summaryrefslogtreecommitdiff
path: root/hosts/vidhar/network/dhcp/default.nix
blob: ccc22c7f49785d645382be4a9816ab9123007478 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
{ flake, config, pkgs, lib, ... }:
{
  config = {
    services.kea = {
      dhcp4 = {
        enable = true;
        settings = {
          valid-lifetime = 4000;
          rebind-timer = 2000;
          renew-timer = 1000;

          interfaces-config = {
            interfaces = [ "lan" "mgmt" ];
          };

          lease-database = {
            name = "/var/lib/kea/dhcp4.leases";
            persist = true;
            type = "memfile";
          };

          client-classes = [
            { name = "ipxe";
              test = "option[77].hex == 'iPXE'";
              next-server = "10.141.0.1";
              boot-file-name = "netboot.ipxe";
              only-if-required = true;
            }
            { name = "uefi-64";
              test = "substring(option[60].hex,0,20) == 'PXEClient:Arch:00007' or substring(option[60].hex,0,20) == 'PXEClient:Arch:00008' or substring(option[60].hex,0,20) == 'PXEClient:Arch:00009'";
              only-if-required = true;
              option-data = [
                { name = "tftp-server-name"; data = "10.141.0.1"; }
              ];
              boot-file-name = "ipxe.efi";
            }
            { name = "uefi-32";
              test = "substring(option[60].hex,0,20) == 'PXEClient:Arch:00002' or substring(option[60].hex,0,20) == 'PXEClient:Arch:00006'";
              only-if-required = true;
              option-data = [
                { name = "tftp-server-name"; data = "10.141.0.1"; }
              ];
              boot-file-name = "i386-ipxe.efi";
            }
            { name = "legacy";
              test = "substring(option[60].hex,0,20) == 'PXEClient:Arch:00000'";
              only-if-required = true;
              option-data = [
                { name = "tftp-server-name"; data = "10.141.0.1"; }
              ];
              boot-file-name = "undionly.kpxe";
            }
          ];

          dhcp-ddns.enable-updates = true;
          ddns-send-updates = false;
          ddns-override-client-update = true;
          ddns-override-no-update = true;
          ddns-replace-client-name = "when-not-present";
          ddns-generated-prefix = "noname";
          ddns-update-on-renew = true;

          subnet4 = [
            { subnet = "10.141.0.0/24";
              option-data = [
                { name = "domain-name-servers";
                  data = "10.141.0.1";
                }
                { name = "broadcast-address";
                  data = "10.141.0.255";
                }
                { name = "routers";
                  data = "10.141.0.1";
                }
                { name = "domain-name";
                  data = "yggdrasil";
                }
                { name = "domain-search";
                  data = "lan.yggdrasil, yggdrasil";
                }
              ];
              ddns-send-updates = true;
              ddns-qualifying-suffix = "lan.yggdrasil";
              pools = [ { pool = "10.141.0.128 - 10.141.0.254"; } ];
              require-client-classes = ["ipxe" "uefi-64" "uefi-32" "legacy"];
              reservations = [
                { hostname = "sif";
                  hw-address = "3c:e1:a1:52:24:35";
                }
                { hostname = "sif";
                  hw-address = "ee:32:68:76:83:ac";
                }
                { hostname = "sif";
                  hw-address = "48:2a:e3:64:62:97";
                }
                { hostname = "eos";
                  hw-address = "00:d8:61:79:c5:40";
                }
              ];
            }
            { subnet = "10.141.1.0/24";
              option-data = [
                { name = "domain-name-servers";
                  data = "10.141.1.1";
                }
                { name = "broadcast-address";
                  data = "10.141.1.255";
                }
                { name = "domain-name";
                  data = "yggdrasil";
                }
                { name = "domain-search";
                  data = "mgmt.yggdrasil, yggdrasil";
                }
              ];
              ddns-send-updates = true;
              ddns-qualifying-suffix = "mgmt.yggdrasil";
              pools = [ { pool = "10.141.1.128 - 10.141.1.254"; } ];
              reservations = [
                { hostname = "switch01";
                  hw-address = "60:a4:b7:53:94:b5";
                  ip-address = "10.141.1.2";
                }
                { hostname = "ap01";
                  hw-address = "74:ac:b9:29:ad:9a";
                  ip-address = "10.141.1.4";
                }
              ];
            }
            { subnet = "10.141.2.0/24";
              option-data = [
                { name = "domain-name-servers";
                  data = "10.141.2.1";
                }
                { name = "broadcast-address";
                  data = "10.141.2.255";
                }
                { name = "routers";
                  data = "10.141.2.1";
                }
              ];
              ddns-send-updates = false;
              pools = [ { pool = "10.141.2.128 - 10.141.2.254"; } ];
              reservations = [];
            }
          ]; 
        };
      };
      dhcp6 = {
        enable = true;
        settings = {
          interfaces-config = {
            interfaces = [ "lan" ];
          };

          lease-database = {
            name = "/var/lib/kea/dhcp6.leases";
            persist = true;
            type = "memfile";
          };
        };
      };
      dhcp-ddns = {
        enable = true;
        settings = {
          forward-ddns = {
            ddns-domains = [
              { name = "lan.yggdrasil.";
                dns-servers = [
                  { ip-address = "127.0.0.1";
                    port = 5353;
                    key-name = "local_key";
                  }
                ];
              }
              { name = "mgmt.yggdrasil.";
                dns-servers = [
                  { ip-address = "127.0.0.1";
                    port = 5353;
                    key-name = "local_key";
                  }
                ];
              }
            ];
          };
          reverse-ddns = {
            ddns-domains = [
              { name = "0.141.10.in-addr.arpa.";
                dns-servers = [
                  { ip-address = "127.0.0.1";
                    port = 5353;
                    key-name = "local_key";
                  }
                ];
              }
              { name = "1.141.10.in-addr.arpa.";
                dns-servers = [
                  { ip-address = "127.0.0.1";
                    port = 5353;
                    key-name = "local_key";
                  }
                ];
              }
            ];
          };
        };
      };
    };

    systemd.services.kea-dhcp-ddns-server = {
      preStart = let 
        configLines = [
          "<?include \"\${CREDENTIALS_DIRECTORY}/knot-tsig.json.frag\"?>"
        ] ++ lib.mapAttrsToList (k: v:
          "\"${k}\": ${builtins.toJSON v}"
        ) config.services.kea.dhcp-ddns.settings;

        config-template = pkgs.writeText "dhcp-ddns.conf" ''
          {"DhcpDdns": {
            ${lib.concatStringsSep ",\n  " configLines}
          }}
        '';
      in ''
        ${pkgs.envsubst}/bin/envsubst -i "${config-template}" -o "''${RUNTIME_DIRECTORY}/dhcp-ddns.conf"
      '';

      serviceConfig = {
        ExecStart = lib.mkForce ''
          ${pkgs.kea}/bin/kea-dhcp-ddns -c "''${RUNTIME_DIRECTORY}/dhcp-ddns.conf" ${lib.escapeShellArgs config.services.kea.dhcp-ddns.extraArgs}
        '';
        LoadCredential = [
          "knot-tsig.json.frag:${config.sops.secrets."kea-knot-tsig.json.frag".path}"
        ];
      };
    };

    sops.secrets."kea-knot-tsig.json.frag" = {
      format = "binary";
      sopsFile = ./knot-tsig.json.frag;
    };

    systemd.services."installer-atftpd" = {
      description = "TFTP Server for PXE Booting NixOS Installer";
      after = [ "network.target" ];
      wantedBy = [ "multi-user.target" ];
      serviceConfig.ExecStart = let
        installerBuild = flake.nixosConfigurations.installer-x86_64-linux-netboot.config.system.build;
        ipxe = pkgs.ipxe.override {
          additionalTargets = {
            "bin-i386-efi/ipxe.efi" = "i386-ipxe.efi";
          };
        };
        tftpRoot = pkgs.runCommandLocal "installer-netboot" {} ''
          mkdir -p $out
          install -m 0444 -t $out \
            ${installerBuild.netbootRamdisk}/initrd \
            ${installerBuild.kernel}/bzImage \
            ${installerBuild.netbootIpxeScript}/netboot.ipxe \
            ${ipxe}/ipxe.efi ${ipxe}/i386-ipxe.efi ${ipxe}/undionly.kpxe
        '';
      in "${pkgs.atftp}/sbin/atftpd --daemon --no-fork --bind-address=10.141.0.1 ${tftpRoot}";
    };
  };
}