Skip to content

Commit a562790

Browse files
Add support for ldapwhoami (RFC4532) (now with tests) (#425)
* Add support for ldapwhoami (RFC4532) * Do not break Net::LDAP#modify_password * Return the extended response data * Add test for connection.ldapwhoami * Fix processing password modify responses Per RFC4511 section 4.12, the responseValue field of an ExtendedResponse object is an optional string. Per RFC3062 section 2, the response to a passsword modify request is a sequence. This means the extended response must be parsed. --------- Co-authored-by: a7b81a9086 <> Co-authored-by: Kevin McCormack <[email protected]>
1 parent 75c0bcb commit a562790

File tree

6 files changed

+71
-8
lines changed

6 files changed

+71
-8
lines changed

.rubocop_todo.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -293,7 +293,7 @@ Metrics/BlockNesting:
293293
# Offense count: 11
294294
# Configuration parameters: CountComments, CountAsOne.
295295
Metrics/ClassLength:
296-
Max: 443
296+
Max: 451
297297

298298
# Offense count: 20
299299
# Configuration parameters: AllowedMethods, AllowedPatterns.

lib/net/ldap.rb

+20-2
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ class Net::LDAP
311311
0 => :array, # RFC-2251 Control and Filter-AND
312312
1 => :array, # SearchFilter-OR
313313
2 => :array, # SearchFilter-NOT
314-
3 => :array, # Seach referral
314+
3 => :array, # Search referral
315315
4 => :array, # unknown use in Microsoft Outlook
316316
5 => :array, # SearchFilter-GE
317317
6 => :array, # SearchFilter-LE
@@ -325,7 +325,7 @@ class Net::LDAP
325325

326326
universal = {
327327
constructed: {
328-
107 => :array, #ExtendedResponse (PasswdModifyResponseValue)
328+
107 => :string, # ExtendedResponse
329329
},
330330
}
331331

@@ -341,6 +341,7 @@ class Net::LDAP
341341

342342
StartTlsOid = '1.3.6.1.4.1.1466.20037'
343343
PasswdModifyOid = '1.3.6.1.4.1.4203.1.11.1'
344+
WhoamiOid = '1.3.6.1.4.1.4203.1.11.3'
344345

345346
# https://tools.ietf.org/html/rfc4511#section-4.1.9
346347
# https://tools.ietf.org/html/rfc4511#appendix-A
@@ -1200,6 +1201,23 @@ def delete_tree(args)
12001201
end
12011202
end
12021203

1204+
# Return the authorization identity of the client that issues the
1205+
# ldapwhoami request. The method does not support any arguments.
1206+
#
1207+
# Returns True or False to indicate whether the request was successfull.
1208+
# The result is available in the extended status information when calling
1209+
# #get_operation_result.
1210+
#
1211+
# ldap.ldapwhoami
1212+
# puts ldap.get_operation_result.extended_response
1213+
def ldapwhoami(args = {})
1214+
instrument "ldapwhoami.net_ldap", args do |payload|
1215+
@result = use_connection(args, &:ldapwhoami)
1216+
@result.success? ? @result.extended_response : nil
1217+
end
1218+
end
1219+
alias_method :whoami, :ldapwhoami
1220+
12031221
# This method is experimental and subject to change. Return the rootDSE
12041222
# record from the LDAP server as a Net::LDAP::Entry, or an empty Entry if
12051223
# the server doesn't return the record.

lib/net/ldap/connection.rb

+16
Original file line numberDiff line numberDiff line change
@@ -703,6 +703,22 @@ def delete(args)
703703
pdu
704704
end
705705

706+
def ldapwhoami
707+
ext_seq = [Net::LDAP::WhoamiOid.to_ber_contextspecific(0)]
708+
request = ext_seq.to_ber_appsequence(Net::LDAP::PDU::ExtendedRequest)
709+
710+
message_id = next_msgid
711+
712+
write(request, nil, message_id)
713+
pdu = queued_read(message_id)
714+
715+
if !pdu || pdu.app_tag != Net::LDAP::PDU::ExtendedResponse
716+
raise Net::LDAP::ResponseMissingOrInvalidError, "response missing or invalid"
717+
end
718+
719+
pdu
720+
end
721+
706722
# Internal: Returns a Socket like object used internally to communicate with
707723
# LDAP server.
708724
#

lib/net/ldap/pdu.rb

+2-2
Original file line numberDiff line numberDiff line change
@@ -194,13 +194,13 @@ def parse_ldap_result(sequence)
194194
# requestValue [1] OCTET STRING OPTIONAL }
195195

196196
def parse_extended_response(sequence)
197-
sequence.length >= 3 or raise Net::LDAP::PDU::Error, "Invalid LDAP result length."
197+
sequence.length.between?(3, 5) or raise Net::LDAP::PDU::Error, "Invalid LDAP result length."
198198
@ldap_result = {
199199
:resultCode => sequence[0],
200200
:matchedDN => sequence[1],
201201
:errorMessage => sequence[2],
202202
}
203-
@extended_response = sequence[3]
203+
@extended_response = sequence.length == 3 ? nil : sequence.last
204204
end
205205
private :parse_extended_response
206206

test/integration/test_password_modify.rb

+21-3
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
require_relative '../test_helper'
22

33
class TestPasswordModifyIntegration < LDAPIntegrationTestCase
4+
# see: https://www.rfc-editor.org/rfc/rfc3062#section-2
5+
PASSWORD_MODIFY_SYNTAX = Net::BER.compile_syntax(
6+
application: {},
7+
universal: {},
8+
context_specific: { primitive: { 0 => :string } },
9+
)
10+
411
def setup
512
super
613
@admin_account = { dn: 'cn=admin,dc=example,dc=org', password: 'admin', method: :simple }
@@ -49,7 +56,13 @@ def test_password_modify_generate
4956
auth: @auth,
5057
old_password: 'admin')
5158

52-
generated_password = @ldap.get_operation_result.extended_response[0][0]
59+
passwd_modify_response_value = @ldap.get_operation_result.extended_response
60+
seq = Net::BER::BerIdentifiedArray.new
61+
sio = StringIO.new(passwd_modify_response_value)
62+
until (e = sio.read_ber(PASSWORD_MODIFY_SYNTAX)).nil?
63+
seq << e
64+
end
65+
generated_password = seq[0][0]
5366

5467
assert generated_password, 'Should have generated a password'
5568

@@ -64,8 +77,13 @@ def test_password_modify_generate_no_old_password
6477
assert @ldap.password_modify(dn: @dn,
6578
auth: @auth)
6679

67-
generated_password = @ldap.get_operation_result.extended_response[0][0]
68-
80+
passwd_modify_response_value = @ldap.get_operation_result.extended_response
81+
seq = Net::BER::BerIdentifiedArray.new
82+
sio = StringIO.new(passwd_modify_response_value)
83+
until (e = sio.read_ber(PASSWORD_MODIFY_SYNTAX)).nil?
84+
seq << e
85+
end
86+
generated_password = seq[0][0]
6987
assert generated_password, 'Should have generated a password'
7088

7189
refute @ldap.bind(username: @dn, password: 'admin', method: :simple),

test/test_ldap_connection.rb

+11
Original file line numberDiff line numberDiff line change
@@ -574,4 +574,15 @@ def test_search_with_controls
574574
# ensure no unread
575575
assert unread.empty?, "should not have any leftover unread messages"
576576
end
577+
578+
def test_ldapwhoami
579+
ber = Net::BER::BerIdentifiedArray.new([Net::LDAP::ResultCodeSuccess, '', '', 0, 'dn:uid=zerosteiner,ou=users,dc=example,dc=org'])
580+
ber.ber_identifier = Net::LDAP::PDU::ExtendedResponse
581+
response = [1, ber]
582+
583+
@tcp_socket.should_receive(:read_ber).and_return(response)
584+
585+
result = @connection.ldapwhoami
586+
assert result.extended_response == 'dn:uid=zerosteiner,ou=users,dc=example,dc=org'
587+
end
577588
end

0 commit comments

Comments
 (0)