From 24ea576489b37ecc5ff5fecef3cd8445ff73a4d9 Mon Sep 17 00:00:00 2001 From: Samuel Munilla Date: Wed, 29 Jun 2016 14:01:24 -0400 Subject: Add externalIPNetworkCIDRs to config Allow networkConfig.externalIPNetworkCIDRs to be set along with a default to emulate the old 3.1 behavior. --- inventory/byo/hosts.origin.example | 10 ++++++++++ 1 file changed, 10 insertions(+) (limited to 'inventory/byo/hosts.origin.example') diff --git a/inventory/byo/hosts.origin.example b/inventory/byo/hosts.origin.example index 8e7883f3b..8dedba9f8 100644 --- a/inventory/byo/hosts.origin.example +++ b/inventory/byo/hosts.origin.example @@ -343,6 +343,16 @@ openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true', #osm_cluster_network_cidr=10.1.0.0/16 #openshift_portal_net=172.30.0.0/16 + +# ExternalIPNetworkCIDRs controls what values are acceptable for the +# service external IP field. If empty, no externalIP may be set. It +# may contain a list of CIDRs which are checked for access. If a CIDR +# is prefixed with !, IPs in that CIDR will be rejected. Rejections +# will be applied first, then the IP checked against one of the +# allowed CIDRs. You should ensure this range does not overlap with +# your nodes, pods, or service CIDRs for security reasons. +#openshift_master_external_ip_network_cidrs=['0.0.0.0/0'] + # Configure number of bits to allocate to each host’s subnet e.g. 8 # would mean a /24 network on the host. #osm_host_subnet_length=8 -- cgit v1.2.3