From 2a9a3b9134efb710df3d4ff65856adda180a341c Mon Sep 17 00:00:00 2001 From: Garrett Honeycutt Date: Wed, 1 Jul 2015 22:20:00 -0400 Subject: [PATCH] Style fixes in documentation's example code --- README.markdown | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/README.markdown b/README.markdown index 5132d25..9a7f5e0 100644 --- a/README.markdown +++ b/README.markdown @@ -136,7 +136,7 @@ Rules are persisted automatically between reboots, although there are known issu ~~~puppet resources { 'firewall': - purge => true + purge => true, } ~~~ @@ -144,7 +144,7 @@ Rules are persisted automatically between reboots, although there are known issu ~~~puppet resources { 'firewallchain': - purge => true + purge => true, } ~~~ @@ -198,17 +198,17 @@ In iptables, the title of the rule is stored using the comment feature of the un Basic accept ICMP request example: ~~~puppet -firewall { "000 accept all icmp requests": - proto => "icmp", - action => "accept", +firewall { '000 accept all icmp requests': + proto => 'icmp', + action => 'accept', } ~~~ Drop all: ~~~puppet -firewall { "999 drop all other requests": - action => "drop", +firewall { '999 drop all other requests': + action => 'drop', } ~~~ @@ -217,7 +217,7 @@ firewall { "999 drop all other requests": IPv6 rules can be specified using the _ip6tables_ provider: ~~~puppet -firewall { "006 Allow inbound SSH (v6)": +firewall { '006 Allow inbound SSH (v6)': port => 22, proto => tcp, action => accept, @@ -279,7 +279,7 @@ You can apply firewall rules to specific nodes. Usually, you will want to put th ~~~puppet node 'some.node.com' { firewall { '111 open port 111': - dport => 111 + dport => 111, } } ~~~ @@ -291,7 +291,7 @@ firewall { '100 snat for network foo2': chain => 'POSTROUTING', jump => 'MASQUERADE', proto => 'all', - outiface => "eth0", + outiface => 'eth0', source => '10.1.2.0/24', table => 'nat', } @@ -812,7 +812,7 @@ firewallchain { 'INPUT:filter:IPv4': ~~~puppet resources { 'firewallchain': - purge => true + purge => true, } ~~~ -- 2.45.2