activeldap 1.2.4 → 3.1.0
Sign up to get free protection for your applications and to get access to all the features.
- data/Gemfile +18 -0
- data/LICENSE +2 -1
- data/README.textile +137 -0
- data/doc/text/development.textile +50 -0
- data/{CHANGES → doc/text/news.textile} +256 -237
- data/doc/text/rails.textile +144 -0
- data/doc/text/tutorial.textile +1005 -0
- data/lib/active_ldap/adapter/base.rb +5 -3
- data/lib/active_ldap/adapter/net_ldap_ext.rb +1 -1
- data/lib/active_ldap/associations.rb +6 -2
- data/lib/active_ldap/base.rb +16 -71
- data/lib/active_ldap/callbacks.rb +52 -33
- data/lib/active_ldap/configuration.rb +2 -2
- data/lib/active_ldap/get_text/parser.rb +2 -2
- data/lib/active_ldap/human_readable.rb +5 -4
- data/lib/active_ldap/log_subscriber.rb +50 -0
- data/lib/active_ldap/persistence.rb +65 -0
- data/lib/active_ldap/railtie.rb +40 -0
- data/lib/active_ldap/railties/controller_runtime.rb +48 -0
- data/lib/active_ldap/user_password.rb +1 -0
- data/lib/active_ldap/validations.rb +34 -72
- data/lib/active_ldap.rb +13 -912
- data/{rails_generators/model_active_ldap → lib/rails/generators/active_ldap/model}/USAGE +2 -1
- data/lib/rails/generators/active_ldap/model/model_generator.rb +47 -0
- data/{rails_generators/model_active_ldap → lib/rails/generators/active_ldap/model}/templates/model_active_ldap.rb +0 -0
- data/lib/rails/generators/active_ldap/scaffold/scaffold_generator.rb +14 -0
- data/{rails_generators/scaffold_active_ldap → lib/rails/generators/active_ldap/scaffold}/templates/ldap.yml +1 -0
- data/test/test_base.rb +9 -0
- data/test/test_callback.rb +2 -6
- data/test/test_connection.rb +2 -2
- data/test/test_user.rb +2 -2
- data/test/test_validation.rb +11 -11
- metadata +165 -106
- data/README +0 -155
- data/Rakefile +0 -133
- data/rails/README +0 -54
- data/rails/init.rb +0 -33
- data/rails_generators/model_active_ldap/model_active_ldap_generator.rb +0 -69
- data/rails_generators/model_active_ldap/templates/unit_test.rb +0 -8
- data/rails_generators/scaffold_active_ldap/scaffold_active_ldap_generator.rb +0 -7
- data/test/al-test-utils.rb +0 -439
- data/test/command.rb +0 -112
- data/test/config.yaml.sample +0 -6
- data/test/fixtures/lower_case_object_class_schema.rb +0 -802
- data/test/run-test.rb +0 -44
@@ -0,0 +1,1005 @@
|
|
1
|
+
h1. Tutorial
|
2
|
+
|
3
|
+
h2. Introduction
|
4
|
+
|
5
|
+
ActiveLdap is a novel way of interacting with LDAP. Most interaction with
|
6
|
+
LDAP is done using clunky LDIFs, web interfaces, or with painful APIs that
|
7
|
+
required a thick reference manual nearby. ActiveLdap aims to fix that.
|
8
|
+
Inspired by "ActiveRecord":http://activerecord.rubyonrails.org, ActiveLdap provides an
|
9
|
+
object oriented interface to LDAP entries.
|
10
|
+
|
11
|
+
The target audience is system administrators and LDAP users everywhere that
|
12
|
+
need quick, clean access to LDAP in Ruby.
|
13
|
+
|
14
|
+
h3. What's LDAP?
|
15
|
+
|
16
|
+
LDAP stands for "Lightweight Directory Access Protocol." Basically this means
|
17
|
+
that it is the protocol used for accessing LDAP servers. LDAP servers
|
18
|
+
lightweight directories. An LDAP server can contain anything from a simple
|
19
|
+
digital phonebook to user accounts for computer systems. More and more
|
20
|
+
frequently, it is being used for the latter. My examples in this text will
|
21
|
+
assume some familiarity with using LDAP as a centralized authentication and
|
22
|
+
authorization server for Unix systems. (Unfortunately, I've yet to try this
|
23
|
+
against Microsoft's ActiveDirectory, despite what the name implies.)
|
24
|
+
|
25
|
+
Further reading:
|
26
|
+
* "RFC1777":http://www.faqs.org/rfcs/rfc1777.html - Lightweight Directory Access Protocol
|
27
|
+
* "OpenLDAP":http://www.openldap.org
|
28
|
+
|
29
|
+
h3. So why use ActiveLdap?
|
30
|
+
|
31
|
+
Using LDAP directly (even with the excellent Ruby/LDAP), leaves you bound to
|
32
|
+
the world of the predefined LDAP API. While this API is important for many
|
33
|
+
reasons, having to extract code out of LDAP search blocks and create huge
|
34
|
+
arrays of LDAP.mod entries make code harder to read, less intuitive, and just
|
35
|
+
less fun to write. Hopefully, ActiveLdap will remedy all of these
|
36
|
+
problems!
|
37
|
+
|
38
|
+
h2. Getting Started
|
39
|
+
|
40
|
+
h3. Requirements
|
41
|
+
|
42
|
+
* A Ruby implementation: "Ruby":http://www.ruby-lang.org 1.8.x, 1.9.1 or "JRuby":http://jruby.codehaus.org/
|
43
|
+
* A LDAP library: "Ruby/LDAP":http://code.google.com/p/ruby-activeldap/wiki/RubyLDAP (for Ruby), "Net::LDAP":http://rubyforge.org/projects/net-ldap/ (for Ruby or JRuby) or JNDI (for JRuby)
|
44
|
+
* A LDAP server: "OpenLDAP":http://www.openldap.org, etc
|
45
|
+
** Your LDAP server must allow root_dse queries to allow for schema queries
|
46
|
+
|
47
|
+
h3. Installation
|
48
|
+
|
49
|
+
Assuming all the requirements are installed, you can install by gem.
|
50
|
+
|
51
|
+
<pre>
|
52
|
+
# gem install activeldap
|
53
|
+
</pre>
|
54
|
+
|
55
|
+
Now as a quick test, you can run:
|
56
|
+
|
57
|
+
<pre>
|
58
|
+
$ irb -rubygems
|
59
|
+
irb> require 'active_ldap'
|
60
|
+
=> true
|
61
|
+
irb> exit
|
62
|
+
</pre>
|
63
|
+
|
64
|
+
If the require returns false or an exception is raised, there has been a
|
65
|
+
problem with the installation. You may need to customize what setup.rb does on
|
66
|
+
install.
|
67
|
+
|
68
|
+
h2. Usage
|
69
|
+
|
70
|
+
This section covers using ActiveLdap from writing extension classes to
|
71
|
+
writing applications that use them.
|
72
|
+
|
73
|
+
Just to give a taste of what's to come, here is a quick example using irb:
|
74
|
+
|
75
|
+
<pre>
|
76
|
+
irb> require 'active_ldap'
|
77
|
+
</pre>
|
78
|
+
|
79
|
+
Call setup_connection method for connect to LDAP server. In this case, LDAP server
|
80
|
+
is localhost, and base of LDAP tree is "dc=dataspill,dc=org".
|
81
|
+
|
82
|
+
<pre>
|
83
|
+
irb> ActiveLdap::Base.setup_connection :host => 'localhost', :base => 'dc=dataspill,dc=org'
|
84
|
+
</pre>
|
85
|
+
|
86
|
+
Here's an extension class that maps to the LDAP Group objects:
|
87
|
+
|
88
|
+
<pre>
|
89
|
+
irb> class Group < ActiveLdap::Base
|
90
|
+
irb* ldap_mapping
|
91
|
+
irb* end
|
92
|
+
</pre>
|
93
|
+
|
94
|
+
In the above code, Group class handles sub tree of ou=Groups
|
95
|
+
tha is :base value specified by setup_connection. A instance
|
96
|
+
of Group class represents a LDAP object under ou=Gruops.
|
97
|
+
|
98
|
+
Here is the Group class in use:
|
99
|
+
|
100
|
+
<pre>
|
101
|
+
# Get all group names
|
102
|
+
irb> all_groups = Group.find(:all, '*').collect {|group| group.cn}
|
103
|
+
=> ["root", "daemon", "bin", "sys", "adm", "tty", ..., "develop"]
|
104
|
+
|
105
|
+
# Get LDAP objects in develop group
|
106
|
+
irb> group = Group.find("develop")
|
107
|
+
=> #<Group objectClass:<...> ...>
|
108
|
+
|
109
|
+
# Get cn of the develop group
|
110
|
+
irb> group.cn
|
111
|
+
=> "develop"
|
112
|
+
|
113
|
+
# Get gid_number of the develop group
|
114
|
+
irb> group.gid_number
|
115
|
+
=> "1003"
|
116
|
+
</pre>
|
117
|
+
|
118
|
+
That's it! No let's get back in to it.
|
119
|
+
|
120
|
+
h3. Extension Classes
|
121
|
+
|
122
|
+
Extension classes are classes that are subclassed from ActiveLdap::Base. They
|
123
|
+
are used to represent objects in your LDAP server abstractly.
|
124
|
+
|
125
|
+
h4. Why do I need them?
|
126
|
+
|
127
|
+
Extension classes are what make ActiveLdap "active"! They do all the
|
128
|
+
background work to make easy-to-use objects by mapping the LDAP object's
|
129
|
+
attributes on to a Ruby class.
|
130
|
+
|
131
|
+
|
132
|
+
h4. Special Methods
|
133
|
+
|
134
|
+
I will briefly talk about each of the methods you can use when defining an
|
135
|
+
extension class. In the above example, I only made one special method call
|
136
|
+
inside the Group class. More than likely, you will want to more than that.
|
137
|
+
|
138
|
+
h5. ldap_mapping
|
139
|
+
|
140
|
+
ldap_mapping is the only required method to setup an extension class for use
|
141
|
+
with ActiveLdap. It must be called inside of a subclass as shown above.
|
142
|
+
|
143
|
+
Below is a much more realistic Group class:
|
144
|
+
|
145
|
+
<pre>
|
146
|
+
class Group < ActiveLdap::Base
|
147
|
+
ldap_mapping :dn_attribute => 'cn',
|
148
|
+
:prefix => 'ou=Groups', :classes => ['top', 'posixGroup'],
|
149
|
+
:scope => :one
|
150
|
+
end
|
151
|
+
</pre>
|
152
|
+
|
153
|
+
As you can see, this method is used for defining how this class maps in to LDAP. Let's say that
|
154
|
+
my LDAP tree looks something like this:
|
155
|
+
|
156
|
+
<pre>
|
157
|
+
* dc=dataspill,dc=org
|
158
|
+
|- ou=People,dc=dataspill,dc=org
|
159
|
+
|+ ou=Groups,dc=dataspill,dc=org
|
160
|
+
\
|
161
|
+
|- cn=develop,ou=Groups,dc=dataspill,dc=org
|
162
|
+
|- cn=root,ou=Groups,dc=dataspill,dc=org
|
163
|
+
|- ...
|
164
|
+
</pre>
|
165
|
+
|
166
|
+
Under ou=People I store user objects, and under ou=Groups, I store group
|
167
|
+
objects. What |ldap_mapping| has done is mapped the class in to the LDAP tree
|
168
|
+
abstractly. With the given :dn_attributes and :prefix, it will only work for
|
169
|
+
entries under ou=Groups,dc=dataspill,dc=org using the primary attribute 'cn'
|
170
|
+
as the beginning of the distinguished name.
|
171
|
+
|
172
|
+
Just for clarity, here's how the arguments map out:
|
173
|
+
|
174
|
+
<pre>
|
175
|
+
cn=develop,ou=Groups,dc=dataspill,dc=org
|
176
|
+
^^ ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^
|
177
|
+
:dn_attribute | |
|
178
|
+
:prefix |
|
179
|
+
:base from setup_connection
|
180
|
+
</pre>
|
181
|
+
|
182
|
+
:scope tells ActiveLdap to only search under ou=Groups, and not to look deeper
|
183
|
+
for dn_attribute matches.
|
184
|
+
(e.g. cn=develop,ou=DevGroups,ou=Groups,dc=dataspill,dc=org)
|
185
|
+
You can choose value from between :sub, :one and :base.
|
186
|
+
|
187
|
+
Something's missing: :classes. :classes is used to tell ActiveLdap what
|
188
|
+
the minimum requirement is when creating a new object. LDAP uses objectClasses
|
189
|
+
to define what attributes a LDAP object may have. ActiveLdap needs to know
|
190
|
+
what classes are required when creating a new object. Of course, you can leave
|
191
|
+
that field out to default to ['top'] only. Then you can let each application
|
192
|
+
choose what objectClasses their objects should have by calling the method e.g.
|
193
|
+
Group#add_class(*values).
|
194
|
+
|
195
|
+
Note that is can be very important to define the default :classes value. Due to
|
196
|
+
implementation choices with most LDAP servers, once an object is created, its
|
197
|
+
structural objectclasses may not be removed (or replaced). Setting a sane default
|
198
|
+
may help avoid programmer error later.
|
199
|
+
|
200
|
+
:classes isn't the only optional argument. If :dn_attribute is left off,
|
201
|
+
it defaults to super class's value or 'cn'. If :prefix is left off,
|
202
|
+
it will default to 'ou=PluralizedClassName'. In this
|
203
|
+
case, it would be 'ou=Groups'.
|
204
|
+
|
205
|
+
:classes should be an Array. :dn_attribute should be a String and so should
|
206
|
+
:prefix.
|
207
|
+
|
208
|
+
|
209
|
+
h5. belongs_to
|
210
|
+
|
211
|
+
This method allows an extension class to make use of other extension classes
|
212
|
+
tying objects together across the LDAP tree. Often, user objects will be
|
213
|
+
members of, or belong_to, Group objects.
|
214
|
+
|
215
|
+
<pre>
|
216
|
+
* dc=dataspill,dc=org
|
217
|
+
|+ ou=People,dc=dataspill,dc=org
|
218
|
+
\
|
219
|
+
|- uid=drewry,ou=People,dc=dataspill,dc=org
|
220
|
+
|- ou=Groups,dc=dataspill,dc=org
|
221
|
+
</pre>
|
222
|
+
|
223
|
+
|
224
|
+
In the above tree, one such example would be user 'drewry' who is a part of the
|
225
|
+
group 'develop'. You can see this by looking at the 'memberUid' field of 'develop'.
|
226
|
+
|
227
|
+
<pre>
|
228
|
+
irb> develop = Group.find('develop')
|
229
|
+
=> ...
|
230
|
+
irb> develop.memberUid
|
231
|
+
=> ['drewry', 'builder']
|
232
|
+
</pre>
|
233
|
+
|
234
|
+
If we look at the LDAP entry for 'drewry', we do not see any references to
|
235
|
+
group 'develop'. In order to remedy that, we can use belongs_to
|
236
|
+
|
237
|
+
<pre>
|
238
|
+
irb> class User < ActiveLdap::Base
|
239
|
+
irb* ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['top','account']
|
240
|
+
irb* belongs_to :groups, :class_name => 'Group', :many => 'memberUid', :foreign_key => 'uid'
|
241
|
+
irb* end
|
242
|
+
</pre>
|
243
|
+
|
244
|
+
Now, class User will have a method called 'groups' which will retrieve all
|
245
|
+
Group objects that a user is in.
|
246
|
+
|
247
|
+
<pre>
|
248
|
+
irb> me = User.find('drewry')
|
249
|
+
irb> me.groups
|
250
|
+
=> #<ActiveLdap::Association::BelongsToMany...> # Enumerable object
|
251
|
+
irb> me.groups.each { |group| p group.cn };nil
|
252
|
+
"cdrom"
|
253
|
+
"audio"
|
254
|
+
"develop"
|
255
|
+
=> nil
|
256
|
+
(Note: nil is just there to make the output cleaner...)
|
257
|
+
</pre>
|
258
|
+
|
259
|
+
TIP: If you weren't sure what the distinguished name attribute was for Group,
|
260
|
+
you could also do the following:
|
261
|
+
|
262
|
+
<pre>
|
263
|
+
irb> me.groups.each { |group| p group.id };nil
|
264
|
+
"cdrom"
|
265
|
+
"audio"
|
266
|
+
"develop"
|
267
|
+
=> nil
|
268
|
+
</pre>
|
269
|
+
|
270
|
+
Now let's talk about the arguments of belongs_to. We use the following code that extends Group group a bit for explain:
|
271
|
+
|
272
|
+
<pre>
|
273
|
+
class User < ActiveLdap::Base
|
274
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'People', :classes => ['top','account']
|
275
|
+
|
276
|
+
# Associate with primary belonged group
|
277
|
+
belongs_to :primary_group, :foreign_key => 'gidNumber',
|
278
|
+
:class_name => 'Group', :primary_key => 'gidNumber'
|
279
|
+
|
280
|
+
# Associate with all belonged groups
|
281
|
+
belongs_to :groups, :foreign_key => 'uid',
|
282
|
+
:class_name => 'Group', :many => 'memberUid',
|
283
|
+
end
|
284
|
+
</pre>
|
285
|
+
|
286
|
+
The first argument is the name of the method you wish to create. In this case, we created a method called primary_group and groups using the symbol :primary_group and :groups. The next collection of arguments are actually a Hash (as with ldap_mapping).
|
287
|
+
|
288
|
+
:foreign_key tells belongs_to what attribute Group objects have that match the related object's attribute. If :foreign_key is left off of the argument list, it is assumed to be the dn_attribute.
|
289
|
+
|
290
|
+
In the example, uid is used for :foreign_key. It may confuse you.
|
291
|
+
|
292
|
+
ActiveLdap uses :foreign_key as "own attribute name". So it
|
293
|
+
may not be "foreign key". You can consider :foreign_key just
|
294
|
+
as a relation key.
|
295
|
+
|
296
|
+
:primary_key is treated as "related object's attribute name"
|
297
|
+
as we discussed later.
|
298
|
+
|
299
|
+
:class_name should be a string that has the name of a class
|
300
|
+
you've already included. If your class is inside of a module,
|
301
|
+
be sure to put the whole name, e.g.
|
302
|
+
@:class_name => "MyLdapModule::Group"@.
|
303
|
+
|
304
|
+
:many and :primary_key are similar. Both of them specifies attribute name of related object specified by :foreign_key. Those values are attribute name that can be used by object of class specified by :class_name.
|
305
|
+
|
306
|
+
Relation is resolved by searching entries of :class_name class with :foreign_key attribute value. Search target attribute for it is :primary_key or :many. primary_group method in the above example searches Group objects with User object's gidNumber value as Group object's gidNumber value. Matched Group objects are belonged objects.
|
307
|
+
|
308
|
+
:parimary_key is used for an object just belongs to an object. The first matched object is treated as beloned object.
|
309
|
+
|
310
|
+
:many is used for an object belongs to many objects. All of matched objects are treated as belonged objects.
|
311
|
+
|
312
|
+
In addition, you can do simple membership tests by doing the following:
|
313
|
+
|
314
|
+
<pre>
|
315
|
+
irb> me.groups.member? 'root'
|
316
|
+
=> false
|
317
|
+
irb> me.groups.member? 'develop'
|
318
|
+
=> true
|
319
|
+
</pre>
|
320
|
+
|
321
|
+
h5. has_many
|
322
|
+
|
323
|
+
This method is the opposite of belongs_to. Instead of checking other objects in
|
324
|
+
other parts of the LDAP tree to see if you belong to them, you have multiple
|
325
|
+
objects from other trees listed in your object. To show this, we can just
|
326
|
+
invert the example from above:
|
327
|
+
|
328
|
+
<pre>
|
329
|
+
class Group < ActiveLdap::Base
|
330
|
+
ldap_mapping :dn_attribute => 'cn', :prefix => 'ou=Groups', :classes => ['top', 'posixGroup']
|
331
|
+
|
332
|
+
# Associate with primary belonged users
|
333
|
+
has_many :primary_members, :foreign_key => 'gidNumber',
|
334
|
+
:class_name => "User", :primary_key => 'gidNumber'
|
335
|
+
|
336
|
+
# Associate with all belonged users
|
337
|
+
has_many :members, :wrap => "memberUid",
|
338
|
+
:class_name => "User", :primary_key => 'uid'
|
339
|
+
end
|
340
|
+
</pre>
|
341
|
+
|
342
|
+
Now we can see that group develop has user 'drewry' as a member, and it can
|
343
|
+
even return all responses in object form just like belongs_to methods.
|
344
|
+
|
345
|
+
<pre>
|
346
|
+
irb> develop = Group.find('develop')
|
347
|
+
=> ...
|
348
|
+
irb> develop.members
|
349
|
+
=> #<ActiveLdap::Association::HasManyWrap:..> # Enumerable object
|
350
|
+
irb> develop.members.map{|member| member.id}
|
351
|
+
=> ["drewry", "builder"]
|
352
|
+
</pre>
|
353
|
+
|
354
|
+
The arguments for has_many follow the exact same idea that belongs_to's
|
355
|
+
arguments followed. :wrap's contents are used to search for matching
|
356
|
+
:primary_key content. If :primary_key is not specified, it defaults to the
|
357
|
+
dn_attribute of the specified :class_name.
|
358
|
+
|
359
|
+
h3. Using these new classes
|
360
|
+
|
361
|
+
These new classes have many method calls. Many of them are automatically
|
362
|
+
generated to provide access to the LDAP object's attributes. Other were defined
|
363
|
+
during class creation by special methods like belongs_to. There are a few other
|
364
|
+
methods that do not fall in to these categories.
|
365
|
+
|
366
|
+
h4. .find
|
367
|
+
|
368
|
+
.find is a class method that is accessible from
|
369
|
+
any subclass of Base that has 'ldap_mapping' called. When
|
370
|
+
called .first(:first) returns the first match of the given class.
|
371
|
+
|
372
|
+
<pre>
|
373
|
+
irb> Group.find(:first, 'deve*").cn
|
374
|
+
=> "develop"
|
375
|
+
</pre>
|
376
|
+
|
377
|
+
In this simple example, Group.find took the search string of 'deve*' and
|
378
|
+
searched for the first match in Group where the dn_attribute matched the
|
379
|
+
query. This is the simplest example of .find.
|
380
|
+
|
381
|
+
<pre>
|
382
|
+
irb> Group.find(:all).collect {|group| group.cn}
|
383
|
+
=> ["root", "daemon", "bin", "sys", "adm", "tty", ..., "develop"]
|
384
|
+
</pre>
|
385
|
+
|
386
|
+
Here .find(:all) returns all matches to the same query. Both .find(:first) and
|
387
|
+
.find(:all) also can take more expressive arguments:
|
388
|
+
|
389
|
+
<pre>
|
390
|
+
irb> Group.find(:all, :attribute => 'gidNumber', :value => '1003').collect {|group| group.cn}
|
391
|
+
=> ["develop"]
|
392
|
+
</pre>
|
393
|
+
|
394
|
+
So it is pretty clear what :attribute and :value do - they are used to query as
|
395
|
+
:attribute=:value.
|
396
|
+
|
397
|
+
If :attribute is unspecified, it defaults to the dn_attribute.
|
398
|
+
|
399
|
+
It is also possible to override :attribute and :value by specifying :filter. This
|
400
|
+
argument allows the direct specification of a LDAP filter to retrieve objects by.
|
401
|
+
|
402
|
+
h4. .search
|
403
|
+
|
404
|
+
.search is a class method that is accessible from any subclass of Base, and Base.
|
405
|
+
It lets the user perform an arbitrary search against the current LDAP connection
|
406
|
+
irrespetive of LDAP mapping data. This is meant to be useful as a utility method
|
407
|
+
to cover 80% of the cases where a user would want to use Base.connection directly.
|
408
|
+
|
409
|
+
<pre>
|
410
|
+
irb> Base.search(:base => 'dc=example,dc=com', :filter => '(uid=roo*)',
|
411
|
+
:scope => :sub, :attributes => ['uid', 'cn'])
|
412
|
+
=> [["uid=root,ou=People,dc=dataspill,dc=org",{"cn"=>["root"], "uidNumber"=>["0"]}]
|
413
|
+
</pre>
|
414
|
+
|
415
|
+
You can specify the :filter, :base, :scope, and :attributes, but they all have defaults --
|
416
|
+
* :filter defaults to objectClass=* - usually this isn't what you want
|
417
|
+
* :base defaults to the base of the class this is executed from (as set in ldap_mapping)
|
418
|
+
* :scope defaults to :sub. Usually you won't need to change it (You can choose value also from between :one and :base)
|
419
|
+
* :attributes defaults to [] and is the list of attributes you want back. Empty means all of them.
|
420
|
+
|
421
|
+
h4. #valid?
|
422
|
+
|
423
|
+
valid? is a method that verifies that all attributes that are required by the
|
424
|
+
objects current objectClasses are populated.
|
425
|
+
|
426
|
+
h4. #save
|
427
|
+
|
428
|
+
save is a method that writes any changes to an object back to the LDAP server.
|
429
|
+
It automatically handles the addition of new objects, and the modification of
|
430
|
+
existing ones.
|
431
|
+
|
432
|
+
h4. .exists?
|
433
|
+
|
434
|
+
exists? is a simple method which returns true is the current object exists in
|
435
|
+
LDAP, or false if it does not.
|
436
|
+
|
437
|
+
<pre>
|
438
|
+
irb> User.exists?("dshadsadsa")
|
439
|
+
=> false
|
440
|
+
</pre>
|
441
|
+
|
442
|
+
|
443
|
+
h3. ActiveLdap::Base
|
444
|
+
|
445
|
+
ActiveLdap::Base has come up a number of times in the examples above. Every
|
446
|
+
time, it was being used as the super class for the wrapper objects. While this
|
447
|
+
is it's main purpose, it also handles quite a bit more in the background.
|
448
|
+
|
449
|
+
h4. What is it?
|
450
|
+
|
451
|
+
ActiveLdap::Base is the heart of ActiveLdap. It does all the schema
|
452
|
+
parsing for validation and attribute-to-method mangling as well as manage the
|
453
|
+
connection to LDAP.
|
454
|
+
|
455
|
+
h5. setup_connection
|
456
|
+
|
457
|
+
Base.setup_connection takes many (optional) arguments and is used to
|
458
|
+
connect to the LDAP server. Sometimes you will want to connect anonymously
|
459
|
+
and other times over TLS with user credentials. Base.setup_connection is
|
460
|
+
here to do all of that for you.
|
461
|
+
|
462
|
+
|
463
|
+
By default, if you call any subclass of Base, such as Group, it will call
|
464
|
+
Base.setup_connection() if these is no active LDAP connection. If your
|
465
|
+
server allows anonymous binding, and you only want to access data in a
|
466
|
+
read-only fashion, you won't need to call Base.setup_connection. Here
|
467
|
+
is a fully parameterized call:
|
468
|
+
|
469
|
+
<pre>
|
470
|
+
Base.setup_connection(
|
471
|
+
:host => 'ldap.dataspill.org',
|
472
|
+
:port => 389,
|
473
|
+
:base => 'dc=dataspill,dc=org',
|
474
|
+
:logger => logger_object,
|
475
|
+
:bind_dn => "uid=drewry,ou=People,dc=dataspill,dc=org",
|
476
|
+
:password_block => Proc.new { 'password12345' },
|
477
|
+
:allow_anonymous => false,
|
478
|
+
:try_sasl => false
|
479
|
+
)
|
480
|
+
</pre>
|
481
|
+
|
482
|
+
There are quite a few arguments, but luckily many of them have safe defaults:
|
483
|
+
* :host defaults to "127.0.0.1".
|
484
|
+
* :port defaults to nil. 389 is applied if not specified.
|
485
|
+
* :bind_dn defaults to nil. anonymous binding is applied if not specified.
|
486
|
+
* :logger defaults to a Logger object that prints fatal messages to stderr
|
487
|
+
* :password_block defaults to nil
|
488
|
+
* :allow_anonymous defaults to true
|
489
|
+
* :try_sasl defaults to false - see Advanced Topics for more on this one.
|
490
|
+
|
491
|
+
|
492
|
+
Most of these are obvious, but I'll step through them for completeness:
|
493
|
+
* :host defines the LDAP server hostname to connect to.
|
494
|
+
* :port defines the LDAP server port to connect to.
|
495
|
+
* :method defines the type of connection - :tls, :ssl, :plain
|
496
|
+
* :base specifies the LDAP search base to use with the prefixes defined in all
|
497
|
+
subclasses.
|
498
|
+
* :bind_dn specifies what your server expects when attempting to bind with
|
499
|
+
credentials.
|
500
|
+
* :logger accepts a custom logger object to integrate with any other logging
|
501
|
+
your application uses.
|
502
|
+
* :password_block, if defined, give the Proc block for acquiring the password
|
503
|
+
* :password, if defined, give the user's password as a String
|
504
|
+
* :store_password indicates whether the password should be stored, or if used
|
505
|
+
whether the :password_block should be called on each reconnect.
|
506
|
+
* :allow_anonymous determines whether anonymous binding is allowed if other
|
507
|
+
bind methods fail
|
508
|
+
* :try_sasl, when true, tells ActiveLdap to attempt a SASL-GSSAPI bind
|
509
|
+
* :sasl_quiet, when true, tells the SASL libraries to not spew messages to STDOUT
|
510
|
+
* :sasl_options, if defined, should be a hash of options to pass through. This currently only works with the ruby-ldap adapter, which currently only supports :realm, :authcid, and :authzid.
|
511
|
+
* :retry_limit - indicates the number of attempts to reconnect that will be undertaken when a stale connection occurs. -1 means infinite.
|
512
|
+
* :retry_wait - seconds to wait before retrying a connection
|
513
|
+
* :scope - dictates how to find objects. (Default: :one)
|
514
|
+
* :timeout - time in seconds - defaults to disabled. This CAN interrupt search() requests. Be warned.
|
515
|
+
* :retry_on_timeout - whether to reconnect when timeouts occur. Defaults to true
|
516
|
+
See lib/configuration.rb(ActiveLdap::Configuration::DEFAULT_CONFIG) for defaults for each option
|
517
|
+
|
518
|
+
Base.setup_connection just setups connection
|
519
|
+
configuration. A connection is connected and bound when it
|
520
|
+
is needed. It follows roughly the following approach:
|
521
|
+
|
522
|
+
* Connect to host:port using :method
|
523
|
+
|
524
|
+
* If bind_dn and password_block/password, attempt to bind with credentials.
|
525
|
+
* If that fails or no password_block and anonymous allowed, attempt to bind
|
526
|
+
anonymously.
|
527
|
+
* If that fails, error out.
|
528
|
+
|
529
|
+
On connect, the configuration options passed in are stored
|
530
|
+
in an internal class variable which is used to cache the
|
531
|
+
information without ditching the defaults passed in from
|
532
|
+
configuration.rb
|
533
|
+
|
534
|
+
h5. connection
|
535
|
+
|
536
|
+
Base.connection returns the ActiveLdap::Connection object.
|
537
|
+
|
538
|
+
h3. Exceptions
|
539
|
+
|
540
|
+
There are a few custom exceptions used in ActiveLdap. They are detailed below.
|
541
|
+
|
542
|
+
h4. DeleteError
|
543
|
+
|
544
|
+
This exception is raised when #delete fails. It will include LDAP error
|
545
|
+
information that was passed up during the error.
|
546
|
+
|
547
|
+
h4. SaveError
|
548
|
+
|
549
|
+
This exception is raised when there is a problem in #save updating or creating
|
550
|
+
an LDAP entry. Often the error messages are cryptic. Looking at the server
|
551
|
+
logs or doing an "Wireshark":http://www.wireshark.org dump of the connection will
|
552
|
+
often provide better insight.
|
553
|
+
|
554
|
+
h4. AuthenticationError
|
555
|
+
|
556
|
+
This exception is raised during Base.setup_connection if no valid authentication methods
|
557
|
+
succeeded.
|
558
|
+
|
559
|
+
h4. ConnectionError
|
560
|
+
|
561
|
+
This exception is raised during Base.setup_connection if no valid
|
562
|
+
connection to the LDAP server could be created. Check you
|
563
|
+
Base.setup_connection arguments, and network connectivity! Also check
|
564
|
+
your LDAP server logs to see if it ever saw the request.
|
565
|
+
|
566
|
+
h4. ObjectClassError
|
567
|
+
|
568
|
+
This exception is raised when an object class is used that is not defined
|
569
|
+
in the schema.
|
570
|
+
|
571
|
+
h3. Others
|
572
|
+
|
573
|
+
Other exceptions may be raised by the Ruby/LDAP module, or by other subsystems.
|
574
|
+
If you get one of these exceptions and think it should be wrapped, write me an
|
575
|
+
email and let me know where it is and what you expected. For faster results,
|
576
|
+
email a patch!
|
577
|
+
|
578
|
+
h3. Putting it all together
|
579
|
+
|
580
|
+
Now that all of the components of ActiveLdap have been covered, it's time
|
581
|
+
to put it all together! The rest of this section will show the steps to setup
|
582
|
+
example user and group management scripts for use with the LDAP tree described
|
583
|
+
above.
|
584
|
+
|
585
|
+
All of the scripts here are in the package's examples/ directory.
|
586
|
+
|
587
|
+
h4. Setting up
|
588
|
+
|
589
|
+
Create directory for scripts.
|
590
|
+
|
591
|
+
<pre>
|
592
|
+
mkdir -p ldapadmin/objects
|
593
|
+
</pre>
|
594
|
+
|
595
|
+
In ldapadmin/objects/ create the file user.rb:
|
596
|
+
|
597
|
+
<pre>
|
598
|
+
require 'objects/group'
|
599
|
+
|
600
|
+
class User < ActiveLdap::Base
|
601
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['person', 'posixAccount']
|
602
|
+
belongs_to :groups, :class_name => 'Group', :many => 'memberUid'
|
603
|
+
end
|
604
|
+
</pre>
|
605
|
+
|
606
|
+
In ldapadmin/objects/ create the file group.rb:
|
607
|
+
|
608
|
+
<pre>
|
609
|
+
class Group < ActiveLdap::Base
|
610
|
+
ldap_mapping :classes => ['top', 'posixGroup'], :prefix => 'ou=Groups'
|
611
|
+
has_many :members, :class_name => "User", :wrap => "memberUid"
|
612
|
+
has_many :primary_members, :class_name => 'User', :foreign_key => 'gidNumber', :primary_key => 'gidNumber'
|
613
|
+
end
|
614
|
+
</pre>
|
615
|
+
|
616
|
+
Now, we can write some small scripts to do simple management tasks.
|
617
|
+
|
618
|
+
h4. Creating LDAP entries
|
619
|
+
|
620
|
+
Now let's create a really dumb script for adding users - ldapadmin/useradd:
|
621
|
+
|
622
|
+
<pre>
|
623
|
+
#!/usr/bin/ruby -W0
|
624
|
+
|
625
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
626
|
+
$LOAD_PATH << File.join(base, "lib")
|
627
|
+
$LOAD_PATH << File.join(base, "examples")
|
628
|
+
|
629
|
+
require 'rubygems'
|
630
|
+
require 'active_ldap'
|
631
|
+
require 'objects/user'
|
632
|
+
require 'objects/group'
|
633
|
+
|
634
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
635
|
+
opts.banner += " USER_NAME CN UID"
|
636
|
+
end
|
637
|
+
|
638
|
+
if argv.size == 3
|
639
|
+
name, cn, uid = argv
|
640
|
+
else
|
641
|
+
$stderr.puts opts
|
642
|
+
exit 1
|
643
|
+
end
|
644
|
+
|
645
|
+
pwb = Proc.new do |user|
|
646
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
647
|
+
end
|
648
|
+
|
649
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
650
|
+
:allow_anonymous => false)
|
651
|
+
|
652
|
+
if User.exists?(name)
|
653
|
+
$stderr.puts("User #{name} already exists.")
|
654
|
+
exit 1
|
655
|
+
end
|
656
|
+
|
657
|
+
user = User.new(name)
|
658
|
+
user.add_class('shadowAccount')
|
659
|
+
user.cn = cn
|
660
|
+
user.uid_number = uid
|
661
|
+
user.gid_number = uid
|
662
|
+
user.home_directory = "/home/#{name}"
|
663
|
+
user.sn = "somesn"
|
664
|
+
unless user.save
|
665
|
+
puts "failed"
|
666
|
+
puts user.errors.full_messages
|
667
|
+
exit 1
|
668
|
+
end
|
669
|
+
</pre>
|
670
|
+
|
671
|
+
h4. Managing LDAP entries
|
672
|
+
|
673
|
+
Now let's create another dumb script for modifying users - ldapadmin/usermod:
|
674
|
+
|
675
|
+
<pre>
|
676
|
+
#!/usr/bin/ruby -W0
|
677
|
+
|
678
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
679
|
+
$LOAD_PATH << File.join(base, "lib")
|
680
|
+
$LOAD_PATH << File.join(base, "examples")
|
681
|
+
|
682
|
+
require 'rubygems'
|
683
|
+
require 'active_ldap'
|
684
|
+
require 'objects/user'
|
685
|
+
require 'objects/group'
|
686
|
+
|
687
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
688
|
+
opts.banner += " USER_NAME CN UID"
|
689
|
+
end
|
690
|
+
|
691
|
+
if argv.size == 3
|
692
|
+
name, cn, uid = argv
|
693
|
+
else
|
694
|
+
$stderr.puts opts
|
695
|
+
exit 1
|
696
|
+
end
|
697
|
+
|
698
|
+
pwb = Proc.new do |user|
|
699
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
700
|
+
end
|
701
|
+
|
702
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
703
|
+
:allow_anonymous => false)
|
704
|
+
|
705
|
+
unless User.exists?(name)
|
706
|
+
$stderr.puts("User #{name} doesn't exist.")
|
707
|
+
exit 1
|
708
|
+
end
|
709
|
+
|
710
|
+
user = User.find(name)
|
711
|
+
user.cn = cn
|
712
|
+
user.uid_number = uid
|
713
|
+
user.gid_number = uid
|
714
|
+
unless user.save
|
715
|
+
puts "failed"
|
716
|
+
puts user.errors.full_messages
|
717
|
+
exit 1
|
718
|
+
end
|
719
|
+
</pre>
|
720
|
+
|
721
|
+
h4. Removing LDAP entries
|
722
|
+
|
723
|
+
Now let's create more one for deleting users - ldapadmin/userdel:
|
724
|
+
|
725
|
+
<pre>
|
726
|
+
#!/usr/bin/ruby -W0
|
727
|
+
|
728
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
729
|
+
$LOAD_PATH << File.join(base, "lib")
|
730
|
+
$LOAD_PATH << File.join(base, "examples")
|
731
|
+
|
732
|
+
require 'rubygems'
|
733
|
+
require 'active_ldap'
|
734
|
+
require 'objects/user'
|
735
|
+
require 'objects/group'
|
736
|
+
|
737
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
738
|
+
opts.banner += " USER_NAME"
|
739
|
+
end
|
740
|
+
|
741
|
+
if argv.size == 1
|
742
|
+
name = argv.shift
|
743
|
+
else
|
744
|
+
$stderr.puts opts
|
745
|
+
exit 1
|
746
|
+
end
|
747
|
+
|
748
|
+
pwb = Proc.new do |user|
|
749
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
750
|
+
end
|
751
|
+
|
752
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
753
|
+
:allow_anonymous => false)
|
754
|
+
|
755
|
+
unless User.exists?(name)
|
756
|
+
$stderr.puts("User #{name} doesn't exist.")
|
757
|
+
exit 1
|
758
|
+
end
|
759
|
+
|
760
|
+
User.destroy(name)
|
761
|
+
</pre>
|
762
|
+
|
763
|
+
h3. Advanced Topics
|
764
|
+
|
765
|
+
Below are some situation tips and tricks to get the most out of ActiveLdap.
|
766
|
+
|
767
|
+
|
768
|
+
h4. Binary data and other subtypes
|
769
|
+
|
770
|
+
Sometimes, you may want to store attributes with language specifiers, or
|
771
|
+
perhaps in binary form. This is (finally!) fully supported. To do so,
|
772
|
+
follow the examples below:
|
773
|
+
|
774
|
+
<pre>
|
775
|
+
irb> user = User.new('drewry')
|
776
|
+
=> ...
|
777
|
+
# This adds a cn entry in lang-en and whatever the server default is.
|
778
|
+
irb> user.cn = [ 'wad', {'lang-en' => ['wad', 'Will Drewry']} ]
|
779
|
+
=> ...
|
780
|
+
irb> user.cn
|
781
|
+
=> ["wad", {"lang-en-us" => ["wad", "Will Drewry"]}]
|
782
|
+
# Now let's add a binary X.509 certificate (assume objectClass is correct)
|
783
|
+
irb> user.user_certificate = File.read('example.der')
|
784
|
+
=> ...
|
785
|
+
irb> user.save
|
786
|
+
</pre>
|
787
|
+
|
788
|
+
So that's a lot to take in. Here's what is going on. I just set the LDAP
|
789
|
+
object's cn to "wad" and cn:lang-en-us to ["wad", "Will Drewry"].
|
790
|
+
Anytime a LDAP subtype is required, you must encapsulate the data in a Hash.
|
791
|
+
|
792
|
+
But wait a minute, I just read in a binary certificate without wrapping it up.
|
793
|
+
So any binary attribute _that requires ;binary subtyping_ will automagically
|
794
|
+
get wrapped in @{'binary' => value}@ if you don't do it. This keeps your #writes
|
795
|
+
from breaking, and my code from crying. For correctness, I could have easily
|
796
|
+
done the following:
|
797
|
+
|
798
|
+
<pre>
|
799
|
+
irb> user.user_certificate = {'binary' => File.read('example.der')}
|
800
|
+
</pre>
|
801
|
+
|
802
|
+
You should note that some binary data does not use the binary subtype all the time.
|
803
|
+
One example is jpegPhoto. You can use it as jpegPhoto;binary or just as jpegPhoto.
|
804
|
+
Since the schema dictates that it is a binary value, ActiveLdap will write
|
805
|
+
it as binary, but the subtype will not be automatically appended as above. The
|
806
|
+
use of the subtype on attributes like jpegPhoto is ultimately decided by the
|
807
|
+
LDAP site policy and not by any programmatic means.
|
808
|
+
|
809
|
+
The only subtypes defined in LDAPv3 are lang-* and binary. These can be nested
|
810
|
+
though:
|
811
|
+
|
812
|
+
<pre>
|
813
|
+
irb> user.cn = [{'lang-ja' => {'binary' => 'some Japanese'}}]
|
814
|
+
</pre>
|
815
|
+
|
816
|
+
As I understand it, OpenLDAP does not support nested subtypes, but some
|
817
|
+
documentation I've read suggests that Netscape's LDAP server does. I only
|
818
|
+
have access to OpenLDAP. If anyone tests this out, please let me know how it
|
819
|
+
goes!
|
820
|
+
|
821
|
+
|
822
|
+
And that pretty much wraps up this section.
|
823
|
+
|
824
|
+
h4. Further integration with your environment aka namespacing
|
825
|
+
|
826
|
+
If you want this to cleanly integrate into your system-wide Ruby include path,
|
827
|
+
you should put your extension classes inside a custom module.
|
828
|
+
|
829
|
+
|
830
|
+
Example:
|
831
|
+
|
832
|
+
./myldap.rb:
|
833
|
+
|
834
|
+
<pre>
|
835
|
+
require 'active_ldap'
|
836
|
+
require 'myldap/user'
|
837
|
+
require 'myldap/group'
|
838
|
+
module MyLDAP
|
839
|
+
end
|
840
|
+
</pre>
|
841
|
+
|
842
|
+
./myldap/user.rb:
|
843
|
+
|
844
|
+
<pre>
|
845
|
+
module MyLDAP
|
846
|
+
class User < ActiveLdap::Base
|
847
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['top', 'account', 'posixAccount']
|
848
|
+
belongs_to :groups, :class_name => 'MyLDAP::Group', :many => 'memberUid'
|
849
|
+
end
|
850
|
+
end
|
851
|
+
</pre>
|
852
|
+
|
853
|
+
./myldap/group.rb:
|
854
|
+
|
855
|
+
<pre>
|
856
|
+
module MyLDAP
|
857
|
+
class Group < ActiveLdap::Base
|
858
|
+
ldap_mapping :classes => ['top', 'posixGroup'], :prefix => 'ou=Groups'
|
859
|
+
has_many :members, :class_name => 'MyLDAP::User', :wrap => 'memberUid'
|
860
|
+
has_many :primary_members, :class_name => 'MyLDAP::User', :foreign_key => 'gidNumber', :primary_key => 'gidNumber'
|
861
|
+
end
|
862
|
+
end
|
863
|
+
</pre>
|
864
|
+
|
865
|
+
Now in your local applications, you can call
|
866
|
+
|
867
|
+
<pre>
|
868
|
+
require 'myldap'
|
869
|
+
|
870
|
+
MyLDAP::Group.new('foo')
|
871
|
+
...
|
872
|
+
</pre>
|
873
|
+
|
874
|
+
and everything should work well.
|
875
|
+
|
876
|
+
|
877
|
+
h4. force array results for single values
|
878
|
+
|
879
|
+
Even though ActiveLdap attempts to maintain programmatic ease by
|
880
|
+
returning Array values only. By specifying 'true' as an argument to
|
881
|
+
any attribute method you will get back a Array if it is single value.
|
882
|
+
Here's an example:
|
883
|
+
|
884
|
+
<pre>
|
885
|
+
irb> user = User.new('drewry')
|
886
|
+
=> ...
|
887
|
+
irb> user.cn(true)
|
888
|
+
=> ["Will Drewry"]
|
889
|
+
</pre>
|
890
|
+
|
891
|
+
h4. Dynamic attribute crawling
|
892
|
+
|
893
|
+
If you use tab completion in irb, you'll notice that you /can/ tab complete the dynamic
|
894
|
+
attribute methods. You can still see which methods are for attributes using
|
895
|
+
Base#attribute_names:
|
896
|
+
|
897
|
+
<pre>
|
898
|
+
irb> d = Group.new('develop')
|
899
|
+
=> ...
|
900
|
+
irb> d.attribute_names
|
901
|
+
=> ["gidNumber", "cn", "memberUid", "commonName", "description", "userPassword", "objectClass"]
|
902
|
+
</pre>
|
903
|
+
|
904
|
+
|
905
|
+
h4. Juggling multiple LDAP connections
|
906
|
+
|
907
|
+
In the same vein as the last tip, you can use multiple LDAP connections by
|
908
|
+
per class as follows:
|
909
|
+
|
910
|
+
<pre>
|
911
|
+
irb> anon_class = Class.new(Base)
|
912
|
+
=> ...
|
913
|
+
irb> anon_class.setup_connection
|
914
|
+
=> ...
|
915
|
+
irb> auth_class = Class.new(Base)
|
916
|
+
=> ...
|
917
|
+
irb> auth_class.setup_connection(:password_block => lambda{'mypass'})
|
918
|
+
=> ...
|
919
|
+
</pre>
|
920
|
+
|
921
|
+
This can be useful for doing authentication tests and other such tricks.
|
922
|
+
|
923
|
+
h4. :try_sasl
|
924
|
+
|
925
|
+
If you have the Ruby/LDAP package with the SASL/GSSAPI patch from Ian
|
926
|
+
MacDonald's web site, you can use Kerberos to bind to your LDAP server. By
|
927
|
+
default, :try_sasl is false.
|
928
|
+
|
929
|
+
Also note that you must be using OpenLDAP 2.1.29 or higher to use SASL/GSSAPI
|
930
|
+
due to some bugs in older versions of OpenLDAP.
|
931
|
+
|
932
|
+
h4. Don't be afraid! [Internals]
|
933
|
+
|
934
|
+
Don't be afraid to add more methods to the extensions classes and to
|
935
|
+
experiment. That's exactly how I ended up with this package. If you come up
|
936
|
+
with something cool, please share it!
|
937
|
+
|
938
|
+
The internal structure of ActiveLdap::Base, and thus all its subclasses, is
|
939
|
+
still in flux. I've tried to minimize the changes to the overall API, but
|
940
|
+
the internals are still rough around the edges.
|
941
|
+
|
942
|
+
h5. Where's ldap_mapping data stored? How can I get to it?
|
943
|
+
|
944
|
+
When you call ldap_mapping, it overwrites several class methods inherited
|
945
|
+
from Base:
|
946
|
+
* Base.base()
|
947
|
+
* Base.required_classes()
|
948
|
+
* Base.dn_attribute()
|
949
|
+
|
950
|
+
You can access these from custom class methods by calling MyClass.base(),
|
951
|
+
or whatever. There are predefined instance methods for getting to these
|
952
|
+
from any new instance methods you define:
|
953
|
+
* Base#base()
|
954
|
+
* Base#required_classes()
|
955
|
+
* Base#dn_attribute()
|
956
|
+
|
957
|
+
h5. What else?
|
958
|
+
|
959
|
+
Well if you want to use the LDAP connection for anything, I'd suggest still
|
960
|
+
calling Base.connection to get it. There really aren't many other internals
|
961
|
+
that need to be worried about. You could get the LDAP schema with
|
962
|
+
Base.schema.
|
963
|
+
|
964
|
+
The only other useful tricks are dereferencing and accessing the stored
|
965
|
+
data. Since LDAP attributes can have multiple names, e.g. cn or commonName,
|
966
|
+
any methods you write might need to figure it out. I'd suggest just
|
967
|
+
calling self[attribname] to get the value, but if that's not good enough,
|
968
|
+
you can call look up the stored name by #to_real_attribute_name as follows:
|
969
|
+
|
970
|
+
<pre>
|
971
|
+
irb> User.find(:first).instance_eval do
|
972
|
+
irb> to_real_attribute_name('commonName')
|
973
|
+
irb> end
|
974
|
+
=> 'cn'
|
975
|
+
</pre>
|
976
|
+
|
977
|
+
This tells you the name the attribute is stored in behind the scenes (@data).
|
978
|
+
Again, self[attribname] should be enough for most extensions, but if not,
|
979
|
+
it's probably safe to dabble here.
|
980
|
+
|
981
|
+
Also, if you like to look up all aliases for an attribute, you can call the
|
982
|
+
following:
|
983
|
+
|
984
|
+
<pre>
|
985
|
+
irb> User.schema.attribute_type 'cn', 'NAME'
|
986
|
+
=> ["cn", "commonName"]
|
987
|
+
</pre>
|
988
|
+
|
989
|
+
This is discovered automagically from the LDAP server's schema.
|
990
|
+
|
991
|
+
h2. Limitations
|
992
|
+
|
993
|
+
h3. Speed
|
994
|
+
|
995
|
+
Currently, ActiveLdap could be faster. I have some recursive type
|
996
|
+
checking going on which slows object creation down, and I'm sure there
|
997
|
+
are many, many other places optimizations can be done. Feel free
|
998
|
+
to send patches, or just hang in there until I can optimize away the
|
999
|
+
slowness.
|
1000
|
+
|
1001
|
+
h2. Feedback
|
1002
|
+
|
1003
|
+
Any and all feedback and patches are welcome. I am very excited about this
|
1004
|
+
package, and I'd like to see it prove helpful to more people than just myself.
|
1005
|
+
|