{ lib, config, pkgs, ... }: let cfg = config.services.clash; in { options.services.clash = { enable = lib.mkEnableOption "Whether to enable Clash, A rule-based proxy in Go."; package = lib.mkPackageOption pkgs "clash" {}; configFile = lib.mkOption { default = null; type = lib.types.nullOr lib.types.path; description = "Configuration file to use."; }; webui = lib.mkOption { default = null; type = lib.types.nullOr lib.types.path; description = '' Local web interface to use. You can also use the following website, just in case: - metacubexd: - http://d.metacubex.one - https://metacubex.github.io/metacubexd - https://metacubexd.pages.dev - yacd: - https://yacd.haishan.me - clash-dashboard (buggy): - https://clash.razord.top ''; }; extraOpts = lib.mkOption { default = null; type = lib.types.nullOr lib.types.string; description = "Extra command line options to use."; }; }; config = lib.mkIf cfg.enable { ### systemd service systemd.services."clash" = { description = "Clash daemon, A rule-based proxy in Go."; documentation = ["https://clash.wiki/" "https://wiki.metacubex.one/"]; after = ["network-online.target"]; wantedBy = ["multi-user.target"]; serviceConfig = { ExecStart = builtins.concatStringsSep " " [ (lib.getExe cfg.package) "-d /var/lib/private/clash" (lib.optionalString (cfg.configFile != null) "-f \${CREDENTIALS_DIRECTORY}/configuration") (lib.optionalString (cfg.webui != null) "-ext-ui ${cfg.webui}") (lib.optionalString (cfg.extraOpts != null) cfg.extraOpts) ]; DynamicUser = true; StateDirectory = "clash"; LoadCredential = "configuration:${cfg.configFile}"; ### Hardening # Experimental, since I have no idea what am I doing... CapabilityBoundingSet = ["CAP_NET_ADMIN" "CAP_NET_BIND_SERVICE" "CAP_NET_RAW"]; AmbientCapabilities = ["CAP_NET_ADMIN" "CAP_NET_BIND_SERVICE" "CAP_NET_RAW"]; NoNewPrivileges = true; MemoryDenyWriteExecute = true; LockPersonality = true; RestrictRealtime = true; RestrictSUIDSGID = true; ProtectSystem = "strict"; ProtectProc = "noaccess"; ProtectHome = true; ProtectClock = true; ProtectKernelLogs = true; ProtectControlGroups = true; ProtectKernelModules = true; ProtectHostname = true; ProtectKernelTunables = true; PrivateDevices = true; PrivateTmp = true; PrivateUsers = true; PrivateMounts = true; }; }; }; }