ruby-ldap 0.9.9
Sign up to get free protection for your applications and to get access to all the features.
- data/COPYING +24 -0
- data/ChangeLog +762 -0
- data/FAQ +62 -0
- data/NOTES +77 -0
- data/README +266 -0
- data/TODO +15 -0
- data/conn.c +1810 -0
- data/entry.c +215 -0
- data/extconf.rb +268 -0
- data/ldap.c +577 -0
- data/lib/ldap/control.rb +50 -0
- data/lib/ldap/ldif.rb +569 -0
- data/lib/ldap/schema.rb +129 -0
- data/misc.c +512 -0
- data/mod.c +355 -0
- data/rbldap.h +194 -0
- data/saslconn.c +176 -0
- data/sslconn.c +377 -0
- data/test/add.rb +31 -0
- data/test/add2.rb +31 -0
- data/test/add3.rb +33 -0
- data/test/bind-ldaps.rb +25 -0
- data/test/bind-sasl.rb +17 -0
- data/test/bind-ssl.rb +25 -0
- data/test/bind.rb +34 -0
- data/test/compare.rb +17 -0
- data/test/conf.rb +12 -0
- data/test/delete.rb +13 -0
- data/test/ext.rb +49 -0
- data/test/misc1.rb +49 -0
- data/test/misc2.rb +40 -0
- data/test/modrdn.rb +23 -0
- data/test/search.rb +20 -0
- data/test/search2.rb +34 -0
- data/test/search3.rb +23 -0
- data/test/setup.rb +38 -0
- data/test/subschema.rb +21 -0
- data/test/tc_conn.rb +124 -0
- data/test/tc_ldif.rb +174 -0
- data/test/tc_schema.rb +32 -0
- data/test/tc_search.rb +137 -0
- data/test/ts_ldap.rb +8 -0
- data/win/winlber.h +21 -0
- data/win/winldap.h +324 -0
- metadata +100 -0
data/lib/ldap/schema.rb
ADDED
@@ -0,0 +1,129 @@
|
|
1
|
+
# Manipulation of LDAP schema data.
|
2
|
+
#
|
3
|
+
#--
|
4
|
+
# $Id: schema.rb,v 1.9 2006/02/08 23:15:17 ianmacd Exp $
|
5
|
+
#++
|
6
|
+
|
7
|
+
# The LDAP module encapsulates the various LDAP-related classes in their own
|
8
|
+
# namespace.
|
9
|
+
#
|
10
|
+
module LDAP
|
11
|
+
|
12
|
+
# Retrieve and process information pertaining to LDAP schemas.
|
13
|
+
#
|
14
|
+
class Schema < Hash
|
15
|
+
|
16
|
+
def initialize(entry)
|
17
|
+
if( entry )
|
18
|
+
entry.each{|key,vals|
|
19
|
+
self[key] = vals
|
20
|
+
}
|
21
|
+
end
|
22
|
+
end
|
23
|
+
|
24
|
+
# Return the list of values related to the schema component given in
|
25
|
+
# +key+. See LDAP::Conn#schema for common values of +key+.
|
26
|
+
#
|
27
|
+
def names(key)
|
28
|
+
self[key].collect{|val| val =~ /NAME\s+'([\w\d_\-]+)'/; $1}
|
29
|
+
end
|
30
|
+
|
31
|
+
# Return the list of attributes in object class +oc+ that are of category
|
32
|
+
# +at+. +at+ may be the string *MUST*, *MAY* or *SUP*.
|
33
|
+
#
|
34
|
+
def attr(oc,at)
|
35
|
+
self['objectClasses'].each{|s|
|
36
|
+
if( s =~ /NAME\s+'#{oc}'/ )
|
37
|
+
case s
|
38
|
+
when /#{at}\s+\(([\w\d_\-\s\$]+)\)/i then return $1.split("$").collect{|attr| attr.strip}
|
39
|
+
when /#{at}\s+([\w\d_\-]+)/i then return $1.split("$").collect{|attr| attr.strip}
|
40
|
+
end
|
41
|
+
end
|
42
|
+
}
|
43
|
+
return nil
|
44
|
+
end
|
45
|
+
|
46
|
+
# Return the list of attributes that an entry with object class +oc+
|
47
|
+
# _must_ possess.
|
48
|
+
#
|
49
|
+
def must(oc)
|
50
|
+
attr(oc, "MUST")
|
51
|
+
end
|
52
|
+
|
53
|
+
# Return the list of attributes that an entry with object class +oc+
|
54
|
+
# _may_ possess.
|
55
|
+
#
|
56
|
+
def may(oc)
|
57
|
+
attr(oc, "MAY")
|
58
|
+
end
|
59
|
+
|
60
|
+
# Return the superior object class of object class +oc+.
|
61
|
+
#
|
62
|
+
def sup(oc)
|
63
|
+
attr(oc, "SUP")
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
class Conn
|
68
|
+
|
69
|
+
# Fetch the schema data for the connection.
|
70
|
+
#
|
71
|
+
# If +base+ is given, it gives the base DN for the search. +attrs+, if
|
72
|
+
# given, is an array of attributes that should be returned from the
|
73
|
+
# server. The default list is *objectClasses*, *attributeTypes*,
|
74
|
+
# *matchingRules*, *matchingRuleUse*, *dITStructureRules*,
|
75
|
+
# *dITContentRules*, *nameForms* and *ldapSyntaxes*.
|
76
|
+
#
|
77
|
+
# +sec+ and +usec+ can be used to specify a time-out for the search in
|
78
|
+
# seconds and microseconds, respectively.
|
79
|
+
#
|
80
|
+
def schema(base = nil, attrs = nil, sec = 0, usec = 0)
|
81
|
+
attrs ||= [
|
82
|
+
'objectClasses',
|
83
|
+
'attributeTypes',
|
84
|
+
'matchingRules',
|
85
|
+
'matchingRuleUse',
|
86
|
+
'dITStructureRules',
|
87
|
+
'dITContentRules',
|
88
|
+
'nameForms',
|
89
|
+
'ldapSyntaxes',
|
90
|
+
]
|
91
|
+
base ||= root_dse(['subschemaSubentry'], sec, usec)[0]['subschemaSubentry'][0]
|
92
|
+
base ||= 'cn=schema'
|
93
|
+
ent = search2(base, LDAP_SCOPE_BASE, '(objectClass=subschema)',
|
94
|
+
attrs, false, sec, usec)
|
95
|
+
return Schema.new(ent[0])
|
96
|
+
end
|
97
|
+
|
98
|
+
# Fetch the root DSE (DSA-specific Entry) for the connection. DSA stands
|
99
|
+
# for Directory System Agent and simply refers to the LDAP server you are
|
100
|
+
# using.
|
101
|
+
#
|
102
|
+
# +attrs+, if given, is an array of attributes that should be returned
|
103
|
+
# from the server. The default list is *subschemaSubentry*,
|
104
|
+
# *namingContexts*, *monitorContext*, *altServer*, *supportedControl*,
|
105
|
+
# *supportedExtension*, *supportedFeatures*, *supportedSASLMechanisms*
|
106
|
+
# and *supportedLDAPVersion*.
|
107
|
+
#
|
108
|
+
# +sec+ and +usec+ can be used to specify a time-out for the search in
|
109
|
+
# seconds and microseconds, respectively.
|
110
|
+
#
|
111
|
+
def root_dse(attrs = nil, sec = 0, usec = 0)
|
112
|
+
attrs ||= [
|
113
|
+
'subschemaSubentry',
|
114
|
+
'namingContexts',
|
115
|
+
'monitorContext',
|
116
|
+
'altServer',
|
117
|
+
'supportedControl',
|
118
|
+
'supportedExtension',
|
119
|
+
'supportedFeatures',
|
120
|
+
'supportedSASLMechanisms',
|
121
|
+
'supportedLDAPVersion',
|
122
|
+
]
|
123
|
+
|
124
|
+
entries = search2('', LDAP_SCOPE_BASE, '(objectClass=*)',
|
125
|
+
attrs, false, sec, usec)
|
126
|
+
return entries
|
127
|
+
end
|
128
|
+
end
|
129
|
+
end
|
data/misc.c
ADDED
@@ -0,0 +1,512 @@
|
|
1
|
+
/* -*- C -*-
|
2
|
+
* $Id: misc.c,v 1.11 2006/07/03 22:54:52 ianmacd Exp $
|
3
|
+
*/
|
4
|
+
|
5
|
+
#include "ruby.h"
|
6
|
+
#include "rbldap.h"
|
7
|
+
|
8
|
+
VALUE rb_sLDAP_APIInfo;
|
9
|
+
VALUE rb_cLDAP_Control;
|
10
|
+
|
11
|
+
#ifdef LDAP_OPT_API_INFO
|
12
|
+
VALUE
|
13
|
+
rb_ldap_apiinfo_new (LDAPAPIInfo * info)
|
14
|
+
{
|
15
|
+
VALUE info_version, api_version, protocol_version;
|
16
|
+
VALUE extensions, vendor_name, vendor_version;
|
17
|
+
int i;
|
18
|
+
|
19
|
+
info_version = INT2NUM (info->ldapai_info_version);
|
20
|
+
api_version = INT2NUM (info->ldapai_api_version);
|
21
|
+
protocol_version = INT2NUM (info->ldapai_protocol_version);
|
22
|
+
vendor_version = INT2NUM (info->ldapai_vendor_version);
|
23
|
+
vendor_name = rb_tainted_str_new2 (info->ldapai_vendor_name);
|
24
|
+
extensions = rb_ary_new ();
|
25
|
+
|
26
|
+
for (i = 0; info->ldapai_extensions[i]; i++)
|
27
|
+
{
|
28
|
+
rb_ary_push (extensions,
|
29
|
+
rb_tainted_str_new2 (info->ldapai_extensions[i]));
|
30
|
+
}
|
31
|
+
|
32
|
+
return rb_struct_new (rb_sLDAP_APIInfo,
|
33
|
+
info_version, api_version, protocol_version,
|
34
|
+
extensions, vendor_name, vendor_version, 0);
|
35
|
+
}
|
36
|
+
|
37
|
+
LDAPAPIInfo *
|
38
|
+
rb_ldap_get_apiinfo (VALUE data)
|
39
|
+
{
|
40
|
+
LDAPAPIInfo *info;
|
41
|
+
VALUE r_extensions;
|
42
|
+
int len, i;
|
43
|
+
char **c_extensions;
|
44
|
+
|
45
|
+
if (data == Qnil)
|
46
|
+
return NULL;
|
47
|
+
|
48
|
+
info = ALLOC_N (LDAPAPIInfo, 1);
|
49
|
+
info->ldapai_info_version =
|
50
|
+
FIX2INT (rb_struct_getmember (data, rb_intern ("info_version")));
|
51
|
+
info->ldapai_api_version =
|
52
|
+
FIX2INT (rb_struct_getmember (data, rb_intern ("api_version")));
|
53
|
+
info->ldapai_protocol_version =
|
54
|
+
FIX2INT (rb_struct_getmember (data, rb_intern ("protocol_version")));
|
55
|
+
r_extensions = rb_struct_getmember (data, rb_intern ("extensions"));
|
56
|
+
len = RARRAY_LEN (r_extensions);
|
57
|
+
c_extensions = ALLOCA_N (char *, len);
|
58
|
+
for (i = 0; i <= len - 1; i++)
|
59
|
+
{
|
60
|
+
VALUE str = RARRAY_PTR (r_extensions)[i];
|
61
|
+
RB_LDAP_SET_STR (c_extensions[i], str);
|
62
|
+
}
|
63
|
+
info->ldapai_extensions = c_extensions;
|
64
|
+
RB_LDAP_SET_STR (info->ldapai_vendor_name,
|
65
|
+
rb_struct_getmember (data, rb_intern ("vendor_name")));
|
66
|
+
info->ldapai_vendor_version =
|
67
|
+
FIX2INT (rb_struct_getmember (data, rb_intern ("vendor_version")));
|
68
|
+
|
69
|
+
return info;
|
70
|
+
}
|
71
|
+
#endif /* LDAP_OPT_API_INFO */
|
72
|
+
|
73
|
+
#ifdef HAVE_LDAPCONTROL
|
74
|
+
static void
|
75
|
+
rb_ldap_control_free (LDAPControl * ctl)
|
76
|
+
{
|
77
|
+
if (ctl)
|
78
|
+
{
|
79
|
+
if (ctl->ldctl_value.bv_val)
|
80
|
+
xfree (ctl->ldctl_value.bv_val);
|
81
|
+
if (ctl->ldctl_oid)
|
82
|
+
xfree (ctl->ldctl_oid);
|
83
|
+
xfree (ctl);
|
84
|
+
}
|
85
|
+
}
|
86
|
+
|
87
|
+
VALUE
|
88
|
+
rb_ldap_control_new (LDAPControl * ctl)
|
89
|
+
{
|
90
|
+
if (!ctl)
|
91
|
+
return Qnil;
|
92
|
+
else
|
93
|
+
return Data_Wrap_Struct (rb_cLDAP_Control, 0, rb_ldap_control_free, ctl);
|
94
|
+
}
|
95
|
+
|
96
|
+
/* Identical to rb_ldap_control_new, but does not define a routine with which
|
97
|
+
to free memory. This should be called only by rb_ldap_parse_result().
|
98
|
+
*/
|
99
|
+
VALUE
|
100
|
+
rb_ldap_control_new2 (LDAPControl * ctl)
|
101
|
+
{
|
102
|
+
if (!ctl)
|
103
|
+
return Qnil;
|
104
|
+
else
|
105
|
+
return Data_Wrap_Struct (rb_cLDAP_Control, 0, 0, ctl);
|
106
|
+
}
|
107
|
+
|
108
|
+
/* This is called by #initialize_copy and is using for duping/cloning. */
|
109
|
+
VALUE
|
110
|
+
rb_ldap_control_copy (VALUE copy, VALUE orig)
|
111
|
+
{
|
112
|
+
LDAPControl *orig_ctl, *copy_ctl;
|
113
|
+
|
114
|
+
Data_Get_Struct (orig, LDAPControl, orig_ctl);
|
115
|
+
Data_Get_Struct (copy, LDAPControl, copy_ctl);
|
116
|
+
memcpy (copy_ctl, orig_ctl, (size_t) sizeof (LDAPControl));
|
117
|
+
|
118
|
+
return copy;
|
119
|
+
}
|
120
|
+
|
121
|
+
static VALUE
|
122
|
+
rb_ldap_control_s_allocate (VALUE klass)
|
123
|
+
{
|
124
|
+
LDAPControl *ctl;
|
125
|
+
|
126
|
+
ctl = ALLOC_N (LDAPControl, 1);
|
127
|
+
ctl->ldctl_value.bv_val = NULL;
|
128
|
+
ctl->ldctl_value.bv_len = 0;
|
129
|
+
ctl->ldctl_oid = NULL;
|
130
|
+
ctl->ldctl_iscritical = 0;
|
131
|
+
return Data_Wrap_Struct (klass, 0, rb_ldap_control_free, ctl);
|
132
|
+
}
|
133
|
+
|
134
|
+
#if RUBY_VERSION_CODE < 170
|
135
|
+
static VALUE
|
136
|
+
rb_ldap_control_s_new (int argc, VALUE argv[], VALUE klass)
|
137
|
+
{
|
138
|
+
VALUE obj;
|
139
|
+
|
140
|
+
obj = rb_ldap_control_s_allocate (klass);
|
141
|
+
rb_obj_call_init (obj, argc, argv);
|
142
|
+
|
143
|
+
return obj;
|
144
|
+
}
|
145
|
+
#endif
|
146
|
+
|
147
|
+
static VALUE
|
148
|
+
rb_ldap_control_set_value (VALUE self, VALUE val)
|
149
|
+
{
|
150
|
+
LDAPControl *ctl;
|
151
|
+
|
152
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
153
|
+
|
154
|
+
if (ctl->ldctl_value.bv_val)
|
155
|
+
free (ctl->ldctl_value.bv_val);
|
156
|
+
|
157
|
+
if (val == Qnil)
|
158
|
+
{
|
159
|
+
ctl->ldctl_value.bv_val = NULL;
|
160
|
+
ctl->ldctl_value.bv_len = 0;
|
161
|
+
}
|
162
|
+
else
|
163
|
+
{
|
164
|
+
RB_LDAP_SET_STR (ctl->ldctl_value.bv_val, val);
|
165
|
+
ctl->ldctl_value.bv_len = RSTRING_LEN (val);
|
166
|
+
}
|
167
|
+
|
168
|
+
return val;
|
169
|
+
}
|
170
|
+
|
171
|
+
static VALUE
|
172
|
+
rb_ldap_control_get_value (VALUE self)
|
173
|
+
{
|
174
|
+
LDAPControl *ctl;
|
175
|
+
VALUE val;
|
176
|
+
|
177
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
178
|
+
|
179
|
+
if (ctl->ldctl_value.bv_len == 0 || ctl->ldctl_value.bv_val == NULL)
|
180
|
+
{
|
181
|
+
val = Qnil;
|
182
|
+
}
|
183
|
+
else
|
184
|
+
{
|
185
|
+
val =
|
186
|
+
rb_tainted_str_new (ctl->ldctl_value.bv_val, ctl->ldctl_value.bv_len);
|
187
|
+
}
|
188
|
+
|
189
|
+
return val;
|
190
|
+
}
|
191
|
+
|
192
|
+
/*
|
193
|
+
* Document-method: value
|
194
|
+
*
|
195
|
+
* call-seq:
|
196
|
+
* ctrl.value => String or nil
|
197
|
+
*
|
198
|
+
* Return the value of the control.
|
199
|
+
*/
|
200
|
+
|
201
|
+
/*
|
202
|
+
* Document-method: value=
|
203
|
+
*
|
204
|
+
* call-seq:
|
205
|
+
* ctrl.value=(val) => val
|
206
|
+
*
|
207
|
+
* Set the value of the control.
|
208
|
+
*/
|
209
|
+
static VALUE
|
210
|
+
rb_ldap_control_value (int argc, VALUE argv[], VALUE self)
|
211
|
+
{
|
212
|
+
VALUE val;
|
213
|
+
|
214
|
+
if (rb_scan_args (argc, argv, "01", &val) == 1)
|
215
|
+
val = rb_ldap_control_set_value (self, val);
|
216
|
+
else
|
217
|
+
val = rb_ldap_control_get_value (self);
|
218
|
+
return val;
|
219
|
+
}
|
220
|
+
|
221
|
+
static VALUE
|
222
|
+
rb_ldap_control_set_oid (VALUE self, VALUE val)
|
223
|
+
{
|
224
|
+
LDAPControl *ctl;
|
225
|
+
|
226
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
227
|
+
|
228
|
+
if (ctl->ldctl_oid)
|
229
|
+
free (ctl->ldctl_oid);
|
230
|
+
|
231
|
+
if (val == Qnil)
|
232
|
+
{
|
233
|
+
ctl->ldctl_oid = NULL;
|
234
|
+
}
|
235
|
+
else
|
236
|
+
{
|
237
|
+
RB_LDAP_SET_STR (ctl->ldctl_oid, val);
|
238
|
+
}
|
239
|
+
|
240
|
+
return val;
|
241
|
+
}
|
242
|
+
|
243
|
+
static VALUE
|
244
|
+
rb_ldap_control_get_oid (VALUE self)
|
245
|
+
{
|
246
|
+
LDAPControl *ctl;
|
247
|
+
VALUE val;
|
248
|
+
|
249
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
250
|
+
|
251
|
+
if (ctl->ldctl_oid == NULL)
|
252
|
+
{
|
253
|
+
val = Qnil;
|
254
|
+
}
|
255
|
+
else
|
256
|
+
{
|
257
|
+
val = rb_tainted_str_new2 (ctl->ldctl_oid);
|
258
|
+
}
|
259
|
+
|
260
|
+
return val;
|
261
|
+
}
|
262
|
+
|
263
|
+
/*
|
264
|
+
* Document-method: oid
|
265
|
+
*
|
266
|
+
* call-seq:
|
267
|
+
* ctrl.oid => String or nil
|
268
|
+
*
|
269
|
+
* Return the OID of the control.
|
270
|
+
*/
|
271
|
+
|
272
|
+
/*
|
273
|
+
* Document-method: oid=
|
274
|
+
*
|
275
|
+
* call-seq:
|
276
|
+
* ctrl.oid=(oid) => oid
|
277
|
+
*
|
278
|
+
* Set the OID of the control.
|
279
|
+
*/
|
280
|
+
static VALUE
|
281
|
+
rb_ldap_control_oid (int argc, VALUE argv[], VALUE self)
|
282
|
+
{
|
283
|
+
VALUE val;
|
284
|
+
LDAPControl *ctl;
|
285
|
+
|
286
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
287
|
+
if (rb_scan_args (argc, argv, "01", &val) == 1)
|
288
|
+
{
|
289
|
+
val = rb_ldap_control_set_oid (self, val);
|
290
|
+
}
|
291
|
+
else
|
292
|
+
{
|
293
|
+
val = rb_ldap_control_get_oid (self);
|
294
|
+
}
|
295
|
+
return val;
|
296
|
+
}
|
297
|
+
|
298
|
+
static VALUE
|
299
|
+
rb_ldap_control_set_critical (VALUE self, VALUE val)
|
300
|
+
{
|
301
|
+
LDAPControl *ctl;
|
302
|
+
|
303
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
304
|
+
ctl->ldctl_iscritical = (val == Qtrue) ? 1 : 0;
|
305
|
+
return val;
|
306
|
+
}
|
307
|
+
|
308
|
+
static VALUE
|
309
|
+
rb_ldap_control_get_critical (VALUE self)
|
310
|
+
{
|
311
|
+
LDAPControl *ctl;
|
312
|
+
VALUE val;
|
313
|
+
|
314
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
315
|
+
val = ctl->ldctl_iscritical ? Qtrue : Qfalse;
|
316
|
+
|
317
|
+
return val;
|
318
|
+
}
|
319
|
+
|
320
|
+
/*
|
321
|
+
* Document-method: critical
|
322
|
+
*
|
323
|
+
* call-seq:
|
324
|
+
* ctrl.critical => true or false
|
325
|
+
* ctrl.critical? => true or false
|
326
|
+
* ctrl.iscritical => true or false
|
327
|
+
*
|
328
|
+
* Return the criticality of the control.
|
329
|
+
*/
|
330
|
+
|
331
|
+
/*
|
332
|
+
* Document-method: critical=
|
333
|
+
*
|
334
|
+
* call-seq:
|
335
|
+
* ctrl.critical=(val) => val
|
336
|
+
* ctrl.iscritical=(val) => val
|
337
|
+
*
|
338
|
+
* Set the criticality of the control. +val+ should be *true* or *false*.
|
339
|
+
*/
|
340
|
+
static VALUE
|
341
|
+
rb_ldap_control_critical (int argc, VALUE argv[], VALUE self)
|
342
|
+
{
|
343
|
+
VALUE val;
|
344
|
+
LDAPControl *ctl;
|
345
|
+
|
346
|
+
Data_Get_Struct (self, LDAPControl, ctl);
|
347
|
+
if (rb_scan_args (argc, argv, "01", &val) == 1)
|
348
|
+
{
|
349
|
+
val = rb_ldap_control_set_critical (self, val);
|
350
|
+
}
|
351
|
+
else
|
352
|
+
{
|
353
|
+
val = rb_ldap_control_get_critical (self);
|
354
|
+
}
|
355
|
+
return val;
|
356
|
+
}
|
357
|
+
|
358
|
+
/*
|
359
|
+
* Document-method: new
|
360
|
+
*
|
361
|
+
* call-seq:
|
362
|
+
* LDAP::Control.new(oid, value, criticality) => LDAP::Control
|
363
|
+
*
|
364
|
+
* Create a new LDAP::Control. +oid+ is the OID of the control, +value+ is the
|
365
|
+
* value to be assigned to the control, and +criticality+ is the criticality
|
366
|
+
* of the control, which should be *true* or *false*.
|
367
|
+
*/
|
368
|
+
static VALUE
|
369
|
+
rb_ldap_control_initialize (int argc, VALUE argv[], VALUE self)
|
370
|
+
{
|
371
|
+
VALUE oid, value, critical;
|
372
|
+
|
373
|
+
switch (rb_scan_args (argc, argv, "03", &oid, &value, &critical))
|
374
|
+
{
|
375
|
+
case 3:
|
376
|
+
rb_ldap_control_set_critical (self, critical);
|
377
|
+
case 2:
|
378
|
+
rb_ldap_control_set_value (self, value);
|
379
|
+
case 1:
|
380
|
+
rb_ldap_control_set_oid (self, oid);
|
381
|
+
default:
|
382
|
+
break;
|
383
|
+
}
|
384
|
+
|
385
|
+
return Qnil;
|
386
|
+
}
|
387
|
+
|
388
|
+
/*
|
389
|
+
* call-seq:
|
390
|
+
* ctrl.inspect => String
|
391
|
+
*
|
392
|
+
* Produce a concise representation of the control.
|
393
|
+
*/
|
394
|
+
static VALUE
|
395
|
+
rb_ldap_control_inspect (VALUE self)
|
396
|
+
{
|
397
|
+
VALUE str;
|
398
|
+
|
399
|
+
str = rb_tainted_str_new2 ("#<");
|
400
|
+
rb_str_cat2 (str, rb_class2name (CLASS_OF (self)));
|
401
|
+
rb_str_cat2 (str, " oid=");
|
402
|
+
rb_str_concat (str, rb_inspect (rb_ldap_control_get_oid (self)));
|
403
|
+
rb_str_cat2 (str, " value=");
|
404
|
+
rb_str_concat (str, rb_inspect (rb_ldap_control_get_value (self)));
|
405
|
+
rb_str_cat2 (str, " iscritical=");
|
406
|
+
rb_str_concat (str, rb_inspect (rb_ldap_control_get_critical (self)));
|
407
|
+
rb_str_cat2 (str, ">");
|
408
|
+
|
409
|
+
return str;
|
410
|
+
}
|
411
|
+
|
412
|
+
VALUE
|
413
|
+
rb_ldap_controls_new (LDAPControl ** ctrls)
|
414
|
+
{
|
415
|
+
int i;
|
416
|
+
VALUE ary;
|
417
|
+
|
418
|
+
if (!ctrls)
|
419
|
+
return Qnil;
|
420
|
+
|
421
|
+
ary = rb_ary_new ();
|
422
|
+
for (i = 0; ctrls[i]; i++)
|
423
|
+
rb_ary_push (ary, rb_ldap_control_new (ctrls[i]));
|
424
|
+
|
425
|
+
return ary;
|
426
|
+
}
|
427
|
+
|
428
|
+
LDAPControl *
|
429
|
+
rb_ldap_get_control (VALUE obj)
|
430
|
+
{
|
431
|
+
LDAPControl *ctl;
|
432
|
+
|
433
|
+
if (obj == Qnil)
|
434
|
+
{
|
435
|
+
return NULL;
|
436
|
+
}
|
437
|
+
else
|
438
|
+
{
|
439
|
+
Data_Get_Struct (obj, LDAPControl, ctl);
|
440
|
+
return ctl;
|
441
|
+
}
|
442
|
+
}
|
443
|
+
|
444
|
+
LDAPControl **
|
445
|
+
rb_ldap_get_controls (VALUE data)
|
446
|
+
{
|
447
|
+
LDAPControl **ctls;
|
448
|
+
int len, i;
|
449
|
+
|
450
|
+
if (data == Qnil)
|
451
|
+
return NULL;
|
452
|
+
|
453
|
+
Check_Type (data, T_ARRAY);
|
454
|
+
len = RARRAY_LEN (data);
|
455
|
+
ctls = ALLOC_N (LDAPControl *, len + 1);
|
456
|
+
for (i = 0; i < len; i++)
|
457
|
+
{
|
458
|
+
ctls[i] = rb_ldap_get_control (rb_ary_entry (data, i));
|
459
|
+
}
|
460
|
+
ctls[len] = NULL;
|
461
|
+
|
462
|
+
return ctls;
|
463
|
+
}
|
464
|
+
#endif
|
465
|
+
|
466
|
+
/* Document-class: LDAP::Control
|
467
|
+
*
|
468
|
+
* Create, manipulate and inspect LDAP controls.
|
469
|
+
*/
|
470
|
+
void
|
471
|
+
Init_ldap_misc ()
|
472
|
+
{
|
473
|
+
rb_sLDAP_APIInfo = rb_struct_define ("APIInfo", "info_version", /* ldapai_xxxx */
|
474
|
+
"api_version",
|
475
|
+
"protocol_version",
|
476
|
+
"extensions",
|
477
|
+
"vendor_name", "vendor_version", NULL);
|
478
|
+
rb_define_const (rb_mLDAP, "APIInfo", rb_sLDAP_APIInfo);
|
479
|
+
|
480
|
+
#ifdef HAVE_LDAPCONTROL
|
481
|
+
rb_cLDAP_Control = rb_define_class_under (rb_mLDAP, "Control", rb_cObject);
|
482
|
+
#if RUBY_VERSION_CODE < 170
|
483
|
+
rb_define_singleton_method (rb_cLDAP_Control, "new",
|
484
|
+
rb_ldap_control_s_new, -1);
|
485
|
+
#endif
|
486
|
+
#if RUBY_VERSION_CODE >= 173
|
487
|
+
rb_define_alloc_func (rb_cLDAP_Control, rb_ldap_control_s_allocate);
|
488
|
+
#else
|
489
|
+
rb_define_singleton_method (rb_cLDAP_Control, "allocate",
|
490
|
+
rb_ldap_control_s_allocate, 0);
|
491
|
+
#endif
|
492
|
+
rb_define_method (rb_cLDAP_Control, "initialize",
|
493
|
+
rb_ldap_control_initialize, -1);
|
494
|
+
rb_define_method (rb_cLDAP_Control, "initialize_copy", rb_ldap_control_copy,
|
495
|
+
1);
|
496
|
+
rb_define_method (rb_cLDAP_Control, "inspect", rb_ldap_control_inspect, 0);
|
497
|
+
rb_define_method (rb_cLDAP_Control, "oid", rb_ldap_control_oid, -1);
|
498
|
+
rb_define_method (rb_cLDAP_Control, "oid=", rb_ldap_control_oid, -1);
|
499
|
+
rb_define_method (rb_cLDAP_Control, "value", rb_ldap_control_value, -1);
|
500
|
+
rb_define_method (rb_cLDAP_Control, "value=", rb_ldap_control_value, -1);
|
501
|
+
rb_define_method (rb_cLDAP_Control, "critical?", rb_ldap_control_critical,
|
502
|
+
-1);
|
503
|
+
rb_define_method (rb_cLDAP_Control, "critical", rb_ldap_control_critical,
|
504
|
+
-1);
|
505
|
+
rb_define_method (rb_cLDAP_Control, "critical=", rb_ldap_control_critical,
|
506
|
+
-1);
|
507
|
+
rb_define_method (rb_cLDAP_Control, "iscritical", rb_ldap_control_critical,
|
508
|
+
-1);
|
509
|
+
rb_define_method (rb_cLDAP_Control, "iscritical=", rb_ldap_control_critical,
|
510
|
+
-1);
|
511
|
+
#endif
|
512
|
+
}
|