dhcp/inventory: removing beaker and beaker-client
Removing references to beaker and the hosts that were part of that setup
This commit is contained in:
parent
5a93a3ab85
commit
41f79ab8d2
9 changed files with 0 additions and 219 deletions
|
@ -50,26 +50,6 @@
|
|||
# to block all access from that group. This is to protect them from any possible attack
|
||||
# vectors from qa-isolated machines.
|
||||
#
|
||||
# Here we hard code beaker client nodes. They are managed by beaker and are not in ansible.
|
||||
-A INPUT -s 10.5.131.31 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.32 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.33 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.34 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.35 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.36 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.37 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.38 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.39 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.40 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.41 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.42 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.43 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.44 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.45 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.46 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.47 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.48 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.49 -j REJECT --reject-with icmp-host-prohibited
|
||||
{% for host in groups['qa_isolated']|sort %}
|
||||
{% if 'eth0_ip' in hostvars[host] %}# {{ host }}
|
||||
-A INPUT -s {{ hostvars[host]['eth0_ip'] }} -j REJECT --reject-with icmp-host-prohibited
|
||||
|
|
|
@ -55,26 +55,6 @@
|
|||
# to block all access from that group. This is to protect them from any possible attack
|
||||
# vectors from qa-isolated machines.
|
||||
#
|
||||
# Here we hard code beaker client nodes. They are managed by beaker and are not in ansible.
|
||||
-A INPUT -s 10.5.131.31 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.32 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.33 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.34 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.35 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.36 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.37 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.38 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.39 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.40 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.41 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.42 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.43 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.44 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.45 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.46 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.47 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.48 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.49 -j REJECT --reject-with icmp-host-prohibited
|
||||
{% for host in groups['qa_isolated']|sort %}
|
||||
{% if 'eth0_ip' in hostvars[host] %}# {{ host }}
|
||||
-A INPUT -s {{ hostvars[host]['eth0_ip'] }} -j REJECT --reject-with icmp-host-prohibited
|
||||
|
|
|
@ -55,26 +55,6 @@
|
|||
# to block all access from that group. This is to protect them from any possible attack
|
||||
# vectors from qa-isolated machines.
|
||||
#
|
||||
# Here we hard code beaker client nodes. They are managed by beaker and are not in ansible.
|
||||
-A INPUT -s 10.5.131.31 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.32 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.33 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.34 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.35 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.36 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.37 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.38 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.39 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.40 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.41 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.42 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.43 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.44 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.45 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.46 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.47 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.48 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.49 -j REJECT --reject-with icmp-host-prohibited
|
||||
{% for host in groups['qa_isolated']|sort %}
|
||||
{% if 'eth0_ip' in hostvars[host] %}# {{ host }}
|
||||
-A INPUT -s {{ hostvars[host]['eth0_ip'] }} -j REJECT --reject-with icmp-host-prohibited
|
||||
|
|
|
@ -55,26 +55,6 @@
|
|||
# to block all access from that group. This is to protect them from any possible attack
|
||||
# vectors from qa-isolated machines.
|
||||
#
|
||||
# Here we hard code beaker client nodes. They are managed by beaker and are not in ansible.
|
||||
-A INPUT -s 10.5.131.31 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.32 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.33 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.34 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.35 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.36 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.37 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.38 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.39 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.40 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.41 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.42 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.43 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.44 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.45 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.46 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.47 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.48 -j REJECT --reject-with icmp-host-prohibited
|
||||
-A INPUT -s 10.5.131.49 -j REJECT --reject-with icmp-host-prohibited
|
||||
{% for host in groups['qa_isolated']|sort %}
|
||||
{% if 'eth0_ip' in hostvars[host] %}# {{ host }}
|
||||
-A INPUT -s {{ hostvars[host]['eth0_ip'] }} -j REJECT --reject-with icmp-host-prohibited
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue