aboutsummaryrefslogtreecommitdiffhomepage
path: root/vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go
diff options
context:
space:
mode:
authorAlex Pilon <apilon@hashicorp.com>2019-02-22 18:24:22 -0500
committerAlex Pilon <apilon@hashicorp.com>2019-02-22 18:24:22 -0500
commit07971ca38143c5faf951d152fba370ddcbe26ad5 (patch)
tree09af1ef91c782de921efc83113907184c8adecee /vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go
parent9b6f05970a001f683b9c886c652de81f00cd5f00 (diff)
downloadterraform-provider-statuscake-07971ca38143c5faf951d152fba370ddcbe26ad5.tar.gz
terraform-provider-statuscake-07971ca38143c5faf951d152fba370ddcbe26ad5.tar.zst
terraform-provider-statuscake-07971ca38143c5faf951d152fba370ddcbe26ad5.zip
deps: use go modules for dep mgmt
run go mod tidy remove govendor from makefile and travis config set appropriate env vars for go modules
Diffstat (limited to 'vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go')
-rw-r--r--vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go36
1 files changed, 0 insertions, 36 deletions
diff --git a/vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go b/vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go
deleted file mode 100644
index d9ff473..0000000
--- a/vendor/github.com/fsouza/go-dockerclient/external/golang.org/x/sys/unix/sockcmsg_linux.go
+++ /dev/null
@@ -1,36 +0,0 @@
1// Copyright 2011 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
5// Socket control messages
6
7package unix
8
9import "unsafe"
10
11// UnixCredentials encodes credentials into a socket control message
12// for sending to another process. This can be used for
13// authentication.
14func UnixCredentials(ucred *Ucred) []byte {
15 b := make([]byte, CmsgSpace(SizeofUcred))
16 h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
17 h.Level = SOL_SOCKET
18 h.Type = SCM_CREDENTIALS
19 h.SetLen(CmsgLen(SizeofUcred))
20 *((*Ucred)(cmsgData(h))) = *ucred
21 return b
22}
23
24// ParseUnixCredentials decodes a socket control message that contains
25// credentials in a Ucred structure. To receive such a message, the
26// SO_PASSCRED option must be enabled on the socket.
27func ParseUnixCredentials(m *SocketControlMessage) (*Ucred, error) {
28 if m.Header.Level != SOL_SOCKET {
29 return nil, EINVAL
30 }
31 if m.Header.Type != SCM_CREDENTIALS {
32 return nil, EINVAL
33 }
34 ucred := *(*Ucred)(unsafe.Pointer(&m.Data[0]))
35 return &ucred, nil
36}