-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtunnels.tf
72 lines (62 loc) · 1.82 KB
/
tunnels.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
resource "random_id" "brickyard_warp_tunnel_secret" {
byte_length = 35
}
resource "cloudflare_tunnel" "brickyard_warp_tunnel" {
account_id = local.cf_account_id
name = "brickyard-warp"
secret = random_id.brickyard_warp_tunnel_secret.b64_std
}
resource "cloudflare_tunnel_config" "brickyard_warp_tunnel_config" {
account_id = local.cf_account_id
tunnel_id = cloudflare_tunnel.brickyard_warp_tunnel.id
config {
warp_routing {
enabled = true
}
ingress_rule {
hostname = "home.paulus.family"
path = "/"
service = "https://127.0.0.1:443"
origin_request {
disable_chunked_encoding = true
http_host_header = "home.paulus.family"
no_tls_verify = true
}
}
ingress_rule {
hostname = "woodlandpark-ssh.access.brickyard.whitestar.systems"
path = "/"
service = "tcp://10.0.10.32:22"
origin_request {
access {
aud_tag = ["bdade16db3fd775d1a784f2cdafb7e6e4ec66302202aa0ff1c1dea2151d7bcc9"]
required = true
team_name = "whitestar"
}
}
}
ingress_rule {
hostname = "protect.brickyard.whitestar.systems"
path = "/"
service = "https://10.0.10.10"
origin_request {
http_host_header = "protect.brickyard.whitestar.systems"
no_tls_verify = true
access {
aud_tag = ["1fdfe9a312a2ce922ba775bb430107d98fad76d4283a3038f472b19ed7fb71c0"]
required = true
team_name = "whitestar"
}
}
}
ingress_rule {
service = "http_status:503"
}
}
}
resource "cloudflare_tunnel_route" "seaview_ip" {
account_id = local.cf_account_id
tunnel_id = cloudflare_tunnel.brickyard_warp_tunnel.id
network = "10.0.0.0/9"
comment = "Home Network Route"
}