2023-03-19 19:05:26 +00:00
|
|
|
|
{
|
|
|
|
|
nixos-config-for-netboot,
|
|
|
|
|
pkgs,
|
|
|
|
|
...
|
|
|
|
|
}: let
|
|
|
|
|
netboot-x86_64 = pkgs.symlinkJoin {
|
|
|
|
|
name = "netboot-x86_64";
|
|
|
|
|
paths = [
|
|
|
|
|
pkgs.ipxe
|
2023-03-19 19:11:32 +00:00
|
|
|
|
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.kernel
|
|
|
|
|
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.netbootRamdisk
|
|
|
|
|
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.netbootIpxeScript
|
2023-03-19 19:05:26 +00:00
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
bootIpxeScript = pkgs.writeText "boot.ipxe" ''
|
|
|
|
|
chain http://192.168.2.1/${"$"}{buildarch}/netboot.ipxe
|
|
|
|
|
'';
|
|
|
|
|
netboot = pkgs.stdenvNoCC.mkDerivation {
|
|
|
|
|
name = "netboot";
|
|
|
|
|
src = pkgs.emptyDirectory;
|
2023-03-20 07:10:37 +00:00
|
|
|
|
buildPhase = "true";
|
2023-03-19 19:05:26 +00:00
|
|
|
|
installPhase = ''
|
|
|
|
|
mkdir $out
|
|
|
|
|
cp ${bootIpxeScript} $out/boot.ipxe
|
|
|
|
|
ln -svf ${netboot-x86_64} $out/x86_64
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
in {
|
2023-03-18 09:02:19 +00:00
|
|
|
|
networking.dhcpcd.allowInterfaces = ["enp2s0f0u4"]; # yes a usb network card don’t judge
|
2022-05-05 19:58:29 +00:00
|
|
|
|
services.dhcpd4 = {
|
|
|
|
|
enable = true;
|
|
|
|
|
extraConfig = ''
|
|
|
|
|
option subnet-mask 255.255.255.0;
|
|
|
|
|
option broadcast-address 192.168.2.255;
|
|
|
|
|
option routers 192.168.2.1;
|
2022-05-05 20:24:55 +00:00
|
|
|
|
option domain-name-servers 1.1.1.1;
|
2022-05-05 19:58:29 +00:00
|
|
|
|
subnet 192.168.2.0 netmask 255.255.255.0 {
|
|
|
|
|
range 192.168.2.100 192.168.2.200;
|
|
|
|
|
}
|
2022-06-20 20:11:25 +00:00
|
|
|
|
option client-arch code 93 = unsigned integer 16;
|
|
|
|
|
if exists user-class and option user-class = "iPXE" {
|
2022-06-21 12:35:44 +00:00
|
|
|
|
filename "http://192.168.2.1/boot.ipxe";
|
2023-03-19 19:05:26 +00:00
|
|
|
|
} elsif substring (option vendor-class-identifier, 0, 10) = "HTTPClient" {
|
|
|
|
|
filename "http://192.168.2.1/x86_64/ipxe.efi";
|
2022-06-20 20:11:25 +00:00
|
|
|
|
} elsif option client-arch != 00:00 {
|
2023-03-19 19:05:26 +00:00
|
|
|
|
filename "/ipxe.efi";
|
|
|
|
|
next-server 192.168.2.1;
|
2022-06-20 20:11:25 +00:00
|
|
|
|
} else {
|
2023-03-19 19:05:26 +00:00
|
|
|
|
filename "/undionly.kpxe";
|
|
|
|
|
next-server 192.168.2.1;
|
2022-06-20 20:11:25 +00:00
|
|
|
|
}
|
2022-05-05 19:58:29 +00:00
|
|
|
|
'';
|
2022-06-12 15:39:15 +00:00
|
|
|
|
interfaces = ["br0"];
|
2022-05-05 19:58:29 +00:00
|
|
|
|
};
|
2022-06-20 20:11:25 +00:00
|
|
|
|
services.tftpd = {
|
|
|
|
|
enable = true;
|
2023-03-19 19:05:26 +00:00
|
|
|
|
path = pkgs.ipxe;
|
2022-06-20 20:11:25 +00:00
|
|
|
|
};
|
2023-03-19 19:05:26 +00:00
|
|
|
|
services.caddy.virtualHosts."http://192.168.2.1".extraConfig = ''
|
|
|
|
|
import baseConfig
|
|
|
|
|
root * ${netboot}
|
|
|
|
|
file_server
|
|
|
|
|
'';
|
2022-06-21 12:48:31 +00:00
|
|
|
|
networking.firewall.interfaces."br0".allowedUDPPorts = [69 4011];
|
2022-05-05 19:58:29 +00:00
|
|
|
|
# No i don’t have ipv6 :(
|
|
|
|
|
networking.firewall.extraCommands = ''
|
|
|
|
|
iptables -A FORWARD -i br0 -j ACCEPT
|
2023-03-18 09:02:19 +00:00
|
|
|
|
iptables -t nat -A POSTROUTING -o enp2s0f0u4 -s 192.168.2.0/24 -j MASQUERADE
|
2022-05-05 19:58:29 +00:00
|
|
|
|
'';
|
2022-05-05 20:04:52 +00:00
|
|
|
|
networking.interfaces.enp1s0f0u4.macAddress = "00:d8:61:d0:de:1e"; # fucking ISP
|
2022-05-05 20:24:55 +00:00
|
|
|
|
boot.kernel.sysctl = {
|
|
|
|
|
"net.ipv4.conf.all.forwarding" = true;
|
|
|
|
|
"net.ipv6.conf.all.forwarding" = true;
|
|
|
|
|
};
|
2022-05-05 19:58:29 +00:00
|
|
|
|
}
|