Add SSH tunnel to a host
This commit is contained in:
parent
df51bc9eb8
commit
23d766c067
6 changed files with 41 additions and 0 deletions
|
@ -96,6 +96,7 @@
|
||||||
};
|
};
|
||||||
nextcloud.enable = true;
|
nextcloud.enable = true;
|
||||||
syncthing.enable = true;
|
syncthing.enable = true;
|
||||||
|
tunnel.enable = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,5 +10,6 @@
|
||||||
./nextcloud
|
./nextcloud
|
||||||
./nginx
|
./nginx
|
||||||
./syncthing
|
./syncthing
|
||||||
|
./tunnel
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
23
modules/services/tunnel/default.nix
Normal file
23
modules/services/tunnel/default.nix
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
{ config, pkgs, lib, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
options.chvp.services.tunnel.enable = lib.mkOption {
|
||||||
|
default = false;
|
||||||
|
example = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf config.chvp.services.tunnel.enable {
|
||||||
|
networking.firewall.trustedInterfaces = [ "br-mailcow" ];
|
||||||
|
systemd.services.tunnel = {
|
||||||
|
after = [ "network.target" ];
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
script = "${pkgs.openssh}/bin/ssh -i ${config.age.secrets."files/services/tunnel/key".path} -o ServerAliveInterval=60 -o ExitOnForwardFailure=yes -o ControlPath=none -NT -p $SSH_PORT -L 0.0.0.0:9797:$CONN_HOST:$CONN_PORT $USER@$SSH_HOST";
|
||||||
|
serviceConfig = {
|
||||||
|
EnvironmentFile = config.age.secrets."files/services/tunnel/env".path;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
age.secrets."files/services/tunnel/key".file = ../../../secrets/files/services/tunnel/key.age;
|
||||||
|
age.secrets."files/services/tunnel/env".file = ../../../secrets/files/services/tunnel/env.age;
|
||||||
|
};
|
||||||
|
}
|
|
@ -46,6 +46,9 @@ in
|
||||||
|
|
||||||
"secrets/passwords/services/syncthing-basic-auth.age".publicKeys = [ lasting-integrity ] ++ users;
|
"secrets/passwords/services/syncthing-basic-auth.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||||
|
|
||||||
|
"secrets/files/services/tunnel/key.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||||
|
"secrets/files/services/tunnel/env.age".publicKeys = [ lasting-integrity ] ++ users;
|
||||||
|
|
||||||
"secrets/passwords/services/data-basic-auth.age".publicKeys = [ urithiru ] ++ users;
|
"secrets/passwords/services/data-basic-auth.age".publicKeys = [ urithiru ] ++ users;
|
||||||
|
|
||||||
"secrets/files/programs/ssh/host_configuration.age".publicKeys = hosts ++ users;
|
"secrets/files/programs/ssh/host_configuration.age".publicKeys = hosts ++ users;
|
||||||
|
|
13
secrets/files/services/tunnel/env.age
Normal file
13
secrets/files/services/tunnel/env.age
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 yad4VQ 4EZbasW5A0791VTZy5+OBXLVJ+/G5kTRvlnMeg4lSDg
|
||||||
|
Aj4iFFHEjEW0SyMrgQTt9hcAed42N/jL60FjARqlHFo
|
||||||
|
-> ssh-ed25519 s9rb8g cRHZludrYSvCJy15kHhxUH516CfOtwQ3VEk4FYJdW2U
|
||||||
|
NbzPbwg5rkgzVAFeHJqfpFdExIMexIZpdLBZFz1miHE
|
||||||
|
-> ssh-ed25519 hKAFvQ rNrDoQWNd76bpvoWFh31ClZQ5VIRAfe2BDEpS/bN0Ug
|
||||||
|
6uKJeY1fL3pryI9ynX9dVEXrsLQg+hrBvkz0FY2fOUI
|
||||||
|
-> k-grease M=!N`9 6bU
|
||||||
|
CtgiHxZfRbY81i9AiltE2ZY0M2xFtIZ7Q7ClL49HU67SimSdJxSLC382I0xk08O9
|
||||||
|
3JRWjOQqvRtcSosB
|
||||||
|
--- vUl2LYnVGXcLs4jdkc9IDYX7HM78TCPTJ5BCvD6fJ1Q
|
||||||
|
PVæ매³I
ªºM„ ö<C2A0>ÄRyÙPPå±6E^.K¦’k<>²ÀÚ2%åÇoD€Ÿ:Õ
Ù…ÃA£‰û>Ib><æ¥Ö<
ÆAæ ð
|
||||||
|
z[!Þ%PØ)«Ð¥ïR-çz$܃<7´qú:ú<>ï݉f¼
|
BIN
secrets/files/services/tunnel/key.age
Normal file
BIN
secrets/files/services/tunnel/key.age
Normal file
Binary file not shown.
Loading…
Add table
Add a link
Reference in a new issue