The <pre/> section is rendered as-is on the page. That is, if all the lines are prefixed with 4 spaces the rendered page will also have them. Problem is if we put a box around such <pre/> because the content might not fix into it. Signed-off-by: Michal Privoznik <mprivozn@xxxxxxxxxx> --- docs/formatnwfilter.html.in | 210 ++++++++++++++++++++++---------------------- 1 file changed, 105 insertions(+), 105 deletions(-) diff --git a/docs/formatnwfilter.html.in b/docs/formatnwfilter.html.in index 93db5b0..7ea69b5 100644 --- a/docs/formatnwfilter.html.in +++ b/docs/formatnwfilter.html.in @@ -61,14 +61,14 @@ the filter <code>clean-traffic</code>. </p> <pre> - ... - <devices> - <interface type='bridge'> - <mac address='00:16:3e:5d:c7:9e'/> - <filterref filter='clean-traffic'/> - </interface> - </devices> - ...</pre> +... +<devices> + <interface type='bridge'> + <mac address='00:16:3e:5d:c7:9e'/> + <filterref filter='clean-traffic'/> + </interface> +</devices> +...</pre> <p> Network filters are written in XML and may either contain references @@ -91,16 +91,16 @@ the parameter <code>IP</code> and a dotted IP address as value. </p> <pre> - ... - <devices> - <interface type='bridge'> - <mac address='00:16:3e:5d:c7:9e'/> - <filterref filter='clean-traffic'> - <parameter name='IP' value='10.0.0.1'/> - </filterref> - </interface> - </devices> - ...</pre> +... +<devices> + <interface type='bridge'> + <mac address='00:16:3e:5d:c7:9e'/> + <filterref filter='clean-traffic'> + <parameter name='IP' value='10.0.0.1'/> + </filterref> + </interface> +</devices> +...</pre> <p> In this particular example, the <code>clean-traffic</code> network @@ -285,18 +285,18 @@ providing multiple elements for the IP variable is: </p> <pre> - ... - <devices> - <interface type='bridge'> - <mac address='00:16:3e:5d:c7:9e'/> - <filterref filter='clean-traffic'> - <parameter name='IP' value='10.0.0.1'/> - <parameter name='IP' value='10.0.0.2'/> - <parameter name='IP' value='10.0.0.3'/> - </filterref> - </interface> - </devices> - ...</pre> +... +<devices> + <interface type='bridge'> + <mac address='00:16:3e:5d:c7:9e'/> + <filterref filter='clean-traffic'> + <parameter name='IP' value='10.0.0.1'/> + <parameter name='IP' value='10.0.0.2'/> + <parameter name='IP' value='10.0.0.3'/> + </filterref> + </interface> +</devices> +...</pre> <p> This then allows filters to enable multiple IP addresses per interface. Therefore, with the list @@ -304,11 +304,11 @@ individual filtering rules, one for each IP address. </p> <pre> - ... - <rule action='accept' direction='in' priority='500'> - <tcp srpipaddr='$IP'/> - </rule> - ... +... +<rule action='accept' direction='in' priority='500'> + <tcp srpipaddr='$IP'/> +</rule> +... </pre> <p> <span class="since">Since 0.9.10</span> it is possible to access @@ -317,11 +317,11 @@ of the variable DSTPORTS. </p> <pre> - ... - <rule action='accept' direction='in' priority='500'> - <udp dstportstart='$DSTPORTS[1]'/> - </rule> - ... +... +<rule action='accept' direction='in' priority='500'> + <udp dstportstart='$DSTPORTS[1]'/> +</rule> +... </pre> <p> <span class="since">Since 0.9.10</span> it is possible to create @@ -336,29 +336,29 @@ iterators to access their elements. </p> <pre> - ... - <rule action='accept' direction='in' priority='500'> - <ip srcipaddr='$SRCIPADDRESSES[@1]' dstportstart='$DSTPORTS[@2]'/> - </rule> - ... +... +<rule action='accept' direction='in' priority='500'> + <ip srcipaddr='$SRCIPADDRESSES[@1]' dstportstart='$DSTPORTS[@2]'/> +</rule> +... </pre> <p> In an example we assign concrete values to SRCIPADDRESSES and DSTPORTS </p> <pre> - SRCIPADDRESSES = [ 10.0.0.1, 11.1.2.3 ] - DSTPORTS = [ 80, 8080 ] +SRCIPADDRESSES = [ 10.0.0.1, 11.1.2.3 ] +DSTPORTS = [ 80, 8080 ] </pre> <p> Accessing the variables using $SRCIPADDRESSES[@1] and $DSTPORTS[@2] would then result in all combinations of addresses and ports being created: </p> <pre> - 10.0.0.1, 80 - 10.0.0.1, 8080 - 11.1.2.3, 80 - 11.1.2.3, 8080 +10.0.0.1, 80 +10.0.0.1, 8080 +11.1.2.3, 80 +11.1.2.3, 8080 </pre> <p> Accessing the same variables using a single iterator, for example by using @@ -366,8 +366,8 @@ parallel access to both lists and result in the following combinations: </p> <pre> - 10.0.0.1, 80 - 11.1.2.3, 8080 +10.0.0.1, 80 +11.1.2.3, 8080 </pre> <p> Further, the notation of $VARIABLE is short-hand for $VARIABLE[@0]. The @@ -440,12 +440,12 @@ using the DHCP snooping method: </p> <pre> - <interface type='bridge'> - <source bridge='virbr0'/> - <filterref filter='clean-traffic'> - <parameter name='CTRL_IP_LEARNING' value='dhcp'/> - </filterref> - </interface> +<interface type='bridge'> + <source bridge='virbr0'/> + <filterref filter='clean-traffic'> + <parameter name='CTRL_IP_LEARNING' value='dhcp'/> + </filterref> +</interface> </pre> <h3><a name="nwfelemsReservedVars">Reserved Variables</a></h3> @@ -658,10 +658,10 @@ </p> <pre> [...] - <rule action='drop' direction='in'> - <protocol match='no' attribute1='value1' attribute2='value2'/> - <protocol attribute3='value3'/> - </rule> +<rule action='drop' direction='in'> + <protocol match='no' attribute1='value1' attribute2='value2'/> + <protocol attribute3='value3'/> +</rule> [...] </pre> <p> @@ -1896,11 +1896,11 @@ turned off for incoming connections to TCP port 12345. </p> <pre> - [...] - <rule direction='in' action='accept' statematch='false'> - <tcp dstportstart='12345'/> - </rule> - [...] +[...] +<rule direction='in' action='accept' statematch='false'> + <tcp dstportstart='12345'/> +</rule> +[...] </pre> <p> This now allows incoming traffic to TCP port 12345, but would also @@ -1918,26 +1918,26 @@ time, the following XML fragment can be used to achieve this. </p> <pre> - [...] - <rule action='drop' direction='in' priority='400'> - <tcp connlimit-above='1'/> - </rule> - <rule action='accept' direction='in' priority='500'> - <tcp dstportstart='22'/> - </rule> - <rule action='drop' direction='out' priority='400'> - <icmp connlimit-above='1'/> - </rule> - <rule action='accept' direction='out' priority='500'> - <icmp/> - </rule> - <rule action='accept' direction='out' priority='500'> - <udp dstportstart='53'/> - </rule> - <rule action='drop' direction='inout' priority='1000'> - <all/> - </rule> - [...] +[...] +<rule action='drop' direction='in' priority='400'> + <tcp connlimit-above='1'/> +</rule> +<rule action='accept' direction='in' priority='500'> + <tcp dstportstart='22'/> +</rule> +<rule action='drop' direction='out' priority='400'> + <icmp connlimit-above='1'/> +</rule> +<rule action='accept' direction='out' priority='500'> + <icmp/> +</rule> +<rule action='accept' direction='out' priority='500'> + <udp dstportstart='53'/> +</rule> +<rule action='drop' direction='inout' priority='1000'> + <all/> +</rule> +[...] </pre> <p> Note that the rule for the limit has to logically appear @@ -1958,7 +1958,7 @@ </p> <pre> - echo 3 > /proc/sys/net/netfilter/nf_conntrack_icmp_timeout +echo 3 > /proc/sys/net/netfilter/nf_conntrack_icmp_timeout </pre> <p> sets the ICMP connection tracking timeout to 3 seconds. The @@ -2201,12 +2201,12 @@ the domain XML of the <code>test</code> VM could then look like this: </p> <pre> - [...] - <interface type='bridge'> - <source bridge='mybridge'/> - <filterref filter='test-eth0'/> - </interface> - [...] +[...] +<interface type='bridge'> + <source bridge='mybridge'/> + <filterref filter='test-eth0'/> +</interface> +[...] </pre> <p> @@ -2216,15 +2216,15 @@ <code>ICMP</code> rule can be replaced with the following two rules: </p> <pre> - <!-- enable outgoing ICMP echo requests--> - <rule action='accept' direction='out'> - <icmp type='8'/> - </rule> +<!-- enable outgoing ICMP echo requests--> +<rule action='accept' direction='out'> + <icmp type='8'/> +</rule> - <!-- enable incoming ICMP echo replies--> - <rule action='accept' direction='in'> - <icmp type='0'/> - </rule> +<!-- enable incoming ICMP echo replies--> +<rule action='accept' direction='in'> + <icmp type='0'/> +</rule> </pre> <h3><a name="nwfwriteexample2nd">Second example custom filter</a></h3> @@ -2326,9 +2326,9 @@ the ftp connection with the VM is established. </p> <pre> - modprobe nf_conntrack_ftp # where available or +modprobe nf_conntrack_ftp # where available or - modprobe ip_conntrack_ftp # if above is not available +modprobe ip_conntrack_ftp # if above is not available </pre> <p> If other protocols than ftp are to be used in conjunction with the -- 2.8.4 -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list