diff options
author | Endi S. Dewata <edewata@redhat.com> | 2011-11-08 15:18:31 -0600 |
---|---|---|
committer | Endi S. Dewata <edewata@redhat.com> | 2011-11-11 14:44:21 +0000 |
commit | df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047 (patch) | |
tree | 972297b26ec84be8f50b4818078b03dc29bd63f9 /install/ui/test/data | |
parent | 97660ac4d5d55fcd0ee40dc5ed863a1e1265492b (diff) | |
download | freeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.tar.gz freeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.tar.xz freeipa-df6bd6ab5acf6d6178f6dd726b9c5927ae7cf047.zip |
Updated sample data.
New sample data files have been added for search facet paging. Unused
files have been removed. The names used in the files have been updated
for consistency.
Ticket #981
Diffstat (limited to 'install/ui/test/data')
106 files changed, 6839 insertions, 1479 deletions
diff --git a/install/ui/test/data/aci_find.json b/install/ui/test/data/aci_find.json deleted file mode 100644 index d1687c112..000000000 --- a/install/ui/test/data/aci_find.json +++ /dev/null @@ -1,60 +0,0 @@ -{ - "error": null, - "id": 6, - "result": { - "count": 53, - "result": [ - "(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey\")(version 3.0;acl \"Enable Anonymous access\";allow (read,search,compare) userdn = \"ldap:///anyone\";)", - "(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey || ipaUniqueId || memberOf || serverHostName || enrolledBy\")(version 3.0;acl \"Admin can manage any entry\";allow (all) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword\")(version 3.0;acl \"Self can write own password\";allow (write) userdn = \"ldap:///self\";)", - "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Admins can write passwords\";allow (add,delete,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Password change service can read/write passwords\";allow (read,write) userdn = \"ldap:///krbprincipalname=kadmin/changepw@AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength\")(targetfilter = \"(objectClass=krbPwdPolicy)\")(version 3.0;acl \"Admins can write password policies\";allow (read,search,compare,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou\")(version 3.0;acl \"Self service\";allow (write) userdn = \"ldap:///self\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate status,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Get Certificates status from the CA\";allow (write) groupdn = \"ldap:///cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Users\";allow (delete) groupdn = \"ldap:///cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify group membership\";allow (write) groupdn = \"ldap:///cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Services\";allow (add) groupdn = \"ldap:///cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"change_password\";allow (write) groupdn = \"ldap:///cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Groups\";allow (add) groupdn = \"ldap:///cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hostgroups\";allow (write) groupdn = \"ldap:///cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Roles\";allow (write) groupdn = \"ldap:///cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"memberhost || externalhost || memberuser || member\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroup membership\";allow (write) groupdn = \"ldap:///cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"userCertificate\")(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Services\";allow (write) groupdn = \"ldap:///cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hostgroups\";allow (add) groupdn = \"ldap:///cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount maps\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount keys\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Services\";allow (delete) groupdn = \"ldap:///cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Users\";allow (add) groupdn = \"ldap:///cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"cn || description || l || location || nshardwareplatform || nsosversion\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hosts\";allow (write) groupdn = \"ldap:///cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"member\")(target = \"ldap:///cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add user to default group\";allow (write) groupdn = \"ldap:///cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hostgroups\";allow (delete) groupdn = \"ldap:///cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Remove entitlement entries\";allow (delete) groupdn = \"ldap:///cn=removeentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)", - "(targetattr = \"krbPrincipalName || enrolledBy || objectClass\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Enroll a host\";allow (write) groupdn = \"ldap:///cn=enroll_host,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hosts\";allow (add) groupdn = \"ldap:///cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove netgroups\";allow (delete) groupdn = \"ldap:///cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"description\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroups\";allow (write) groupdn = \"ldap:///cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify role group membership\";allow (write) groupdn = \"ldap:///cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"userCertificate\")(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Modify entitlements\";allow (write) groupdn = \"ldap:///cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)", - "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify task group membership\";allow (write) groupdn = \"ldap:///cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Roles\";allow (add) groupdn = \"ldap:///cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate remove hold,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Certificate Remove Hold\";allow (write) groupdn = \"ldap:///cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Roles\";allow (delete) groupdn = \"ldap:///cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount maps\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou || mepManagedEntry || objectclass\")(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Users\";allow (write) groupdn = \"ldap:///cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add netgroups\";allow (add) groupdn = \"ldap:///cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hosts\";allow (delete) groupdn = \"ldap:///cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Add entitlements\";allow (add) groupdn = \"ldap:///cn=addentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)", - "(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount keys\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Groups\";allow (delete) groupdn = \"ldap:///cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=retrieve certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Retrieve Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=revoke certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Revoke Certificate\";allow (write) groupdn = \"ldap:///cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"krbPrincipalKey || krbLastPwdChange\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Manage host keytab\";allow (write) groupdn = \"ldap:///cn=manage_host_keytab,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"cn || description || gidnumber || objectclass || mepManagedBy\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Groups\";allow (write) groupdn = \"ldap:///cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"member\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify host group membership\";allow (write) groupdn = \"ldap:///cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)", - "(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate different host,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from a different host\";allow (write) groupdn = \"ldap:///cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)" - ], - "summary": "53 ACIs matched" - } -} diff --git a/install/ui/test/data/automountkey_add.json b/install/ui/test/data/automountkey_add.json index 2c0193cdd..c4e442d47 100644 --- a/install/ui/test/data/automountkey_add.json +++ b/install/ui/test/data/automountkey_add.json @@ -12,7 +12,7 @@ "description": [ "/var/log/ipa mountinfogoeshere" ], - "dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automount", "top" diff --git a/install/ui/test/data/automountkey_find.json b/install/ui/test/data/automountkey_find.json index 47326a33c..3123b551d 100644 --- a/install/ui/test/data/automountkey_find.json +++ b/install/ui/test/data/automountkey_find.json @@ -14,7 +14,7 @@ "description": [ "nfsserver:/var/log/dirsrv /var/log/dirsrv" ], - "dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automount", "top" @@ -30,7 +30,7 @@ "description": [ "nfsserver:/var/log/ipa /var/log/ipa" ], - "dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automount", "top" diff --git a/install/ui/test/data/automountkey_show.json b/install/ui/test/data/automountkey_show.json index f4c06716c..599e2a5a0 100644 --- a/install/ui/test/data/automountkey_show.json +++ b/install/ui/test/data/automountkey_show.json @@ -20,7 +20,7 @@ "description": [ "/home auto.home" ], - "dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automount", "top" diff --git a/install/ui/test/data/automountlocation_add.json b/install/ui/test/data/automountlocation_add.json index 4e810eb0b..da0c871ac 100644 --- a/install/ui/test/data/automountlocation_add.json +++ b/install/ui/test/data/automountlocation_add.json @@ -6,7 +6,7 @@ "cn": [ "YYZ" ], - "dn": "cn=yyz,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=yyz,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "nscontainer", "top" diff --git a/install/ui/test/data/automountlocation_find.json b/install/ui/test/data/automountlocation_find.json index 0adc74835..333baab16 100644 --- a/install/ui/test/data/automountlocation_find.json +++ b/install/ui/test/data/automountlocation_find.json @@ -8,25 +8,25 @@ "cn": [ "BOS" ], - "dn": "cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=bos,cn=automount,dc=example,dc=com" }, { "cn": [ "BRNO" ], - "dn": "cn=brno,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=brno,cn=automount,dc=example,dc=com" }, { "cn": [ "default" ], - "dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=default,cn=automount,dc=example,dc=com" }, { "cn": [ "RDU" ], - "dn": "cn=rdu,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=rdu,cn=automount,dc=example,dc=com" } ], "summary": null, diff --git a/install/ui/test/data/automountlocation_find_pkeys.json b/install/ui/test/data/automountlocation_find_pkeys.json new file mode 100644 index 000000000..333baab16 --- /dev/null +++ b/install/ui/test/data/automountlocation_find_pkeys.json @@ -0,0 +1,35 @@ +{ + "error": null, + "id": null, + "result": { + "count": 4, + "result": [ + { + "cn": [ + "BOS" + ], + "dn": "cn=bos,cn=automount,dc=example,dc=com" + }, + { + "cn": [ + "BRNO" + ], + "dn": "cn=brno,cn=automount,dc=example,dc=com" + }, + { + "cn": [ + "default" + ], + "dn": "cn=default,cn=automount,dc=example,dc=com" + }, + { + "cn": [ + "RDU" + ], + "dn": "cn=rdu,cn=automount,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/automountlocation_get_records.json b/install/ui/test/data/automountlocation_get_records.json new file mode 100644 index 000000000..ece79d39e --- /dev/null +++ b/install/ui/test/data/automountlocation_get_records.json @@ -0,0 +1,53 @@ +{ + "error": null, + "id": null, + "result": { + "count": 4, + "results": [ + { + "error": null, + "result": { + "cn": [ + "BOS" + ], + "dn": "cn=bos,cn=automount,dc=example,dc=com" + }, + "summary": null, + "value": "BOS" + }, + { + "error": null, + "result": { + "cn": [ + "BRNO" + ], + "dn": "cn=brno,cn=automount,dc=example,dc=com" + }, + "summary": null, + "value": "BRNO" + }, + { + "error": null, + "result": { + "cn": [ + "default" + ], + "dn": "cn=default,cn=automount,dc=example,dc=com" + }, + "summary": null, + "value": "default" + }, + { + "error": null, + "result": { + "cn": [ + "RDU" + ], + "dn": "cn=rdu,cn=automount,dc=example,dc=com" + }, + "summary": null, + "value": "RDU" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/automountlocation_show.json b/install/ui/test/data/automountlocation_show.json index 97ce2624f..79c83e608 100644 --- a/install/ui/test/data/automountlocation_show.json +++ b/install/ui/test/data/automountlocation_show.json @@ -6,7 +6,7 @@ "cn": [ "default" ], - "dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=default,cn=automount,dc=example,dc=com" }, "summary": null, "value": "default" diff --git a/install/ui/test/data/automountmap_add.json b/install/ui/test/data/automountmap_add.json index 129aef1a8..77db2c3d0 100644 --- a/install/ui/test/data/automountmap_add.json +++ b/install/ui/test/data/automountmap_add.json @@ -6,7 +6,7 @@ "automountmapname": [ "auto.log" ], - "dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" diff --git a/install/ui/test/data/automountmap_add_indirect.json b/install/ui/test/data/automountmap_add_indirect.json index f5ea1ed23..c2efba4a8 100644 --- a/install/ui/test/data/automountmap_add_indirect.json +++ b/install/ui/test/data/automountmap_add_indirect.json @@ -9,7 +9,7 @@ "description": [ "test" ], - "dn": "automountmapname=test,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=test,cn=default,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" diff --git a/install/ui/test/data/automountmap_find.json b/install/ui/test/data/automountmap_find.json index 2cd077d74..aaa0d71cf 100644 --- a/install/ui/test/data/automountmap_find.json +++ b/install/ui/test/data/automountmap_find.json @@ -8,7 +8,7 @@ "automountmapname": [ "auto.direct" ], - "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" @@ -18,7 +18,7 @@ "automountmapname": [ "auto.home" ], - "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" @@ -28,7 +28,7 @@ "automountmapname": [ "auto.log" ], - "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" @@ -38,7 +38,7 @@ "automountmapname": [ "auto.master" ], - "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com", "objectclass": [ "automountmap", "top" diff --git a/install/ui/test/data/automountmap_find_pkeys.json b/install/ui/test/data/automountmap_find_pkeys.json new file mode 100644 index 000000000..5a6321aaa --- /dev/null +++ b/install/ui/test/data/automountmap_find_pkeys.json @@ -0,0 +1,35 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 4, + "result": [ + { + "automountmapname": [ + "auto.direct" + ], + "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com" + }, + { + "automountmapname": [ + "auto.home" + ], + "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com" + }, + { + "automountmapname": [ + "auto.log" + ], + "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com" + }, + { + "automountmapname": [ + "auto.master" + ], + "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/automountmap_get_records.json b/install/ui/test/data/automountmap_get_records.json new file mode 100644 index 000000000..0e9079e5c --- /dev/null +++ b/install/ui/test/data/automountmap_get_records.json @@ -0,0 +1,69 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 4, + "results": [ + { + "error": null, + "result": { + "automountmapname": [ + "auto.direct" + ], + "dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com", + "objectclass": [ + "automountmap", + "top" + ] + }, + "summary": null, + "value": "auto.direct" + }, + { + "error": null, + "result": { + "automountmapname": [ + "auto.home" + ], + "dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com", + "objectclass": [ + "automountmap", + "top" + ] + }, + "summary": null, + "value": "auto.home" + }, + { + "error": null, + "result": { + "automountmapname": [ + "auto.log" + ], + "dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com", + "objectclass": [ + "automountmap", + "top" + ] + }, + "summary": null, + "value": "auto.log" + }, + { + "error": null, + "result": { + "automountmapname": [ + "auto.master" + ], + "dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com", + "objectclass": [ + "automountmap", + "top" + ] + }, + "summary": null, + "value": "auto.master" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/automountmap_show.json b/install/ui/test/data/automountmap_show.json index 8380a6ca1..10a9898de 100644 --- a/install/ui/test/data/automountmap_show.json +++ b/install/ui/test/data/automountmap_show.json @@ -6,7 +6,7 @@ "automountmapname": [ "live" ], - "dn": "automountmapname=live,cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "automountmapname=live,cn=bos,cn=automount,dc=example,dc=com" }, "summary": null, "value": "live" diff --git a/install/ui/test/data/config_show.json b/install/ui/test/data/config_show.json index e3b6154b9..dd4485c3e 100644 --- a/install/ui/test/data/config_show.json +++ b/install/ui/test/data/config_show.json @@ -28,15 +28,15 @@ "cn": [ "ipaConfig" ], - "dn": "cn=ipaconfig,cn=etc,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=ipaconfig,cn=etc,dc=dev,dc=example,dc=com", "ipacertificatesubjectbase": [ - "O=IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "O=DEV.EXAMPLE.COM" ], "ipaconfigstring": [ "AllowNThash" ], "ipadefaultemaildomain": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "ipadefaultloginshell": [ "/bin/sh" diff --git a/install/ui/test/data/delegation_find.json b/install/ui/test/data/delegation_find.json index 82b31fc58..da6d91394 100644 --- a/install/ui/test/data/delegation_find.json +++ b/install/ui/test/data/delegation_find.json @@ -9,9 +9,9 @@ "attrs": [ "cn" ], - "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)", + "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)", "group": "muppets", - "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com", "permissions": [ "write" ] @@ -21,9 +21,9 @@ "attrs": [ "title" ], - "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)", + "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)", "group": "muppets", - "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com", "permissions": [ "write" ] diff --git a/install/ui/test/data/delegation_list.json b/install/ui/test/data/delegation_list.json index d4d9fc060..ca9b717e1 100644 --- a/install/ui/test/data/delegation_list.json +++ b/install/ui/test/data/delegation_list.json @@ -9,9 +9,9 @@ "attrs": [ "cn" ], - "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)", + "filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)", "group": "muppets", - "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com", "permissions": [ "write" ] @@ -21,9 +21,9 @@ "attrs": [ "title" ], - "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)", + "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)", "group": "muppets", - "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com", "permissions": [ "write" ] diff --git a/install/ui/test/data/delegation_mod.json b/install/ui/test/data/delegation_mod.json index 9f7da68bf..78ae7b213 100644 --- a/install/ui/test/data/delegation_mod.json +++ b/install/ui/test/data/delegation_mod.json @@ -7,9 +7,9 @@ "attrs": [ "title" ], - "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)", + "filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)", "group": "muppets", - "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com", "permissions": [ "add", "delete" diff --git a/install/ui/test/data/dns_find.json b/install/ui/test/data/dns_find.json deleted file mode 100644 index c3b49f413..000000000 --- a/install/ui/test/data/dns_find.json +++ /dev/null @@ -1,101 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "count": 3, - "result": [ - { - "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "ayoung.boston.devel.redhat.com" - ], - "idnssoaexpire": [ - "1209600" - ], - "idnssoaminimum": [ - "3600" - ], - "idnssoamname": [ - "ipa.ayoung.boston.devel.redhat.com." - ], - "idnssoarefresh": [ - "3600" - ], - "idnssoaretry": [ - "900" - ], - "idnssoarname": [ - "root.ipa.ayoung.boston.devel.redhat.com." - ], - "idnssoaserial": [ - "2010061001" - ], - "idnszoneactive": [ - "TRUE" - ] - }, - { - "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "122.168.192.in-addr.arpa" - ], - "idnssoaexpire": [ - "1209600" - ], - "idnssoaminimum": [ - "3600" - ], - "idnssoamname": [ - "ipa.ayoung.boston.devel.redhat.com." - ], - "idnssoarefresh": [ - "3600" - ], - "idnssoaretry": [ - "900" - ], - "idnssoarname": [ - "root.122.168.192.in-addr.arpa." - ], - "idnssoaserial": [ - "2010061001" - ], - "idnszoneactive": [ - "TRUE" - ] - }, - { - "dn": "idnsname=redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "redhat.com" - ], - "idnssoaexpire": [ - "1209600" - ], - "idnssoaminimum": [ - "3600" - ], - "idnssoamname": [ - "127.0.0.1" - ], - "idnssoarefresh": [ - "3600" - ], - "idnssoaretry": [ - "900" - ], - "idnssoarname": [ - "root.redhat.com." - ], - "idnssoaserial": [ - "2010061001" - ], - "idnszoneactive": [ - "TRUE" - ] - } - ], - "summary": null, - "truncated": false - } -}
\ No newline at end of file diff --git a/install/ui/test/data/dns_find_rr.json b/install/ui/test/data/dns_find_rr.json deleted file mode 100644 index 4183f703f..000000000 --- a/install/ui/test/data/dns_find_rr.json +++ /dev/null @@ -1,110 +0,0 @@ -{ - "error": null, - "id": 6, - "result": { - "count": 11, - "result": [ - { - "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "ayoung.boston.devel.redhat.com" - ], - "nsrecord": [ - "ipa.ayoung.boston.devel.redhat.com." - ] - }, - { - "arecord": [ - "192.168.122.81" - ], - "dn": "idnsname=ipa,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "ipa" - ] - }, - { - "dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_ldap._tcp" - ], - "srvrecord": [ - "0 100 389 ipa" - ] - }, - { - "dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kerberos" - ], - "txtrecord": [ - "AYOUNG.BOSTON.DEVEL.REDHAT.COM" - ] - }, - { - "dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kerberos._tcp" - ], - "srvrecord": [ - "0 100 88 ipa" - ] - }, - { - "dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kerberos._udp" - ], - "srvrecord": [ - "0 100 88 ipa" - ] - }, - { - "dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kerberos-master._tcp" - ], - "srvrecord": [ - "0 100 88 ipa" - ] - }, - { - "dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kerberos-master._udp" - ], - "srvrecord": [ - "0 100 88 ipa" - ] - }, - { - "dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kpasswd._tcp" - ], - "srvrecord": [ - "0 100 464 ipa" - ] - }, - { - "dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_kpasswd._udp" - ], - "srvrecord": [ - "0 100 464 ipa" - ] - }, - { - "dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "_ntp._udp" - ], - "srvrecord": [ - "0 100 123 ipa" - ] - } - ], - "summary": null, - "truncated": false - } -}
\ No newline at end of file diff --git a/install/ui/test/data/dns_show.json b/install/ui/test/data/dns_show.json deleted file mode 100644 index 3f3046a51..000000000 --- a/install/ui/test/data/dns_show.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "result": { - "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "idnsname": [ - "ayoung.boston.devel.redhat.com" - ], - "idnssoaexpire": [ - "1209600" - ], - "idnssoaminimum": [ - "3600" - ], - "idnssoamname": [ - "ipa.ayoung.boston.devel.redhat.com." - ], - "idnssoarefresh": [ - "3600" - ], - "idnssoaretry": [ - "900" - ], - "idnssoarname": [ - "root.ipa.ayoung.boston.devel.redhat.com." - ], - "idnssoaserial": [ - "2010061001" - ], - "idnszoneactive": [ - "TRUE" - ] - }, - "summary": null, - "value": "ayoung.boston.devel.redhat.com" - } -}
\ No newline at end of file diff --git a/install/ui/test/data/dnsrecord_add.json b/install/ui/test/data/dnsrecord_add.json index 968d3f606..7cbf570da 100644 --- a/install/ui/test/data/dnsrecord_add.json +++ b/install/ui/test/data/dnsrecord_add.json @@ -6,7 +6,7 @@ "arecord": [ "1.2.3.4" ], - "dn": "idnsname=a4,idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=a4,idnsname=dev.example.com,cn=dns,dc=example,dc=com", "idnsname": [ "a4" ], diff --git a/install/ui/test/data/dnsrecord_find.json b/install/ui/test/data/dnsrecord_find.json index 87160e55e..8ca2283d8 100644 --- a/install/ui/test/data/dnsrecord_find.json +++ b/install/ui/test/data/dnsrecord_find.json @@ -5,102 +5,102 @@ "count": 12, "result": [ { - "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "@" ], "nsrecord": [ - "server15.ayoung.boston.devel.redhat.com." + "dev.example.com." ] }, { - "dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kerberos" ], "txtrecord": [ - "SERVER15.AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "DEV.EXAMPLE.COM" ] }, { - "dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kerberos-master._tcp" ], "srvrecord": [ - "0 100 88 server15" + "0 100 88 dev" ] }, { - "dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kerberos-master._udp" ], "srvrecord": [ - "0 100 88 server15" + "0 100 88 dev" ] }, { - "dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kerberos._tcp" ], "srvrecord": [ - "0 100 88 server15" + "0 100 88 dev" ] }, { - "dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kerberos._udp" ], "srvrecord": [ - "0 100 88 server15" + "0 100 88 dev" ] }, { - "dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kpasswd._tcp" ], "srvrecord": [ - "0 100 464 server15" + "0 100 464 dev" ] }, { - "dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_kpasswd._udp" ], "srvrecord": [ - "0 100 464 server15" + "0 100 464 dev" ] }, { - "dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_ldap._tcp" ], "srvrecord": [ - "0 100 389 server15" + "0 100 389 dev" ] }, { - "dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "_ntp._udp" ], "srvrecord": [ - "0 100 123 server15" + "0 100 123 dev" ] }, { "aaaarecord": [ "fec0::5054:ff:feb5:5a47" ], - "dn": "idnsname=server15,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ - "server15" + "dev" ] }, { @@ -114,7 +114,7 @@ "1.3.5.7", "10.10.2.1" ], - "dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "testrec" ], @@ -122,10 +122,10 @@ "key" ], "srvrecord": [ - "1 1 80 server15" + "1 1 80 dev" ], "txtrecord": [ - "A TExt Record", + "A Text Record", "Another Text Record" ] } diff --git a/install/ui/test/data/dnsrecord_find_pkeys.json b/install/ui/test/data/dnsrecord_find_pkeys.json new file mode 100644 index 000000000..aec4c9093 --- /dev/null +++ b/install/ui/test/data/dnsrecord_find_pkeys.json @@ -0,0 +1,83 @@ +{ + "error": null, + "id": null, + "result": { + "count": 12, + "result": [ + { + "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "@" + ] + }, + { + "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos" + ] + }, + { + "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos-master._tcp" + ] + }, + { + "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos-master._udp" + ] + }, + { + "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos._tcp" + ] + }, + { + "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos._udp" + ] + }, + { + "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kpasswd._tcp" + ] + }, + { + "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kpasswd._udp" + ] + }, + { + "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_ldap._tcp" + ] + }, + { + "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_ntp._udp" + ] + }, + { + "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "dev" + ] + }, + { + "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "testrec" + ] + } + ], + "summary": null, + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/dnsrecord_get_records.json b/install/ui/test/data/dnsrecord_get_records.json new file mode 100644 index 000000000..d2dd03e01 --- /dev/null +++ b/install/ui/test/data/dnsrecord_get_records.json @@ -0,0 +1,194 @@ +{ + "error": null, + "id": null, + "result": { + "count": 12, + "results": [ + { + "error": null, + "result": { + "dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "@" + ], + "nsrecord": [ + "dev.example.com." + ] + }, + "summary": null, + "value": "@" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos" + ], + "txtrecord": [ + "DEV.EXAMPLE.COM" + ] + }, + "summary": null, + "value": "_kerberos" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos-master._tcp" + ], + "srvrecord": [ + "0 100 88 dev" + ] + }, + "summary": null, + "value": "_kerberos-master._tcp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos-master._udp" + ], + "srvrecord": [ + "0 100 88 dev" + ] + }, + "summary": null, + "value": "_kerberos-master._udp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos._tcp" + ], + "srvrecord": [ + "0 100 88 dev" + ] + }, + "summary": null, + "value": "_kerberos._tcp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kerberos._udp" + ], + "srvrecord": [ + "0 100 88 dev" + ] + }, + "summary": null, + "value": "_kerberos._udp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kpasswd._tcp" + ], + "srvrecord": [ + "0 100 464 dev" + ] + }, + "summary": null, + "value": "_kpasswd._tcp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_kpasswd._udp" + ], + "srvrecord": [ + "0 100 464 dev" + ] + }, + "summary": null, + "value": "_kpasswd._udp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_ldap._tcp" + ], + "srvrecord": [ + "0 100 389 dev" + ] + }, + "summary": null, + "value": "_ldap._tcp" + }, + { + "error": null, + "result": { + "dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "_ntp._udp" + ], + "srvrecord": [ + "0 100 123 dev" + ] + }, + "summary": null, + "value": "_ntp._udp" + }, + { + "error": null, + "result": { + "aaaarecord": [ + "fec0::5054:ff:feb5:5a47" + ], + "dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "dev" + ] + }, + "summary": null, + "value": "dev" + }, + { + "error": null, + "result": { + "aaaarecord": [ + "feed:babe:beef:cafe::0001", + "feed:babe:beef:cafe::0002", + "feed:babe:beef:cafe::0004" + ], + "arecord": [ + "3.4.5.6", + "1.3.5.7", + "10.10.2.1" + ], + "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", + "idnsname": [ + "testrec" + ], + "keyrecord": [ + "key" + ], + "srvrecord": [ + "1 1 80 dev" + ], + "txtrecord": [ + "A Text Record", + "Another Text Record" + ] + }, + "summary": null, + "value": "testrec" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/dnsrecord_show.json b/install/ui/test/data/dnsrecord_show.json index e2a412546..d15ef5398 100644 --- a/install/ui/test/data/dnsrecord_show.json +++ b/install/ui/test/data/dnsrecord_show.json @@ -48,7 +48,7 @@ "sshfprecord": "rscwo", "txtrecord": "rscwo" }, - "dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com", "idnsname": [ "testrec" ], @@ -60,7 +60,7 @@ "idnsrecord" ], "srvrecord": [ - "1 1 80 server15" + "1 1 80 dev" ], "txtrecord": [ "A Text Record", diff --git a/install/ui/test/data/dnszone_add.json b/install/ui/test/data/dnszone_add.json index 6870acc5b..3cb833056 100644 --- a/install/ui/test/data/dnszone_add.json +++ b/install/ui/test/data/dnszone_add.json @@ -3,12 +3,12 @@ "id": 3, "result": { "result": { - "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com", "idnsallowdynupdate": [ "FALSE" ], "idnsname": [ - "henson.ayoung.boston.devel.redhat.com" + "dev.example.com" ], "idnssoaexpire": [ "1209600" @@ -17,7 +17,7 @@ "3600" ], "idnssoamname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "idnssoarefresh": [ "3600" @@ -26,7 +26,7 @@ "900" ], "idnssoarname": [ - "root.henson.ayoung.boston.devel.redhat.com." + "root.dev.example.com." ], "idnssoaserial": [ "2010021201" @@ -41,6 +41,6 @@ ] }, "summary": null, - "value": "henson.ayoung.boston.devel.redhat.com" + "value": "dev.example.com" } }
\ No newline at end of file diff --git a/install/ui/test/data/dnszone_find.json b/install/ui/test/data/dnszone_find.json index b8f76d417..fdf2c8e40 100644 --- a/install/ui/test/data/dnszone_find.json +++ b/install/ui/test/data/dnszone_find.json @@ -5,12 +5,12 @@ "count": 3, "result": [ { - "dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=example.com,cn=dns,dc=example,dc=com", "idnsallowdynupdate": [ "TRUE" ], "idnsname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "idnssoaexpire": [ "1209600" @@ -19,7 +19,7 @@ "3600" ], "idnssoamname": [ - "ipa.ayoung.boston.devel.redhat.com." + "ipa.example.com." ], "idnssoarefresh": [ "3600" @@ -28,19 +28,19 @@ "900" ], "idnssoarname": [ - "root.ipa.ayoung.boston.devel.redhat.com." + "root.ipa.example.com." ], "idnssoaserial": [ "2010021201" ], "idnsupdatepolicy": [ - "grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-self * A;" + "grant EXAMPLE.COM krb5-self * A;" ], "idnszoneactive": [ "TRUE" ], "nsrecord": [ - "ipa.ayoung.boston.devel.redhat.com." + "ipa.example.com." ], "objectclass": [ "top", @@ -49,7 +49,7 @@ ] }, { - "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com", "idnsallowdynupdate": [ "TRUE" ], @@ -63,7 +63,7 @@ "3600" ], "idnssoamname": [ - "ipa.ayoung.boston.devel.redhat.com." + "ipa.example.com." ], "idnssoarefresh": [ "3600" @@ -78,13 +78,13 @@ "2010021201" ], "idnsupdatepolicy": [ - "grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;" + "grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;" ], "idnszoneactive": [ "TRUE" ], "nsrecord": [ - "ipa.ayoung.boston.devel.redhat.com." + "ipa.example.com." ], "objectclass": [ "top", @@ -93,12 +93,12 @@ ] }, { - "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com", "idnsallowdynupdate": [ "FALSE" ], "idnsname": [ - "henson.ayoung.boston.devel.redhat.com" + "dev.example.com" ], "idnssoaexpire": [ "1209600" @@ -107,7 +107,7 @@ "3600" ], "idnssoamname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "idnssoarefresh": [ "3600" @@ -116,7 +116,7 @@ "900" ], "idnssoarname": [ - "root.henson.ayoung.boston.devel.redhat.com." + "root.dev.example.com." ], "idnssoaserial": [ "2010021201" diff --git a/install/ui/test/data/dnszone_find_pkeys.json b/install/ui/test/data/dnszone_find_pkeys.json new file mode 100644 index 000000000..1b4f02500 --- /dev/null +++ b/install/ui/test/data/dnszone_find_pkeys.json @@ -0,0 +1,29 @@ +{ + "error": null, + "id": 6, + "result": { + "count": 3, + "result": [ + { + "dn": "idnsname=example.com,cn=dns,dc=example,dc=com", + "idnsname": [ + "example.com" + ] + }, + { + "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com", + "idnsname": [ + "122.168.192.in-addr.arpa" + ] + }, + { + "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com", + "idnsname": [ + "dev.example.com" + ] + } + ], + "summary": null, + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/dnszone_get_records.json b/install/ui/test/data/dnszone_get_records.json new file mode 100644 index 000000000..07b70734d --- /dev/null +++ b/install/ui/test/data/dnszone_get_records.json @@ -0,0 +1,150 @@ +{ + "error": null, + "id": 6, + "result": { + "count": 3, + "results": [ + { + "error": null, + "result": { + "dn": "idnsname=example.com,cn=dns,dc=example,dc=com", + "idnsallowdynupdate": [ + "TRUE" + ], + "idnsname": [ + "example.com" + ], + "idnssoaexpire": [ + "1209600" + ], + "idnssoaminimum": [ + "3600" + ], + "idnssoamname": [ + "ipa.example.com." + ], + "idnssoarefresh": [ + "3600" + ], + "idnssoaretry": [ + "900" + ], + "idnssoarname": [ + "root.ipa.example.com." + ], + "idnssoaserial": [ + "2010021201" + ], + "idnsupdatepolicy": [ + "grant EXAMPLE.COM krb5-self * A;" + ], + "idnszoneactive": [ + "TRUE" + ], + "nsrecord": [ + "ipa.example.com." + ], + "objectclass": [ + "top", + "idnsrecord", + "idnszone" + ] + }, + "summary": null, + "value": "example.com" + }, + { + "error": null, + "result": { + "dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com", + "idnsallowdynupdate": [ + "TRUE" + ], + "idnsname": [ + "122.168.192.in-addr.arpa" + ], + "idnssoaexpire": [ + "1209600" + ], + "idnssoaminimum": [ + "3600" + ], + "idnssoamname": [ + "ipa.example.com." + ], + "idnssoarefresh": [ + "3600" + ], + "idnssoaretry": [ + "900" + ], + "idnssoarname": [ + "root.122.168.192.in-addr.arpa." + ], + "idnssoaserial": [ + "2010021201" + ], + "idnsupdatepolicy": [ + "grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;" + ], + "idnszoneactive": [ + "TRUE" + ], + "nsrecord": [ + "ipa.example.com." + ], + "objectclass": [ + "top", + "idnsrecord", + "idnszone" + ] + }, + "summary": null, + "value": "122.168.192.in-addr.arpa" + }, + { + "error": null, + "result": { + "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com", + "idnsallowdynupdate": [ + "FALSE" + ], + "idnsname": [ + "dev.example.com" + ], + "idnssoaexpire": [ + "1209600" + ], + "idnssoaminimum": [ + "3600" + ], + "idnssoamname": [ + "example.com" + ], + "idnssoarefresh": [ + "3600" + ], + "idnssoaretry": [ + "900" + ], + "idnssoarname": [ + "root.dev.example.com." + ], + "idnssoaserial": [ + "2010021201" + ], + "idnszoneactive": [ + "TRUE" + ], + "objectclass": [ + "top", + "idnsrecord", + "idnszone" + ] + }, + "summary": null, + "value": "dev.example.com" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/dnszone_show.json b/install/ui/test/data/dnszone_show.json index 35e507627..afad93c45 100644 --- a/install/ui/test/data/dnszone_show.json +++ b/install/ui/test/data/dnszone_show.json @@ -47,12 +47,12 @@ "sshfprecord": "rscwo", "txtrecord": "rscwo" }, - "dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com", "idnsallowdynupdate": [ "FALSE" ], "idnsname": [ - "henson.ayoung.boston.devel.redhat.com" + "dev.example.com" ], "idnssoaexpire": [ "1209600" @@ -61,7 +61,7 @@ "3600" ], "idnssoamname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "idnssoarefresh": [ "3600" @@ -70,7 +70,7 @@ "900" ], "idnssoarname": [ - "root.henson.ayoung.boston.devel.redhat.com." + "root.dev.example.com." ], "idnssoaserial": [ "2010021201" @@ -85,6 +85,6 @@ ] }, "summary": null, - "value": "henson.ayoung.boston.devel.redhat.com" + "value": "dev.example.com" } }
\ No newline at end of file diff --git a/install/ui/test/data/entitle_find_offline.json b/install/ui/test/data/entitle_find_offline.json index 3980af6fb..442dbf03d 100644 --- a/install/ui/test/data/entitle_find_offline.json +++ b/install/ui/test/data/entitle_find_offline.json @@ -5,7 +5,7 @@ "count": 1, "result": [ { - "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com", "ipaentitlementid": [ "IMPORTED" ], diff --git a/install/ui/test/data/entitle_find_online.json b/install/ui/test/data/entitle_find_online.json index 76bd437e2..8143fd426 100644 --- a/install/ui/test/data/entitle_find_online.json +++ b/install/ui/test/data/entitle_find_online.json @@ -5,7 +5,7 @@ "count": 1, "result": [ { - "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com", "ipaentitlementid": [ "b788ccee-4b09-48f0-8a9a-2c769f7b41e0" ], diff --git a/install/ui/test/data/entitle_register.json b/install/ui/test/data/entitle_register.json index 8644801da..c66124738 100644 --- a/install/ui/test/data/entitle_register.json +++ b/install/ui/test/data/entitle_register.json @@ -3,7 +3,7 @@ "id": 0, "result": { "result": { - "dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=example,dc=com", "ipaentitlementid": [ "cf9d9755-7445-438c-a40c-23b1c60e1f9b" ], diff --git a/install/ui/test/data/group_add.json b/install/ui/test/data/group_add.json index 180f5f11c..6f5f8bfc4 100644 --- a/install/ui/test/data/group_add.json +++ b/install/ui/test/data/group_add.json @@ -9,7 +9,7 @@ "description": [ "The People in Your Neighborhood" ], - "dn": "cn=neighbors,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=neighbors,cn=groups,cn=accounts,dc=example,dc=com", "gidnumber": [ "123456" ], diff --git a/install/ui/test/data/group_add_member.json b/install/ui/test/data/group_add_member.json index 7f10d1052..9a81960b4 100644 --- a/install/ui/test/data/group_add_member.json +++ b/install/ui/test/data/group_add_member.json @@ -16,7 +16,7 @@ "description": [ "testgroup" ], - "dn": "cn=testgroup,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=testgroup,cn=groups,cn=accounts,dc=example,dc=com", "member_user": [ "kfrog" ] diff --git a/install/ui/test/data/group_find.json b/install/ui/test/data/group_find.json index 338622948..fe40e254a 100644 --- a/install/ui/test/data/group_find.json +++ b/install/ui/test/data/group_find.json @@ -11,7 +11,7 @@ "description": [ "Account administrators group" ], - "dn": "cn=admins,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "1420800000" ], @@ -26,7 +26,7 @@ "description": [ "Default group for all users" ], - "dn": "cn=ipausers,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "1420800001" ], @@ -46,7 +46,7 @@ "description": [ "Limited admins who can edit other users" ], - "dn": "cn=editors,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "1420800002" ] @@ -58,7 +58,7 @@ "description": [ "Monsters on Sesame Street" ], - "dn": "cn=monsters,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "1420800009" ] @@ -70,7 +70,7 @@ "description": [ "Muppets moonlighting for CTW" ], - "dn": "cn=muppets,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "1420800010" ] diff --git a/install/ui/test/data/group_find_pkeys.json b/install/ui/test/data/group_find_pkeys.json new file mode 100644 index 000000000..483751bfe --- /dev/null +++ b/install/ui/test/data/group_find_pkeys.json @@ -0,0 +1,41 @@ +{ + "error": null, + "id": 2, + "result": { + "count": 5, + "result": [ + { + "cn": [ + "admins" + ], + "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "ipausers" + ], + "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "editors" + ], + "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "monsters" + ], + "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "muppets" + ], + "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + } + ], + "summary": "5 groups matched", + "truncated": false + } +} diff --git a/install/ui/test/data/group_get_records.json b/install/ui/test/data/group_get_records.json new file mode 100644 index 000000000..d40b4f2a3 --- /dev/null +++ b/install/ui/test/data/group_get_records.json @@ -0,0 +1,105 @@ +{ + "error": null, + "id": 2, + "result": { + "count": 5, + "results": [ + { + "error": null, + "result": { + "cn": [ + "admins" + ], + "description": [ + "Account administrators group" + ], + "dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", + "gidnumber": [ + "1420800000" + ], + "member_user": [ + "admin" + ] + }, + "summary": null, + "value": "admins" + }, + { + "error": null, + "result": { + "cn": [ + "ipausers" + ], + "description": [ + "Default group for all users" + ], + "dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", + "gidnumber": [ + "1420800001" + ], + "member_user": [ + "kfrog", + "count123", + "scram", + "elmo", + "zoe", + "pdawn" + ] + }, + "summary": null, + "value": "ipausers" + }, + { + "error": null, + "result": { + "cn": [ + "editors" + ], + "description": [ + "Limited admins who can edit other users" + ], + "dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", + "gidnumber": [ + "1420800002" + ] + }, + "summary": null, + "value": "editors" + }, + { + "error": null, + "result": { + "cn": [ + "monsters" + ], + "description": [ + "Monsters on Sesame Street" + ], + "dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", + "gidnumber": [ + "1420800009" + ] + }, + "summary": null, + "value": "monsters" + }, + { + "error": null, + "result": { + "cn": [ + "muppets" + ], + "description": [ + "Muppets moonlighting for CTW" + ], + "dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com", + "gidnumber": [ + "1420800010" + ] + }, + "summary": null, + "value": "muppets" + } + ] + } +} diff --git a/install/ui/test/data/group_member_user.json b/install/ui/test/data/group_member_user.json index 971b13d44..1eaaefac7 100644 --- a/install/ui/test/data/group_member_user.json +++ b/install/ui/test/data/group_member_user.json @@ -1,124 +1,1454 @@ { "error": null, - "id": 0, + "id": null, "result": { - "count": 2, + "count": 20, "results": [ { "error": null, "result": { "cn": [ - "Administrator" + "Adrian Barrett" ], - "dn": "uid=admin,cn=users,cn=accounts,dc=dev,dc=example,dc=com", + "displayname": [ + "Adrian Barrett" + ], + "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com", "gecos": [ - "Administrator" + "Adrian Barrett" ], "gidnumber": [ - "1662072955" + "1576000176" + ], + "givenname": [ + "Adrian" ], + "has_keytab": false, + "has_password": false, "homedirectory": [ - "/home/admin" + "/home/abarrett" + ], + "initials": [ + "AB" ], "ipauniqueid": [ - "ffb8d002-f46c-11df-8cc1-00163e72f2d9" + "6cca548c-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "abarrett@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=abarrett,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Barrett" + ], + "uid": [ + "abarrett" + ], + "uidnumber": [ + "1576000176" + ] + }, + "summary": null, + "value": "abarrett" + }, + { + "error": null, + "result": { + "cn": [ + "Anja Bradley" + ], + "displayname": [ + "Anja Bradley" + ], + "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Anja Bradley" + ], + "gidnumber": [ + "1576000024" + ], + "givenname": [ + "Anja" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/abradley" + ], + "initials": [ + "AB" + ], + "ipauniqueid": [ + "5375ac2a-073f-11e1-95ae-525400e135d8" + ], + "krbprincipalname": [ + "abradley@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers", + "editors" + ], + "mepmanagedentry": [ + "cn=abradley,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" ], - "krblastpwdchange": [ - "20101120061333Z" + "sn": [ + "Bradley" ], - "krbpasswordexpiration": [ - "20110218061333Z" + "uid": [ + "abradley" + ], + "uidnumber": [ + "1576000024" + ] + }, + "summary": null, + "value": "abradley" + }, + { + "error": null, + "result": { + "cn": [ + "Annmarie Carlson" + ], + "displayname": [ + "Annmarie Carlson" + ], + "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Annmarie Carlson" + ], + "gidnumber": [ + "1576000036" + ], + "givenname": [ + "Annmarie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/acarlson" + ], + "initials": [ + "AC" + ], + "ipauniqueid": [ + "54dccaa8-073f-11e1-89ea-525400e135d8" ], "krbprincipalname": [ - "admin@DEV.EXAMPLE.COM" + "acarlson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" ], "loginshell": [ - "/bin/bash" + "/bin/sh" + ], + "memberof_group": [ + "ipausers", + "editors" + ], + "mepmanagedentry": [ + "cn=acarlson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Carlson" + ], + "uid": [ + "acarlson" + ], + "uidnumber": [ + "1576000036" + ] + }, + "summary": null, + "value": "acarlson" + }, + { + "error": null, + "result": { + "cn": [ + "Angelika Daniels" + ], + "displayname": [ + "Angelika Daniels" + ], + "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Angelika Daniels" + ], + "gidnumber": [ + "1576000035" + ], + "givenname": [ + "Angelika" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/adaniels" + ], + "initials": [ + "AD" + ], + "ipauniqueid": [ + "54abe492-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "adaniels@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers", + "editors" + ], + "mepmanagedentry": [ + "cn=adaniels,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Daniels" + ], + "uid": [ + "adaniels" + ], + "uidnumber": [ + "1576000035" + ] + }, + "summary": null, + "value": "adaniels" + }, + { + "error": null, + "result": { + "cn": [ + "Antionette George" + ], + "displayname": [ + "Antionette George" + ], + "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Antionette George" + ], + "gidnumber": [ + "1576000165" + ], + "givenname": [ + "Antionette" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/ageorge" + ], + "initials": [ + "AG" + ], + "ipauniqueid": [ + "6a8af776-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "ageorge@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" ], "memberof_group": [ - "admins", "ipausers" ], - "memberof_rolegroup": [ - "replicaadmin" + "memberofindirect_group": [ + "editors" ], - "memberof_taskgroup": [ - "managereplica", - "deletereplica" + "mepmanagedentry": [ + "cn=ageorge,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "George" + ], + "uid": [ + "ageorge" + ], + "uidnumber": [ + "1576000165" + ] + }, + "summary": null, + "value": "ageorge" + }, + { + "error": null, + "result": { + "cn": [ + "Amiee Gordon" + ], + "displayname": [ + "Amiee Gordon" + ], + "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Amiee Gordon" + ], + "gidnumber": [ + "1576000056" + ], + "givenname": [ + "Amiee" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/agordon" + ], + "initials": [ + "AG" + ], + "ipauniqueid": [ + "57b0510a-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "agordon@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers", + "editors" ], "mepmanagedentry": [ - "cn=admin,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + "cn=agordon,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Gordon" + ], + "uid": [ + "agordon" + ], + "uidnumber": [ + "1576000056" + ] + }, + "summary": null, + "value": "agordon" + }, + { + "error": null, + "result": { + "cn": [ + "Anderson Jennings" + ], + "displayname": [ + "Anderson Jennings" + ], + "dn": "uid=ajennings,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Anderson Jennings" + ], + "gidnumber": [ + "1576000206" + ], + "givenname": [ + "Anderson" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/ajennings" + ], + "initials": [ + "AJ" + ], + "ipauniqueid": [ + "7417afdc-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "ajennings@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=ajennings,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Jennings" + ], + "uid": [ + "ajennings" + ], + "uidnumber": [ + "1576000206" + ] + }, + "summary": null, + "value": "ajennings" + }, + { + "error": null, + "result": { + "cn": [ + "Antonio Obrien" + ], + "displayname": [ + "Antonio Obrien" + ], + "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Antonio Obrien" + ], + "gidnumber": [ + "1576000201" + ], + "givenname": [ + "Antonio" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aobrien" + ], + "initials": [ + "AO" + ], + "ipauniqueid": [ + "72e80936-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aobrien@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" ], - "nsaccountlock": [ - "False" + "memberof_group": [ + "ipausers" ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=aobrien,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, "objectclass": [ "top", "person", + "organizationalperson", + "inetorgperson", + "inetuser", "posixaccount", "krbprincipalaux", "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Obrien" + ], + "uid": [ + "aobrien" + ], + "uidnumber": [ + "1576000201" + ] + }, + "summary": null, + "value": "aobrien" + }, + { + "error": null, + "result": { + "cn": [ + "Asley Ortega" + ], + "displayname": [ + "Asley Ortega" + ], + "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Asley Ortega" + ], + "gidnumber": [ + "1576000156" + ], + "givenname": [ + "Asley" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aortega" + ], + "initials": [ + "AO" + ], + "ipauniqueid": [ + "68c80e56-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aortega@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=aortega,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", "ipaobject", "mepOriginEntry" ], "sn": [ - "Administrator" + "Ortega" ], "uid": [ - "admin" + "aortega" ], "uidnumber": [ - "1662072955" + "1576000156" ] }, "summary": null, - "value": "admin" + "value": "aortega" }, { "error": null, "result": { "cn": [ - "Test User" + "Alicia Ortiz" + ], + "displayname": [ + "Alicia Ortiz" ], - "dn": "uid=test,cn=users,cn=accounts,dc=dev,dc=example,dc=com", + "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com", "gecos": [ - "test" + "Alicia Ortiz" ], "gidnumber": [ - "1662072958" + "1576000181" ], "givenname": [ - "Test" + "Alicia" ], + "has_keytab": false, + "has_password": false, "homedirectory": [ - "/home/test" + "/home/aortiz" + ], + "initials": [ + "AO" ], "ipauniqueid": [ - "c0724e5e-f472-11df-8186-00163e72f2d9" + "6dda4b48-073f-11e1-89ea-525400e135d8" ], "krbprincipalname": [ - "test@DEV.EXAMPLE.COM" + "aortiz@EXAMPLE.COM" ], "krbpwdpolicyreference": [ - "cn=global_policy,cn=DEV.EXAMPLE.COM,cn=kerberos,dc=dev,dc=example,dc=com" + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" ], "loginshell": [ "/bin/sh" ], - "mail": [ - "test" + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=aortiz,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Ortiz" + ], + "uid": [ + "aortiz" + ], + "uidnumber": [ + "1576000181" + ] + }, + "summary": null, + "value": "aortiz" + }, + { + "error": null, + "result": { + "cn": [ + "Alda Peterson" + ], + "displayname": [ + "Alda Peterson" + ], + "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Alda Peterson" + ], + "gidnumber": [ + "1576000080" + ], + "givenname": [ + "Alda" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/apeterson" + ], + "initials": [ + "AP" + ], + "ipauniqueid": [ + "5b25407a-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "apeterson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" ], "memberof_group": [ "ipausers", "editors" ], "mepmanagedentry": [ - "cn=test,cn=groups,cn=accounts,dc=dev,dc=example,dc=com" + "cn=apeterson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Peterson" + ], + "uid": [ + "apeterson" + ], + "uidnumber": [ + "1576000080" + ] + }, + "summary": null, + "value": "apeterson" + }, + { + "error": null, + "result": { + "cn": [ + "Augustina Rhodes" + ], + "displayname": [ + "Augustina Rhodes" + ], + "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Augustina Rhodes" + ], + "gidnumber": [ + "1576000007" + ], + "givenname": [ + "Augustina" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/arhodes" + ], + "initials": [ + "AR" + ], + "ipauniqueid": [ + "51b4c812-073f-11e1-9cf6-525400e135d8" + ], + "krbprincipalname": [ + "arhodes@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=arhodes,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Rhodes" + ], + "uid": [ + "arhodes" + ], + "uidnumber": [ + "1576000007" + ] + }, + "summary": null, + "value": "arhodes" + }, + { + "error": null, + "result": { + "cn": [ + "Ammie Romero" + ], + "displayname": [ + "Ammie Romero" + ], + "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Ammie Romero" + ], + "gidnumber": [ + "1576000055" + ], + "givenname": [ + "Ammie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aromero" + ], + "initials": [ + "AR" + ], + "ipauniqueid": [ + "578ac750-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aromero@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=aromero,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" ], - "nsaccountlock": [ - "False" + "sn": [ + "Romero" + ], + "uid": [ + "aromero" + ], + "uidnumber": [ + "1576000055" + ] + }, + "summary": null, + "value": "aromero" + }, + { + "error": null, + "result": { + "cn": [ + "Adella Thompson" + ], + "displayname": [ + "Adella Thompson" + ], + "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Adella Thompson" + ], + "gidnumber": [ + "1576000123" + ], + "givenname": [ + "Adella" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/athompson" + ], + "initials": [ + "AT" + ], + "ipauniqueid": [ + "62647b08-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "athompson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=athompson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Thompson" + ], + "uid": [ + "athompson" + ], + "uidnumber": [ + "1576000123" + ] + }, + "summary": null, + "value": "athompson" + }, + { + "error": null, + "result": { + "cn": [ + "Asha Valdez" + ], + "displayname": [ + "Asha Valdez" + ], + "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Asha Valdez" + ], + "gidnumber": [ + "1576000195" + ], + "givenname": [ + "Asha" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/avaldez" + ], + "initials": [ + "AV" + ], + "ipauniqueid": [ + "71821438-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "avaldez@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=avaldez,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Valdez" + ], + "uid": [ + "avaldez" + ], + "uidnumber": [ + "1576000195" + ] + }, + "summary": null, + "value": "avaldez" + }, + { + "error": null, + "result": { + "cn": [ + "Bennie Barber" + ], + "displayname": [ + "Bennie Barber" + ], + "dn": "uid=bbarber,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bennie Barber" + ], + "gidnumber": [ + "1576000208" + ], + "givenname": [ + "Bennie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bbarber" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "749350ba-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bbarber@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=bbarber,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Barber" + ], + "uid": [ + "bbarber" + ], + "uidnumber": [ + "1576000208" + ] + }, + "summary": null, + "value": "bbarber" + }, + { + "error": null, + "result": { + "cn": [ + "Bulah Bauer" + ], + "displayname": [ + "Bulah Bauer" + ], + "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bulah Bauer" + ], + "gidnumber": [ + "1576000070" + ], + "givenname": [ + "Bulah" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bbauer" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "598f9148-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bbauer@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=bbauer,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Bauer" + ], + "uid": [ + "bbauer" + ], + "uidnumber": [ + "1576000070" + ] + }, + "summary": null, + "value": "bbauer" + }, + { + "error": null, + "result": { + "cn": [ + "Bernardo Blair" + ], + "displayname": [ + "Bernardo Blair" + ], + "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bernardo Blair" + ], + "gidnumber": [ + "1576000169" + ], + "givenname": [ + "Bernardo" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bblair" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "6b55c99c-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bblair@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=bblair,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Blair" + ], + "uid": [ + "bblair" + ], + "uidnumber": [ + "1576000169" + ] + }, + "summary": null, + "value": "bblair" + }, + { + "error": null, + "result": { + "cn": [ + "Barrie Bush" + ], + "displayname": [ + "Barrie Bush" + ], + "dn": "uid=bbush,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Barrie Bush" + ], + "gidnumber": [ + "1576000230" + ], + "givenname": [ + "Barrie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bbush" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "7a0dbbb6-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bbush@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=bbush,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Bush" + ], + "uid": [ + "bbush" + ], + "uidnumber": [ + "1576000230" + ] + }, + "summary": null, + "value": "bbush" + }, + { + "error": null, + "result": { + "cn": [ + "Billy Gross" + ], + "displayname": [ + "Billy Gross" + ], + "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Billy Gross" + ], + "gidnumber": [ + "1576000047" + ], + "givenname": [ + "Billy" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bgross" + ], + "initials": [ + "BG" + ], + "ipauniqueid": [ + "5679c2a8-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bgross@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "memberofindirect_group": [ + "editors" + ], + "mepmanagedentry": [ + "cn=bgross,cn=groups,cn=accounts,dc=example,dc=com" ], + "nsaccountlock": false, "objectclass": [ "top", "person", @@ -132,17 +1462,17 @@ "mepOriginEntry" ], "sn": [ - "User" + "Gross" ], "uid": [ - "test" + "bgross" ], "uidnumber": [ - "1662072958" + "1576000047" ] }, "summary": null, - "value": "test" + "value": "bgross" } ] } diff --git a/install/ui/test/data/group_remove_member.json b/install/ui/test/data/group_remove_member.json index 0118438af..6582d73df 100644 --- a/install/ui/test/data/group_remove_member.json +++ b/install/ui/test/data/group_remove_member.json @@ -16,7 +16,7 @@ "description": [ "Muppets moonlighting for CTW" ], - "dn": "cn=muppets,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com", "gidnumber": [ "1950316043" ], diff --git a/install/ui/test/data/group_show.json b/install/ui/test/data/group_show.json index 536b120ca..4ac6e0c06 100644 --- a/install/ui/test/data/group_show.json +++ b/install/ui/test/data/group_show.json @@ -1,6 +1,6 @@ { "error": null, - "id": 0, + "id": null, "result": { "result": { "cn": [ @@ -9,27 +9,261 @@ "description": [ "Default group for all users" ], - "dn": "cn=ipausers,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com", "gidnumber": [ - "1079249048" - ], - "member": [ - "uid=gsmile,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", - "uid=kfrog,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", - "uid=count123,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com" + "1576000001" ], "member_user": [ - "gsmile", - "kfrog", - "count123" + "dmontes", + "sroberson", + "vmendoza", + "mvang", + "arhodes", + "ngutierrez", + "lbaldwin", + "uevans", + "fwolfe", + "mdyer", + "ibeard", + "lduran", + "cmcintosh", + "nmartinez", + "sshepherd", + "tosborn", + "mcarney", + "scohen", + "jbuckley", + "jgould", + "ewatkins", + "abradley", + "lhall", + "dkelly", + "drosario", + "jpreston", + "mjefferson", + "jwu", + "marcher", + "rhale", + "jmckee", + "cduffy", + "adaniels", + "acarlson", + "wryan", + "mclay", + "mgates", + "jmccann", + "mvaughan", + "grobles", + "llarson", + "mbailey", + "dbriggs", + "ekane", + "bgross", + "smcclure", + "mkrause", + "sparrish", + "bmcgee", + "kfisher", + "mestes", + "mlong", + "aromero", + "agordon", + "vgriffin", + "chartman", + "lcohen", + "fstrong", + "lgross", + "kmills", + "mbutler", + "jmaynard", + "jmccarty", + "jburch", + "kreyes", + "ckramer", + "chuynh", + "bbauer", + "ipotts", + "ldennis", + "kgonzalez", + "mtravis", + "tcase", + "groman", + "tburch", + "dmyers", + "rcannon", + "apeterson", + "lbarnett", + "eclay", + "lstevenson", + "lnewman", + "crobles", + "sbarron", + "smcfarland", + "sknapp", + "ghouse", + "lgeorge", + "swoodard", + "dphillips", + "candrade", + "jmcfarland", + "ccarson", + "cgreer", + "khuerta", + "dblevins", + "bswanson", + "chickman", + "rcarrillo", + "jkaufman", + "kshaw", + "gowen", + "rcontreras", + "cmccullough", + "krivera", + "jbarron", + "sbradford", + "lwilson", + "jvelez", + "dlopez", + "lgibbs", + "jsnow", + "sklein", + "lsharp", + "mcameron", + "flam", + "nparker", + "lhogan", + "lmorrison", + "bnewton", + "athompson", + "jsanford", + "rcohen", + "cmelendez", + "yjacobs", + "mmcintyre", + "dhood", + "mescobar", + "mvilla", + "dshort", + "okennedy", + "cvillarreal", + "skane", + "vreyes", + "lrobinson", + "mbright", + "eriley", + "ehunt", + "ctrujillo", + "hrichard", + "sserrano", + "nramirez", + "zschneider", + "mtanner", + "hcalderon", + "sroy", + "mblevins", + "rhampton", + "kpeters", + "gmoody", + "kgraham", + "lpacheco", + "swalter", + "aortega", + "spruitt", + "lchandler", + "wnichols", + "eberry", + "kzhang", + "cheath", + "tproctor", + "vgill", + "ageorge", + "cwiggins", + "clloyd", + "mrichardson", + "bblair", + "mdonovan", + "dmoses", + "jkhan", + "mcrane", + "gmcintosh", + "wweaver", + "abarrett", + "pcarroll", + "twebster", + "omcdonald", + "bwolfe", + "aortiz", + "dbean", + "hpittman", + "bpage", + "jmullen", + "lcabrera", + "mbray", + "kpatterson", + "lwalters", + "ljennings", + "mrowland", + "srich", + "jvilla", + "jzavala", + "avaldez", + "ehayes", + "jjoyce", + "scastaneda", + "mwoodard", + "cbarrera", + "aobrien", + "jvillanueva", + "jhowe", + "cstout", + "mwhitehead", + "ajennings", + "dfrye", + "bbarber", + "twilson", + "kfernandez", + "eherrera", + "dyoung", + "pjohnston", + "jbean", + "ldawson", + "kwood", + "tcrane", + "rwelch", + "wholmes", + "cchristian", + "ffrazier", + "bmullins", + "tduarte", + "elawrence", + "rgregory", + "ssteele", + "ktravis", + "llee", + "sorr", + "bbush", + "ublake", + "kjohnson", + "vcannon", + "mandrade", + "emeyer", + "hpeck", + "ssantana", + "lluna", + "fneal", + "lswanson", + "rlynch", + "pcarpenter", + "cblackwell", + "sfrost", + "cconner", + "stanner", + "opayne", + "jriggs", + "jhuynh" ], - "memberof": [], - "objectclass": [ - "top", - "groupofnames", - "nestedgroup", - "ipausergroup", - "posixgroup" + "memberof_group": [ + "editors" ] }, "summary": null, diff --git a/install/ui/test/data/hbacrule_find.json b/install/ui/test/data/hbacrule_find.json index 1775119c8..0629e3827 100644 --- a/install/ui/test/data/hbacrule_find.json +++ b/install/ui/test/data/hbacrule_find.json @@ -14,7 +14,7 @@ "description": [ "Allow all users to access any host from any host" ], - "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com", "hostcategory": [ "all" ], diff --git a/install/ui/test/data/hbacrule_find_pkeys.json b/install/ui/test/data/hbacrule_find_pkeys.json new file mode 100644 index 000000000..3c33573f0 --- /dev/null +++ b/install/ui/test/data/hbacrule_find_pkeys.json @@ -0,0 +1,17 @@ +{ + "error": null, + "id": null, + "result": { + "count": 1, + "result": [ + { + "cn": [ + "allow_all" + ], + "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com" + } + ], + "summary": "1 HBAC rule matched", + "truncated": false + } +} diff --git a/install/ui/test/data/hbacrule_get_records.json b/install/ui/test/data/hbacrule_get_records.json new file mode 100644 index 000000000..feaf217f6 --- /dev/null +++ b/install/ui/test/data/hbacrule_get_records.json @@ -0,0 +1,41 @@ +{ + "error": null, + "id": null, + "result": { + "count": 1, + "results": [ + { + "error": null, + "result": { + "accessruletype": [ + "allow" + ], + "cn": [ + "allow_all" + ], + "description": [ + "Allow all users to access any host from any host" + ], + "dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com", + "hostcategory": [ + "all" + ], + "ipaenabledflag": [ + "TRUE" + ], + "servicecategory": [ + "all" + ], + "sourcehostcategory": [ + "all" + ], + "usercategory": [ + "all" + ] + }, + "summary": null, + "value": "allow_all" + } + ] + } +} diff --git a/install/ui/test/data/hbacsvc_find_pkeys.json b/install/ui/test/data/hbacsvc_find_pkeys.json new file mode 100644 index 000000000..01939d2ce --- /dev/null +++ b/install/ui/test/data/hbacsvc_find_pkeys.json @@ -0,0 +1,71 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 10, + "result": [ + { + "cn": [ + "sshd" + ], + "dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "ftp" + ], + "dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "su" + ], + "dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "login" + ], + "dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "su-l" + ], + "dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "sudo" + ], + "dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "sudo-i" + ], + "dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "gdm" + ], + "dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "gdm-password" + ], + "dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "kdm" + ], + "dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +} diff --git a/install/ui/test/data/hbacsvc_get_records.json b/install/ui/test/data/hbacsvc_get_records.json new file mode 100644 index 000000000..fd8af3056 --- /dev/null +++ b/install/ui/test/data/hbacsvc_get_records.json @@ -0,0 +1,149 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 10, + "results": [ + { + "error": null, + "result": { + "cn": [ + "sshd" + ], + "description": [ + "sshd" + ], + "dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "sshd" + }, + { + "error": null, + "result": { + "cn": [ + "ftp" + ], + "description": [ + "ftp" + ], + "dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "ftp" + }, + { + "error": null, + "result": { + "cn": [ + "su" + ], + "description": [ + "su" + ], + "dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "su" + }, + { + "error": null, + "result": { + "cn": [ + "login" + ], + "description": [ + "login" + ], + "dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "login" + }, + { + "error": null, + "result": { + "cn": [ + "su-l" + ], + "description": [ + "su with login shell" + ], + "dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "su-l" + }, + { + "error": null, + "result": { + "cn": [ + "sudo" + ], + "description": [ + "sudo" + ], + "dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "sudo" + }, + { + "error": null, + "result": { + "cn": [ + "sudo-i" + ], + "description": [ + "sudo-i" + ], + "dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "sudo-i" + }, + { + "error": null, + "result": { + "cn": [ + "gdm" + ], + "description": [ + "gdm" + ], + "dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "gdm" + }, + { + "error": null, + "result": { + "cn": [ + "gdm-password" + ], + "description": [ + "gdm-password" + ], + "dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "gdm-password" + }, + { + "error": null, + "result": { + "cn": [ + "kdm" + ], + "description": [ + "kdm" + ], + "dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "kdm" + } + ] + } +} diff --git a/install/ui/test/data/hbacsvcgroup_find_pkeys.json b/install/ui/test/data/hbacsvcgroup_find_pkeys.json new file mode 100644 index 000000000..fdca25658 --- /dev/null +++ b/install/ui/test/data/hbacsvcgroup_find_pkeys.json @@ -0,0 +1,17 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "result": [ + { + "cn": [ + "Sudo" + ], + "dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com" + } + ], + "summary": "1 group matched", + "truncated": false + } +} diff --git a/install/ui/test/data/hbacsvcgroup_get_records.json b/install/ui/test/data/hbacsvcgroup_get_records.json new file mode 100644 index 000000000..1d9a62f83 --- /dev/null +++ b/install/ui/test/data/hbacsvcgroup_get_records.json @@ -0,0 +1,27 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "results": [ + { + "error": null, + "result": { + "cn": [ + "Sudo" + ], + "description": [ + "Default group of Sudo related services" + ], + "dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com", + "member_hbacsvc": [ + "sudo", + "sudo-i" + ] + }, + "summary": null, + "value": "Sudo" + } + ] + } +} diff --git a/install/ui/test/data/host_add.json b/install/ui/test/data/host_add.json index 8b4d8b93a..f03649009 100644 --- a/install/ui/test/data/host_add.json +++ b/install/ui/test/data/host_add.json @@ -6,7 +6,7 @@ "cn": [ "www.pbs.org" ], - "dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com", "fqdn": [ "www.pbs.org" ], @@ -15,10 +15,10 @@ "3ad2e63d-b43a-11df-8dd1-525400674dcd" ], "krbprincipalname": [ - "host/www.pbs.org@AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "host/www.pbs.org@EXAMPLE.COM" ], "managedby": [ - "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com" ], "objectclass": [ "ipaobject", diff --git a/install/ui/test/data/host_find_pkeys.json b/install/ui/test/data/host_find_pkeys.json new file mode 100644 index 000000000..9b38adba6 --- /dev/null +++ b/install/ui/test/data/host_find_pkeys.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": null, + "result": { + "count": 2, + "result": [ + { + "dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com", + "fqdn": [ + "dev.example.com" + ] + }, + { + "dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com", + "fqdn": [ + "test.example.com" + ] + } + ], + "summary": "2 hosts matched", + "truncated": false + } +} diff --git a/install/ui/test/data/host_get_records.json b/install/ui/test/data/host_get_records.json new file mode 100644 index 000000000..27e0fcfa0 --- /dev/null +++ b/install/ui/test/data/host_get_records.json @@ -0,0 +1,112 @@ +{ + "error": null, + "id": null, + "result": { + "count": 2, + "results": [ + { + "error": null, + "result": { + "cn": [ + "dev.example.com" + ], + "dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com", + "enrolledby_user": [ + "admin" + ], + "fqdn": [ + "dev.example.com" + ], + "has_keytab": true, + "has_password": false, + "ipauniqueid": [ + "d2c1f41c-ff41-11e0-bde8-525400e135d8" + ], + "krbextradata": [ + { + "__base64__": "AAIIEqdOaG9zdC9kZXYuZXhhbXBsZS5jb21ASURNLkxBQi5CT1MuUkVESEFULkNPTQA=" + } + ], + "krblastpwdchange": [ + "20111025194616Z" + ], + "krbprincipalname": [ + "host/dev.example.com@EXAMPLE.COM" + ], + "managedby_host": [ + "dev.example.com" + ], + "managing_host": [ + "dev.example.com" + ], + "objectclass": [ + "ipaobject", + "nshost", + "ipahost", + "pkiuser", + "ipaservice", + "krbprincipalaux", + "krbprincipal", + "top" + ], + "serverhostname": [ + "dev" + ] + }, + "summary": null, + "value": "dev.example.com" + }, + { + "error": null, + "result": { + "cn": [ + "test.example.com" + ], + "dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com", + "enrolledby_user": [ + "admin" + ], + "fqdn": [ + "test.example.com" + ], + "has_keytab": false, + "has_password": false, + "ipauniqueid": [ + "d5d1400e-ff41-11e0-9a21-525400e135d8" + ], + "krbextradata": [ + { + "__base64__": "AAIiEqdOaG9zdC90ZXN0LmV4YW1wbGUuY29tQElETS5MQUIuQk9TLlJFREhBVC5DT00A" + } + ], + "krbprincipalname": [ + "host/test.example.com@EXAMPLE.COM" + ], + "managedby_host": [ + "test.example.com" + ], + "managing_host": [ + "test.example.com" + ], + "objectclass": [ + "ipaobject", + "nshost", + "ipahost", + "pkiuser", + "ipaservice", + "krbprincipalaux", + "krbprincipal", + "top" + ], + "serverhostname": [ + "test" + ] + }, + "summary": null, + "value": "test.example.com" + } + ], + "summary": "2 hosts matched", + "truncated": false + } +} diff --git a/install/ui/test/data/hostgroup_add.json b/install/ui/test/data/hostgroup_add.json index bc41ee7d8..b20d9aa9d 100644 --- a/install/ui/test/data/hostgroup_add.json +++ b/install/ui/test/data/hostgroup_add.json @@ -9,7 +9,7 @@ "description": [ "Special Guest Stars" ], - "dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=example,dc=com", "ipauniqueid": [ "7f8c57ae-b43a-11df-8016-525400674dcd" ], diff --git a/install/ui/test/data/hostgroup_add_member.json b/install/ui/test/data/hostgroup_add_member.json index a92201751..34ed8d051 100644 --- a/install/ui/test/data/hostgroup_add_member.json +++ b/install/ui/test/data/hostgroup_add_member.json @@ -16,7 +16,7 @@ "description": [ "Live servers" ], - "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com", "ipauniqueid": [ "1ba89342-b683-11df-8d5b-525400674dcd" ], diff --git a/install/ui/test/data/hostgroup_find.json b/install/ui/test/data/hostgroup_find.json index 6732910c0..5310fc482 100644 --- a/install/ui/test/data/hostgroup_find.json +++ b/install/ui/test/data/hostgroup_find.json @@ -11,7 +11,7 @@ "description": [ "Live servers" ], - "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com", "member": [], "memberof": [] }, @@ -22,7 +22,7 @@ "description": [ "Staging servers" ], - "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com", "member": [], "memberof": [] } diff --git a/install/ui/test/data/hostgroup_find_pkeys.json b/install/ui/test/data/hostgroup_find_pkeys.json new file mode 100644 index 000000000..95b00fa52 --- /dev/null +++ b/install/ui/test/data/hostgroup_find_pkeys.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "result": [ + { + "cn": [ + "host-live" + ], + "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "stage-live" + ], + "dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com" + } + ], + "summary": "2 hostgroups matched", + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/hostgroup_get_records.json b/install/ui/test/data/hostgroup_get_records.json new file mode 100644 index 000000000..678bb4af5 --- /dev/null +++ b/install/ui/test/data/hostgroup_get_records.json @@ -0,0 +1,41 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "results": [ + { + "error": null, + "result": { + "cn": [ + "host-live" + ], + "description": [ + "Live servers" + ], + "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com", + "member": [], + "memberof": [] + }, + "summary": null, + "value": "host-live" + }, + { + "error": null, + "result": { + "cn": [ + "host-stage" + ], + "description": [ + "Staging servers" + ], + "dn": "cn=host-stage,cn=hostgroups,cn=accounts,dc=example,dc=com", + "member": [], + "memberof": [] + }, + "summary": null, + "value": "host-stage" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/hostgroup_show.json b/install/ui/test/data/hostgroup_show.json index 776d446dd..549ed8c91 100644 --- a/install/ui/test/data/hostgroup_show.json +++ b/install/ui/test/data/hostgroup_show.json @@ -9,7 +9,7 @@ "description": [ "Live servers" ], - "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com", "member_host": [ "live3.pbs.org", "live2.pbs.org", diff --git a/install/ui/test/data/ipa_init.json b/install/ui/test/data/ipa_init.json index 75f3793d2..830b2d633 100644 --- a/install/ui/test/data/ipa_init.json +++ b/install/ui/test/data/ipa_init.json @@ -382,7 +382,7 @@ "cn": [ "Administrator" ], - "dn": "uid=admin,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com", "gecos": [ "Administrator" ], @@ -415,7 +415,7 @@ "20111212052109Z" ], "krbprincipalname": [ - "admin@IDM.LAB.BOS.REDHAT.COM" + "admin@EXAMPLE.COM" ], "loginshell": [ "/bin/bash" @@ -451,13 +451,13 @@ "count": 72, "error": null, "result": { - "basedn": "dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "basedn": "dc=example,dc=com", "bin": "/var/www", "ca_agent_install_port": 9443, "ca_agent_port": 443, "ca_ee_install_port": 9444, "ca_ee_port": 443, - "ca_host": "edewata-f15.idm.lab.bos.redhat.com", + "ca_host": "dev.example.com", "ca_install_port": 9180, "ca_port": 80, "conf": "/etc/ipa/server.conf", @@ -493,17 +493,17 @@ "container_virtual": "cn=virtual operations,cn=etc", "context": "server", "debug": false, - "domain": "idm.lab.bos.redhat.com", + "domain": "example.com", "dot_ipa": "/var/www/.ipa", "enable_ra": true, "fallback": true, "home": "/var/www", - "host": "edewata-f15.idm.lab.bos.redhat.com", + "host": "dev.example.com", "in_server": true, "in_tree": false, "interactive": true, "ipalib": "/usr/lib/python2.7/site-packages/ipalib", - "ldap_uri": "ldapi://%2fvar%2frun%2fslapd-IDM-LAB-BOS-REDHAT-COM.socket", + "ldap_uri": "ldapi://%2fvar%2frun%2fslapd-EXAMPLE-COM.socket", "log": null, "logdir": "/var/log/ipa", "mode": "production", @@ -512,7 +512,7 @@ "mount_xmlserver": "xml", "prompt_all": false, "ra_plugin": "selfsign", - "realm": "IDM.LAB.BOS.REDHAT.COM", + "realm": "EXAMPLE.COM", "rpc_json_uri": "http://localhost:8888/ipa/json", "script": "/var/www/mod_wsgi", "site_packages": "/usr/lib/python2.7/site-packages", @@ -522,7 +522,7 @@ "wait_for_attr": false, "webui_assets_dir": null, "webui_prod": true, - "xmlrpc_uri": "https://edewata-f15.idm.lab.bos.redhat.com/ipa/xml" + "xmlrpc_uri": "https://dev.example.com/ipa/xml" }, "summary": "72 variables", "total": 72 diff --git a/install/ui/test/data/ipa_init_objects.json b/install/ui/test/data/ipa_init_objects.json index fce7a1f6d..0ed111d18 100644 --- a/install/ui/test/data/ipa_init_objects.json +++ b/install/ui/test/data/ipa_init_objects.json @@ -4542,7 +4542,7 @@ "aciattrs": [], "attribute_members": {}, "bindable": false, - "container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos", + "container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos", "default_attributes": [ "krbmaxticketlife", "krbmaxrenewableage" @@ -5418,7 +5418,7 @@ ], "attribute_members": {}, "bindable": false, - "container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos", + "container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos", "default_attributes": [ "cn", "cospriority", diff --git a/install/ui/test/data/krbtpolicy_show.json b/install/ui/test/data/krbtpolicy_show.json index 6f9fe6d2e..9a30ca3ba 100644 --- a/install/ui/test/data/krbtpolicy_show.json +++ b/install/ui/test/data/krbtpolicy_show.json @@ -27,9 +27,9 @@ "objectclass": "rscwo" }, "cn": [ - "IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "DEV.EXAMPLE.COM" ], - "dn": "cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com", "krbdefaultencsalttypes": [ "aes256-cts:special", "aes128-cts:special", @@ -46,7 +46,7 @@ "2" ], "krbsubtrees": [ - "dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dc=dev,dc=example,dc=com" ], "krbsupportedencsalttypes": [ "aes256-cts:normal", diff --git a/install/ui/test/data/netgroup_add.json b/install/ui/test/data/netgroup_add.json index 989bb5db0..9d8d4c519 100644 --- a/install/ui/test/data/netgroup_add.json +++ b/install/ui/test/data/netgroup_add.json @@ -9,12 +9,12 @@ "description": [ "Butterfly Networks" ], - "dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=example,dc=com", "ipauniqueid": [ "b16f7240-b43a-11df-89fa-525400674dcd" ], "nisdomainname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ], "objectclass": [ "ipaobject", diff --git a/install/ui/test/data/netgroup_add_member.json b/install/ui/test/data/netgroup_add_member.json index 5fbae9e14..8b1f49e8f 100644 --- a/install/ui/test/data/netgroup_add_member.json +++ b/install/ui/test/data/netgroup_add_member.json @@ -20,7 +20,7 @@ "description": [ "live servers" ], - "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com", "memberhost_host": [ "live3.pbs.org", "live2.pbs.org", @@ -33,7 +33,7 @@ "muppets" ], "nisdomainname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ] } } diff --git a/install/ui/test/data/netgroup_find.json b/install/ui/test/data/netgroup_find.json index 15626e0b9..6addf3948 100644 --- a/install/ui/test/data/netgroup_find.json +++ b/install/ui/test/data/netgroup_find.json @@ -11,17 +11,17 @@ "description": [ "staging servers" ], - "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com", "memberhost": [], "memberof": [], "memberuser": [ - "cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com" + "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com" ], "memberuser_group": [ "muppets" ], "nisdomainname": [ - "idm.lab.bos.redhat.com" + "example.com" ] }, { @@ -31,22 +31,22 @@ "description": [ "live servers" ], - "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com", + "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com", "memberhost": [ - "cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com" + "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com" ], "memberhost_hostgroup": [ "host-live" ], "memberof": [], "memberuser": [ - "cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com" + "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com" ], "memberuser_group": [ "muppets" ], "nisdomainname": [ - "idm.lab.bos.redhat.com" + "example.com" ] } ], diff --git a/install/ui/test/data/netgroup_find_pkeys.json b/install/ui/test/data/netgroup_find_pkeys.json new file mode 100644 index 000000000..7e3c87f61 --- /dev/null +++ b/install/ui/test/data/netgroup_find_pkeys.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "result": [ + { + "cn": [ + "net-stage" + ], + "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com" + }, + { + "cn": [ + "net-live" + ], + "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/netgroup_get_records.json b/install/ui/test/data/netgroup_get_records.json new file mode 100644 index 000000000..6383f73d1 --- /dev/null +++ b/install/ui/test/data/netgroup_get_records.json @@ -0,0 +1,64 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "results": [ + { + "error": null, + "result": { + "cn": [ + "net-stage" + ], + "description": [ + "staging servers" + ], + "dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com", + "memberhost": [], + "memberof": [], + "memberuser": [ + "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com" + ], + "memberuser_group": [ + "muppets" + ], + "nisdomainname": [ + "example.com" + ] + }, + "summary": null, + "value": "net-stage" + }, + { + "error": null, + "result": { + "cn": [ + "net-live" + ], + "description": [ + "live servers" + ], + "dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com", + "memberhost": [ + "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com" + ], + "memberhost_hostgroup": [ + "host-live" + ], + "memberof": [], + "memberuser": [ + "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com" + ], + "memberuser_group": [ + "muppets" + ], + "nisdomainname": [ + "example.com" + ] + }, + "summary": null, + "value": "net-live" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/netgroup_show.json b/install/ui/test/data/netgroup_show.json index aa77e8885..4702fa01e 100644 --- a/install/ui/test/data/netgroup_show.json +++ b/install/ui/test/data/netgroup_show.json @@ -9,7 +9,7 @@ "description": [ "live servers" ], - "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com", "memberhost_host": [ "live3.pbs.org", "live2.pbs.org", @@ -29,7 +29,7 @@ "count123" ], "nisdomainname": [ - "ayoung.boston.devel.redhat.com" + "example.com" ] }, "summary": null, diff --git a/install/ui/test/data/permission_add.json b/install/ui/test/data/permission_add.json index 9ea7b226b..d1def4771 100644 --- a/install/ui/test/data/permission_add.json +++ b/install/ui/test/data/permission_add.json @@ -9,7 +9,7 @@ "description": [ "description" ], - "dn": "cn=testperm,cn=permissions,cn=pbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=testperm,cn=permissions,cn=pbac,dc=example,dc=com", "objectclass": [ "groupofnames", "top" diff --git a/install/ui/test/data/permission_find_pkeys.json b/install/ui/test/data/permission_find_pkeys.json new file mode 100644 index 000000000..35d0acb98 --- /dev/null +++ b/install/ui/test/data/permission_find_pkeys.json @@ -0,0 +1,35 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 4, + "result": [ + { + "cn": [ + "filter" + ], + "dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa" + }, + { + "cn": [ + "subtree" + ], + "dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa" + }, + { + "cn": [ + "targetgroup" + ], + "dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa" + }, + { + "cn": [ + "type" + ], + "dn": "cn=type,cn=permissions,cn=pbac,dc=ipa" + } + ], + "summary": "4 permissions matched", + "truncated": false + } +} diff --git a/install/ui/test/data/permission_get_records.json b/install/ui/test/data/permission_get_records.json new file mode 100644 index 000000000..c337d72cc --- /dev/null +++ b/install/ui/test/data/permission_get_records.json @@ -0,0 +1,101 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 4, + "results": [ + { + "error": null, + "result": { + "cn": [ + "filter" + ], + "description": [ + "Filter Permission" + ], + "dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa", + "filter": "(ou=Engineering)", + "objectclass": [ + "groupofnames", + "top" + ], + "permissions": [ + "write" + ] + }, + "summary": null, + "value": "filter" + }, + { + "error": null, + "result": { + "cn": [ + "subtree" + ], + "description": [ + "Subtree Permission" + ], + "dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa", + "objectclass": [ + "groupofnames", + "top" + ], + "permissions": [ + "write" + ], + "subtree": "ldap:///dc=ipa" + }, + "summary": null, + "value": "subtree" + }, + { + "error": null, + "result": { + "cn": [ + "targetgroup" + ], + "description": [ + "Target Group Permission" + ], + "dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa", + "objectclass": [ + "groupofnames", + "top" + ], + "permissions": [ + "write" + ], + "targetgroup": "ipausers" + }, + "summary": null, + "value": "targetgroup" + }, + { + "error": null, + "result": { + "attrs": [ + "cn", + "description" + ], + "cn": [ + "type" + ], + "description": [ + "Type Permission" + ], + "dn": "cn=type,cn=permissions,cn=pbac,dc=ipa", + "objectclass": [ + "groupofnames", + "top" + ], + "permissions": [ + "write" + ], + "type": "user" + }, + "summary": null, + "value": "type" + } + ] + } +} diff --git a/install/ui/test/data/permission_show.json b/install/ui/test/data/permission_show.json index 0d5784274..4c4beb66b 100644 --- a/install/ui/test/data/permission_show.json +++ b/install/ui/test/data/permission_show.json @@ -27,9 +27,9 @@ "description": [ "Test Permission" ], - "dn": "cn=test,cn=permissions,cn=hbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=test,cn=permissions,cn=hbac,dc=example,dc=com", "member": [ - "cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com" ], "objectclass": [ "groupofnames", diff --git a/install/ui/test/data/privilege_find.json b/install/ui/test/data/privilege_find.json index c48c4a0e8..c9054d887 100644 --- a/install/ui/test/data/privilege_find.json +++ b/install/ui/test/data/privilege_find.json @@ -11,7 +11,7 @@ "description": [ "User Administrators" ], - "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addusers", "change_password", @@ -27,7 +27,7 @@ "description": [ "Group Administrators" ], - "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addgroups", "removegroups", @@ -42,7 +42,7 @@ "description": [ "Host Administrators" ], - "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addhosts", "removehosts", @@ -58,7 +58,7 @@ "description": [ "Host Group Administrators" ], - "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addhostgroups", "removehostgroups", @@ -73,7 +73,7 @@ "description": [ "Role administration" ], - "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addroles", "removeroles", @@ -89,7 +89,7 @@ "description": [ "Service Administrators" ], - "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addservices", "removeservices", @@ -104,7 +104,7 @@ "description": [ "Automount Administrators" ], - "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addautomountmaps", "removeautomountmaps", @@ -119,7 +119,7 @@ "description": [ "Netgroups Administrators" ], - "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addnetgroups", "removenetgroups", @@ -134,7 +134,7 @@ "description": [ "Certificate Administrators" ], - "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "retrieve_certs", "request_certs", @@ -151,9 +151,9 @@ "description": [ "Replication Administrators" ], - "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberindirect": [ - "uid=admin,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "uid=admin,cn=users,cn=accounts,dc=example,dc=com" ], "memberof_permission": [ "managereplica", @@ -167,7 +167,7 @@ "description": [ "Host Enrollment" ], - "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "manage_host_keytab", "enroll_host" @@ -180,7 +180,7 @@ "description": [ "Entitlement Administrators" ], - "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com", "memberof_permission": [ "addentitlements", "removeentitlements", @@ -194,7 +194,7 @@ "description": [ "DNS Administrators" ], - "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com" }, { "cn": [ @@ -203,9 +203,9 @@ "description": [ "DNS Servers" ], - "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com", "memberindirect": [ - "krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com" ] } ], diff --git a/install/ui/test/data/privilege_find_pkeys.json b/install/ui/test/data/privilege_find_pkeys.json new file mode 100644 index 000000000..e8bad4b40 --- /dev/null +++ b/install/ui/test/data/privilege_find_pkeys.json @@ -0,0 +1,95 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 14, + "result": [ + { + "cn": [ + "useradmin" + ], + "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "groupadmin" + ], + "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "hostadmin" + ], + "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "hostgroupadmin" + ], + "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "delegationadmin" + ], + "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "serviceadmin" + ], + "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "automountadmin" + ], + "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "netgroupadmin" + ], + "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "certadmin" + ], + "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "replicaadmin" + ], + "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "enrollhost" + ], + "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "entitlementadmin" + ], + "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "dnsadmin" + ], + "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "dnsserver" + ], + "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com" + } + ], + "summary": "14 privileges matched", + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/privilege_get_records.json b/install/ui/test/data/privilege_get_records.json new file mode 100644 index 000000000..38efdbcd4 --- /dev/null +++ b/install/ui/test/data/privilege_get_records.json @@ -0,0 +1,283 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 14, + "results": [ + { + "error": null, + "result": { + "cn": [ + "useradmin" + ], + "description": [ + "User Administrators" + ], + "dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addusers", + "change_password", + "add_user_to_default_group", + "removeusers", + "modifyusers" + ] + }, + "summary": null, + "value": "useradmin" + }, + { + "error": null, + "result": { + "cn": [ + "groupadmin" + ], + "description": [ + "Group Administrators" + ], + "dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addgroups", + "removegroups", + "modifygroups", + "modifygroupmembership" + ] + }, + "summary": null, + "value": "groupadmin" + }, + { + "error": null, + "result": { + "cn": [ + "hostadmin" + ], + "description": [ + "Host Administrators" + ], + "dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addhosts", + "removehosts", + "modifyhosts", + "manage_host_keytab", + "enroll_host" + ] + }, + "summary": null, + "value": "hostadmin" + }, + { + "error": null, + "result": { + "cn": [ + "hostgroupadmin" + ], + "description": [ + "Host Group Administrators" + ], + "dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addhostgroups", + "removehostgroups", + "modifyhostgroups", + "modifyhostgroupmembership" + ] + }, + "summary": null, + "value": "hostgroupadmin" + }, + { + "error": null, + "result": { + "cn": [ + "delegationadmin" + ], + "description": [ + "Role administration" + ], + "dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addroles", + "removeroles", + "modifyroles", + "modifyrolemembership", + "modifyprivilegemembership" + ] + }, + "summary": null, + "value": "delegationadmin" + }, + { + "error": null, + "result": { + "cn": [ + "serviceadmin" + ], + "description": [ + "Service Administrators" + ], + "dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addservices", + "removeservices", + "modifyservices", + "manage_service_keytab" + ] + }, + "summary": null, + "value": "serviceadmin" + }, + { + "error": null, + "result": { + "cn": [ + "automountadmin" + ], + "description": [ + "Automount Administrators" + ], + "dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addautomountmaps", + "removeautomountmaps", + "addautomountkeys", + "removeautomountkeys" + ] + }, + "summary": null, + "value": "automountadmin" + }, + { + "error": null, + "result": { + "cn": [ + "netgroupadmin" + ], + "description": [ + "Netgroups Administrators" + ], + "dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addnetgroups", + "removenetgroups", + "modifynetgroups", + "modifynetgroupmembership" + ] + }, + "summary": null, + "value": "netgroupadmin" + }, + { + "error": null, + "result": { + "cn": [ + "certadmin" + ], + "description": [ + "Certificate Administrators" + ], + "dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "retrieve_certs", + "request_certs", + "request_cert_different_host", + "certificate_status", + "revoke_certificate", + "certificate_remove_hold" + ] + }, + "summary": null, + "value": "certadmin" + }, + { + "error": null, + "result": { + "cn": [ + "replicaadmin" + ], + "description": [ + "Replication Administrators" + ], + "dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberindirect": [ + "uid=admin,cn=users,cn=accounts,dc=example,dc=com" + ], + "memberof_permission": [ + "managereplica", + "deletereplica" + ] + }, + "summary": null, + "value": "replicaadmin" + }, + { + "error": null, + "result": { + "cn": [ + "enrollhost" + ], + "description": [ + "Host Enrollment" + ], + "dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "manage_host_keytab", + "enroll_host" + ] + }, + "summary": null, + "value": "enrollhost" + }, + { + "error": null, + "result": { + "cn": [ + "entitlementadmin" + ], + "description": [ + "Entitlement Administrators" + ], + "dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com", + "memberof_permission": [ + "addentitlements", + "removeentitlements", + "modifyentitlements" + ] + }, + "summary": null, + "value": "entitlementadmin" + }, + { + "error": null, + "result": { + "cn": [ + "dnsadmin" + ], + "description": [ + "DNS Administrators" + ], + "dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com" + }, + "summary": null, + "value": "dnsadmin" + }, + { + "error": null, + "result": { + "cn": [ + "dnsserver" + ], + "description": [ + "DNS Servers" + ], + "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com", + "memberindirect": [ + "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com" + ] + }, + "summary": null, + "value": "dnsserver" + } + ] + } +}
\ No newline at end of file diff --git a/install/ui/test/data/privilege_show.json b/install/ui/test/data/privilege_show.json index 7d9328aa0..ce2a25978 100644 --- a/install/ui/test/data/privilege_show.json +++ b/install/ui/test/data/privilege_show.json @@ -23,9 +23,9 @@ "description": [ "DNS Servers" ], - "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com", "memberindirect": [ - "krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com" ], "objectclass": [ "top", diff --git a/install/ui/test/data/pwpolicy_find.json b/install/ui/test/data/pwpolicy_find.json index 629ebfc90..94cf88df6 100644 --- a/install/ui/test/data/pwpolicy_find.json +++ b/install/ui/test/data/pwpolicy_find.json @@ -6,7 +6,7 @@ "result": [ { "cn": "GLOBAL", - "dn": "cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=accounts,dc=example,dc=com", "krbmaxpwdlife": [ "90" ], @@ -30,7 +30,7 @@ "cospriority": [ "1" ], - "dn": "cn=testgroup12,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com", "krbmaxpwdlife": [ "40" ], @@ -51,7 +51,7 @@ "cospriority": [ "2" ], - "dn": "cn=testgroup22,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com", "krbmaxpwdlife": [ "60" ], diff --git a/install/ui/test/data/pwpolicy_find_pkeys.json b/install/ui/test/data/pwpolicy_find_pkeys.json new file mode 100644 index 000000000..a5a0cf5ec --- /dev/null +++ b/install/ui/test/data/pwpolicy_find_pkeys.json @@ -0,0 +1,27 @@ +{ + "error": null, + "id": 6, + "result": { + "count": 3, + "result": [ + { + "cn": "GLOBAL", + "dn": "cn=accounts,dc=example,dc=com" + }, + { + "cn": [ + "testgroup12" + ], + "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com" + }, + { + "cn": [ + "testgroup22" + ], + "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +} diff --git a/install/ui/test/data/pwpolicy_get_records.json b/install/ui/test/data/pwpolicy_get_records.json new file mode 100644 index 000000000..77fff6a45 --- /dev/null +++ b/install/ui/test/data/pwpolicy_get_records.json @@ -0,0 +1,85 @@ +{ + "error": null, + "id": 6, + "result": { + "count": 3, + "results": [ + { + "error": null, + "result": { + "cn": "GLOBAL", + "dn": "cn=accounts,dc=example,dc=com", + "krbmaxpwdlife": [ + "90" + ], + "krbminpwdlife": [ + "1" + ], + "krbpwdhistorylength": [ + "0" + ], + "krbpwdmindiffchars": [ + "0" + ], + "krbpwdminlength": [ + "8" + ] + }, + "summary": null, + "value": "GLOBAL" + }, + { + "error": null, + "result": { + "cn": [ + "testgroup12" + ], + "cospriority": [ + "1" + ], + "dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com", + "krbmaxpwdlife": [ + "40" + ], + "krbminpwdlife": [ + "50" + ], + "krbpwdhistorylength": [ + "5" + ], + "krbpwdminlength": [ + "6" + ] + }, + "summary": null, + "value": "testgroup12" + }, + { + "error": null, + "result": { + "cn": [ + "testgroup22" + ], + "cospriority": [ + "2" + ], + "dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com", + "krbmaxpwdlife": [ + "60" + ], + "krbminpwdlife": [ + "40" + ], + "krbpwdhistorylength": [ + "8" + ], + "krbpwdminlength": [ + "9" + ] + }, + "summary": null, + "value": "testgroup22" + } + ] + } +} diff --git a/install/ui/test/data/pwpolicy_show.json b/install/ui/test/data/pwpolicy_show.json index e91f52efa..5329f6b34 100644 --- a/install/ui/test/data/pwpolicy_show.json +++ b/install/ui/test/data/pwpolicy_show.json @@ -20,7 +20,7 @@ "cn": [ "global_policy" ], - "dn": "cn=global_policy,cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=global_policy,cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com", "krbmaxpwdlife": [ "90" ], diff --git a/install/ui/test/data/role_find.json b/install/ui/test/data/role_find.json index af013803c..6ca3b8ffb 100644 --- a/install/ui/test/data/role_find.json +++ b/install/ui/test/data/role_find.json @@ -11,7 +11,7 @@ "description": [ "Helpdesk" ], - "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com" } ], "summary": "1 role matched", diff --git a/install/ui/test/data/role_find_pkeys.json b/install/ui/test/data/role_find_pkeys.json new file mode 100644 index 000000000..af2f3403b --- /dev/null +++ b/install/ui/test/data/role_find_pkeys.json @@ -0,0 +1,17 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "result": [ + { + "cn": [ + "helpdesk" + ], + "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com" + } + ], + "summary": "1 role matched", + "truncated": false + } +}
\ No newline at end of file diff --git a/install/ui/test/data/role_get_records.json b/install/ui/test/data/role_get_records.json new file mode 100644 index 000000000..fc7ab747c --- /dev/null +++ b/install/ui/test/data/role_get_records.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "results": [ + { + "error": null, + "result": { + "cn": [ + "helpdesk" + ], + "description": [ + "Helpdesk" + ], + "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com" + }, + "summary": null, + "value": "helpdesk" + } + ] + } +} diff --git a/install/ui/test/data/role_show.json b/install/ui/test/data/role_show.json index 9ad8dd689..69189c034 100644 --- a/install/ui/test/data/role_show.json +++ b/install/ui/test/data/role_show.json @@ -23,7 +23,7 @@ "description": [ "Helpdesk" ], - "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com", "objectclass": [ "top", "groupofnames", diff --git a/install/ui/test/data/rolegroup_add.json b/install/ui/test/data/rolegroup_add.json deleted file mode 100644 index 54e2c2832..000000000 --- a/install/ui/test/data/rolegroup_add.json +++ /dev/null @@ -1,22 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "result": { - "cn": [ - "test" - ], - "description": [ - "Test role" - ], - "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "objectclass": [ - "groupofnames", - "nestedgroup", - "top" - ] - }, - "summary": "Added rolegroup \"test\"", - "value": "test" - } -} diff --git a/install/ui/test/data/rolegroup_add_member.json b/install/ui/test/data/rolegroup_add_member.json deleted file mode 100644 index e68ecc28b..000000000 --- a/install/ui/test/data/rolegroup_add_member.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "completed": 1, - "failed": { - "member": { - "group": [], - "host": [], - "hostgroup": [], - "user": [] - } - }, - "result": { - "cn": [ - "test" - ], - "description": [ - "Test role" - ], - "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "member_user": [ - "admin" - ] - } - } -} diff --git a/install/ui/test/data/rolegroup_del.json b/install/ui/test/data/rolegroup_del.json deleted file mode 100644 index 8af1e6306..000000000 --- a/install/ui/test/data/rolegroup_del.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "result": true, - "summary": "Deleted rolegroup \"test\"", - "value": "test" - } -} diff --git a/install/ui/test/data/rolegroup_find.json b/install/ui/test/data/rolegroup_find.json deleted file mode 100644 index 8ed2a76b7..000000000 --- a/install/ui/test/data/rolegroup_find.json +++ /dev/null @@ -1,185 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "count": 15, - "result": [ - { - "cn": [ - "helpdesk" - ], - "description": [ - "Helpdesk" - ], - "dn": "cn=helpdesk,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "member_user": [ - "edewata" - ] - }, - { - "cn": [ - "useradmin" - ], - "description": [ - "User Administrators" - ], - "dn": "cn=useradmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "groupadmin" - ], - "description": [ - "Group Administrators" - ], - "dn": "cn=groupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "hostadmin" - ], - "description": [ - "Host Administrators" - ], - "dn": "cn=hostadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "memberof_taskgroup": [ - "addhosts", - "removehosts", - "modifyhosts", - "manage_host_keytab", - "enroll_host" - ] - }, - { - "cn": [ - "hostgroupadmin" - ], - "description": [ - "Host Group Administrators" - ], - "dn": "cn=hostgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "delegationadmin" - ], - "description": [ - "Role administration" - ], - "dn": "cn=delegationadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "serviceadmin" - ], - "description": [ - "Service Administrators" - ], - "dn": "cn=serviceadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "memberof_taskgroup": [ - "addservices", - "removeservices", - "modifyservices" - ] - }, - { - "cn": [ - "automountadmin" - ], - "description": [ - "Automount Administrators" - ], - "dn": "cn=automountadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "netgroupadmin" - ], - "description": [ - "Netgroups Administrators" - ], - "dn": "cn=netgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "dnsadmin" - ], - "description": [ - "DNS Administrators" - ], - "dn": "cn=dnsadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "dnsserver" - ], - "description": [ - "DNS Servers" - ], - "dn": "cn=dnsserver,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - }, - { - "cn": [ - "certadmin" - ], - "description": [ - "Certificate Administrators" - ], - "dn": "cn=certadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "memberof_taskgroup": [ - "retrieve_certs", - "request_certs", - "request_cert_different_host", - "certificate_status", - "revoke_certificate", - "certificate_remove_hold" - ] - }, - { - "cn": [ - "replicaadmin" - ], - "description": [ - "Replication Administrators" - ], - "dn": "cn=replicaadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "member_user": [ - "admin" - ], - "memberof_taskgroup": [ - "managereplica", - "deletereplica" - ] - }, - { - "cn": [ - "enrollhost" - ], - "description": [ - "Host Enrollment" - ], - "dn": "cn=enrollhost,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "memberof_taskgroup": [ - "manage_host_keytab", - "enroll_host" - ] - }, - { - "cn": [ - "entitlementadmin" - ], - "description": [ - "Entitlement Administrators" - ], - "dn": "cn=entitlementadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "memberof_taskgroup": [ - "addentitlements", - "removeentitlements", - "modifyentitlements" - ] - } - ], - "summary": "15 rolegroups matched", - "truncated": false - } -} diff --git a/install/ui/test/data/rolegroup_remove_member.json b/install/ui/test/data/rolegroup_remove_member.json deleted file mode 100644 index d42bb6016..000000000 --- a/install/ui/test/data/rolegroup_remove_member.json +++ /dev/null @@ -1,24 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "completed": 1, - "failed": { - "member": { - "group": [], - "host": [], - "hostgroup": [], - "user": [] - } - }, - "result": { - "cn": [ - "test" - ], - "description": [ - "Test role" - ], - "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com" - } - } -} diff --git a/install/ui/test/data/rolegroup_show.json b/install/ui/test/data/rolegroup_show.json deleted file mode 100644 index 4652fb2cd..000000000 --- a/install/ui/test/data/rolegroup_show.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "error": null, - "id": 0, - "result": { - "result": { - "cn": [ - "test" - ], - "description": [ - "Test role" - ], - "dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com", - "member_user": [ - "admin" - ] - }, - "summary": null, - "value": "test" - } -} diff --git a/install/ui/test/data/service_find_pkeys.json b/install/ui/test/data/service_find_pkeys.json new file mode 100644 index 000000000..ef14125f2 --- /dev/null +++ b/install/ui/test/data/service_find_pkeys.json @@ -0,0 +1,29 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 3, + "result": [ + { + "dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "krbprincipalname": [ + "ldap/dev.example.com@DEV.EXAMPLE.COM" + ] + }, + { + "dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "krbprincipalname": [ + "HTTP/dev.example.com@DEV.EXAMPLE.COM" + ] + }, + { + "dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "krbprincipalname": [ + "test/dev.example.com@DEV.EXAMPLE.COM" + ] + } + ], + "summary": "3 services matched", + "truncated": false + } +} diff --git a/install/ui/test/data/service_get_records.json b/install/ui/test/data/service_get_records.json new file mode 100644 index 000000000..a91d1db49 --- /dev/null +++ b/install/ui/test/data/service_get_records.json @@ -0,0 +1,61 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 3, + "results": [ + { + "error": null, + "result": { + "dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "has_keytab": true, + "krbprincipalname": [ + "ldap/dev.example.com@DEV.EXAMPLE.COM" + ], + "managedby_host": [ + "dev.example.com" + ], + "usercertificate": [ + { + "__base64__": "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" + } + ] + }, + "summary": null, + "value": "ldap/dev.example.com@DEV.EXAMPLE.COM" + }, + { + "error": null, + "result": { + "dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "has_keytab": true, + "krbprincipalname": [ + "HTTP/dev.example.com@DEV.EXAMPLE.COM" + ], + "usercertificate": [ + { + "__base64__": "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" + } + ] + }, + "summary": null, + "value": "HTTP/dev.example.com@DEV.EXAMPLE.COM" + }, + { + "error": null, + "result": { + "dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com", + "has_keytab": false, + "krbprincipalname": [ + "test/dev.example.com@DEV.EXAMPLE.COM" + ], + "managedby_host": [ + "dev.example.com" + ] + }, + "summary": null, + "value": "test/dev.example.com@DEV.EXAMPLE.COM" + } + ] + } +} diff --git a/install/ui/test/data/sudocmd_find_pkeys.json b/install/ui/test/data/sudocmd_find_pkeys.json new file mode 100644 index 000000000..f7f5a23ef --- /dev/null +++ b/install/ui/test/data/sudocmd_find_pkeys.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "result": [ + { + "dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com", + "sudocmd": [ + "/usr/bin/more" + ] + }, + { + "dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com", + "sudocmd": [ + "/usr/bin/less" + ] + } + ], + "summary": "2 sudo command matched", + "truncated": false + } +} diff --git a/install/ui/test/data/sudocmd_get_records.json b/install/ui/test/data/sudocmd_get_records.json new file mode 100644 index 000000000..0ae943c80 --- /dev/null +++ b/install/ui/test/data/sudocmd_get_records.json @@ -0,0 +1,31 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "results": [ + { + "error": null, + "result": { + "dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com", + "sudocmd": [ + "/usr/bin/more" + ] + }, + "summary": null, + "value": "/usr/bin/more" + }, + { + "error": null, + "result": { + "dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com", + "sudocmd": [ + "/usr/bin/less" + ] + }, + "summary": null, + "value": "/usr/bin/less" + } + ] + } +} diff --git a/install/ui/test/data/sudocmdgroup_find_pkeys.json b/install/ui/test/data/sudocmdgroup_find_pkeys.json new file mode 100644 index 000000000..03a3cf4d4 --- /dev/null +++ b/install/ui/test/data/sudocmdgroup_find_pkeys.json @@ -0,0 +1,23 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "result": [ + { + "cn": [ + "group1" + ], + "dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com" + }, + { + "cn": [ + "group2" + ], + "dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com" + } + ], + "summary": "2 sudo command groups matched", + "truncated": false + } +} diff --git a/install/ui/test/data/sudocmdgroup_get_records.json b/install/ui/test/data/sudocmdgroup_get_records.json new file mode 100644 index 000000000..2670bea1c --- /dev/null +++ b/install/ui/test/data/sudocmdgroup_get_records.json @@ -0,0 +1,41 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 2, + "results": [ + { + "error": null, + "result": { + "cn": [ + "group1" + ], + "description": [ + "Group 1" + ], + "dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com", + "member_sudocmd": [ + "/usr/bin/more", + "/usr/bin/less" + ] + }, + "summary": null, + "value": "group1" + }, + { + "error": null, + "result": { + "cn": [ + "group2" + ], + "description": [ + "Group 2" + ], + "dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "group2" + } + ] + } +} diff --git a/install/ui/test/data/sudorule_find_pkeys.json b/install/ui/test/data/sudorule_find_pkeys.json new file mode 100644 index 000000000..a843b2a5b --- /dev/null +++ b/install/ui/test/data/sudorule_find_pkeys.json @@ -0,0 +1,17 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "result": [ + { + "cn": [ + "test" + ], + "dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com" + } + ], + "summary": null, + "truncated": false + } +} diff --git a/install/ui/test/data/sudorule_get_records.json b/install/ui/test/data/sudorule_get_records.json new file mode 100644 index 000000000..b0d82b880 --- /dev/null +++ b/install/ui/test/data/sudorule_get_records.json @@ -0,0 +1,20 @@ +{ + "error": null, + "id": 0, + "result": { + "count": 1, + "results": [ + { + "error": null, + "result": { + "cn": [ + "test" + ], + "dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com" + }, + "summary": null, + "value": "test" + } + ] + } +} diff --git a/install/ui/test/data/taskgroup_find.json b/install/ui/test/data/taskgroup_find.json deleted file mode 100644 index fa5c46250..000000000 --- a/install/ui/test/data/taskgroup_find.json +++ /dev/null @@ -1,554 +0,0 @@ -{ - "error": null, - "id": 6, - "result": { - "count": 45, - "result": [ - { - "cn": [ - "addusers" - ], - "description": [ - "Add Users" - ], - "dn": "cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "useradmin" - ] - }, - { - "cn": [ - "change_password" - ], - "description": [ - "Change a user password" - ], - "dn": "cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "useradmin" - ] - }, - { - "cn": [ - "add_user_to_default_group" - ], - "description": [ - "Add user to default group" - ], - "dn": "cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "useradmin" - ] - }, - { - "cn": [ - "removeusers" - ], - "description": [ - "Remove Users" - ], - "dn": "cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "useradmin" - ] - }, - { - "cn": [ - "modifyusers" - ], - "description": [ - "Modify Users" - ], - "dn": "cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "useradmin" - ] - }, - { - "cn": [ - "addgroups" - ], - "description": [ - "Add Groups" - ], - "dn": "cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "groupadmin" - ] - }, - { - "cn": [ - "removegroups" - ], - "description": [ - "Remove Groups" - ], - "dn": "cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "groupadmin" - ] - }, - { - "cn": [ - "modifygroups" - ], - "description": [ - "Modify Groups" - ], - "dn": "cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "groupadmin" - ] - }, - { - "cn": [ - "modifygroupmembership" - ], - "description": [ - "Modify Group membership" - ], - "dn": "cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "groupadmin" - ] - }, - { - "cn": [ - "addhosts" - ], - "description": [ - "Add Hosts" - ], - "dn": "cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostadmin" - ] - }, - { - "cn": [ - "removehosts" - ], - "description": [ - "Remove Hosts" - ], - "dn": "cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostadmin" - ] - }, - { - "cn": [ - "modifyhosts" - ], - "description": [ - "Modify Hosts" - ], - "dn": "cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostadmin" - ] - }, - { - "cn": [ - "addhostgroups" - ], - "description": [ - "Add Host Groups" - ], - "dn": "cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostgroupadmin" - ] - }, - { - "cn": [ - "removehostgroups" - ], - "description": [ - "Remove Host Groups" - ], - "dn": "cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostgroupadmin" - ] - }, - { - "cn": [ - "modifyhostgroups" - ], - "description": [ - "Modify Host Groups" - ], - "dn": "cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostgroupadmin" - ] - }, - { - "cn": [ - "modifyhostgroupmembership" - ], - "description": [ - "Modify Host Group membership" - ], - "dn": "cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostgroupadmin" - ] - }, - { - "cn": [ - "addservices" - ], - "description": [ - "Add Services" - ], - "dn": "cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "serviceadmin" - ] - }, - { - "cn": [ - "removeservices" - ], - "description": [ - "Remove Services" - ], - "dn": "cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "serviceadmin" - ] - }, - { - "cn": [ - "addhrole", - "addroles" - ], - "description": [ - "Add Roles" - ], - "dn": "cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "delegationadmin" - ] - }, - { - "cn": [ - "removeroles" - ], - "description": [ - "Remove Roles" - ], - "dn": "cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "delegationadmin" - ] - }, - { - "cn": [ - "modifyroles" - ], - "description": [ - "Modify Roles" - ], - "dn": "cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "delegationadmin" - ] - }, - { - "cn": [ - "modifyrolegroupmembership" - ], - "description": [ - "Modify Role Group membership" - ], - "dn": "cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "delegationadmin" - ] - }, - { - "cn": [ - "modifytaskgroupmembership" - ], - "description": [ - "Modify Task Group membership" - ], - "dn": "cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "delegationadmin" - ] - }, - { - "cn": [ - "addautomount" - ], - "description": [ - "Add Automount maps/keys" - ], - "dn": "cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "automountadmin" - ] - }, - { - "cn": [ - "removeautomount" - ], - "description": [ - "Remove Automount maps/keys" - ], - "dn": "cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "automountadmin" - ] - }, - { - "cn": [ - "addnetgroups" - ], - "description": [ - "Add netgroups" - ], - "dn": "cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "netgroupadmin" - ] - }, - { - "cn": [ - "removenetgroups" - ], - "description": [ - "Remove netgroups" - ], - "dn": "cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "netgroupadmin" - ] - }, - { - "cn": [ - "modifynetgroups" - ], - "description": [ - "Modify netgroups" - ], - "dn": "cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "netgroupadmin" - ] - }, - { - "cn": [ - "modifynetgroupmembership" - ], - "description": [ - "Modify netgroup membership" - ], - "dn": "cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "netgroupadmin" - ] - }, - { - "cn": [ - "manage_host_keytab" - ], - "description": [ - "Manage host keytab" - ], - "dn": "cn=manage_host_keytab,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostadmin", - "enrollhost" - ] - }, - { - "cn": [ - "manage_host_keytab", - "update_dns", - "update_sn" - ], - "description": [ - "Updates DNS" - ], - "dn": "cn=update_dns,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "dnsadmin", - "dnsserver" - ] - }, - { - "cn": [ - "modifyservices" - ], - "description": [ - "Modify Services" - ], - "dn": "cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "serviceadmin" - ] - }, - { - "cn": [ - "enroll_host" - ], - "description": [ - "Enroll a host" - ], - "dn": "cn=enroll_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "hostadmin", - "enrollhost" - ] - }, - { - "cn": [ - "retrieve_certs" - ], - "description": [ - "Retrieve SSL Certificates" - ], - "dn": "cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "request_certs" - ], - "description": [ - "Request a SSL Certificate" - ], - "dn": "cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "request_cert_different_host" - ], - "description": [ - "Request a SSL Certificate from a different host" - ], - "dn": "cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "certificate_status" - ], - "description": [ - "Status of cert request" - ], - "dn": "cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "revoke_certificate" - ], - "description": [ - "Revoke Certificate" - ], - "dn": "cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "certificate_remove_hold" - ], - "description": [ - "Certificate Remove Hold" - ], - "dn": "cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "certadmin" - ] - }, - { - "cn": [ - "managereplica" - ], - "description": [ - "Manage Replication Agreements" - ], - "dn": "cn=managereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "replicaadmin" - ] - }, - { - "cn": [ - "deletereplica" - ], - "description": [ - "Delete Replication Agreements" - ], - "dn": "cn=deletereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "replicaadmin" - ] - }, - { - "cn": [ - "addentitlements" - ], - "description": [ - "Add Entitlements" - ], - "dn": "cn=addentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "entitlementadmin" - ] - }, - { - "cn": [ - "removeentitlements" - ], - "description": [ - "Remove Entitlements" - ], - "dn": "cn=removeentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "entitlementadmin" - ] - }, - { - "cn": [ - "modifyentitlements" - ], - "description": [ - "Modify Entitlements" - ], - "dn": "cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", - "member_rolegroup": [ - "entitlementadmin" - ] - }, - { - "cn": [ - "testtaskgroup" - ], - "description": [ - "test1" - ], - "dn": "cn=testtaskgroup,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" - } - ], - "summary": "45 grupos de tarea coincidentes", - "truncated": false - } -}
\ No newline at end of file diff --git a/install/ui/test/data/user_add.json b/install/ui/test/data/user_add.json index e6a98b5c2..8e51993f3 100644 --- a/install/ui/test/data/user_add.json +++ b/install/ui/test/data/user_add.json @@ -3,7 +3,7 @@ "id": 10, "result": { "result": { - "dn": "uid=snuffy,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=snuffy,cn=users,cn=accounts,dc=example,dc=com", "gecos": [ "snuffy" ], @@ -17,7 +17,7 @@ "a4ce7d19-b439-11df-a9ae-525400674dcd" ], "krbprincipalname": [ - "snuffy@AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "snuffy@EXAMPLE.COM" ], "loginshell": [ "/bin/sh" diff --git a/install/ui/test/data/user_find.json b/install/ui/test/data/user_find.json index bd6c59766..825baa2ca 100644 --- a/install/ui/test/data/user_find.json +++ b/install/ui/test/data/user_find.json @@ -5,7 +5,7 @@ "count": 100, "result": [ { - "dn": "uid=abradley,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=abradley,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400048" ], @@ -32,7 +32,7 @@ ] }, { - "dn": "uid=abrown,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=abrown,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400013" ], @@ -59,7 +59,7 @@ ] }, { - "dn": "uid=acarlson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=acarlson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400060" ], @@ -86,7 +86,7 @@ ] }, { - "dn": "uid=adaniels,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=adaniels,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400059" ], @@ -113,7 +113,7 @@ ] }, { - "dn": "uid=admin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=admin,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400000" ], @@ -137,7 +137,7 @@ ] }, { - "dn": "uid=agordon,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=agordon,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400080" ], @@ -164,7 +164,7 @@ ] }, { - "dn": "uid=ajohnson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ajohnson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400011" ], @@ -191,7 +191,7 @@ ] }, { - "dn": "uid=ajones,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ajones,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400014" ], @@ -218,7 +218,7 @@ ] }, { - "dn": "uid=amiller,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=amiller,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400015" ], @@ -245,7 +245,7 @@ ] }, { - "dn": "uid=apeterson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=apeterson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400104" ], @@ -272,7 +272,7 @@ ] }, { - "dn": "uid=arhodes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=arhodes,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400031" ], @@ -299,7 +299,7 @@ ] }, { - "dn": "uid=aromero,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=aromero,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400079" ], @@ -326,7 +326,7 @@ ] }, { - "dn": "uid=asmith,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=asmith,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400010" ], @@ -353,7 +353,7 @@ ] }, { - "dn": "uid=awilliams,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=awilliams,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400012" ], @@ -380,7 +380,7 @@ ] }, { - "dn": "uid=bbauer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=bbauer,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400094" ], @@ -407,7 +407,7 @@ ] }, { - "dn": "uid=bgross,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=bgross,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400071" ], @@ -434,7 +434,7 @@ ] }, { - "dn": "uid=bmcgee,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=bmcgee,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400075" ], @@ -461,7 +461,7 @@ ] }, { - "dn": "uid=cduffy,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=cduffy,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400058" ], @@ -488,7 +488,7 @@ ] }, { - "dn": "uid=chartman,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=chartman,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400082" ], @@ -515,7 +515,7 @@ ] }, { - "dn": "uid=chuynh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=chuynh,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400093" ], @@ -542,7 +542,7 @@ ] }, { - "dn": "uid=ckramer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ckramer,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400092" ], @@ -569,7 +569,7 @@ ] }, { - "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400039" ], @@ -596,7 +596,7 @@ ] }, { - "dn": "uid=dbriggs,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=dbriggs,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400069" ], @@ -623,7 +623,7 @@ ] }, { - "dn": "uid=dkelly,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=dkelly,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400050" ], @@ -650,7 +650,7 @@ ] }, { - "dn": "uid=dmontes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=dmontes,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400027" ], @@ -677,7 +677,7 @@ ] }, { - "dn": "uid=dmyers,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=dmyers,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400102" ], @@ -704,7 +704,7 @@ ] }, { - "dn": "uid=drosario,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=drosario,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400051" ], @@ -731,7 +731,7 @@ ] }, { - "dn": "uid=eduardo,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=eduardo,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400007" ], @@ -758,7 +758,7 @@ ] }, { - "dn": "uid=ekane,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ekane,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400070" ], @@ -785,7 +785,7 @@ ] }, { - "dn": "uid=ewatkins,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ewatkins,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400047" ], @@ -812,7 +812,7 @@ ] }, { - "dn": "uid=fstrong,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=fstrong,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400084" ], @@ -839,7 +839,7 @@ ] }, { - "dn": "uid=fwolfe,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=fwolfe,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400035" ], @@ -866,7 +866,7 @@ ] }, { - "dn": "uid=grobles,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=grobles,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400066" ], @@ -893,7 +893,7 @@ ] }, { - "dn": "uid=groman,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=groman,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400100" ], @@ -920,7 +920,7 @@ ] }, { - "dn": "uid=ibeard,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ibeard,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400037" ], @@ -947,7 +947,7 @@ ] }, { - "dn": "uid=ipotts,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ipotts,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400095" ], @@ -974,7 +974,7 @@ ] }, { - "dn": "uid=jbuckley,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jbuckley,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400045" ], @@ -1001,7 +1001,7 @@ ] }, { - "dn": "uid=jburch,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jburch,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400090" ], @@ -1028,7 +1028,7 @@ ] }, { - "dn": "uid=jgould,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jgould,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400046" ], @@ -1055,7 +1055,7 @@ ] }, { - "dn": "uid=jmaynard,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jmaynard,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400088" ], @@ -1082,7 +1082,7 @@ ] }, { - "dn": "uid=jmccann,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jmccann,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400064" ], @@ -1109,7 +1109,7 @@ ] }, { - "dn": "uid=jmccarty,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jmccarty,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400089" ], @@ -1136,7 +1136,7 @@ ] }, { - "dn": "uid=jmckee,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jmckee,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400057" ], @@ -1163,7 +1163,7 @@ ] }, { - "dn": "uid=jpreston,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jpreston,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400052" ], @@ -1190,7 +1190,7 @@ ] }, { - "dn": "uid=jwu,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=jwu,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400054" ], @@ -1217,7 +1217,7 @@ ] }, { - "dn": "uid=kanderson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kanderson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400004" ], @@ -1244,7 +1244,7 @@ ] }, { - "dn": "uid=kfisher,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kfisher,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400076" ], @@ -1271,7 +1271,7 @@ ] }, { - "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400097" ], @@ -1298,7 +1298,7 @@ ] }, { - "dn": "uid=kmills,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kmills,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400086" ], @@ -1325,7 +1325,7 @@ ] }, { - "dn": "uid=kreyes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kreyes,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400091" ], @@ -1352,7 +1352,7 @@ ] }, { - "dn": "uid=kvonneu,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kvonneu,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400005" ], @@ -1379,7 +1379,7 @@ ] }, { - "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400033" ], @@ -1406,7 +1406,7 @@ ] }, { - "dn": "uid=lbarnett,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lbarnett,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400105" ], @@ -1433,7 +1433,7 @@ ] }, { - "dn": "uid=lcohen,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lcohen,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400083" ], @@ -1460,7 +1460,7 @@ ] }, { - "dn": "uid=ldennis,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ldennis,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400096" ], @@ -1487,7 +1487,7 @@ ] }, { - "dn": "uid=lduran,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lduran,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400038" ], @@ -1514,7 +1514,7 @@ ] }, { - "dn": "uid=lgross,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lgross,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400085" ], @@ -1541,7 +1541,7 @@ ] }, { - "dn": "uid=lhall,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=lhall,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400049" ], @@ -1568,7 +1568,7 @@ ] }, { - "dn": "uid=llarson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=llarson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400067" ], @@ -1595,7 +1595,7 @@ ] }, { - "dn": "uid=marcher,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=marcher,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400055" ], @@ -1622,7 +1622,7 @@ ] }, { - "dn": "uid=mbailey,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mbailey,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400068" ], @@ -1649,7 +1649,7 @@ ] }, { - "dn": "uid=mbutler,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mbutler,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400087" ], @@ -1676,7 +1676,7 @@ ] }, { - "dn": "uid=mcarney,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mcarney,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400043" ], @@ -1703,7 +1703,7 @@ ] }, { - "dn": "uid=mclay,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mclay,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400062" ], @@ -1730,7 +1730,7 @@ ] }, { - "dn": "uid=mdyer,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mdyer,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400036" ], @@ -1757,7 +1757,7 @@ ] }, { - "dn": "uid=mestes,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mestes,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400077" ], @@ -1784,7 +1784,7 @@ ] }, { - "dn": "uid=mgates,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mgates,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400063" ], @@ -1811,7 +1811,7 @@ ] }, { - "dn": "uid=mjefferson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mjefferson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400053" ], @@ -1838,7 +1838,7 @@ ] }, { - "dn": "uid=mkrause,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mkrause,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400073" ], @@ -1865,7 +1865,7 @@ ] }, { - "dn": "uid=mlong,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mlong,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400078" ], @@ -1892,7 +1892,7 @@ ] }, { - "dn": "uid=mtravis,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mtravis,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400098" ], @@ -1919,7 +1919,7 @@ ] }, { - "dn": "uid=mvang,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mvang,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400030" ], @@ -1946,7 +1946,7 @@ ] }, { - "dn": "uid=mvaughan,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=mvaughan,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400065" ], @@ -1973,7 +1973,7 @@ ] }, { - "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400032" ], @@ -2000,7 +2000,7 @@ ] }, { - "dn": "uid=nmartinez,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=nmartinez,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400040" ], @@ -2027,7 +2027,7 @@ ] }, { - "dn": "uid=ostein,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=ostein,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400006" ], @@ -2054,7 +2054,7 @@ ] }, { - "dn": "uid=pdawn,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=pdawn,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400009" ], @@ -2081,7 +2081,7 @@ ] }, { - "dn": "uid=rcannon,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=rcannon,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400103" ], @@ -2108,7 +2108,7 @@ ] }, { - "dn": "uid=rhale,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=rhale,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400056" ], @@ -2135,7 +2135,7 @@ ] }, { - "dn": "uid=sbecker,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sbecker,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400021" ], @@ -2162,7 +2162,7 @@ ] }, { - "dn": "uid=scohen,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=scohen,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400044" ], @@ -2189,7 +2189,7 @@ ] }, { - "dn": "uid=sfrazier,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sfrazier,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400020" ], @@ -2216,7 +2216,7 @@ ] }, { - "dn": "uid=sgregory,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sgregory,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400018" ], @@ -2243,7 +2243,7 @@ ] }, { - "dn": "uid=smaldonado,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=smaldonado,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400022" ], @@ -2270,7 +2270,7 @@ ] }, { - "dn": "uid=smcclure,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=smcclure,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400072" ], @@ -2297,7 +2297,7 @@ ] }, { - "dn": "uid=sparrish,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sparrish,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400074" ], @@ -2324,7 +2324,7 @@ ] }, { - "dn": "uid=sroberson,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sroberson,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400028" ], @@ -2351,7 +2351,7 @@ ] }, { - "dn": "uid=sshelton,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sshelton,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400019" ], @@ -2378,7 +2378,7 @@ ] }, { - "dn": "uid=sshepherd,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=sshepherd,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400041" ], @@ -2405,7 +2405,7 @@ ] }, { - "dn": "uid=t,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=t,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400003" ], @@ -2435,7 +2435,7 @@ ] }, { - "dn": "uid=tburch,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=tburch,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400101" ], @@ -2462,7 +2462,7 @@ ] }, { - "dn": "uid=tcase,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=tcase,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400099" ], @@ -2489,7 +2489,7 @@ ] }, { - "dn": "uid=tosborn,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=tosborn,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400042" ], @@ -2516,7 +2516,7 @@ ] }, { - "dn": "uid=uevans,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=uevans,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400034" ], @@ -2543,7 +2543,7 @@ ] }, { - "dn": "uid=vgriffin,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=vgriffin,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400081" ], @@ -2570,7 +2570,7 @@ ] }, { - "dn": "uid=vmendoza,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=vmendoza,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400029" ], @@ -2597,7 +2597,7 @@ ] }, { - "dn": "uid=wryan,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=wryan,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400061" ], @@ -2624,7 +2624,7 @@ ] }, { - "dn": "uid=zlloyd,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=zlloyd,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400016" ], @@ -2651,7 +2651,7 @@ ] }, { - "dn": "uid=zmarsh,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=zmarsh,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400017" ], @@ -2678,7 +2678,7 @@ ] }, { - "dn": "uid=zoe,cn=users,cn=accounts,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=zoe,cn=users,cn=accounts,dc=dev,dc=example,dc=com", "gidnumber": [ "835400008" ], diff --git a/install/ui/test/data/user_find_pkeys.json b/install/ui/test/data/user_find_pkeys.json new file mode 100644 index 000000000..1669d249e --- /dev/null +++ b/install/ui/test/data/user_find_pkeys.json @@ -0,0 +1,1211 @@ +{ + "error": null, + "id": null, + "result": { + "count": 200, + "result": [ + { + "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "abarrett" + ] + }, + { + "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "abradley" + ] + }, + { + "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "acarlson" + ] + }, + { + "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "adaniels" + ] + }, + { + "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "admin" + ] + }, + { + "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ageorge" + ] + }, + { + "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "agordon" + ] + }, + { + "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "aobrien" + ] + }, + { + "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "aortega" + ] + }, + { + "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "aortiz" + ] + }, + { + "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "apeterson" + ] + }, + { + "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "arhodes" + ] + }, + { + "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "aromero" + ] + }, + { + "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "athompson" + ] + }, + { + "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "avaldez" + ] + }, + { + "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bbauer" + ] + }, + { + "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bblair" + ] + }, + { + "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bgross" + ] + }, + { + "dn": "uid=bmcgee,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bmcgee" + ] + }, + { + "dn": "uid=bnewton,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bnewton" + ] + }, + { + "dn": "uid=bpage,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bpage" + ] + }, + { + "dn": "uid=bswanson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bswanson" + ] + }, + { + "dn": "uid=bwolfe,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "bwolfe" + ] + }, + { + "dn": "uid=candrade,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "candrade" + ] + }, + { + "dn": "uid=cbarrera,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cbarrera" + ] + }, + { + "dn": "uid=ccarson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ccarson" + ] + }, + { + "dn": "uid=cduffy,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cduffy" + ] + }, + { + "dn": "uid=cgreer,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cgreer" + ] + }, + { + "dn": "uid=chartman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "chartman" + ] + }, + { + "dn": "uid=cheath,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cheath" + ] + }, + { + "dn": "uid=chickman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "chickman" + ] + }, + { + "dn": "uid=chuynh,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "chuynh" + ] + }, + { + "dn": "uid=ckramer,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ckramer" + ] + }, + { + "dn": "uid=clloyd,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "clloyd" + ] + }, + { + "dn": "uid=cmccullough,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cmccullough" + ] + }, + { + "dn": "uid=cmcintosh,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cmcintosh" + ] + }, + { + "dn": "uid=cmelendez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cmelendez" + ] + }, + { + "dn": "uid=crobles,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "crobles" + ] + }, + { + "dn": "uid=ctrujillo,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ctrujillo" + ] + }, + { + "dn": "uid=cvillarreal,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cvillarreal" + ] + }, + { + "dn": "uid=cwiggins,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "cwiggins" + ] + }, + { + "dn": "uid=dbean,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dbean" + ] + }, + { + "dn": "uid=dblevins,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dblevins" + ] + }, + { + "dn": "uid=dbriggs,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dbriggs" + ] + }, + { + "dn": "uid=dhood,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dhood" + ] + }, + { + "dn": "uid=dkelly,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dkelly" + ] + }, + { + "dn": "uid=dlopez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dlopez" + ] + }, + { + "dn": "uid=dmontes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dmontes" + ] + }, + { + "dn": "uid=dmoses,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dmoses" + ] + }, + { + "dn": "uid=dmyers,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dmyers" + ] + }, + { + "dn": "uid=dphillips,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dphillips" + ] + }, + { + "dn": "uid=drosario,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "drosario" + ] + }, + { + "dn": "uid=dshort,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "dshort" + ] + }, + { + "dn": "uid=eberry,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "eberry" + ] + }, + { + "dn": "uid=eclay,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "eclay" + ] + }, + { + "dn": "uid=ehayes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ehayes" + ] + }, + { + "dn": "uid=ehunt,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ehunt" + ] + }, + { + "dn": "uid=ekane,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ekane" + ] + }, + { + "dn": "uid=eriley,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "eriley" + ] + }, + { + "dn": "uid=ewatkins,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ewatkins" + ] + }, + { + "dn": "uid=flam,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "flam" + ] + }, + { + "dn": "uid=fstrong,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "fstrong" + ] + }, + { + "dn": "uid=fwolfe,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "fwolfe" + ] + }, + { + "dn": "uid=ghouse,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ghouse" + ] + }, + { + "dn": "uid=gmcintosh,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "gmcintosh" + ] + }, + { + "dn": "uid=gmoody,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "gmoody" + ] + }, + { + "dn": "uid=gowen,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "gowen" + ] + }, + { + "dn": "uid=grobles,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "grobles" + ] + }, + { + "dn": "uid=groman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "groman" + ] + }, + { + "dn": "uid=hcalderon,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "hcalderon" + ] + }, + { + "dn": "uid=hpittman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "hpittman" + ] + }, + { + "dn": "uid=hrichard,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "hrichard" + ] + }, + { + "dn": "uid=ibeard,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ibeard" + ] + }, + { + "dn": "uid=ipotts,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ipotts" + ] + }, + { + "dn": "uid=jbarron,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jbarron" + ] + }, + { + "dn": "uid=jbuckley,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jbuckley" + ] + }, + { + "dn": "uid=jburch,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jburch" + ] + }, + { + "dn": "uid=jgould,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jgould" + ] + }, + { + "dn": "uid=jjoyce,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jjoyce" + ] + }, + { + "dn": "uid=jkaufman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jkaufman" + ] + }, + { + "dn": "uid=jkhan,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jkhan" + ] + }, + { + "dn": "uid=jmaynard,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmaynard" + ] + }, + { + "dn": "uid=jmccann,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmccann" + ] + }, + { + "dn": "uid=jmccarty,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmccarty" + ] + }, + { + "dn": "uid=jmcfarland,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmcfarland" + ] + }, + { + "dn": "uid=jmckee,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmckee" + ] + }, + { + "dn": "uid=jmullen,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jmullen" + ] + }, + { + "dn": "uid=jpreston,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jpreston" + ] + }, + { + "dn": "uid=jsanford,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jsanford" + ] + }, + { + "dn": "uid=jsnow,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jsnow" + ] + }, + { + "dn": "uid=jvelez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jvelez" + ] + }, + { + "dn": "uid=jvilla,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jvilla" + ] + }, + { + "dn": "uid=jwu,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jwu" + ] + }, + { + "dn": "uid=jzavala,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "jzavala" + ] + }, + { + "dn": "uid=kfisher,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kfisher" + ] + }, + { + "dn": "uid=kgonzalez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kgonzalez" + ] + }, + { + "dn": "uid=kgraham,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kgraham" + ] + }, + { + "dn": "uid=khuerta,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "khuerta" + ] + }, + { + "dn": "uid=kmills,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kmills" + ] + }, + { + "dn": "uid=kpatterson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kpatterson" + ] + }, + { + "dn": "uid=kpeters,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kpeters" + ] + }, + { + "dn": "uid=kreyes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kreyes" + ] + }, + { + "dn": "uid=krivera,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "krivera" + ] + }, + { + "dn": "uid=kshaw,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kshaw" + ] + }, + { + "dn": "uid=kzhang,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "kzhang" + ] + }, + { + "dn": "uid=lbaldwin,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lbaldwin" + ] + }, + { + "dn": "uid=lbarnett,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lbarnett" + ] + }, + { + "dn": "uid=lcabrera,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lcabrera" + ] + }, + { + "dn": "uid=lchandler,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lchandler" + ] + }, + { + "dn": "uid=lcohen,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lcohen" + ] + }, + { + "dn": "uid=ldennis,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ldennis" + ] + }, + { + "dn": "uid=lduran,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lduran" + ] + }, + { + "dn": "uid=lgeorge,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lgeorge" + ] + }, + { + "dn": "uid=lgibbs,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lgibbs" + ] + }, + { + "dn": "uid=lgross,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lgross" + ] + }, + { + "dn": "uid=lhall,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lhall" + ] + }, + { + "dn": "uid=lhogan,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lhogan" + ] + }, + { + "dn": "uid=ljennings,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ljennings" + ] + }, + { + "dn": "uid=llarson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "llarson" + ] + }, + { + "dn": "uid=lmorrison,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lmorrison" + ] + }, + { + "dn": "uid=lnewman,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lnewman" + ] + }, + { + "dn": "uid=lpacheco,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lpacheco" + ] + }, + { + "dn": "uid=lrobinson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lrobinson" + ] + }, + { + "dn": "uid=lsharp,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lsharp" + ] + }, + { + "dn": "uid=lstevenson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lstevenson" + ] + }, + { + "dn": "uid=lwalters,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lwalters" + ] + }, + { + "dn": "uid=lwilson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "lwilson" + ] + }, + { + "dn": "uid=marcher,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "marcher" + ] + }, + { + "dn": "uid=mbailey,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mbailey" + ] + }, + { + "dn": "uid=mblevins,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mblevins" + ] + }, + { + "dn": "uid=mbray,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mbray" + ] + }, + { + "dn": "uid=mbright,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mbright" + ] + }, + { + "dn": "uid=mbutler,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mbutler" + ] + }, + { + "dn": "uid=mcameron,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mcameron" + ] + }, + { + "dn": "uid=mcarney,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mcarney" + ] + }, + { + "dn": "uid=mclay,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mclay" + ] + }, + { + "dn": "uid=mcrane,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mcrane" + ] + }, + { + "dn": "uid=mdonovan,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mdonovan" + ] + }, + { + "dn": "uid=mdyer,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mdyer" + ] + }, + { + "dn": "uid=mescobar,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mescobar" + ] + }, + { + "dn": "uid=mestes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mestes" + ] + }, + { + "dn": "uid=mgates,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mgates" + ] + }, + { + "dn": "uid=mjefferson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mjefferson" + ] + }, + { + "dn": "uid=mkrause,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mkrause" + ] + }, + { + "dn": "uid=mlong,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mlong" + ] + }, + { + "dn": "uid=mmcintyre,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mmcintyre" + ] + }, + { + "dn": "uid=mrichardson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mrichardson" + ] + }, + { + "dn": "uid=mrowland,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mrowland" + ] + }, + { + "dn": "uid=mtanner,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mtanner" + ] + }, + { + "dn": "uid=mtravis,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mtravis" + ] + }, + { + "dn": "uid=mvang,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mvang" + ] + }, + { + "dn": "uid=mvaughan,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mvaughan" + ] + }, + { + "dn": "uid=mvilla,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mvilla" + ] + }, + { + "dn": "uid=mwoodard,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "mwoodard" + ] + }, + { + "dn": "uid=ngutierrez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "ngutierrez" + ] + }, + { + "dn": "uid=nmartinez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "nmartinez" + ] + }, + { + "dn": "uid=nparker,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "nparker" + ] + }, + { + "dn": "uid=nramirez,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "nramirez" + ] + }, + { + "dn": "uid=okennedy,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "okennedy" + ] + }, + { + "dn": "uid=omcdonald,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "omcdonald" + ] + }, + { + "dn": "uid=pcarroll,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "pcarroll" + ] + }, + { + "dn": "uid=rcannon,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rcannon" + ] + }, + { + "dn": "uid=rcarrillo,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rcarrillo" + ] + }, + { + "dn": "uid=rcohen,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rcohen" + ] + }, + { + "dn": "uid=rcontreras,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rcontreras" + ] + }, + { + "dn": "uid=rhale,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rhale" + ] + }, + { + "dn": "uid=rhampton,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "rhampton" + ] + }, + { + "dn": "uid=sbarron,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sbarron" + ] + }, + { + "dn": "uid=sbradford,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sbradford" + ] + }, + { + "dn": "uid=scastaneda,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "scastaneda" + ] + }, + { + "dn": "uid=scohen,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "scohen" + ] + }, + { + "dn": "uid=skane,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "skane" + ] + }, + { + "dn": "uid=sklein,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sklein" + ] + }, + { + "dn": "uid=sknapp,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sknapp" + ] + }, + { + "dn": "uid=smcclure,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "smcclure" + ] + }, + { + "dn": "uid=smcfarland,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "smcfarland" + ] + }, + { + "dn": "uid=sparrish,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sparrish" + ] + }, + { + "dn": "uid=spruitt,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "spruitt" + ] + }, + { + "dn": "uid=srich,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "srich" + ] + }, + { + "dn": "uid=sroberson,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sroberson" + ] + }, + { + "dn": "uid=sroy,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sroy" + ] + }, + { + "dn": "uid=sserrano,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sserrano" + ] + }, + { + "dn": "uid=sshepherd,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "sshepherd" + ] + }, + { + "dn": "uid=swalter,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "swalter" + ] + }, + { + "dn": "uid=swoodard,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "swoodard" + ] + }, + { + "dn": "uid=tburch,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "tburch" + ] + }, + { + "dn": "uid=tcase,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "tcase" + ] + }, + { + "dn": "uid=tosborn,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "tosborn" + ] + }, + { + "dn": "uid=tproctor,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "tproctor" + ] + }, + { + "dn": "uid=twebster,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "twebster" + ] + }, + { + "dn": "uid=uevans,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "uevans" + ] + }, + { + "dn": "uid=vgill,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "vgill" + ] + }, + { + "dn": "uid=vgriffin,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "vgriffin" + ] + }, + { + "dn": "uid=vmendoza,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "vmendoza" + ] + }, + { + "dn": "uid=vreyes,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "vreyes" + ] + }, + { + "dn": "uid=wnichols,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "wnichols" + ] + }, + { + "dn": "uid=wryan,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "wryan" + ] + }, + { + "dn": "uid=wweaver,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "wweaver" + ] + }, + { + "dn": "uid=yjacobs,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "yjacobs" + ] + }, + { + "dn": "uid=zschneider,cn=users,cn=accounts,dc=example,dc=com", + "uid": [ + "zschneider" + ] + } + ], + "summary": "200 users matched", + "truncated": true + } +} diff --git a/install/ui/test/data/user_get_records.json b/install/ui/test/data/user_get_records.json new file mode 100644 index 000000000..c45a45c60 --- /dev/null +++ b/install/ui/test/data/user_get_records.json @@ -0,0 +1,1422 @@ +{ + "error": null, + "id": null, + "result": { + "count": 20, + "results": [ + { + "error": null, + "result": { + "cn": [ + "Adrian Barrett" + ], + "displayname": [ + "Adrian Barrett" + ], + "dn": "uid=abarrett,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Adrian Barrett" + ], + "gidnumber": [ + "1576000176" + ], + "givenname": [ + "Adrian" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/abarrett" + ], + "initials": [ + "AB" + ], + "ipauniqueid": [ + "6cca548c-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "abarrett@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=abarrett,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Barrett" + ], + "uid": [ + "abarrett" + ], + "uidnumber": [ + "1576000176" + ] + }, + "summary": null, + "value": "abarrett" + }, + { + "error": null, + "result": { + "cn": [ + "Anja Bradley" + ], + "displayname": [ + "Anja Bradley" + ], + "dn": "uid=abradley,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Anja Bradley" + ], + "gidnumber": [ + "1576000024" + ], + "givenname": [ + "Anja" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/abradley" + ], + "initials": [ + "AB" + ], + "ipauniqueid": [ + "5375ac2a-073f-11e1-95ae-525400e135d8" + ], + "krbprincipalname": [ + "abradley@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=abradley,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Bradley" + ], + "uid": [ + "abradley" + ], + "uidnumber": [ + "1576000024" + ] + }, + "summary": null, + "value": "abradley" + }, + { + "error": null, + "result": { + "cn": [ + "Annmarie Carlson" + ], + "displayname": [ + "Annmarie Carlson" + ], + "dn": "uid=acarlson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Annmarie Carlson" + ], + "gidnumber": [ + "1576000036" + ], + "givenname": [ + "Annmarie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/acarlson" + ], + "initials": [ + "AC" + ], + "ipauniqueid": [ + "54dccaa8-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "acarlson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=acarlson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Carlson" + ], + "uid": [ + "acarlson" + ], + "uidnumber": [ + "1576000036" + ] + }, + "summary": null, + "value": "acarlson" + }, + { + "error": null, + "result": { + "cn": [ + "Angelika Daniels" + ], + "displayname": [ + "Angelika Daniels" + ], + "dn": "uid=adaniels,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Angelika Daniels" + ], + "gidnumber": [ + "1576000035" + ], + "givenname": [ + "Angelika" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/adaniels" + ], + "initials": [ + "AD" + ], + "ipauniqueid": [ + "54abe492-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "adaniels@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=adaniels,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Daniels" + ], + "uid": [ + "adaniels" + ], + "uidnumber": [ + "1576000035" + ] + }, + "summary": null, + "value": "adaniels" + }, + { + "error": null, + "result": { + "cn": [ + "Administrator" + ], + "dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Administrator" + ], + "gidnumber": [ + "1576000000" + ], + "has_keytab": true, + "has_password": true, + "homedirectory": [ + "/home/admin" + ], + "ipauniqueid": [ + "edbf4ade-073a-11e1-8a0f-525400e135d8" + ], + "krbextradata": [ + { + "__base64__": "AAJ3crROcm9vdC9hZG1pbkBJRE0uTEFCLkJPUy5SRURIQVQuQ09NAA==" + } + ], + "krblastpwdchange": [ + "20111104231711Z" + ], + "krbpasswordexpiration": [ + "20120202231711Z" + ], + "krbprincipalname": [ + "admin@EXAMPLE.COM" + ], + "loginshell": [ + "/bin/bash" + ], + "memberof_group": [ + "admins" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "inetuser", + "ipaobject" + ], + "sn": [ + "Administrator" + ], + "uid": [ + "admin" + ], + "uidnumber": [ + "1576000000" + ] + }, + "summary": null, + "value": "admin" + }, + { + "error": null, + "result": { + "cn": [ + "Antionette George" + ], + "displayname": [ + "Antionette George" + ], + "dn": "uid=ageorge,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Antionette George" + ], + "gidnumber": [ + "1576000165" + ], + "givenname": [ + "Antionette" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/ageorge" + ], + "initials": [ + "AG" + ], + "ipauniqueid": [ + "6a8af776-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "ageorge@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=ageorge,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "George" + ], + "uid": [ + "ageorge" + ], + "uidnumber": [ + "1576000165" + ] + }, + "summary": null, + "value": "ageorge" + }, + { + "error": null, + "result": { + "cn": [ + "Amiee Gordon" + ], + "displayname": [ + "Amiee Gordon" + ], + "dn": "uid=agordon,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Amiee Gordon" + ], + "gidnumber": [ + "1576000056" + ], + "givenname": [ + "Amiee" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/agordon" + ], + "initials": [ + "AG" + ], + "ipauniqueid": [ + "57b0510a-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "agordon@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=agordon,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Gordon" + ], + "uid": [ + "agordon" + ], + "uidnumber": [ + "1576000056" + ] + }, + "summary": null, + "value": "agordon" + }, + { + "error": null, + "result": { + "cn": [ + "Antonio Obrien" + ], + "displayname": [ + "Antonio Obrien" + ], + "dn": "uid=aobrien,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Antonio Obrien" + ], + "gidnumber": [ + "1576000201" + ], + "givenname": [ + "Antonio" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aobrien" + ], + "initials": [ + "AO" + ], + "ipauniqueid": [ + "72e80936-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aobrien@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=aobrien,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Obrien" + ], + "uid": [ + "aobrien" + ], + "uidnumber": [ + "1576000201" + ] + }, + "summary": null, + "value": "aobrien" + }, + { + "error": null, + "result": { + "cn": [ + "Asley Ortega" + ], + "displayname": [ + "Asley Ortega" + ], + "dn": "uid=aortega,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Asley Ortega" + ], + "gidnumber": [ + "1576000156" + ], + "givenname": [ + "Asley" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aortega" + ], + "initials": [ + "AO" + ], + "ipauniqueid": [ + "68c80e56-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aortega@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=aortega,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Ortega" + ], + "uid": [ + "aortega" + ], + "uidnumber": [ + "1576000156" + ] + }, + "summary": null, + "value": "aortega" + }, + { + "error": null, + "result": { + "cn": [ + "Alicia Ortiz" + ], + "displayname": [ + "Alicia Ortiz" + ], + "dn": "uid=aortiz,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Alicia Ortiz" + ], + "gidnumber": [ + "1576000181" + ], + "givenname": [ + "Alicia" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aortiz" + ], + "initials": [ + "AO" + ], + "ipauniqueid": [ + "6dda4b48-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aortiz@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=aortiz,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Ortiz" + ], + "uid": [ + "aortiz" + ], + "uidnumber": [ + "1576000181" + ] + }, + "summary": null, + "value": "aortiz" + }, + { + "error": null, + "result": { + "cn": [ + "Alda Peterson" + ], + "displayname": [ + "Alda Peterson" + ], + "dn": "uid=apeterson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Alda Peterson" + ], + "gidnumber": [ + "1576000080" + ], + "givenname": [ + "Alda" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/apeterson" + ], + "initials": [ + "AP" + ], + "ipauniqueid": [ + "5b25407a-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "apeterson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=apeterson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Peterson" + ], + "uid": [ + "apeterson" + ], + "uidnumber": [ + "1576000080" + ] + }, + "summary": null, + "value": "apeterson" + }, + { + "error": null, + "result": { + "cn": [ + "Augustina Rhodes" + ], + "displayname": [ + "Augustina Rhodes" + ], + "dn": "uid=arhodes,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Augustina Rhodes" + ], + "gidnumber": [ + "1576000007" + ], + "givenname": [ + "Augustina" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/arhodes" + ], + "initials": [ + "AR" + ], + "ipauniqueid": [ + "51b4c812-073f-11e1-9cf6-525400e135d8" + ], + "krbprincipalname": [ + "arhodes@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=arhodes,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Rhodes" + ], + "uid": [ + "arhodes" + ], + "uidnumber": [ + "1576000007" + ] + }, + "summary": null, + "value": "arhodes" + }, + { + "error": null, + "result": { + "cn": [ + "Ammie Romero" + ], + "displayname": [ + "Ammie Romero" + ], + "dn": "uid=aromero,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Ammie Romero" + ], + "gidnumber": [ + "1576000055" + ], + "givenname": [ + "Ammie" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/aromero" + ], + "initials": [ + "AR" + ], + "ipauniqueid": [ + "578ac750-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "aromero@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=aromero,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Romero" + ], + "uid": [ + "aromero" + ], + "uidnumber": [ + "1576000055" + ] + }, + "summary": null, + "value": "aromero" + }, + { + "error": null, + "result": { + "cn": [ + "Adella Thompson" + ], + "displayname": [ + "Adella Thompson" + ], + "dn": "uid=athompson,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Adella Thompson" + ], + "gidnumber": [ + "1576000123" + ], + "givenname": [ + "Adella" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/athompson" + ], + "initials": [ + "AT" + ], + "ipauniqueid": [ + "62647b08-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "athompson@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=athompson,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Thompson" + ], + "uid": [ + "athompson" + ], + "uidnumber": [ + "1576000123" + ] + }, + "summary": null, + "value": "athompson" + }, + { + "error": null, + "result": { + "cn": [ + "Asha Valdez" + ], + "displayname": [ + "Asha Valdez" + ], + "dn": "uid=avaldez,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Asha Valdez" + ], + "gidnumber": [ + "1576000195" + ], + "givenname": [ + "Asha" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/avaldez" + ], + "initials": [ + "AV" + ], + "ipauniqueid": [ + "71821438-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "avaldez@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=avaldez,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Valdez" + ], + "uid": [ + "avaldez" + ], + "uidnumber": [ + "1576000195" + ] + }, + "summary": null, + "value": "avaldez" + }, + { + "error": null, + "result": { + "cn": [ + "Bulah Bauer" + ], + "displayname": [ + "Bulah Bauer" + ], + "dn": "uid=bbauer,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bulah Bauer" + ], + "gidnumber": [ + "1576000070" + ], + "givenname": [ + "Bulah" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bbauer" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "598f9148-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bbauer@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=bbauer,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Bauer" + ], + "uid": [ + "bbauer" + ], + "uidnumber": [ + "1576000070" + ] + }, + "summary": null, + "value": "bbauer" + }, + { + "error": null, + "result": { + "cn": [ + "Bernardo Blair" + ], + "displayname": [ + "Bernardo Blair" + ], + "dn": "uid=bblair,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bernardo Blair" + ], + "gidnumber": [ + "1576000169" + ], + "givenname": [ + "Bernardo" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bblair" + ], + "initials": [ + "BB" + ], + "ipauniqueid": [ + "6b55c99c-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bblair@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=bblair,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Blair" + ], + "uid": [ + "bblair" + ], + "uidnumber": [ + "1576000169" + ] + }, + "summary": null, + "value": "bblair" + }, + { + "error": null, + "result": { + "cn": [ + "Billy Gross" + ], + "displayname": [ + "Billy Gross" + ], + "dn": "uid=bgross,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Billy Gross" + ], + "gidnumber": [ + "1576000047" + ], + "givenname": [ + "Billy" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bgross" + ], + "initials": [ + "BG" + ], + "ipauniqueid": [ + "5679c2a8-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bgross@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=bgross,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Gross" + ], + "uid": [ + "bgross" + ], + "uidnumber": [ + "1576000047" + ] + }, + "summary": null, + "value": "bgross" + }, + { + "error": null, + "result": { + "cn": [ + "Bev Mcgee" + ], + "displayname": [ + "Bev Mcgee" + ], + "dn": "uid=bmcgee,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bev Mcgee" + ], + "gidnumber": [ + "1576000051" + ], + "givenname": [ + "Bev" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bmcgee" + ], + "initials": [ + "BM" + ], + "ipauniqueid": [ + "56f64ee0-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bmcgee@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=bmcgee,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Mcgee" + ], + "uid": [ + "bmcgee" + ], + "uidnumber": [ + "1576000051" + ] + }, + "summary": null, + "value": "bmcgee" + }, + { + "error": null, + "result": { + "cn": [ + "Bettyann Newton" + ], + "displayname": [ + "Bettyann Newton" + ], + "dn": "uid=bnewton,cn=users,cn=accounts,dc=example,dc=com", + "gecos": [ + "Bettyann Newton" + ], + "gidnumber": [ + "1576000122" + ], + "givenname": [ + "Bettyann" + ], + "has_keytab": false, + "has_password": false, + "homedirectory": [ + "/home/bnewton" + ], + "initials": [ + "BN" + ], + "ipauniqueid": [ + "623d1c52-073f-11e1-89ea-525400e135d8" + ], + "krbprincipalname": [ + "bnewton@EXAMPLE.COM" + ], + "krbpwdpolicyreference": [ + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" + ], + "loginshell": [ + "/bin/sh" + ], + "memberof_group": [ + "ipausers" + ], + "mepmanagedentry": [ + "cn=bnewton,cn=groups,cn=accounts,dc=example,dc=com" + ], + "nsaccountlock": false, + "objectclass": [ + "top", + "person", + "organizationalperson", + "inetorgperson", + "inetuser", + "posixaccount", + "krbprincipalaux", + "krbticketpolicyaux", + "ipaobject", + "mepOriginEntry" + ], + "sn": [ + "Newton" + ], + "uid": [ + "bnewton" + ], + "uidnumber": [ + "1576000122" + ] + }, + "summary": null, + "value": "bnewton" + } + ] + } +} diff --git a/install/ui/test/data/user_mod.json b/install/ui/test/data/user_mod.json index c77012c14..cf0bf63f7 100644 --- a/install/ui/test/data/user_mod.json +++ b/install/ui/test/data/user_mod.json @@ -113,10 +113,10 @@ "20101105172205Z" ], "krbprincipalname": [ - "kfrog@AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "kfrog@EXAMPLE.COM" ], "krbpwdpolicyreference": [ - "cn=global_policy,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" ], "loginshell": [ "/bin/sh" @@ -129,7 +129,7 @@ "muppets" ], "mepmanagedentry": [ - "cn=kfrog,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "cn=kfrog,cn=groups,cn=accounts,dc=example,dc=com" ], "nsaccountlock": [ "False" diff --git a/install/ui/test/data/user_show.json b/install/ui/test/data/user_show.json index 2fbd049e5..25a505a7b 100644 --- a/install/ui/test/data/user_show.json +++ b/install/ui/test/data/user_show.json @@ -91,7 +91,7 @@ "cn": [ "Kermit The Frog" ], - "dn": "uid=kfrog,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com", + "dn": "uid=kfrog,cn=users,cn=accounts,dc=example,dc=com", "gecos": [ "kfrog" ], @@ -114,10 +114,10 @@ "20101105172205Z" ], "krbprincipalname": [ - "kfrog@AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "kfrog@EXAMPLE.COM" ], "krbpwdpolicyreference": [ - "cn=global_policy,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "cn=global_policy,cn=EXAMPLE.COM,cn=kerberos,dc=example,dc=com" ], "loginshell": [ "/bin/sh" @@ -133,7 +133,7 @@ "editors" ], "mepmanagedentry": [ - "cn=kfrog,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com" + "cn=kfrog,cn=groups,cn=accounts,dc=example,dc=com" ], "nsaccountlock": [ "False" diff --git a/install/ui/test/data/whoami.json b/install/ui/test/data/whoami.json index a922d3720..aa161899e 100644 --- a/install/ui/test/data/whoami.json +++ b/install/ui/test/data/whoami.json @@ -2,6 +2,6 @@ "error": null, "id": 0, "result": { - "summary": "admin@AYOUNG.BOSTON.DEVEL.REDHAT.COM" + "summary": "admin@EXAMPLE.COM" } } |