A vibe coded tangled fork which supports pijul.
1package config
2
3import (
4 "context"
5 "fmt"
6 "net/url"
7 "strings"
8 "time"
9
10 "github.com/sethvargo/go-envconfig"
11)
12
13type CoreConfig struct {
14 CookieSecret string `env:"COOKIE_SECRET, default=00000000000000000000000000000000"`
15 DbPath string `env:"DB_PATH, default=appview.db"`
16 ListenAddr string `env:"LISTEN_ADDR, default=0.0.0.0:3000"`
17 AppviewHost string `env:"APPVIEW_HOST, default=tangled.org"`
18 AppviewName string `env:"APPVIEW_Name, default=Tangled"`
19 Dev bool `env:"DEV, default=false"`
20 DisallowedNicknamesFile string `env:"DISALLOWED_NICKNAMES_FILE"`
21
22 // temporarily, to add users to default knot and spindle
23 AppPassword string `env:"APP_PASSWORD"`
24
25 // uhhhh this is because knot1 is under icy's did
26 TmpAltAppPassword string `env:"ALT_APP_PASSWORD"`
27}
28
29func (c *CoreConfig) UseTLS() bool {
30 return !c.Dev
31}
32
33func (c *CoreConfig) BaseUrl() string {
34 if c.UseTLS() {
35 return "https://" + c.AppviewHost
36 }
37 return "http://" + c.AppviewHost
38}
39
40type OAuthConfig struct {
41 ClientSecret string `env:"CLIENT_SECRET"`
42 ClientKid string `env:"CLIENT_KID"`
43}
44
45type PlcConfig struct {
46 PLCURL string `env:"URL, default=https://plc.directory"`
47}
48
49type KnotMirrorConfig struct {
50 Url string `env:"URL, required"`
51}
52
53type JetstreamConfig struct {
54 Endpoint string `env:"ENDPOINT, default=wss://jetstream1.us-east.bsky.network/subscribe"`
55}
56
57type ConsumerConfig struct {
58 RetryInterval time.Duration `env:"RETRY_INTERVAL, default=60s"`
59 MaxRetryInterval time.Duration `env:"MAX_RETRY_INTERVAL, default=120m"`
60 ConnectionTimeout time.Duration `env:"CONNECTION_TIMEOUT, default=5s"`
61 WorkerCount int `env:"WORKER_COUNT, default=64"`
62 QueueSize int `env:"QUEUE_SIZE, default=100"`
63}
64
65type ResendConfig struct {
66 ApiKey string `env:"API_KEY"`
67 SentFrom string `env:"SENT_FROM, default=noreply@notifs.tangled.sh"`
68}
69
70type CamoConfig struct {
71 Host string `env:"HOST, default=https://camo.tangled.sh"`
72 SharedSecret string `env:"SHARED_SECRET"`
73}
74
75type AvatarConfig struct {
76 Host string `env:"HOST, default=https://avatar.tangled.sh"`
77 SharedSecret string `env:"SHARED_SECRET"`
78}
79
80type PosthogConfig struct {
81 ApiKey string `env:"API_KEY"`
82 Endpoint string `env:"ENDPOINT, default=https://eu.i.posthog.com"`
83}
84
85type RedisConfig struct {
86 Addr string `env:"ADDR, default=localhost:6379"`
87 Password string `env:"PASS"`
88 DB int `env:"DB, default=0"`
89}
90
91type PdsConfig struct {
92 Host string `env:"HOST, default=https://tngl.sh"`
93 AdminSecret string `env:"ADMIN_SECRET"`
94}
95
96func (p *PdsConfig) IsTnglShUser(pdsHost string) bool {
97 return strings.TrimRight(pdsHost, "/") == strings.TrimRight(p.Host, "/")
98}
99
100type R2Config struct {
101 AccessKeyID string `env:"ACCESS_KEY_ID"`
102 SecretAccessKey string `env:"SECRET_ACCESS_KEY"`
103 Bucket string `env:"BUCKET, default=tangled-sites"`
104}
105
106type TurnstileConfig struct {
107 SiteKey string `env:"SITE_KEY"`
108 SecretKey string `env:"SECRET_KEY"`
109}
110
111type KVConfig struct {
112 NamespaceId string `env:"NAMESPACE_ID"`
113 ApiToken string `env:"API_TOKEN"`
114}
115
116type Cloudflare struct {
117 // Legacy top-level API token. For services like Workers KV, we
118 // now use a scoped Account API token configured under the relevant
119 // sub-struct.
120 ApiToken string `env:"API_TOKEN"`
121 ZoneId string `env:"ZONE_ID"`
122 AccountId string `env:"ACCOUNT_ID"`
123
124 KV KVConfig `env:",prefix=KV_"`
125 Turnstile TurnstileConfig `env:",prefix=TURNSTILE_"`
126 R2 R2Config `env:",prefix=R2_"`
127}
128
129type SitesConfig struct {
130 Domain string `env:"DOMAIN, default=tngl.io"`
131}
132
133type LabelConfig struct {
134 DefaultLabelDefs []string `env:"DEFAULTS, default=at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/wontfix,at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/good-first-issue,at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/duplicate,at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/documentation,at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/assignee"` // delimiter=,
135 GoodFirstIssue string `env:"GFI, default=at://did:plc:wshs7t2adsemcrrd4snkeqli/sh.tangled.label.definition/good-first-issue"`
136}
137
138type BlueskyConfig struct {
139 UpdateInterval time.Duration `env:"UPDATE_INTERVAL, default=1h"`
140}
141
142func (cfg RedisConfig) ToURL() string {
143 u := &url.URL{
144 Scheme: "redis",
145 Host: cfg.Addr,
146 Path: fmt.Sprintf("/%d", cfg.DB),
147 }
148
149 if cfg.Password != "" {
150 u.User = url.UserPassword("", cfg.Password)
151 }
152
153 return u.String()
154}
155
156type Config struct {
157 Core CoreConfig `env:",prefix=TANGLED_"`
158 Jetstream JetstreamConfig `env:",prefix=TANGLED_JETSTREAM_"`
159 Knotstream ConsumerConfig `env:",prefix=TANGLED_KNOTSTREAM_"`
160 Spindlestream ConsumerConfig `env:",prefix=TANGLED_SPINDLESTREAM_"`
161 Resend ResendConfig `env:",prefix=TANGLED_RESEND_"`
162 Posthog PosthogConfig `env:",prefix=TANGLED_POSTHOG_"`
163 Camo CamoConfig `env:",prefix=TANGLED_CAMO_"`
164 Avatar AvatarConfig `env:",prefix=TANGLED_AVATAR_"`
165 OAuth OAuthConfig `env:",prefix=TANGLED_OAUTH_"`
166 Redis RedisConfig `env:",prefix=TANGLED_REDIS_"`
167 Plc PlcConfig `env:",prefix=TANGLED_PLC_"`
168 Pds PdsConfig `env:",prefix=TANGLED_PDS_"`
169 Cloudflare Cloudflare `env:",prefix=TANGLED_CLOUDFLARE_"`
170 Label LabelConfig `env:",prefix=TANGLED_LABEL_"`
171 Bluesky BlueskyConfig `env:",prefix=TANGLED_BLUESKY_"`
172 Sites SitesConfig `env:",prefix=TANGLED_SITES_"`
173 KnotMirror KnotMirrorConfig `env:",prefix=TANGLED_KNOTMIRROR_"`
174}
175
176func LoadConfig(ctx context.Context) (*Config, error) {
177 var cfg Config
178 err := envconfig.Process(ctx, &cfg)
179 if err != nil {
180 return nil, err
181 }
182
183 return &cfg, nil
184}