LDAP

From YobiWiki
Revision as of 22:32, 24 November 2010 by <bdi>PhilippeTeuwen</bdi> (talk | contribs) (Reverted edits by Etegohy (Talk) to last revision by PhilippeTeuwen)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

VRAC

apt-get install slapd phpldapadmin ldap-utils
slappasswd -> create a root pwd string
edit /etc/ldap/slapd.conf -> enable rootdn and add rootpw "{SHA}xxxx"
private:/etc/ldap# cat create_struct.ldif 
dn: dc=addressbook,dc=yobi,dc=be
description: Yobi's addessbook
objectClass: domain
objectClass: top
dc: addressbook

dn: dc=groups,dc=yobi,dc=be
description: Users groups
objectClass: domain
dc: groups

dn: dc=users,dc=yobi,dc=be
description: Users
objectClass: domain
dc: users

ldapadd -c -x -D "cn=admin,dc=yobi,dc=be" -W -f create_struct.ldif

... users groups books

/usr/lib/cgi-bin/pwab.cgi
/var/www/styles/pwab.css
/etc/pwab/config.pl

# For pwab                                                                                                                                                                
AddHandler cgi-script .cgi                                                                                                                                                
<Directory "/var/www/pwab">                                                                                                                                               
    Options +ExecCGI                                                                                                                                                      
    </Directory>                                                                                                                                                              
    
apt-get install libnet-ldap-perl
.htaccess

add schema /etc/ldap/shema/mozillaAbPersonAlpha.schema
                           walrantMozillaAbPerson.schema
/etc/ldap/slapd.conf:
#include         /etc/ldap/schema/mozillaAbPersonAlpha.schema                                                                                                             
include         /etc/ldap/schema/walrantMozillaAbPerson.schema

ACLs...

BASE DN dc=addressbook,dc=yobi,dc=be
BIND DN cn=phil,dc=users,dc=yobi,dc=be

mozimport.pl

#!/usr/bin/perl

use strict;
use MIME::Base64;
die "Usage: $0 <file>" unless $ARGV[0];
my $dest = "ou=import,ou=phil,dc=addressbook,dc=yobi,dc=be";
my %e;
my @t;
open (my $fh,$ARGV[0]) or die "Cannot open file $ARGV[0]: $!";
while (<$fh>) {

    next if m/^modifytimestamp:/i;
    next if m/^mozillaDefaultEmail/i;
    next if m/^mozillaCustom4/i;
    next if m/^objectclass/i;
    next unless m/([^:]+):(.*)/;
    my $attr = $1;
    my $val = $2;
    $#t++ if m/^dn/;
    warn "attr already exists: $attr" if $t[$#t]->{$attr};
    if ( $val =~ m/^:/ ) {
	$val = decode_base64(substr($val,2));
	$t[$#t]->{$attr . 'charset'} = 1;
    } else {
	$val = substr($val,1);
    }
    $t[$#t]->{$attr} = $val;
}
close($fh);
foreach (@t) {
    unless ($_->{'sn'}) {
	$_->{'sn'} = $_->{'givenName'};
	$_->{'givenName'} = "-";
    }
    $_->{'cn'} = $_->{'sn'} . " " . $_->{'givenName'};
    $_->{'cn'.'charset'} = $_->{'sn'.'charset'} + $_->{'givenName'.'charset'};
    $_->{'dn'} = 'cn=' . $_->{'cn'} . ',' . $dest;
    $_->{'dn'.'charset'} = $_->{'cn'.'charset'};
    foreach my $i (keys %{$_}) {
	next if $i =~ m/charset/;
	if ($_->{$i.'charset'}) {
	    $_->{$i} = encode_base64($_->{$i});
	    $_->{$i} =~ s/[\n\r]//g;
	}
    }
    my $h = '';
    $h = ':' if $_->{'dn'.'charset'};
    print "dn:$h $_->{dn}\n";
    print "objectclass: top\n";
    print "objectclass: person\n";
    print "objectclass: organizationalPerson\n";
    print "objectclass: inetOrgPerson\n";
    print "objectclass: mozillaAbPersonAlpha\n";
    print "objectclass: walrantMozillaAbPerson\n";
    
    foreach my $i (keys %{$_}) {
	next if $i =~ m/charset/;
	next if $i =~m/dn/;
	my $h='';
	if ($_->{$i.'charset'}) {
	    $h=':';
	}
	print "$i:$h $_->{$i}\n";
    }
    print "\n";
}
exit;

if ( m/objectclass: mozillaAbPersonAlpha/ ) {
    print;
    print "objectclass: walrantMozillaAbPerson\n";
    next;
    }
print;

Bugs

  • when moving card to a dir where the card dn exists already
  • Mozilla autocompletion -> account settings -> choose explicitely the LDAP server, not via default LDAP

TLS

To run the service through TLS for the outside and without TLS internally (for phpLdapAdmin and pwab):
Edit /etc/default/slapd

SLAPD_SERVICES="ldap://127.0.0.1/ ldaps://<public_ip>/"

Edit /etc/ldap/slapd and add:

include /etc/ldap/tls.conf

Create /etc/ldap/tls.conf
Here I simply reuse the certificates done for apache:

TLSCertificateFile /etc/apache2/ssl/www_yobi_be.crt
TLSCertificateKeyFile /etc/apache2/ssl/www_yobi_be.key
TLSVerifyClient never

Now it works through TLS for Mozilla Thunderbird