@@ -9,25 +9,25 @@ IPV6={{ 'no' if sysctl_config['net.ipv6.conf.all.disable_ipv6'] is defined and s
99
1010# Set the default input policy to ACCEPT, DROP, or REJECT. Please note that if
1111# you change this you will most likely want to adjust your rules.
12- DEFAULT_INPUT_POLICY=' {{ ufw_default_input_policy }}'
12+ DEFAULT_INPUT_POLICY=" {{ ufw_default_input_policy }}"
1313
1414# Set the default output policy to ACCEPT, DROP, or REJECT. Please note that if
1515# you change this you will most likely want to adjust your rules.
16- DEFAULT_OUTPUT_POLICY=' {{ ufw_default_output_policy }}'
16+ DEFAULT_OUTPUT_POLICY=" {{ ufw_default_output_policy }}"
1717
1818# Set the default forward policy to ACCEPT, DROP or REJECT. Please note that
1919# if you change this you will most likely want to adjust your rules
20- DEFAULT_FORWARD_POLICY=' {{ ufw_default_forward_policy }}'
20+ DEFAULT_FORWARD_POLICY=" {{ ufw_default_forward_policy }}"
2121
2222# Set the default application policy to ACCEPT, DROP, REJECT or SKIP. Please
2323# note that setting this to ACCEPT may be a security risk. See 'man ufw' for
2424# details
25- DEFAULT_APPLICATION_POLICY=' {{ ufw_default_application_policy }}'
25+ DEFAULT_APPLICATION_POLICY=" {{ ufw_default_application_policy }}"
2626
2727# By default, ufw only touches its own chains. Set this to 'yes' to have ufw
2828# manage the built-in chains too. Warning: setting this to 'yes' will break
2929# non-ufw managed firewall rules
30- MANAGE_BUILTINS=' {{ ufw_manage_builtins }}'
30+ MANAGE_BUILTINS=" {{ ufw_manage_builtins }}"
3131
3232#
3333# IPT backend
@@ -42,4 +42,4 @@ MANAGE_BUILTINS='{{ ufw_manage_builtins }}'
4242# nf_conntrack_pptp, nf_nat_pptp: PPTP over stateful firewall/NAT
4343# nf_conntrack_ftp, nf_nat_ftp: active FTP support
4444# nf_conntrack_tftp, nf_nat_tftp: TFTP support (server side)
45- IPT_MODULES=' {{ ufw_ipt_modules }}'
45+ IPT_MODULES=" {{ ufw_ipt_modules }}"
0 commit comments