nixos-config/config/services/router.nix

76 lines
2.4 KiB
Nix
Raw Normal View History

2023-03-19 19:05:26 +00:00
{
nixos-config-for-netboot,
pkgs,
...
}: let
netboot-x86_64 = pkgs.symlinkJoin {
name = "netboot-x86_64";
paths = [
pkgs.ipxe
2023-03-19 19:11:32 +00:00
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.kernel
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.netbootRamdisk
nixos-config-for-netboot.nixosConfigurations.netboot.config.system.build.netbootIpxeScript
2023-03-19 19:05:26 +00:00
];
};
bootIpxeScript = pkgs.writeText "boot.ipxe" ''
chain http://192.168.2.1/${"$"}{buildarch}/netboot.ipxe
'';
netboot = pkgs.stdenvNoCC.mkDerivation {
name = "netboot";
src = pkgs.emptyDirectory;
2023-03-20 07:10:37 +00:00
buildPhase = "true";
2023-03-19 19:05:26 +00:00
installPhase = ''
mkdir $out
cp ${bootIpxeScript} $out/boot.ipxe
ln -svf ${netboot-x86_64} $out/x86_64
'';
};
in {
2023-03-18 09:02:19 +00:00
networking.dhcpcd.allowInterfaces = ["enp2s0f0u4"]; # yes a usb network card dont judge
2022-05-05 19:58:29 +00:00
services.dhcpd4 = {
enable = true;
extraConfig = ''
option subnet-mask 255.255.255.0;
option broadcast-address 192.168.2.255;
option routers 192.168.2.1;
2022-05-05 20:24:55 +00:00
option domain-name-servers 1.1.1.1;
2022-05-05 19:58:29 +00:00
subnet 192.168.2.0 netmask 255.255.255.0 {
range 192.168.2.100 192.168.2.200;
}
2022-06-20 20:11:25 +00:00
option client-arch code 93 = unsigned integer 16;
if exists user-class and option user-class = "iPXE" {
2022-06-21 12:35:44 +00:00
filename "http://192.168.2.1/boot.ipxe";
2023-03-19 19:05:26 +00:00
} elsif substring (option vendor-class-identifier, 0, 10) = "HTTPClient" {
filename "http://192.168.2.1/x86_64/ipxe.efi";
2022-06-20 20:11:25 +00:00
} elsif option client-arch != 00:00 {
2023-03-19 19:05:26 +00:00
filename "/ipxe.efi";
next-server 192.168.2.1;
2022-06-20 20:11:25 +00:00
} else {
2023-03-19 19:05:26 +00:00
filename "/undionly.kpxe";
next-server 192.168.2.1;
2022-06-20 20:11:25 +00:00
}
2022-05-05 19:58:29 +00:00
'';
2022-06-12 15:39:15 +00:00
interfaces = ["br0"];
2022-05-05 19:58:29 +00:00
};
2022-06-20 20:11:25 +00:00
services.tftpd = {
enable = true;
2023-03-19 19:05:26 +00:00
path = pkgs.ipxe;
2022-06-20 20:11:25 +00:00
};
2023-03-19 19:05:26 +00:00
services.caddy.virtualHosts."http://192.168.2.1".extraConfig = ''
import baseConfig
root * ${netboot}
file_server
'';
2022-06-21 12:48:31 +00:00
networking.firewall.interfaces."br0".allowedUDPPorts = [69 4011];
2022-05-05 19:58:29 +00:00
# No i dont have ipv6 :(
networking.firewall.extraCommands = ''
iptables -A FORWARD -i br0 -j ACCEPT
2023-03-18 09:02:19 +00:00
iptables -t nat -A POSTROUTING -o enp2s0f0u4 -s 192.168.2.0/24 -j MASQUERADE
2022-05-05 19:58:29 +00:00
'';
networking.interfaces.enp1s0f0u4.macAddress = "00:d8:61:d0:de:1e"; # fucking ISP
2022-05-05 20:24:55 +00:00
boot.kernel.sysctl = {
"net.ipv4.conf.all.forwarding" = true;
"net.ipv6.conf.all.forwarding" = true;
};
2022-05-05 19:58:29 +00:00
}