activeldap 1.2.4 → 3.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/Gemfile +18 -0
- data/LICENSE +2 -1
- data/README.textile +137 -0
- data/doc/text/development.textile +50 -0
- data/{CHANGES → doc/text/news.textile} +256 -237
- data/doc/text/rails.textile +144 -0
- data/doc/text/tutorial.textile +1005 -0
- data/lib/active_ldap/adapter/base.rb +5 -3
- data/lib/active_ldap/adapter/net_ldap_ext.rb +1 -1
- data/lib/active_ldap/associations.rb +6 -2
- data/lib/active_ldap/base.rb +16 -71
- data/lib/active_ldap/callbacks.rb +52 -33
- data/lib/active_ldap/configuration.rb +2 -2
- data/lib/active_ldap/get_text/parser.rb +2 -2
- data/lib/active_ldap/human_readable.rb +5 -4
- data/lib/active_ldap/log_subscriber.rb +50 -0
- data/lib/active_ldap/persistence.rb +65 -0
- data/lib/active_ldap/railtie.rb +40 -0
- data/lib/active_ldap/railties/controller_runtime.rb +48 -0
- data/lib/active_ldap/user_password.rb +1 -0
- data/lib/active_ldap/validations.rb +34 -72
- data/lib/active_ldap.rb +13 -912
- data/{rails_generators/model_active_ldap → lib/rails/generators/active_ldap/model}/USAGE +2 -1
- data/lib/rails/generators/active_ldap/model/model_generator.rb +47 -0
- data/{rails_generators/model_active_ldap → lib/rails/generators/active_ldap/model}/templates/model_active_ldap.rb +0 -0
- data/lib/rails/generators/active_ldap/scaffold/scaffold_generator.rb +14 -0
- data/{rails_generators/scaffold_active_ldap → lib/rails/generators/active_ldap/scaffold}/templates/ldap.yml +1 -0
- data/test/test_base.rb +9 -0
- data/test/test_callback.rb +2 -6
- data/test/test_connection.rb +2 -2
- data/test/test_user.rb +2 -2
- data/test/test_validation.rb +11 -11
- metadata +165 -106
- data/README +0 -155
- data/Rakefile +0 -133
- data/rails/README +0 -54
- data/rails/init.rb +0 -33
- data/rails_generators/model_active_ldap/model_active_ldap_generator.rb +0 -69
- data/rails_generators/model_active_ldap/templates/unit_test.rb +0 -8
- data/rails_generators/scaffold_active_ldap/scaffold_active_ldap_generator.rb +0 -7
- data/test/al-test-utils.rb +0 -439
- data/test/command.rb +0 -112
- data/test/config.yaml.sample +0 -6
- data/test/fixtures/lower_case_object_class_schema.rb +0 -802
- data/test/run-test.rb +0 -44
@@ -0,0 +1,1005 @@
|
|
1
|
+
h1. Tutorial
|
2
|
+
|
3
|
+
h2. Introduction
|
4
|
+
|
5
|
+
ActiveLdap is a novel way of interacting with LDAP. Most interaction with
|
6
|
+
LDAP is done using clunky LDIFs, web interfaces, or with painful APIs that
|
7
|
+
required a thick reference manual nearby. ActiveLdap aims to fix that.
|
8
|
+
Inspired by "ActiveRecord":http://activerecord.rubyonrails.org, ActiveLdap provides an
|
9
|
+
object oriented interface to LDAP entries.
|
10
|
+
|
11
|
+
The target audience is system administrators and LDAP users everywhere that
|
12
|
+
need quick, clean access to LDAP in Ruby.
|
13
|
+
|
14
|
+
h3. What's LDAP?
|
15
|
+
|
16
|
+
LDAP stands for "Lightweight Directory Access Protocol." Basically this means
|
17
|
+
that it is the protocol used for accessing LDAP servers. LDAP servers
|
18
|
+
lightweight directories. An LDAP server can contain anything from a simple
|
19
|
+
digital phonebook to user accounts for computer systems. More and more
|
20
|
+
frequently, it is being used for the latter. My examples in this text will
|
21
|
+
assume some familiarity with using LDAP as a centralized authentication and
|
22
|
+
authorization server for Unix systems. (Unfortunately, I've yet to try this
|
23
|
+
against Microsoft's ActiveDirectory, despite what the name implies.)
|
24
|
+
|
25
|
+
Further reading:
|
26
|
+
* "RFC1777":http://www.faqs.org/rfcs/rfc1777.html - Lightweight Directory Access Protocol
|
27
|
+
* "OpenLDAP":http://www.openldap.org
|
28
|
+
|
29
|
+
h3. So why use ActiveLdap?
|
30
|
+
|
31
|
+
Using LDAP directly (even with the excellent Ruby/LDAP), leaves you bound to
|
32
|
+
the world of the predefined LDAP API. While this API is important for many
|
33
|
+
reasons, having to extract code out of LDAP search blocks and create huge
|
34
|
+
arrays of LDAP.mod entries make code harder to read, less intuitive, and just
|
35
|
+
less fun to write. Hopefully, ActiveLdap will remedy all of these
|
36
|
+
problems!
|
37
|
+
|
38
|
+
h2. Getting Started
|
39
|
+
|
40
|
+
h3. Requirements
|
41
|
+
|
42
|
+
* A Ruby implementation: "Ruby":http://www.ruby-lang.org 1.8.x, 1.9.1 or "JRuby":http://jruby.codehaus.org/
|
43
|
+
* A LDAP library: "Ruby/LDAP":http://code.google.com/p/ruby-activeldap/wiki/RubyLDAP (for Ruby), "Net::LDAP":http://rubyforge.org/projects/net-ldap/ (for Ruby or JRuby) or JNDI (for JRuby)
|
44
|
+
* A LDAP server: "OpenLDAP":http://www.openldap.org, etc
|
45
|
+
** Your LDAP server must allow root_dse queries to allow for schema queries
|
46
|
+
|
47
|
+
h3. Installation
|
48
|
+
|
49
|
+
Assuming all the requirements are installed, you can install by gem.
|
50
|
+
|
51
|
+
<pre>
|
52
|
+
# gem install activeldap
|
53
|
+
</pre>
|
54
|
+
|
55
|
+
Now as a quick test, you can run:
|
56
|
+
|
57
|
+
<pre>
|
58
|
+
$ irb -rubygems
|
59
|
+
irb> require 'active_ldap'
|
60
|
+
=> true
|
61
|
+
irb> exit
|
62
|
+
</pre>
|
63
|
+
|
64
|
+
If the require returns false or an exception is raised, there has been a
|
65
|
+
problem with the installation. You may need to customize what setup.rb does on
|
66
|
+
install.
|
67
|
+
|
68
|
+
h2. Usage
|
69
|
+
|
70
|
+
This section covers using ActiveLdap from writing extension classes to
|
71
|
+
writing applications that use them.
|
72
|
+
|
73
|
+
Just to give a taste of what's to come, here is a quick example using irb:
|
74
|
+
|
75
|
+
<pre>
|
76
|
+
irb> require 'active_ldap'
|
77
|
+
</pre>
|
78
|
+
|
79
|
+
Call setup_connection method for connect to LDAP server. In this case, LDAP server
|
80
|
+
is localhost, and base of LDAP tree is "dc=dataspill,dc=org".
|
81
|
+
|
82
|
+
<pre>
|
83
|
+
irb> ActiveLdap::Base.setup_connection :host => 'localhost', :base => 'dc=dataspill,dc=org'
|
84
|
+
</pre>
|
85
|
+
|
86
|
+
Here's an extension class that maps to the LDAP Group objects:
|
87
|
+
|
88
|
+
<pre>
|
89
|
+
irb> class Group < ActiveLdap::Base
|
90
|
+
irb* ldap_mapping
|
91
|
+
irb* end
|
92
|
+
</pre>
|
93
|
+
|
94
|
+
In the above code, Group class handles sub tree of ou=Groups
|
95
|
+
tha is :base value specified by setup_connection. A instance
|
96
|
+
of Group class represents a LDAP object under ou=Gruops.
|
97
|
+
|
98
|
+
Here is the Group class in use:
|
99
|
+
|
100
|
+
<pre>
|
101
|
+
# Get all group names
|
102
|
+
irb> all_groups = Group.find(:all, '*').collect {|group| group.cn}
|
103
|
+
=> ["root", "daemon", "bin", "sys", "adm", "tty", ..., "develop"]
|
104
|
+
|
105
|
+
# Get LDAP objects in develop group
|
106
|
+
irb> group = Group.find("develop")
|
107
|
+
=> #<Group objectClass:<...> ...>
|
108
|
+
|
109
|
+
# Get cn of the develop group
|
110
|
+
irb> group.cn
|
111
|
+
=> "develop"
|
112
|
+
|
113
|
+
# Get gid_number of the develop group
|
114
|
+
irb> group.gid_number
|
115
|
+
=> "1003"
|
116
|
+
</pre>
|
117
|
+
|
118
|
+
That's it! No let's get back in to it.
|
119
|
+
|
120
|
+
h3. Extension Classes
|
121
|
+
|
122
|
+
Extension classes are classes that are subclassed from ActiveLdap::Base. They
|
123
|
+
are used to represent objects in your LDAP server abstractly.
|
124
|
+
|
125
|
+
h4. Why do I need them?
|
126
|
+
|
127
|
+
Extension classes are what make ActiveLdap "active"! They do all the
|
128
|
+
background work to make easy-to-use objects by mapping the LDAP object's
|
129
|
+
attributes on to a Ruby class.
|
130
|
+
|
131
|
+
|
132
|
+
h4. Special Methods
|
133
|
+
|
134
|
+
I will briefly talk about each of the methods you can use when defining an
|
135
|
+
extension class. In the above example, I only made one special method call
|
136
|
+
inside the Group class. More than likely, you will want to more than that.
|
137
|
+
|
138
|
+
h5. ldap_mapping
|
139
|
+
|
140
|
+
ldap_mapping is the only required method to setup an extension class for use
|
141
|
+
with ActiveLdap. It must be called inside of a subclass as shown above.
|
142
|
+
|
143
|
+
Below is a much more realistic Group class:
|
144
|
+
|
145
|
+
<pre>
|
146
|
+
class Group < ActiveLdap::Base
|
147
|
+
ldap_mapping :dn_attribute => 'cn',
|
148
|
+
:prefix => 'ou=Groups', :classes => ['top', 'posixGroup'],
|
149
|
+
:scope => :one
|
150
|
+
end
|
151
|
+
</pre>
|
152
|
+
|
153
|
+
As you can see, this method is used for defining how this class maps in to LDAP. Let's say that
|
154
|
+
my LDAP tree looks something like this:
|
155
|
+
|
156
|
+
<pre>
|
157
|
+
* dc=dataspill,dc=org
|
158
|
+
|- ou=People,dc=dataspill,dc=org
|
159
|
+
|+ ou=Groups,dc=dataspill,dc=org
|
160
|
+
\
|
161
|
+
|- cn=develop,ou=Groups,dc=dataspill,dc=org
|
162
|
+
|- cn=root,ou=Groups,dc=dataspill,dc=org
|
163
|
+
|- ...
|
164
|
+
</pre>
|
165
|
+
|
166
|
+
Under ou=People I store user objects, and under ou=Groups, I store group
|
167
|
+
objects. What |ldap_mapping| has done is mapped the class in to the LDAP tree
|
168
|
+
abstractly. With the given :dn_attributes and :prefix, it will only work for
|
169
|
+
entries under ou=Groups,dc=dataspill,dc=org using the primary attribute 'cn'
|
170
|
+
as the beginning of the distinguished name.
|
171
|
+
|
172
|
+
Just for clarity, here's how the arguments map out:
|
173
|
+
|
174
|
+
<pre>
|
175
|
+
cn=develop,ou=Groups,dc=dataspill,dc=org
|
176
|
+
^^ ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^
|
177
|
+
:dn_attribute | |
|
178
|
+
:prefix |
|
179
|
+
:base from setup_connection
|
180
|
+
</pre>
|
181
|
+
|
182
|
+
:scope tells ActiveLdap to only search under ou=Groups, and not to look deeper
|
183
|
+
for dn_attribute matches.
|
184
|
+
(e.g. cn=develop,ou=DevGroups,ou=Groups,dc=dataspill,dc=org)
|
185
|
+
You can choose value from between :sub, :one and :base.
|
186
|
+
|
187
|
+
Something's missing: :classes. :classes is used to tell ActiveLdap what
|
188
|
+
the minimum requirement is when creating a new object. LDAP uses objectClasses
|
189
|
+
to define what attributes a LDAP object may have. ActiveLdap needs to know
|
190
|
+
what classes are required when creating a new object. Of course, you can leave
|
191
|
+
that field out to default to ['top'] only. Then you can let each application
|
192
|
+
choose what objectClasses their objects should have by calling the method e.g.
|
193
|
+
Group#add_class(*values).
|
194
|
+
|
195
|
+
Note that is can be very important to define the default :classes value. Due to
|
196
|
+
implementation choices with most LDAP servers, once an object is created, its
|
197
|
+
structural objectclasses may not be removed (or replaced). Setting a sane default
|
198
|
+
may help avoid programmer error later.
|
199
|
+
|
200
|
+
:classes isn't the only optional argument. If :dn_attribute is left off,
|
201
|
+
it defaults to super class's value or 'cn'. If :prefix is left off,
|
202
|
+
it will default to 'ou=PluralizedClassName'. In this
|
203
|
+
case, it would be 'ou=Groups'.
|
204
|
+
|
205
|
+
:classes should be an Array. :dn_attribute should be a String and so should
|
206
|
+
:prefix.
|
207
|
+
|
208
|
+
|
209
|
+
h5. belongs_to
|
210
|
+
|
211
|
+
This method allows an extension class to make use of other extension classes
|
212
|
+
tying objects together across the LDAP tree. Often, user objects will be
|
213
|
+
members of, or belong_to, Group objects.
|
214
|
+
|
215
|
+
<pre>
|
216
|
+
* dc=dataspill,dc=org
|
217
|
+
|+ ou=People,dc=dataspill,dc=org
|
218
|
+
\
|
219
|
+
|- uid=drewry,ou=People,dc=dataspill,dc=org
|
220
|
+
|- ou=Groups,dc=dataspill,dc=org
|
221
|
+
</pre>
|
222
|
+
|
223
|
+
|
224
|
+
In the above tree, one such example would be user 'drewry' who is a part of the
|
225
|
+
group 'develop'. You can see this by looking at the 'memberUid' field of 'develop'.
|
226
|
+
|
227
|
+
<pre>
|
228
|
+
irb> develop = Group.find('develop')
|
229
|
+
=> ...
|
230
|
+
irb> develop.memberUid
|
231
|
+
=> ['drewry', 'builder']
|
232
|
+
</pre>
|
233
|
+
|
234
|
+
If we look at the LDAP entry for 'drewry', we do not see any references to
|
235
|
+
group 'develop'. In order to remedy that, we can use belongs_to
|
236
|
+
|
237
|
+
<pre>
|
238
|
+
irb> class User < ActiveLdap::Base
|
239
|
+
irb* ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['top','account']
|
240
|
+
irb* belongs_to :groups, :class_name => 'Group', :many => 'memberUid', :foreign_key => 'uid'
|
241
|
+
irb* end
|
242
|
+
</pre>
|
243
|
+
|
244
|
+
Now, class User will have a method called 'groups' which will retrieve all
|
245
|
+
Group objects that a user is in.
|
246
|
+
|
247
|
+
<pre>
|
248
|
+
irb> me = User.find('drewry')
|
249
|
+
irb> me.groups
|
250
|
+
=> #<ActiveLdap::Association::BelongsToMany...> # Enumerable object
|
251
|
+
irb> me.groups.each { |group| p group.cn };nil
|
252
|
+
"cdrom"
|
253
|
+
"audio"
|
254
|
+
"develop"
|
255
|
+
=> nil
|
256
|
+
(Note: nil is just there to make the output cleaner...)
|
257
|
+
</pre>
|
258
|
+
|
259
|
+
TIP: If you weren't sure what the distinguished name attribute was for Group,
|
260
|
+
you could also do the following:
|
261
|
+
|
262
|
+
<pre>
|
263
|
+
irb> me.groups.each { |group| p group.id };nil
|
264
|
+
"cdrom"
|
265
|
+
"audio"
|
266
|
+
"develop"
|
267
|
+
=> nil
|
268
|
+
</pre>
|
269
|
+
|
270
|
+
Now let's talk about the arguments of belongs_to. We use the following code that extends Group group a bit for explain:
|
271
|
+
|
272
|
+
<pre>
|
273
|
+
class User < ActiveLdap::Base
|
274
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'People', :classes => ['top','account']
|
275
|
+
|
276
|
+
# Associate with primary belonged group
|
277
|
+
belongs_to :primary_group, :foreign_key => 'gidNumber',
|
278
|
+
:class_name => 'Group', :primary_key => 'gidNumber'
|
279
|
+
|
280
|
+
# Associate with all belonged groups
|
281
|
+
belongs_to :groups, :foreign_key => 'uid',
|
282
|
+
:class_name => 'Group', :many => 'memberUid',
|
283
|
+
end
|
284
|
+
</pre>
|
285
|
+
|
286
|
+
The first argument is the name of the method you wish to create. In this case, we created a method called primary_group and groups using the symbol :primary_group and :groups. The next collection of arguments are actually a Hash (as with ldap_mapping).
|
287
|
+
|
288
|
+
:foreign_key tells belongs_to what attribute Group objects have that match the related object's attribute. If :foreign_key is left off of the argument list, it is assumed to be the dn_attribute.
|
289
|
+
|
290
|
+
In the example, uid is used for :foreign_key. It may confuse you.
|
291
|
+
|
292
|
+
ActiveLdap uses :foreign_key as "own attribute name". So it
|
293
|
+
may not be "foreign key". You can consider :foreign_key just
|
294
|
+
as a relation key.
|
295
|
+
|
296
|
+
:primary_key is treated as "related object's attribute name"
|
297
|
+
as we discussed later.
|
298
|
+
|
299
|
+
:class_name should be a string that has the name of a class
|
300
|
+
you've already included. If your class is inside of a module,
|
301
|
+
be sure to put the whole name, e.g.
|
302
|
+
@:class_name => "MyLdapModule::Group"@.
|
303
|
+
|
304
|
+
:many and :primary_key are similar. Both of them specifies attribute name of related object specified by :foreign_key. Those values are attribute name that can be used by object of class specified by :class_name.
|
305
|
+
|
306
|
+
Relation is resolved by searching entries of :class_name class with :foreign_key attribute value. Search target attribute for it is :primary_key or :many. primary_group method in the above example searches Group objects with User object's gidNumber value as Group object's gidNumber value. Matched Group objects are belonged objects.
|
307
|
+
|
308
|
+
:parimary_key is used for an object just belongs to an object. The first matched object is treated as beloned object.
|
309
|
+
|
310
|
+
:many is used for an object belongs to many objects. All of matched objects are treated as belonged objects.
|
311
|
+
|
312
|
+
In addition, you can do simple membership tests by doing the following:
|
313
|
+
|
314
|
+
<pre>
|
315
|
+
irb> me.groups.member? 'root'
|
316
|
+
=> false
|
317
|
+
irb> me.groups.member? 'develop'
|
318
|
+
=> true
|
319
|
+
</pre>
|
320
|
+
|
321
|
+
h5. has_many
|
322
|
+
|
323
|
+
This method is the opposite of belongs_to. Instead of checking other objects in
|
324
|
+
other parts of the LDAP tree to see if you belong to them, you have multiple
|
325
|
+
objects from other trees listed in your object. To show this, we can just
|
326
|
+
invert the example from above:
|
327
|
+
|
328
|
+
<pre>
|
329
|
+
class Group < ActiveLdap::Base
|
330
|
+
ldap_mapping :dn_attribute => 'cn', :prefix => 'ou=Groups', :classes => ['top', 'posixGroup']
|
331
|
+
|
332
|
+
# Associate with primary belonged users
|
333
|
+
has_many :primary_members, :foreign_key => 'gidNumber',
|
334
|
+
:class_name => "User", :primary_key => 'gidNumber'
|
335
|
+
|
336
|
+
# Associate with all belonged users
|
337
|
+
has_many :members, :wrap => "memberUid",
|
338
|
+
:class_name => "User", :primary_key => 'uid'
|
339
|
+
end
|
340
|
+
</pre>
|
341
|
+
|
342
|
+
Now we can see that group develop has user 'drewry' as a member, and it can
|
343
|
+
even return all responses in object form just like belongs_to methods.
|
344
|
+
|
345
|
+
<pre>
|
346
|
+
irb> develop = Group.find('develop')
|
347
|
+
=> ...
|
348
|
+
irb> develop.members
|
349
|
+
=> #<ActiveLdap::Association::HasManyWrap:..> # Enumerable object
|
350
|
+
irb> develop.members.map{|member| member.id}
|
351
|
+
=> ["drewry", "builder"]
|
352
|
+
</pre>
|
353
|
+
|
354
|
+
The arguments for has_many follow the exact same idea that belongs_to's
|
355
|
+
arguments followed. :wrap's contents are used to search for matching
|
356
|
+
:primary_key content. If :primary_key is not specified, it defaults to the
|
357
|
+
dn_attribute of the specified :class_name.
|
358
|
+
|
359
|
+
h3. Using these new classes
|
360
|
+
|
361
|
+
These new classes have many method calls. Many of them are automatically
|
362
|
+
generated to provide access to the LDAP object's attributes. Other were defined
|
363
|
+
during class creation by special methods like belongs_to. There are a few other
|
364
|
+
methods that do not fall in to these categories.
|
365
|
+
|
366
|
+
h4. .find
|
367
|
+
|
368
|
+
.find is a class method that is accessible from
|
369
|
+
any subclass of Base that has 'ldap_mapping' called. When
|
370
|
+
called .first(:first) returns the first match of the given class.
|
371
|
+
|
372
|
+
<pre>
|
373
|
+
irb> Group.find(:first, 'deve*").cn
|
374
|
+
=> "develop"
|
375
|
+
</pre>
|
376
|
+
|
377
|
+
In this simple example, Group.find took the search string of 'deve*' and
|
378
|
+
searched for the first match in Group where the dn_attribute matched the
|
379
|
+
query. This is the simplest example of .find.
|
380
|
+
|
381
|
+
<pre>
|
382
|
+
irb> Group.find(:all).collect {|group| group.cn}
|
383
|
+
=> ["root", "daemon", "bin", "sys", "adm", "tty", ..., "develop"]
|
384
|
+
</pre>
|
385
|
+
|
386
|
+
Here .find(:all) returns all matches to the same query. Both .find(:first) and
|
387
|
+
.find(:all) also can take more expressive arguments:
|
388
|
+
|
389
|
+
<pre>
|
390
|
+
irb> Group.find(:all, :attribute => 'gidNumber', :value => '1003').collect {|group| group.cn}
|
391
|
+
=> ["develop"]
|
392
|
+
</pre>
|
393
|
+
|
394
|
+
So it is pretty clear what :attribute and :value do - they are used to query as
|
395
|
+
:attribute=:value.
|
396
|
+
|
397
|
+
If :attribute is unspecified, it defaults to the dn_attribute.
|
398
|
+
|
399
|
+
It is also possible to override :attribute and :value by specifying :filter. This
|
400
|
+
argument allows the direct specification of a LDAP filter to retrieve objects by.
|
401
|
+
|
402
|
+
h4. .search
|
403
|
+
|
404
|
+
.search is a class method that is accessible from any subclass of Base, and Base.
|
405
|
+
It lets the user perform an arbitrary search against the current LDAP connection
|
406
|
+
irrespetive of LDAP mapping data. This is meant to be useful as a utility method
|
407
|
+
to cover 80% of the cases where a user would want to use Base.connection directly.
|
408
|
+
|
409
|
+
<pre>
|
410
|
+
irb> Base.search(:base => 'dc=example,dc=com', :filter => '(uid=roo*)',
|
411
|
+
:scope => :sub, :attributes => ['uid', 'cn'])
|
412
|
+
=> [["uid=root,ou=People,dc=dataspill,dc=org",{"cn"=>["root"], "uidNumber"=>["0"]}]
|
413
|
+
</pre>
|
414
|
+
|
415
|
+
You can specify the :filter, :base, :scope, and :attributes, but they all have defaults --
|
416
|
+
* :filter defaults to objectClass=* - usually this isn't what you want
|
417
|
+
* :base defaults to the base of the class this is executed from (as set in ldap_mapping)
|
418
|
+
* :scope defaults to :sub. Usually you won't need to change it (You can choose value also from between :one and :base)
|
419
|
+
* :attributes defaults to [] and is the list of attributes you want back. Empty means all of them.
|
420
|
+
|
421
|
+
h4. #valid?
|
422
|
+
|
423
|
+
valid? is a method that verifies that all attributes that are required by the
|
424
|
+
objects current objectClasses are populated.
|
425
|
+
|
426
|
+
h4. #save
|
427
|
+
|
428
|
+
save is a method that writes any changes to an object back to the LDAP server.
|
429
|
+
It automatically handles the addition of new objects, and the modification of
|
430
|
+
existing ones.
|
431
|
+
|
432
|
+
h4. .exists?
|
433
|
+
|
434
|
+
exists? is a simple method which returns true is the current object exists in
|
435
|
+
LDAP, or false if it does not.
|
436
|
+
|
437
|
+
<pre>
|
438
|
+
irb> User.exists?("dshadsadsa")
|
439
|
+
=> false
|
440
|
+
</pre>
|
441
|
+
|
442
|
+
|
443
|
+
h3. ActiveLdap::Base
|
444
|
+
|
445
|
+
ActiveLdap::Base has come up a number of times in the examples above. Every
|
446
|
+
time, it was being used as the super class for the wrapper objects. While this
|
447
|
+
is it's main purpose, it also handles quite a bit more in the background.
|
448
|
+
|
449
|
+
h4. What is it?
|
450
|
+
|
451
|
+
ActiveLdap::Base is the heart of ActiveLdap. It does all the schema
|
452
|
+
parsing for validation and attribute-to-method mangling as well as manage the
|
453
|
+
connection to LDAP.
|
454
|
+
|
455
|
+
h5. setup_connection
|
456
|
+
|
457
|
+
Base.setup_connection takes many (optional) arguments and is used to
|
458
|
+
connect to the LDAP server. Sometimes you will want to connect anonymously
|
459
|
+
and other times over TLS with user credentials. Base.setup_connection is
|
460
|
+
here to do all of that for you.
|
461
|
+
|
462
|
+
|
463
|
+
By default, if you call any subclass of Base, such as Group, it will call
|
464
|
+
Base.setup_connection() if these is no active LDAP connection. If your
|
465
|
+
server allows anonymous binding, and you only want to access data in a
|
466
|
+
read-only fashion, you won't need to call Base.setup_connection. Here
|
467
|
+
is a fully parameterized call:
|
468
|
+
|
469
|
+
<pre>
|
470
|
+
Base.setup_connection(
|
471
|
+
:host => 'ldap.dataspill.org',
|
472
|
+
:port => 389,
|
473
|
+
:base => 'dc=dataspill,dc=org',
|
474
|
+
:logger => logger_object,
|
475
|
+
:bind_dn => "uid=drewry,ou=People,dc=dataspill,dc=org",
|
476
|
+
:password_block => Proc.new { 'password12345' },
|
477
|
+
:allow_anonymous => false,
|
478
|
+
:try_sasl => false
|
479
|
+
)
|
480
|
+
</pre>
|
481
|
+
|
482
|
+
There are quite a few arguments, but luckily many of them have safe defaults:
|
483
|
+
* :host defaults to "127.0.0.1".
|
484
|
+
* :port defaults to nil. 389 is applied if not specified.
|
485
|
+
* :bind_dn defaults to nil. anonymous binding is applied if not specified.
|
486
|
+
* :logger defaults to a Logger object that prints fatal messages to stderr
|
487
|
+
* :password_block defaults to nil
|
488
|
+
* :allow_anonymous defaults to true
|
489
|
+
* :try_sasl defaults to false - see Advanced Topics for more on this one.
|
490
|
+
|
491
|
+
|
492
|
+
Most of these are obvious, but I'll step through them for completeness:
|
493
|
+
* :host defines the LDAP server hostname to connect to.
|
494
|
+
* :port defines the LDAP server port to connect to.
|
495
|
+
* :method defines the type of connection - :tls, :ssl, :plain
|
496
|
+
* :base specifies the LDAP search base to use with the prefixes defined in all
|
497
|
+
subclasses.
|
498
|
+
* :bind_dn specifies what your server expects when attempting to bind with
|
499
|
+
credentials.
|
500
|
+
* :logger accepts a custom logger object to integrate with any other logging
|
501
|
+
your application uses.
|
502
|
+
* :password_block, if defined, give the Proc block for acquiring the password
|
503
|
+
* :password, if defined, give the user's password as a String
|
504
|
+
* :store_password indicates whether the password should be stored, or if used
|
505
|
+
whether the :password_block should be called on each reconnect.
|
506
|
+
* :allow_anonymous determines whether anonymous binding is allowed if other
|
507
|
+
bind methods fail
|
508
|
+
* :try_sasl, when true, tells ActiveLdap to attempt a SASL-GSSAPI bind
|
509
|
+
* :sasl_quiet, when true, tells the SASL libraries to not spew messages to STDOUT
|
510
|
+
* :sasl_options, if defined, should be a hash of options to pass through. This currently only works with the ruby-ldap adapter, which currently only supports :realm, :authcid, and :authzid.
|
511
|
+
* :retry_limit - indicates the number of attempts to reconnect that will be undertaken when a stale connection occurs. -1 means infinite.
|
512
|
+
* :retry_wait - seconds to wait before retrying a connection
|
513
|
+
* :scope - dictates how to find objects. (Default: :one)
|
514
|
+
* :timeout - time in seconds - defaults to disabled. This CAN interrupt search() requests. Be warned.
|
515
|
+
* :retry_on_timeout - whether to reconnect when timeouts occur. Defaults to true
|
516
|
+
See lib/configuration.rb(ActiveLdap::Configuration::DEFAULT_CONFIG) for defaults for each option
|
517
|
+
|
518
|
+
Base.setup_connection just setups connection
|
519
|
+
configuration. A connection is connected and bound when it
|
520
|
+
is needed. It follows roughly the following approach:
|
521
|
+
|
522
|
+
* Connect to host:port using :method
|
523
|
+
|
524
|
+
* If bind_dn and password_block/password, attempt to bind with credentials.
|
525
|
+
* If that fails or no password_block and anonymous allowed, attempt to bind
|
526
|
+
anonymously.
|
527
|
+
* If that fails, error out.
|
528
|
+
|
529
|
+
On connect, the configuration options passed in are stored
|
530
|
+
in an internal class variable which is used to cache the
|
531
|
+
information without ditching the defaults passed in from
|
532
|
+
configuration.rb
|
533
|
+
|
534
|
+
h5. connection
|
535
|
+
|
536
|
+
Base.connection returns the ActiveLdap::Connection object.
|
537
|
+
|
538
|
+
h3. Exceptions
|
539
|
+
|
540
|
+
There are a few custom exceptions used in ActiveLdap. They are detailed below.
|
541
|
+
|
542
|
+
h4. DeleteError
|
543
|
+
|
544
|
+
This exception is raised when #delete fails. It will include LDAP error
|
545
|
+
information that was passed up during the error.
|
546
|
+
|
547
|
+
h4. SaveError
|
548
|
+
|
549
|
+
This exception is raised when there is a problem in #save updating or creating
|
550
|
+
an LDAP entry. Often the error messages are cryptic. Looking at the server
|
551
|
+
logs or doing an "Wireshark":http://www.wireshark.org dump of the connection will
|
552
|
+
often provide better insight.
|
553
|
+
|
554
|
+
h4. AuthenticationError
|
555
|
+
|
556
|
+
This exception is raised during Base.setup_connection if no valid authentication methods
|
557
|
+
succeeded.
|
558
|
+
|
559
|
+
h4. ConnectionError
|
560
|
+
|
561
|
+
This exception is raised during Base.setup_connection if no valid
|
562
|
+
connection to the LDAP server could be created. Check you
|
563
|
+
Base.setup_connection arguments, and network connectivity! Also check
|
564
|
+
your LDAP server logs to see if it ever saw the request.
|
565
|
+
|
566
|
+
h4. ObjectClassError
|
567
|
+
|
568
|
+
This exception is raised when an object class is used that is not defined
|
569
|
+
in the schema.
|
570
|
+
|
571
|
+
h3. Others
|
572
|
+
|
573
|
+
Other exceptions may be raised by the Ruby/LDAP module, or by other subsystems.
|
574
|
+
If you get one of these exceptions and think it should be wrapped, write me an
|
575
|
+
email and let me know where it is and what you expected. For faster results,
|
576
|
+
email a patch!
|
577
|
+
|
578
|
+
h3. Putting it all together
|
579
|
+
|
580
|
+
Now that all of the components of ActiveLdap have been covered, it's time
|
581
|
+
to put it all together! The rest of this section will show the steps to setup
|
582
|
+
example user and group management scripts for use with the LDAP tree described
|
583
|
+
above.
|
584
|
+
|
585
|
+
All of the scripts here are in the package's examples/ directory.
|
586
|
+
|
587
|
+
h4. Setting up
|
588
|
+
|
589
|
+
Create directory for scripts.
|
590
|
+
|
591
|
+
<pre>
|
592
|
+
mkdir -p ldapadmin/objects
|
593
|
+
</pre>
|
594
|
+
|
595
|
+
In ldapadmin/objects/ create the file user.rb:
|
596
|
+
|
597
|
+
<pre>
|
598
|
+
require 'objects/group'
|
599
|
+
|
600
|
+
class User < ActiveLdap::Base
|
601
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['person', 'posixAccount']
|
602
|
+
belongs_to :groups, :class_name => 'Group', :many => 'memberUid'
|
603
|
+
end
|
604
|
+
</pre>
|
605
|
+
|
606
|
+
In ldapadmin/objects/ create the file group.rb:
|
607
|
+
|
608
|
+
<pre>
|
609
|
+
class Group < ActiveLdap::Base
|
610
|
+
ldap_mapping :classes => ['top', 'posixGroup'], :prefix => 'ou=Groups'
|
611
|
+
has_many :members, :class_name => "User", :wrap => "memberUid"
|
612
|
+
has_many :primary_members, :class_name => 'User', :foreign_key => 'gidNumber', :primary_key => 'gidNumber'
|
613
|
+
end
|
614
|
+
</pre>
|
615
|
+
|
616
|
+
Now, we can write some small scripts to do simple management tasks.
|
617
|
+
|
618
|
+
h4. Creating LDAP entries
|
619
|
+
|
620
|
+
Now let's create a really dumb script for adding users - ldapadmin/useradd:
|
621
|
+
|
622
|
+
<pre>
|
623
|
+
#!/usr/bin/ruby -W0
|
624
|
+
|
625
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
626
|
+
$LOAD_PATH << File.join(base, "lib")
|
627
|
+
$LOAD_PATH << File.join(base, "examples")
|
628
|
+
|
629
|
+
require 'rubygems'
|
630
|
+
require 'active_ldap'
|
631
|
+
require 'objects/user'
|
632
|
+
require 'objects/group'
|
633
|
+
|
634
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
635
|
+
opts.banner += " USER_NAME CN UID"
|
636
|
+
end
|
637
|
+
|
638
|
+
if argv.size == 3
|
639
|
+
name, cn, uid = argv
|
640
|
+
else
|
641
|
+
$stderr.puts opts
|
642
|
+
exit 1
|
643
|
+
end
|
644
|
+
|
645
|
+
pwb = Proc.new do |user|
|
646
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
647
|
+
end
|
648
|
+
|
649
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
650
|
+
:allow_anonymous => false)
|
651
|
+
|
652
|
+
if User.exists?(name)
|
653
|
+
$stderr.puts("User #{name} already exists.")
|
654
|
+
exit 1
|
655
|
+
end
|
656
|
+
|
657
|
+
user = User.new(name)
|
658
|
+
user.add_class('shadowAccount')
|
659
|
+
user.cn = cn
|
660
|
+
user.uid_number = uid
|
661
|
+
user.gid_number = uid
|
662
|
+
user.home_directory = "/home/#{name}"
|
663
|
+
user.sn = "somesn"
|
664
|
+
unless user.save
|
665
|
+
puts "failed"
|
666
|
+
puts user.errors.full_messages
|
667
|
+
exit 1
|
668
|
+
end
|
669
|
+
</pre>
|
670
|
+
|
671
|
+
h4. Managing LDAP entries
|
672
|
+
|
673
|
+
Now let's create another dumb script for modifying users - ldapadmin/usermod:
|
674
|
+
|
675
|
+
<pre>
|
676
|
+
#!/usr/bin/ruby -W0
|
677
|
+
|
678
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
679
|
+
$LOAD_PATH << File.join(base, "lib")
|
680
|
+
$LOAD_PATH << File.join(base, "examples")
|
681
|
+
|
682
|
+
require 'rubygems'
|
683
|
+
require 'active_ldap'
|
684
|
+
require 'objects/user'
|
685
|
+
require 'objects/group'
|
686
|
+
|
687
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
688
|
+
opts.banner += " USER_NAME CN UID"
|
689
|
+
end
|
690
|
+
|
691
|
+
if argv.size == 3
|
692
|
+
name, cn, uid = argv
|
693
|
+
else
|
694
|
+
$stderr.puts opts
|
695
|
+
exit 1
|
696
|
+
end
|
697
|
+
|
698
|
+
pwb = Proc.new do |user|
|
699
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
700
|
+
end
|
701
|
+
|
702
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
703
|
+
:allow_anonymous => false)
|
704
|
+
|
705
|
+
unless User.exists?(name)
|
706
|
+
$stderr.puts("User #{name} doesn't exist.")
|
707
|
+
exit 1
|
708
|
+
end
|
709
|
+
|
710
|
+
user = User.find(name)
|
711
|
+
user.cn = cn
|
712
|
+
user.uid_number = uid
|
713
|
+
user.gid_number = uid
|
714
|
+
unless user.save
|
715
|
+
puts "failed"
|
716
|
+
puts user.errors.full_messages
|
717
|
+
exit 1
|
718
|
+
end
|
719
|
+
</pre>
|
720
|
+
|
721
|
+
h4. Removing LDAP entries
|
722
|
+
|
723
|
+
Now let's create more one for deleting users - ldapadmin/userdel:
|
724
|
+
|
725
|
+
<pre>
|
726
|
+
#!/usr/bin/ruby -W0
|
727
|
+
|
728
|
+
base = File.expand_path(File.join(File.dirname(__FILE__), ".."))
|
729
|
+
$LOAD_PATH << File.join(base, "lib")
|
730
|
+
$LOAD_PATH << File.join(base, "examples")
|
731
|
+
|
732
|
+
require 'rubygems'
|
733
|
+
require 'active_ldap'
|
734
|
+
require 'objects/user'
|
735
|
+
require 'objects/group'
|
736
|
+
|
737
|
+
argv, opts, options = ActiveLdap::Command.parse_options do |opts, options|
|
738
|
+
opts.banner += " USER_NAME"
|
739
|
+
end
|
740
|
+
|
741
|
+
if argv.size == 1
|
742
|
+
name = argv.shift
|
743
|
+
else
|
744
|
+
$stderr.puts opts
|
745
|
+
exit 1
|
746
|
+
end
|
747
|
+
|
748
|
+
pwb = Proc.new do |user|
|
749
|
+
ActiveLdap::Command.read_password("[#{user}] Password: ")
|
750
|
+
end
|
751
|
+
|
752
|
+
ActiveLdap::Base.setup_connection(:password_block => pwb,
|
753
|
+
:allow_anonymous => false)
|
754
|
+
|
755
|
+
unless User.exists?(name)
|
756
|
+
$stderr.puts("User #{name} doesn't exist.")
|
757
|
+
exit 1
|
758
|
+
end
|
759
|
+
|
760
|
+
User.destroy(name)
|
761
|
+
</pre>
|
762
|
+
|
763
|
+
h3. Advanced Topics
|
764
|
+
|
765
|
+
Below are some situation tips and tricks to get the most out of ActiveLdap.
|
766
|
+
|
767
|
+
|
768
|
+
h4. Binary data and other subtypes
|
769
|
+
|
770
|
+
Sometimes, you may want to store attributes with language specifiers, or
|
771
|
+
perhaps in binary form. This is (finally!) fully supported. To do so,
|
772
|
+
follow the examples below:
|
773
|
+
|
774
|
+
<pre>
|
775
|
+
irb> user = User.new('drewry')
|
776
|
+
=> ...
|
777
|
+
# This adds a cn entry in lang-en and whatever the server default is.
|
778
|
+
irb> user.cn = [ 'wad', {'lang-en' => ['wad', 'Will Drewry']} ]
|
779
|
+
=> ...
|
780
|
+
irb> user.cn
|
781
|
+
=> ["wad", {"lang-en-us" => ["wad", "Will Drewry"]}]
|
782
|
+
# Now let's add a binary X.509 certificate (assume objectClass is correct)
|
783
|
+
irb> user.user_certificate = File.read('example.der')
|
784
|
+
=> ...
|
785
|
+
irb> user.save
|
786
|
+
</pre>
|
787
|
+
|
788
|
+
So that's a lot to take in. Here's what is going on. I just set the LDAP
|
789
|
+
object's cn to "wad" and cn:lang-en-us to ["wad", "Will Drewry"].
|
790
|
+
Anytime a LDAP subtype is required, you must encapsulate the data in a Hash.
|
791
|
+
|
792
|
+
But wait a minute, I just read in a binary certificate without wrapping it up.
|
793
|
+
So any binary attribute _that requires ;binary subtyping_ will automagically
|
794
|
+
get wrapped in @{'binary' => value}@ if you don't do it. This keeps your #writes
|
795
|
+
from breaking, and my code from crying. For correctness, I could have easily
|
796
|
+
done the following:
|
797
|
+
|
798
|
+
<pre>
|
799
|
+
irb> user.user_certificate = {'binary' => File.read('example.der')}
|
800
|
+
</pre>
|
801
|
+
|
802
|
+
You should note that some binary data does not use the binary subtype all the time.
|
803
|
+
One example is jpegPhoto. You can use it as jpegPhoto;binary or just as jpegPhoto.
|
804
|
+
Since the schema dictates that it is a binary value, ActiveLdap will write
|
805
|
+
it as binary, but the subtype will not be automatically appended as above. The
|
806
|
+
use of the subtype on attributes like jpegPhoto is ultimately decided by the
|
807
|
+
LDAP site policy and not by any programmatic means.
|
808
|
+
|
809
|
+
The only subtypes defined in LDAPv3 are lang-* and binary. These can be nested
|
810
|
+
though:
|
811
|
+
|
812
|
+
<pre>
|
813
|
+
irb> user.cn = [{'lang-ja' => {'binary' => 'some Japanese'}}]
|
814
|
+
</pre>
|
815
|
+
|
816
|
+
As I understand it, OpenLDAP does not support nested subtypes, but some
|
817
|
+
documentation I've read suggests that Netscape's LDAP server does. I only
|
818
|
+
have access to OpenLDAP. If anyone tests this out, please let me know how it
|
819
|
+
goes!
|
820
|
+
|
821
|
+
|
822
|
+
And that pretty much wraps up this section.
|
823
|
+
|
824
|
+
h4. Further integration with your environment aka namespacing
|
825
|
+
|
826
|
+
If you want this to cleanly integrate into your system-wide Ruby include path,
|
827
|
+
you should put your extension classes inside a custom module.
|
828
|
+
|
829
|
+
|
830
|
+
Example:
|
831
|
+
|
832
|
+
./myldap.rb:
|
833
|
+
|
834
|
+
<pre>
|
835
|
+
require 'active_ldap'
|
836
|
+
require 'myldap/user'
|
837
|
+
require 'myldap/group'
|
838
|
+
module MyLDAP
|
839
|
+
end
|
840
|
+
</pre>
|
841
|
+
|
842
|
+
./myldap/user.rb:
|
843
|
+
|
844
|
+
<pre>
|
845
|
+
module MyLDAP
|
846
|
+
class User < ActiveLdap::Base
|
847
|
+
ldap_mapping :dn_attribute => 'uid', :prefix => 'ou=People', :classes => ['top', 'account', 'posixAccount']
|
848
|
+
belongs_to :groups, :class_name => 'MyLDAP::Group', :many => 'memberUid'
|
849
|
+
end
|
850
|
+
end
|
851
|
+
</pre>
|
852
|
+
|
853
|
+
./myldap/group.rb:
|
854
|
+
|
855
|
+
<pre>
|
856
|
+
module MyLDAP
|
857
|
+
class Group < ActiveLdap::Base
|
858
|
+
ldap_mapping :classes => ['top', 'posixGroup'], :prefix => 'ou=Groups'
|
859
|
+
has_many :members, :class_name => 'MyLDAP::User', :wrap => 'memberUid'
|
860
|
+
has_many :primary_members, :class_name => 'MyLDAP::User', :foreign_key => 'gidNumber', :primary_key => 'gidNumber'
|
861
|
+
end
|
862
|
+
end
|
863
|
+
</pre>
|
864
|
+
|
865
|
+
Now in your local applications, you can call
|
866
|
+
|
867
|
+
<pre>
|
868
|
+
require 'myldap'
|
869
|
+
|
870
|
+
MyLDAP::Group.new('foo')
|
871
|
+
...
|
872
|
+
</pre>
|
873
|
+
|
874
|
+
and everything should work well.
|
875
|
+
|
876
|
+
|
877
|
+
h4. force array results for single values
|
878
|
+
|
879
|
+
Even though ActiveLdap attempts to maintain programmatic ease by
|
880
|
+
returning Array values only. By specifying 'true' as an argument to
|
881
|
+
any attribute method you will get back a Array if it is single value.
|
882
|
+
Here's an example:
|
883
|
+
|
884
|
+
<pre>
|
885
|
+
irb> user = User.new('drewry')
|
886
|
+
=> ...
|
887
|
+
irb> user.cn(true)
|
888
|
+
=> ["Will Drewry"]
|
889
|
+
</pre>
|
890
|
+
|
891
|
+
h4. Dynamic attribute crawling
|
892
|
+
|
893
|
+
If you use tab completion in irb, you'll notice that you /can/ tab complete the dynamic
|
894
|
+
attribute methods. You can still see which methods are for attributes using
|
895
|
+
Base#attribute_names:
|
896
|
+
|
897
|
+
<pre>
|
898
|
+
irb> d = Group.new('develop')
|
899
|
+
=> ...
|
900
|
+
irb> d.attribute_names
|
901
|
+
=> ["gidNumber", "cn", "memberUid", "commonName", "description", "userPassword", "objectClass"]
|
902
|
+
</pre>
|
903
|
+
|
904
|
+
|
905
|
+
h4. Juggling multiple LDAP connections
|
906
|
+
|
907
|
+
In the same vein as the last tip, you can use multiple LDAP connections by
|
908
|
+
per class as follows:
|
909
|
+
|
910
|
+
<pre>
|
911
|
+
irb> anon_class = Class.new(Base)
|
912
|
+
=> ...
|
913
|
+
irb> anon_class.setup_connection
|
914
|
+
=> ...
|
915
|
+
irb> auth_class = Class.new(Base)
|
916
|
+
=> ...
|
917
|
+
irb> auth_class.setup_connection(:password_block => lambda{'mypass'})
|
918
|
+
=> ...
|
919
|
+
</pre>
|
920
|
+
|
921
|
+
This can be useful for doing authentication tests and other such tricks.
|
922
|
+
|
923
|
+
h4. :try_sasl
|
924
|
+
|
925
|
+
If you have the Ruby/LDAP package with the SASL/GSSAPI patch from Ian
|
926
|
+
MacDonald's web site, you can use Kerberos to bind to your LDAP server. By
|
927
|
+
default, :try_sasl is false.
|
928
|
+
|
929
|
+
Also note that you must be using OpenLDAP 2.1.29 or higher to use SASL/GSSAPI
|
930
|
+
due to some bugs in older versions of OpenLDAP.
|
931
|
+
|
932
|
+
h4. Don't be afraid! [Internals]
|
933
|
+
|
934
|
+
Don't be afraid to add more methods to the extensions classes and to
|
935
|
+
experiment. That's exactly how I ended up with this package. If you come up
|
936
|
+
with something cool, please share it!
|
937
|
+
|
938
|
+
The internal structure of ActiveLdap::Base, and thus all its subclasses, is
|
939
|
+
still in flux. I've tried to minimize the changes to the overall API, but
|
940
|
+
the internals are still rough around the edges.
|
941
|
+
|
942
|
+
h5. Where's ldap_mapping data stored? How can I get to it?
|
943
|
+
|
944
|
+
When you call ldap_mapping, it overwrites several class methods inherited
|
945
|
+
from Base:
|
946
|
+
* Base.base()
|
947
|
+
* Base.required_classes()
|
948
|
+
* Base.dn_attribute()
|
949
|
+
|
950
|
+
You can access these from custom class methods by calling MyClass.base(),
|
951
|
+
or whatever. There are predefined instance methods for getting to these
|
952
|
+
from any new instance methods you define:
|
953
|
+
* Base#base()
|
954
|
+
* Base#required_classes()
|
955
|
+
* Base#dn_attribute()
|
956
|
+
|
957
|
+
h5. What else?
|
958
|
+
|
959
|
+
Well if you want to use the LDAP connection for anything, I'd suggest still
|
960
|
+
calling Base.connection to get it. There really aren't many other internals
|
961
|
+
that need to be worried about. You could get the LDAP schema with
|
962
|
+
Base.schema.
|
963
|
+
|
964
|
+
The only other useful tricks are dereferencing and accessing the stored
|
965
|
+
data. Since LDAP attributes can have multiple names, e.g. cn or commonName,
|
966
|
+
any methods you write might need to figure it out. I'd suggest just
|
967
|
+
calling self[attribname] to get the value, but if that's not good enough,
|
968
|
+
you can call look up the stored name by #to_real_attribute_name as follows:
|
969
|
+
|
970
|
+
<pre>
|
971
|
+
irb> User.find(:first).instance_eval do
|
972
|
+
irb> to_real_attribute_name('commonName')
|
973
|
+
irb> end
|
974
|
+
=> 'cn'
|
975
|
+
</pre>
|
976
|
+
|
977
|
+
This tells you the name the attribute is stored in behind the scenes (@data).
|
978
|
+
Again, self[attribname] should be enough for most extensions, but if not,
|
979
|
+
it's probably safe to dabble here.
|
980
|
+
|
981
|
+
Also, if you like to look up all aliases for an attribute, you can call the
|
982
|
+
following:
|
983
|
+
|
984
|
+
<pre>
|
985
|
+
irb> User.schema.attribute_type 'cn', 'NAME'
|
986
|
+
=> ["cn", "commonName"]
|
987
|
+
</pre>
|
988
|
+
|
989
|
+
This is discovered automagically from the LDAP server's schema.
|
990
|
+
|
991
|
+
h2. Limitations
|
992
|
+
|
993
|
+
h3. Speed
|
994
|
+
|
995
|
+
Currently, ActiveLdap could be faster. I have some recursive type
|
996
|
+
checking going on which slows object creation down, and I'm sure there
|
997
|
+
are many, many other places optimizations can be done. Feel free
|
998
|
+
to send patches, or just hang in there until I can optimize away the
|
999
|
+
slowness.
|
1000
|
+
|
1001
|
+
h2. Feedback
|
1002
|
+
|
1003
|
+
Any and all feedback and patches are welcome. I am very excited about this
|
1004
|
+
package, and I'd like to see it prove helpful to more people than just myself.
|
1005
|
+
|