rubinius-net-ldap 0.11

Sign up to get free protection for your applications and to get access to all the features.
Files changed (73) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +10 -0
  3. data/.rubocop.yml +5 -0
  4. data/.rubocop_todo.yml +462 -0
  5. data/.travis.yml +19 -0
  6. data/CONTRIBUTING.md +54 -0
  7. data/Contributors.rdoc +24 -0
  8. data/Gemfile +2 -0
  9. data/Hacking.rdoc +63 -0
  10. data/History.rdoc +260 -0
  11. data/License.rdoc +29 -0
  12. data/README.rdoc +65 -0
  13. data/Rakefile +17 -0
  14. data/lib/net-ldap.rb +2 -0
  15. data/lib/net/ber.rb +320 -0
  16. data/lib/net/ber/ber_parser.rb +182 -0
  17. data/lib/net/ber/core_ext.rb +55 -0
  18. data/lib/net/ber/core_ext/array.rb +96 -0
  19. data/lib/net/ber/core_ext/false_class.rb +10 -0
  20. data/lib/net/ber/core_ext/integer.rb +74 -0
  21. data/lib/net/ber/core_ext/string.rb +66 -0
  22. data/lib/net/ber/core_ext/true_class.rb +11 -0
  23. data/lib/net/ldap.rb +1229 -0
  24. data/lib/net/ldap/connection.rb +702 -0
  25. data/lib/net/ldap/dataset.rb +168 -0
  26. data/lib/net/ldap/dn.rb +225 -0
  27. data/lib/net/ldap/entry.rb +193 -0
  28. data/lib/net/ldap/error.rb +38 -0
  29. data/lib/net/ldap/filter.rb +778 -0
  30. data/lib/net/ldap/instrumentation.rb +23 -0
  31. data/lib/net/ldap/password.rb +38 -0
  32. data/lib/net/ldap/pdu.rb +297 -0
  33. data/lib/net/ldap/version.rb +5 -0
  34. data/lib/net/snmp.rb +264 -0
  35. data/rubinius-net-ldap.gemspec +37 -0
  36. data/script/install-openldap +112 -0
  37. data/script/package +7 -0
  38. data/script/release +16 -0
  39. data/test/ber/core_ext/test_array.rb +22 -0
  40. data/test/ber/core_ext/test_string.rb +25 -0
  41. data/test/ber/test_ber.rb +99 -0
  42. data/test/fixtures/cacert.pem +20 -0
  43. data/test/fixtures/openldap/memberof.ldif +33 -0
  44. data/test/fixtures/openldap/retcode.ldif +76 -0
  45. data/test/fixtures/openldap/slapd.conf.ldif +67 -0
  46. data/test/fixtures/seed.ldif +374 -0
  47. data/test/integration/test_add.rb +28 -0
  48. data/test/integration/test_ber.rb +30 -0
  49. data/test/integration/test_bind.rb +34 -0
  50. data/test/integration/test_delete.rb +31 -0
  51. data/test/integration/test_open.rb +88 -0
  52. data/test/integration/test_return_codes.rb +38 -0
  53. data/test/integration/test_search.rb +77 -0
  54. data/test/support/vm/openldap/.gitignore +1 -0
  55. data/test/support/vm/openldap/README.md +32 -0
  56. data/test/support/vm/openldap/Vagrantfile +33 -0
  57. data/test/test_dn.rb +44 -0
  58. data/test/test_entry.rb +65 -0
  59. data/test/test_filter.rb +223 -0
  60. data/test/test_filter_parser.rb +20 -0
  61. data/test/test_helper.rb +66 -0
  62. data/test/test_ldap.rb +60 -0
  63. data/test/test_ldap_connection.rb +404 -0
  64. data/test/test_ldif.rb +104 -0
  65. data/test/test_password.rb +10 -0
  66. data/test/test_rename.rb +77 -0
  67. data/test/test_search.rb +39 -0
  68. data/test/test_snmp.rb +119 -0
  69. data/test/test_ssl_ber.rb +40 -0
  70. data/test/testdata.ldif +101 -0
  71. data/testserver/ldapserver.rb +210 -0
  72. data/testserver/testdata.ldif +101 -0
  73. metadata +204 -0
data/test/test_ldif.rb ADDED
@@ -0,0 +1,104 @@
1
+ # $Id: testldif.rb 61 2006-04-18 20:55:55Z blackhedd $
2
+
3
+ require File.expand_path('../test_helper', __FILE__)
4
+
5
+ require 'digest/sha1'
6
+ require 'base64'
7
+
8
+ class TestLdif < Test::Unit::TestCase
9
+ TestLdifFilename = "#{File.dirname(__FILE__)}/testdata.ldif"
10
+
11
+ def test_empty_ldif
12
+ ds = Net::LDAP::Dataset.read_ldif(StringIO.new)
13
+ assert_equal(true, ds.empty?)
14
+ end
15
+
16
+ def test_ldif_with_version
17
+ io = StringIO.new("version: 1")
18
+ ds = Net::LDAP::Dataset.read_ldif(io)
19
+ assert_equal "1", ds.version
20
+ end
21
+
22
+ def test_ldif_with_comments
23
+ str = ["# Hello from LDIF-land", "# This is an unterminated comment"]
24
+ io = StringIO.new(str[0] + "\r\n" + str[1])
25
+ ds = Net::LDAP::Dataset::read_ldif(io)
26
+ assert_equal(str, ds.comments)
27
+ end
28
+
29
+ def test_ldif_with_password
30
+ psw = "goldbricks"
31
+ hashed_psw = "{SHA}" + Base64::encode64(Digest::SHA1.digest(psw)).chomp
32
+
33
+ ldif_encoded = Base64::encode64(hashed_psw).chomp
34
+ ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: Goldbrick\r\nuserPassword:: #{ldif_encoded}\r\n\r\n"))
35
+ recovered_psw = ds["Goldbrick"][:userpassword].shift
36
+ assert_equal(hashed_psw, recovered_psw)
37
+ end
38
+
39
+ def test_ldif_with_continuation_lines
40
+ ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
41
+ assert_equal(true, ds.has_key?("abcdefghijklmn"))
42
+ end
43
+
44
+ def test_ldif_with_continuation_lines_and_extra_whitespace
45
+ ds1 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hijklmn\r\n\r\n"))
46
+ assert_equal(true, ds1.has_key?("abcdefg hijklmn"))
47
+ ds2 = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: abcdefg\r\n hij klmn\r\n\r\n"))
48
+ assert_equal(true, ds2.has_key?("abcdefghij klmn"))
49
+ end
50
+
51
+ def test_ldif_tab_is_not_continuation
52
+ ds = Net::LDAP::Dataset::read_ldif(StringIO.new("dn: key\r\n\tnotcontinued\r\n\r\n"))
53
+ assert_equal(true, ds.has_key?("key"))
54
+ end
55
+
56
+ def test_ldif_with_base64_dn
57
+ str = "dn:: Q049QmFzZTY0IGRuIHRlc3QsT1U9VGVzdCxPVT1Vbml0cyxEQz1leGFtcGxlLERDPWNvbQ==\r\n\r\n"
58
+ ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
59
+ assert_equal(true, ds.has_key?("CN=Base64 dn test,OU=Test,OU=Units,DC=example,DC=com"))
60
+ end
61
+
62
+ def test_ldif_with_base64_dn_and_continuation_lines
63
+ str = "dn:: Q049QmFzZTY0IGRuIHRlc3Qgd2l0aCBjb250aW51YXRpb24gbGluZSxPVT1UZXN0LE9VPVVua\r\n XRzLERDPWV4YW1wbGUsREM9Y29t\r\n\r\n"
64
+ ds = Net::LDAP::Dataset::read_ldif(StringIO.new(str))
65
+ assert_equal(true, ds.has_key?("CN=Base64 dn test with continuation line,OU=Test,OU=Units,DC=example,DC=com"))
66
+ end
67
+
68
+ # TODO, INADEQUATE. We need some more tests
69
+ # to verify the content.
70
+ def test_ldif
71
+ File.open(TestLdifFilename, "r") {|f|
72
+ ds = Net::LDAP::Dataset::read_ldif(f)
73
+ assert_equal(13, ds.length)
74
+ }
75
+ end
76
+
77
+ # Must test folded lines and base64-encoded lines as well as normal ones.
78
+ def test_to_ldif
79
+ data = File.open(TestLdifFilename, "rb") { |f| f.read }
80
+ io = StringIO.new(data)
81
+
82
+ # added .lines to turn to array because 1.9 doesn't have
83
+ # .grep on basic strings
84
+ entries = data.lines.grep(/^dn:\s*/) { $'.chomp }
85
+ dn_entries = entries.dup
86
+
87
+ ds = Net::LDAP::Dataset::read_ldif(io) { |type, value|
88
+ case type
89
+ when :dn
90
+ assert_equal(dn_entries.first, value)
91
+ dn_entries.shift
92
+ end
93
+ }
94
+ assert_equal(entries.size, ds.size)
95
+ assert_equal(entries.sort, ds.to_ldif.grep(/^dn:\s*/) { $'.chomp })
96
+ end
97
+
98
+ def test_to_ldif_with_version
99
+ ds = Net::LDAP::Dataset.new
100
+ ds.version = "1"
101
+
102
+ assert_equal "version: 1", ds.to_ldif_string.chomp
103
+ end
104
+ end
@@ -0,0 +1,10 @@
1
+ # $Id: testpsw.rb 72 2006-04-24 21:58:14Z blackhedd $
2
+
3
+ require File.expand_path('../test_helper', __FILE__)
4
+
5
+ class TestPassword < Test::Unit::TestCase
6
+ def test_psw
7
+ assert_equal("{MD5}xq8jwrcfibi0sZdZYNkSng==", Net::LDAP::Password.generate( :md5, "cashflow" ))
8
+ assert_equal("{SHA}YE4eGkN4BvwNN1f5R7CZz0kFn14=", Net::LDAP::Password.generate( :sha, "cashflow" ))
9
+ end
10
+ end
@@ -0,0 +1,77 @@
1
+ require File.expand_path('../test_helper', __FILE__)
2
+
3
+ # Commented out since it assumes you have a live LDAP server somewhere. This
4
+ # will be migrated to the integration specs, as soon as they are ready.
5
+ =begin
6
+ class TestRename < Test::Unit::TestCase
7
+ HOST= '10.10.10.71'
8
+ PORT = 389
9
+ BASE = "o=test"
10
+ AUTH = { :method => :simple, :username => "cn=testadmin,#{BASE}", :password => 'password' }
11
+ BASIC_USER = "cn=jsmith,ou=sales,#{BASE}"
12
+ RENAMED_USER = "cn=jbrown,ou=sales,#{BASE}"
13
+ MOVED_USER = "cn=jsmith,ou=marketing,#{BASE}"
14
+ RENAMED_MOVED_USER = "cn=jjones,ou=marketing,#{BASE}"
15
+
16
+ def setup
17
+ # create the entries we're going to manipulate
18
+ Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
19
+ if ldap.add(:dn => "ou=sales,#{BASE}", :attributes => { :ou => "sales", :objectclass => "organizationalUnit" })
20
+ puts "Add failed: #{ldap.get_operation_result.message} - code: #{ldap.get_operation_result.code}"
21
+ end
22
+ ldap.add(:dn => "ou=marketing,#{BASE}", :attributes => { :ou => "marketing", :objectclass => "organizationalUnit" })
23
+ ldap.add(:dn => BASIC_USER, :attributes => { :cn => "jsmith", :objectclass => "inetOrgPerson", :sn => "Smith" })
24
+ end
25
+ end
26
+
27
+ def test_rename_entry
28
+ dn = nil
29
+ Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
30
+ ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jbrown")
31
+
32
+ ldap.search(:base => RENAMED_USER) do |entry|
33
+ dn = entry.dn
34
+ end
35
+ end
36
+ assert_equal(RENAMED_USER, dn)
37
+ end
38
+
39
+ def test_move_entry
40
+ dn = nil
41
+ Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
42
+ ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jsmith", :new_superior => "ou=marketing,#{BASE}")
43
+
44
+ ldap.search(:base => MOVED_USER) do |entry|
45
+ dn = entry.dn
46
+ end
47
+ end
48
+ assert_equal(MOVED_USER, dn)
49
+ end
50
+
51
+ def test_move_and_rename_entry
52
+ dn = nil
53
+ Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
54
+ ldap.rename(:olddn => BASIC_USER, :newrdn => "cn=jjones", :new_superior => "ou=marketing,#{BASE}")
55
+
56
+ ldap.search(:base => RENAMED_MOVED_USER) do |entry|
57
+ dn = entry.dn
58
+ end
59
+ end
60
+ assert_equal(RENAMED_MOVED_USER, dn)
61
+ end
62
+
63
+ def teardown
64
+ # delete the entries
65
+ # note: this doesn't always completely clear up on eDirectory as objects get locked while
66
+ # the rename/move is being completed on the server and this prevents the delete from happening
67
+ Net::LDAP::open(:host => HOST, :port => PORT, :auth => AUTH) do |ldap|
68
+ ldap.delete(:dn => BASIC_USER)
69
+ ldap.delete(:dn => RENAMED_USER)
70
+ ldap.delete(:dn => MOVED_USER)
71
+ ldap.delete(:dn => RENAMED_MOVED_USER)
72
+ ldap.delete(:dn => "ou=sales,#{BASE}")
73
+ ldap.delete(:dn => "ou=marketing,#{BASE}")
74
+ end
75
+ end
76
+ end
77
+ =end
@@ -0,0 +1,39 @@
1
+ # -*- ruby encoding: utf-8 -*-
2
+ require File.expand_path('../test_helper', __FILE__)
3
+
4
+ class TestSearch < Test::Unit::TestCase
5
+ class FakeConnection
6
+ def search(args)
7
+ OpenStruct.new(:result_code => Net::LDAP::ResultCodeOperationsError, :message => "error", :success? => false)
8
+ end
9
+ end
10
+
11
+ def setup
12
+ @service = MockInstrumentationService.new
13
+ @connection = Net::LDAP.new :instrumentation_service => @service
14
+ @connection.instance_variable_set(:@open_connection, FakeConnection.new)
15
+ end
16
+
17
+ def test_true_result
18
+ assert_nil @connection.search(:return_result => true)
19
+ end
20
+
21
+ def test_false_result
22
+ assert !@connection.search(:return_result => false)
23
+ end
24
+
25
+ def test_no_result
26
+ assert_nil @connection.search
27
+ end
28
+
29
+ def test_instrumentation_publishes_event
30
+ events = @service.subscribe "search.net_ldap"
31
+
32
+ @connection.search(:filter => "test")
33
+
34
+ payload, result = events.pop
35
+ assert payload.has_key?(:result)
36
+ assert payload.has_key?(:filter)
37
+ assert_equal "test", payload[:filter]
38
+ end
39
+ end
data/test/test_snmp.rb ADDED
@@ -0,0 +1,119 @@
1
+ # $Id: testsnmp.rb 231 2006-12-21 15:09:29Z blackhedd $
2
+
3
+ require File.expand_path('../test_helper', __FILE__)
4
+ require 'net/snmp'
5
+
6
+ class TestSnmp < Test::Unit::TestCase
7
+ def self.raw_string(s)
8
+ # Conveniently, String#b only needs to be called when it exists
9
+ s.respond_to?(:b) ? s.b : s
10
+ end
11
+
12
+ SnmpGetRequest = raw_string("0'\002\001\000\004\006public\240\032\002\002?*\002\001\000\002\001\0000\0160\f\006\b+\006\001\002\001\001\001\000\005\000")
13
+ SnmpGetResponse = raw_string("0+\002\001\000\004\006public\242\036\002\002'\017\002\001\000\002\001\0000\0220\020\006\b+\006\001\002\001\001\001\000\004\004test")
14
+
15
+ SnmpGetRequestXXX = raw_string("0'\002\001\000\004\006xxxxxx\240\032\002\002?*\002\001\000\002\001\0000\0160\f\006\b+\006\001\002\001\001\001\000\005\000")
16
+
17
+ def test_invalid_packet
18
+ data = "xxxx"
19
+ assert_raise(Net::BER::BerError) {
20
+ ary = data.read_ber(Net::SNMP::AsnSyntax)
21
+ }
22
+ end
23
+
24
+ # The method String#read_ber! added by Net::BER consumes a well-formed BER
25
+ # object from the head of a string. If it doesn't find a complete,
26
+ # well-formed BER object, it returns nil and leaves the string unchanged.
27
+ # If it finds an object, it returns the object and removes it from the
28
+ # head of the string. This is good for handling partially-received data
29
+ # streams, such as from network connections.
30
+ def _test_consume_string
31
+ data = "xxx"
32
+ assert_equal(nil, data.read_ber!)
33
+ assert_equal("xxx", data)
34
+
35
+ data = SnmpGetRequest + "!!!"
36
+ ary = data.read_ber!(Net::SNMP::AsnSyntax)
37
+ assert_equal("!!!", data)
38
+ assert ary.is_a?(Array)
39
+ assert ary.is_a?(Net::BER::BerIdentifiedArray)
40
+ end
41
+
42
+ def test_weird_packet
43
+ assert_raise(Net::SnmpPdu::Error) {
44
+ Net::SnmpPdu.parse("aaaaaaaaaaaaaa")
45
+ }
46
+ end
47
+
48
+ def test_get_request
49
+ data = SnmpGetRequest.dup
50
+ pkt = data.read_ber(Net::SNMP::AsnSyntax)
51
+ assert pkt.is_a?(Net::BER::BerIdentifiedArray)
52
+ assert_equal(48, pkt.ber_identifier) # Constructed [0], signifies GetRequest
53
+
54
+ pdu = Net::SnmpPdu.parse(pkt)
55
+ assert_equal(:get_request, pdu.pdu_type)
56
+ assert_equal(16170, pdu.request_id) # whatever was in the test data. 16170 is not magic.
57
+ assert_equal([[[1, 3, 6, 1, 2, 1, 1, 1, 0], nil]], pdu.variables)
58
+
59
+ assert_equal(pdu.to_ber_string, SnmpGetRequest)
60
+ end
61
+
62
+ def test_empty_pdu
63
+ pdu = Net::SnmpPdu.new
64
+ assert_raise(Net::SnmpPdu::Error) { pdu.to_ber_string }
65
+ end
66
+
67
+ def test_malformations
68
+ pdu = Net::SnmpPdu.new
69
+ pdu.version = 0
70
+ pdu.version = 2
71
+ assert_raise(Net::SnmpPdu::Error) { pdu.version = 100 }
72
+
73
+ pdu.pdu_type = :get_request
74
+ pdu.pdu_type = :get_next_request
75
+ pdu.pdu_type = :get_response
76
+ pdu.pdu_type = :set_request
77
+ pdu.pdu_type = :trap
78
+ assert_raise(Net::SnmpPdu::Error) { pdu.pdu_type = :something_else }
79
+ end
80
+
81
+ def test_make_response
82
+ pdu = Net::SnmpPdu.new
83
+ pdu.version = 0
84
+ pdu.community = "public"
85
+ pdu.pdu_type = :get_response
86
+ pdu.request_id = 9999
87
+ pdu.error_status = 0
88
+ pdu.error_index = 0
89
+ pdu.add_variable_binding [1, 3, 6, 1, 2, 1, 1, 1, 0], "test"
90
+
91
+ assert_equal(SnmpGetResponse, pdu.to_ber_string)
92
+ end
93
+
94
+ def test_make_bad_response
95
+ pdu = Net::SnmpPdu.new
96
+ assert_raise(Net::SnmpPdu::Error) {pdu.to_ber_string}
97
+ pdu.pdu_type = :get_response
98
+ pdu.request_id = 999
99
+ pdu.to_ber_string
100
+ # Not specifying variables doesn't create an error. (Maybe it should?)
101
+ end
102
+
103
+ def test_snmp_integers
104
+ c32 = Net::SNMP::Counter32.new(100)
105
+ assert_equal("A\001d", c32.to_ber)
106
+ g32 = Net::SNMP::Gauge32.new(100)
107
+ assert_equal("B\001d", g32.to_ber)
108
+ t32 = Net::SNMP::TimeTicks32.new(100)
109
+ assert_equal("C\001d", t32.to_ber)
110
+ end
111
+
112
+ def test_community
113
+ data = SnmpGetRequestXXX.dup
114
+ ary = data.read_ber(Net::SNMP::AsnSyntax)
115
+ pdu = Net::SnmpPdu.parse(ary)
116
+ assert_equal("xxxxxx", pdu.community)
117
+ end
118
+
119
+ end
@@ -0,0 +1,40 @@
1
+ require File.expand_path('../test_helper', __FILE__)
2
+ require 'timeout'
3
+
4
+ class TestSSLBER < Test::Unit::TestCase
5
+ # Transmits str to @to and reads it back from @from.
6
+ #
7
+ def transmit(str)
8
+ Timeout::timeout(1) do
9
+ @to.write(str)
10
+ @to.close
11
+
12
+ @from.read
13
+ end
14
+ end
15
+
16
+ def setup
17
+ @from, @to = IO.pipe
18
+
19
+ # The production code operates on sockets, which do need #connect called
20
+ # on them to work. Pipes are more robust for this test, so we'll skip
21
+ # the #connect call since it fails.
22
+ #
23
+ # TODO: Replace test with real socket
24
+ # https://github.com/ruby-ldap/ruby-net-ldap/pull/121#discussion_r18746386
25
+ flexmock(OpenSSL::SSL::SSLSocket).
26
+ new_instances.should_receive(:connect => nil)
27
+
28
+ @to = Net::LDAP::Connection.wrap_with_ssl(@to)
29
+ @from = Net::LDAP::Connection.wrap_with_ssl(@from)
30
+ end
31
+
32
+ def test_transmit_strings
33
+ assert_equal "foo", transmit("foo")
34
+ end
35
+
36
+ def test_transmit_ber_encoded_numbers
37
+ @to.write 1234.to_ber
38
+ assert_equal 1234, @from.read_ber
39
+ end
40
+ end
@@ -0,0 +1,101 @@
1
+ # $Id: testdata.ldif 50 2006-04-17 17:57:33Z blackhedd $
2
+ #
3
+ # This is test-data for an LDAP server in LDIF format.
4
+ #
5
+ dn: dc=bayshorenetworks,dc=com
6
+ objectClass: dcObject
7
+ objectClass: organization
8
+ o: Bayshore Networks LLC
9
+ dc: bayshorenetworks
10
+
11
+ dn: cn=Manager,dc=bayshorenetworks,dc=com
12
+ objectClass: organizationalrole
13
+ cn: Manager
14
+
15
+ dn: ou=people,dc=bayshorenetworks,dc=com
16
+ objectClass: organizationalunit
17
+ ou: people
18
+
19
+ dn: ou=privileges,dc=bayshorenetworks,dc=com
20
+ objectClass: organizationalunit
21
+ ou: privileges
22
+
23
+ dn: ou=roles,dc=bayshorenetworks,dc=com
24
+ objectClass: organizationalunit
25
+ ou: roles
26
+
27
+ dn: ou=office,dc=bayshorenetworks,dc=com
28
+ objectClass: organizationalunit
29
+ ou: office
30
+
31
+ dn: mail=nogoodnik@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
32
+ cn: Bob Fosse
33
+ mail: nogoodnik@steamheat.net
34
+ sn: Fosse
35
+ ou: people
36
+ objectClass: top
37
+ objectClass: inetorgperson
38
+ objectClass: authorizedperson
39
+ hasAccessRole: uniqueIdentifier=engineer,ou=roles
40
+ hasAccessRole: uniqueIdentifier=ldapadmin,ou=roles
41
+ hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
42
+ hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
43
+ hasAccessRole: uniqueIdentifier=ogilvy_eagle_user,ou=roles
44
+ hasAccessRole: uniqueIdentifier=greenplug_user,ou=roles
45
+ hasAccessRole: uniqueIdentifier=brandplace_logging_user,ou=roles
46
+ hasAccessRole: uniqueIdentifier=brandplace_report_user,ou=roles
47
+ hasAccessRole: uniqueIdentifier=workorder_user,ou=roles
48
+ hasAccessRole: uniqueIdentifier=bayshore_eagle_user,ou=roles
49
+ hasAccessRole: uniqueIdentifier=bayshore_eagle_superuser,ou=roles
50
+ hasAccessRole: uniqueIdentifier=kledaras_user,ou=roles
51
+
52
+ dn: mail=elephant@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
53
+ cn: Gwen Verdon
54
+ mail: elephant@steamheat.net
55
+ sn: Verdon
56
+ ou: people
57
+ objectClass: top
58
+ objectClass: inetorgperson
59
+ objectClass: authorizedperson
60
+ hasAccessRole: uniqueIdentifier=brandplace_report_user,ou=roles
61
+ hasAccessRole: uniqueIdentifier=engineer,ou=roles
62
+ hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
63
+ hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
64
+ hasAccessRole: uniqueIdentifier=ldapadmin,ou=roles
65
+
66
+ dn: uniqueIdentifier=engineering,ou=privileges,dc=bayshorenetworks,dc=com
67
+ uniqueIdentifier: engineering
68
+ ou: privileges
69
+ objectClass: accessPrivilege
70
+
71
+ dn: uniqueIdentifier=engineer,ou=roles,dc=bayshorenetworks,dc=com
72
+ uniqueIdentifier: engineer
73
+ ou: roles
74
+ objectClass: accessRole
75
+ hasAccessPrivilege: uniqueIdentifier=engineering,ou=privileges
76
+
77
+ dn: uniqueIdentifier=ldapadmin,ou=roles,dc=bayshorenetworks,dc=com
78
+ uniqueIdentifier: ldapadmin
79
+ ou: roles
80
+ objectClass: accessRole
81
+
82
+ dn: uniqueIdentifier=ldapsuperadmin,ou=roles,dc=bayshorenetworks,dc=com
83
+ uniqueIdentifier: ldapsuperadmin
84
+ ou: roles
85
+ objectClass: accessRole
86
+
87
+ dn: mail=catperson@steamheat.net,ou=people,dc=bayshorenetworks,dc=com
88
+ cn: Sid Sorokin
89
+ mail: catperson@steamheat.net
90
+ sn: Sorokin
91
+ ou: people
92
+ objectClass: top
93
+ objectClass: inetorgperson
94
+ objectClass: authorizedperson
95
+ hasAccessRole: uniqueIdentifier=engineer,ou=roles
96
+ hasAccessRole: uniqueIdentifier=ogilvy_elephant_user,ou=roles
97
+ hasAccessRole: uniqueIdentifier=ldapsuperadmin,ou=roles
98
+ hasAccessRole: uniqueIdentifier=ogilvy_eagle_user,ou=roles
99
+ hasAccessRole: uniqueIdentifier=greenplug_user,ou=roles
100
+ hasAccessRole: uniqueIdentifier=workorder_user,ou=roles
101
+