}
OUTPUT:
RETVAL
+
+
+krb5_timestamp
+password_expiration(self)
+ Authen::Kerberos::Kadmin::Entry self
+ CODE:
+{
+ CROAK_NULL_SELF(self, "Authen::Kerberos::Kadmin::Entry",
+ "password_expiration");
+ RETVAL = self->ent->pw_expiration;
+}
+ OUTPUT:
+ RETVAL
since UNIX epoch, or C<0> if there is no password change information
available.
+=item password_expiration
+
+Returns the password expiration time for this database entry in seconds
+since UNIX epoch, or C<0> if this principal does not have a password
+expiration set.
+
=back
=head1 AUTHOR
use File::Copy qw(copy);
-use Test::More tests => 13;
+use Test::More tests => 14;
BEGIN {
use_ok('Authen::Kerberos::Kadmin');
my $entry = $kadmin->get('test@TEST.EXAMPLE.COM');
isa_ok($entry, 'Authen::Kerberos::Kadmin::Entry');
is($entry->last_password_change, 1_393_043_331, 'Last password change time');
+is($entry->password_expiration, 0, 'No password expiration');
# Test password change. At the moment, we don't check whether the password
# change is performed in the database. We'll do that later.