fix(homelab)!: use traefik middleware to restrict WAN access
This commit is contained in:
@@ -4,6 +4,8 @@ kind: Kustomization
|
||||
resources:
|
||||
- ./metallb/pool.yaml
|
||||
- ./traefik/config.yaml
|
||||
- ./traefik/private-networks.yaml
|
||||
- ./traefik/chains.yaml
|
||||
- ./cert-manager/config.yaml
|
||||
- ./routes/minecraft.yaml
|
||||
- ./routes/gitea/ssh.yaml
|
||||
|
||||
@@ -10,6 +10,12 @@ spec:
|
||||
hostnames:
|
||||
- "home-assistant.lucalise.ca"
|
||||
rules:
|
||||
- backendRefs:
|
||||
- filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: private-networks
|
||||
backendRefs:
|
||||
- name: home-assistant
|
||||
port: 8080
|
||||
|
||||
@@ -10,6 +10,12 @@ spec:
|
||||
hostnames:
|
||||
- "storage.lucalise.ca"
|
||||
rules:
|
||||
- backendRefs:
|
||||
- filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: private-networks
|
||||
backendRefs:
|
||||
- name: longhorn-frontend
|
||||
port: 80
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
apiVersion: gateway.networking.k8s.io/v1
|
||||
kind: HTTPRoute
|
||||
metadata:
|
||||
name: longhorn
|
||||
name: pihole
|
||||
namespace: pihole-system
|
||||
spec:
|
||||
parentRefs:
|
||||
@@ -10,6 +10,12 @@ spec:
|
||||
hostnames:
|
||||
- "pihole.lucalise.ca"
|
||||
rules:
|
||||
- backendRefs:
|
||||
- filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: private-networks
|
||||
backendRefs:
|
||||
- name: pihole-web
|
||||
port: 80
|
||||
|
||||
32
nix/homelab/kustomize/traefik/chains.yaml
Normal file
32
nix/homelab/kustomize/traefik/chains.yaml
Normal file
@@ -0,0 +1,32 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: private-networks
|
||||
namespace: home
|
||||
spec:
|
||||
chain:
|
||||
middlewares:
|
||||
- name: private-networks
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: private-networks
|
||||
namespace: longhorn-system
|
||||
spec:
|
||||
chain:
|
||||
middlewares:
|
||||
- name: private-networks
|
||||
namespace: kube-system
|
||||
---
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: private-networks
|
||||
namespace: pihole-system
|
||||
spec:
|
||||
chain:
|
||||
middlewares:
|
||||
- name: private-networks
|
||||
namespace: kube-system
|
||||
@@ -11,6 +11,8 @@ spec:
|
||||
service:
|
||||
annotations:
|
||||
metallb.universe.tf/address-pool: rufus-pool
|
||||
spec:
|
||||
externalTrafficPolicy: Local
|
||||
|
||||
ports:
|
||||
web:
|
||||
|
||||
13
nix/homelab/kustomize/traefik/private-networks.yaml
Normal file
13
nix/homelab/kustomize/traefik/private-networks.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: private-networks
|
||||
namespace: kube-system
|
||||
spec:
|
||||
ipAllowList:
|
||||
sourceRange:
|
||||
# RFC1918 private address ranges
|
||||
- 10.0.0.0/8
|
||||
- 172.16.0.0/12
|
||||
- 192.168.0.0/16
|
||||
- 100.64.0.0/10
|
||||
36
nix/homelab/scripts/generate-chains.sh
Executable file
36
nix/homelab/scripts/generate-chains.sh
Executable file
@@ -0,0 +1,36 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
set -e
|
||||
|
||||
NAMESPACES=(
|
||||
"home"
|
||||
"longhorn-system"
|
||||
"pihole-system"
|
||||
)
|
||||
|
||||
OUTPUT_FILE="kustomize/traefik/chains.yaml"
|
||||
|
||||
> "$OUTPUT_FILE"
|
||||
|
||||
for i in "${!NAMESPACES[@]}"; do
|
||||
ns="${NAMESPACES[$i]}"
|
||||
|
||||
if [[ $i -gt 0 ]]; then
|
||||
echo "---" >> "$OUTPUT_FILE"
|
||||
fi
|
||||
|
||||
cat >> "$OUTPUT_FILE" <<EOF
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: private-networks
|
||||
namespace: ${ns}
|
||||
spec:
|
||||
chain:
|
||||
middlewares:
|
||||
- name: private-networks
|
||||
namespace: kube-system
|
||||
EOF
|
||||
done
|
||||
|
||||
echo "Generated $OUTPUT_FILE with ${#NAMESPACES[@]} namespace chains"
|
||||
@@ -9,8 +9,12 @@ fi
|
||||
SERVER_NAME="$1"
|
||||
BACKUP_FILE="$2"
|
||||
|
||||
cd kustomize
|
||||
|
||||
kubectl scale deployment minecraft-$SERVER_NAME --replicas 0
|
||||
|
||||
sed -e "s/{{SERVER_NAME}}/$SERVER_NAME/g" \
|
||||
-e "s/{{BACKUP_FILE}}/$BACKUP_FILE/g" \
|
||||
restore-job.yaml | kubectl apply -f -
|
||||
|
||||
cd -
|
||||
@@ -17,13 +17,13 @@
|
||||
enable = true;
|
||||
dns = "systemd-resolved";
|
||||
};
|
||||
networking.extraHosts = ''
|
||||
192.168.27.10 traefik.lucalise.ca
|
||||
192.168.27.10 media.lucalise.ca
|
||||
192.168.27.10 git.lucalise.ca
|
||||
192.168.27.10 storage.lucalise.ca
|
||||
192.168.27.10 home-assistant.lucalise.ca
|
||||
'';
|
||||
# networking.extraHosts = ''
|
||||
# 75.157.238.86 traefik.lucalise.ca
|
||||
# 75.157.238.86 media.lucalise.ca
|
||||
# 75.157.238.86 git.lucalise.ca
|
||||
# 75.157.238.86 storage.lucalise.ca
|
||||
# 75.157.238.86 home-assistant.lucalise.ca
|
||||
# '';
|
||||
|
||||
services.resolved = {
|
||||
enable = true;
|
||||
|
||||
Reference in New Issue
Block a user