forked from tangled.org/core
Monorepo for Tangled — https://tangled.org

nix/modules: tangled-appview -> tangled.appview

Signed-off-by: Anirudh Oppiliappan <anirudh@tangled.org>

anirudh.fi 7b3f9402 5b600825

verified
+3 -3
docs/hacking.md
··· 52 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR 53 54 # the secret key from above 55 - export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..." 56 57 # run redis in at a new shell to store oauth sessions 58 redis-server ··· 168 169 If for any reason you wish to disable either one of the 170 services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set 171 - `services.tangled-spindle.enable` (or 172 - `services.tangled-knot.enable`) to `false`.
··· 52 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR 53 54 # the secret key from above 55 + export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..." 56 57 # run redis in at a new shell to store oauth sessions 58 redis-server ··· 168 169 If for any reason you wish to disable either one of the 170 services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set 171 + `services.tangled.spindle.enable` (or 172 + `services.tangled.knot.enable`) to `false`.
+1 -1
docs/migrations.md
··· 49 latest revision, and change your config block like so: 50 51 ```diff 52 - services.tangled-knot = { 53 enable = true; 54 server = { 55 - secretFile = /path/to/secret;
··· 49 latest revision, and change your config block like so: 50 51 ```diff 52 + services.tangled.knot = { 53 enable = true; 54 server = { 55 - secretFile = /path/to/secret;
+3 -3
flake.nix
··· 283 }: { 284 imports = [./nix/modules/appview.nix]; 285 286 - services.tangled-appview.package = lib.mkDefault self.packages.${pkgs.system}.appview; 287 }; 288 nixosModules.knot = { 289 lib, ··· 292 }: { 293 imports = [./nix/modules/knot.nix]; 294 295 - services.tangled-knot.package = lib.mkDefault self.packages.${pkgs.system}.knot; 296 }; 297 nixosModules.spindle = { 298 lib, ··· 301 }: { 302 imports = [./nix/modules/spindle.nix]; 303 304 - services.tangled-spindle.package = lib.mkDefault self.packages.${pkgs.system}.spindle; 305 }; 306 }; 307 }
··· 283 }: { 284 imports = [./nix/modules/appview.nix]; 285 286 + services.tangled.appview.package = lib.mkDefault self.packages.${pkgs.system}.appview; 287 }; 288 nixosModules.knot = { 289 lib, ··· 292 }: { 293 imports = [./nix/modules/knot.nix]; 294 295 + services.tangled.knot.package = lib.mkDefault self.packages.${pkgs.system}.knot; 296 }; 297 nixosModules.spindle = { 298 lib, ··· 301 }: { 302 imports = [./nix/modules/spindle.nix]; 303 304 + services.tangled.spindle.package = lib.mkDefault self.packages.${pkgs.system}.spindle; 305 }; 306 }; 307 }
+4 -4
nix/modules/appview.nix
··· 3 lib, 4 ... 5 }: let 6 - cfg = config.services.tangled-appview; 7 in 8 with lib; { 9 options = { 10 - services.tangled-appview = { 11 enable = mkOption { 12 type = types.bool; 13 default = false; ··· 25 environmentFile = mkOption { 26 type = with types; nullOr path; 27 default = null; 28 - example = "/etc/tangled-appview.env"; 29 description = '' 30 Additional environment file as defined in {manpage}`systemd.exec(5)`. 31 ··· 39 }; 40 41 config = mkIf cfg.enable { 42 - systemd.services.tangled-appview = { 43 description = "tangled appview service"; 44 wantedBy = ["multi-user.target"]; 45
··· 3 lib, 4 ... 5 }: let 6 + cfg = config.services.tangled.appview; 7 in 8 with lib; { 9 options = { 10 + services.tangled.appview = { 11 enable = mkOption { 12 type = types.bool; 13 default = false; ··· 25 environmentFile = mkOption { 26 type = with types; nullOr path; 27 default = null; 28 + example = "/etc-/appview.env"; 29 description = '' 30 Additional environment file as defined in {manpage}`systemd.exec(5)`. 31 ··· 39 }; 40 41 config = mkIf cfg.enable { 42 + systemd.services.tangled.appview = { 43 description = "tangled appview service"; 44 wantedBy = ["multi-user.target"]; 45
+2 -2
nix/modules/knot.nix
··· 4 lib, 5 ... 6 }: let 7 - cfg = config.services.tangled-knot; 8 in 9 with lib; { 10 options = { 11 - services.tangled-knot = { 12 enable = mkOption { 13 type = types.bool; 14 default = false;
··· 4 lib, 5 ... 6 }: let 7 + cfg = config.services.tangled.knot; 8 in 9 with lib; { 10 options = { 11 + services.tangled.knot = { 12 enable = mkOption { 13 type = types.bool; 14 default = false;
+2 -2
nix/modules/spindle.nix
··· 3 lib, 4 ... 5 }: let 6 - cfg = config.services.tangled-spindle; 7 in 8 with lib; { 9 options = { 10 - services.tangled-spindle = { 11 enable = mkOption { 12 type = types.bool; 13 default = false;
··· 3 lib, 4 ... 5 }: let 6 + cfg = config.services.tangled.spindle; 7 in 8 with lib; { 9 options = { 10 + services.tangled.spindle = { 11 enable = mkOption { 12 type = types.bool; 13 default = false;
+6 -6
nix/vm.nix
··· 73 time.timeZone = "Europe/London"; 74 services.getty.autologinUser = "root"; 75 environment.systemPackages = with pkgs; [curl vim git sqlite litecli]; 76 - services.tangled-knot = { 77 enable = true; 78 motd = "Welcome to the development knot!\n"; 79 server = { ··· 82 listenAddr = "0.0.0.0:6000"; 83 }; 84 }; 85 - services.tangled-spindle = { 86 enable = true; 87 server = { 88 owner = envVar "TANGLED_VM_SPINDLE_OWNER"; ··· 99 users = { 100 # So we don't have to deal with permission clashing between 101 # blank disk VMs and existing state 102 - users.${config.services.tangled-knot.gitUser}.uid = 666; 103 - groups.${config.services.tangled-knot.gitUser}.gid = 666; 104 105 # TODO: separate spindle user 106 }; ··· 120 serviceConfig.PermissionsStartOnly = true; 121 }; 122 in { 123 - knot = mkDataSyncScripts "/mnt/knot-data" config.services.tangled-knot.stateDir; 124 - spindle = mkDataSyncScripts "/mnt/spindle-data" (builtins.dirOf config.services.tangled-spindle.server.dbPath); 125 }; 126 }) 127 ];
··· 73 time.timeZone = "Europe/London"; 74 services.getty.autologinUser = "root"; 75 environment.systemPackages = with pkgs; [curl vim git sqlite litecli]; 76 + services.tangled.knot = { 77 enable = true; 78 motd = "Welcome to the development knot!\n"; 79 server = { ··· 82 listenAddr = "0.0.0.0:6000"; 83 }; 84 }; 85 + services.tangled.spindle = { 86 enable = true; 87 server = { 88 owner = envVar "TANGLED_VM_SPINDLE_OWNER"; ··· 99 users = { 100 # So we don't have to deal with permission clashing between 101 # blank disk VMs and existing state 102 + users.${config.services.tangled.knot.gitUser}.uid = 666; 103 + groups.${config.services.tangled.knot.gitUser}.gid = 666; 104 105 # TODO: separate spindle user 106 }; ··· 120 serviceConfig.PermissionsStartOnly = true; 121 }; 122 in { 123 + knot = mkDataSyncScripts "/mnt/knot-data" config.services.tangled.knot.stateDir; 124 + spindle = mkDataSyncScripts "/mnt/spindle-data" (builtins.dirOf config.services.tangled.spindle.server.dbPath); 125 }; 126 }) 127 ];