From b2e6844e9e451804f507635314f7d8dd2a1fe96e Mon Sep 17 00:00:00 2001 From: Claude Date: Sat, 11 Apr 2026 14:48:23 +0000 Subject: [PATCH] Comment out Hytale server in game-servers.nix https://claude.ai/code/session_01Ays1x4CUUJE1jPLkeNMojV --- services/game-servers.nix | 60 +++++++++++++++++++-------------------- 1 file changed, 30 insertions(+), 30 deletions(-) diff --git a/services/game-servers.nix b/services/game-servers.nix index dd0635d..1759773 100644 --- a/services/game-servers.nix +++ b/services/game-servers.nix @@ -35,35 +35,35 @@ }; ## <----- HYTALE ----> ## - systemd.services.hytale-server = { - description = "Hytale Dedicated Server"; - wantedBy = [ "multi-user.target" ]; - after = [ "network.target" ]; - - path = with pkgs; [ bash jdk unzip gawk gnugrep coreutils screen ]; # Added screen - - environment = { - HYTALE_MEMORY = "8G"; - }; - - serviceConfig = { - Type = "forking"; # Changed from "simple" - User = "fred"; - Group = "users"; - WorkingDirectory = "/home/fred/docker/hytale-server/Server"; - ExecStart = "${pkgs.screen}/bin/screen -dmS hytale /home/fred/docker/hytale-server/start-hytale.sh"; - ExecStop = "${pkgs.screen}/bin/screen -S hytale -X stuff 'stop^M'"; - RemainAfterExit = "yes"; - Restart = "on-failure"; - RestartSec = "10s"; - TimeoutStopSec = "30s"; - - # Security hardening - NoNewPrivileges = true; - PrivateTmp = true; - }; - }; - - networking.firewall.allowedUDPPorts = [ 5520 9876 9877 ]; + # systemd.services.hytale-server = { + # description = "Hytale Dedicated Server"; + # wantedBy = [ "multi-user.target" ]; + # after = [ "network.target" ]; + # + # path = with pkgs; [ bash jdk unzip gawk gnugrep coreutils screen ]; + # + # environment = { + # HYTALE_MEMORY = "8G"; + # }; + # + # serviceConfig = { + # Type = "forking"; + # User = "fred"; + # Group = "users"; + # WorkingDirectory = "/home/fred/docker/hytale-server/Server"; + # ExecStart = "${pkgs.screen}/bin/screen -dmS hytale /home/fred/docker/hytale-server/start-hytale.sh"; + # ExecStop = "${pkgs.screen}/bin/screen -S hytale -X stuff 'stop^M'"; + # RemainAfterExit = "yes"; + # Restart = "on-failure"; + # RestartSec = "10s"; + # TimeoutStopSec = "30s"; + # + # # Security hardening + # NoNewPrivileges = true; + # PrivateTmp = true; + # }; + # }; + + networking.firewall.allowedUDPPorts = [ 9876 9877 ]; }; }