samba-tool: Use self.outf in a few more places.
authorJelmer Vernooij <jelmer@samba.org>
Wed, 12 Oct 2011 22:36:44 +0000 (00:36 +0200)
committerJelmer Vernooij <jelmer@samba.org>
Thu, 13 Oct 2011 03:06:52 +0000 (05:06 +0200)
Autobuild-User: Jelmer Vernooij <jelmer@samba.org>
Autobuild-Date: Thu Oct 13 05:06:52 CEST 2011 on sn-devel-104

13 files changed:
source4/scripting/python/samba/netcmd/__init__.py
source4/scripting/python/samba/netcmd/dbcheck.py
source4/scripting/python/samba/netcmd/dsacl.py
source4/scripting/python/samba/netcmd/fsmo.py
source4/scripting/python/samba/netcmd/gpo.py
source4/scripting/python/samba/netcmd/group.py
source4/scripting/python/samba/netcmd/ldapcmp.py
source4/scripting/python/samba/netcmd/ntacl.py
source4/scripting/python/samba/netcmd/rodc.py
source4/scripting/python/samba/netcmd/spn.py
source4/scripting/python/samba/netcmd/testparm.py
source4/scripting/python/samba/netcmd/time.py
source4/scripting/python/samba/netcmd/user.py

index 49e03800d681ac28459b725a27ae6690c22e6c88..33ed3d557892a19df8a825867a521b66f7497e38 100644 (file)
@@ -100,7 +100,7 @@ class Command(object):
         return parser, optiongroups
 
     def message(self, text):
-        print text
+        self.outf.write(text+"\n")
 
     def _run(self, *argv):
         parser, optiongroups = self._create_parser()
@@ -162,17 +162,17 @@ class SuperCommand(Command):
             usage = "samba-tool <subcommand>"
         else:
             usage = "samba-tool %s <subcommand>" % myname
-        print "Usage: %s [options]" %usage        
-        print "Available subcommands:"
+        self.outf.write("Usage: %s [options]\n" % usage)
+        self.outf.write("Available subcommands:\n")
         subcmds = self.subcommands.keys()
         subcmds.sort()
-        max_length = max(map(lambda c: len(c), subcmds))
+        max_length = max([len(c) for c in subcmds])
         for cmd in subcmds:
-            print "  %*s  - %s" % (-max_length, cmd, self.subcommands[cmd].description)
+            self.outf.write("  %*s  - %s\n" % (-max_length, cmd, self.subcommands[cmd].description))
         if subcommand in [None]:
             raise CommandError("You must specify a subcommand")
         if subcommand in ['help', '-h', '--help']:
-            print "For more help on a specific subcommand, please type: %s (-h|--help)" % usage
+            self.outf.write("For more help on a specific subcommand, please type: %s (-h|--help)\n" % usage)
             return 0
         raise CommandError("No such subcommand '%s'" % subcommand)
 
index 7840a61725741ae6ed048eb92aa7b179172f12c1..44f3dedf34196ce32c610ce7cb985d0f3079e663 100644 (file)
@@ -56,8 +56,10 @@ class cmd_dbcheck(Command):
                type=str, metavar="URL", dest="H"),
         ]
 
-    def run(self, DN=None, H=None, verbose=False, fix=False, yes=False, cross_ncs=False, quiet=False,
-            scope="SUB", credopts=None, sambaopts=None, versionopts=None, attrs=None, reindex=False):
+    def run(self, DN=None, H=None, verbose=False, fix=False, yes=False,
+            cross_ncs=False, quiet=False,
+            scope="SUB", credopts=None, sambaopts=None, versionopts=None,
+            attrs=None, reindex=False):
 
         lp = sambaopts.get_loadparm()
 
@@ -77,7 +79,7 @@ class cmd_dbcheck(Command):
             samdb_schema = SamDB(session_info=system_session(), url=None,
                                  credentials=creds, lp=lp)
 
-        scope_map = { "SUB": ldb.SCOPE_SUBTREE, "BASE":ldb.SCOPE_BASE, "ONE":ldb.SCOPE_ONELEVEL }
+        scope_map = { "SUB": ldb.SCOPE_SUBTREE, "BASE": ldb.SCOPE_BASE, "ONE":ldb.SCOPE_ONELEVEL }
         scope = scope.upper()
         if not scope in scope_map:
             raise CommandError("Unknown scope %s" % scope)
@@ -95,7 +97,6 @@ class cmd_dbcheck(Command):
             attrs = attrs.split()
 
         started_transaction = False
-
         if yes and fix:
             samdb.transaction_start()
             started_transaction = True
@@ -104,10 +105,10 @@ class cmd_dbcheck(Command):
                     fix=fix, yes=yes, quiet=quiet)
 
             if reindex:
-                print("Re-indexing...")
+                self.outf.write("Re-indexing...\n")
                 error_count = 0
                 if chk.reindex_database():
-                    print("completed re-index OK")
+                    self.outf.write("completed re-index OK\n")
             else:
                 error_count = chk.check_database(DN=DN, scope=search_scope,
                         controls=controls, attrs=attrs)
index 78dae43764e19efa96fea5c8240696185f5a388d..97d4eb8534dbafdaf93c2e1a9675b8757040b224 100644 (file)
@@ -129,8 +129,8 @@ class cmd_dsacl_set(Command):
     def print_new_acl(self, samdb, object_dn):
         desc = self.read_descriptor(samdb, object_dn)
         desc_sddl = desc.as_sddl(self.get_domain_sid(samdb))
-        print "new descriptor for %s:" % object_dn
-        print desc_sddl
+        self.outf.write("new descriptor for %s:\n" % object_dn)
+        self.outf.write(desc_sddl + "\n")
 
     def run(self, car, action, objectdn, trusteedn, sddl,
             H=None, credopts=None, sambaopts=None, versionopts=None):
index 06a2de1c2cfc62a9f339a35262a48922044599d9..e8e24b2de145e36678df9a9a97138505d13ceb43 100644 (file)
@@ -95,7 +95,7 @@ all=all of the above"""),
             samdb.modify(m)
         except LdbError, (num, msg):
             raise CommandError("Failed to initiate role seize of '%s' role: %s" % (role, msg))
-        print("FSMO transfer of '%s' role successful" % role)
+        self.outf.write("FSMO transfer of '%s' role successful\n" % role)
 
     def run(self, force=None, H=None, role=None,
             credopts=None, sambaopts=None, versionopts=None):
@@ -231,7 +231,7 @@ all=all of the above"""),
             samdb.modify(m)
         except LdbError, (num, msg):
             raise CommandError("Failed to initiate transfer of '%s' role: %s" % (role, msg))
-        print("FSMO transfer of '%s' role successful" % role)    
+        self.outf.write("FSMO transfer of '%s' role successful\n" % role)
 
     def run(self, force=None, H=None, role=None,
             credopts=None, sambaopts=None, versionopts=None):
index 8b96d37d50b609626b64c67e5285efc36de57ccc..0d96dbc56fc88e7cb6474aaf7d12d99e80f8eed2 100644 (file)
@@ -256,13 +256,13 @@ class cmd_listall(Command):
         msg = get_gpo_info(self.samdb, None)
 
         for m in msg:
-            print("GPO          : %s" % m['name'][0])
-            print("display name : %s" % m['displayName'][0])
-            print("path         : %s" % m['gPCFileSysPath'][0])
-            print("dn           : %s" % m.dn)
-            print("version      : %s" % attr_default(m, 'versionNumber', '0'))
-            print("flags        : %s" % gpo_flags_string(int(attr_default(m, 'flags', 0))))
-            print("")
+            self.outf.write("GPO          : %s\n" % m['name'][0])
+            self.outf.write("display name : %s\n" % m['displayName'][0])
+            self.outf.write("path         : %s\n" % m['gPCFileSysPath'][0])
+            self.outf.write("dn           : %s\n" % m.dn)
+            self.outf.write("version      : %s\n" % attr_default(m, 'versionNumber', '0'))
+            self.outf.write("flags        : %s\n" % gpo_flags_string(int(attr_default(m, 'flags', 0))))
+            self.outf.write("\n")
 
 
 class cmd_list(Command):
@@ -331,7 +331,8 @@ class cmd_list(Command):
                                                  attrs=['name', 'displayName', 'flags',
                                                         'ntSecurityDescriptor'])
                     except Exception:
-                        print("Failed to fetch gpo object %s" % g['dn'])
+                        self.outf.write("Failed to fetch gpo object %s\n" %
+                            g['dn'])
                         continue
 
                     secdesc_ndr = gmsg[0]['ntSecurityDescriptor'][0]
@@ -343,7 +344,7 @@ class cmd_list(Command):
                                                     dcerpc.security.SEC_ADS_LIST |
                                                     dcerpc.security.SEC_ADS_READ_PROP)
                     except RuntimeError:
-                        print("Failed access check on %s" % msg.dn)
+                        self.outf.write("Failed access check on %s\n" % msg.dn)
                         continue
 
                     # check the flags on the GPO
@@ -368,9 +369,9 @@ class cmd_list(Command):
         else:
             msg_str = 'user'
 
-        print("GPOs for %s %s" % (msg_str, username))
+        self.outf.write("GPOs for %s %s\n" % (msg_str, username))
         for g in gpos:
-            print("    %s %s" % (g[0], g[1]))
+            self.outf.write("    %s %s\n" % (g[0], g[1]))
 
 
 class cmd_show(Command):
@@ -407,14 +408,14 @@ class cmd_show(Command):
         secdesc_ndr = msg['ntSecurityDescriptor'][0]
         secdesc = ndr_unpack(dcerpc.security.descriptor, secdesc_ndr)
 
-        print("GPO          : %s" % msg['name'][0])
-        print("display name : %s" % msg['displayName'][0])
-        print("path         : %s" % msg['gPCFileSysPath'][0])
-        print("dn           : %s" % msg.dn)
-        print("version      : %s" % attr_default(msg, 'versionNumber', '0'))
-        print("flags        : %s" % gpo_flags_string(int(attr_default(msg, 'flags', 0))))
-        print("ACL          : %s" % secdesc.as_sddl())
-        print("")
+        self.outf.write("GPO          : %s\n" % msg['name'][0])
+        self.outf.write("display name : %s\n" % msg['displayName'][0])
+        self.outf.write("path         : %s\n" % msg['gPCFileSysPath'][0])
+        self.outf.write("dn           : %s\n" % msg.dn)
+        self.outf.write("version      : %s\n" % attr_default(msg, 'versionNumber', '0'))
+        self.outf.write("flags        : %s\n" % gpo_flags_string(int(attr_default(msg, 'flags', 0))))
+        self.outf.write("ACL          : %s\n" % secdesc.as_sddl())
+        self.outf.write("\n")
 
 
 class cmd_getlink(Command):
@@ -452,16 +453,16 @@ class cmd_getlink(Command):
             raise CommandError("Could not find Container DN %s (%s)" % container_dn, e)
 
         if 'gPLink' in msg:
-            print("GPO(s) linked to DN %s" % container_dn)
+            self.outf.write("GPO(s) linked to DN %s\n" % container_dn)
             gplist = parse_gplink(msg['gPLink'][0])
             for g in gplist:
                 msg = get_gpo_info(self.samdb, dn=g['dn'])
-                print("    GPO     : %s" % msg[0]['name'][0])
-                print("    Name    : %s" % msg[0]['displayName'][0])
-                print("    Options : %s" % gplink_options_string(g['options']))
-                print("")
+                self.outf.write("    GPO     : %s\n" % msg[0]['name'][0])
+                self.outf.write("    Name    : %s\n" % msg[0]['displayName'][0])
+                self.outf.write("    Options : %s\n" % gplink_options_string(g['options']))
+                self.outf.write("\n")
         else:
-            print("No GPO(s) linked to DN=%s" % container_dn)
+            self.outf.write("No GPO(s) linked to DN=%s\n" % container_dn)
 
 
 class cmd_setlink(Command):
@@ -548,7 +549,7 @@ class cmd_setlink(Command):
         except Exception, e:
             raise CommandError("Error adding GPO Link", e)
 
-        print("Added/Updated GPO link")
+        self.outf.write("Added/Updated GPO link\n")
         cmd_getlink().run(container_dn, H, sambaopts, credopts, versionopts)
 
 
@@ -617,7 +618,7 @@ class cmd_dellink(Command):
         except Exception, e:
             raise CommandError("Error Removing GPO Link (%s)" % e)
 
-        print("Deleted GPO link.")
+        self.outf.write("Deleted GPO link.\n")
         cmd_getlink().run(container_dn, H, sambaopts, credopts, versionopts)
 
 
@@ -660,9 +661,9 @@ class cmd_getinheritance(Command):
             inheritance = int(msg['gPOptions'][0])
 
         if inheritance == dsdb.GPO_BLOCK_INHERITANCE:
-            print("Container has GPO_BLOCK_INHERITANCE")
+            self.outf.write("Container has GPO_BLOCK_INHERITANCE\n")
         else:
-            print("Container has GPO_INHERIT")
+            self.outf.write("Container has GPO_INHERIT\n")
 
 
 class cmd_setinheritance(Command):
@@ -783,8 +784,9 @@ class cmd_fetch(Command):
             os.mkdir(gpodir)
             copy_directory_remote_to_local(conn, sharepath, gpodir)
         except Exception, e:
+            # FIXME: Catch more specific exception
             raise CommandError("Error copying GPO from DC", e)
-        print('GPO copied to %s' % gpodir)
+        self.outf.write('GPO copied to %s\n' % gpodir)
 
 
 class cmd_create(Command):
@@ -951,7 +953,7 @@ class cmd_create(Command):
         except Exception, e:
             raise CommandError("Error setting ACL on GPT", e)
 
-        print "GPO '%s' created as %s" % (displayname, gpo)
+        self.outf.write("GPO '%s' created as %s\n" % (displayname, gpo))
 
 
 class cmd_gpo(SuperCommand):
index 90bee5f636ad4d3c2d018249ea12ff631f694a38..db2a6d62695c39e81a695dd98ebc59b58afb9a7d 100644 (file)
@@ -80,8 +80,9 @@ class cmd_group_add(Command):
             samdb.newgroup(groupname, groupou=groupou, grouptype = gtype,
                           description=description, mailaddress=mail_address, notes=notes)
         except Exception, e:
+            # FIXME: catch more specific exception
             raise CommandError('Failed to create group "%s"' % groupname, e)
-        print("Added group %s" % groupname)
+        self.outf.write("Added group %s\n" % groupname)
 
 
 class cmd_group_delete(Command):
@@ -106,8 +107,9 @@ class cmd_group_delete(Command):
                           credentials=creds, lp=lp)
             samdb.deletegroup(groupname)
         except Exception, e:
+            # FIXME: catch more specific exception
             raise CommandError('Failed to remove group "%s"' % groupname, e)
-        print("Deleted group %s" % groupname)
+        self.outf.write("Deleted group %s\n" % groupname)
 
 
 class cmd_group_add_members(Command):
@@ -133,8 +135,10 @@ class cmd_group_add_members(Command):
                           credentials=creds, lp=lp)
             samdb.add_remove_group_members(groupname, listofmembers, add_members_operation=True)
         except Exception, e:
-            raise CommandError('Failed to add members "%s" to group "%s"' % (listofmembers, groupname), e)
-        print("Added members to group %s" % groupname)
+            # FIXME: catch more specific exception
+            raise CommandError('Failed to add members "%s" to group "%s"' % (
+                listofmembers, groupname), e)
+        self.outf.write("Added members to group %s\n" % groupname)
 
 
 class cmd_group_remove_members(Command):
@@ -160,8 +164,9 @@ class cmd_group_remove_members(Command):
                           credentials=creds, lp=lp)
             samdb.add_remove_group_members(groupname, listofmembers, add_members_operation=False)
         except Exception, e:
+            # FIXME: Catch more specific exception
             raise CommandError('Failed to remove members "%s" from group "%s"' % (listofmembers, groupname), e)
-        print("Removed members from group %s" % groupname)
+        self.outf.write("Removed members from group %s\n" % groupname)
 
 
 class cmd_group(SuperCommand):
index cd81aa33d861a255f8b5461fa72f761fbc91016c..7805eca6cf96e64d666e4f2a670a7142d8e6eb47 100755 (executable)
@@ -85,11 +85,15 @@ class LDAPBase(object):
         # Log some domain controller specific place-holers that are being used
         # when compare content of two DCs. Uncomment for DEBUG purposes.
         if self.two_domains and not self.quiet:
-            print "\n* Place-holders for %s:" % self.host
-            print 4*" " + "${DOMAIN_DN}      => %s" % self.base_dn
-            print 4*" " + "${DOMAIN_NETBIOS} => %s" % self.domain_netbios
-            print 4*" " + "${SERVER_NAME}     => %s" % self.server_names
-            print 4*" " + "${DOMAIN_NAME}    => %s" % self.domain_name
+            self.outf.write("\n* Place-holders for %s:\n" % self.host)
+            self.outf.write(4*" " + "${DOMAIN_DN}      => %s\n" %
+                self.base_dn)
+            self.outf.write(4*" " + "${DOMAIN_NETBIOS} => %s\n" %
+                self.domain_netbios)
+            self.outf.write(4*" " + "${SERVER_NAME}     => %s\n" %
+                self.server_names)
+            self.outf.write(4*" " + "${DOMAIN_NAME}    => %s\n" %
+                self.domain_name)
 
     def find_domain_sid(self):
         res = self.ldb.search(base=self.base_dn, expression="(objectClass=*)", scope=SCOPE_BASE)
@@ -493,7 +497,7 @@ class LDAPObject(object):
         Log on the screen if there is no --quiet oprion set
         """
         if not self.quiet:
-            print msg
+            self.outf.write(msg+"\n")
 
     def fix_dn(self, s):
         res = "%s" % s
@@ -665,6 +669,7 @@ class LDAPObject(object):
 
 
 class LDAPBundel(object):
+
     def __init__(self, connection, context, dn_list=None, filter_list=None):
         self.con = connection
         self.two_domains = self.con.two_domains
@@ -705,7 +710,7 @@ class LDAPBundel(object):
         Log on the screen if there is no --quiet oprion set
         """
         if not self.quiet:
-            print msg
+            self.outf.write(msg+"\n")
 
     def update_size(self):
         self.size = len(self.dn_list)
@@ -820,7 +825,7 @@ class LDAPBundel(object):
         try:
             res = self.con.ldb.search(base=self.search_base, scope=self.search_scope, attrs=["dn"])
         except LdbError, (enum, estr):
-            print("Failed search of base=%s" % self.search_base)
+            self.outf.write("Failed search of base=%s\n" % self.search_base)
             raise
         for x in res:
            dn_list.append(x["dn"].get_linearized())
@@ -842,6 +847,7 @@ class LDAPBundel(object):
             self.log( "".join([str("\n" + 4*" " + x) for x in self.summary["df_value_attrs"]]) )
             self.summary["df_value_attrs"] = []
 
+
 class cmd_ldapcmp(Command):
     """compare two ldap databases"""
     synopsis = "%prog ldapcmp <URL1> <URL2> (domain|configuration|schema) [options]"
@@ -942,22 +948,23 @@ class cmd_ldapcmp(Command):
         status = 0
         for context in contexts:
             if not quiet:
-                print "\n* Comparing [%s] context..." % context
+                self.outf.write("\n* Comparing [%s] context...\n" % context)
 
             b1 = LDAPBundel(con1, context=context, filter_list=filter_list)
             b2 = LDAPBundel(con2, context=context, filter_list=filter_list)
 
             if b1 == b2:
                 if not quiet:
-                    print "\n* Result for [%s]: SUCCESS" % context
+                    self.outf.write("\n* Result for [%s]: SUCCESS\n" %
+                        context)
             else:
                 if not quiet:
-                    print "\n* Result for [%s]: FAILURE" % context
+                    self.outf.write("\n* Result for [%s]: FAILURE\n" % context)
                     if not descriptor:
                         assert len(b1.summary["df_value_attrs"]) == len(b2.summary["df_value_attrs"])
                         b2.summary["df_value_attrs"] = []
-                        print "\nSUMMARY"
-                        print "---------"
+                        self.outf.write("\nSUMMARY\n")
+                        self.outf.write("---------\n")
                         b1.print_summary()
                         b2.print_summary()
                 # mark exit status as FAILURE if a least one comparison failed
index d93835bda12c8df2cc704a16f0ec4b351b498d5a..1948309ca8de244764496f3fb5c9120908698a11 100644 (file)
@@ -65,7 +65,6 @@ class cmd_ntacl_set(Command):
         except Exception, e:
             raise CommandError("Unable to read domain SID from configuration files", e)
         attrs = ["objectSid"]
-        print lp.get("realm")
         res = ldb.search(expression="(objectClass=*)",
             base="flatname=%s,cn=Primary Domains" % lp.get("workgroup"),
             scope=SCOPE_BASE, attrs=attrs)
@@ -97,12 +96,11 @@ class cmd_ntacl_get(Command):
         acl = getntacl(lp, file, xattr_backend, eadb_file)
         if as_sddl:
             anysid = security.dom_sid(security.SID_NT_SELF)
-            print acl.info.as_sddl(anysid)
+            self.outf.write(acl.info.as_sddl(anysid)+"\n")
         else:
             acl.dump()
 
 
-
 class cmd_ntacl(SuperCommand):
     """NT ACLs manipulation"""
 
index 67c23dcf6fc9b108d7ccdfd03c693091ee23eac4..b2a5e3f72007fa61885874a9bd2deba7fc78614d 100644 (file)
@@ -90,7 +90,7 @@ class cmd_rodc_preload(Command):
         source_dsa_invocation_id = misc.GUID(local_samdb.schema_format_value("objectGUID", res[0]["invocationId"][0]))
 
         dn = self.get_dn(samdb, account)
-        print "Replicating DN %s" % dn
+        self.outf.write("Replicating DN %s\n" % dn)
 
         destination_dsa_guid = misc.GUID(local_samdb.get_ntds_GUID())
 
index 6c36f6ca4c71475408665f545463222a0fc28f82..614710c973cb0c8a56aa7fc5c8cf5d836eca86b0 100644 (file)
@@ -50,7 +50,7 @@ class cmd_spn_list(Command):
         # TODO once I understand how, use the domain info to naildown
         # to the correct domain
         (cleaneduser, realm, domain) = _get_user_realm_domain(user)
-        print cleaneduser
+        self.outf.write(cleaneduser+"\n")
         res = sam.search(expression="samaccountname=%s" % ldb.binary_encode(cleaneduser),
                             scope=ldb.SCOPE_SUBTREE,
                             attrs=["servicePrincipalName"])
@@ -59,11 +59,14 @@ class cmd_spn_list(Command):
             found = False
             flag = ldb.FLAG_MOD_ADD
             if spns != None:
-                print "User %s has the following servicePrincipalName: " %  str(res[0].dn)
+                self.outf.write(
+                    "User %s has the following servicePrincipalName: \n" %
+                    res[0].dn)
                 for e in spns:
-                    print "\t %s" % (str(e))
+                    self.outf.write("\t %s\n" % e)
             else:
-                print "User %s has no servicePrincipalName" % str(res[0].dn)
+                self.outf.write("User %s has no servicePrincipalName" %
+                    res[0].dn)
         else:
             raise CommandError("User %s not found" % user)
 
index b9979770e60ccbccbe0fbe7075cdc04bfe9b78fe..9de6fdfa20556469a0373304a83d839271bae12c 100755 (executable)
@@ -106,10 +106,10 @@ class cmd_testparm(Command):
                 if parameter_name is None:
                     lp[section_name].dump(sys.stdout, lp.default_service, verbose)
                 else:
-                    print lp.get(parameter_name, section_name)
+                    self.outf.write(lp.get(parameter_name, section_name)+"\n")
             else:
                 if not suppress_prompt:
-                    print "Press enter to see a dump of your service definitions"
+                    self.outf.write("Press enter to see a dump of your service definitions\n")
                     sys.stdin.readline()
                 lp.dump(sys.stdout, verbose)
         if valid:
index 9b520944847c194d777f98f5493d8e84ccbd9fea..31a6f7c627843c7f6e4aaa3cf0406e6b4053b813 100644 (file)
@@ -39,4 +39,4 @@ class cmd_time(Command):
         net = Net(creds, lp, server=credopts.ipaddress)
         if server_name is None:
             server_name = common.netcmd_dnsname(lp)
-        print net.time(server_name)
+        self.outf.write(net.time(server_name)+"\n")
index 5af80ffd74f6008e962c0f8ab3a0728f90199415..215fd155338afc3209edb2444aa13f7cbe50a96c 100644 (file)
@@ -101,8 +101,7 @@ class cmd_user_add(Command):
         except Exception, e:
             raise CommandError("Failed to add user '%s': " % username, e)
 
-        print("User '%s' created successfully" % username)
-
+        self.outf.write("User '%s' created successfully\n" % username)
 
 
 class cmd_user_delete(Command):
@@ -128,8 +127,7 @@ class cmd_user_delete(Command):
             samdb.deleteuser(username)
         except Exception, e:
             raise CommandError('Failed to remove user "%s"' % username, e)
-        print("Deleted user %s" % username)
-
+        self.outf.write("Deleted user %s\n" % username)
 
 
 class cmd_user_enable(Command):
@@ -162,8 +160,7 @@ class cmd_user_enable(Command):
             samdb.enable_account(filter)
         except Exception, msg:
             raise CommandError("Failed to enable user '%s': %s" % (username or filter, msg))
-        print("Enabled user '%s'" % (username or filter))
-
+        self.outf.write("Enabled user '%s'\n" % (username or filter))
 
 
 class cmd_user_setexpiry(Command):
@@ -198,9 +195,11 @@ class cmd_user_setexpiry(Command):
         try:
             samdb.setexpiry(filter, days*24*3600, no_expiry_req=noexpiry)
         except Exception, msg:
-            raise CommandError("Failed to set expiry for user '%s': %s" % (username or filter, msg))
-        print("Set expiry for user '%s' to %u days" % (username or filter, days))
-
+            # FIXME: Catch more specific exception
+            raise CommandError("Failed to set expiry for user '%s': %s" % (
+                username or filter, msg))
+        self.outf.write("Set expiry for user '%s' to %u days\n" % (
+            username or filter, days))
 
 
 class cmd_user_password(Command):
@@ -232,9 +231,9 @@ class cmd_user_password(Command):
         try:
             net.change_password(password)
         except Exception, msg:
+            # FIXME: catch more specific exception
             raise CommandError("Failed to change password : %s" % msg)
-        print "Changed password OK"
-
+        self.outf.write("Changed password OK\n")
 
 
 class cmd_user_setpassword(Command):
@@ -282,8 +281,9 @@ class cmd_user_setpassword(Command):
                               force_change_at_next_login=must_change_at_next_login,
                               username=username)
         except Exception, msg:
+            # FIXME: catch more specific exception
             raise CommandError("Failed to set password for user '%s': %s" % (username or filter, msg))
-        print "Changed password OK"
+        self.outf.write("Changed password OK\n")