Enables internet connection sharing from WiFi (wlo1) to Ethernet (enp34s0) to provide network access for the 3D printer. Includes DHCP server with static IP reservation, DNS forwarding through Pi-hole, and NAT configuration.
233 lines
8.6 KiB
Markdown
233 lines
8.6 KiB
Markdown
# CLAUDE.md
|
|
|
|
This file provides guidance to Claude Code (claude.ai/code) when working with code in this repository.
|
|
|
|
## Build and Deployment Commands
|
|
|
|
### Building Configurations
|
|
```bash
|
|
# Build a NixOS configuration (creates ./result symlink)
|
|
just build <hostname>
|
|
# or
|
|
nixos-rebuild build --flake .#<hostname>
|
|
|
|
# Build home-manager configuration
|
|
home-manager build --flake .#sajenim@<hostname>
|
|
```
|
|
|
|
### Deploying Changes
|
|
```bash
|
|
# Apply NixOS configuration locally (requires sudo)
|
|
just switch <hostname>
|
|
# or
|
|
sudo nixos-rebuild switch --flake .#<hostname>
|
|
|
|
# Deploy to remote host
|
|
just deploy <hostname>
|
|
# or
|
|
nixos-rebuild switch --flake .#<hostname> --target-host <hostname> --use-remote-sudo
|
|
|
|
# Apply home-manager configuration
|
|
home-manager switch --flake .#sajenim@<hostname>
|
|
```
|
|
|
|
### Code Quality
|
|
```bash
|
|
# Format all Nix files using alejandra
|
|
nix fmt
|
|
|
|
# Check flake and evaluate all configurations
|
|
nix flake check
|
|
```
|
|
|
|
### Secret Management
|
|
```bash
|
|
# Rekey secrets using YubiKey (after adding/modifying secrets)
|
|
agenix-rekey edit <secret-name>
|
|
agenix-rekey rekey
|
|
```
|
|
|
|
## Architecture Overview
|
|
|
|
### Flake Structure
|
|
This is a NixOS flake-based configuration managing two hosts:
|
|
- **fuchsia**: Desktop workstation (gaming, development, XMonad)
|
|
- **viridian**: Server (multimedia, services, containers)
|
|
|
|
The flake follows the standard structure from Misterio77's starter configs.
|
|
|
|
### Configuration Layers
|
|
|
|
**NixOS System Configuration** (`nixos/`):
|
|
```
|
|
nixos/
|
|
├── common/
|
|
│ ├── global/ # Base system config for all hosts
|
|
│ │ ├── age.nix # Agenix secret management with YubiKey
|
|
│ │ ├── env.nix # Environment variables
|
|
│ │ ├── nix.nix # Nix daemon, flakes, garbage collection
|
|
│ │ └── ssh.nix # SSH server config
|
|
│ ├── optional/ # Opt-in features
|
|
│ │ ├── ephemeral-btrfs.nix # Impermanence with btrfs root wipe
|
|
│ │ ├── persist.nix # Persistence paths for ephemeral root
|
|
│ │ └── yubikey.nix # YubiKey support
|
|
│ └── users/ # User-specific system settings
|
|
├── fuchsia/
|
|
│ ├── configuration.nix
|
|
│ └── services/ # Desktop services (X11, pipewire, flatpak, etc.)
|
|
└── viridian/
|
|
├── configuration.nix
|
|
├── services/ # Server services (traefik, minecraft, IRC, etc.)
|
|
└── multimedia/ # *arr stack (sonarr, radarr, jellyfin, etc.)
|
|
```
|
|
|
|
**Home-Manager User Configuration** (`home-manager/`):
|
|
```
|
|
home-manager/sajenim/
|
|
├── global/ # Base home config
|
|
├── features/ # Modular user features
|
|
│ ├── cli/ # Shell, terminal utilities
|
|
│ ├── desktop/ # GUI applications, window manager
|
|
│ ├── editors/ # Text editors configuration
|
|
│ ├── games/ # Gaming-related configs
|
|
│ ├── printing/ # Printer utilities
|
|
│ └── university/ # Academic tools
|
|
├── fuchsia.nix # Desktop profile
|
|
└── viridian.nix # Server profile (minimal)
|
|
```
|
|
|
|
### Key Architectural Patterns
|
|
|
|
**Module Organization**: Configuration is split between:
|
|
- `nixos/common/global/`: Imported by ALL hosts (mandatory base config)
|
|
- `nixos/common/optional/`: Opt-in features imported per-host
|
|
- `nixos/<hostname>/`: Host-specific hardware and services
|
|
- `home-manager/sajenim/features/`: Composable user environment features
|
|
|
|
**Imports Pattern**: Each host's `configuration.nix` composes its full system by:
|
|
1. Importing `../common/global` (base system)
|
|
2. Importing selected `../common/optional/*` modules
|
|
3. Importing `../common/users/<username>` (user accounts)
|
|
4. Importing host-specific services from `./services/`
|
|
5. Setting host-specific options (hostname, firewall, etc.)
|
|
|
|
**Impermanence**: Uses opt-in persistence with ephemeral btrfs root:
|
|
- Root filesystem (`/`) wiped on every boot
|
|
- Only `/nix`, `/persist`, and `/boot` survive reboots
|
|
- Services must explicitly declare what to persist in `/persist`
|
|
- Secrets use persistent SSH keys at `/persist/etc/ssh/` for decryption
|
|
|
|
**Secret Management**:
|
|
- Encrypted with agenix using host SSH keys
|
|
- Master key stored on YubiKey for rekeying
|
|
- Rekeyed secrets stored in `nixos/common/global/secrets/rekeyed/<hostname>/`
|
|
- Decryption happens during system activation using persistent SSH keys
|
|
|
|
**Overlays**: Applied globally via `nixos/common/global/default.nix`:
|
|
- `additions`: Custom packages from `pkgs/`
|
|
- `modifications`: Patches to existing packages (e.g., dmenu theming)
|
|
- `unstable-packages`: Makes `pkgs.unstable.*` available for newer versions
|
|
|
|
**Unfree Packages**: Allowlist is centralized in `nixos/common/global/default.nix`
|
|
- Default policy: only free software
|
|
- Exceptions listed explicitly (steam, minecraft-server)
|
|
- Do NOT use `allowUnfreePredicate` in other modules (won't merge)
|
|
|
|
### Flake Inputs
|
|
External dependencies include:
|
|
- `nixpkgs` (25.05 stable), `nixpkgs-unstable`
|
|
- `home-manager` (follows nixpkgs)
|
|
- `agenix`, `agenix-rekey` (secret management)
|
|
- `impermanence` (ephemeral root filesystem)
|
|
- `crowdsec` (security)
|
|
- `nixvim` (personal Neovim config, external flake)
|
|
- `xmonad-config` (personal XMonad config, external flake)
|
|
- `nix-minecraft` (declarative Minecraft server)
|
|
|
|
Personal flakes (nixvim, xmonad-config) are maintained in separate repositories
|
|
and imported as flake inputs. They are updated independently via `nix flake update`.
|
|
|
|
## Working with This Configuration
|
|
|
|
### Adding a New Host
|
|
1. Create `nixos/<hostname>/` directory
|
|
2. Add `configuration.nix` and `hardware-configuration.nix`
|
|
3. Add SSH host keys (ed25519 and RSA) to the host directory
|
|
4. Update `flake.nix` to add the new `nixosConfiguration`
|
|
5. Configure secrets: update age.rekey to include new host key
|
|
|
|
### Adding a Service
|
|
Services are organized by host in `nixos/<hostname>/services/`:
|
|
- Create a subdirectory for complex services (e.g., `traefik/`)
|
|
- Each service gets its own `default.nix`
|
|
- Import in `nixos/<hostname>/services/default.nix` or `configuration.nix`
|
|
- Declare persistence paths if using ephemeral root
|
|
- Use agenix for any credentials
|
|
|
|
### Modifying Packages
|
|
- **Custom packages**: Add to `pkgs/` and reference in `pkgs/default.nix`
|
|
- **Patching packages**: Add patches to `overlays/patches/`, modify overlay in
|
|
`overlays/default.nix`
|
|
- **Unfree packages**: Add to allowlist in `nixos/common/global/default.nix`
|
|
|
|
### Testing Changes
|
|
1. **IMPORTANT**: Stage new files with git before building or checking
|
|
- Nix flakes only evaluate files tracked in git
|
|
- Run `git add <file>` for any new files before `nix flake check` or build
|
|
2. Build configuration: `just build <hostname>`
|
|
3. Check for evaluation errors: `nix flake check`
|
|
4. Review changes before switching
|
|
5. Switch: `just switch <hostname>` (local) or `just deploy <hostname>` (remote)
|
|
|
|
### Managing Secrets
|
|
- Secrets are encrypted per-host and stored in
|
|
`nixos/common/global/secrets/rekeyed/<hostname>/`
|
|
- Edit secrets: `agenix-rekey edit <secret-name>`
|
|
- After editing, rekey all hosts: `agenix-rekey rekey`
|
|
- YubiKey required for rekeying operations
|
|
- Host SSH keys at `/persist/etc/ssh/` are used for automatic decryption
|
|
|
|
## Important Conventions
|
|
|
|
### Network IP Allocation
|
|
This infrastructure uses the following IP range scheme to avoid conflicts:
|
|
|
|
**Allocated Ranges:**
|
|
- `192.168.50.0/24` - Home router/main LAN
|
|
- `10.1.0.0/24` - Internet sharing from fuchsia (Ethernet to printer)
|
|
- `10.2.0.0/24` - Reserved for future internet sharing from another host
|
|
- `10.3.0.0/24` - Reserved for future internet sharing from another host
|
|
- `10.39.179.0/24` - WireGuard VPN on Raspberry Pi
|
|
- `172.17.0.0/16` - Docker default bridge network (viridian)
|
|
|
|
**Conventions:**
|
|
- Internet connection sharing uses `10.N.0.0/24` where N is 1, 2, 3, etc.
|
|
- Gateway host is always `10.N.0.1`
|
|
- DHCP pools typically use `10.N.0.2` through `10.N.0.10`
|
|
- Keep VPN/tunnel ranges in the `10.30.0.0/16` and higher space
|
|
|
|
### Line Length
|
|
Keep all Nix code to a maximum of 100 characters per line for consistency.
|
|
|
|
### Module Naming
|
|
- System-level services: `nixos/<hostname>/services/<service-name>/default.nix`
|
|
- User-level features: `home-manager/sajenim/features/<category>/<feature>.nix`
|
|
|
|
### Persistence Declarations
|
|
When adding services to hosts with ephemeral root, declare persistence:
|
|
```nix
|
|
environment.persistence."/persist" = {
|
|
directories = [
|
|
"/var/lib/service-name"
|
|
];
|
|
files = [
|
|
"/var/lib/service-name/config.conf"
|
|
];
|
|
};
|
|
```
|
|
|
|
### Comments
|
|
This codebase uses structured comments to explain configuration choices:
|
|
- Block comments at file top explain module purpose
|
|
- Inline comments explain non-obvious configuration decisions
|
|
- Group related options with visual separators when helpful
|