table ip filter {
ct timeout agressive-tcp {
...
policy = { established : 100, close_wait : 4, close : 4 }
^ ^ ^ ^ ^ ^
for consistency with map syntax.
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
if (timeout[i] != timeout_protocol[l4].dflt_timeout[i]) {
if (comma)
nft_print(octx, ", ");
- nft_print(octx, "%s: %u",
+ nft_print(octx, "%s : %u",
timeout_protocol[l4].state_to_name[i],
timeout[i]);
comma = true;
ct timeout cttime {
protocol udp
l3proto ip
- policy = { unreplied: 15, replied: 12 }
+ policy = { unreplied : 15, replied : 12 }
}
chain input {
$NFT add chain test input
$NFT add quota test https-quota 25 mbytes
$NFT add ct helper test cthelp { type \"sip\" protocol tcp \; }
-$NFT add ct timeout test cttime { protocol udp \; policy = {replied: 12, unreplied: 15 } \; }
+$NFT add ct timeout test cttime { protocol udp \; policy = {replied : 12, unreplied : 15 } \; }
$NFT add table test-ip
GET="$($NFT list table test)"
ct timeout cttime{
protocol tcp
l3proto ip
- policy = { established: 123, close: 12 }
+ policy = { established : 123, close : 12 }
}
chain c {
ct timeout cttime {
protocol tcp
l3proto ip
- policy = { established: 123, close: 12 }
+ policy = { established : 123, close : 12 }
}
chain c {