Monorepo for Tangled
at master 192 lines 6.1 kB view raw
1{ 2 nixpkgs, 3 system, 4 hostSystem, 5 self, 6}: let 7 envVar = name: let 8 var = builtins.getEnv name; 9 in 10 if var == "" 11 then throw "\$${name} must be defined, see https://docs.tangled.org/hacking-on-tangled.html#hacking-on-tangled for more details" 12 else var; 13 envVarOr = name: default: let 14 var = builtins.getEnv name; 15 in 16 if var != "" 17 then var 18 else default; 19 20 plcUrl = envVarOr "TANGLED_VM_PLC_URL" "https://plc.directory"; 21 jetstream = envVarOr "TANGLED_VM_JETSTREAM_ENDPOINT" "wss://jetstream1.us-west.bsky.network/subscribe"; 22in 23 nixpkgs.lib.nixosSystem { 24 inherit system; 25 modules = [ 26 self.nixosModules.knot 27 self.nixosModules.spindle 28 self.nixosModules.knotmirror 29 ({ 30 lib, 31 config, 32 pkgs, 33 ... 34 }: { 35 virtualisation.vmVariant.virtualisation = { 36 host.pkgs = import nixpkgs {system = hostSystem;}; 37 38 graphics = false; 39 memorySize = 2048; 40 diskSize = 10 * 1024; 41 cores = 2; 42 forwardPorts = [ 43 # ssh 44 { 45 from = "host"; 46 host.port = 2222; 47 guest.port = 22; 48 } 49 # knot 50 { 51 from = "host"; 52 host.port = 6444; 53 guest.port = 6444; 54 } 55 # spindle 56 { 57 from = "host"; 58 host.port = 6555; 59 guest.port = 6555; 60 } 61 # knotmirror 62 { 63 from = "host"; 64 host.port = 7007; # 7000 is deserved in macos for Airplay 65 guest.port = 7000; 66 } 67 # knotmirror-tap 68 { 69 from = "host"; 70 host.port = 7480; 71 guest.port = 7480; 72 } 73 # knotmirror-admin 74 { 75 from = "host"; 76 host.port = 7200; 77 guest.port = 7200; 78 } 79 ]; 80 sharedDirectories = { 81 # We can't use the 9p mounts directly for most of these 82 # as SQLite is incompatible with them. So instead we 83 # mount the shared directories to a different location 84 # and copy the contents around on service start/stop. 85 knotData = { 86 source = "$TANGLED_VM_DATA_DIR/knot"; 87 target = "/mnt/knot-data"; 88 }; 89 spindleData = { 90 source = "$TANGLED_VM_DATA_DIR/spindle"; 91 target = "/mnt/spindle-data"; 92 }; 93 spindleLogs = { 94 source = "$TANGLED_VM_DATA_DIR/spindle-logs"; 95 target = "/var/log/spindle"; 96 }; 97 }; 98 }; 99 # This is fine because any and all ports that are forwarded to host are explicitly marked above, we don't need a separate guest firewall 100 networking.firewall.enable = false; 101 time.timeZone = "Europe/London"; 102 services.getty.autologinUser = "root"; 103 environment.systemPackages = with pkgs; [curl vim git sqlite litecli postgresql_14]; 104 services.tangled.knot = { 105 enable = true; 106 motd = "Welcome to the development knot!\n"; 107 server = { 108 owner = envVar "TANGLED_VM_KNOT_OWNER"; 109 hostname = envVarOr "TANGLED_VM_KNOT_HOST" "localhost:6444"; 110 plcUrl = plcUrl; 111 jetstreamEndpoint = jetstream; 112 listenAddr = "0.0.0.0:6444"; 113 dev = true; 114 }; 115 knotmirrors = [ 116 "http://localhost:7000" 117 ]; 118 }; 119 services.tangled.spindle = { 120 enable = true; 121 environmentFile = "/var/lib/spindle/.env"; 122 server = { 123 owner = envVar "TANGLED_VM_SPINDLE_OWNER"; 124 hostname = envVarOr "TANGLED_VM_SPINDLE_HOST" "localhost:6555"; 125 plcUrl = plcUrl; 126 jetstreamEndpoint = jetstream; 127 listenAddr = "0.0.0.0:6555"; 128 dev = true; 129 queueSize = 100; 130 maxJobCount = 2; 131 secrets = { 132 provider = "sqlite"; 133 }; 134 }; 135 136 pipelines = { 137 logBucket = envVarOr "SPINDLE_S3_LOG_BUCKET" ""; 138 }; 139 }; 140 services.postgresql = { 141 enable = true; 142 package = pkgs.postgresql_14; 143 ensureDatabases = ["mirror" "tap"]; 144 ensureUsers = [ 145 {name = "tnglr";} 146 ]; 147 authentication = '' 148 local all tnglr trust 149 host all tnglr 127.0.0.1/32 trust 150 ''; 151 }; 152 services.tangled.knotmirror = { 153 enable = true; 154 listenAddr = "0.0.0.0:7000"; 155 adminListenAddr = "0.0.0.0:7200"; 156 hostname = "localhost:7000"; 157 dbUrl = "postgresql://tnglr@127.0.0.1:5432/mirror"; 158 fullNetwork = false; 159 tap.dbUrl = "postgresql://tnglr@127.0.0.1:5432/tap"; 160 }; 161 users = { 162 # So we don't have to deal with permission clashing between 163 # blank disk VMs and existing state 164 users.${config.services.tangled.knot.gitUser}.uid = 666; 165 groups.${config.services.tangled.knot.gitUser}.gid = 666; 166 167 # TODO: separate spindle user 168 }; 169 systemd.services = let 170 mkDataSyncScripts = source: target: { 171 enableStrictShellChecks = true; 172 173 preStart = lib.mkBefore '' 174 mkdir -p ${target} 175 ${lib.getExe pkgs.rsync} -a ${source}/ ${target} 176 ''; 177 178 postStop = lib.mkAfter '' 179 ${lib.getExe pkgs.rsync} -a ${target}/ ${source} 180 ''; 181 182 serviceConfig.PermissionsStartOnly = true; 183 }; 184 in { 185 knot = mkDataSyncScripts "/mnt/knot-data" config.services.tangled.knot.stateDir; 186 spindle = mkDataSyncScripts "/mnt/spindle-data" (builtins.dirOf config.services.tangled.spindle.server.dbPath); 187 knotmirror.after = ["postgresql.target"]; 188 tap-knotmirror.after = ["postgresql.target"]; 189 }; 190 }) 191 ]; 192 }