Skip to content

Commit cc7480d

Browse files
authored
Merge pull request #1151 from david22swan/maint/main/readme_fix
(maint) Update all README.md mentions of `action` to `jump`
2 parents 79a30da + 3e304e0 commit cc7480d

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

README.md

+18-18
Original file line numberDiff line numberDiff line change
@@ -77,24 +77,24 @@ class my_fw::pre {
7777
7878
# Default firewall rules
7979
firewall { '000 accept all icmp':
80-
proto => 'icmp',
81-
action => 'accept',
80+
proto => 'icmp',
81+
jump => 'accept',
8282
}
8383
-> firewall { '001 accept all to lo interface':
8484
proto => 'all',
8585
iniface => 'lo',
86-
action => 'accept',
86+
jump => 'accept',
8787
}
8888
-> firewall { '002 reject local traffic not on loopback interface':
8989
iniface => '! lo',
9090
proto => 'all',
9191
destination => '127.0.0.1/8',
92-
action => 'reject',
92+
jump => 'reject',
9393
}
9494
-> firewall { '003 accept related established rules':
9595
proto => 'all',
9696
state => ['RELATED', 'ESTABLISHED'],
97-
action => 'accept',
97+
jump => 'accept',
9898
}
9999
}
100100
```
@@ -108,7 +108,7 @@ existing connections are not closed.
108108
class my_fw::post {
109109
firewall { '999 drop all':
110110
proto => 'all',
111-
action => 'drop',
111+
jump => 'drop',
112112
before => undef,
113113
}
114114
}
@@ -218,16 +218,16 @@ Basic accept ICMP request example:
218218

219219
```puppet
220220
firewall { '000 accept all icmp requests':
221-
proto => 'icmp',
222-
action => 'accept',
221+
proto => 'icmp',
222+
jump => 'accept',
223223
}
224224
```
225225

226226
Drop all:
227227

228228
```puppet
229229
firewall { '999 drop all other requests':
230-
action => 'drop',
230+
jump => 'drop',
231231
}
232232
```
233233

@@ -239,7 +239,7 @@ IPv6 rules can be specified using the _ip6tables_ provider:
239239
firewall { '006 Allow inbound SSH (v6)':
240240
dport => 22,
241241
proto => 'tcp',
242-
action => 'accept',
242+
jump => 'accept',
243243
protocol => 'ip6tables',
244244
}
245245
```
@@ -265,7 +265,7 @@ class profile::apache {
265265
firewall { '100 allow http and https access':
266266
dport => [80, 443],
267267
proto => 'tcp',
268-
action => 'accept',
268+
jump => 'accept',
269269
}
270270
}
271271
```
@@ -283,14 +283,14 @@ Examples:
283283

284284
```puppet
285285
firewall { '001 disallow esp protocol':
286-
action => 'accept',
286+
jump => 'accept',
287287
proto => '! esp',
288288
}
289289
290290
firewall { '002 drop NEW external website packets with FIN/RST/ACK set and SYN unset':
291291
chain => 'INPUT',
292292
state => 'NEW',
293-
action => 'drop',
293+
jump => 'drop',
294294
proto => 'tcp',
295295
sport => ['! http', '443'],
296296
source => '! 10.0.0.0/8',
@@ -304,7 +304,7 @@ Examples:
304304

305305
```puppet
306306
firewall { '001 allow local disallow anycast':
307-
action => 'accept',
307+
jump => 'accept',
308308
src_type => ['LOCAL', '! ANYCAST'],
309309
}
310310
```
@@ -377,7 +377,7 @@ firewallchain { 'MY_CHAIN:filter:IPv4':
377377
378378
firewall { '100 my rule':
379379
chain => 'MY_CHAIN',
380-
action => 'accept',
380+
jump => 'accept',
381381
proto => 'tcp',
382382
dport => 5000,
383383
}
@@ -471,7 +471,7 @@ firewall_multi { '100 allow http and https access':
471471
],
472472
dport => [80, 443],
473473
proto => 'tcp',
474-
action => 'accept',
474+
jump => 'accept',
475475
}
476476
```
477477

@@ -572,7 +572,7 @@ firewall { '571 - hop_limit':
572572
ensure => present,
573573
proto => 'tcp',
574574
dport => '571',
575-
action => 'accept',
575+
jump => 'ACCEPT',
576576
hop_limit => '5',
577577
provider => 'ip6tables',
578578
}
@@ -595,7 +595,7 @@ And the second negating access to a range of ports on `iptables`:
595595
firewall { '560 - negated ports':
596596
proto => `tcp`,
597597
sport => ['! 560-570','! 580'],
598-
action => `accept`,
598+
jump => `accept`,
599599
}
600600
```
601601

0 commit comments

Comments
 (0)