π XPipe + Cloudflare Tunnel - Team Setup
Remote Team Access zu XPipe Connection Hub
π CRITICAL: Access Control erforderlich
XPipe Tunnel MUSS mit Cloudflare Access geschΓΌtzt werden!
π Setup Guide: Security Cloudflare Access
Warum?
- XPipe hat Zugriff auf ALLE Server & Docker Container
- SSH Keys und Credentials im XPipe Vault
- Team kann Commands auf Production Servern ausfΓΌhren
- HΓΆchste Sicherheitsstufe nΓΆtig!
Access Policy:
- Application:
xpipe.g100.dev - Include: Core Team only (Email Whitelist)
- Require: One-Time PIN + 2FA (spΓ€ter)
- Session: 8 hours max
- Audit Logs: ACTIVE
π― Problem & LΓΆsung
Problem
- XPipe ist Desktop App (lΓ€uft lokal auf deinem Mac)
- Team braucht Zugriff auf deine Connections
- Team braucht Zugriff auf Server/Docker/Kubernetes
β LΓΆsung: Cloudflare Tunnel
βββββββββββββββββββββββββββββββββββββββββββ
β DEIN MAC (lokal) β
β β
β ββββββββββββββ β
β β XPipe β β Desktop App β
β βββββββ¬βββββββ β
β β β
β βββ SSH Connections β
β βββ Docker Containers β
β βββ Kubernetes Clusters β
β βββ MCP Server (Port 21721) β
β β
β ββββββββββββββββββββββββ β
β β Cloudflare Tunnel β β
β β (cloudflared) β β
β ββββββββββββ¬ββββββββββββ β
β β β
βββββββββββββββΌββββββββββββββββββββββββββββ
β
βΌ HTTPS
βββββββββββββββββββββββ
β Cloudflare Edge β
β xpipe.your-domain β
βββββββββββ¬ββββββββββββ
β
βΌ
βββββββββββββββββββββββ
β TEAM (weltweit) β
β - Developer A β
β - Developer B β
β - AI Agents β
βββββββββββββββββββββββ
π Setup Guide
1. XPipe lokal installieren
2. MCP Server aktivieren
In XPipe:
1. Settings β Automation β MCP Server
2. β
Enable MCP Server
3. β
Enable Write Operations
4. Port: 21721 (default)
5. Generate API Key β KOPIEREN!
3. Cloudflare Tunnel erstellen
# Cloudflared installieren
brew install cloudflare/cloudflare/cloudflared
# Login zu Cloudflare
cloudflared tunnel login
# Tunnel erstellen
cloudflared tunnel create xpipe-team-access
# Output:
# Tunnel credentials written to:
# /Users/gm/.cloudflared/<TUNNEL_ID>.json
# β
Copy <TUNNEL_ID>
4. Tunnel konfigurieren
Erstelle: ~/.cloudflared/config.yml
tunnel: <TUNNEL_ID> # Von Schritt 3
credentials-file: /Users/gm/.cloudflared/<TUNNEL_ID>.json
ingress:
# XPipe MCP Server
- hostname: xpipe.contractplattform.dev
service: http://localhost:21721
originRequest:
noTLSVerify: true
# Fallback
- service: http_status:404
5. DNS konfigurieren
# Automatisch DNS Record erstellen
cloudflared tunnel route dns xpipe-team-access xpipe.contractplattform.dev
# Output:
# β
Created CNAME record for xpipe.contractplattform.dev
6. Tunnel starten
# Foreground (zum Testen)
cloudflared tunnel run xpipe-team-access
# Background (Production)
cloudflared service install xpipe-team-access
macOS Service:
# Service starten
sudo launchctl load /Library/LaunchDaemons/com.cloudflare.cloudflared.plist
# Status prΓΌfen
sudo launchctl list | grep cloudflared
π€ Team Access Setup
Team Member Config
Auf jedem Team Mac/PC:
Claude Desktop Config (~/Library/Application Support/Claude/claude_desktop_config.json):
{
"mcpServers": {
"xpipe-team": {
"command": "http",
"args": ["https://xpipe.contractplattform.dev"],
"env": {
"XPIPE_API_KEY": "YOUR_XPIPE_API_KEY_FROM_STEP_2"
}
}
}
}
Cursor Config (.cursor/mcp_config.json):
{
"mcpServers": {
"xpipe": {
"url": "https://xpipe.contractplattform.dev",
"headers": {
"Authorization": "Bearer YOUR_XPIPE_API_KEY"
}
}
}
}
π Security Best Practices
1. API Key Rotation
2. Access Control
Cloudflare Access (optional, fΓΌr zusΓ€tzliche Sicherheit):
# In Cloudflare Dashboard:
# Zero Trust β Access β Applications β Add an application
Name: XPipe MCP Server
Domain: xpipe.contractplattform.dev
Policy:
- Email ends with: @your-company.com
- Require GitHub Auth
3. Read-Only fΓΌr bestimmte Team Members
In XPipe: - Settings β MCP Server - β Disable "Enable Write Operations" fΓΌr read-only access - Team kann dann nur lesen, nicht deployen
π³ Docker Container Access via XPipe
Use Case: Team greift auf Docker Container zu
Setup in XPipe:
- New Connection β Docker
- Host:
docker.host.internal(local Docker) - Containers: Auto-detect
Team kann dann:
# Via AI Agent (Claude/Cursor):
"Agent, list all Docker containers on production server via XPipe"
# Agent fΓΌhrt aus:
# β XPipe MCP Tool: list_containers
# β Zeigt alle Container
π¬ Workflow Example: Team Deployment
Szenario: Developer B deployed MORELO API
Developer B (remote in Berlin):
Agent Workflow:
1. Verbindet zu https://xpipe.contractplattform.dev
2. Authentifiziert mit API Key
3. FΓΌhrt XPipe Script deploy-morelo-safe.sh aus
4. Liest Output
5. Berichtet Success/Failure
Dein Mac (in MΓΌnchen): - XPipe lΓ€uft im Hintergrund - Cloudflare Tunnel leitet Request weiter - Script wird lokal ausgefΓΌhrt - Output wird zurΓΌck an Developer B gesendet
π Monitoring & Logs
Cloudflare Tunnel Logs
# Live Logs
cloudflared tunnel logs xpipe-team-access
# Oder in Cloudflare Dashboard:
# Zero Trust β Tunnels β xpipe-team-access β Logs
XPipe Logs
# macOS Logs
tail -f ~/Library/Application\ Support/XPipe/logs/xpipe.log
# Oder in XPipe:
# Settings β Advanced β Show Logs
π₯ Advanced: Multiple Tunnels
Verschiedene Environments
# ~/.cloudflared/config.yml
tunnel: <TUNNEL_ID>
credentials-file: /Users/gm/.cloudflared/<TUNNEL_ID>.json
ingress:
# Production XPipe
- hostname: xpipe.contractplattform.dev
service: http://localhost:21721
# Staging XPipe (anderer Port)
- hostname: xpipe-staging.contractplattform.dev
service: http://localhost:21722
# Dev MkDocs (bonus!)
- hostname: docs.contractplattform.dev
service: http://localhost:8000
# Fallback
- service: http_status:404
β Team Collaboration Features
| Feature | Local Only | Mit Cloudflare Tunnel |
|---|---|---|
| SSH Connections | β | β Via MCP |
| Docker Management | β | β Via MCP |
| Kubernetes Access | β | β Via MCP |
| Script Execution | β | β Via MCP |
| AI Agent Access | β Lokal | β Weltweit |
| Team Sharing | β Git Vault | β Live Access |
| Security | π Lokal | π HTTPS + API Key |
π― Next Steps
Phase 1: Lokal testen
Phase 2: Cloudflare Tunnel
Phase 3: Team Onboarding
π Resources
| Resource | URL |
|---|---|
| XPipe Docker Guide | https://docs.xpipe.io/guide/docker |
| XPipe VNC Guide | https://docs.xpipe.io/guide/vnc |
| Cloudflare Tunnel Docs | https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/ |
| cloudflared Installation | https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/installation/ |
π₯ BONUS: Git Vault + Cloudflare Tunnel
Beste Kombination:
Git Vault (fΓΌr Connections & Scripts)
βββ Team hat immer latest Connections
βββ Versioniert mit Git
βββ Self-hosted Repository
Cloudflare Tunnel (fΓΌr Live Access)
βββ Team kann live deployen
βββ AI Agents haben Zugriff
βββ Secure HTTPS + API Keys
Ready fΓΌr Team Setup? π
Next: Cloudflared installieren und ersten Tunnel erstellen!