8000 fix indentation in examples · saltstack/salt-user-guide@bdec135 · GitHub
[go: up one dir, main page]

Skip to content

Commit bdec135

Browse files
Sebastian Engelbarbaricyawps
authored andcommitted
fix indentation in examples
1 parent cf04036 commit bdec135

File tree

4 files changed

+33
-32
lines changed

4 files changed

+33
-32
lines changed

.brokignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,5 @@ https://saltstack.gitlab.io/open/docs/salt-user-guide
1212
https://twitter.com/intent/follow?screen_name=Salt_Project_OS
1313
https://www.example.com
1414
https://www.example.org
15+
https://www.reddit.com/r/saltstack/
1516
https://your-GitLab-username.gitlab.io

docs/topics/requisites.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -137,13 +137,13 @@ to do this, set ``order: last``
137137
138138
update_status:
139139
module.function:
140-
- name: http.query
141-
- args:
142-
- 'https://example.org/update-status'
143-
- kwargs:
144-
- method: POST
145-
- params: 'keyA=valA&keyB=valB'
146-
- order: last
140+
- name: http.query
141+
- args:
142+
- 'https://example.org/update-status'
143+
- kwargs:
144+
- method: POST
145+
- params: 'keyA=valA&keyB=valB'
146+
- order: last
147147
148148
install_app:
149149
pkg.installed:

docs/topics/security.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -312,15 +312,15 @@ Salt’s External Authentication System (eAuth) allows for Salt to pass through
312312
313313
# examples of external authentication definitions
314314
external_auth:
315-
auth_module: # the authentication system
316-
some_user_or_group%: # a user or group given access
317-
'some_host': # a minion matching expressing
318-
- exec_mod.function # access a specific function
319-
- exec_mod.* # access to all module functions
320-
- exec_mod.* # all access a specific function
321-
- '@wheel' # access to all wheel modules
322-
- '@runner' # access to all runner modules
323-
- '@jobs' # access to the jobs runner and/or wheel module
315+
auth_module: # the authentication system
316+
some_user_or_group%: # a user or group given access
317+
'some_host': # a minion matching expressing
318+
- exec_mod.function # access a specific function
319+
- exec_mod.* # access to all module functions
320+
- exec_mod.* # all access a specific function
321+
- '@wheel' # access to all wheel modules
322+
- '@runner' # access to all runner modules
323+
- '@jobs' # access to the jobs runner and/or wheel module
324324
325325
326326
LDAP external authentication

docs/topics/states.rst

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ However, doing the same with a Salt state requires no check state, since the ins
107107
install_tree_now:
108108
pkg.installed:
109109
- pkgs:
110-
- tree
110+
- tree
111111
112112
.. code-block:: bash
113113
@@ -240,21 +240,21 @@ The contents and layout of the files are intended to be as simple as possible, w
240240
:caption: /srv/salt/top.sls
241241
242242
base:
243-
'*':
244-
- core
245-
'^(app|web).(qa|prod).loc$':
246-
- match: pcre
247-
- httpd
248-
- nagios.web
249-
'os:Ubuntu':
250-
- match: grain
251-
- repos.ubuntu
252-
'os_family:RedHat':
253-
- match: grain
254-
- repos.epel
255-
'nagios* or G@role:monitoring':
256-
- match: compound
257-
- nagios.server
243+
'*':
244+
- core
245+
'^(app|web).(qa|prod).loc$':
246+
- match: pcre
247+
- httpd
248+
- nagios.web
249+
'os:Ubuntu':
250+
- match: grain
251+
- repos.ubuntu
252+
'os_family:RedHat':
253+
- match: grain
254+
- repos.epel
255+
'nagios* or G@role:monitoring':
256+
- match: compound
257+
- nagios.server
258258
259259
* ``base`` is the default environment to use as the ``file_roots``.
260260
* Targeting parameter is defined next.

0 commit comments

Comments
 (0)
0