forked from tangled.org/core
Monorepo for Tangled — https://tangled.org

nix/modules: tangled-appview -> tangled.appview

Signed-off-by: Anirudh Oppiliappan <anirudh@tangled.org>

anirudh.fi 7b3f9402 5b600825

verified
+3 -3
docs/hacking.md
···
did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR
# the secret key from above
-
export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..."
+
export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..."
# run redis in at a new shell to store oauth sessions
redis-server
···
If for any reason you wish to disable either one of the
services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set
-
`services.tangled-spindle.enable` (or
-
`services.tangled-knot.enable`) to `false`.
+
`services.tangled.spindle.enable` (or
+
`services.tangled.knot.enable`) to `false`.
+1 -1
docs/migrations.md
···
latest revision, and change your config block like so:
```diff
-
services.tangled-knot = {
+
services.tangled.knot = {
enable = true;
server = {
- secretFile = /path/to/secret;
+3 -3
flake.nix
···
}: {
imports = [./nix/modules/appview.nix];
-
services.tangled-appview.package = lib.mkDefault self.packages.${pkgs.system}.appview;
+
services.tangled.appview.package = lib.mkDefault self.packages.${pkgs.system}.appview;
};
nixosModules.knot = {
lib,
···
}: {
imports = [./nix/modules/knot.nix];
-
services.tangled-knot.package = lib.mkDefault self.packages.${pkgs.system}.knot;
+
services.tangled.knot.package = lib.mkDefault self.packages.${pkgs.system}.knot;
};
nixosModules.spindle = {
lib,
···
}: {
imports = [./nix/modules/spindle.nix];
-
services.tangled-spindle.package = lib.mkDefault self.packages.${pkgs.system}.spindle;
+
services.tangled.spindle.package = lib.mkDefault self.packages.${pkgs.system}.spindle;
};
};
}
+4 -4
nix/modules/appview.nix
···
lib,
...
}: let
-
cfg = config.services.tangled-appview;
+
cfg = config.services.tangled.appview;
in
with lib; {
options = {
-
services.tangled-appview = {
+
services.tangled.appview = {
enable = mkOption {
type = types.bool;
default = false;
···
environmentFile = mkOption {
type = with types; nullOr path;
default = null;
-
example = "/etc/tangled-appview.env";
+
example = "/etc-/appview.env";
description = ''
Additional environment file as defined in {manpage}`systemd.exec(5)`.
···
};
config = mkIf cfg.enable {
-
systemd.services.tangled-appview = {
+
systemd.services.tangled.appview = {
description = "tangled appview service";
wantedBy = ["multi-user.target"];
+2 -2
nix/modules/knot.nix
···
lib,
...
}: let
-
cfg = config.services.tangled-knot;
+
cfg = config.services.tangled.knot;
in
with lib; {
options = {
-
services.tangled-knot = {
+
services.tangled.knot = {
enable = mkOption {
type = types.bool;
default = false;
+2 -2
nix/modules/spindle.nix
···
lib,
...
}: let
-
cfg = config.services.tangled-spindle;
+
cfg = config.services.tangled.spindle;
in
with lib; {
options = {
-
services.tangled-spindle = {
+
services.tangled.spindle = {
enable = mkOption {
type = types.bool;
default = false;
+6 -6
nix/vm.nix
···
time.timeZone = "Europe/London";
services.getty.autologinUser = "root";
environment.systemPackages = with pkgs; [curl vim git sqlite litecli];
-
services.tangled-knot = {
+
services.tangled.knot = {
enable = true;
motd = "Welcome to the development knot!\n";
server = {
···
listenAddr = "0.0.0.0:6000";
};
};
-
services.tangled-spindle = {
+
services.tangled.spindle = {
enable = true;
server = {
owner = envVar "TANGLED_VM_SPINDLE_OWNER";
···
users = {
# So we don't have to deal with permission clashing between
# blank disk VMs and existing state
-
users.${config.services.tangled-knot.gitUser}.uid = 666;
-
groups.${config.services.tangled-knot.gitUser}.gid = 666;
+
users.${config.services.tangled.knot.gitUser}.uid = 666;
+
groups.${config.services.tangled.knot.gitUser}.gid = 666;
# TODO: separate spindle user
};
···
serviceConfig.PermissionsStartOnly = true;
};
in {
-
knot = mkDataSyncScripts "/mnt/knot-data" config.services.tangled-knot.stateDir;
-
spindle = mkDataSyncScripts "/mnt/spindle-data" (builtins.dirOf config.services.tangled-spindle.server.dbPath);
+
knot = mkDataSyncScripts "/mnt/knot-data" config.services.tangled.knot.stateDir;
+
spindle = mkDataSyncScripts "/mnt/spindle-data" (builtins.dirOf config.services.tangled.spindle.server.dbPath);
};
})
];