mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-02-25 18:55:28 -06:00
Updated sample data.
New sample data files have been added for search facet paging. Unused files have been removed. The names used in the files have been updated for consistency. Ticket #981
This commit is contained in:
parent
97660ac4d5
commit
df6bd6ab5a
@ -1,60 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 53,
|
||||
"result": [
|
||||
"(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey\")(version 3.0;acl \"Enable Anonymous access\";allow (read,search,compare) userdn = \"ldap:///anyone\";)",
|
||||
"(targetattr != \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory || krbMKey || ipaUniqueId || memberOf || serverHostName || enrolledBy\")(version 3.0;acl \"Admin can manage any entry\";allow (all) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword\")(version 3.0;acl \"Self can write own password\";allow (write) userdn = \"ldap:///self\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Admins can write passwords\";allow (add,delete,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"Password change service can read/write passwords\";allow (read,write) userdn = \"ldap:///krbprincipalname=kadmin/changepw@AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=AYOUNG.BOSTON.DEVEL.REDHAT.COM,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbMaxPwdLife || krbMinPwdLife || krbPwdMinDiffChars || krbPwdMinLength || krbPwdHistoryLength\")(targetfilter = \"(objectClass=krbPwdPolicy)\")(version 3.0;acl \"Admins can write password policies\";allow (read,search,compare,write) groupdn = \"ldap:///cn=admins,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou\")(version 3.0;acl \"Self service\";allow (write) userdn = \"ldap:///self\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate status,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Get Certificates status from the CA\";allow (write) groupdn = \"ldap:///cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Users\";allow (delete) groupdn = \"ldap:///cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify group membership\";allow (write) groupdn = \"ldap:///cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Services\";allow (add) groupdn = \"ldap:///cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userPassword || krbPrincipalKey || sambaLMPassword || sambaNTPassword || passwordHistory\")(version 3.0;acl \"change_password\";allow (write) groupdn = \"ldap:///cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Groups\";allow (add) groupdn = \"ldap:///cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hostgroups\";allow (write) groupdn = \"ldap:///cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Roles\";allow (write) groupdn = \"ldap:///cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"memberhost || externalhost || memberuser || member\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroup membership\";allow (write) groupdn = \"ldap:///cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userCertificate\")(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Services\";allow (write) groupdn = \"ldap:///cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hostgroups\";allow (add) groupdn = \"ldap:///cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount maps\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove automount keys\";allow (delete) groupdn = \"ldap:///cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///krbprincipalname=*,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Services\";allow (delete) groupdn = \"ldap:///cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Users\";allow (add) groupdn = \"ldap:///cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description || l || location || nshardwareplatform || nsosversion\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Hosts\";allow (write) groupdn = \"ldap:///cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add user to default group\";allow (write) groupdn = \"ldap:///cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hostgroups\";allow (delete) groupdn = \"ldap:///cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Remove entitlement entries\";allow (delete) groupdn = \"ldap:///cn=removeentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(targetattr = \"krbPrincipalName || enrolledBy || objectClass\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Enroll a host\";allow (write) groupdn = \"ldap:///cn=enroll_host,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Hosts\";allow (add) groupdn = \"ldap:///cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove netgroups\";allow (delete) groupdn = \"ldap:///cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"description\")(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify netgroups\";allow (write) groupdn = \"ldap:///cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify role group membership\";allow (write) groupdn = \"ldap:///cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"userCertificate\")(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Modify entitlements\";allow (write) groupdn = \"ldap:///cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify task group membership\";allow (write) groupdn = \"ldap:///cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add Roles\";allow (add) groupdn = \"ldap:///cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=certificate remove hold,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Certificate Remove Hold\";allow (write) groupdn = \"ldap:///cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=rolegroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Roles\";allow (delete) groupdn = \"ldap:///cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount maps\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"givenName || sn || cn || displayName || title || initials || loginShell || gecos || homePhone || mobile || pager || facsimileTelephoneNumber || telephoneNumber || street || roomNumber || l || st || postalCode || manager || secretary || description || carLicense || labeledURI || inetUserHTTPURL || seeAlso || employeeType || businessCategory || ou || mepManagedEntry || objectclass\")(target = \"ldap:///uid=*,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Users\";allow (write) groupdn = \"ldap:///cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add netgroups\";allow (add) groupdn = \"ldap:///cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Hosts\";allow (delete) groupdn = \"ldap:///cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///ipauniqueid=*,cn=entitlements,cn=etc,dc=greyoak,dc=com\")(version 3.0;acl \"Add entitlements\";allow (add) groupdn = \"ldap:///cn=addentitlements,cn=taskgroups,cn=accounts,dc=greyoak,dc=com\";)",
|
||||
"(target = \"ldap:///automountkey=*,automountmapname=*,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Add automount keys\";allow (add) groupdn = \"ldap:///cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Remove Groups\";allow (delete) groupdn = \"ldap:///cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=retrieve certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Retrieve Certificates from the CA\";allow (write) groupdn = \"ldap:///cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=revoke certificate,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Revoke Certificate\";allow (write) groupdn = \"ldap:///cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"krbPrincipalKey || krbLastPwdChange\")(target = \"ldap:///fqdn=*,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Manage host keytab\";allow (write) groupdn = \"ldap:///cn=manage_host_keytab,cn=taskgroups, cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"cn || description || gidnumber || objectclass || mepManagedBy\")(target = \"ldap:///cn=*,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify Groups\";allow (write) groupdn = \"ldap:///cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"member\")(target = \"ldap:///cn=*,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Modify host group membership\";allow (write) groupdn = \"ldap:///cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)",
|
||||
"(targetattr = \"objectClass\")(target = \"ldap:///cn=request certificate different host,cn=virtual operations,cn=etc,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\")(version 3.0;acl \"Request Certificates from a different host\";allow (write) groupdn = \"ldap:///cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com\";)"
|
||||
],
|
||||
"summary": "53 ACIs matched"
|
||||
}
|
||||
}
|
@ -12,7 +12,7 @@
|
||||
"description": [
|
||||
"/var/log/ipa mountinfogoeshere"
|
||||
],
|
||||
"dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "description=/var/log/ipa mountinfogoeshere,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automount",
|
||||
"top"
|
||||
|
@ -14,7 +14,7 @@
|
||||
"description": [
|
||||
"nfsserver:/var/log/dirsrv /var/log/dirsrv"
|
||||
],
|
||||
"dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "description=nfsserver:/var/log/dirsrv /var/log/dirsrv,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automount",
|
||||
"top"
|
||||
@ -30,7 +30,7 @@
|
||||
"description": [
|
||||
"nfsserver:/var/log/ipa /var/log/ipa"
|
||||
],
|
||||
"dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "description=nfsserver:/var/log/ipa /var/log/ipa,automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automount",
|
||||
"top"
|
||||
|
@ -20,7 +20,7 @@
|
||||
"description": [
|
||||
"/home auto.home"
|
||||
],
|
||||
"dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "description=/home auto.home,automountmapname=auto.master,cn=default,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automount",
|
||||
"top"
|
||||
|
@ -6,7 +6,7 @@
|
||||
"cn": [
|
||||
"YYZ"
|
||||
],
|
||||
"dn": "cn=yyz,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=yyz,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"nscontainer",
|
||||
"top"
|
||||
|
@ -8,25 +8,25 @@
|
||||
"cn": [
|
||||
"BOS"
|
||||
],
|
||||
"dn": "cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=bos,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"BRNO"
|
||||
],
|
||||
"dn": "cn=brno,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=brno,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=default,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"RDU"
|
||||
],
|
||||
"dn": "cn=rdu,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=rdu,cn=automount,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
|
35
install/ui/test/data/automountlocation_find_pkeys.json
Normal file
35
install/ui/test/data/automountlocation_find_pkeys.json
Normal file
@ -0,0 +1,35 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"BOS"
|
||||
],
|
||||
"dn": "cn=bos,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"BRNO"
|
||||
],
|
||||
"dn": "cn=brno,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"RDU"
|
||||
],
|
||||
"dn": "cn=rdu,cn=automount,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
53
install/ui/test/data/automountlocation_get_records.json
Normal file
53
install/ui/test/data/automountlocation_get_records.json
Normal file
@ -0,0 +1,53 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"BOS"
|
||||
],
|
||||
"dn": "cn=bos,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "BOS"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"BRNO"
|
||||
],
|
||||
"dn": "cn=brno,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "BRNO"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "default"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"RDU"
|
||||
],
|
||||
"dn": "cn=rdu,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "RDU"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -6,7 +6,7 @@
|
||||
"cn": [
|
||||
"default"
|
||||
],
|
||||
"dn": "cn=default,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=default,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "default"
|
||||
|
@ -6,7 +6,7 @@
|
||||
"automountmapname": [
|
||||
"auto.log"
|
||||
],
|
||||
"dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=auto.log,cn=mtv,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"test"
|
||||
],
|
||||
"dn": "automountmapname=test,cn=default,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=test,cn=default,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
|
@ -8,7 +8,7 @@
|
||||
"automountmapname": [
|
||||
"auto.direct"
|
||||
],
|
||||
"dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
@ -18,7 +18,7 @@
|
||||
"automountmapname": [
|
||||
"auto.home"
|
||||
],
|
||||
"dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
@ -28,7 +28,7 @@
|
||||
"automountmapname": [
|
||||
"auto.log"
|
||||
],
|
||||
"dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
@ -38,7 +38,7 @@
|
||||
"automountmapname": [
|
||||
"auto.master"
|
||||
],
|
||||
"dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
|
35
install/ui/test/data/automountmap_find_pkeys.json
Normal file
35
install/ui/test/data/automountmap_find_pkeys.json
Normal file
@ -0,0 +1,35 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"result": [
|
||||
{
|
||||
"automountmapname": [
|
||||
"auto.direct"
|
||||
],
|
||||
"dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"automountmapname": [
|
||||
"auto.home"
|
||||
],
|
||||
"dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"automountmapname": [
|
||||
"auto.log"
|
||||
],
|
||||
"dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"automountmapname": [
|
||||
"auto.master"
|
||||
],
|
||||
"dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
69
install/ui/test/data/automountmap_get_records.json
Normal file
69
install/ui/test/data/automountmap_get_records.json
Normal file
@ -0,0 +1,69 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"automountmapname": [
|
||||
"auto.direct"
|
||||
],
|
||||
"dn": "automountmapname=auto.direct,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "auto.direct"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"automountmapname": [
|
||||
"auto.home"
|
||||
],
|
||||
"dn": "automountmapname=auto.home,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "auto.home"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"automountmapname": [
|
||||
"auto.log"
|
||||
],
|
||||
"dn": "automountmapname=auto.log,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "auto.log"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"automountmapname": [
|
||||
"auto.master"
|
||||
],
|
||||
"dn": "automountmapname=auto.master,cn=bos,cn=automount,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"automountmap",
|
||||
"top"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "auto.master"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -6,7 +6,7 @@
|
||||
"automountmapname": [
|
||||
"live"
|
||||
],
|
||||
"dn": "automountmapname=live,cn=bos,cn=automount,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "automountmapname=live,cn=bos,cn=automount,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "live"
|
||||
|
@ -28,15 +28,15 @@
|
||||
"cn": [
|
||||
"ipaConfig"
|
||||
],
|
||||
"dn": "cn=ipaconfig,cn=etc,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=ipaconfig,cn=etc,dc=dev,dc=example,dc=com",
|
||||
"ipacertificatesubjectbase": [
|
||||
"O=IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
"O=DEV.EXAMPLE.COM"
|
||||
],
|
||||
"ipaconfigstring": [
|
||||
"AllowNThash"
|
||||
],
|
||||
"ipadefaultemaildomain": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"ipadefaultloginshell": [
|
||||
"/bin/sh"
|
||||
|
@ -9,9 +9,9 @@
|
||||
"attrs": [
|
||||
"cn"
|
||||
],
|
||||
"filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
|
||||
"filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)",
|
||||
"group": "muppets",
|
||||
"membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"permissions": [
|
||||
"write"
|
||||
]
|
||||
@ -21,9 +21,9 @@
|
||||
"attrs": [
|
||||
"title"
|
||||
],
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
|
||||
"group": "muppets",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"permissions": [
|
||||
"write"
|
||||
]
|
||||
|
@ -9,9 +9,9 @@
|
||||
"attrs": [
|
||||
"cn"
|
||||
],
|
||||
"filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
|
||||
"filter": "(memberOf=cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com)",
|
||||
"group": "muppets",
|
||||
"membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"membergroup": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"permissions": [
|
||||
"write"
|
||||
]
|
||||
@ -21,9 +21,9 @@
|
||||
"attrs": [
|
||||
"title"
|
||||
],
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
|
||||
"group": "muppets",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"permissions": [
|
||||
"write"
|
||||
]
|
||||
|
@ -7,9 +7,9 @@
|
||||
"attrs": [
|
||||
"title"
|
||||
],
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com)",
|
||||
"filter": "(memberOf=cn=monsters,cn=groups,cn=accounts,dc=example,dc=com)",
|
||||
"group": "muppets",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"membergroup": "cn=monsters,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"permissions": [
|
||||
"add",
|
||||
"delete"
|
||||
|
@ -1,101 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"122.168.192.in-addr.arpa"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.122.168.192.in-addr.arpa."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"127.0.0.1"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
@ -1,110 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 11,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
],
|
||||
"nsrecord": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
]
|
||||
},
|
||||
{
|
||||
"arecord": [
|
||||
"192.168.122.81"
|
||||
],
|
||||
"dn": "idnsname=ipa,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_ldap._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 389 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos"
|
||||
],
|
||||
"txtrecord": [
|
||||
"AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 ipa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"_ntp._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 123 ipa"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
@ -1,38 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.ayoung.boston.devel.redhat.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010061001"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "ayoung.boston.devel.redhat.com"
|
||||
}
|
||||
}
|
@ -6,7 +6,7 @@
|
||||
"arecord": [
|
||||
"1.2.3.4"
|
||||
],
|
||||
"dn": "idnsname=a4,idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=a4,idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"a4"
|
||||
],
|
||||
|
@ -5,102 +5,102 @@
|
||||
"count": 12,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"@"
|
||||
],
|
||||
"nsrecord": [
|
||||
"server15.ayoung.boston.devel.redhat.com."
|
||||
"dev.example.com."
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos"
|
||||
],
|
||||
"txtrecord": [
|
||||
"SERVER15.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
"DEV.EXAMPLE.COM"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 server15"
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 server15"
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 server15"
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 server15"
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 server15"
|
||||
"0 100 464 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 server15"
|
||||
"0 100 464 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ldap._tcp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ldap._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 389 server15"
|
||||
"0 100 389 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ntp._udp,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ntp._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 123 server15"
|
||||
"0 100 123 dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"aaaarecord": [
|
||||
"fec0::5054:ff:feb5:5a47"
|
||||
],
|
||||
"dn": "idnsname=server15,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"server15"
|
||||
"dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -114,7 +114,7 @@
|
||||
"1.3.5.7",
|
||||
"10.10.2.1"
|
||||
],
|
||||
"dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"testrec"
|
||||
],
|
||||
@ -122,10 +122,10 @@
|
||||
"key"
|
||||
],
|
||||
"srvrecord": [
|
||||
"1 1 80 server15"
|
||||
"1 1 80 dev"
|
||||
],
|
||||
"txtrecord": [
|
||||
"A TExt Record",
|
||||
"A Text Record",
|
||||
"Another Text Record"
|
||||
]
|
||||
}
|
||||
|
83
install/ui/test/data/dnsrecord_find_pkeys.json
Normal file
83
install/ui/test/data/dnsrecord_find_pkeys.json
Normal file
@ -0,0 +1,83 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 12,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"@"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._tcp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._udp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._tcp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._udp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._tcp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._udp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ldap._tcp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ntp._udp"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"dev"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"testrec"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
194
install/ui/test/data/dnsrecord_get_records.json
Normal file
194
install/ui/test/data/dnsrecord_get_records.json
Normal file
@ -0,0 +1,194 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 12,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"@"
|
||||
],
|
||||
"nsrecord": [
|
||||
"dev.example.com."
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "@"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kerberos,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos"
|
||||
],
|
||||
"txtrecord": [
|
||||
"DEV.EXAMPLE.COM"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kerberos"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kerberos-master._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kerberos-master._tcp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kerberos-master._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos-master._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kerberos-master._udp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kerberos._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kerberos._tcp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kerberos._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kerberos._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 88 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kerberos._udp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kpasswd._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kpasswd._tcp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_kpasswd._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_kpasswd._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 464 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_kpasswd._udp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_ldap._tcp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ldap._tcp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 389 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_ldap._tcp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=_ntp._udp,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"_ntp._udp"
|
||||
],
|
||||
"srvrecord": [
|
||||
"0 100 123 dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "_ntp._udp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"aaaarecord": [
|
||||
"fec0::5054:ff:feb5:5a47"
|
||||
],
|
||||
"dn": "idnsname=dev,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "dev"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"aaaarecord": [
|
||||
"feed:babe:beef:cafe::0001",
|
||||
"feed:babe:beef:cafe::0002",
|
||||
"feed:babe:beef:cafe::0004"
|
||||
],
|
||||
"arecord": [
|
||||
"3.4.5.6",
|
||||
"1.3.5.7",
|
||||
"10.10.2.1"
|
||||
],
|
||||
"dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"testrec"
|
||||
],
|
||||
"keyrecord": [
|
||||
"key"
|
||||
],
|
||||
"srvrecord": [
|
||||
"1 1 80 dev"
|
||||
],
|
||||
"txtrecord": [
|
||||
"A Text Record",
|
||||
"Another Text Record"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "testrec"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -48,7 +48,7 @@
|
||||
"sshfprecord": "rscwo",
|
||||
"txtrecord": "rscwo"
|
||||
},
|
||||
"dn": "idnsname=testrec,idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=testrec,idnsname=example.com,cn=dns,dc=dev,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"testrec"
|
||||
],
|
||||
@ -60,7 +60,7 @@
|
||||
"idnsrecord"
|
||||
],
|
||||
"srvrecord": [
|
||||
"1 1 80 server15"
|
||||
"1 1 80 dev"
|
||||
],
|
||||
"txtrecord": [
|
||||
"A Text Record",
|
||||
|
@ -3,12 +3,12 @@
|
||||
"id": 3,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"FALSE"
|
||||
],
|
||||
"idnsname": [
|
||||
"henson.ayoung.boston.devel.redhat.com"
|
||||
"dev.example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
@ -17,7 +17,7 @@
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
@ -26,7 +26,7 @@
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.henson.ayoung.boston.devel.redhat.com."
|
||||
"root.dev.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
@ -41,6 +41,6 @@
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "henson.ayoung.boston.devel.redhat.com"
|
||||
"value": "dev.example.com"
|
||||
}
|
||||
}
|
@ -5,12 +5,12 @@
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"TRUE"
|
||||
],
|
||||
"idnsname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
@ -19,7 +19,7 @@
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
"ipa.example.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
@ -28,19 +28,19 @@
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.ayoung.boston.devel.redhat.com."
|
||||
"root.ipa.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
],
|
||||
"idnsupdatepolicy": [
|
||||
"grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-self * A;"
|
||||
"grant EXAMPLE.COM krb5-self * A;"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
],
|
||||
"nsrecord": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
"ipa.example.com."
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
@ -49,7 +49,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"TRUE"
|
||||
],
|
||||
@ -63,7 +63,7 @@
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
"ipa.example.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
@ -78,13 +78,13 @@
|
||||
"2010021201"
|
||||
],
|
||||
"idnsupdatepolicy": [
|
||||
"grant AYOUNG.BOSTON.DEVEL.REDHAT.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
|
||||
"grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
],
|
||||
"nsrecord": [
|
||||
"ipa.ayoung.boston.devel.redhat.com."
|
||||
"ipa.example.com."
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
@ -93,12 +93,12 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"FALSE"
|
||||
],
|
||||
"idnsname": [
|
||||
"henson.ayoung.boston.devel.redhat.com"
|
||||
"dev.example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
@ -107,7 +107,7 @@
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
@ -116,7 +116,7 @@
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.henson.ayoung.boston.devel.redhat.com."
|
||||
"root.dev.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
|
29
install/ui/test/data/dnszone_find_pkeys.json
Normal file
29
install/ui/test/data/dnszone_find_pkeys.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"example.com"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"122.168.192.in-addr.arpa"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsname": [
|
||||
"dev.example.com"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
150
install/ui/test/data/dnszone_get_records.json
Normal file
150
install/ui/test/data/dnszone_get_records.json
Normal file
@ -0,0 +1,150 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"TRUE"
|
||||
],
|
||||
"idnsname": [
|
||||
"example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.example.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.ipa.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
],
|
||||
"idnsupdatepolicy": [
|
||||
"grant EXAMPLE.COM krb5-self * A;"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
],
|
||||
"nsrecord": [
|
||||
"ipa.example.com."
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
"idnsrecord",
|
||||
"idnszone"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "example.com"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=122.168.192.in-addr.arpa,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"TRUE"
|
||||
],
|
||||
"idnsname": [
|
||||
"122.168.192.in-addr.arpa"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ipa.example.com."
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.122.168.192.in-addr.arpa."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
],
|
||||
"idnsupdatepolicy": [
|
||||
"grant EXAMPLE.COM krb5-subdomain 122.168.192.in-addr.arpa. PTR;"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
],
|
||||
"nsrecord": [
|
||||
"ipa.example.com."
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
"idnsrecord",
|
||||
"idnszone"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "122.168.192.in-addr.arpa"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"FALSE"
|
||||
],
|
||||
"idnsname": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
],
|
||||
"idnssoaminimum": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"example.com"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
],
|
||||
"idnssoaretry": [
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.dev.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
],
|
||||
"idnszoneactive": [
|
||||
"TRUE"
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
"idnsrecord",
|
||||
"idnszone"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "dev.example.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -47,12 +47,12 @@
|
||||
"sshfprecord": "rscwo",
|
||||
"txtrecord": "rscwo"
|
||||
},
|
||||
"dn": "idnsname=henson.ayoung.boston.devel.redhat.com,cn=dns,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "idnsname=dev.example.com,cn=dns,dc=example,dc=com",
|
||||
"idnsallowdynupdate": [
|
||||
"FALSE"
|
||||
],
|
||||
"idnsname": [
|
||||
"henson.ayoung.boston.devel.redhat.com"
|
||||
"dev.example.com"
|
||||
],
|
||||
"idnssoaexpire": [
|
||||
"1209600"
|
||||
@ -61,7 +61,7 @@
|
||||
"3600"
|
||||
],
|
||||
"idnssoamname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"idnssoarefresh": [
|
||||
"3600"
|
||||
@ -70,7 +70,7 @@
|
||||
"900"
|
||||
],
|
||||
"idnssoarname": [
|
||||
"root.henson.ayoung.boston.devel.redhat.com."
|
||||
"root.dev.example.com."
|
||||
],
|
||||
"idnssoaserial": [
|
||||
"2010021201"
|
||||
@ -85,6 +85,6 @@
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "henson.ayoung.boston.devel.redhat.com"
|
||||
"value": "dev.example.com"
|
||||
}
|
||||
}
|
@ -5,7 +5,7 @@
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com",
|
||||
"ipaentitlementid": [
|
||||
"IMPORTED"
|
||||
],
|
||||
|
@ -5,7 +5,7 @@
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "ipaentitlementid=b788ccee-4b09-48f0-8a9a-2c769f7b41e0,cn=entitlements,cn=etc,dc=example,dc=com",
|
||||
"ipaentitlementid": [
|
||||
"b788ccee-4b09-48f0-8a9a-2c769f7b41e0"
|
||||
],
|
||||
|
@ -3,7 +3,7 @@
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "ipaentitlementid=cf9d9755-7445-438c-a40c-23b1c60e1f9b,cn=entitlements,cn=etc,dc=example,dc=com",
|
||||
"ipaentitlementid": [
|
||||
"cf9d9755-7445-438c-a40c-23b1c60e1f9b"
|
||||
],
|
||||
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"The People in Your Neighborhood"
|
||||
],
|
||||
"dn": "cn=neighbors,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=neighbors,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"123456"
|
||||
],
|
||||
|
@ -16,7 +16,7 @@
|
||||
"description": [
|
||||
"testgroup"
|
||||
],
|
||||
"dn": "cn=testgroup,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=testgroup,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"member_user": [
|
||||
"kfrog"
|
||||
]
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description": [
|
||||
"Account administrators group"
|
||||
],
|
||||
"dn": "cn=admins,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800000"
|
||||
],
|
||||
@ -26,7 +26,7 @@
|
||||
"description": [
|
||||
"Default group for all users"
|
||||
],
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800001"
|
||||
],
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
"Limited admins who can edit other users"
|
||||
],
|
||||
"dn": "cn=editors,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800002"
|
||||
]
|
||||
@ -58,7 +58,7 @@
|
||||
"description": [
|
||||
"Monsters on Sesame Street"
|
||||
],
|
||||
"dn": "cn=monsters,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800009"
|
||||
]
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
"Muppets moonlighting for CTW"
|
||||
],
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800010"
|
||||
]
|
||||
|
41
install/ui/test/data/group_find_pkeys.json
Normal file
41
install/ui/test/data/group_find_pkeys.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 2,
|
||||
"result": {
|
||||
"count": 5,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"admins"
|
||||
],
|
||||
"dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"ipausers"
|
||||
],
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"editors"
|
||||
],
|
||||
"dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"monsters"
|
||||
],
|
||||
"dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"muppets"
|
||||
],
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "5 groups matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
105
install/ui/test/data/group_get_records.json
Normal file
105
install/ui/test/data/group_get_records.json
Normal file
@ -0,0 +1,105 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 2,
|
||||
"result": {
|
||||
"count": 5,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"admins"
|
||||
],
|
||||
"description": [
|
||||
"Account administrators group"
|
||||
],
|
||||
"dn": "cn=admins,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800000"
|
||||
],
|
||||
"member_user": [
|
||||
"admin"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "admins"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"ipausers"
|
||||
],
|
||||
"description": [
|
||||
"Default group for all users"
|
||||
],
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800001"
|
||||
],
|
||||
"member_user": [
|
||||
"kfrog",
|
||||
"count123",
|
||||
"scram",
|
||||
"elmo",
|
||||
"zoe",
|
||||
"pdawn"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "ipausers"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"editors"
|
||||
],
|
||||
"description": [
|
||||
"Limited admins who can edit other users"
|
||||
],
|
||||
"dn": "cn=editors,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800002"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "editors"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"monsters"
|
||||
],
|
||||
"description": [
|
||||
"Monsters on Sesame Street"
|
||||
],
|
||||
"dn": "cn=monsters,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800009"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "monsters"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"muppets"
|
||||
],
|
||||
"description": [
|
||||
"Muppets moonlighting for CTW"
|
||||
],
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1420800010"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "muppets"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -16,7 +16,7 @@
|
||||
"description": [
|
||||
"Muppets moonlighting for CTW"
|
||||
],
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=muppets,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1950316043"
|
||||
],
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"id": null,
|
||||
"result": {
|
||||
"result": {
|
||||
"cn": [
|
||||
@ -9,27 +9,261 @@
|
||||
"description": [
|
||||
"Default group for all users"
|
||||
],
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "cn=ipausers,cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"gidnumber": [
|
||||
"1079249048"
|
||||
],
|
||||
"member": [
|
||||
"uid=gsmile,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"uid=kfrog,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"uid=count123,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
|
||||
"1576000001"
|
||||
],
|
||||
"member_user": [
|
||||
"gsmile",
|
||||
"kfrog",
|
||||
"count123"
|
||||
"dmontes",
|
||||
"sroberson",
|
||||
"vmendoza",
|
||||
"mvang",
|
||||
"arhodes",
|
||||
"ngutierrez",
|
||||
"lbaldwin",
|
||||
"uevans",
|
||||
"fwolfe",
|
||||
"mdyer",
|
||||
"ibeard",
|
||||
"lduran",
|
||||
"cmcintosh",
|
||||
"nmartinez",
|
||||
"sshepherd",
|
||||
"tosborn",
|
||||
"mcarney",
|
||||
"scohen",
|
||||
"jbuckley",
|
||||
"jgould",
|
||||
"ewatkins",
|
||||
"abradley",
|
||||
"lhall",
|
||||
"dkelly",
|
||||
"drosario",
|
||||
"jpreston",
|
||||
"mjefferson",
|
||||
"jwu",
|
||||
"marcher",
|
||||
"rhale",
|
||||
"jmckee",
|
||||
"cduffy",
|
||||
"adaniels",
|
||||
"acarlson",
|
||||
"wryan",
|
||||
"mclay",
|
||||
"mgates",
|
||||
"jmccann",
|
||||
"mvaughan",
|
||||
"grobles",
|
||||
"llarson",
|
||||
"mbailey",
|
||||
"dbriggs",
|
||||
"ekane",
|
||||
"bgross",
|
||||
"smcclure",
|
||||
"mkrause",
|
||||
"sparrish",
|
||||
"bmcgee",
|
||||
"kfisher",
|
||||
"mestes",
|
||||
"mlong",
|
||||
"aromero",
|
||||
"agordon",
|
||||
"vgriffin",
|
||||
"chartman",
|
||||
"lcohen",
|
||||
"fstrong",
|
||||
"lgross",
|
||||
"kmills",
|
||||
"mbutler",
|
||||
"jmaynard",
|
||||
"jmccarty",
|
||||
"jburch",
|
||||
"kreyes",
|
||||
"ckramer",
|
||||
"chuynh",
|
||||
"bbauer",
|
||||
"ipotts",
|
||||
"ldennis",
|
||||
"kgonzalez",
|
||||
"mtravis",
|
||||
"tcase",
|
||||
"groman",
|
||||
"tburch",
|
||||
"dmyers",
|
||||
"rcannon",
|
||||
"apeterson",
|
||||
"lbarnett",
|
||||
"eclay",
|
||||
"lstevenson",
|
||||
"lnewman",
|
||||
"crobles",
|
||||
"sbarron",
|
||||
"smcfarland",
|
||||
"sknapp",
|
||||
"ghouse",
|
||||
"lgeorge",
|
||||
"swoodard",
|
||||
"dphillips",
|
||||
"candrade",
|
||||
"jmcfarland",
|
||||
"ccarson",
|
||||
"cgreer",
|
||||
"khuerta",
|
||||
"dblevins",
|
||||
"bswanson",
|
||||
"chickman",
|
||||
"rcarrillo",
|
||||
"jkaufman",
|
||||
"kshaw",
|
||||
"gowen",
|
||||
"rcontreras",
|
||||
"cmccullough",
|
||||
"krivera",
|
||||
"jbarron",
|
||||
"sbradford",
|
||||
"lwilson",
|
||||
"jvelez",
|
||||
"dlopez",
|
||||
"lgibbs",
|
||||
"jsnow",
|
||||
"sklein",
|
||||
"lsharp",
|
||||
"mcameron",
|
||||
"flam",
|
||||
"nparker",
|
||||
"lhogan",
|
||||
"lmorrison",
|
||||
"bnewton",
|
||||
"athompson",
|
||||
"jsanford",
|
||||
"rcohen",
|
||||
"cmelendez",
|
||||
"yjacobs",
|
||||
"mmcintyre",
|
||||
"dhood",
|
||||
"mescobar",
|
||||
"mvilla",
|
||||
"dshort",
|
||||
"okennedy",
|
||||
"cvillarreal",
|
||||
"skane",
|
||||
"vreyes",
|
||||
"lrobinson",
|
||||
"mbright",
|
||||
"eriley",
|
||||
"ehunt",
|
||||
"ctrujillo",
|
||||
"hrichard",
|
||||
"sserrano",
|
||||
"nramirez",
|
||||
"zschneider",
|
||||
"mtanner",
|
||||
"hcalderon",
|
||||
"sroy",
|
||||
"mblevins",
|
||||
"rhampton",
|
||||
"kpeters",
|
||||
"gmoody",
|
||||
"kgraham",
|
||||
"lpacheco",
|
||||
"swalter",
|
||||
"aortega",
|
||||
"spruitt",
|
||||
"lchandler",
|
||||
"wnichols",
|
||||
"eberry",
|
||||
"kzhang",
|
||||
"cheath",
|
||||
"tproctor",
|
||||
"vgill",
|
||||
"ageorge",
|
||||
"cwiggins",
|
||||
"clloyd",
|
||||
"mrichardson",
|
||||
"bblair",
|
||||
"mdonovan",
|
||||
"dmoses",
|
||||
"jkhan",
|
||||
"mcrane",
|
||||
"gmcintosh",
|
||||
"wweaver",
|
||||
"abarrett",
|
||||
"pcarroll",
|
||||
"twebster",
|
||||
"omcdonald",
|
||||
"bwolfe",
|
||||
"aortiz",
|
||||
"dbean",
|
||||
"hpittman",
|
||||
"bpage",
|
||||
"jmullen",
|
||||
"lcabrera",
|
||||
"mbray",
|
||||
"kpatterson",
|
||||
"lwalters",
|
||||
"ljennings",
|
||||
"mrowland",
|
||||
"srich",
|
||||
"jvilla",
|
||||
"jzavala",
|
||||
"avaldez",
|
||||
"ehayes",
|
||||
"jjoyce",
|
||||
"scastaneda",
|
||||
"mwoodard",
|
||||
"cbarrera",
|
||||
"aobrien",
|
||||
"jvillanueva",
|
||||
"jhowe",
|
||||
"cstout",
|
||||
"mwhitehead",
|
||||
"ajennings",
|
||||
"dfrye",
|
||||
"bbarber",
|
||||
"twilson",
|
||||
"kfernandez",
|
||||
"eherrera",
|
||||
"dyoung",
|
||||
"pjohnston",
|
||||
"jbean",
|
||||
"ldawson",
|
||||
"kwood",
|
||||
"tcrane",
|
||||
"rwelch",
|
||||
"wholmes",
|
||||
"cchristian",
|
||||
"ffrazier",
|
||||
"bmullins",
|
||||
"tduarte",
|
||||
"elawrence",
|
||||
"rgregory",
|
||||
"ssteele",
|
||||
"ktravis",
|
||||
"llee",
|
||||
"sorr",
|
||||
"bbush",
|
||||
"ublake",
|
||||
"kjohnson",
|
||||
"vcannon",
|
||||
"mandrade",
|
||||
"emeyer",
|
||||
"hpeck",
|
||||
"ssantana",
|
||||
"lluna",
|
||||
"fneal",
|
||||
"lswanson",
|
||||
"rlynch",
|
||||
"pcarpenter",
|
||||
"cblackwell",
|
||||
"sfrost",
|
||||
"cconner",
|
||||
"stanner",
|
||||
"opayne",
|
||||
"jriggs",
|
||||
"jhuynh"
|
||||
],
|
||||
"memberof": [],
|
||||
"objectclass": [
|
||||
"top",
|
||||
"groupofnames",
|
||||
"nestedgroup",
|
||||
"ipausergroup",
|
||||
"posixgroup"
|
||||
"memberof_group": [
|
||||
"editors"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
|
@ -14,7 +14,7 @@
|
||||
"description": [
|
||||
"Allow all users to access any host from any host"
|
||||
],
|
||||
"dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=server15,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com",
|
||||
"hostcategory": [
|
||||
"all"
|
||||
],
|
||||
|
17
install/ui/test/data/hbacrule_find_pkeys.json
Normal file
17
install/ui/test/data/hbacrule_find_pkeys.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"allow_all"
|
||||
],
|
||||
"dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "1 HBAC rule matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
41
install/ui/test/data/hbacrule_get_records.json
Normal file
41
install/ui/test/data/hbacrule_get_records.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"accessruletype": [
|
||||
"allow"
|
||||
],
|
||||
"cn": [
|
||||
"allow_all"
|
||||
],
|
||||
"description": [
|
||||
"Allow all users to access any host from any host"
|
||||
],
|
||||
"dn": "ipauniqueid=ca842a42-a445-11e0-87ff-525400b55a47,cn=hbac,dc=dev,dc=example,dc=com",
|
||||
"hostcategory": [
|
||||
"all"
|
||||
],
|
||||
"ipaenabledflag": [
|
||||
"TRUE"
|
||||
],
|
||||
"servicecategory": [
|
||||
"all"
|
||||
],
|
||||
"sourcehostcategory": [
|
||||
"all"
|
||||
],
|
||||
"usercategory": [
|
||||
"all"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "allow_all"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
71
install/ui/test/data/hbacsvc_find_pkeys.json
Normal file
71
install/ui/test/data/hbacsvc_find_pkeys.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 10,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"sshd"
|
||||
],
|
||||
"dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"ftp"
|
||||
],
|
||||
"dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"su"
|
||||
],
|
||||
"dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"login"
|
||||
],
|
||||
"dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"su-l"
|
||||
],
|
||||
"dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"sudo"
|
||||
],
|
||||
"dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"sudo-i"
|
||||
],
|
||||
"dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"gdm"
|
||||
],
|
||||
"dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"gdm-password"
|
||||
],
|
||||
"dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"kdm"
|
||||
],
|
||||
"dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
149
install/ui/test/data/hbacsvc_get_records.json
Normal file
149
install/ui/test/data/hbacsvc_get_records.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 10,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"sshd"
|
||||
],
|
||||
"description": [
|
||||
"sshd"
|
||||
],
|
||||
"dn": "cn=sshd,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "sshd"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"ftp"
|
||||
],
|
||||
"description": [
|
||||
"ftp"
|
||||
],
|
||||
"dn": "cn=ftp,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "ftp"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"su"
|
||||
],
|
||||
"description": [
|
||||
"su"
|
||||
],
|
||||
"dn": "cn=su,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "su"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"login"
|
||||
],
|
||||
"description": [
|
||||
"login"
|
||||
],
|
||||
"dn": "cn=login,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "login"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"su-l"
|
||||
],
|
||||
"description": [
|
||||
"su with login shell"
|
||||
],
|
||||
"dn": "cn=su-l,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "su-l"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"sudo"
|
||||
],
|
||||
"description": [
|
||||
"sudo"
|
||||
],
|
||||
"dn": "cn=sudo,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "sudo"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"sudo-i"
|
||||
],
|
||||
"description": [
|
||||
"sudo-i"
|
||||
],
|
||||
"dn": "cn=sudo-i,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "sudo-i"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"gdm"
|
||||
],
|
||||
"description": [
|
||||
"gdm"
|
||||
],
|
||||
"dn": "cn=gdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "gdm"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"gdm-password"
|
||||
],
|
||||
"description": [
|
||||
"gdm-password"
|
||||
],
|
||||
"dn": "cn=gdm-password,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "gdm-password"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"kdm"
|
||||
],
|
||||
"description": [
|
||||
"kdm"
|
||||
],
|
||||
"dn": "cn=kdm,cn=hbacservices,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "kdm"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
17
install/ui/test/data/hbacsvcgroup_find_pkeys.json
Normal file
17
install/ui/test/data/hbacsvcgroup_find_pkeys.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"Sudo"
|
||||
],
|
||||
"dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "1 group matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
27
install/ui/test/data/hbacsvcgroup_get_records.json
Normal file
27
install/ui/test/data/hbacsvcgroup_get_records.json
Normal file
@ -0,0 +1,27 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"Sudo"
|
||||
],
|
||||
"description": [
|
||||
"Default group of Sudo related services"
|
||||
],
|
||||
"dn": "cn=sudo,cn=hbacservicegroups,cn=hbac,dc=dev,dc=example,dc=com",
|
||||
"member_hbacsvc": [
|
||||
"sudo",
|
||||
"sudo-i"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "Sudo"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -6,7 +6,7 @@
|
||||
"cn": [
|
||||
"www.pbs.org"
|
||||
],
|
||||
"dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com",
|
||||
"fqdn": [
|
||||
"www.pbs.org"
|
||||
],
|
||||
@ -15,10 +15,10 @@
|
||||
"3ad2e63d-b43a-11df-8dd1-525400674dcd"
|
||||
],
|
||||
"krbprincipalname": [
|
||||
"host/www.pbs.org@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
"host/www.pbs.org@EXAMPLE.COM"
|
||||
],
|
||||
"managedby": [
|
||||
"fqdn=www.pbs.org,cn=computers,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"fqdn=www.pbs.org,cn=computers,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"objectclass": [
|
||||
"ipaobject",
|
||||
|
23
install/ui/test/data/host_find_pkeys.json
Normal file
23
install/ui/test/data/host_find_pkeys.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"result": [
|
||||
{
|
||||
"dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com",
|
||||
"fqdn": [
|
||||
"dev.example.com"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com",
|
||||
"fqdn": [
|
||||
"test.example.com"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": "2 hosts matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
112
install/ui/test/data/host_get_records.json
Normal file
112
install/ui/test/data/host_get_records.json
Normal file
@ -0,0 +1,112 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": null,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"dn": "fqdn=dev.example.com,cn=computers,cn=accounts,dc=example,dc=com",
|
||||
"enrolledby_user": [
|
||||
"admin"
|
||||
],
|
||||
"fqdn": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"has_keytab": true,
|
||||
"has_password": false,
|
||||
"ipauniqueid": [
|
||||
"d2c1f41c-ff41-11e0-bde8-525400e135d8"
|
||||
],
|
||||
"krbextradata": [
|
||||
{
|
||||
"__base64__": "AAIIEqdOaG9zdC9kZXYuZXhhbXBsZS5jb21ASURNLkxBQi5CT1MuUkVESEFULkNPTQA="
|
||||
}
|
||||
],
|
||||
"krblastpwdchange": [
|
||||
"20111025194616Z"
|
||||
],
|
||||
"krbprincipalname": [
|
||||
"host/dev.example.com@EXAMPLE.COM"
|
||||
],
|
||||
"managedby_host": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"managing_host": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"objectclass": [
|
||||
"ipaobject",
|
||||
"nshost",
|
||||
"ipahost",
|
||||
"pkiuser",
|
||||
"ipaservice",
|
||||
"krbprincipalaux",
|
||||
"krbprincipal",
|
||||
"top"
|
||||
],
|
||||
"serverhostname": [
|
||||
"dev"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "dev.example.com"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"test.example.com"
|
||||
],
|
||||
"dn": "fqdn=test.example.com,cn=computers,cn=accounts,dc=example,dc=com",
|
||||
"enrolledby_user": [
|
||||
"admin"
|
||||
],
|
||||
"fqdn": [
|
||||
"test.example.com"
|
||||
],
|
||||
"has_keytab": false,
|
||||
"has_password": false,
|
||||
"ipauniqueid": [
|
||||
"d5d1400e-ff41-11e0-9a21-525400e135d8"
|
||||
],
|
||||
"krbextradata": [
|
||||
{
|
||||
"__base64__": "AAIiEqdOaG9zdC90ZXN0LmV4YW1wbGUuY29tQElETS5MQUIuQk9TLlJFREhBVC5DT00A"
|
||||
}
|
||||
],
|
||||
"krbprincipalname": [
|
||||
"host/test.example.com@EXAMPLE.COM"
|
||||
],
|
||||
"managedby_host": [
|
||||
"test.example.com"
|
||||
],
|
||||
"managing_host": [
|
||||
"test.example.com"
|
||||
],
|
||||
"objectclass": [
|
||||
"ipaobject",
|
||||
"nshost",
|
||||
"ipahost",
|
||||
"pkiuser",
|
||||
"ipaservice",
|
||||
"krbprincipalaux",
|
||||
"krbprincipal",
|
||||
"top"
|
||||
],
|
||||
"serverhostname": [
|
||||
"test"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "test.example.com"
|
||||
}
|
||||
],
|
||||
"summary": "2 hosts matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"Special Guest Stars"
|
||||
],
|
||||
"dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=guest_hosts,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"ipauniqueid": [
|
||||
"7f8c57ae-b43a-11df-8016-525400674dcd"
|
||||
],
|
||||
|
@ -16,7 +16,7 @@
|
||||
"description": [
|
||||
"Live servers"
|
||||
],
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"ipauniqueid": [
|
||||
"1ba89342-b683-11df-8d5b-525400674dcd"
|
||||
],
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description": [
|
||||
"Live servers"
|
||||
],
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"member": [],
|
||||
"memberof": []
|
||||
},
|
||||
@ -22,7 +22,7 @@
|
||||
"description": [
|
||||
"Staging servers"
|
||||
],
|
||||
"dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"member": [],
|
||||
"memberof": []
|
||||
}
|
||||
|
23
install/ui/test/data/hostgroup_find_pkeys.json
Normal file
23
install/ui/test/data/hostgroup_find_pkeys.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"host-live"
|
||||
],
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"stage-live"
|
||||
],
|
||||
"dn": "cn=stage-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "2 hostgroups matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
41
install/ui/test/data/hostgroup_get_records.json
Normal file
41
install/ui/test/data/hostgroup_get_records.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"host-live"
|
||||
],
|
||||
"description": [
|
||||
"Live servers"
|
||||
],
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"member": [],
|
||||
"memberof": []
|
||||
},
|
||||
"summary": null,
|
||||
"value": "host-live"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"host-stage"
|
||||
],
|
||||
"description": [
|
||||
"Staging servers"
|
||||
],
|
||||
"dn": "cn=host-stage,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"member": [],
|
||||
"memberof": []
|
||||
},
|
||||
"summary": null,
|
||||
"value": "host-stage"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"Live servers"
|
||||
],
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com",
|
||||
"member_host": [
|
||||
"live3.pbs.org",
|
||||
"live2.pbs.org",
|
||||
|
@ -382,7 +382,7 @@
|
||||
"cn": [
|
||||
"Administrator"
|
||||
],
|
||||
"dn": "uid=admin,cn=users,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "uid=admin,cn=users,cn=accounts,dc=example,dc=com",
|
||||
"gecos": [
|
||||
"Administrator"
|
||||
],
|
||||
@ -415,7 +415,7 @@
|
||||
"20111212052109Z"
|
||||
],
|
||||
"krbprincipalname": [
|
||||
"admin@IDM.LAB.BOS.REDHAT.COM"
|
||||
"admin@EXAMPLE.COM"
|
||||
],
|
||||
"loginshell": [
|
||||
"/bin/bash"
|
||||
@ -451,13 +451,13 @@
|
||||
"count": 72,
|
||||
"error": null,
|
||||
"result": {
|
||||
"basedn": "dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"basedn": "dc=example,dc=com",
|
||||
"bin": "/var/www",
|
||||
"ca_agent_install_port": 9443,
|
||||
"ca_agent_port": 443,
|
||||
"ca_ee_install_port": 9444,
|
||||
"ca_ee_port": 443,
|
||||
"ca_host": "edewata-f15.idm.lab.bos.redhat.com",
|
||||
"ca_host": "dev.example.com",
|
||||
"ca_install_port": 9180,
|
||||
"ca_port": 80,
|
||||
"conf": "/etc/ipa/server.conf",
|
||||
@ -493,17 +493,17 @@
|
||||
"container_virtual": "cn=virtual operations,cn=etc",
|
||||
"context": "server",
|
||||
"debug": false,
|
||||
"domain": "idm.lab.bos.redhat.com",
|
||||
"domain": "example.com",
|
||||
"dot_ipa": "/var/www/.ipa",
|
||||
"enable_ra": true,
|
||||
"fallback": true,
|
||||
"home": "/var/www",
|
||||
"host": "edewata-f15.idm.lab.bos.redhat.com",
|
||||
"host": "dev.example.com",
|
||||
"in_server": true,
|
||||
"in_tree": false,
|
||||
"interactive": true,
|
||||
"ipalib": "/usr/lib/python2.7/site-packages/ipalib",
|
||||
"ldap_uri": "ldapi://%2fvar%2frun%2fslapd-IDM-LAB-BOS-REDHAT-COM.socket",
|
||||
"ldap_uri": "ldapi://%2fvar%2frun%2fslapd-EXAMPLE-COM.socket",
|
||||
"log": null,
|
||||
"logdir": "/var/log/ipa",
|
||||
"mode": "production",
|
||||
@ -512,7 +512,7 @@
|
||||
"mount_xmlserver": "xml",
|
||||
"prompt_all": false,
|
||||
"ra_plugin": "selfsign",
|
||||
"realm": "IDM.LAB.BOS.REDHAT.COM",
|
||||
"realm": "EXAMPLE.COM",
|
||||
"rpc_json_uri": "http://localhost:8888/ipa/json",
|
||||
"script": "/var/www/mod_wsgi",
|
||||
"site_packages": "/usr/lib/python2.7/site-packages",
|
||||
@ -522,7 +522,7 @@
|
||||
"wait_for_attr": false,
|
||||
"webui_assets_dir": null,
|
||||
"webui_prod": true,
|
||||
"xmlrpc_uri": "https://edewata-f15.idm.lab.bos.redhat.com/ipa/xml"
|
||||
"xmlrpc_uri": "https://dev.example.com/ipa/xml"
|
||||
},
|
||||
"summary": "72 variables",
|
||||
"total": 72
|
||||
|
@ -4542,7 +4542,7 @@
|
||||
"aciattrs": [],
|
||||
"attribute_members": {},
|
||||
"bindable": false,
|
||||
"container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos",
|
||||
"container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos",
|
||||
"default_attributes": [
|
||||
"krbmaxticketlife",
|
||||
"krbmaxrenewableage"
|
||||
@ -5418,7 +5418,7 @@
|
||||
],
|
||||
"attribute_members": {},
|
||||
"bindable": false,
|
||||
"container_dn": "cn=VM-021.IDM.LAB.BOS.REDHAT.COM,cn=kerberos",
|
||||
"container_dn": "cn=DEV.EXAMPLE.COM,cn=kerberos",
|
||||
"default_attributes": [
|
||||
"cn",
|
||||
"cospriority",
|
||||
|
@ -27,9 +27,9 @@
|
||||
"objectclass": "rscwo"
|
||||
},
|
||||
"cn": [
|
||||
"IPA14.AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
"DEV.EXAMPLE.COM"
|
||||
],
|
||||
"dn": "cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com",
|
||||
"krbdefaultencsalttypes": [
|
||||
"aes256-cts:special",
|
||||
"aes128-cts:special",
|
||||
@ -46,7 +46,7 @@
|
||||
"2"
|
||||
],
|
||||
"krbsubtrees": [
|
||||
"dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dc=dev,dc=example,dc=com"
|
||||
],
|
||||
"krbsupportedencsalttypes": [
|
||||
"aes256-cts:normal",
|
||||
|
@ -9,12 +9,12 @@
|
||||
"description": [
|
||||
"Butterfly Networks"
|
||||
],
|
||||
"dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=b16f7240-b43a-11df-89fa-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"ipauniqueid": [
|
||||
"b16f7240-b43a-11df-89fa-525400674dcd"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
],
|
||||
"objectclass": [
|
||||
"ipaobject",
|
||||
|
@ -20,7 +20,7 @@
|
||||
"description": [
|
||||
"live servers"
|
||||
],
|
||||
"dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost_host": [
|
||||
"live3.pbs.org",
|
||||
"live2.pbs.org",
|
||||
@ -33,7 +33,7 @@
|
||||
"muppets"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -11,17 +11,17 @@
|
||||
"description": [
|
||||
"staging servers"
|
||||
],
|
||||
"dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost": [],
|
||||
"memberof": [],
|
||||
"memberuser": [
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberuser_group": [
|
||||
"muppets"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"idm.lab.bos.redhat.com"
|
||||
"example.com"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -31,22 +31,22 @@
|
||||
"description": [
|
||||
"live servers"
|
||||
],
|
||||
"dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost": [
|
||||
"cn=host-live,cn=hostgroups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
|
||||
"cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberhost_hostgroup": [
|
||||
"host-live"
|
||||
],
|
||||
"memberof": [],
|
||||
"memberuser": [
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=idm,dc=lab,dc=bos,dc=redhat,dc=com"
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberuser_group": [
|
||||
"muppets"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"idm.lab.bos.redhat.com"
|
||||
"example.com"
|
||||
]
|
||||
}
|
||||
],
|
||||
|
23
install/ui/test/data/netgroup_find_pkeys.json
Normal file
23
install/ui/test/data/netgroup_find_pkeys.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"net-stage"
|
||||
],
|
||||
"dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"net-live"
|
||||
],
|
||||
"dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
64
install/ui/test/data/netgroup_get_records.json
Normal file
64
install/ui/test/data/netgroup_get_records.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"net-stage"
|
||||
],
|
||||
"description": [
|
||||
"staging servers"
|
||||
],
|
||||
"dn": "ipauniqueid=f6ee9f40-9456-11df-973b-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost": [],
|
||||
"memberof": [],
|
||||
"memberuser": [
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberuser_group": [
|
||||
"muppets"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"example.com"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "net-stage"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"net-live"
|
||||
],
|
||||
"description": [
|
||||
"live servers"
|
||||
],
|
||||
"dn": "ipauniqueid=f763e426-9456-11df-934d-00163e26b89e,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost": [
|
||||
"cn=host-live,cn=hostgroups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberhost_hostgroup": [
|
||||
"host-live"
|
||||
],
|
||||
"memberof": [],
|
||||
"memberuser": [
|
||||
"cn=muppets,cn=groups,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberuser_group": [
|
||||
"muppets"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"example.com"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "net-live"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"live servers"
|
||||
],
|
||||
"dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "ipauniqueid=2e08b2c2-baac-11df-a0cf-525400674dcd,cn=ng,cn=alt,dc=example,dc=com",
|
||||
"memberhost_host": [
|
||||
"live3.pbs.org",
|
||||
"live2.pbs.org",
|
||||
@ -29,7 +29,7 @@
|
||||
"count123"
|
||||
],
|
||||
"nisdomainname": [
|
||||
"ayoung.boston.devel.redhat.com"
|
||||
"example.com"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
|
@ -9,7 +9,7 @@
|
||||
"description": [
|
||||
"description"
|
||||
],
|
||||
"dn": "cn=testperm,cn=permissions,cn=pbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=testperm,cn=permissions,cn=pbac,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"top"
|
||||
|
35
install/ui/test/data/permission_find_pkeys.json
Normal file
35
install/ui/test/data/permission_find_pkeys.json
Normal file
@ -0,0 +1,35 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"filter"
|
||||
],
|
||||
"dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"subtree"
|
||||
],
|
||||
"dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"targetgroup"
|
||||
],
|
||||
"dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"type"
|
||||
],
|
||||
"dn": "cn=type,cn=permissions,cn=pbac,dc=ipa"
|
||||
}
|
||||
],
|
||||
"summary": "4 permissions matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
101
install/ui/test/data/permission_get_records.json
Normal file
101
install/ui/test/data/permission_get_records.json
Normal file
@ -0,0 +1,101 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 4,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"filter"
|
||||
],
|
||||
"description": [
|
||||
"Filter Permission"
|
||||
],
|
||||
"dn": "cn=filter,cn=permissions,cn=pbac,dc=ipa",
|
||||
"filter": "(ou=Engineering)",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"top"
|
||||
],
|
||||
"permissions": [
|
||||
"write"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "filter"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"subtree"
|
||||
],
|
||||
"description": [
|
||||
"Subtree Permission"
|
||||
],
|
||||
"dn": "cn=subtree,cn=permissions,cn=pbac,dc=ipa",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"top"
|
||||
],
|
||||
"permissions": [
|
||||
"write"
|
||||
],
|
||||
"subtree": "ldap:///dc=ipa"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "subtree"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"targetgroup"
|
||||
],
|
||||
"description": [
|
||||
"Target Group Permission"
|
||||
],
|
||||
"dn": "cn=targetgroup,cn=permissions,cn=pbac,dc=ipa",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"top"
|
||||
],
|
||||
"permissions": [
|
||||
"write"
|
||||
],
|
||||
"targetgroup": "ipausers"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "targetgroup"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"attrs": [
|
||||
"cn",
|
||||
"description"
|
||||
],
|
||||
"cn": [
|
||||
"type"
|
||||
],
|
||||
"description": [
|
||||
"Type Permission"
|
||||
],
|
||||
"dn": "cn=type,cn=permissions,cn=pbac,dc=ipa",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"top"
|
||||
],
|
||||
"permissions": [
|
||||
"write"
|
||||
],
|
||||
"type": "user"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "type"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -27,9 +27,9 @@
|
||||
"description": [
|
||||
"Test Permission"
|
||||
],
|
||||
"dn": "cn=test,cn=permissions,cn=hbac,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=test,cn=permissions,cn=hbac,dc=example,dc=com",
|
||||
"member": [
|
||||
"cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description": [
|
||||
"User Administrators"
|
||||
],
|
||||
"dn": "cn=useradmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addusers",
|
||||
"change_password",
|
||||
@ -27,7 +27,7 @@
|
||||
"description": [
|
||||
"Group Administrators"
|
||||
],
|
||||
"dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addgroups",
|
||||
"removegroups",
|
||||
@ -42,7 +42,7 @@
|
||||
"description": [
|
||||
"Host Administrators"
|
||||
],
|
||||
"dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addhosts",
|
||||
"removehosts",
|
||||
@ -58,7 +58,7 @@
|
||||
"description": [
|
||||
"Host Group Administrators"
|
||||
],
|
||||
"dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addhostgroups",
|
||||
"removehostgroups",
|
||||
@ -73,7 +73,7 @@
|
||||
"description": [
|
||||
"Role administration"
|
||||
],
|
||||
"dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addroles",
|
||||
"removeroles",
|
||||
@ -89,7 +89,7 @@
|
||||
"description": [
|
||||
"Service Administrators"
|
||||
],
|
||||
"dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addservices",
|
||||
"removeservices",
|
||||
@ -104,7 +104,7 @@
|
||||
"description": [
|
||||
"Automount Administrators"
|
||||
],
|
||||
"dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addautomountmaps",
|
||||
"removeautomountmaps",
|
||||
@ -119,7 +119,7 @@
|
||||
"description": [
|
||||
"Netgroups Administrators"
|
||||
],
|
||||
"dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addnetgroups",
|
||||
"removenetgroups",
|
||||
@ -134,7 +134,7 @@
|
||||
"description": [
|
||||
"Certificate Administrators"
|
||||
],
|
||||
"dn": "cn=certadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"retrieve_certs",
|
||||
"request_certs",
|
||||
@ -151,9 +151,9 @@
|
||||
"description": [
|
||||
"Replication Administrators"
|
||||
],
|
||||
"dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberindirect": [
|
||||
"uid=admin,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"uid=admin,cn=users,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberof_permission": [
|
||||
"managereplica",
|
||||
@ -167,7 +167,7 @@
|
||||
"description": [
|
||||
"Host Enrollment"
|
||||
],
|
||||
"dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"manage_host_keytab",
|
||||
"enroll_host"
|
||||
@ -180,7 +180,7 @@
|
||||
"description": [
|
||||
"Entitlement Administrators"
|
||||
],
|
||||
"dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addentitlements",
|
||||
"removeentitlements",
|
||||
@ -194,7 +194,7 @@
|
||||
"description": [
|
||||
"DNS Administrators"
|
||||
],
|
||||
"dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
@ -203,9 +203,9 @@
|
||||
"description": [
|
||||
"DNS Servers"
|
||||
],
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberindirect": [
|
||||
"krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
|
||||
]
|
||||
}
|
||||
],
|
||||
|
95
install/ui/test/data/privilege_find_pkeys.json
Normal file
95
install/ui/test/data/privilege_find_pkeys.json
Normal file
@ -0,0 +1,95 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 14,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"useradmin"
|
||||
],
|
||||
"dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"groupadmin"
|
||||
],
|
||||
"dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"hostadmin"
|
||||
],
|
||||
"dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"hostgroupadmin"
|
||||
],
|
||||
"dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"delegationadmin"
|
||||
],
|
||||
"dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"serviceadmin"
|
||||
],
|
||||
"dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"automountadmin"
|
||||
],
|
||||
"dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"netgroupadmin"
|
||||
],
|
||||
"dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certadmin"
|
||||
],
|
||||
"dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"replicaadmin"
|
||||
],
|
||||
"dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"enrollhost"
|
||||
],
|
||||
"dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"entitlementadmin"
|
||||
],
|
||||
"dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"dnsadmin"
|
||||
],
|
||||
"dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"dnsserver"
|
||||
],
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "14 privileges matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
283
install/ui/test/data/privilege_get_records.json
Normal file
283
install/ui/test/data/privilege_get_records.json
Normal file
@ -0,0 +1,283 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 14,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"useradmin"
|
||||
],
|
||||
"description": [
|
||||
"User Administrators"
|
||||
],
|
||||
"dn": "cn=useradmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addusers",
|
||||
"change_password",
|
||||
"add_user_to_default_group",
|
||||
"removeusers",
|
||||
"modifyusers"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "useradmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"groupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Group Administrators"
|
||||
],
|
||||
"dn": "cn=groupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addgroups",
|
||||
"removegroups",
|
||||
"modifygroups",
|
||||
"modifygroupmembership"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "groupadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"hostadmin"
|
||||
],
|
||||
"description": [
|
||||
"Host Administrators"
|
||||
],
|
||||
"dn": "cn=hostadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addhosts",
|
||||
"removehosts",
|
||||
"modifyhosts",
|
||||
"manage_host_keytab",
|
||||
"enroll_host"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "hostadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"hostgroupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Host Group Administrators"
|
||||
],
|
||||
"dn": "cn=hostgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addhostgroups",
|
||||
"removehostgroups",
|
||||
"modifyhostgroups",
|
||||
"modifyhostgroupmembership"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "hostgroupadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"delegationadmin"
|
||||
],
|
||||
"description": [
|
||||
"Role administration"
|
||||
],
|
||||
"dn": "cn=delegationadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addroles",
|
||||
"removeroles",
|
||||
"modifyroles",
|
||||
"modifyrolemembership",
|
||||
"modifyprivilegemembership"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "delegationadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"serviceadmin"
|
||||
],
|
||||
"description": [
|
||||
"Service Administrators"
|
||||
],
|
||||
"dn": "cn=serviceadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addservices",
|
||||
"removeservices",
|
||||
"modifyservices",
|
||||
"manage_service_keytab"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "serviceadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"automountadmin"
|
||||
],
|
||||
"description": [
|
||||
"Automount Administrators"
|
||||
],
|
||||
"dn": "cn=automountadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addautomountmaps",
|
||||
"removeautomountmaps",
|
||||
"addautomountkeys",
|
||||
"removeautomountkeys"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "automountadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"netgroupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Netgroups Administrators"
|
||||
],
|
||||
"dn": "cn=netgroupadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addnetgroups",
|
||||
"removenetgroups",
|
||||
"modifynetgroups",
|
||||
"modifynetgroupmembership"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "netgroupadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"certadmin"
|
||||
],
|
||||
"description": [
|
||||
"Certificate Administrators"
|
||||
],
|
||||
"dn": "cn=certadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"retrieve_certs",
|
||||
"request_certs",
|
||||
"request_cert_different_host",
|
||||
"certificate_status",
|
||||
"revoke_certificate",
|
||||
"certificate_remove_hold"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "certadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"replicaadmin"
|
||||
],
|
||||
"description": [
|
||||
"Replication Administrators"
|
||||
],
|
||||
"dn": "cn=replicaadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberindirect": [
|
||||
"uid=admin,cn=users,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"memberof_permission": [
|
||||
"managereplica",
|
||||
"deletereplica"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "replicaadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"enrollhost"
|
||||
],
|
||||
"description": [
|
||||
"Host Enrollment"
|
||||
],
|
||||
"dn": "cn=enrollhost,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"manage_host_keytab",
|
||||
"enroll_host"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "enrollhost"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"entitlementadmin"
|
||||
],
|
||||
"description": [
|
||||
"Entitlement Administrators"
|
||||
],
|
||||
"dn": "cn=entitlementadmin,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberof_permission": [
|
||||
"addentitlements",
|
||||
"removeentitlements",
|
||||
"modifyentitlements"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "entitlementadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"dnsadmin"
|
||||
],
|
||||
"description": [
|
||||
"DNS Administrators"
|
||||
],
|
||||
"dn": "cn=dnsadmin,cn=privileges,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "dnsadmin"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"dnsserver"
|
||||
],
|
||||
"description": [
|
||||
"DNS Servers"
|
||||
],
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberindirect": [
|
||||
"krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "dnsserver"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -23,9 +23,9 @@
|
||||
"description": [
|
||||
"DNS Servers"
|
||||
],
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=dnsserver,cn=privileges,cn=accounts,dc=example,dc=com",
|
||||
"memberindirect": [
|
||||
"krbprincipalname=dns/ipa.ayoung.boston.devel.redhat.com@ayoung.boston.devel.redhat.com,cn=services,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"krbprincipalname=dns/ipa.example.com@example.com,cn=services,cn=accounts,dc=example,dc=com"
|
||||
],
|
||||
"objectclass": [
|
||||
"top",
|
||||
|
@ -6,7 +6,7 @@
|
||||
"result": [
|
||||
{
|
||||
"cn": "GLOBAL",
|
||||
"dn": "cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=accounts,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"90"
|
||||
],
|
||||
@ -30,7 +30,7 @@
|
||||
"cospriority": [
|
||||
"1"
|
||||
],
|
||||
"dn": "cn=testgroup12,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"40"
|
||||
],
|
||||
@ -51,7 +51,7 @@
|
||||
"cospriority": [
|
||||
"2"
|
||||
],
|
||||
"dn": "cn=testgroup22,cn=ayoung.boston.devel.redhat.com,cn=kerberos,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"60"
|
||||
],
|
||||
|
27
install/ui/test/data/pwpolicy_find_pkeys.json
Normal file
27
install/ui/test/data/pwpolicy_find_pkeys.json
Normal file
@ -0,0 +1,27 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"cn": "GLOBAL",
|
||||
"dn": "cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testgroup12"
|
||||
],
|
||||
"dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testgroup22"
|
||||
],
|
||||
"dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
85
install/ui/test/data/pwpolicy_get_records.json
Normal file
85
install/ui/test/data/pwpolicy_get_records.json
Normal file
@ -0,0 +1,85 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": "GLOBAL",
|
||||
"dn": "cn=accounts,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"90"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"1"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdmindiffchars": [
|
||||
"0"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"8"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "GLOBAL"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"testgroup12"
|
||||
],
|
||||
"cospriority": [
|
||||
"1"
|
||||
],
|
||||
"dn": "cn=testgroup12,cn=example.com,cn=kerberos,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"40"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"50"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"5"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"6"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "testgroup12"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"testgroup22"
|
||||
],
|
||||
"cospriority": [
|
||||
"2"
|
||||
],
|
||||
"dn": "cn=testgroup22,cn=example.com,cn=kerberos,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"60"
|
||||
],
|
||||
"krbminpwdlife": [
|
||||
"40"
|
||||
],
|
||||
"krbpwdhistorylength": [
|
||||
"8"
|
||||
],
|
||||
"krbpwdminlength": [
|
||||
"9"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "testgroup22"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -20,7 +20,7 @@
|
||||
"cn": [
|
||||
"global_policy"
|
||||
],
|
||||
"dn": "cn=global_policy,cn=ipa14.ayoung.boston.devel.redhat.com,cn=kerberos,dc=ipa14,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=global_policy,cn=dev.example.com,cn=kerberos,dc=dev,dc=example,dc=com",
|
||||
"krbmaxpwdlife": [
|
||||
"90"
|
||||
],
|
||||
|
@ -11,7 +11,7 @@
|
||||
"description": [
|
||||
"Helpdesk"
|
||||
],
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "1 role matched",
|
||||
|
17
install/ui/test/data/role_find_pkeys.json
Normal file
17
install/ui/test/data/role_find_pkeys.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"helpdesk"
|
||||
],
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "1 role matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
23
install/ui/test/data/role_get_records.json
Normal file
23
install/ui/test/data/role_get_records.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"helpdesk"
|
||||
],
|
||||
"description": [
|
||||
"Helpdesk"
|
||||
],
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "helpdesk"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -23,7 +23,7 @@
|
||||
"description": [
|
||||
"Helpdesk"
|
||||
],
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "cn=helpdesk,cn=roles,cn=accounts,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"top",
|
||||
"groupofnames",
|
||||
|
@ -1,22 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": {
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"description": [
|
||||
"Test role"
|
||||
],
|
||||
"dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"objectclass": [
|
||||
"groupofnames",
|
||||
"nestedgroup",
|
||||
"top"
|
||||
]
|
||||
},
|
||||
"summary": "Added rolegroup \"test\"",
|
||||
"value": "test"
|
||||
}
|
||||
}
|
@ -1,27 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"completed": 1,
|
||||
"failed": {
|
||||
"member": {
|
||||
"group": [],
|
||||
"host": [],
|
||||
"hostgroup": [],
|
||||
"user": []
|
||||
}
|
||||
},
|
||||
"result": {
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"description": [
|
||||
"Test role"
|
||||
],
|
||||
"dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"member_user": [
|
||||
"admin"
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,9 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": true,
|
||||
"summary": "Deleted rolegroup \"test\"",
|
||||
"value": "test"
|
||||
}
|
||||
}
|
@ -1,185 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 15,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"helpdesk"
|
||||
],
|
||||
"description": [
|
||||
"Helpdesk"
|
||||
],
|
||||
"dn": "cn=helpdesk,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"member_user": [
|
||||
"edewata"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"useradmin"
|
||||
],
|
||||
"description": [
|
||||
"User Administrators"
|
||||
],
|
||||
"dn": "cn=useradmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"groupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Group Administrators"
|
||||
],
|
||||
"dn": "cn=groupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"hostadmin"
|
||||
],
|
||||
"description": [
|
||||
"Host Administrators"
|
||||
],
|
||||
"dn": "cn=hostadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"memberof_taskgroup": [
|
||||
"addhosts",
|
||||
"removehosts",
|
||||
"modifyhosts",
|
||||
"manage_host_keytab",
|
||||
"enroll_host"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"hostgroupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Host Group Administrators"
|
||||
],
|
||||
"dn": "cn=hostgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"delegationadmin"
|
||||
],
|
||||
"description": [
|
||||
"Role administration"
|
||||
],
|
||||
"dn": "cn=delegationadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"serviceadmin"
|
||||
],
|
||||
"description": [
|
||||
"Service Administrators"
|
||||
],
|
||||
"dn": "cn=serviceadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"memberof_taskgroup": [
|
||||
"addservices",
|
||||
"removeservices",
|
||||
"modifyservices"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"automountadmin"
|
||||
],
|
||||
"description": [
|
||||
"Automount Administrators"
|
||||
],
|
||||
"dn": "cn=automountadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"netgroupadmin"
|
||||
],
|
||||
"description": [
|
||||
"Netgroups Administrators"
|
||||
],
|
||||
"dn": "cn=netgroupadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"dnsadmin"
|
||||
],
|
||||
"description": [
|
||||
"DNS Administrators"
|
||||
],
|
||||
"dn": "cn=dnsadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"dnsserver"
|
||||
],
|
||||
"description": [
|
||||
"DNS Servers"
|
||||
],
|
||||
"dn": "cn=dnsserver,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certadmin"
|
||||
],
|
||||
"description": [
|
||||
"Certificate Administrators"
|
||||
],
|
||||
"dn": "cn=certadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"memberof_taskgroup": [
|
||||
"retrieve_certs",
|
||||
"request_certs",
|
||||
"request_cert_different_host",
|
||||
"certificate_status",
|
||||
"revoke_certificate",
|
||||
"certificate_remove_hold"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"replicaadmin"
|
||||
],
|
||||
"description": [
|
||||
"Replication Administrators"
|
||||
],
|
||||
"dn": "cn=replicaadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"member_user": [
|
||||
"admin"
|
||||
],
|
||||
"memberof_taskgroup": [
|
||||
"managereplica",
|
||||
"deletereplica"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"enrollhost"
|
||||
],
|
||||
"description": [
|
||||
"Host Enrollment"
|
||||
],
|
||||
"dn": "cn=enrollhost,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"memberof_taskgroup": [
|
||||
"manage_host_keytab",
|
||||
"enroll_host"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"entitlementadmin"
|
||||
],
|
||||
"description": [
|
||||
"Entitlement Administrators"
|
||||
],
|
||||
"dn": "cn=entitlementadmin,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"memberof_taskgroup": [
|
||||
"addentitlements",
|
||||
"removeentitlements",
|
||||
"modifyentitlements"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": "15 rolegroups matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
@ -1,24 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"completed": 1,
|
||||
"failed": {
|
||||
"member": {
|
||||
"group": [],
|
||||
"host": [],
|
||||
"hostgroup": [],
|
||||
"user": []
|
||||
}
|
||||
},
|
||||
"result": {
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"description": [
|
||||
"Test role"
|
||||
],
|
||||
"dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
}
|
||||
}
|
@ -1,20 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"result": {
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"description": [
|
||||
"Test role"
|
||||
],
|
||||
"dn": "cn=test,cn=rolegroups,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"member_user": [
|
||||
"admin"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "test"
|
||||
}
|
||||
}
|
29
install/ui/test/data/service_find_pkeys.json
Normal file
29
install/ui/test/data/service_find_pkeys.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"result": [
|
||||
{
|
||||
"dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"krbprincipalname": [
|
||||
"ldap/dev.example.com@DEV.EXAMPLE.COM"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"krbprincipalname": [
|
||||
"HTTP/dev.example.com@DEV.EXAMPLE.COM"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"krbprincipalname": [
|
||||
"test/dev.example.com@DEV.EXAMPLE.COM"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": "3 services matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
61
install/ui/test/data/service_get_records.json
Normal file
61
install/ui/test/data/service_get_records.json
Normal file
@ -0,0 +1,61 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 3,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "krbprincipalname=ldap/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"has_keytab": true,
|
||||
"krbprincipalname": [
|
||||
"ldap/dev.example.com@DEV.EXAMPLE.COM"
|
||||
],
|
||||
"managedby_host": [
|
||||
"dev.example.com"
|
||||
],
|
||||
"usercertificate": [
|
||||
{
|
||||
"__base64__": "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"
|
||||
}
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "ldap/dev.example.com@DEV.EXAMPLE.COM"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "krbprincipalname=http/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"has_keytab": true,
|
||||
"krbprincipalname": [
|
||||
"HTTP/dev.example.com@DEV.EXAMPLE.COM"
|
||||
],
|
||||
"usercertificate": [
|
||||
{
|
||||
"__base64__": "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"
|
||||
}
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "HTTP/dev.example.com@DEV.EXAMPLE.COM"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "krbprincipalname=test/dev.example.com@dev.example.com,cn=services,cn=accounts,dc=dev,dc=example,dc=com",
|
||||
"has_keytab": false,
|
||||
"krbprincipalname": [
|
||||
"test/dev.example.com@DEV.EXAMPLE.COM"
|
||||
],
|
||||
"managedby_host": [
|
||||
"dev.example.com"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "test/dev.example.com@DEV.EXAMPLE.COM"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
23
install/ui/test/data/sudocmd_find_pkeys.json
Normal file
23
install/ui/test/data/sudocmd_find_pkeys.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"result": [
|
||||
{
|
||||
"dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
|
||||
"sudocmd": [
|
||||
"/usr/bin/more"
|
||||
]
|
||||
},
|
||||
{
|
||||
"dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
|
||||
"sudocmd": [
|
||||
"/usr/bin/less"
|
||||
]
|
||||
}
|
||||
],
|
||||
"summary": "2 sudo command matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
31
install/ui/test/data/sudocmd_get_records.json
Normal file
31
install/ui/test/data/sudocmd_get_records.json
Normal file
@ -0,0 +1,31 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "sudocmd=/usr/bin/more,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
|
||||
"sudocmd": [
|
||||
"/usr/bin/more"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "/usr/bin/more"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"dn": "sudocmd=/usr/bin/less,cn=sudocmds,cn=sudo,dc=dev,dc=example,dc=com",
|
||||
"sudocmd": [
|
||||
"/usr/bin/less"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "/usr/bin/less"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
23
install/ui/test/data/sudocmdgroup_find_pkeys.json
Normal file
23
install/ui/test/data/sudocmdgroup_find_pkeys.json
Normal file
@ -0,0 +1,23 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"group1"
|
||||
],
|
||||
"dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"group2"
|
||||
],
|
||||
"dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "2 sudo command groups matched",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
41
install/ui/test/data/sudocmdgroup_get_records.json
Normal file
41
install/ui/test/data/sudocmdgroup_get_records.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 2,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"group1"
|
||||
],
|
||||
"description": [
|
||||
"Group 1"
|
||||
],
|
||||
"dn": "cn=group1,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com",
|
||||
"member_sudocmd": [
|
||||
"/usr/bin/more",
|
||||
"/usr/bin/less"
|
||||
]
|
||||
},
|
||||
"summary": null,
|
||||
"value": "group1"
|
||||
},
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"group2"
|
||||
],
|
||||
"description": [
|
||||
"Group 2"
|
||||
],
|
||||
"dn": "cn=group2,cn=sudocmdgroups,cn=sudo,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "group2"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
17
install/ui/test/data/sudorule_find_pkeys.json
Normal file
17
install/ui/test/data/sudorule_find_pkeys.json
Normal file
@ -0,0 +1,17 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": null,
|
||||
"truncated": false
|
||||
}
|
||||
}
|
20
install/ui/test/data/sudorule_get_records.json
Normal file
20
install/ui/test/data/sudorule_get_records.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 0,
|
||||
"result": {
|
||||
"count": 1,
|
||||
"results": [
|
||||
{
|
||||
"error": null,
|
||||
"result": {
|
||||
"cn": [
|
||||
"test"
|
||||
],
|
||||
"dn": "ipauniqueid=4fc57a02-f23311df-b268e50e-a3b3ef71,cn=sudorules,cn=sudo,dc=dev,dc=example,dc=com"
|
||||
},
|
||||
"summary": null,
|
||||
"value": "test"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,554 +0,0 @@
|
||||
{
|
||||
"error": null,
|
||||
"id": 6,
|
||||
"result": {
|
||||
"count": 45,
|
||||
"result": [
|
||||
{
|
||||
"cn": [
|
||||
"addusers"
|
||||
],
|
||||
"description": [
|
||||
"Add Users"
|
||||
],
|
||||
"dn": "cn=addusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"change_password"
|
||||
],
|
||||
"description": [
|
||||
"Change a user password"
|
||||
],
|
||||
"dn": "cn=change_password,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"add_user_to_default_group"
|
||||
],
|
||||
"description": [
|
||||
"Add user to default group"
|
||||
],
|
||||
"dn": "cn=add_user_to_default_group,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeusers"
|
||||
],
|
||||
"description": [
|
||||
"Remove Users"
|
||||
],
|
||||
"dn": "cn=removeusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyusers"
|
||||
],
|
||||
"description": [
|
||||
"Modify Users"
|
||||
],
|
||||
"dn": "cn=modifyusers,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"useradmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add Groups"
|
||||
],
|
||||
"dn": "cn=addgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removegroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove Groups"
|
||||
],
|
||||
"dn": "cn=removegroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifygroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify Groups"
|
||||
],
|
||||
"dn": "cn=modifygroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifygroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Group membership"
|
||||
],
|
||||
"dn": "cn=modifygroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"groupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhosts"
|
||||
],
|
||||
"description": [
|
||||
"Add Hosts"
|
||||
],
|
||||
"dn": "cn=addhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removehosts"
|
||||
],
|
||||
"description": [
|
||||
"Remove Hosts"
|
||||
],
|
||||
"dn": "cn=removehosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhosts"
|
||||
],
|
||||
"description": [
|
||||
"Modify Hosts"
|
||||
],
|
||||
"dn": "cn=modifyhosts,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add Host Groups"
|
||||
],
|
||||
"dn": "cn=addhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removehostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove Host Groups"
|
||||
],
|
||||
"dn": "cn=removehostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhostgroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify Host Groups"
|
||||
],
|
||||
"dn": "cn=modifyhostgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyhostgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Host Group membership"
|
||||
],
|
||||
"dn": "cn=modifyhostgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addservices"
|
||||
],
|
||||
"description": [
|
||||
"Add Services"
|
||||
],
|
||||
"dn": "cn=addservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeservices"
|
||||
],
|
||||
"description": [
|
||||
"Remove Services"
|
||||
],
|
||||
"dn": "cn=removeservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addhrole",
|
||||
"addroles"
|
||||
],
|
||||
"description": [
|
||||
"Add Roles"
|
||||
],
|
||||
"dn": "cn=addroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeroles"
|
||||
],
|
||||
"description": [
|
||||
"Remove Roles"
|
||||
],
|
||||
"dn": "cn=removeroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyroles"
|
||||
],
|
||||
"description": [
|
||||
"Modify Roles"
|
||||
],
|
||||
"dn": "cn=modifyroles,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyrolegroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Role Group membership"
|
||||
],
|
||||
"dn": "cn=modifyrolegroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifytaskgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify Task Group membership"
|
||||
],
|
||||
"dn": "cn=modifytaskgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"delegationadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addautomount"
|
||||
],
|
||||
"description": [
|
||||
"Add Automount maps/keys"
|
||||
],
|
||||
"dn": "cn=addautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"automountadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeautomount"
|
||||
],
|
||||
"description": [
|
||||
"Remove Automount maps/keys"
|
||||
],
|
||||
"dn": "cn=removeautomount,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"automountadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addnetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Add netgroups"
|
||||
],
|
||||
"dn": "cn=addnetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removenetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Remove netgroups"
|
||||
],
|
||||
"dn": "cn=removenetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifynetgroups"
|
||||
],
|
||||
"description": [
|
||||
"Modify netgroups"
|
||||
],
|
||||
"dn": "cn=modifynetgroups,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifynetgroupmembership"
|
||||
],
|
||||
"description": [
|
||||
"Modify netgroup membership"
|
||||
],
|
||||
"dn": "cn=modifynetgroupmembership,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"netgroupadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"manage_host_keytab"
|
||||
],
|
||||
"description": [
|
||||
"Manage host keytab"
|
||||
],
|
||||
"dn": "cn=manage_host_keytab,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin",
|
||||
"enrollhost"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"manage_host_keytab",
|
||||
"update_dns",
|
||||
"update_sn"
|
||||
],
|
||||
"description": [
|
||||
"Updates DNS"
|
||||
],
|
||||
"dn": "cn=update_dns,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"dnsadmin",
|
||||
"dnsserver"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyservices"
|
||||
],
|
||||
"description": [
|
||||
"Modify Services"
|
||||
],
|
||||
"dn": "cn=modifyservices,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"serviceadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"enroll_host"
|
||||
],
|
||||
"description": [
|
||||
"Enroll a host"
|
||||
],
|
||||
"dn": "cn=enroll_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"hostadmin",
|
||||
"enrollhost"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"retrieve_certs"
|
||||
],
|
||||
"description": [
|
||||
"Retrieve SSL Certificates"
|
||||
],
|
||||
"dn": "cn=retrieve_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"request_certs"
|
||||
],
|
||||
"description": [
|
||||
"Request a SSL Certificate"
|
||||
],
|
||||
"dn": "cn=request_certs,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"request_cert_different_host"
|
||||
],
|
||||
"description": [
|
||||
"Request a SSL Certificate from a different host"
|
||||
],
|
||||
"dn": "cn=request_cert_different_host,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certificate_status"
|
||||
],
|
||||
"description": [
|
||||
"Status of cert request"
|
||||
],
|
||||
"dn": "cn=certificate_status,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"revoke_certificate"
|
||||
],
|
||||
"description": [
|
||||
"Revoke Certificate"
|
||||
],
|
||||
"dn": "cn=revoke_certificate,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"certificate_remove_hold"
|
||||
],
|
||||
"description": [
|
||||
"Certificate Remove Hold"
|
||||
],
|
||||
"dn": "cn=certificate_remove_hold,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"certadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"managereplica"
|
||||
],
|
||||
"description": [
|
||||
"Manage Replication Agreements"
|
||||
],
|
||||
"dn": "cn=managereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"replicaadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"deletereplica"
|
||||
],
|
||||
"description": [
|
||||
"Delete Replication Agreements"
|
||||
],
|
||||
"dn": "cn=deletereplica,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"replicaadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"addentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Add Entitlements"
|
||||
],
|
||||
"dn": "cn=addentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"removeentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Remove Entitlements"
|
||||
],
|
||||
"dn": "cn=removeentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"modifyentitlements"
|
||||
],
|
||||
"description": [
|
||||
"Modify Entitlements"
|
||||
],
|
||||
"dn": "cn=modifyentitlements,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"member_rolegroup": [
|
||||
"entitlementadmin"
|
||||
]
|
||||
},
|
||||
{
|
||||
"cn": [
|
||||
"testtaskgroup"
|
||||
],
|
||||
"description": [
|
||||
"test1"
|
||||
],
|
||||
"dn": "cn=testtaskgroup,cn=taskgroups,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com"
|
||||
}
|
||||
],
|
||||
"summary": "45 grupos de tarea coincidentes",
|
||||
"truncated": false
|
||||
}
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
"id": 10,
|
||||
"result": {
|
||||
"result": {
|
||||
"dn": "uid=snuffy,cn=users,cn=accounts,dc=ayoung,dc=boston,dc=devel,dc=redhat,dc=com",
|
||||
"dn": "uid=snuffy,cn=users,cn=accounts,dc=example,dc=com",
|
||||
"gecos": [
|
||||
"snuffy"
|
||||
],
|
||||
@ -17,7 +17,7 @@
|
||||
"a4ce7d19-b439-11df-a9ae-525400674dcd"
|
||||
],
|
||||
"krbprincipalname": [
|
||||
"snuffy@AYOUNG.BOSTON.DEVEL.REDHAT.COM"
|
||||
"snuffy@EXAMPLE.COM"
|
||||
],
|
||||
"loginshell": [
|
||||
"/bin/sh"
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user