feat: setup termix and wireproxy for sock5 proxy.
This commit is contained in:
parent
02062743f8
commit
2363adccc0
9 changed files with 135 additions and 24 deletions
34
modules/servers/per-server/tyr/services/wireproxy.nix
Normal file
34
modules/servers/per-server/tyr/services/wireproxy.nix
Normal file
|
|
@ -0,0 +1,34 @@
|
|||
{pkgs, ...}: {
|
||||
systemd.services.wireproxy = {
|
||||
enable = true;
|
||||
description = "Wireproxy";
|
||||
after = ["network.target"];
|
||||
wants = ["network.target"];
|
||||
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
Restart = "always";
|
||||
RestartSec = 3;
|
||||
User = "wireproxy";
|
||||
Group = "wireproxy";
|
||||
WorkingDirectory = "/var/lib/wireproxy";
|
||||
StateDirectory = "wireproxy";
|
||||
};
|
||||
|
||||
script = "${pkgs.wireproxy}/bin/wireproxy";
|
||||
|
||||
wantedBy = ["multi-user.target"];
|
||||
};
|
||||
|
||||
users = {
|
||||
users.wireproxy = {
|
||||
isSystemUser = true;
|
||||
home = "/var/lib/wireproxy";
|
||||
createHome = true;
|
||||
group = "wireproxy";
|
||||
};
|
||||
groups.wireproxy = {};
|
||||
};
|
||||
|
||||
networking.firewall.allowedTCPPorts = [25344];
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue