at master 1563 lines 44 kB view raw view rendered
1--- 2title: Tangled docs 3author: The Tangled Contributors 4date: 21 Sun, Dec 2025 5abstract: | 6 Tangled is a decentralized code hosting and collaboration 7 platform. Every component of Tangled is open-source and 8 self-hostable. [tangled.org](https://tangled.org) also 9 provides hosting and CI services that are free to use. 10 11 There are several models for decentralized code 12 collaboration platforms, ranging from ActivityPub’s 13 (Forgejo) federated model, to Radicle’s entirely P2P model. 14 Our approach attempts to be the best of both worlds by 15 adopting the AT Protocol—a protocol for building decentralized 16 social applications with a central identity 17 18 Our approach to this is the idea of “knots”. Knots are 19 lightweight, headless servers that enable users to host Git 20 repositories with ease. Knots are designed for either single 21 or multi-tenant use which is perfect for self-hosting on a 22 Raspberry Pi at home, or larger “community” servers. By 23 default, Tangled provides managed knots where you can host 24 your repositories for free. 25 26 The appview at tangled.org acts as a consolidated "view" 27 into the whole network, allowing users to access, clone and 28 contribute to repositories hosted across different knots 29 seamlessly. 30--- 31 32# Quick start guide 33 34## Login or sign up 35 36You can [login](https://tangled.org) by using your AT Protocol 37account. If you are unclear on what that means, simply head 38to the [signup](https://tangled.org/signup) page and create 39an account. By doing so, you will be choosing Tangled as 40your account provider (you will be granted a handle of the 41form `user.tngl.sh`). 42 43In the AT Protocol network, users are free to choose their account 44provider (known as a "Personal Data Service", or PDS), and 45login to applications that support AT accounts. 46 47You can think of it as "one account for all of the atmosphere"! 48 49If you already have an AT account (you may have one if you 50signed up to Bluesky, for example), you can login with the 51same handle on Tangled (so just use `user.bsky.social` on 52the login page). 53 54## Add an SSH key 55 56Once you are logged in, you can start creating repositories 57and pushing code. Tangled supports pushing git repositories 58over SSH. 59 60First, you'll need to generate an SSH key if you don't 61already have one: 62 63```bash 64ssh-keygen -t ed25519 -C "foo@bar.com" 65``` 66 67When prompted, save the key to the default location 68(`~/.ssh/id_ed25519`) and optionally set a passphrase. 69 70Copy your public key to your clipboard: 71 72```bash 73# on X11 74cat ~/.ssh/id_ed25519.pub | xclip -sel c 75 76# on wayland 77cat ~/.ssh/id_ed25519.pub | wl-copy 78 79# on macos 80cat ~/.ssh/id_ed25519.pub | pbcopy 81``` 82 83Now, navigate to 'Settings' -> 'Keys' and hit 'Add Key', 84paste your public key, give it a descriptive name, and hit 85save. 86 87## Create a repository 88 89Once your SSH key is added, create your first repository: 90 911. Hit the green `+` icon on the topbar, and select 92 repository 932. Enter a repository name 943. Add a description 954. Choose a knotserver to host this repository on 965. Hit create 97 98Knots are self-hostable, lightweight Git servers that can 99host your repository. Unlike traditional code forges, your 100code can live on any server. Read the [Knots](TODO) section 101for more. 102 103## Configure SSH 104 105To ensure Git uses the correct SSH key and connects smoothly 106to Tangled, add this configuration to your `~/.ssh/config` 107file: 108 109``` 110Host tangled.org 111 Hostname tangled.org 112 User git 113 IdentityFile ~/.ssh/id_ed25519 114 AddressFamily inet 115``` 116 117This tells SSH to use your specific key when connecting to 118Tangled and prevents authentication issues if you have 119multiple SSH keys. 120 121Note that this configuration only works for knotservers that 122are hosted by tangled.org. If you use a custom knot, refer 123to the [Knots](TODO) section. 124 125## Push your first repository 126 127Initialize a new Git repository: 128 129```bash 130mkdir my-project 131cd my-project 132 133git init 134echo "# My Project" > README.md 135``` 136 137Add some content and push! 138 139```bash 140git add README.md 141git commit -m "Initial commit" 142git remote add origin git@tangled.org:user.tngl.sh/my-project 143git push -u origin main 144``` 145 146That's it! Your code is now hosted on Tangled. 147 148## Migrating an existing repository 149 150Moving your repositories from GitHub, GitLab, Bitbucket, or 151any other Git forge to Tangled is straightforward. You'll 152simply change your repository's remote URL. At the moment, 153Tangled does not have any tooling to migrate data such as 154GitHub issues or pull requests. 155 156First, create a new repository on tangled.org as described 157in the [Quick Start Guide](#create-a-repository). 158 159Navigate to your existing local repository: 160 161```bash 162cd /path/to/your/existing/repo 163``` 164 165You can inspect your existing Git remote like so: 166 167```bash 168git remote -v 169``` 170 171You'll see something like: 172 173``` 174origin git@github.com:username/my-project (fetch) 175origin git@github.com:username/my-project (push) 176``` 177 178Update the remote URL to point to tangled: 179 180```bash 181git remote set-url origin git@tangled.org:user.tngl.sh/my-project 182``` 183 184Verify the change: 185 186```bash 187git remote -v 188``` 189 190You should now see: 191 192``` 193origin git@tangled.org:user.tngl.sh/my-project (fetch) 194origin git@tangled.org:user.tngl.sh/my-project (push) 195``` 196 197Push all your branches and tags to Tangled: 198 199```bash 200git push -u origin --all 201git push -u origin --tags 202``` 203 204Your repository is now migrated to Tangled! All commit 205history, branches, and tags have been preserved. 206 207## Mirroring a repository to Tangled 208 209If you want to maintain your repository on multiple forges 210simultaneously, for example, keeping your primary repository 211on GitHub while mirroring to Tangled for backup or 212redundancy, you can do so by adding multiple remotes. 213 214You can configure your local repository to push to both 215Tangled and, say, GitHub. You may already have the following 216setup: 217 218``` 219$ git remote -v 220origin git@github.com:username/my-project (fetch) 221origin git@github.com:username/my-project (push) 222``` 223 224Now add Tangled as an additional push URL to the same 225remote: 226 227```bash 228git remote set-url --add --push origin git@tangled.org:user.tngl.sh/my-project 229``` 230 231You also need to re-add the original URL as a push 232destination (Git replaces the push URL when you use `--add` 233the first time): 234 235```bash 236git remote set-url --add --push origin git@github.com:username/my-project 237``` 238 239Verify your configuration: 240 241``` 242$ git remote -v 243origin git@github.com:username/repo (fetch) 244origin git@tangled.org:username/my-project (push) 245origin git@github.com:username/repo (push) 246``` 247 248Notice that there's one fetch URL (the primary remote) and 249two push URLs. Now, whenever you push, Git will 250automatically push to both remotes: 251 252```bash 253git push origin main 254``` 255 256This single command pushes your `main` branch to both GitHub 257and Tangled simultaneously. 258 259To push all branches and tags: 260 261```bash 262git push origin --all 263git push origin --tags 264``` 265 266If you prefer more control over which remote you push to, 267you can maintain separate remotes: 268 269```bash 270git remote add github git@github.com:username/my-project 271git remote add tangled git@tangled.org:username/my-project 272``` 273 274Then push to each explicitly: 275 276```bash 277git push github main 278git push tangled main 279``` 280 281# Knot self-hosting guide 282 283So you want to run your own knot server? Great! Here are a few prerequisites: 284 2851. A server of some kind (a VPS, a Raspberry Pi, etc.). Preferably running a Linux distribution of some kind. 2862. A (sub)domain name. People generally use `knot.example.com`. 2873. A valid SSL certificate for your domain. 288 289## NixOS 290 291Refer to the [knot 292module](https://tangled.org/tangled.org/core/blob/master/nix/modules/knot.nix) 293for a full list of options. Sample configurations: 294 295- [The test VM](https://tangled.org/tangled.org/core/blob/master/nix/vm.nix#L85) 296- [@pyrox.dev/nix](https://tangled.org/pyrox.dev/nix/blob/d19571cc1b5fe01035e1e6951ec8cf8a476b4dee/hosts/marvin/services/tangled.nix#L15-25) 297 298## Docker 299 300Refer to 301[@tangled.org/knot-docker](https://tangled.org/@tangled.org/knot-docker). 302Note that this is community maintained. 303 304## Manual setup 305 306First, clone this repository: 307 308``` 309git clone https://tangled.org/@tangled.org/core 310``` 311 312Then, build the `knot` CLI. This is the knot administration 313and operation tool. For the purpose of this guide, we're 314only concerned with these subcommands: 315 316 * `knot server`: the main knot server process, typically 317 run as a supervised service 318 * `knot guard`: handles role-based access control for git 319 over SSH (you'll never have to run this yourself) 320 * `knot keys`: fetches SSH keys associated with your knot; 321 we'll use this to generate the SSH 322 `AuthorizedKeysCommand` 323 324``` 325cd core 326export CGO_ENABLED=1 327go build -o knot ./cmd/knot 328``` 329 330Next, move the `knot` binary to a location owned by `root` -- 331`/usr/local/bin/` is a good choice. Make sure the binary itself is also owned by `root`: 332 333``` 334sudo mv knot /usr/local/bin/knot 335sudo chown root:root /usr/local/bin/knot 336``` 337 338This is necessary because SSH `AuthorizedKeysCommand` requires [really 339specific permissions](https://stackoverflow.com/a/27638306). The 340`AuthorizedKeysCommand` specifies a command that is run by `sshd` to 341retrieve a user's public SSH keys dynamically for authentication. Let's 342set that up. 343 344``` 345sudo tee /etc/ssh/sshd_config.d/authorized_keys_command.conf <<EOF 346Match User git 347 AuthorizedKeysCommand /usr/local/bin/knot keys -o authorized-keys 348 AuthorizedKeysCommandUser nobody 349EOF 350``` 351 352Then, reload `sshd`: 353 354``` 355sudo systemctl reload ssh 356``` 357 358Next, create the `git` user. We'll use the `git` user's home directory 359to store repositories: 360 361``` 362sudo adduser git 363``` 364 365Create `/home/git/.knot.env` with the following, updating the values as 366necessary. The `KNOT_SERVER_OWNER` should be set to your 367DID, you can find your DID in the [Settings](https://tangled.sh/settings) page. 368 369``` 370KNOT_REPO_SCAN_PATH=/home/git 371KNOT_SERVER_HOSTNAME=knot.example.com 372APPVIEW_ENDPOINT=https://tangled.org 373KNOT_SERVER_OWNER=did:plc:foobar 374KNOT_SERVER_INTERNAL_LISTEN_ADDR=127.0.0.1:5444 375KNOT_SERVER_LISTEN_ADDR=127.0.0.1:5555 376``` 377 378If you run a Linux distribution that uses systemd, you can 379use the provided service file to run the server. Copy 380[`knotserver.service`](https://tangled.org/tangled.org/core/blob/master/systemd/knotserver.service) 381to `/etc/systemd/system/`. Then, run: 382 383``` 384systemctl enable knotserver 385systemctl start knotserver 386``` 387 388The last step is to configure a reverse proxy like Nginx or Caddy to front your 389knot. Here's an example configuration for Nginx: 390 391``` 392server { 393 listen 80; 394 listen [::]:80; 395 server_name knot.example.com; 396 397 location / { 398 proxy_pass http://localhost:5555; 399 proxy_set_header Host $host; 400 proxy_set_header X-Real-IP $remote_addr; 401 proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 402 proxy_set_header X-Forwarded-Proto $scheme; 403 } 404 405 # wss endpoint for git events 406 location /events { 407 proxy_set_header X-Forwarded-For $remote_addr; 408 proxy_set_header Host $http_host; 409 proxy_set_header Upgrade websocket; 410 proxy_set_header Connection Upgrade; 411 proxy_pass http://localhost:5555; 412 } 413 # additional config for SSL/TLS go here. 414} 415 416``` 417 418Remember to use Let's Encrypt or similar to procure a certificate for your 419knot domain. 420 421You should now have a running knot server! You can finalize 422your registration by hitting the `verify` button on the 423[/settings/knots](https://tangled.org/settings/knots) page. This simply creates 424a record on your PDS to announce the existence of the knot. 425 426### Custom paths 427 428(This section applies to manual setup only. Docker users should edit the mounts 429in `docker-compose.yml` instead.) 430 431Right now, the database and repositories of your knot lives in `/home/git`. You 432can move these paths if you'd like to store them in another folder. Be careful 433when adjusting these paths: 434 435* Stop your knot when moving data (e.g. `systemctl stop knotserver`) to prevent 436any possible side effects. Remember to restart it once you're done. 437* Make backups before moving in case something goes wrong. 438* Make sure the `git` user can read and write from the new paths. 439 440#### Database 441 442As an example, let's say the current database is at `/home/git/knotserver.db`, 443and we want to move it to `/home/git/database/knotserver.db`. 444 445Copy the current database to the new location. Make sure to copy the `.db-shm` 446and `.db-wal` files if they exist. 447 448``` 449mkdir /home/git/database 450cp /home/git/knotserver.db* /home/git/database 451``` 452 453In the environment (e.g. `/home/git/.knot.env`), set `KNOT_SERVER_DB_PATH` to 454the new file path (_not_ the directory): 455 456``` 457KNOT_SERVER_DB_PATH=/home/git/database/knotserver.db 458``` 459 460#### Repositories 461 462As an example, let's say the repositories are currently in `/home/git`, and we 463want to move them into `/home/git/repositories`. 464 465Create the new folder, then move the existing repositories (if there are any): 466 467``` 468mkdir /home/git/repositories 469# move all DIDs into the new folder; these will vary for you! 470mv /home/git/did:plc:wshs7t2adsemcrrd4snkeqli /home/git/repositories 471``` 472 473In the environment (e.g. `/home/git/.knot.env`), update `KNOT_REPO_SCAN_PATH` 474to the new directory: 475 476``` 477KNOT_REPO_SCAN_PATH=/home/git/repositories 478``` 479 480Similarly, update your `sshd` `AuthorizedKeysCommand` to use the updated 481repository path: 482 483``` 484sudo tee /etc/ssh/sshd_config.d/authorized_keys_command.conf <<EOF 485Match User git 486 AuthorizedKeysCommand /usr/local/bin/knot keys -o authorized-keys -git-dir /home/git/repositories 487 AuthorizedKeysCommandUser nobody 488EOF 489``` 490 491Make sure to restart your SSH server! 492 493#### MOTD (message of the day) 494 495To configure the MOTD used ("Welcome to this knot!" by default), edit the 496`/home/git/motd` file: 497 498``` 499printf "Hi from this knot!\n" > /home/git/motd 500``` 501 502Note that you should add a newline at the end if setting a non-empty message 503since the knot won't do this for you. 504 505# Spindles 506 507## Pipelines 508 509Spindle workflows allow you to write CI/CD pipelines in a 510simple format. They're located in the `.tangled/workflows` 511directory at the root of your repository, and are defined 512using YAML. 513 514The fields are: 515 516- [Trigger](#trigger): A **required** field that defines 517 when a workflow should be triggered. 518- [Engine](#engine): A **required** field that defines which 519 engine a workflow should run on. 520- [Clone options](#clone-options): An **optional** field 521 that defines how the repository should be cloned. 522- [Dependencies](#dependencies): An **optional** field that 523 allows you to list dependencies you may need. 524- [Environment](#environment): An **optional** field that 525 allows you to define environment variables. 526- [Steps](#steps): An **optional** field that allows you to 527 define what steps should run in the workflow. 528 529### Trigger 530 531The first thing to add to a workflow is the trigger, which 532defines when a workflow runs. This is defined using a `when` 533field, which takes in a list of conditions. Each condition 534has the following fields: 535 536- `event`: This is a **required** field that defines when 537 your workflow should run. It's a list that can take one or 538 more of the following values: 539 - `push`: The workflow should run every time a commit is 540 pushed to the repository. 541 - `pull_request`: The workflow should run every time a 542 pull request is made or updated. 543 - `manual`: The workflow can be triggered manually. 544- `branch`: Defines which branches the workflow should run 545 for. If used with the `push` event, commits to the 546 branch(es) listed here will trigger the workflow. If used 547 with the `pull_request` event, updates to pull requests 548 targeting the branch(es) listed here will trigger the 549 workflow. This field has no effect with the `manual` 550 event. Supports glob patterns using `*` and `**` (e.g., 551 `main`, `develop`, `release-*`). Either `branch` or `tag` 552 (or both) must be specified for `push` events. 553- `tag`: Defines which tags the workflow should run for. 554 Only used with the `push` event - when tags matching the 555 pattern(s) listed here are pushed, the workflow will 556 trigger. This field has no effect with `pull_request` or 557 `manual` events. Supports glob patterns using `*` and `**` 558 (e.g., `v*`, `v1.*`, `release-**`). Either `branch` or 559 `tag` (or both) must be specified for `push` events. 560 561For example, if you'd like to define a workflow that runs 562when commits are pushed to the `main` and `develop` 563branches, or when pull requests that target the `main` 564branch are updated, or manually, you can do so with: 565 566```yaml 567when: 568 - event: ["push", "manual"] 569 branch: ["main", "develop"] 570 - event: ["pull_request"] 571 branch: ["main"] 572``` 573 574You can also trigger workflows on tag pushes. For instance, 575to run a deployment workflow when tags matching `v*` are 576pushed: 577 578```yaml 579when: 580 - event: ["push"] 581 tag: ["v*"] 582``` 583 584You can even combine branch and tag patterns in a single 585constraint (the workflow triggers if either matches): 586 587```yaml 588when: 589 - event: ["push"] 590 branch: ["main", "release-*"] 591 tag: ["v*", "stable"] 592``` 593 594### Engine 595 596Next is the engine on which the workflow should run, defined 597using the **required** `engine` field. The currently 598supported engines are: 599 600- `nixery`: This uses an instance of 601 [Nixery](https://nixery.dev) to run steps, which allows 602 you to add [dependencies](#dependencies) from 603 Nixpkgs (https://github.com/NixOS/nixpkgs). You can 604 search for packages on https://search.nixos.org, and 605 there's a pretty good chance the package(s) you're looking 606 for will be there. 607 608Example: 609 610```yaml 611engine: "nixery" 612``` 613 614### Clone options 615 616When a workflow starts, the first step is to clone the 617repository. You can customize this behavior using the 618**optional** `clone` field. It has the following fields: 619 620- `skip`: Setting this to `true` will skip cloning the 621 repository. This can be useful if your workflow is doing 622 something that doesn't require anything from the 623 repository itself. This is `false` by default. 624- `depth`: This sets the number of commits, or the "clone 625 depth", to fetch from the repository. For example, if you 626 set this to 2, the last 2 commits will be fetched. By 627 default, the depth is set to 1, meaning only the most 628 recent commit will be fetched, which is the commit that 629 triggered the workflow. 630- `submodules`: If you use Git submodules 631 (https://git-scm.com/book/en/v2/Git-Tools-Submodules) 632 in your repository, setting this field to `true` will 633 recursively fetch all submodules. This is `false` by 634 default. 635 636The default settings are: 637 638```yaml 639clone: 640 skip: false 641 depth: 1 642 submodules: false 643``` 644 645### Dependencies 646 647Usually when you're running a workflow, you'll need 648additional dependencies. The `dependencies` field lets you 649define which dependencies to get, and from where. It's a 650key-value map, with the key being the registry to fetch 651dependencies from, and the value being the list of 652dependencies to fetch. 653 654Say you want to fetch Node.js and Go from `nixpkgs`, and a 655package called `my_pkg` you've made from your own registry 656at your repository at 657`https://tangled.org/@example.com/my_pkg`. You can define 658those dependencies like so: 659 660```yaml 661dependencies: 662 # nixpkgs 663 nixpkgs: 664 - nodejs 665 - go 666 # unstable 667 nixpkgs/nixpkgs-unstable: 668 - bun 669 # custom registry 670 git+https://tangled.org/@example.com/my_pkg: 671 - my_pkg 672``` 673 674Now these dependencies are available to use in your 675workflow! 676 677### Environment 678 679The `environment` field allows you define environment 680variables that will be available throughout the entire 681workflow. **Do not put secrets here, these environment 682variables are visible to anyone viewing the repository. You 683can add secrets for pipelines in your repository's 684settings.** 685 686Example: 687 688```yaml 689environment: 690 GOOS: "linux" 691 GOARCH: "arm64" 692 NODE_ENV: "production" 693 MY_ENV_VAR: "MY_ENV_VALUE" 694``` 695 696By default, the following environment variables set: 697 698- `CI` - Always set to `true` to indicate a CI environment 699- `TANGLED_PIPELINE_ID` - The AT URI of the current pipeline 700- `TANGLED_REPO_KNOT` - The repository's knot hostname 701- `TANGLED_REPO_DID` - The DID of the repository owner 702- `TANGLED_REPO_NAME` - The name of the repository 703- `TANGLED_REPO_DEFAULT_BRANCH` - The default branch of the 704 repository 705- `TANGLED_REPO_URL` - The full URL to the repository 706 707These variables are only available when the pipeline is 708triggered by a push: 709 710- `TANGLED_REF` - The full git reference (e.g., 711 `refs/heads/main` or `refs/tags/v1.0.0`) 712- `TANGLED_REF_NAME` - The short name of the reference 713 (e.g., `main` or `v1.0.0`) 714- `TANGLED_REF_TYPE` - The type of reference, either 715 `branch` or `tag` 716- `TANGLED_SHA` - The commit SHA that triggered the pipeline 717- `TANGLED_COMMIT_SHA` - Alias for `TANGLED_SHA` 718 719These variables are only available when the pipeline is 720triggered by a pull request: 721 722- `TANGLED_PR_SOURCE_BRANCH` - The source branch of the pull 723 request 724- `TANGLED_PR_TARGET_BRANCH` - The target branch of the pull 725 request 726- `TANGLED_PR_SOURCE_SHA` - The commit SHA of the source 727 branch 728 729### Steps 730 731The `steps` field allows you to define what steps should run 732in the workflow. It's a list of step objects, each with the 733following fields: 734 735- `name`: This field allows you to give your step a name. 736 This name is visible in your workflow runs, and is used to 737 describe what the step is doing. 738- `command`: This field allows you to define a command to 739 run in that step. The step is run in a Bash shell, and the 740 logs from the command will be visible in the pipelines 741 page on the Tangled website. The 742 [dependencies](#dependencies) you added will be available 743 to use here. 744- `environment`: Similar to the global 745 [environment](#environment) config, this **optional** 746 field is a key-value map that allows you to set 747 environment variables for the step. **Do not put secrets 748 here, these environment variables are visible to anyone 749 viewing the repository. You can add secrets for pipelines 750 in your repository's settings.** 751 752Example: 753 754```yaml 755steps: 756 - name: "Build backend" 757 command: "go build" 758 environment: 759 GOOS: "darwin" 760 GOARCH: "arm64" 761 - name: "Build frontend" 762 command: "npm run build" 763 environment: 764 NODE_ENV: "production" 765``` 766 767### Complete workflow 768 769```yaml 770# .tangled/workflows/build.yml 771 772when: 773 - event: ["push", "manual"] 774 branch: ["main", "develop"] 775 - event: ["pull_request"] 776 branch: ["main"] 777 778engine: "nixery" 779 780# using the default values 781clone: 782 skip: false 783 depth: 1 784 submodules: false 785 786dependencies: 787 # nixpkgs 788 nixpkgs: 789 - nodejs 790 - go 791 # custom registry 792 git+https://tangled.org/@example.com/my_pkg: 793 - my_pkg 794 795environment: 796 GOOS: "linux" 797 GOARCH: "arm64" 798 NODE_ENV: "production" 799 MY_ENV_VAR: "MY_ENV_VALUE" 800 801steps: 802 - name: "Build backend" 803 command: "go build" 804 environment: 805 GOOS: "darwin" 806 GOARCH: "arm64" 807 - name: "Build frontend" 808 command: "npm run build" 809 environment: 810 NODE_ENV: "production" 811``` 812 813If you want another example of a workflow, you can look at 814the one [Tangled uses to build the 815project](https://tangled.org/@tangled.org/core/blob/master/.tangled/workflows/build.yml). 816 817## Self-hosting guide 818 819### Prerequisites 820 821* Go 822* Docker (the only supported backend currently) 823 824### Configuration 825 826Spindle is configured using environment variables. The following environment variables are available: 827 828* `SPINDLE_SERVER_LISTEN_ADDR`: The address the server listens on (default: `"0.0.0.0:6555"`). 829* `SPINDLE_SERVER_DB_PATH`: The path to the SQLite database file (default: `"spindle.db"`). 830* `SPINDLE_SERVER_HOSTNAME`: The hostname of the server (required). 831* `SPINDLE_SERVER_JETSTREAM_ENDPOINT`: The endpoint of the Jetstream server (default: `"wss://jetstream1.us-west.bsky.network/subscribe"`). 832* `SPINDLE_SERVER_DEV`: A boolean indicating whether the server is running in development mode (default: `false`). 833* `SPINDLE_SERVER_OWNER`: The DID of the owner (required). 834* `SPINDLE_PIPELINES_NIXERY`: The Nixery URL (default: `"nixery.tangled.sh"`). 835* `SPINDLE_PIPELINES_WORKFLOW_TIMEOUT`: The default workflow timeout (default: `"5m"`). 836* `SPINDLE_PIPELINES_LOG_DIR`: The directory to store workflow logs (default: `"/var/log/spindle"`). 837 838### Running spindle 839 8401. **Set the environment variables.** For example: 841 842 ```shell 843 export SPINDLE_SERVER_HOSTNAME="your-hostname" 844 export SPINDLE_SERVER_OWNER="your-did" 845 ``` 846 8472. **Build the Spindle binary.** 848 849 ```shell 850 cd core 851 go mod download 852 go build -o cmd/spindle/spindle cmd/spindle/main.go 853 ``` 854 8553. **Create the log directory.** 856 857 ```shell 858 sudo mkdir -p /var/log/spindle 859 sudo chown $USER:$USER -R /var/log/spindle 860 ``` 861 8624. **Run the Spindle binary.** 863 864 ```shell 865 ./cmd/spindle/spindle 866 ``` 867 868Spindle will now start, connect to the Jetstream server, and begin processing pipelines. 869 870## Architecture 871 872Spindle is a small CI runner service. Here's a high-level overview of how it operates: 873 874* Listens for [`sh.tangled.spindle.member`](/lexicons/spindle/member.json) and 875[`sh.tangled.repo`](/lexicons/repo.json) records on the Jetstream. 876* When a new repo record comes through (typically when you add a spindle to a 877repo from the settings), spindle then resolves the underlying knot and 878subscribes to repo events (see: 879[`sh.tangled.pipeline`](/lexicons/pipeline.json)). 880* The spindle engine then handles execution of the pipeline, with results and 881logs beamed on the spindle event stream over WebSocket 882 883### The engine 884 885At present, the only supported backend is Docker (and Podman, if Docker 886compatibility is enabled, so that `/run/docker.sock` is created). spindle 887executes each step in the pipeline in a fresh container, with state persisted 888across steps within the `/tangled/workspace` directory. 889 890The base image for the container is constructed on the fly using 891[Nixery](https://nixery.dev), which is handy for caching layers for frequently 892used packages. 893 894The pipeline manifest is [specified here](https://docs.tangled.org/spindles.html#pipelines). 895 896## Secrets with openbao 897 898This document covers setting up spindle to use OpenBao for secrets 899management via OpenBao Proxy instead of the default SQLite backend. 900 901### Overview 902 903Spindle now uses OpenBao Proxy for secrets management. The proxy handles 904authentication automatically using AppRole credentials, while spindle 905connects to the local proxy instead of directly to the OpenBao server. 906 907This approach provides better security, automatic token renewal, and 908simplified application code. 909 910### Installation 911 912Install OpenBao from Nixpkgs: 913 914```bash 915nix shell nixpkgs#openbao # for a local server 916``` 917 918### Setup 919 920The setup process can is documented for both local development and production. 921 922#### Local development 923 924Start OpenBao in dev mode: 925 926```bash 927bao server -dev -dev-root-token-id="root" -dev-listen-address=127.0.0.1:8201 928``` 929 930This starts OpenBao on `http://localhost:8201` with a root token. 931 932Set up environment for bao CLI: 933 934```bash 935export BAO_ADDR=http://localhost:8200 936export BAO_TOKEN=root 937``` 938 939#### Production 940 941You would typically use a systemd service with a 942configuration file. Refer to 943[@tangled.org/infra](https://tangled.org/@tangled.org/infra) 944for how this can be achieved using Nix. 945 946Then, initialize the bao server: 947 948```bash 949bao operator init -key-shares=1 -key-threshold=1 950``` 951 952This will print out an unseal key and a root key. Save them 953somewhere (like a password manager). Then unseal the vault 954to begin setting it up: 955 956```bash 957bao operator unseal <unseal_key> 958``` 959 960All steps below remain the same across both dev and 961production setups. 962 963#### Configure openbao server 964 965Create the spindle KV mount: 966 967```bash 968bao secrets enable -path=spindle -version=2 kv 969``` 970 971Set up AppRole authentication and policy: 972 973Create a policy file `spindle-policy.hcl`: 974 975```hcl 976# Full access to spindle KV v2 data 977path "spindle/data/*" { 978 capabilities = ["create", "read", "update", "delete"] 979} 980 981# Access to metadata for listing and management 982path "spindle/metadata/*" { 983 capabilities = ["list", "read", "delete", "update"] 984} 985 986# Allow listing at root level 987path "spindle/" { 988 capabilities = ["list"] 989} 990 991# Required for connection testing and health checks 992path "auth/token/lookup-self" { 993 capabilities = ["read"] 994} 995``` 996 997Apply the policy and create an AppRole: 998 999```bash 1000bao policy write spindle-policy spindle-policy.hcl 1001bao auth enable approle 1002bao write auth/approle/role/spindle \ 1003 token_policies="spindle-policy" \ 1004 token_ttl=1h \ 1005 token_max_ttl=4h \ 1006 bind_secret_id=true \ 1007 secret_id_ttl=0 \ 1008 secret_id_num_uses=0 1009``` 1010 1011Get the credentials: 1012 1013```bash 1014# Get role ID (static) 1015ROLE_ID=$(bao read -field=role_id auth/approle/role/spindle/role-id) 1016 1017# Generate secret ID 1018SECRET_ID=$(bao write -f -field=secret_id auth/approle/role/spindle/secret-id) 1019 1020echo "Role ID: $ROLE_ID" 1021echo "Secret ID: $SECRET_ID" 1022``` 1023 1024#### Create proxy configuration 1025 1026Create the credential files: 1027 1028```bash 1029# Create directory for OpenBao files 1030mkdir -p /tmp/openbao 1031 1032# Save credentials 1033echo "$ROLE_ID" > /tmp/openbao/role-id 1034echo "$SECRET_ID" > /tmp/openbao/secret-id 1035chmod 600 /tmp/openbao/role-id /tmp/openbao/secret-id 1036``` 1037 1038Create a proxy configuration file `/tmp/openbao/proxy.hcl`: 1039 1040```hcl 1041# OpenBao server connection 1042vault { 1043 address = "http://localhost:8200" 1044} 1045 1046# Auto-Auth using AppRole 1047auto_auth { 1048 method "approle" { 1049 mount_path = "auth/approle" 1050 config = { 1051 role_id_file_path = "/tmp/openbao/role-id" 1052 secret_id_file_path = "/tmp/openbao/secret-id" 1053 } 1054 } 1055 1056 # Optional: write token to file for debugging 1057 sink "file" { 1058 config = { 1059 path = "/tmp/openbao/token" 1060 mode = 0640 1061 } 1062 } 1063} 1064 1065# Proxy listener for spindle 1066listener "tcp" { 1067 address = "127.0.0.1:8201" 1068 tls_disable = true 1069} 1070 1071# Enable API proxy with auto-auth token 1072api_proxy { 1073 use_auto_auth_token = true 1074} 1075 1076# Enable response caching 1077cache { 1078 use_auto_auth_token = true 1079} 1080 1081# Logging 1082log_level = "info" 1083``` 1084 1085#### Start the proxy 1086 1087Start OpenBao Proxy: 1088 1089```bash 1090bao proxy -config=/tmp/openbao/proxy.hcl 1091``` 1092 1093The proxy will authenticate with OpenBao and start listening on 1094`127.0.0.1:8201`. 1095 1096#### Configure spindle 1097 1098Set these environment variables for spindle: 1099 1100```bash 1101export SPINDLE_SERVER_SECRETS_PROVIDER=openbao 1102export SPINDLE_SERVER_SECRETS_OPENBAO_PROXY_ADDR=http://127.0.0.1:8201 1103export SPINDLE_SERVER_SECRETS_OPENBAO_MOUNT=spindle 1104``` 1105 1106On startup, spindle will now connect to the local proxy, 1107which handles all authentication automatically. 1108 1109### Production setup for proxy 1110 1111For production, you'll want to run the proxy as a service: 1112 1113Place your production configuration in 1114`/etc/openbao/proxy.hcl` with proper TLS settings for the 1115vault connection. 1116 1117### Verifying setup 1118 1119Test the proxy directly: 1120 1121```bash 1122# Check proxy health 1123curl -H "X-Vault-Request: true" http://127.0.0.1:8201/v1/sys/health 1124 1125# Test token lookup through proxy 1126curl -H "X-Vault-Request: true" http://127.0.0.1:8201/v1/auth/token/lookup-self 1127``` 1128 1129Test OpenBao operations through the server: 1130 1131```bash 1132# List all secrets 1133bao kv list spindle/ 1134 1135# Add a test secret via the spindle API, then check it exists 1136bao kv list spindle/repos/ 1137 1138# Get a specific secret 1139bao kv get spindle/repos/your_repo_path/SECRET_NAME 1140``` 1141 1142### How it works 1143 1144- Spindle connects to OpenBao Proxy on localhost (typically 1145 port 8200 or 8201) 1146- The proxy authenticates with OpenBao using AppRole 1147 credentials 1148- All spindle requests go through the proxy, which injects 1149 authentication tokens 1150- Secrets are stored at 1151 `spindle/repos/{sanitized_repo_path}/{secret_key}` 1152- Repository paths like `did:plc:alice/myrepo` become 1153 `did_plc_alice_myrepo` 1154- The proxy handles all token renewal automatically 1155- Spindle no longer manages tokens or authentication 1156 directly 1157 1158### Troubleshooting 1159 1160**Connection refused**: Check that the OpenBao Proxy is 1161running and listening on the configured address. 1162 1163**403 errors**: Verify the AppRole credentials are correct 1164and the policy has the necessary permissions. 1165 1166**404 route errors**: The spindle KV mount probably doesn't 1167exist—run the mount creation step again. 1168 1169**Proxy authentication failures**: Check the proxy logs and 1170verify the role-id and secret-id files are readable and 1171contain valid credentials. 1172 1173**Secret not found after writing**: This can indicate policy 1174permission issues. Verify the policy includes both 1175`spindle/data/*` and `spindle/metadata/*` paths with 1176appropriate capabilities. 1177 1178Check proxy logs: 1179 1180```bash 1181# If running as systemd service 1182journalctl -u openbao-proxy -f 1183 1184# If running directly, check the console output 1185``` 1186 1187Test AppRole authentication manually: 1188 1189```bash 1190bao write auth/approle/login \ 1191 role_id="$(cat /tmp/openbao/role-id)" \ 1192 secret_id="$(cat /tmp/openbao/secret-id)" 1193``` 1194 1195# Migrating knots and spindles 1196 1197Sometimes, non-backwards compatible changes are made to the 1198knot/spindle XRPC APIs. If you host a knot or a spindle, you 1199will need to follow this guide to upgrade. Typically, this 1200only requires you to deploy the newest version. 1201 1202This document is laid out in reverse-chronological order. 1203Newer migration guides are listed first, and older guides 1204are further down the page. 1205 1206## Upgrading from v1.8.x 1207 1208After v1.8.2, the HTTP API for knots and spindles has been 1209deprecated and replaced with XRPC. Repositories on outdated 1210knots will not be viewable from the appview. Upgrading is 1211straightforward however. 1212 1213For knots: 1214 1215- Upgrade to the latest tag (v1.9.0 or above) 1216- Head to the [knot dashboard](https://tangled.org/settings/knots) and 1217 hit the "retry" button to verify your knot 1218 1219For spindles: 1220 1221- Upgrade to the latest tag (v1.9.0 or above) 1222- Head to the [spindle 1223 dashboard](https://tangled.org/settings/spindles) and hit the 1224 "retry" button to verify your spindle 1225 1226## Upgrading from v1.7.x 1227 1228After v1.7.0, knot secrets have been deprecated. You no 1229longer need a secret from the appview to run a knot. All 1230authorized commands to knots are managed via [Inter-Service 1231Authentication](https://atproto.com/specs/xrpc#inter-service-authentication-jwt). 1232Knots will be read-only until upgraded. 1233 1234Upgrading is quite easy, in essence: 1235 1236- `KNOT_SERVER_SECRET` is no more, you can remove this 1237 environment variable entirely 1238- `KNOT_SERVER_OWNER` is now required on boot, set this to 1239 your DID. You can find your DID in the 1240 [settings](https://tangled.org/settings) page. 1241- Restart your knot once you have replaced the environment 1242 variable 1243- Head to the [knot dashboard](https://tangled.org/settings/knots) and 1244 hit the "retry" button to verify your knot. This simply 1245 writes a `sh.tangled.knot` record to your PDS. 1246 1247If you use the nix module, simply bump the flake to the 1248latest revision, and change your config block like so: 1249 1250```diff 1251 services.tangled.knot = { 1252 enable = true; 1253 server = { 1254- secretFile = /path/to/secret; 1255+ owner = "did:plc:foo"; 1256 }; 1257 }; 1258``` 1259 1260# Hacking on Tangled 1261 1262We highly recommend [installing 1263Nix](https://nixos.org/download/) (the package manager) 1264before working on the codebase. The Nix flake provides a lot 1265of helpers to get started and most importantly, builds and 1266dev shells are entirely deterministic. 1267 1268To set up your dev environment: 1269 1270```bash 1271nix develop 1272``` 1273 1274Non-Nix users can look at the `devShell` attribute in the 1275`flake.nix` file to determine necessary dependencies. 1276 1277## Running the appview 1278 1279The Nix flake also exposes a few `app` attributes (run `nix 1280flake show` to see a full list of what the flake provides), 1281one of the apps runs the appview with the `air` 1282live-reloader: 1283 1284```bash 1285TANGLED_DEV=true nix run .#watch-appview 1286 1287# TANGLED_DB_PATH might be of interest to point to 1288# different sqlite DBs 1289 1290# in a separate shell, you can live-reload tailwind 1291nix run .#watch-tailwind 1292``` 1293 1294To authenticate with the appview, you will need Redis and 1295OAuth JWKs to be set up: 1296 1297``` 1298# OAuth JWKs should already be set up by the Nix devshell: 1299echo $TANGLED_OAUTH_CLIENT_SECRET 1300z42ty4RT1ovnTopY8B8ekz9NuziF2CuMkZ7rbRFpAR9jBqMc 1301 1302echo $TANGLED_OAUTH_CLIENT_KID 13031761667908 1304 1305# if not, you can set it up yourself: 1306goat key generate -t P-256 1307Key Type: P-256 / secp256r1 / ES256 private key 1308Secret Key (Multibase Syntax): save this securely (eg, add to password manager) 1309 z42tuPDKRfM2mz2Kv953ARen2jmrPA8S9LX9tRq4RVcUMwwL 1310Public Key (DID Key Syntax): share or publish this (eg, in DID document) 1311 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR 1312 1313# the secret key from above 1314export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..." 1315 1316# Run Redis in a new shell to store OAuth sessions 1317redis-server 1318``` 1319 1320## Running knots and spindles 1321 1322An end-to-end knot setup requires setting up a machine with 1323`sshd`, `AuthorizedKeysCommand`, and a Git user, which is 1324quite cumbersome. So the Nix flake provides a 1325`nixosConfiguration` to do so. 1326 1327<details> 1328 <summary><strong>macOS users will have to set up a Nix Builder first</strong></summary> 1329 1330 In order to build Tangled's dev VM on macOS, you will 1331 first need to set up a Linux Nix builder. The recommended 1332 way to do so is to run a [`darwin.linux-builder` 1333 VM](https://nixos.org/manual/nixpkgs/unstable/#sec-darwin-builder) 1334 and to register it in `nix.conf` as a builder for Linux 1335 with the same architecture as your Mac (`linux-aarch64` if 1336 you are using Apple Silicon). 1337 1338 > IMPORTANT: You must build `darwin.linux-builder` somewhere other than inside 1339 > the Tangled repo so that it doesn't conflict with the other VM. For example, 1340 > you can do 1341 > 1342 > ```shell 1343 > cd $(mktemp -d buildervm.XXXXX) && nix run nixpkgs#darwin.linux-builder 1344 > ``` 1345 > 1346 > to store the builder VM in a temporary dir. 1347 > 1348 > You should read and follow [all the other intructions][darwin builder vm] to 1349 > avoid subtle problems. 1350 1351 Alternatively, you can use any other method to set up a 1352 Linux machine with Nix installed that you can `sudo ssh` 1353 into (in other words, root user on your Mac has to be able 1354 to ssh into the Linux machine without entering a password) 1355 and that has the same architecture as your Mac. See 1356 [remote builder 1357 instructions](https://nix.dev/manual/nix/2.28/advanced-topics/distributed-builds.html#requirements) 1358 for how to register such a builder in `nix.conf`. 1359 1360 > WARNING: If you'd like to use 1361 > [`nixos-lima`](https://github.com/nixos-lima/nixos-lima) or 1362 > [Orbstack](https://orbstack.dev/), note that setting them up so that `sudo 1363 > ssh` works can be tricky. It seems to be [possible with 1364 > Orbstack](https://github.com/orgs/orbstack/discussions/1669). 1365 1366</details> 1367 1368To begin, grab your DID from http://localhost:3000/settings. 1369Then, set `TANGLED_VM_KNOT_OWNER` and 1370`TANGLED_VM_SPINDLE_OWNER` to your DID. You can now start a 1371lightweight NixOS VM like so: 1372 1373```bash 1374nix run --impure .#vm 1375 1376# type `poweroff` at the shell to exit the VM 1377``` 1378 1379This starts a knot on port 6444, a spindle on port 6555 1380with `ssh` exposed on port 2222. 1381 1382Once the services are running, head to 1383http://localhost:3000/settings/knots and hit "Verify". It should 1384verify the ownership of the services instantly if everything 1385went smoothly. 1386 1387You can push repositories to this VM with this ssh config 1388block on your main machine: 1389 1390```bash 1391Host nixos-shell 1392 Hostname localhost 1393 Port 2222 1394 User git 1395 IdentityFile ~/.ssh/my_tangled_key 1396``` 1397 1398Set up a remote called `local-dev` on a git repo: 1399 1400```bash 1401git remote add local-dev git@nixos-shell:user/repo 1402git push local-dev main 1403``` 1404 1405The above VM should already be running a spindle on 1406`localhost:6555`. Head to http://localhost:3000/settings/spindles and 1407hit "Verify". You can then configure each repository to use 1408this spindle and run CI jobs. 1409 1410Of interest when debugging spindles: 1411 1412``` 1413# Service logs from journald: 1414journalctl -xeu spindle 1415 1416# CI job logs from disk: 1417ls /var/log/spindle 1418 1419# Debugging spindle database: 1420sqlite3 /var/lib/spindle/spindle.db 1421 1422# litecli has a nicer REPL interface: 1423litecli /var/lib/spindle/spindle.db 1424``` 1425 1426If for any reason you wish to disable either one of the 1427services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set 1428`services.tangled.spindle.enable` (or 1429`services.tangled.knot.enable`) to `false`. 1430 1431# Contribution guide 1432 1433## Commit guidelines 1434 1435We follow a commit style similar to the Go project. Please keep commits: 1436 1437* **atomic**: each commit should represent one logical change 1438* **descriptive**: the commit message should clearly describe what the 1439change does and why it's needed 1440 1441### Message format 1442 1443``` 1444<service/top-level directory>/<affected package/directory>: <short summary of change> 1445 1446Optional longer description can go here, if necessary. Explain what the 1447change does and why, especially if not obvious. Reference relevant 1448issues or PRs when applicable. These can be links for now since we don't 1449auto-link issues/PRs yet. 1450``` 1451 1452Here are some examples: 1453 1454``` 1455appview/state: fix token expiry check in middleware 1456 1457The previous check did not account for clock drift, leading to premature 1458token invalidation. 1459``` 1460 1461``` 1462knotserver/git/service: improve error checking in upload-pack 1463``` 1464 1465 1466### General notes 1467 1468- PRs get merged "as-is" (fast-forward)—like applying a patch-series 1469using `git am`. At present, there is no squashing—so please author 1470your commits as they would appear on `master`, following the above 1471guidelines. 1472- If there is a lot of nesting, for example "appview: 1473pages/templates/repo/fragments: ...", these can be truncated down to 1474just "appview: repo/fragments: ...". If the change affects a lot of 1475subdirectories, you may abbreviate to just the top-level names, e.g. 1476"appview: ..." or "knotserver: ...". 1477- Keep commits lowercased with no trailing period. 1478- Use the imperative mood in the summary line (e.g., "fix bug" not 1479"fixed bug" or "fixes bug"). 1480- Try to keep the summary line under 72 characters, but we aren't too 1481fussed about this. 1482- Follow the same formatting for PR titles if filled manually. 1483- Don't include unrelated changes in the same commit. 1484- Avoid noisy commit messages like "wip" or "final fix"—rewrite history 1485before submitting if necessary. 1486 1487## Code formatting 1488 1489We use a variety of tools to format our code, and multiplex them with 1490[`treefmt`](https://treefmt.com). All you need to do to format your changes 1491is run `nix run .#fmt` (or just `treefmt` if you're in the devshell). 1492 1493## Proposals for bigger changes 1494 1495Small fixes like typos, minor bugs, or trivial refactors can be 1496submitted directly as PRs. 1497 1498For larger changes—especially those introducing new features, significant 1499refactoring, or altering system behavior—please open a proposal first. This 1500helps us evaluate the scope, design, and potential impact before implementation. 1501 1502Create a new issue titled: 1503 1504``` 1505proposal: <affected scope>: <summary of change> 1506``` 1507 1508In the description, explain: 1509 1510- What the change is 1511- Why it's needed 1512- How you plan to implement it (roughly) 1513- Any open questions or tradeoffs 1514 1515We'll use the issue thread to discuss and refine the idea before moving 1516forward. 1517 1518## Developer Certificate of Origin (DCO) 1519 1520We require all contributors to certify that they have the right to 1521submit the code they're contributing. To do this, we follow the 1522[Developer Certificate of Origin 1523(DCO)](https://developercertificate.org/). 1524 1525By signing your commits, you're stating that the contribution is your 1526own work, or that you have the right to submit it under the project's 1527license. This helps us keep things clean and legally sound. 1528 1529To sign your commit, just add the `-s` flag when committing: 1530 1531```sh 1532git commit -s -m "your commit message" 1533``` 1534 1535This appends a line like: 1536 1537``` 1538Signed-off-by: Your Name <your.email@example.com> 1539``` 1540 1541We won't merge commits if they aren't signed off. If you forget, you can 1542amend the last commit like this: 1543 1544```sh 1545git commit --amend -s 1546``` 1547 1548If you're submitting a PR with multiple commits, make sure each one is 1549signed. 1550 1551For [jj](https://jj-vcs.github.io/jj/latest/) users, you can run the following command 1552to make it sign off commits in the tangled repo: 1553 1554```shell 1555# Safety check, should say "No matching config key..." 1556jj config list templates.commit_trailers 1557# The command below may need to be adjusted if the command above returned something. 1558jj config set --repo templates.commit_trailers "format_signed_off_by_trailer(self)" 1559``` 1560 1561Refer to the [jujutsu 1562documentation](https://jj-vcs.github.io/jj/latest/config/#commit-trailers) 1563for more information.