60 lines
1.4 KiB
Nix
60 lines
1.4 KiB
Nix
{ lib, pkgs, ... }:
|
|
|
|
let
|
|
config = lib.toFile "config.yml" ''
|
|
config:
|
|
lite:
|
|
enabled: true
|
|
routes:
|
|
- host: stepson.minecraft.lyes.eu
|
|
backend: 10.0.0.2:25565
|
|
'';
|
|
in
|
|
{
|
|
environment.systemPackages = with pkgs; [ gate ];
|
|
|
|
systemd.services.gate = {
|
|
description = "Gate Minecraft Proxy";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
|
|
serviceConfig = {
|
|
ExecStart = "${pkgs.gate}/bin/gate --config ${config}";
|
|
Restart = "always";
|
|
|
|
StandardInput = "socket";
|
|
StandardOutput = "journal";
|
|
StandardError = "journal";
|
|
|
|
# Hardening
|
|
CapabilityBoundingSet = [ "" ];
|
|
DeviceAllow = [ "" ];
|
|
LockPersonality = true;
|
|
PrivateDevices = true;
|
|
PrivateTmp = true;
|
|
PrivateUsers = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectProc = "invisible";
|
|
RestrictAddressFamilies = [
|
|
"AF_INET"
|
|
"AF_INET6"
|
|
];
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SystemCallArchitectures = "native";
|
|
UMask = "0077";
|
|
};
|
|
};
|
|
|
|
networking.firewall = {
|
|
allowedTCPPorts = [ 25565 ];
|
|
allowedUDPPorts = [ 25565 ];
|
|
};
|
|
}
|