Re-format ipa-adtrust-install final message to be within 80 characters wide

https://fedorahosted.org/freeipa/ticket/2857
This commit is contained in:
Alexander Bokovoy 2012-06-21 16:19:27 +03:00 committed by Martin Kosek
parent 0e3d064ac1
commit 5a982358b5

View File

@ -210,30 +210,34 @@ def main():
netbios_name, options.no_msdcs) netbios_name, options.no_msdcs)
smb.create_instance() smb.create_instance()
print "==============================================================================" print """
print "Setup complete" =============================================================================
print "" Setup complete
print "\tYou must make sure these network ports are open:"
print "\t\tTCP Ports:" You must make sure these network ports are open:
print "\t\t * 138: netbios-dgm" \tTCP Ports:
print "\t\t * 139: netbios-ssn" \t * 138: netbios-dgm
print "\t\t * 445: microsoft-ds" \t * 139: netbios-ssn
print "\t\tUDP Ports:" \t * 445: microsoft-ds
print "\t\t * 138: netbios-dgm" \tUDP Ports:
print "\t\t * 139: netbios-ssn" \t * 138: netbios-dgm
print "\t\t * 389: (C)LDAP" \t * 139: netbios-ssn
print "\t\t * 445: microsoft-ds" \t * 389: (C)LDAP
print "" \t * 445: microsoft-ds
print "\tAdditionally you have to make sure the FreeIPA LDAP server cannot be reached"
print "\tby any domain controller in the Active Directory domain by closing the" Additionally you have to make sure the FreeIPA LDAP server is not reachable
print "\tfollowing ports for these servers:" by any domain controller in the Active Directory domain by closing down
print "\t\tTCP Ports:" the following ports for these servers:
print "\t\t * 389, 636: LDAP/LDAPS" \tTCP Ports:
print "\tYou may want to choose to REJECT the network packets instead of DROPing them" \t * 389, 636: LDAP/LDAPS
print "\tto avoid timeouts on the AD domain controllers."
print "" You may want to choose to REJECT the network packets instead of DROPing
print "\tWARNING: you MUST re-kinit admin user before using 'ipa trust-*' commands family" them to avoid timeouts on the AD domain controllers.
print "\tin order to re-generate Kerberos tickets to include AD-specific information"
=============================================================================
WARNING: you MUST re-kinit admin user before using 'ipa trust-*' commands
family in order to re-generate Kerberos tickets to include AD-specific
information"""
return 0 return 0