Monorepo for Tangled
at push-rukyyyptkmtm 1810 lines 51 kB view raw view rendered
1--- 2title: Tangled docs 3author: The Tangled Contributors 4date: 21 Sun, Dec 2025 5abstract: | 6 Tangled is a decentralized code hosting and collaboration 7 platform. Every component of Tangled is open-source and 8 self-hostable. [tangled.org](https://tangled.org) also 9 provides hosting and CI services that are free to use. 10 11 There are several models for decentralized code 12 collaboration platforms, ranging from ActivityPub’s 13 (Forgejo) federated model, to Radicle’s entirely P2P model. 14 Our approach attempts to be the best of both worlds by 15 adopting the AT Protocol—a protocol for building decentralized 16 social applications with a central identity 17 18 Our approach to this is the idea of “knots”. Knots are 19 lightweight, headless servers that enable users to host Git 20 repositories with ease. Knots are designed for either single 21 or multi-tenant use which is perfect for self-hosting on a 22 Raspberry Pi at home, or larger “community” servers. By 23 default, Tangled provides managed knots where you can host 24 your repositories for free. 25 26 The appview at tangled.org acts as a consolidated "view" 27 into the whole network, allowing users to access, clone and 28 contribute to repositories hosted across different knots 29 seamlessly. 30--- 31 32# Quick start guide 33 34## Login or sign up 35 36You can [login](https://tangled.org) by using your AT Protocol 37account. If you are unclear on what that means, simply head 38to the [signup](https://tangled.org/signup) page and create 39an account. By doing so, you will be choosing Tangled as 40your account provider (you will be granted a handle of the 41form `user.tngl.sh`). 42 43In the AT Protocol network, users are free to choose their account 44provider (known as a "Personal Data Service", or PDS), and 45login to applications that support AT accounts. 46 47You can think of it as "one account for all of the atmosphere"! 48 49If you already have an AT account (you may have one if you 50signed up to Bluesky, for example), you can login with the 51same handle on Tangled (so just use `user.bsky.social` on 52the login page). 53 54## Add an SSH key 55 56Once you are logged in, you can start creating repositories 57and pushing code. Tangled supports pushing git repositories 58over SSH. 59 60First, you'll need to generate an SSH key if you don't 61already have one: 62 63```bash 64ssh-keygen -t ed25519 -C "foo@bar.com" 65``` 66 67When prompted, save the key to the default location 68(`~/.ssh/id_ed25519`) and optionally set a passphrase. 69 70Copy your public key to your clipboard: 71 72```bash 73# on X11 74cat ~/.ssh/id_ed25519.pub | xclip -sel c 75 76# on wayland 77cat ~/.ssh/id_ed25519.pub | wl-copy 78 79# on macos 80cat ~/.ssh/id_ed25519.pub | pbcopy 81``` 82 83Now, navigate to 'Settings' -> 'Keys' and hit 'Add Key', 84paste your public key, give it a descriptive name, and hit 85save. 86 87## Create a repository 88 89Once your SSH key is added, create your first repository: 90 911. Hit the green `+` icon on the topbar, and select 92 repository 932. Enter a repository name 943. Add a description 954. Choose a knotserver to host this repository on 965. Hit create 97 98Knots are self-hostable, lightweight Git servers that can 99host your repository. Unlike traditional code forges, your 100code can live on any server. Read the [Knots](TODO) section 101for more. 102 103## Configure SSH 104 105To ensure Git uses the correct SSH key and connects smoothly 106to Tangled, add this configuration to your `~/.ssh/config` 107file: 108 109``` 110Host tangled.org 111 Hostname tangled.org 112 User git 113 IdentityFile ~/.ssh/id_ed25519 114 AddressFamily inet 115``` 116 117This tells SSH to use your specific key when connecting to 118Tangled and prevents authentication issues if you have 119multiple SSH keys. 120 121Note that this configuration only works for knotservers that 122are hosted by tangled.org. If you use a custom knot, refer 123to the [Knots](TODO) section. 124 125## Push your first repository 126 127Initialize a new Git repository: 128 129```bash 130mkdir my-project 131cd my-project 132 133git init 134echo "# My Project" > README.md 135``` 136 137Add some content and push! 138 139```bash 140git add README.md 141git commit -m "Initial commit" 142git remote add origin git@tangled.org:user.tngl.sh/my-project 143git push -u origin main 144``` 145 146That's it! Your code is now hosted on Tangled. 147 148## Migrating an existing repository 149 150Moving your repositories from GitHub, GitLab, Bitbucket, or 151any other Git forge to Tangled is straightforward. You'll 152simply change your repository's remote URL. At the moment, 153Tangled does not have any tooling to migrate data such as 154GitHub issues or pull requests. 155 156First, create a new repository on tangled.org as described 157in the [Quick Start Guide](#create-a-repository). 158 159Navigate to your existing local repository: 160 161```bash 162cd /path/to/your/existing/repo 163``` 164 165You can inspect your existing Git remote like so: 166 167```bash 168git remote -v 169``` 170 171You'll see something like: 172 173``` 174origin git@github.com:username/my-project (fetch) 175origin git@github.com:username/my-project (push) 176``` 177 178Update the remote URL to point to tangled: 179 180```bash 181git remote set-url origin git@tangled.org:user.tngl.sh/my-project 182``` 183 184Verify the change: 185 186```bash 187git remote -v 188``` 189 190You should now see: 191 192``` 193origin git@tangled.org:user.tngl.sh/my-project (fetch) 194origin git@tangled.org:user.tngl.sh/my-project (push) 195``` 196 197Push all your branches and tags to Tangled: 198 199```bash 200git push -u origin --all 201git push -u origin --tags 202``` 203 204Your repository is now migrated to Tangled! All commit 205history, branches, and tags have been preserved. 206 207## Mirroring a repository to Tangled 208 209If you want to maintain your repository on multiple forges 210simultaneously, for example, keeping your primary repository 211on GitHub while mirroring to Tangled for backup or 212redundancy, you can do so by adding multiple remotes. 213 214You can configure your local repository to push to both 215Tangled and, say, GitHub. You may already have the following 216setup: 217 218``` 219$ git remote -v 220origin git@github.com:username/my-project (fetch) 221origin git@github.com:username/my-project (push) 222``` 223 224Now add Tangled as an additional push URL to the same 225remote: 226 227```bash 228git remote set-url --add --push origin git@tangled.org:user.tngl.sh/my-project 229``` 230 231You also need to re-add the original URL as a push 232destination (Git replaces the push URL when you use `--add` 233the first time): 234 235```bash 236git remote set-url --add --push origin git@github.com:username/my-project 237``` 238 239Verify your configuration: 240 241``` 242$ git remote -v 243origin git@github.com:username/repo (fetch) 244origin git@tangled.org:username/my-project (push) 245origin git@github.com:username/repo (push) 246``` 247 248Notice that there's one fetch URL (the primary remote) and 249two push URLs. Now, whenever you push, Git will 250automatically push to both remotes: 251 252```bash 253git push origin main 254``` 255 256This single command pushes your `main` branch to both GitHub 257and Tangled simultaneously. 258 259To push all branches and tags: 260 261```bash 262git push origin --all 263git push origin --tags 264``` 265 266If you prefer more control over which remote you push to, 267you can maintain separate remotes: 268 269```bash 270git remote add github git@github.com:username/my-project 271git remote add tangled git@tangled.org:username/my-project 272``` 273 274Then push to each explicitly: 275 276```bash 277git push github main 278git push tangled main 279``` 280 281# Knot self-hosting guide 282 283So you want to run your own knot server? Great! Here are a few prerequisites: 284 2851. A server of some kind (a VPS, a Raspberry Pi, etc.). Preferably running a Linux distribution of some kind. 2862. A (sub)domain name. People generally use `knot.example.com`. 2873. A valid SSL certificate for your domain. 288 289## NixOS 290 291Refer to the [knot 292module](https://tangled.org/tangled.org/core/blob/master/nix/modules/knot.nix) 293for a full list of options. Sample configurations: 294 295- [The test VM](https://tangled.org/tangled.org/core/blob/master/nix/vm.nix#L85) 296- [@pyrox.dev/nix](https://tangled.org/pyrox.dev/nix/blob/d19571cc1b5fe01035e1e6951ec8cf8a476b4dee/hosts/marvin/services/tangled.nix#L15-25) 297 298## Docker 299 300Refer to 301[@tangled.org/knot-docker](https://tangled.org/@tangled.org/knot-docker). 302Note that this is community maintained. 303 304## Manual setup 305 306First, clone this repository: 307 308``` 309git clone https://tangled.org/@tangled.org/core 310``` 311 312Then, build the `knot` CLI. This is the knot administration 313and operation tool. For the purpose of this guide, we're 314only concerned with these subcommands: 315 316- `knot server`: the main knot server process, typically 317 run as a supervised service 318- `knot guard`: handles role-based access control for git 319 over SSH (you'll never have to run this yourself) 320- `knot keys`: fetches SSH keys associated with your knot; 321 we'll use this to generate the SSH 322 `AuthorizedKeysCommand` 323 324``` 325cd core 326export CGO_ENABLED=1 327go build -o knot ./cmd/knot 328``` 329 330Next, move the `knot` binary to a location owned by `root` -- 331`/usr/local/bin/` is a good choice. Make sure the binary itself is also owned by `root`: 332 333``` 334sudo mv knot /usr/local/bin/knot 335sudo chown root:root /usr/local/bin/knot 336``` 337 338This is necessary because SSH `AuthorizedKeysCommand` requires [really 339specific permissions](https://stackoverflow.com/a/27638306). The 340`AuthorizedKeysCommand` specifies a command that is run by `sshd` to 341retrieve a user's public SSH keys dynamically for authentication. Let's 342set that up. 343 344``` 345sudo tee /etc/ssh/sshd_config.d/authorized_keys_command.conf <<EOF 346Match User git 347 AuthorizedKeysCommand /usr/local/bin/knot keys -o authorized-keys 348 AuthorizedKeysCommandUser nobody 349EOF 350``` 351 352Then, reload `sshd`: 353 354``` 355sudo systemctl reload ssh 356``` 357 358Next, create the `git` user. We'll use the `git` user's home directory 359to store repositories: 360 361``` 362sudo adduser git 363``` 364 365Create `/home/git/.knot.env` with the following, updating the values as 366necessary. The `KNOT_SERVER_OWNER` should be set to your 367DID, you can find your DID in the [Settings](https://tangled.sh/settings) page. 368 369``` 370KNOT_REPO_SCAN_PATH=/home/git 371KNOT_SERVER_HOSTNAME=knot.example.com 372APPVIEW_ENDPOINT=https://tangled.org 373KNOT_SERVER_OWNER=did:plc:foobar 374KNOT_SERVER_INTERNAL_LISTEN_ADDR=127.0.0.1:5444 375KNOT_SERVER_LISTEN_ADDR=127.0.0.1:5555 376``` 377 378If you run a Linux distribution that uses systemd, you can 379use the provided service file to run the server. Copy 380[`knotserver.service`](https://tangled.org/tangled.org/core/blob/master/systemd/knotserver.service) 381to `/etc/systemd/system/`. Then, run: 382 383``` 384systemctl enable knotserver 385systemctl start knotserver 386``` 387 388The last step is to configure a reverse proxy like Nginx or Caddy to front your 389knot. Here's an example configuration for Nginx: 390 391``` 392server { 393 listen 80; 394 listen [::]:80; 395 server_name knot.example.com; 396 397 location / { 398 proxy_pass http://localhost:5555; 399 proxy_set_header Host $host; 400 proxy_set_header X-Real-IP $remote_addr; 401 proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; 402 proxy_set_header X-Forwarded-Proto $scheme; 403 } 404 405 # wss endpoint for git events 406 location /events { 407 proxy_set_header X-Forwarded-For $remote_addr; 408 proxy_set_header Host $http_host; 409 proxy_set_header Upgrade websocket; 410 proxy_set_header Connection Upgrade; 411 proxy_pass http://localhost:5555; 412 } 413 # additional config for SSL/TLS go here. 414} 415 416``` 417 418Remember to use Let's Encrypt or similar to procure a certificate for your 419knot domain. 420 421You should now have a running knot server! You can finalize 422your registration by hitting the `verify` button on the 423[/settings/knots](https://tangled.org/settings/knots) page. This simply creates 424a record on your PDS to announce the existence of the knot. 425 426### Custom paths 427 428(This section applies to manual setup only. Docker users should edit the mounts 429in `docker-compose.yml` instead.) 430 431Right now, the database and repositories of your knot lives in `/home/git`. You 432can move these paths if you'd like to store them in another folder. Be careful 433when adjusting these paths: 434 435- Stop your knot when moving data (e.g. `systemctl stop knotserver`) to prevent 436 any possible side effects. Remember to restart it once you're done. 437- Make backups before moving in case something goes wrong. 438- Make sure the `git` user can read and write from the new paths. 439 440#### Database 441 442As an example, let's say the current database is at `/home/git/knotserver.db`, 443and we want to move it to `/home/git/database/knotserver.db`. 444 445Copy the current database to the new location. Make sure to copy the `.db-shm` 446and `.db-wal` files if they exist. 447 448``` 449mkdir /home/git/database 450cp /home/git/knotserver.db* /home/git/database 451``` 452 453In the environment (e.g. `/home/git/.knot.env`), set `KNOT_SERVER_DB_PATH` to 454the new file path (_not_ the directory): 455 456``` 457KNOT_SERVER_DB_PATH=/home/git/database/knotserver.db 458``` 459 460#### Repositories 461 462As an example, let's say the repositories are currently in `/home/git`, and we 463want to move them into `/home/git/repositories`. 464 465Create the new folder, then move the existing repositories (if there are any): 466 467``` 468mkdir /home/git/repositories 469# move all DIDs into the new folder; these will vary for you! 470mv /home/git/did:plc:wshs7t2adsemcrrd4snkeqli /home/git/repositories 471``` 472 473In the environment (e.g. `/home/git/.knot.env`), update `KNOT_REPO_SCAN_PATH` 474to the new directory: 475 476``` 477KNOT_REPO_SCAN_PATH=/home/git/repositories 478``` 479 480Similarly, update your `sshd` `AuthorizedKeysCommand` to use the updated 481repository path: 482 483``` 484sudo tee /etc/ssh/sshd_config.d/authorized_keys_command.conf <<EOF 485Match User git 486 AuthorizedKeysCommand /usr/local/bin/knot keys -o authorized-keys -git-dir /home/git/repositories 487 AuthorizedKeysCommandUser nobody 488EOF 489``` 490 491Make sure to restart your SSH server! 492 493#### MOTD (message of the day) 494 495To configure the MOTD used ("Welcome to this knot!" by default), edit the 496`/home/git/motd` file: 497 498``` 499printf "Hi from this knot!\n" > /home/git/motd 500``` 501 502Note that you should add a newline at the end if setting a non-empty message 503since the knot won't do this for you. 504 505## Troubleshooting 506 507If you run your own knot, you may run into some of these 508common issues. You can always join the 509[IRC](https://web.libera.chat/#tangled) or 510[Discord](https://chat.tangled.org/) if this section does 511not help. 512 513### Unable to push 514 515If you are unable to push to your knot or repository: 516 5171. First, ensure that you have added your SSH public key to 518 your account 5192. Check to see that your knot has synced the key by running 520 `knot keys` 5213. Check to see if git is supplying the correct private key 522 when pushing: `GIT_SSH_COMMAND="ssh -v" git push ...` 5234. Check to see if `sshd` on the knot is rejecting the push 524 for some reason: `journalctl -xeu ssh` (or `sshd`, 525 depending on your machine). These logs are unavailable if 526 using docker. 5275. Check to see if the knot itself is rejecting the push, 528 depending on your setup, the logs might be in one of the 529 following paths: 530 - `/tmp/knotguard.log` 531 - `/home/git/log` 532 - `/home/git/guard.log` 533 534# Spindles 535 536## Pipelines 537 538Spindle workflows allow you to write CI/CD pipelines in a 539simple format. They're located in the `.tangled/workflows` 540directory at the root of your repository, and are defined 541using YAML. 542 543The fields are: 544 545- [Trigger](#trigger): A **required** field that defines 546 when a workflow should be triggered. 547- [Engine](#engine): A **required** field that defines which 548 engine a workflow should run on. 549- [Clone options](#clone-options): An **optional** field 550 that defines how the repository should be cloned. 551- [Dependencies](#dependencies): An **optional** field that 552 allows you to list dependencies you may need. 553- [Environment](#environment): An **optional** field that 554 allows you to define environment variables. 555- [Steps](#steps): An **optional** field that allows you to 556 define what steps should run in the workflow. 557 558### Trigger 559 560The first thing to add to a workflow is the trigger, which 561defines when a workflow runs. This is defined using a `when` 562field, which takes in a list of conditions. Each condition 563has the following fields: 564 565- `event`: This is a **required** field that defines when 566 your workflow should run. It's a list that can take one or 567 more of the following values: 568 - `push`: The workflow should run every time a commit is 569 pushed to the repository. 570 - `pull_request`: The workflow should run every time a 571 pull request is made or updated. 572 - `manual`: The workflow can be triggered manually. 573- `branch`: Defines which branches the workflow should run 574 for. If used with the `push` event, commits to the 575 branch(es) listed here will trigger the workflow. If used 576 with the `pull_request` event, updates to pull requests 577 targeting the branch(es) listed here will trigger the 578 workflow. This field has no effect with the `manual` 579 event. Supports glob patterns using `*` and `**` (e.g., 580 `main`, `develop`, `release-*`). Either `branch` or `tag` 581 (or both) must be specified for `push` events. 582- `tag`: Defines which tags the workflow should run for. 583 Only used with the `push` event - when tags matching the 584 pattern(s) listed here are pushed, the workflow will 585 trigger. This field has no effect with `pull_request` or 586 `manual` events. Supports glob patterns using `*` and `**` 587 (e.g., `v*`, `v1.*`, `release-**`). Either `branch` or 588 `tag` (or both) must be specified for `push` events. 589 590For example, if you'd like to define a workflow that runs 591when commits are pushed to the `main` and `develop` 592branches, or when pull requests that target the `main` 593branch are updated, or manually, you can do so with: 594 595```yaml 596when: 597 - event: ["push", "manual"] 598 branch: ["main", "develop"] 599 - event: ["pull_request"] 600 branch: ["main"] 601``` 602 603You can also trigger workflows on tag pushes. For instance, 604to run a deployment workflow when tags matching `v*` are 605pushed: 606 607```yaml 608when: 609 - event: ["push"] 610 tag: ["v*"] 611``` 612 613You can even combine branch and tag patterns in a single 614constraint (the workflow triggers if either matches): 615 616```yaml 617when: 618 - event: ["push"] 619 branch: ["main", "release-*"] 620 tag: ["v*", "stable"] 621``` 622 623### Engine 624 625Next is the engine on which the workflow should run, defined 626using the **required** `engine` field. The currently 627supported engines are: 628 629- `nixery`: This uses an instance of 630 [Nixery](https://nixery.dev) to run steps, which allows 631 you to add [dependencies](#dependencies) from 632 Nixpkgs (https://github.com/NixOS/nixpkgs). You can 633 search for packages on https://search.nixos.org, and 634 there's a pretty good chance the package(s) you're looking 635 for will be there. 636 637Example: 638 639```yaml 640engine: "nixery" 641``` 642 643### Clone options 644 645When a workflow starts, the first step is to clone the 646repository. You can customize this behavior using the 647**optional** `clone` field. It has the following fields: 648 649- `skip`: Setting this to `true` will skip cloning the 650 repository. This can be useful if your workflow is doing 651 something that doesn't require anything from the 652 repository itself. This is `false` by default. 653- `depth`: This sets the number of commits, or the "clone 654 depth", to fetch from the repository. For example, if you 655 set this to 2, the last 2 commits will be fetched. By 656 default, the depth is set to 1, meaning only the most 657 recent commit will be fetched, which is the commit that 658 triggered the workflow. 659- `submodules`: If you use Git submodules 660 (https://git-scm.com/book/en/v2/Git-Tools-Submodules) 661 in your repository, setting this field to `true` will 662 recursively fetch all submodules. This is `false` by 663 default. 664 665The default settings are: 666 667```yaml 668clone: 669 skip: false 670 depth: 1 671 submodules: false 672``` 673 674### Dependencies 675 676Usually when you're running a workflow, you'll need 677additional dependencies. The `dependencies` field lets you 678define which dependencies to get, and from where. It's a 679key-value map, with the key being the registry to fetch 680dependencies from, and the value being the list of 681dependencies to fetch. 682 683The registry URL syntax can be found [on the nix 684manual](https://nix.dev/manual/nix/2.18/command-ref/new-cli/nix3-registry-add). 685 686Say you want to fetch Node.js and Go from `nixpkgs`, and a 687package called `my_pkg` you've made from your own registry 688at your repository at 689`https://tangled.org/@example.com/my_pkg`. You can define 690those dependencies like so: 691 692```yaml 693dependencies: 694 # nixpkgs 695 nixpkgs: 696 - nodejs 697 - go 698 # unstable 699 nixpkgs/nixpkgs-unstable: 700 - bun 701 # custom registry 702 git+https://tangled.org/@example.com/my_pkg: 703 - my_pkg 704``` 705 706Now these dependencies are available to use in your 707workflow! 708 709### Environment 710 711The `environment` field allows you define environment 712variables that will be available throughout the entire 713workflow. **Do not put secrets here, these environment 714variables are visible to anyone viewing the repository. You 715can add secrets for pipelines in your repository's 716settings.** 717 718Example: 719 720```yaml 721environment: 722 GOOS: "linux" 723 GOARCH: "arm64" 724 NODE_ENV: "production" 725 MY_ENV_VAR: "MY_ENV_VALUE" 726``` 727 728By default, the following environment variables set: 729 730- `CI` - Always set to `true` to indicate a CI environment 731- `TANGLED_PIPELINE_ID` - The AT URI of the current pipeline 732- `TANGLED_REPO_KNOT` - The repository's knot hostname 733- `TANGLED_REPO_DID` - The DID of the repository owner 734- `TANGLED_REPO_NAME` - The name of the repository 735- `TANGLED_REPO_DEFAULT_BRANCH` - The default branch of the 736 repository 737- `TANGLED_REPO_URL` - The full URL to the repository 738 739These variables are only available when the pipeline is 740triggered by a push: 741 742- `TANGLED_REF` - The full git reference (e.g., 743 `refs/heads/main` or `refs/tags/v1.0.0`) 744- `TANGLED_REF_NAME` - The short name of the reference 745 (e.g., `main` or `v1.0.0`) 746- `TANGLED_REF_TYPE` - The type of reference, either 747 `branch` or `tag` 748- `TANGLED_SHA` - The commit SHA that triggered the pipeline 749- `TANGLED_COMMIT_SHA` - Alias for `TANGLED_SHA` 750 751These variables are only available when the pipeline is 752triggered by a pull request: 753 754- `TANGLED_PR_SOURCE_BRANCH` - The source branch of the pull 755 request 756- `TANGLED_PR_TARGET_BRANCH` - The target branch of the pull 757 request 758- `TANGLED_PR_SOURCE_SHA` - The commit SHA of the source 759 branch 760 761### Steps 762 763The `steps` field allows you to define what steps should run 764in the workflow. It's a list of step objects, each with the 765following fields: 766 767- `name`: This field allows you to give your step a name. 768 This name is visible in your workflow runs, and is used to 769 describe what the step is doing. 770- `command`: This field allows you to define a command to 771 run in that step. The step is run in a Bash shell, and the 772 logs from the command will be visible in the pipelines 773 page on the Tangled website. The 774 [dependencies](#dependencies) you added will be available 775 to use here. 776- `environment`: Similar to the global 777 [environment](#environment) config, this **optional** 778 field is a key-value map that allows you to set 779 environment variables for the step. **Do not put secrets 780 here, these environment variables are visible to anyone 781 viewing the repository. You can add secrets for pipelines 782 in your repository's settings.** 783 784Example: 785 786```yaml 787steps: 788 - name: "Build backend" 789 command: "go build" 790 environment: 791 GOOS: "darwin" 792 GOARCH: "arm64" 793 - name: "Build frontend" 794 command: "npm run build" 795 environment: 796 NODE_ENV: "production" 797``` 798 799### Complete workflow 800 801```yaml 802# .tangled/workflows/build.yml 803 804when: 805 - event: ["push", "manual"] 806 branch: ["main", "develop"] 807 - event: ["pull_request"] 808 branch: ["main"] 809 810engine: "nixery" 811 812# using the default values 813clone: 814 skip: false 815 depth: 1 816 submodules: false 817 818dependencies: 819 # nixpkgs 820 nixpkgs: 821 - nodejs 822 - go 823 # custom registry 824 git+https://tangled.org/@example.com/my_pkg: 825 - my_pkg 826 827environment: 828 GOOS: "linux" 829 GOARCH: "arm64" 830 NODE_ENV: "production" 831 MY_ENV_VAR: "MY_ENV_VALUE" 832 833steps: 834 - name: "Build backend" 835 command: "go build" 836 environment: 837 GOOS: "darwin" 838 GOARCH: "arm64" 839 - name: "Build frontend" 840 command: "npm run build" 841 environment: 842 NODE_ENV: "production" 843``` 844 845If you want another example of a workflow, you can look at 846the one [Tangled uses to build the 847project](https://tangled.org/@tangled.org/core/blob/master/.tangled/workflows/build.yml). 848 849## Self-hosting guide 850 851### Prerequisites 852 853- Go 854- Docker (the only supported backend currently) 855 856### Configuration 857 858Spindle is configured using environment variables. The following environment variables are available: 859 860- `SPINDLE_SERVER_LISTEN_ADDR`: The address the server listens on (default: `"0.0.0.0:6555"`). 861- `SPINDLE_SERVER_DB_PATH`: The path to the SQLite database file (default: `"spindle.db"`). 862- `SPINDLE_SERVER_HOSTNAME`: The hostname of the server (required). 863- `SPINDLE_SERVER_JETSTREAM_ENDPOINT`: The endpoint of the Jetstream server (default: `"wss://jetstream1.us-west.bsky.network/subscribe"`). 864- `SPINDLE_SERVER_DEV`: A boolean indicating whether the server is running in development mode (default: `false`). 865- `SPINDLE_SERVER_OWNER`: The DID of the owner (required). 866- `SPINDLE_PIPELINES_NIXERY`: The Nixery URL (default: `"nixery.tangled.sh"`). 867- `SPINDLE_PIPELINES_WORKFLOW_TIMEOUT`: The default workflow timeout (default: `"5m"`). 868- `SPINDLE_PIPELINES_LOG_DIR`: The directory to store workflow logs (default: `"/var/log/spindle"`). 869 870### Running spindle 871 8721. **Set the environment variables.** For example: 873 874 ```shell 875 export SPINDLE_SERVER_HOSTNAME="your-hostname" 876 export SPINDLE_SERVER_OWNER="your-did" 877 ``` 878 8792. **Build the Spindle binary.** 880 881 ```shell 882 cd core 883 go mod download 884 go build -o cmd/spindle/spindle cmd/spindle/main.go 885 ``` 886 8873. **Create the log directory.** 888 889 ```shell 890 sudo mkdir -p /var/log/spindle 891 sudo chown $USER:$USER -R /var/log/spindle 892 ``` 893 8944. **Run the Spindle binary.** 895 896 ```shell 897 ./cmd/spindle/spindle 898 ``` 899 900Spindle will now start, connect to the Jetstream server, and begin processing pipelines. 901 902## Architecture 903 904Spindle is a small CI runner service. Here's a high-level overview of how it operates: 905 906- Listens for [`sh.tangled.spindle.member`](/lexicons/spindle/member.json) and 907 [`sh.tangled.repo`](/lexicons/repo.json) records on the Jetstream. 908- When a new repo record comes through (typically when you add a spindle to a 909 repo from the settings), spindle then resolves the underlying knot and 910 subscribes to repo events (see: 911 [`sh.tangled.pipeline`](/lexicons/pipeline.json)). 912- The spindle engine then handles execution of the pipeline, with results and 913 logs beamed on the spindle event stream over WebSocket 914 915### The engine 916 917At present, the only supported backend is Docker (and Podman, if Docker 918compatibility is enabled, so that `/run/docker.sock` is created). spindle 919executes each step in the pipeline in a fresh container, with state persisted 920across steps within the `/tangled/workspace` directory. 921 922The base image for the container is constructed on the fly using 923[Nixery](https://nixery.dev), which is handy for caching layers for frequently 924used packages. 925 926The pipeline manifest is [specified here](https://docs.tangled.org/spindles.html#pipelines). 927 928## Secrets with openbao 929 930This document covers setting up spindle to use OpenBao for secrets 931management via OpenBao Proxy instead of the default SQLite backend. 932 933### Overview 934 935Spindle now uses OpenBao Proxy for secrets management. The proxy handles 936authentication automatically using AppRole credentials, while spindle 937connects to the local proxy instead of directly to the OpenBao server. 938 939This approach provides better security, automatic token renewal, and 940simplified application code. 941 942### Installation 943 944Install OpenBao from Nixpkgs: 945 946```bash 947nix shell nixpkgs#openbao # for a local server 948``` 949 950### Setup 951 952The setup process can is documented for both local development and production. 953 954#### Local development 955 956Start OpenBao in dev mode: 957 958```bash 959bao server -dev -dev-root-token-id="root" -dev-listen-address=127.0.0.1:8201 960``` 961 962This starts OpenBao on `http://localhost:8201` with a root token. 963 964Set up environment for bao CLI: 965 966```bash 967export BAO_ADDR=http://localhost:8200 968export BAO_TOKEN=root 969``` 970 971#### Production 972 973You would typically use a systemd service with a 974configuration file. Refer to 975[@tangled.org/infra](https://tangled.org/@tangled.org/infra) 976for how this can be achieved using Nix. 977 978Then, initialize the bao server: 979 980```bash 981bao operator init -key-shares=1 -key-threshold=1 982``` 983 984This will print out an unseal key and a root key. Save them 985somewhere (like a password manager). Then unseal the vault 986to begin setting it up: 987 988```bash 989bao operator unseal <unseal_key> 990``` 991 992All steps below remain the same across both dev and 993production setups. 994 995#### Configure openbao server 996 997Create the spindle KV mount: 998 999```bash 1000bao secrets enable -path=spindle -version=2 kv 1001``` 1002 1003Set up AppRole authentication and policy: 1004 1005Create a policy file `spindle-policy.hcl`: 1006 1007```hcl 1008# Full access to spindle KV v2 data 1009path "spindle/data/*" { 1010 capabilities = ["create", "read", "update", "delete"] 1011} 1012 1013# Access to metadata for listing and management 1014path "spindle/metadata/*" { 1015 capabilities = ["list", "read", "delete", "update"] 1016} 1017 1018# Allow listing at root level 1019path "spindle/" { 1020 capabilities = ["list"] 1021} 1022 1023# Required for connection testing and health checks 1024path "auth/token/lookup-self" { 1025 capabilities = ["read"] 1026} 1027``` 1028 1029Apply the policy and create an AppRole: 1030 1031```bash 1032bao policy write spindle-policy spindle-policy.hcl 1033bao auth enable approle 1034bao write auth/approle/role/spindle \ 1035 token_policies="spindle-policy" \ 1036 token_ttl=1h \ 1037 token_max_ttl=4h \ 1038 bind_secret_id=true \ 1039 secret_id_ttl=0 \ 1040 secret_id_num_uses=0 1041``` 1042 1043Get the credentials: 1044 1045```bash 1046# Get role ID (static) 1047ROLE_ID=$(bao read -field=role_id auth/approle/role/spindle/role-id) 1048 1049# Generate secret ID 1050SECRET_ID=$(bao write -f -field=secret_id auth/approle/role/spindle/secret-id) 1051 1052echo "Role ID: $ROLE_ID" 1053echo "Secret ID: $SECRET_ID" 1054``` 1055 1056#### Create proxy configuration 1057 1058Create the credential files: 1059 1060```bash 1061# Create directory for OpenBao files 1062mkdir -p /tmp/openbao 1063 1064# Save credentials 1065echo "$ROLE_ID" > /tmp/openbao/role-id 1066echo "$SECRET_ID" > /tmp/openbao/secret-id 1067chmod 600 /tmp/openbao/role-id /tmp/openbao/secret-id 1068``` 1069 1070Create a proxy configuration file `/tmp/openbao/proxy.hcl`: 1071 1072```hcl 1073# OpenBao server connection 1074vault { 1075 address = "http://localhost:8200" 1076} 1077 1078# Auto-Auth using AppRole 1079auto_auth { 1080 method "approle" { 1081 mount_path = "auth/approle" 1082 config = { 1083 role_id_file_path = "/tmp/openbao/role-id" 1084 secret_id_file_path = "/tmp/openbao/secret-id" 1085 } 1086 } 1087 1088 # Optional: write token to file for debugging 1089 sink "file" { 1090 config = { 1091 path = "/tmp/openbao/token" 1092 mode = 0640 1093 } 1094 } 1095} 1096 1097# Proxy listener for spindle 1098listener "tcp" { 1099 address = "127.0.0.1:8201" 1100 tls_disable = true 1101} 1102 1103# Enable API proxy with auto-auth token 1104api_proxy { 1105 use_auto_auth_token = true 1106} 1107 1108# Enable response caching 1109cache { 1110 use_auto_auth_token = true 1111} 1112 1113# Logging 1114log_level = "info" 1115``` 1116 1117#### Start the proxy 1118 1119Start OpenBao Proxy: 1120 1121```bash 1122bao proxy -config=/tmp/openbao/proxy.hcl 1123``` 1124 1125The proxy will authenticate with OpenBao and start listening on 1126`127.0.0.1:8201`. 1127 1128#### Configure spindle 1129 1130Set these environment variables for spindle: 1131 1132```bash 1133export SPINDLE_SERVER_SECRETS_PROVIDER=openbao 1134export SPINDLE_SERVER_SECRETS_OPENBAO_PROXY_ADDR=http://127.0.0.1:8201 1135export SPINDLE_SERVER_SECRETS_OPENBAO_MOUNT=spindle 1136``` 1137 1138On startup, spindle will now connect to the local proxy, 1139which handles all authentication automatically. 1140 1141### Production setup for proxy 1142 1143For production, you'll want to run the proxy as a service: 1144 1145Place your production configuration in 1146`/etc/openbao/proxy.hcl` with proper TLS settings for the 1147vault connection. 1148 1149### Verifying setup 1150 1151Test the proxy directly: 1152 1153```bash 1154# Check proxy health 1155curl -H "X-Vault-Request: true" http://127.0.0.1:8201/v1/sys/health 1156 1157# Test token lookup through proxy 1158curl -H "X-Vault-Request: true" http://127.0.0.1:8201/v1/auth/token/lookup-self 1159``` 1160 1161Test OpenBao operations through the server: 1162 1163```bash 1164# List all secrets 1165bao kv list spindle/ 1166 1167# Add a test secret via the spindle API, then check it exists 1168bao kv list spindle/repos/ 1169 1170# Get a specific secret 1171bao kv get spindle/repos/your_repo_path/SECRET_NAME 1172``` 1173 1174### How it works 1175 1176- Spindle connects to OpenBao Proxy on localhost (typically 1177 port 8200 or 8201) 1178- The proxy authenticates with OpenBao using AppRole 1179 credentials 1180- All spindle requests go through the proxy, which injects 1181 authentication tokens 1182- Secrets are stored at 1183 `spindle/repos/{sanitized_repo_path}/{secret_key}` 1184- Repository paths like `did:plc:alice/myrepo` become 1185 `did_plc_alice_myrepo` 1186- The proxy handles all token renewal automatically 1187- Spindle no longer manages tokens or authentication 1188 directly 1189 1190### Troubleshooting 1191 1192**Connection refused**: Check that the OpenBao Proxy is 1193running and listening on the configured address. 1194 1195**403 errors**: Verify the AppRole credentials are correct 1196and the policy has the necessary permissions. 1197 1198**404 route errors**: The spindle KV mount probably doesn't 1199exist—run the mount creation step again. 1200 1201**Proxy authentication failures**: Check the proxy logs and 1202verify the role-id and secret-id files are readable and 1203contain valid credentials. 1204 1205**Secret not found after writing**: This can indicate policy 1206permission issues. Verify the policy includes both 1207`spindle/data/*` and `spindle/metadata/*` paths with 1208appropriate capabilities. 1209 1210Check proxy logs: 1211 1212```bash 1213# If running as systemd service 1214journalctl -u openbao-proxy -f 1215 1216# If running directly, check the console output 1217``` 1218 1219Test AppRole authentication manually: 1220 1221```bash 1222bao write auth/approle/login \ 1223 role_id="$(cat /tmp/openbao/role-id)" \ 1224 secret_id="$(cat /tmp/openbao/secret-id)" 1225``` 1226 1227# Webhooks 1228 1229Webhooks allow you to receive HTTP POST notifications when events occur in your repositories. This enables you to integrate Tangled with external services, trigger CI/CD pipelines, send notifications, or automate workflows. 1230 1231## Overview 1232 1233Webhooks send HTTP POST requests to URLs you configure whenever specific events happen. Currently, Tangled supports push events, with more event types coming soon. 1234 1235## Configuring webhooks 1236 1237To set up a webhook for your repository: 1238 12391. Navigate to your repository settings 12402. Click the "hooks" tab 12413. Click "add webhook" 12424. Configure your webhook: 1243 - **Payload URL**: The endpoint that will receive the webhook POST requests 1244 - **Secret**: An optional secret key for verifying webhook authenticity (auto-generated if left blank) 1245 - **Events**: Select which events trigger the webhook (currently only push events) 1246 - **Active**: Toggle whether the webhook is enabled 1247 1248## Webhook payload 1249 1250### Push 1251 1252When a push event occurs, Tangled sends a POST request with a JSON payload of the format: 1253 1254```json 1255{ 1256 "after": "7b320e5cbee2734071e4310c1d9ae401d8f6cab5", 1257 "before": "c04ddf64eddc90e4e2a9846ba3b43e67a0e2865e", 1258 "pusher": { 1259 "did": "did:plc:hwevmowznbiukdf6uk5dwrrq" 1260 }, 1261 "ref": "refs/heads/main", 1262 "repository": { 1263 "clone_url": "https://tangled.org/did:plc:hwevmowznbiukdf6uk5dwrrq/some-repo", 1264 "created_at": "2025-09-15T08:57:23Z", 1265 "description": "an example repository", 1266 "fork": false, 1267 "full_name": "did:plc:hwevmowznbiukdf6uk5dwrrq/some-repo", 1268 "html_url": "https://tangled.org/did:plc:hwevmowznbiukdf6uk5dwrrq/some-repo", 1269 "name": "some-repo", 1270 "open_issues_count": 5, 1271 "owner": { 1272 "did": "did:plc:hwevmowznbiukdf6uk5dwrrq" 1273 }, 1274 "ssh_url": "ssh://git@tangled.org/did:plc:hwevmowznbiukdf6uk5dwrrq/some-repo", 1275 "stars_count": 1, 1276 "updated_at": "2025-09-15T08:57:23Z" 1277 } 1278} 1279``` 1280 1281## HTTP headers 1282 1283Each webhook request includes the following headers: 1284 1285- `Content-Type: application/json` 1286- `User-Agent: Tangled-Hook/<short-sha>` — User agent with short SHA of the commit 1287- `X-Tangled-Event: push` — The event type 1288- `X-Tangled-Hook-ID: <webhook-id>` — The webhook ID 1289- `X-Tangled-Delivery: <uuid>` — Unique delivery ID 1290- `X-Tangled-Signature-256: sha256=<hmac>` — HMAC-SHA256 signature (if secret configured) 1291 1292## Verifying webhook signatures 1293 1294If you configured a secret, you should verify the webhook signature to ensure requests are authentic. For example, in Go: 1295 1296```go 1297package main 1298 1299import ( 1300 "crypto/hmac" 1301 "crypto/sha256" 1302 "encoding/hex" 1303 "io" 1304 "net/http" 1305 "strings" 1306) 1307 1308func verifySignature(payload []byte, signatureHeader, secret string) bool { 1309 // Remove 'sha256=' prefix from signature header 1310 signature := strings.TrimPrefix(signatureHeader, "sha256=") 1311 1312 // Compute expected signature 1313 mac := hmac.New(sha256.New, []byte(secret)) 1314 mac.Write(payload) 1315 expected := hex.EncodeToString(mac.Sum(nil)) 1316 1317 // Use constant-time comparison to prevent timing attacks 1318 return hmac.Equal([]byte(signature), []byte(expected)) 1319} 1320 1321func webhookHandler(w http.ResponseWriter, r *http.Request) { 1322 // Read the request body 1323 payload, err := io.ReadAll(r.Body) 1324 if err != nil { 1325 http.Error(w, "Bad request", http.StatusBadRequest) 1326 return 1327 } 1328 1329 // Get signature from header 1330 signatureHeader := r.Header.Get("X-Tangled-Signature-256") 1331 1332 // Verify signature 1333 if signatureHeader != "" && verifySignature(payload, signatureHeader, yourSecret) { 1334 // Webhook is authentic, process it 1335 processWebhook(payload) 1336 w.WriteHeader(http.StatusOK) 1337 } else { 1338 http.Error(w, "Invalid signature", http.StatusUnauthorized) 1339 } 1340} 1341``` 1342 1343## Delivery retries 1344 1345Webhooks are automatically retried on failure: 1346 1347- **3 total attempts** (1 initial + 2 retries) 1348- **Exponential backoff** starting at 1 second, max 10 seconds 1349- **Retried on**: 1350 - Network errors 1351 - HTTP 5xx server errors 1352- **Not retried on**: 1353 - HTTP 4xx client errors (bad request, unauthorized, etc.) 1354 1355### Timeouts 1356 1357Webhook requests timeout after 30 seconds. If your endpoint needs more time: 1358 13591. Respond with 200 OK immediately 13602. Process the webhook asynchronously in the background 1361 1362## Example integrations 1363 1364### Discord notifications 1365 1366```javascript 1367app.post("/webhook", (req, res) => { 1368 const payload = req.body; 1369 1370 fetch("https://discord.com/api/webhooks/...", { 1371 method: "POST", 1372 headers: { "Content-Type": "application/json" }, 1373 body: JSON.stringify({ 1374 content: `New push to ${payload.repository.full_name}`, 1375 embeds: [ 1376 { 1377 title: `${payload.pusher.did} pushed to ${payload.ref}`, 1378 url: payload.repository.html_url, 1379 color: 0x00ff00, 1380 }, 1381 ], 1382 }), 1383 }); 1384 1385 res.status(200).send("OK"); 1386}); 1387``` 1388 1389# Migrating knots and spindles 1390 1391Sometimes, non-backwards compatible changes are made to the 1392knot/spindle XRPC APIs. If you host a knot or a spindle, you 1393will need to follow this guide to upgrade. Typically, this 1394only requires you to deploy the newest version. 1395 1396This document is laid out in reverse-chronological order. 1397Newer migration guides are listed first, and older guides 1398are further down the page. 1399 1400## Upgrading from v1.8.x 1401 1402After v1.8.2, the HTTP API for knots and spindles has been 1403deprecated and replaced with XRPC. Repositories on outdated 1404knots will not be viewable from the appview. Upgrading is 1405straightforward however. 1406 1407For knots: 1408 1409- Upgrade to the latest tag (v1.9.0 or above) 1410- Head to the [knot dashboard](https://tangled.org/settings/knots) and 1411 hit the "retry" button to verify your knot 1412 1413For spindles: 1414 1415- Upgrade to the latest tag (v1.9.0 or above) 1416- Head to the [spindle 1417 dashboard](https://tangled.org/settings/spindles) and hit the 1418 "retry" button to verify your spindle 1419 1420## Upgrading from v1.7.x 1421 1422After v1.7.0, knot secrets have been deprecated. You no 1423longer need a secret from the appview to run a knot. All 1424authorized commands to knots are managed via [Inter-Service 1425Authentication](https://atproto.com/specs/xrpc#inter-service-authentication-jwt). 1426Knots will be read-only until upgraded. 1427 1428Upgrading is quite easy, in essence: 1429 1430- `KNOT_SERVER_SECRET` is no more, you can remove this 1431 environment variable entirely 1432- `KNOT_SERVER_OWNER` is now required on boot, set this to 1433 your DID. You can find your DID in the 1434 [settings](https://tangled.org/settings) page. 1435- Restart your knot once you have replaced the environment 1436 variable 1437- Head to the [knot dashboard](https://tangled.org/settings/knots) and 1438 hit the "retry" button to verify your knot. This simply 1439 writes a `sh.tangled.knot` record to your PDS. 1440 1441If you use the nix module, simply bump the flake to the 1442latest revision, and change your config block like so: 1443 1444```diff 1445 services.tangled.knot = { 1446 enable = true; 1447 server = { 1448- secretFile = /path/to/secret; 1449+ owner = "did:plc:foo"; 1450 }; 1451 }; 1452``` 1453 1454# Hacking on Tangled 1455 1456We highly recommend [installing 1457Nix](https://nixos.org/download/) (the package manager) 1458before working on the codebase. The Nix flake provides a lot 1459of helpers to get started and most importantly, builds and 1460dev shells are entirely deterministic. 1461 1462To set up your dev environment: 1463 1464```bash 1465nix develop 1466``` 1467 1468Non-Nix users can look at the `devShell` attribute in the 1469`flake.nix` file to determine necessary dependencies. 1470 1471## Running the appview 1472 1473The Nix flake also exposes a few `app` attributes (run `nix 1474flake show` to see a full list of what the flake provides), 1475one of the apps runs the appview with the `air` 1476live-reloader: 1477 1478```bash 1479TANGLED_DEV=true nix run .#watch-appview 1480 1481# TANGLED_DB_PATH might be of interest to point to 1482# different sqlite DBs 1483 1484# in a separate shell, you can live-reload tailwind 1485nix run .#watch-tailwind 1486``` 1487 1488To authenticate with the appview, you will need Redis and 1489OAuth JWKs to be set up: 1490 1491``` 1492# OAuth JWKs should already be set up by the Nix devshell: 1493echo $TANGLED_OAUTH_CLIENT_SECRET 1494z42ty4RT1ovnTopY8B8ekz9NuziF2CuMkZ7rbRFpAR9jBqMc 1495 1496echo $TANGLED_OAUTH_CLIENT_KID 14971761667908 1498 1499# if not, you can set it up yourself: 1500goat key generate -t P-256 1501Key Type: P-256 / secp256r1 / ES256 private key 1502Secret Key (Multibase Syntax): save this securely (eg, add to password manager) 1503 z42tuPDKRfM2mz2Kv953ARen2jmrPA8S9LX9tRq4RVcUMwwL 1504Public Key (DID Key Syntax): share or publish this (eg, in DID document) 1505 did:key:zDnaeUBxtG6Xuv3ATJE4GaWeyXM3jyamJsZw3bSPpxx4bNXDR 1506 1507# the secret key from above 1508export TANGLED_OAUTH_CLIENT_SECRET="z42tuP..." 1509 1510# Run Redis in a new shell to store OAuth sessions 1511redis-server 1512``` 1513 1514## Running knots and spindles 1515 1516An end-to-end knot setup requires setting up a machine with 1517`sshd`, `AuthorizedKeysCommand`, and a Git user, which is 1518quite cumbersome. So the Nix flake provides a 1519`nixosConfiguration` to do so. 1520 1521<details> 1522 <summary><strong>macOS users will have to set up a Nix Builder first</strong></summary> 1523 1524In order to build Tangled's dev VM on macOS, you will 1525first need to set up a Linux Nix builder. The recommended 1526way to do so is to run a [`darwin.linux-builder` 1527VM](https://nixos.org/manual/nixpkgs/unstable/#sec-darwin-builder) 1528and to register it in `nix.conf` as a builder for Linux 1529with the same architecture as your Mac (`linux-aarch64` if 1530you are using Apple Silicon). 1531 1532> IMPORTANT: You must build `darwin.linux-builder` somewhere other than inside 1533> the Tangled repo so that it doesn't conflict with the other VM. For example, 1534> you can do 1535> 1536> ```shell 1537> cd $(mktemp -d buildervm.XXXXX) && nix run nixpkgs#darwin.linux-builder 1538> ``` 1539> 1540> to store the builder VM in a temporary dir. 1541> 1542> You should read and follow [all the other intructions][darwin builder vm] to 1543> avoid subtle problems. 1544 1545Alternatively, you can use any other method to set up a 1546Linux machine with Nix installed that you can `sudo ssh` 1547into (in other words, root user on your Mac has to be able 1548to ssh into the Linux machine without entering a password) 1549and that has the same architecture as your Mac. See 1550[remote builder 1551instructions](https://nix.dev/manual/nix/2.28/advanced-topics/distributed-builds.html#requirements) 1552for how to register such a builder in `nix.conf`. 1553 1554> WARNING: If you'd like to use 1555> [`nixos-lima`](https://github.com/nixos-lima/nixos-lima) or 1556> [Orbstack](https://orbstack.dev/), note that setting them up so that `sudo 1557ssh` works can be tricky. It seems to be [possible with 1558> Orbstack](https://github.com/orgs/orbstack/discussions/1669). 1559 1560</details> 1561 1562To begin, grab your DID from http://localhost:3000/settings. 1563Then, set `TANGLED_VM_KNOT_OWNER` and 1564`TANGLED_VM_SPINDLE_OWNER` to your DID. You can now start a 1565lightweight NixOS VM like so: 1566 1567```bash 1568nix run --impure .#vm 1569 1570# type `poweroff` at the shell to exit the VM 1571``` 1572 1573This starts a knot on port 6444, a spindle on port 6555 1574with `ssh` exposed on port 2222. 1575 1576Once the services are running, head to 1577http://localhost:3000/settings/knots and hit "Verify". It should 1578verify the ownership of the services instantly if everything 1579went smoothly. 1580 1581You can push repositories to this VM with this ssh config 1582block on your main machine: 1583 1584```bash 1585Host nixos-shell 1586 Hostname localhost 1587 Port 2222 1588 User git 1589 IdentityFile ~/.ssh/my_tangled_key 1590``` 1591 1592Set up a remote called `local-dev` on a git repo: 1593 1594```bash 1595git remote add local-dev git@nixos-shell:user/repo 1596git push local-dev main 1597``` 1598 1599The above VM should already be running a spindle on 1600`localhost:6555`. Head to http://localhost:3000/settings/spindles and 1601hit "Verify". You can then configure each repository to use 1602this spindle and run CI jobs. 1603 1604Of interest when debugging spindles: 1605 1606``` 1607# Service logs from journald: 1608journalctl -xeu spindle 1609 1610# CI job logs from disk: 1611ls /var/log/spindle 1612 1613# Debugging spindle database: 1614sqlite3 /var/lib/spindle/spindle.db 1615 1616# litecli has a nicer REPL interface: 1617litecli /var/lib/spindle/spindle.db 1618``` 1619 1620If for any reason you wish to disable either one of the 1621services in the VM, modify [nix/vm.nix](/nix/vm.nix) and set 1622`services.tangled.spindle.enable` (or 1623`services.tangled.knot.enable`) to `false`. 1624 1625# Contribution guide 1626 1627## Commit guidelines 1628 1629We follow a commit style similar to the Go project. Please keep commits: 1630 1631- **atomic**: each commit should represent one logical change 1632- **descriptive**: the commit message should clearly describe what the 1633 change does and why it's needed 1634 1635### Message format 1636 1637``` 1638<service/top-level directory>/<affected package/directory>: <short summary of change> 1639 1640Optional longer description can go here, if necessary. Explain what the 1641change does and why, especially if not obvious. Reference relevant 1642issues or PRs when applicable. These can be links for now since we don't 1643auto-link issues/PRs yet. 1644``` 1645 1646Here are some examples: 1647 1648``` 1649appview/state: fix token expiry check in middleware 1650 1651The previous check did not account for clock drift, leading to premature 1652token invalidation. 1653``` 1654 1655``` 1656knotserver/git/service: improve error checking in upload-pack 1657``` 1658 1659### General notes 1660 1661- PRs get merged "as-is" (fast-forward)—like applying a patch-series 1662 using `git am`. At present, there is no squashing—so please author 1663 your commits as they would appear on `master`, following the above 1664 guidelines. 1665- If there is a lot of nesting, for example "appview: 1666 pages/templates/repo/fragments: ...", these can be truncated down to 1667 just "appview: repo/fragments: ...". If the change affects a lot of 1668 subdirectories, you may abbreviate to just the top-level names, e.g. 1669 "appview: ..." or "knotserver: ...". 1670- Keep commits lowercased with no trailing period. 1671- Use the imperative mood in the summary line (e.g., "fix bug" not 1672 "fixed bug" or "fixes bug"). 1673- Try to keep the summary line under 72 characters, but we aren't too 1674 fussed about this. 1675- Follow the same formatting for PR titles if filled manually. 1676- Don't include unrelated changes in the same commit. 1677- Avoid noisy commit messages like "wip" or "final fix"—rewrite history 1678 before submitting if necessary. 1679 1680## Code formatting 1681 1682We use a variety of tools to format our code, and multiplex them with 1683[`treefmt`](https://treefmt.com). All you need to do to format your changes 1684is run `nix run .#fmt` (or just `treefmt` if you're in the devshell). 1685 1686## Proposals for bigger changes 1687 1688Small fixes like typos, minor bugs, or trivial refactors can be 1689submitted directly as PRs. 1690 1691For larger changes—especially those introducing new features, significant 1692refactoring, or altering system behavior—please open a proposal first. This 1693helps us evaluate the scope, design, and potential impact before implementation. 1694 1695Create a new issue titled: 1696 1697``` 1698proposal: <affected scope>: <summary of change> 1699``` 1700 1701In the description, explain: 1702 1703- What the change is 1704- Why it's needed 1705- How you plan to implement it (roughly) 1706- Any open questions or tradeoffs 1707 1708We'll use the issue thread to discuss and refine the idea before moving 1709forward. 1710 1711## Developer Certificate of Origin (DCO) 1712 1713We require all contributors to certify that they have the right to 1714submit the code they're contributing. To do this, we follow the 1715[Developer Certificate of Origin 1716(DCO)](https://developercertificate.org/). 1717 1718By signing your commits, you're stating that the contribution is your 1719own work, or that you have the right to submit it under the project's 1720license. This helps us keep things clean and legally sound. 1721 1722To sign your commit, just add the `-s` flag when committing: 1723 1724```sh 1725git commit -s -m "your commit message" 1726``` 1727 1728This appends a line like: 1729 1730``` 1731Signed-off-by: Your Name <your.email@example.com> 1732``` 1733 1734We won't merge commits if they aren't signed off. If you forget, you can 1735amend the last commit like this: 1736 1737```sh 1738git commit --amend -s 1739``` 1740 1741If you're submitting a PR with multiple commits, make sure each one is 1742signed. 1743 1744For [jj](https://jj-vcs.github.io/jj/latest/) users, you can run the following command 1745to make it sign off commits in the tangled repo: 1746 1747```shell 1748# Safety check, should say "No matching config key..." 1749jj config list templates.commit_trailers 1750# The command below may need to be adjusted if the command above returned something. 1751jj config set --repo templates.commit_trailers "format_signed_off_by_trailer(self)" 1752``` 1753 1754Refer to the [jujutsu 1755documentation](https://jj-vcs.github.io/jj/latest/config/#commit-trailers) 1756for more information. 1757 1758# Troubleshooting guide 1759 1760## Login issues 1761 1762Owing to the distributed nature of OAuth on AT Protocol, you 1763may run into issues with logging in. If you run a 1764self-hosted PDS: 1765 1766- You may need to ensure that your PDS is timesynced using 1767 NTP: 1768 - Enable the `ntpd` service 1769 - Run `ntpd -qg` to synchronize your clock 1770- You may need to increase the default request timeout: 1771 `NODE_OPTIONS="--network-family-autoselection-attempt-timeout=500"` 1772 1773## Empty punchcard 1774 1775For Tangled to register commits that you make across the 1776network, you need to setup one of following: 1777 1778- The committer email should be a verified email associated 1779 to your account. You can add and verify emails on the 1780 settings page. 1781- Or, the committer email should be set to your account's 1782 DID: `git config user.email "did:plc:foobar"`. You can find 1783 your account's DID on the settings page 1784 1785## Commit is not marked as verified 1786 1787Presently, Tangled only supports SSH commit signatures. 1788 1789To sign commits using an SSH key with git: 1790 1791``` 1792git config --global gpg.format ssh 1793git config --global user.signingkey ~/.ssh/tangled-key 1794``` 1795 1796To sign commits using an SSH key with jj, add this to your 1797config: 1798 1799``` 1800[signing] 1801behavior = "own" 1802backend = "ssh" 1803key = "~/.ssh/tangled-key" 1804``` 1805 1806## Self-hosted knot issues 1807 1808If you need help troubleshooting a self-hosted knot, check 1809out the [knot troubleshooting 1810guide](/knot-self-hosting-guide.html#troubleshooting).