name mode size
..
doc 040000
etc 040000
Makefile 100644 540B
README 100644 35.36kB
api.h 100644 2.54kB
iniparser.c 100644 27.45kB
iniparser.h 100644 3.05kB
ld_session.c 100644 5.41kB
ld_session.h 100644 2.42kB
ldap_api_fn.c 100644 9.33kB
ldap_api_fn.h 100644 1.61kB
ldap_connect.c 100644 6.03kB
ldap_connect.h 100644 1.23kB
ldap_escape.c 100644 2.09kB
ldap_escape.h 100644 1.07kB
ldap_exp_fn.c 100644 6.81kB
ldap_exp_fn.h 100644 1.81kB
ldap_mod.c 100644 11.96kB
README
LDAP Module Christian Schlatter University of North Carolina <cs@unc.edu> Copyright © 2007 University of North Carolina __________________________________________________________________ Table of Contents 1. Admin Guide 1. Overview 1.1. Usage Basics 1.2. LDAP URLs 2. Dependencies 2.1. Kamailio Modules 2.2. External Libraries or Applications 3. LDAP Configuration File 3.1. Configuration File Syntax 3.2. LDAP Session Settings 3.3. Configuration File Example 4. Parameters 4.1. config_file (string) 5. Functions 5.1. ldap_search(ldap_url) 5.2. ldap_result("ldap_attr_name/avp_spec[/avp_type]" [, regex_subst]) 5.3. ldap_result_check("ldap_attr_name/string_to_match" [, regex_subst]) 5.4. ldap_result_next() 5.5. ldap_filter_url_encode(string, avp_spec) 6. Installation & Running 6.1. Compiling the LDAP module 2. Developer Guide 1. Overview 2. API Functions 2.1. ldap_params_search 2.2. ldap_url_search 2.3. ldap_result_attr_vals 2.4. ldap_value_free_len 2.5. ldap_result_next 2.6. ldap_str2scope 2.7. ldap_rfc4515_escape 2.8. get_ldap_handle 2.9. get_last_ldap_result 3. Example Usage Resources List of Tables 1.1. RFC 4515 Escaping Rules 1.2. ldap_filter_url_encode() escaping rules List of Examples 1.1. ldap_server_url examples 1.2. ldap_version example 1.3. ldap_bind_dn example 1.4. ldap_bind_password example 1.5. ldap_network_timeout example 1.6. ldap_client_bind_timeout example 1.7. Example LDAP Configuration File 1.8. config_file parameter usage 1.9. Example Usage of ldap_url 1.10. Example Usage 1.11. Example Usage 1.12. Example Usage 1.13. Example Usage 1.14. Example Usage 2.1. Example code fragment to load LDAP module API 2.2. Example LDAP module API function call Chapter 1. Admin Guide Table of Contents 1. Overview 1.1. Usage Basics 1.2. LDAP URLs 2. Dependencies 2.1. Kamailio Modules 2.2. External Libraries or Applications 3. LDAP Configuration File 3.1. Configuration File Syntax 3.2. LDAP Session Settings 3.3. Configuration File Example 4. Parameters 4.1. config_file (string) 5. Functions 5.1. ldap_search(ldap_url) 5.2. ldap_result("ldap_attr_name/avp_spec[/avp_type]" [, regex_subst]) 5.3. ldap_result_check("ldap_attr_name/string_to_match" [, regex_subst]) 5.4. ldap_result_next() 5.5. ldap_filter_url_encode(string, avp_spec) 6. Installation & Running 6.1. Compiling the LDAP module 1. Overview 1.1. Usage Basics 1.2. LDAP URLs The LDAP module implements an LDAP search interface for Kamailio. It exports script functions to perform an LDAP search operation and to store the search results as Kamailio AVPs. This allows for using LDAP directory data in the Kamailio SIP message routing script. The following features are offered by the LDAP module: * LDAP search function based on a LDAP URL * LDAP result parsing functions to store LDAP data as AVP variables * Support for accessing multiple LDAP servers * LDAP SIMPLE authentication * LDAP server failover and automatic reconnect * Configurable LDAP connection and bind timeouts * Module API for LDAP search operations that can be used by other Kamailio modules The module implementation makes use of the open source OpenLDAP library available on most UNIX/Linux platforms. Besides LDAP server failover and automatic reconnect, this module can handle multiple LDAP sessions concurrently allowing access to data stored on different LDAP servers. Each Kamailio worker process maintains one LDAP TCP connection per configured LDAP server. This enables parallel execution of LDAP requests and offloads LDAP concurrency control to the LDAP server(s). An LDAP search module API is provided that can be used by other Kamailio modules. A module using this API does not have to implement LDAP connection management and configuration, while still having access to the full OpenLDAP API for searching and result handling. Since LDAP server implementations are optimized for fast read access they are a good choice to store SIP provisioning data. Performance tests have shown that this module achieves lower data access times and higher call rates than other database modules like e.g. the Kamailio MYSQL module. 1.1. Usage Basics LDAP sessions is specified in an external configuration file (as described in Section 3, “LDAP Configuration File”). Each of these LDAP sessions includes LDAP server access parameters like server hostname or connection timeouts. Normally only a single LDAP session per process will be used unless there is a need to access more than one LDAP server. The LDAP session name will then be used in the Kamailio configuration script to refer to a specific LDAP session. The ldap_search function (Section 5.1, “ldap_search(ldap_url)”) performs an LDAP search operation. It expects an LDAP URL as input which includes the LDAP session name and search parameters. The section Section 1.2, “LDAP URLs” provides a quick overview on LDAP URLs. The result of a LDAP search is stored internally and can be accessed with one of the ldap_result* functions. ldap_result (Section 5.2, “ldap_result("ldap_attr_name/avp_spec[/avp_type]" [, regex_subst])”) stores resulting LDAP attribute values as AVPs. ldap_result_check (Section 5.3, “ldap_result_check("ldap_attr_name/string_to_match" [, regex_subst])”) is a convenience function to compare a string with LDAP attribute values using regular expression matching. Finally, ldap_result_next (Section 5.4, “ldap_result_next()”) allows using LDAP search queries that return more than one LDAP entry. All ldap_result* functions always access the LDAP result set from the last ldap_search call. This should be kept in mind when calling ldap_search more than once in the Kamailio configuration script. 1.2. LDAP URLs ldap_search expects an LDAP URL as argument. This section describes the format and semantics of an LDAP URL. RFC 4516 [RFC4516] describes the format of an LDAP Uniform Resource Locator (URL). An LDAP URL represents an LDAP search operation in a compact format. The LDAP URL format is defined as follows (slightly modified, refer to section 2 of [RFC4516] for ABNF notation): ldap://[ldap_session_name][/dn?attrs[?scope[?filter]]]] ldap_session_name An LDAP session name as defined in the LDAP configuration file. (RFC 4516 defines this as LDAP hostport parameter) dn Base Distinguished Name (DN) of LDAP search or target of non-search operation, as defined in RFC 4514 [RFC4514] attrs Comma separated list of LDAP attributes to be returned scope Scope for LDAP search, valid values are “base”, “one”, or “sub” filter LDAP search filter definition following rules of RFC 4515 [RFC4515] Note The following table lists characters that have to be escaped in LDAP search filters: Table 1.1. RFC 4515 Escaping Rules * \2a ( \28 ) \29 \ \5c Note Non-URL characters in an LDAP URL have to be escaped using percent-encoding (refer to section 2.1 of RFC 4516). In particular this means that any "?" character in an LDAP URL component must be written as "%3F", since "?" is used as a URL delimiter. The exported function ldap_filter_url_encode (Section 5.5, “ldap_filter_url_encode(string, avp_spec)”) implements RFC 4515/4516 LDAP search filter and URL escaping rules. 2. Dependencies 2.1. Kamailio Modules 2.2. External Libraries or Applications 2.1. Kamailio Modules The module depends on the following modules (the listed modules must be loaded before this module): * No dependencies on other Kamailio modules. 2.2. External Libraries or Applications The following libraries or applications must be installed before running Kamailio with this module loaded: * OpenLDAP library (libldap) v2.1 or greater, libldap header files (libldap-dev) are needed for compilation OpenSSL library if you compile your OpenLDAP library with SSL/TLS support. 3. LDAP Configuration File 3.1. Configuration File Syntax 3.2. LDAP Session Settings 3.3. Configuration File Example The module reads an external configuration file at module initialization time that includes LDAP session definitions. 3.1. Configuration File Syntax The configuration file follows the Windows INI file syntax, section names are enclosed in square brackets: [Section_Name] Any section can contain zero or more configuration key assignments of the form key = value ; comment Values can be given enclosed with quotes. If no quotes are present, the value is understood as containing all characters between the first and the last non-blank characters. Lines starting with a hash sign and blank lines are treated as comments. Each section describes one LDAP session that can be referred to in the Kamailio configuration script. Using the section name as the host part of an LDAP URL tells the module to use the LDAP session specified in the respective section. An example LDAP session specification looks like: [example_ldap] ldap_server_url = "ldap://ldap1.example.com, ldap://ldap2.example.com " ldap_bind_dn = "cn=sip_proxy,ou=accounts,dc=example,dc=com" ldap_bind_password = "pwd" ldap_network_timeout = 500 ldap_client_bind_timeout = 500 The configuration keys are explained in the following section. This LDAP session can be referred to in the routing script by using an LDAP URL like e.g. ldap://example_ldap/cn=admin,dc=example,dc=com 3.2. LDAP Session Settings ldap_server_url (mandatory) LDAP URL including fully qualified domain name or IP address of LDAP server optionally followed by a colon and TCP port to connect: ldap://<FQDN/IP>[:<port>]. Failover LDAP servers can be added, each separated by a comma. In the event of connection errors, the module tries to connect to servers in order of appearance. To connect over TLS/SSL, use ldaps://. Default value: none, this is a mandatory setting Example 1.1. ldap_server_url examples ldap_server_url = "ldap://localhost" ldap_server_url = "ldaps://ldap.example.com:7777" ldap_server_url = "ldap://ldap1.example.com, ldap://ldap2.example.com:80389" ldap_version (optional) Supported LDAP versions are 2 and 3. Default value: 3 (LDAPv3) Example 1.2. ldap_version example ldap_version = 2 ldap_bind_dn (optional) Authentication user DN used to bind to LDAP server (module currently only supports SIMPLE_AUTH). Empty string enables anonymous LDAP bind. Default value: “” (empty string --> anonymous bind) Example 1.3. ldap_bind_dn example ldap_bind_dn = "cn=root,dc=example,dc=com"; ldap_bind_password (optional) Authentication password used to bind to LDAP server (SIMPLE_AUTH). Empty string enables anonymous bind. Default value: “” (empty string --> anonymous bind) Example 1.4. ldap_bind_password example ldap_bind_password = "secret"; ldap_network_timeout (optional) LDAP TCP connect timeout in milliseconds. Setting this parameter to a low value enables fast failover if ldap_server_url contains more than one LDAP server addresses. Default value: 1000 (one second) Example 1.5. ldap_network_timeout example ldap_network_timeout = 500 ; setting TCP timeout to 500 ms ldap_client_bind_timeout (optional) LDAP bind operation timeout in milliseconds. Default value: 1000 (one second) Example 1.6. ldap_client_bind_timeout example ldap_client_bind_timeout = 1000 3.3. Configuration File Example The following configuration file example includes two LDAP session definitions that could be used e.g. for accessing H.350 data and do phone number to name mappings. Example 1.7. Example LDAP Configuration File # LDAP session "sipaccounts": # # - using LDAPv3 (default) # - two redundant LDAP servers # [sipaccounts] ldap_server_url = "ldap://h350-1.example.com, ldap://h350-2.example.com" ldap_bind_dn = "cn=sip_proxy,ou=accounts,dc=example,dc=com" ldap_bind_password = "pwd" ldap_network_timeout = 500 ldap_client_bind_timeout = 500 # LDAP session "campus": # # - using LDAPv2 # - anonymous bind # [campus] ldap_version = 2 ldap_server_url = "ldap://ldap.example.com" ldap_network_timeout = 500 ldap_client_bind_timeout = 500 4. Parameters 4.1. config_file (string) 4.1. config_file (string) Full path to LDAP configuration file. Default value: /usr/local/etc/kamailio/ldap.cfg Example 1.8. config_file parameter usage modparam("ldap", "config_file", "/usr/local/etc/kamailio/ldap.ini") 5. Functions 5.1. ldap_search(ldap_url) 5.2. ldap_result("ldap_attr_name/avp_spec[/avp_type]" [, regex_subst]) 5.3. ldap_result_check("ldap_attr_name/string_to_match" [, regex_subst]) 5.4. ldap_result_next() 5.5. ldap_filter_url_encode(string, avp_spec) 5.1. ldap_search(ldap_url) Performs an LDAP search operation using given LDAP URL and stores result internally for later retrieval by ldap_result* functions. If one or more LDAP entries are found the function returns the number of found entries which evaluates to TRUE in the Kamailio configuration script. It returns -1 (FALSE) in case no LDAP entry was found, and -2 (FALSE) if an internal error like e.g. an LDAP error occurred. Function Parameters: ldap_url An LDAP URL defining the LDAP search operation (refer to Section 1.2, “LDAP URLs” for a description of the LDAP URL format). The hostport part must be one of the LDAP session names declared in the LDAP configuration script. Kamailio pseudo variables and AVPs included in ldap_url do get substituted with their value. Example 1.9. Example Usage of ldap_url Search with LDAP session named sipaccounts, base ou=sip,dc=example,dc=com, one level deep using search filter (cn=schlatter) and returning all attributes: ldap://sipaccounts/ou=sip,dc=example,dc=com??one?(cn=schlatter) Subtree search with LDAP session named ldap1, base dc=example,dc=com using search filter (cn=$(avp(s:name))) and returning SIPIdentityUserName and SIPIdentityServiceLevel attributes ldap://ldap_1/dc=example,dc=com? SIPIdentityUserName,SIPIdentityServiceLevel?sub?(cn=$(avp(s:name))) Return Values: n > 0 (TRUE): + Found n matching LDAP entries -1 (FALSE): + No matching LDAP entries found -2 (FALSE): + LDAP error (e.g. LDAP server unavailable), or + internal error This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE, and ONREPLY_ROUTE. Example 1.10. Example Usage ... # ldap search if (!ldap_search("ldap://sipaccounts/ou=sip,dc=example,dc=com??one?(cn=$rU)")) { switch ($retcode) { case -1: # no LDAP entry found sl_send_reply("404", "User Not Found"); exit; case -2: # internal error sl_send_reply("500", "Internal server error"); exit; default: exit; } } xlog("L_INFO", "ldap_search: found [$retcode] entries for (cn=$rU)"); # save telephone number in $avp(s:tel_number) ldap_result("telephoneNumber/$avp(s:tel_number)"); ... 5.2. ldap_result("ldap_attr_name/avp_spec[/avp_type]" [, regex_subst]) This function converts LDAP attribute values into AVPs for later use in the message routing script. It accesses the LDAP result set fetched by the last ldap_search call. ldap_attr_name specifies the LDAP attribute name who's value will be stored in AVP avp_spec. Multi valued LDAP attributes generate an indexed AVP. The optional regex_subst parameter allows to further define what part of an attribute value should be stored as AVP. An AVP can either be of type string or integer. As default, ldap_result stores LDAP attribute values as AVP of type string. The optional avp_type parameter can be used to explicitly specify the type of the AVP. It can be either str for string, or int for integer. If avp_type is specified as int then ldap_result tries to convert the LDAP attribute values to integer. In this case, the values are only stored as AVP if the conversion to integer is succesfull. Function Parameters: ldap_attr_name The name of the LDAP attribute who's value should be stored, e.g. SIPIdentityServiceLevel or telephonenumber avp_spec Specification of destination AVP, e.g. $avp(s:service_level) or $avp(i:12) avp_type Optional specification of destination AVP type, either str or int. If this parameter is not specified then the LDAP attribute values are stored as AVP of type string. regex_subst Regex substitution that gets applied to LDAP attribute value before storing it as AVP, e.g. "/^sip:(.+)$/\1/" to strip off "sip:" from the beginning of an LDAP attribute value. Return Values: n > 0 (TRUE) LDAP attribute ldap_attr_name found in LDAP result set and n LDAP attribute values stored in avp_spec -1 (FALSE) No LDAP attribute ldap_attr_name found in LDAP result set -2 (FALSE) Internal error occurred This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE, and ONREPLY_ROUTE. Example 1.11. Example Usage ... # ldap_search call ... # save SIPIdentityServiceLevel in $avp(s:service_level) if (!ldap_result("SIPIdentityServiceLevel/$avp(s:service_level)")) { switch ($retcode) { case -1: # no SIPIdentityServiceLevel found sl_send_reply("403", "Forbidden"); exit; case -2: # internal error sl_send_reply("500", "Internal server error"); exit; default: exit; } } # save SIP URI domain in $avp(i:10) ldap_result("SIPIdentitySIPURI/$avp(i:10)", "/^[^@]+@(.+)$/\1/"); ... 5.3. ldap_result_check("ldap_attr_name/string_to_match" [, regex_subst]) This function compares ldap_attr_name's value with string_to_match for equality. It accesses the LDAP result set fetched by the last ldap_search call. The optional regex_subst parameter allows to further define what part of the attribute value should be used for the equality match. If ldap_attr_name is multi valued, each value is checked against string_to_match. If one or more of the values do match the function returns 1 (TRUE). Function Parameters: ldap_attr_name The name of the LDAP attribute who's value should be matched, e.g. SIPIdentitySIPURI string_to_match String to be matched. Included AVPs and pseudo variables do get expanded. regex_subst Regex substitution that gets applied to LDAP attribute value before comparing it with string_to_match, e.g. "/^[^@]@+(.+)$/\1/" to extract the domain part of a SIP URI Return Values: 1 (TRUE) One or more ldap_attr_name attribute values match string_to_match (after regex_subst is applied) -1 (FALSE) ldap_attr_name attribute not found or attribute value doesn't match string_to_match (after regex_subst is applied) -2 (FALSE) Internal error occurred This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE, and ONREPLY_ROUTE. Example 1.12. Example Usage ... # ldap_search call ... # check if 'sn' ldap attribute value equals username part of R-URI, # the same could be achieved with ldap_result_check("sn/$rU") if (!ldap_result_check("sn/$ru", "/^sip:([^@]).*$/\1/")) { switch ($retcode) { case -1: # R-URI username doesn't match sn sl_send_reply("401", "Unauthorized"); exit; case -2: # internal error sl_send_reply("500", "Internal server error"); exit; default: exit; } } ... 5.4. ldap_result_next() An LDAP search operation can return multiple LDAP entries. This function can be used to cycle through all returned LDAP entries. It returns 1 (TRUE) if there is another LDAP entry present in the LDAP result set and causes ldap_result* functions to work on the next LDAP entry. The function returns -1 (FALSE) if there are no more LDAP entries in the LDAP result set. Return Values: 1 (TRUE) Another LDAP entry is present in the LDAP result set and result pointer is incremented by one -1 (FALSE) No more LDAP entries are available -2 (FALSE) Internal error This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE, and ONREPLY_ROUTE. Example 1.13. Example Usage ... # ldap_search call ... ldap_result("telephonenumber/$avp(s:tel1)"); if (ldap_result_next()) { ldap_result("telephonenumber/$avp(s:tel2)"); } if (ldap_result_next()) { ldap_result("telephonenumber/$avp(s:tel3)"); } if (ldap_result_next()) { ldap_result("telephonenumber/$avp(s:tel4)"); } ... 5.5. ldap_filter_url_encode(string, avp_spec) This function applies the following escaping rules to string and stores the result in AVP avp_spec: Table 1.2. ldap_filter_url_encode() escaping rules character in string gets replaced with defined in * \2a RFC 4515 ( \28 RFC 4515 ) \29 RFC 4515 \ \5c RFC 4515 ? %3F RFC 4516 The string stored in AVP avp_spec can be safely used in an LDAP URL filter string. Function Parameters: string String to apply RFC 4515 and URL escaping rules to. AVPs and pseudo variables do get expanded. Example: "cn=$avp(s:name)" avp_spec Specification of AVP to store resulting RFC 4515 and URL encoded string, e.g. $avp(s:ldap_search) or $avp(i:10) Return Values: 1 (TRUE) RFC 4515 and URL encoded filter_component stored as AVP avp_name -1 (FALSE) Internal error This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE, and ONREPLY_ROUTE. Example 1.14. Example Usage ... if (!ldap_filter_url_encode("cn=$avp(s:name)", "$avp(s:name_esc)")) { # RFC 4515/URL encoding failed --> silently discard request exit; } xlog("L_INFO", "encoded LDAP filter component: [$avp(s:name_esc)]\n"); if (ldap_search( "ldap://h350/ou=commObjects,dc=example,dc=com??sub?($avp(s:name_esc))")) { ... } ... 6. Installation & Running 6.1. Compiling the LDAP module 6.1. Compiling the LDAP module OpenLDAP library (libldap) and header files (libldap-dev) v2.1 or greater (this module was tested with v2.1.3 and v2.3.32) are required for compiling the LDAP module. The OpenLDAP source is available at http://www.openldap.org/. Note that TLS support needs to be added a compile time for the libraries. The OpenLDAP library is available pre-compiled for most UNIX/Linux flavors. On Debian/Ubuntu, the following packages must be installed: # apt-get install libldap2 libldap2-dev . Chapter 2. Developer Guide Table of Contents 1. Overview 2. API Functions 2.1. ldap_params_search 2.2. ldap_url_search 2.3. ldap_result_attr_vals 2.4. ldap_value_free_len 2.5. ldap_result_next 2.6. ldap_str2scope 2.7. ldap_rfc4515_escape 2.8. get_ldap_handle 2.9. get_last_ldap_result 3. Example Usage 1. Overview The LDAP module API can be used by other Kamailio modules to implement LDAP search functionality. This frees the module implementer from having to care about LDAP connection management and configuration. In order to use this API, a module has to load the API using the load_ldap_api function which returns a pointer to a ldap_api structure. This structure includes pointers to the API functions described below. The LDAP module source file api.h includes all declarations needed to load the API, it has to be included in the file that use the API. Loading the API is typically done inside a module's mod_init call as the following example shows: Example 2.1. Example code fragment to load LDAP module API #include "../../sr_module.h" #include "../ldap/api.h" /* * global pointer to ldap api */ extern ldap_api_t ldap_api; ... static int mod_init(void) { /* * load the LDAP API */ if (load_ldap_api(&ldap_api) != 0) { LM_ERR("Unable to load LDAP API - this module requires ldap module\n"); return -1; } ... } ... The API functions can then be used like in the following example: Example 2.2. Example LDAP module API function call ... rc = ldap_api.ldap_rfc4515_escape(str1, str2, 0); ... 2. API Functions 2.1. ldap_params_search 2.2. ldap_url_search 2.3. ldap_result_attr_vals 2.4. ldap_value_free_len 2.5. ldap_result_next 2.6. ldap_str2scope 2.7. ldap_rfc4515_escape 2.8. get_ldap_handle 2.9. get_last_ldap_result 2.1. ldap_params_search Performs an LDAP search using the parameters given as function arguments. typedef int (*ldap_params_search_t)(int* _ld_result_count, char* _lds_name, char* _dn, int _scope, char** _attrs, char* _filter, ...); Function arguments: int* _ld_result_count The function stores the number of returned LDAP entries in _ld_result_count. char* _lds_name LDAP session name as configured in the LDAP module configuration file. char* _dn LDAP search DN. int _scope LDAP search scope, one of LDAP_SCOPE_ONELEVEL, LDAP_SCOPE_BASE, or LDAP_SCOPE_SUBTREE, as defined in OpenLDAP's ldap.h. char** _attrs A null-terminated array of attribute types to return from entries. If empty (NULL), all attribute types are returned. char* _filter LDAP search filter string according to RFC 4515. printf patterns in this string do get replaced with the function arguments' values following the _filter argument. Return Values: -1 Internal error. 0 Success, _ld_result_count includes the number of LDAP entries found. 2.2. ldap_url_search Performs an LDAP search using an LDAP URL. typedef int (*ldap_url_search_t)(char* _ldap_url, int* _result_count); Function arguments: char* _ldap_url LDAP URL as described in Section 1.2, “LDAP URLs”. int* _result_count The function stores the number of returned LDAP entries in _ld_result_count. Return Values: -1 Internal error. 0 Success, _ld_result_count includes the number of LDAP entries found. 2.3. ldap_result_attr_vals Retrieve the value(s) of a returned LDAP attribute. The function accesses the LDAP result returned by the last call of ldap_params_search or ldap_url_search. The berval structure is defined in OpenLDAP's ldap.h, which has to be included. This function allocates memory to store the LDAP attribute value(s). This memory has to freed with the function ldap_value_free_len (see next section). typedef int (*ldap_result_attr_vals_t)(str* _attr_name, struct berval ***_vals); typedef struct berval { ber_len_t bv_len; char *bv_val; } BerValue; Function arguments: str* _attr_name str structure holding the LDAP attribute name. struct berval ***_vals A null-terminated array of the attribute's value(s). Return Values: -1 Internal error. 0 Success, _vals includes the attribute's value(s). 1 No attribute value found. 2.4. ldap_value_free_len Function used to free memory allocated by ldap_result_attr_vals. The berval structure is defined in OpenLDAP's ldap.h, which has to be included. typedef void (*ldap_value_free_len_t)(struct berval **_vals); typedef struct berval { ber_len_t bv_len; char *bv_val; } BerValue; Function arguments: struct berval **_vals berval array returned by ldap_result_attr_vals. 2.5. ldap_result_next Increments the LDAP result pointer. typedef int (*ldap_result_next_t)(); Return Values: -1 No LDAP result found, probably because ldap_params_search or ldap_url_search was not called. 0 Success, LDAP result pointer points now to next result. 1 No more results available. 2.6. ldap_str2scope Converts LDAP search scope string into integer value e.g. for ldap_params_search. typedef int (*ldap_str2scope_t)(char* scope_str); Function arguments: char* scope_str LDAP search scope string. One of "one", "onelevel", "base", "sub", or "subtree". Return Values: -1 scope_str not recognized. n >= 0 LDAP search scope integer. 2.7. ldap_rfc4515_escape Applies escaping rules described in Section 5.5, “ldap_filter_url_encode(string, avp_spec)”. typedef int (*ldap_rfc4515_escape_t)(str *sin, str *sout, int url_encode); Function arguments: str *sin str structure holding the string to apply the escaping rules. str *sout str structure holding the escaped string. The length of this string must be at least three times the length of sin plus one. int url_encode Flag that specifies if a '?' character gets escaped with '%3F' or not. If url_encode equals 0, '?' does not get escaped. Return Values: -1 Internal error. 0 Success, sout contains escaped string. 2.8. get_ldap_handle Returns the OpenLDAP LDAP handle for a specific LDAP session. This allows a module implementor to use the OpenLDAP API functions directly, instead of using the API functions exported by the Kamailio LDAP module. The LDAP structure is defined in OpenLDAP's ldap.h, which has to be included. typedef int (*get_ldap_handle_t)(char* _lds_name, LDAP** _ldap_handle); Function arguments: char* _lds_name LDAP session name as specified in the LDAP module configuration file. LDAP** _ldap_handle OpenLDAP LDAP handle returned by this function. Return Values: -1 Internal error. 0 Success, _ldap_handle contains the OpenLDAP LDAP handle. 2.9. get_last_ldap_result Returns the OpenLDAP LDAP handle and OpenLDAP result handle of the last LDAP search operation. These handles can be used as input for OpenLDAP LDAP result API functions. LDAP and LDAPMessage structures are defined in OpenLDAP's ldap.h, which has to be included. typedef void (*get_last_ldap_result_t) (LDAP** _last_ldap_handle, LDAPMessage** _last_ldap_result); Function arguments: LDAP** _last_ldap_handle OpenLDAP LDAP handle returned by this function. LDAPMessage** _last_ldap_result OpenLDAP result handle returned by this function. 3. Example Usage The following example shows how this API can be used to perform an LDAP search operation. It is assumed that the API is loaded and available through the ldap_api pointer. ... int rc, ld_result_count, scope = 0; char* sip_username = "test"; /* * get LDAP search scope integer */ scope = ldap_api.ldap_str2scope("sub"); if (scope == -1) { LM_ERR("ldap_str2scope failed\n"); return -1; } /* * perform LDAP search */ if (ldap_api.ldap_params_search( &ld_result_count, "campus", "dc=example,dc=com", scope, NULL, "(&(objectClass=SIPIdentity)(SIPIdentityUserName=%s))", sip_username) != 0) { LM_ERR("LDAP search failed\n"); return -1; } /* * check result count */ if (ld_result_count < 1) { LM_ERR("LDAP search returned no entry\n"); return 1; } /* * get password attribute value */ struct berval **attr_vals = NULL; str ldap_pwd_attr_name = str_init("SIPIdentityPassword"); str res_password; rc = ldap_api.ldap_result_attr_vals(&ldap_pwd_attr_name, &attr_vals); if (rc < 0) { LM_ERR("ldap_result_attr_vals failed\n"); ldap_api.ldap_value_free_len(attr_vals); return -1; } if (rc == 1) { LM_INFO("No password attribute value found for [%s]\n", sip_username); ldap_api.ldap_value_free_len(attr_vals); return 2; } res_password.s = attr_vals[0]->bv_val; res_password.len = attr_vals[0]->bv_len; ldap_api.ldap_value_free_len(attr_vals); LM_INFO("Password for user [%s]: [%s]\n", sip_username, res_password.s); ... return 0; Resources [RFC4510] Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map. June 2006. Internet Engineering Task Force. [RFC4511] Lightweight Directory Access Protocol (LDAP): The Protocol. June 2006. Internet Engineering Task Force. [RFC4514] Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names. June 2006. Internet Engineering Task Force. [RFC4515] Lightweight Directory Access Protocol (LDAP): String Representation of Search Filters. June 2006. Internet Engineering Task Force. [RFC4516] Lightweight Directory Access Protocol (LDAP): Uniform Resource Locator. June 2006. Internet Engineering Task Force. [RFC2617] HTTP Authentication: Basic and Digest Access Authentication. June 1999. Internet Engineering Task Force. [RFC3261] SIP: Session Initiation Protocol. June 2002. Internet Engineering Task Force. [H.350] Directory Services Architecture for Multimedia Conferencing. August 2003. ITU-T. [H.350.4] Directory services architecture for SIP. August 2003. ITU-T.