Remove ssh forwarding from traefik, remove traefik auth from internal connections

This commit is contained in:
Evie Litherland-Smith 2023-05-30 10:08:26 +01:00
parent 7d57d89e02
commit a69d0a1a92
4 changed files with 6 additions and 19 deletions

View file

@ -1,14 +1,13 @@
{...}: { {...}: {
imports = [ imports = [
./adguardhome ./adguardhome
./traefik/adguardhome.nix
./gitea ./gitea
./traefik/gitea.nix
./nextcloud ./nextcloud
./sshd
./traefik/adguardhome.nix
./traefik/gitea.nix
./traefik/nextcloud.nix ./traefik/nextcloud.nix
./traefik/qbittorrent.nix ./traefik/qbittorrent.nix
./sshd
./traefik/sshd.nix
./syncthing/Vanguard.nix ./syncthing/Vanguard.nix
]; ];
} }

View file

@ -12,8 +12,8 @@
scheme = "https"; scheme = "https";
}; };
}; };
https = {address = ":443";}; https.address = ":443";
traefik-internal = {address = ":8080";}; traefik-internal.address = ":8080";
}; };
certificatesResolvers = { certificatesResolvers = {
default = { default = {
@ -37,7 +37,6 @@
rule = "ClientIP(`192.168.0.0/16`)"; rule = "ClientIP(`192.168.0.0/16`)";
entryPoints = ["traefik-internal"]; entryPoints = ["traefik-internal"];
service = "api@internal"; service = "api@internal";
middlewares = ["auth"];
}; };
middlewares = { middlewares = {
auth.basicAuth.users = ["xenia:$apr1$LB0wVd6I$BHVPIyh.F5Ewt9/7PqAtS."]; auth.basicAuth.users = ["xenia:$apr1$LB0wVd6I$BHVPIyh.F5Ewt9/7PqAtS."];

View file

@ -1,5 +1,5 @@
{...}: { {...}: {
imports = [./default.nix ./sshd.nix]; imports = [./default.nix];
services.traefik.dynamicConfigOptions = { services.traefik.dynamicConfigOptions = {
http = { http = {
routers.gitea = { routers.gitea = {

View file

@ -1,11 +0,0 @@
{...}: {
imports = [./default.nix];
services.traefik.dynamicConfigOptions.tcp = {
routers.ssh = {
rule = "ClientIP(`192.168.0.0/16`)";
entryPoints = ["ssh"];
service = "ssh-redirect";
};
services.ssh-redirect.loadBalancer.servers = [{address = "localhost:22";}];
};
}