1998-07-21 06:32:13 +04:00
|
|
|
#############################################################################
|
1999-08-25 02:30:55 +04:00
|
|
|
# $Id: Conn.pm,v 1.23 1999/08/24 22:30:43 leif%netscape.com Exp $
|
1998-07-21 06:32:13 +04:00
|
|
|
#
|
|
|
|
# The contents of this file are subject to the Mozilla Public License
|
|
|
|
# Version 1.0 (the "License"); you may not use this file except in
|
|
|
|
# compliance with the License. You may obtain a copy of the License at
|
|
|
|
# http://www.mozilla.org/MPL/
|
|
|
|
#
|
|
|
|
# Software distributed under the License is distributed on an "AS IS"
|
|
|
|
# basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the
|
|
|
|
# License for the specific language governing rights and limitations
|
|
|
|
# under the License.
|
|
|
|
#
|
1998-08-13 15:02:11 +04:00
|
|
|
# The Original Code is PerLDAP. The Initial Developer of the Original
|
1998-07-21 06:32:13 +04:00
|
|
|
# Code is Netscape Communications Corp. and Clayton Donley. Portions
|
|
|
|
# created by Netscape are Copyright (C) Netscape Communications
|
|
|
|
# Corp., portions created by Clayton Donley are Copyright (C) Clayton
|
|
|
|
# Donley. All Rights Reserved.
|
|
|
|
#
|
|
|
|
# Contributor(s):
|
|
|
|
#
|
|
|
|
# DESCRIPTION
|
1998-07-23 15:05:59 +04:00
|
|
|
# This is the main object class for connecting to an LDAP server,
|
|
|
|
# and perform searches and updates. It depends on the ::Entry
|
|
|
|
# object class, which is the data type returned from a search
|
|
|
|
# operation for instance.
|
1998-07-21 06:32:13 +04:00
|
|
|
#
|
|
|
|
#############################################################################
|
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
package Mozilla::LDAP::Conn;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
use Mozilla::LDAP::Utils 1.4 ();
|
|
|
|
use Mozilla::LDAP::API 1.4 qw(/.+/);
|
|
|
|
use Mozilla::LDAP::Entry 1.4 ();
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
use vars qw($VERSION);
|
|
|
|
|
|
|
|
$VERSION = "1.4";
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
1998-08-09 05:16:55 +04:00
|
|
|
# Creator, create and initialize a new LDAP object ("connection"). We support
|
|
|
|
# either providing all parameters as a hash array, or as individual
|
|
|
|
# arguments.
|
1998-07-23 15:05:59 +04:00
|
|
|
#
|
|
|
|
sub new
|
|
|
|
{
|
1999-03-22 07:12:41 +03:00
|
|
|
my ($class, $self) = (shift, {});
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-07-31 02:12:02 +04:00
|
|
|
if (ref $_[$[] eq "HASH")
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($hash);
|
1998-07-29 13:00:51 +04:00
|
|
|
|
1998-07-31 02:12:02 +04:00
|
|
|
$hash = $_[$[];
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"host"} = $hash->{"host"} if defined($hash->{"host"});
|
|
|
|
$self->{"port"} = $hash->{"port"} if defined($hash->{"port"});
|
|
|
|
$self->{"binddn"} = $hash->{"bind"} if defined($hash->{"bind"});
|
|
|
|
$self->{"bindpasswd"} = $hash->{"pswd"} if defined($hash->{"pswd"});
|
|
|
|
$self->{"certdb"} = $hash->{"cert"} if defined($hash->{"cert"});
|
1998-07-29 13:00:51 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
my ($host, $port, $binddn, $bindpasswd, $certdb, $authmeth) = @_;
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"host"} = $host;
|
|
|
|
$self->{"port"} = $port;
|
|
|
|
$self->{"binddn"} = $binddn;
|
|
|
|
$self->{"bindpasswd"} = $bindpasswd;
|
|
|
|
$self->{"certdb"} = $certdb;
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
$self->{"binddn"} = "" unless defined($self->{"binddn"});
|
|
|
|
$self->{"bindpasswd"} = "" unless defined($self->{"bindpasswd"});
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
if (!defined($self->{"port"}) || ($self->{"port"} eq ""))
|
1998-07-29 13:00:51 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"port"} = (($self->{"certdb"} ne "") ? LDAPS_PORT : LDAP_PORT);
|
1998-07-29 13:00:51 +04:00
|
|
|
}
|
1998-07-23 15:05:59 +04:00
|
|
|
bless $self, $class;
|
|
|
|
|
1998-07-29 12:23:53 +04:00
|
|
|
return unless $self->init();
|
1998-07-23 15:05:59 +04:00
|
|
|
return $self;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Destructor, makes sure we close any open LDAP connections.
|
|
|
|
#
|
|
|
|
sub DESTROY
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
return unless defined($self->{"ld"});
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
$self->close();
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
1998-07-29 06:41:11 +04:00
|
|
|
# Initialize a normal connection. This seems silly, why not just merge
|
|
|
|
# this back into the creator method (new)...
|
1998-07-23 15:05:59 +04:00
|
|
|
#
|
|
|
|
sub init
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($ret, $ld);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
if (defined($self->{"certdb"}) && ($self->{"certdb"} ne ""))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
$ret = ldapssl_client_init($self->{"certdb"}, 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
return 0 if ($ret < 0);
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$ld = ldapssl_init($self->{"host"}, $self->{"port"}, 1);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$ld = ldap_init($self->{"host"}, $self->{"port"});
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1999-01-22 02:52:52 +03:00
|
|
|
return 0 unless $ld;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ld"} = $ld;
|
|
|
|
$ret = ldap_simple_bind_s($ld, $self->{"binddn"}, $self->{"bindpasswd"});
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
|
|
|
}
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
#############################################################################
|
|
|
|
# Create a new, empty, Entry object, properly tied into the Entry class.
|
|
|
|
# This is mostly for convenience, you could directly do the "tie" yourself
|
|
|
|
# in your code.
|
|
|
|
#
|
|
|
|
sub newEntry
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my (%entry);
|
|
|
|
my ($obj);
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
tie %entry, 'Mozilla::LDAP::Entry';
|
|
|
|
$obj = bless \%entry, 'Mozilla::LDAP::Entry';
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
return $obj;
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Checks if a string is a properly formed LDAP URL.
|
|
|
|
#
|
|
|
|
sub isURL
|
|
|
|
{
|
|
|
|
my ($self, $url) = @_;
|
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
return ldap_is_ldap_url($url);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
1998-08-03 10:58:01 +04:00
|
|
|
# Return the actual low level LD connection structure, which is needed if
|
|
|
|
# you want to call any of the API functions yourself...
|
1998-07-23 15:05:59 +04:00
|
|
|
#
|
1998-08-03 10:58:01 +04:00
|
|
|
sub getLD
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return $self->{"ld"} if defined($self->{"ld"});
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Return the actual the current result message, don't use this unless you
|
|
|
|
# really have to...
|
|
|
|
#
|
|
|
|
sub getRes
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
1999-01-22 02:52:52 +03:00
|
|
|
|
|
|
|
return $self->{"ldres"} if defined($self->{"ldres"});
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-08-03 10:58:01 +04:00
|
|
|
#############################################################################
|
|
|
|
# Return the Error code from the last LDAP api function call. The last two
|
|
|
|
# optional arguments are pointers to strings, and will be set to the
|
|
|
|
# match string and extra error string if appropriate.
|
|
|
|
#
|
|
|
|
sub getErrorCode
|
|
|
|
{
|
|
|
|
my ($self, $match, $msg) = @_;
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ret);
|
1998-08-03 10:58:01 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
return LDAP_SUCCESS unless defined($self->{"ld"});
|
1998-08-13 15:02:11 +04:00
|
|
|
return ldap_get_lderrno($self->{"ld"}, $match, $msg);
|
1998-08-03 10:58:01 +04:00
|
|
|
}
|
|
|
|
*getError = \*getErrorCode;
|
|
|
|
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
#############################################################################
|
|
|
|
# Return the Error string from the last LDAP api function call.
|
|
|
|
#
|
|
|
|
sub getErrorString
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
|
|
|
my ($err);
|
1998-08-03 10:58:01 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
return LDAP_SUCCESS unless defined($self->{"ld"});
|
1998-08-13 15:02:11 +04:00
|
|
|
$err = ldap_get_lderrno($self->{"ld"}, undef, undef);
|
1998-08-09 05:16:55 +04:00
|
|
|
|
1998-08-03 10:58:01 +04:00
|
|
|
return ldap_err2string($err);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Print the last error code...
|
|
|
|
#
|
|
|
|
sub printError
|
|
|
|
{
|
|
|
|
my ($self, $str) = @_;
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
return unless defined($self->{"ld"});
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
$str = "LDAP error:" unless defined($str);
|
|
|
|
print "$str ", $self->getErrorString(), "\n";
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Normal LDAP search. Note that this will actually perform LDAP URL searches
|
|
|
|
# if the filter string looks like a proper URL.
|
|
|
|
#
|
|
|
|
sub search
|
|
|
|
{
|
|
|
|
my ($self, $basedn, $scope, $filter, $attrsonly, @attrs) = @_;
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($resv, $entry);
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($res) = \$resv;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-07-29 12:41:39 +04:00
|
|
|
$scope = Mozilla::LDAP::Utils::str2Scope($scope);
|
1998-07-29 06:41:11 +04:00
|
|
|
$filter = "(objectclass=*)" if ($filter =~ /^ALL$/i);
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
if (defined($self->{"ldres"}))
|
|
|
|
{
|
|
|
|
ldap_msgfree($self->{"ldres"});
|
|
|
|
undef $self->{"ldres"};
|
|
|
|
}
|
1998-07-29 06:41:11 +04:00
|
|
|
if (ldap_is_ldap_url($filter))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
if (! ldap_url_search_s($self->{"ld"}, $filter, $attrsonly, $res))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ldres"} = $res;
|
|
|
|
$self->{"ldfe"} = 1;
|
1998-07-29 06:41:11 +04:00
|
|
|
$entry = $self->nextEntry();
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
if (! ldap_search_s($self->{"ld"}, $basedn, $scope, $filter,
|
|
|
|
defined(\@attrs) ? \@attrs : 0,
|
|
|
|
defined($attrsonly) ? $attrsonly : 0,
|
|
|
|
defined($res) ? $res : 0))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ldres"} = $res;
|
|
|
|
$self->{"ldfe"} = 1;
|
1998-07-29 06:41:11 +04:00
|
|
|
$entry = $self->nextEntry();
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# URL search, optimized for LDAP URL searches.
|
|
|
|
#
|
|
|
|
sub searchURL
|
|
|
|
{
|
|
|
|
my ($self, $url, $attrsonly) = @_;
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($resv, $entry);
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($res) = \$resv;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
if (defined($self->{"ldres"}))
|
|
|
|
{
|
|
|
|
ldap_msgfree($self->{"ldres"});
|
|
|
|
undef $self->{"ldres"};
|
|
|
|
}
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
if (! ldap_url_search_s($self->{"ld"}, $url,
|
|
|
|
defined($attrsonly) ? $attrsonly : 0,
|
|
|
|
defined($res) ? $res : 0))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ldres"} = $res;
|
|
|
|
$self->{"ldfe"} = 1;
|
1998-07-29 06:41:11 +04:00
|
|
|
$entry = $self->nextEntry();
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return $entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
#############################################################################
|
|
|
|
# Browse an LDAP entry, very much like the regular search, except we set
|
|
|
|
# some defaults (like scope=BASE, filter=(objectclass=*) and so on). Note
|
|
|
|
# that this method does not support the attributesOnly flag.
|
|
|
|
#
|
|
|
|
sub browse
|
|
|
|
{
|
|
|
|
my ($self, $basedn, @attrs) = @_;
|
|
|
|
my ($scope, $filter);
|
|
|
|
|
|
|
|
$scope = Mozilla::LDAP::Utils::str2Scope("BASE");
|
|
|
|
$filter = "(objectclass=*)" ;
|
|
|
|
|
|
|
|
return $self->search($basedn, $scope, $filter, 0, @attrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Compare an attribute value against a DN in the server (without having to
|
|
|
|
# do a search first).
|
|
|
|
#
|
|
|
|
sub compare
|
|
|
|
{
|
|
|
|
my ($self, $dn, $attr, $value) = @_;
|
|
|
|
|
|
|
|
return ldap_compare_s($self->{"ld"}, $dn, $attr, $value) ==
|
|
|
|
LDAP_COMPARE_TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
#############################################################################
|
1998-07-29 06:41:11 +04:00
|
|
|
# Get an entry from the search, either the first entry, or the next entry,
|
|
|
|
# depending on the call order.
|
1998-07-23 15:05:59 +04:00
|
|
|
#
|
1998-07-29 06:41:11 +04:00
|
|
|
sub nextEntry
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
1999-01-22 02:52:52 +03:00
|
|
|
my (%entry, @ocorder, @vals);
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($attr, $lcattr, $obj, $ldentry, $berv, $dn, $count);
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ber) = \$berv;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
# I use the object directly, to avoid setting the "change" flags
|
1999-08-25 02:30:55 +04:00
|
|
|
$obj = tie %entry, 'Mozilla::LDAP::Entry';
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"dn"} = "";
|
|
|
|
if ($self->{"ldfe"} == 1)
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-03-22 07:12:41 +03:00
|
|
|
return "" unless defined($self->{"ldres"});
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ldfe"} = 0;
|
1999-03-22 07:12:41 +03:00
|
|
|
$ldentry = ldap_first_entry($self->{"ld"}, $self->{"ldres"});
|
1998-08-13 15:02:11 +04:00
|
|
|
$self->{"ldentry"} = $ldentry;
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
1999-03-22 07:12:41 +03:00
|
|
|
return "" unless defined($self->{"ldentry"});
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$ldentry = ldap_next_entry($self->{"ld"}, $self->{"ldentry"});
|
|
|
|
$self->{"ldentry"} = $ldentry;
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1999-03-22 07:12:41 +03:00
|
|
|
if (! $ldentry)
|
|
|
|
{
|
|
|
|
if (defined($self->{"ldres"}))
|
|
|
|
{
|
|
|
|
ldap_msgfree($self->{"ldres"});
|
|
|
|
undef $self->{"ldres"};
|
|
|
|
}
|
|
|
|
|
|
|
|
return "";
|
|
|
|
}
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$dn = ldap_get_dn($self->{"ld"}, $self->{"ldentry"});
|
1999-01-22 02:52:52 +03:00
|
|
|
$obj->{"_oc_numattr_"} = 0;
|
|
|
|
$obj->{"_oc_keyidx_"} = 0;
|
1998-08-13 15:02:11 +04:00
|
|
|
$obj->{"dn"} = $dn;
|
|
|
|
$self->{"dn"} = $dn;
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$attr = ldap_first_attribute($self->{"ld"}, $self->{"ldentry"}, $ber);
|
1999-08-25 02:30:55 +04:00
|
|
|
return (bless \%entry, 'Mozilla::LDAP::Entry') unless $attr;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$lcattr = lc $attr;
|
1998-08-13 15:02:11 +04:00
|
|
|
@vals = ldap_get_values_len($self->{"ld"}, $self->{"ldentry"}, $attr);
|
1999-01-22 02:52:52 +03:00
|
|
|
$obj->{$lcattr} = [@vals];
|
|
|
|
push(@ocorder, $lcattr);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$count = 1;
|
1998-08-13 15:02:11 +04:00
|
|
|
while ($attr = ldap_next_attribute($self->{"ld"},
|
|
|
|
$self->{"ldentry"}, $ber))
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
$lcattr = lc $attr;
|
1998-08-13 15:02:11 +04:00
|
|
|
@vals = ldap_get_values_len($self->{"ld"}, $self->{"ldentry"}, $attr);
|
1999-01-22 02:52:52 +03:00
|
|
|
$obj->{$lcattr} = [@vals];
|
|
|
|
push(@ocorder, $lcattr);
|
|
|
|
$count++;
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$obj->{"_oc_order_"} = \@ocorder;
|
1999-01-22 02:52:52 +03:00
|
|
|
$obj->{"_oc_numattr_"} = $count;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
ldap_ber_free($ber, 0) if $ber;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
return bless \%entry, 'Mozilla::LDAP::Entry';
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
# This is deprecated...
|
|
|
|
*entry = \*nextEntry;
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Close the connection to the LDAP server.
|
|
|
|
#
|
|
|
|
sub close
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($self) = shift;
|
|
|
|
my ($ret) = 1;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
ldap_unbind_s($self->{"ld"}) if defined($self->{"ld"});
|
|
|
|
if (defined($self->{"ldres"}))
|
|
|
|
{
|
|
|
|
ldap_msgfree($self->{"ldres"});
|
|
|
|
undef $self->{"ldres"};
|
|
|
|
}
|
1998-08-13 15:02:11 +04:00
|
|
|
undef $self->{"ld"};
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Delete an object.
|
|
|
|
#
|
|
|
|
sub delete
|
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
my ($self, $id) = @_;
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ret) = 1;
|
|
|
|
my ($dn) = $id;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
if (ref($id) eq 'Mozilla::LDAP::Entry')
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
$dn = $id->getDN();
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
$dn = $self->{"dn"} unless (defined($dn) && ($dn ne ""));
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1999-01-22 02:52:52 +03:00
|
|
|
|
|
|
|
$dn = Mozilla::LDAP::Utils::normalizeDN($dn);
|
1998-08-13 15:02:11 +04:00
|
|
|
$ret = ldap_delete_s($self->{"ld"}, $dn) if ($dn ne "");
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Add an object.
|
|
|
|
#
|
|
|
|
sub add
|
|
|
|
{
|
1998-07-30 07:08:03 +04:00
|
|
|
my ($self, $entry) = @_;
|
1999-03-22 07:12:41 +03:00
|
|
|
my (%ent);
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($ref, $key, $val);
|
1999-01-22 02:52:52 +03:00
|
|
|
my ($ret, $gotcha) = (1, 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
$ref = ref($entry);
|
1999-08-25 02:30:55 +04:00
|
|
|
if ($ref eq 'Mozilla::LDAP::Entry')
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
foreach $key (@{$entry->{"_oc_order_"}})
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1998-07-29 06:41:11 +04:00
|
|
|
next if (($key eq "dn") || ($key =~ /^_.+_$/));
|
1999-08-25 02:30:55 +04:00
|
|
|
$ent{$key} = { "ab" => $entry->{$key} };
|
1998-07-30 07:08:03 +04:00
|
|
|
$gotcha++;
|
1999-03-22 07:12:41 +03:00
|
|
|
$entry->attrClean($key);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1999-03-22 07:12:41 +03:00
|
|
|
}
|
1999-08-25 02:30:55 +04:00
|
|
|
elsif ($ref eq 'HASH')
|
1999-03-22 07:12:41 +03:00
|
|
|
{
|
|
|
|
foreach $key (keys(%{$entry}))
|
|
|
|
{
|
|
|
|
next if (($key eq "dn") || ($key =~ /^_.+_$/));
|
1999-08-25 02:30:55 +04:00
|
|
|
$ent{$key} = { "ab" => $entry->{$key} };
|
1999-03-22 07:12:41 +03:00
|
|
|
$gotcha++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
# We can't handle this, so let's just return.
|
|
|
|
return 0;
|
|
|
|
}
|
1998-07-30 07:08:03 +04:00
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
if ($gotcha > 0 )
|
|
|
|
{
|
|
|
|
$ret = ldap_add_s($self->{"ld"}, $entry->{"dn"}, \%ent);
|
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
return 0;
|
1998-07-31 02:12:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
1998-08-03 11:50:54 +04:00
|
|
|
# Modify the RDN, and update the entry accordingly. Note that the last
|
1999-01-22 02:52:52 +03:00
|
|
|
# two arguments (DN and "delete") are optional. The last (optional) argument
|
|
|
|
# is a flag, which if set to TRUE (the default), will cause the corresponding
|
|
|
|
# attribute value to be removed from the entry.
|
1998-07-31 02:12:02 +04:00
|
|
|
#
|
|
|
|
sub modifyRDN
|
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
my ($self, $rdn, $dn, $del) = ($_[$[], $_[$[ + 1], $_[$[ + 2], $_[$[ + 3]);
|
1999-03-22 07:12:41 +03:00
|
|
|
my (@vals);
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ret) = 1;
|
1998-07-31 02:12:02 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$del = 1 unless (defined($del) && ($del ne ""));
|
|
|
|
$dn = $self->{"dn"} unless (defined($dn) && ($dn ne ""));
|
1998-07-31 02:12:02 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
@vals = ldap_explode_dn($dn, 0);
|
|
|
|
if (lc($vals[$[]) ne lc($rdn))
|
1998-07-31 02:12:02 +04:00
|
|
|
{
|
1998-08-13 15:02:11 +04:00
|
|
|
$ret = ldap_modrdn2_s($self->{"ld"}, $dn, $rdn, $del);
|
1998-07-31 02:12:02 +04:00
|
|
|
if ($ret == LDAP_SUCCESS)
|
|
|
|
{
|
|
|
|
shift(@vals);
|
|
|
|
unshift(@vals, ($rdn));
|
1999-03-30 05:16:45 +04:00
|
|
|
$self->{"dn"} = join(@vals);
|
1998-07-31 02:12:02 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Update an object. NOTE: I'd like to clean up my change tracking tags here,
|
|
|
|
# so that we can call update() again with the same entry.
|
|
|
|
#
|
|
|
|
sub update
|
|
|
|
{
|
1998-08-09 05:16:55 +04:00
|
|
|
my ($self, $entry) = @_;
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($vals, @add, @remove, %mod, %new);
|
1999-03-30 05:16:45 +04:00
|
|
|
my ($key, $val);
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ret) = 1;
|
1998-07-23 15:05:59 +04:00
|
|
|
local $_;
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
foreach $key (@{$entry->{"_oc_order_"}})
|
1998-07-23 15:05:59 +04:00
|
|
|
{
|
1999-01-22 02:52:52 +03:00
|
|
|
next if (($key eq "dn") || ($key =~ /^_.+_$/));
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
$vals = defined($entry->{$key}) ?
|
|
|
|
$entry->{$key} :
|
|
|
|
[ ];
|
|
|
|
|
|
|
|
if (defined($entry->{"_${key}_deleted_"}))
|
|
|
|
{
|
|
|
|
$mod{$key} = { "db", [] };
|
|
|
|
}
|
|
|
|
elsif (defined($entry->{"_${key}_modified_"}))
|
|
|
|
{
|
|
|
|
@remove = ();
|
|
|
|
undef %new;
|
|
|
|
grep(($new{$_} = 1), @{$vals});
|
|
|
|
if (defined($entry->{"_${key}_save_"}))
|
|
|
|
{
|
|
|
|
foreach (@{$entry->{"_${key}_save_"}})
|
|
|
|
{
|
|
|
|
if (! $new{$_})
|
|
|
|
{
|
|
|
|
push(@remove, $_);
|
|
|
|
}
|
|
|
|
$new{$_} = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
@add = ();
|
|
|
|
foreach (@{$vals})
|
|
|
|
{
|
|
|
|
push(@add, $_) if ($new{$_} == 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((scalar(@remove) + scalar(@add)) < scalar(@{$vals}))
|
|
|
|
{
|
|
|
|
$mod{$key}{"db"} = [ @remove ] if ($#remove >= $[);
|
|
|
|
$mod{$key}{"ab"} = [ @add ] if ($#add >= $[);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
$mod{$key}{"rb"} = [ @{$vals} ];
|
|
|
|
}
|
|
|
|
}
|
1999-03-22 07:12:41 +03:00
|
|
|
$entry->attrClean($key);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
1998-07-30 13:51:35 +04:00
|
|
|
|
|
|
|
# This is here for debug purposes only...
|
|
|
|
if ($main::LDAP_DEBUG)
|
|
|
|
{
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($op);
|
1999-03-30 05:16:45 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
foreach $key (keys(%mod))
|
1998-07-30 13:51:35 +04:00
|
|
|
{
|
|
|
|
print "Working on $key\n";
|
|
|
|
foreach $op (keys %{$mod{$key}})
|
|
|
|
{
|
|
|
|
print "\tDoing operation: $op\n";
|
|
|
|
foreach $val (@{$mod{$key}{$op}})
|
|
|
|
{
|
|
|
|
print "\t\t$val\n";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1998-08-13 16:02:27 +04:00
|
|
|
$ret = ldap_modify_s($self->{"ld"}, $entry->{"dn"}, \%mod)
|
1999-08-25 02:30:55 +04:00
|
|
|
if (scalar(keys(%mod)));
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
1998-08-19 02:26:30 +04:00
|
|
|
# Set the rebind procedure. We also provide a neat default rebind procedure,
|
|
|
|
# which takes three arguments (DN, password, and the auth method). This is an
|
|
|
|
# extension to the LDAP SDK, which I think should be there. It was also
|
|
|
|
# needed to get this to work on Win/NT...
|
1998-07-23 15:05:59 +04:00
|
|
|
#
|
|
|
|
sub setRebindProc
|
|
|
|
{
|
|
|
|
my ($self, $proc) = @_;
|
|
|
|
|
|
|
|
# Should we try to reinitialize the connection?
|
1998-08-13 15:02:11 +04:00
|
|
|
die "No LDAP connection" unless defined($self->{"ld"});
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
ldap_set_rebind_proc($self->{"ld"}, $proc);
|
1998-07-23 15:05:59 +04:00
|
|
|
}
|
|
|
|
|
1998-08-19 02:26:30 +04:00
|
|
|
sub setDefaultRebindProc
|
|
|
|
{
|
|
|
|
my ($self, $dn, $pswd, $auth) = @_;
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$auth = LDAP_AUTH_SIMPLE unless defined($auth);
|
1998-08-19 02:26:30 +04:00
|
|
|
die "No LDAP connection"
|
1999-08-25 02:30:55 +04:00
|
|
|
unless defined($self->{"ld"});
|
1998-08-19 02:26:30 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
ldap_set_default_rebind_proc($self->{"ld"}, $dn, $pswd, $auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Do a simple authentication, so that we can rebind as another user.
|
|
|
|
#
|
|
|
|
sub simpleAuth
|
|
|
|
{
|
|
|
|
my ($self, $dn, $pswd) = @_;
|
1999-08-25 02:30:55 +04:00
|
|
|
my ($ret);
|
1999-01-22 02:52:52 +03:00
|
|
|
|
|
|
|
$ret = ldap_simple_bind_s($self->{"ld"}, $dn, $pswd);
|
|
|
|
|
|
|
|
return (($ret == LDAP_SUCCESS) ? 1 : 0);
|
1998-08-19 02:26:30 +04:00
|
|
|
}
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# Mandatory TRUE return value.
|
|
|
|
#
|
|
|
|
1;
|
|
|
|
|
|
|
|
|
|
|
|
#############################################################################
|
|
|
|
# POD documentation...
|
|
|
|
#
|
|
|
|
__END__
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
Mozilla::LDAP::Conn - Object Oriented API for the LDAP SDK.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
1998-07-29 06:41:11 +04:00
|
|
|
use Mozilla::LDAP::Conn;
|
|
|
|
use Mozilla::LDAP::Utils;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 ABSTRACT
|
|
|
|
|
|
|
|
This package is the main API for using our Perl Object Oriented LDAP
|
|
|
|
module. Even though it's certainly possible, and sometimes even necessary,
|
|
|
|
to call the native LDAP C SDK functions, we strongly recommend you use
|
|
|
|
these object classes.
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
It's not required to use our Mozilla::LDAP::Utils.pm package, but it's
|
|
|
|
convenient and good for portability if you use as much as you can from
|
|
|
|
that package as well. This implies using the LdapConf package as well,
|
|
|
|
even though you usually don't need to use it directly.
|
|
|
|
|
|
|
|
You should read this document in combination with the Mozilla::LDAP::Entry
|
|
|
|
document. Both modules depend on each other heavily.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
First, this is not ment to be a crash course in how LDAP works, if you
|
|
|
|
have no experience with LDAP, I suggest you read some of the literature
|
|
|
|
that's available out there. The LDAP Deployment Book from Netscape, or the
|
|
|
|
LDAP C SDK documentation are good starting points.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
This object class basically tracks and manages the LDAP connection, it's
|
|
|
|
current status, and the current search operation (if any). Every time you
|
|
|
|
call the B<search> method of an object instance, you'll reset it's
|
|
|
|
internal state. It depends heavily on the ::Entry class, which are used to
|
|
|
|
retrieve, modify and update a single entry.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
The B<search> and B<nextEntry> methods returns Mozilla::LDAP::Entry
|
|
|
|
objects, naturally. You also have to instantiate (and modify) a new
|
|
|
|
::Entry object when you want to add new entries to an LDAP
|
|
|
|
server. Alternatively, the add() method will also take a hash array as
|
|
|
|
argument, to make it easy to create new LDAP entries.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
To assure that changes to an entry are updated properly, we strongly
|
1998-08-09 05:16:55 +04:00
|
|
|
recommend you use the native methods of the ::Entry object class. Even
|
|
|
|
though you can modify certain elements directly, it could cause changes
|
|
|
|
not to be committed to the LDAP server. If there's something missing from
|
|
|
|
the API, please let us know, or even fix it yourself.
|
1998-07-29 06:41:11 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=head1 SOME PERLDAP/OO BASICS
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
An entry consist of a DN, and a hash array of pointers to attribute
|
|
|
|
values. Each attribute value (except the DN) is an array, but you have to
|
|
|
|
remember the hash array in the entry stores pointers to the array, not the
|
|
|
|
array. So, to access the first CN value of an entry, you'd do
|
|
|
|
|
|
|
|
$cn = $entry->{cn}[0];
|
|
|
|
|
|
|
|
To set the CN attribute to a completely new array of values, you'd do
|
|
|
|
|
|
|
|
$entry->{cn} = [ "Leif Hedstrom", "The Swede" ];
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
As long as you remember this, and try to use native Mozilla::LDAP::Entry
|
|
|
|
methods, this package will take care of most the work. Once you master
|
|
|
|
this, working with LDAP in Perl is surprisingly easy.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
We already mentioned DN, which stands for Distinguished Name. Every entry
|
1998-08-09 05:16:55 +04:00
|
|
|
on an LDAP server must have a DN, and it's always guaranteed to be unique
|
|
|
|
within your database. Some typical DNs are
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
uid=leif,ou=people,o=netscape.com
|
|
|
|
cn=gene-staff,ou=mailGroup,o=netscape.com
|
|
|
|
dc=data,dc=netscape,dc=com
|
|
|
|
|
|
|
|
There's also a term called RDN, which stands for Relative Distinguished
|
1998-08-09 05:16:55 +04:00
|
|
|
Name. In the above examples, C<uid=leif>, C<cn=gene-staff> and C<dc=data>
|
1998-07-23 15:05:59 +04:00
|
|
|
are all RDNs. One particular property for a RDN is that they must be
|
|
|
|
unique within it's sub-tree. Hence, there can only be one user with
|
1999-08-25 02:30:55 +04:00
|
|
|
C<uid=leif> within the C<ou=people> tree, there can never be a name
|
|
|
|
conflict.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=head1 CREATING A NEW OBJECT INSTANCE
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
Before you can do anything with PerLDAP, you'll need to instantiate at
|
|
|
|
least one Mozilla::LDAP::Conn object, and connect it to an LDAP server. As
|
|
|
|
you probably guessed already, this is done with the B<new> method:
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
$conn = new Mozilla::LDAP::Conn("ldap", "389", $bind, $pswd, $cert);
|
|
|
|
die "Couldn't connect to LDAP server ldap" unless $conn;
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
The arguments are: Host name, port number, and optionally a bind-DN, it's
|
|
|
|
password, and a certificate. If there is no bind-DN, the connection will
|
|
|
|
be bound as the anonymous user. If the certificate file is specified, the
|
|
|
|
connection will be over SSL, and you should then probably connect to port
|
|
|
|
636. You have to check that the object was created properly, and take
|
|
|
|
proper actions if you couldn't get a connection.
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
There's one convenient alternative call method to this function. Instead of
|
|
|
|
providing each individual argument, you can provide one hash array
|
|
|
|
(actually, a pointer to a hash). For example:
|
|
|
|
|
|
|
|
%ld = Mozilla::LDAP::Utils::ldapArgs();
|
|
|
|
$conn = new Mozilla::LDAP::Conn(\%ld);
|
|
|
|
|
|
|
|
The components of the hash are:
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$ld->{"host"}
|
|
|
|
$ld->{"port"}
|
1999-03-22 07:12:41 +03:00
|
|
|
$ld->{"base"}
|
1998-08-13 15:02:11 +04:00
|
|
|
$ld->{"bind"}
|
|
|
|
$ld->{"pswd"}
|
|
|
|
$ld->{"cert"}
|
1998-08-09 05:16:55 +04:00
|
|
|
|
|
|
|
and (not used in the B<new> method)
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
$ld->{"scope"}
|
1998-08-09 05:16:55 +04:00
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
Once a connection is established, the package will take care of the
|
|
|
|
rest. If for some reason the connection is lost, the object should
|
|
|
|
reconnect on it's own, automatically. [Note: This doesn't work
|
1998-08-09 05:16:55 +04:00
|
|
|
now... ]. You can use the Mozilla::LDAP:Conn object for any number of
|
|
|
|
operations, but since everything is currently done synchronously, you can
|
|
|
|
only have one operation active at any single time. You can of course have
|
|
|
|
multiple Mozilla::LDAP::Conn instanced active at the same time.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 PERFORMING LDAP SEARCHES
|
|
|
|
|
|
|
|
We assume that you are familiar with the LDAP filter syntax already, all
|
1998-08-09 05:16:55 +04:00
|
|
|
searches performed by this object class uses these filters. You should
|
|
|
|
also be familiar with LDAP URLs, and LDAP object classes. There are some
|
|
|
|
of the few things you actually must know about LDAP. Perhaps the simples
|
|
|
|
filter is
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
(uid=leif)
|
|
|
|
|
|
|
|
This matches all entries with the UID set to "leif". Normally that
|
|
|
|
would only match one entry, but there is no guarantee for that. To find
|
|
|
|
everyone with the name "leif", you'd instead do
|
|
|
|
|
|
|
|
(cn=*leif*)
|
|
|
|
|
|
|
|
A more complicated search involves logic operators. To find all mail
|
|
|
|
groups owned by "leif" (or actually his DN), you could do
|
|
|
|
|
|
|
|
(&(objectclass=mailGroup)(owner=uid=leif,ou=people,o=netscape))
|
|
|
|
|
|
|
|
The I<owner> attribute is what's called a DN attribute, so to match on it
|
|
|
|
we have to specify the entire DN in the filter above. We could of course
|
|
|
|
also do a sub string "wild card" match, but it's less efficient, and
|
|
|
|
requires indexes to perform reasonably well.
|
|
|
|
|
|
|
|
Ok, now we are prepared to actually do a real search on the LDAP server:
|
|
|
|
|
|
|
|
$base = "o=netscape.com";
|
1998-08-09 05:16:55 +04:00
|
|
|
$conn = new Mozilla::LDAP::Conn("ldap", "389", "", ""); die "No LDAP
|
|
|
|
connection" unless $conn;
|
|
|
|
|
|
|
|
$entry = $conn->search($base, "subtree", "(uid=leif)");
|
|
|
|
if (! $entry)
|
|
|
|
{ # handle this event, no entries found, dude!
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
while ($entry)
|
|
|
|
{
|
|
|
|
$entry->printLDIF();
|
|
|
|
$entry = $conn->nextEntry();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
This is in fact a poor mans implementation of the I<ldapsearch> command
|
|
|
|
line utility. The B<search> method returns an Mozilla::LDAP::Entry object,
|
|
|
|
which holds the first entry from the search, if any. To get the second and
|
1998-07-23 15:05:59 +04:00
|
|
|
subsequent entries you call the B<entry> method, until there are no more
|
1998-08-09 05:16:55 +04:00
|
|
|
entries. The B<printLDIF> method is a convenient function, requesting the
|
|
|
|
entry to print itself on STDOUT, in LDIF format.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
The arguments to the B<search> methods are the I<LDAP Base-DN>, the
|
|
|
|
I<scope> of the search ("base", "one" or "sub"), and the actual LDAP
|
|
|
|
I<filter>. The entry return contains the DN, and all attribute values. To
|
|
|
|
access a specific attribute value, you just have to use the hash array:
|
|
|
|
|
|
|
|
$cn = $entry->{cn}[0];
|
|
|
|
|
|
|
|
Since many LDAP attributes can have more than one value, value of the hash
|
|
|
|
array is another array (or actually a pointer to an array). In many cases
|
|
|
|
you can just assume the value is in the first slot (indexed by [0]), but
|
|
|
|
for some attributes you have to support multiple values. To find out how
|
|
|
|
many values a specific attribute has, you'd call the B<size> method:
|
|
|
|
|
|
|
|
$numVals = $entry->size("objectclass");
|
|
|
|
|
|
|
|
One caveat: Many LDAP attributes are case insensitive, but the methods in
|
1998-08-09 05:16:55 +04:00
|
|
|
the Mozilla::LDAP::Entry package are not aware of this. Hence, if you
|
|
|
|
compare values with case sensitivity, you can experience weird
|
|
|
|
behavior. If you know an attribute is CIS (Case Insensitive), make sure
|
|
|
|
you do case insensitive string comparisons.
|
|
|
|
|
|
|
|
Unfortunately some methods in this package can't do this, and by default
|
|
|
|
will do case sensitive comparisons. We are working on this, and in a
|
|
|
|
future release some of the methods will handle this more gracefully. As an
|
|
|
|
extension (for LDAP v3.0) we could also use schema discovery for handling
|
|
|
|
this even better.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
There is an alternative search method, to use LDAP URLs instead of a
|
|
|
|
filter string. This can be used to easily parse and process URLs, which is
|
|
|
|
a compact way of storing a "link" to some specific LDAP information. To
|
|
|
|
process such a search, you use the B<searchURL> method:
|
|
|
|
|
|
|
|
$entry->searchURL("ldap:///o=netscape.com??sub?(uid=leif");
|
|
|
|
|
|
|
|
As it turns out, the B<search> method also supports LDAP URL searches. If
|
1998-08-09 05:16:55 +04:00
|
|
|
the search filter looks like a proper URL, we will actually do an URL
|
|
|
|
search instead. This is for backward compatibility, and for ease of use.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
To achieve better performance and use less memory, you can limit your
|
|
|
|
search to only retrieve certain attributes. With the LDAP URLs you specify
|
|
|
|
this as an optional parameter, and with the B<search> method you add two
|
|
|
|
more options, like
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
$entry = $conn->search($base, "sub", $filter, 0, ("mail", "cn");
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
The last argument specifies an array of attributes to retrieve, the fewer
|
|
|
|
the attributes, the faster the search will be. The second to last argument
|
|
|
|
is a boolean value indicating if we should retrieve only the attribute
|
|
|
|
names (and no values). In most cases you want this to be FALSE, to
|
|
|
|
retrieve both the attribute names, and all their values. To do this with
|
|
|
|
the B<searchURL> method, add a second argument, which should be 0 or 1.
|
|
|
|
|
|
|
|
=head1 MODIFYING AND CREATING NEW LDAP ENTRIES
|
|
|
|
|
|
|
|
Once you have an LDAP entry, either from a search, or created directly to
|
|
|
|
get a new empty object, you are ready to modify it. If you are creating a
|
1999-01-22 02:52:52 +03:00
|
|
|
new entry, the first thing to set it it's DN, like
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$entry = $conn->newEntry();
|
1998-07-23 15:05:59 +04:00
|
|
|
$entry->setDN("uid=leif,ou=people,o=netscape.com");
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
alternatively you can still use the B<new> method on the Entry class, like
|
|
|
|
|
|
|
|
$entry = new Mozilla::LDAP::Entry;
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
You should not do this for an existing LDAP entry, changing the RDN (or
|
1998-08-09 05:16:55 +04:00
|
|
|
DN) for such an entry must be done with B<modifyRDN>. To populate (or
|
|
|
|
modify) some other attributes, we can do
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
$entry->{objectclass} = [ "top", "person", "inetOrgPerson" ];
|
|
|
|
$entry->{cn} = [ "Leif Hedstrom" ];
|
|
|
|
$entry->{mail} = [ "leif@netscape.com" ];
|
|
|
|
|
|
|
|
Once you are done modifying your LDAP entry, call the B<update> method
|
1998-08-09 05:16:55 +04:00
|
|
|
from the Mozilla::LDAP::Conn object instance:
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
$conn->update($entry);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
Or, if you are creating an entirely new LDAP entry, you must call the
|
|
|
|
B<add> method:
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
$conn->add($entry);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
If all comes to worse, and you have to remove an entry again from the LDAP
|
|
|
|
server, just call the B<delete> method, like
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
$conn->delete($entry->getDN());
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
You can't use native Perl functions like push() and splice() on attribute
|
1998-08-09 05:16:55 +04:00
|
|
|
values, since they won't update the ::Entry instance state properly.
|
1999-01-22 02:52:52 +03:00
|
|
|
Instead use one of the methods provided by the Mozilla::LDAP::Entry
|
|
|
|
object class, for instance
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
$entry->addValue("cn", "The Swede");
|
|
|
|
$entry->removeValue("mailAlternateAddress", "leif@mcom.com");
|
|
|
|
$entry->remove("seeAlso");
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
These methods return a TRUE or FALSE value, depending on the outcome
|
|
|
|
of the operation. If there was no value to remove, or a value already
|
|
|
|
exists, we return FALSE, otherwise TRUE. To check if an attribute has a
|
|
|
|
certain value, use the B<hasValue> method, like
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
if ($entry->hasValue("mail", "leif@netscape.com")) {
|
1998-07-23 15:05:59 +04:00
|
|
|
# Do something
|
|
|
|
}
|
|
|
|
|
|
|
|
There is a similar method, B<matchValue>, which takes a regular
|
|
|
|
expression to match against, instead of the entire string. For more
|
|
|
|
information this and other methods in the Entry class, see below.
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=head1 OBJECT CLASS METHODS
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
We have already described the fundamentals of this class earlier. This is
|
|
|
|
a summary of all available methods which you can use. Be careful not to
|
|
|
|
use any undocumented features or heaviour, since the internals in this
|
|
|
|
module is likely to change.
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=head2 Searching and updating entries
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=over 13
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
=item B<add>
|
|
|
|
|
|
|
|
Add a new entry to the LDAP server. Make sure you use the B<new> method
|
|
|
|
for the Mozilla::LDAP::Entry object, to create a proper entry.
|
|
|
|
|
|
|
|
=item B<browse>
|
|
|
|
|
|
|
|
Searches for an LDAP entry, but sets some default values to begin with,
|
|
|
|
such as scope=BASE, filter=(objectclass=*) and so on. Much like B<search>
|
|
|
|
except for these defaults. Requires a DN value
|
|
|
|
as an argument. An optional second argument is an array of which
|
|
|
|
attributes to return from the entry. Note that this does not support the
|
|
|
|
"attributesOnly" flag.
|
|
|
|
|
|
|
|
$secondEntry = $conn->browse($entry->getDN());
|
|
|
|
|
|
|
|
=item B<close>
|
|
|
|
|
|
|
|
Close the LDAP connection, and clean up the object. If you don't call this
|
|
|
|
directly, the destructor for the object instance will do the job for you.
|
|
|
|
|
|
|
|
=item B<compare>
|
|
|
|
|
|
|
|
Compares an attribute and value to a given DN without first doing a
|
|
|
|
search. Requires three arguments: a DN, the attribute name, and the value
|
|
|
|
of the attribute. Returns TRUE if the attribute/value compared ok.
|
|
|
|
|
|
|
|
print "not" unless $conn->compare($entry->getDN(), "cn", "Big Swede");
|
|
|
|
print "ok";
|
|
|
|
|
|
|
|
=item B<delete>
|
|
|
|
|
|
|
|
This will delete the current entry, or possibly an entry as specified with
|
|
|
|
the optional argument. You can use this function to delete any entry you
|
|
|
|
like, by passing it an explicit DN. If you don't pass it this argument,
|
|
|
|
B<delete> defaults to delete the current entry, from the last call to
|
|
|
|
B<search> or B<entry>. I'd recommend doing a delete with the explicit DN,
|
|
|
|
like
|
|
|
|
|
|
|
|
$conn->delete($entry->getDN());
|
|
|
|
|
|
|
|
=item B<modifyRDN>
|
|
|
|
|
|
|
|
This will rename the specified LDAP entry, by modifying it's RDN. For
|
|
|
|
example, assuming you have a DN of
|
|
|
|
|
|
|
|
uid=leif, ou=people, dc=netscape, dc=com
|
|
|
|
|
|
|
|
and you wish to rename to
|
|
|
|
|
|
|
|
uid=fiel, ou=people, dc=netscape, dc=com
|
|
|
|
|
|
|
|
you'd do something like
|
|
|
|
|
|
|
|
$rdn = "uid=fiel";
|
|
|
|
$conn->modifyRDN($rdn, $entry->getDN());
|
|
|
|
|
|
|
|
Note that this can only be done on the RDN, you could not change say
|
|
|
|
C<ou=people> to be C<ou=hackers> in the example above. To do that, you have
|
|
|
|
to add a new entry (a copy of the old one), and then remove the old
|
|
|
|
entry.
|
|
|
|
|
|
|
|
The last argument is a boolean (0 or 1), which indicates if the old RDN
|
|
|
|
value should be removed from the entry. The default is TRUE ("1").
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
=item B<new>
|
|
|
|
|
|
|
|
This creates and initialized a new LDAP connection and object. The
|
|
|
|
required arguments are host name, port number, bind DN and the bind
|
|
|
|
password. An optional argument is a certificate (public key), which causes
|
|
|
|
the LDAP connection to be established over an SSL channel. Currently we do
|
1998-08-09 05:16:55 +04:00
|
|
|
not support Client Authentication, so you still have to use the simple
|
|
|
|
authentication method (i.e. with a password).
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
A typical usage could be something like
|
|
|
|
|
|
|
|
%ld = Mozilla::LDAP::Utils::ldapArgs();
|
|
|
|
$conn = new Mozilla::LDAP::Conn(\%ld);
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
Also, remember that if you use SSL, the port is (usually) 636.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
=item B<newEntry>
|
|
|
|
|
|
|
|
This will create an empty Mozilla::LDAP::Entry object, which is properly
|
|
|
|
tied into the appropriate objectclass. Use this method instead of manually
|
|
|
|
creating new Entry objects, or at least make sure that you use the "tie"
|
|
|
|
function when creating the entry. This function takes no arguments, and
|
|
|
|
returns a pointer to an ::Entry object. For instance
|
|
|
|
|
|
|
|
$entry = $conn->newEntry();
|
|
|
|
|
|
|
|
or
|
|
|
|
|
|
|
|
$entry = Mozilla::LDAP::Conn->newEntry();
|
|
|
|
|
|
|
|
=item B<nextEntry>
|
|
|
|
|
|
|
|
This method will return the next entry from the search result, and can
|
|
|
|
therefore only be called after a succesful search has been initiated. If
|
|
|
|
there are no more entries to retrieve, it returns nothing (empty string).
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
=item B<search>
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
The B<search> method is the main entry point into this module. It requires
|
|
|
|
at least three arguments: The Base DN, the scope, and the search
|
1998-07-23 15:05:59 +04:00
|
|
|
strings. Two more optional arguments can be given, the first specifies if
|
|
|
|
only attribute names should be returned (TRUE or FALSE). The second
|
|
|
|
argument is a list (array) of attributes to return.
|
|
|
|
|
|
|
|
The last option is very important for performance. If you are only
|
|
|
|
interested in say the "mail" and "mailHost" attributes, specifying this in
|
1998-08-13 15:02:11 +04:00
|
|
|
the search will signficantly reduce the search time. An example of an
|
|
|
|
efficient search is
|
|
|
|
|
|
|
|
@attr = ("cn", "uid", "mail");
|
|
|
|
$filter = "(uid=*)";
|
1999-03-22 07:12:41 +03:00
|
|
|
$entry = $conn->search($base, $scope, $filter, 0, @attr);
|
1998-08-13 15:02:11 +04:00
|
|
|
while ($entry) {
|
|
|
|
# do something
|
|
|
|
$entry = $conn->nextEntry();
|
|
|
|
}
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=item B<searchURL>
|
|
|
|
|
|
|
|
This is almost identical to B<search>, except this function takes only two
|
|
|
|
arguments, an LDAP URL and an optional flag to specify if we only want the
|
|
|
|
attribute names to be returned (and no values). This function isn't very
|
|
|
|
useful, since the B<search> method will actually honor properly formed
|
|
|
|
LDAP URL's, and use it if appropriate.
|
|
|
|
|
1999-01-22 02:52:52 +03:00
|
|
|
=item B<simpleAuth>
|
|
|
|
|
|
|
|
This method will rebind the LDAP connection using new credentials (i.e. a
|
|
|
|
new user-DN and password). To rebind "anonymously", just don't pass a DN
|
|
|
|
and password, and it will default to binding as the unprivleged user. For
|
|
|
|
example:
|
|
|
|
|
|
|
|
$user = "leif";
|
|
|
|
$password = "secret";
|
|
|
|
$conn = new Mozilla::LDAP::Conn($host, $port); # Anonymous bind
|
|
|
|
die "Could't connect to LDAP server $host" unless $conn;
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
$entry = $conn->search($base, $scope, "(uid=$user)", 0, (uid));
|
1999-01-22 02:52:52 +03:00
|
|
|
exit (-1) unless $entry;
|
|
|
|
|
|
|
|
$ret = $conn->simpleAuth($entry->getDN(), $password);
|
|
|
|
exit (-1) unless $ret;
|
|
|
|
|
|
|
|
$ret = $conn->simpleAuth(); # Bind as anon again.
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
=item B<update>
|
1999-01-22 02:52:52 +03:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
After modifying an Ldap::Entry entry (see below), use the B<update>
|
|
|
|
method to commit changes to the LDAP server. Only attributes that has been
|
|
|
|
changed will be updated, assuming you have used the appropriate methods in
|
|
|
|
the Entry object. For instance, do not use B<push> or B<splice> to
|
|
|
|
modify an entry, the B<update> will not recognize such changes.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
To change the CN value for an entry, you could do
|
1998-08-13 15:02:11 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
$entry->{cn} = ["Leif Hedstrom"];
|
|
|
|
$conn->update($entry);
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=back
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=head2 Other methods
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=over 13
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
=item B<getErrorCode>
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
Return the error code (numeric) from the last LDAP API function
|
|
|
|
call. Remember that this can only be called I<after> the successful
|
1999-03-22 07:12:41 +03:00
|
|
|
creation of a new :Conn object instance. A typical usage could be
|
1998-08-13 15:02:11 +04:00
|
|
|
|
|
|
|
if (! $opt_n) {
|
|
|
|
$conn->modifyRDN($rdn, $entry->getDN());
|
|
|
|
$conn->printError() if $conn->getErrorCode();
|
|
|
|
}
|
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
Which will report any error message as generated by the call to
|
|
|
|
B<modifyRDN>. Some LDAP functions return extra error information, which
|
|
|
|
can be retrieved like:
|
|
|
|
|
|
|
|
$err = getErrorCode(\$matched, \$string);
|
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
|
1999-03-22 07:12:41 +03:00
|
|
|
$matched will then contain the portion of the matched DN (if applicable to
|
|
|
|
the error code), and $string will contain any additional error string
|
|
|
|
returned by the LDAP server.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=item B<getErrorString>
|
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
Very much like B<getErrorCode>, but return a string with a human readable
|
1998-08-13 15:02:11 +04:00
|
|
|
error message. This can then be used to print a good error message on the
|
|
|
|
console.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1999-08-25 02:30:55 +04:00
|
|
|
=item B<getLD>
|
|
|
|
|
|
|
|
Return the (internal) LDAP* connection handle, which you can use
|
|
|
|
(carefully) to call the native LDAP API functions. You shouldn't have to
|
|
|
|
use this in most cases, unless of course our OO layer is seriously flawed.
|
|
|
|
|
|
|
|
=item B<getRes>
|
|
|
|
|
|
|
|
Just like B<getLD>, except it returns the internal LDAP return message
|
|
|
|
structure. Again, use this very carefully, and be aware that this might
|
|
|
|
break in future releases of PerLDAP. These two methods can be used to call
|
|
|
|
some useful API functions, like
|
|
|
|
|
|
|
|
$cld = $conn->getLD();
|
|
|
|
$res = $conn->getRes();
|
|
|
|
$count = Mozilla::LDAP::API::ldap_count_entries($cld, $res);
|
|
|
|
|
|
|
|
=item B<isURL>
|
|
|
|
|
|
|
|
Returns TRUE or FALSE if the given argument is a properly formed URL.
|
|
|
|
|
1998-07-23 15:05:59 +04:00
|
|
|
=item B<printError>
|
|
|
|
|
|
|
|
Print the last error message on standard output.
|
|
|
|
|
|
|
|
=item B<setRebindProc>
|
|
|
|
|
|
|
|
Tell the LDAP SDK to call the provided Perl function when it has to follow
|
|
|
|
referrals. The Perl function should return an array of three elements, the
|
|
|
|
new Bind DN, password and authentication method. A typical usage is
|
|
|
|
|
|
|
|
sub rebindProc {
|
|
|
|
return ("uid=ldapadmin", "secret", LDAP_AUTH_SIMPLE);
|
|
|
|
}
|
|
|
|
|
|
|
|
$ld->setRebindProc(\&rebindProc);
|
|
|
|
|
|
|
|
=item B<setDefaultRebindProc>
|
|
|
|
|
|
|
|
This is very much like the previous function, except instead of specifying
|
|
|
|
the function to use, you give it the DN, password and Auth method. Then
|
|
|
|
we'll use a default rebind procedure (internal in C) to handle the rebind
|
|
|
|
credentials. This was a solution for the Windows/NT problem/bugs we have
|
|
|
|
with rebind procedures written in Perl.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 EXAMPLES
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
There are plenty of examples to look at, in the examples directory. We are
|
|
|
|
adding more examples every day (almost).
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 INSTALLATION
|
|
|
|
|
|
|
|
Installing this package is part of the Makefile supplied in the
|
1998-08-09 05:16:55 +04:00
|
|
|
package. See the installation procedures which are part of this package.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 AVAILABILITY
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
This package can be retrieved from a number of places, including:
|
1998-07-23 15:05:59 +04:00
|
|
|
|
1998-08-13 15:02:11 +04:00
|
|
|
http://www.mozilla.org/directory/
|
1998-08-09 05:16:55 +04:00
|
|
|
Your local CPAN server
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 CREDITS
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
Most of this code was developed by Leif Hedstrom, Netscape Communications
|
|
|
|
Corporation.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
None. :)
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
1998-08-09 05:16:55 +04:00
|
|
|
L<Mozilla::LDAP::Entry>, L<LDAP::Mozilla:Utils> L<LDAP::Mozilla:API> and
|
|
|
|
of course L<Perl>.
|
1998-07-23 15:05:59 +04:00
|
|
|
|
|
|
|
=cut
|