1 # Unix SMB/CIFS implementation.
2 # Copyright (C) Sean Dague <sdague@linux.vnet.ibm.com> 2011
4 # This program is free software; you can redistribute it and/or modify
5 # it under the terms of the GNU General Public License as published by
6 # the Free Software Foundation; either version 3 of the License, or
7 # (at your option) any later version.
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
14 # You should have received a copy of the GNU General Public License
15 # along with this program. If not, see <http://www.gnu.org/licenses/>.
22 from samba.tests.samba_tool.base import SambaToolCmdTest
28 from samba.ndr import ndr_unpack
29 from samba.dcerpc import drsblobs
31 class UserCmdTestCase(SambaToolCmdTest):
32 """Tests for samba-tool user subcommands"""
37 super(UserCmdTestCase, self).setUp()
38 self.samdb = self.getSamDB("-H", "ldap://%s" % os.environ["DC_SERVER"],
39 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
41 self.users.append(self._randomUser({"name": "sambatool1", "company": "comp1"}))
42 self.users.append(self._randomUser({"name": "sambatool2", "company": "comp1"}))
43 self.users.append(self._randomUser({"name": "sambatool3", "company": "comp2"}))
44 self.users.append(self._randomUser({"name": "sambatool4", "company": "comp2"}))
45 self.users.append(self._randomPosixUser({"name": "posixuser1"}))
46 self.users.append(self._randomPosixUser({"name": "posixuser2"}))
47 self.users.append(self._randomPosixUser({"name": "posixuser3"}))
48 self.users.append(self._randomPosixUser({"name": "posixuser4"}))
50 # setup the 8 users and ensure they are correct
51 for user in self.users:
52 (result, out, err) = user["createUserFn"](user)
54 self.assertCmdSuccess(result, out, err)
55 self.assertEquals(err,"","Shouldn't be any error messages")
56 self.assertIn("User '%s' created successfully" % user["name"], out)
58 user["checkUserFn"](user)
62 super(UserCmdTestCase, self).tearDown()
63 # clean up all the left over users, just in case
64 for user in self.users:
65 if self._find_user(user["name"]):
66 self.runsubcmd("user", "delete", user["name"])
69 def test_newuser(self):
70 # try to add all the users again, this should fail
71 for user in self.users:
72 (result, out, err) = self._create_user(user)
73 self.assertCmdFail(result, "Ensure that create user fails")
74 self.assertIn("LDAP error 68 LDAP_ENTRY_ALREADY_EXISTS", err)
76 # try to delete all the 4 users we just added
77 for user in self.users:
78 (result, out, err) = self.runsubcmd("user", "delete", user["name"])
79 self.assertCmdSuccess(result, out, err, "Can we delete users")
80 found = self._find_user(user["name"])
81 self.assertIsNone(found)
83 # test adding users with --use-username-as-cn
84 for user in self.users:
85 (result, out, err) = self.runsubcmd("user", "create", user["name"], user["password"],
86 "--use-username-as-cn",
87 "--surname=%s" % user["surname"],
88 "--given-name=%s" % user["given-name"],
89 "--job-title=%s" % user["job-title"],
90 "--department=%s" % user["department"],
91 "--description=%s" % user["description"],
92 "--company=%s" % user["company"],
93 "-H", "ldap://%s" % os.environ["DC_SERVER"],
94 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
96 self.assertCmdSuccess(result, out, err)
97 self.assertEquals(err,"","Shouldn't be any error messages")
98 self.assertIn("User '%s' created successfully" % user["name"], out)
100 found = self._find_user(user["name"])
102 self.assertEquals("%s" % found.get("cn"), "%(name)s" % user)
103 self.assertEquals("%s" % found.get("name"), "%(name)s" % user)
105 def _verify_supplementalCredentials(self, ldif,
108 msgs = self.samdb.parse_ldif(ldif)
109 (changetype, obj) = next(msgs)
111 self.assertIn("supplementalCredentials", obj, "supplementalCredentials attribute required")
112 sc_blob = obj["supplementalCredentials"][0]
113 sc = ndr_unpack(drsblobs.supplementalCredentialsBlob, sc_blob)
115 self.assertGreaterEqual(sc.sub.num_packages,
116 min_packages, "min_packages check")
117 self.assertLessEqual(sc.sub.num_packages,
118 max_packages, "max_packages check")
120 if max_packages == 0:
123 def find_package(packages, name, start_idx=0):
124 for i in range(start_idx, len(packages)):
125 if packages[i].name == name:
126 return (i, packages[i])
129 # The ordering is this
131 # Primary:Kerberos-Newer-Keys (optional)
134 # Primary:CLEARTEXT (optional)
135 # Primary:SambaGPG (optional)
137 # And the 'Packages' package is insert before the last
141 (pidx, pp) = find_package(sc.sub.packages, "Packages", start_idx=nidx)
142 self.assertIsNotNone(pp, "Packages required")
143 self.assertEqual(pidx + 1, sc.sub.num_packages - 1,
144 "Packages needs to be at num_packages - 1")
146 (knidx, knp) = find_package(sc.sub.packages, "Primary:Kerberos-Newer-Keys",
148 if knidx is not None:
149 self.assertEqual(knidx, nidx, "Primary:Kerberos-Newer-Keys at wrong position")
154 (kidx, kp) = find_package(sc.sub.packages, "Primary:Kerberos",
156 self.assertIsNotNone(pp, "Primary:Kerberos required")
157 self.assertEqual(kidx, nidx, "Primary:Kerberos at wrong position")
162 (widx, wp) = find_package(sc.sub.packages, "Primary:WDigest",
164 self.assertIsNotNone(pp, "Primary:WDigest required")
165 self.assertEqual(widx, nidx, "Primary:WDigest at wrong position")
170 (cidx, cp) = find_package(sc.sub.packages, "Primary:CLEARTEXT",
173 self.assertEqual(cidx, nidx, "Primary:CLEARTEXT at wrong position")
178 (gidx, gp) = find_package(sc.sub.packages, "Primary:SambaGPG",
181 self.assertEqual(gidx, nidx, "Primary:SambaGPG at wrong position")
186 self.assertEqual(nidx, sc.sub.num_packages, "Unknown packages found")
188 def test_setpassword(self):
189 for user in self.users:
190 newpasswd = self.randomPass()
191 (result, out, err) = self.runsubcmd("user", "setpassword",
193 "--newpassword=%s" % newpasswd,
194 "-H", "ldap://%s" % os.environ["DC_SERVER"],
195 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
196 self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
197 self.assertEquals(err,"","setpassword with url")
198 self.assertMatch(out, "Changed password OK", "setpassword with url")
200 attributes = "sAMAccountName,unicodePwd,supplementalCredentials,virtualClearTextUTF8,virtualClearTextUTF16,virtualSSHA,virtualSambaGPG"
201 (result, out, err) = self.runsubcmd("user", "syncpasswords",
202 "--cache-ldb-initialize",
203 "--attributes=%s" % attributes,
204 "--decrypt-samba-gpg")
205 self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --cache-ldb-initialize runs")
206 self.assertEqual(err,"","getpassword without url")
208 "objectClass": { "value": "userSyncPasswords" },
210 "dirsyncFilter": { },
211 "dirsyncAttribute": { },
212 "dirsyncControl": { "value": "dirsync:1:0:0"},
213 "passwordAttribute": { },
214 "decryptSambaGPG": { },
217 for a in cache_attrs.keys():
218 v = cache_attrs[a].get("value", "")
219 self.assertMatch(out, "%s: %s" % (a, v),
220 "syncpasswords --cache-ldb-initialize: %s: %s out[%s]" % (a, v, out))
222 (result, out, err) = self.runsubcmd("user", "syncpasswords", "--no-wait")
223 self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --no-wait runs")
224 self.assertEqual(err,"","syncpasswords --no-wait")
225 self.assertMatch(out, "dirsync_loop(): results 0",
226 "syncpasswords --no-wait: 'dirsync_loop(): results 0': out[%s]" % (out))
227 for user in self.users:
228 self.assertMatch(out, "sAMAccountName: %s" % (user["name"]),
229 "syncpasswords --no-wait: 'sAMAccountName': %s out[%s]" % (user["name"], out))
231 for user in self.users:
232 newpasswd = self.randomPass()
233 creds = credentials.Credentials()
234 creds.set_anonymous()
235 creds.set_password(newpasswd)
236 nthash = creds.get_nt_hash()
237 unicodePwd = base64.b64encode(creds.get_nt_hash())
238 virtualClearTextUTF8 = base64.b64encode(newpasswd)
239 virtualClearTextUTF16 = base64.b64encode(unicode(newpasswd, 'utf-8').encode('utf-16-le'))
241 (result, out, err) = self.runsubcmd("user", "setpassword",
243 "--newpassword=%s" % newpasswd)
244 self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
245 self.assertEquals(err,"","setpassword without url")
246 self.assertMatch(out, "Changed password OK", "setpassword without url")
248 (result, out, err) = self.runsubcmd("user", "syncpasswords", "--no-wait")
249 self.assertCmdSuccess(result, out, err, "Ensure syncpasswords --no-wait runs")
250 self.assertEqual(err,"","syncpasswords --no-wait")
251 self.assertMatch(out, "dirsync_loop(): results 0",
252 "syncpasswords --no-wait: 'dirsync_loop(): results 0': out[%s]" % (out))
253 self.assertMatch(out, "sAMAccountName: %s" % (user["name"]),
254 "syncpasswords --no-wait: 'sAMAccountName': %s out[%s]" % (user["name"], out))
255 self.assertMatch(out, "# unicodePwd::: REDACTED SECRET ATTRIBUTE",
256 "getpassword '# unicodePwd::: REDACTED SECRET ATTRIBUTE': out[%s]" % out)
257 self.assertMatch(out, "unicodePwd:: %s" % unicodePwd,
258 "getpassword unicodePwd: out[%s]" % out)
259 self.assertMatch(out, "# supplementalCredentials::: REDACTED SECRET ATTRIBUTE",
260 "getpassword '# supplementalCredentials::: REDACTED SECRET ATTRIBUTE': out[%s]" % out)
261 self.assertMatch(out, "supplementalCredentials:: ",
262 "getpassword supplementalCredentials: out[%s]" % out)
263 if "virtualSambaGPG:: " in out:
264 self.assertMatch(out, "virtualClearTextUTF8:: %s" % virtualClearTextUTF8,
265 "getpassword virtualClearTextUTF8: out[%s]" % out)
266 self.assertMatch(out, "virtualClearTextUTF16:: %s" % virtualClearTextUTF16,
267 "getpassword virtualClearTextUTF16: out[%s]" % out)
268 self.assertMatch(out, "virtualSSHA: ",
269 "getpassword virtualSSHA: out[%s]" % out)
271 (result, out, err) = self.runsubcmd("user", "getpassword",
273 "--attributes=%s" % attributes,
274 "--decrypt-samba-gpg")
275 self.assertCmdSuccess(result, out, err, "Ensure getpassword runs")
276 self.assertEqual(err,"","getpassword without url")
277 self.assertMatch(out, "Got password OK", "getpassword without url")
278 self.assertMatch(out, "sAMAccountName: %s" % (user["name"]),
279 "getpassword: 'sAMAccountName': %s out[%s]" % (user["name"], out))
280 self.assertMatch(out, "unicodePwd:: %s" % unicodePwd,
281 "getpassword unicodePwd: out[%s]" % out)
282 self.assertMatch(out, "supplementalCredentials:: ",
283 "getpassword supplementalCredentials: out[%s]" % out)
284 self._verify_supplementalCredentials(out.replace("\nGot password OK\n", ""))
285 if "virtualSambaGPG:: " in out:
286 self.assertMatch(out, "virtualClearTextUTF8:: %s" % virtualClearTextUTF8,
287 "getpassword virtualClearTextUTF8: out[%s]" % out)
288 self.assertMatch(out, "virtualClearTextUTF16:: %s" % virtualClearTextUTF16,
289 "getpassword virtualClearTextUTF16: out[%s]" % out)
290 self.assertMatch(out, "virtualSSHA: ",
291 "getpassword virtualSSHA: out[%s]" % out)
293 for user in self.users:
294 newpasswd = self.randomPass()
295 (result, out, err) = self.runsubcmd("user", "setpassword",
297 "--newpassword=%s" % newpasswd,
298 "--must-change-at-next-login",
299 "-H", "ldap://%s" % os.environ["DC_SERVER"],
300 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
301 self.assertCmdSuccess(result, out, err, "Ensure setpassword runs")
302 self.assertEquals(err,"","setpassword with forced change")
303 self.assertMatch(out, "Changed password OK", "setpassword with forced change")
308 def test_setexpiry(self):
309 twodays = time.time() + (2 * 24 * 60 * 60)
311 for user in self.users:
312 (result, out, err) = self.runsubcmd("user", "setexpiry", user["name"],
314 "-H", "ldap://%s" % os.environ["DC_SERVER"],
315 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
316 self.assertCmdSuccess(result, out, err, "Can we run setexpiry with names")
317 self.assertIn("Expiry for user '%s' set to 2 days." % user["name"], out)
319 for user in self.users:
320 found = self._find_user(user["name"])
322 expires = nttime2unix(int("%s" % found.get("accountExpires")))
323 self.assertWithin(expires, twodays, 5, "Ensure account expires is within 5 seconds of the expected time")
325 # TODO: renable this after the filter case is sorted out
326 if "filters are broken, bail now":
329 # now run the expiration based on a filter
330 fourdays = time.time() + (4 * 24 * 60 * 60)
331 (result, out, err) = self.runsubcmd("user", "setexpiry",
332 "--filter", "(&(objectClass=user)(company=comp2))",
334 "-H", "ldap://%s" % os.environ["DC_SERVER"],
335 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
336 self.assertCmdSuccess(result, out, err, "Can we run setexpiry with a filter")
338 for user in self.users:
339 found = self._find_user(user["name"])
340 if ("%s" % found.get("company")) == "comp2":
341 expires = nttime2unix(int("%s" % found.get("accountExpires")))
342 self.assertWithin(expires, fourdays, 5, "Ensure account expires is within 5 seconds of the expected time")
344 expires = nttime2unix(int("%s" % found.get("accountExpires")))
345 self.assertWithin(expires, twodays, 5, "Ensure account expires is within 5 seconds of the expected time")
349 (result, out, err) = self.runsubcmd("user", "list",
350 "-H", "ldap://%s" % os.environ["DC_SERVER"],
351 "-U%s%%%s" % (os.environ["DC_USERNAME"],
352 os.environ["DC_PASSWORD"]))
353 self.assertCmdSuccess(result, out, err, "Error running list")
355 search_filter = ("(&(objectClass=user)(userAccountControl:%s:=%u))" %
356 (ldb.OID_COMPARATOR_AND, dsdb.UF_NORMAL_ACCOUNT))
358 userlist = self.samdb.search(base=self.samdb.domain_dn(),
359 scope=ldb.SCOPE_SUBTREE,
360 expression=search_filter,
361 attrs=["samaccountname"])
363 self.assertTrue(len(userlist) > 0, "no users found in samdb")
365 for userobj in userlist:
366 name = userobj.get("samaccountname", idx=0)
367 found = self.assertMatch(out, name,
368 "user '%s' not found" % name)
371 for user in self.users:
372 (result, out, err) = self.runsubcmd(
373 "user", "show", user["name"],
374 "--attributes=sAMAccountName,company",
375 "-H", "ldap://%s" % os.environ["DC_SERVER"],
376 "-U%s%%%s" % (os.environ["DC_USERNAME"],
377 os.environ["DC_PASSWORD"]))
378 self.assertCmdSuccess(result, out, err, "Error running show")
380 expected_out = """dn: CN=%s %s,CN=Users,%s
384 """ % (user["given-name"], user["surname"], self.samdb.domain_dn(),
385 user["company"], user["name"])
387 self.assertEqual(out, expected_out,
388 "Unexpected show output for user '%s'" %
392 full_ou_dn = str(self.samdb.normalize_dn_in_domain("OU=movetest"))
393 (result, out, err) = self.runsubcmd("ou", "create", full_ou_dn)
394 self.assertCmdSuccess(result, out, err)
395 self.assertEquals(err, "", "There shouldn't be any error message")
396 self.assertIn('Created ou "%s"' % full_ou_dn, out)
398 for user in self.users:
399 (result, out, err) = self.runsubcmd(
400 "user", "move", user["name"], full_ou_dn)
401 self.assertCmdSuccess(result, out, err, "Error running move")
402 self.assertIn('Moved user "%s" into "%s"' %
403 (user["name"], full_ou_dn), out)
405 # Should fail as users objects are in OU
406 (result, out, err) = self.runsubcmd("ou", "delete", full_ou_dn)
407 self.assertCmdFail(result)
408 self.assertIn(("subtree_delete: Unable to delete a non-leaf node "
409 "(it has %d children)!") % len(self.users), err)
411 for user in self.users:
412 new_dn = "CN=Users,%s" % self.samdb.domain_dn()
413 (result, out, err) = self.runsubcmd(
414 "user", "move", user["name"], new_dn)
415 self.assertCmdSuccess(result, out, err, "Error running move")
416 self.assertIn('Moved user "%s" into "%s"' %
417 (user["name"], new_dn), out)
419 (result, out, err) = self.runsubcmd("ou", "delete", full_ou_dn)
420 self.assertCmdSuccess(result, out, err,
421 "Failed to delete ou '%s'" % full_ou_dn)
423 def test_getpwent(self):
427 self.skipTest("Skipping getpwent test, no 'pwd' module available")
430 # get the current user's data for the test
433 u = pwd.getpwuid(uid)
435 self.skipTest("Skipping getpwent test, current EUID not found in NSS")
439 # samba-tool user create command didn't support users with empty gecos if none is
440 # specified on the command line and the user hasn't one in the passwd file it
441 # will fail, so let's add some contents
444 if (gecos is None or len(gecos) == 0):
446 user = self._randomPosixUser({
454 # check if --rfc2307-from-nss sets the same values as we got from pwd.getpwuid()
455 (result, out, err) = self.runsubcmd("user", "create", user["name"], user["password"],
456 "--surname=%s" % user["surname"],
457 "--given-name=%s" % user["given-name"],
458 "--job-title=%s" % user["job-title"],
459 "--department=%s" % user["department"],
460 "--description=%s" % user["description"],
461 "--company=%s" % user["company"],
462 "--gecos=%s" % user["gecos"],
463 "--rfc2307-from-nss",
464 "-H", "ldap://%s" % os.environ["DC_SERVER"],
465 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
467 self.assertCmdSuccess(result, out, err)
468 self.assertEquals(err,"","Shouldn't be any error messages")
469 self.assertIn("User '%s' created successfully" % user["name"], out)
471 self._check_posix_user(user)
472 self.runsubcmd("user", "delete", user["name"])
474 # Check if overriding the attributes from NSS with explicit values works
476 # get a user with all random posix attributes
477 user = self._randomPosixUser({"name": u[0]})
478 # create a user with posix attributes from nss but override all of them with the
479 # random ones just obtained
480 (result, out, err) = self.runsubcmd("user", "create", user["name"], user["password"],
481 "--surname=%s" % user["surname"],
482 "--given-name=%s" % user["given-name"],
483 "--job-title=%s" % user["job-title"],
484 "--department=%s" % user["department"],
485 "--description=%s" % user["description"],
486 "--company=%s" % user["company"],
487 "--rfc2307-from-nss",
488 "--gecos=%s" % user["gecos"],
489 "--login-shell=%s" % user["loginShell"],
490 "--uid=%s" % user["uid"],
491 "--uid-number=%s" % user["uidNumber"],
492 "--gid-number=%s" % user["gidNumber"],
493 "-H", "ldap://%s" % os.environ["DC_SERVER"],
494 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
496 self.assertCmdSuccess(result, out, err)
497 self.assertEquals(err,"","Shouldn't be any error messages")
498 self.assertIn("User '%s' created successfully" % user["name"], out)
500 self._check_posix_user(user)
501 self.runsubcmd("user", "delete", user["name"])
503 def _randomUser(self, base={}):
504 """create a user with random attribute values, you can specify base attributes"""
506 "name": self.randomName(),
507 "password": self.randomPass(),
508 "surname": self.randomName(),
509 "given-name": self.randomName(),
510 "job-title": self.randomName(),
511 "department": self.randomName(),
512 "company": self.randomName(),
513 "description": self.randomName(count=100),
514 "createUserFn": self._create_user,
515 "checkUserFn": self._check_user,
520 def _randomPosixUser(self, base={}):
521 """create a user with random attribute values and additional RFC2307
522 attributes, you can specify base attributes"""
523 user = self._randomUser({})
526 "uid": self.randomName(),
527 "loginShell": self.randomName(),
528 "gecos": self.randomName(),
529 "uidNumber": self.randomXid(),
530 "gidNumber": self.randomXid(),
531 "createUserFn": self._create_posix_user,
532 "checkUserFn": self._check_posix_user,
534 user.update(posixAttributes)
538 def _check_user(self, user):
539 """ check if a user from SamDB has the same attributes as its template """
540 found = self._find_user(user["name"])
542 self.assertEquals("%s" % found.get("name"), "%(given-name)s %(surname)s" % user)
543 self.assertEquals("%s" % found.get("title"), user["job-title"])
544 self.assertEquals("%s" % found.get("company"), user["company"])
545 self.assertEquals("%s" % found.get("description"), user["description"])
546 self.assertEquals("%s" % found.get("department"), user["department"])
548 def _check_posix_user(self, user):
549 """ check if a posix_user from SamDB has the same attributes as its template """
550 found = self._find_user(user["name"])
552 self.assertEquals("%s" % found.get("loginShell"), user["loginShell"])
553 self.assertEquals("%s" % found.get("gecos"), user["gecos"])
554 self.assertEquals("%s" % found.get("uidNumber"), "%s" % user["uidNumber"])
555 self.assertEquals("%s" % found.get("gidNumber"), "%s" % user["gidNumber"])
556 self.assertEquals("%s" % found.get("uid"), user["uid"])
557 self._check_user(user)
559 def _create_user(self, user):
560 return self.runsubcmd("user", "create", user["name"], user["password"],
561 "--surname=%s" % user["surname"],
562 "--given-name=%s" % user["given-name"],
563 "--job-title=%s" % user["job-title"],
564 "--department=%s" % user["department"],
565 "--description=%s" % user["description"],
566 "--company=%s" % user["company"],
567 "-H", "ldap://%s" % os.environ["DC_SERVER"],
568 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
569 def _create_posix_user(self, user):
570 """ create a new user with RFC2307 attributes """
571 return self.runsubcmd("user", "create", user["name"], user["password"],
572 "--surname=%s" % user["surname"],
573 "--given-name=%s" % user["given-name"],
574 "--job-title=%s" % user["job-title"],
575 "--department=%s" % user["department"],
576 "--description=%s" % user["description"],
577 "--company=%s" % user["company"],
578 "--gecos=%s" % user["gecos"],
579 "--login-shell=%s" % user["loginShell"],
580 "--uid=%s" % user["uid"],
581 "--uid-number=%s" % user["uidNumber"],
582 "--gid-number=%s" % user["gidNumber"],
583 "-H", "ldap://%s" % os.environ["DC_SERVER"],
584 "-U%s%%%s" % (os.environ["DC_USERNAME"], os.environ["DC_PASSWORD"]))
586 def _find_user(self, name):
587 search_filter = "(&(sAMAccountName=%s)(objectCategory=%s,%s))" % (ldb.binary_encode(name), "CN=Person,CN=Schema,CN=Configuration", self.samdb.domain_dn())
588 userlist = self.samdb.search(base=self.samdb.domain_dn(),
589 scope=ldb.SCOPE_SUBTREE,
590 expression=search_filter, attrs=[])