flake/nixos/modules/services/hysteria.nix

82 lines
2.5 KiB
Nix
Raw Normal View History

{
config,
lib,
2024-07-09 13:03:42 +00:00
pkgs,
utils,
...
}: let
cfg = config.services.hysteria;
2024-07-09 13:03:42 +00:00
settingsFormat = pkgs.formats.json {};
in {
options.services.hysteria = {
enable = lib.mkEnableOption "Hysteria, a powerful, lightning fast and censorship resistant proxy";
package = lib.mkPackageOption pkgs "hysteria" {};
mode = lib.mkOption {
type = lib.types.enum ["server" "client"];
default = "server";
2024-05-01 00:20:34 +00:00
description = "Whether to use Hysteria as a client or a server.";
};
2024-07-09 13:03:42 +00:00
settings = lib.mkOption {
type = lib.types.submodule {
freeformType = settingsFormat.type;
};
default = {};
2024-05-01 00:20:34 +00:00
description = ''
2024-07-09 13:03:42 +00:00
The Hysteria configuration, see https://hysteria.network/ for documentation.
2024-05-01 00:20:34 +00:00
2024-07-09 13:03:42 +00:00
Options containing secret data should be set to an attribute set
containing the attribute `_secret` - a string pointing to a file
containing the value the option should be set to.
Ignored when `services.hysteria.configFile` is set.
2024-05-01 00:20:34 +00:00
'';
};
};
config = lib.mkIf cfg.enable {
systemd.services."hysteria" = {
description = "Hysteria daemon, a powerful, lightning fast and censorship resistant proxy.";
2024-05-01 00:20:34 +00:00
documentation = ["https://hysteria.network/"];
wantedBy = ["multi-user.target"];
after = ["network-online.target"];
wants = ["network-online.target"];
2024-07-09 13:03:42 +00:00
preStart = utils.genJqSecretsReplacementSnippet cfg.settings "/var/lib/private/hysteria/config.json";
serviceConfig = {
ExecStart = lib.concatStringsSep " " [
(lib.getExe cfg.package)
cfg.mode
2024-07-09 13:03:42 +00:00
"--config /var/lib/private/hysteria/config.json"
];
DynamicUser = true;
StateDirectory = "hysteria";
### Hardening
AmbientCapabilities = ["CAP_NET_ADMIN" "CAP_NET_BIND_SERVICE" "CAP_NET_RAW"];
CapabilityBoundingSet = ["CAP_NET_ADMIN" "CAP_NET_BIND_SERVICE" "CAP_NET_RAW"];
NoNewPrivileges = true;
PrivateMounts = true;
PrivateTmp = true;
ProcSubset = "pid";
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectProc = "invisible";
ProtectSystem = "strict";
RestrictRealtime = true;
RestrictSUIDSGID = true;
RestrictNamespaces = true;
SystemCallArchitectures = "native";
2024-05-01 00:20:34 +00:00
SystemCallFilter = "@system-service";
UMask = "0077";
};
};
};
}