Skip to content

Commit ca7f3c3

Browse files
authored
🔀 Merge pull request #187 from nevans/sasl/username-vs-authcid-vs-authzid
🔒 SASL: Clarify usage of username vs authcid vs authzid
2 parents 573b680 + 34e4662 commit ca7f3c3

10 files changed

+221
-91
lines changed

‎lib/net/imap/sasl/anonymous_authenticator.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,9 @@ class AnonymousAuthenticator
2929
# this, see Net::IMAP#authenticate or your client's authentication
3030
# method.
3131
#
32-
# #anonymous_message is an optional message which is sent to the server.
33-
# It may be sent as a positional argument or as a keyword argument.
32+
# ==== Parameters
33+
#
34+
# * _optional_ #anonymous_message — a message to send to the server.
3435
#
3536
# Any other keyword arguments are silently ignored.
3637
def initialize(anon_msg = nil, anonymous_message: nil, **)

‎lib/net/imap/sasl/cram_md5_authenticator.rb

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,17 @@
1414
# of cleartext and recommends TLS version 1.2 or greater be used for all
1515
# traffic. With TLS +CRAM-MD5+ is okay, but so is +PLAIN+
1616
class Net::IMAP::SASL::CramMD5Authenticator
17-
def initialize(user, password, warn_deprecation: true, **_ignored)
17+
def initialize(user = nil, pass = nil,
18+
authcid: nil, username: nil,
19+
password: nil,
20+
warn_deprecation: true,
21+
**)
1822
if warn_deprecation
1923
warn "WARNING: CRAM-MD5 mechanism is deprecated." # TODO: recommend SCRAM
2024
end
2125
require "digest/md5"
22-
@user = user
23-
@password = password
26+
@user = authcid || username || user
27+
@password = password || pass
2428
@done = false
2529
end
2630

‎lib/net/imap/sasl/digest_md5_authenticator.rb

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,9 @@ class Net::IMAP::SASL::DigestMD5Authenticator
2020
# "Authentication identity" is the generic term used by
2121
# RFC-4422[https://tools.ietf.org/html/rfc4422].
2222
# RFC-4616[https://tools.ietf.org/html/rfc4616] and many later RFCs abbreviate
23-
# that to +authcid+. So +authcid+ is available as an alias for #username.
23+
# this to +authcid+.
2424
attr_reader :username
25+
alias authcid username
2526

2627
# A password or passphrase that matches the #username.
2728
#
@@ -44,23 +45,34 @@ class Net::IMAP::SASL::DigestMD5Authenticator
4445
# :call-seq:
4546
# new(username, password, authzid = nil, **options) -> authenticator
4647
# new(username:, password:, authzid: nil, **options) -> authenticator
48+
# new(authcid:, password:, authzid: nil, **options) -> authenticator
4749
#
4850
# Creates an Authenticator for the "+DIGEST-MD5+" SASL mechanism.
4951
#
5052
# Called by Net::IMAP#authenticate and similar methods on other clients.
5153
#
5254
# ==== Parameters
5355
#
54-
# * #username — Identity whose #password is used.
55-
# * #password — A password or passphrase associated with this #username.
56-
# * #authzid ― Alternate identity to act as or on behalf of. Optional.
57-
# * +warn_deprecation+ — Set to +false+ to silence the warning.
56+
# * #authcid ― Authentication identity that is associated with #password.
5857
#
59-
# See the documentation for each attribute for more details.
58+
# #username ― An alias for +authcid+.
59+
#
60+
# * #password ― A password or passphrase associated with this #authcid.
61+
#
62+
# * _optional_ #authzid ― Authorization identity to act as or on behalf of.
63+
#
64+
# When +authzid+ is not set, the server should derive the authorization
65+
# identity from the authentication identity.
66+
#
67+
# * _optional_ +warn_deprecation+ — Set to +false+ to silence the warning.
68+
#
69+
# Any other keyword arguments are silently ignored.
6070
def initialize(user = nil, pass = nil, authz = nil,
6171
username: nil, password: nil, authzid: nil,
72+
authcid: nil,
6273
warn_deprecation: true, **)
63-
username ||= user or raise ArgumentError, "missing username"
74+
username = authcid || username || user or
75+
raise ArgumentError, "missing username (authcid)"
6476
password ||= pass or raise ArgumentError, "missing password"
6577
authzid ||= authz
6678
if warn_deprecation

‎lib/net/imap/sasl/external_authenticator.rb

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,45 @@ module SASL
1212
# established external to SASL, for example by TLS certificate or IPsec.
1313
class ExternalAuthenticator
1414

15-
# Authorization identity: an identity to act as or on behalf of.
15+
# Authorization identity: an identity to act as or on behalf of. The
16+
# identity form is application protocol specific. If not provided or
17+
# left blank, the server derives an authorization identity from the
18+
# authentication identity. The server is responsible for verifying the
19+
# client's credentials and verifying that the identity it associates
20+
# with the client's authentication identity is allowed to act as (or on
21+
# behalf of) the authorization identity.
22+
#
23+
# For example, an administrator or superuser might take on another role:
24+
#
25+
# imap.authenticate "PLAIN", "root", passwd, authzid: "user"
1626
#
17-
# If not explicitly provided, the server defaults to using the identity
18-
# that was authenticated by the external credentials.
1927
attr_reader :authzid
28+
alias username authzid
2029

2130
# :call-seq:
2231
# new(authzid: nil, **) -> authenticator
32+
# new(username: nil, **) -> authenticator
33+
# new(username = nil, **) -> authenticator
2334
#
2435
# Creates an Authenticator for the "+EXTERNAL+" SASL mechanism, as
2536
# specified in RFC-4422[https://tools.ietf.org/html/rfc4422]. To use
2637
# this, see Net::IMAP#authenticate or your client's authentication
2738
# method.
2839
#
29-
# #authzid is an optional identity to act as or on behalf of.
40+
# ==== Parameters
41+
#
42+
# * _optional_ #authzid ― Authorization identity to act as or on behalf of.
43+
#
44+
# _optional_ #username ― An alias for #authzid.
45+
#
46+
# Note that, unlike some other authenticators, +username+ sets the
47+
# _authorization_ identity and not the _authentication_ identity. The
48+
# authentication identity is established for the client by the
49+
# external credentials.
3050
#
3151
# Any other keyword parameters are quietly ignored.
32-
def initialize(authzid: nil, **)
52+
def initialize(user = nil, authzid: nil, username: nil, **)
53+
authzid ||= username || user
3354
@authzid = authzid&.to_str&.encode "UTF-8"
3455
if @authzid&.match?(/\u0000/u) # also validates UTF8 encoding
3556
raise ArgumentError, "contains NULL"

‎lib/net/imap/sasl/login_authenticator.rb

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,16 @@ class Net::IMAP::SASL::LoginAuthenticator
2323
STATE_DONE = :DONE
2424
private_constant :STATE_USER, :STATE_PASSWORD, :STATE_DONE
2525

26-
def initialize(user, password, warn_deprecation: true, **_ignored)
26+
def initialize(user = nil, pass = nil,
27+
authcid: nil, username: nil,
28+
password: nil,
29+
warn_deprecation: true,
30+
**)
2731
if warn_deprecation
2832
warn "WARNING: LOGIN SASL mechanism is deprecated. Use PLAIN instead."
2933
end
30-
@user = user
31-
@password = password
34+
@user = authcid || username || user
35+
@password = password || pass
3236
@state = STATE_USER
3337
end
3438

‎lib/net/imap/sasl/oauthbearer_authenticator.rb

Lines changed: 69 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,25 @@ module SASL
1414
class OAuthAuthenticator
1515
include GS2Header
1616

17-
# Authorization identity: an identity to act as or on behalf of.
17+
# Authorization identity: an identity to act as or on behalf of. The
18+
# identity form is application protocol specific. If not provided or
19+
# left blank, the server derives an authorization identity from the
20+
# authentication identity. The server is responsible for verifying the
21+
# client's credentials and verifying that the identity it associates
22+
# with the client's authentication identity is allowed to act as (or on
23+
# behalf of) the authorization identity.
24+
#
25+
# For example, an administrator or superuser might take on another role:
26+
#
27+
# imap.authenticate "PLAIN", "root", passwd, authzid: "user"
1828
#
19-
# If no explicit authorization identity is provided, it is usually
20-
# derived from the authentication identity. For the OAuth-based
21-
# mechanisms, the authentication identity is the identity established by
22-
# the OAuth credential.
2329
attr_reader :authzid
30+
alias username authzid
2431

25-
# Hostname to which the client connected.
32+
# Hostname to which the client connected. (optional)
2633
attr_reader :host
2734

28-
# Service port to which the client connected.
35+
# Service port to which the client connected. (optional)
2936
attr_reader :port
3037

3138
# HTTP method. (optional)
@@ -39,6 +46,7 @@ class OAuthAuthenticator
3946

4047
# The query string. (optional)
4148
attr_reader :qs
49+
alias query qs
4250

4351
# Stores the most recent server "challenge". When authentication fails,
4452
# this may hold information about the failure reason, as JSON.
@@ -47,29 +55,42 @@ class OAuthAuthenticator
4755
# Creates an RFC7628[https://tools.ietf.org/html/rfc7628] OAuth
4856
# authenticator.
4957
#
50-
# === Options
58+
# ==== Parameters
59+
#
60+
# See child classes for required parameter(s). The following parameters
61+
# are all optional, but it is worth noting that <b>application protocols
62+
# are allowed to require</b> #authzid (or other parameters, such as
63+
# #host or #port) <b>as are specific server implementations</b>.
64+
#
65+
# * _optional_ #authzid ― Authorization identity to act as or on behalf of.
66+
#
67+
# _optional_ #username — An alias for #authzid.
5168
#
52-
# See child classes for required configuration parameter(s). The
53-
# following parameters are all optional, but protocols or servers may
54-
# add requirements for #authzid, #host, #port, or any other parameter.
69+
# Note that, unlike some other authenticators, +username+ sets the
70+
# _authorization_ identity and not the _authentication_ identity. The
71+
# authentication identity is established for the client by the OAuth
72+
# token.
5573
#
56-
# * #authzid ― Identity to act as or on behalf of.
57-
# * #host — Hostname to which the client connected.
58-
# * #port — Service port to which the client connected.
59-
# * #mthd — HTTP method
60-
# * #path — HTTP path data
61-
# * #post — HTTP post data
62-
# * #qs — HTTP query string
74+
# * _optional_ #host — Hostname to which the client connected.
75+
# * _optional_ #port — Service port to which the client connected.
76+
# * _optional_ #mthd — HTTP method
77+
# * _optional_ #path — HTTP path data
78+
# * _optional_ #post — HTTP post data
79+
# * _optional_ #qs — HTTP query string
6380
#
81+
# _optional_ #query — An alias for #qs
82+
#
83+
# Any other keyword parameters are quietly ignored.
6484
def initialize(authzid: nil, host: nil, port: nil,
85+
username: nil, query: nil,
6586
mthd: nil, path: nil, post: nil, qs: nil, **)
66-
@authzid = authzid
87+
@authzid = authzid || username
6788
@host = host
6889
@port = port
6990
@mthd = mthd
7091
@path = path
7192
@post = post
72-
@qs = qs
93+
@qs = qs || query
7394
@done = false
7495
end
7596

@@ -116,34 +137,45 @@ def authorization; raise "must be implemented by subclass" end
116137
# the bearer token.
117138
class OAuthBearerAuthenticator < OAuthAuthenticator
118139

119-
# An OAuth2 bearer token, generally the access token.
140+
# An OAuth 2.0 bearer token. See {RFC-6750}[https://www.rfc-editor.org/rfc/rfc6750]
120141
attr_reader :oauth2_token
121142

122143
# :call-seq:
123-
# new(oauth2_token, **options) -> authenticator
124-
# new(oauth2_token:, **options) -> authenticator
144+
# new(oauth2_token, **options) -> authenticator
145+
# new(authzid, oauth2_token, **options) -> authenticator
146+
# new(oauth2_token:, **options) -> authenticator
125147
#
126148
# Creates an Authenticator for the "+OAUTHBEARER+" SASL mechanism.
127149
#
128150
# Called by Net::IMAP#authenticate and similar methods on other clients.
129151
#
130-
# === Options
152+
# ==== Parameters
153+
#
154+
# * #oauth2_token — An OAuth2 bearer token
155+
#
156+
# All other keyword parameters are passed to
157+
# {super}[rdoc-ref:OAuthAuthenticator::new] (see OAuthAuthenticator).
158+
# The most common ones are:
159+
#
160+
# * _optional_ #authzid ― Authorization identity to act as or on behalf of.
161+
#
162+
# _optional_ #username — An alias for #authzid.
131163
#
132-
# Only +oauth2_token+ is required by the mechanism, however protocols
133-
# and servers may add requirements for #authzid, #host, #port, or any
134-
# other parameter.
164+
# Note that, unlike some other authenticators, +username+ sets the
165+
# _authorization_ identity and not the _authentication_ identity. The
166+
# authentication identity is established for the client by
167+
# #oauth2_token.
135168
#
136-
# * #oauth2_token — An OAuth2 bearer token or access token. *Required.*
137-
# May be provided as either regular or keyword argument.
138-
# * #authzid ― Identity to act as or on behalf of.
139-
# * #host — Hostname to which the client connected.
140-
# * #port — Service port to which the client connected.
141-
# * See OAuthAuthenticator documentation for less common parameters.
169+
# * _optional_ #host — Hostname to which the client connected.
170+
# * _optional_ #port — Service port to which the client connected.
142171
#
143-
def initialize(oauth2_token_arg = nil, oauth2_token: nil, **args, &blk)
144-
super(**args, &blk) # handles authzid, host, port, etc
145-
oauth2_token && oauth2_token_arg and
146-
raise ArgumentError, "conflicting values for oauth2_token"
172+
# Although only oauth2_token is required by this mechanism, it is worth
173+
# noting that <b><em>application protocols are allowed to
174+
# require</em></b> #authzid (<em>or other parameters, such as</em> #host
175+
# _or_ #port) <b><em>as are specific server implementations</em></b>.
176+
def initialize(arg1 = nil, arg2 = nil, oauth2_token: nil, **args, &blk)
177+
username, oauth2_token_arg = arg2.nil? ? [nil, arg1] : [arg1, arg2]
178+
super(username: username, **args, &blk)
147179
@oauth2_token = oauth2_token || oauth2_token_arg or
148180
raise ArgumentError, "missing oauth2_token"
149181
end

‎lib/net/imap/sasl/plain_authenticator.rb

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ class Net::IMAP::SASL::PlainAuthenticator
2222
# RFC-4616[https://tools.ietf.org/html/rfc4616] and many later RFCs abbreviate
2323
# this to +authcid+.
2424
attr_reader :username
25+
alias authcid username
2526

2627
# A password or passphrase that matches the #username.
2728
attr_reader :password
@@ -42,25 +43,31 @@ class Net::IMAP::SASL::PlainAuthenticator
4243
# :call-seq:
4344
# new(username, password, authzid: nil, **) -> authenticator
4445
# new(username:, password:, authzid: nil, **) -> authenticator
46+
# new(authcid:, password:, authzid: nil, **) -> authenticator
4547
#
4648
# Creates an Authenticator for the "+PLAIN+" SASL mechanism.
4749
#
4850
# Called by Net::IMAP#authenticate and similar methods on other clients.
4951
#
50-
# === Parameters
52+
# ==== Parameters
5153
#
52-
# * #username ― Identity whose +password+ is used.
53-
# * #password ― Password or passphrase associated with this username+.
54-
# * #authzid ― Alternate identity to act as or on behalf of. Optional.
54+
# * #authcid ― Authentication identity that is associated with #password.
5555
#
56-
# See attribute documentation for more details.
56+
# #username ― An alias for #authcid.
57+
#
58+
# * #password ― A password or passphrase associated with the #authcid.
59+
#
60+
# * _optional_ #authzid ― Authorization identity to act as or on behalf of.
61+
#
62+
# When +authzid+ is not set, the server should derive the authorization
63+
# identity from the authentication identity.
64+
#
65+
# Any other keyword parameters are quietly ignored.
5766
def initialize(user = nil, pass = nil,
67+
authcid: nil,
5868
username: nil, password: nil, authzid: nil, **)
59-
[username, user].compact.count == 1 or
60-
raise ArgumentError, "conflicting values for username"
61-
[password, pass].compact.count == 1 or
62-
raise ArgumentError, "conflicting values for password"
63-
username ||= user or raise ArgumentError, "missing username"
69+
username ||= authcid || user or
70+
raise ArgumentError, "missing username (authcid)"
6471
password ||= pass or raise ArgumentError, "missing password"
6572
raise ArgumentError, "username contains NULL" if username.include?(NULL)
6673
raise ArgumentError, "password contains NULL" if password.include?(NULL)

0 commit comments

Comments
 (0)