add nixos module but good

This commit is contained in:
Aubrey 2024-12-22 00:31:20 -06:00
parent f1194c752c
commit 0dc1bf6c36
No known key found for this signature in database

113
flake.nix
View file

@ -48,67 +48,70 @@
openssl openssl
]; ];
}; };
formatter = pkgs.alejandra;
packages.default = craneLib.buildPackage (commonArgs packages.default = craneLib.buildPackage (commonArgs
// { // {
cargoArtifacts = craneLib.buildDepsOnly commonArgs; cargoArtifacts = craneLib.buildDepsOnly commonArgs;
}); });
nixosModules.default = with lib; { config, ... }: { formatter = alejandra;
options.services.smo-server = { }
enable = mkEnableOption "a game server for Super Mario Odyssey Online"; )
user = mkOption { // {
type = lib.types.string; nixosModules.default = {config, lib, pkgs, system, ...}: {
description = "The user to start the server with"; options.services.smo-server = {
}; enable = lib.mkEnableOption "a game server for Super Mario Odyssey Online";
enableFaker = mkOption { user = lib.mkOption {
type = lib.types.bool; type = lib.types.string;
default = false; description = "The user to start the server with";
example = true;
description = "Whether to enable the test bot for solo development.";
};
tcpPort = mkOption {
type = lib.types.port;
default = 1027;
description = "The TCP port to host the server on";
};
udpPort = mkOption {
type = lib.types.port;
default = 1027;
description = "The UDP port to host the server on";
};
proximity = {
type = lib.types.attrs;
port = {
type = lib.types.port;
example = 4433;
description = "The UDP port to host the proximity chat server on";
};
certPath = {
type = lib.types.path;
example = "cert.pem";
description = "The certificate used for encrypting the WebTransport stream";
};
keyPath = {
type = lib.types.path;
example = "cert.pem";
description = "The certificate used for encrypting the WebTransport stream";
};
};
}; };
config = mkIf config.services.smo-server.enable { enableFaker = lib.mkOption {
systemd.services.smo-server = with services.smo-server; { type = lib.types.bool;
wantedBy = ["multi-user.target"]; default = false;
after = ["network.target"]; example = true;
description = "Start smo-server"; description = "Whether to enable the test bot for solo development.";
serviceConfig = { };
WorkingDirectory = "${packages.default.outPath}"; tcpPort = lib.mkOption {
Type = "simple"; type = lib.types.port;
ExecStart = let proxRes = 5; default = 1027;
in ''${packages.default.outPath}/bin/smo-server -t ${tcpPort} -u ${udpPort} ${proxRes}''; description = "The TCP port to host the server on";
}; };
udpPort = lib.mkOption {
type = lib.types.port;
default = 1027;
description = "The UDP port to host the server on";
};
proximity = {
type = lib.types.attrs;
port = lib.mkOption {
type = lib.types.port;
example = 4433;
description = "The UDP port to host the proximity chat server on";
};
certPath = lib.mkOption {
type = lib.types.path;
example = "cert.pem";
description = "The certificate used for encrypting the WebTransport stream";
};
keyPath = lib.mkOption {
type = lib.types.path;
example = "cert.pem";
description = "The certificate used for encrypting the WebTransport stream";
}; };
}; };
}; };
} config = if config.services.smo-server.enable then {
); systemd.services.smo-server = with config.services.smo-server; {
wantedBy = ["multi-user.target"];
after = ["network.target"];
description = "Start smo-server";
serviceConfig = {
WorkingDirectory = "${self.packages.${system}.default.outPath}";
Type = "simple";
ExecStart = let
proxRes = 5;
in ''${self.packages.${system}.default.outPath}/bin/smo-server -t ${tcpPort} -u ${udpPort}'';
};
};
} else {};
};
};
} }