summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorEndi S. Dewata <edewata@redhat.com>2011-11-08 15:18:31 -0600
committerEndi S. Dewata <edewata@redhat.com>2011-11-11 14:44:21 +0000
commitdf6bd6ab5acf6d6178f6dd726b9c5927ae7cf047 (patch)
tree972297b26ec84be8f50b4818078b03dc29bd63f9
parent97660ac4d5d55fcd0ee40dc5ed863a1e1265492b (diff)
downloadfreeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.tar.gz
freeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.tar.xz
freeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.zip
Updated sample data.
New sample data files have been added for search facet paging. Unused files have been removed. The names used in the files have been updated for consistency. Ticket #981
-rw-r--r--install/ui/test/data/aci_find.json60
-rw-r--r--install/ui/test/data/automountkey_add.json2
-rw-r--r--install/ui/test/data/automountkey_find.json4
-rw-r--r--install/ui/test/data/automountkey_show.json2
-rw-r--r--install/ui/test/data/automountlocation_add.json2
-rw-r--r--install/ui/test/data/automountlocation_find.json8
-rw-r--r--install/ui/test/data/automountlocation_find_pkeys.json35
-rw-r--r--install/ui/test/data/automountlocation_get_records.json53
-rw-r--r--install/ui/test/data/automountlocation_show.json2
-rw-r--r--install/ui/test/data/automountmap_add.json2
-rw-r--r--install/ui/test/data/automountmap_add_indirect.json2
-rw-r--r--install/ui/test/data/automountmap_find.json8
-rw-r--r--install/ui/test/data/automountmap_find_pkeys.json35
-rw-r--r--install/ui/test/data/automountmap_get_records.json69
-rw-r--r--install/ui/test/data/automountmap_show.json2
-rw-r--r--install/ui/test/data/config_show.json6
-rw-r--r--install/ui/test/data/delegation_find.json8
-rw-r--r--install/ui/test/data/delegation_list.json8
-rw-r--r--install/ui/test/data/delegation_mod.json4
-rw-r--r--install/ui/test/data/dns_find.json101
-rw-r--r--install/ui/test/data/dns_find_rr.json110
-rw-r--r--install/ui/test/data/dns_show.json38
-rw-r--r--install/ui/test/data/dnsrecord_add.json2
-rw-r--r--install/ui/test/data/dnsrecord_find.json50
-rw-r--r--install/ui/test/data/dnsrecord_find_pkeys.json83
-rw-r--r--install/ui/test/data/dnsrecord_get_records.json194
-rw-r--r--install/ui/test/data/dnsrecord_show.json4
-rw-r--r--install/ui/test/data/dnszone_add.json10
-rw-r--r--install/ui/test/data/dnszone_find.json28
-rw-r--r--install/ui/test/data/dnszone_find_pkeys.json29
-rw-r--r--install/ui/test/data/dnszone_get_records.json150
-rw-r--r--install/ui/test/data/dnszone_show.json10
-rw-r--r--install/ui/test/data/entitle_find_offline.json2
-rw-r--r--install/ui/test/data/entitle_find_online.json2
-rw-r--r--install/ui/test/data/entitle_register.json2
-rw-r--r--install/ui/test/data/group_add.json2
-rw-r--r--install/ui/test/data/group_add_member.json2
-rw-r--r--install/ui/test/data/group_find.json10
-rw-r--r--install/ui/test/data/group_find_pkeys.json41
-rw-r--r--install/ui/test/data/group_get_records.json105
-rw-r--r--install/ui/test/data/group_member_user.json1420
-rw-r--r--install/ui/test/data/group_remove_member.json2
-rw-r--r--install/ui/test/data/group_show.json270
-rw-r--r--install/ui/test/data/hbacrule_find.json2
-rw-r--r--install/ui/test/data/hbacrule_find_pkeys.json17
-rw-r--r--install/ui/test/data/hbacrule_get_records.json41
-rw-r--r--install/ui/test/data/hbacsvc_find_pkeys.json71
-rw-r--r--install/ui/test/data/hbacsvc_get_records.json149
-rw-r--r--install/ui/test/data/hbacsvcgroup_find_pkeys.json17
-rw-r--r--install/ui/test/data/hbacsvcgroup_get_records.json27
-rw-r--r--install/ui/test/data/host_add.json6
-rw-r--r--install/ui/test/data/host_find_pkeys.json23
-rw-r--r--install/ui/test/data/host_get_records.json112
-rw-r--r--install/ui/test/data/hostgroup_add.json2
-rw-r--r--install/ui/test/data/hostgroup_add_member.json2
-rw-r--r--install/ui/test/data/hostgroup_find.json4
-rw-r--r--install/ui/test/data/hostgroup_find_pkeys.json23
-rw-r--r--install/ui/test/data/hostgroup_get_records.json41
-rw-r--r--install/ui/test/data/hostgroup_show.json2
-rw-r--r--install/ui/test/data/ipa_init.json18
-rw-r--r--install/ui/test/data/ipa_init_objects.json4
-rw-r--r--install/ui/test/data/krbtpolicy_show.json6
-rw-r--r--install/ui/test/data/netgroup_add.json4
-rw-r--r--install/ui/test/data/netgroup_add_member.json4
-rw-r--r--install/ui/test/data/netgroup_find.json14
-rw-r--r--install/ui/test/data/netgroup_find_pkeys.json23
-rw-r--r--install/ui/test/data/netgroup_get_records.json64
-rw-r--r--install/ui/test/data/netgroup_show.json4
-rw-r--r--install/ui/test/data/permission_add.json2
-rw-r--r--install/ui/test/data/permission_find_pkeys.json35
-rw-r--r--install/ui/test/data/permission_get_records.json101
-rw-r--r--install/ui/test/data/permission_show.json4
-rw-r--r--install/ui/test/data/privilege_find.json32
-rw-r--r--install/ui/test/data/privilege_find_pkeys.json95
-rw-r--r--install/ui/test/data/privilege_get_records.json283
-rw-r--r--install/ui/test/data/privilege_show.json4
-rw-r--r--install/ui/test/data/pwpolicy_find.json6
-rw-r--r--install/ui/test/data/pwpolicy_find_pkeys.json27
-rw-r--r--install/ui/test/data/pwpolicy_get_records.json85
-rw-r--r--install/ui/test/data/pwpolicy_show.json2
-rw-r--r--install/ui/test/data/role_find.json2
-rw-r--r--install/ui/test/data/role_find_pkeys.json17
-rw-r--r--install/ui/test/data/role_get_records.json23
-rw-r--r--install/ui/test/data/role_show.json2
-rw-r--r--install/ui/test/data/rolegroup_add.json22
-rw-r--r--install/ui/test/data/rolegroup_add_member.json27
-rw-r--r--install/ui/test/data/rolegroup_del.json9
-rw-r--r--install/ui/test/data/rolegroup_find.json185
-rw-r--r--install/ui/test/data/rolegroup_remove_member.json24
-rw-r--r--install/ui/test/data/rolegroup_show.json20
-rw-r--r--install/ui/test/data/service_find_pkeys.json29
-rw-r--r--install/ui/test/data/service_get_records.json61
-rw-r--r--install/ui/test/data/sudocmd_find_pkeys.json23
-rw-r--r--install/ui/test/data/sudocmd_get_records.json31
-rw-r--r--install/ui/test/data/sudocmdgroup_find_pkeys.json23
-rw-r--r--install/ui/test/data/sudocmdgroup_get_records.json41
-rw-r--r--install/ui/test/data/sudorule_find_pkeys.json17
-rw-r--r--install/ui/test/data/sudorule_get_records.json20
-rw-r--r--install/ui/test/data/taskgroup_find.json554
-rw-r--r--install/ui/test/data/user_add.json4
-rw-r--r--install/ui/test/data/user_find.json200
-rw-r--r--install/ui/test/data/user_find_pkeys.json1211
-rw-r--r--install/ui/test/data/user_get_records.json1422
-rw-r--r--install/ui/test/data/user_mod.json6
-rw-r--r--install/ui/test/data/user_show.json8
-rw-r--r--install/ui/test/data/whoami.json2
106 files changed, 6839 insertions, 1479 deletions
diff --git a/install/ui/test/data/aci_find.json b/install/ui/test/data/aci_find.json
deleted file mode 100644
index d1687c112..000000000
--- a/install/ui/test/data/aci_find.json
+++ /dev/null
@@ -1,60 +0,0 @@
-{
- "error": null,
- "id": 6,
- "result": {
- "count": 53,
- "result": [
- "(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey\")(version 3.0;acl \"Enable Anonymous access\";allow (read,search,compare) userdn = \"ldap:///anyone\";)",
- "(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey || ipaUniqueId || memberOf || serverHostName || enrolledBy\")(version 3.0;acl \"Admin can manage any entry\";allow (all) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword\")(version 3.0;acl \"Self can write own password\";allow (write) userdn = \"ldap:///self\";)",
- "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Admins can write passwords\";allow (add,delete,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Password change service can read/write passwords\";allow (read,write) userdn = \"ldap:///krbprincipalname=kadmin/changepw@AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength\")(targetfilter = \"(objectClass=krbPwdPolicy)\")(version 3.0;acl \"Admins can write password policies\";allow (read,search,compare,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou\")(version 3.0;acl \"Self service\";allow (write) userdn = \"ldap:///self\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate status,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Get Certificates status from the CA\";allow (write) groupdn = \"ldap:///cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Users\";allow (delete) groupdn = \"ldap:///cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify group membership\";allow (write) groupdn = \"ldap:///cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Services\";allow (add) groupdn = \"ldap:///cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"change_password\";allow (write) groupdn = \"ldap:///cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Groups\";allow (add) groupdn = \"ldap:///cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hostgroups\";allow (write) groupdn = \"ldap:///cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Roles\";allow (write) groupdn = \"ldap:///cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"memberhost || externalhost || memberuser || member\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroup membership\";allow (write) groupdn = \"ldap:///cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"userCertificate\")(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Services\";allow (write) groupdn = \"ldap:///cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hostgroups\";allow (add) groupdn = \"ldap:///cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount maps\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount keys\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Services\";allow (delete) groupdn = \"ldap:///cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Users\";allow (add) groupdn = \"ldap:///cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"cn || description || l || location || nshardwareplatform || nsosversion\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hosts\";allow (write) groupdn = \"ldap:///cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"member\")(target = \"ldap:///cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add user to default group\";allow (write) groupdn = \"ldap:///cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hostgroups\";allow (delete) groupdn = \"ldap:///cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Remove entitlement entries\";allow (delete) groupdn = \"ldap:///cn=removeentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
- "(targetattr = \"krbPrincipalName || enrolledBy || objectClass\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Enroll a host\";allow (write) groupdn = \"ldap:///cn=enroll_host,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hosts\";allow (add) groupdn = \"ldap:///cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove netgroups\";allow (delete) groupdn = \"ldap:///cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"description\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroups\";allow (write) groupdn = \"ldap:///cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify role group membership\";allow (write) groupdn = \"ldap:///cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"userCertificate\")(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Modify entitlements\";allow (write) groupdn = \"ldap:///cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
- "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify task group membership\";allow (write) groupdn = \"ldap:///cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Roles\";allow (add) groupdn = \"ldap:///cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate remove hold,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Certificate Remove Hold\";allow (write) groupdn = \"ldap:///cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Roles\";allow (delete) groupdn = \"ldap:///cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount maps\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou || mepManagedEntry || objectclass\")(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Users\";allow (write) groupdn = \"ldap:///cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add netgroups\";allow (add) groupdn = \"ldap:///cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hosts\";allow (delete) groupdn = \"ldap:///cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Add entitlements\";allow (add) groupdn = \"ldap:///cn=addentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
- "(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount keys\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Groups\";allow (delete) groupdn = \"ldap:///cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=retrieve certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Retrieve Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=revoke certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Revoke Certificate\";allow (write) groupdn = \"ldap:///cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"krbPrincipalKey || krbLastPwdChange\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Manage host keytab\";allow (write) groupdn = \"ldap:///cn=manage_host_keytab,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"cn || description || gidnumber || objectclass || mepManagedBy\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Groups\";allow (write) groupdn = \"ldap:///cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify host group membership\";allow (write) groupdn = \"ldap:///cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
- "(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate different host,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from a different host\";allow (write) groupdn = \"ldap:///cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)"
- ],
- "summary": "53 ACIs matched"
- }
-}
diff --git a/install/ui/test/data/automountkey_add.json b/install/ui/test/data/automountkey_add.json
index 2c0193cdd..c4e442d47 100644
--- a/install/ui/test/data/automountkey_add.json
+++ b/install/ui/test/data/automountkey_add.json
@@ -12,7 +12,7 @@
"description": [
"/var/log/ipa mountinfogoeshere"
],
- "dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automount",
"top"
diff --git a/install/ui/test/data/automountkey_find.json b/install/ui/test/data/automountkey_find.json
index 47326a33c..3123b551d 100644
--- a/install/ui/test/data/automountkey_find.json
+++ b/install/ui/test/data/automountkey_find.json
@@ -14,7 +14,7 @@
"description": [
"nfsserver:/var/log/dirsrv /var/log/dirsrv"
],
- "dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automount",
"top"
@@ -30,7 +30,7 @@
"description": [
"nfsserver:/var/log/ipa /var/log/ipa"
],
- "dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automount",
"top"
diff --git a/install/ui/test/data/automountkey_show.json b/install/ui/test/data/automountkey_show.json
index f4c06716c..599e2a5a0 100644
--- a/install/ui/test/data/automountkey_show.json
+++ b/install/ui/test/data/automountkey_show.json
@@ -20,7 +20,7 @@
"description": [
"/home auto.home"
],
- "dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automount",
"top"
diff --git a/install/ui/test/data/automountlocation_add.json b/install/ui/test/data/automountlocation_add.json
index 4e810eb0b..da0c871ac 100644
--- a/install/ui/test/data/automountlocation_add.json
+++ b/install/ui/test/data/automountlocation_add.json
@@ -6,7 +6,7 @@
"cn": [
"YYZ"
],
- "dn": "cn=yyz,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=yyz,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"nscontainer",
"top"
diff --git a/install/ui/test/data/automountlocation_find.json b/install/ui/test/data/automountlocation_find.json
index 0adc74835..333baab16 100644
--- a/install/ui/test/data/automountlocation_find.json
+++ b/install/ui/test/data/automountlocation_find.json
@@ -8,25 +8,25 @@
"cn": [
"BOS"
],
- "dn": "cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=bos,cn=automount,dc=example,dc=com"
},
{
"cn": [
"BRNO"
],
- "dn": "cn=brno,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=brno,cn=automount,dc=example,dc=com"
},
{
"cn": [
"default"
],
- "dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=default,cn=automount,dc=example,dc=com"
},
{
"cn": [
"RDU"
],
- "dn": "cn=rdu,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=rdu,cn=automount,dc=example,dc=com"
}
],
"summary": null,
diff --git a/install/ui/test/data/automountlocation_find_pkeys.json b/install/ui/test/data/automountlocation_find_pkeys.json
new file mode 100644
index 000000000..333baab16
--- /dev/null
+++ b/install/ui/test/data/automountlocation_find_pkeys.json
@@ -0,0 +1,35 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 4,
+ "result": [
+ {
+ "cn": [
+ "BOS"
+ ],
+ "dn": "cn=bos,cn=automount,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "BRNO"
+ ],
+ "dn": "cn=brno,cn=automount,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "default"
+ ],
+ "dn": "cn=default,cn=automount,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "RDU"
+ ],
+ "dn": "cn=rdu,cn=automount,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/automountlocation_get_records.json b/install/ui/test/data/automountlocation_get_records.json
new file mode 100644
index 000000000..ece79d39e
--- /dev/null
+++ b/install/ui/test/data/automountlocation_get_records.json
@@ -0,0 +1,53 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 4,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "BOS"
+ ],
+ "dn": "cn=bos,cn=automount,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "BOS"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "BRNO"
+ ],
+ "dn": "cn=brno,cn=automount,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "BRNO"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "default"
+ ],
+ "dn": "cn=default,cn=automount,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "default"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "RDU"
+ ],
+ "dn": "cn=rdu,cn=automount,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "RDU"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/automountlocation_show.json b/install/ui/test/data/automountlocation_show.json
index 97ce2624f..79c83e608 100644
--- a/install/ui/test/data/automountlocation_show.json
+++ b/install/ui/test/data/automountlocation_show.json
@@ -6,7 +6,7 @@
"cn": [
"default"
],
- "dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=default,cn=automount,dc=example,dc=com"
},
"summary": null,
"value": "default"
diff --git a/install/ui/test/data/automountmap_add.json b/install/ui/test/data/automountmap_add.json
index 129aef1a8..77db2c3d0 100644
--- a/install/ui/test/data/automountmap_add.json
+++ b/install/ui/test/data/automountmap_add.json
@@ -6,7 +6,7 @@
"automountmapname": [
"auto.log"
],
- "dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
diff --git a/install/ui/test/data/automountmap_add_indirect.json b/install/ui/test/data/automountmap_add_indirect.json
index f5ea1ed23..c2efba4a8 100644
--- a/install/ui/test/data/automountmap_add_indirect.json
+++ b/install/ui/test/data/automountmap_add_indirect.json
@@ -9,7 +9,7 @@
"description": [
"test"
],
- "dn": "automountmapname=test,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=test,cn=default,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
diff --git a/install/ui/test/data/automountmap_find.json b/install/ui/test/data/automountmap_find.json
index 2cd077d74..aaa0d71cf 100644
--- a/install/ui/test/data/automountmap_find.json
+++ b/install/ui/test/data/automountmap_find.json
@@ -8,7 +8,7 @@
"automountmapname": [
"auto.direct"
],
- "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
@@ -18,7 +18,7 @@
"automountmapname": [
"auto.home"
],
- "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
@@ -28,7 +28,7 @@
"automountmapname": [
"auto.log"
],
- "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
@@ -38,7 +38,7 @@
"automountmapname": [
"auto.master"
],
- "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
"objectclass": [
"automountmap",
"top"
diff --git a/install/ui/test/data/automountmap_find_pkeys.json b/install/ui/test/data/automountmap_find_pkeys.json
new file mode 100644
index 000000000..5a6321aaa
--- /dev/null
+++ b/install/ui/test/data/automountmap_find_pkeys.json
@@ -0,0 +1,35 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 4,
+ "result": [
+ {
+ "automountmapname": [
+ "auto.direct"
+ ],
+ "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
+ },
+ {
+ "automountmapname": [
+ "auto.home"
+ ],
+ "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
+ },
+ {
+ "automountmapname": [
+ "auto.log"
+ ],
+ "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
+ },
+ {
+ "automountmapname": [
+ "auto.master"
+ ],
+ "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/automountmap_get_records.json b/install/ui/test/data/automountmap_get_records.json
new file mode 100644
index 000000000..0e9079e5c
--- /dev/null
+++ b/install/ui/test/data/automountmap_get_records.json
@@ -0,0 +1,69 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 4,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "automountmapname": [
+ "auto.direct"
+ ],
+ "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
+ "objectclass": [
+ "automountmap",
+ "top"
+ ]
+ },
+ "summary": null,
+ "value": "auto.direct"
+ },
+ {
+ "error": null,
+ "result": {
+ "automountmapname": [
+ "auto.home"
+ ],
+ "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
+ "objectclass": [
+ "automountmap",
+ "top"
+ ]
+ },
+ "summary": null,
+ "value": "auto.home"
+ },
+ {
+ "error": null,
+ "result": {
+ "automountmapname": [
+ "auto.log"
+ ],
+ "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
+ "objectclass": [
+ "automountmap",
+ "top"
+ ]
+ },
+ "summary": null,
+ "value": "auto.log"
+ },
+ {
+ "error": null,
+ "result": {
+ "automountmapname": [
+ "auto.master"
+ ],
+ "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
+ "objectclass": [
+ "automountmap",
+ "top"
+ ]
+ },
+ "summary": null,
+ "value": "auto.master"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/automountmap_show.json b/install/ui/test/data/automountmap_show.json
index 8380a6ca1..10a9898de 100644
--- a/install/ui/test/data/automountmap_show.json
+++ b/install/ui/test/data/automountmap_show.json
@@ -6,7 +6,7 @@
"automountmapname": [
"live"
],
- "dn": "automountmapname=live,cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "automountmapname=live,cn=bos,cn=automount,dc=example,dc=com"
},
"summary": null,
"value": "live"
diff --git a/install/ui/test/data/config_show.json b/install/ui/test/data/config_show.json
index e3b6154b9..dd4485c3e 100644
--- a/install/ui/test/data/config_show.json
+++ b/install/ui/test/data/config_show.json
@@ -28,15 +28,15 @@
"cn": [
"ipaConfig"
],
- "dn": "cn=ipaconfig,cn=etc,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=ipaconfig,cn=etc,dc=dev,dc=example,dc=com",
"ipacertificatesubjectbase": [
- "O=IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "O=DEV.EXAMPLE.COM"
],
"ipaconfigstring": [
"AllowNThash"
],
"ipadefaultemaildomain": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"ipadefaultloginshell": [
"/bin/sh"
diff --git a/install/ui/test/data/delegation_find.json b/install/ui/test/data/delegation_find.json
index 82b31fc58..da6d91394 100644
--- a/install/ui/test/data/delegation_find.json
+++ b/install/ui/test/data/delegation_find.json
@@ -9,9 +9,9 @@
"attrs": [
"cn"
],
- "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
+ "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)",
"group": "muppets",
- "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
"permissions": [
"write"
]
@@ -21,9 +21,9 @@
"attrs": [
"title"
],
- "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
+ "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
"group": "muppets",
- "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
"permissions": [
"write"
]
diff --git a/install/ui/test/data/delegation_list.json b/install/ui/test/data/delegation_list.json
index d4d9fc060..ca9b717e1 100644
--- a/install/ui/test/data/delegation_list.json
+++ b/install/ui/test/data/delegation_list.json
@@ -9,9 +9,9 @@
"attrs": [
"cn"
],
- "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
+ "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)",
"group": "muppets",
- "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
"permissions": [
"write"
]
@@ -21,9 +21,9 @@
"attrs": [
"title"
],
- "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
+ "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
"group": "muppets",
- "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
"permissions": [
"write"
]
diff --git a/install/ui/test/data/delegation_mod.json b/install/ui/test/data/delegation_mod.json
index 9f7da68bf..78ae7b213 100644
--- a/install/ui/test/data/delegation_mod.json
+++ b/install/ui/test/data/delegation_mod.json
@@ -7,9 +7,9 @@
"attrs": [
"title"
],
- "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
+ "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
"group": "muppets",
- "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
"permissions": [
"add",
"delete"
diff --git a/install/ui/test/data/dns_find.json b/install/ui/test/data/dns_find.json
deleted file mode 100644
index c3b49f413..000000000
--- a/install/ui/test/data/dns_find.json
+++ /dev/null
@@ -1,101 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "count": 3,
- "result": [
- {
- "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "ayoung.boston.devel.redhat.com"
- ],
- "idnssoaexpire": [
- "1209600"
- ],
- "idnssoaminimum": [
- "3600"
- ],
- "idnssoamname": [
- "ipa.ayoung.boston.devel.redhat.com."
- ],
- "idnssoarefresh": [
- "3600"
- ],
- "idnssoaretry": [
- "900"
- ],
- "idnssoarname": [
- "root.ipa.ayoung.boston.devel.redhat.com."
- ],
- "idnssoaserial": [
- "2010061001"
- ],
- "idnszoneactive": [
- "TRUE"
- ]
- },
- {
- "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "122.168.192.in-addr.arpa"
- ],
- "idnssoaexpire": [
- "1209600"
- ],
- "idnssoaminimum": [
- "3600"
- ],
- "idnssoamname": [
- "ipa.ayoung.boston.devel.redhat.com."
- ],
- "idnssoarefresh": [
- "3600"
- ],
- "idnssoaretry": [
- "900"
- ],
- "idnssoarname": [
- "root.122.168.192.in-addr.arpa."
- ],
- "idnssoaserial": [
- "2010061001"
- ],
- "idnszoneactive": [
- "TRUE"
- ]
- },
- {
- "dn": "idnsname=redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "redhat.com"
- ],
- "idnssoaexpire": [
- "1209600"
- ],
- "idnssoaminimum": [
- "3600"
- ],
- "idnssoamname": [
- "127.0.0.1"
- ],
- "idnssoarefresh": [
- "3600"
- ],
- "idnssoaretry": [
- "900"
- ],
- "idnssoarname": [
- "root.redhat.com."
- ],
- "idnssoaserial": [
- "2010061001"
- ],
- "idnszoneactive": [
- "TRUE"
- ]
- }
- ],
- "summary": null,
- "truncated": false
- }
-} \ No newline at end of file
diff --git a/install/ui/test/data/dns_find_rr.json b/install/ui/test/data/dns_find_rr.json
deleted file mode 100644
index 4183f703f..000000000
--- a/install/ui/test/data/dns_find_rr.json
+++ /dev/null
@@ -1,110 +0,0 @@
-{
- "error": null,
- "id": 6,
- "result": {
- "count": 11,
- "result": [
- {
- "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "ayoung.boston.devel.redhat.com"
- ],
- "nsrecord": [
- "ipa.ayoung.boston.devel.redhat.com."
- ]
- },
- {
- "arecord": [
- "192.168.122.81"
- ],
- "dn": "idnsname=ipa,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "ipa"
- ]
- },
- {
- "dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_ldap._tcp"
- ],
- "srvrecord": [
- "0 100 389 ipa"
- ]
- },
- {
- "dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kerberos"
- ],
- "txtrecord": [
- "AYOUNG.BOSTON.DEVEL.REDHAT.COM"
- ]
- },
- {
- "dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kerberos._tcp"
- ],
- "srvrecord": [
- "0 100 88 ipa"
- ]
- },
- {
- "dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kerberos._udp"
- ],
- "srvrecord": [
- "0 100 88 ipa"
- ]
- },
- {
- "dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kerberos-master._tcp"
- ],
- "srvrecord": [
- "0 100 88 ipa"
- ]
- },
- {
- "dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kerberos-master._udp"
- ],
- "srvrecord": [
- "0 100 88 ipa"
- ]
- },
- {
- "dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kpasswd._tcp"
- ],
- "srvrecord": [
- "0 100 464 ipa"
- ]
- },
- {
- "dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_kpasswd._udp"
- ],
- "srvrecord": [
- "0 100 464 ipa"
- ]
- },
- {
- "dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "_ntp._udp"
- ],
- "srvrecord": [
- "0 100 123 ipa"
- ]
- }
- ],
- "summary": null,
- "truncated": false
- }
-} \ No newline at end of file
diff --git a/install/ui/test/data/dns_show.json b/install/ui/test/data/dns_show.json
deleted file mode 100644
index 3f3046a51..000000000
--- a/install/ui/test/data/dns_show.json
+++ /dev/null
@@ -1,38 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "result": {
- "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "idnsname": [
- "ayoung.boston.devel.redhat.com"
- ],
- "idnssoaexpire": [
- "1209600"
- ],
- "idnssoaminimum": [
- "3600"
- ],
- "idnssoamname": [
- "ipa.ayoung.boston.devel.redhat.com."
- ],
- "idnssoarefresh": [
- "3600"
- ],
- "idnssoaretry": [
- "900"
- ],
- "idnssoarname": [
- "root.ipa.ayoung.boston.devel.redhat.com."
- ],
- "idnssoaserial": [
- "2010061001"
- ],
- "idnszoneactive": [
- "TRUE"
- ]
- },
- "summary": null,
- "value": "ayoung.boston.devel.redhat.com"
- }
-} \ No newline at end of file
diff --git a/install/ui/test/data/dnsrecord_add.json b/install/ui/test/data/dnsrecord_add.json
index 968d3f606..7cbf570da 100644
--- a/install/ui/test/data/dnsrecord_add.json
+++ b/install/ui/test/data/dnsrecord_add.json
@@ -6,7 +6,7 @@
"arecord": [
"1.2.3.4"
],
- "dn": "idnsname=a4,idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=a4,idnsname=dev.example.com,cn=dns,dc=example,dc=com",
"idnsname": [
"a4"
],
diff --git a/install/ui/test/data/dnsrecord_find.json b/install/ui/test/data/dnsrecord_find.json
index 87160e55e..8ca2283d8 100644
--- a/install/ui/test/data/dnsrecord_find.json
+++ b/install/ui/test/data/dnsrecord_find.json
@@ -5,102 +5,102 @@
"count": 12,
"result": [
{
- "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"@"
],
"nsrecord": [
- "server15.ayoung.boston.devel.redhat.com."
+ "dev.example.com."
]
},
{
- "dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kerberos"
],
"txtrecord": [
- "SERVER15.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "DEV.EXAMPLE.COM"
]
},
{
- "dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kerberos-master._tcp"
],
"srvrecord": [
- "0 100 88 server15"
+ "0 100 88 dev"
]
},
{
- "dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kerberos-master._udp"
],
"srvrecord": [
- "0 100 88 server15"
+ "0 100 88 dev"
]
},
{
- "dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kerberos._tcp"
],
"srvrecord": [
- "0 100 88 server15"
+ "0 100 88 dev"
]
},
{
- "dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kerberos._udp"
],
"srvrecord": [
- "0 100 88 server15"
+ "0 100 88 dev"
]
},
{
- "dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kpasswd._tcp"
],
"srvrecord": [
- "0 100 464 server15"
+ "0 100 464 dev"
]
},
{
- "dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_kpasswd._udp"
],
"srvrecord": [
- "0 100 464 server15"
+ "0 100 464 dev"
]
},
{
- "dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_ldap._tcp"
],
"srvrecord": [
- "0 100 389 server15"
+ "0 100 389 dev"
]
},
{
- "dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"_ntp._udp"
],
"srvrecord": [
- "0 100 123 server15"
+ "0 100 123 dev"
]
},
{
"aaaarecord": [
"fec0::5054:ff:feb5:5a47"
],
- "dn": "idnsname=server15,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
- "server15"
+ "dev"
]
},
{
@@ -114,7 +114,7 @@
"1.3.5.7",
"10.10.2.1"
],
- "dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"testrec"
],
@@ -122,10 +122,10 @@
"key"
],
"srvrecord": [
- "1 1 80 server15"
+ "1 1 80 dev"
],
"txtrecord": [
- "A TExt Record",
+ "A Text Record",
"Another Text Record"
]
}
diff --git a/install/ui/test/data/dnsrecord_find_pkeys.json b/install/ui/test/data/dnsrecord_find_pkeys.json
new file mode 100644
index 000000000..aec4c9093
--- /dev/null
+++ b/install/ui/test/data/dnsrecord_find_pkeys.json
@@ -0,0 +1,83 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 12,
+ "result": [
+ {
+ "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "@"
+ ]
+ },
+ {
+ "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos"
+ ]
+ },
+ {
+ "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos-master._tcp"
+ ]
+ },
+ {
+ "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos-master._udp"
+ ]
+ },
+ {
+ "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos._tcp"
+ ]
+ },
+ {
+ "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos._udp"
+ ]
+ },
+ {
+ "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kpasswd._tcp"
+ ]
+ },
+ {
+ "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kpasswd._udp"
+ ]
+ },
+ {
+ "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_ldap._tcp"
+ ]
+ },
+ {
+ "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_ntp._udp"
+ ]
+ },
+ {
+ "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "dev"
+ ]
+ },
+ {
+ "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "testrec"
+ ]
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/dnsrecord_get_records.json b/install/ui/test/data/dnsrecord_get_records.json
new file mode 100644
index 000000000..d2dd03e01
--- /dev/null
+++ b/install/ui/test/data/dnsrecord_get_records.json
@@ -0,0 +1,194 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 12,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "@"
+ ],
+ "nsrecord": [
+ "dev.example.com."
+ ]
+ },
+ "summary": null,
+ "value": "@"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos"
+ ],
+ "txtrecord": [
+ "DEV.EXAMPLE.COM"
+ ]
+ },
+ "summary": null,
+ "value": "_kerberos"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos-master._tcp"
+ ],
+ "srvrecord": [
+ "0 100 88 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kerberos-master._tcp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos-master._udp"
+ ],
+ "srvrecord": [
+ "0 100 88 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kerberos-master._udp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos._tcp"
+ ],
+ "srvrecord": [
+ "0 100 88 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kerberos._tcp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kerberos._udp"
+ ],
+ "srvrecord": [
+ "0 100 88 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kerberos._udp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kpasswd._tcp"
+ ],
+ "srvrecord": [
+ "0 100 464 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kpasswd._tcp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_kpasswd._udp"
+ ],
+ "srvrecord": [
+ "0 100 464 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_kpasswd._udp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_ldap._tcp"
+ ],
+ "srvrecord": [
+ "0 100 389 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_ldap._tcp"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "_ntp._udp"
+ ],
+ "srvrecord": [
+ "0 100 123 dev"
+ ]
+ },
+ "summary": null,
+ "value": "_ntp._udp"
+ },
+ {
+ "error": null,
+ "result": {
+ "aaaarecord": [
+ "fec0::5054:ff:feb5:5a47"
+ ],
+ "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "dev"
+ ]
+ },
+ "summary": null,
+ "value": "dev"
+ },
+ {
+ "error": null,
+ "result": {
+ "aaaarecord": [
+ "feed:babe:beef:cafe::0001",
+ "feed:babe:beef:cafe::0002",
+ "feed:babe:beef:cafe::0004"
+ ],
+ "arecord": [
+ "3.4.5.6",
+ "1.3.5.7",
+ "10.10.2.1"
+ ],
+ "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
+ "idnsname": [
+ "testrec"
+ ],
+ "keyrecord": [
+ "key"
+ ],
+ "srvrecord": [
+ "1 1 80 dev"
+ ],
+ "txtrecord": [
+ "A Text Record",
+ "Another Text Record"
+ ]
+ },
+ "summary": null,
+ "value": "testrec"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/dnsrecord_show.json b/install/ui/test/data/dnsrecord_show.json
index e2a412546..d15ef5398 100644
--- a/install/ui/test/data/dnsrecord_show.json
+++ b/install/ui/test/data/dnsrecord_show.json
@@ -48,7 +48,7 @@
"sshfprecord": "rscwo",
"txtrecord": "rscwo"
},
- "dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
"idnsname": [
"testrec"
],
@@ -60,7 +60,7 @@
"idnsrecord"
],
"srvrecord": [
- "1 1 80 server15"
+ "1 1 80 dev"
],
"txtrecord": [
"A Text Record",
diff --git a/install/ui/test/data/dnszone_add.json b/install/ui/test/data/dnszone_add.json
index 6870acc5b..3cb833056 100644
--- a/install/ui/test/data/dnszone_add.json
+++ b/install/ui/test/data/dnszone_add.json
@@ -3,12 +3,12 @@
"id": 3,
"result": {
"result": {
- "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
"idnsallowdynupdate": [
"FALSE"
],
"idnsname": [
- "henson.ayoung.boston.devel.redhat.com"
+ "dev.example.com"
],
"idnssoaexpire": [
"1209600"
@@ -17,7 +17,7 @@
"3600"
],
"idnssoamname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"idnssoarefresh": [
"3600"
@@ -26,7 +26,7 @@
"900"
],
"idnssoarname": [
- "root.henson.ayoung.boston.devel.redhat.com."
+ "root.dev.example.com."
],
"idnssoaserial": [
"2010021201"
@@ -41,6 +41,6 @@
]
},
"summary": null,
- "value": "henson.ayoung.boston.devel.redhat.com"
+ "value": "dev.example.com"
}
} \ No newline at end of file
diff --git a/install/ui/test/data/dnszone_find.json b/install/ui/test/data/dnszone_find.json
index b8f76d417..fdf2c8e40 100644
--- a/install/ui/test/data/dnszone_find.json
+++ b/install/ui/test/data/dnszone_find.json
@@ -5,12 +5,12 @@
"count": 3,
"result": [
{
- "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
"idnsallowdynupdate": [
"TRUE"
],
"idnsname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"idnssoaexpire": [
"1209600"
@@ -19,7 +19,7 @@
"3600"
],
"idnssoamname": [
- "ipa.ayoung.boston.devel.redhat.com."
+ "ipa.example.com."
],
"idnssoarefresh": [
"3600"
@@ -28,19 +28,19 @@
"900"
],
"idnssoarname": [
- "root.ipa.ayoung.boston.devel.redhat.com."
+ "root.ipa.example.com."
],
"idnssoaserial": [
"2010021201"
],
"idnsupdatepolicy": [
- "grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-self * A;"
+ "grant EXAMPLE.COM krb5-self * A;"
],
"idnszoneactive": [
"TRUE"
],
"nsrecord": [
- "ipa.ayoung.boston.devel.redhat.com."
+ "ipa.example.com."
],
"objectclass": [
"top",
@@ -49,7 +49,7 @@
]
},
{
- "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
"idnsallowdynupdate": [
"TRUE"
],
@@ -63,7 +63,7 @@
"3600"
],
"idnssoamname": [
- "ipa.ayoung.boston.devel.redhat.com."
+ "ipa.example.com."
],
"idnssoarefresh": [
"3600"
@@ -78,13 +78,13 @@
"2010021201"
],
"idnsupdatepolicy": [
- "grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
+ "grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
],
"idnszoneactive": [
"TRUE"
],
"nsrecord": [
- "ipa.ayoung.boston.devel.redhat.com."
+ "ipa.example.com."
],
"objectclass": [
"top",
@@ -93,12 +93,12 @@
]
},
{
- "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
"idnsallowdynupdate": [
"FALSE"
],
"idnsname": [
- "henson.ayoung.boston.devel.redhat.com"
+ "dev.example.com"
],
"idnssoaexpire": [
"1209600"
@@ -107,7 +107,7 @@
"3600"
],
"idnssoamname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"idnssoarefresh": [
"3600"
@@ -116,7 +116,7 @@
"900"
],
"idnssoarname": [
- "root.henson.ayoung.boston.devel.redhat.com."
+ "root.dev.example.com."
],
"idnssoaserial": [
"2010021201"
diff --git a/install/ui/test/data/dnszone_find_pkeys.json b/install/ui/test/data/dnszone_find_pkeys.json
new file mode 100644
index 000000000..1b4f02500
--- /dev/null
+++ b/install/ui/test/data/dnszone_find_pkeys.json
@@ -0,0 +1,29 @@
+{
+ "error": null,
+ "id": 6,
+ "result": {
+ "count": 3,
+ "result": [
+ {
+ "dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
+ "idnsname": [
+ "example.com"
+ ]
+ },
+ {
+ "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
+ "idnsname": [
+ "122.168.192.in-addr.arpa"
+ ]
+ },
+ {
+ "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
+ "idnsname": [
+ "dev.example.com"
+ ]
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/dnszone_get_records.json b/install/ui/test/data/dnszone_get_records.json
new file mode 100644
index 000000000..07b70734d
--- /dev/null
+++ b/install/ui/test/data/dnszone_get_records.json
@@ -0,0 +1,150 @@
+{
+ "error": null,
+ "id": 6,
+ "result": {
+ "count": 3,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
+ "idnsallowdynupdate": [
+ "TRUE"
+ ],
+ "idnsname": [
+ "example.com"
+ ],
+ "idnssoaexpire": [
+ "1209600"
+ ],
+ "idnssoaminimum": [
+ "3600"
+ ],
+ "idnssoamname": [
+ "ipa.example.com."
+ ],
+ "idnssoarefresh": [
+ "3600"
+ ],
+ "idnssoaretry": [
+ "900"
+ ],
+ "idnssoarname": [
+ "root.ipa.example.com."
+ ],
+ "idnssoaserial": [
+ "2010021201"
+ ],
+ "idnsupdatepolicy": [
+ "grant EXAMPLE.COM krb5-self * A;"
+ ],
+ "idnszoneactive": [
+ "TRUE"
+ ],
+ "nsrecord": [
+ "ipa.example.com."
+ ],
+ "objectclass": [
+ "top",
+ "idnsrecord",
+ "idnszone"
+ ]
+ },
+ "summary": null,
+ "value": "example.com"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
+ "idnsallowdynupdate": [
+ "TRUE"
+ ],
+ "idnsname": [
+ "122.168.192.in-addr.arpa"
+ ],
+ "idnssoaexpire": [
+ "1209600"
+ ],
+ "idnssoaminimum": [
+ "3600"
+ ],
+ "idnssoamname": [
+ "ipa.example.com."
+ ],
+ "idnssoarefresh": [
+ "3600"
+ ],
+ "idnssoaretry": [
+ "900"
+ ],
+ "idnssoarname": [
+ "root.122.168.192.in-addr.arpa."
+ ],
+ "idnssoaserial": [
+ "2010021201"
+ ],
+ "idnsupdatepolicy": [
+ "grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
+ ],
+ "idnszoneactive": [
+ "TRUE"
+ ],
+ "nsrecord": [
+ "ipa.example.com."
+ ],
+ "objectclass": [
+ "top",
+ "idnsrecord",
+ "idnszone"
+ ]
+ },
+ "summary": null,
+ "value": "122.168.192.in-addr.arpa"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
+ "idnsallowdynupdate": [
+ "FALSE"
+ ],
+ "idnsname": [
+ "dev.example.com"
+ ],
+ "idnssoaexpire": [
+ "1209600"
+ ],
+ "idnssoaminimum": [
+ "3600"
+ ],
+ "idnssoamname": [
+ "example.com"
+ ],
+ "idnssoarefresh": [
+ "3600"
+ ],
+ "idnssoaretry": [
+ "900"
+ ],
+ "idnssoarname": [
+ "root.dev.example.com."
+ ],
+ "idnssoaserial": [
+ "2010021201"
+ ],
+ "idnszoneactive": [
+ "TRUE"
+ ],
+ "objectclass": [
+ "top",
+ "idnsrecord",
+ "idnszone"
+ ]
+ },
+ "summary": null,
+ "value": "dev.example.com"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/dnszone_show.json b/install/ui/test/data/dnszone_show.json
index 35e507627..afad93c45 100644
--- a/install/ui/test/data/dnszone_show.json
+++ b/install/ui/test/data/dnszone_show.json
@@ -47,12 +47,12 @@
"sshfprecord": "rscwo",
"txtrecord": "rscwo"
},
- "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
"idnsallowdynupdate": [
"FALSE"
],
"idnsname": [
- "henson.ayoung.boston.devel.redhat.com"
+ "dev.example.com"
],
"idnssoaexpire": [
"1209600"
@@ -61,7 +61,7 @@
"3600"
],
"idnssoamname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"idnssoarefresh": [
"3600"
@@ -70,7 +70,7 @@
"900"
],
"idnssoarname": [
- "root.henson.ayoung.boston.devel.redhat.com."
+ "root.dev.example.com."
],
"idnssoaserial": [
"2010021201"
@@ -85,6 +85,6 @@
]
},
"summary": null,
- "value": "henson.ayoung.boston.devel.redhat.com"
+ "value": "dev.example.com"
}
} \ No newline at end of file
diff --git a/install/ui/test/data/entitle_find_offline.json b/install/ui/test/data/entitle_find_offline.json
index 3980af6fb..442dbf03d 100644
--- a/install/ui/test/data/entitle_find_offline.json
+++ b/install/ui/test/data/entitle_find_offline.json
@@ -5,7 +5,7 @@
"count": 1,
"result": [
{
- "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com",
"ipaentitlementid": [
"IMPORTED"
],
diff --git a/install/ui/test/data/entitle_find_online.json b/install/ui/test/data/entitle_find_online.json
index 76bd437e2..8143fd426 100644
--- a/install/ui/test/data/entitle_find_online.json
+++ b/install/ui/test/data/entitle_find_online.json
@@ -5,7 +5,7 @@
"count": 1,
"result": [
{
- "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com",
"ipaentitlementid": [
"b788ccee-4b09-48f0-8a9a-2c769f7b41e0"
],
diff --git a/install/ui/test/data/entitle_register.json b/install/ui/test/data/entitle_register.json
index 8644801da..c66124738 100644
--- a/install/ui/test/data/entitle_register.json
+++ b/install/ui/test/data/entitle_register.json
@@ -3,7 +3,7 @@
"id": 0,
"result": {
"result": {
- "dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=example,dc=com",
"ipaentitlementid": [
"cf9d9755-7445-438c-a40c-23b1c60e1f9b"
],
diff --git a/install/ui/test/data/group_add.json b/install/ui/test/data/group_add.json
index 180f5f11c..6f5f8bfc4 100644
--- a/install/ui/test/data/group_add.json
+++ b/install/ui/test/data/group_add.json
@@ -9,7 +9,7 @@
"description": [
"The People in Your Neighborhood"
],
- "dn": "cn=neighbors,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=neighbors,cn=groups,cn=accounts,dc=example,dc=com",
"gidnumber": [
"123456"
],
diff --git a/install/ui/test/data/group_add_member.json b/install/ui/test/data/group_add_member.json
index 7f10d1052..9a81960b4 100644
--- a/install/ui/test/data/group_add_member.json
+++ b/install/ui/test/data/group_add_member.json
@@ -16,7 +16,7 @@
"description": [
"testgroup"
],
- "dn": "cn=testgroup,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=testgroup,cn=groups,cn=accounts,dc=example,dc=com",
"member_user": [
"kfrog"
]
diff --git a/install/ui/test/data/group_find.json b/install/ui/test/data/group_find.json
index 338622948..fe40e254a 100644
--- a/install/ui/test/data/group_find.json
+++ b/install/ui/test/data/group_find.json
@@ -11,7 +11,7 @@
"description": [
"Account administrators group"
],
- "dn": "cn=admins,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"1420800000"
],
@@ -26,7 +26,7 @@
"description": [
"Default group for all users"
],
- "dn": "cn=ipausers,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"1420800001"
],
@@ -46,7 +46,7 @@
"description": [
"Limited admins who can edit other users"
],
- "dn": "cn=editors,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"1420800002"
]
@@ -58,7 +58,7 @@
"description": [
"Monsters on Sesame Street"
],
- "dn": "cn=monsters,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"1420800009"
]
@@ -70,7 +70,7 @@
"description": [
"Muppets moonlighting for CTW"
],
- "dn": "cn=muppets,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"1420800010"
]
diff --git a/install/ui/test/data/group_find_pkeys.json b/install/ui/test/data/group_find_pkeys.json
new file mode 100644
index 000000000..483751bfe
--- /dev/null
+++ b/install/ui/test/data/group_find_pkeys.json
@@ -0,0 +1,41 @@
+{
+ "error": null,
+ "id": 2,
+ "result": {
+ "count": 5,
+ "result": [
+ {
+ "cn": [
+ "admins"
+ ],
+ "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "ipausers"
+ ],
+ "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "editors"
+ ],
+ "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "monsters"
+ ],
+ "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "muppets"
+ ],
+ "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": "5 groups matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/group_get_records.json b/install/ui/test/data/group_get_records.json
new file mode 100644
index 000000000..d40b4f2a3
--- /dev/null
+++ b/install/ui/test/data/group_get_records.json
@@ -0,0 +1,105 @@
+{
+ "error": null,
+ "id": 2,
+ "result": {
+ "count": 5,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "admins"
+ ],
+ "description": [
+ "Account administrators group"
+ ],
+ "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
+ "gidnumber": [
+ "1420800000"
+ ],
+ "member_user": [
+ "admin"
+ ]
+ },
+ "summary": null,
+ "value": "admins"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "ipausers"
+ ],
+ "description": [
+ "Default group for all users"
+ ],
+ "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
+ "gidnumber": [
+ "1420800001"
+ ],
+ "member_user": [
+ "kfrog",
+ "count123",
+ "scram",
+ "elmo",
+ "zoe",
+ "pdawn"
+ ]
+ },
+ "summary": null,
+ "value": "ipausers"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "editors"
+ ],
+ "description": [
+ "Limited admins who can edit other users"
+ ],
+ "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
+ "gidnumber": [
+ "1420800002"
+ ]
+ },
+ "summary": null,
+ "value": "editors"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "monsters"
+ ],
+ "description": [
+ "Monsters on Sesame Street"
+ ],
+ "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
+ "gidnumber": [
+ "1420800009"
+ ]
+ },
+ "summary": null,
+ "value": "monsters"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "muppets"
+ ],
+ "description": [
+ "Muppets moonlighting for CTW"
+ ],
+ "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
+ "gidnumber": [
+ "1420800010"
+ ]
+ },
+ "summary": null,
+ "value": "muppets"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/group_member_user.json b/install/ui/test/data/group_member_user.json
index 971b13d44..1eaaefac7 100644
--- a/install/ui/test/data/group_member_user.json
+++ b/install/ui/test/data/group_member_user.json
@@ -1,124 +1,1454 @@
{
"error": null,
- "id": 0,
+ "id": null,
"result": {
- "count": 2,
+ "count": 20,
"results": [
{
"error": null,
"result": {
"cn": [
- "Administrator"
+ "Adrian Barrett"
],
- "dn": "uid=admin,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
+ "displayname": [
+ "Adrian Barrett"
+ ],
+ "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com",
"gecos": [
- "Administrator"
+ "Adrian Barrett"
],
"gidnumber": [
- "1662072955"
+ "1576000176"
+ ],
+ "givenname": [
+ "Adrian"
],
+ "has_keytab": false,
+ "has_password": false,
"homedirectory": [
- "/home/admin"
+ "/home/abarrett"
+ ],
+ "initials": [
+ "AB"
],
"ipauniqueid": [
- "ffb8d002-f46c-11df-8cc1-00163e72f2d9"
+ "6cca548c-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "abarrett@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=abarrett,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Barrett"
+ ],
+ "uid": [
+ "abarrett"
+ ],
+ "uidnumber": [
+ "1576000176"
+ ]
+ },
+ "summary": null,
+ "value": "abarrett"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Anja Bradley"
+ ],
+ "displayname": [
+ "Anja Bradley"
+ ],
+ "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Anja Bradley"
+ ],
+ "gidnumber": [
+ "1576000024"
+ ],
+ "givenname": [
+ "Anja"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/abradley"
+ ],
+ "initials": [
+ "AB"
+ ],
+ "ipauniqueid": [
+ "5375ac2a-073f-11e1-95ae-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "abradley@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers",
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=abradley,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
],
- "krblastpwdchange": [
- "20101120061333Z"
+ "sn": [
+ "Bradley"
],
- "krbpasswordexpiration": [
- "20110218061333Z"
+ "uid": [
+ "abradley"
+ ],
+ "uidnumber": [
+ "1576000024"
+ ]
+ },
+ "summary": null,
+ "value": "abradley"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Annmarie Carlson"
+ ],
+ "displayname": [
+ "Annmarie Carlson"
+ ],
+ "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Annmarie Carlson"
+ ],
+ "gidnumber": [
+ "1576000036"
+ ],
+ "givenname": [
+ "Annmarie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/acarlson"
+ ],
+ "initials": [
+ "AC"
+ ],
+ "ipauniqueid": [
+ "54dccaa8-073f-11e1-89ea-525400e135d8"
],
"krbprincipalname": [
- "admin@DEV.EXAMPLE.COM"
+ "acarlson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
],
"loginshell": [
- "/bin/bash"
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers",
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=acarlson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Carlson"
+ ],
+ "uid": [
+ "acarlson"
+ ],
+ "uidnumber": [
+ "1576000036"
+ ]
+ },
+ "summary": null,
+ "value": "acarlson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Angelika Daniels"
+ ],
+ "displayname": [
+ "Angelika Daniels"
+ ],
+ "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Angelika Daniels"
+ ],
+ "gidnumber": [
+ "1576000035"
+ ],
+ "givenname": [
+ "Angelika"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/adaniels"
+ ],
+ "initials": [
+ "AD"
+ ],
+ "ipauniqueid": [
+ "54abe492-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "adaniels@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers",
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=adaniels,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Daniels"
+ ],
+ "uid": [
+ "adaniels"
+ ],
+ "uidnumber": [
+ "1576000035"
+ ]
+ },
+ "summary": null,
+ "value": "adaniels"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Antionette George"
+ ],
+ "displayname": [
+ "Antionette George"
+ ],
+ "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Antionette George"
+ ],
+ "gidnumber": [
+ "1576000165"
+ ],
+ "givenname": [
+ "Antionette"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/ageorge"
+ ],
+ "initials": [
+ "AG"
+ ],
+ "ipauniqueid": [
+ "6a8af776-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "ageorge@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
],
"memberof_group": [
- "admins",
"ipausers"
],
- "memberof_rolegroup": [
- "replicaadmin"
+ "memberofindirect_group": [
+ "editors"
],
- "memberof_taskgroup": [
- "managereplica",
- "deletereplica"
+ "mepmanagedentry": [
+ "cn=ageorge,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "George"
+ ],
+ "uid": [
+ "ageorge"
+ ],
+ "uidnumber": [
+ "1576000165"
+ ]
+ },
+ "summary": null,
+ "value": "ageorge"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Amiee Gordon"
+ ],
+ "displayname": [
+ "Amiee Gordon"
+ ],
+ "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Amiee Gordon"
+ ],
+ "gidnumber": [
+ "1576000056"
+ ],
+ "givenname": [
+ "Amiee"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/agordon"
+ ],
+ "initials": [
+ "AG"
+ ],
+ "ipauniqueid": [
+ "57b0510a-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "agordon@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers",
+ "editors"
],
"mepmanagedentry": [
- "cn=admin,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ "cn=agordon,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Gordon"
+ ],
+ "uid": [
+ "agordon"
+ ],
+ "uidnumber": [
+ "1576000056"
+ ]
+ },
+ "summary": null,
+ "value": "agordon"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Anderson Jennings"
+ ],
+ "displayname": [
+ "Anderson Jennings"
+ ],
+ "dn": "uid=ajennings,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Anderson Jennings"
+ ],
+ "gidnumber": [
+ "1576000206"
+ ],
+ "givenname": [
+ "Anderson"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/ajennings"
+ ],
+ "initials": [
+ "AJ"
+ ],
+ "ipauniqueid": [
+ "7417afdc-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "ajennings@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=ajennings,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Jennings"
+ ],
+ "uid": [
+ "ajennings"
+ ],
+ "uidnumber": [
+ "1576000206"
+ ]
+ },
+ "summary": null,
+ "value": "ajennings"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Antonio Obrien"
+ ],
+ "displayname": [
+ "Antonio Obrien"
+ ],
+ "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Antonio Obrien"
+ ],
+ "gidnumber": [
+ "1576000201"
+ ],
+ "givenname": [
+ "Antonio"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aobrien"
+ ],
+ "initials": [
+ "AO"
+ ],
+ "ipauniqueid": [
+ "72e80936-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aobrien@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
],
- "nsaccountlock": [
- "False"
+ "memberof_group": [
+ "ipausers"
],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=aobrien,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
"objectclass": [
"top",
"person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
"posixaccount",
"krbprincipalaux",
"krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Obrien"
+ ],
+ "uid": [
+ "aobrien"
+ ],
+ "uidnumber": [
+ "1576000201"
+ ]
+ },
+ "summary": null,
+ "value": "aobrien"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Asley Ortega"
+ ],
+ "displayname": [
+ "Asley Ortega"
+ ],
+ "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Asley Ortega"
+ ],
+ "gidnumber": [
+ "1576000156"
+ ],
+ "givenname": [
+ "Asley"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aortega"
+ ],
+ "initials": [
+ "AO"
+ ],
+ "ipauniqueid": [
+ "68c80e56-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aortega@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=aortega,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
"inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
"ipaobject",
"mepOriginEntry"
],
"sn": [
- "Administrator"
+ "Ortega"
],
"uid": [
- "admin"
+ "aortega"
],
"uidnumber": [
- "1662072955"
+ "1576000156"
]
},
"summary": null,
- "value": "admin"
+ "value": "aortega"
},
{
"error": null,
"result": {
"cn": [
- "Test User"
+ "Alicia Ortiz"
+ ],
+ "displayname": [
+ "Alicia Ortiz"
],
- "dn": "uid=test,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
+ "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com",
"gecos": [
- "test"
+ "Alicia Ortiz"
],
"gidnumber": [
- "1662072958"
+ "1576000181"
],
"givenname": [
- "Test"
+ "Alicia"
],
+ "has_keytab": false,
+ "has_password": false,
"homedirectory": [
- "/home/test"
+ "/home/aortiz"
+ ],
+ "initials": [
+ "AO"
],
"ipauniqueid": [
- "c0724e5e-f472-11df-8186-00163e72f2d9"
+ "6dda4b48-073f-11e1-89ea-525400e135d8"
],
"krbprincipalname": [
- "test@DEV.EXAMPLE.COM"
+ "aortiz@EXAMPLE.COM"
],
"krbpwdpolicyreference": [
- "cn=global_policy,cn=DEV.EXAMPLE.COM,cn=kerberos,dc=dev,dc=example,dc=com"
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
],
"loginshell": [
"/bin/sh"
],
- "mail": [
- "test"
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=aortiz,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Ortiz"
+ ],
+ "uid": [
+ "aortiz"
+ ],
+ "uidnumber": [
+ "1576000181"
+ ]
+ },
+ "summary": null,
+ "value": "aortiz"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Alda Peterson"
+ ],
+ "displayname": [
+ "Alda Peterson"
+ ],
+ "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Alda Peterson"
+ ],
+ "gidnumber": [
+ "1576000080"
+ ],
+ "givenname": [
+ "Alda"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/apeterson"
+ ],
+ "initials": [
+ "AP"
+ ],
+ "ipauniqueid": [
+ "5b25407a-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "apeterson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
],
"memberof_group": [
"ipausers",
"editors"
],
"mepmanagedentry": [
- "cn=test,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
+ "cn=apeterson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Peterson"
+ ],
+ "uid": [
+ "apeterson"
+ ],
+ "uidnumber": [
+ "1576000080"
+ ]
+ },
+ "summary": null,
+ "value": "apeterson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Augustina Rhodes"
+ ],
+ "displayname": [
+ "Augustina Rhodes"
+ ],
+ "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Augustina Rhodes"
+ ],
+ "gidnumber": [
+ "1576000007"
+ ],
+ "givenname": [
+ "Augustina"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/arhodes"
+ ],
+ "initials": [
+ "AR"
+ ],
+ "ipauniqueid": [
+ "51b4c812-073f-11e1-9cf6-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "arhodes@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=arhodes,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Rhodes"
+ ],
+ "uid": [
+ "arhodes"
+ ],
+ "uidnumber": [
+ "1576000007"
+ ]
+ },
+ "summary": null,
+ "value": "arhodes"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Ammie Romero"
+ ],
+ "displayname": [
+ "Ammie Romero"
+ ],
+ "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Ammie Romero"
+ ],
+ "gidnumber": [
+ "1576000055"
+ ],
+ "givenname": [
+ "Ammie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aromero"
+ ],
+ "initials": [
+ "AR"
+ ],
+ "ipauniqueid": [
+ "578ac750-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aromero@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=aromero,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
],
- "nsaccountlock": [
- "False"
+ "sn": [
+ "Romero"
+ ],
+ "uid": [
+ "aromero"
+ ],
+ "uidnumber": [
+ "1576000055"
+ ]
+ },
+ "summary": null,
+ "value": "aromero"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Adella Thompson"
+ ],
+ "displayname": [
+ "Adella Thompson"
+ ],
+ "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Adella Thompson"
+ ],
+ "gidnumber": [
+ "1576000123"
+ ],
+ "givenname": [
+ "Adella"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/athompson"
+ ],
+ "initials": [
+ "AT"
+ ],
+ "ipauniqueid": [
+ "62647b08-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "athompson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=athompson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Thompson"
+ ],
+ "uid": [
+ "athompson"
+ ],
+ "uidnumber": [
+ "1576000123"
+ ]
+ },
+ "summary": null,
+ "value": "athompson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Asha Valdez"
+ ],
+ "displayname": [
+ "Asha Valdez"
+ ],
+ "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Asha Valdez"
+ ],
+ "gidnumber": [
+ "1576000195"
+ ],
+ "givenname": [
+ "Asha"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/avaldez"
+ ],
+ "initials": [
+ "AV"
+ ],
+ "ipauniqueid": [
+ "71821438-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "avaldez@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=avaldez,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Valdez"
+ ],
+ "uid": [
+ "avaldez"
+ ],
+ "uidnumber": [
+ "1576000195"
+ ]
+ },
+ "summary": null,
+ "value": "avaldez"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bennie Barber"
+ ],
+ "displayname": [
+ "Bennie Barber"
+ ],
+ "dn": "uid=bbarber,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bennie Barber"
+ ],
+ "gidnumber": [
+ "1576000208"
+ ],
+ "givenname": [
+ "Bennie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bbarber"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "749350ba-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bbarber@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=bbarber,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Barber"
+ ],
+ "uid": [
+ "bbarber"
+ ],
+ "uidnumber": [
+ "1576000208"
+ ]
+ },
+ "summary": null,
+ "value": "bbarber"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bulah Bauer"
+ ],
+ "displayname": [
+ "Bulah Bauer"
+ ],
+ "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bulah Bauer"
+ ],
+ "gidnumber": [
+ "1576000070"
+ ],
+ "givenname": [
+ "Bulah"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bbauer"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "598f9148-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bbauer@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=bbauer,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Bauer"
+ ],
+ "uid": [
+ "bbauer"
+ ],
+ "uidnumber": [
+ "1576000070"
+ ]
+ },
+ "summary": null,
+ "value": "bbauer"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bernardo Blair"
+ ],
+ "displayname": [
+ "Bernardo Blair"
+ ],
+ "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bernardo Blair"
+ ],
+ "gidnumber": [
+ "1576000169"
+ ],
+ "givenname": [
+ "Bernardo"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bblair"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "6b55c99c-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bblair@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=bblair,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Blair"
+ ],
+ "uid": [
+ "bblair"
+ ],
+ "uidnumber": [
+ "1576000169"
+ ]
+ },
+ "summary": null,
+ "value": "bblair"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Barrie Bush"
+ ],
+ "displayname": [
+ "Barrie Bush"
+ ],
+ "dn": "uid=bbush,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Barrie Bush"
+ ],
+ "gidnumber": [
+ "1576000230"
+ ],
+ "givenname": [
+ "Barrie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bbush"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "7a0dbbb6-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bbush@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=bbush,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Bush"
+ ],
+ "uid": [
+ "bbush"
+ ],
+ "uidnumber": [
+ "1576000230"
+ ]
+ },
+ "summary": null,
+ "value": "bbush"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Billy Gross"
+ ],
+ "displayname": [
+ "Billy Gross"
+ ],
+ "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Billy Gross"
+ ],
+ "gidnumber": [
+ "1576000047"
+ ],
+ "givenname": [
+ "Billy"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bgross"
+ ],
+ "initials": [
+ "BG"
+ ],
+ "ipauniqueid": [
+ "5679c2a8-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bgross@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "memberofindirect_group": [
+ "editors"
+ ],
+ "mepmanagedentry": [
+ "cn=bgross,cn=groups,cn=accounts,dc=example,dc=com"
],
+ "nsaccountlock": false,
"objectclass": [
"top",
"person",
@@ -132,17 +1462,17 @@
"mepOriginEntry"
],
"sn": [
- "User"
+ "Gross"
],
"uid": [
- "test"
+ "bgross"
],
"uidnumber": [
- "1662072958"
+ "1576000047"
]
},
"summary": null,
- "value": "test"
+ "value": "bgross"
}
]
}
diff --git a/install/ui/test/data/group_remove_member.json b/install/ui/test/data/group_remove_member.json
index 0118438af..6582d73df 100644
--- a/install/ui/test/data/group_remove_member.json
+++ b/install/ui/test/data/group_remove_member.json
@@ -16,7 +16,7 @@
"description": [
"Muppets moonlighting for CTW"
],
- "dn": "cn=muppets,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com",
"gidnumber": [
"1950316043"
],
diff --git a/install/ui/test/data/group_show.json b/install/ui/test/data/group_show.json
index 536b120ca..4ac6e0c06 100644
--- a/install/ui/test/data/group_show.json
+++ b/install/ui/test/data/group_show.json
@@ -1,6 +1,6 @@
{
"error": null,
- "id": 0,
+ "id": null,
"result": {
"result": {
"cn": [
@@ -9,27 +9,261 @@
"description": [
"Default group for all users"
],
- "dn": "cn=ipausers,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
"gidnumber": [
- "1079249048"
- ],
- "member": [
- "uid=gsmile,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
- "uid=kfrog,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
- "uid=count123,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
+ "1576000001"
],
"member_user": [
- "gsmile",
- "kfrog",
- "count123"
+ "dmontes",
+ "sroberson",
+ "vmendoza",
+ "mvang",
+ "arhodes",
+ "ngutierrez",
+ "lbaldwin",
+ "uevans",
+ "fwolfe",
+ "mdyer",
+ "ibeard",
+ "lduran",
+ "cmcintosh",
+ "nmartinez",
+ "sshepherd",
+ "tosborn",
+ "mcarney",
+ "scohen",
+ "jbuckley",
+ "jgould",
+ "ewatkins",
+ "abradley",
+ "lhall",
+ "dkelly",
+ "drosario",
+ "jpreston",
+ "mjefferson",
+ "jwu",
+ "marcher",
+ "rhale",
+ "jmckee",
+ "cduffy",
+ "adaniels",
+ "acarlson",
+ "wryan",
+ "mclay",
+ "mgates",
+ "jmccann",
+ "mvaughan",
+ "grobles",
+ "llarson",
+ "mbailey",
+ "dbriggs",
+ "ekane",
+ "bgross",
+ "smcclure",
+ "mkrause",
+ "sparrish",
+ "bmcgee",
+ "kfisher",
+ "mestes",
+ "mlong",
+ "aromero",
+ "agordon",
+ "vgriffin",
+ "chartman",
+ "lcohen",
+ "fstrong",
+ "lgross",
+ "kmills",
+ "mbutler",
+ "jmaynard",
+ "jmccarty",
+ "jburch",
+ "kreyes",
+ "ckramer",
+ "chuynh",
+ "bbauer",
+ "ipotts",
+ "ldennis",
+ "kgonzalez",
+ "mtravis",
+ "tcase",
+ "groman",
+ "tburch",
+ "dmyers",
+ "rcannon",
+ "apeterson",
+ "lbarnett",
+ "eclay",
+ "lstevenson",
+ "lnewman",
+ "crobles",
+ "sbarron",
+ "smcfarland",
+ "sknapp",
+ "ghouse",
+ "lgeorge",
+ "swoodard",
+ "dphillips",
+ "candrade",
+ "jmcfarland",
+ "ccarson",
+ "cgreer",
+ "khuerta",
+ "dblevins",
+ "bswanson",
+ "chickman",
+ "rcarrillo",
+ "jkaufman",
+ "kshaw",
+ "gowen",
+ "rcontreras",
+ "cmccullough",
+ "krivera",
+ "jbarron",
+ "sbradford",
+ "lwilson",
+ "jvelez",
+ "dlopez",
+ "lgibbs",
+ "jsnow",
+ "sklein",
+ "lsharp",
+ "mcameron",
+ "flam",
+ "nparker",
+ "lhogan",
+ "lmorrison",
+ "bnewton",
+ "athompson",
+ "jsanford",
+ "rcohen",
+ "cmelendez",
+ "yjacobs",
+ "mmcintyre",
+ "dhood",
+ "mescobar",
+ "mvilla",
+ "dshort",
+ "okennedy",
+ "cvillarreal",
+ "skane",
+ "vreyes",
+ "lrobinson",
+ "mbright",
+ "eriley",
+ "ehunt",
+ "ctrujillo",
+ "hrichard",
+ "sserrano",
+ "nramirez",
+ "zschneider",
+ "mtanner",
+ "hcalderon",
+ "sroy",
+ "mblevins",
+ "rhampton",
+ "kpeters",
+ "gmoody",
+ "kgraham",
+ "lpacheco",
+ "swalter",
+ "aortega",
+ "spruitt",
+ "lchandler",
+ "wnichols",
+ "eberry",
+ "kzhang",
+ "cheath",
+ "tproctor",
+ "vgill",
+ "ageorge",
+ "cwiggins",
+ "clloyd",
+ "mrichardson",
+ "bblair",
+ "mdonovan",
+ "dmoses",
+ "jkhan",
+ "mcrane",
+ "gmcintosh",
+ "wweaver",
+ "abarrett",
+ "pcarroll",
+ "twebster",
+ "omcdonald",
+ "bwolfe",
+ "aortiz",
+ "dbean",
+ "hpittman",
+ "bpage",
+ "jmullen",
+ "lcabrera",
+ "mbray",
+ "kpatterson",
+ "lwalters",
+ "ljennings",
+ "mrowland",
+ "srich",
+ "jvilla",
+ "jzavala",
+ "avaldez",
+ "ehayes",
+ "jjoyce",
+ "scastaneda",
+ "mwoodard",
+ "cbarrera",
+ "aobrien",
+ "jvillanueva",
+ "jhowe",
+ "cstout",
+ "mwhitehead",
+ "ajennings",
+ "dfrye",
+ "bbarber",
+ "twilson",
+ "kfernandez",
+ "eherrera",
+ "dyoung",
+ "pjohnston",
+ "jbean",
+ "ldawson",
+ "kwood",
+ "tcrane",
+ "rwelch",
+ "wholmes",
+ "cchristian",
+ "ffrazier",
+ "bmullins",
+ "tduarte",
+ "elawrence",
+ "rgregory",
+ "ssteele",
+ "ktravis",
+ "llee",
+ "sorr",
+ "bbush",
+ "ublake",
+ "kjohnson",
+ "vcannon",
+ "mandrade",
+ "emeyer",
+ "hpeck",
+ "ssantana",
+ "lluna",
+ "fneal",
+ "lswanson",
+ "rlynch",
+ "pcarpenter",
+ "cblackwell",
+ "sfrost",
+ "cconner",
+ "stanner",
+ "opayne",
+ "jriggs",
+ "jhuynh"
],
- "memberof": [],
- "objectclass": [
- "top",
- "groupofnames",
- "nestedgroup",
- "ipausergroup",
- "posixgroup"
+ "memberof_group": [
+ "editors"
]
},
"summary": null,
diff --git a/install/ui/test/data/hbacrule_find.json b/install/ui/test/data/hbacrule_find.json
index 1775119c8..0629e3827 100644
--- a/install/ui/test/data/hbacrule_find.json
+++ b/install/ui/test/data/hbacrule_find.json
@@ -14,7 +14,7 @@
"description": [
"Allow all users to access any host from any host"
],
- "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com",
"hostcategory": [
"all"
],
diff --git a/install/ui/test/data/hbacrule_find_pkeys.json b/install/ui/test/data/hbacrule_find_pkeys.json
new file mode 100644
index 000000000..3c33573f0
--- /dev/null
+++ b/install/ui/test/data/hbacrule_find_pkeys.json
@@ -0,0 +1,17 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 1,
+ "result": [
+ {
+ "cn": [
+ "allow_all"
+ ],
+ "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": "1 HBAC rule matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/hbacrule_get_records.json b/install/ui/test/data/hbacrule_get_records.json
new file mode 100644
index 000000000..feaf217f6
--- /dev/null
+++ b/install/ui/test/data/hbacrule_get_records.json
@@ -0,0 +1,41 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 1,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "accessruletype": [
+ "allow"
+ ],
+ "cn": [
+ "allow_all"
+ ],
+ "description": [
+ "Allow all users to access any host from any host"
+ ],
+ "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com",
+ "hostcategory": [
+ "all"
+ ],
+ "ipaenabledflag": [
+ "TRUE"
+ ],
+ "servicecategory": [
+ "all"
+ ],
+ "sourcehostcategory": [
+ "all"
+ ],
+ "usercategory": [
+ "all"
+ ]
+ },
+ "summary": null,
+ "value": "allow_all"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/hbacsvc_find_pkeys.json b/install/ui/test/data/hbacsvc_find_pkeys.json
new file mode 100644
index 000000000..01939d2ce
--- /dev/null
+++ b/install/ui/test/data/hbacsvc_find_pkeys.json
@@ -0,0 +1,71 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 10,
+ "result": [
+ {
+ "cn": [
+ "sshd"
+ ],
+ "dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "ftp"
+ ],
+ "dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "su"
+ ],
+ "dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "login"
+ ],
+ "dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "su-l"
+ ],
+ "dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "sudo"
+ ],
+ "dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "sudo-i"
+ ],
+ "dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "gdm"
+ ],
+ "dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "gdm-password"
+ ],
+ "dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "kdm"
+ ],
+ "dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/hbacsvc_get_records.json b/install/ui/test/data/hbacsvc_get_records.json
new file mode 100644
index 000000000..fd8af3056
--- /dev/null
+++ b/install/ui/test/data/hbacsvc_get_records.json
@@ -0,0 +1,149 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 10,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "sshd"
+ ],
+ "description": [
+ "sshd"
+ ],
+ "dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "sshd"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "ftp"
+ ],
+ "description": [
+ "ftp"
+ ],
+ "dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "ftp"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "su"
+ ],
+ "description": [
+ "su"
+ ],
+ "dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "su"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "login"
+ ],
+ "description": [
+ "login"
+ ],
+ "dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "login"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "su-l"
+ ],
+ "description": [
+ "su with login shell"
+ ],
+ "dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "su-l"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "sudo"
+ ],
+ "description": [
+ "sudo"
+ ],
+ "dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "sudo"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "sudo-i"
+ ],
+ "description": [
+ "sudo-i"
+ ],
+ "dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "sudo-i"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "gdm"
+ ],
+ "description": [
+ "gdm"
+ ],
+ "dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "gdm"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "gdm-password"
+ ],
+ "description": [
+ "gdm-password"
+ ],
+ "dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "gdm-password"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "kdm"
+ ],
+ "description": [
+ "kdm"
+ ],
+ "dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "kdm"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/hbacsvcgroup_find_pkeys.json b/install/ui/test/data/hbacsvcgroup_find_pkeys.json
new file mode 100644
index 000000000..fdca25658
--- /dev/null
+++ b/install/ui/test/data/hbacsvcgroup_find_pkeys.json
@@ -0,0 +1,17 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "result": [
+ {
+ "cn": [
+ "Sudo"
+ ],
+ "dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": "1 group matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/hbacsvcgroup_get_records.json b/install/ui/test/data/hbacsvcgroup_get_records.json
new file mode 100644
index 000000000..1d9a62f83
--- /dev/null
+++ b/install/ui/test/data/hbacsvcgroup_get_records.json
@@ -0,0 +1,27 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Sudo"
+ ],
+ "description": [
+ "Default group of Sudo related services"
+ ],
+ "dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com",
+ "member_hbacsvc": [
+ "sudo",
+ "sudo-i"
+ ]
+ },
+ "summary": null,
+ "value": "Sudo"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/host_add.json b/install/ui/test/data/host_add.json
index 8b4d8b93a..f03649009 100644
--- a/install/ui/test/data/host_add.json
+++ b/install/ui/test/data/host_add.json
@@ -6,7 +6,7 @@
"cn": [
"www.pbs.org"
],
- "dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com",
"fqdn": [
"www.pbs.org"
],
@@ -15,10 +15,10 @@
"3ad2e63d-b43a-11df-8dd1-525400674dcd"
],
"krbprincipalname": [
- "host/www.pbs.org@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "host/www.pbs.org@EXAMPLE.COM"
],
"managedby": [
- "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com"
],
"objectclass": [
"ipaobject",
diff --git a/install/ui/test/data/host_find_pkeys.json b/install/ui/test/data/host_find_pkeys.json
new file mode 100644
index 000000000..9b38adba6
--- /dev/null
+++ b/install/ui/test/data/host_find_pkeys.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 2,
+ "result": [
+ {
+ "dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com",
+ "fqdn": [
+ "dev.example.com"
+ ]
+ },
+ {
+ "dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com",
+ "fqdn": [
+ "test.example.com"
+ ]
+ }
+ ],
+ "summary": "2 hosts matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/host_get_records.json b/install/ui/test/data/host_get_records.json
new file mode 100644
index 000000000..27e0fcfa0
--- /dev/null
+++ b/install/ui/test/data/host_get_records.json
@@ -0,0 +1,112 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 2,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "dev.example.com"
+ ],
+ "dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com",
+ "enrolledby_user": [
+ "admin"
+ ],
+ "fqdn": [
+ "dev.example.com"
+ ],
+ "has_keytab": true,
+ "has_password": false,
+ "ipauniqueid": [
+ "d2c1f41c-ff41-11e0-bde8-525400e135d8"
+ ],
+ "krbextradata": [
+ {
+ "__base64__": "AAIIEqdOaG9zdC9kZXYuZXhhbXBsZS5jb21ASURNLkxBQi5CT1MuUkVESEFULkNPTQA="
+ }
+ ],
+ "krblastpwdchange": [
+ "20111025194616Z"
+ ],
+ "krbprincipalname": [
+ "host/dev.example.com@EXAMPLE.COM"
+ ],
+ "managedby_host": [
+ "dev.example.com"
+ ],
+ "managing_host": [
+ "dev.example.com"
+ ],
+ "objectclass": [
+ "ipaobject",
+ "nshost",
+ "ipahost",
+ "pkiuser",
+ "ipaservice",
+ "krbprincipalaux",
+ "krbprincipal",
+ "top"
+ ],
+ "serverhostname": [
+ "dev"
+ ]
+ },
+ "summary": null,
+ "value": "dev.example.com"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "test.example.com"
+ ],
+ "dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com",
+ "enrolledby_user": [
+ "admin"
+ ],
+ "fqdn": [
+ "test.example.com"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "ipauniqueid": [
+ "d5d1400e-ff41-11e0-9a21-525400e135d8"
+ ],
+ "krbextradata": [
+ {
+ "__base64__": "AAIiEqdOaG9zdC90ZXN0LmV4YW1wbGUuY29tQElETS5MQUIuQk9TLlJFREhBVC5DT00A"
+ }
+ ],
+ "krbprincipalname": [
+ "host/test.example.com@EXAMPLE.COM"
+ ],
+ "managedby_host": [
+ "test.example.com"
+ ],
+ "managing_host": [
+ "test.example.com"
+ ],
+ "objectclass": [
+ "ipaobject",
+ "nshost",
+ "ipahost",
+ "pkiuser",
+ "ipaservice",
+ "krbprincipalaux",
+ "krbprincipal",
+ "top"
+ ],
+ "serverhostname": [
+ "test"
+ ]
+ },
+ "summary": null,
+ "value": "test.example.com"
+ }
+ ],
+ "summary": "2 hosts matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/hostgroup_add.json b/install/ui/test/data/hostgroup_add.json
index bc41ee7d8..b20d9aa9d 100644
--- a/install/ui/test/data/hostgroup_add.json
+++ b/install/ui/test/data/hostgroup_add.json
@@ -9,7 +9,7 @@
"description": [
"Special Guest Stars"
],
- "dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=example,dc=com",
"ipauniqueid": [
"7f8c57ae-b43a-11df-8016-525400674dcd"
],
diff --git a/install/ui/test/data/hostgroup_add_member.json b/install/ui/test/data/hostgroup_add_member.json
index a92201751..34ed8d051 100644
--- a/install/ui/test/data/hostgroup_add_member.json
+++ b/install/ui/test/data/hostgroup_add_member.json
@@ -16,7 +16,7 @@
"description": [
"Live servers"
],
- "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
"ipauniqueid": [
"1ba89342-b683-11df-8d5b-525400674dcd"
],
diff --git a/install/ui/test/data/hostgroup_find.json b/install/ui/test/data/hostgroup_find.json
index 6732910c0..5310fc482 100644
--- a/install/ui/test/data/hostgroup_find.json
+++ b/install/ui/test/data/hostgroup_find.json
@@ -11,7 +11,7 @@
"description": [
"Live servers"
],
- "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
"member": [],
"memberof": []
},
@@ -22,7 +22,7 @@
"description": [
"Staging servers"
],
- "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
"member": [],
"memberof": []
}
diff --git a/install/ui/test/data/hostgroup_find_pkeys.json b/install/ui/test/data/hostgroup_find_pkeys.json
new file mode 100644
index 000000000..95b00fa52
--- /dev/null
+++ b/install/ui/test/data/hostgroup_find_pkeys.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "result": [
+ {
+ "cn": [
+ "host-live"
+ ],
+ "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "stage-live"
+ ],
+ "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
+ }
+ ],
+ "summary": "2 hostgroups matched",
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/hostgroup_get_records.json b/install/ui/test/data/hostgroup_get_records.json
new file mode 100644
index 000000000..678bb4af5
--- /dev/null
+++ b/install/ui/test/data/hostgroup_get_records.json
@@ -0,0 +1,41 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "host-live"
+ ],
+ "description": [
+ "Live servers"
+ ],
+ "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
+ "member": [],
+ "memberof": []
+ },
+ "summary": null,
+ "value": "host-live"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "host-stage"
+ ],
+ "description": [
+ "Staging servers"
+ ],
+ "dn": "cn=host-stage,cn=hostgroups,cn=accounts,dc=example,dc=com",
+ "member": [],
+ "memberof": []
+ },
+ "summary": null,
+ "value": "host-stage"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/hostgroup_show.json b/install/ui/test/data/hostgroup_show.json
index 776d446dd..549ed8c91 100644
--- a/install/ui/test/data/hostgroup_show.json
+++ b/install/ui/test/data/hostgroup_show.json
@@ -9,7 +9,7 @@
"description": [
"Live servers"
],
- "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
"member_host": [
"live3.pbs.org",
"live2.pbs.org",
diff --git a/install/ui/test/data/ipa_init.json b/install/ui/test/data/ipa_init.json
index 75f3793d2..830b2d633 100644
--- a/install/ui/test/data/ipa_init.json
+++ b/install/ui/test/data/ipa_init.json
@@ -382,7 +382,7 @@
"cn": [
"Administrator"
],
- "dn": "uid=admin,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com",
"gecos": [
"Administrator"
],
@@ -415,7 +415,7 @@
"20111212052109Z"
],
"krbprincipalname": [
- "admin@IDM.LAB.BOS.REDHAT.COM"
+ "admin@EXAMPLE.COM"
],
"loginshell": [
"/bin/bash"
@@ -451,13 +451,13 @@
"count": 72,
"error": null,
"result": {
- "basedn": "dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "basedn": "dc=example,dc=com",
"bin": "/var/www",
"ca_agent_install_port": 9443,
"ca_agent_port": 443,
"ca_ee_install_port": 9444,
"ca_ee_port": 443,
- "ca_host": "edewata-f15.idm.lab.bos.redhat.com",
+ "ca_host": "dev.example.com",
"ca_install_port": 9180,
"ca_port": 80,
"conf": "/etc/ipa/server.conf",
@@ -493,17 +493,17 @@
"container_virtual": "cn=virtual operations,cn=etc",
"context": "server",
"debug": false,
- "domain": "idm.lab.bos.redhat.com",
+ "domain": "example.com",
"dot_ipa": "/var/www/.ipa",
"enable_ra": true,
"fallback": true,
"home": "/var/www",
- "host": "edewata-f15.idm.lab.bos.redhat.com",
+ "host": "dev.example.com",
"in_server": true,
"in_tree": false,
"interactive": true,
"ipalib": "/usr/lib/python2.7/site-packages/ipalib",
- "ldap_uri": "ldapi://%2fvar%2frun%2fslapd-IDM-LAB-BOS-REDHAT-COM.socket",
+ "ldap_uri": "ldapi://%2fvar%2frun%2fslapd-EXAMPLE-COM.socket",
"log": null,
"logdir": "/var/log/ipa",
"mode": "production",
@@ -512,7 +512,7 @@
"mount_xmlserver": "xml",
"prompt_all": false,
"ra_plugin": "selfsign",
- "realm": "IDM.LAB.BOS.REDHAT.COM",
+ "realm": "EXAMPLE.COM",
"rpc_json_uri": "http://localhost:8888/ipa/json",
"script": "/var/www/mod_wsgi",
"site_packages": "/usr/lib/python2.7/site-packages",
@@ -522,7 +522,7 @@
"wait_for_attr": false,
"webui_assets_dir": null,
"webui_prod": true,
- "xmlrpc_uri": "https://edewata-f15.idm.lab.bos.redhat.com/ipa/xml"
+ "xmlrpc_uri": "https://dev.example.com/ipa/xml"
},
"summary": "72 variables",
"total": 72
diff --git a/install/ui/test/data/ipa_init_objects.json b/install/ui/test/data/ipa_init_objects.json
index fce7a1f6d..0ed111d18 100644
--- a/install/ui/test/data/ipa_init_objects.json
+++ b/install/ui/test/data/ipa_init_objects.json
@@ -4542,7 +4542,7 @@
"aciattrs": [],
"attribute_members": {},
"bindable": false,
- "container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos",
+ "container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos",
"default_attributes": [
"krbmaxticketlife",
"krbmaxrenewableage"
@@ -5418,7 +5418,7 @@
],
"attribute_members": {},
"bindable": false,
- "container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos",
+ "container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos",
"default_attributes": [
"cn",
"cospriority",
diff --git a/install/ui/test/data/krbtpolicy_show.json b/install/ui/test/data/krbtpolicy_show.json
index 6f9fe6d2e..9a30ca3ba 100644
--- a/install/ui/test/data/krbtpolicy_show.json
+++ b/install/ui/test/data/krbtpolicy_show.json
@@ -27,9 +27,9 @@
"objectclass": "rscwo"
},
"cn": [
- "IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "DEV.EXAMPLE.COM"
],
- "dn": "cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com",
"krbdefaultencsalttypes": [
"aes256-cts:special",
"aes128-cts:special",
@@ -46,7 +46,7 @@
"2"
],
"krbsubtrees": [
- "dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dc=dev,dc=example,dc=com"
],
"krbsupportedencsalttypes": [
"aes256-cts:normal",
diff --git a/install/ui/test/data/netgroup_add.json b/install/ui/test/data/netgroup_add.json
index 989bb5db0..9d8d4c519 100644
--- a/install/ui/test/data/netgroup_add.json
+++ b/install/ui/test/data/netgroup_add.json
@@ -9,12 +9,12 @@
"description": [
"Butterfly Networks"
],
- "dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
"ipauniqueid": [
"b16f7240-b43a-11df-89fa-525400674dcd"
],
"nisdomainname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
],
"objectclass": [
"ipaobject",
diff --git a/install/ui/test/data/netgroup_add_member.json b/install/ui/test/data/netgroup_add_member.json
index 5fbae9e14..8b1f49e8f 100644
--- a/install/ui/test/data/netgroup_add_member.json
+++ b/install/ui/test/data/netgroup_add_member.json
@@ -20,7 +20,7 @@
"description": [
"live servers"
],
- "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
"memberhost_host": [
"live3.pbs.org",
"live2.pbs.org",
@@ -33,7 +33,7 @@
"muppets"
],
"nisdomainname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
]
}
}
diff --git a/install/ui/test/data/netgroup_find.json b/install/ui/test/data/netgroup_find.json
index 15626e0b9..6addf3948 100644
--- a/install/ui/test/data/netgroup_find.json
+++ b/install/ui/test/data/netgroup_find.json
@@ -11,17 +11,17 @@
"description": [
"staging servers"
],
- "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
"memberhost": [],
"memberof": [],
"memberuser": [
- "cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
+ "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
],
"memberuser_group": [
"muppets"
],
"nisdomainname": [
- "idm.lab.bos.redhat.com"
+ "example.com"
]
},
{
@@ -31,22 +31,22 @@
"description": [
"live servers"
],
- "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
+ "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
"memberhost": [
- "cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
+ "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
],
"memberhost_hostgroup": [
"host-live"
],
"memberof": [],
"memberuser": [
- "cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
+ "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
],
"memberuser_group": [
"muppets"
],
"nisdomainname": [
- "idm.lab.bos.redhat.com"
+ "example.com"
]
}
],
diff --git a/install/ui/test/data/netgroup_find_pkeys.json b/install/ui/test/data/netgroup_find_pkeys.json
new file mode 100644
index 000000000..7e3c87f61
--- /dev/null
+++ b/install/ui/test/data/netgroup_find_pkeys.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "result": [
+ {
+ "cn": [
+ "net-stage"
+ ],
+ "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "net-live"
+ ],
+ "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/netgroup_get_records.json b/install/ui/test/data/netgroup_get_records.json
new file mode 100644
index 000000000..6383f73d1
--- /dev/null
+++ b/install/ui/test/data/netgroup_get_records.json
@@ -0,0 +1,64 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "net-stage"
+ ],
+ "description": [
+ "staging servers"
+ ],
+ "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
+ "memberhost": [],
+ "memberof": [],
+ "memberuser": [
+ "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "memberuser_group": [
+ "muppets"
+ ],
+ "nisdomainname": [
+ "example.com"
+ ]
+ },
+ "summary": null,
+ "value": "net-stage"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "net-live"
+ ],
+ "description": [
+ "live servers"
+ ],
+ "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
+ "memberhost": [
+ "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
+ ],
+ "memberhost_hostgroup": [
+ "host-live"
+ ],
+ "memberof": [],
+ "memberuser": [
+ "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "memberuser_group": [
+ "muppets"
+ ],
+ "nisdomainname": [
+ "example.com"
+ ]
+ },
+ "summary": null,
+ "value": "net-live"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/netgroup_show.json b/install/ui/test/data/netgroup_show.json
index aa77e8885..4702fa01e 100644
--- a/install/ui/test/data/netgroup_show.json
+++ b/install/ui/test/data/netgroup_show.json
@@ -9,7 +9,7 @@
"description": [
"live servers"
],
- "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
"memberhost_host": [
"live3.pbs.org",
"live2.pbs.org",
@@ -29,7 +29,7 @@
"count123"
],
"nisdomainname": [
- "ayoung.boston.devel.redhat.com"
+ "example.com"
]
},
"summary": null,
diff --git a/install/ui/test/data/permission_add.json b/install/ui/test/data/permission_add.json
index 9ea7b226b..d1def4771 100644
--- a/install/ui/test/data/permission_add.json
+++ b/install/ui/test/data/permission_add.json
@@ -9,7 +9,7 @@
"description": [
"description"
],
- "dn": "cn=testperm,cn=permissions,cn=pbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=testperm,cn=permissions,cn=pbac,dc=example,dc=com",
"objectclass": [
"groupofnames",
"top"
diff --git a/install/ui/test/data/permission_find_pkeys.json b/install/ui/test/data/permission_find_pkeys.json
new file mode 100644
index 000000000..35d0acb98
--- /dev/null
+++ b/install/ui/test/data/permission_find_pkeys.json
@@ -0,0 +1,35 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 4,
+ "result": [
+ {
+ "cn": [
+ "filter"
+ ],
+ "dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa"
+ },
+ {
+ "cn": [
+ "subtree"
+ ],
+ "dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa"
+ },
+ {
+ "cn": [
+ "targetgroup"
+ ],
+ "dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa"
+ },
+ {
+ "cn": [
+ "type"
+ ],
+ "dn": "cn=type,cn=permissions,cn=pbac,dc=ipa"
+ }
+ ],
+ "summary": "4 permissions matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/permission_get_records.json b/install/ui/test/data/permission_get_records.json
new file mode 100644
index 000000000..c337d72cc
--- /dev/null
+++ b/install/ui/test/data/permission_get_records.json
@@ -0,0 +1,101 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 4,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "filter"
+ ],
+ "description": [
+ "Filter Permission"
+ ],
+ "dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa",
+ "filter": "(ou=Engineering)",
+ "objectclass": [
+ "groupofnames",
+ "top"
+ ],
+ "permissions": [
+ "write"
+ ]
+ },
+ "summary": null,
+ "value": "filter"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "subtree"
+ ],
+ "description": [
+ "Subtree Permission"
+ ],
+ "dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa",
+ "objectclass": [
+ "groupofnames",
+ "top"
+ ],
+ "permissions": [
+ "write"
+ ],
+ "subtree": "ldap:///dc=ipa"
+ },
+ "summary": null,
+ "value": "subtree"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "targetgroup"
+ ],
+ "description": [
+ "Target Group Permission"
+ ],
+ "dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa",
+ "objectclass": [
+ "groupofnames",
+ "top"
+ ],
+ "permissions": [
+ "write"
+ ],
+ "targetgroup": "ipausers"
+ },
+ "summary": null,
+ "value": "targetgroup"
+ },
+ {
+ "error": null,
+ "result": {
+ "attrs": [
+ "cn",
+ "description"
+ ],
+ "cn": [
+ "type"
+ ],
+ "description": [
+ "Type Permission"
+ ],
+ "dn": "cn=type,cn=permissions,cn=pbac,dc=ipa",
+ "objectclass": [
+ "groupofnames",
+ "top"
+ ],
+ "permissions": [
+ "write"
+ ],
+ "type": "user"
+ },
+ "summary": null,
+ "value": "type"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/permission_show.json b/install/ui/test/data/permission_show.json
index 0d5784274..4c4beb66b 100644
--- a/install/ui/test/data/permission_show.json
+++ b/install/ui/test/data/permission_show.json
@@ -27,9 +27,9 @@
"description": [
"Test Permission"
],
- "dn": "cn=test,cn=permissions,cn=hbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=test,cn=permissions,cn=hbac,dc=example,dc=com",
"member": [
- "cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com"
],
"objectclass": [
"groupofnames",
diff --git a/install/ui/test/data/privilege_find.json b/install/ui/test/data/privilege_find.json
index c48c4a0e8..c9054d887 100644
--- a/install/ui/test/data/privilege_find.json
+++ b/install/ui/test/data/privilege_find.json
@@ -11,7 +11,7 @@
"description": [
"User Administrators"
],
- "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addusers",
"change_password",
@@ -27,7 +27,7 @@
"description": [
"Group Administrators"
],
- "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addgroups",
"removegroups",
@@ -42,7 +42,7 @@
"description": [
"Host Administrators"
],
- "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addhosts",
"removehosts",
@@ -58,7 +58,7 @@
"description": [
"Host Group Administrators"
],
- "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addhostgroups",
"removehostgroups",
@@ -73,7 +73,7 @@
"description": [
"Role administration"
],
- "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addroles",
"removeroles",
@@ -89,7 +89,7 @@
"description": [
"Service Administrators"
],
- "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addservices",
"removeservices",
@@ -104,7 +104,7 @@
"description": [
"Automount Administrators"
],
- "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addautomountmaps",
"removeautomountmaps",
@@ -119,7 +119,7 @@
"description": [
"Netgroups Administrators"
],
- "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addnetgroups",
"removenetgroups",
@@ -134,7 +134,7 @@
"description": [
"Certificate Administrators"
],
- "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"retrieve_certs",
"request_certs",
@@ -151,9 +151,9 @@
"description": [
"Replication Administrators"
],
- "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberindirect": [
- "uid=admin,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "uid=admin,cn=users,cn=accounts,dc=example,dc=com"
],
"memberof_permission": [
"managereplica",
@@ -167,7 +167,7 @@
"description": [
"Host Enrollment"
],
- "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"manage_host_keytab",
"enroll_host"
@@ -180,7 +180,7 @@
"description": [
"Entitlement Administrators"
],
- "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com",
"memberof_permission": [
"addentitlements",
"removeentitlements",
@@ -194,7 +194,7 @@
"description": [
"DNS Administrators"
],
- "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
},
{
"cn": [
@@ -203,9 +203,9 @@
"description": [
"DNS Servers"
],
- "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
"memberindirect": [
- "krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
]
}
],
diff --git a/install/ui/test/data/privilege_find_pkeys.json b/install/ui/test/data/privilege_find_pkeys.json
new file mode 100644
index 000000000..e8bad4b40
--- /dev/null
+++ b/install/ui/test/data/privilege_find_pkeys.json
@@ -0,0 +1,95 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 14,
+ "result": [
+ {
+ "cn": [
+ "useradmin"
+ ],
+ "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "groupadmin"
+ ],
+ "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "hostadmin"
+ ],
+ "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "hostgroupadmin"
+ ],
+ "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "delegationadmin"
+ ],
+ "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "serviceadmin"
+ ],
+ "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "automountadmin"
+ ],
+ "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "netgroupadmin"
+ ],
+ "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "certadmin"
+ ],
+ "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "replicaadmin"
+ ],
+ "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "enrollhost"
+ ],
+ "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "entitlementadmin"
+ ],
+ "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "dnsadmin"
+ ],
+ "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "dnsserver"
+ ],
+ "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com"
+ }
+ ],
+ "summary": "14 privileges matched",
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/privilege_get_records.json b/install/ui/test/data/privilege_get_records.json
new file mode 100644
index 000000000..38efdbcd4
--- /dev/null
+++ b/install/ui/test/data/privilege_get_records.json
@@ -0,0 +1,283 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 14,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "useradmin"
+ ],
+ "description": [
+ "User Administrators"
+ ],
+ "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addusers",
+ "change_password",
+ "add_user_to_default_group",
+ "removeusers",
+ "modifyusers"
+ ]
+ },
+ "summary": null,
+ "value": "useradmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "groupadmin"
+ ],
+ "description": [
+ "Group Administrators"
+ ],
+ "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addgroups",
+ "removegroups",
+ "modifygroups",
+ "modifygroupmembership"
+ ]
+ },
+ "summary": null,
+ "value": "groupadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "hostadmin"
+ ],
+ "description": [
+ "Host Administrators"
+ ],
+ "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addhosts",
+ "removehosts",
+ "modifyhosts",
+ "manage_host_keytab",
+ "enroll_host"
+ ]
+ },
+ "summary": null,
+ "value": "hostadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "hostgroupadmin"
+ ],
+ "description": [
+ "Host Group Administrators"
+ ],
+ "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addhostgroups",
+ "removehostgroups",
+ "modifyhostgroups",
+ "modifyhostgroupmembership"
+ ]
+ },
+ "summary": null,
+ "value": "hostgroupadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "delegationadmin"
+ ],
+ "description": [
+ "Role administration"
+ ],
+ "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addroles",
+ "removeroles",
+ "modifyroles",
+ "modifyrolemembership",
+ "modifyprivilegemembership"
+ ]
+ },
+ "summary": null,
+ "value": "delegationadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "serviceadmin"
+ ],
+ "description": [
+ "Service Administrators"
+ ],
+ "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addservices",
+ "removeservices",
+ "modifyservices",
+ "manage_service_keytab"
+ ]
+ },
+ "summary": null,
+ "value": "serviceadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "automountadmin"
+ ],
+ "description": [
+ "Automount Administrators"
+ ],
+ "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addautomountmaps",
+ "removeautomountmaps",
+ "addautomountkeys",
+ "removeautomountkeys"
+ ]
+ },
+ "summary": null,
+ "value": "automountadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "netgroupadmin"
+ ],
+ "description": [
+ "Netgroups Administrators"
+ ],
+ "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addnetgroups",
+ "removenetgroups",
+ "modifynetgroups",
+ "modifynetgroupmembership"
+ ]
+ },
+ "summary": null,
+ "value": "netgroupadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "certadmin"
+ ],
+ "description": [
+ "Certificate Administrators"
+ ],
+ "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "retrieve_certs",
+ "request_certs",
+ "request_cert_different_host",
+ "certificate_status",
+ "revoke_certificate",
+ "certificate_remove_hold"
+ ]
+ },
+ "summary": null,
+ "value": "certadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "replicaadmin"
+ ],
+ "description": [
+ "Replication Administrators"
+ ],
+ "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberindirect": [
+ "uid=admin,cn=users,cn=accounts,dc=example,dc=com"
+ ],
+ "memberof_permission": [
+ "managereplica",
+ "deletereplica"
+ ]
+ },
+ "summary": null,
+ "value": "replicaadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "enrollhost"
+ ],
+ "description": [
+ "Host Enrollment"
+ ],
+ "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "manage_host_keytab",
+ "enroll_host"
+ ]
+ },
+ "summary": null,
+ "value": "enrollhost"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "entitlementadmin"
+ ],
+ "description": [
+ "Entitlement Administrators"
+ ],
+ "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberof_permission": [
+ "addentitlements",
+ "removeentitlements",
+ "modifyentitlements"
+ ]
+ },
+ "summary": null,
+ "value": "entitlementadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "dnsadmin"
+ ],
+ "description": [
+ "DNS Administrators"
+ ],
+ "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "dnsadmin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "dnsserver"
+ ],
+ "description": [
+ "DNS Servers"
+ ],
+ "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
+ "memberindirect": [
+ "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
+ ]
+ },
+ "summary": null,
+ "value": "dnsserver"
+ }
+ ]
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/privilege_show.json b/install/ui/test/data/privilege_show.json
index 7d9328aa0..ce2a25978 100644
--- a/install/ui/test/data/privilege_show.json
+++ b/install/ui/test/data/privilege_show.json
@@ -23,9 +23,9 @@
"description": [
"DNS Servers"
],
- "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
"memberindirect": [
- "krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
],
"objectclass": [
"top",
diff --git a/install/ui/test/data/pwpolicy_find.json b/install/ui/test/data/pwpolicy_find.json
index 629ebfc90..94cf88df6 100644
--- a/install/ui/test/data/pwpolicy_find.json
+++ b/install/ui/test/data/pwpolicy_find.json
@@ -6,7 +6,7 @@
"result": [
{
"cn": "GLOBAL",
- "dn": "cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=accounts,dc=example,dc=com",
"krbmaxpwdlife": [
"90"
],
@@ -30,7 +30,7 @@
"cospriority": [
"1"
],
- "dn": "cn=testgroup12,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com",
"krbmaxpwdlife": [
"40"
],
@@ -51,7 +51,7 @@
"cospriority": [
"2"
],
- "dn": "cn=testgroup22,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com",
"krbmaxpwdlife": [
"60"
],
diff --git a/install/ui/test/data/pwpolicy_find_pkeys.json b/install/ui/test/data/pwpolicy_find_pkeys.json
new file mode 100644
index 000000000..a5a0cf5ec
--- /dev/null
+++ b/install/ui/test/data/pwpolicy_find_pkeys.json
@@ -0,0 +1,27 @@
+{
+ "error": null,
+ "id": 6,
+ "result": {
+ "count": 3,
+ "result": [
+ {
+ "cn": "GLOBAL",
+ "dn": "cn=accounts,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "testgroup12"
+ ],
+ "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "testgroup22"
+ ],
+ "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/pwpolicy_get_records.json b/install/ui/test/data/pwpolicy_get_records.json
new file mode 100644
index 000000000..77fff6a45
--- /dev/null
+++ b/install/ui/test/data/pwpolicy_get_records.json
@@ -0,0 +1,85 @@
+{
+ "error": null,
+ "id": 6,
+ "result": {
+ "count": 3,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": "GLOBAL",
+ "dn": "cn=accounts,dc=example,dc=com",
+ "krbmaxpwdlife": [
+ "90"
+ ],
+ "krbminpwdlife": [
+ "1"
+ ],
+ "krbpwdhistorylength": [
+ "0"
+ ],
+ "krbpwdmindiffchars": [
+ "0"
+ ],
+ "krbpwdminlength": [
+ "8"
+ ]
+ },
+ "summary": null,
+ "value": "GLOBAL"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "testgroup12"
+ ],
+ "cospriority": [
+ "1"
+ ],
+ "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com",
+ "krbmaxpwdlife": [
+ "40"
+ ],
+ "krbminpwdlife": [
+ "50"
+ ],
+ "krbpwdhistorylength": [
+ "5"
+ ],
+ "krbpwdminlength": [
+ "6"
+ ]
+ },
+ "summary": null,
+ "value": "testgroup12"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "testgroup22"
+ ],
+ "cospriority": [
+ "2"
+ ],
+ "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com",
+ "krbmaxpwdlife": [
+ "60"
+ ],
+ "krbminpwdlife": [
+ "40"
+ ],
+ "krbpwdhistorylength": [
+ "8"
+ ],
+ "krbpwdminlength": [
+ "9"
+ ]
+ },
+ "summary": null,
+ "value": "testgroup22"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/pwpolicy_show.json b/install/ui/test/data/pwpolicy_show.json
index e91f52efa..5329f6b34 100644
--- a/install/ui/test/data/pwpolicy_show.json
+++ b/install/ui/test/data/pwpolicy_show.json
@@ -20,7 +20,7 @@
"cn": [
"global_policy"
],
- "dn": "cn=global_policy,cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=global_policy,cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com",
"krbmaxpwdlife": [
"90"
],
diff --git a/install/ui/test/data/role_find.json b/install/ui/test/data/role_find.json
index af013803c..6ca3b8ffb 100644
--- a/install/ui/test/data/role_find.json
+++ b/install/ui/test/data/role_find.json
@@ -11,7 +11,7 @@
"description": [
"Helpdesk"
],
- "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
}
],
"summary": "1 role matched",
diff --git a/install/ui/test/data/role_find_pkeys.json b/install/ui/test/data/role_find_pkeys.json
new file mode 100644
index 000000000..af2f3403b
--- /dev/null
+++ b/install/ui/test/data/role_find_pkeys.json
@@ -0,0 +1,17 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "result": [
+ {
+ "cn": [
+ "helpdesk"
+ ],
+ "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
+ }
+ ],
+ "summary": "1 role matched",
+ "truncated": false
+ }
+} \ No newline at end of file
diff --git a/install/ui/test/data/role_get_records.json b/install/ui/test/data/role_get_records.json
new file mode 100644
index 000000000..fc7ab747c
--- /dev/null
+++ b/install/ui/test/data/role_get_records.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "helpdesk"
+ ],
+ "description": [
+ "Helpdesk"
+ ],
+ "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "helpdesk"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/role_show.json b/install/ui/test/data/role_show.json
index 9ad8dd689..69189c034 100644
--- a/install/ui/test/data/role_show.json
+++ b/install/ui/test/data/role_show.json
@@ -23,7 +23,7 @@
"description": [
"Helpdesk"
],
- "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com",
"objectclass": [
"top",
"groupofnames",
diff --git a/install/ui/test/data/rolegroup_add.json b/install/ui/test/data/rolegroup_add.json
deleted file mode 100644
index 54e2c2832..000000000
--- a/install/ui/test/data/rolegroup_add.json
+++ /dev/null
@@ -1,22 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "result": {
- "cn": [
- "test"
- ],
- "description": [
- "Test role"
- ],
- "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "objectclass": [
- "groupofnames",
- "nestedgroup",
- "top"
- ]
- },
- "summary": "Added rolegroup \"test\"",
- "value": "test"
- }
-}
diff --git a/install/ui/test/data/rolegroup_add_member.json b/install/ui/test/data/rolegroup_add_member.json
deleted file mode 100644
index e68ecc28b..000000000
--- a/install/ui/test/data/rolegroup_add_member.json
+++ /dev/null
@@ -1,27 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "completed": 1,
- "failed": {
- "member": {
- "group": [],
- "host": [],
- "hostgroup": [],
- "user": []
- }
- },
- "result": {
- "cn": [
- "test"
- ],
- "description": [
- "Test role"
- ],
- "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "member_user": [
- "admin"
- ]
- }
- }
-}
diff --git a/install/ui/test/data/rolegroup_del.json b/install/ui/test/data/rolegroup_del.json
deleted file mode 100644
index 8af1e6306..000000000
--- a/install/ui/test/data/rolegroup_del.json
+++ /dev/null
@@ -1,9 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "result": true,
- "summary": "Deleted rolegroup \"test\"",
- "value": "test"
- }
-}
diff --git a/install/ui/test/data/rolegroup_find.json b/install/ui/test/data/rolegroup_find.json
deleted file mode 100644
index 8ed2a76b7..000000000
--- a/install/ui/test/data/rolegroup_find.json
+++ /dev/null
@@ -1,185 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "count": 15,
- "result": [
- {
- "cn": [
- "helpdesk"
- ],
- "description": [
- "Helpdesk"
- ],
- "dn": "cn=helpdesk,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "member_user": [
- "edewata"
- ]
- },
- {
- "cn": [
- "useradmin"
- ],
- "description": [
- "User Administrators"
- ],
- "dn": "cn=useradmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "groupadmin"
- ],
- "description": [
- "Group Administrators"
- ],
- "dn": "cn=groupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "hostadmin"
- ],
- "description": [
- "Host Administrators"
- ],
- "dn": "cn=hostadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "memberof_taskgroup": [
- "addhosts",
- "removehosts",
- "modifyhosts",
- "manage_host_keytab",
- "enroll_host"
- ]
- },
- {
- "cn": [
- "hostgroupadmin"
- ],
- "description": [
- "Host Group Administrators"
- ],
- "dn": "cn=hostgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "delegationadmin"
- ],
- "description": [
- "Role administration"
- ],
- "dn": "cn=delegationadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "serviceadmin"
- ],
- "description": [
- "Service Administrators"
- ],
- "dn": "cn=serviceadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "memberof_taskgroup": [
- "addservices",
- "removeservices",
- "modifyservices"
- ]
- },
- {
- "cn": [
- "automountadmin"
- ],
- "description": [
- "Automount Administrators"
- ],
- "dn": "cn=automountadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "netgroupadmin"
- ],
- "description": [
- "Netgroups Administrators"
- ],
- "dn": "cn=netgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "dnsadmin"
- ],
- "description": [
- "DNS Administrators"
- ],
- "dn": "cn=dnsadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "dnsserver"
- ],
- "description": [
- "DNS Servers"
- ],
- "dn": "cn=dnsserver,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- },
- {
- "cn": [
- "certadmin"
- ],
- "description": [
- "Certificate Administrators"
- ],
- "dn": "cn=certadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "memberof_taskgroup": [
- "retrieve_certs",
- "request_certs",
- "request_cert_different_host",
- "certificate_status",
- "revoke_certificate",
- "certificate_remove_hold"
- ]
- },
- {
- "cn": [
- "replicaadmin"
- ],
- "description": [
- "Replication Administrators"
- ],
- "dn": "cn=replicaadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "member_user": [
- "admin"
- ],
- "memberof_taskgroup": [
- "managereplica",
- "deletereplica"
- ]
- },
- {
- "cn": [
- "enrollhost"
- ],
- "description": [
- "Host Enrollment"
- ],
- "dn": "cn=enrollhost,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "memberof_taskgroup": [
- "manage_host_keytab",
- "enroll_host"
- ]
- },
- {
- "cn": [
- "entitlementadmin"
- ],
- "description": [
- "Entitlement Administrators"
- ],
- "dn": "cn=entitlementadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "memberof_taskgroup": [
- "addentitlements",
- "removeentitlements",
- "modifyentitlements"
- ]
- }
- ],
- "summary": "15 rolegroups matched",
- "truncated": false
- }
-}
diff --git a/install/ui/test/data/rolegroup_remove_member.json b/install/ui/test/data/rolegroup_remove_member.json
deleted file mode 100644
index d42bb6016..000000000
--- a/install/ui/test/data/rolegroup_remove_member.json
+++ /dev/null
@@ -1,24 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "completed": 1,
- "failed": {
- "member": {
- "group": [],
- "host": [],
- "hostgroup": [],
- "user": []
- }
- },
- "result": {
- "cn": [
- "test"
- ],
- "description": [
- "Test role"
- ],
- "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
- }
- }
-}
diff --git a/install/ui/test/data/rolegroup_show.json b/install/ui/test/data/rolegroup_show.json
deleted file mode 100644
index 4652fb2cd..000000000
--- a/install/ui/test/data/rolegroup_show.json
+++ /dev/null
@@ -1,20 +0,0 @@
-{
- "error": null,
- "id": 0,
- "result": {
- "result": {
- "cn": [
- "test"
- ],
- "description": [
- "Test role"
- ],
- "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
- "member_user": [
- "admin"
- ]
- },
- "summary": null,
- "value": "test"
- }
-}
diff --git a/install/ui/test/data/service_find_pkeys.json b/install/ui/test/data/service_find_pkeys.json
new file mode 100644
index 000000000..ef14125f2
--- /dev/null
+++ b/install/ui/test/data/service_find_pkeys.json
@@ -0,0 +1,29 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 3,
+ "result": [
+ {
+ "dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "krbprincipalname": [
+ "ldap/dev.example.com@DEV.EXAMPLE.COM"
+ ]
+ },
+ {
+ "dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "krbprincipalname": [
+ "HTTP/dev.example.com@DEV.EXAMPLE.COM"
+ ]
+ },
+ {
+ "dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "krbprincipalname": [
+ "test/dev.example.com@DEV.EXAMPLE.COM"
+ ]
+ }
+ ],
+ "summary": "3 services matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/service_get_records.json b/install/ui/test/data/service_get_records.json
new file mode 100644
index 000000000..a91d1db49
--- /dev/null
+++ b/install/ui/test/data/service_get_records.json
@@ -0,0 +1,61 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 3,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "has_keytab": true,
+ "krbprincipalname": [
+ "ldap/dev.example.com@DEV.EXAMPLE.COM"
+ ],
+ "managedby_host": [
+ "dev.example.com"
+ ],
+ "usercertificate": [
+ {
+ "__base64__": "MIICbjCCAdegAwIBAgICA+0wDQYJKoZIhvcNAQEFBQAwKTEnMCUGA1UEAxMeSVBBIFRlc3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTEwMDkwMjA2NTYzMloXDTIwMDkwMjA2NTYzMlowKDEMMAoGA1UEChMDSVBBMRgwFgYDVQQDEw9kZXYuZXhhbXBsZS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDc63RjpqUCI84j9kjn0XYmpAOjkYbLddT9F0UUanASg1iIhscwWjvp/Mf5ZIzEYoB+dloI9gvEUWb8CU/x42QZr4lgEK4m/vCSDA0CkAnWvU/DHdtcAgpdZeBOQ1CMynyvNvN/ajyaA8dPwRcs9yJDrWXMa7LzMuw+ct5HA7HRdDdvUeIFr8YZEd/Mt1N96BmlVf3GA3P89cWfCKr1iVnmyewanjKuwcws1GCxawCnp0w1GHbKct4PPhB3k6EN8ZipFDGZmSeDVsa3gF7y2reLAYTS1/RwWPAHNeQ0cpOMe155cF3uHGSoX+RWtgo0BZ1+wgLMU5sf9W3ZMln3WmoFAgMBAAGjIjAgMBEGCWCGSAGG+EIBAQQEAwIGQDALBgNVHQ8EBAMCBSAwDQYJKoZIhvcNAQEFBQADgYEAbSYTU+IQvfppQE7setcpO/PiFNnMaZ3Ss7UGjm6XoPem9X0ktQOfWhBuhfH/7MbPdg2zn+55soaRpd8rOThr187G40GAMM5I3Jr+8386Q4zwCvED7B09pzBhQd/4ecVTIYFc82EytsM6I1aBrG9cLLuT+RL2dK5efOymCf/zjsw="
+ }
+ ]
+ },
+ "summary": null,
+ "value": "ldap/dev.example.com@DEV.EXAMPLE.COM"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "has_keytab": true,
+ "krbprincipalname": [
+ "HTTP/dev.example.com@DEV.EXAMPLE.COM"
+ ],
+ "usercertificate": [
+ {
+ "__base64__": "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"
+ }
+ ]
+ },
+ "summary": null,
+ "value": "HTTP/dev.example.com@DEV.EXAMPLE.COM"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
+ "has_keytab": false,
+ "krbprincipalname": [
+ "test/dev.example.com@DEV.EXAMPLE.COM"
+ ],
+ "managedby_host": [
+ "dev.example.com"
+ ]
+ },
+ "summary": null,
+ "value": "test/dev.example.com@DEV.EXAMPLE.COM"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/sudocmd_find_pkeys.json b/install/ui/test/data/sudocmd_find_pkeys.json
new file mode 100644
index 000000000..f7f5a23ef
--- /dev/null
+++ b/install/ui/test/data/sudocmd_find_pkeys.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "result": [
+ {
+ "dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
+ "sudocmd": [
+ "/usr/bin/more"
+ ]
+ },
+ {
+ "dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
+ "sudocmd": [
+ "/usr/bin/less"
+ ]
+ }
+ ],
+ "summary": "2 sudo command matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/sudocmd_get_records.json b/install/ui/test/data/sudocmd_get_records.json
new file mode 100644
index 000000000..0ae943c80
--- /dev/null
+++ b/install/ui/test/data/sudocmd_get_records.json
@@ -0,0 +1,31 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
+ "sudocmd": [
+ "/usr/bin/more"
+ ]
+ },
+ "summary": null,
+ "value": "/usr/bin/more"
+ },
+ {
+ "error": null,
+ "result": {
+ "dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
+ "sudocmd": [
+ "/usr/bin/less"
+ ]
+ },
+ "summary": null,
+ "value": "/usr/bin/less"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/sudocmdgroup_find_pkeys.json b/install/ui/test/data/sudocmdgroup_find_pkeys.json
new file mode 100644
index 000000000..03a3cf4d4
--- /dev/null
+++ b/install/ui/test/data/sudocmdgroup_find_pkeys.json
@@ -0,0 +1,23 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "result": [
+ {
+ "cn": [
+ "group1"
+ ],
+ "dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
+ },
+ {
+ "cn": [
+ "group2"
+ ],
+ "dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": "2 sudo command groups matched",
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/sudocmdgroup_get_records.json b/install/ui/test/data/sudocmdgroup_get_records.json
new file mode 100644
index 000000000..2670bea1c
--- /dev/null
+++ b/install/ui/test/data/sudocmdgroup_get_records.json
@@ -0,0 +1,41 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 2,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "group1"
+ ],
+ "description": [
+ "Group 1"
+ ],
+ "dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com",
+ "member_sudocmd": [
+ "/usr/bin/more",
+ "/usr/bin/less"
+ ]
+ },
+ "summary": null,
+ "value": "group1"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "group2"
+ ],
+ "description": [
+ "Group 2"
+ ],
+ "dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "group2"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/sudorule_find_pkeys.json b/install/ui/test/data/sudorule_find_pkeys.json
new file mode 100644
index 000000000..a843b2a5b
--- /dev/null
+++ b/install/ui/test/data/sudorule_find_pkeys.json
@@ -0,0 +1,17 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "result": [
+ {
+ "cn": [
+ "test"
+ ],
+ "dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com"
+ }
+ ],
+ "summary": null,
+ "truncated": false
+ }
+}
diff --git a/install/ui/test/data/sudorule_get_records.json b/install/ui/test/data/sudorule_get_records.json
new file mode 100644
index 000000000..b0d82b880
--- /dev/null
+++ b/install/ui/test/data/sudorule_get_records.json
@@ -0,0 +1,20 @@
+{
+ "error": null,
+ "id": 0,
+ "result": {
+ "count": 1,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "test"
+ ],
+ "dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com"
+ },
+ "summary": null,
+ "value": "test"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/taskgroup_find.json b/install/ui/test/data/taskgroup_find.json
deleted file mode 100644
index fa5c46250..000000000
--- a/install/ui/test/data/taskgroup_find.json
+++ /dev/null
@@ -1,554 +0,0 @@
-{
- "error": null,
- "id": 6,
- "result": {
- "count": 45,
- "result": [
- {
- "cn": [
- "addusers"
- ],
- "description": [
- "Add Users"
- ],
- "dn": "cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "useradmin"
- ]
- },
- {
- "cn": [
- "change_password"
- ],
- "description": [
- "Change a user password"
- ],
- "dn": "cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "useradmin"
- ]
- },
- {
- "cn": [
- "add_user_to_default_group"
- ],
- "description": [
- "Add user to default group"
- ],
- "dn": "cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "useradmin"
- ]
- },
- {
- "cn": [
- "removeusers"
- ],
- "description": [
- "Remove Users"
- ],
- "dn": "cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "useradmin"
- ]
- },
- {
- "cn": [
- "modifyusers"
- ],
- "description": [
- "Modify Users"
- ],
- "dn": "cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "useradmin"
- ]
- },
- {
- "cn": [
- "addgroups"
- ],
- "description": [
- "Add Groups"
- ],
- "dn": "cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "groupadmin"
- ]
- },
- {
- "cn": [
- "removegroups"
- ],
- "description": [
- "Remove Groups"
- ],
- "dn": "cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "groupadmin"
- ]
- },
- {
- "cn": [
- "modifygroups"
- ],
- "description": [
- "Modify Groups"
- ],
- "dn": "cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "groupadmin"
- ]
- },
- {
- "cn": [
- "modifygroupmembership"
- ],
- "description": [
- "Modify Group membership"
- ],
- "dn": "cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "groupadmin"
- ]
- },
- {
- "cn": [
- "addhosts"
- ],
- "description": [
- "Add Hosts"
- ],
- "dn": "cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostadmin"
- ]
- },
- {
- "cn": [
- "removehosts"
- ],
- "description": [
- "Remove Hosts"
- ],
- "dn": "cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostadmin"
- ]
- },
- {
- "cn": [
- "modifyhosts"
- ],
- "description": [
- "Modify Hosts"
- ],
- "dn": "cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostadmin"
- ]
- },
- {
- "cn": [
- "addhostgroups"
- ],
- "description": [
- "Add Host Groups"
- ],
- "dn": "cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostgroupadmin"
- ]
- },
- {
- "cn": [
- "removehostgroups"
- ],
- "description": [
- "Remove Host Groups"
- ],
- "dn": "cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostgroupadmin"
- ]
- },
- {
- "cn": [
- "modifyhostgroups"
- ],
- "description": [
- "Modify Host Groups"
- ],
- "dn": "cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostgroupadmin"
- ]
- },
- {
- "cn": [
- "modifyhostgroupmembership"
- ],
- "description": [
- "Modify Host Group membership"
- ],
- "dn": "cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostgroupadmin"
- ]
- },
- {
- "cn": [
- "addservices"
- ],
- "description": [
- "Add Services"
- ],
- "dn": "cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "serviceadmin"
- ]
- },
- {
- "cn": [
- "removeservices"
- ],
- "description": [
- "Remove Services"
- ],
- "dn": "cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "serviceadmin"
- ]
- },
- {
- "cn": [
- "addhrole",
- "addroles"
- ],
- "description": [
- "Add Roles"
- ],
- "dn": "cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "delegationadmin"
- ]
- },
- {
- "cn": [
- "removeroles"
- ],
- "description": [
- "Remove Roles"
- ],
- "dn": "cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "delegationadmin"
- ]
- },
- {
- "cn": [
- "modifyroles"
- ],
- "description": [
- "Modify Roles"
- ],
- "dn": "cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "delegationadmin"
- ]
- },
- {
- "cn": [
- "modifyrolegroupmembership"
- ],
- "description": [
- "Modify Role Group membership"
- ],
- "dn": "cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "delegationadmin"
- ]
- },
- {
- "cn": [
- "modifytaskgroupmembership"
- ],
- "description": [
- "Modify Task Group membership"
- ],
- "dn": "cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "delegationadmin"
- ]
- },
- {
- "cn": [
- "addautomount"
- ],
- "description": [
- "Add Automount maps/keys"
- ],
- "dn": "cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "automountadmin"
- ]
- },
- {
- "cn": [
- "removeautomount"
- ],
- "description": [
- "Remove Automount maps/keys"
- ],
- "dn": "cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "automountadmin"
- ]
- },
- {
- "cn": [
- "addnetgroups"
- ],
- "description": [
- "Add netgroups"
- ],
- "dn": "cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "netgroupadmin"
- ]
- },
- {
- "cn": [
- "removenetgroups"
- ],
- "description": [
- "Remove netgroups"
- ],
- "dn": "cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "netgroupadmin"
- ]
- },
- {
- "cn": [
- "modifynetgroups"
- ],
- "description": [
- "Modify netgroups"
- ],
- "dn": "cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "netgroupadmin"
- ]
- },
- {
- "cn": [
- "modifynetgroupmembership"
- ],
- "description": [
- "Modify netgroup membership"
- ],
- "dn": "cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "netgroupadmin"
- ]
- },
- {
- "cn": [
- "manage_host_keytab"
- ],
- "description": [
- "Manage host keytab"
- ],
- "dn": "cn=manage_host_keytab,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostadmin",
- "enrollhost"
- ]
- },
- {
- "cn": [
- "manage_host_keytab",
- "update_dns",
- "update_sn"
- ],
- "description": [
- "Updates DNS"
- ],
- "dn": "cn=update_dns,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "dnsadmin",
- "dnsserver"
- ]
- },
- {
- "cn": [
- "modifyservices"
- ],
- "description": [
- "Modify Services"
- ],
- "dn": "cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "serviceadmin"
- ]
- },
- {
- "cn": [
- "enroll_host"
- ],
- "description": [
- "Enroll a host"
- ],
- "dn": "cn=enroll_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "hostadmin",
- "enrollhost"
- ]
- },
- {
- "cn": [
- "retrieve_certs"
- ],
- "description": [
- "Retrieve SSL Certificates"
- ],
- "dn": "cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "request_certs"
- ],
- "description": [
- "Request a SSL Certificate"
- ],
- "dn": "cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "request_cert_different_host"
- ],
- "description": [
- "Request a SSL Certificate from a different host"
- ],
- "dn": "cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "certificate_status"
- ],
- "description": [
- "Status of cert request"
- ],
- "dn": "cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "revoke_certificate"
- ],
- "description": [
- "Revoke Certificate"
- ],
- "dn": "cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "certificate_remove_hold"
- ],
- "description": [
- "Certificate Remove Hold"
- ],
- "dn": "cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "certadmin"
- ]
- },
- {
- "cn": [
- "managereplica"
- ],
- "description": [
- "Manage Replication Agreements"
- ],
- "dn": "cn=managereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "replicaadmin"
- ]
- },
- {
- "cn": [
- "deletereplica"
- ],
- "description": [
- "Delete Replication Agreements"
- ],
- "dn": "cn=deletereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "replicaadmin"
- ]
- },
- {
- "cn": [
- "addentitlements"
- ],
- "description": [
- "Add Entitlements"
- ],
- "dn": "cn=addentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "entitlementadmin"
- ]
- },
- {
- "cn": [
- "removeentitlements"
- ],
- "description": [
- "Remove Entitlements"
- ],
- "dn": "cn=removeentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "entitlementadmin"
- ]
- },
- {
- "cn": [
- "modifyentitlements"
- ],
- "description": [
- "Modify Entitlements"
- ],
- "dn": "cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
- "member_rolegroup": [
- "entitlementadmin"
- ]
- },
- {
- "cn": [
- "testtaskgroup"
- ],
- "description": [
- "test1"
- ],
- "dn": "cn=testtaskgroup,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
- }
- ],
- "summary": "45 grupos de tarea coincidentes",
- "truncated": false
- }
-} \ No newline at end of file
diff --git a/install/ui/test/data/user_add.json b/install/ui/test/data/user_add.json
index e6a98b5c2..8e51993f3 100644
--- a/install/ui/test/data/user_add.json
+++ b/install/ui/test/data/user_add.json
@@ -3,7 +3,7 @@
"id": 10,
"result": {
"result": {
- "dn": "uid=snuffy,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=snuffy,cn=users,cn=accounts,dc=example,dc=com",
"gecos": [
"snuffy"
],
@@ -17,7 +17,7 @@
"a4ce7d19-b439-11df-a9ae-525400674dcd"
],
"krbprincipalname": [
- "snuffy@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "snuffy@EXAMPLE.COM"
],
"loginshell": [
"/bin/sh"
diff --git a/install/ui/test/data/user_find.json b/install/ui/test/data/user_find.json
index bd6c59766..825baa2ca 100644
--- a/install/ui/test/data/user_find.json
+++ b/install/ui/test/data/user_find.json
@@ -5,7 +5,7 @@
"count": 100,
"result": [
{
- "dn": "uid=abradley,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=abradley,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400048"
],
@@ -32,7 +32,7 @@
]
},
{
- "dn": "uid=abrown,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=abrown,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400013"
],
@@ -59,7 +59,7 @@
]
},
{
- "dn": "uid=acarlson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=acarlson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400060"
],
@@ -86,7 +86,7 @@
]
},
{
- "dn": "uid=adaniels,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=adaniels,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400059"
],
@@ -113,7 +113,7 @@
]
},
{
- "dn": "uid=admin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=admin,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400000"
],
@@ -137,7 +137,7 @@
]
},
{
- "dn": "uid=agordon,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=agordon,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400080"
],
@@ -164,7 +164,7 @@
]
},
{
- "dn": "uid=ajohnson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ajohnson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400011"
],
@@ -191,7 +191,7 @@
]
},
{
- "dn": "uid=ajones,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ajones,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400014"
],
@@ -218,7 +218,7 @@
]
},
{
- "dn": "uid=amiller,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=amiller,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400015"
],
@@ -245,7 +245,7 @@
]
},
{
- "dn": "uid=apeterson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=apeterson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400104"
],
@@ -272,7 +272,7 @@
]
},
{
- "dn": "uid=arhodes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=arhodes,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400031"
],
@@ -299,7 +299,7 @@
]
},
{
- "dn": "uid=aromero,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=aromero,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400079"
],
@@ -326,7 +326,7 @@
]
},
{
- "dn": "uid=asmith,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=asmith,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400010"
],
@@ -353,7 +353,7 @@
]
},
{
- "dn": "uid=awilliams,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=awilliams,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400012"
],
@@ -380,7 +380,7 @@
]
},
{
- "dn": "uid=bbauer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=bbauer,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400094"
],
@@ -407,7 +407,7 @@
]
},
{
- "dn": "uid=bgross,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=bgross,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400071"
],
@@ -434,7 +434,7 @@
]
},
{
- "dn": "uid=bmcgee,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=bmcgee,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400075"
],
@@ -461,7 +461,7 @@
]
},
{
- "dn": "uid=cduffy,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=cduffy,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400058"
],
@@ -488,7 +488,7 @@
]
},
{
- "dn": "uid=chartman,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=chartman,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400082"
],
@@ -515,7 +515,7 @@
]
},
{
- "dn": "uid=chuynh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=chuynh,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400093"
],
@@ -542,7 +542,7 @@
]
},
{
- "dn": "uid=ckramer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ckramer,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400092"
],
@@ -569,7 +569,7 @@
]
},
{
- "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400039"
],
@@ -596,7 +596,7 @@
]
},
{
- "dn": "uid=dbriggs,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=dbriggs,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400069"
],
@@ -623,7 +623,7 @@
]
},
{
- "dn": "uid=dkelly,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=dkelly,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400050"
],
@@ -650,7 +650,7 @@
]
},
{
- "dn": "uid=dmontes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=dmontes,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400027"
],
@@ -677,7 +677,7 @@
]
},
{
- "dn": "uid=dmyers,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=dmyers,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400102"
],
@@ -704,7 +704,7 @@
]
},
{
- "dn": "uid=drosario,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=drosario,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400051"
],
@@ -731,7 +731,7 @@
]
},
{
- "dn": "uid=eduardo,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=eduardo,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400007"
],
@@ -758,7 +758,7 @@
]
},
{
- "dn": "uid=ekane,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ekane,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400070"
],
@@ -785,7 +785,7 @@
]
},
{
- "dn": "uid=ewatkins,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ewatkins,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400047"
],
@@ -812,7 +812,7 @@
]
},
{
- "dn": "uid=fstrong,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=fstrong,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400084"
],
@@ -839,7 +839,7 @@
]
},
{
- "dn": "uid=fwolfe,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=fwolfe,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400035"
],
@@ -866,7 +866,7 @@
]
},
{
- "dn": "uid=grobles,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=grobles,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400066"
],
@@ -893,7 +893,7 @@
]
},
{
- "dn": "uid=groman,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=groman,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400100"
],
@@ -920,7 +920,7 @@
]
},
{
- "dn": "uid=ibeard,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ibeard,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400037"
],
@@ -947,7 +947,7 @@
]
},
{
- "dn": "uid=ipotts,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ipotts,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400095"
],
@@ -974,7 +974,7 @@
]
},
{
- "dn": "uid=jbuckley,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jbuckley,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400045"
],
@@ -1001,7 +1001,7 @@
]
},
{
- "dn": "uid=jburch,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jburch,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400090"
],
@@ -1028,7 +1028,7 @@
]
},
{
- "dn": "uid=jgould,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jgould,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400046"
],
@@ -1055,7 +1055,7 @@
]
},
{
- "dn": "uid=jmaynard,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jmaynard,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400088"
],
@@ -1082,7 +1082,7 @@
]
},
{
- "dn": "uid=jmccann,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jmccann,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400064"
],
@@ -1109,7 +1109,7 @@
]
},
{
- "dn": "uid=jmccarty,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jmccarty,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400089"
],
@@ -1136,7 +1136,7 @@
]
},
{
- "dn": "uid=jmckee,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jmckee,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400057"
],
@@ -1163,7 +1163,7 @@
]
},
{
- "dn": "uid=jpreston,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jpreston,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400052"
],
@@ -1190,7 +1190,7 @@
]
},
{
- "dn": "uid=jwu,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=jwu,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400054"
],
@@ -1217,7 +1217,7 @@
]
},
{
- "dn": "uid=kanderson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kanderson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400004"
],
@@ -1244,7 +1244,7 @@
]
},
{
- "dn": "uid=kfisher,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kfisher,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400076"
],
@@ -1271,7 +1271,7 @@
]
},
{
- "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400097"
],
@@ -1298,7 +1298,7 @@
]
},
{
- "dn": "uid=kmills,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kmills,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400086"
],
@@ -1325,7 +1325,7 @@
]
},
{
- "dn": "uid=kreyes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kreyes,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400091"
],
@@ -1352,7 +1352,7 @@
]
},
{
- "dn": "uid=kvonneu,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kvonneu,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400005"
],
@@ -1379,7 +1379,7 @@
]
},
{
- "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400033"
],
@@ -1406,7 +1406,7 @@
]
},
{
- "dn": "uid=lbarnett,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lbarnett,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400105"
],
@@ -1433,7 +1433,7 @@
]
},
{
- "dn": "uid=lcohen,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lcohen,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400083"
],
@@ -1460,7 +1460,7 @@
]
},
{
- "dn": "uid=ldennis,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ldennis,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400096"
],
@@ -1487,7 +1487,7 @@
]
},
{
- "dn": "uid=lduran,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lduran,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400038"
],
@@ -1514,7 +1514,7 @@
]
},
{
- "dn": "uid=lgross,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lgross,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400085"
],
@@ -1541,7 +1541,7 @@
]
},
{
- "dn": "uid=lhall,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=lhall,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400049"
],
@@ -1568,7 +1568,7 @@
]
},
{
- "dn": "uid=llarson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=llarson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400067"
],
@@ -1595,7 +1595,7 @@
]
},
{
- "dn": "uid=marcher,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=marcher,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400055"
],
@@ -1622,7 +1622,7 @@
]
},
{
- "dn": "uid=mbailey,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mbailey,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400068"
],
@@ -1649,7 +1649,7 @@
]
},
{
- "dn": "uid=mbutler,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mbutler,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400087"
],
@@ -1676,7 +1676,7 @@
]
},
{
- "dn": "uid=mcarney,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mcarney,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400043"
],
@@ -1703,7 +1703,7 @@
]
},
{
- "dn": "uid=mclay,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mclay,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400062"
],
@@ -1730,7 +1730,7 @@
]
},
{
- "dn": "uid=mdyer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mdyer,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400036"
],
@@ -1757,7 +1757,7 @@
]
},
{
- "dn": "uid=mestes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mestes,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400077"
],
@@ -1784,7 +1784,7 @@
]
},
{
- "dn": "uid=mgates,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mgates,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400063"
],
@@ -1811,7 +1811,7 @@
]
},
{
- "dn": "uid=mjefferson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mjefferson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400053"
],
@@ -1838,7 +1838,7 @@
]
},
{
- "dn": "uid=mkrause,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mkrause,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400073"
],
@@ -1865,7 +1865,7 @@
]
},
{
- "dn": "uid=mlong,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mlong,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400078"
],
@@ -1892,7 +1892,7 @@
]
},
{
- "dn": "uid=mtravis,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mtravis,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400098"
],
@@ -1919,7 +1919,7 @@
]
},
{
- "dn": "uid=mvang,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mvang,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400030"
],
@@ -1946,7 +1946,7 @@
]
},
{
- "dn": "uid=mvaughan,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=mvaughan,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400065"
],
@@ -1973,7 +1973,7 @@
]
},
{
- "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400032"
],
@@ -2000,7 +2000,7 @@
]
},
{
- "dn": "uid=nmartinez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=nmartinez,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400040"
],
@@ -2027,7 +2027,7 @@
]
},
{
- "dn": "uid=ostein,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=ostein,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400006"
],
@@ -2054,7 +2054,7 @@
]
},
{
- "dn": "uid=pdawn,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=pdawn,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400009"
],
@@ -2081,7 +2081,7 @@
]
},
{
- "dn": "uid=rcannon,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=rcannon,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400103"
],
@@ -2108,7 +2108,7 @@
]
},
{
- "dn": "uid=rhale,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=rhale,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400056"
],
@@ -2135,7 +2135,7 @@
]
},
{
- "dn": "uid=sbecker,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sbecker,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400021"
],
@@ -2162,7 +2162,7 @@
]
},
{
- "dn": "uid=scohen,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=scohen,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400044"
],
@@ -2189,7 +2189,7 @@
]
},
{
- "dn": "uid=sfrazier,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sfrazier,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400020"
],
@@ -2216,7 +2216,7 @@
]
},
{
- "dn": "uid=sgregory,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sgregory,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400018"
],
@@ -2243,7 +2243,7 @@
]
},
{
- "dn": "uid=smaldonado,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=smaldonado,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400022"
],
@@ -2270,7 +2270,7 @@
]
},
{
- "dn": "uid=smcclure,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=smcclure,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400072"
],
@@ -2297,7 +2297,7 @@
]
},
{
- "dn": "uid=sparrish,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sparrish,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400074"
],
@@ -2324,7 +2324,7 @@
]
},
{
- "dn": "uid=sroberson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sroberson,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400028"
],
@@ -2351,7 +2351,7 @@
]
},
{
- "dn": "uid=sshelton,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sshelton,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400019"
],
@@ -2378,7 +2378,7 @@
]
},
{
- "dn": "uid=sshepherd,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=sshepherd,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400041"
],
@@ -2405,7 +2405,7 @@
]
},
{
- "dn": "uid=t,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=t,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400003"
],
@@ -2435,7 +2435,7 @@
]
},
{
- "dn": "uid=tburch,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=tburch,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400101"
],
@@ -2462,7 +2462,7 @@
]
},
{
- "dn": "uid=tcase,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=tcase,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400099"
],
@@ -2489,7 +2489,7 @@
]
},
{
- "dn": "uid=tosborn,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=tosborn,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400042"
],
@@ -2516,7 +2516,7 @@
]
},
{
- "dn": "uid=uevans,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=uevans,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400034"
],
@@ -2543,7 +2543,7 @@
]
},
{
- "dn": "uid=vgriffin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=vgriffin,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400081"
],
@@ -2570,7 +2570,7 @@
]
},
{
- "dn": "uid=vmendoza,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=vmendoza,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400029"
],
@@ -2597,7 +2597,7 @@
]
},
{
- "dn": "uid=wryan,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=wryan,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400061"
],
@@ -2624,7 +2624,7 @@
]
},
{
- "dn": "uid=zlloyd,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=zlloyd,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400016"
],
@@ -2651,7 +2651,7 @@
]
},
{
- "dn": "uid=zmarsh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=zmarsh,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400017"
],
@@ -2678,7 +2678,7 @@
]
},
{
- "dn": "uid=zoe,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=zoe,cn=users,cn=accounts,dc=dev,dc=example,dc=com",
"gidnumber": [
"835400008"
],
diff --git a/install/ui/test/data/user_find_pkeys.json b/install/ui/test/data/user_find_pkeys.json
new file mode 100644
index 000000000..1669d249e
--- /dev/null
+++ b/install/ui/test/data/user_find_pkeys.json
@@ -0,0 +1,1211 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 200,
+ "result": [
+ {
+ "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "abarrett"
+ ]
+ },
+ {
+ "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "abradley"
+ ]
+ },
+ {
+ "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "acarlson"
+ ]
+ },
+ {
+ "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "adaniels"
+ ]
+ },
+ {
+ "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "admin"
+ ]
+ },
+ {
+ "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ageorge"
+ ]
+ },
+ {
+ "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "agordon"
+ ]
+ },
+ {
+ "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "aobrien"
+ ]
+ },
+ {
+ "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "aortega"
+ ]
+ },
+ {
+ "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "aortiz"
+ ]
+ },
+ {
+ "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "apeterson"
+ ]
+ },
+ {
+ "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "arhodes"
+ ]
+ },
+ {
+ "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "aromero"
+ ]
+ },
+ {
+ "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "athompson"
+ ]
+ },
+ {
+ "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "avaldez"
+ ]
+ },
+ {
+ "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bbauer"
+ ]
+ },
+ {
+ "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bblair"
+ ]
+ },
+ {
+ "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bgross"
+ ]
+ },
+ {
+ "dn": "uid=bmcgee,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bmcgee"
+ ]
+ },
+ {
+ "dn": "uid=bnewton,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bnewton"
+ ]
+ },
+ {
+ "dn": "uid=bpage,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bpage"
+ ]
+ },
+ {
+ "dn": "uid=bswanson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bswanson"
+ ]
+ },
+ {
+ "dn": "uid=bwolfe,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "bwolfe"
+ ]
+ },
+ {
+ "dn": "uid=candrade,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "candrade"
+ ]
+ },
+ {
+ "dn": "uid=cbarrera,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cbarrera"
+ ]
+ },
+ {
+ "dn": "uid=ccarson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ccarson"
+ ]
+ },
+ {
+ "dn": "uid=cduffy,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cduffy"
+ ]
+ },
+ {
+ "dn": "uid=cgreer,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cgreer"
+ ]
+ },
+ {
+ "dn": "uid=chartman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "chartman"
+ ]
+ },
+ {
+ "dn": "uid=cheath,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cheath"
+ ]
+ },
+ {
+ "dn": "uid=chickman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "chickman"
+ ]
+ },
+ {
+ "dn": "uid=chuynh,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "chuynh"
+ ]
+ },
+ {
+ "dn": "uid=ckramer,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ckramer"
+ ]
+ },
+ {
+ "dn": "uid=clloyd,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "clloyd"
+ ]
+ },
+ {
+ "dn": "uid=cmccullough,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cmccullough"
+ ]
+ },
+ {
+ "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cmcintosh"
+ ]
+ },
+ {
+ "dn": "uid=cmelendez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cmelendez"
+ ]
+ },
+ {
+ "dn": "uid=crobles,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "crobles"
+ ]
+ },
+ {
+ "dn": "uid=ctrujillo,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ctrujillo"
+ ]
+ },
+ {
+ "dn": "uid=cvillarreal,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cvillarreal"
+ ]
+ },
+ {
+ "dn": "uid=cwiggins,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "cwiggins"
+ ]
+ },
+ {
+ "dn": "uid=dbean,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dbean"
+ ]
+ },
+ {
+ "dn": "uid=dblevins,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dblevins"
+ ]
+ },
+ {
+ "dn": "uid=dbriggs,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dbriggs"
+ ]
+ },
+ {
+ "dn": "uid=dhood,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dhood"
+ ]
+ },
+ {
+ "dn": "uid=dkelly,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dkelly"
+ ]
+ },
+ {
+ "dn": "uid=dlopez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dlopez"
+ ]
+ },
+ {
+ "dn": "uid=dmontes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dmontes"
+ ]
+ },
+ {
+ "dn": "uid=dmoses,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dmoses"
+ ]
+ },
+ {
+ "dn": "uid=dmyers,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dmyers"
+ ]
+ },
+ {
+ "dn": "uid=dphillips,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dphillips"
+ ]
+ },
+ {
+ "dn": "uid=drosario,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "drosario"
+ ]
+ },
+ {
+ "dn": "uid=dshort,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "dshort"
+ ]
+ },
+ {
+ "dn": "uid=eberry,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "eberry"
+ ]
+ },
+ {
+ "dn": "uid=eclay,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "eclay"
+ ]
+ },
+ {
+ "dn": "uid=ehayes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ehayes"
+ ]
+ },
+ {
+ "dn": "uid=ehunt,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ehunt"
+ ]
+ },
+ {
+ "dn": "uid=ekane,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ekane"
+ ]
+ },
+ {
+ "dn": "uid=eriley,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "eriley"
+ ]
+ },
+ {
+ "dn": "uid=ewatkins,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ewatkins"
+ ]
+ },
+ {
+ "dn": "uid=flam,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "flam"
+ ]
+ },
+ {
+ "dn": "uid=fstrong,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "fstrong"
+ ]
+ },
+ {
+ "dn": "uid=fwolfe,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "fwolfe"
+ ]
+ },
+ {
+ "dn": "uid=ghouse,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ghouse"
+ ]
+ },
+ {
+ "dn": "uid=gmcintosh,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "gmcintosh"
+ ]
+ },
+ {
+ "dn": "uid=gmoody,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "gmoody"
+ ]
+ },
+ {
+ "dn": "uid=gowen,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "gowen"
+ ]
+ },
+ {
+ "dn": "uid=grobles,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "grobles"
+ ]
+ },
+ {
+ "dn": "uid=groman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "groman"
+ ]
+ },
+ {
+ "dn": "uid=hcalderon,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "hcalderon"
+ ]
+ },
+ {
+ "dn": "uid=hpittman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "hpittman"
+ ]
+ },
+ {
+ "dn": "uid=hrichard,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "hrichard"
+ ]
+ },
+ {
+ "dn": "uid=ibeard,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ibeard"
+ ]
+ },
+ {
+ "dn": "uid=ipotts,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ipotts"
+ ]
+ },
+ {
+ "dn": "uid=jbarron,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jbarron"
+ ]
+ },
+ {
+ "dn": "uid=jbuckley,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jbuckley"
+ ]
+ },
+ {
+ "dn": "uid=jburch,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jburch"
+ ]
+ },
+ {
+ "dn": "uid=jgould,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jgould"
+ ]
+ },
+ {
+ "dn": "uid=jjoyce,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jjoyce"
+ ]
+ },
+ {
+ "dn": "uid=jkaufman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jkaufman"
+ ]
+ },
+ {
+ "dn": "uid=jkhan,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jkhan"
+ ]
+ },
+ {
+ "dn": "uid=jmaynard,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmaynard"
+ ]
+ },
+ {
+ "dn": "uid=jmccann,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmccann"
+ ]
+ },
+ {
+ "dn": "uid=jmccarty,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmccarty"
+ ]
+ },
+ {
+ "dn": "uid=jmcfarland,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmcfarland"
+ ]
+ },
+ {
+ "dn": "uid=jmckee,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmckee"
+ ]
+ },
+ {
+ "dn": "uid=jmullen,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jmullen"
+ ]
+ },
+ {
+ "dn": "uid=jpreston,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jpreston"
+ ]
+ },
+ {
+ "dn": "uid=jsanford,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jsanford"
+ ]
+ },
+ {
+ "dn": "uid=jsnow,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jsnow"
+ ]
+ },
+ {
+ "dn": "uid=jvelez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jvelez"
+ ]
+ },
+ {
+ "dn": "uid=jvilla,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jvilla"
+ ]
+ },
+ {
+ "dn": "uid=jwu,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jwu"
+ ]
+ },
+ {
+ "dn": "uid=jzavala,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "jzavala"
+ ]
+ },
+ {
+ "dn": "uid=kfisher,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kfisher"
+ ]
+ },
+ {
+ "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kgonzalez"
+ ]
+ },
+ {
+ "dn": "uid=kgraham,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kgraham"
+ ]
+ },
+ {
+ "dn": "uid=khuerta,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "khuerta"
+ ]
+ },
+ {
+ "dn": "uid=kmills,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kmills"
+ ]
+ },
+ {
+ "dn": "uid=kpatterson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kpatterson"
+ ]
+ },
+ {
+ "dn": "uid=kpeters,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kpeters"
+ ]
+ },
+ {
+ "dn": "uid=kreyes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kreyes"
+ ]
+ },
+ {
+ "dn": "uid=krivera,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "krivera"
+ ]
+ },
+ {
+ "dn": "uid=kshaw,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kshaw"
+ ]
+ },
+ {
+ "dn": "uid=kzhang,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "kzhang"
+ ]
+ },
+ {
+ "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lbaldwin"
+ ]
+ },
+ {
+ "dn": "uid=lbarnett,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lbarnett"
+ ]
+ },
+ {
+ "dn": "uid=lcabrera,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lcabrera"
+ ]
+ },
+ {
+ "dn": "uid=lchandler,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lchandler"
+ ]
+ },
+ {
+ "dn": "uid=lcohen,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lcohen"
+ ]
+ },
+ {
+ "dn": "uid=ldennis,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ldennis"
+ ]
+ },
+ {
+ "dn": "uid=lduran,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lduran"
+ ]
+ },
+ {
+ "dn": "uid=lgeorge,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lgeorge"
+ ]
+ },
+ {
+ "dn": "uid=lgibbs,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lgibbs"
+ ]
+ },
+ {
+ "dn": "uid=lgross,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lgross"
+ ]
+ },
+ {
+ "dn": "uid=lhall,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lhall"
+ ]
+ },
+ {
+ "dn": "uid=lhogan,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lhogan"
+ ]
+ },
+ {
+ "dn": "uid=ljennings,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ljennings"
+ ]
+ },
+ {
+ "dn": "uid=llarson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "llarson"
+ ]
+ },
+ {
+ "dn": "uid=lmorrison,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lmorrison"
+ ]
+ },
+ {
+ "dn": "uid=lnewman,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lnewman"
+ ]
+ },
+ {
+ "dn": "uid=lpacheco,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lpacheco"
+ ]
+ },
+ {
+ "dn": "uid=lrobinson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lrobinson"
+ ]
+ },
+ {
+ "dn": "uid=lsharp,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lsharp"
+ ]
+ },
+ {
+ "dn": "uid=lstevenson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lstevenson"
+ ]
+ },
+ {
+ "dn": "uid=lwalters,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lwalters"
+ ]
+ },
+ {
+ "dn": "uid=lwilson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "lwilson"
+ ]
+ },
+ {
+ "dn": "uid=marcher,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "marcher"
+ ]
+ },
+ {
+ "dn": "uid=mbailey,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mbailey"
+ ]
+ },
+ {
+ "dn": "uid=mblevins,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mblevins"
+ ]
+ },
+ {
+ "dn": "uid=mbray,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mbray"
+ ]
+ },
+ {
+ "dn": "uid=mbright,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mbright"
+ ]
+ },
+ {
+ "dn": "uid=mbutler,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mbutler"
+ ]
+ },
+ {
+ "dn": "uid=mcameron,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mcameron"
+ ]
+ },
+ {
+ "dn": "uid=mcarney,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mcarney"
+ ]
+ },
+ {
+ "dn": "uid=mclay,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mclay"
+ ]
+ },
+ {
+ "dn": "uid=mcrane,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mcrane"
+ ]
+ },
+ {
+ "dn": "uid=mdonovan,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mdonovan"
+ ]
+ },
+ {
+ "dn": "uid=mdyer,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mdyer"
+ ]
+ },
+ {
+ "dn": "uid=mescobar,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mescobar"
+ ]
+ },
+ {
+ "dn": "uid=mestes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mestes"
+ ]
+ },
+ {
+ "dn": "uid=mgates,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mgates"
+ ]
+ },
+ {
+ "dn": "uid=mjefferson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mjefferson"
+ ]
+ },
+ {
+ "dn": "uid=mkrause,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mkrause"
+ ]
+ },
+ {
+ "dn": "uid=mlong,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mlong"
+ ]
+ },
+ {
+ "dn": "uid=mmcintyre,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mmcintyre"
+ ]
+ },
+ {
+ "dn": "uid=mrichardson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mrichardson"
+ ]
+ },
+ {
+ "dn": "uid=mrowland,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mrowland"
+ ]
+ },
+ {
+ "dn": "uid=mtanner,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mtanner"
+ ]
+ },
+ {
+ "dn": "uid=mtravis,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mtravis"
+ ]
+ },
+ {
+ "dn": "uid=mvang,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mvang"
+ ]
+ },
+ {
+ "dn": "uid=mvaughan,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mvaughan"
+ ]
+ },
+ {
+ "dn": "uid=mvilla,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mvilla"
+ ]
+ },
+ {
+ "dn": "uid=mwoodard,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "mwoodard"
+ ]
+ },
+ {
+ "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "ngutierrez"
+ ]
+ },
+ {
+ "dn": "uid=nmartinez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "nmartinez"
+ ]
+ },
+ {
+ "dn": "uid=nparker,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "nparker"
+ ]
+ },
+ {
+ "dn": "uid=nramirez,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "nramirez"
+ ]
+ },
+ {
+ "dn": "uid=okennedy,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "okennedy"
+ ]
+ },
+ {
+ "dn": "uid=omcdonald,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "omcdonald"
+ ]
+ },
+ {
+ "dn": "uid=pcarroll,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "pcarroll"
+ ]
+ },
+ {
+ "dn": "uid=rcannon,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rcannon"
+ ]
+ },
+ {
+ "dn": "uid=rcarrillo,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rcarrillo"
+ ]
+ },
+ {
+ "dn": "uid=rcohen,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rcohen"
+ ]
+ },
+ {
+ "dn": "uid=rcontreras,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rcontreras"
+ ]
+ },
+ {
+ "dn": "uid=rhale,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rhale"
+ ]
+ },
+ {
+ "dn": "uid=rhampton,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "rhampton"
+ ]
+ },
+ {
+ "dn": "uid=sbarron,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sbarron"
+ ]
+ },
+ {
+ "dn": "uid=sbradford,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sbradford"
+ ]
+ },
+ {
+ "dn": "uid=scastaneda,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "scastaneda"
+ ]
+ },
+ {
+ "dn": "uid=scohen,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "scohen"
+ ]
+ },
+ {
+ "dn": "uid=skane,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "skane"
+ ]
+ },
+ {
+ "dn": "uid=sklein,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sklein"
+ ]
+ },
+ {
+ "dn": "uid=sknapp,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sknapp"
+ ]
+ },
+ {
+ "dn": "uid=smcclure,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "smcclure"
+ ]
+ },
+ {
+ "dn": "uid=smcfarland,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "smcfarland"
+ ]
+ },
+ {
+ "dn": "uid=sparrish,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sparrish"
+ ]
+ },
+ {
+ "dn": "uid=spruitt,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "spruitt"
+ ]
+ },
+ {
+ "dn": "uid=srich,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "srich"
+ ]
+ },
+ {
+ "dn": "uid=sroberson,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sroberson"
+ ]
+ },
+ {
+ "dn": "uid=sroy,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sroy"
+ ]
+ },
+ {
+ "dn": "uid=sserrano,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sserrano"
+ ]
+ },
+ {
+ "dn": "uid=sshepherd,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "sshepherd"
+ ]
+ },
+ {
+ "dn": "uid=swalter,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "swalter"
+ ]
+ },
+ {
+ "dn": "uid=swoodard,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "swoodard"
+ ]
+ },
+ {
+ "dn": "uid=tburch,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "tburch"
+ ]
+ },
+ {
+ "dn": "uid=tcase,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "tcase"
+ ]
+ },
+ {
+ "dn": "uid=tosborn,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "tosborn"
+ ]
+ },
+ {
+ "dn": "uid=tproctor,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "tproctor"
+ ]
+ },
+ {
+ "dn": "uid=twebster,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "twebster"
+ ]
+ },
+ {
+ "dn": "uid=uevans,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "uevans"
+ ]
+ },
+ {
+ "dn": "uid=vgill,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "vgill"
+ ]
+ },
+ {
+ "dn": "uid=vgriffin,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "vgriffin"
+ ]
+ },
+ {
+ "dn": "uid=vmendoza,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "vmendoza"
+ ]
+ },
+ {
+ "dn": "uid=vreyes,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "vreyes"
+ ]
+ },
+ {
+ "dn": "uid=wnichols,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "wnichols"
+ ]
+ },
+ {
+ "dn": "uid=wryan,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "wryan"
+ ]
+ },
+ {
+ "dn": "uid=wweaver,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "wweaver"
+ ]
+ },
+ {
+ "dn": "uid=yjacobs,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "yjacobs"
+ ]
+ },
+ {
+ "dn": "uid=zschneider,cn=users,cn=accounts,dc=example,dc=com",
+ "uid": [
+ "zschneider"
+ ]
+ }
+ ],
+ "summary": "200 users matched",
+ "truncated": true
+ }
+}
diff --git a/install/ui/test/data/user_get_records.json b/install/ui/test/data/user_get_records.json
new file mode 100644
index 000000000..c45a45c60
--- /dev/null
+++ b/install/ui/test/data/user_get_records.json
@@ -0,0 +1,1422 @@
+{
+ "error": null,
+ "id": null,
+ "result": {
+ "count": 20,
+ "results": [
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Adrian Barrett"
+ ],
+ "displayname": [
+ "Adrian Barrett"
+ ],
+ "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Adrian Barrett"
+ ],
+ "gidnumber": [
+ "1576000176"
+ ],
+ "givenname": [
+ "Adrian"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/abarrett"
+ ],
+ "initials": [
+ "AB"
+ ],
+ "ipauniqueid": [
+ "6cca548c-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "abarrett@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=abarrett,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Barrett"
+ ],
+ "uid": [
+ "abarrett"
+ ],
+ "uidnumber": [
+ "1576000176"
+ ]
+ },
+ "summary": null,
+ "value": "abarrett"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Anja Bradley"
+ ],
+ "displayname": [
+ "Anja Bradley"
+ ],
+ "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Anja Bradley"
+ ],
+ "gidnumber": [
+ "1576000024"
+ ],
+ "givenname": [
+ "Anja"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/abradley"
+ ],
+ "initials": [
+ "AB"
+ ],
+ "ipauniqueid": [
+ "5375ac2a-073f-11e1-95ae-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "abradley@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=abradley,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Bradley"
+ ],
+ "uid": [
+ "abradley"
+ ],
+ "uidnumber": [
+ "1576000024"
+ ]
+ },
+ "summary": null,
+ "value": "abradley"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Annmarie Carlson"
+ ],
+ "displayname": [
+ "Annmarie Carlson"
+ ],
+ "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Annmarie Carlson"
+ ],
+ "gidnumber": [
+ "1576000036"
+ ],
+ "givenname": [
+ "Annmarie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/acarlson"
+ ],
+ "initials": [
+ "AC"
+ ],
+ "ipauniqueid": [
+ "54dccaa8-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "acarlson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=acarlson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Carlson"
+ ],
+ "uid": [
+ "acarlson"
+ ],
+ "uidnumber": [
+ "1576000036"
+ ]
+ },
+ "summary": null,
+ "value": "acarlson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Angelika Daniels"
+ ],
+ "displayname": [
+ "Angelika Daniels"
+ ],
+ "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Angelika Daniels"
+ ],
+ "gidnumber": [
+ "1576000035"
+ ],
+ "givenname": [
+ "Angelika"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/adaniels"
+ ],
+ "initials": [
+ "AD"
+ ],
+ "ipauniqueid": [
+ "54abe492-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "adaniels@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=adaniels,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Daniels"
+ ],
+ "uid": [
+ "adaniels"
+ ],
+ "uidnumber": [
+ "1576000035"
+ ]
+ },
+ "summary": null,
+ "value": "adaniels"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Administrator"
+ ],
+ "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Administrator"
+ ],
+ "gidnumber": [
+ "1576000000"
+ ],
+ "has_keytab": true,
+ "has_password": true,
+ "homedirectory": [
+ "/home/admin"
+ ],
+ "ipauniqueid": [
+ "edbf4ade-073a-11e1-8a0f-525400e135d8"
+ ],
+ "krbextradata": [
+ {
+ "__base64__": "AAJ3crROcm9vdC9hZG1pbkBJRE0uTEFCLkJPUy5SRURIQVQuQ09NAA=="
+ }
+ ],
+ "krblastpwdchange": [
+ "20111104231711Z"
+ ],
+ "krbpasswordexpiration": [
+ "20120202231711Z"
+ ],
+ "krbprincipalname": [
+ "admin@EXAMPLE.COM"
+ ],
+ "loginshell": [
+ "/bin/bash"
+ ],
+ "memberof_group": [
+ "admins"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "inetuser",
+ "ipaobject"
+ ],
+ "sn": [
+ "Administrator"
+ ],
+ "uid": [
+ "admin"
+ ],
+ "uidnumber": [
+ "1576000000"
+ ]
+ },
+ "summary": null,
+ "value": "admin"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Antionette George"
+ ],
+ "displayname": [
+ "Antionette George"
+ ],
+ "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Antionette George"
+ ],
+ "gidnumber": [
+ "1576000165"
+ ],
+ "givenname": [
+ "Antionette"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/ageorge"
+ ],
+ "initials": [
+ "AG"
+ ],
+ "ipauniqueid": [
+ "6a8af776-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "ageorge@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=ageorge,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "George"
+ ],
+ "uid": [
+ "ageorge"
+ ],
+ "uidnumber": [
+ "1576000165"
+ ]
+ },
+ "summary": null,
+ "value": "ageorge"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Amiee Gordon"
+ ],
+ "displayname": [
+ "Amiee Gordon"
+ ],
+ "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Amiee Gordon"
+ ],
+ "gidnumber": [
+ "1576000056"
+ ],
+ "givenname": [
+ "Amiee"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/agordon"
+ ],
+ "initials": [
+ "AG"
+ ],
+ "ipauniqueid": [
+ "57b0510a-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "agordon@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=agordon,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Gordon"
+ ],
+ "uid": [
+ "agordon"
+ ],
+ "uidnumber": [
+ "1576000056"
+ ]
+ },
+ "summary": null,
+ "value": "agordon"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Antonio Obrien"
+ ],
+ "displayname": [
+ "Antonio Obrien"
+ ],
+ "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Antonio Obrien"
+ ],
+ "gidnumber": [
+ "1576000201"
+ ],
+ "givenname": [
+ "Antonio"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aobrien"
+ ],
+ "initials": [
+ "AO"
+ ],
+ "ipauniqueid": [
+ "72e80936-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aobrien@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=aobrien,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Obrien"
+ ],
+ "uid": [
+ "aobrien"
+ ],
+ "uidnumber": [
+ "1576000201"
+ ]
+ },
+ "summary": null,
+ "value": "aobrien"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Asley Ortega"
+ ],
+ "displayname": [
+ "Asley Ortega"
+ ],
+ "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Asley Ortega"
+ ],
+ "gidnumber": [
+ "1576000156"
+ ],
+ "givenname": [
+ "Asley"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aortega"
+ ],
+ "initials": [
+ "AO"
+ ],
+ "ipauniqueid": [
+ "68c80e56-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aortega@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=aortega,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Ortega"
+ ],
+ "uid": [
+ "aortega"
+ ],
+ "uidnumber": [
+ "1576000156"
+ ]
+ },
+ "summary": null,
+ "value": "aortega"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Alicia Ortiz"
+ ],
+ "displayname": [
+ "Alicia Ortiz"
+ ],
+ "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Alicia Ortiz"
+ ],
+ "gidnumber": [
+ "1576000181"
+ ],
+ "givenname": [
+ "Alicia"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aortiz"
+ ],
+ "initials": [
+ "AO"
+ ],
+ "ipauniqueid": [
+ "6dda4b48-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aortiz@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=aortiz,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Ortiz"
+ ],
+ "uid": [
+ "aortiz"
+ ],
+ "uidnumber": [
+ "1576000181"
+ ]
+ },
+ "summary": null,
+ "value": "aortiz"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Alda Peterson"
+ ],
+ "displayname": [
+ "Alda Peterson"
+ ],
+ "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Alda Peterson"
+ ],
+ "gidnumber": [
+ "1576000080"
+ ],
+ "givenname": [
+ "Alda"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/apeterson"
+ ],
+ "initials": [
+ "AP"
+ ],
+ "ipauniqueid": [
+ "5b25407a-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "apeterson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=apeterson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Peterson"
+ ],
+ "uid": [
+ "apeterson"
+ ],
+ "uidnumber": [
+ "1576000080"
+ ]
+ },
+ "summary": null,
+ "value": "apeterson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Augustina Rhodes"
+ ],
+ "displayname": [
+ "Augustina Rhodes"
+ ],
+ "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Augustina Rhodes"
+ ],
+ "gidnumber": [
+ "1576000007"
+ ],
+ "givenname": [
+ "Augustina"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/arhodes"
+ ],
+ "initials": [
+ "AR"
+ ],
+ "ipauniqueid": [
+ "51b4c812-073f-11e1-9cf6-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "arhodes@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=arhodes,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Rhodes"
+ ],
+ "uid": [
+ "arhodes"
+ ],
+ "uidnumber": [
+ "1576000007"
+ ]
+ },
+ "summary": null,
+ "value": "arhodes"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Ammie Romero"
+ ],
+ "displayname": [
+ "Ammie Romero"
+ ],
+ "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Ammie Romero"
+ ],
+ "gidnumber": [
+ "1576000055"
+ ],
+ "givenname": [
+ "Ammie"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/aromero"
+ ],
+ "initials": [
+ "AR"
+ ],
+ "ipauniqueid": [
+ "578ac750-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "aromero@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=aromero,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Romero"
+ ],
+ "uid": [
+ "aromero"
+ ],
+ "uidnumber": [
+ "1576000055"
+ ]
+ },
+ "summary": null,
+ "value": "aromero"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Adella Thompson"
+ ],
+ "displayname": [
+ "Adella Thompson"
+ ],
+ "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Adella Thompson"
+ ],
+ "gidnumber": [
+ "1576000123"
+ ],
+ "givenname": [
+ "Adella"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/athompson"
+ ],
+ "initials": [
+ "AT"
+ ],
+ "ipauniqueid": [
+ "62647b08-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "athompson@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=athompson,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Thompson"
+ ],
+ "uid": [
+ "athompson"
+ ],
+ "uidnumber": [
+ "1576000123"
+ ]
+ },
+ "summary": null,
+ "value": "athompson"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Asha Valdez"
+ ],
+ "displayname": [
+ "Asha Valdez"
+ ],
+ "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Asha Valdez"
+ ],
+ "gidnumber": [
+ "1576000195"
+ ],
+ "givenname": [
+ "Asha"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/avaldez"
+ ],
+ "initials": [
+ "AV"
+ ],
+ "ipauniqueid": [
+ "71821438-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "avaldez@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=avaldez,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Valdez"
+ ],
+ "uid": [
+ "avaldez"
+ ],
+ "uidnumber": [
+ "1576000195"
+ ]
+ },
+ "summary": null,
+ "value": "avaldez"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bulah Bauer"
+ ],
+ "displayname": [
+ "Bulah Bauer"
+ ],
+ "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bulah Bauer"
+ ],
+ "gidnumber": [
+ "1576000070"
+ ],
+ "givenname": [
+ "Bulah"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bbauer"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "598f9148-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bbauer@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=bbauer,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Bauer"
+ ],
+ "uid": [
+ "bbauer"
+ ],
+ "uidnumber": [
+ "1576000070"
+ ]
+ },
+ "summary": null,
+ "value": "bbauer"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bernardo Blair"
+ ],
+ "displayname": [
+ "Bernardo Blair"
+ ],
+ "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bernardo Blair"
+ ],
+ "gidnumber": [
+ "1576000169"
+ ],
+ "givenname": [
+ "Bernardo"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bblair"
+ ],
+ "initials": [
+ "BB"
+ ],
+ "ipauniqueid": [
+ "6b55c99c-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bblair@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=bblair,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Blair"
+ ],
+ "uid": [
+ "bblair"
+ ],
+ "uidnumber": [
+ "1576000169"
+ ]
+ },
+ "summary": null,
+ "value": "bblair"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Billy Gross"
+ ],
+ "displayname": [
+ "Billy Gross"
+ ],
+ "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Billy Gross"
+ ],
+ "gidnumber": [
+ "1576000047"
+ ],
+ "givenname": [
+ "Billy"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bgross"
+ ],
+ "initials": [
+ "BG"
+ ],
+ "ipauniqueid": [
+ "5679c2a8-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bgross@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=bgross,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Gross"
+ ],
+ "uid": [
+ "bgross"
+ ],
+ "uidnumber": [
+ "1576000047"
+ ]
+ },
+ "summary": null,
+ "value": "bgross"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bev Mcgee"
+ ],
+ "displayname": [
+ "Bev Mcgee"
+ ],
+ "dn": "uid=bmcgee,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bev Mcgee"
+ ],
+ "gidnumber": [
+ "1576000051"
+ ],
+ "givenname": [
+ "Bev"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bmcgee"
+ ],
+ "initials": [
+ "BM"
+ ],
+ "ipauniqueid": [
+ "56f64ee0-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bmcgee@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=bmcgee,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Mcgee"
+ ],
+ "uid": [
+ "bmcgee"
+ ],
+ "uidnumber": [
+ "1576000051"
+ ]
+ },
+ "summary": null,
+ "value": "bmcgee"
+ },
+ {
+ "error": null,
+ "result": {
+ "cn": [
+ "Bettyann Newton"
+ ],
+ "displayname": [
+ "Bettyann Newton"
+ ],
+ "dn": "uid=bnewton,cn=users,cn=accounts,dc=example,dc=com",
+ "gecos": [
+ "Bettyann Newton"
+ ],
+ "gidnumber": [
+ "1576000122"
+ ],
+ "givenname": [
+ "Bettyann"
+ ],
+ "has_keytab": false,
+ "has_password": false,
+ "homedirectory": [
+ "/home/bnewton"
+ ],
+ "initials": [
+ "BN"
+ ],
+ "ipauniqueid": [
+ "623d1c52-073f-11e1-89ea-525400e135d8"
+ ],
+ "krbprincipalname": [
+ "bnewton@EXAMPLE.COM"
+ ],
+ "krbpwdpolicyreference": [
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
+ ],
+ "loginshell": [
+ "/bin/sh"
+ ],
+ "memberof_group": [
+ "ipausers"
+ ],
+ "mepmanagedentry": [
+ "cn=bnewton,cn=groups,cn=accounts,dc=example,dc=com"
+ ],
+ "nsaccountlock": false,
+ "objectclass": [
+ "top",
+ "person",
+ "organizationalperson",
+ "inetorgperson",
+ "inetuser",
+ "posixaccount",
+ "krbprincipalaux",
+ "krbticketpolicyaux",
+ "ipaobject",
+ "mepOriginEntry"
+ ],
+ "sn": [
+ "Newton"
+ ],
+ "uid": [
+ "bnewton"
+ ],
+ "uidnumber": [
+ "1576000122"
+ ]
+ },
+ "summary": null,
+ "value": "bnewton"
+ }
+ ]
+ }
+}
diff --git a/install/ui/test/data/user_mod.json b/install/ui/test/data/user_mod.json
index c77012c14..cf0bf63f7 100644
--- a/install/ui/test/data/user_mod.json
+++ b/install/ui/test/data/user_mod.json
@@ -113,10 +113,10 @@
"20101105172205Z"
],
"krbprincipalname": [
- "kfrog@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "kfrog@EXAMPLE.COM"
],
"krbpwdpolicyreference": [
- "cn=global_policy,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
],
"loginshell": [
"/bin/sh"
@@ -129,7 +129,7 @@
"muppets"
],
"mepmanagedentry": [
- "cn=kfrog,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "cn=kfrog,cn=groups,cn=accounts,dc=example,dc=com"
],
"nsaccountlock": [
"False"
diff --git a/install/ui/test/data/user_show.json b/install/ui/test/data/user_show.json
index 2fbd049e5..25a505a7b 100644
--- a/install/ui/test/data/user_show.json
+++ b/install/ui/test/data/user_show.json
@@ -91,7 +91,7 @@
"cn": [
"Kermit The Frog"
],
- "dn": "uid=kfrog,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
+ "dn": "uid=kfrog,cn=users,cn=accounts,dc=example,dc=com",
"gecos": [
"kfrog"
],
@@ -114,10 +114,10 @@
"20101105172205Z"
],
"krbprincipalname": [
- "kfrog@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "kfrog@EXAMPLE.COM"
],
"krbpwdpolicyreference": [
- "cn=global_policy,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com"
],
"loginshell": [
"/bin/sh"
@@ -133,7 +133,7 @@
"editors"
],
"mepmanagedentry": [
- "cn=kfrog,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
+ "cn=kfrog,cn=groups,cn=accounts,dc=example,dc=com"
],
"nsaccountlock": [
"False"
diff --git a/install/ui/test/data/whoami.json b/install/ui/test/data/whoami.json
index a922d3720..aa161899e 100644
--- a/install/ui/test/data/whoami.json
+++ b/install/ui/test/data/whoami.json
@@ -2,6 +2,6 @@
"error": null,
"id": 0,
"result": {
- "summary": "admin@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
+ "summary": "admin@EXAMPLE.COM"
}
}