@@ -126,7 +126,7 @@ NOTE: The test suite requires an active kerberos deployment.
126126## Functions
127127
128128<dl >
129- <dt ><a href =" #checkPassword " >checkPassword(username, password, service, [defaultRealm], [callback] )</a > ⇒ <code >Promise</code ></dt >
129+ <dt ><a href =" #checkPassword " >checkPassword(username, password, service, [defaultRealm])</a > ⇒ <code >Promise</code ></dt >
130130<dd ><p >This function provides a simple way to verify that a user name and password
131131match those normally used for Kerberos authentication.
132132It does this by checking that the supplied user name and password can be
@@ -141,14 +141,14 @@ has the correct realms and KDCs listed.</p>
141141only be used for testing. Do not use this in any production system - your
142142security could be compromised if you do.</p >
143143</dd >
144- <dt ><a href =" #principalDetails " >principalDetails(service, hostname, [callback] )</a > ⇒ <code >Promise</code ></dt >
144+ <dt ><a href =" #principalDetails " >principalDetails(service, hostname)</a > ⇒ <code >Promise</code ></dt >
145145<dd ><p >This function returns the service principal for the server given a service type and hostname.</p >
146146<p >Details are looked up via the <code >/etc/keytab</code > file.</p >
147147</dd >
148- <dt ><a href =" #initializeClient " >initializeClient(service, [options], [callback] )</a > ⇒ <code >Promise</code ></dt >
148+ <dt ><a href =" #initializeClient " >initializeClient(service, [options])</a > ⇒ <code >Promise</code ></dt >
149149<dd ><p >Initializes a context for client-side authentication with the given service principal.</p >
150150</dd >
151- <dt ><a href =" #initializeServer " >initializeServer(service, [callback] )</a > ⇒ <code >Promise</code ></dt >
151+ <dt ><a href =" #initializeServer " >initializeServer(service)</a > ⇒ <code >Promise</code ></dt >
152152<dd ><p >Initializes a context for server-side authentication with the given service principal.</p >
153153</dd >
154154</dl >
@@ -168,52 +168,49 @@ security could be compromised if you do.</p>
168168
169169* [ KerberosClient] ( #KerberosClient )
170170
171- * [ .step(challenge, [ callback ] )] ( #KerberosClient+step )
171+ * [ .step(challenge)] ( #KerberosClient+step )
172172
173- * [ .wrap(challenge, [ options] , [ callback ] )] ( #KerberosClient+wrap )
173+ * [ .wrap(challenge, [ options] )] ( #KerberosClient+wrap )
174174
175- * [ .unwrap(challenge, [ callback ] )] ( #KerberosClient+unwrap )
175+ * [ .unwrap(challenge)] ( #KerberosClient+unwrap )
176176
177177
178178<a name =" KerberosClient+step " ></a >
179179
180- ### * kerberosClient* .step(challenge, [ callback ] )
180+ ### * kerberosClient* .step(challenge)
181181
182182| Param | Type | Description |
183183| --- | --- | --- |
184184| challenge | <code >string</code > | A string containing the base64-encoded server data (which may be empty for the first step) |
185- | [ callback] | <code >function</code > | |
186185
187186Processes a single kerberos client-side step using the supplied server challenge.
188187
189- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
188+ ** Returns** : <code >Promise</code > - returns Promise
190189<a name =" KerberosClient+wrap " ></a >
191190
192- ### * kerberosClient* .wrap(challenge, [ options] , [ callback ] )
191+ ### * kerberosClient* .wrap(challenge, [ options] )
193192
194193| Param | Type | Description |
195194| --- | --- | --- |
196195| challenge | <code >string</code > | The response returned after calling ` unwrap ` |
197196| [ options] | <code >object</code > | Optional settings |
198197| [ options.user] | <code >string</code > | The user to authorize |
199198| [ options.protect] | <code >boolean</code > | Indicates if the wrap should request message confidentiality |
200- | [ callback] | <code >function</code > | |
201199
202200Perform the client side kerberos wrap step.
203201
204- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
202+ ** Returns** : <code >Promise</code > - returns Promise
205203<a name =" KerberosClient+unwrap " ></a >
206204
207- ### * kerberosClient* .unwrap(challenge, [ callback ] )
205+ ### * kerberosClient* .unwrap(challenge)
208206
209207| Param | Type | Description |
210208| --- | --- | --- |
211209| challenge | <code >string</code > | A string containing the base64-encoded server data |
212- | [ callback] | <code >function</code > | |
213210
214211Perform the client side kerberos unwrap step
215212
216- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
213+ ** Returns** : <code >Promise</code > - returns Promise
217214<a name =" KerberosServer " ></a >
218215
219216## KerberosServer
@@ -228,27 +225,25 @@ Perform the client side kerberos unwrap step
228225
229226<a name =" KerberosServer+step " ></a >
230227
231- ### * kerberosServer* .step(challenge, [ callback ] )
228+ ### * kerberosServer* .step(challenge)
232229
233230| Param | Type | Description |
234231| --- | --- | --- |
235232| challenge | <code >string</code > | A string containing the base64-encoded client data |
236- | [ callback] | <code >function</code > | |
237233
238234Processes a single kerberos server-side step using the supplied client data.
239235
240- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
236+ ** Returns** : <code >Promise</code > - returns Promise
241237<a name =" checkPassword " ></a >
242238
243- ## checkPassword(username, password, service, [ defaultRealm] , [ callback ] )
239+ ## checkPassword(username, password, service, [ defaultRealm] )
244240
245241| Param | Type | Description |
246242| --- | --- | --- |
247243| username | <code >string</code > | The Kerberos user name. If no realm is supplied, then the ` defaultRealm ` will be used. |
248244| password | <code >string</code > | The password for the user. |
249245| service | <code >string</code > | The Kerberos service to check access for. |
250246| [ defaultRealm] | <code >string</code > | The default realm to use if one is not supplied in the user argument. |
251- | [ callback] | <code >function</code > | |
252247
253248This function provides a simple way to verify that a user name and password
254249match those normally used for Kerberos authentication.
@@ -266,25 +261,24 @@ IMPORTANT: This method is vulnerable to KDC spoofing attacks and it should
266261only be used for testing. Do not use this in any production system - your
267262security could be compromised if you do.
268263
269- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
264+ ** Returns** : <code >Promise</code > - returns Promise
270265<a name =" principalDetails " ></a >
271266
272- ## principalDetails(service, hostname, [ callback ] )
267+ ## principalDetails(service, hostname)
273268
274269| Param | Type | Description |
275270| --- | --- | --- |
276271| service | <code >string</code > | The Kerberos service type for the server. |
277272| hostname | <code >string</code > | The hostname of the server. |
278- | [ callback] | <code >function</code > | |
279273
280274This function returns the service principal for the server given a service type and hostname.
281275
282276Details are looked up via the ` /etc/keytab ` file.
283277
284- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
278+ ** Returns** : <code >Promise</code > - returns Promise
285279<a name =" initializeClient " ></a >
286280
287- ## initializeClient(service, [ options] , [ callback ] )
281+ ## initializeClient(service, [ options] )
288282
289283| Param | Type | Description |
290284| --- | --- | --- |
@@ -293,20 +287,18 @@ Details are looked up via the `/etc/keytab` file.
293287| [ options.principal
] | <
code >string</
code >
| Optional string containing the client principal in the form 'user@realm' (e.g. '
[email protected] ').
| 294288| [ options.flags] | <code >number</code > | Optional integer used to set GSS flags. (e.g. ` GSS_C_DELEG_FLAG\|GSS_C_MUTUAL_FLAG\|GSS_C_SEQUENCE_FLAG ` will allow for forwarding credentials to the remote host) |
295289| [ options.mechOID] | <code >number</code > | Optional GSS mech OID. Defaults to None (GSS_C_NO_OID). Other possible values are ` GSS_MECH_OID_KRB5 ` , ` GSS_MECH_OID_SPNEGO ` . |
296- | [ callback] | <code >function</code > | |
297290
298291Initializes a context for client-side authentication with the given service principal.
299292
300- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
293+ ** Returns** : <code >Promise</code > - returns Promise
301294<a name =" initializeServer " ></a >
302295
303- ## initializeServer(service, [ callback ] )
296+ ## initializeServer(service)
304297
305298| Param | Type | Description |
306299| --- | --- | --- |
307300| service
| <
code >string</
code >
| A string containing the service principal in the form 'type@fqdn' (e.g. '
[email protected] ').
| 308- | [ callback] | <code >function</code > | |
309301
310302Initializes a context for server-side authentication with the given service principal.
311303
312- ** Returns** : <code >Promise</code > - returns Promise if no callback passed
304+ ** Returns** : <code >Promise</code > - returns Promise
0 commit comments