nixos-config/modules/minecraft.nix

110 lines
3.1 KiB
Nix
Raw Normal View History

2022-02-19 14:34:26 +00:00
{ config, lib, options, pkgs, ... }:
with lib;
let
papermc = pkgs.callPackage ../packages/minecraft/paper.nix { };
cfg = config.services.minecraft;
opt = options.services.minecraft;
serverProperties = pkgs.writeText "server.properties" ''
${cfg.properties.extraConfig}
'';
whitelistJson = pkgs.writeText "whitelist.json" ''
2022-02-19 14:36:39 +00:00
${builtins.toJSON cfg.whitelist}
2022-02-19 14:34:26 +00:00
'';
in
{
options.services.minecraft = {
enable = mkOption {
default = false;
type = types.bool;
description = "Enable minecraft server";
};
stateDir = mkOption {
default = "/var/lib/minecraft";
type = types.string;
description = "Path to the minecraft server state directory";
};
properties = {
extraConfig = mkOption {
default = "";
type = types.string;
description = "Extra configuration to be added to the minecraft server properties file";
};
};
whitelist = mkOption {
default = [ ];
type = types.listOf (types.submodule {
options = {
uuid = mkOption {
type = types.string;
description = "UUID of the whitelist entry";
};
name = mkOption {
type = types.string;
description = "Name of the whitelist entry";
};
};
});
};
};
config = mkIf cfg.enable {
systemd.services.minecraft = {
description = "Minecraft Server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ papermc ];
preStart = ''
# Agree to the EULA
echo "eula=true" > eula.txt
# Update the server properties
cp ${serverProperties} server.properties
# Update the whitelist
cp ${whitelistJson} whitelist.json
'';
serviceConfig = {
Type = "simple";
User = "minecraft";
Group = "minecraft";
WorkingDirectory = cfg.stateDir;
2022-02-19 14:38:42 +00:00
ExecStart = "${papermc}/bin/minecraft-server";
2022-02-19 14:34:26 +00:00
Restart = "always";
RuntimeDirectory = "minecraft";
RuntimeDirectoryMode = "0755";
UMask = "0027";
CapabilityBoundingSet = "";
# Security
NoNewPrivileges = true;
# Sandboxing
ProtectSystem = "strict";
ProtectHome = true;
PrivateTmp = true;
PrivateDevices = true;
PrivateUsers = true;
ProtectHostname = true;
ProtectClock = true;
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectKernelLogs = true;
ProtectControlGroups = true;
RestrictAddressFamilies = [ "AF_UNIX AF_INET AF_INET6" ];
LockPersonality = true;
MemoryDenyWriteExecute = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
PrivateMounts = true;
};
environment = {
USER = "minecraft";
HOME = cfg.stateDir;
};
};
users.users.minecraft = {
description = "Minecraft Server";
home = cfg.stateDir;
useDefaultShell = true;
group = "minecraft";
isSystemUser = true;
};
users.groups.minecraft = { };
};
}