ruby-ldap 0.9.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/COPYING +24 -0
- data/ChangeLog +762 -0
- data/FAQ +62 -0
- data/NOTES +77 -0
- data/README +266 -0
- data/TODO +15 -0
- data/conn.c +1810 -0
- data/entry.c +215 -0
- data/extconf.rb +268 -0
- data/ldap.c +577 -0
- data/lib/ldap/control.rb +50 -0
- data/lib/ldap/ldif.rb +569 -0
- data/lib/ldap/schema.rb +129 -0
- data/misc.c +512 -0
- data/mod.c +355 -0
- data/rbldap.h +194 -0
- data/saslconn.c +176 -0
- data/sslconn.c +377 -0
- data/test/add.rb +31 -0
- data/test/add2.rb +31 -0
- data/test/add3.rb +33 -0
- data/test/bind-ldaps.rb +25 -0
- data/test/bind-sasl.rb +17 -0
- data/test/bind-ssl.rb +25 -0
- data/test/bind.rb +34 -0
- data/test/compare.rb +17 -0
- data/test/conf.rb +12 -0
- data/test/delete.rb +13 -0
- data/test/ext.rb +49 -0
- data/test/misc1.rb +49 -0
- data/test/misc2.rb +40 -0
- data/test/modrdn.rb +23 -0
- data/test/search.rb +20 -0
- data/test/search2.rb +34 -0
- data/test/search3.rb +23 -0
- data/test/setup.rb +38 -0
- data/test/subschema.rb +21 -0
- data/test/tc_conn.rb +124 -0
- data/test/tc_ldif.rb +174 -0
- data/test/tc_schema.rb +32 -0
- data/test/tc_search.rb +137 -0
- data/test/ts_ldap.rb +8 -0
- data/win/winlber.h +21 -0
- data/win/winldap.h +324 -0
- metadata +100 -0
data/FAQ
ADDED
@@ -0,0 +1,62 @@
|
|
1
|
+
$Id: FAQ,v 1.6 2006/04/25 08:43:12 ianmacd Exp $
|
2
|
+
|
3
|
+
|
4
|
+
FAQ
|
5
|
+
---
|
6
|
+
|
7
|
+
Q. How do I add/modify binary data?
|
8
|
+
|
9
|
+
A. Create a LDAP::Mod object with the flag LDAP::LDAP_MOD_BVALUES as follows:
|
10
|
+
|
11
|
+
entry = [
|
12
|
+
LDAP::mod(LDAP::LDAP_MOD_ADD|LDAP_MOD_BVALUES, 'jpegPhoto', [jpeg_img]),
|
13
|
+
LDAP::mod(LDAP::LDAP_MOD_ADD, 'cn', ['Takaaki Tateishi']),
|
14
|
+
...
|
15
|
+
]
|
16
|
+
conn.add("dc=localhost, dc=localdomain", entry)
|
17
|
+
|
18
|
+
|
19
|
+
|
20
|
+
Q. Is there shortcut method for adding/modifying entries.
|
21
|
+
|
22
|
+
A. Yes, there is. You can directly give LDAP::Conn#add/modify hash data as
|
23
|
+
follows:
|
24
|
+
|
25
|
+
entry = {
|
26
|
+
'objectclass' => [ 'top', 'person' ],
|
27
|
+
...
|
28
|
+
}
|
29
|
+
conn.add( "cn=foobar, dc=localhost, dc=localdomain", entry )
|
30
|
+
|
31
|
+
|
32
|
+
|
33
|
+
Q. Can I use SASL authentication?
|
34
|
+
|
35
|
+
A. Yes, it works for me using Cyrus SASL and Kerberos V via GSSAPI.
|
36
|
+
Use LDAP::Conn#sasl_bind. Your mileage may vary.
|
37
|
+
|
38
|
+
|
39
|
+
|
40
|
+
Q. Can I put a limit on the number of results returned by the server?
|
41
|
+
|
42
|
+
A. Yes, as of version 0.9.4, you can. Set the size limit using
|
43
|
+
LDAP::Conn#set_option and then check for LDAP::Conn#search or
|
44
|
+
LDAP::Conn#search2 having exceeded this limit, by using LDAP::Conn#err:
|
45
|
+
|
46
|
+
conn = LDAP::Conn.new( 'localhost', 389 )
|
47
|
+
|
48
|
+
# Limit the results set to a maximum of 10.
|
49
|
+
conn.set_option( LDAP::LDAP_OPT_SIZELIMIT, 10 )
|
50
|
+
|
51
|
+
conn.search2( 'dc=localhost,dc=localdomain',
|
52
|
+
LDAP::LDAP_SCOPE_SUBTREE, '(objectClass=*)' )
|
53
|
+
|
54
|
+
if conn.err == LDAP::LDAP_SIZELIMIT_EXCEEDED
|
55
|
+
# Results set was truncated by server.
|
56
|
+
end
|
57
|
+
|
58
|
+
Note that LDAP::LDAP_SIZELIMIT_EXCEEDED may occur even when you have not
|
59
|
+
put an explicit limit on the number of results to be returned. The server
|
60
|
+
will likely have its own maximum configured, so it can be important to
|
61
|
+
check for this condition on all of your calls to LDAP::Conn#search and
|
62
|
+
LDAP::Conn#search2.
|
data/NOTES
ADDED
@@ -0,0 +1,77 @@
|
|
1
|
+
$Id: NOTES,v 1.4 2006/08/09 11:22:25 ianmacd Exp $
|
2
|
+
|
3
|
+
0.9.9
|
4
|
+
-----
|
5
|
+
|
6
|
+
Supported OpenLDAP 2.4.15 and higher. Thanks to Milos Jakubicek.
|
7
|
+
Gem Packaging Support. Thanks to S. Potter [mbbx6spp].
|
8
|
+
|
9
|
+
0.9.8
|
10
|
+
-----
|
11
|
+
|
12
|
+
Supported Ruby 1.9.x.
|
13
|
+
|
14
|
+
|
15
|
+
0.9.7
|
16
|
+
-----
|
17
|
+
|
18
|
+
LDAP_MOD_DELETE and LDAP_MOD_REPLACE were reversed in win/winldap.h, so
|
19
|
+
deletion and replacement operations did not work on Win32 systems.
|
20
|
+
|
21
|
+
|
22
|
+
0.9.6
|
23
|
+
-----
|
24
|
+
|
25
|
+
A segfault on FreeBSD when using AMD64 was fixed for this release.
|
26
|
+
|
27
|
+
The only other changes are minor clarifications of the documentation.
|
28
|
+
|
29
|
+
|
30
|
+
0.9.5
|
31
|
+
-----
|
32
|
+
|
33
|
+
The Windows build is now believed to work out of the box. It has been tested
|
34
|
+
on Windows XP SP2, using SVC C++ 6.0 to build the software. Thanks to Chris
|
35
|
+
Scharf <scharfie@gmail.com> for his work in this area and willingness to work
|
36
|
+
with me on fixing the problems.
|
37
|
+
|
38
|
+
|
39
|
+
0.9.4
|
40
|
+
-----
|
41
|
+
|
42
|
+
LDAP::Conn#search, LDAP::Conn#search2, LDAP::Conn#search_ext and
|
43
|
+
LDAP::Conn#search_ext2 have been modified to treat LDAP_SIZELIMIT_EXCEEDED as
|
44
|
+
success.
|
45
|
+
|
46
|
+
After using any of these four methods, the user should use LDAP::Conn#err to
|
47
|
+
check whether the error status of the Conn object is
|
48
|
+
LDAP::LDAP_SIZELIMIT_EXCEEDED. If true, the results set has been truncated by
|
49
|
+
the server.
|
50
|
+
|
51
|
+
Previously, LDAP_SIZELIMIT_EXCEEDED would raise an exception and no results
|
52
|
+
would be returned, which is not the correct behaviour if the user has
|
53
|
+
deliberately put a limit on the number of results to be returned, as might be
|
54
|
+
done in order to spare the server.
|
55
|
+
|
56
|
+
|
57
|
+
0.9.3
|
58
|
+
-----
|
59
|
+
|
60
|
+
The usability of the library on Windows platforms is currently a case of 'suck
|
61
|
+
it and see'. Some people report the code working, others report immediate
|
62
|
+
segfaults; yet others say that it worked after they made some minor
|
63
|
+
alterations to the code in order to get it to build.
|
64
|
+
|
65
|
+
Differences in Windows platform used, chosen compiler and version, plus the
|
66
|
+
variety of servers with which the code is used, conspire to result in the
|
67
|
+
exact facts of the matter not yet having been ascertained.
|
68
|
+
|
69
|
+
Most people seemed to experience some difficulty in getting the code to build
|
70
|
+
on Windows, so some effort has gone into making this better for the 0.9.3
|
71
|
+
release. This work is difficult, since I do not have a Windows build
|
72
|
+
environment at my disposal.
|
73
|
+
|
74
|
+
If you are a Windows user and you found that the code did not work in its
|
75
|
+
original form, but you managed to get it to work after some alterations, I
|
76
|
+
would be very grateful if you wrote to me to let me know what changes were
|
77
|
+
needed. Please include precise details of your build platform.
|
data/README
ADDED
@@ -0,0 +1,266 @@
|
|
1
|
+
Ruby/LDAP -- A Ruby extension library for LDAP
|
2
|
+
|
3
|
+
$Id: README,v 1.19 2009/03/19 15:25:20 alexey.chebotar Exp $
|
4
|
+
|
5
|
+
Copyright (C) 2000-2004 Takaaki Tateishi <ttate@users.sourceforge.net>
|
6
|
+
Copyright (C) 2005-2006 Ian Macdonald <ian@caliban.org>
|
7
|
+
Copyright (C) 2009 Alexey Chebotar <alexey.chebotar@gmail.com>
|
8
|
+
-------------------------------------------------------------------------------
|
9
|
+
|
10
|
+
DESCRIPTION
|
11
|
+
|
12
|
+
'Ruby/LDAP' is a Ruby extension library that provides an interface to the LDAP
|
13
|
+
API as described in RFC1823.
|
14
|
+
-------------------------------------------------------------------------------
|
15
|
+
|
16
|
+
REQUIREMENT
|
17
|
+
|
18
|
+
* Ruby 1.8.x / 1.9.x (at least 1.8.2 if you want to use ldap/control)
|
19
|
+
* OpenLDAP, Netscape SDK, Windows 2003 or Windows XP
|
20
|
+
|
21
|
+
-------------------------------------------------------------------------------
|
22
|
+
|
23
|
+
PORTS
|
24
|
+
|
25
|
+
* FreeBSD ("Akinori -Aki- MUSHA" <knu@idaemons.org>)
|
26
|
+
* Debian (Akira Yamada <akira@ruby-lang.org>)
|
27
|
+
|
28
|
+
-------------------------------------------------------------------------------
|
29
|
+
|
30
|
+
BUILDING
|
31
|
+
|
32
|
+
extconf.rb will try to use the OpenLDAP 2 or Netscape SDK libraries and guess
|
33
|
+
paths to some header files and libraries from the position of ldap.h. If you'd
|
34
|
+
like to see the available options for extconf.rb, run it with '--help' option.
|
35
|
+
|
36
|
+
$ ruby extconf.rb [--with-openldap1|--with-openldap2|--with-netscape|--with-wldap32]
|
37
|
+
$ make
|
38
|
+
|
39
|
+
This will create ldap.so, which you can either manually copy into place or
|
40
|
+
install with:
|
41
|
+
|
42
|
+
$ make install
|
43
|
+
|
44
|
+
If you're building the software on Windows, you may need to use nmake instead
|
45
|
+
of make.
|
46
|
+
|
47
|
+
-------------------------------------------------------------------------------
|
48
|
+
|
49
|
+
LICENSE
|
50
|
+
|
51
|
+
See COPYING.
|
52
|
+
-------------------------------------------------------------------------------
|
53
|
+
|
54
|
+
AVAILABLE CLASSES and METHODS
|
55
|
+
|
56
|
+
LDAP::LDAP_VERSION
|
57
|
+
LDAP::LDAP_MAX_VERSION
|
58
|
+
LDAP::VERSION
|
59
|
+
LDAP::MAJOR_VERSION
|
60
|
+
LDAP::MINOR_VERSION
|
61
|
+
LDAP::LDAP_PORT
|
62
|
+
LDAP::LDAPS_PORT
|
63
|
+
LDAP::LDAP_API_INFO_VERSION
|
64
|
+
LDAP::LDAP_VENDOR_NAME
|
65
|
+
LDAP::LDAP_VENDOR_VERSION
|
66
|
+
LDAP::LDAP_API_VERSION
|
67
|
+
LDAP.err2string(errcode)
|
68
|
+
LDAP.dn2ufn(dn)
|
69
|
+
LDAP.mod(mod_op, mod_type, mod_vals) (= LDAP::Mod.new)
|
70
|
+
LDAP.hash2mods(mod_op, hash)
|
71
|
+
LDAP.entry2hash(entry) (= entry.to_hash)
|
72
|
+
LDAP::Conn.new(host = "localhost", port = LDAP::LDAP_PORT)
|
73
|
+
: conn (raise LDAP::Error)
|
74
|
+
LDAP::Conn.open(host = "localhost", port = LDAP::LDAP_PORT)
|
75
|
+
: conn (raise LDAP::Error)
|
76
|
+
LDAP::Conn#simple_bind(dn = nil, password = nil) { ... }
|
77
|
+
: conn (raise LDAP::ResultError)
|
78
|
+
LDAP::Conn#bind(dn = nil, password = nil,
|
79
|
+
method = LDAP::LDAP_AUTH_SIMPLE) {|conn| ... }
|
80
|
+
(raise LDAP::ResultError)
|
81
|
+
LDAP::Conn#bind(dn = nil, password = nil,
|
82
|
+
method = LDAP::LDAP_AUTH_SIMPLE) : conn
|
83
|
+
(raise LDAP::ResultError)
|
84
|
+
LDAP::Conn#sasl_bind(dn = nil, mech = nil, cred = nil,
|
85
|
+
sctrls=nil, cctrls=nil) {|conn| ... }
|
86
|
+
(raise LDAP::ResultError)
|
87
|
+
LDAP::Conn#sasl_bind(dn = nil, mech = nil, cred = nil,
|
88
|
+
sctrls=nil, cctrls=nil) : conn
|
89
|
+
(raise LDAP::ResultError)
|
90
|
+
LDAP::Conn#bound? : true || false
|
91
|
+
LDAP::Conn#unbind() (raise LDAP::ResultError)
|
92
|
+
LDAP::Conn#start_tls
|
93
|
+
LDAP::Conn#perror(str)
|
94
|
+
LDAP::Conn#result2error(ldap_msg) : errcode
|
95
|
+
LDAP::Conn#err2string(errcode) : errmsg
|
96
|
+
LDAP::Conn#get_errno : errcode [if available]
|
97
|
+
LDAP::Conn#search(basedn, scope, filter, attrs = nil, attrsonly = false,
|
98
|
+
sec = 0, usec = 0,
|
99
|
+
s_attr = nil, s_proc = nil) {|entry| ... }
|
100
|
+
: conn (raise LDAP::ResultError)
|
101
|
+
LDAP::Conn#search2(basedn, scope, filter, attrs = nil, attrsonly = false,
|
102
|
+
sec = 0, usec = 0,
|
103
|
+
s_attr = nil, s_proc = nil) {|entry_as_hash| ... }
|
104
|
+
: conn (if a block is given) /
|
105
|
+
Array of Hash (if no block is given)
|
106
|
+
(raise LDAP::ResultError)
|
107
|
+
LDAP::Conn#search_ext(basedn, scope, filter, attrs = nil,
|
108
|
+
attrsonly = false, serverctrls, clientctrls,
|
109
|
+
sec = 0, usec = 0,
|
110
|
+
s_attr = nil, s_proc = nil) {|entry| ... }
|
111
|
+
: conn (raise LDAP::ResultError)
|
112
|
+
LDAP::Conn#search_ext2(basedn, scope, filter, attrs = nil,
|
113
|
+
attrsonly = false,
|
114
|
+
serverctrls, clientctrls, sec = 0, usec = 0,
|
115
|
+
s_attr = nil, s_proc = nil) {|entry_as_hash| ... }
|
116
|
+
: conn (if a block is given) /
|
117
|
+
Array of Hash (if no block is given)
|
118
|
+
(raise LDAP::ResultError)
|
119
|
+
LDAP::Conn#add(dn, ldap_mods) : self (raise LDAP::ResultError)
|
120
|
+
LDAP::Conn#add_ext(dn, ldap_mods, serverctrls, clientctrls)
|
121
|
+
: self (raise LDAP::ResultError)
|
122
|
+
LDAP::Conn#modify(dn, ldap_mods) : self (raise LDAP::ResultError)
|
123
|
+
LDAP::Conn#modify_ext(dn, ldap_mods, serverctrls, clientctrls)
|
124
|
+
: self (raise LDAP::ResultError)
|
125
|
+
LDAP::Conn#modrdn(olddn, newdn, delete) : self (raise LDAP::ResultError)
|
126
|
+
LDAP::Conn#delete(dn) : self (raise LDAP::ResultError)
|
127
|
+
LDAP::Conn#delete(dn, serverctrls, clientctrls) : self
|
128
|
+
(raise LDAP::ResultError)
|
129
|
+
LDAP::Conn#compare(dn, attr, val) : self
|
130
|
+
LDAP::Conn#compare_ext(dn, attr, val, serverctrls, clientctrls) : self
|
131
|
+
LDAP::Conn#set_option(opt, data) : self (raise LDAP::ResultError)
|
132
|
+
LDAP::Conn#get_option(opt) : data (raise LDAP::ResultError)
|
133
|
+
LDAP::Conn#schema(base = nil, attrs = nil,
|
134
|
+
sec = 0, usec = 0) : LDAP::Schema
|
135
|
+
LDAP::Conn#root_dse(attrs = nil, sec = 0, usec = 0) : Array of Hash
|
136
|
+
LDAP::SSLConn.new(host = 'localhost', port = LDAP_PORT,
|
137
|
+
start_tls = false, sctrls=nil, cctrls=nil)
|
138
|
+
: conn (raise LDAP::Error)
|
139
|
+
LDAP::Mod.new(mod_op, mod_type, mod_vals) : ldap_mod
|
140
|
+
LDAP::Mod#inspect : String
|
141
|
+
LDAP::Mod#mod_op : mod_op
|
142
|
+
LDAP::Mod#mod_type : mod_type
|
143
|
+
LDAP::Mod#mod_vals : mod_vals
|
144
|
+
LDAP::Mod#mod_op=(mod_op)
|
145
|
+
LDAP::Mod#mod_type=(mod_type)
|
146
|
+
LDAP::Mod#mod_vals=(mod_vals)
|
147
|
+
LDAP::Entry#get_dn : dn
|
148
|
+
LDAP::Entry#get_values : vals
|
149
|
+
LDAP::Entry#get_attributes : attrs
|
150
|
+
LDAP::Entry#dn (= get_dn)
|
151
|
+
LDAP::Entry#vals (= get_values)
|
152
|
+
LDAP::Entry#[] (= get_values)
|
153
|
+
LDAP::Entry#attrs (= get_attributes)
|
154
|
+
LDAP::Entry#to_hash : Hash
|
155
|
+
LDAP::Entry#inspect : String
|
156
|
+
LDAP::Control.new : LDAP::Control
|
157
|
+
LDAP::Control#oid : String
|
158
|
+
LDAP::Control#oid=(oid) : oid
|
159
|
+
LDAP::Control#critical : true || false
|
160
|
+
LDAP::Control#critical? : true || false
|
161
|
+
LDAP::Control#critical=(crit) : crit
|
162
|
+
LDAP::Control#value : String
|
163
|
+
LDAP::Control#value=(val) : val
|
164
|
+
LDAP::Control#inspect : String
|
165
|
+
|
166
|
+
SSLConn is a subclass of Conn, so its objects have access to the same methods
|
167
|
+
as Conn objects.
|
168
|
+
|
169
|
+
In ldap/schema.rb:
|
170
|
+
|
171
|
+
LDAP::Conn#schema(attrs = nil, sec = 0, usec = 0) : schema
|
172
|
+
LDAP::Schema#must(oc) : attributes
|
173
|
+
LDAP::Schema#may(oc) : attributes
|
174
|
+
LDAP::Schema#names(attr) : names
|
175
|
+
LDAP::Schema#sup(oc) : object class
|
176
|
+
|
177
|
+
In ldap/control.rb:
|
178
|
+
|
179
|
+
LDAP::Control.encode(array) : String
|
180
|
+
LDAP::Control#decode : Array
|
181
|
+
|
182
|
+
In ldap/ldif.rb:
|
183
|
+
|
184
|
+
LDAP::Entry#to_ldif : LDAP::LDIF::Entry
|
185
|
+
LDAP::Entry#to_s : Alias of LDAP::Entry#to_ldif
|
186
|
+
LDAP::Mod#to_ldif(dn) : LDAP::LDIF::Mod
|
187
|
+
LDAP::Mod#to_s(dn) : Alias of LDAP::Mod#to_ldif
|
188
|
+
LDAP::Record.new(dn, change_type, attrs, mods=nil, ctrls=nil)
|
189
|
+
LDAP::Record#send(conn) : self
|
190
|
+
LDAP::Record#clean : self
|
191
|
+
LDAP::LDIF.mods_to_ldif( dn, *mods )
|
192
|
+
LDAP::LDIF.parse_entry(lines) : LDAP::Record (raise LDAP::LDIFError)
|
193
|
+
LDAP::LDIF.parse_file(file, sort=false)
|
194
|
+
: self (if a block is given) /
|
195
|
+
Array (if no block is given)
|
196
|
+
|
197
|
+
See also test/*.rb for examples.
|
198
|
+
-------------------------------------------------------------------------------
|
199
|
+
|
200
|
+
REFERENCES
|
201
|
+
|
202
|
+
* T. Howes, M. Smith (University of Michigan): RFC1823, The LDAP Application
|
203
|
+
Program Interface, August 1995
|
204
|
+
* T. Howes (University of Michigan): RFC1960, A String Representation of LDAP
|
205
|
+
Search Filters, June 1996
|
206
|
+
* M. Wahl, Critical Angle Inc, T. Hows, Netscape Communications Gorp., S.
|
207
|
+
Kille, Isode Limited: Lightweight Directory Access Protocol (v3), December
|
208
|
+
1997
|
209
|
+
* M. Wahl, Critical Angle Inc., A. Coulbeck, Isode Inc., T. Howes, Netscape
|
210
|
+
Communications Corp., S. Kille, Isode Limited: December 1997
|
211
|
+
* M .Wahl, Critical Angle Inc., S. Kille, Isode Ltd., T. Howes, Netscape
|
212
|
+
Communications Corp.: Lightweight Directory Access Protocol (v3): UTF-8
|
213
|
+
String Representation of Distinguished Names, December 1997
|
214
|
+
* T. Howes, Netscape Communications Gorp.: The String Representation of LDAP
|
215
|
+
Search Filters, December 1997
|
216
|
+
* F. Yergeau (Alis Technologies): RFC2279, UTF-8, a transformation format of
|
217
|
+
ISO 10646, October 1998
|
218
|
+
* Netscape Communications Corp.: Netscape Directory SDK
|
219
|
+
* C. Weider, A. Herron, A. Anantha, T. Howes: RFC2696, LDAP Control
|
220
|
+
Extension for Simple Paged Results Manipulation, September 1999
|
221
|
+
* Luiz Ernesto Pinheiro Malere: LDAP Linux HOWTO, February 2000
|
222
|
+
* G. Good: RFC2849, The LDAP Data Interchange Format (LDIF) - Technical
|
223
|
+
Specification, June 2000.
|
224
|
+
* Tim Howes, Mark Smith: Understanding and Deploying LDAP Directory Servers
|
225
|
+
* The OpenLDAP Project: OpenLDAP 2.2 Administrator's Guide, February 2004
|
226
|
+
|
227
|
+
Here are some URLs that contain useful information about LDAP:
|
228
|
+
|
229
|
+
* University of Michigan
|
230
|
+
http://www.umich.edu/~dirsvcs/ldap/
|
231
|
+
* OpenLDAP Project
|
232
|
+
http://www.openldap.org/
|
233
|
+
* Netscape Communications
|
234
|
+
http://developer.netscape.com/docs/manuals/communicator/ldap45.htm
|
235
|
+
* Netscape Directory SDK
|
236
|
+
http://www.mozilla.org/directory/
|
237
|
+
* Active Directory Service Interfaces Overview
|
238
|
+
http://www.microsoft.com/windows2000/techinfo/howitworks/activedirectory/
|
239
|
+
adsilinks.asp
|
240
|
+
* LDAP schema repository
|
241
|
+
http://www.hklc.com/ldapschema/
|
242
|
+
http://ldap.hklc.com/
|
243
|
+
* Object Identifiers Registry
|
244
|
+
http://www.alvestrand.no/harald/objectid/
|
245
|
+
|
246
|
+
THANKS
|
247
|
+
|
248
|
+
This list maybe not correct. If you notice mistakes of this list, please point out.
|
249
|
+
|
250
|
+
* atsu@@metallic.co.jp
|
251
|
+
* Akinori MUSHA
|
252
|
+
* Akira Yamada
|
253
|
+
* Pirmin Kalberer
|
254
|
+
* Radek Hnilica
|
255
|
+
* Hadmut Danisch
|
256
|
+
* Yuuzou Gotou
|
257
|
+
* Tilo Sloboda
|
258
|
+
* Usa Nakamura
|
259
|
+
* Mark Kittisopikul
|
260
|
+
* Jan Mikkelsen
|
261
|
+
* Adam Doligalski
|
262
|
+
* Chris Scharf
|
263
|
+
* bidon: Patch.
|
264
|
+
* Milos Jakubicek: Patch.
|
265
|
+
* S. Potter [mbbx6spp]: Gem Packaging Support
|
266
|
+
* Kouhei Sutou
|
data/TODO
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
-*- text -*-
|
2
|
+
|
3
|
+
To-do list
|
4
|
+
----------
|
5
|
+
|
6
|
+
- Support for more LDAPv3 controls and extensions.
|
7
|
+
|
8
|
+
- DSML support.
|
9
|
+
|
10
|
+
- (?) adding ldap_url_search_s(), ldap_url_search_st() and
|
11
|
+
ldap_is_ldap_url()
|
12
|
+
|
13
|
+
- Asynchronous functions.
|
14
|
+
|
15
|
+
- Correctly implement SASL functions.
|
data/conn.c
ADDED
@@ -0,0 +1,1810 @@
|
|
1
|
+
/*
|
2
|
+
* conn.c
|
3
|
+
* $Id: conn.c,v 1.51 2006/08/01 00:07:53 ianmacd Exp $
|
4
|
+
*/
|
5
|
+
|
6
|
+
#include "ruby.h"
|
7
|
+
#include "rbldap.h"
|
8
|
+
#if defined(HAVE_SYS_TIME_H)
|
9
|
+
# include <sys/time.h>
|
10
|
+
#endif
|
11
|
+
#if defined(HAVE_UNISTD_H)
|
12
|
+
# include <unistd.h>
|
13
|
+
#endif
|
14
|
+
|
15
|
+
/* RDoc needs the following bogus code to find the parent module:
|
16
|
+
*
|
17
|
+
* rb_mLDAP = rb_define_module ("LDAP");
|
18
|
+
*/
|
19
|
+
|
20
|
+
static VALUE rb_ldap_sort_obj = Qnil;
|
21
|
+
extern VALUE rb_ldap_control_new2 (LDAPControl * ctl);
|
22
|
+
extern VALUE rb_ldap_sslconn_initialize (int argc, VALUE argv[], VALUE self);
|
23
|
+
extern VALUE rb_ldap_conn_rebind (VALUE self);
|
24
|
+
|
25
|
+
VALUE rb_cLDAP_Conn;
|
26
|
+
|
27
|
+
static void
|
28
|
+
rb_ldap_conn_free (RB_LDAP_DATA * ldapdata)
|
29
|
+
{
|
30
|
+
if (ldapdata->ldap && ldapdata->bind)
|
31
|
+
{
|
32
|
+
ldap_unbind (ldapdata->ldap);
|
33
|
+
};
|
34
|
+
};
|
35
|
+
|
36
|
+
static void
|
37
|
+
rb_ldap_conn_mark (RB_LDAP_DATA * ldapdata)
|
38
|
+
{
|
39
|
+
/* empty */
|
40
|
+
};
|
41
|
+
|
42
|
+
VALUE
|
43
|
+
rb_ldap_conn_new (VALUE klass, LDAP * cldap)
|
44
|
+
{
|
45
|
+
VALUE conn;
|
46
|
+
RB_LDAP_DATA *ldapdata;
|
47
|
+
|
48
|
+
conn = Data_Make_Struct (klass, RB_LDAP_DATA,
|
49
|
+
rb_ldap_conn_mark, rb_ldap_conn_free, ldapdata);
|
50
|
+
ldapdata->ldap = cldap;
|
51
|
+
ldapdata->err = 0;
|
52
|
+
ldapdata->bind = 0;
|
53
|
+
|
54
|
+
return conn;
|
55
|
+
};
|
56
|
+
|
57
|
+
VALUE
|
58
|
+
rb_ldap_conn_s_allocate (VALUE klass)
|
59
|
+
{
|
60
|
+
return rb_ldap_conn_new (klass, (LDAP *) 0);
|
61
|
+
}
|
62
|
+
|
63
|
+
/*
|
64
|
+
* call-seq:
|
65
|
+
* LDAP::Conn.new(host='localhost', port=LDAP_PORT) => LDAP::Conn
|
66
|
+
*
|
67
|
+
* Return a new LDAP::Conn connection to the server, +host+, on port +port+.
|
68
|
+
*/
|
69
|
+
VALUE
|
70
|
+
rb_ldap_conn_initialize (int argc, VALUE argv[], VALUE self)
|
71
|
+
{
|
72
|
+
LDAP *cldap;
|
73
|
+
char *chost;
|
74
|
+
int cport;
|
75
|
+
int was_verbose = Qfalse;
|
76
|
+
RB_LDAP_DATA *ldapdata;
|
77
|
+
|
78
|
+
VALUE host, port;
|
79
|
+
|
80
|
+
Data_Get_Struct (self, RB_LDAP_DATA, ldapdata);
|
81
|
+
if (ldapdata->ldap)
|
82
|
+
{
|
83
|
+
return Qnil;
|
84
|
+
}
|
85
|
+
|
86
|
+
switch (rb_scan_args (argc, argv, "02", &host, &port))
|
87
|
+
{
|
88
|
+
case 0:
|
89
|
+
chost = ALLOCA_N (char, strlen ("localhost") + 1);
|
90
|
+
strcpy (chost, "localhost");
|
91
|
+
cport = LDAP_PORT;
|
92
|
+
break;
|
93
|
+
case 1:
|
94
|
+
chost = StringValueCStr (host);
|
95
|
+
cport = LDAP_PORT;
|
96
|
+
break;
|
97
|
+
case 2:
|
98
|
+
chost = StringValueCStr (host);
|
99
|
+
cport = NUM2INT (port);
|
100
|
+
break;
|
101
|
+
default:
|
102
|
+
rb_bug ("rb_ldap_conn_new");
|
103
|
+
};
|
104
|
+
|
105
|
+
cldap = ldap_init (chost, cport);
|
106
|
+
if (!cldap)
|
107
|
+
rb_raise (rb_eLDAP_ResultError, "can't initialise an LDAP session");
|
108
|
+
ldapdata->ldap = cldap;
|
109
|
+
|
110
|
+
rb_iv_set (self, "@args", rb_ary_new4 (argc, argv));
|
111
|
+
|
112
|
+
/* Silence warning that next rb_iv_get produces. */
|
113
|
+
if (ruby_verbose == Qtrue)
|
114
|
+
{
|
115
|
+
was_verbose = Qtrue;
|
116
|
+
ruby_verbose = Qfalse;
|
117
|
+
}
|
118
|
+
|
119
|
+
if (rb_iv_get (self, "@sasl_quiet") != Qtrue)
|
120
|
+
rb_iv_set (self, "@sasl_quiet", Qfalse);
|
121
|
+
if (was_verbose == Qtrue)
|
122
|
+
ruby_verbose = Qtrue;
|
123
|
+
|
124
|
+
return Qnil;
|
125
|
+
};
|
126
|
+
|
127
|
+
/*
|
128
|
+
* call-seq:
|
129
|
+
* LDAP::Conn.open(host='localhost', port=LDAP_PORT) => LDAP::Conn
|
130
|
+
*
|
131
|
+
* Return a new LDAP::Conn connection to the server, +host+, on port +port+.
|
132
|
+
*/
|
133
|
+
VALUE
|
134
|
+
rb_ldap_conn_s_open (int argc, VALUE argv[], VALUE klass)
|
135
|
+
{
|
136
|
+
LDAP *cldap;
|
137
|
+
char *chost;
|
138
|
+
int cport;
|
139
|
+
|
140
|
+
VALUE host, port;
|
141
|
+
VALUE conn;
|
142
|
+
|
143
|
+
switch (rb_scan_args (argc, argv, "02", &host, &port))
|
144
|
+
{
|
145
|
+
case 0:
|
146
|
+
chost = ALLOCA_N (char, strlen ("localhost") + 1);
|
147
|
+
strcpy (chost, "localhost");
|
148
|
+
cport = LDAP_PORT;
|
149
|
+
break;
|
150
|
+
case 1:
|
151
|
+
chost = StringValueCStr (host);
|
152
|
+
cport = LDAP_PORT;
|
153
|
+
break;
|
154
|
+
case 2:
|
155
|
+
chost = StringValueCStr (host);
|
156
|
+
cport = NUM2INT (port);
|
157
|
+
break;
|
158
|
+
default:
|
159
|
+
rb_bug ("rb_ldap_conn_new");
|
160
|
+
};
|
161
|
+
|
162
|
+
cldap = ldap_open (chost, cport);
|
163
|
+
if (!cldap)
|
164
|
+
rb_raise (rb_eLDAP_ResultError, "can't open an LDAP session");
|
165
|
+
conn = rb_ldap_conn_new (klass, cldap);
|
166
|
+
|
167
|
+
return conn;
|
168
|
+
};
|
169
|
+
|
170
|
+
/*
|
171
|
+
* call-seq:
|
172
|
+
* conn.start_tls => nil
|
173
|
+
*
|
174
|
+
* Initiate START_TLS for the connection, +conn+.
|
175
|
+
*/
|
176
|
+
VALUE
|
177
|
+
rb_ldap_conn_start_tls_s (int argc, VALUE argv[], VALUE self)
|
178
|
+
{
|
179
|
+
#ifdef HAVE_LDAP_START_TLS_S
|
180
|
+
VALUE arg1, arg2;
|
181
|
+
RB_LDAP_DATA *ldapdata;
|
182
|
+
LDAPControl **serverctrls;
|
183
|
+
LDAPControl **clientctrls;
|
184
|
+
|
185
|
+
switch (rb_scan_args (argc, argv, "02", &arg1, &arg2))
|
186
|
+
{
|
187
|
+
case 0:
|
188
|
+
serverctrls = NULL;
|
189
|
+
clientctrls = NULL;
|
190
|
+
break;
|
191
|
+
case 1:
|
192
|
+
case 2:
|
193
|
+
rb_notimplement ();
|
194
|
+
default:
|
195
|
+
rb_bug ("rb_ldap_conn_start_tls_s");
|
196
|
+
};
|
197
|
+
|
198
|
+
GET_LDAP_DATA (self, ldapdata);
|
199
|
+
ldapdata->err = ldap_start_tls_s (ldapdata->ldap, serverctrls, clientctrls);
|
200
|
+
Check_LDAP_Result (ldapdata->err);
|
201
|
+
#else
|
202
|
+
rb_notimplement ();
|
203
|
+
#endif
|
204
|
+
return Qnil;
|
205
|
+
};
|
206
|
+
|
207
|
+
VALUE
|
208
|
+
rb_ldap_conn_rebind (VALUE self)
|
209
|
+
{
|
210
|
+
VALUE ary = rb_iv_get (self, "@args");
|
211
|
+
|
212
|
+
if (rb_obj_is_kind_of (self, rb_cLDAP_SSLConn) == Qtrue)
|
213
|
+
return rb_ldap_sslconn_initialize (RARRAY_LEN (ary), RARRAY_PTR (ary),
|
214
|
+
self);
|
215
|
+
else
|
216
|
+
return rb_ldap_conn_initialize (RARRAY_LEN (ary), RARRAY_PTR (ary),
|
217
|
+
self);
|
218
|
+
}
|
219
|
+
|
220
|
+
/*
|
221
|
+
* call-seq:
|
222
|
+
* conn.simple_bind(dn=nil, password=nil) => self
|
223
|
+
* conn.simple_bind(dn=nil, password=nil) { |conn| } => nil
|
224
|
+
*
|
225
|
+
* Bind an LDAP connection, using the DN, +dn+, and the credential, +password+.
|
226
|
+
* If a block is given, +self+ is yielded to the block.
|
227
|
+
*/
|
228
|
+
VALUE
|
229
|
+
rb_ldap_conn_simple_bind_s (int argc, VALUE argv[], VALUE self)
|
230
|
+
{
|
231
|
+
RB_LDAP_DATA *ldapdata;
|
232
|
+
|
233
|
+
VALUE arg1, arg2;
|
234
|
+
char *dn = NULL;
|
235
|
+
char *passwd = NULL;
|
236
|
+
|
237
|
+
Data_Get_Struct (self, RB_LDAP_DATA, ldapdata);
|
238
|
+
if (!ldapdata->ldap)
|
239
|
+
{
|
240
|
+
if (rb_iv_get (self, "@args") != Qnil)
|
241
|
+
{
|
242
|
+
rb_ldap_conn_rebind (self);
|
243
|
+
GET_LDAP_DATA (self, ldapdata);
|
244
|
+
}
|
245
|
+
else
|
246
|
+
{
|
247
|
+
rb_raise (rb_eLDAP_InvalidDataError,
|
248
|
+
"The LDAP handler has already unbound.");
|
249
|
+
}
|
250
|
+
}
|
251
|
+
|
252
|
+
if (ldapdata->bind)
|
253
|
+
{
|
254
|
+
rb_raise (rb_eLDAP_Error, "already bound.");
|
255
|
+
};
|
256
|
+
switch (rb_scan_args (argc, argv, "02", &arg1, &arg2))
|
257
|
+
{
|
258
|
+
case 0:
|
259
|
+
break;
|
260
|
+
case 1:
|
261
|
+
if (arg1 == Qnil)
|
262
|
+
{
|
263
|
+
dn = NULL;
|
264
|
+
}
|
265
|
+
else
|
266
|
+
{
|
267
|
+
dn = StringValueCStr (arg1);
|
268
|
+
}
|
269
|
+
break;
|
270
|
+
case 2:
|
271
|
+
if (arg1 == Qnil)
|
272
|
+
{
|
273
|
+
dn = NULL;
|
274
|
+
}
|
275
|
+
else
|
276
|
+
{
|
277
|
+
dn = StringValueCStr (arg1);
|
278
|
+
}
|
279
|
+
if (arg2 == Qnil)
|
280
|
+
{
|
281
|
+
passwd = NULL;
|
282
|
+
}
|
283
|
+
else
|
284
|
+
{
|
285
|
+
passwd = StringValueCStr (arg2);
|
286
|
+
}
|
287
|
+
break;
|
288
|
+
default:
|
289
|
+
rb_bug ("rb_ldap_conn_simple_bind_s");
|
290
|
+
}
|
291
|
+
|
292
|
+
ldapdata->err = ldap_simple_bind_s (ldapdata->ldap, dn, passwd);
|
293
|
+
Check_LDAP_Result (ldapdata->err);
|
294
|
+
ldapdata->bind = 1;
|
295
|
+
|
296
|
+
if (rb_block_given_p ())
|
297
|
+
{
|
298
|
+
rb_ensure (rb_yield, self, rb_ldap_conn_unbind, self);
|
299
|
+
return Qnil;
|
300
|
+
}
|
301
|
+
else
|
302
|
+
{
|
303
|
+
return self;
|
304
|
+
};
|
305
|
+
};
|
306
|
+
|
307
|
+
/*
|
308
|
+
* call-seq:
|
309
|
+
* conn.bind(dn=nil, password=nil, method=LDAP::LDAP_AUTH_SIMPLE)
|
310
|
+
* => self
|
311
|
+
* conn.bind(dn=nil, password=nil, method=LDAP::LDAP_AUTH_SIMPLE)
|
312
|
+
* { |conn| } => nil
|
313
|
+
*
|
314
|
+
* Bind an LDAP connection, using the DN, +dn+, the credential, +password+,
|
315
|
+
* and the bind method, +method+. If a block is given, +self+ is yielded to
|
316
|
+
* the block.
|
317
|
+
*/
|
318
|
+
VALUE
|
319
|
+
rb_ldap_conn_bind_s (int argc, VALUE argv[], VALUE self)
|
320
|
+
{
|
321
|
+
RB_LDAP_DATA *ldapdata;
|
322
|
+
|
323
|
+
VALUE arg1, arg2, arg3;
|
324
|
+
char *dn = NULL;
|
325
|
+
char *passwd = NULL;
|
326
|
+
int method = LDAP_AUTH_SIMPLE;
|
327
|
+
|
328
|
+
Data_Get_Struct (self, RB_LDAP_DATA, ldapdata);
|
329
|
+
if (!ldapdata->ldap)
|
330
|
+
{
|
331
|
+
if (rb_iv_get (self, "@args") != Qnil)
|
332
|
+
{
|
333
|
+
rb_ldap_conn_rebind (self);
|
334
|
+
GET_LDAP_DATA (self, ldapdata);
|
335
|
+
}
|
336
|
+
else
|
337
|
+
{
|
338
|
+
rb_raise (rb_eLDAP_InvalidDataError,
|
339
|
+
"The LDAP handler has already unbound.");
|
340
|
+
}
|
341
|
+
}
|
342
|
+
|
343
|
+
if (ldapdata->bind)
|
344
|
+
{
|
345
|
+
rb_raise (rb_eLDAP_Error, "already bound.");
|
346
|
+
};
|
347
|
+
switch (rb_scan_args (argc, argv, "03", &arg1, &arg2, &arg3))
|
348
|
+
{
|
349
|
+
case 0:
|
350
|
+
break;
|
351
|
+
case 1:
|
352
|
+
dn = StringValueCStr (arg1);
|
353
|
+
break;
|
354
|
+
case 2:
|
355
|
+
dn = StringValueCStr (arg1);
|
356
|
+
passwd = StringValueCStr (arg2);
|
357
|
+
break;
|
358
|
+
case 3:
|
359
|
+
dn = StringValueCStr (arg1);
|
360
|
+
passwd = StringValueCStr (arg2);
|
361
|
+
method = NUM2INT (arg3);
|
362
|
+
break;
|
363
|
+
default:
|
364
|
+
rb_bug ("rb_ldap_conn_bind_s");
|
365
|
+
}
|
366
|
+
|
367
|
+
ldapdata->err = ldap_bind_s (ldapdata->ldap, dn, passwd, method);
|
368
|
+
Check_LDAP_Result (ldapdata->err);
|
369
|
+
ldapdata->bind = 1;
|
370
|
+
|
371
|
+
if (rb_block_given_p ())
|
372
|
+
{
|
373
|
+
rb_ensure (rb_yield, self, rb_ldap_conn_unbind, self);
|
374
|
+
return Qnil;
|
375
|
+
}
|
376
|
+
else
|
377
|
+
{
|
378
|
+
return self;
|
379
|
+
};
|
380
|
+
};
|
381
|
+
|
382
|
+
/*
|
383
|
+
* call-seq:
|
384
|
+
* conn.unbind => nil
|
385
|
+
*
|
386
|
+
* Unbind the LDAP connection from the server.
|
387
|
+
*/
|
388
|
+
VALUE
|
389
|
+
rb_ldap_conn_unbind (VALUE self)
|
390
|
+
{
|
391
|
+
RB_LDAP_DATA *ldapdata;
|
392
|
+
|
393
|
+
GET_LDAP_DATA (self, ldapdata);
|
394
|
+
ldapdata->err = ldap_unbind (ldapdata->ldap);
|
395
|
+
ldapdata->bind = 0;
|
396
|
+
ldapdata->ldap = NULL;
|
397
|
+
Check_LDAP_Result (ldapdata->err);
|
398
|
+
|
399
|
+
return Qnil;
|
400
|
+
};
|
401
|
+
|
402
|
+
/*
|
403
|
+
* call-seq:
|
404
|
+
* conn.bound? => true or false
|
405
|
+
*
|
406
|
+
* Return *true* if the LDAP connection is still bound.
|
407
|
+
*/
|
408
|
+
VALUE
|
409
|
+
rb_ldap_conn_bound (VALUE self)
|
410
|
+
{
|
411
|
+
RB_LDAP_DATA *ldapdata;
|
412
|
+
|
413
|
+
Data_Get_Struct (self, RB_LDAP_DATA, ldapdata);
|
414
|
+
|
415
|
+
return ldapdata->bind == 0 ? Qfalse : Qtrue;
|
416
|
+
};
|
417
|
+
|
418
|
+
/*
|
419
|
+
* call-seq:
|
420
|
+
* conn.set_option(option, data) => self
|
421
|
+
*
|
422
|
+
* Set a session-wide option for this LDAP connection.
|
423
|
+
*
|
424
|
+
* For example:
|
425
|
+
*
|
426
|
+
* <code>conn.set_option( LDAP::LDAP_OPT_PROTOCOL_VERSION, 3 )</code>
|
427
|
+
*
|
428
|
+
* would set the protocol of this connection to LDAPv3.
|
429
|
+
*/
|
430
|
+
VALUE
|
431
|
+
rb_ldap_conn_set_option (VALUE self, VALUE opt, VALUE data)
|
432
|
+
{
|
433
|
+
/* ldap_set_option() is defined in IETF draft */
|
434
|
+
#ifdef HAVE_LDAP_SET_OPTION
|
435
|
+
RB_LDAP_DATA *ldapdata;
|
436
|
+
RB_LDAP_DATA dummy;
|
437
|
+
int idata;
|
438
|
+
void *optdata;
|
439
|
+
int copt;
|
440
|
+
|
441
|
+
if (NIL_P (self))
|
442
|
+
{
|
443
|
+
dummy.ldap = NULL;
|
444
|
+
dummy.err = dummy.bind = 0;
|
445
|
+
ldapdata = &dummy;
|
446
|
+
}
|
447
|
+
else
|
448
|
+
GET_LDAP_DATA (self, ldapdata);
|
449
|
+
copt = NUM2INT (opt);
|
450
|
+
|
451
|
+
switch (copt)
|
452
|
+
{
|
453
|
+
case LDAP_OPT_REFERRALS:
|
454
|
+
optdata = (void *) NUM2INT (data);
|
455
|
+
break;
|
456
|
+
case LDAP_OPT_DEREF:
|
457
|
+
case LDAP_OPT_SIZELIMIT:
|
458
|
+
case LDAP_OPT_TIMELIMIT:
|
459
|
+
case LDAP_OPT_RESTART:
|
460
|
+
case LDAP_OPT_PROTOCOL_VERSION:
|
461
|
+
if (ldapdata->bind != 0)
|
462
|
+
rb_raise (rb_eLDAP_ResultError,
|
463
|
+
"can't set LDAP protocol version after bind");
|
464
|
+
case LDAP_OPT_ERROR_NUMBER:
|
465
|
+
#ifdef LDAP_OPT_SSL
|
466
|
+
case LDAP_OPT_SSL:
|
467
|
+
#endif
|
468
|
+
#ifdef USE_OPENLDAP2
|
469
|
+
#ifdef LDAP_OPT_X_TLS
|
470
|
+
case LDAP_OPT_X_TLS:
|
471
|
+
#endif
|
472
|
+
#ifdef LDAP_OPT_X_TLS_REQUIRE_CERT
|
473
|
+
case LDAP_OPT_X_TLS_REQUIRE_CERT:
|
474
|
+
#endif
|
475
|
+
#endif
|
476
|
+
idata = NUM2INT (data);
|
477
|
+
optdata = &idata;
|
478
|
+
break;
|
479
|
+
case LDAP_OPT_HOST_NAME:
|
480
|
+
case LDAP_OPT_ERROR_STRING:
|
481
|
+
#ifdef LDAP_OPT_MATCHED_DN
|
482
|
+
case LDAP_OPT_MATCHED_DN:
|
483
|
+
#endif
|
484
|
+
#ifdef USE_OPENLDAP2
|
485
|
+
#ifdef LDAP_OPT_X_TLS_CACERTFILE
|
486
|
+
case LDAP_OPT_X_TLS_CACERTFILE:
|
487
|
+
#endif
|
488
|
+
#ifdef LDAP_OPT_X_TLS_CACERTDIR
|
489
|
+
case LDAP_OPT_X_TLS_CACERTDIR:
|
490
|
+
#endif
|
491
|
+
#ifdef LDAP_OPT_X_TLS_CERT
|
492
|
+
case LDAP_OPT_X_TLS_CERT:
|
493
|
+
#endif
|
494
|
+
#ifdef LDAP_OPT_X_TLS_CERTFILE
|
495
|
+
case LDAP_OPT_X_TLS_CERTFILE:
|
496
|
+
#endif
|
497
|
+
#ifdef LDAP_OPT_X_TLS_KEYFILE
|
498
|
+
case LDAP_OPT_X_TLS_KEYFILE:
|
499
|
+
#endif
|
500
|
+
#ifdef LDAP_OPT_X_TLS_PROTOCOL_MIN
|
501
|
+
case LDAP_OPT_X_TLS_PROTOCOL_MIN:
|
502
|
+
#endif
|
503
|
+
#ifdef LDAP_OPT_X_TLS_CIPHER_SUITE
|
504
|
+
case LDAP_OPT_X_TLS_CIPHER_SUITE:
|
505
|
+
#endif
|
506
|
+
#ifdef LDAP_OPT_X_TLS_RANDOM_FILE
|
507
|
+
case LDAP_OPT_X_TLS_RANDOM_FILE:
|
508
|
+
#endif
|
509
|
+
#endif
|
510
|
+
optdata = NIL_P (data) ? NULL : StringValueCStr (data);
|
511
|
+
break;
|
512
|
+
#ifdef LDAP_OPT_API_INFO
|
513
|
+
case LDAP_OPT_API_INFO:
|
514
|
+
rb_raise (rb_eLDAP_Error, "option is read-only");
|
515
|
+
/* optdata = (void*)rb_ldap_get_apiinfo(data); */
|
516
|
+
break;
|
517
|
+
#endif
|
518
|
+
#ifdef LDAP_OPT_SERVER_CONTROLS
|
519
|
+
case LDAP_OPT_SERVER_CONTROLS:
|
520
|
+
optdata = rb_ldap_get_controls (data);
|
521
|
+
break;
|
522
|
+
#endif
|
523
|
+
default:
|
524
|
+
rb_notimplement ();
|
525
|
+
}
|
526
|
+
ldapdata->err = ldap_set_option (ldapdata->ldap, copt, optdata);
|
527
|
+
Check_LDAP_OPT_Result (ldapdata->err);
|
528
|
+
|
529
|
+
return self;
|
530
|
+
#else
|
531
|
+
rb_notimplement ();
|
532
|
+
#endif
|
533
|
+
};
|
534
|
+
|
535
|
+
static VALUE
|
536
|
+
rb_ldap_conn_s_set_option (VALUE klass, VALUE opt, VALUE data)
|
537
|
+
{
|
538
|
+
return rb_ldap_conn_set_option (Qnil, opt, data);
|
539
|
+
}
|
540
|
+
|
541
|
+
/* call-seq:
|
542
|
+
* conn.get_option(opt) => String
|
543
|
+
*
|
544
|
+
* Return the value associated with the option, +opt+.
|
545
|
+
*/
|
546
|
+
VALUE
|
547
|
+
rb_ldap_conn_get_option (VALUE self, VALUE opt)
|
548
|
+
{
|
549
|
+
#ifdef HAVE_LDAP_GET_OPTION
|
550
|
+
RB_LDAP_DATA *ldapdata;
|
551
|
+
static RB_LDAP_DATA dummy = { NULL, 0, 0 };
|
552
|
+
long *data;
|
553
|
+
int copt;
|
554
|
+
VALUE val;
|
555
|
+
|
556
|
+
if (NIL_P (self))
|
557
|
+
{
|
558
|
+
if (dummy.ldap == NULL)
|
559
|
+
dummy.ldap = ldap_init ("", 0);
|
560
|
+
ldapdata = &dummy;
|
561
|
+
}
|
562
|
+
else
|
563
|
+
GET_LDAP_DATA (self, ldapdata);
|
564
|
+
copt = NUM2INT (opt);
|
565
|
+
|
566
|
+
#if defined(LDAP_OPT_API_INFO) && defined(LDAP_API_INFO_VERSION)
|
567
|
+
if (copt == LDAP_OPT_API_INFO)
|
568
|
+
{
|
569
|
+
LDAPAPIInfo *info;
|
570
|
+
|
571
|
+
info = ALLOCA_N (LDAPAPIInfo, 1);
|
572
|
+
/* This is from the Netscape SDK docs for 4.1* */
|
573
|
+
info->ldapai_info_version = LDAP_API_INFO_VERSION;
|
574
|
+
ldapdata->err = ldap_get_option (NULL, copt, (void *) info);
|
575
|
+
data = (long *) info;
|
576
|
+
}
|
577
|
+
else
|
578
|
+
{
|
579
|
+
data = (void *) ALLOCA_N (char, LDAP_GET_OPT_MAX_BUFFER_SIZE);
|
580
|
+
ldapdata->err = ldap_get_option (ldapdata->ldap, copt, (void *) data);
|
581
|
+
}
|
582
|
+
#else
|
583
|
+
data = (void *) ALLOCA_N (char, LDAP_GET_OPT_MAX_BUFFER_SIZE);
|
584
|
+
ldapdata->err = ldap_get_option (ldapdata->ldap, copt, (void *) data);
|
585
|
+
#endif
|
586
|
+
|
587
|
+
if (ldapdata->err == LDAP_OPT_SUCCESS)
|
588
|
+
{
|
589
|
+
switch (copt)
|
590
|
+
{
|
591
|
+
case LDAP_OPT_DEREF:
|
592
|
+
case LDAP_OPT_SIZELIMIT:
|
593
|
+
case LDAP_OPT_TIMELIMIT:
|
594
|
+
case LDAP_OPT_REFERRALS:
|
595
|
+
case LDAP_OPT_RESTART:
|
596
|
+
case LDAP_OPT_PROTOCOL_VERSION:
|
597
|
+
case LDAP_OPT_ERROR_NUMBER:
|
598
|
+
#ifdef USE_OPENLDAP2
|
599
|
+
#ifdef LDAP_OPT_X_TLS
|
600
|
+
case LDAP_OPT_X_TLS:
|
601
|
+
#endif
|
602
|
+
#ifdef LDAP_OPT_X_TLS_REQUIRE_CERT
|
603
|
+
case LDAP_OPT_X_TLS_REQUIRE_CERT:
|
604
|
+
#endif
|
605
|
+
#endif
|
606
|
+
val = INT2NUM ((int) (*data));
|
607
|
+
break;
|
608
|
+
|
609
|
+
case LDAP_OPT_HOST_NAME:
|
610
|
+
case LDAP_OPT_ERROR_STRING:
|
611
|
+
#ifdef LDAP_OPT_MATCHED_DN
|
612
|
+
case LDAP_OPT_MATCHED_DN:
|
613
|
+
#endif
|
614
|
+
#ifdef USE_OPENLDAP2
|
615
|
+
#ifdef LDAP_OPT_X_TLS_CACERTFILE
|
616
|
+
case LDAP_OPT_X_TLS_CACERTFILE:
|
617
|
+
#endif
|
618
|
+
#ifdef LDAP_OPT_X_TLS_CACERTDIR
|
619
|
+
case LDAP_OPT_X_TLS_CACERTDIR:
|
620
|
+
#endif
|
621
|
+
#ifdef LDAP_OPT_X_TLS_CERT
|
622
|
+
case LDAP_OPT_X_TLS_CERT:
|
623
|
+
#endif
|
624
|
+
#ifdef LDAP_OPT_X_TLS_CERTFILE
|
625
|
+
case LDAP_OPT_X_TLS_CERTFILE:
|
626
|
+
#endif
|
627
|
+
#ifdef LDAP_OPT_X_TLS_KEYFILE
|
628
|
+
case LDAP_OPT_X_TLS_KEYFILE:
|
629
|
+
#endif
|
630
|
+
#ifdef LDAP_OPT_X_TLS_PROTOCOL_MIN
|
631
|
+
case LDAP_OPT_X_TLS_PROTOCOL_MIN:
|
632
|
+
#endif
|
633
|
+
#ifdef LDAP_OPT_X_TLS_CIPHER_SUITE
|
634
|
+
case LDAP_OPT_X_TLS_CIPHER_SUITE:
|
635
|
+
#endif
|
636
|
+
#ifdef LDAP_OPT_X_TLS_RANDOM_FILE
|
637
|
+
case LDAP_OPT_X_TLS_RANDOM_FILE:
|
638
|
+
#endif
|
639
|
+
#endif
|
640
|
+
val = (data
|
641
|
+
&& *data) ? rb_tainted_str_new2 ((char *) (*data)) : Qnil;
|
642
|
+
break;
|
643
|
+
#ifdef LDAP_OPT_API_INFO
|
644
|
+
case LDAP_OPT_API_INFO:
|
645
|
+
val = rb_ldap_apiinfo_new ((LDAPAPIInfo *) data);
|
646
|
+
break;
|
647
|
+
#endif
|
648
|
+
default:
|
649
|
+
rb_notimplement ();
|
650
|
+
};
|
651
|
+
|
652
|
+
return val;
|
653
|
+
}
|
654
|
+
else
|
655
|
+
{
|
656
|
+
rb_raise (rb_eLDAP_Error, ldap_err2string (ldapdata->err));
|
657
|
+
};
|
658
|
+
#else
|
659
|
+
rb_notimplement ();
|
660
|
+
#endif
|
661
|
+
};
|
662
|
+
|
663
|
+
static VALUE
|
664
|
+
rb_ldap_conn_s_get_option (VALUE klass, VALUE opt)
|
665
|
+
{
|
666
|
+
return rb_ldap_conn_get_option (Qnil, opt);
|
667
|
+
}
|
668
|
+
|
669
|
+
/*
|
670
|
+
* call-seq:
|
671
|
+
* conn.perror(msg) => nil
|
672
|
+
*
|
673
|
+
* Print the text string associated with the error code of the last LDAP
|
674
|
+
* operation. +msg+ is used to prefix the error.
|
675
|
+
*/
|
676
|
+
VALUE
|
677
|
+
rb_ldap_conn_perror (VALUE self, VALUE msg)
|
678
|
+
{
|
679
|
+
RB_LDAP_DATA *ldapdata;
|
680
|
+
char *cmsg;
|
681
|
+
#if (! defined(HAVE_LDAP_PERROR)) || defined(USE_NETSCAPE_SDK)
|
682
|
+
char *str;
|
683
|
+
#endif
|
684
|
+
|
685
|
+
GET_LDAP_DATA (self, ldapdata);
|
686
|
+
cmsg = StringValueCStr (msg);
|
687
|
+
#if defined(HAVE_LDAP_PERROR) && (! defined(USE_NETSCAPE_SDK))
|
688
|
+
ldap_perror (ldapdata->ldap, cmsg);
|
689
|
+
#else
|
690
|
+
str = ldap_err2string (ldapdata->err);
|
691
|
+
fprintf (stderr, "%s: %s\n", cmsg, str);
|
692
|
+
#endif
|
693
|
+
|
694
|
+
return Qnil;
|
695
|
+
};
|
696
|
+
|
697
|
+
/*
|
698
|
+
* call-seq:
|
699
|
+
* conn.result2error(msg) => Fixnum
|
700
|
+
*
|
701
|
+
* Return the error code associated with the LDAP message, +msg+.
|
702
|
+
*/
|
703
|
+
VALUE
|
704
|
+
rb_ldap_conn_result2error (VALUE self, VALUE msg)
|
705
|
+
{
|
706
|
+
RB_LDAP_DATA *ldapdata;
|
707
|
+
RB_LDAPENTRY_DATA *edata;
|
708
|
+
int cdofree = 0;
|
709
|
+
|
710
|
+
GET_LDAP_DATA (self, ldapdata);
|
711
|
+
Check_Kind (msg, rb_cLDAP_Entry);
|
712
|
+
GET_LDAPENTRY_DATA (msg, edata);
|
713
|
+
|
714
|
+
ldapdata->err = ldap_result2error (ldapdata->ldap, edata->msg, cdofree);
|
715
|
+
return INT2NUM (ldapdata->err);
|
716
|
+
};
|
717
|
+
|
718
|
+
/*
|
719
|
+
* call-seq:
|
720
|
+
* conn.err2string(err) => String
|
721
|
+
*
|
722
|
+
* Return the text string associated with the LDAP error, +err+.
|
723
|
+
*/
|
724
|
+
VALUE
|
725
|
+
rb_ldap_conn_err2string (VALUE self, VALUE err)
|
726
|
+
{
|
727
|
+
RB_LDAP_DATA *ldapdata;
|
728
|
+
int c_err = NUM2INT (err);
|
729
|
+
char *str;
|
730
|
+
|
731
|
+
GET_LDAP_DATA (self, ldapdata);
|
732
|
+
str = ldap_err2string (c_err);
|
733
|
+
return (str ? rb_tainted_str_new2 (str) : Qnil);
|
734
|
+
};
|
735
|
+
|
736
|
+
VALUE
|
737
|
+
rb_ldap_conn_get_errno (VALUE self)
|
738
|
+
{
|
739
|
+
RB_LDAP_DATA *ldapdata;
|
740
|
+
VALUE err;
|
741
|
+
|
742
|
+
GET_LDAP_DATA (self, ldapdata);
|
743
|
+
|
744
|
+
#ifdef USE_NETSCAPE_SDK
|
745
|
+
cerr = ldap_get_lderrno (ldapdata->ldap, NULL, NULL);
|
746
|
+
err = INT2NUM (cerr);
|
747
|
+
#else
|
748
|
+
# ifdef USE_OPENLDAP1
|
749
|
+
cerr = NUM2INT (ldapdata->ldap->ld_errno);
|
750
|
+
err = INT2NUM (cerr);
|
751
|
+
# else
|
752
|
+
rb_notimplement ();
|
753
|
+
# endif
|
754
|
+
#endif
|
755
|
+
|
756
|
+
return err;
|
757
|
+
};
|
758
|
+
|
759
|
+
static VALUE
|
760
|
+
rb_ldap_conn_invalidate_entry (VALUE msg)
|
761
|
+
{
|
762
|
+
RB_LDAPENTRY_DATA *edata;
|
763
|
+
GET_LDAPENTRY_DATA (msg, edata);
|
764
|
+
edata->ldap = NULL;
|
765
|
+
edata->msg = NULL;
|
766
|
+
return Qnil;
|
767
|
+
};
|
768
|
+
|
769
|
+
|
770
|
+
static int
|
771
|
+
rb_ldap_internal_strcmp (const char *left, const char *right)
|
772
|
+
{
|
773
|
+
VALUE res;
|
774
|
+
|
775
|
+
if (rb_ldap_sort_obj == Qtrue)
|
776
|
+
{
|
777
|
+
res = rb_funcall (rb_tainted_str_new2 (left), rb_intern ("<=>"), 1,
|
778
|
+
rb_tainted_str_new2 (right));
|
779
|
+
}
|
780
|
+
else if (rb_ldap_sort_obj != Qnil)
|
781
|
+
{
|
782
|
+
res = rb_funcall (rb_ldap_sort_obj, rb_intern ("call"), 2,
|
783
|
+
rb_tainted_str_new2 (left),
|
784
|
+
rb_tainted_str_new2 (right));
|
785
|
+
}
|
786
|
+
else
|
787
|
+
{
|
788
|
+
res = 0;
|
789
|
+
};
|
790
|
+
|
791
|
+
return INT2NUM (res);
|
792
|
+
};
|
793
|
+
|
794
|
+
static int
|
795
|
+
rb_ldap_conn_search_i (int argc, VALUE argv[], VALUE self,
|
796
|
+
RB_LDAP_DATA ** ldapdata, LDAPMessage ** cmsg)
|
797
|
+
{
|
798
|
+
VALUE base, scope, filter, attrs, attrsonly, sec, usec, s_attr, s_proc;
|
799
|
+
|
800
|
+
LDAP *cldap;
|
801
|
+
char *cbase;
|
802
|
+
int cscope;
|
803
|
+
char *cfilter;
|
804
|
+
char **cattrs;
|
805
|
+
char *sort_attr;
|
806
|
+
int cattrsonly;
|
807
|
+
int i;
|
808
|
+
struct timeval tv;
|
809
|
+
|
810
|
+
GET_LDAP_DATA (self, (*ldapdata));
|
811
|
+
cldap = (*ldapdata)->ldap;
|
812
|
+
|
813
|
+
cattrs = NULL;
|
814
|
+
cattrsonly = 0;
|
815
|
+
tv.tv_sec = 0;
|
816
|
+
tv.tv_usec = 0;
|
817
|
+
sort_attr = NULL;
|
818
|
+
rb_ldap_sort_obj = Qnil;
|
819
|
+
|
820
|
+
switch (rb_scan_args (argc, argv, "36",
|
821
|
+
&base, &scope, &filter, &attrs, &attrsonly, &sec,
|
822
|
+
&usec, &s_attr, &s_proc))
|
823
|
+
{
|
824
|
+
case 9:
|
825
|
+
rb_ldap_sort_obj = s_proc; /* Ruby's GC never starts in a C function */
|
826
|
+
case 8:
|
827
|
+
if (rb_ldap_sort_obj == Qnil)
|
828
|
+
{
|
829
|
+
rb_ldap_sort_obj = Qtrue;
|
830
|
+
}
|
831
|
+
sort_attr = StringValueCStr (s_attr);
|
832
|
+
case 7:
|
833
|
+
tv.tv_usec = NUM2INT (usec);
|
834
|
+
case 6:
|
835
|
+
tv.tv_sec = NUM2INT (sec);
|
836
|
+
case 5:
|
837
|
+
cattrsonly = (attrsonly == Qtrue) ? 1 : 0;
|
838
|
+
case 4:
|
839
|
+
if (TYPE (attrs) == T_NIL)
|
840
|
+
{
|
841
|
+
cattrs = NULL;
|
842
|
+
}
|
843
|
+
else
|
844
|
+
{
|
845
|
+
if (TYPE (attrs) == T_STRING)
|
846
|
+
attrs = rb_ary_to_ary (attrs);
|
847
|
+
else
|
848
|
+
Check_Type (attrs, T_ARRAY);
|
849
|
+
|
850
|
+
if (RARRAY_LEN (attrs) == 0)
|
851
|
+
{
|
852
|
+
cattrs = NULL;
|
853
|
+
}
|
854
|
+
else
|
855
|
+
{
|
856
|
+
cattrs = ALLOCA_N (char *, (RARRAY_LEN (attrs) + 1));
|
857
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
858
|
+
{
|
859
|
+
cattrs[i] = StringValueCStr (RARRAY_PTR (attrs)[i]);
|
860
|
+
};
|
861
|
+
cattrs[RARRAY_LEN (attrs)] = NULL;
|
862
|
+
}
|
863
|
+
}
|
864
|
+
case 3:
|
865
|
+
cbase = StringValueCStr (base);
|
866
|
+
cscope = NUM2INT (scope);
|
867
|
+
cfilter = StringValueCStr (filter);
|
868
|
+
break;
|
869
|
+
default:
|
870
|
+
rb_bug ("rb_ldap_conn_search_s");
|
871
|
+
};
|
872
|
+
|
873
|
+
(*cmsg) = NULL;
|
874
|
+
if (tv.tv_sec == 0 && tv.tv_usec == 0)
|
875
|
+
{
|
876
|
+
(*ldapdata)->err = ldap_search_s (cldap, cbase, cscope, cfilter,
|
877
|
+
cattrs, cattrsonly, cmsg);
|
878
|
+
}
|
879
|
+
else
|
880
|
+
{
|
881
|
+
(*ldapdata)->err = ldap_search_st (cldap, cbase, cscope, cfilter,
|
882
|
+
cattrs, cattrsonly, &tv, cmsg);
|
883
|
+
}
|
884
|
+
if (!(cmsg && (*cmsg)))
|
885
|
+
{
|
886
|
+
rb_raise (rb_eRuntimeError, "no result returned by search");
|
887
|
+
}
|
888
|
+
Check_LDAP_Result ((*ldapdata)->err);
|
889
|
+
|
890
|
+
#ifdef HAVE_LDAP_SORT_ENTRIES
|
891
|
+
if (rb_ldap_sort_obj != Qnil)
|
892
|
+
{
|
893
|
+
ldap_sort_entries ((*ldapdata)->ldap, cmsg,
|
894
|
+
sort_attr, rb_ldap_internal_strcmp);
|
895
|
+
};
|
896
|
+
#endif
|
897
|
+
rb_ldap_sort_obj = Qnil;
|
898
|
+
|
899
|
+
return (*ldapdata)->err;
|
900
|
+
}
|
901
|
+
|
902
|
+
static VALUE
|
903
|
+
rb_ldap_conn_search_b (VALUE rdata)
|
904
|
+
{
|
905
|
+
void **data = (void **) rdata;
|
906
|
+
LDAP *cldap = (LDAP *) data[0];
|
907
|
+
LDAPMessage *cmsg = (LDAPMessage *) data[1];
|
908
|
+
LDAPMessage *e;
|
909
|
+
VALUE m;
|
910
|
+
|
911
|
+
for (e = ldap_first_entry (cldap, cmsg); e != NULL;
|
912
|
+
e = ldap_next_entry (cldap, e))
|
913
|
+
{
|
914
|
+
m = rb_ldap_entry_new (cldap, e);
|
915
|
+
rb_ensure (rb_yield, m, rb_ldap_conn_invalidate_entry, m);
|
916
|
+
}
|
917
|
+
return Qnil;
|
918
|
+
}
|
919
|
+
|
920
|
+
static VALUE
|
921
|
+
rb_ldap_conn_search2_b (VALUE rdata)
|
922
|
+
{
|
923
|
+
void **data = (void *) rdata;
|
924
|
+
LDAP *cldap = (LDAP *) data[0];
|
925
|
+
LDAPMessage *cmsg = (LDAPMessage *) data[1];
|
926
|
+
VALUE ary = (VALUE) data[2];
|
927
|
+
LDAPMessage *e;
|
928
|
+
VALUE m;
|
929
|
+
VALUE hash;
|
930
|
+
|
931
|
+
for (e = ldap_first_entry (cldap, cmsg); e != NULL;
|
932
|
+
e = ldap_next_entry (cldap, e))
|
933
|
+
{
|
934
|
+
m = rb_ldap_entry_new (cldap, e);
|
935
|
+
hash = rb_ldap_entry_to_hash (m);
|
936
|
+
rb_ary_push (ary, hash);
|
937
|
+
if (rb_block_given_p ())
|
938
|
+
{
|
939
|
+
rb_ensure (rb_yield, hash, rb_ldap_conn_invalidate_entry, m);
|
940
|
+
}
|
941
|
+
}
|
942
|
+
return Qnil;
|
943
|
+
}
|
944
|
+
|
945
|
+
static VALUE
|
946
|
+
rb_ldap_msgfree (VALUE data)
|
947
|
+
{
|
948
|
+
LDAPMessage *cmsg = (LDAPMessage *) data;
|
949
|
+
ldap_msgfree (cmsg);
|
950
|
+
return Qnil;
|
951
|
+
}
|
952
|
+
|
953
|
+
VALUE
|
954
|
+
rb_ldap_parse_result (LDAP * cldap, LDAPMessage * cmsg)
|
955
|
+
{
|
956
|
+
int rc, err, i;
|
957
|
+
char **referrals;
|
958
|
+
LDAPControl **serverctrls;
|
959
|
+
VALUE refs, ctls, ary;
|
960
|
+
|
961
|
+
refs = rb_ary_new ();
|
962
|
+
ctls = rb_ary_new ();
|
963
|
+
ary = rb_ary_new ();
|
964
|
+
|
965
|
+
rc = ldap_parse_result (cldap, cmsg, &err, NULL, NULL,
|
966
|
+
&referrals, &serverctrls, 0);
|
967
|
+
Check_LDAP_Result (rc);
|
968
|
+
Check_LDAP_Result (err);
|
969
|
+
|
970
|
+
if (referrals)
|
971
|
+
{
|
972
|
+
for (i = 0; referrals[i]; i++)
|
973
|
+
{
|
974
|
+
rb_ary_push (refs, rb_str_new2 (referrals[i]));
|
975
|
+
}
|
976
|
+
}
|
977
|
+
|
978
|
+
if (serverctrls)
|
979
|
+
{
|
980
|
+
for (i = 0; serverctrls[i]; i++)
|
981
|
+
{
|
982
|
+
rb_ary_push (ctls, rb_ldap_control_new2 (serverctrls[i]));
|
983
|
+
}
|
984
|
+
}
|
985
|
+
|
986
|
+
rb_ary_push (ary, refs);
|
987
|
+
rb_ary_push (ary, ctls);
|
988
|
+
|
989
|
+
return ary;
|
990
|
+
}
|
991
|
+
|
992
|
+
/*
|
993
|
+
* call-seq:
|
994
|
+
* conn.search(base_dn, scope, filter, attrs=nil, attrsonly=false,
|
995
|
+
* sec=0, usec=0, s_attr=nil, s_proc=nil) { |entry| } => self
|
996
|
+
*
|
997
|
+
* Perform a search, with the base DN +base_dn+, a scope of +scope+ and a
|
998
|
+
* search filter of +filter+.
|
999
|
+
*
|
1000
|
+
* If +attrs+ is present, it should be an array of the attributes that the
|
1001
|
+
* search should return. By default, all attributes are returned, which is the
|
1002
|
+
* same as specifying an empty array or *nil*. Alternatively, +attrs+ may be a
|
1003
|
+
* single string, in which case it will be treated as a single element array.
|
1004
|
+
*
|
1005
|
+
* If +attrsonly+ is *true*, attributes will be returned, but not their values.
|
1006
|
+
*
|
1007
|
+
* If +sec+ and/or +usec+ are given, they define the time-out for the search in
|
1008
|
+
* seconds and microseconds, respectively.
|
1009
|
+
*
|
1010
|
+
* If +s_attr+ is given, it specifies the attribute on which to sort the
|
1011
|
+
* entries returned by the server. If +s_proc+ is given, it specifies a Proc
|
1012
|
+
* object that will be used to sort the entries returned by the server.
|
1013
|
+
*
|
1014
|
+
* Note that not all results may be returned by this method. If a
|
1015
|
+
* size limit has been set for the number of results to be returned and this
|
1016
|
+
* limit is exceeded, the results set will be truncated. You can check for
|
1017
|
+
* this by calling LDAP::Conn#err immediately after this method and comparing
|
1018
|
+
* the result to LDAP::LDAP_SIZELIMIT_EXCEEDED.
|
1019
|
+
*/
|
1020
|
+
VALUE
|
1021
|
+
rb_ldap_conn_search_s (int argc, VALUE argv[], VALUE self)
|
1022
|
+
{
|
1023
|
+
RB_LDAP_DATA *ldapdata;
|
1024
|
+
LDAPMessage *cmsg;
|
1025
|
+
LDAP *cldap;
|
1026
|
+
VALUE rc_ary = Qnil;
|
1027
|
+
|
1028
|
+
rb_ldap_conn_search_i (argc, argv, self, &ldapdata, &cmsg);
|
1029
|
+
cldap = ldapdata->ldap;
|
1030
|
+
|
1031
|
+
if (ldapdata->err == LDAP_SUCCESS
|
1032
|
+
|| ldapdata->err == LDAP_SIZELIMIT_EXCEEDED)
|
1033
|
+
{
|
1034
|
+
void *pass_data[] = { (void *) cldap, (void *) cmsg };
|
1035
|
+
|
1036
|
+
rc_ary = rb_ldap_parse_result (cldap, cmsg);
|
1037
|
+
rb_iv_set (self, "@referrals", rb_ary_shift (rc_ary));
|
1038
|
+
rb_iv_set (self, "@controls", rb_ary_shift (rc_ary));
|
1039
|
+
|
1040
|
+
rb_ensure (rb_ldap_conn_search_b, (VALUE) pass_data,
|
1041
|
+
rb_ldap_msgfree, (VALUE) cmsg);
|
1042
|
+
};
|
1043
|
+
|
1044
|
+
return self;
|
1045
|
+
}
|
1046
|
+
|
1047
|
+
/*
|
1048
|
+
* call-seq:
|
1049
|
+
* conn.search2(base_dn, scope, filter, attrs=nil, attrsonly=false,
|
1050
|
+
* sec=0, usec=0, s_attr=nil, s_proc=nil) => array
|
1051
|
+
* conn.search2(base_dn, scope, filter, attrs=nil, attrsonly=false,
|
1052
|
+
* sec=0, usec=0, s_attr=nil, s_proc=nil) { |entry_as_hash| } => self
|
1053
|
+
*
|
1054
|
+
* Perform a search, with the base DN +base_dn+, a scope of +scope+ and a
|
1055
|
+
* search filter of +filter+.
|
1056
|
+
*
|
1057
|
+
* If +attrs+ is present, it should be an array of the attributes that the
|
1058
|
+
* search should return. By default, all attributes are returned, which is the
|
1059
|
+
* same as specifying an empty array or *nil*. Alternatively, +attrs+ may be a
|
1060
|
+
* single string, in which case it will be treated as a single element array.
|
1061
|
+
*
|
1062
|
+
* If +attrsonly+ is *true*, attributes will be returned, but not their values.
|
1063
|
+
*
|
1064
|
+
* If +sec+ and/or +usec+ are given, they define the time-out for the search in
|
1065
|
+
* seconds and microseconds, respectively.
|
1066
|
+
*
|
1067
|
+
* If +s_attr+ is given, it specifies the attribute on which to sort the
|
1068
|
+
* entries returned by the server. If +s_proc+ is given, it specifies a Proc
|
1069
|
+
* object that will be used to sort the entries returned by the server.
|
1070
|
+
*
|
1071
|
+
* Note that not all results may be returned by this method. If a
|
1072
|
+
* size limit has been set for the number of results to be returned and this
|
1073
|
+
* limit is exceeded, the results set will be truncated. You can check for
|
1074
|
+
* this by calling LDAP::Conn#err immediately after this method and comparing
|
1075
|
+
* the result to LDAP::LDAP_SIZELIMIT_EXCEEDED.
|
1076
|
+
*/
|
1077
|
+
VALUE
|
1078
|
+
rb_ldap_conn_search2_s (int argc, VALUE argv[], VALUE self)
|
1079
|
+
{
|
1080
|
+
RB_LDAP_DATA *ldapdata;
|
1081
|
+
LDAPMessage *cmsg;
|
1082
|
+
LDAP *cldap;
|
1083
|
+
VALUE ary = Qnil;
|
1084
|
+
VALUE rc_ary = Qnil;
|
1085
|
+
|
1086
|
+
rb_ldap_conn_search_i (argc, argv, self, &ldapdata, &cmsg);
|
1087
|
+
cldap = ldapdata->ldap;
|
1088
|
+
|
1089
|
+
ary = rb_ary_new ();
|
1090
|
+
if (ldapdata->err == LDAP_SUCCESS
|
1091
|
+
|| ldapdata->err == LDAP_SIZELIMIT_EXCEEDED)
|
1092
|
+
{
|
1093
|
+
void *pass_data[] = { (void *) cldap, (void *) cmsg, (void *) ary };
|
1094
|
+
|
1095
|
+
rc_ary = rb_ldap_parse_result (cldap, cmsg);
|
1096
|
+
rb_iv_set (self, "@referrals", rb_ary_shift (rc_ary));
|
1097
|
+
rb_iv_set (self, "@controls", rb_ary_shift (rc_ary));
|
1098
|
+
|
1099
|
+
rb_ensure (rb_ldap_conn_search2_b, (VALUE) pass_data,
|
1100
|
+
rb_ldap_msgfree, (VALUE) cmsg);
|
1101
|
+
}
|
1102
|
+
|
1103
|
+
if (rb_block_given_p ())
|
1104
|
+
{
|
1105
|
+
return self;
|
1106
|
+
}
|
1107
|
+
else
|
1108
|
+
{
|
1109
|
+
return ary;
|
1110
|
+
}
|
1111
|
+
}
|
1112
|
+
|
1113
|
+
#if defined(HAVE_LDAPCONTROL) && defined(HAVE_LDAP_SEARCH_EXT_S)
|
1114
|
+
static int
|
1115
|
+
rb_ldap_conn_search_ext_i (int argc, VALUE argv[], VALUE self,
|
1116
|
+
RB_LDAP_DATA ** ldapdata, LDAPMessage ** cmsg)
|
1117
|
+
{
|
1118
|
+
VALUE base, scope, filter, attrs, attrsonly;
|
1119
|
+
VALUE serverctrls, clientctrls, sec, usec, limit, s_attr, s_proc;
|
1120
|
+
|
1121
|
+
LDAP *cldap;
|
1122
|
+
char *cbase;
|
1123
|
+
int cscope;
|
1124
|
+
int climit;
|
1125
|
+
char *cfilter;
|
1126
|
+
char **cattrs;
|
1127
|
+
char *sort_attr;
|
1128
|
+
int cattrsonly;
|
1129
|
+
int i;
|
1130
|
+
struct timeval tv;
|
1131
|
+
LDAPControl **sctrls, **cctrls;
|
1132
|
+
|
1133
|
+
GET_LDAP_DATA (self, (*ldapdata));
|
1134
|
+
cldap = (*ldapdata)->ldap;
|
1135
|
+
|
1136
|
+
cattrs = NULL;
|
1137
|
+
cattrsonly = 0;
|
1138
|
+
cctrls = NULL;
|
1139
|
+
sctrls = NULL;
|
1140
|
+
tv.tv_sec = 0;
|
1141
|
+
tv.tv_usec = 0;
|
1142
|
+
sort_attr = NULL;
|
1143
|
+
rb_ldap_sort_obj = Qnil;
|
1144
|
+
climit = 0;
|
1145
|
+
|
1146
|
+
switch (rb_scan_args (argc, argv, "39",
|
1147
|
+
&base, &scope, &filter, &attrs, &attrsonly,
|
1148
|
+
&serverctrls, &clientctrls, &sec, &usec, &limit,
|
1149
|
+
&s_attr, &s_proc))
|
1150
|
+
{
|
1151
|
+
case 12:
|
1152
|
+
rb_ldap_sort_obj = s_proc; /* Ruby's GC never start in a C function */
|
1153
|
+
case 11:
|
1154
|
+
if (rb_ldap_sort_obj == Qnil)
|
1155
|
+
{
|
1156
|
+
rb_ldap_sort_obj = Qtrue;
|
1157
|
+
}
|
1158
|
+
sort_attr = StringValueCStr (s_attr);
|
1159
|
+
case 10:
|
1160
|
+
climit = NUM2INT (limit);
|
1161
|
+
case 9:
|
1162
|
+
tv.tv_usec = NUM2INT (usec);
|
1163
|
+
case 8:
|
1164
|
+
tv.tv_sec = NUM2INT (sec);
|
1165
|
+
case 7:
|
1166
|
+
cctrls = rb_ldap_get_controls (clientctrls);
|
1167
|
+
case 6:
|
1168
|
+
sctrls = rb_ldap_get_controls (serverctrls);
|
1169
|
+
case 5:
|
1170
|
+
cattrsonly = (attrsonly == Qtrue) ? 1 : 0;
|
1171
|
+
case 4:
|
1172
|
+
if (TYPE (attrs) == T_NIL)
|
1173
|
+
{
|
1174
|
+
cattrs = NULL;
|
1175
|
+
}
|
1176
|
+
else
|
1177
|
+
{
|
1178
|
+
if (TYPE (attrs) == T_STRING)
|
1179
|
+
attrs = rb_ary_to_ary (attrs);
|
1180
|
+
else
|
1181
|
+
Check_Type (attrs, T_ARRAY);
|
1182
|
+
|
1183
|
+
if (RARRAY_LEN (attrs) == 0)
|
1184
|
+
{
|
1185
|
+
cattrs = NULL;
|
1186
|
+
}
|
1187
|
+
else
|
1188
|
+
{
|
1189
|
+
cattrs = ALLOCA_N (char *, (RARRAY_LEN (attrs) + 1));
|
1190
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
1191
|
+
{
|
1192
|
+
cattrs[i] = StringValueCStr (RARRAY_PTR (attrs)[i]);
|
1193
|
+
};
|
1194
|
+
cattrs[RARRAY_LEN (attrs)] = NULL;
|
1195
|
+
}
|
1196
|
+
}
|
1197
|
+
case 3:
|
1198
|
+
cbase = StringValueCStr (base);
|
1199
|
+
cscope = NUM2INT (scope);
|
1200
|
+
cfilter = StringValueCStr (filter);
|
1201
|
+
break;
|
1202
|
+
default:
|
1203
|
+
rb_bug ("rb_ldap_conn_search_s");
|
1204
|
+
};
|
1205
|
+
|
1206
|
+
(*cmsg) = NULL;
|
1207
|
+
if (tv.tv_sec == 0 && tv.tv_usec == 0)
|
1208
|
+
{
|
1209
|
+
(*ldapdata)->err = ldap_search_ext_s (cldap, cbase, cscope, cfilter,
|
1210
|
+
cattrs, cattrsonly,
|
1211
|
+
sctrls, cctrls,
|
1212
|
+
NULL, climit, cmsg);
|
1213
|
+
}
|
1214
|
+
else
|
1215
|
+
{
|
1216
|
+
(*ldapdata)->err = ldap_search_ext_s (cldap, cbase, cscope, cfilter,
|
1217
|
+
cattrs, cattrsonly,
|
1218
|
+
sctrls, cctrls,
|
1219
|
+
&tv, climit, cmsg);
|
1220
|
+
}
|
1221
|
+
Check_LDAP_Result ((*ldapdata)->err);
|
1222
|
+
|
1223
|
+
#ifdef HAVE_LDAP_SORT_ENTRIES
|
1224
|
+
if (rb_ldap_sort_obj != Qnil)
|
1225
|
+
{
|
1226
|
+
ldap_sort_entries ((*ldapdata)->ldap, cmsg,
|
1227
|
+
sort_attr, rb_ldap_internal_strcmp);
|
1228
|
+
};
|
1229
|
+
#endif
|
1230
|
+
rb_ldap_sort_obj = Qnil;
|
1231
|
+
|
1232
|
+
return (*ldapdata)->err;
|
1233
|
+
};
|
1234
|
+
|
1235
|
+
/*
|
1236
|
+
* call-seq:
|
1237
|
+
* conn.search_ext(base_dn, scope, filter, attrs=nil, attrsonly=false,
|
1238
|
+
* sctrls, cctrls, sec=0, usec=0, s_attr=nil, s_proc=nil)
|
1239
|
+
* { |entry| } => self
|
1240
|
+
*
|
1241
|
+
* Perform a search, with the base DN +base_dn+, a scope of +scope+ and a
|
1242
|
+
* search filter of +filter+.
|
1243
|
+
*
|
1244
|
+
* If +attrs+ is present, it should be an array of the attributes that the
|
1245
|
+
* search should return. By default, all attributes are returned, which is the
|
1246
|
+
* same as specifying an empty array or *nil*. Alternatively, +attrs+ may be a
|
1247
|
+
* single string, in which case it will be treated as a single element array.
|
1248
|
+
*
|
1249
|
+
* If +attrsonly+ is *true*, attributes will be returned, but not their values.
|
1250
|
+
*
|
1251
|
+
* +sctrls+ is an array of server controls, whilst +cctrls+ is an array of
|
1252
|
+
* client controls.
|
1253
|
+
*
|
1254
|
+
* If +sec+ and/or +usec+ are given, they define the time-out for the search in
|
1255
|
+
* seconds and microseconds, respectively.
|
1256
|
+
*
|
1257
|
+
* If +s_attr+ is given, it specifies the attribute on which to sort the
|
1258
|
+
* entries returned by the server. If +s_proc+ is given, it specifies a Proc
|
1259
|
+
* object that will be used to sort the entries returned by the server.
|
1260
|
+
*
|
1261
|
+
* Note that not all results may be returned by this method. If a
|
1262
|
+
* size limit has been set for the number of results to be returned and this
|
1263
|
+
* limit is exceeded, the results set will be truncated. You can check for
|
1264
|
+
* this by calling LDAP::Conn#err immediately after this method and comparing
|
1265
|
+
* the result to LDAP::LDAP_SIZELIMIT_EXCEEDED.
|
1266
|
+
*/
|
1267
|
+
VALUE
|
1268
|
+
rb_ldap_conn_search_ext_s (int argc, VALUE argv[], VALUE self)
|
1269
|
+
{
|
1270
|
+
RB_LDAP_DATA *ldapdata;
|
1271
|
+
LDAPMessage *cmsg;
|
1272
|
+
LDAP *cldap;
|
1273
|
+
|
1274
|
+
rb_ldap_conn_search_ext_i (argc, argv, self, &ldapdata, &cmsg);
|
1275
|
+
cldap = ldapdata->ldap;
|
1276
|
+
|
1277
|
+
if (ldapdata->err == LDAP_SUCCESS
|
1278
|
+
|| ldapdata->err == LDAP_SIZELIMIT_EXCEEDED)
|
1279
|
+
{
|
1280
|
+
void *pass_data[] = { (void *) cldap, (void *) cmsg };
|
1281
|
+
rb_ensure (rb_ldap_conn_search_b, (VALUE) pass_data,
|
1282
|
+
rb_ldap_msgfree, (VALUE) cmsg);
|
1283
|
+
};
|
1284
|
+
|
1285
|
+
return self;
|
1286
|
+
};
|
1287
|
+
|
1288
|
+
/*
|
1289
|
+
* call-seq:
|
1290
|
+
* conn.search_ext2(base_dn, scope, filter, attrs=nil,
|
1291
|
+
* attrsonly=false, sctrls, cctrls, sec=0, usec=0,
|
1292
|
+
* s_attr=nil, s_proc=nil) => array
|
1293
|
+
* conn.search_ext2(base_dn, scope, filter, attrs=nil,
|
1294
|
+
* attrsonly=false, sctrls, cctrls, sec=0, usec=0,
|
1295
|
+
* s_attr=nil, s_proc=nil) { |entry_as_hash| } => self
|
1296
|
+
*
|
1297
|
+
* Perform a search, with the base DN +base_dn+, a scope of +scope+ and a
|
1298
|
+
* search filter of +filter+.
|
1299
|
+
*
|
1300
|
+
* If +attrs+ is present, it should be an array of the attributes that the
|
1301
|
+
* search should return. By default, all attributes are returned, which is the
|
1302
|
+
* same as specifying an empty array or *nil*. Alternatively, +attrs+ may be a
|
1303
|
+
* single string, in which case it will be treated as a single element array.
|
1304
|
+
*
|
1305
|
+
* If +attrsonly+ is *true*, attributes will be returned, but not their values.
|
1306
|
+
*
|
1307
|
+
* +sctrls+ is an array of server controls, whilst +cctrls+ is an array of
|
1308
|
+
* client controls.
|
1309
|
+
*
|
1310
|
+
* If +sec+ and/or +usec+ are given, they define the time-out for the search in
|
1311
|
+
* seconds and microseconds, respectively.
|
1312
|
+
*
|
1313
|
+
* If +s_attr+ is given, it specifies the attribute on which to sort the
|
1314
|
+
* entries returned by the server. If +s_proc+ is given, it specifies a Proc
|
1315
|
+
* object that will be used to sort the entries returned by the server.
|
1316
|
+
*
|
1317
|
+
* Note that not all results may be returned by this method. If a
|
1318
|
+
* size limit has been set for the number of results to be returned and this
|
1319
|
+
* limit is exceeded, the results set will be truncated. You can check for
|
1320
|
+
* this by calling LDAP::Conn#err immediately after this method and comparing
|
1321
|
+
* the result to LDAP::LDAP_SIZELIMIT_EXCEEDED.
|
1322
|
+
*/
|
1323
|
+
VALUE
|
1324
|
+
rb_ldap_conn_search_ext2_s (int argc, VALUE argv[], VALUE self)
|
1325
|
+
{
|
1326
|
+
RB_LDAP_DATA *ldapdata;
|
1327
|
+
LDAPMessage *cmsg;
|
1328
|
+
LDAP *cldap;
|
1329
|
+
VALUE ary;
|
1330
|
+
|
1331
|
+
rb_ldap_conn_search_ext_i (argc, argv, self, &ldapdata, &cmsg);
|
1332
|
+
cldap = ldapdata->ldap;
|
1333
|
+
|
1334
|
+
ary = rb_ary_new ();
|
1335
|
+
if (ldapdata->err == LDAP_SUCCESS
|
1336
|
+
|| ldapdata->err == LDAP_SIZELIMIT_EXCEEDED)
|
1337
|
+
{
|
1338
|
+
void *pass_data[] = { (void *) cldap, (void *) cmsg, (void *) ary };
|
1339
|
+
rb_ensure (rb_ldap_conn_search2_b, (VALUE) pass_data,
|
1340
|
+
rb_ldap_msgfree, (VALUE) cmsg);
|
1341
|
+
}
|
1342
|
+
|
1343
|
+
if (rb_block_given_p ())
|
1344
|
+
{
|
1345
|
+
return self;
|
1346
|
+
}
|
1347
|
+
else
|
1348
|
+
{
|
1349
|
+
return ary;
|
1350
|
+
}
|
1351
|
+
}
|
1352
|
+
#endif
|
1353
|
+
|
1354
|
+
/*
|
1355
|
+
* call-seq:
|
1356
|
+
* conn.add(dn, attrs) => self
|
1357
|
+
*
|
1358
|
+
* Add an entry with the DN, +dn+, and the attributes, +attrs+. +attrs+
|
1359
|
+
* should be either an array of LDAP#Mod objects or a hash of attribute/value
|
1360
|
+
* array pairs.
|
1361
|
+
*/
|
1362
|
+
VALUE
|
1363
|
+
rb_ldap_conn_add_s (VALUE self, VALUE dn, VALUE attrs)
|
1364
|
+
{
|
1365
|
+
RB_LDAP_DATA *ldapdata;
|
1366
|
+
char *c_dn;
|
1367
|
+
LDAPMod **c_attrs;
|
1368
|
+
int i;
|
1369
|
+
|
1370
|
+
switch (TYPE (attrs))
|
1371
|
+
{
|
1372
|
+
case T_HASH:
|
1373
|
+
attrs = rb_ldap_hash2mods (rb_mLDAP,
|
1374
|
+
INT2NUM (LDAP_MOD_ADD | LDAP_MOD_BVALUES),
|
1375
|
+
attrs);
|
1376
|
+
break;
|
1377
|
+
case T_ARRAY:
|
1378
|
+
break;
|
1379
|
+
default:
|
1380
|
+
rb_raise (rb_eTypeError, "must be a hash or an array");
|
1381
|
+
};
|
1382
|
+
|
1383
|
+
GET_LDAP_DATA (self, ldapdata);
|
1384
|
+
c_dn = StringValueCStr (dn);
|
1385
|
+
c_attrs = ALLOCA_N (LDAPMod *, (RARRAY_LEN (attrs) + 1));
|
1386
|
+
|
1387
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
1388
|
+
{
|
1389
|
+
VALUE mod = RARRAY_PTR (attrs)[i];
|
1390
|
+
RB_LDAPMOD_DATA *moddata;
|
1391
|
+
Check_Kind (mod, rb_cLDAP_Mod);
|
1392
|
+
GET_LDAPMOD_DATA (mod, moddata);
|
1393
|
+
c_attrs[i] = moddata->mod;
|
1394
|
+
};
|
1395
|
+
c_attrs[i] = NULL;
|
1396
|
+
|
1397
|
+
ldapdata->err = ldap_add_s (ldapdata->ldap, c_dn, c_attrs);
|
1398
|
+
Check_LDAP_Result (ldapdata->err);
|
1399
|
+
|
1400
|
+
return self;
|
1401
|
+
};
|
1402
|
+
|
1403
|
+
#if defined(HAVE_LDAPCONTROL) && defined(HAVE_LDAP_ADD_EXT_S)
|
1404
|
+
/*
|
1405
|
+
* call-seq:
|
1406
|
+
* conn.add_ext(dn, attrs, sctrls, cctrls) => self
|
1407
|
+
*
|
1408
|
+
* Add an entry with the DN, +dn+, and the attributes, +attrs+. +attrs+
|
1409
|
+
* should be either an array of LDAP#Mod objects or a hash of attribute/value
|
1410
|
+
* array pairs. +sctrls+ is an array of server controls, whilst +cctrls+ is
|
1411
|
+
* an array of client controls.
|
1412
|
+
*/
|
1413
|
+
VALUE
|
1414
|
+
rb_ldap_conn_add_ext_s (VALUE self, VALUE dn, VALUE attrs,
|
1415
|
+
VALUE serverctrls, VALUE clientctrls)
|
1416
|
+
{
|
1417
|
+
RB_LDAP_DATA *ldapdata;
|
1418
|
+
char *c_dn;
|
1419
|
+
LDAPMod **c_attrs;
|
1420
|
+
int i;
|
1421
|
+
LDAPControl **sctrls, **cctrls;
|
1422
|
+
|
1423
|
+
switch (TYPE (attrs))
|
1424
|
+
{
|
1425
|
+
case T_HASH:
|
1426
|
+
attrs = rb_ldap_hash2mods (rb_mLDAP,
|
1427
|
+
INT2NUM (LDAP_MOD_ADD | LDAP_MOD_BVALUES),
|
1428
|
+
attrs);
|
1429
|
+
break;
|
1430
|
+
case T_ARRAY:
|
1431
|
+
break;
|
1432
|
+
default:
|
1433
|
+
rb_raise (rb_eTypeError, "must be a hash or an array");
|
1434
|
+
};
|
1435
|
+
|
1436
|
+
GET_LDAP_DATA (self, ldapdata);
|
1437
|
+
c_dn = StringValueCStr (dn);
|
1438
|
+
c_attrs = ALLOCA_N (LDAPMod *, (RARRAY_LEN (attrs) + 1));
|
1439
|
+
sctrls = rb_ldap_get_controls (serverctrls);
|
1440
|
+
cctrls = rb_ldap_get_controls (clientctrls);
|
1441
|
+
|
1442
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
1443
|
+
{
|
1444
|
+
VALUE mod = RARRAY_PTR (attrs)[i];
|
1445
|
+
RB_LDAPMOD_DATA *moddata;
|
1446
|
+
Check_Kind (mod, rb_cLDAP_Mod);
|
1447
|
+
GET_LDAPMOD_DATA (mod, moddata);
|
1448
|
+
c_attrs[i] = moddata->mod;
|
1449
|
+
};
|
1450
|
+
c_attrs[i] = NULL;
|
1451
|
+
|
1452
|
+
ldapdata->err =
|
1453
|
+
ldap_add_ext_s (ldapdata->ldap, c_dn, c_attrs, sctrls, cctrls);
|
1454
|
+
Check_LDAP_Result (ldapdata->err);
|
1455
|
+
|
1456
|
+
return self;
|
1457
|
+
}
|
1458
|
+
#endif
|
1459
|
+
|
1460
|
+
/*
|
1461
|
+
* call-seq:
|
1462
|
+
* conn.modify(dn, mods) => self
|
1463
|
+
*
|
1464
|
+
* Modify an entry with the DN, +dn+, and the attributes, +mods+. +mods+
|
1465
|
+
* should be either an array of LDAP#Mod objects or a hash of attribute/value
|
1466
|
+
* array pairs.
|
1467
|
+
*/
|
1468
|
+
VALUE
|
1469
|
+
rb_ldap_conn_modify_s (VALUE self, VALUE dn, VALUE attrs)
|
1470
|
+
{
|
1471
|
+
RB_LDAP_DATA *ldapdata;
|
1472
|
+
char *c_dn;
|
1473
|
+
LDAPMod **c_attrs;
|
1474
|
+
int i;
|
1475
|
+
|
1476
|
+
switch (TYPE (attrs))
|
1477
|
+
{
|
1478
|
+
case T_HASH:
|
1479
|
+
attrs =
|
1480
|
+
rb_ldap_hash2mods (rb_mLDAP,
|
1481
|
+
INT2NUM (LDAP_MOD_REPLACE | LDAP_MOD_BVALUES),
|
1482
|
+
attrs);
|
1483
|
+
break;
|
1484
|
+
case T_ARRAY:
|
1485
|
+
break;
|
1486
|
+
default:
|
1487
|
+
rb_raise (rb_eTypeError, "must be a hash or an array");
|
1488
|
+
};
|
1489
|
+
|
1490
|
+
GET_LDAP_DATA (self, ldapdata);
|
1491
|
+
c_dn = StringValueCStr (dn);
|
1492
|
+
c_attrs = ALLOC_N (LDAPMod *, RARRAY_LEN (attrs) + 1);
|
1493
|
+
|
1494
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
1495
|
+
{
|
1496
|
+
VALUE mod = RARRAY_PTR (attrs)[i];
|
1497
|
+
RB_LDAPMOD_DATA *moddata;
|
1498
|
+
Check_Kind (mod, rb_cLDAP_Mod);
|
1499
|
+
GET_LDAPMOD_DATA (mod, moddata);
|
1500
|
+
c_attrs[i] = moddata->mod;
|
1501
|
+
};
|
1502
|
+
c_attrs[i] = NULL;
|
1503
|
+
|
1504
|
+
ldapdata->err = ldap_modify_s (ldapdata->ldap, c_dn, c_attrs);
|
1505
|
+
Check_LDAP_Result (ldapdata->err);
|
1506
|
+
|
1507
|
+
return self;
|
1508
|
+
};
|
1509
|
+
|
1510
|
+
#if defined(HAVE_LDAPCONTROL) && defined(HAVE_LDAP_MODIFY_EXT_S)
|
1511
|
+
/*
|
1512
|
+
* call-seq:
|
1513
|
+
* conn.modify_ext(dn, mods, sctrls, cctrls) => self
|
1514
|
+
*
|
1515
|
+
* Modify an entry with the DN, +dn+, and the attributes, +mods+. +mods+
|
1516
|
+
* should be either an array of LDAP#Mod objects or a hash of attribute/value
|
1517
|
+
* array pairs. +sctrls+ is an array of server controls, whilst +cctrls+ is
|
1518
|
+
* an array of client controls.
|
1519
|
+
*/
|
1520
|
+
VALUE
|
1521
|
+
rb_ldap_conn_modify_ext_s (VALUE self, VALUE dn, VALUE attrs,
|
1522
|
+
VALUE serverctrls, VALUE clientctrls)
|
1523
|
+
{
|
1524
|
+
RB_LDAP_DATA *ldapdata;
|
1525
|
+
char *c_dn;
|
1526
|
+
LDAPMod **c_attrs;
|
1527
|
+
int i;
|
1528
|
+
LDAPControl **sctrls, **cctrls;
|
1529
|
+
|
1530
|
+
switch (TYPE (attrs))
|
1531
|
+
{
|
1532
|
+
case T_HASH:
|
1533
|
+
attrs =
|
1534
|
+
rb_ldap_hash2mods (rb_mLDAP,
|
1535
|
+
INT2NUM (LDAP_MOD_REPLACE | LDAP_MOD_BVALUES),
|
1536
|
+
attrs);
|
1537
|
+
break;
|
1538
|
+
case T_ARRAY:
|
1539
|
+
break;
|
1540
|
+
default:
|
1541
|
+
rb_raise (rb_eTypeError, "must be a hash or an array");
|
1542
|
+
};
|
1543
|
+
|
1544
|
+
GET_LDAP_DATA (self, ldapdata);
|
1545
|
+
c_dn = StringValueCStr (dn);
|
1546
|
+
c_attrs = ALLOC_N (LDAPMod *, RARRAY_LEN (attrs) + 1);
|
1547
|
+
sctrls = rb_ldap_get_controls (serverctrls);
|
1548
|
+
cctrls = rb_ldap_get_controls (clientctrls);
|
1549
|
+
|
1550
|
+
for (i = 0; i < RARRAY_LEN (attrs); i++)
|
1551
|
+
{
|
1552
|
+
VALUE mod = RARRAY_PTR (attrs)[i];
|
1553
|
+
RB_LDAPMOD_DATA *moddata;
|
1554
|
+
Check_Kind (mod, rb_cLDAP_Mod);
|
1555
|
+
GET_LDAPMOD_DATA (mod, moddata);
|
1556
|
+
c_attrs[i] = moddata->mod;
|
1557
|
+
};
|
1558
|
+
c_attrs[i] = NULL;
|
1559
|
+
|
1560
|
+
ldapdata->err =
|
1561
|
+
ldap_modify_ext_s (ldapdata->ldap, c_dn, c_attrs, sctrls, cctrls);
|
1562
|
+
Check_LDAP_Result (ldapdata->err);
|
1563
|
+
|
1564
|
+
return self;
|
1565
|
+
}
|
1566
|
+
#endif
|
1567
|
+
|
1568
|
+
/*
|
1569
|
+
* call-seq:
|
1570
|
+
* conn.modrdn(dn, new_rdn, delete_old_rdn) => self
|
1571
|
+
*
|
1572
|
+
* Modify the RDN of the entry with DN, +dn+, giving it the new RDN,
|
1573
|
+
* +new_rdn+. If +delete_old_rdn+ is *true*, the old RDN value will be deleted
|
1574
|
+
* from the entry.
|
1575
|
+
*/
|
1576
|
+
VALUE
|
1577
|
+
rb_ldap_conn_modrdn_s (VALUE self, VALUE dn, VALUE newrdn, VALUE delete_p)
|
1578
|
+
{
|
1579
|
+
RB_LDAP_DATA *ldapdata;
|
1580
|
+
char *c_dn;
|
1581
|
+
char *c_newrdn;
|
1582
|
+
int c_delete_p;
|
1583
|
+
|
1584
|
+
GET_LDAP_DATA (self, ldapdata);
|
1585
|
+
c_dn = StringValueCStr (dn);
|
1586
|
+
c_newrdn = StringValueCStr (newrdn);
|
1587
|
+
c_delete_p = (delete_p == Qtrue) ? 1 : 0;
|
1588
|
+
|
1589
|
+
ldapdata->err = ldap_modrdn2_s (ldapdata->ldap, c_dn, c_newrdn, c_delete_p);
|
1590
|
+
Check_LDAP_Result (ldapdata->err);
|
1591
|
+
|
1592
|
+
return self;
|
1593
|
+
};
|
1594
|
+
|
1595
|
+
/*
|
1596
|
+
* call-seq:
|
1597
|
+
* conn.delete(dn) => self
|
1598
|
+
*
|
1599
|
+
* Delete the entry with the DN, +dn+.
|
1600
|
+
*/
|
1601
|
+
VALUE
|
1602
|
+
rb_ldap_conn_delete_s (VALUE self, VALUE dn)
|
1603
|
+
{
|
1604
|
+
RB_LDAP_DATA *ldapdata;
|
1605
|
+
char *c_dn;
|
1606
|
+
|
1607
|
+
GET_LDAP_DATA (self, ldapdata);
|
1608
|
+
c_dn = StringValueCStr (dn);
|
1609
|
+
|
1610
|
+
ldapdata->err = ldap_delete_s (ldapdata->ldap, c_dn);
|
1611
|
+
Check_LDAP_Result (ldapdata->err);
|
1612
|
+
|
1613
|
+
return self;
|
1614
|
+
};
|
1615
|
+
|
1616
|
+
#if defined(HAVE_LDAPCONTROL) && defined(HAVE_LDAP_DELETE_EXT_S)
|
1617
|
+
/*
|
1618
|
+
* call-seq:
|
1619
|
+
* conn.delete_ext(dn, sctrls, cctrls) => self
|
1620
|
+
*
|
1621
|
+
* Delete the entry with the DN, +dn+. +sctrls+ is an array of server
|
1622
|
+
* controls, whilst +cctrls+ is an array of client controls.
|
1623
|
+
*/
|
1624
|
+
VALUE
|
1625
|
+
rb_ldap_conn_delete_ext_s (VALUE self, VALUE dn,
|
1626
|
+
VALUE serverctrls, VALUE clientctrls)
|
1627
|
+
{
|
1628
|
+
RB_LDAP_DATA *ldapdata;
|
1629
|
+
char *c_dn;
|
1630
|
+
LDAPControl **sctrls, **cctrls;
|
1631
|
+
|
1632
|
+
GET_LDAP_DATA (self, ldapdata);
|
1633
|
+
c_dn = StringValueCStr (dn);
|
1634
|
+
sctrls = rb_ldap_get_controls (serverctrls);
|
1635
|
+
cctrls = rb_ldap_get_controls (clientctrls);
|
1636
|
+
|
1637
|
+
ldapdata->err = ldap_delete_ext_s (ldapdata->ldap, c_dn, sctrls, cctrls);
|
1638
|
+
Check_LDAP_Result (ldapdata->err);
|
1639
|
+
|
1640
|
+
return self;
|
1641
|
+
}
|
1642
|
+
#endif
|
1643
|
+
|
1644
|
+
#if defined(HAVE_LDAP_COMPARE_S)
|
1645
|
+
/*
|
1646
|
+
* call-seq:
|
1647
|
+
* conn.compare(dn, attr, val) => true or false
|
1648
|
+
*
|
1649
|
+
* Compare the DN given as +dn+ to see whether it has the attribute +attr+
|
1650
|
+
* with a value of +val+.
|
1651
|
+
*/
|
1652
|
+
VALUE
|
1653
|
+
rb_ldap_conn_compare_s (VALUE self, VALUE dn, VALUE attr, VALUE val)
|
1654
|
+
{
|
1655
|
+
RB_LDAP_DATA *ldapdata;
|
1656
|
+
char *c_dn, *c_attr, *c_val;
|
1657
|
+
|
1658
|
+
GET_LDAP_DATA (self, ldapdata);
|
1659
|
+
c_dn = StringValueCStr (dn);
|
1660
|
+
c_attr = StringValueCStr (attr);
|
1661
|
+
c_val = StringValueCStr (val);
|
1662
|
+
|
1663
|
+
ldapdata->err = ldap_compare_s (ldapdata->ldap, c_dn, c_attr, c_val);
|
1664
|
+
|
1665
|
+
if ((ldapdata->err) == LDAP_COMPARE_TRUE)
|
1666
|
+
return Qtrue;
|
1667
|
+
else if ((ldapdata->err) == LDAP_COMPARE_FALSE)
|
1668
|
+
return Qfalse;
|
1669
|
+
|
1670
|
+
Check_LDAP_Result (ldapdata->err);
|
1671
|
+
|
1672
|
+
fprintf (stderr, "rb_ldap_conn_compare_s() unexpectedly set no error.\n");
|
1673
|
+
|
1674
|
+
return self;
|
1675
|
+
}
|
1676
|
+
#endif
|
1677
|
+
|
1678
|
+
#if defined(HAVE_LDAPCONTROL) && defined(HAVE_LDAP_COMPARE_EXT_S)
|
1679
|
+
/*
|
1680
|
+
* call-seq:
|
1681
|
+
* conn.compare_ext(dn, attr, val, sctrls, cctrls) => true or false
|
1682
|
+
*
|
1683
|
+
* Compare the DN given as +dn+ to see whether it has the attribute +attr+
|
1684
|
+
* with a value of +val+. +sctrls+ is an array of server controls, whilst
|
1685
|
+
* +cctrls+ is an array of client controls.
|
1686
|
+
*/
|
1687
|
+
VALUE
|
1688
|
+
rb_ldap_conn_compare_ext_s (VALUE self, VALUE dn, VALUE attr, VALUE val,
|
1689
|
+
VALUE serverctrls, VALUE clientctrls)
|
1690
|
+
{
|
1691
|
+
RB_LDAP_DATA *ldapdata;
|
1692
|
+
char *c_dn, *c_attr;
|
1693
|
+
#ifdef USE_WLDAP32
|
1694
|
+
char *c_val;
|
1695
|
+
#endif
|
1696
|
+
struct berval bval;
|
1697
|
+
LDAPControl **sctrls, **cctrls;
|
1698
|
+
|
1699
|
+
GET_LDAP_DATA (self, ldapdata);
|
1700
|
+
c_dn = StringValueCStr (dn);
|
1701
|
+
c_attr = StringValueCStr (attr);
|
1702
|
+
#ifdef USE_WLDAP32
|
1703
|
+
c_val = StringValueCStr (val);
|
1704
|
+
#endif
|
1705
|
+
bval.bv_val = StringValueCStr (val);
|
1706
|
+
bval.bv_len = RSTRING_LEN (val);
|
1707
|
+
sctrls = rb_ldap_get_controls (serverctrls);
|
1708
|
+
cctrls = rb_ldap_get_controls (clientctrls);
|
1709
|
+
|
1710
|
+
ldapdata->err = ldap_compare_ext_s (ldapdata->ldap, c_dn, c_attr,
|
1711
|
+
#ifdef USE_WLDAP32
|
1712
|
+
c_val,
|
1713
|
+
#endif
|
1714
|
+
&bval, sctrls, cctrls);
|
1715
|
+
|
1716
|
+
if ((ldapdata->err) == LDAP_COMPARE_TRUE)
|
1717
|
+
return Qtrue;
|
1718
|
+
else if ((ldapdata->err) == LDAP_COMPARE_FALSE)
|
1719
|
+
return Qfalse;
|
1720
|
+
|
1721
|
+
Check_LDAP_Result (ldapdata->err);
|
1722
|
+
|
1723
|
+
fprintf (stderr,
|
1724
|
+
"rb_ldap_conn_compare_ext_s() unexpectedly set no error.\n");
|
1725
|
+
|
1726
|
+
return self;
|
1727
|
+
}
|
1728
|
+
#endif
|
1729
|
+
|
1730
|
+
/*
|
1731
|
+
* call-seq:
|
1732
|
+
* conn.err => Fixnum
|
1733
|
+
*
|
1734
|
+
* Return the error associated with the most recent LDAP operation.
|
1735
|
+
*/
|
1736
|
+
VALUE
|
1737
|
+
rb_ldap_conn_err (VALUE self)
|
1738
|
+
{
|
1739
|
+
RB_LDAP_DATA *ldapdata;
|
1740
|
+
|
1741
|
+
GET_LDAP_DATA (self, ldapdata);
|
1742
|
+
return INT2NUM (ldapdata->err);
|
1743
|
+
};
|
1744
|
+
|
1745
|
+
/* Document-class: LDAP::Conn
|
1746
|
+
*
|
1747
|
+
* Create and manipulate unencrypted LDAP connections.
|
1748
|
+
*/
|
1749
|
+
void
|
1750
|
+
Init_ldap_conn ()
|
1751
|
+
{
|
1752
|
+
rb_ldap_sort_obj = Qnil;
|
1753
|
+
|
1754
|
+
rb_cLDAP_Conn = rb_define_class_under (rb_mLDAP, "Conn", rb_cData);
|
1755
|
+
rb_define_attr (rb_cLDAP_Conn, "referrals", 1, 0);
|
1756
|
+
rb_define_attr (rb_cLDAP_Conn, "controls", 1, 0);
|
1757
|
+
rb_define_attr (rb_cLDAP_Conn, "sasl_quiet", 1, 1);
|
1758
|
+
#if RUBY_VERSION_CODE < 170
|
1759
|
+
rb_define_singleton_method (rb_cLDAP_Conn, "new", rb_ldap_class_new, -1);
|
1760
|
+
#endif
|
1761
|
+
#if RUBY_VERSION_CODE >= 173
|
1762
|
+
rb_define_alloc_func (rb_cLDAP_Conn, rb_ldap_conn_s_allocate);
|
1763
|
+
#else
|
1764
|
+
rb_define_singleton_method (rb_cLDAP_Conn, "allocate",
|
1765
|
+
rb_ldap_conn_s_allocate, 0);
|
1766
|
+
#endif
|
1767
|
+
rb_define_singleton_method (rb_cLDAP_Conn, "open", rb_ldap_conn_s_open, -1);
|
1768
|
+
rb_define_singleton_method (rb_cLDAP_Conn, "set_option",
|
1769
|
+
rb_ldap_conn_s_set_option, 2);
|
1770
|
+
rb_define_singleton_method (rb_cLDAP_Conn, "get_option",
|
1771
|
+
rb_ldap_conn_s_get_option, 1);
|
1772
|
+
rb_ldap_conn_define_method ("initialize", rb_ldap_conn_initialize, -1);
|
1773
|
+
rb_ldap_conn_define_method ("start_tls", rb_ldap_conn_start_tls_s, -1);
|
1774
|
+
rb_ldap_conn_define_method ("simple_bind", rb_ldap_conn_simple_bind_s, -1);
|
1775
|
+
rb_ldap_conn_define_method ("bind", rb_ldap_conn_bind_s, -1);
|
1776
|
+
rb_ldap_conn_define_method ("bound?", rb_ldap_conn_bound, 0);
|
1777
|
+
rb_ldap_conn_define_method ("unbind", rb_ldap_conn_unbind, 0);
|
1778
|
+
rb_ldap_conn_define_method ("set_option", rb_ldap_conn_set_option, 2);
|
1779
|
+
rb_ldap_conn_define_method ("get_option", rb_ldap_conn_get_option, 1);
|
1780
|
+
rb_ldap_conn_define_method ("search", rb_ldap_conn_search_s, -1);
|
1781
|
+
rb_ldap_conn_define_method ("search2", rb_ldap_conn_search2_s, -1);
|
1782
|
+
rb_ldap_conn_define_method ("add", rb_ldap_conn_add_s, 2);
|
1783
|
+
rb_ldap_conn_define_method ("modify", rb_ldap_conn_modify_s, 2);
|
1784
|
+
rb_ldap_conn_define_method ("modrdn", rb_ldap_conn_modrdn_s, 3);
|
1785
|
+
rb_ldap_conn_define_method ("delete", rb_ldap_conn_delete_s, 1);
|
1786
|
+
#if defined(HAVE_LDAP_COMPARE_S)
|
1787
|
+
rb_ldap_conn_define_method ("compare", rb_ldap_conn_compare_s, 3);
|
1788
|
+
#endif
|
1789
|
+
rb_ldap_conn_define_method ("perror", rb_ldap_conn_perror, 1);
|
1790
|
+
rb_ldap_conn_define_method ("err2string", rb_ldap_conn_err2string, 1);
|
1791
|
+
rb_ldap_conn_define_method ("result2error", rb_ldap_conn_result2error, 1);
|
1792
|
+
rb_ldap_conn_define_method ("err", rb_ldap_conn_err, 0);
|
1793
|
+
|
1794
|
+
#if defined(HAVE_LDAP_SEARCH_EXT_S)
|
1795
|
+
rb_ldap_conn_define_method ("search_ext", rb_ldap_conn_search_ext_s, -1);
|
1796
|
+
rb_ldap_conn_define_method ("search_ext2", rb_ldap_conn_search_ext2_s, -1);
|
1797
|
+
#endif
|
1798
|
+
#if defined(HAVE_LDAP_ADD_EXT_S)
|
1799
|
+
rb_ldap_conn_define_method ("add_ext", rb_ldap_conn_add_ext_s, 4);
|
1800
|
+
#endif
|
1801
|
+
#if defined(HAVE_LDAP_MODIFY_EXT_S)
|
1802
|
+
rb_ldap_conn_define_method ("modify_ext", rb_ldap_conn_modify_ext_s, 4);
|
1803
|
+
#endif
|
1804
|
+
#if defined(HAVE_LDAP_DELETE_EXT_S)
|
1805
|
+
rb_ldap_conn_define_method ("delete_ext", rb_ldap_conn_delete_ext_s, 3);
|
1806
|
+
#endif
|
1807
|
+
#if defined(HAVE_LDAP_COMPARE_EXT_S)
|
1808
|
+
rb_ldap_conn_define_method ("compare_ext", rb_ldap_conn_compare_ext_s, 5);
|
1809
|
+
#endif
|
1810
|
+
};
|