File | Code |
---|---|
CHSANCH/Lingua-Stem-Es…/diffs.txt :18578: |
nissho nissh |
CTILMES/LibCurl…/versioninfo.pl6 :34: |
say $v.libssh-version; |
CTILMES/LibCurl…/EasyHandle.pm6 :663: |
has Str $.libssh-version; |
CTILMES/LibGit2…/Cred.pm6 :29: |
sub git_cred_ssh_key_from_agent(Pointer is rw, Str --> int32) |
CTILMES/LibGit2…/Cred.pm6 :32: |
method ssh-key-from-agent(Str:D $username --> Git::Cred) |
CTILMES/LibGit2…/Cred.pm6 :35: |
check(git_cred_ssh_key_from_agent($ptr, $username)); |
CTILMES/LibGit2…/Cred.pm6 :39: |
sub git_cred_ssh_key_memory_new(Pointer is rw, Str, Str, Str, Str --> int32) |
CTILMES/LibGit2…/Cred.pm6 :42: |
method ssh-key-memory-new(Str:D $username, |
CTILMES/LibGit2…/Cred.pm6 :48: |
check(git_cred_ssh_key_memory_new($ptr, $username, $publickey, |
CTILMES/LibGit2…/Cred.pm6 :60: |
sub git_cred_ssh_key_new(Pointer is rw, Str, Str, Str, Str --> int32) |
CTILMES/LibGit2…/Cred.pm6 :63: |
method ssh-key-new(Str:D $username, |
CTILMES/LibGit2…/Cred.pm6 :69: |
check(git_cred_ssh_key_new($ptr, $username, $publickey, $privatekey, |
CTILMES/LibGit2…/34-remote-push.t :11: |
my $cred = Git::Cred.ssh-key-from-agent('git'); |
FRITH/Image-Libexif…/Raw.pm6 :125: |
sub exif_set_sshort(Pointer $data, int16 $order, uint8 $value) is native(LIB) is export { * } |
FRITH/Image-Libexif…/Raw.pm6 :129: |
sub exif_get_sshort(Pointer $data, uint8 $value --> int16) is native(LIB) is export { * } |
JNTHN/Cro-Core…/uri.t :264: |
'ssh://jnthn@some.secret.host', |
JNTHN/Cro-Core…/uri.t :265: |
*.scheme eq 'ssh', |
JNTHN/Cro-Core…/uri.t :275: |
'ssh://root@112.34.56.78', |
JNTHN/Cro-Core…/uri.t :276: |
*.scheme eq 'ssh', |
JNTHN/cro…/app.js :59273: |
overlay: "crosshair", |
JSTOWE/URI-Template…/rfc6570.txt :276: |
(Section 1.5), and the crosshatch ("#") operator for expansion of |
JSTOWE/URI-Template…/rfc6570.txt :304: |
| # | Fragment expansion, crosshatch-prefixed (Sec 3.2.4) | |
JSTOWE/URI-Template…/rfc6570.txt :1264: |
Fragment expansion, as indicated by the crosshatch ("#") operator for |
JSTOWE/URI-Template…/rfc6570.txt :1266: |
except that a crosshatch character (fragment delimiter) is appended |
KAJI/App-Platform…/CHANGELOG.md :16: |
- Replace run with App::Platform::Command on ssh+ssl |
KAJI/App-Platform…/README.md :27: |
ssh Wrapper to ssh* commandds |
KAJI/App-Platform…/advanced_configurations.rst :86: |
ssh-keys: available |
KAJI/App-Platform…/getting_started.rst :42: |
ssh Wrapper to ssh* commandds |
KAJI/App-Platform…/Platform.pm6 :36: |
method ssh('keygen') { |
KAJI/App-Platform…/Platform.pm6 :37: |
my $ssh-dir = $.data-path ~ '/' ~ self.domain ~ '/ssh'; |
KAJI/App-Platform…/Platform.pm6 :38: |
mkdir $ssh-dir if not $ssh-dir.IO.e; |
KAJI/App-Platform…/Platform.pm6 :39: |
App::Platform::Command.new(<ssh-keygen -t rsa -q -N>, '', '-f', "$ssh-dir/id_rsa").run; |
KAJI/App-Platform…/Info.pm6 :31: |
# has ssh keys generated? |
KAJI/App-Platform…/Info.pm6 :32: |
my $ssh-keys = 'unavailable'; |
KAJI/App-Platform…/Info.pm6 :33: |
my $ssh-path = "$data-path/$domain/ssh"; |
KAJI/App-Platform…/Info.pm6 :34: |
$ssh-path = $ssh-path.subst(/ '$HOME' /, $*HOME); |
KAJI/App-Platform…/Info.pm6 :35: |
if $ssh-path.IO.d and "$ssh-path/id_rsa".IO.e and "$ssh-path/id_rsa.pub".IO.e { |
KAJI/App-Platform…/Info.pm6 :36: |
$ssh-keys = color('green') ~ 'available' ~ color('reset'); |
KAJI/App-Platform…/Info.pm6 :40: |
for <status ssl-certs ssh-keys domain network data-path> { |
KAJI/App-Platform…/SSH.pm6 :12: |
#| Wrapper to ssh* commandds |
KAJI/App-Platform…/SSH.pm6 :14: |
'ssh', |
KAJI/App-Platform…/SSH.pm6 :26: |
App::Platform.new(:$domain, :$network,:$data-path).ssh('keygen'); |
KAJI/App-Platform…/SSH.pm6 :31: |
'ssh', |
KAJI/App-Platform…/SSH.pm6 :39: |
:filter<ssh keygen> |
KAJI/App-Platform…/SSH.pm6 :43: |
multi cli('ssh', |
KAJI/App-Platform…/SSH.pm6 :50: |
:filter<ssh> |
KAJI/App-Platform…/Container.pm6 :121: |
if not self.data-path ~ '/' ~ self.domain ~ '/ssh/id_rsa.pub'.IO.e { |
KAJI/App-Platform…/Container.pm6 :122: |
put "No SSH keys available. Maybe you should run:\n\n platform --data-path={self.data-path} --domain={self.domain} ssh keygen\n"; |
KAJI/App-Platform…/99-setup.t :98: |
subtest 'platform ssh keygen', { |
KAJI/App-Platform…/99-setup.t :100: |
run <bin/platform>, "--data-path=$data-dir/.platform", <ssh keygen>; |
KAJI/App-Platform…/99-setup.t :101: |
ok "$data-dir/.platform/localhost/ssh".IO.e, '<data>/localhost/ssh exists'; |
KAJI/App-Platform…/99-setup.t :102: |
ok "$data-dir/.platform/localhost/ssh/$_".IO.e, "<data>/localhost/ssh/$_ exists" for <id_rsa id_rsa.pub>; |
KAJI/App-Platform…/author-02-project.t :52: |
/var/lib/auth/platorc/.ssh: |
KAJI/App-Platform…/author-02-project.t :59: |
/var/lib/auth/platorc/.ssh/authorized_keys: |
KAJI/App-Platform…/author-02-project.t :60: |
content: ssh/id_rsa.pub |
KAJI/App-Platform…/author-02-project.t :100: |
subtest 'platform ssh keygen', { |
KAJI/App-Platform…/author-02-project.t :102: |
run <bin/platform>, "--data-path=$tmpdir/.platform", <ssh keygen>; |
KAJI/App-Platform…/author-02-project.t :103: |
ok "$tmpdir/.platform/localhost/ssh".IO.e, '<data>/localhost/ssh exists'; |
KAJI/App-Platform…/author-02-project.t :104: |
ok "$tmpdir/.platform/localhost/ssh/$_".IO.e, "<data>/localhost/ssh/$_ exists" for <id_rsa id_rsa.pub>; |
KAJI/App-Platform…/author-02-project.t :120: |
$proc = run <docker exec -it project-honeybee cat /var/lib/auth/platorc/.ssh/authorized_keys>, :out; |
KAJI/App-Platform…/author-02-project.t :121: |
my $id_rsa_pub = "$tmpdir/.platform/localhost/ssh/id_rsa.pub".IO.slurp; |
KAJI/App-Platform…/author-03-environment.t :41: |
sub create-ssh-project(Str $animal) { |
KAJI/App-Platform…/author-03-environment.t :46: |
RUN apt-get -y install openssh-server |
KAJI/App-Platform…/author-03-environment.t :50: |
command: /bin/bash -c "/etc/init.d/ssh start && nginx -g 'daemon off;'" |
KAJI/App-Platform…/author-03-environment.t :72: |
subtest "platform --domain=$domain-sahara ssh keygen", { |
KAJI/App-Platform…/author-03-environment.t :74: |
run <bin/platform>, "--domain=$domain-sahara", "--data-path=$tmpdir/.platform", <ssh keygen>; |
KAJI/App-Platform…/author-03-environment.t :75: |
ok "$tmpdir/.platform/$domain-sahara/ssh".IO.e, "<data>/$domain-sahara/ssh exists"; |
KAJI/App-Platform…/author-03-environment.t :76: |
ok "$tmpdir/.platform/$domain-sahara/ssh/$_".IO.e, "<data>/$domain-sahara/ssh/$_ exists" for <id_rsa id_rsa.pub>; |
KAJI/App-Platform…/author-03-environment.t :79: |
subtest "platform --domain=$domain-amazon ssh keygen", { |
KAJI/App-Platform…/author-03-environment.t :81: |
run <bin/platform>, "--domain=$domain-amazon", "--data-path=$tmpdir/.platform", <ssh keygen>; |
KAJI/App-Platform…/author-03-environment.t :82: |
ok "$tmpdir/.platform/$domain-amazon/ssh".IO.e, "<data>/$domain-amazon/ssh exists"; |
KAJI/App-Platform…/author-03-environment.t :83: |
ok "$tmpdir/.platform/$domain-amazon/ssh/$_".IO.e, "<data>/$domain-amazon/ssh/$_ exists" for <id_rsa id_rsa.pub>; |
KAJI/App-Platform…/author-03-environment.t :125: |
create-ssh-project('octopus'); |
KAJI/App-Platform…/author-03-environment.t :126: |
create-ssh-project('blowfish'); |
KAJI/App-Platform…/author-03-environment.t :136: |
/var/lib/octonaut/.ssh: |
KAJI/App-Platform…/author-03-environment.t :141: |
/var/lib/octonaut/.ssh/id_rsa: |
KAJI/App-Platform…/author-03-environment.t :142: |
content: ssh/id_rsa |
KAJI/App-Platform…/author-03-environment.t :151: |
/home/kwazii/.ssh: |
KAJI/App-Platform…/author-03-environment.t :156: |
/home/kwazii/.ssh/authorized_keys: |
KAJI/App-Platform…/author-03-environment.t :157: |
content: ssh/id_rsa.pub |
KAJI/App-Platform…/author-03-environment.t :181: |
$proc = run <docker exec -it project-octopus su octonaut --command>, "ssh -o \"StrictHostKeyChecking no\" kwazii\@{%addr<blowfish>} ls /", :out; |
KAJI/App-Platform…/author-03-environment.t :183: |
is $out.lines.elems, 21, 'got proper response from ssh connection'; |
MARTIMM/GTK-Glade…/Gdkkeysyms.pm6 :510: |
constant GDK_KEY_ssharp is export = 0x0df; |
MARTIMM/GTK-Glade…/Gdkkeysyms.pm6 :2076: |
constant GDK_KEY_Sinh_ssha is export = 0x1000dc2; |
MELEZHIK/Sparky…/README.md :119: |
ssh_private_key: /path/to/ssh_private/key.pem |
MELEZHIK/Sparky…/README.md :120: |
ssh_user: sparky |
MELEZHIK/Sparky…/sparky-runner.pl6 :102: |
if %sparrowdo-config<ssh_user> { |
MELEZHIK/Sparky…/sparky-runner.pl6 :103: |
$sparrowdo-run ~= " --ssh_user=" ~ %sparrowdo-config<ssh_user>; |
MELEZHIK/Sparky…/sparky-runner.pl6 :106: |
if %sparrowdo-config<ssh_private_key> { |
MELEZHIK/Sparky…/sparky-runner.pl6 :107: |
$sparrowdo-run ~= " --ssh_private_key=" ~ %sparrowdo-config<ssh_private_key>; |
MELEZHIK/Sparky…/sparky-runner.pl6 :110: |
if %sparrowdo-config<ssh_port> { |
MELEZHIK/Sparky…/sparky-runner.pl6 :111: |
$sparrowdo-run ~= " --ssh_port=" ~ %sparrowdo-config<ssh_port>; |
MELEZHIK/Sparrowdo…/Changes.md :55: |
* git-scm may accept ssh key, thanks to @spigell |
MELEZHIK/Sparrowdo…/Changes.md :194: |
* a lot of improvements for bash/ssh/scp core dsl functions |
MELEZHIK/Sparrowdo…/Changes.md :198: |
* core-dsl/ssh - refactoring |
MELEZHIK/Sparrowdo…/Changes.md :202: |
* core-dsl/ssh - fix documentation issues / add `create` parameter |
MELEZHIK/Sparrowdo…/Changes.md :206: |
* core-dsl/ssh - explicit exit at the end of ssh command |
MELEZHIK/Sparrowdo…/Changes.md :211: |
* core-dsl/ssh function added |
MELEZHIK/Sparrowdo…/README.md :167: |
Sparrowdo acts over ssh invoking sparrow client with input json data generated |
MELEZHIK/Sparrowdo…/README.md :197: |
An assumption is made that ssh user you run `sparrowdo` with ( see `--ssh_user` |
MELEZHIK/Sparrowdo…/README.md :200: |
* ssh passwordless access on the remote host |
MELEZHIK/Sparrowdo…/README.md :262: |
## --ssh\_user |
MELEZHIK/Sparrowdo…/README.md :264: |
Sets user for the ssh connection to the remote host. |
MELEZHIK/Sparrowdo…/README.md :273: |
You must install `sshpass` to use this feature. |
MELEZHIK/Sparrowdo…/README.md :275: |
## --ssh\_private\_key |
MELEZHIK/Sparrowdo…/README.md :280: |
Is equal to `-i` parameter of ssh client. |
MELEZHIK/Sparrowdo…/README.md :282: |
## --ssh\_port |
MELEZHIK/Sparrowdo…/README.md :284: |
Sets ssh port for the ssh connection to remote host. Default value is `22`. |
MELEZHIK/Sparrowdo…/README.md :295: |
If set to true - do not initiate ssh command under `sudo`, just as is. Default |
MELEZHIK/Sparrowdo…/README.md :414: |
Export ssh configuration from vagrant host and run sparrowdo against it. |
MELEZHIK/Sparrowdo…/README.md :419: |
# exporting ssh configuration for "current" vagrant machine |
MELEZHIK/Sparrowdo…/README.md :421: |
$ sparrowdo --vagrant --vagrant_id=6951606 # exporting ssh configuration |
MELEZHIK/Sparrowdo…/sparrowdo :28: |
Str :$ssh_user, |
MELEZHIK/Sparrowdo…/sparrowdo :29: |
Str :$ssh_private_key, |
MELEZHIK/Sparrowdo…/sparrowdo :30: |
Int :$ssh_port = 22, |
MELEZHIK/Sparrowdo…/sparrowdo :133: |
SshPort => $ssh_port, |
MELEZHIK/Sparrowdo…/sparrowdo :134: |
SshUser => $ssh_user, |
MELEZHIK/Sparrowdo…/sparrowdo :135: |
SshPrivateKey => $ssh_private_key, |
MELEZHIK/Sparrowdo…/sparrowdo :153: |
"exporting ssh configuration from vagrant machine (id $vagrant_id)", |
MELEZHIK/Sparrowdo…/sparrowdo :158: |
shell "vagrant ssh-config $vagrant_id --host vagrant > $sparrowdo-cache/vagrant/.vagrant_ssh_config"; |
MELEZHIK/Sparrowdo…/sparrowdo :163: |
"exporting vagrant ssh configuration from current directory", |
MELEZHIK/Sparrowdo…/sparrowdo :168: |
shell "vagrant ssh-config --host vagrant > $sparrowdo-cache/vagrant/.vagrant_ssh_config"; |
MELEZHIK/Sparrowdo…/sparrowdo :171: |
ssh_shell "rm -rf $sparrow_root/sparrowdo-cache && mkdir -m 777 -p $sparrow_root/sparrowdo-cache"; |
MELEZHIK/Sparrowdo…/sparrowdo :184: |
ssh_shell "perl -MSparrow -e 1 2>/dev/null || ( echo Sparrow is not installed. Run sparrowdo --bootstrap to install; exit 1 ) && \\ |
MELEZHIK/Sparrowdo…/sparrowdo :242: |
ssh_shell "mkdir -p $sparrow_root && mv $sparrow_root/sparrow-cache/sparrow.list $sparrow_root"; |
MELEZHIK/Sparrowdo…/sparrowdo :250: |
ssh_shell "mkdir -p $sparrow_root && touch $sparrow_root/sparrow.list"; |
MELEZHIK/Sparrowdo…/sparrowdo :258: |
ssh_shell "echo repo: $repo_val > $sparrow_root/sparrow-cache/sparrow.yaml"; |
MELEZHIK/Sparrowdo…/sparrowdo :264: |
ssh_shell 'sparrow index update' unless input_params('NoIndexUpdate'); |
MELEZHIK/Sparrowdo…/sparrowdo :269: |
ssh_shell "sparrow plg install " ~ @p[0]; |
MELEZHIK/Sparrowdo…/sparrowdo :273: |
ssh_shell "sparrow plg run " ~ @p[0] ~ ' --args-file ' ~ "$sparrow_root/sparrow-cache/plugins/" ~ "@p[0].args"; |
MELEZHIK/Sparrowdo…/sparrowdo :276: |
ssh_shell "sparrow plg run " ~ @p[0]; |
MELEZHIK/Sparrowdo…/sparrowdo :297: |
ssh_shell "sparrow box run $sparrow_root/sparrow-cache/task-box.json --mode quiet --purge-cache"; |
MELEZHIK/Sparrowdo…/sparrowdo :299: |
ssh_shell "sparrow box run $sparrow_root/sparrow-cache/task-box.json --mode quiet"; |
MELEZHIK/Sparrowdo…/sparrowdo :305: |
sub ssh_shell ( $cmd ) { |
MELEZHIK/Sparrowdo…/sparrowdo :327: |
my $ssh_cmd; |
MELEZHIK/Sparrowdo…/sparrowdo :331: |
$ssh_cmd = ( input_params('NoSudo') ) ?? "sh -c '" !! "sudo sh -c '"; |
MELEZHIK/Sparrowdo…/sparrowdo :332: |
$ssh_cmd ~= ~ ( join ' ; ', @bash_commands ) ~ "'"; |
MELEZHIK/Sparrowdo…/sparrowdo :336: |
$ssh_cmd = "docker exec -i " ~ input_params('Docker') ~ ' '; |
MELEZHIK/Sparrowdo…/sparrowdo :339: |
$ssh_cmd ~= "sh -c '" ~ ( join ' ; ', @bash_commands ) ~ "'"; |
MELEZHIK/Sparrowdo…/sparrowdo :341: |
$ssh_cmd ~= "sudo sh -c '" ~ ( join ' ; ', @bash_commands ) ~ "'"; |
MELEZHIK/Sparrowdo…/sparrowdo :347: |
$ssh_cmd = 'sshpass -p ' ~ input_params('Password'); |
MELEZHIK/Sparrowdo…/sparrowdo :348: |
$ssh_cmd ~= ' ssh -o ConnectionAttempts=1 -o ConnectTimeout=5'; |
MELEZHIK/Sparrowdo…/sparrowdo :350: |
$ssh_cmd = 'sshpass -e ssh -o ConnectionAttempts=1 -o ConnectTimeout=5'; |
MELEZHIK/Sparrowdo…/sparrowdo :352: |
$ssh_cmd = 'ssh -o ConnectionAttempts=1 -o ConnectTimeout=5'; |
MELEZHIK/Sparrowdo…/sparrowdo :355: |
$ssh_cmd ~= ' -F ' ~ "$sparrowdo-cache/vagrant/.vagrant_ssh_config" if ( input_params('Vagrant') or input_params('VagrantId') ); |
MELEZHIK/Sparrowdo…/sparrowdo :357: |
$ssh_cmd ~= ' -p ' ~ input_params('SshPort') unless ( input_params('Vagrant') or input_params('VagrantId') ); |
MELEZHIK/Sparrowdo…/sparrowdo :359: |
$ssh_cmd ~= ' -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -tt'; |
MELEZHIK/Sparrowdo…/sparrowdo :361: |
$ssh_cmd ~= ' -q' unless input_params('Verbose'); |
MELEZHIK/Sparrowdo…/sparrowdo :363: |
$ssh_cmd ~= ' -i ' ~ input_params('SshPrivateKey') if input_params('SshPrivateKey'); |
MELEZHIK/Sparrowdo…/sparrowdo :365: |
my $ssh_host = ( input_params('Vagrant') or input_params('VagrantId') ) ?? 'vagrant' !! input_params('Host'); |
MELEZHIK/Sparrowdo…/sparrowdo :368: |
$ssh_cmd ~= ' ' ~ input_params('SshUser') ~ '@' ~ $ssh_host ~ ' '; |
MELEZHIK/Sparrowdo…/sparrowdo :370: |
$ssh_cmd ~= ' ' ~ $ssh_host ~ ' '; |
MELEZHIK/Sparrowdo…/sparrowdo :373: |
$ssh_cmd ~= ( input_params('NoSudo') ) ?? " \"sh -c '" !! " \"sudo sh -c '"; |
MELEZHIK/Sparrowdo…/sparrowdo :375: |
$ssh_cmd ~= ~ ( join ' ; ', @bash_commands ) ~ "'\""; |
MELEZHIK/Sparrowdo…/sparrowdo :377: |
$ssh_cmd ~= ' 2>/dev/null' unless input_params('Verbose'); |
MELEZHIK/Sparrowdo…/sparrowdo :381: |
term-out( $ssh_cmd, input_params('NoColor'), %( colors => 'bold green') ) if input_params('Verbose'); |
MELEZHIK/Sparrowdo…/sparrowdo :383: |
shell $ssh_cmd; |
MELEZHIK/Sparrowdo…/sparrowdo :398: |
my $ssh_host_term; |
MELEZHIK/Sparrowdo…/sparrowdo :400: |
my $ssh_host = ( input_params('Vagrant') or input_params('VagrantId') ) ?? 'vagrant' !! input_params('Host'); |
MELEZHIK/Sparrowdo…/sparrowdo :405: |
$ssh_host_term = input_params('SshUser') ~ '@' ~ $ssh_host; |
MELEZHIK/Sparrowdo…/sparrowdo :407: |
$ssh_host_term = $ssh_host; |
MELEZHIK/Sparrowdo…/sparrowdo :436: |
$scp_params ~= ' -F ' ~ "$sparrowdo-cache/vagrant/.vagrant_ssh_config" if ( input_params('Vagrant') or input_params('VagrantId') ); |
MELEZHIK/Sparrowdo…/sparrowdo :446: |
$scp_command = 'sshpass -p ' ~ input_params('Password') ~ ' '; |
MELEZHIK/Sparrowdo…/sparrowdo :449: |
$scp_command = 'sshpass -e'; |
MELEZHIK/Sparrowdo…/sparrowdo :456: |
$scp_command ~= ' ' ~ $ssh_host_term ~ ':' ~ $file ~ ' ' ~ $dest ; |
MELEZHIK/Sparrowdo…/sparrowdo :458: |
$scp_command ~= ' ' ~ $file ~ ' ' ~ $ssh_host_term ~ ':' ~ $dest; |
MELEZHIK/Sparrowdo…/sparrowdo :580: |
ssh_shell "sh $sparrow_root/sparrowdo-cache/bootstrap.sh"; |
MELEZHIK/Sparrowdo…/sparrowind :191: |
my $ssh_cmd; |
MELEZHIK/Sparrowdo…/sparrowind :194: |
$ssh_cmd ~= ~ ( join ' && ', @bash_commands ); |
MELEZHIK/Sparrowdo…/sparrowind :197: |
$ssh_cmd !! |
MELEZHIK/Sparrowdo…/sparrowind :198: |
colored($ssh_cmd, 'bold green') if input_params('Verbose'); |
MELEZHIK/Sparrowdo…/sparrowind :200: |
shell $ssh_cmd; |
MELEZHIK/Sparrowdo…/core-dsl.md :20: |
* Ssh commands |
MELEZHIK/Sparrowdo…/core-dsl.md :381: |
| git-scm | checkout source from git repository | `ssh($source,[%args])` | |
MELEZHIK/Sparrowdo…/core-dsl.md :395: |
# Specify ssh key for authentification |
MELEZHIK/Sparrowdo…/core-dsl.md :396: |
git-scm 'ssh://git@github.com/melezhik/sparrow.git', %( to => '/tmp/foo', ssh-key => '/tmp/my.key' ); |
MELEZHIK/Sparrowdo…/core-dsl.md :398: |
# ssh authentification with unknown server key |
MELEZHIK/Sparrowdo…/core-dsl.md :399: |
git-scm 'ssh://git@github.com/melezhik/sparrow.git', %( to => '/tmp/foo', ssh-key => '/tmp/my.key', accept-hostkey => True ); |
MELEZHIK/Sparrowdo…/core-dsl.md :413: |
This function executes ssh commands. |
MELEZHIK/Sparrowdo…/core-dsl.md :417: |
| ssh | execute ssh commands | `ssh($command,%args)` | |
MELEZHIK/Sparrowdo…/core-dsl.md :418: |
| ssh | alias for `ssh` with command set via %args | `ssh(%args)` | |
MELEZHIK/Sparrowdo…/core-dsl.md :422: |
# ssh to 192.168.0.1 and execute 'uptime' |
MELEZHIK/Sparrowdo…/core-dsl.md :424: |
ssh 'uptime', %( host => '192.168.0.1' ) |
MELEZHIK/Sparrowdo…/core-dsl.md :427: |
ssh 'uptime', %( host => '192.168.0.1' , description => "how old are you?" ); |
MELEZHIK/Sparrowdo…/core-dsl.md :430: |
ssh 'uptime', %( |
MELEZHIK/Sparrowdo…/core-dsl.md :435: |
# and ssh_key |
MELEZHIK/Sparrowdo…/core-dsl.md :436: |
ssh 'uptime', %( |
MELEZHIK/Sparrowdo…/core-dsl.md :439: |
ssh-key => 'keys/id_rsa' |
MELEZHIK/Sparrowdo…/core-dsl.md :444: |
ssh q:to/CMD/, %( host => '192.168.0.1', user => 'old_dog'); |
MELEZHIK/Sparrowdo…/core-dsl.md :451: |
# prevent from running ssh command next time if file $create exist: |
MELEZHIK/Sparrowdo…/core-dsl.md :452: |
ssh "run-me", %( host => '192.168.0.1' , create => '/do/not/run/twice' ) |
MELEZHIK/Sparrowdo…/core-dsl.md :473: |
# set ssh private key and user id |
MELEZHIK/Sparrowdo…/core-dsl.md :478: |
ssh-key => 'keys/id_rsa' |
MELEZHIK/Sparrowdo…/core-dsl.md :508: |
# ensure existence by PID taken from /var/run/sshd.pid |
MELEZHIK/Sparrowdo…/core-dsl.md :509: |
proc-exists 'sshd'; |
MELEZHIK/Sparrowdo…/core-dsl.md :512: |
proc-exists-by-footprint 'sshd', 'sshd\s+-D'; |
MELEZHIK/Sparrowdo…/core-dsl.md :515: |
proc-exists-by-pid 'sshd', '/var/run/sshd.pid'; |
MELEZHIK/Sparrowdo…/core-dsl.md :528: |
Use `ssh host` command line parameter as URL: |
MELEZHIK/Sparrowdo…/sparrowfile :1: |
package-install "openssh-server"; |
MELEZHIK/Sparrowdo…/sparrowfile :5: |
package-install "openssh-clients"; |
MELEZHIK/Sparrowdo…/sparrowfile :10: |
service-start "ssh"; |
MELEZHIK/Sparrowdo…/sparrowfile :12: |
service-start "sshd"; |
MELEZHIK/Sparrowdo…/sparrowfile :15: |
my $key = "/root/.ssh/id_rsa"; |
MELEZHIK/Sparrowdo…/sparrowfile :17: |
file-delete "/root/.ssh/id_rsa.pub"; |
MELEZHIK/Sparrowdo…/sparrowfile :18: |
file-delete '/root/.ssh/id_rsa'; |
MELEZHIK/Sparrowdo…/sparrowfile :19: |
file-delete '/root/.ssh/authorized_keys'; |
MELEZHIK/Sparrowdo…/sparrowfile :21: |
bash 'cat /dev/zero | ssh-keygen -q -N ""'; |
MELEZHIK/Sparrowdo…/sparrowfile :22: |
bash 'cat /root/.ssh/id_rsa.pub > /root/.ssh/authorized_keys'; |
MELEZHIK/Sparrowdo…/sparrowfile :25: |
ssh 'rm -rf /tmp/test-ssh-scp && mkdir -p /tmp/test-ssh-scp', %( |
MELEZHIK/Sparrowdo…/sparrowfile :33: |
host => "127.0.0.1:/tmp/test-ssh-scp", |
MELEZHIK/Sparrowdo…/sparrowfile :36: |
bash 'cat /tmp/test-ssh-scp/hello.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :42: |
host => "127.0.0.1:/tmp/test-ssh-scp", |
MELEZHIK/Sparrowdo…/sparrowfile :45: |
bash 'cat /tmp/test-ssh-scp/hello2.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :49: |
directory-delete '/tmp/test-ssh-scp-pull'; |
MELEZHIK/Sparrowdo…/sparrowfile :50: |
directory-create '/tmp/test-ssh-scp-pull'; |
MELEZHIK/Sparrowdo…/sparrowfile :53: |
data => '/tmp/test-ssh-scp-pull', |
MELEZHIK/Sparrowdo…/sparrowfile :54: |
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt", |
MELEZHIK/Sparrowdo…/sparrowfile :58: |
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :62: |
bash 'rm -rf /tmp/test-ssh-scp-pull/*.txt'; |
MELEZHIK/Sparrowdo…/sparrowfile :65: |
data => '/tmp/test-ssh-scp-pull', |
MELEZHIK/Sparrowdo…/sparrowfile :66: |
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt 127.0.0.1:/tmp/test-ssh-scp/hello2.txt", |
MELEZHIK/Sparrowdo…/sparrowfile :70: |
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :74: |
bash 'cat /tmp/test-ssh-scp-pull/hello2.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :78: |
bash 'rm -rf /tmp/test-ssh-scp-pull/*.txt'; |
MELEZHIK/Sparrowdo…/sparrowfile :81: |
data => '/tmp/test-ssh-scp-pull', |
MELEZHIK/Sparrowdo…/sparrowfile :82: |
host => "127.0.0.1:/tmp/test-ssh-scp/hello.txt 127.0.0.1:/tmp/test-ssh-scp/hello2.txt", |
MELEZHIK/Sparrowdo…/sparrowfile :86: |
bash 'cat /tmp/test-ssh-scp-pull/hello.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :90: |
bash 'cat /tmp/test-ssh-scp-pull/hello2.txt', %( |
MELEZHIK/Sparrowdo…/sparrowfile :1: |
package-install "openssh-server"; |
MELEZHIK/Sparrowdo…/sparrowfile :5: |
package-install "openssh-clients"; |
MELEZHIK/Sparrowdo…/sparrowfile :11: |
service-start "ssh"; |
MELEZHIK/Sparrowdo…/sparrowfile :13: |
service-start "sshd"; |
MELEZHIK/Sparrowdo…/sparrowfile :16: |
my $key = "/root/.ssh/id_rsa"; |
MELEZHIK/Sparrowdo…/sparrowfile :18: |
file-delete "/root/.ssh/id_rsa.pub"; |
MELEZHIK/Sparrowdo…/sparrowfile :19: |
file-delete '/root/.ssh/id_rsa'; |
MELEZHIK/Sparrowdo…/sparrowfile :20: |
file-delete '/root/.ssh/authorized_keys'; |
MELEZHIK/Sparrowdo…/sparrowfile :22: |
bash 'cat /dev/zero | ssh-keygen -q -N ""'; |
MELEZHIK/Sparrowdo…/sparrowfile :23: |
bash 'cat /root/.ssh/id_rsa.pub > /root/.ssh/authorized_keys'; |
MELEZHIK/Sparrowdo…/sparrowfile :27: |
ssh q:to/HERE/, %( host => "127.0.0.1" , user => 'root' ); |
MELEZHIK/Sparrowdo…/sparrowfile :33: |
ssh 'uptime', %( host => "127.0.0.1" ); |
MELEZHIK/Sparrowdo…/Git.pm6 :16: |
my @git-ssh-opts = Array.new; |
MELEZHIK/Sparrowdo…/Git.pm6 :17: |
@git-ssh-opts.push: 'ssh'; |
MELEZHIK/Sparrowdo…/Git.pm6 :18: |
@git-ssh-opts.push: "-i %args<ssh-key>" if %args<ssh-key>; |
MELEZHIK/Sparrowdo…/Git.pm6 :19: |
@git-ssh-opts.push: "-o StrictHostKeyChecking=no" if %args<accept-hostkey> == True; |
MELEZHIK/Sparrowdo…/Git.pm6 :25: |
%bash-args<envvars><GIT_SSH_COMMAND> = '"' ~ ( join ' ', @git-ssh-opts ) ~ '"'; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :10: |
multi sub ssh ( %args ) is export { |
MELEZHIK/Sparrowdo…/Ssh.pm6 :11: |
ssh %args<command>, %args; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :14: |
multi sub ssh ( $command, %args ) is export { |
MELEZHIK/Sparrowdo…/Ssh.pm6 :18: |
if %args<ssh-key>:exists { |
MELEZHIK/Sparrowdo…/Ssh.pm6 :19: |
file '/opt/sparrow/.cache/ssh-key', %( |
MELEZHIK/Sparrowdo…/Ssh.pm6 :20: |
content => ( slurp %args<ssh-key> ), |
MELEZHIK/Sparrowdo…/Ssh.pm6 :25: |
my $ssh-host-term = %args<user>:exists ?? %args<user> ~ '@' ~ %args<host> !! %args<host>; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :28: |
my $ssh-run-cmd = 'ssh -o ConnectionAttempts=1 -o ConnectTimeout=10'; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :30: |
$ssh-run-cmd ~= ' -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -tt'; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :32: |
$ssh-run-cmd ~= ' -q' ; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :34: |
$ssh-run-cmd ~= ' -i /opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :36: |
$ssh-run-cmd ~= " $ssh-host-term '$command'"; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :41: |
$bash-cmd = "if ! test -f %args<create> ; then set -x; $ssh-run-cmd ; else echo skip due to %args<create> exists; fi" |
MELEZHIK/Sparrowdo…/Ssh.pm6 :43: |
$bash-cmd = "set -x; $ssh-run-cmd" |
MELEZHIK/Sparrowdo…/Ssh.pm6 :47: |
description => %args<description> || "remote command on $ssh-host-term", |
MELEZHIK/Sparrowdo…/Ssh.pm6 :51: |
file-delete '/opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :61: |
if %args<ssh-key>:exists { |
MELEZHIK/Sparrowdo…/Ssh.pm6 :62: |
file '/opt/sparrow/.cache/ssh-key', %( |
MELEZHIK/Sparrowdo…/Ssh.pm6 :63: |
content => ( slurp %args<ssh-key> ), |
MELEZHIK/Sparrowdo…/Ssh.pm6 :75: |
$scp-run-cmd ~= ' -i /opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :77: |
my $ssh-host-term; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :81: |
for %args<host>.words -> $w { $ssh-host-term ~= ' ' ~ %args<user> ~ '@' ~ $w } |
MELEZHIK/Sparrowdo…/Ssh.pm6 :83: |
$ssh-host-term = %args<host> |
MELEZHIK/Sparrowdo…/Ssh.pm6 :86: |
$scp-run-cmd ~= " $ssh-host-term %args<data>"; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :90: |
$ssh-host-term = %args<user>:exists ?? %args<user> ~ '@' ~ %args<host> !! %args<host>; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :92: |
$scp-run-cmd ~= " %args<data> $ssh-host-term"; |
MELEZHIK/Sparrowdo…/Ssh.pm6 :110: |
file-delete '/opt/sparrow/.cache/ssh-key' if %args<ssh-key>:exists; |
MELEZHIK/Sparrowdo…/sparrowfile.minoca :10: |
service-enable "sshd"; |
MELEZHIK/Sparrowdo…/suite.yaml :14: |
- ssh |
MELEZHIK/Sparrowdo…/suite.yaml :32: |
- ssh |
MELEZHIK/Sparrowdo…/suite.yaml :57: |
minoca: "--no_sudo --host=127.0.0.1 --ssh_user=root --ssh_port=2222 --format=production" |
MELEZHIK/Sparrowform…/README.md :13: |
Currently only ***ssh accessed instances with public IPs are supported*** ( aws ec2 / google compute instances with public IPs ). |
MELEZHIK/Sparrowform…/README.md :47: |
## Handling ssh connections |
MELEZHIK/Sparrowform…/README.md :49: |
You may pass ssh connection parameters by specifying sparrowdo cli parameters: |
MELEZHIK/Sparrowform…/README.md :51: |
$ sparrowform --ssh_user=ec2-user --ssh_private_key=/path/to/ssh.key |
MELEZHIK/Sparrowform…/so-45177941.md :6: |
$ sparrowform --ssh_user=my-user --ssh_private_key=/path/to/key # do provision |
MELEZHIK/Sparrowform…/so-45177941.md :8: |
Obviously you are free not to run `sparrowform` in subsequent runs. It does it's job (install ansible related dependencies, that is it). Then you drop your initial `ssh_private_key` and goes with new private key ( ansible related I guess ?) |
MLDEVINE/Async-Command…/Multi.md :76: |
%command<ctools> = <ssh ctools uname -n>; |
MLDEVINE/Async-Command…/Multi.md :77: |
%command<jtools> = <ssh jtools notarealcommand>; |
MLDEVINE/Async-Command…/Multi.md :84: |
command => ["ssh", "ctools", "uname", "-n"], |
MLDEVINE/Async-Command…/Multi.md :92: |
command => ["ssh", "jtools", "notarealcommand"], |
SKAJI/App-Mi6…/Mi6.pm6 :300: |
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / { |
UGEXE/zef…/git.pm6 :14: |
return True if $uri.scheme.lc.starts-with('http' | 'ssh') && $uri.path.ends-with('.git' || '.git/'); |
UGEXE/zef…/URI.pm6 :164: |
elsif $id ~~ /^(.+?) '@' (.+?) ':' (.*)/ and URI.parse("ssh\:\/\/$0\@$1\/$2", :rule<URI>) -> $m { |
WARRINGD/Font-AFM…/glyphlist.txt :2337: |
issharbengali;09FA |
WARRINGD/Font-AFM…/glyphlist.txt :3619: |
solidusshortoverlaycmb;0337 |
WARRINGD/Font-AFM…/glyphlist.txt :3633: |
squarediagonalcrosshatchfill;25A9 |
WARRINGD/Font-AFM…/glyphlist.txt :3644: |
squareorthogonalcrosshatchfill;25A6 |
WARRINGD/HTML-Canvas…/README.md :256: |
my \image = HTML::Canvas::Image.open("t/images/crosshair-100x100.jpg"); |
WARRINGD/HTML-Canvas…/cairo-transforms.t :48: |
my \image = HTML::Canvas::Image.open("t/images/crosshair-100x100.png"); |
WARRINGD/HTML-Canvas…/images.t :11: |
my \jpg-image = HTML::Canvas::Image.open("t/images/crosshair-100x100.jpg"); |
WARRINGD/HTML-Canvas…/images.t :12: |
my \png-image = HTML::Canvas::Image.open("t/images/crosshair-100x100.png"); |
WARRINGD/PDF-ISO_32000…/Link_annotation_additional.pm6 :43: |
If this entry is not present or the conforming reader does not recognize it, the region specified by the Rect entry is used. QuadPointsshall be ignored if any coordinate in the array lies outside the region specified by Rect. |
WARRINGD/PDF-ISO_32000…/Stream_common.pm6 :28: |
- (Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter and that f… |
WARRINGD/PDF-ISO_32000…/Link_annotation_additional_entries.html :211: |
If this entry is not present or the conforming reader does not recognize it, the region specified by the Rect entry should be used. QuadPointsshall be ignored if any coordinate in the array lies outside the region specified by Rect. |
WARRINGD/PDF-ISO_32000…/Stream_common_entries.html :87: |
(Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter … |
WARRINGD/PDF-ISO_32000…/Link_annotation_additional_entries.json :38: |
"(Optional; PDF 1.6) An array of 8 × n numbers specifying the coordinates of n quadrilaterals in default user space that comprise the region … |
WARRINGD/PDF-ISO_32000…/Stream_common_entries.json :23: |
"(Optional) A parameter dictionary or an array of such dictionaries, used by the filters specified by Filter. If there is only one filter and… |
CurtTilmes/perl6-libcurl…/versioninfo.pl6 :34: |
say $v.libssh-version; |
CurtTilmes/perl6-libcurl…/EasyHandle.pm6 :663: |
has Str $.libssh-version; |
MattOates/Text--Emotion…/AFINN-111.txt :184: |
asshole -4 |
MattOates/Text--Emotion…/Scorer.pm :6: |
has %dictionary = split /<[,;]>/, "abandon,-2;abandoned,-2;abandons,-2;abducted,-2;abduction,-2;abductions,-2;abhor,-3;abhorred,-3;abhorrent,-3;a… |
YellowApple/p6-GLFW…/Cursor.pm6 :11: |
constant Crosshair = 0x00036003; |
atweiden/config-toml…/ssh-ed25519.pub :1: |
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZFvfg/A7kwROAKeTlhkkwhYgKaJqNTnQRgV+Ii0xPa hello@toml |
atweiden/config-toml…/01-primitives.t :246: |
# t/data/ssh-ed25519 |
atweiden/config-toml…/01-primitives.t :247: |
my Str $ssh-ed25519-perl = slurp('t/data/ssh-ed25519').trim; |
atweiden/config-toml…/01-primitives.t :248: |
my Str $ssh-ed25519-toml = Q:to/EOF/.trim; |
atweiden/config-toml…/01-primitives.t :259: |
# t/data/ssh-ed25519.pub |
atweiden/config-toml…/01-primitives.t :260: |
my Str $ssh-ed25519-pub-perl = slurp('t/data/ssh-ed25519.pub').trim; |
atweiden/config-toml…/01-primitives.t :261: |
my Str $ssh-ed25519-pub-toml = Q:to/EOF/.trim; |
atweiden/config-toml…/01-primitives.t :263: |
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMZFvfg/A7kwROAKeTlhkkwhYgKaJqNTnQRgV+Ii0xPa hello@toml''' |
atweiden/config-toml…/01-primitives.t :273: |
my $match-ssh-ed25519-toml = |
atweiden/config-toml…/01-primitives.t :275: |
$ssh-ed25519-toml, |
atweiden/config-toml…/01-primitives.t :279: |
my $match-ssh-ed25519-pub-toml = |
atweiden/config-toml…/01-primitives.t :281: |
$ssh-ed25519-pub-toml, |
atweiden/config-toml…/01-primitives.t :300: |
$match-ssh-ed25519-toml.WHAT, |
atweiden/config-toml…/01-primitives.t :303: |
♪ [Grammar.parse($ssh-ed25519-toml, :rule<string>)] - 11 of 142 |
atweiden/config-toml…/01-primitives.t :306: |
┃ Success ┃ (ssh-ed25519) successfully |
atweiden/config-toml…/01-primitives.t :313: |
$match-ssh-ed25519-pub-toml.WHAT, |
atweiden/config-toml…/01-primitives.t :316: |
♪ [Grammar.parse($ssh-ed25519-pub-toml, :rule<string>)] - 12 of 142 |
atweiden/config-toml…/01-primitives.t :319: |
┃ Success ┃ (ssh-ed25519.pub) successfully |
atweiden/config-toml…/01-primitives.t :339: |
$ssh-ed25519-perl ~~ $match-ssh-ed25519-toml.made, |
atweiden/config-toml…/01-primitives.t :344: |
┃ ┃ ∙ $ssh-ed25519-perl ~~ $match-ssh-ed25519-toml.made |
atweiden/config-toml…/01-primitives.t :352: |
$ssh-ed25519-pub-perl ~~ $match-ssh-ed25519-pub-toml.made, |
atweiden/config-toml…/01-primitives.t :357: |
┃ ┃ ∙ $ssh-ed25519-pub-perl ~~ |
atweiden/config-toml…/01-primitives.t :358: |
┃ Success ┃ $match-ssh-ed25519-pub-toml.made |
azawawi/farabi6…/codemirror.css :294: |
.CodeMirror-crosshair { cursor: crosshair; } |
azawawi/farabi6…/codemirror.js :4015: |
// Turn mouse into crosshair when Alt is held on Mac. |
azawawi/farabi6…/codemirror.js :4016: |
if (code == 18 && !/\bCodeMirror-crosshair\b/.test(cm.display.lineDiv.className)) |
azawawi/farabi6…/codemirror.js :4022: |
addClass(lineDiv, "CodeMirror-crosshair"); |
azawawi/farabi6…/codemirror.js :4026: |
rmClass(lineDiv, "CodeMirror-crosshair"); |
azawawi/farabi6…/css.js :556: |
"cross", "crosshair", "currentcolor", "cursive", "cyclic", "dashed", "decimal", |
azawawi/farabi6…/shell.js :35: |
'shopt shred source sort sleep ssh start stop su sudo tee telnet top ' + |
azawawi/farabi6…/icon.min.css :10: |
*/@font-face{font-family:Icons;src:url(../themes/default/assets/fonts/icons.eot);src:url(../themes/default/assets/fonts/icons.eot?#iefix) format('em… |
azawawi/farabi6…/semantic.min.css :11: |
@import 'https://fonts.googleapis.com/css?family=Lato:400,700,400italic,700italic\&subset=latin';\*,:after,:before{box-sizing:inherit}html{box-sizing:b… |
azawawi/perl6-gtk-scintilla…/LexJSON.cxx :343: |
context.Match("ssh://") || |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :59: |
StringSetHolder ssh; |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :60: |
ssh.sa.Insert(0, "Alpha"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :61: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :62: |
ssh.sa.Insert(0, "Beta"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :63: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :64: |
ssh.sa.Insert(0, "Cat"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :65: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :66: |
ssh.sa.Insert(1, "Dog"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :67: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :68: |
ssh.sa.Insert(0, "Elephant"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :69: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :70: |
ssh.sa.Insert(1, "Fox"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :71: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :72: |
ssh.sa.Insert(0, "Grass"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :73: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :74: |
ssh.sa.Insert(1, "Hat"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :75: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :76: |
ssh.sa.Delete(4); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :77: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :78: |
ssh.sa.Insert(0, "Indigo"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :79: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :80: |
ssh.sa.Insert(1, "Jackal"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :81: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :82: |
ssh.sa.Insert(0, "Kanga"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :83: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :84: |
ssh.sa.Insert(1, "Lion"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :85: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :86: |
ssh.sa.Insert(0, "Mango"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :87: |
REQUIRE(ssh.Check()); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :88: |
ssh.sa.Insert(1, "Neon"); |
azawawi/perl6-gtk-scintilla…/testSplitVector.cxx :89: |
REQUIRE(ssh.Check()); |
azawawi/perl6-net-curl…/sftpget.c :27: |
/* define this to switch off the use of ssh-agent in this program */ |
azawawi/perl6-net-curl…/sftpget.c :80: |
/* We activate ssh agent. For this to work you need |
azawawi/perl6-net-curl…/sftpget.c :81: |
to have ssh-agent running (type set | grep SSH_AGENT to check) or |
azawawi/perl6-net-curl…/NativeCall.pm6 :761: |
has Str $.libssh_version; # const char* libssh_version |
cosimo/perl6-facter…/ssh.rb :1: |
## ssh.rb |
cosimo/perl6-facter…/ssh.rb :16: |
["/etc/ssh","/usr/local/etc/ssh","/etc","/usr/local/etc"].each do |dir| |
cosimo/perl6-facter…/ssh.rb :17: |
{"SSHDSAKey" => "ssh_host_dsa_key.pub", "SSHRSAKey" => "ssh_host_rsa_key.pub"}.each do |name,file| |
fayland/perl6-WebService-GitHub…/search.response :96: |
"ssh_url": "git@github.com:chef-cookbooks/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :184: |
"ssh_url": "git@github.com:schacon/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :272: |
"ssh_url": "git@github.com:abaez/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :360: |
"ssh_url": "git@github.com:major/MySQLTuner-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :448: |
"ssh_url": "git@github.com:testafy/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :536: |
"ssh_url": "git@github.com:Perl/perl5.git", |
fayland/perl6-WebService-GitHub…/search.response :624: |
"ssh_url": "git@github.com:chromatic/modern_perl_book.git", |
fayland/perl6-WebService-GitHub…/search.response :712: |
"ssh_url": "git@github.com:libwww-perl/libwww-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :800: |
"ssh_url": "git@github.com:vim-perl/vim-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :888: |
"ssh_url": "git@github.com:hachiojipm/awesome-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :976: |
"ssh_url": "git@github.com:perlorg/perlweb.git", |
fayland/perl6-WebService-GitHub…/search.response :1064: |
"ssh_url": "git@github.com:gugod/App-perlbrew.git", |
fayland/perl6-WebService-GitHub…/search.response :1152: |
"ssh_url": "git@github.com:judofyr/perloku.git", |
fayland/perl6-WebService-GitHub…/search.response :1240: |
"ssh_url": "git@github.com:fglock/Perlito.git", |
fayland/perl6-WebService-GitHub…/search.response :1328: |
"ssh_url": "git@github.com:ANXS/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :1416: |
"ssh_url": "git@github.com:mongodb/mongo-perl-driver.git", |
fayland/perl6-WebService-GitHub…/search.response :1504: |
"ssh_url": "git@github.com:elastic/elasticsearch-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :1592: |
"ssh_url": "git@github.com:Perl-Critic/Perl-Critic.git", |
fayland/perl6-WebService-GitHub…/search.response :1680: |
"ssh_url": "git@github.com:goccy/perl-motion.git", |
fayland/perl6-WebService-GitHub…/search.response :1768: |
"ssh_url": "git@github.com:DataMonster/Perl.git", |
fayland/perl6-WebService-GitHub…/search.response :1856: |
"ssh_url": "git@github.com:adamziaja/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :1944: |
"ssh_url": "git@github.com:slimakuj/perl.git", |
fayland/perl6-WebService-GitHub…/search.response :2032: |
"ssh_url": "git@github.com:gbarr/perl-libnet.git", |
fayland/perl6-WebService-GitHub…/search.response :2120: |
"ssh_url": "git@github.com:miyagawa/heroku-buildpack-perl.git", |
fayland/perl6-WebService-GitHub…/search.response :2208: |
"ssh_url": "git@github.com:vmbrasseur/Perl_Companies.git", |
fayland/perl6-WebService-GitHub…/search.response :2296: |
"ssh_url": "git@github.com:PerlRedis/perl-redis.git", |
fayland/perl6-WebService-GitHub…/search.response :2384: |
"ssh_url": "git@github.com:typester/perldojo.git", |
fayland/perl6-WebService-GitHub…/search.response :2472: |
"ssh_url": "git@github.com:kasei/perlrdf.git", |
fayland/perl6-WebService-GitHub…/search.response :2560: |
"ssh_url": "git@github.com:hachi/Perlbal.git", |
fayland/perl6-WebService-GitHub…/search.response :2648: |
"ssh_url": "git@github.com:rafl/perlfaq.git", |
jnthn/p6-docker-file…/parse-complex.t :15: |
RUN apt-get update && apt-get install -y inotify-tools nginx apache2 openssh-server |
jnthn/p6-ssh-libssh…/.gitrepo :7: |
remote = https://github.com/jnthn/p6-ssh-libssh.git |
jnthn/p6-ssh-libssh…/Build.pm :8: |
# to have a libssh already. |
jnthn/p6-ssh-libssh…/Build.pm :11: |
my constant @files = "ssh.dll", "libeay32.dll", "msvcr110.dll"; |
jnthn/p6-ssh-libssh…/Build.pm :24: |
say 'Installing bundled libssh.'; |
jnthn/p6-ssh-libssh…/Build.pm :30: |
my $blob = LWP::Simple.get("http://www.p6c.org/\~jnthn/libssh/$file"); |
jnthn/p6-ssh-libssh…/META6.json :5: |
"description" : "Asynchronous binding for libssh; client-only and limited functionality so far.", |
jnthn/p6-ssh-libssh…/META6.json :14: |
"resources" : [ "ssh.dll", "libeay32.dll", "msvcr110.dll" ], |
jnthn/p6-ssh-libssh…/META6.json :15: |
"source-url" : "https://github.com/jnthn/p6-ssh-libssh.git" |
jnthn/p6-ssh-libssh…/README.md :21: |
On Linux, install libssh with your package manager to use this module. On |
jnthn/p6-ssh-libssh…/README.md :22: |
Windows, the installation of this module will download a pre-built libssh.dll, |
jnthn/p6-ssh-libssh…/forward.p6 :5: |
# perl6 examples/forward.p6 your.ssh.host youruser www.bash.org 80 8888 |
jnthn/p6-ssh-libssh…/reverse-forward.p6 :5: |
# perl6 examples/reverse-forward.p6 your.ssh.host youruser 8888 8080 |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :42: |
die X::SSH::LibSSH::Error.new(message => ssh_get_error($s)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :47: |
# We use libssh exclusively in non-blocking mode. A single event loop |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :48: |
# thread manages all interactions with libssh (that is, we only ever make |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :72: |
$!loop = ssh_event_new(); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :76: |
# work, then poll the libssh event loop and run any |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :81: |
ssh_event_dopoll($!loop, 20); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :103: |
ssh_event_add_session($!loop, $session)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :110: |
ssh_event_remove_session($!loop, $session)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :128: |
my $channel = ssh_channel_accept_forward($session, 0, $port-num); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :238: |
with $!session-handle = ssh_new() -> $s { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :239: |
ssh_set_blocking($s, 0); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :241: |
ssh_options_set_str($s, SSH_OPTIONS_HOST, $!host)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :243: |
ssh_options_set_int($s, SSH_OPTIONS_PORT, CArray[int32].new($!port))); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :245: |
ssh_options_set_str($s, SSH_OPTIONS_USER, $!user)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :248: |
ssh_options_set_int($s, SSH_OPTIONS_LOG_VERBOSITY, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :253: |
ssh_options_set_int($s, SSH_OPTIONS_TIMEOUT, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :257: |
my $outcome = error-check($s, ssh_connect($s)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :266: |
if error-check($s, ssh_connect($s)) == 0 { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :295: |
given SSHServerKnown(error-check($s, ssh_is_server_known($s))) { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :309: |
die "Unknown response from ssh_is_server_known"; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :326: |
ssh_get_pubkey_hash($!session-handle, $hash-buf)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :329: |
hash => ssh_get_hexa($hash-buf[0], $hash-len) |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :331: |
ssh_clean_pubkey_hash($hash-buf); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :342: |
ssh_write_knownhost($!session-handle)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :375: |
ssh_pki_import_privkey_file($_, $!private-key-file-password, Pointer, Pointer, $key-out)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :381: |
?? { ssh_userauth_publickey($s, Str, $key) } |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :382: |
!! { ssh_userauth_publickey_auto($s, Str, Str) }; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :385: |
ssh_key_free($key) with $key; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :394: |
ssh_key_free($key) with $key; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :400: |
ssh_key_free($key) with $key; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :411: |
ssh_key_free($key) with $key; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :436: |
my &auth-function = { ssh_userauth_password($s, Str, $!password) } |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :473: |
my $channel = ssh_channel_new($!session-handle); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :483: |
ssh_channel_open_session($channel)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :489: |
ssh_channel_request_pty_size($channel, $terminal, $cols, $rows)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :493: |
ssh_channel_request_shell($channel)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :496: |
if ssh_channel_is_open($channel) == 1 { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :532: |
my $channel = ssh_channel_new($!session-handle); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :535: |
ssh_channel_open_session($channel)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :542: |
ssh_channel_open_session($channel)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :571: |
ssh_channel_request_exec($channel, $command)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :578: |
ssh_channel_request_exec($channel, $command)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :604: |
my $channel = ssh_channel_new($!session-handle); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :607: |
ssh_channel_open_forward($channel, $remote-host, $remote-port, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :615: |
ssh_channel_open_forward($channel, $remote-host, $remote-port, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :652: |
ssh_channel_listen_forward($!session-handle, $bind, $remote-port, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :661: |
ssh_channel_listen_forward($!session-handle, $bind, $remote-port, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :690: |
# For SCP, the libssh async interface unfortunately does not work. |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :692: |
# what libssh does to implement it in terms of a reuqest channel. |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :819: |
ssh_disconnect($_); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :820: |
ssh_free($_); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :861: |
if ssh_channel_is_eof($!channel-handle) { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :869: |
my $nread = ssh_channel_read_nonblocking($!channel-handle, $buf, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :915: |
my uint $ws = ssh_channel_window_size($!channel-handle); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :920: |
ssh_channel_write($!channel-handle, $send-buf, $send)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :959: |
error-check($!session.session-handle, ssh_channel_send_eof($!channel-handle)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :977: |
my $exit = ssh_channel_get_exit_status($!channel-handle); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :1000: |
error-check('close a channel', ssh_channel_close($_)); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :1001: |
ssh_channel_free($_); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :1040: |
error-check('set logging callback', ssh_set_log_callback( |
jnthn/p6-ssh-libssh…/Raw.pm6 :5: |
sub libssh() { |
jnthn/p6-ssh-libssh…/Raw.pm6 :13: |
$windows-dep-path = extract-windows-library('ssh.dll'); |
jnthn/p6-ssh-libssh…/Raw.pm6 :19: |
'libssh.so.4' |
jnthn/p6-ssh-libssh…/Raw.pm6 :87: |
sub ssh_new() returns SSHSession is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :88: |
sub ssh_free(SSHSession) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :89: |
sub ssh_set_blocking(SSHSession, int32) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :90: |
sub ssh_options_set_int(SSHSession, int32, CArray[int32]) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :91: |
is symbol('ssh_options_set') is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :92: |
sub ssh_options_set_str(SSHSession, int32, Str) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :93: |
is symbol('ssh_options_set') is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :94: |
sub ssh_connect(SSHSession) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :95: |
sub ssh_disconnect(SSHSession) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :96: |
sub ssh_is_server_known(SSHSession) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :97: |
sub ssh_write_knownhost(SSHSession) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :98: |
sub ssh_get_pubkey_hash(SSHSession, CArray[Pointer]) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :100: |
sub ssh_get_hexa(Pointer, size_t) returns Str is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :101: |
sub ssh_clean_pubkey_hash(CArray[Pointer]) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :102: |
sub ssh_set_log_callback(& (int32, Str, Str, Pointer)) |
jnthn/p6-ssh-libssh…/Raw.pm6 :103: |
returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :114: |
sub ssh_userauth_publickey_auto(SSHSession, Str, Str) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :115: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :116: |
sub ssh_pki_import_privkey_file(Str, Str, Pointer, Pointer, CArray[SSHKey]) |
jnthn/p6-ssh-libssh…/Raw.pm6 :117: |
returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :118: |
sub ssh_userauth_publickey(SSHSession, Str, SSHKey) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :119: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :120: |
sub ssh_key_free(SSHKey) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :121: |
sub ssh_userauth_password(SSHSession, Str, Str) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :122: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :125: |
sub ssh_event_new() returns SSHEvent is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :126: |
sub ssh_event_free(SSHEvent) is native(&libssh) is export {*}; |
jnthn/p6-ssh-libssh…/Raw.pm6 :127: |
sub ssh_event_add_session(SSHEvent, SSHSession) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :128: |
sub ssh_event_remove_session(SSHEvent, SSHSession) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :129: |
sub ssh_event_dopoll(SSHEvent, int32) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :132: |
sub ssh_channel_new(SSHSession) returns SSHChannel is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :133: |
sub ssh_channel_free(SSHChannel) is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :134: |
sub ssh_channel_open_session(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :135: |
sub ssh_channel_is_open(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :136: |
sub ssh_channel_close(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :137: |
sub ssh_channel_request_exec(SSHChannel, Str) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :138: |
sub ssh_channel_request_pty(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :139: |
sub ssh_channel_request_pty_size(SSHChannel, Str, int32, int32) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :140: |
sub ssh_channel_change_pty_size(SSHChannel, int32, int32) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :141: |
sub ssh_channel_request_shell(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :142: |
sub ssh_channel_read_nonblocking(SSHChannel, Buf, uint32, int32) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :143: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :144: |
sub ssh_channel_is_eof(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :145: |
sub ssh_channel_get_exit_status(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :146: |
sub ssh_channel_window_size(SSHChannel) returns uint32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :147: |
sub ssh_channel_write(SSHChannel, Blob, uint32) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :148: |
sub ssh_channel_send_eof(SSHChannel) returns int32 is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :149: |
sub ssh_channel_open_forward(SSHChannel, Str, int32, Str, int32) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :150: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :151: |
sub ssh_channel_listen_forward(SSHSession, Str, int32, CArray[int32]) returns int32 |
jnthn/p6-ssh-libssh…/Raw.pm6 :152: |
is native(&libssh) is symbol('ssh_forward_listen') is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :153: |
sub ssh_channel_accept_forward(SSHSession, int32, CArray[int32]) returns SSHChannel |
jnthn/p6-ssh-libssh…/Raw.pm6 :154: |
is native(&libssh) is export {*} |
jnthn/p6-ssh-libssh…/Raw.pm6 :156: |
sub ssh_get_error(SSHSession) returns Str is symbol('ssh_get_error') |
jnthn/p6-ssh-libssh…/Raw.pm6 :157: |
is native(&libssh) is export {*} |
kalkin/Ddt…/Distribution.pm6 :237: |
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / { |
melezhik/perl6-sparrowdo-rvm…/.travis.yml :5: |
- cat /dev/zero | ssh-keygen -q -N "" |
melezhik/perl6-sparrowdo-rvm…/.travis.yml :6: |
- cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys |
melezhik/perl6-sparrowdo-rvm…/.travis.yml :7: |
- chmod og-wx ~/.ssh/authorized_keys |
noqisofon/p6-miroku…/Miroku.pm6 :320: |
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / { |
noqisofon/p6-miroku…/03-find-source-url.t :29: |
} elsif $url ~~ m/'ssh://git@' $<rest>=[.+] / { |
p6-css/CSS-Module-p6…/Metadata.pm :6: |
BEGIN our $property = ${:azimuth(${:default($["center", [{:keyw("center")},]]), :inherit, :synopsis("<angle> | [[ left-side | far-left | left | c… |
p6-css/CSS-Module-p6…/Grammar.pm :179: |
#| cursor: [ [<uri> ,]* [ auto | crosshair | default | pointer | move | e-resize | ne-resize | nw-resize | n-resize | se-resize | sw-resize | s-resize | w-resize | text | wait | help | progress ] ] |
p6-css/CSS-Module-p6…/Grammar.pm :181: |
rule expr-cursor {:i [ [ <uri> <op(',')> ]* [ [ auto | crosshair | default | pointer | move | e\-resize | ne\-resize | nw\-resize | n\-resize | se\-resize | sw\-resize | s\-resize | w\-resize | text | wait | help | progress ] & <keyw> ] ] } |
p6-css/CSS-Module-p6…/Metadata.pm :6: |
BEGIN our $property = ${:azimuth(${:default($["center", [{:keyw("center")},]]), :inherit, :synopsis("<angle> | [[ left-side | far-left | left | c… |
p6-css/CSS-Module-p6…/css21-properties.txt :37: |
'cursor' [ [<uri> ,]* [ auto | crosshair | default | pointer | move | e-resize | ne-resize | nw-resize | n-resize | se-resize | sw-resize | s-resize | w-resize | text | wait | help | progress ] ] | inherit auto yes visual, interactive |
p6-css/CSS-Properties-p6…/README.md :471: |
cursor | auto | Yes | | [ [\<uri\> ,]* [ auto \| crosshair \| default \| pointer \| move \| e-resize \| ne-resize \| nw-resize \| n-resize \| se-resize \| sw-resize \| s-resize \| w-resize \| text \| wait \| help \| progress ] ] |
p6-pdf/PDF-API6…/README.md :234: |
PDF::API6.open( "enc.pdf", :password<sshh!> ); |
p6-pdf/PDF-API6…/README.md :283: |
$pdf.encrypt( :owner-pass<ssh1>, :user-pass<abc>, :aes ); |
p6-pdf/PDF-p6…/README.md :361: |
To open an encrypted PDF document, specify either the user or owner password: `PDF.open( "enc.pdf", :password<ssh!>)` |
p6-pdf/PDF-p6…/README.md :363: |
A document can be encrypted using the `encrypt` method: `$pdf.encrypt( :owner-pass<ssh1>, :user-pass<abc>, :aes )` |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :13: |
my $owner-pass = 'ssh!'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :14: |
my $owner-pass = 'ssh!'; |
perl6-community-modules/uri…/DefaultPort.pm :11: |
ssh => 22, |
perl6/doc…/words.pws :174: |
classhow |
raydiak/Git-PurePerl…/Protocol.pm :32: |
when m{^'ssh://'((.*?)\@)?(.*?)(\/.*)} |
raydiak/Git-PurePerl…/SSH.pm :21: |
"ssh", $connect, |
samcv/URL-Find…/README.md :16: |
By default it will match domain names that use unicode characters such as http://правительство.рф. To only match ASCII domains use the :ascii option.… |
samcv/URL-Find…/README.md :29: |
Accepts a string and returns a list of URL's. Optionally you can specify a limit to the number of URL's returned, or whether you want to only match URL's with ASCII domain names: :ascii<1> Matches only http https ftp git and ssh schemes by default. To match any scheme, use :any<1> |
samcv/URL-Find…/Find.pm6 :11: |
only find http, https, ftp, git and ssh schemes, but you can specify `:any<1>` to match any schemes |
samcv/URL-Find…/Find.pm6 :15: |
my token protocol {:i [http|https|ftp|git|ssh] } |
samcv/URL-Find…/Find.pm6 :25: |
#| Matches only http https ftp git and ssh schemes by default. To match any scheme, use :any<1> |
slobo/Perl6-X11-Xlib-Raw…/keysym.pm6 :697: |
XK_ssharp => 0x00df, #= U+00DF LATIN SMALL LETTER SHARP S |
slobo/Perl6-X11-Xlib-Raw…/keysym.pm6 :2456: |
XK_Sinh_ssha => 0x1000dc2, #= U+0DC2 SINHALA MUURDHAJA SAYANNA |
spitsh/spitsh…/CHANGELOG.md :54: |
- **New Feature**: ssh support through new classes: |
spitsh/spitsh…/CHANGELOG.md :55: |
- `SSHd` with methods to start and interact with the sshd command |
spitsh/spitsh…/DigitalOcean.sp :99: |
constant @:ssh-keys = $:ssh-keypair.public-key.fingerprint(:algo<md5>); |
spitsh/spitsh…/DigitalOcean.sp :126: |
:@ssh-keys = @:ssh-keys, |
spitsh/spitsh…/DigitalOcean.sp :135: |
ssh_keys => @ssh-keys, |
spitsh/spitsh…/DigitalOcean.sp :143: |
static method create-ssh-seeded( |
spitsh/spitsh…/DigitalOcean.sp :148: |
:@ssh-keys = @:ssh-keys |
spitsh/spitsh…/DigitalOcean.sp :154: |
my $set-ssh-keys = eval( |
spitsh/spitsh…/DigitalOcean.sp :157: |
sshd => '/usr/sbin/sshd', # DO always has ssh installed |
spitsh/spitsh…/DigitalOcean.sp :160: |
$keydir.add('seed_ssh.pub').push: $seed-public-key; |
spitsh/spitsh…/DigitalOcean.sp :161: |
my SSH-keypair $seed-keys = $keydir.add('seed_ssh').push: $seed-private-key; |
spitsh/spitsh…/DigitalOcean.sp :167: |
:@ssh-keys, |
spitsh/spitsh…/DigitalOcean.sp :168: |
on-boot => $set-ssh-keys, |
spitsh/spitsh…/DigitalOcean.sp :183: |
or fatal "{$droplet.name}: ssh seeding failed: seed port $:seed-port never opened for", "\c[DROPLET]"; |
spitsh/spitsh…/DigitalOcean.sp :198: |
DO.request('GET', 'account/keys').ok.json<ssh_keys>.List-->List[JSON] |
spitsh/spitsh…/DigitalOcean.sp :204: |
.ok.json<ssh_key>; |
spitsh/spitsh…/DigitalOcean.sp :210: |
?? debug "ssh key $fingerprint already exists", "\c[WATER WAVE]" |
spitsh/spitsh…/DigitalOcean.sp :215: |
DO.request('GET', "account/keys/$fingerprint").ok.json<ssh_key>; |
spitsh/spitsh…/DigitalOcean.sp :267: |
method ssh-seed($shell)~ { |
spitsh/spitsh…/DigitalOcean.sp :268: |
$self.ipv4.ssh( |
spitsh/spitsh…/reserved.txt :588: |
ssh |
spitsh/spitsh…/reserved.txt :589: |
ssh-keygen |
spitsh/spitsh…/Host.sp :33: |
method ssh( |
spitsh/spitsh…/Host.sp :37: |
:$identity = $:ssh-identity-file, |
spitsh/spitsh…/Host.sp :43: |
my $ssh-host = "$user@$self"; |
spitsh/spitsh…/Host.sp :44: |
debug "Attempting ssh to $ssh-host:$port"; |
spitsh/spitsh…/Host.sp :45: |
# XXX: Until we figure out how to make the ssh connection wait |
spitsh/spitsh…/Host.sp :48: |
$:ssh !>warn($ssh-host) |
spitsh/spitsh…/Host.sp :54: |
"$ssh-host" sh |
spitsh/spitsh…/Host.sp :58: |
method ssh-keyscan(:$port = 22, :$type = 'rsa,ecdsa,ed25519', Bool :$debug) -->List[SSH-known-host] |
spitsh/spitsh…/Host.sp :60: |
$:ssh-keyscan !>debug |
spitsh/spitsh…/SSH.sp :1: |
constant Pkg $:Pkg-openssh-client = on { |
spitsh/spitsh…/SSH.sp :2: |
Alpine { 'openssh-client' } |
spitsh/spitsh…/SSH.sp :3: |
Debian { 'openssh-client' } |
spitsh/spitsh…/SSH.sp :4: |
RHEL { 'openssh-clients' } |
spitsh/spitsh…/SSH.sp :7: |
constant Cmd $:sshd is logged-as("\c[BLOWFISH]") = { |
spitsh/spitsh…/SSH.sp :9: |
Alpine { Pkg<openssh>.ensure-install } |
spitsh/spitsh…/SSH.sp :10: |
Any { Pkg<openssh-server>.ensure-install } |
spitsh/spitsh…/SSH.sp :12: |
Cmd<sshd>.path; |
spitsh/spitsh…/SSH.sp :15: |
constant Cmd $:ssh is logged-as("\c[BLOWFISH]") = on { |
spitsh/spitsh…/SSH.sp :17: |
Cmd<ssh> or |
spitsh/spitsh…/SSH.sp :18: |
$:Pkg-openssh-client.install && 'ssh'; |
spitsh/spitsh…/SSH.sp :20: |
Spit-Helper { 'ssh' } |
spitsh/spitsh…/SSH.sp :23: |
constant Cmd $:ssh-keygen = ($:ssh; 'ssh-keygen'); |
spitsh/spitsh…/SSH.sp :24: |
constant Cmd $:ssh-keyscan is logged-as("\c[BLOWFISH, KEY, RIGHT-POINTING MAGNIFYING GLASS]") = ($:ssh; 'ssh-keyscan'); |
spitsh/spitsh…/SSH.sp :25: |
constant $:ssh-known-hosts is export = $:HOME.add('.ssh').mkdir.add('known_hosts'); |
spitsh/spitsh…/SSH.sp :26: |
constant $:ssh-conf-dir = File</etc/ssh>; |
spitsh/spitsh…/SSH.sp :27: |
constant $:authorized_keys is export = $:HOME.add('.ssh').mkdir.add('authorized_keys'); |
spitsh/spitsh…/SSH.sp :36: |
when /^ssh-rsa$/ { 'rsa' } |
spitsh/spitsh…/SSH.sp :37: |
when /^ssh-dss$/ { 'dsa' } |
spitsh/spitsh…/SSH.sp :38: |
when /^ssh-ed25519$/ { 'ed25519' } |
spitsh/spitsh…/SSH.sp :49: |
$:ssh-keygen -lf- ("-E$_" if $algo) | |
spitsh/spitsh…/SSH.sp :68: |
method add { $:ssh-known-hosts.push: $self } |
spitsh/spitsh…/SSH.sp :83: |
${ $:ssh-keygen -yf $self >($self.public-key-file) !>error }; |
spitsh/spitsh…/SSH.sp :89: |
:$path = "$:HOME/.ssh/{Str.random}" |
spitsh/spitsh…/SSH.sp :93: |
$:ssh-keygen -q -N '' |
spitsh/spitsh…/SSH.sp :100: |
!! die "Unable to produce a ssh key pair at $path"; |
spitsh/spitsh…/SSH.sp :114: |
constant $:ssh-private-key; |
spitsh/spitsh…/SSH.sp :115: |
constant File $:ssh-identity-file = ( File.tmp.chmod(600).write("$_\n") if $:ssh-private-key ); |
spitsh/spitsh…/SSH.sp :116: |
constant SSH-keypair $:ssh-keypair = if $:ssh-identity-file { |
spitsh/spitsh…/SSH.sp :117: |
$:ssh-identity-file-->SSH-keypair.generate-public-key; |
spitsh/spitsh…/SSH.sp :118: |
$:ssh-identity-file; |
spitsh/spitsh…/SSH.sp :127: |
if $:os ~~ Debian { File</var/run/sshd>.mkdir } |
spitsh/spitsh…/SSH.sp :130: |
$:sshd >debug/warn ('-ddd' if $debug) -p $port -D |
spitsh/spitsh…/SSH.sp :135: |
static method generate-missing-keys ${ $:ssh-keygen -A >debug/warn } |
spitsh/spitsh…/SSH.sp :138: |
$:ssh-conf-dir.add("ssh_host_{$type}_key") |
spitsh/spitsh…/SSH.sp :152: |
$:ssh-conf-dir.add('sshd_config'); |
spitsh/spitsh…/harness.sp :1: |
constant @:run = <cli base packages commands transport json ssh http-client docker helper>; |
spitsh/spitsh…/harness.sp :37: |
if @:run.first('ssh') { |
spitsh/spitsh…/harness.sp :38: |
${@run 'spec/ssh'} |
spitsh/spitsh…/spit-helper.sp :11: |
ok ${$:ssh -V !>info}, 'ssh version'; |
spitsh/spitsh…/install.t :3: |
my $pkg1 = $:Pkg-openssh-client; |
spitsh/spitsh…/install.t :12: |
ok Cmd<ssh>, "$pkg1 commmand installed"; |
spitsh/spitsh…/basic.t :18: |
ok $:ssh-known-hosts.contains($server-pair.public-key), |
spitsh/spitsh…/basic.t :24: |
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server'; |
spitsh/spitsh…/basic.t :27: |
my $res = Host.local.ssh( |
spitsh/spitsh…/custom-server-keys.t :15: |
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server'; |
spitsh/spitsh…/custom-server-keys.t :17: |
my $res = Host.local.ssh( |
spitsh/spitsh…/fingerprint.t :4: |
skip 'centos has an old ass version of openssh', 2; |
spitsh/spitsh…/fingerprint.t :8: |
given 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFofjAwqt5UV/SIDlZmu6blGAStuRXJ4CawlExwnps55 root@b5978f0527b8'-->SSH-public-key { |
spitsh/spitsh…/keyscan.t :24: |
ok Host.local.wait-connectable($:port, :timeout(1)), '.run started the ssh server'; |
spitsh/spitsh…/keyscan.t :26: |
Host.local.ssh-keyscan(:$:port).add; |
spitsh/spitsh…/keyscan.t :29: |
ok $:ssh-known-hosts.contains($ed25519.public-key.key), |
spitsh/spitsh…/keyscan.t :30: |
'.ssh-keyscan.add added ed25519 key'; |
spitsh/spitsh…/keyscan.t :32: |
ok $:ssh-known-hosts.contains($ecdsa.public-key.key), |
spitsh/spitsh…/keyscan.t :33: |
'.ssh-keyscan.add added ecdsa key'; |
spitsh/spitsh…/keyscan.t :35: |
my $res = Host.local.ssh( |
spitsh/spitsh…/ssh-private-key.t :18: |
Host.local.ssh-keyscan(:$:port).add; |
spitsh/spitsh…/ssh-private-key.t :20: |
eval(ssh-private-key => $private-key){ |
spitsh/spitsh…/ssh-private-key.t :21: |
my $res = Host.local.ssh( |
spitsh/spitsh…/ssh-private-key.t :26: |
is $res, 'success', 'setting $:ssh-private-key is enough to make everything work'; |
tokuhirom/p6-Crust…/file.t :51: |
$req = HTTP::Request.new(GET => "/../.ssh/id_rsa"); |
ugexe/zef…/git.pm6 :13: |
return $url.starts-with('git' | 'http' | 'ssh') && $url.ends-with('.git'); |
ugexe/zef…/URI.pm6 :168: |
elsif $id ~~ /^(.+?) '@' (.+?) ':' (.*)/ and URI.parse("ssh\:\/\/$0\@$1\/$2", :rule<URI>) -> $m { |
Created
February 1, 2019 23:09
-
-
Save Whateverable/ec450456c67f742083c0beaa86b673cb to your computer and use it in GitHub Desktop.
greppable6
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ssh |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment