···
42
-
supportedSystems = ["x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin"];
43
-
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
44
-
nixpkgsFor = forAllSystems (system:
47
-
overlays = [self.overlays.default];
49
-
inherit (gitignore.lib) gitignoreSource;
51
-
overlays.default = final: prev: let
52
-
goModHash = "sha256-EilWxfqrcKDaSR5zA3ZuDSCq7V+/IfWpKPu8HWhpndA=";
53
-
buildCmdPackage = name:
54
-
final.buildGoModule {
57
-
src = gitignoreSource ./.;
58
-
subPackages = ["cmd/${name}"];
59
-
vendorHash = goModHash;
63
-
indigo-lexgen = final.buildGoModule {
64
-
pname = "indigo-lexgen";
67
-
subPackages = ["cmd/lexgen"];
68
-
vendorHash = "sha256-pGc29fgJFq8LP7n/pY1cv6ExZl88PAeFqIbFEhB3xXs=";
72
-
appview = with final;
73
-
final.pkgsStatic.buildGoModule {
76
-
src = gitignoreSource ./.;
79
-
mkdir -p appview/pages/static/{fonts,icons}
80
-
cp -f ${htmx-src} appview/pages/static/htmx.min.js
81
-
cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
82
-
cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
83
-
cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
84
-
cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
85
-
${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o appview/pages/static/tw.css
89
-
subPackages = ["cmd/appview"];
90
-
vendorHash = goModHash;
92
-
stdenv = pkgsStatic.stdenv;
95
-
knotserver = with final;
96
-
final.pkgsStatic.buildGoModule {
97
-
pname = "knotserver";
99
-
src = gitignoreSource ./.;
100
-
nativeBuildInputs = [final.makeWrapper];
101
-
subPackages = ["cmd/knotserver"];
102
-
vendorHash = goModHash;
107
-
cp $GOPATH/bin/knotserver $out/bin/knotserver
109
-
wrapProgram $out/bin/knotserver \
110
-
--prefix PATH : ${pkgs.git}/bin
112
-
runHook postInstall
116
-
knotserver-unwrapped = final.pkgsStatic.buildGoModule {
117
-
pname = "knotserver";
119
-
src = gitignoreSource ./.;
120
-
subPackages = ["cmd/knotserver"];
121
-
vendorHash = goModHash;
124
-
repoguard = buildCmdPackage "repoguard";
125
-
keyfetch = buildCmdPackage "keyfetch";
127
-
packages = forAllSystems (system: {
129
-
(nixpkgsFor."${system}")
133
-
knotserver-unwrapped
138
-
defaultPackage = forAllSystems (system: nixpkgsFor.${system}.appview);
139
-
formatter = forAllSystems (system: nixpkgsFor."${system}".alejandra);
140
-
devShells = forAllSystems (system: let
141
-
pkgs = nixpkgsFor.${system};
142
-
staticShell = pkgs.mkShell.override {
143
-
stdenv = pkgs.pkgsStatic.stdenv;
146
-
default = staticShell {
147
-
nativeBuildInputs = [
159
-
mkdir -p appview/pages/static/{fonts,icons}
160
-
cp -f ${htmx-src} appview/pages/static/htmx.min.js
161
-
cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
162
-
cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
163
-
cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
164
-
cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
168
-
apps = forAllSystems (system: let
169
-
pkgs = nixpkgsFor."${system}";
170
-
air-watcher = name:
171
-
pkgs.writeShellScriptBin "run"
173
-
${pkgs.air}/bin/air -c /dev/null \
174
-
-build.cmd "${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o ./appview/pages/static/tw.css && ${pkgs.go}/bin/go build -o ./out/${name}.out ./cmd/${name}/main.go" \
175
-
-build.bin "./out/${name}.out" \
176
-
-build.include_ext "go"
179
-
pkgs.writeShellScriptBin "run"
181
-
${pkgs.tailwindcss}/bin/tailwindcss -w -i input.css -o ./appview/pages/static/tw.css
186
-
program = ''${air-watcher "appview"}/bin/run'';
188
-
watch-knotserver = {
190
-
program = ''${air-watcher "knotserver"}/bin/run'';
194
-
program = ''${tailwind-watcher}/bin/run'';
198
-
nixosModules.appview = {
206
-
services.tangled-appview = {
207
-
enable = mkOption {
210
-
description = "Enable tangled appview";
44
+
supportedSystems = [ "x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin" ];
45
+
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
46
+
nixpkgsFor = forAllSystems (system:
49
+
overlays = [ self.overlays.default ];
51
+
inherit (gitignore.lib) gitignoreSource;
54
+
overlays.default = final: prev:
56
+
goModHash = "sha256-EilWxfqrcKDaSR5zA3ZuDSCq7V+/IfWpKPu8HWhpndA=";
57
+
buildCmdPackage = name:
58
+
final.buildGoModule {
61
+
src = gitignoreSource ./.;
62
+
subPackages = [ "cmd/${name}" ];
63
+
vendorHash = goModHash;
215
-
description = "Port to run the appview on";
217
-
cookie_secret = mkOption {
219
-
default = "00000000000000000000000000000000";
220
-
description = "Cookie secret";
68
+
indigo-lexgen = final.buildGoModule {
69
+
pname = "indigo-lexgen";
72
+
subPackages = [ "cmd/lexgen" ];
73
+
vendorHash = "sha256-pGc29fgJFq8LP7n/pY1cv6ExZl88PAeFqIbFEhB3xXs=";
77
+
appview = with final;
78
+
final.pkgsStatic.buildGoModule {
81
+
src = gitignoreSource ./.;
84
+
mkdir -p appview/pages/static/{fonts,icons}
85
+
cp -f ${htmx-src} appview/pages/static/htmx.min.js
86
+
cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
87
+
cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
88
+
cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
89
+
cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
90
+
${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o appview/pages/static/tw.css
94
+
subPackages = [ "cmd/appview" ];
95
+
vendorHash = goModHash;
97
+
stdenv = pkgsStatic.stdenv;
225
-
config = mkIf config.services.tangled-appview.enable {
226
-
systemd.services.tangled-appview = {
227
-
description = "tangled appview service";
228
-
wantedBy = ["multi-user.target"];
100
+
knotserver = with final;
101
+
final.pkgsStatic.buildGoModule {
102
+
pname = "knotserver";
104
+
src = gitignoreSource ./.;
105
+
nativeBuildInputs = [ final.makeWrapper ];
106
+
subPackages = [ "cmd/knotserver" ];
107
+
vendorHash = goModHash;
231
-
ListenStream = "0.0.0.0:${toString config.services.tangled-appview.port}";
232
-
ExecStart = "${self.packages.${pkgs.system}.appview}/bin/appview";
233
-
Restart = "always";
112
+
cp $GOPATH/bin/knotserver $out/bin/knotserver
237
-
TANGLED_DB_PATH = "appview.db";
238
-
TANGLED_COOKIE_SECRET = config.services.tangled-appview.cookie_secret;
114
+
wrapProgram $out/bin/knotserver \
115
+
--prefix PATH : ${pkgs.git}/bin
117
+
runHook postInstall
121
+
knotserver-unwrapped = final.pkgsStatic.buildGoModule {
122
+
pname = "knotserver";
124
+
src = gitignoreSource ./.;
125
+
subPackages = [ "cmd/knotserver" ];
126
+
vendorHash = goModHash;
129
+
repoguard = buildCmdPackage "repoguard";
130
+
keyfetch = buildCmdPackage "keyfetch";
132
+
packages = forAllSystems (system: {
134
+
(nixpkgsFor."${system}")
138
+
knotserver-unwrapped
143
+
defaultPackage = forAllSystems (system: nixpkgsFor.${system}.appview);
144
+
formatter = forAllSystems (system: nixpkgsFor."${system}".alejandra);
145
+
devShells = forAllSystems (system:
147
+
pkgs = nixpkgsFor.${system};
148
+
staticShell = pkgs.mkShell.override {
149
+
stdenv = pkgs.pkgsStatic.stdenv;
153
+
default = staticShell {
154
+
nativeBuildInputs = [
166
+
mkdir -p appview/pages/static/{fonts,icons}
167
+
cp -f ${htmx-src} appview/pages/static/htmx.min.js
168
+
cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
169
+
cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
170
+
cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
171
+
cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
175
+
apps = forAllSystems (system:
177
+
pkgs = nixpkgsFor."${system}";
178
+
air-watcher = name:
179
+
pkgs.writeShellScriptBin "run"
181
+
TANGLED_DEV=true ${pkgs.air}/bin/air -c /dev/null \
182
+
-build.cmd "${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o ./appview/pages/static/tw.css && ${pkgs.go}/bin/go build -o ./out/${name}.out ./cmd/${name}/main.go" \
183
+
-build.bin "./out/${name}.out" \
184
+
-build.include_ext "go"
187
+
pkgs.writeShellScriptBin "run"
189
+
${pkgs.tailwindcss}/bin/tailwindcss -w -i input.css -o ./appview/pages/static/tw.css
195
+
program = ''${air-watcher "appview"}/bin/run'';
197
+
watch-knotserver = {
199
+
program = ''${air-watcher "knotserver"}/bin/run'';
203
+
program = ''${tailwind-watcher}/bin/run'';
244
-
nixosModules.knotserver = {
250
-
cfg = config.services.tangled-knotserver;
254
-
services.tangled-knotserver = {
255
-
enable = mkOption {
258
-
description = "Enable a tangled knotserver";
207
+
nixosModules.appview =
215
+
services.tangled-appview = {
216
+
enable = mkOption {
219
+
description = "Enable tangled appview";
224
+
description = "Port to run the appview on";
226
+
cookie_secret = mkOption {
228
+
default = "00000000000000000000000000000000";
229
+
description = "Cookie secret";
261
-
appviewEndpoint = mkOption {
263
-
default = "https://tangled.sh";
264
-
description = "Appview endpoint";
234
+
config = mkIf config.services.tangled-appview.enable {
235
+
systemd.services.tangled-appview = {
236
+
description = "tangled appview service";
237
+
wantedBy = [ "multi-user.target" ];
267
-
gitUser = mkOption {
270
-
description = "User that hosts git repos and performs git operations";
240
+
ListenStream = "0.0.0.0:${toString config.services.tangled-appview.port}";
241
+
ExecStart = "${self.packages.${pkgs.system}.appview}/bin/appview";
242
+
Restart = "always";
273
-
openFirewall = mkOption {
276
-
description = "Open port 22 in the firewall for ssh";
279
-
stateDir = mkOption {
281
-
default = "/home/${cfg.gitUser}";
282
-
description = "Tangled knot data directory";
286
-
scanPath = mkOption {
288
-
default = cfg.stateDir;
289
-
description = "Path where repositories are scanned from";
246
+
TANGLED_DB_PATH = "appview.db";
247
+
TANGLED_COOKIE_SECRET = config.services.tangled-appview.cookie_secret;
292
-
mainBranch = mkOption {
295
-
description = "Default branch name for repositories";
253
+
nixosModules.knotserver =
260
+
cfg = config.services.tangled-knotserver;
264
+
services.tangled-knotserver = {
265
+
enable = mkOption {
268
+
description = "Enable a tangled knotserver";
300
-
listenAddr = mkOption {
271
+
appviewEndpoint = mkOption {
302
-
default = "0.0.0.0:5555";
303
-
description = "Address to listen on";
273
+
default = "https://tangled.sh";
274
+
description = "Appview endpoint";
306
-
internalListenAddr = mkOption {
277
+
gitUser = mkOption {
308
-
default = "127.0.0.1:5444";
309
-
description = "Internal address for inter-service communication";
280
+
description = "User that hosts git repos and performs git operations";
312
-
secretFile = mkOption {
313
-
type = lib.types.path;
314
-
example = "KNOT_SERVER_SECRET=<hash>";
315
-
description = "File containing secret key provided by appview (required)";
283
+
openFirewall = mkOption {
286
+
description = "Open port 22 in the firewall for ssh";
318
-
dbPath = mkOption {
289
+
stateDir = mkOption {
320
-
default = "${cfg.stateDir}/knotserver.db";
321
-
description = "Path to the database file";
291
+
default = "/home/${cfg.gitUser}";
292
+
description = "Tangled knot data directory";
324
-
hostname = mkOption {
326
-
example = "knot.tangled.sh";
327
-
description = "Hostname for the server (required)";
296
+
scanPath = mkOption {
298
+
default = cfg.stateDir;
299
+
description = "Path where repositories are scanned from";
302
+
mainBranch = mkOption {
305
+
description = "Default branch name for repositories";
333
-
description = "Enable development mode (disables signature verification)";
310
+
listenAddr = mkOption {
312
+
default = "0.0.0.0:5555";
313
+
description = "Address to listen on";
316
+
internalListenAddr = mkOption {
318
+
default = "127.0.0.1:5444";
319
+
description = "Internal address for inter-service communication";
322
+
secretFile = mkOption {
323
+
type = lib.types.path;
324
+
example = "KNOT_SERVER_SECRET=<hash>";
325
+
description = "File containing secret key provided by appview (required)";
328
+
dbPath = mkOption {
330
+
default = "${cfg.stateDir}/knotserver.db";
331
+
description = "Path to the database file";
334
+
hostname = mkOption {
336
+
example = "knot.tangled.sh";
337
+
description = "Hostname for the server (required)";
343
+
description = "Enable development mode (disables signature verification)";
339
-
config = mkIf cfg.enable {
340
-
environment.systemPackages = with pkgs; [git];
349
+
config = mkIf cfg.enable {
350
+
environment.systemPackages = with pkgs; [ git ];
342
-
system.activationScripts.gitConfig = ''
343
-
mkdir -p "${cfg.repo.scanPath}"
344
-
chown -R ${cfg.gitUser}:${cfg.gitUser} \
345
-
"${cfg.repo.scanPath}"
352
+
system.activationScripts.gitConfig = ''
353
+
mkdir -p "${cfg.repo.scanPath}"
354
+
chown -R ${cfg.gitUser}:${cfg.gitUser} \
355
+
"${cfg.repo.scanPath}"
347
-
mkdir -p "${cfg.stateDir}/.config/git"
348
-
cat > "${cfg.stateDir}/.config/git/config" << EOF
351
-
email = git@example.com
353
-
chown -R ${cfg.gitUser}:${cfg.gitUser} \
357
+
mkdir -p "${cfg.stateDir}/.config/git"
358
+
cat > "${cfg.stateDir}/.config/git/config" << EOF
361
+
email = git@example.com
363
+
chown -R ${cfg.gitUser}:${cfg.gitUser} \
357
-
users.users.${cfg.gitUser} = {
358
-
isSystemUser = true;
359
-
useDefaultShell = true;
360
-
home = cfg.stateDir;
362
-
group = cfg.gitUser;
367
+
users.users.${cfg.gitUser} = {
368
+
isSystemUser = true;
369
+
useDefaultShell = true;
370
+
home = cfg.stateDir;
372
+
group = cfg.gitUser;
365
-
users.groups.${cfg.gitUser} = {};
375
+
users.groups.${cfg.gitUser} = { };
367
-
services.openssh = {
370
-
Match User ${cfg.gitUser}
371
-
AuthorizedKeysCommand /etc/ssh/keyfetch_wrapper
372
-
AuthorizedKeysCommandUser nobody
377
+
services.openssh = {
380
+
Match User ${cfg.gitUser}
381
+
AuthorizedKeysCommand /etc/ssh/keyfetch_wrapper
382
+
AuthorizedKeysCommandUser nobody
376
-
environment.etc."ssh/keyfetch_wrapper" = {
379
-
#!${pkgs.stdenv.shell}
380
-
${self.packages.${pkgs.system}.keyfetch}/bin/keyfetch \
381
-
-repoguard-path ${self.packages.${pkgs.system}.repoguard}/bin/repoguard \
382
-
-internal-api "http://${cfg.server.internalListenAddr}" \
383
-
-git-dir "${cfg.repo.scanPath}" \
384
-
-log-path /tmp/repoguard.log
386
+
environment.etc."ssh/keyfetch_wrapper" = {
389
+
#!${pkgs.stdenv.shell}
390
+
${self.packages.${pkgs.system}.keyfetch}/bin/keyfetch \
391
+
-repoguard-path ${self.packages.${pkgs.system}.repoguard}/bin/repoguard \
392
+
-internal-api "http://${cfg.server.internalListenAddr}" \
393
+
-git-dir "${cfg.repo.scanPath}" \
394
+
-log-path /tmp/repoguard.log
388
-
systemd.services.knotserver = {
389
-
description = "knotserver service";
390
-
after = ["network.target" "sshd.service"];
391
-
wantedBy = ["multi-user.target"];
393
-
User = cfg.gitUser;
394
-
WorkingDirectory = cfg.stateDir;
396
-
"KNOT_REPO_SCAN_PATH=${cfg.repo.scanPath}"
397
-
"KNOT_REPO_MAIN_BRANCH=${cfg.repo.mainBranch}"
398
-
"APPVIEW_ENDPOINT=${cfg.appviewEndpoint}"
399
-
"KNOT_SERVER_INTERNAL_LISTEN_ADDR=${cfg.server.internalListenAddr}"
400
-
"KNOT_SERVER_LISTEN_ADDR=${cfg.server.listenAddr}"
401
-
"KNOT_SERVER_DB_PATH=${cfg.server.dbPath}"
402
-
"KNOT_SERVER_HOSTNAME=${cfg.server.hostname}"
404
-
EnvironmentFile = cfg.server.secretFile;
405
-
ExecStart = "${self.packages.${pkgs.system}.knotserver}/bin/knotserver";
406
-
Restart = "always";
398
+
systemd.services.knotserver = {
399
+
description = "knotserver service";
400
+
after = [ "network.target" "sshd.service" ];
401
+
wantedBy = [ "multi-user.target" ];
403
+
User = cfg.gitUser;
404
+
WorkingDirectory = cfg.stateDir;
406
+
"KNOT_REPO_SCAN_PATH=${cfg.repo.scanPath}"
407
+
"KNOT_REPO_MAIN_BRANCH=${cfg.repo.mainBranch}"
408
+
"APPVIEW_ENDPOINT=${cfg.appviewEndpoint}"
409
+
"KNOT_SERVER_INTERNAL_LISTEN_ADDR=${cfg.server.internalListenAddr}"
410
+
"KNOT_SERVER_LISTEN_ADDR=${cfg.server.listenAddr}"
411
+
"KNOT_SERVER_DB_PATH=${cfg.server.dbPath}"
412
+
"KNOT_SERVER_HOSTNAME=${cfg.server.hostname}"
414
+
EnvironmentFile = cfg.server.secretFile;
415
+
ExecStart = "${self.packages.${pkgs.system}.knotserver}/bin/knotserver";
416
+
Restart = "always";
410
-
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [22];
420
+
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ 22 ];
414
-
nixosConfigurations.knotVM = nixpkgs.lib.nixosSystem {
415
-
system = "x86_64-linux";
417
-
self.nixosModules.knotserver
423
-
virtualisation.memorySize = 2048;
424
-
virtualisation.cores = 2;
425
-
services.getty.autologinUser = "root";
426
-
environment.systemPackages = with pkgs; [curl vim git];
427
-
systemd.tmpfiles.rules = let
428
-
u = config.services.tangled-knotserver.gitUser;
429
-
g = config.services.tangled-knotserver.gitUser;
431
-
"d /var/lib/knotserver 0770 ${u} ${g} - -" # Create the directory first
432
-
"f+ /var/lib/knotserver/secret 0660 ${u} ${g} - KNOT_SERVER_SECRET=5b42390da4c6659f34c9a545adebd8af82c4a19960d735f651e3d582623ba9f2"
434
-
services.tangled-knotserver = {
437
-
secretFile = "/var/lib/knotserver/secret";
438
-
hostname = "localhost:6000";
439
-
listenAddr = "0.0.0.0:6000";
424
+
nixosConfigurations.knotVM = nixpkgs.lib.nixosSystem {
425
+
system = "x86_64-linux";
427
+
self.nixosModules.knotserver
432
+
virtualisation.memorySize = 2048;
433
+
virtualisation.cores = 2;
434
+
services.getty.autologinUser = "root";
435
+
environment.systemPackages = with pkgs; [ curl vim git ];
436
+
systemd.tmpfiles.rules =
438
+
u = config.services.tangled-knotserver.gitUser;
439
+
g = config.services.tangled-knotserver.gitUser;
442
+
"d /var/lib/knotserver 0770 ${u} ${g} - -" # Create the directory first
443
+
"f+ /var/lib/knotserver/secret 0660 ${u} ${g} - KNOT_SERVER_SECRET=5b42390da4c6659f34c9a545adebd8af82c4a19960d735f651e3d582623ba9f2"
445
+
services.tangled-knotserver = {
448
+
secretFile = "/var/lib/knotserver/secret";
449
+
hostname = "localhost:6000";
450
+
listenAddr = "0.0.0.0:6000";