Merge pull request #202710 from lukegb/unpoller
unifi-poller: rename to unpoller
This commit is contained in:
commit
386563c4ed
@ -139,6 +139,13 @@
|
|||||||
the Nix store.
|
the Nix store.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
<listitem>
|
||||||
|
<para>
|
||||||
|
The <literal>unifi-poller</literal> package and corresponding
|
||||||
|
NixOS module have been renamed to <literal>unpoller</literal>
|
||||||
|
to match upstream.
|
||||||
|
</para>
|
||||||
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
@ -44,3 +44,5 @@ In addition to numerous new and upgraded packages, this release has the followin
|
|||||||
- A new `virtualisation.rosetta` module was added to allow running `x86_64` binaries through [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) inside virtualised NixOS guests on Apple silicon. This feature works by default with the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm).
|
- A new `virtualisation.rosetta` module was added to allow running `x86_64` binaries through [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) inside virtualised NixOS guests on Apple silicon. This feature works by default with the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm).
|
||||||
|
|
||||||
- Resilio sync secret keys can now be provided using a secrets file at runtime, preventing these secrets from ending up in the Nix store.
|
- Resilio sync secret keys can now be provided using a secrets file at runtime, preventing these secrets from ending up in the Nix store.
|
||||||
|
|
||||||
|
- The `unifi-poller` package and corresponding NixOS module have been renamed to `unpoller` to match upstream.
|
||||||
|
@ -724,7 +724,7 @@
|
|||||||
./services/monitoring/thanos.nix
|
./services/monitoring/thanos.nix
|
||||||
./services/monitoring/tremor-rs.nix
|
./services/monitoring/tremor-rs.nix
|
||||||
./services/monitoring/tuptime.nix
|
./services/monitoring/tuptime.nix
|
||||||
./services/monitoring/unifi-poller.nix
|
./services/monitoring/unpoller.nix
|
||||||
./services/monitoring/ups.nix
|
./services/monitoring/ups.nix
|
||||||
./services/monitoring/uptime.nix
|
./services/monitoring/uptime.nix
|
||||||
./services/monitoring/vmagent.nix
|
./services/monitoring/vmagent.nix
|
||||||
|
@ -73,7 +73,7 @@ let
|
|||||||
"tor"
|
"tor"
|
||||||
"unbound"
|
"unbound"
|
||||||
"unifi"
|
"unifi"
|
||||||
"unifi-poller"
|
"unpoller"
|
||||||
"v2ray"
|
"v2ray"
|
||||||
"varnish"
|
"varnish"
|
||||||
"wireguard"
|
"wireguard"
|
||||||
@ -230,6 +230,10 @@ in
|
|||||||
options.services.prometheus.exporters = mkOption {
|
options.services.prometheus.exporters = mkOption {
|
||||||
type = types.submodule {
|
type = types.submodule {
|
||||||
options = (mkSubModules);
|
options = (mkSubModules);
|
||||||
|
imports = [
|
||||||
|
../../../misc/assertions.nix
|
||||||
|
(lib.mkRenamedOptionModule [ "unifi-poller" ] [ "unpoller" ])
|
||||||
|
];
|
||||||
};
|
};
|
||||||
description = lib.mdDoc "Prometheus exporter configuration";
|
description = lib.mdDoc "Prometheus exporter configuration";
|
||||||
default = {};
|
default = {};
|
||||||
@ -293,13 +297,14 @@ in
|
|||||||
Please specify either 'services.prometheus.exporters.sql.configuration' or
|
Please specify either 'services.prometheus.exporters.sql.configuration' or
|
||||||
'services.prometheus.exporters.sql.configFile'
|
'services.prometheus.exporters.sql.configFile'
|
||||||
'';
|
'';
|
||||||
} ] ++ (flip map (attrNames cfg) (exporter: {
|
} ] ++ (flip map (attrNames exporterOpts) (exporter: {
|
||||||
assertion = cfg.${exporter}.firewallFilter != null -> cfg.${exporter}.openFirewall;
|
assertion = cfg.${exporter}.firewallFilter != null -> cfg.${exporter}.openFirewall;
|
||||||
message = ''
|
message = ''
|
||||||
The `firewallFilter'-option of exporter ${exporter} doesn't have any effect unless
|
The `firewallFilter'-option of exporter ${exporter} doesn't have any effect unless
|
||||||
`openFirewall' is set to `true'!
|
`openFirewall' is set to `true'!
|
||||||
'';
|
'';
|
||||||
}));
|
})) ++ config.services.prometheus.exporters.assertions;
|
||||||
|
warnings = config.services.prometheus.exporters.warnings;
|
||||||
}] ++ [(mkIf config.services.minio.enable {
|
}] ++ [(mkIf config.services.minio.enable {
|
||||||
services.prometheus.exporters.minio.minioAddress = mkDefault "http://localhost:9000";
|
services.prometheus.exporters.minio.minioAddress = mkDefault "http://localhost:9000";
|
||||||
services.prometheus.exporters.minio.minioAccessKey = mkDefault config.services.minio.accessKey;
|
services.prometheus.exporters.minio.minioAccessKey = mkDefault config.services.minio.accessKey;
|
||||||
|
@ -3,9 +3,9 @@
|
|||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.services.prometheus.exporters.unifi-poller;
|
cfg = config.services.prometheus.exporters.unpoller;
|
||||||
|
|
||||||
configFile = pkgs.writeText "prometheus-unifi-poller-exporter.json" (generators.toJSON {} {
|
configFile = pkgs.writeText "prometheus-unpoller-exporter.json" (generators.toJSON {} {
|
||||||
poller = { inherit (cfg.log) debug quiet; };
|
poller = { inherit (cfg.log) debug quiet; };
|
||||||
unifi = { inherit (cfg) controllers; };
|
unifi = { inherit (cfg) controllers; };
|
||||||
influxdb.disable = true;
|
influxdb.disable = true;
|
||||||
@ -21,8 +21,8 @@ in {
|
|||||||
port = 9130;
|
port = 9130;
|
||||||
|
|
||||||
extraOpts = {
|
extraOpts = {
|
||||||
inherit (options.services.unifi-poller.unifi) controllers;
|
inherit (options.services.unpoller.unifi) controllers;
|
||||||
inherit (options.services.unifi-poller) loki;
|
inherit (options.services.unpoller) loki;
|
||||||
log = {
|
log = {
|
||||||
debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs.");
|
debug = mkEnableOption (lib.mdDoc "debug logging including line numbers, high resolution timestamps, per-device logs.");
|
||||||
quiet = mkEnableOption (lib.mdDoc "startup and error logs only.");
|
quiet = mkEnableOption (lib.mdDoc "startup and error logs only.");
|
||||||
@ -31,7 +31,7 @@ in {
|
|||||||
};
|
};
|
||||||
|
|
||||||
serviceOpts.serviceConfig = {
|
serviceOpts.serviceConfig = {
|
||||||
ExecStart = "${pkgs.unifi-poller}/bin/unpoller --config ${configFile}";
|
ExecStart = "${pkgs.unpoller}/bin/unpoller --config ${configFile}";
|
||||||
DynamicUser = false;
|
DynamicUser = false;
|
||||||
};
|
};
|
||||||
}
|
}
|
@ -3,15 +3,19 @@
|
|||||||
with lib;
|
with lib;
|
||||||
|
|
||||||
let
|
let
|
||||||
cfg = config.services.unifi-poller;
|
cfg = config.services.unpoller;
|
||||||
|
|
||||||
configFile = pkgs.writeText "unifi-poller.json" (generators.toJSON {} {
|
configFile = pkgs.writeText "unpoller.json" (generators.toJSON {} {
|
||||||
inherit (cfg) poller influxdb loki prometheus unifi;
|
inherit (cfg) poller influxdb loki prometheus unifi;
|
||||||
});
|
});
|
||||||
|
|
||||||
in {
|
in {
|
||||||
options.services.unifi-poller = {
|
imports = [
|
||||||
enable = mkEnableOption (lib.mdDoc "unifi-poller");
|
(lib.mkRenamedOptionModule [ "services" "unifi-poller" ] [ "services" "unpoller" ])
|
||||||
|
];
|
||||||
|
|
||||||
|
options.services.unpoller = {
|
||||||
|
enable = mkEnableOption (lib.mdDoc "unpoller");
|
||||||
|
|
||||||
poller = {
|
poller = {
|
||||||
debug = mkOption {
|
debug = mkOption {
|
||||||
@ -86,8 +90,8 @@ in {
|
|||||||
};
|
};
|
||||||
pass = mkOption {
|
pass = mkOption {
|
||||||
type = types.path;
|
type = types.path;
|
||||||
default = pkgs.writeText "unifi-poller-influxdb-default.password" "unifipoller";
|
default = pkgs.writeText "unpoller-influxdb-default.password" "unifipoller";
|
||||||
defaultText = literalExpression "unifi-poller-influxdb-default.password";
|
defaultText = literalExpression "unpoller-influxdb-default.password";
|
||||||
description = lib.mdDoc ''
|
description = lib.mdDoc ''
|
||||||
Path of a file containing the password for influxdb.
|
Path of a file containing the password for influxdb.
|
||||||
This file needs to be readable by the unifi-poller user.
|
This file needs to be readable by the unifi-poller user.
|
||||||
@ -135,8 +139,8 @@ in {
|
|||||||
};
|
};
|
||||||
pass = mkOption {
|
pass = mkOption {
|
||||||
type = types.path;
|
type = types.path;
|
||||||
default = pkgs.writeText "unifi-poller-loki-default.password" "";
|
default = pkgs.writeText "unpoller-loki-default.password" "";
|
||||||
defaultText = "unifi-poller-influxdb-default.password";
|
defaultText = "unpoller-influxdb-default.password";
|
||||||
description = lib.mdDoc ''
|
description = lib.mdDoc ''
|
||||||
Path of a file containing the password for Loki.
|
Path of a file containing the password for Loki.
|
||||||
This file needs to be readable by the unifi-poller user.
|
This file needs to be readable by the unifi-poller user.
|
||||||
@ -184,8 +188,8 @@ in {
|
|||||||
};
|
};
|
||||||
pass = mkOption {
|
pass = mkOption {
|
||||||
type = types.path;
|
type = types.path;
|
||||||
default = pkgs.writeText "unifi-poller-unifi-default.password" "unifi";
|
default = pkgs.writeText "unpoller-unifi-default.password" "unifi";
|
||||||
defaultText = literalExpression "unifi-poller-unifi-default.password";
|
defaultText = literalExpression "unpoller-unifi-default.password";
|
||||||
description = lib.mdDoc ''
|
description = lib.mdDoc ''
|
||||||
Path of a file containing the password for the unifi service user.
|
Path of a file containing the password for the unifi service user.
|
||||||
This file needs to be readable by the unifi-poller user.
|
This file needs to be readable by the unifi-poller user.
|
||||||
@ -303,7 +307,7 @@ in {
|
|||||||
wantedBy = [ "multi-user.target" ];
|
wantedBy = [ "multi-user.target" ];
|
||||||
after = [ "network.target" ];
|
after = [ "network.target" ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
ExecStart = "${pkgs.unifi-poller}/bin/unifi-poller --config ${configFile}";
|
ExecStart = "${pkgs.unpoller}/bin/unpoller --config ${configFile}";
|
||||||
Restart = "always";
|
Restart = "always";
|
||||||
PrivateTmp = true;
|
PrivateTmp = true;
|
||||||
ProtectHome = true;
|
ProtectHome = true;
|
@ -1244,15 +1244,15 @@ let
|
|||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
unifi-poller = {
|
unpoller = {
|
||||||
nodeName = "unifi_poller";
|
nodeName = "unpoller";
|
||||||
exporterConfig.enable = true;
|
exporterConfig.enable = true;
|
||||||
exporterConfig.controllers = [{ }];
|
exporterConfig.controllers = [{ }];
|
||||||
exporterTest = ''
|
exporterTest = ''
|
||||||
wait_for_unit("prometheus-unifi-poller-exporter.service")
|
wait_for_unit("prometheus-unpoller-exporter.service")
|
||||||
wait_for_open_port(9130)
|
wait_for_open_port(9130)
|
||||||
succeed(
|
succeed(
|
||||||
"curl -sSf localhost:9130/metrics | grep 'unifipoller_build_info{.\\+} 1'"
|
"curl -sSf localhost:9130/metrics | grep 'unpoller_build_info{.\\+} 1'"
|
||||||
)
|
)
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
@ -4,12 +4,12 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
buildGoModule rec {
|
buildGoModule rec {
|
||||||
pname = "unifi-poller";
|
pname = "unpoller";
|
||||||
version = "2.2.0";
|
version = "2.2.0";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "unifi-poller";
|
owner = "unpoller";
|
||||||
repo = "unifi-poller";
|
repo = "unpoller";
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
hash = "sha256-jPatTo+5nQ73AETXI88x/bma0wlY333DNvuyaYQTgz0=";
|
hash = "sha256-jPatTo+5nQ73AETXI88x/bma0wlY333DNvuyaYQTgz0=";
|
||||||
};
|
};
|
||||||
@ -26,7 +26,7 @@ buildGoModule rec {
|
|||||||
|
|
||||||
meta = with lib; {
|
meta = with lib; {
|
||||||
description = "Collect ALL UniFi Controller, Site, Device & Client Data - Export to InfluxDB or Prometheus";
|
description = "Collect ALL UniFi Controller, Site, Device & Client Data - Export to InfluxDB or Prometheus";
|
||||||
homepage = "https://github.com/unifi-poller/unifi-poller";
|
homepage = "https://github.com/unpoller/unpoller";
|
||||||
changelog = "https://github.com/unpoller/unpoller/releases/tag/v${version}";
|
changelog = "https://github.com/unpoller/unpoller/releases/tag/v${version}";
|
||||||
license = licenses.mit;
|
license = licenses.mit;
|
||||||
maintainers = with maintainers; [ ];
|
maintainers = with maintainers; [ ];
|
@ -1531,6 +1531,7 @@ mapAliases ({
|
|||||||
ufraw = throw "ufraw is unmaintained and has been removed from nixpkgs. Its successor, nufraw, doesn't seem to be stable enough. Consider using Darktable for now"; # Added 2020-01-11
|
ufraw = throw "ufraw is unmaintained and has been removed from nixpkgs. Its successor, nufraw, doesn't seem to be stable enough. Consider using Darktable for now"; # Added 2020-01-11
|
||||||
ultrastardx-beta = throw "'ultrastardx-beta' has been renamed to/replaced by 'ultrastardx'"; # Converted to throw 2022-02-22
|
ultrastardx-beta = throw "'ultrastardx-beta' has been renamed to/replaced by 'ultrastardx'"; # Converted to throw 2022-02-22
|
||||||
unicorn-emu = unicorn; # Added 2020-10-29
|
unicorn-emu = unicorn; # Added 2020-10-29
|
||||||
|
unifi-poller = unpoller; # Added 2022-11-24
|
||||||
unifiStable = unifi6; # Added 2020-12-28
|
unifiStable = unifi6; # Added 2020-12-28
|
||||||
unity3d = throw "'unity3d' is unmaintained, has seen no updates in years and depends on deprecated GTK2"; # Added 2022-06-16
|
unity3d = throw "'unity3d' is unmaintained, has seen no updates in years and depends on deprecated GTK2"; # Added 2022-06-16
|
||||||
untrunc = untrunc-anthwlock; # Added 2021-02-01
|
untrunc = untrunc-anthwlock; # Added 2021-02-01
|
||||||
|
@ -38058,7 +38058,7 @@ with pkgs;
|
|||||||
texlive = texlive.combined.scheme-medium;
|
texlive = texlive.combined.scheme-medium;
|
||||||
};
|
};
|
||||||
|
|
||||||
unifi-poller = callPackage ../servers/monitoring/unifi-poller {};
|
unpoller = callPackage ../servers/monitoring/unpoller {};
|
||||||
|
|
||||||
fac-build = callPackage ../development/tools/build-managers/fac {
|
fac-build = callPackage ../development/tools/build-managers/fac {
|
||||||
inherit (darwin.apple_sdk.frameworks) CoreServices;
|
inherit (darwin.apple_sdk.frameworks) CoreServices;
|
||||||
|
Loading…
Reference in New Issue
Block a user