Comparing version 0.0.19 to 0.0.20
@@ -0,1 +1,6 @@ | ||
0.0.20 03-07-2016 | ||
----------------- | ||
- Updated nan.h dependency to 2.2.x series. | ||
- Fixed minor compilation warnings due to v8 C++ ABI changes. | ||
0.0.19 03-07-2016 | ||
@@ -2,0 +7,0 @@ ----------------- |
@@ -70,3 +70,3 @@ var format = require('util').format, | ||
if(err) return callback(err); | ||
// Aquire credentials | ||
// Acquire credentials | ||
self.ssip.SecurityCredentials.aquire_kerberos(username, password, function(err, security_credentials) { | ||
@@ -73,0 +73,0 @@ if(err) return callback(err); |
@@ -11,4 +11,18 @@ var kerberos = require('../build/Release/kerberos') | ||
// in a straightforward way. Use 'HTTP' for SPNEGO / Negotiate authentication. | ||
Kerberos.prototype.authGSSClientInit = function(uri, flags, callback) { | ||
return this._native_kerberos.authGSSClientInit(uri, flags, callback); | ||
// If credentialsCache is not specified, the default credentials cache from the | ||
// environment will be used (ie. KRB5CCNAME). In the case where multiple | ||
// credentials caches may be in use at once (such as for a server doing | ||
// delegation), specify the cache name here and it will be used for this | ||
// exchange. The credentialsCache is optional. | ||
Kerberos.prototype.authGSSClientInit = function(uri, flags, credentialsCache, callback) { | ||
if (typeof(credentialsCache) == 'function') { | ||
callback = credentialsCache; | ||
credentialsCache = ''; | ||
} | ||
if (credentialsCache === undefined) { | ||
credentialsCache = ''; | ||
} | ||
return this._native_kerberos.authGSSClientInit(uri, flags, credentialsCache, callback); | ||
} | ||
@@ -65,3 +79,5 @@ | ||
// credentials which will be stored in a credentials cache during the authGSSServerStep | ||
// method. this parameter is optional. | ||
// method. this parameter is optional. The credentials will be stored in | ||
// a new cache, the location of which will be made available as the "delegatedCredentialsCache" | ||
// property on the returned context AFTER the authGSSServerStep stage. | ||
// | ||
@@ -118,2 +134,13 @@ // when "constrained_delegation" is enabled, a username can (optionally) be provided and | ||
// authenticate the username and password against the KDC, and verify the KDC using a local | ||
// service key stored in the keytab. See above for details on providing the keytab. | ||
// The service should be the service principal name for a key available in the local keytab, | ||
// e.g. HTTP/somehost.example.com. If service is an empty tring, KDC verification will | ||
// be skipped. DON'T DO THIS - it's a possible security vulnerability if an attacker | ||
// can spoof your KDC (see: https://github.com/qesuto/node-krb5/issues/13) | ||
// callback receives error and boolean | ||
Kerberos.prototype.authUserKrb5Password = function(username, password, service, callback) { | ||
return this._native_kerberos.authUserKrb5Password(username, password, service, callback); | ||
}; | ||
Kerberos.prototype.acquireAlternateCredentials = function(user_name, password, domain) { | ||
@@ -120,0 +147,0 @@ return this._native_kerberos.acquireAlternateCredentials(user_name, password, domain); |
@@ -15,3 +15,3 @@ var SecurityCredentialsNative = require('../../../build/Release/kerberos').SecurityCredentials; | ||
if(typeof callback == 'function') { | ||
return SecurityCredentialsNative.aquire('Kerberos', username, password, domain, callback); | ||
return SecurityCredentialsNative.acquire('Kerberos', username, password, domain, callback); | ||
} else { | ||
@@ -18,0 +18,0 @@ return SecurityCredentialsNative.aquireSync('Kerberos', username, password, domain); |
{ | ||
"name": "kerberos", | ||
"version": "0.0.19", | ||
"version": "0.0.20", | ||
"description": "Kerberos library for Node.js", | ||
@@ -16,3 +16,3 @@ "main": "index.js", | ||
"dependencies": { | ||
"nan": "~2.0" | ||
"nan": "~2.2" | ||
}, | ||
@@ -19,0 +19,0 @@ "devDependencies": { |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
No README
QualityPackage does not have a README. This may indicate a failed publish or a low quality package.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
202718
511
39
1
0