/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at * trunk/opends/resource/legal-notices/OpenDS.LICENSE * or https://OpenDS.dev.java.net/OpenDS.LICENSE. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at * trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable, * add the following below this CDDL HEADER, with the fields enclosed * by brackets "[]" replaced with your own identifying information: * Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END * * * Copyright 2009-2010 Sun Microsystems, Inc. */ package org.opends.sdk; import java.util.Collection; import java.util.Collections; import org.opends.sdk.requests.Requests; import org.opends.sdk.requests.SearchRequest; import org.opends.sdk.responses.SearchResultEntry; import org.opends.sdk.schema.CoreSchema; import com.sun.opends.sdk.util.*; /** * The root DSE is a DSA-specific Entry (DSE) and not part of any naming context * (or any subtree), and which is uniquely identified by the empty DN. *
* A Directory Server uses the root DSE to provide information about itself * using the following set of attributes: *
* The root DSE may also include a {@code subschemaSubentry} attribute. If it * does, the attribute refers to the subschema (sub)entry holding the schema * controlling the root DSE. Clients SHOULD NOT assume that this subschema * (sub)entry controls other entries held by the server. * * @see RFC 4512 - Lightweight * Directory Access Protocol (LDAP): Directory Information Models * @see RFC 3045 - Storing Vendor * Information in the LDAP Root DSE * @see RFC 3112 - LDAP * Authentication Password Schema */ public final class RootDSE { private static final AttributeDescription ATTR_ALT_SERVER = AttributeDescription.create(CoreSchema.getAltServerAttributeType()); private static final AttributeDescription ATTR_NAMING_CONTEXTS = AttributeDescription.create(CoreSchema.getNamingContextsAttributeType()); private static final AttributeDescription ATTR_SUBSCHEMA_SUBENTRY = AttributeDescription.create(CoreSchema.getSubschemaSubentryAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_AUTH_PASSWORD_SCHEMES = AttributeDescription.create( CoreSchema.getSupportedAuthPasswordSchemesAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_CONTROL = AttributeDescription.create(CoreSchema.getSupportedControlAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_EXTENSION = AttributeDescription.create( CoreSchema.getSupportedExtensionAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_FEATURE = AttributeDescription.create(CoreSchema.getSupportedFeaturesAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_LDAP_VERSION = AttributeDescription.create( CoreSchema.getSupportedLDAPVersionAttributeType()); private static final AttributeDescription ATTR_SUPPORTED_SASL_MECHANISMS = AttributeDescription.create( CoreSchema.getSupportedSASLMechanismsAttributeType()); private static final AttributeDescription ATTR_VENDOR_NAME = AttributeDescription.create(CoreSchema.getVendorNameAttributeType()); private static final AttributeDescription ATTR_VENDOR_VERSION = AttributeDescription.create(CoreSchema.getVendorNameAttributeType()); private static final SearchRequest SEARCH_REQUEST = Requests .newSearchRequest(DN.rootDN(), SearchScope.BASE_OBJECT, Filter .getObjectClassPresentFilter(), ATTR_ALT_SERVER.toString(), ATTR_NAMING_CONTEXTS.toString(), ATTR_SUPPORTED_CONTROL.toString(), ATTR_SUPPORTED_EXTENSION.toString(), ATTR_SUPPORTED_FEATURE .toString(), ATTR_SUPPORTED_LDAP_VERSION.toString(), ATTR_SUPPORTED_SASL_MECHANISMS.toString(), ATTR_VENDOR_NAME .toString(), ATTR_VENDOR_VERSION.toString(), ATTR_SUPPORTED_AUTH_PASSWORD_SCHEMES.toString(), ATTR_SUBSCHEMA_SUBENTRY.toString(), "*"); /** * Reads the Root DSE from the Directory Server using the provided connection. *
* If the Root DSE is not returned by the Directory Server then the request
* will fail with an {@link EntryNotFoundException}. More specifically, the
* returned future will never return {@code null}.
*
* @param connection
* A connection to the Directory Server whose Root DSE is to be read.
* @param handler
* A result handler which can be used to asynchronously process the
* operation result when it is received, may be {@code null}.
* @return A future representing the result of the operation.
* @throws UnsupportedOperationException
* If the connection does not support search operations.
* @throws IllegalStateException
* If the connection has already been closed, i.e. if {@code
* isClosed() == true}.
* @throws NullPointerException
* If the {@code connection} was {@code null}.
*/
public static FutureResult
* If the Root DSE is not returned by the Directory Server then the request
* will fail with an {@link EntryNotFoundException}. More specifically, this
* method will never return {@code null}.
*
* @param connection
* A connection to the Directory Server whose Root DSE is to be read.
* @return The Directory Server's Root DSE.
* @throws ErrorResultException
* If the result code indicates that the request failed for some
* reason.
* @throws InterruptedException
* If the current thread was interrupted while waiting.
* @throws UnsupportedOperationException
* If the connection does not support search operations.
* @throws IllegalStateException
* If the connection has already been closed, i.e. if {@code
* isClosed() == true}.
* @throws NullPointerException
* If the {@code connection} was {@code null}.
*/
public static RootDSE readRootDSE(final Connection connection)
throws ErrorResultException, InterruptedException,
UnsupportedOperationException, IllegalStateException,
NullPointerException
{
final Entry entry = connection.searchSingleEntry(SEARCH_REQUEST);
return new RootDSE(entry);
}
private final Entry entry;
/**
* Creates a new Root DSE instance backed by the provided entry. Modifications
* made to {@code entry} will be reflected in the returned Root DSE. The
* returned Root DSE instance is unmodifiable and attempts to use modify any
* of the returned collections will result in a {@code
* UnsupportedOperationException}.
*
* @param entry
* The Root DSE entry.
* @throws NullPointerException
* If {@code entry} was {@code null} .
*/
public RootDSE(final Entry entry) throws NullPointerException
{
Validator.ensureNotNull(entry);
this.entry = entry;
}
/**
* Returns an unmodifiable list of URIs referring to alternative Directory
* Servers that may be contacted when the Directory Server becomes
* unavailable.
*
* URIs for Directory Servers implementing the LDAP protocol are written
* according to RFC 4516. Other kinds of URIs may be provided.
*
* If the Directory Server does not know of any other Directory Servers that
* could be used, the returned list will be empty.
*
* @return An unmodifiable list of URIs referring to alternative Directory
* Servers, which may be empty.
* @see RFC 4516 - Lightweight
* Directory Access Protocol (LDAP): Uniform Resource Locator
*/
public Collection
* If the Directory Server does not master or shadow any naming contexts, the
* returned list will be empty.
*
* @return An unmodifiable list of DNs identifying the context prefixes of the
* naming contexts, which may be empty.
*/
public Collection
* Clients SHOULD NOT assume that this subschema (sub)entry controls other
* entries held by the Directory Server.
*
* @return The DN of the subschema subentry holding the schema controlling the
* Root DSE, or {@code null} if the DN is not provided.
*/
public DN getSubschemaSubentry()
{
return getSingleValuedAttribute(ATTR_SUBSCHEMA_SUBENTRY, Functions
.valueToDN());
}
/**
* Returns an unmodifiable list of supported authentication password schemes
* which the Directory Server supports.
*
* If the Directory Server does not support any authentication password
* schemes, the returned list will be empty.
*
* @return An unmodifiable list of supported authentication password schemes,
* which may be empty.
* @see RFC 3112 - LDAP
* Authentication Password Schema
*/
public Collection
* If the Directory Server does not support any request controls, the returned
* list will be empty. Object identifiers identifying response controls may
* not be listed.
*
* @return An unmodifiable list of object identifiers identifying the request
* controls, which may be empty.
*/
public Collection
* If the Directory Server does not support any extended operations, the
* returned list will be empty.
*
* An extended operation generally consists of an extended request and an
* extended response but may also include other protocol data units (such as
* intermediate responses). The object identifier assigned to the extended
* request is used to identify the extended operation. Other object
* identifiers used in the extended operation may not be listed as values of
* this attribute.
*
* @return An unmodifiable list of object identifiers identifying the extended
* operations, which may be empty.
*/
public Collection
* If the server does not support any discoverable elective features, the
* returned list will be empty.
*
* @return An unmodifiable list of object identifiers identifying the elective
* features, which may be empty.
*/
public Collection
* The contents of the returned list may depend on the current session state
* and may be empty if the Directory Server does not support any SASL
* mechanisms.
*
* @return An unmodifiable list of the SASL mechanisms, which may be empty.
* @see RFC 4513 - Lightweight
* Directory Access Protocol (LDAP): Authentication Methods and Security
* Mechanisms
* @see RFC 4422 - Simple
* Authentication and Security Layer (SASL)
*/
public Collection
* Note that this value is typically a release value comprised of a string
* and/or a string of numbers used by the developer of the LDAP server
* product. The returned string will be unique between two versions of the
* Directory Server, but there are no other syntactic restrictions on the
* value or the way it is formatted.
*
* @return The version of the Directory Server implementation, or {@code null}
* if the vendor version is not provided.
* @see RFC 3045 - Storing Vendor
* Information in the LDAP Root DSE
*/
public String getVendorVersion()
{
return getSingleValuedAttribute(ATTR_VENDOR_VERSION, Functions
.valueToString());
}
private