diff --git a/flake.nix b/flake.nix index 815d91f..526101a 100644 --- a/flake.nix +++ b/flake.nix @@ -48,67 +48,70 @@ openssl ]; }; - formatter = pkgs.alejandra; packages.default = craneLib.buildPackage (commonArgs // { cargoArtifacts = craneLib.buildDepsOnly commonArgs; }); - nixosModules.default = with lib; { config, ... }: { - options.services.smo-server = { - enable = mkEnableOption "a game server for Super Mario Odyssey Online"; - user = mkOption { - type = lib.types.string; - description = "The user to start the server with"; - }; - enableFaker = mkOption { - type = lib.types.bool; - default = false; - example = true; - description = "Whether to enable the test bot for solo development."; - }; - tcpPort = mkOption { - type = lib.types.port; - default = 1027; - description = "The TCP port to host the server on"; - }; - udpPort = mkOption { - type = lib.types.port; - default = 1027; - description = "The UDP port to host the server on"; - }; - proximity = { - type = lib.types.attrs; - port = { - type = lib.types.port; - example = 4433; - description = "The UDP port to host the proximity chat server on"; - }; - certPath = { - type = lib.types.path; - example = "cert.pem"; - description = "The certificate used for encrypting the WebTransport stream"; - }; - keyPath = { - type = lib.types.path; - example = "cert.pem"; - description = "The certificate used for encrypting the WebTransport stream"; - }; - }; + formatter = alejandra; + } + ) + // { + nixosModules.default = {config, lib, pkgs, system, ...}: { + options.services.smo-server = { + enable = lib.mkEnableOption "a game server for Super Mario Odyssey Online"; + user = lib.mkOption { + type = lib.types.string; + description = "The user to start the server with"; }; - config = mkIf config.services.smo-server.enable { - systemd.services.smo-server = with services.smo-server; { - wantedBy = ["multi-user.target"]; - after = ["network.target"]; - description = "Start smo-server"; - serviceConfig = { - WorkingDirectory = "${packages.default.outPath}"; - Type = "simple"; - ExecStart = let proxRes = 5; - in ''${packages.default.outPath}/bin/smo-server -t ${tcpPort} -u ${udpPort} ${proxRes}''; - }; + enableFaker = lib.mkOption { + type = lib.types.bool; + default = false; + example = true; + description = "Whether to enable the test bot for solo development."; + }; + tcpPort = lib.mkOption { + type = lib.types.port; + default = 1027; + description = "The TCP port to host the server on"; + }; + udpPort = lib.mkOption { + type = lib.types.port; + default = 1027; + description = "The UDP port to host the server on"; + }; + proximity = { + type = lib.types.attrs; + port = lib.mkOption { + type = lib.types.port; + example = 4433; + description = "The UDP port to host the proximity chat server on"; + }; + certPath = lib.mkOption { + type = lib.types.path; + example = "cert.pem"; + description = "The certificate used for encrypting the WebTransport stream"; + }; + keyPath = lib.mkOption { + type = lib.types.path; + example = "cert.pem"; + description = "The certificate used for encrypting the WebTransport stream"; }; }; }; - } - ); + config = if config.services.smo-server.enable then { + systemd.services.smo-server = with config.services.smo-server; { + wantedBy = ["multi-user.target"]; + after = ["network.target"]; + description = "Start smo-server"; + serviceConfig = { + WorkingDirectory = "${self.packages.${system}.default.outPath}"; + Type = "simple"; + ExecStart = let + proxRes = 5; + in ''${self.packages.${system}.default.outPath}/bin/smo-server -t ${tcpPort} -u ${udpPort}''; + }; + }; + } else {}; + }; + }; }