1{
2 description = "atproto github";
3
4 inputs = {
5 nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
6 indigo = {
7 url = "github:oppiliappan/indigo";
8 flake = false;
9 };
10 htmx-src = {
11 url = "https://unpkg.com/htmx.org@2.0.4/dist/htmx.min.js";
12 flake = false;
13 };
14 lucide-src = {
15 url = "https://github.com/lucide-icons/lucide/releases/download/0.483.0/lucide-icons-0.483.0.zip";
16 flake = false;
17 };
18 inter-fonts-src = {
19 url = "https://github.com/rsms/inter/releases/download/v4.1/Inter-4.1.zip";
20 flake = false;
21 };
22 ibm-plex-mono-src = {
23 url = "https://github.com/IBM/plex/releases/download/%40ibm%2Fplex-mono%401.1.0/ibm-plex-mono.zip";
24 flake = false;
25 };
26 gitignore = {
27 url = "github:hercules-ci/gitignore.nix";
28 inputs.nixpkgs.follows = "nixpkgs";
29 };
30 };
31
32 outputs = {
33 self,
34 nixpkgs,
35 indigo,
36 htmx-src,
37 lucide-src,
38 gitignore,
39 inter-fonts-src,
40 ibm-plex-mono-src,
41 }: let
42 supportedSystems = ["x86_64-linux" "x86_64-darwin" "aarch64-linux" "aarch64-darwin"];
43 forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
44 nixpkgsFor = forAllSystems (system:
45 import nixpkgs {
46 inherit system;
47 overlays = [self.overlays.default];
48 });
49 inherit (gitignore.lib) gitignoreSource;
50 in {
51 overlays.default = final: prev: let
52 goModHash = "sha256-HkmfHtnuixvDsLPthcguXToOFQo4eliZKQA2ibytdsE=";
53 in {
54 indigo-lexgen = final.buildGoModule {
55 pname = "indigo-lexgen";
56 version = "0.1.0";
57 src = indigo;
58 subPackages = ["cmd/lexgen"];
59 vendorHash = "sha256-pGc29fgJFq8LP7n/pY1cv6ExZl88PAeFqIbFEhB3xXs=";
60 doCheck = false;
61 };
62
63 appview = with final;
64 final.pkgsStatic.buildGoModule {
65 pname = "appview";
66 version = "0.1.0";
67 src = gitignoreSource ./.;
68 postUnpack = ''
69 pushd source
70 mkdir -p appview/pages/static/{fonts,icons}
71 cp -f ${htmx-src} appview/pages/static/htmx.min.js
72 cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
73 cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
74 cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
75 cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
76 ${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o appview/pages/static/tw.css
77 popd
78 '';
79 doCheck = false;
80 subPackages = ["cmd/appview"];
81 vendorHash = goModHash;
82 env.CGO_ENABLED = 1;
83 stdenv = pkgsStatic.stdenv;
84 };
85
86 appview-cross = with final;
87 final.pkgsCross.gnu64.pkgsStatic.buildGoModule {
88 pname = "appview";
89 version = "0.1.0";
90 src = gitignoreSource ./.;
91 postUnpack = ''
92 pushd source
93 mkdir -p appview/pages/static/{fonts,icons}
94 cp -f ${htmx-src} appview/pages/static/htmx.min.js
95 cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
96 cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
97 cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
98 cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
99 ${pkgs.tailwindcss}/bin/tailwindcss -i input.css -o appview/pages/static/tw.css
100 popd
101 '';
102 doCheck = false;
103 subPackages = ["cmd/appview"];
104 vendorHash = goModHash;
105 env.CGO_ENABLED = 1;
106 stdenv = pkgsStatic.stdenv;
107 };
108
109 # cross-compile on darwin to x86_64-linux
110 knot-cross = with final;
111 final.pkgsCross.gnu64.pkgsStatic.buildGoModule {
112 pname = "knot";
113 version = "0.1.0";
114 src = gitignoreSource ./.;
115 subPackages = ["cmd/knot"];
116 vendorHash = goModHash;
117
118 env.CGO_ENABLED = 1;
119 };
120
121 knot = with final;
122 final.pkgsStatic.buildGoModule {
123 pname = "knot";
124 version = "0.1.0";
125 src = gitignoreSource ./.;
126 nativeBuildInputs = [final.makeWrapper];
127 subPackages = ["cmd/knot"];
128 vendorHash = goModHash;
129 installPhase = ''
130 runHook preInstall
131
132 mkdir -p $out/bin
133 cp $GOPATH/bin/knot $out/bin/knot
134
135 wrapProgram $out/bin/knot \
136 --prefix PATH : ${pkgs.git}/bin
137
138 runHook postInstall
139 '';
140 env.CGO_ENABLED = 1;
141 };
142 knot-unwrapped = final.pkgsStatic.buildGoModule {
143 pname = "knot";
144 version = "0.1.0";
145 src = gitignoreSource ./.;
146 subPackages = ["cmd/knot"];
147 vendorHash = goModHash;
148 env.CGO_ENABLED = 1;
149 };
150 genjwks = final.buildGoModule {
151 pname = "genjwks";
152 version = "0.1.0";
153 src = gitignoreSource ./.;
154 subPackages = ["cmd/genjwks"];
155 vendorHash = goModHash;
156 env.CGO_ENABLED = 0;
157 };
158 };
159 packages = forAllSystems (system: {
160 inherit
161 (nixpkgsFor."${system}")
162 indigo-lexgen
163 appview
164 appview-cross
165 knot
166 knot-cross
167 knot-unwrapped
168 genjwks
169 ;
170 });
171 defaultPackage = forAllSystems (system: nixpkgsFor.${system}.appview);
172 formatter = forAllSystems (system: nixpkgsFor."${system}".alejandra);
173 devShells = forAllSystems (system: let
174 pkgs = nixpkgsFor.${system};
175 staticShell = pkgs.mkShell.override {
176 stdenv = pkgs.pkgsStatic.stdenv;
177 };
178 in {
179 default = staticShell {
180 nativeBuildInputs = [
181 pkgs.go
182 pkgs.air
183 pkgs.gopls
184 pkgs.httpie
185 pkgs.indigo-lexgen
186 pkgs.litecli
187 pkgs.websocat
188 pkgs.tailwindcss
189 pkgs.nixos-shell
190 pkgs.redis
191 ];
192 shellHook = ''
193 mkdir -p appview/pages/static/{fonts,icons}
194 cp -f ${htmx-src} appview/pages/static/htmx.min.js
195 cp -rf ${lucide-src}/*.svg appview/pages/static/icons/
196 cp -f ${inter-fonts-src}/web/InterVariable*.woff2 appview/pages/static/fonts/
197 cp -f ${inter-fonts-src}/web/InterDisplay*.woff2 appview/pages/static/fonts/
198 cp -f ${ibm-plex-mono-src}/fonts/complete/woff2/IBMPlexMono-Regular.woff2 appview/pages/static/fonts/
199 export TANGLED_OAUTH_JWKS="$(${pkgs.genjwks}/bin/genjwks)"
200 '';
201 env.CGO_ENABLED = 1;
202 };
203 });
204 apps = forAllSystems (system: let
205 pkgs = nixpkgsFor."${system}";
206 air-watcher = name: arg:
207 pkgs.writeShellScriptBin "run"
208 ''
209 ${pkgs.air}/bin/air -c /dev/null \
210 -build.cmd "${pkgs.go}/bin/go build -o ./out/${name}.out ./cmd/${name}/main.go" \
211 -build.bin "./out/${name}.out ${arg}" \
212 -build.stop_on_error "true" \
213 -build.include_ext "go"
214 '';
215 tailwind-watcher =
216 pkgs.writeShellScriptBin "run"
217 ''
218 ${pkgs.tailwindcss}/bin/tailwindcss -w -i input.css -o ./appview/pages/static/tw.css
219 '';
220 in {
221 watch-appview = {
222 type = "app";
223 program = ''${air-watcher "appview" ""}/bin/run'';
224 };
225 watch-knot = {
226 type = "app";
227 program = ''${air-watcher "knot" "server"}/bin/run'';
228 };
229 watch-tailwind = {
230 type = "app";
231 program = ''${tailwind-watcher}/bin/run'';
232 };
233 });
234
235 nixosModules.appview = {
236 config,
237 pkgs,
238 lib,
239 ...
240 }:
241 with lib; {
242 options = {
243 services.tangled-appview = {
244 enable = mkOption {
245 type = types.bool;
246 default = false;
247 description = "Enable tangled appview";
248 };
249 port = mkOption {
250 type = types.int;
251 default = 3000;
252 description = "Port to run the appview on";
253 };
254 cookie_secret = mkOption {
255 type = types.str;
256 default = "00000000000000000000000000000000";
257 description = "Cookie secret";
258 };
259 };
260 };
261
262 config = mkIf config.services.tangled-appview.enable {
263 systemd.services.tangled-appview = {
264 description = "tangled appview service";
265 wantedBy = ["multi-user.target"];
266
267 serviceConfig = {
268 ListenStream = "0.0.0.0:${toString config.services.tangled-appview.port}";
269 ExecStart = "${self.packages.${pkgs.system}.appview}/bin/appview";
270 Restart = "always";
271 };
272
273 environment = {
274 TANGLED_DB_PATH = "appview.db";
275 TANGLED_COOKIE_SECRET = config.services.tangled-appview.cookie_secret;
276 };
277 };
278 };
279 };
280
281 nixosModules.knot = {
282 config,
283 pkgs,
284 lib,
285 ...
286 }: let
287 cfg = config.services.tangled-knot;
288 in
289 with lib; {
290 options = {
291 services.tangled-knot = {
292 enable = mkOption {
293 type = types.bool;
294 default = false;
295 description = "Enable a tangled knot";
296 };
297
298 appviewEndpoint = mkOption {
299 type = types.str;
300 default = "https://tangled.sh";
301 description = "Appview endpoint";
302 };
303
304 gitUser = mkOption {
305 type = types.str;
306 default = "git";
307 description = "User that hosts git repos and performs git operations";
308 };
309
310 openFirewall = mkOption {
311 type = types.bool;
312 default = true;
313 description = "Open port 22 in the firewall for ssh";
314 };
315
316 stateDir = mkOption {
317 type = types.path;
318 default = "/home/${cfg.gitUser}";
319 description = "Tangled knot data directory";
320 };
321
322 repo = {
323 scanPath = mkOption {
324 type = types.path;
325 default = cfg.stateDir;
326 description = "Path where repositories are scanned from";
327 };
328
329 mainBranch = mkOption {
330 type = types.str;
331 default = "main";
332 description = "Default branch name for repositories";
333 };
334 };
335
336 server = {
337 listenAddr = mkOption {
338 type = types.str;
339 default = "0.0.0.0:5555";
340 description = "Address to listen on";
341 };
342
343 internalListenAddr = mkOption {
344 type = types.str;
345 default = "127.0.0.1:5444";
346 description = "Internal address for inter-service communication";
347 };
348
349 secretFile = mkOption {
350 type = lib.types.path;
351 example = "KNOT_SERVER_SECRET=<hash>";
352 description = "File containing secret key provided by appview (required)";
353 };
354
355 dbPath = mkOption {
356 type = types.path;
357 default = "${cfg.stateDir}/knotserver.db";
358 description = "Path to the database file";
359 };
360
361 hostname = mkOption {
362 type = types.str;
363 example = "knot.tangled.sh";
364 description = "Hostname for the server (required)";
365 };
366
367 dev = mkOption {
368 type = types.bool;
369 default = false;
370 description = "Enable development mode (disables signature verification)";
371 };
372 };
373 };
374 };
375
376 config = mkIf cfg.enable {
377 environment.systemPackages = with pkgs; [git];
378
379 system.activationScripts.gitConfig = ''
380 mkdir -p "${cfg.repo.scanPath}"
381 chown -R ${cfg.gitUser}:${cfg.gitUser} \
382 "${cfg.repo.scanPath}"
383
384 mkdir -p "${cfg.stateDir}/.config/git"
385 cat > "${cfg.stateDir}/.config/git/config" << EOF
386 [user]
387 name = Git User
388 email = git@example.com
389 EOF
390 chown -R ${cfg.gitUser}:${cfg.gitUser} \
391 "${cfg.stateDir}"
392 '';
393
394 users.users.${cfg.gitUser} = {
395 isSystemUser = true;
396 useDefaultShell = true;
397 home = cfg.stateDir;
398 createHome = true;
399 group = cfg.gitUser;
400 };
401
402 users.groups.${cfg.gitUser} = {};
403
404 services.openssh = {
405 enable = true;
406 extraConfig = ''
407 Match User ${cfg.gitUser}
408 AuthorizedKeysCommand /etc/ssh/keyfetch_wrapper
409 AuthorizedKeysCommandUser nobody
410 '';
411 };
412
413 environment.etc."ssh/keyfetch_wrapper" = {
414 mode = "0555";
415 text = ''
416 #!${pkgs.stdenv.shell}
417 ${self.packages.${pkgs.system}.knot}/bin/knot keys \
418 -output authorized-keys \
419 -internal-api "http://${cfg.server.internalListenAddr}" \
420 -git-dir "${cfg.repo.scanPath}" \
421 -log-path /tmp/knotguard.log
422 '';
423 };
424
425 systemd.services.knot = {
426 description = "knot service";
427 after = ["network.target" "sshd.service"];
428 wantedBy = ["multi-user.target"];
429 serviceConfig = {
430 User = cfg.gitUser;
431 WorkingDirectory = cfg.stateDir;
432 Environment = [
433 "KNOT_REPO_SCAN_PATH=${cfg.repo.scanPath}"
434 "KNOT_REPO_MAIN_BRANCH=${cfg.repo.mainBranch}"
435 "APPVIEW_ENDPOINT=${cfg.appviewEndpoint}"
436 "KNOT_SERVER_INTERNAL_LISTEN_ADDR=${cfg.server.internalListenAddr}"
437 "KNOT_SERVER_LISTEN_ADDR=${cfg.server.listenAddr}"
438 "KNOT_SERVER_DB_PATH=${cfg.server.dbPath}"
439 "KNOT_SERVER_HOSTNAME=${cfg.server.hostname}"
440 ];
441 EnvironmentFile = cfg.server.secretFile;
442 ExecStart = "${self.packages.${pkgs.system}.knot}/bin/knot server";
443 Restart = "always";
444 };
445 };
446
447 networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [22];
448 };
449 };
450
451 nixosConfigurations.knotVM = nixpkgs.lib.nixosSystem {
452 system = "x86_64-linux";
453 modules = [
454 self.nixosModules.knot
455 ({
456 config,
457 pkgs,
458 ...
459 }: {
460 virtualisation.memorySize = 2048;
461 virtualisation.diskSize = 10 * 1024;
462 virtualisation.cores = 2;
463 services.getty.autologinUser = "root";
464 environment.systemPackages = with pkgs; [curl vim git];
465 systemd.tmpfiles.rules = let
466 u = config.services.tangled-knot.gitUser;
467 g = config.services.tangled-knot.gitUser;
468 in [
469 "d /var/lib/knot 0770 ${u} ${g} - -" # Create the directory first
470 "f+ /var/lib/knot/secret 0660 ${u} ${g} - KNOT_SERVER_SECRET=38a7c3237c2a585807e06a5bcfac92eb39442063f3da306b7acb15cfdc51d19d"
471 ];
472 services.tangled-knot = {
473 enable = true;
474 server = {
475 secretFile = "/var/lib/knot/secret";
476 hostname = "localhost:6000";
477 listenAddr = "0.0.0.0:6000";
478 };
479 };
480 })
481 ];
482 };
483 };
484}