Skip to content

Commit 4a6e2fc

Browse files
regen docs
1 parent 731443f commit 4a6e2fc

File tree

1 file changed

+46
-51
lines changed

1 file changed

+46
-51
lines changed

README.md

Lines changed: 46 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,12 @@ modify an existing installation) and select *Common Tools for Visual C++* during
3939
Only the following version combinations with the [MongoDB Node.js
4040
Driver](https://github.com/mongodb/node-mongodb-native) are considered stable.
4141

42-
42+
4343
| ------------- | -------------- | -------------- |
44-
| `[email protected]` | N/A | |
45-
| `[email protected]` | | |
46-
| `[email protected]` | | |
47-
| `[email protected]` | | N/A |
44+
| `[email protected]` | N/A ||
45+
| `[email protected]` |||
46+
| `[email protected]` |||
47+
| `[email protected]` || N/A |
4848

4949
### Installation
5050

@@ -121,11 +121,6 @@ NOTE: The test suite requires an active kerberos deployment.
121121
<dd></dd>
122122
<dt><a href="#KerberosServer">KerberosServer</a></dt>
123123
<dd></dd>
124-
<dt><del><a href="#MongoAuthProcess">MongoAuthProcess</a></del></dt>
125-
<dd><p>A class that was used for MongoDB kerberos authentication with legacy
126-
MongoDB Node drivers (<code>mongodb&lt;4.0</code>).</p>
127-
<p>Not intended for direct use.</p>
128-
</dd>
129124
</dl>
130125

131126
## Functions
@@ -163,12 +158,12 @@ security could be compromised if you do.</p>
163158
## KerberosClient
164159
**Properties**
165160

166-
| Name | Type | Description |
167-
| --------------- | -------------------- | ------------------------------------------------------------------ |
168-
| username | <code>string</code> | The username used for authentication |
169-
| response | <code>string</code> | The last response received during authentication steps |
170-
| responseConf | <code>string</code> | Indicates whether confidentiality was applied or not (GSSAPI only) |
171-
| contextComplete | <code>boolean</code> | Indicates that authentication has successfully completed or not |
161+
| Name | Type | Description |
162+
| --- | --- | --- |
163+
| username | <code>string</code> | The username used for authentication |
164+
| response | <code>string</code> | The last response received during authentication steps |
165+
| responseConf | <code>string</code> | Indicates whether confidentiality was applied or not (GSSAPI only) |
166+
| contextComplete | <code>boolean</code> | Indicates that authentication has successfully completed or not |
172167

173168

174169
* [KerberosClient](#KerberosClient)
@@ -184,8 +179,8 @@ security could be compromised if you do.</p>
184179

185180
### *kerberosClient*.step(challenge)
186181

187-
| Param | Type | Description |
188-
| --------- | ------------------- | ------------------------------------------------------------------------------------------ |
182+
| Param | Type | Description |
183+
| --- | --- | --- |
189184
| challenge | <code>string</code> | A string containing the base64-encoded server data (which may be empty for the first step) |
190185

191186
Processes a single kerberos client-side step using the supplied server challenge.
@@ -195,11 +190,11 @@ Processes a single kerberos client-side step using the supplied server challenge
195190

196191
### *kerberosClient*.wrap(challenge, [options])
197192

198-
| Param | Type | Description |
199-
| ----------------- | -------------------- | ------------------------------------------------------------ |
200-
| challenge | <code>string</code> | The response returned after calling `unwrap` |
201-
| [options] | <code>object</code> | Optional settings |
202-
| [options.user] | <code>string</code> | The user to authorize |
193+
| Param | Type | Description |
194+
| --- | --- | --- |
195+
| challenge | <code>string</code> | The response returned after calling `unwrap` |
196+
| [options] | <code>object</code> | Optional settings |
197+
| [options.user] | <code>string</code> | The user to authorize |
203198
| [options.protect] | <code>boolean</code> | Indicates if the wrap should request message confidentiality |
204199

205200
Perform the client side kerberos wrap step.
@@ -209,8 +204,8 @@ Perform the client side kerberos wrap step.
209204

210205
### *kerberosClient*.unwrap(challenge)
211206

212-
| Param | Type | Description |
213-
| --------- | ------------------- | -------------------------------------------------- |
207+
| Param | Type | Description |
208+
| --- | --- | --- |
214209
| challenge | <code>string</code> | A string containing the base64-encoded server data |
215210

216211
Perform the client side kerberos unwrap step
@@ -221,19 +216,19 @@ Perform the client side kerberos unwrap step
221216
## KerberosServer
222217
**Properties**
223218

224-
| Name | Type | Description |
225-
| --------------- | -------------------- | --------------------------------------------------------------- |
226-
| username | <code>string</code> | The username used for authentication |
227-
| response | <code>string</code> | The last response received during authentication steps |
228-
| targetName | <code>string</code> | The target used for authentication |
219+
| Name | Type | Description |
220+
| --- | --- | --- |
221+
| username | <code>string</code> | The username used for authentication |
222+
| response | <code>string</code> | The last response received during authentication steps |
223+
| targetName | <code>string</code> | The target used for authentication |
229224
| contextComplete | <code>boolean</code> | Indicates that authentication has successfully completed or not |
230225

231226
<a name="KerberosServer+step"></a>
232227

233228
### *kerberosServer*.step(challenge)
234229

235-
| Param | Type | Description |
236-
| --------- | ------------------- | -------------------------------------------------- |
230+
| Param | Type | Description |
231+
| --- | --- | --- |
237232
| challenge | <code>string</code> | A string containing the base64-encoded client data |
238233

239234
Processes a single kerberos server-side step using the supplied client data.
@@ -243,12 +238,12 @@ Processes a single kerberos server-side step using the supplied client data.
243238

244239
## checkPassword(username, password, service, [defaultRealm])
245240

246-
| Param | Type | Description |
247-
| -------------- | ------------------- | -------------------------------------------------------------------------------------- |
248-
| username | <code>string</code> | The Kerberos user name. If no realm is supplied, then the `defaultRealm` will be used. |
249-
| password | <code>string</code> | The password for the user. |
250-
| service | <code>string</code> | The Kerberos service to check access for. |
251-
| [defaultRealm] | <code>string</code> | The default realm to use if one is not supplied in the user argument. |
241+
| Param | Type | Description |
242+
| --- | --- | --- |
243+
| username | <code>string</code> | The Kerberos user name. If no realm is supplied, then the `defaultRealm` will be used. |
244+
| password | <code>string</code> | The password for the user. |
245+
| service | <code>string</code> | The Kerberos service to check access for. |
246+
| [defaultRealm] | <code>string</code> | The default realm to use if one is not supplied in the user argument. |
252247

253248
This function provides a simple way to verify that a user name and password
254249
match those normally used for Kerberos authentication.
@@ -271,10 +266,10 @@ security could be compromised if you do.
271266

272267
## principalDetails(service, hostname)
273268

274-
| Param | Type | Description |
275-
| -------- | ------------------- | ----------------------------------------- |
276-
| service | <code>string</code> | The Kerberos service type for the server. |
277-
| hostname | <code>string</code> | The hostname of the server. |
269+
| Param | Type | Description |
270+
| --- | --- | --- |
271+
| service | <code>string</code> | The Kerberos service type for the server. |
272+
| hostname | <code>string</code> | The hostname of the server. |
278273

279274
This function returns the service principal for the server given a service type and hostname.
280275

@@ -285,13 +280,13 @@ Details are looked up via the `/etc/keytab` file.
285280

286281
## initializeClient(service, [options])
287282

288-
| Param | Type | Description |
289-
| ------------------- | ------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
290-
| service | <code>string</code> | A string containing the service principal in the form 'type@fqdn' (e.g. '[email protected]'). |
291-
| [options] | <code>object</code> | Optional settings |
292-
| [options.principal] | <code>string</code> | Optional string containing the client principal in the form 'user@realm' (e.g. '[email protected]'). |
293-
| [options.flags] | <code>number</code> | Optional integer used to set GSS flags. (e.g. `GSS_C_DELEG_FLAG\|GSS_C_MUTUAL_FLAG\|GSS_C_SEQUENCE_FLAG` will allow for forwarding credentials to the remote host) |
294-
| [options.mechOID] | <code>number</code> | Optional GSS mech OID. Defaults to None (GSS_C_NO_OID). Other possible values are `GSS_MECH_OID_KRB5`, `GSS_MECH_OID_SPNEGO`. |
283+
| Param | Type | Description |
284+
| --- | --- | --- |
285+
| service | <code>string</code> | A string containing the service principal in the form 'type@fqdn' (e.g. '[email protected]'). |
286+
| [options] | <code>object</code> | Optional settings |
287+
| [options.principal] | <code>string</code> | Optional string containing the client principal in the form 'user@realm' (e.g. '[email protected]'). |
288+
| [options.flags] | <code>number</code> | Optional integer used to set GSS flags. (e.g. `GSS_C_DELEG_FLAG\|GSS_C_MUTUAL_FLAG\|GSS_C_SEQUENCE_FLAG` will allow for forwarding credentials to the remote host) |
289+
| [options.mechOID] | <code>number</code> | Optional GSS mech OID. Defaults to None (GSS_C_NO_OID). Other possible values are `GSS_MECH_OID_KRB5`, `GSS_MECH_OID_SPNEGO`. |
295290

296291
Initializes a context for client-side authentication with the given service principal.
297292

@@ -300,8 +295,8 @@ Initializes a context for client-side authentication with the given service prin
300295

301296
## initializeServer(service)
302297

303-
| Param | Type | Description |
304-
| ------- | ------------------- | ----------------------------------------------------------------------------------------------- |
298+
| Param | Type | Description |
299+
| --- | --- | --- |
305300
| service | <code>string</code> | A string containing the service principal in the form 'type@fqdn' (e.g. '[email protected]'). |
306301

307302
Initializes a context for server-side authentication with the given service principal.

0 commit comments

Comments
 (0)