2014-11-24 20:39:36 +00:00
|
|
|
{ config, lib, pkgs, utils, ... }:
|
2014-08-05 22:00:30 +01:00
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.services.unifi;
|
|
|
|
stateDir = "/var/lib/unifi";
|
2015-01-01 16:17:16 +00:00
|
|
|
cmd = "@${pkgs.jre}/bin/java java -jar ${stateDir}/lib/ace.jar";
|
2014-11-24 20:39:36 +00:00
|
|
|
mountPoints = [
|
|
|
|
{
|
|
|
|
what = "${pkgs.unifi}/dl";
|
|
|
|
where = "${stateDir}/dl";
|
|
|
|
}
|
|
|
|
{
|
|
|
|
what = "${pkgs.unifi}/lib";
|
|
|
|
where = "${stateDir}/lib";
|
|
|
|
}
|
|
|
|
{
|
|
|
|
what = "${pkgs.mongodb}/bin";
|
|
|
|
where = "${stateDir}/bin";
|
|
|
|
}
|
2016-04-23 06:43:55 +01:00
|
|
|
{
|
|
|
|
what = "${cfg.dataDir}";
|
|
|
|
where = "${stateDir}/data";
|
|
|
|
}
|
2014-11-24 20:39:36 +00:00
|
|
|
];
|
|
|
|
systemdMountPoints = map (m: "${utils.escapeSystemdPath m.where}.mount") mountPoints;
|
2014-08-05 22:00:30 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
services.unifi.enable = mkOption {
|
2015-06-15 17:10:26 +01:00
|
|
|
type = types.bool;
|
2014-08-05 22:00:30 +01:00
|
|
|
default = false;
|
|
|
|
description = ''
|
|
|
|
Whether or not to enable the unifi controller service.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2016-04-23 06:43:55 +01:00
|
|
|
services.unifi.dataDir = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "${stateDir}/data";
|
|
|
|
description = ''
|
|
|
|
Where to store the database and other data.
|
|
|
|
|
|
|
|
This directory will be bind-mounted to ${stateDir}/data as part of the service startup.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2016-08-16 20:42:57 +01:00
|
|
|
services.unifi.openPorts = mkOption {
|
|
|
|
type = types.bool;
|
|
|
|
default = true;
|
|
|
|
description = ''
|
|
|
|
Whether or not to open the minimum required ports on the firewall.
|
|
|
|
|
|
|
|
This is necessary to allow firmware upgrades and device discovery to
|
|
|
|
work. For remote login, you should additionally open (or forward) port
|
|
|
|
8443.
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2014-08-05 22:00:30 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
|
|
|
users.extraUsers.unifi = {
|
|
|
|
uid = config.ids.uids.unifi;
|
|
|
|
description = "UniFi controller daemon user";
|
|
|
|
home = "${stateDir}";
|
|
|
|
};
|
|
|
|
|
2016-08-16 20:42:57 +01:00
|
|
|
networking.firewall = mkIf cfg.openPorts {
|
|
|
|
# https://help.ubnt.com/hc/en-us/articles/204910084-UniFi-Change-Default-Ports-for-Controller-and-UAPs
|
|
|
|
allowedTCPPorts = [
|
|
|
|
8080 # Port for UAP to inform controller.
|
|
|
|
8880 # Port for HTTP portal redirect, if guest portal is enabled.
|
|
|
|
8843 # Port for HTTPS portal redirect, ditto.
|
|
|
|
];
|
|
|
|
allowedUDPPorts = [
|
|
|
|
3478 # UDP port used for STUN.
|
|
|
|
10001 # UDP port used for device discovery.
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2014-08-06 05:15:49 +01:00
|
|
|
# We must create the binary directories as bind mounts instead of symlinks
|
|
|
|
# This is because the controller resolves all symlinks to absolute paths
|
|
|
|
# to be used as the working directory.
|
|
|
|
systemd.mounts = map ({ what, where }: {
|
2014-08-06 04:09:15 +01:00
|
|
|
bindsTo = [ "unifi.service" ];
|
2014-11-24 20:39:36 +00:00
|
|
|
partOf = [ "unifi.service" ];
|
2014-12-05 20:11:47 +00:00
|
|
|
unitConfig.RequiresMountsFor = stateDir;
|
2014-08-05 22:00:30 +01:00
|
|
|
options = "bind";
|
2014-08-06 05:15:49 +01:00
|
|
|
what = what;
|
|
|
|
where = where;
|
2014-11-24 20:39:36 +00:00
|
|
|
}) mountPoints;
|
2014-08-05 22:00:30 +01:00
|
|
|
|
|
|
|
systemd.services.unifi = {
|
|
|
|
description = "UniFi controller daemon";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
2014-11-24 20:39:36 +00:00
|
|
|
after = [ "network.target" ] ++ systemdMountPoints;
|
|
|
|
partOf = systemdMountPoints;
|
|
|
|
bindsTo = systemdMountPoints;
|
2014-12-05 20:11:47 +00:00
|
|
|
unitConfig.RequiresMountsFor = stateDir;
|
2016-02-11 16:44:00 +00:00
|
|
|
# This a HACK to fix missing dependencies of dynamic libs extracted from jars
|
2016-04-23 06:39:28 +01:00
|
|
|
environment.LD_LIBRARY_PATH = with pkgs.stdenv; "${cc.cc.lib}/lib";
|
2014-08-05 22:00:30 +01:00
|
|
|
|
|
|
|
preStart = ''
|
2016-08-16 20:34:26 +01:00
|
|
|
# Ensure privacy of state and data.
|
2016-08-16 20:42:57 +01:00
|
|
|
chown unifi "${stateDir}" "${stateDir}/data"
|
|
|
|
chmod 0700 "${stateDir}" "${stateDir}/data"
|
2014-08-05 22:00:30 +01:00
|
|
|
|
|
|
|
# Create the volatile webapps
|
2014-11-24 08:22:12 +00:00
|
|
|
rm -rf "${stateDir}/webapps"
|
2014-08-05 22:00:30 +01:00
|
|
|
mkdir -p "${stateDir}/webapps"
|
|
|
|
chown unifi "${stateDir}/webapps"
|
2015-06-23 18:09:34 +01:00
|
|
|
ln -s "${pkgs.unifi}/webapps/ROOT" "${stateDir}/webapps/ROOT"
|
2014-08-05 22:00:30 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
postStop = ''
|
2014-11-24 10:29:53 +00:00
|
|
|
rm -rf "${stateDir}/webapps"
|
2014-08-05 22:00:30 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "simple";
|
|
|
|
ExecStart = "${cmd} start";
|
|
|
|
ExecStop = "${cmd} stop";
|
|
|
|
User = "unifi";
|
|
|
|
PermissionsStartOnly = true;
|
|
|
|
UMask = "0077";
|
|
|
|
WorkingDirectory = "${stateDir}";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|