filter<ssh keygen>
KAJI/App-Platform
…/SSH.pm6 :43:
multi cli('ssh',
KAJI/App-Platform
…/SSH.pm6 :50:
:filter<ssh>
KAJI/App-Platform
…/Container.pm6 :121:
if not self.data-path ~ '/' ~ self.domain ~ '/ssh/id_rsa.pub'.IO.e {
KAJI/App-Platform
…/Container.pm6 :122:
put "No SSH keys available. Maybe you should run:\n\n platform --data-path={self.data-path} --domain={self.domain} ssh keygen\n";
KAJI/App-Platform
…/99-setup.t :98:
subtest 'platform ssh keygen', {
KAJI/App-Platform
…/99-setup.t :100:
run <bin/platform>, "--data-path=$data-dir/.platform", <ssh keygen>;
KAJI/App-Platform
…/99-setup.t :101:
ok "$data-dir/.platform/localhost/ssh".IO.e, '<data>/localhost/ssh exists';
KAJI/App-Platform
…/99-setup.t :102:
ok "$data-dir/.platform/localhost/ssh/$_".IO.e, "<data>/localhost/ssh/$_ exists" for <id_rsa id_rsa.pub>;
KAJI/App-Platform
…/author-02-project.t :52:
/var/lib/auth/platorc/.ssh:
KAJI/App-Platform
…/author-02-project.t :59:
/var/lib/auth/platorc/.ssh/authorized_keys:
KAJI/App-Platform
…/author-02-project.t :60:
content: ssh/id_rsa.pub
KAJI/App-Platform
…/author-02-project.t :100:
subtest 'platform ssh keygen', {
KAJI/App-Platform
…/author-02-project.t :102:
run <bin/platform>, "--data-path=$tmpdir/.platform", <ssh keygen>;
KAJI/App-Platform
…/author-02-project.t :103:
ok "$tmpdir/.platform/localhost/ssh".IO.e, '<data>/localhost/ssh exists';
KAJI/App-Platform
…/author-02-project.t :104:
ok "$tmpdir/.platform/localhost/ssh/$_".IO.e, "<data>/localhost/ssh/$_ exists" for <id_rsa id_rsa.pub>;
KAJI/App-Platform
…/author-02-project.t :120:
$proc = run <docker exec -it project-honeybee cat /var/lib/auth/platorc/.ssh/authorized_keys>, :out;
KAJI/App-Platform
…/author-02-project.t :121:
my $id_rsa_pub = "$tmpdir/.platform/localhost/ssh/id_rsa.pub".IO.slurp;
KAJI/App-Platform
…/author-03-environment.t :41:
sub create-ssh-project(Str $animal) {
KAJI/App-Platform
…/author-03-environment.t :46:
RUN apt-get -y install openssh-server
KAJI/App-Platform
…/author-03-environment.t :50:
command: /bin/bash -c "/etc/init.d/ssh start && nginx -g 'daemon off;'"
KAJI/App-Platform
…/author-03-environment.t :72:
subtest "platform --domain=$domain-sahara ssh keygen", {
KAJI/App-Platform
…/author-03-environment.t :74:
run <bin/platform>, "--domain=$domain-sahara", "--data-path=$tmpdir/.platform", <ssh keygen>;
KAJI/App-Platform
…/author-03-environment.t :75:
ok "$tmpdir/.platform/$domain-sahara/ssh".IO.e, "<data>/$domain-sahara/ssh exists";
KAJI/App-Platform
…/author-03-environment.t :76:
ok "$tmpdir/.platform/$domain-sahara/ssh/$_".IO.e, "<data>/$domain-sahara/ssh/$_ exists" for <id_rsa id_rsa.pub>;
KAJI/App-Platform
…/author-03-environment.t :79:
subtest "platform --domain=$domain-amazon ssh keygen", {
KAJI/App-Platform
…/author-03-environment.t :81:
run <bin/platform>, "--domain=$domain-amazon", "--data-path=$tmpdir/.platform", <ssh keygen>;
KAJI/App-Platform
…/author-03-environment.t :82:
ok "$tmpdir/.platform/$domain-amazon/ssh".IO.e, "<data>/$domain-amazon/ssh exists";
KAJI/App-Platform
…/author-03-environment.t :83:
ok "$tmpdir/.platform/$domain-amazon/ssh/$_".IO.e, "<data>/$domain-amazon/ssh/$_ exists" for <id_rsa id_rsa.pub>;
KAJI/App-Platform
…/author-03-environment.t :125:
create-ssh-project('octopus');
KAJI/App-Platform
…/author-03-environment.t :126:
create-ssh-project('blowfish');
KAJI/App-Platform
…/author-03-environment.t :136:
/var/lib/octonaut/.ssh:
KAJI/App-Platform
…/author-03-environment.t :141:
/var/lib/octonaut/.ssh/id_rsa:
KAJI/App-Platform
…/author-03-environment.t :142:
content: ssh/id_rsa
KAJI/App-Platform
…/author-03-environment.t :151:
/home/kwazii/.ssh:
KAJI/App-Platform
…/author-03-environment.t :156:
/home/kwazii/.ssh/authorized_keys:
KAJI/App-Platform
…/author-03-environment.t :157:
content: ssh/id_rsa.pub
KAJI/App-Platform
…/author-03-environment.t :181:
$proc = run <docker exec -it project-octopus su octonaut --command>, "ssh -o \"StrictHostKeyChecking no\" kwazii\@{%addr<blowfish>} ls /", :out;
KAJI/App-Platform
…/author-03-environment.t :183:
is $out.lines.elems, 21, 'got proper response from ssh connection';
MARTIMM/GTK-Glade
…/Gdkkeysyms.pm6 :510:
constant GDK_KEY_ssharp is export = 0x0df;
MARTIMM/GTK-Glade
…/Gdkkeysyms.pm6 :2076:
constant GDK_KEY_Sinh_ssha is export = 0x1000dc2;
MELEZHIK/Sparky
…/README.md :119:
ssh_private_key: /path/to/ssh_private/key.pem
MELEZHIK/Sparky
…/README.md :120:
ssh_user: sparky
MELEZHIK/Sparky
…/sparky-runner.pl6 :102:
if %sparrowdo-config<ssh_user> {
MELEZHIK/Sparky
…/sparky-runner.pl6 :103:
$sparrowdo-run ~= " --ssh_user=" ~ %sparrowdo-config<ssh_user>;
MELEZHIK/Sparky
…/sparky-runner.pl6 :106:
if %sparrowdo-config<ssh_private_key> {
MELEZHIK/Sparky
…/sparky-runner.pl6 :107:
$sparrowdo-run ~= " --ssh_private_key=" ~ %sparrowdo-config<ssh_private_key>;
MELEZHIK/Sparky
…/sparky-runner.pl6 :110:
if %sparrowdo-config<ssh_port> {
MELEZHIK/Sparky
…/sparky-runner.pl6 :111:
$sparrowdo-run ~= " --ssh_port=" ~ %sparrowdo-config<ssh_port>;
MELEZHIK/Sparrowdo
…/Changes.md :55:
* git-scm may accept ssh key, thanks to @spigell
MELEZHIK/Sparrowdo
…/Changes.md :194:
* a lot of improvements for bash/ssh/scp core dsl functions
MELEZHIK/Sparrowdo
…/Changes.md :198:
* core-dsl/ssh - refactoring
MELEZHIK/Sparrowdo
…/Changes.md :202:
* core-dsl/ssh - fix documentation issues / add `create` parameter
MELEZHIK/Sparrowdo
…/Changes.md :206:
* core-dsl/ssh - explicit exit at the end of ssh command
MELEZHIK/Sparrowdo
…/Changes.md :211:
* core-dsl/ssh function added
MELEZHIK/Sparrowdo
…/README.md :167:
Sparrowdo acts over ssh invoking sparrow client with input json data generated
MELEZHIK/Sparrowdo
…/README.md :197:
An assumption is made that ssh user you run `sparrowdo` with ( see `--ssh_user`
MELEZHIK/Sparrowdo
…/README.md :200:
* ssh passwordless access on the remote host
MELEZHIK/Sparrowdo
…/README.md :262:
## --ssh\_user
MELEZHIK/Sparrowdo
…/README.md :264:
Sets user for the ssh connection to the remote host.
MELEZHIK/Sparrowdo
…/README.md :273:
You must install `sshpass` to use this feature.
MELEZHIK/Sparrowdo
…/README.md :275:
## --ssh\_private\_key
MELEZHIK/Sparrowdo
…/README.md :280:
Is equal to `-i` parameter of ssh client.
MELEZHIK/Sparrowdo
…/README.md :282:
## --ssh\_port
MELEZHIK/Sparrowdo
…/README.md :284:
Sets ssh port for the ssh connection to remote host. Default value is `22`.
MELEZHIK/Sparrowdo
…/README.md :295:
If set to true - do not initiate ssh command under `sudo`, just as is. Default
MELEZHIK/Sparrowdo
…/README.md :414:
Export ssh configuration from vagrant host and run sparrowdo against it.
MELEZHIK/Sparrowdo
…/README.md :419:
# exporting ssh configuration for "current" vagrant machine
MELEZHIK/Sparrowdo
…/README.md :421:
$ sparrowdo --vagrant --vagrant_id=6951606 # exporting ssh configuration
MELEZHIK/Sparrowdo
…/sparrowdo :28:
Str :$ssh_user,
MELEZHIK/Sparrowdo
…/sparrowdo :29:
Str :$ssh_private_key,
MELEZHIK/Sparrowdo
…/sparrowdo :30:
Int :$ssh_port = 22,
MELEZHIK/Sparrowdo
…/sparrowdo :133:
SshPort => $ssh_port,
MELEZHIK/Sparrowdo
…/sparrowdo :134:
SshUser => $ssh_user,
MELEZHIK/Sparrowdo
…/sparrowdo :135:
SshPrivateKey => $ssh_private_key,
MELEZHIK/Sparrowdo
…/sparrowdo :153:
"exporting ssh configuration from vagrant machine (id $vagrant_id)",
MELEZHIK/Sparrowdo
…/sparrowdo :158:
shell "vagrant ssh-config $vagrant_id --host vagrant > $sparrowdo-cache/vagrant/.vagrant_ssh_config";
MELEZHIK/Sparrowdo
…/sparrowdo :163:
"exporting vagrant ssh configuration from current directory",
MELEZHIK/Sparrowdo
…/sparrowdo :168:
shell "vagrant ssh-config --host vagrant > $sparrowdo-cache/vagrant/.vagrant_ssh_config";
MELEZHIK/Sparrowdo
…/sparrowdo :171:
ssh_shell "rm -rf $sparrow_root/sparrowdo-cache && mkdir -m 777 -p $sparrow_root/sparrowdo-cache";
MELEZHIK/Sparrowdo
…/sparrowdo :184:
ssh_shell "perl -MSparrow -e 1 2>/dev/null || ( echo Sparrow is not installed. Run sparrowdo --bootstrap to install; exit 1 ) && \\
MELEZHIK/Sparrowdo
…/sparrowdo :242:
ssh_shell "mkdir -p $sparrow_root && mv $sparrow_root/sparrow-cache/sparrow.list $sparrow_root";
MELEZHIK/Sparrowdo
…/sparrowdo :250:
ssh_shell "mkdir -p $sparrow_root && touch $sparrow_root/sparrow.list";
MELEZHIK/Sparrowdo
…/sparrowdo :258:
ssh_shell "echo repo: $repo_val > $sparrow_root/sparrow-cache/sparrow.yaml";
MELEZHIK/Sparrowdo
…/sparrowdo :264:
ssh_shell 'sparrow index update' unless input_params('NoIndexUpdate');
MELEZHIK/Sparrowdo
…/sparrowdo :269:
ssh_shell "sparrow plg install " ~ @p[0];
MELEZHIK/Sparrowdo
…/sparrowdo :273:
ssh_shell "sparrow plg run " ~ @p[0] ~ ' --args-file ' ~ "$sparrow_root/sparrow-cache/plugins/" ~ "@p[0].args";
MELEZHIK/Sparrowdo
…/sparrowdo :276:
ssh_shell "sparrow plg run " ~ @p[0];
MELEZHIK/Sparrowdo
…/sparrowdo :297:
ssh_shell "sparrow box run $sparrow_root/sparrow-cache/task-box.json --mode quiet --purge-cache";
MELEZHIK/Sparrowdo
…/sparrowdo :299:
ssh_shell "sparrow box run $sparrow_root/sparrow-cache/task-box.json --mode quiet";
MELEZHIK/Sparrowdo
…/sparrowdo :305:
sub ssh_shell ( $cmd ) {
MELEZHIK/Sparrowdo
…/sparrowdo :327:
my $ssh_cmd;
MELEZHIK/Sparrowdo
…/sparrowdo :331:
$ssh_cmd = ( input_params('NoSudo') ) ?? "sh -c '" !! "sudo sh -c '";
MELEZHIK/Sparrowdo
…/sparrowdo :332:
$ssh_cmd ~= ~ ( join ' ; ', @bash_commands ) ~ "'";
MELEZHIK/Sparrowdo
…/sparrowdo :336:
$ssh_cmd = "docker exec -i " ~ input_params('Docker') ~ ' ';
MELEZHIK/Sparrowdo
…/sparrowdo :339:
$ssh_cmd ~= "sh -c '" ~ ( join ' ; ', @bash_commands ) ~ "'";
MELEZHIK/Sparrowdo
…/sparrowdo :341:
$ssh_cmd ~= "sudo sh -c '" ~ ( join ' ; ', @bash_commands ) ~ "'";
MELEZHIK/Sparrowdo
…/sparrowdo :347:
$ssh_cmd = 'sshpass -p ' ~ input_params('Password');
MELEZHIK/Sparrowdo
…/sparrowdo :348:
$ssh_cmd ~= ' ssh -o ConnectionAttempts=1 -o ConnectTimeout=5';
MELEZHIK/Sparrowdo
…/sparrowdo :350:
$ssh_cmd = 'sshpass -e ssh -o ConnectionAttempts=1 -o ConnectTimeout=5';
MELEZHIK/Sparrowdo
…/sparrowdo :352:
$ssh_cmd = 'ssh -o ConnectionAttempts=1 -o ConnectTimeout=5';
MELEZHIK/Sparrowdo
…/sparrowdo :355:
$ssh_cmd ~= ' -F ' ~ "$sparrowdo-cache/vagrant/.vagrant_ssh_config" if ( input_params('Vagrant') or input_params('VagrantId') );
MELEZHIK/Sparrowdo
…/sparrowdo :357:
$ssh_cmd ~= ' -p ' ~ input_params('SshPort') unless ( input_params('Vagrant') or input_params('VagrantId') );
MELEZHIK/Sparrowdo
…/sparrowdo :359:
$ssh_cmd ~= ' -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -tt';
MELEZHIK/Sparrowdo
…/sparrowdo :361:
$ssh_cmd ~= ' -q' unless input_params('Verbose');
MELEZHIK/Sparrowdo
…/sparrowdo :363:
$ssh_cmd ~= ' -i ' ~ input_params('SshPrivateKey') if input_params('SshPrivateKey');
MELEZHIK/Sparrowdo
…/sparrowdo :365:
my $ssh_host = ( input_params('Vagrant') or input_params('VagrantId') ) ?? 'vagrant' !! input_params('Host');
MELEZHIK/Sparrowdo
…/sparrowdo :368:
$ssh_cmd ~= ' ' ~ input_params('SshUser') ~ '@' ~ $ssh_host ~ ' ';
MELEZHIK/Sparrowdo
…/sparrowdo :370:
$ssh_cmd ~= ' ' ~ $ssh_host ~ ' ';
MELEZHIK/Sparrowdo
…/sparrowdo :373:
$ssh_cmd ~= ( input_params('NoSudo') ) ?? " \"sh -c '" !! " \"sudo sh -c '";
MELEZHIK/Sparrowdo
…/sparrowdo :375:
$ssh_cmd ~= ~ ( join ' ; ', @bash_commands ) ~ "'\"";
MELEZHIK/Sparrowdo
…/sparrowdo :377:
$ssh_cmd ~= ' 2>/dev/null' unless input_params('Verbose');
MELEZHIK/Sparrowdo
…/sparrowdo :381:
term-out( $ssh_cmd, input_params('NoColor'), %( colors => 'bold green') ) if input_params('Verbose');
MELEZHIK/Sparrowdo
…/sparrowdo :383:
shell $ssh_cmd;
MELEZHIK/Sparrowdo
…/sparrowdo :398:
my $ssh_host_term;
MELEZHIK/Sparrowdo
…/sparrowdo :400:
my $ssh_host = ( input_params('Vagrant') or input_params('VagrantId') ) ?? 'vagrant' !! input_params('Host');
MELEZHIK/Sparrowdo
…/sparrowdo :405:
$ssh_host_term = input_params('SshUser') ~ '@' ~ $ssh_host;
MELEZHIK/Sparrowdo
…/sparrowdo :407:
$ssh_host_term = $ssh_host;
MELEZHIK/Sparrowdo
…/sparrowdo :436:
$scp_params ~= ' -F ' ~ "$sparrowdo-cache/vagrant/.vagrant_ssh_config" if ( input_params('Vagrant') or input_params('VagrantId') );
MELEZHIK/Sparrowdo
…/sparrowdo :446:
$scp_command = 'sshpass -p ' ~ input_params('Password') ~ ' ';
MELEZHIK/Sparrowdo
…/sparrowdo :449:
$scp_command = 'sshpass -e';
MELEZHIK/Sparrowdo
…/sparrowdo :456:
$scp_command ~= ' ' ~ $ssh_host_term ~ ':' ~ $file ~ ' ' ~ $dest ;
MELEZHIK/Sparrowdo
…/sparrowdo :458:
$scp_command ~= ' ' ~ $file ~ ' ' ~ $ssh_host_term ~ ':' ~ $dest;
MELEZHIK/Sparrowdo
…/sparrowdo :580:
ssh_shell "sh $sparrow_root/sparrowdo-cache/bootstrap.sh";
MELEZHIK/Sparrowdo
…/sparrowind :191:
my $ssh_cmd;
MELEZHIK/Sparrowdo
…/sparrowind :194:
$ssh_cmd ~= ~ ( join ' && ', @bash_commands );
MELEZHIK/Sparrowdo
…/sparrowind :197:
$ssh_cmd !!
MELEZHIK/Sparrowdo
…/sparrowind :198:
colored($ssh_cmd, 'bold green') if input_params('Verbose');
MELEZHIK/Sparrowdo
…/sparrowind :200:
shell $ssh_cmd;
MELEZHIK/Sparrowdo
…/core-dsl.md :20:
* Ssh commands
MELEZHIK/Sparrowdo
…/core-dsl.md :381:
| git-scm | checkout source from git repository | `ssh($source,[%args])` |
MELEZHIK/Sparrowdo
…/core-dsl.md :395:
# Specify ssh key for authentification
MELEZHIK/Sparrowdo
…/core-dsl.md :396:
git-scm 'ssh://git@github.com/melezhik/sparrow.git', %( to => '/tmp/foo', ssh-key => '/tmp/my.key' );
MELEZHIK/Sparrowdo
…/core-dsl.md :398:
# ssh authentification with unknown server key
MELEZHIK/Sparrowdo
…/core-dsl.md :399:
git-scm 'ssh://git@github.com/melezhik/sparrow.git', %( to => '/tmp/foo', ssh-key => '/tmp/my.key', accept-hostkey => True );
MELEZHIK/Sparrowdo
…/core-dsl.md :413:
This function executes ssh commands.
MELEZHIK/Sparrowdo
…/core-dsl.md :417:
| ssh | execute ssh commands | `ssh($command,%args)` |
MELEZHIK/Sparrowdo
…/core-dsl.md :418:
| ssh | alias for `ssh` with command set via %args | `ssh(%args)` |
MELEZHIK/Sparrowdo
…/core-dsl.md :422:
# ssh to 192.168.0.1 and execute 'uptime'
MELEZHIK/Sparrowdo
…/core-dsl.md :424:
ssh 'uptime', %( host => '192.168.0.1' )
MELEZHIK/Sparrowdo
…/core-dsl.md :427:
ssh 'uptime', %( host => '192.168.0.1' , description => "how old are you?" );
MELEZHIK/Sparrowdo
…/core-dsl.md :430:
ssh 'uptime', %(
MELEZHIK/Sparrowdo
…/core-dsl.md :435:
# and ssh_key
MELEZHIK/Sparrowdo
…/core-dsl.md :436:
ssh 'uptime', %(
MELEZHIK/Sparrowdo
…/core-dsl.md :439:
ssh-key => 'keys/id_rsa'
MELEZHIK/Sparrowdo
…/core-dsl.md :444:
ssh q:to/CMD/, %( host => '192.168.0.1', user => 'old_dog');
MELEZHIK/Sparrowdo
…/core-dsl.md :451:
# prevent from running ssh command next time if file $create exist:
MELEZHIK/Sparrowdo
…/core-dsl.md :452:
ssh "run-me", %( host => '192.168.0.1' , create => '/do/not/run/twice' )
MELEZHIK/Sparrowdo
…/core-dsl.md :473:
# set ssh private key and user id
MELEZHIK/Sparrowdo
…/core-dsl.md :478:
ssh-key => 'keys/id_rsa'
MELEZHIK/Sparrowdo
…/core-dsl.md :508:
# ensure existence by PID taken from /var/run/sshd.pid
MELEZHIK/Sparrowdo
…/core-dsl.md :509:
proc-exists 'sshd';
MELEZHIK/Sparrowdo
…/core-dsl.md :512:
proc-exists-by-footprint 'sshd', 'sshd\s+-D';
MELEZHIK/Sparrowdo
…/core-dsl.md :515:
proc-exists-by-pid 'sshd', '/var/run/sshd.pid';
MELEZHIK/Sparrowdo
…/core-dsl.md :528:
Use `ssh host` command line parameter as URL:
MELEZHIK/Sparrowdo
…/sparrowfile :1:
package-install "openssh-server";
MELEZHIK/Sparrowdo
…/sparrowfile :5:
package-install "openssh-clients";
MELEZHIK/Sparrowdo
…/sparrowfile :10:
service-start "ssh";
MELEZHIK/Sparrowdo
…/sparrowfile :12:
service-start "sshd";
MELEZHIK/Sparrowdo
…/sparrowfile :15:
my $key = "/root/.ssh/id_rsa";
MELEZHIK/Sparrowdo
…/sparrowfile :17:
file-delete "/root/.ssh/id_rsa.pub";
MELEZHIK/Sparrowdo
…/sparrowfile :18:
file-delete '/root/.ssh/id_rsa';
MELEZHIK/Sparrowdo
…/sparrowfile :19:
file-delete '/root/.ssh/authorized_keys';
MELEZHIK/Sparrowdo
…/sparrowfile :21:
bash 'cat /dev/zero | ssh-keygen -q -N ""';
MELEZHIK/Sparrowdo
…/sparrowfile :22:
bash 'cat /root/.ssh/id_rsa.pub > /root/.ssh/authorized_keys';
MELEZHIK/Sparrowdo
…/sparrowfile :25:
ssh 'rm -rf /tmp/test-ssh-scp && mkdir -p /tmp/test-ssh-scp', %(
MELEZHIK/Sparrowdo
…/sparrowfile :33:
host => "127.0.0.1:/tmp/test-ssh-scp",
MELEZHIK/Sparrowdo
…/sparrowfile :36:
bash 'cat /tmp/test-ssh-scp/hello.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :42:
host => "127.0.0.1:/tmp/test-ssh-scp",
MELEZHIK/Sparrowdo
…/sparrowfile :45:
bash 'cat /tmp/test-ssh-scp/hello2.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :49:
directory-delete '/tmp/test-ssh-scp-pull';
MELEZHIK/Sparrowdo
…/sparrowfile :50:
directory-create '/tmp/test-ssh-scp-pull';
MELEZHIK/Sparrowdo
…/sparrowfile :53:
data => '/tmp/test-ssh-scp-pull',
MELEZHIK/Sparrowdo
…/sparrowfile :54:
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt",
MELEZHIK/Sparrowdo
…/sparrowfile :58:
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :62:
bash 'rm -rf /tmp/test-ssh-scp-pull/*.txt';
MELEZHIK/Sparrowdo
…/sparrowfile :65:
data => '/tmp/test-ssh-scp-pull',
MELEZHIK/Sparrowdo
…/sparrowfile :66:
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt 127.0.0.1:/tmp/test-ssh-scp/hello2.txt",
MELEZHIK/Sparrowdo
…/sparrowfile :70:
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :74:
bash 'cat /tmp/test-ssh-scp-pull/hello2.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :78:
bash 'rm -rf /tmp/test-ssh-scp-pull/*.txt';
MELEZHIK/Sparrowdo
…/sparrowfile :81:
data => '/tmp/test-ssh-scp-pull',
MELEZHIK/Sparrowdo
…/sparrowfile :82:
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt 127.0.0.1:/tmp/test-ssh-scp/hello2.txt",
MELEZHIK/Sparrowdo
…/sparrowfile :86:
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :90:
bash 'cat /tmp/test-ssh-scp-pull/hello2.txt', %(
MELEZHIK/Sparrowdo
…/sparrowfile :1:
package-install "openssh-server";
MELEZHIK/Sparrowdo
…/sparrowfile :5:
package-install "openssh-clients";
MELEZHIK/Sparrowdo
…/sparrowfile :11:
service-start "ssh";
MELEZHIK/Sparrowdo
…/sparrowfile :13:
service-start "sshd";
MELEZHIK/Sparrowdo
…/sparrowfile :16:
my $key = "/root/.ssh/id_rsa";
MELEZHIK/Sparrowdo
…/sparrowfile :18:
file-delete "/root/.ssh/id_rsa.pub";
MELEZHIK/Sparrowdo
…/sparrowfile :19:
file-delete '/root/.ssh/id_rsa';
MELEZHIK/Sparrowdo
…/sparrowfile :20:
file-delete '/root/.ssh/authorized_keys';
MELEZHIK/Sparrowdo
…/sparrowfile :22:
bash 'cat /dev/zero | ssh-keygen -q -N ""';
MELEZHIK/Sparrowdo
…/sparrowfile :23:
bash 'cat /root/.ssh/id_rsa.pub > /root/.ssh/authorized_keys';
MELEZHIK/Sparrowdo
…/sparrowfile :27:
ssh q:to/HERE/, %( host => "127.0.0.1" , user => 'root' );
MELEZHIK/Sparrowdo
…/sparrowfile :33:
ssh 'uptime', %( host => "127.0.0.1" );
MELEZHIK/Sparrowdo
…/Git.pm6 :16:
my @git-ssh-opts = Array.new;
MELEZHIK/Sparrowdo
…/Git.pm6 :17:
@git-ssh-opts.push: 'ssh';
MELEZHIK/Sparrowdo
…/Git.pm6 :18:
@git-ssh-opts.push: "-i %args<ssh-key>" if %args<ssh-key>;
MELEZHIK/Sparrowdo
…/Git.pm6 :19:
@git-ssh-opts.push: "-o StrictHostKeyChecking=no" if %args<accept-hostkey> == True;
MELEZHIK/Sparrowdo
…/Git.pm6 :25:
%bash-args<envvars><GIT_SSH_COMMAND> = '"' ~ ( join ' ', @git-ssh-opts ) ~ '"';
MELEZHIK/Sparrowdo
…/Ssh.pm6 :10:
multi sub ssh ( %args ) is export {
MELEZHIK/Sparrowdo
…/Ssh.pm6 :11:
ssh %args<command>, %args;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :14:
multi sub ssh ( $command, %args ) is export {
MELEZHIK/Sparrowdo
…/Ssh.pm6 :18:
if %args<ssh-key>:exists {
MELEZHIK/Sparrowdo
…/Ssh.pm6 :19:
file '/opt/sparrow/.cache/ssh-key', %(
MELEZHIK/Sparrowdo
…/Ssh.pm6 :20:
content => ( slurp %args<ssh-key> ),
MELEZHIK/Sparrowdo
…/Ssh.pm6 :25:
my $ssh-host-term = %args<user>:exists ?? %args<user> ~ '@' ~ %args<host> !! %args<host>;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :28:
my $ssh-run-cmd = 'ssh -o ConnectionAttempts=1 -o ConnectTimeout=10';
MELEZHIK/Sparrowdo
…/Ssh.pm6 :30:
$ssh-run-cmd ~= ' -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -tt';
MELEZHIK/Sparrowdo
…/Ssh.pm6 :32:
$ssh-run-cmd ~= ' -q' ;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :34:
$ssh-run-cmd ~= ' -i /opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :36:
$ssh-run-cmd ~= " $ssh-host-term '$command'";
MELEZHIK/Sparrowdo
…/Ssh.pm6 :41:
$bash-cmd = "if ! test -f %args<create> ; then set -x; $ssh-run-cmd ; else echo skip due to %args<create> exists; fi"
MELEZHIK/Sparrowdo
…/Ssh.pm6 :43:
$bash-cmd = "set -x; $ssh-run-cmd"
MELEZHIK/Sparrowdo
…/Ssh.pm6 :47:
description => %args<description> || "remote command on $ssh-host-term",
MELEZHIK/Sparrowdo
…/Ssh.pm6 :51:
file-delete '/opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :61:
if %args<ssh-key>:exists {
MELEZHIK/Sparrowdo
…/Ssh.pm6 :62:
file '/opt/sparrow/.cache/ssh-key', %(
MELEZHIK/Sparrowdo
…/Ssh.pm6 :63:
content => ( slurp %args<ssh-key> ),
MELEZHIK/Sparrowdo
…/Ssh.pm6 :75:
$scp-run-cmd ~= ' -i /opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :77:
my $ssh-host-term;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :81:
for %args<host>.words -> $w { $ssh-host-term ~= ' ' ~ %args<user> ~ '@' ~ $w }
MELEZHIK/Sparrowdo
…/Ssh.pm6 :83:
$ssh-host-term = %args<host>
MELEZHIK/Sparrowdo
…/Ssh.pm6 :86:
$scp-run-cmd ~= " $ssh-host-term %args<data>";
MELEZHIK/Sparrowdo
…/Ssh.pm6 :90:
$ssh-host-term = %args<user>:exists ?? %args<user> ~ '@' ~ %args<host> !! %args<host>;
MELEZHIK/Sparrowdo
…/Ssh.pm6 :92:
$scp-run-cmd ~= " %args<data> $ssh-host-term";
MELEZHIK/Sparrowdo
…/Ssh.pm6 :110:
file-delete '/opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists;
MELEZHIK/Sparrowdo
…/sparrowfile.minoca :10:
service-enable "sshd";
MELEZHIK/Sparrowdo
…/suite.yaml :14:
- ssh
MELEZHIK/Sparrowdo
…/suite.yaml :32:
- ssh
MELEZHIK/Sparrowdo
…/suite.yaml :57:
minoca: "--no_sudo --host=127.0.0.1 --ssh_user=root --ssh_port=2222 --format=production"
MELEZHIK/Sparrowform
…/README.md :13:
Currently only ***ssh accessed instances with public IPs are supported*** ( aws ec2 / google compute instances with public IPs ).
MELEZHIK/Sparrowform
…/README.md :47:
## Handling ssh connections
MELEZHIK/Sparrowform
…/README.md :49:
You may pass ssh connection parameters by specifying sparrowdo cli parameters:
MELEZHIK/Sparrowform
…/README.md :51:
$ sparrowform --ssh_user=ec2-user --ssh_private_key=/path/to/ssh.key
MELEZHIK/Sparrowform
…/so-45177941.md :6:
$ sparrowform --ssh_user=my-user --ssh_private_key=/path/to/key # do provision
MELEZHIK/Sparrowform
…/so-45177941.md :8:
Obviously you are free not to run `sparrowform` in subsequent runs. It does it's job (install ansible related dependencies, that is it). Then you drop your initial `ssh_private_key` and goes with new private key ( ansible related I guess ?)
MLDEVINE/Async-Command
…/Multi.md :76:
%command<ctools> = <ssh ctools uname -n>;
MLDEVINE/Async-Command
…/Multi.md :77:
%command<jtools> = <ssh jtools notarealcommand>;
MLDEVINE/Async-Command
…/Multi.md :84:
command => ["ssh", "ctools", "uname", "-n"],
MLDEVINE/Async-Command
…/Multi.md :92:
command => ["ssh", "jtools", "notarealcommand"],
SKAJI/App-Mi6
…/Mi6.pm6 :300:
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / {
UGEXE/zef
…/git.pm6 :14:
return True if $uri.scheme.lc.starts-with('http' | 'ssh') && $uri.path.ends-with('.git' || '.git/');
UGEXE/zef
…/URI.pm6 :164:
elsif $id ~~ /^(.+?) '@' (.+?) ':' (.*)/ and URI.parse("ssh\:\/\/$0\@$1\/$2", :rule<URI>) -> $m {
WARRINGD/Font-AFM
…/glyphlist.txt :2337:
issharbengali;09FA
WARRINGD/Font-AFM
…/glyphlist.txt :3619:
solidusshortoverlaycmb;0337
WARRINGD/Font-AFM
…/glyphlist.txt :3633:
squarediagonalcrosshatchfill;25A9
WARRINGD/Font-AFM
…/glyphlist.txt :3644:
squareorthogonalcrosshatchfill;25A6
WARRINGD/HTML-Canvas
…/README.md :256:
my \image = HTML::Canvas::Image.open("t/images/crosshair-100x100.jpg");
WARRINGD/HTML-Canvas
…/cairo-transforms.t :48:
my \image = HTML::Canvas::Image.open("t/images/crosshair-100x100.png");
WARRINGD/HTML-Canvas
…/images.t :11:
my \jpg-image = HTML::Canvas::Image.open("t/images/crosshair-100x100.jpg");
WARRINGD/HTML-Canvas
…/images.t :12:
my \png-image = HTML::Canvas::Image.open("t/images/crosshair-100x100.png");
WARRINGD/PDF-ISO_32000
…/Link_annotation_additional.pm6 :43:
If this entry is not present or the conforming reader does not recognize it, the region specified by the Rect entry is used. QuadPointsshall be ignored if any coordinate in the array lies outside the region specified by Rect.
WARRINGD/PDF-ISO_32000
…/Stream_common.pm6 :28:
- (Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter and that f…
WARRINGD/PDF-ISO_32000
…/Link_annotation_additional_entries.html :211:
If this entry is not present or the conforming reader does not recognize it, the region specified by the Rect entry should be used. QuadPointsshall be ignored if any coordinate in the array lies outside the region specified by Rect.
WARRINGD/PDF-ISO_32000
…/Stream_common_entries.html :87:
(Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter …
WARRINGD/PDF-ISO_32000
…/Link_annotation_additional_entries.json :38:
"(Optional; PDF 1.6) An array of 8 × n numbers specifying the coordinates of n quadrilaterals in default user space that comprise the region …
WARRINGD/PDF-ISO_32000
…/Stream_common_entries.json :23:
"(Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter and…
CurtTilmes/perl6-libcurl
…/versioninfo.pl6 :34:
say $v.libssh-version;
CurtTilmes/perl6-libcurl
…/EasyHandle.pm6 :663:
has Str $.libssh-version;
MattOates/Text--Emotion
…/AFINN-111.txt :184:
asshole -4
MattOates/Text--Emotion
…/Scorer.pm :6:
has %dictionary = split /<[,;]>/, "abandon,-2;abandoned,-2;abandons,-2;abducted,-2;abduction,-2;abductions,-2;abhor,-3;abhorred,-3;abhorrent,-3;a…
YellowApple/p6-GLFW
…/Cursor.pm6 :11:
constant Crosshair = 0x00036003;
atweiden/config-toml
…/ssh-ed25519.pub :1:
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZFvfg/A7kwROAKeTlhkkwhYgKaJqNTnQRgV+Ii0xPa hello@toml
atweiden/config-toml
…/01-primitives.t :246:
# t/data/ssh-ed25519
atweiden/config-toml
…/01-primitives.t :247:
my Str $ssh-ed25519-perl = slurp('t/data/ssh-ed25519').trim;
atweiden/config-toml
…/01-primitives.t :248:
my Str $ssh-ed25519-toml = Q:to/EOF/.trim;
atweiden/config-toml
…/01-primitives.t :259:
# t/data/ssh-ed25519.pub
atweiden/config-toml
…/01-primitives.t :260:
my Str $ssh-ed25519-pub-perl = slurp('t/data/ssh-ed25519.pub').trim;
atweiden/config-toml
…/01-primitives.t :261:
my Str $ssh-ed25519-pub-toml = Q:to/EOF/.trim;
atweiden/config-toml
…/01-primitives.t :263:
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZFvfg/A7kwROAKeTlhkkwhYgKaJqNTnQRgV+Ii0xPa hello@toml'''
atweiden/config-toml
…/01-primitives.t :273:
my $match-ssh-ed25519-toml =
atweiden/config-toml
…/01-primitives.t :275:
$ssh-ed25519-toml,
atweiden/config-toml
…/01-primitives.t :279:
my $match-ssh-ed25519-pub-toml =
atweiden/config-toml
…/01-primitives.t :281:
$ssh-ed25519-pub-toml,
atweiden/config-toml
…/01-primitives.t :300:
$match-ssh-ed25519-toml.WHAT,
atweiden/config-toml
…/01-primitives.t :303:
♪ [Grammar.parse($ssh-ed25519-toml, :rule<string>)] - 11 of 142
atweiden/config-toml
…/01-primitives.t :306:
┃ Success ┃ (ssh-ed25519) successfully
atweiden/config-toml
…/01-primitives.t :313:
$match-ssh-ed25519-pub-toml.WHAT,
atweiden/config-toml
…/01-primitives.t :316:
♪ [Grammar.parse($ssh-ed25519-pub-toml, :rule<string>)] - 12 of 142
atweiden/config-toml
…/01-primitives.t :319:
┃ Success ┃ (ssh-ed25519.pub) successfully
atweiden/config-toml
…/01-primitives.t :339:
$ssh-ed25519-perl ~~ $match-ssh-ed25519-toml.made,
atweiden/config-toml
…/01-primitives.t :344:
┃ ┃ ∙ $ssh-ed25519-perl ~~ $match-ssh-ed25519-toml.made
atweiden/config-toml
…/01-primitives.t :352:
$ssh-ed25519-pub-perl ~~ $match-ssh-ed25519-pub-toml.made,
atweiden/config-toml
…/01-primitives.t :357:
┃ ┃ ∙ $ssh-ed25519-pub-perl ~~
atweiden/config-toml
…/01-primitives.t :358:
┃ Success ┃ $match-ssh-ed25519-pub-toml.made
azawawi/farabi6
…/codemirror.css :294:
.CodeMirror-crosshair { cursor: crosshair; }
azawawi/farabi6
…/codemirror.js :4015:
// Turn mouse into crosshair when Alt is held on Mac.
azawawi/farabi6
…/codemirror.js :4016:
if (code == 18 && !/\bCodeMirror-crosshair\b/.test(cm.display.lineDiv.className))
azawawi/farabi6
…/codemirror.js :4022:
addClass(lineDiv, "CodeMirror-crosshair");
azawawi/farabi6
…/codemirror.js :4026:
rmClass(lineDiv, "CodeMirror-crosshair");
azawawi/farabi6
…/css.js :556:
"cross", "crosshair", "currentcolor", "cursive", "cyclic", "dashed", "decimal",
azawawi/farabi6
…/shell.js :35:
'shopt shred source sort sleep ssh start stop su sudo tee telnet top ' +
azawawi/farabi6
…/icon.min.css :10:
*/@font-face{font-family:Icons;src:url(../themes/default/assets/fonts/icons.eot);src:url(../themes/default/assets/fonts/icons.eot?#iefix) format('em…
azawawi/farabi6
…/semantic.min.css :11:
@import 'https://fonts.googleapis.com/css?family=Lato:400,700,400italic,700italic\&subset=latin';\*,:after,:before{box-sizing:inherit}html{box-sizing:b…
azawawi/perl6-gtk-scintilla
…/LexJSON.cxx :343:
context.Match("ssh://") ||
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :59:
StringSetHolder ssh;
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :60:
ssh.sa.Insert(0, "Alpha");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :61:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :62:
ssh.sa.Insert(0, "Beta");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :63:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :64:
ssh.sa.Insert(0, "Cat");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :65:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :66:
ssh.sa.Insert(1, "Dog");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :67:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :68:
ssh.sa.Insert(0, "Elephant");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :69:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :70:
ssh.sa.Insert(1, "Fox");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :71:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :72:
ssh.sa.Insert(0, "Grass");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :73:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :74:
ssh.sa.Insert(1, "Hat");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :75:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :76:
ssh.sa.Delete(4);
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :77:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :78:
ssh.sa.Insert(0, "Indigo");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :79:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :80:
ssh.sa.Insert(1, "Jackal");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :81:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :82:
ssh.sa.Insert(0, "Kanga");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :83:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :84:
ssh.sa.Insert(1, "Lion");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :85:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :86:
ssh.sa.Insert(0, "Mango");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :87:
REQUIRE(ssh.Check());
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :88:
ssh.sa.Insert(1, "Neon");
azawawi/perl6-gtk-scintilla
…/testSplitVector.cxx :89:
REQUIRE(ssh.Check());
azawawi/perl6-net-curl
…/sftpget.c :27:
/* define this to switch off the use of ssh-agent in this program */
azawawi/perl6-net-curl
…/sftpget.c :80:
/* We activate ssh agent. For this to work you need
azawawi/perl6-net-curl
…/sftpget.c :81:
to have ssh-agent running (type set | grep SSH_AGENT to check) or
azawawi/perl6-net-curl
…/NativeCall.pm6 :761:
has Str $.libssh_version; # const char* libssh_version
cosimo/perl6-facter
…/ssh.rb :1:
## ssh.rb
cosimo/perl6-facter
…/ssh.rb :16:
["/etc/ssh","/usr/local/etc/ssh","/etc","/usr/local/etc"].each do |dir|
cosimo/perl6-facter
…/ssh.rb :17:
{"SSHDSAKey" => "ssh_host_dsa_key.pub", "SSHRSAKey" => "ssh_host_rsa_key.pub"}.each do |name,file|
fayland/perl6-WebService-GitHub
…/search.response :96:
"ssh_url": "git@github.com:chef-cookbooks/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :184:
"ssh_url": "git@github.com:schacon/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :272:
"ssh_url": "git@github.com:abaez/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :360:
"ssh_url": "git@github.com:major/MySQLTuner-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :448:
"ssh_url": "git@github.com:testafy/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :536:
"ssh_url": "git@github.com:Perl/perl5.git",
fayland/perl6-WebService-GitHub
…/search.response :624:
"ssh_url": "git@github.com:chromatic/modern_perl_book.git",
fayland/perl6-WebService-GitHub
…/search.response :712:
"ssh_url": "git@github.com:libwww-perl/libwww-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :800:
"ssh_url": "git@github.com:vim-perl/vim-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :888:
"ssh_url": "git@github.com:hachiojipm/awesome-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :976:
"ssh_url": "git@github.com:perlorg/perlweb.git",
fayland/perl6-WebService-GitHub
…/search.response :1064:
"ssh_url": "git@github.com:gugod/App-perlbrew.git",
fayland/perl6-WebService-GitHub
…/search.response :1152:
"ssh_url": "git@github.com:judofyr/perloku.git",
fayland/perl6-WebService-GitHub
…/search.response :1240:
"ssh_url": "git@github.com:fglock/Perlito.git",
fayland/perl6-WebService-GitHub
…/search.response :1328:
"ssh_url": "git@github.com:ANXS/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :1416:
"ssh_url": "git@github.com:mongodb/mongo-perl-driver.git",
fayland/perl6-WebService-GitHub
…/search.response :1504:
"ssh_url": "git@github.com:elastic/elasticsearch-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :1592:
"ssh_url": "git@github.com:Perl-Critic/Perl-Critic.git",
fayland/perl6-WebService-GitHub
…/search.response :1680:
"ssh_url": "git@github.com:goccy/perl-motion.git",
fayland/perl6-WebService-GitHub
…/search.response :1768:
"ssh_url": "git@github.com:DataMonster/Perl.git",
fayland/perl6-WebService-GitHub
…/search.response :1856:
"ssh_url": "git@github.com:adamziaja/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :1944:
"ssh_url": "git@github.com:slimakuj/perl.git",
fayland/perl6-WebService-GitHub
…/search.response :2032:
"ssh_url": "git@github.com:gbarr/perl-libnet.git",
fayland/perl6-WebService-GitHub
…/search.response :2120:
"ssh_url": "git@github.com:miyagawa/heroku-buildpack-perl.git",
fayland/perl6-WebService-GitHub
…/search.response :2208:
"ssh_url": "git@github.com:vmbrasseur/Perl_Companies.git",
fayland/perl6-WebService-GitHub
…/search.response :2296:
"ssh_url": "git@github.com:PerlRedis/perl-redis.git",
fayland/perl6-WebService-GitHub
…/search.response :2384:
"ssh_url": "git@github.com:typester/perldojo.git",
fayland/perl6-WebService-GitHub
…/search.response :2472:
"ssh_url": "git@github.com:kasei/perlrdf.git",
fayland/perl6-WebService-GitHub
…/search.response :2560:
"ssh_url": "git@github.com:hachi/Perlbal.git",
fayland/perl6-WebService-GitHub
…/search.response :2648:
"ssh_url": "git@github.com:rafl/perlfaq.git",
jnthn/p6-docker-file
…/parse-complex.t :15:
RUN apt-get update && apt-get install -y inotify-tools nginx apache2 openssh-server
jnthn/p6-ssh-libssh
…/.gitrepo :7:
remote = https://github.com/jnthn/p6-ssh-libssh.git
jnthn/p6-ssh-libssh
…/Build.pm :8:
# to have a libssh already.
jnthn/p6-ssh-libssh
…/Build.pm :11:
my constant @files = "ssh.dll", "libeay32.dll", "msvcr110.dll";
jnthn/p6-ssh-libssh
…/Build.pm :24:
say 'Installing bundled libssh.';
jnthn/p6-ssh-libssh
…/Build.pm :30:
my $blob = LWP::Simple.get("http://www.p6c.org/\~jnthn/libssh/$file");
jnthn/p6-ssh-libssh
…/META6.json :5:
"description" : "Asynchronous binding for libssh; client-only and limited functionality so far.",
jnthn/p6-ssh-libssh
…/META6.json :14:
"resources" : [ "ssh.dll", "libeay32.dll", "msvcr110.dll" ],
jnthn/p6-ssh-libssh
…/META6.json :15:
"source-url" : "https://github.com/jnthn/p6-ssh-libssh.git"
jnthn/p6-ssh-libssh
…/README.md :21:
On Linux, install libssh with your package manager to use this module. On
jnthn/p6-ssh-libssh
…/README.md :22:
Windows, the installation of this module will download a pre-built libssh.dll,
jnthn/p6-ssh-libssh
…/forward.p6 :5:
# perl6 examples/forward.p6 your.ssh.host youruser www.bash.org 80 8888
jnthn/p6-ssh-libssh
…/reverse-forward.p6 :5:
# perl6 examples/reverse-forward.p6 your.ssh.host youruser 8888 8080
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :42:
die X::SSH::LibSSH::Error.new(message => ssh_get_error($s));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :47:
# We use libssh exclusively in non-blocking mode. A single event loop
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :48:
# thread manages all interactions with libssh (that is, we only ever make
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :72:
$!loop = ssh_event_new();
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :76:
# work, then poll the libssh event loop and run any
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :81:
ssh_event_dopoll($!loop, 20);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :103:
ssh_event_add_session($!loop, $session));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :110:
ssh_event_remove_session($!loop, $session));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :128:
my $channel = ssh_channel_accept_forward($session, 0, $port-num);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :238:
with $!session-handle = ssh_new() -> $s {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :239:
ssh_set_blocking($s, 0);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :241:
ssh_options_set_str($s, SSH_OPTIONS_HOST, $!host));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :243:
ssh_options_set_int($s, SSH_OPTIONS_PORT, CArray[int32].new($!port)));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :245:
ssh_options_set_str($s, SSH_OPTIONS_USER, $!user));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :248:
ssh_options_set_int($s, SSH_OPTIONS_LOG_VERBOSITY,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :253:
ssh_options_set_int($s, SSH_OPTIONS_TIMEOUT,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :257:
my $outcome = error-check($s, ssh_connect($s));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :266:
if error-check($s, ssh_connect($s)) == 0 {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :295:
given SSHServerKnown(error-check($s, ssh_is_server_known($s))) {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :309:
die "Unknown response from ssh_is_server_known";
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :326:
ssh_get_pubkey_hash($!session-handle, $hash-buf));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :329:
hash => ssh_get_hexa($hash-buf[0], $hash-len)
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :331:
ssh_clean_pubkey_hash($hash-buf);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :342:
ssh_write_knownhost($!session-handle));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :375:
ssh_pki_import_privkey_file($_, $!private-key-file-password, Pointer, Pointer, $key-out));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :381:
?? { ssh_userauth_publickey($s, Str, $key) }
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :382:
!! { ssh_userauth_publickey_auto($s, Str, Str) };
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :385:
ssh_key_free($key) with $key;
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :394:
ssh_key_free($key) with $key;
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :400:
ssh_key_free($key) with $key;
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :411:
ssh_key_free($key) with $key;
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :436:
my &auth-function = { ssh_userauth_password($s, Str, $!password) }
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :473:
my $channel = ssh_channel_new($!session-handle);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :483:
ssh_channel_open_session($channel));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :489:
ssh_channel_request_pty_size($channel, $terminal, $cols, $rows));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :493:
ssh_channel_request_shell($channel));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :496:
if ssh_channel_is_open($channel) == 1 {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :532:
my $channel = ssh_channel_new($!session-handle);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :535:
ssh_channel_open_session($channel));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :542:
ssh_channel_open_session($channel));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :571:
ssh_channel_request_exec($channel, $command));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :578:
ssh_channel_request_exec($channel, $command));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :604:
my $channel = ssh_channel_new($!session-handle);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :607:
ssh_channel_open_forward($channel, $remote-host, $remote-port,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :615:
ssh_channel_open_forward($channel, $remote-host, $remote-port,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :652:
ssh_channel_listen_forward($!session-handle, $bind, $remote-port,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :661:
ssh_channel_listen_forward($!session-handle, $bind, $remote-port,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :690:
# For SCP, the libssh async interface unfortunately does not work.
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :692:
# what libssh does to implement it in terms of a reuqest channel.
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :819:
ssh_disconnect($_);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :820:
ssh_free($_);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :861:
if ssh_channel_is_eof($!channel-handle) {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :869:
my $nread = ssh_channel_read_nonblocking($!channel-handle, $buf,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :915:
my uint $ws = ssh_channel_window_size($!channel-handle);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :920:
ssh_channel_write($!channel-handle, $send-buf, $send));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :959:
error-check($!session.session-handle, ssh_channel_send_eof($!channel-handle));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :977:
my $exit = ssh_channel_get_exit_status($!channel-handle);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :1000:
error-check('close a channel', ssh_channel_close($_));
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :1001:
ssh_channel_free($_);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :1040:
error-check('set logging callback', ssh_set_log_callback(
jnthn/p6-ssh-libssh
…/Raw.pm6 :5:
sub libssh() {
jnthn/p6-ssh-libssh
…/Raw.pm6 :13:
$windows-dep-path = extract-windows-library('ssh.dll');
jnthn/p6-ssh-libssh
…/Raw.pm6 :19:
'libssh.so.4'
jnthn/p6-ssh-libssh
…/Raw.pm6 :87:
sub ssh_new() returns SSHSession is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :88:
sub ssh_free(SSHSession) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :89:
sub ssh_set_blocking(SSHSession, int32) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :90:
sub ssh_options_set_int(SSHSession, int32, CArray[int32]) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :91:
is symbol('ssh_options_set') is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :92:
sub ssh_options_set_str(SSHSession, int32, Str) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :93:
is symbol('ssh_options_set') is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :94:
sub ssh_connect(SSHSession) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :95:
sub ssh_disconnect(SSHSession) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :96:
sub ssh_is_server_known(SSHSession) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :97:
sub ssh_write_knownhost(SSHSession) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :98:
sub ssh_get_pubkey_hash(SSHSession, CArray[Pointer]) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :100:
sub ssh_get_hexa(Pointer, size_t) returns Str is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :101:
sub ssh_clean_pubkey_hash(CArray[Pointer]) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :102:
sub ssh_set_log_callback(& (int32, Str, Str, Pointer))
jnthn/p6-ssh-libssh
…/Raw.pm6 :103:
returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :114:
sub ssh_userauth_publickey_auto(SSHSession, Str, Str) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :115:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :116:
sub ssh_pki_import_privkey_file(Str, Str, Pointer, Pointer, CArray[SSHKey])
jnthn/p6-ssh-libssh
…/Raw.pm6 :117:
returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :118:
sub ssh_userauth_publickey(SSHSession, Str, SSHKey) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :119:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :120:
sub ssh_key_free(SSHKey) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :121:
sub ssh_userauth_password(SSHSession, Str, Str) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :122:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :125:
sub ssh_event_new() returns SSHEvent is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :126:
sub ssh_event_free(SSHEvent) is native(&libssh) is export {*};
jnthn/p6-ssh-libssh
…/Raw.pm6 :127:
sub ssh_event_add_session(SSHEvent, SSHSession) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :128:
sub ssh_event_remove_session(SSHEvent, SSHSession) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :129:
sub ssh_event_dopoll(SSHEvent, int32) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :132:
sub ssh_channel_new(SSHSession) returns SSHChannel is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :133:
sub ssh_channel_free(SSHChannel) is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :134:
sub ssh_channel_open_session(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :135:
sub ssh_channel_is_open(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :136:
sub ssh_channel_close(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :137:
sub ssh_channel_request_exec(SSHChannel, Str) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :138:
sub ssh_channel_request_pty(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :139:
sub ssh_channel_request_pty_size(SSHChannel, Str, int32, int32) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :140:
sub ssh_channel_change_pty_size(SSHChannel, int32, int32) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :141:
sub ssh_channel_request_shell(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :142:
sub ssh_channel_read_nonblocking(SSHChannel, Buf, uint32, int32) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :143:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :144:
sub ssh_channel_is_eof(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :145:
sub ssh_channel_get_exit_status(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :146:
sub ssh_channel_window_size(SSHChannel) returns uint32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :147:
sub ssh_channel_write(SSHChannel, Blob, uint32) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :148:
sub ssh_channel_send_eof(SSHChannel) returns int32 is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :149:
sub ssh_channel_open_forward(SSHChannel, Str, int32, Str, int32) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :150:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :151:
sub ssh_channel_listen_forward(SSHSession, Str, int32, CArray[int32]) returns int32
jnthn/p6-ssh-libssh
…/Raw.pm6 :152:
is native(&libssh) is symbol('ssh_forward_listen') is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :153:
sub ssh_channel_accept_forward(SSHSession, int32, CArray[int32]) returns SSHChannel
jnthn/p6-ssh-libssh
…/Raw.pm6 :154:
is native(&libssh) is export {*}
jnthn/p6-ssh-libssh
…/Raw.pm6 :156:
sub ssh_get_error(SSHSession) returns Str is symbol('ssh_get_error')
jnthn/p6-ssh-libssh
…/Raw.pm6 :157:
is native(&libssh) is export {*}
kalkin/Ddt
…/Distribution.pm6 :237:
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / {
melezhik/perl6-sparrowdo-rvm
…/.travis.yml :5:
- cat /dev/zero | ssh-keygen -q -N ""
melezhik/perl6-sparrowdo-rvm
…/.travis.yml :6:
- cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
melezhik/perl6-sparrowdo-rvm
…/.travis.yml :7:
- chmod og-wx ~/.ssh/authorized_keys
noqisofon/p6-miroku
…/Miroku.pm6 :320:
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / {
noqisofon/p6-miroku
…/03-find-source-url.t :29:
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / {
p6-css/CSS-Module-p6
…/Metadata.pm :6:
BEGIN our $property = ${:azimuth(${:default($["center", [{:keyw("center")},]]), :inherit, :synopsis("<angle> | [[ left-side | far-left | left | c…
p6-css/CSS-Module-p6
…/Grammar.pm :179:
#| cursor: [ [<uri> ,]* [ auto | crosshair | default | pointer | move | e-resize | ne-resize | nw-resize | n-resize | se-resize | sw-resize | s-resize | w-resize | text | wait | help | progress ] ]
p6-css/CSS-Module-p6
…/Grammar.pm :181:
rule expr-cursor {:i [ [ <uri> <op(',')> ]* [ [ auto | crosshair | default | pointer | move | e\-resize | ne\-resize | nw\-resize | n\-resize | se\-resize | sw\-resize | s\-resize | w\-resize | text | wait | help | progress ] & <keyw> ] ] }
p6-css/CSS-Module-p6
…/Metadata.pm :6:
BEGIN our $property = ${:azimuth(${:default($["center", [{:keyw("center")},]]), :inherit, :synopsis("<angle> | [[ left-side | far-left | left | c…
p6-css/CSS-Module-p6
…/css21-properties.txt :37:
'cursor' [ [<uri> ,]* [ auto | crosshair | default | pointer | move | e-resize | ne-resize | nw-resize | n-resize | se-resize | sw-resize | s-resize | w-resize | text | wait | help | progress ] ] | inherit auto yes visual, interactive
p6-css/CSS-Properties-p6
…/README.md :471:
cursor | auto | Yes | | [ [\<uri\> ,]* [ auto \| crosshair \| default \| pointer \| move \| e-resize \| ne-resize \| nw-resize \| n-resize \| se-resize \| sw-resize \| s-resize \| w-resize \| text \| wait \| help \| progress ] ]
p6-pdf/PDF-API6
…/README.md :234:
PDF::API6.open( "enc.pdf", :password<sshh!> );
p6-pdf/PDF-API6
…/README.md :283:
$pdf.encrypt( :owner-pass<ssh1>, :user-pass<abc>, :aes );
p6-pdf/PDF-p6
…/README.md :361:
To open an encrypted PDF document, specify either the user or owner password: `PDF.open( "enc.pdf", :password<ssh!>)`
p6-pdf/PDF-p6
…/README.md :363:
A document can be encrypted using the `encrypt` method: `$pdf.encrypt( :owner-pass<ssh1>, :user-pass<abc>, :aes )`
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :13:
my $owner-pass = 'ssh!';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :14:
my $owner-pass = 'ssh!';
perl6-community-modules/uri
…/DefaultPort.pm :11:
ssh => 22,
perl6/doc
…/words.pws :174:
classhow
raydiak/Git-PurePerl
…/Protocol.pm :32:
when m{^'ssh://'((.*?)\@)?(.*?)(\/.*)}
raydiak/Git-PurePerl
…/SSH.pm :21:
"ssh", $connect,
samcv/URL-Find
…/README.md :16:
By default it will match domain names that use unicode characters such as http://правительство.рф. To only match ASCII domains use the :ascii option.…
samcv/URL-Find
…/README.md :29:
Accepts a string and returns a list of URL's. Optionally you can specify a limit to the number of URL's returned, or whether you want to only match URL's with ASCII domain names: :ascii<1> Matches only http https ftp git and ssh schemes by default. To match any scheme, use :any<1>
samcv/URL-Find
…/Find.pm6 :11:
only find http, https, ftp, git and ssh schemes, but you can specify `:any<1>` to match any schemes
samcv/URL-Find
…/Find.pm6 :15:
my token protocol {:i [http|https|ftp|git|ssh] }
samcv/URL-Find
…/Find.pm6 :25:
#| Matches only http https ftp git and ssh schemes by default. To match any scheme, use :any<1>
slobo/Perl6-X11-Xlib-Raw
…/keysym.pm6 :697:
XK_ssharp => 0x00df, #= U+00DF LATIN SMALL LETTER SHARP S
slobo/Perl6-X11-Xlib-Raw
…/keysym.pm6 :2456:
XK_Sinh_ssha => 0x1000dc2, #= U+0DC2 SINHALA MUURDHAJA SAYANNA
spitsh/spitsh
…/CHANGELOG.md :54:
- **New Feature**: ssh support through new classes:
spitsh/spitsh
…/CHANGELOG.md :55:
- `SSHd` with methods to start and interact with the sshd command
spitsh/spitsh
…/DigitalOcean.sp :99:
constant @:ssh-keys = $:ssh-keypair.public-key.fingerprint(:algo<md5>);
spitsh/spitsh
…/DigitalOcean.sp :126:
:@ssh-keys = @:ssh-keys,
spitsh/spitsh
…/DigitalOcean.sp :135:
ssh_keys => @ssh-keys,
spitsh/spitsh
…/DigitalOcean.sp :143:
static method create-ssh-seeded(
spitsh/spitsh
…/DigitalOcean.sp :148:
:@ssh-keys = @:ssh-keys
spitsh/spitsh
…/DigitalOcean.sp :154:
my $set-ssh-keys = eval(
spitsh/spitsh
…/DigitalOcean.sp :157:
sshd => '/usr/sbin/sshd', # DO always has ssh installed
spitsh/spitsh
…/DigitalOcean.sp :160:
$keydir.add('seed_ssh.pub').push: $seed-public-key;
spitsh/spitsh
…/DigitalOcean.sp :161:
my SSH-keypair $seed-keys = $keydir.add('seed_ssh').push: $seed-private-key;
spitsh/spitsh
…/DigitalOcean.sp :167:
:@ssh-keys,
spitsh/spitsh
…/DigitalOcean.sp :168:
on-boot => $set-ssh-keys,
spitsh/spitsh
…/DigitalOcean.sp :183:
or fatal "{$droplet.name}: ssh seeding failed: seed port $:seed-port never opened for", "\c[DROPLET]";
spitsh/spitsh
…/DigitalOcean.sp :198:
DO.request('GET', 'account/keys').ok.json<ssh_keys>.List-->List[JSON]
spitsh/spitsh
…/DigitalOcean.sp :204:
.ok.json<ssh_key>;
spitsh/spitsh
…/DigitalOcean.sp :210:
?? debug "ssh key $fingerprint already exists", "\c[WATER WAVE]"
spitsh/spitsh
…/DigitalOcean.sp :215:
DO.request('GET', "account/keys/$fingerprint").ok.json<ssh_key>;
spitsh/spitsh
…/DigitalOcean.sp :267:
method ssh-seed($shell)~ {
spitsh/spitsh
…/DigitalOcean.sp :268:
$self.ipv4.ssh(
spitsh/spitsh
…/reserved.txt :588:
ssh
spitsh/spitsh
…/reserved.txt :589:
ssh-keygen
spitsh/spitsh
…/Host.sp :33:
method ssh(
spitsh/spitsh
…/Host.sp :37:
:$identity = $:ssh-identity-file,
spitsh/spitsh
…/Host.sp :43:
my $ssh-host = "$user@$self";
spitsh/spitsh
…/Host.sp :44:
debug "Attempting ssh to $ssh-host:$port";
spitsh/spitsh
…/Host.sp :45:
# XXX: Until we figure out how to make the ssh connection wait
spitsh/spitsh
…/Host.sp :48:
$:ssh !>warn($ssh-host)
spitsh/spitsh
…/Host.sp :54:
"$ssh-host" sh
spitsh/spitsh
…/Host.sp :58:
method ssh-keyscan(:$port = 22, :$type = 'rsa,ecdsa,ed25519', Bool :$debug) -->List[SSH-known-host]
spitsh/spitsh
…/Host.sp :60:
$:ssh-keyscan !>debug
spitsh/spitsh
…/SSH.sp :1:
constant Pkg $:Pkg-openssh-client = on {
spitsh/spitsh
…/SSH.sp :2:
Alpine { 'openssh-client' }
spitsh/spitsh
…/SSH.sp :3:
Debian { 'openssh-client' }
spitsh/spitsh
…/SSH.sp :4:
RHEL { 'openssh-clients' }
spitsh/spitsh
…/SSH.sp :7:
constant Cmd $:sshd is logged-as("\c[BLOWFISH]") = {
spitsh/spitsh
…/SSH.sp :9:
Alpine { Pkg<openssh>.ensure-install }
spitsh/spitsh
…/SSH.sp :10:
Any { Pkg<openssh-server>.ensure-install }
spitsh/spitsh
…/SSH.sp :12:
Cmd<sshd>.path;
spitsh/spitsh
…/SSH.sp :15:
constant Cmd $:ssh is logged-as("\c[BLOWFISH]") = on {
spitsh/spitsh
…/SSH.sp :17:
Cmd<ssh> or
spitsh/spitsh
…/SSH.sp :18:
$:Pkg-openssh-client.install && 'ssh';
spitsh/spitsh
…/SSH.sp :20:
Spit-Helper { 'ssh' }
spitsh/spitsh
…/SSH.sp :23:
constant Cmd $:ssh-keygen = ($:ssh; 'ssh-keygen');
spitsh/spitsh
…/SSH.sp :24:
constant Cmd $:ssh-keyscan is logged-as("\c[BLOWFISH, KEY, RIGHT-POINTING MAGNIFYING GLASS]") = ($:ssh; 'ssh-keyscan');
spitsh/spitsh
…/SSH.sp :25:
constant $:ssh-known-hosts is export = $:HOME.add('.ssh').mkdir.add('known_hosts');
spitsh/spitsh
…/SSH.sp :26:
constant $:ssh-conf-dir = File</etc/ssh>;
spitsh/spitsh
…/SSH.sp :27:
constant $:authorized_keys is export = $:HOME.add('.ssh').mkdir.add('authorized_keys');
spitsh/spitsh
…/SSH.sp :36:
when /^ssh-rsa$/ { 'rsa' }
spitsh/spitsh
…/SSH.sp :37:
when /^ssh-dss$/ { 'dsa' }
spitsh/spitsh
…/SSH.sp :38:
when /^ssh-ed25519$/ { 'ed25519' }
spitsh/spitsh
…/SSH.sp :49:
$:ssh-keygen -lf- ("-E$_" if $algo) |
spitsh/spitsh
…/SSH.sp :68:
method add { $:ssh-known-hosts.push: $self }
spitsh/spitsh
…/SSH.sp :83:
${ $:ssh-keygen -yf $self >($self.public-key-file) !>error };
spitsh/spitsh
…/SSH.sp :89:
:$path = "$:HOME/.ssh/{Str.random}"
spitsh/spitsh
…/SSH.sp :93:
$:ssh-keygen -q -N ''
spitsh/spitsh
…/SSH.sp :100:
!! die "Unable to produce a ssh key pair at $path";
spitsh/spitsh
…/SSH.sp :114:
constant $:ssh-private-key;
spitsh/spitsh
…/SSH.sp :115:
constant File $:ssh-identity-file = ( File.tmp.chmod(600).write("$_\n") if $:ssh-private-key );
spitsh/spitsh
…/SSH.sp :116:
constant SSH-keypair $:ssh-keypair = if $:ssh-identity-file {
spitsh/spitsh
…/SSH.sp :117:
$:ssh-identity-file-->SSH-keypair.generate-public-key;
spitsh/spitsh
…/SSH.sp :118:
$:ssh-identity-file;
spitsh/spitsh
…/SSH.sp :127:
if $:os ~~ Debian { File</var/run/sshd>.mkdir }
spitsh/spitsh
…/SSH.sp :130:
$:sshd >debug/warn ('-ddd' if $debug) -p $port -D
spitsh/spitsh
…/SSH.sp :135:
static method generate-missing-keys ${ $:ssh-keygen -A >debug/warn }
spitsh/spitsh
…/SSH.sp :138:
$:ssh-conf-dir.add("ssh_host_{$type}_key")
spitsh/spitsh
…/SSH.sp :152:
$:ssh-conf-dir.add('sshd_config');
spitsh/spitsh
…/harness.sp :1:
constant @:run = <cli base packages commands transport json ssh http-client docker helper>;
spitsh/spitsh
…/harness.sp :37:
if @:run.first('ssh') {
spitsh/spitsh
…/harness.sp :38:
${@run 'spec/ssh'}
spitsh/spitsh
…/spit-helper.sp :11:
ok ${$:ssh -V !>info}, 'ssh version';
spitsh/spitsh
…/install.t :3:
my $pkg1 = $:Pkg-openssh-client;
spitsh/spitsh
…/install.t :12:
ok Cmd<ssh>, "$pkg1 commmand installed";
spitsh/spitsh
…/basic.t :18:
ok $:ssh-known-hosts.contains($server-pair.public-key),
spitsh/spitsh
…/basic.t :24:
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server';
spitsh/spitsh
…/basic.t :27:
my $res = Host.local.ssh(
spitsh/spitsh
…/custom-server-keys.t :15:
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server';
spitsh/spitsh
…/custom-server-keys.t :17:
my $res = Host.local.ssh(
spitsh/spitsh
…/fingerprint.t :4:
skip 'centos has an old ass version of openssh', 2;
spitsh/spitsh
…/fingerprint.t :8:
given 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFofjAwqt5UV/SIDlZmu6blGAStuRXJ4CawlExwnps55 root@b5978f0527b8'-->SSH-public-key {
spitsh/spitsh
…/keyscan.t :24:
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server';
spitsh/spitsh
…/keyscan.t :26:
Host.local.ssh-keyscan(:$:port).add;
spitsh/spitsh
…/keyscan.t :29:
ok $:ssh-known-hosts.contains($ed25519.public-key.key),
spitsh/spitsh
…/keyscan.t :30:
'.ssh-keyscan.add added ed25519 key';
spitsh/spitsh
…/keyscan.t :32:
ok $:ssh-known-hosts.contains($ecdsa.public-key.key),
spitsh/spitsh
…/keyscan.t :33:
'.ssh-keyscan.add added ecdsa key';
spitsh/spitsh
…/keyscan.t :35:
my $res = Host.local.ssh(
spitsh/spitsh
…/ssh-private-key.t :18:
Host.local.ssh-keyscan(:$:port).add;
spitsh/spitsh
…/ssh-private-key.t :20:
eval(ssh-private-key => $private-key){
spitsh/spitsh
…/ssh-private-key.t :21:
my $res = Host.local.ssh(
spitsh/spitsh
…/ssh-private-key.t :26:
is $res, 'success', 'setting $:ssh-private-key is enough to make everything work';
tokuhirom/p6-Crust
…/file.t :51:
$req = HTTP::Request.new(GET => "/../.ssh/id_rsa");
ugexe/zef
…/git.pm6 :13:
return $url.starts-with('git' | 'http' | 'ssh') && $url.ends-with('.git');
ugexe/zef
…/URI.pm6 :168:
elsif $id ~~ /^(.+?) '@' (.+?) ':' (.*)/ and URI.parse("ssh\:\/\/$0\@$1\/$2", :rule<URI>) -> $m {
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment