diff options
| author | Joseph Richey <joerichey@google.com> | 2019-10-25 17:15:27 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2019-10-25 17:15:27 -0700 |
| commit | b24e4ccd245861f7537f17c3e01be2cbefb1b29e (patch) | |
| tree | 41270d37811b1410b7d1cad9bc9fa9e2cdfd3447 /vendor/golang.org/x/sys/unix/sockcmsg_linux.go | |
| parent | 5d888ac2c654a3ac00cd4b608cba0ca1dce47678 (diff) | |
Delete vendored code and update CI to Go 1.13 (#158)
As the Go community transitions to using the modules ecosystem,
we want to only support one way of managing dependencies.
So this change moves to only using Go modules for dependency management.
This means that our effective minimum Go version increases to Go 1.11.
To account for this, we also update:
- the documentation
- Makefile
- CI scripts
Diffstat (limited to 'vendor/golang.org/x/sys/unix/sockcmsg_linux.go')
| -rw-r--r-- | vendor/golang.org/x/sys/unix/sockcmsg_linux.go | 36 |
1 files changed, 0 insertions, 36 deletions
diff --git a/vendor/golang.org/x/sys/unix/sockcmsg_linux.go b/vendor/golang.org/x/sys/unix/sockcmsg_linux.go deleted file mode 100644 index 6079eb4..0000000 --- a/vendor/golang.org/x/sys/unix/sockcmsg_linux.go +++ /dev/null @@ -1,36 +0,0 @@ -// Copyright 2011 The Go Authors. All rights reserved. -// Use of this source code is governed by a BSD-style -// license that can be found in the LICENSE file. - -// Socket control messages - -package unix - -import "unsafe" - -// UnixCredentials encodes credentials into a socket control message -// for sending to another process. This can be used for -// authentication. -func UnixCredentials(ucred *Ucred) []byte { - b := make([]byte, CmsgSpace(SizeofUcred)) - h := (*Cmsghdr)(unsafe.Pointer(&b[0])) - h.Level = SOL_SOCKET - h.Type = SCM_CREDENTIALS - h.SetLen(CmsgLen(SizeofUcred)) - *((*Ucred)(cmsgData(h))) = *ucred - return b -} - -// ParseUnixCredentials decodes a socket control message that contains -// credentials in a Ucred structure. To receive such a message, the -// SO_PASSCRED option must be enabled on the socket. -func ParseUnixCredentials(m *SocketControlMessage) (*Ucred, error) { - if m.Header.Level != SOL_SOCKET { - return nil, EINVAL - } - if m.Header.Type != SCM_CREDENTIALS { - return nil, EINVAL - } - ucred := *(*Ucred)(unsafe.Pointer(&m.Data[0])) - return &ucred, nil -} |