Compare commits

..

5 commits

11 changed files with 674 additions and 592 deletions

2
.git-blame-ignore-revs Normal file
View file

@ -0,0 +1,2 @@
# Switch to nixfmt formatting
82c1d22d3dd74fb5da489162a9d4caba9ab3baba

75
flake.lock generated
View file

@ -2,16 +2,18 @@
"nodes": { "nodes": {
"dream2nix": { "dream2nix": {
"inputs": { "inputs": {
"nixpkgs": "nixpkgs", "nixpkgs": [
"nixpkgs"
],
"purescript-overlay": "purescript-overlay", "purescript-overlay": "purescript-overlay",
"pyproject-nix": "pyproject-nix" "pyproject-nix": "pyproject-nix"
}, },
"locked": { "locked": {
"lastModified": 1735160684, "lastModified": 1763413832,
"narHash": "sha256-n5CwhmqKxifuD4Sq4WuRP/h5LO6f23cGnSAuJemnd/4=", "narHash": "sha256-dkqBwDXiv8MPoFyIvOuC4bVubAP+TlVZUkVMB78TTSg=",
"owner": "nix-community", "owner": "nix-community",
"repo": "dream2nix", "repo": "dream2nix",
"rev": "8ce6284ff58208ed8961681276f82c2f8f978ef4", "rev": "5658fba3a0b6b7d5cb0460b949651f64f644a743",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -28,11 +30,11 @@
"rust-analyzer-src": "rust-analyzer-src" "rust-analyzer-src": "rust-analyzer-src"
}, },
"locked": { "locked": {
"lastModified": 1737181903, "lastModified": 1763621140,
"narHash": "sha256-lvp77MhGzSN+ICd0MugppCjQR6cmlM2iAC5cjy2ZsaA=", "narHash": "sha256-nx0zy/+yR57FwloXmatf3CaXgzA4zJqIFbplnpaKn/Y=",
"owner": "nix-community", "owner": "nix-community",
"repo": "fenix", "repo": "fenix",
"rev": "ac79bb490b8c1af4bbc587b84c76f9527d6b14f7", "rev": "d4e14d370b4763c67ea02a39f01f5366297d61cb",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -59,34 +61,15 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1729850857, "lastModified": 1763334038,
"narHash": "sha256-WvLXzNNnnw+qpFOmgaM3JUlNEH+T4s22b5i2oyyCpXE=", "narHash": "sha256-3FzFzhmeuKK2dLv6pm6rC1QTcukVe+xcLpKOrE5Fx5g=",
"owner": "NixOS", "rev": "4c8cdd5b1a630e8f72c9dd9bf582b1afb3127d2c",
"repo": "nixpkgs", "type": "tarball",
"rev": "41dea55321e5a999b17033296ac05fe8a8b5a257", "url": "https://releases.nixos.org/nixos/25.05/nixos-25.05.812880.4c8cdd5b1a63/nixexprs.tar.xz?lastModified=1763334038&rev=4c8cdd5b1a630e8f72c9dd9bf582b1afb3127d2c"
"type": "github"
}, },
"original": { "original": {
"owner": "NixOS", "type": "tarball",
"ref": "nixpkgs-unstable", "url": "https://channels.nixos.org/nixos-25.05/nixexprs.tar.xz"
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1737165118,
"narHash": "sha256-s40Kk/OulP3J/1JvC3VT16U4r/Xw6Qdi7SRw3LYkPWs=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "6a3ae7a5a12fb8cac2d59d7df7cbd95f9b2f0566",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
} }
}, },
"purescript-overlay": { "purescript-overlay": {
@ -113,18 +96,22 @@
} }
}, },
"pyproject-nix": { "pyproject-nix": {
"flake": false, "inputs": {
"nixpkgs": [
"dream2nix",
"nixpkgs"
]
},
"locked": { "locked": {
"lastModified": 1702448246, "lastModified": 1752481895,
"narHash": "sha256-hFg5s/hoJFv7tDpiGvEvXP0UfFvFEDgTdyHIjDVHu1I=", "narHash": "sha256-luVj97hIMpCbwhx3hWiRwjP2YvljWy8FM+4W9njDhLA=",
"owner": "davhau", "owner": "pyproject-nix",
"repo": "pyproject.nix", "repo": "pyproject.nix",
"rev": "5a06a2697b228c04dd2f35659b4b659ca74f7aeb", "rev": "16ee295c25107a94e59a7fc7f2e5322851781162",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "davhau", "owner": "pyproject-nix",
"ref": "dream2nix",
"repo": "pyproject.nix", "repo": "pyproject.nix",
"type": "github" "type": "github"
} }
@ -133,17 +120,17 @@
"inputs": { "inputs": {
"dream2nix": "dream2nix", "dream2nix": "dream2nix",
"fenix": "fenix", "fenix": "fenix",
"nixpkgs": "nixpkgs_2" "nixpkgs": "nixpkgs"
} }
}, },
"rust-analyzer-src": { "rust-analyzer-src": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1737140097, "lastModified": 1763555010,
"narHash": "sha256-m4SN8DeKzsP10EQFS7+2zgGfCrMhTfTt1H0QRNesD08=", "narHash": "sha256-SG8PRrLir8RkXdyBm/NnuUo3WqS7HW6ltJLZnAWjBjA=",
"owner": "rust-lang", "owner": "rust-lang",
"repo": "rust-analyzer", "repo": "rust-analyzer",
"rev": "f61bfa4d7feb84d07538d361fe77d34a29e3b375", "rev": "636c3aa24ec6762347c334c030b5034c351d6e05",
"type": "github" "type": "github"
}, },
"original": { "original": {

130
flake.nix
View file

@ -2,8 +2,11 @@
description = "tlater.net web server"; description = "tlater.net web server";
inputs = { inputs = {
nixpkgs.url = "github:nixos/nixpkgs/nixos-24.11"; nixpkgs.url = "https://channels.nixos.org/nixos-25.05/nixexprs.tar.xz";
dream2nix.url = "github:nix-community/dream2nix"; dream2nix = {
url = "github:nix-community/dream2nix";
inputs.nixpkgs.follows = "nixpkgs";
};
fenix = { fenix = {
url = "github:nix-community/fenix"; url = "github:nix-community/fenix";
@ -11,70 +14,77 @@
}; };
}; };
outputs = { outputs =
self, {
nixpkgs, self,
dream2nix, nixpkgs,
fenix, dream2nix,
}: let fenix,
# At the moment, we only deploy to x86_64-linux. Update when we }:
# care about another platform. let
system = "x86_64-linux"; # At the moment, we only deploy to x86_64-linux. Update when we
pkgs = nixpkgs.legacyPackages.${system}; # care about another platform.
fenixPkgs = fenix.packages.${system}; system = "x86_64-linux";
ownPkgs = self.packages.${system}; pkgs = nixpkgs.legacyPackages.${system};
in { fenixPkgs = fenix.packages.${system};
packages.${system} = dream2nix.lib.importPackages { ownPkgs = self.packages.${system};
projectRoot = ./.; in
projectRootFile = "flake.nix"; {
packagesDir = ./packages; packages.${system} = dream2nix.lib.importPackages {
packageSets = { projectRoot = ./.;
nixpkgs = pkgs; projectRootFile = "flake.nix";
fenix = fenixPkgs; packagesDir = ./packages;
}; packageSets = {
}; nixpkgs = pkgs;
fenix = fenixPkgs;
apps.${system} = { };
default = let
inherit (ownPkgs) server templates;
inherit (pkgs) writeShellScript;
in {
type = "app";
program = builtins.toString (writeShellScript "tlaternet-webserver" ''
${server}/bin/tlaternet-webserver --template-directory ${templates}
'');
}; };
update = let apps.${system} = {
update-script = pkgs.callPackage ./nix/update.nix {inherit self;}; default =
in { let
type = "app"; inherit (ownPkgs) server templates;
program = "${update-script}/bin/update"; inherit (pkgs) writeShellScript;
in
{
type = "app";
program = builtins.toString (
writeShellScript "tlaternet-webserver" ''
${server}/bin/tlaternet-webserver --template-directory ${templates}
''
);
};
update =
let
update-script = pkgs.callPackage ./nix/update.nix { inherit self; };
in
{
type = "app";
program = "${update-script}/bin/update";
};
}; };
};
nixosModules.default = import ./nix/module.nix {inherit self system;}; nixosModules.default = import ./nix/module.nix { inherit self system; };
devShells.${system} = { devShells.${system} = {
server = pkgs.mkShell { server = pkgs.mkShell {
packages = [ packages = [
(fenixPkgs.stable.withComponents [ (fenixPkgs.stable.withComponents [
"rustc" "rustc"
"cargo" "cargo"
"rustfmt" "rustfmt"
"rust-std" "rust-std"
"rust-docs" "rust-docs"
"clippy" "clippy"
"rust-src" "rust-src"
"rust-analysis" "rust-analysis"
]) ])
fenixPkgs.rust-analyzer fenixPkgs.rust-analyzer
]; ];
};
}; };
};
checks.${system} = import ./nix/checks { checks.${system} = import ./nix/checks { inherit self pkgs; };
inherit self pkgs;
}; };
};
} }

View file

@ -1,9 +1,8 @@
{ pkgs, self }:
let
callPackage = pkgs.lib.callPackageWith (pkgs // { inherit self; });
in
{ {
pkgs, lintNix = callPackage ./lint-nix.nix { };
self, openHomepage = callPackage ./open-homepage.nix { };
}: let
callPackage = pkgs.lib.callPackageWith (pkgs // {inherit self;});
in {
lintNix = callPackage ./lint-nix.nix {};
openHomepage = callPackage ./open-homepage.nix {};
} }

View file

@ -2,26 +2,31 @@
self, self,
lib, lib,
stdenv, stdenv,
alejandra, nixfmt-rfc-style,
deadnix, deadnix,
statix, statix,
}: let }:
let
inherit (lib) sourceFilesBySuffices; inherit (lib) sourceFilesBySuffices;
in in
stdenv.mkDerivation { stdenv.mkDerivation {
dontPatch = true; dontPatch = true;
dontConfigure = true; dontConfigure = true;
dontBuild = true; dontBuild = true;
dontInstall = true; dontInstall = true;
doCheck = true; doCheck = true;
name = "lint-nix"; name = "lint-nix";
src = sourceFilesBySuffices self [".nix"]; src = sourceFilesBySuffices self [ ".nix" ];
checkInputs = [alejandra deadnix statix]; checkInputs = [
checkPhase = '' nixfmt-rfc-style
mkdir -p $out deadnix
alejandra --check . | tee $out/alejandra.log statix
deadnix --fail | tee $out/deadnix.log ];
statix check | tee $out/statix.log checkPhase = ''
''; mkdir -p $out
} nixfmt --strict --check . | tee $out/nixfmt.log
deadnix --fail | tee $out/deadnix.log
statix check | tee $out/statix.log
'';
}

View file

@ -1,19 +1,16 @@
{ { self, nixosTest }:
self,
nixosTest,
}:
nixosTest { nixosTest {
name = "open-homepage"; name = "open-homepage";
nodes = { nodes = {
# Host with just the default configuration # Host with just the default configuration
defaults = { defaults = {
imports = [self.nixosModules.default]; imports = [ self.nixosModules.default ];
services.tlaternet-webserver.enable = true; services.tlaternet-webserver.enable = true;
}; };
host = { host = {
imports = [self.nixosModules.default]; imports = [ self.nixosModules.default ];
services.tlaternet-webserver = { services.tlaternet-webserver = {
enable = true; enable = true;
@ -23,10 +20,10 @@ nixosTest {
}; };
}; };
networking.firewall.allowedTCPPorts = [8080]; networking.firewall.allowedTCPPorts = [ 8080 ];
}; };
client = {}; client = { };
}; };
testScript = '' testScript = ''

View file

@ -1,18 +1,14 @@
{ { self, system }:
self, { config, lib, ... }:
system, let
}: {
config,
lib,
...
}: let
inherit (lib) mkEnableOption mkIf mkOption; inherit (lib) mkEnableOption mkIf mkOption;
inherit (lib.types) str int; inherit (lib.types) str int;
inherit (lib.strings) escapeShellArgs; inherit (lib.strings) escapeShellArgs;
inherit (self.packages.${system}) server templates; inherit (self.packages.${system}) server templates;
cfg = config.services.tlaternet-webserver; cfg = config.services.tlaternet-webserver;
in { in
{
options = { options = {
services.tlaternet-webserver = { services.tlaternet-webserver = {
enable = mkEnableOption "tlaternet web server"; enable = mkEnableOption "tlaternet web server";
@ -35,8 +31,8 @@ in {
config = mkIf cfg.enable { config = mkIf cfg.enable {
systemd.services.tlaternet-webserver = { systemd.services.tlaternet-webserver = {
description = "tlaternet webserver"; description = "tlaternet webserver";
wantedBy = ["multi-user.target"]; wantedBy = [ "multi-user.target" ];
after = ["network.target"]; after = [ "network.target" ];
script = escapeShellArgs [ script = escapeShellArgs [
"${server}/bin/tlaternet-webserver" "${server}/bin/tlaternet-webserver"
@ -60,14 +56,21 @@ in {
ProtectKernelModules = true; ProtectKernelModules = true;
ProtectKernelLogs = true; ProtectKernelLogs = true;
ProtectControlGroups = true; ProtectControlGroups = true;
RestrictAddressFamilies = ["AF_UNIX" "AF_INET" "AF_INET6"]; RestrictAddressFamilies = [
"AF_UNIX"
"AF_INET"
"AF_INET6"
];
RestrictNamespaces = true; RestrictNamespaces = true;
LockPersonality = true; LockPersonality = true;
MemoryDenyWriteExecute = true; MemoryDenyWriteExecute = true;
RestrictRealtime = true; RestrictRealtime = true;
RestrictSUIDSGID = true; RestrictSUIDSGID = true;
SystemCallArchitectures = "native"; SystemCallArchitectures = "native";
SystemCallFilter = ["@system-service" "~@privileged @resources @setuid @keyring"]; SystemCallFilter = [
"@system-service"
"~@privileged @resources @setuid @keyring"
];
}; };
}; };
}; };

View file

@ -6,20 +6,25 @@
git, git,
nix, nix,
yq-go, yq-go,
}: let }:
let
selfPackages = self.packages.${system}; selfPackages = self.packages.${system};
inherit (selfPackages.server.config.deps) cargo; inherit (selfPackages.server.config.deps) cargo;
inherit (selfPackages.templates.config.deps) npm; inherit (selfPackages.templates.config.deps) npm;
npm-check-updates = npm-check-updates =
(builtins.elemAt (lib.attrValues (builtins.elemAt (lib.attrValues selfPackages.templates.config.nodejs-granular-v3.deps.npm-check-updates) 0)
selfPackages.templates.config.nodejs-granular-v3.deps.npm-check-updates) .package-func.result;
0)
.package-func
.result;
in in
writeShellApplication { writeShellApplication {
name = "update"; name = "update";
runtimeInputs = [cargo git nix npm npm-check-updates yq-go]; runtimeInputs = [
text = builtins.readFile ./scripts/update.sh; cargo
} git
nix
npm
npm-check-updates
yq-go
];
text = builtins.readFile ./scripts/update.sh;
}

File diff suppressed because it is too large Load diff

View file

@ -1,16 +1,26 @@
{dream2nix, ...}: { { dream2nix, lib, ... }:
{
imports = [ imports = [
dream2nix.modules.dream2nix.rust-cargo-lock dream2nix.modules.dream2nix.rust-cargo-lock
dream2nix.modules.dream2nix.rust-cargo-vendor dream2nix.modules.dream2nix.rust-cargo-vendor
dream2nix.modules.dream2nix.rust-crane dream2nix.modules.dream2nix.rust-crane
]; ];
deps = {fenix, ...}: { deps =
deps.cargo = fenix.stable.minimalToolchain; { fenix, ... }:
}; {
deps.cargo = fenix.stable.minimalToolchain;
};
name = "tlaternet-webserver"; inherit
version = "0.1.0"; ((lib.pipe ./Cargo.toml [
builtins.readFile
builtins.fromTOML
]).package
)
name
version
;
mkDerivation = { mkDerivation = {
src = ./.; src = ./.;

View file

@ -3,28 +3,37 @@
config, config,
lib, lib,
... ...
}: { }:
{
imports = [ imports = [
dream2nix.modules.dream2nix.nodejs-package-json-v3 dream2nix.modules.dream2nix.nodejs-package-json-v3
dream2nix.modules.dream2nix.nodejs-granular-v3 dream2nix.modules.dream2nix.nodejs-granular-v3
dream2nix.modules.dream2nix.nodejs-devshell-v3 dream2nix.modules.dream2nix.nodejs-devshell-v3
]; ];
deps = {nixpkgs, ...}: { deps =
inherit (nixpkgs) pkg-config runCommandLocal rsync vips yj; { nixpkgs, ... }:
}; {
inherit (nixpkgs)
pkg-config
runCommandLocal
rsync
vips
yj
;
};
name = "tlaternet-templates"; name = "tlaternet-templates";
version = "0.1.0"; version = "0.1.0";
mkDerivation = { mkDerivation = {
src = config.deps.runCommandLocal "source" {nativeBuildInputs = [config.deps.yj];} '' src = config.deps.runCommandLocal "source" { nativeBuildInputs = [ config.deps.yj ]; } ''
cp -r ${./.} $out/ cp -r ${./.} $out/
chmod -R u+w $out chmod -R u+w $out
yj < $out/package.yaml > $out/package.json yj < $out/package.yaml > $out/package.json
''; '';
nativeBuildInputs = [config.deps.yj]; nativeBuildInputs = [ config.deps.yj ];
# The default phase (which is hidden in `preInstallPhases`) will # The default phase (which is hidden in `preInstallPhases`) will
# copy the full node_modules directory to the output, and symlink # copy the full node_modules directory to the output, and symlink
@ -32,7 +41,7 @@
# #
# Since this package's output is static HTML/JS, we do not want # Since this package's output is static HTML/JS, we do not want
# that. # that.
preInstallPhases = lib.mkForce []; preInstallPhases = lib.mkForce [ ];
installPhase = '' installPhase = ''
cp -r dist $out cp -r dist $out
''; '';