mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-02-19 18:44:13 +00:00
nixos/unifi: Add service module
This commit is contained in:
parent
0652ee16e4
commit
dfb596b49b
@ -138,6 +138,7 @@
|
|||||||
znc = 128;
|
znc = 128;
|
||||||
polipo = 129;
|
polipo = 129;
|
||||||
mopidy = 130;
|
mopidy = 130;
|
||||||
|
unifi = 131;
|
||||||
|
|
||||||
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
|
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
|
||||||
|
|
||||||
|
@ -233,6 +233,7 @@
|
|||||||
./services/networking/teamspeak3.nix
|
./services/networking/teamspeak3.nix
|
||||||
./services/networking/tftpd.nix
|
./services/networking/tftpd.nix
|
||||||
./services/networking/unbound.nix
|
./services/networking/unbound.nix
|
||||||
|
./services/networking/unifi.nix
|
||||||
./services/networking/vsftpd.nix
|
./services/networking/vsftpd.nix
|
||||||
./services/networking/wakeonlan.nix
|
./services/networking/wakeonlan.nix
|
||||||
./services/networking/websockify.nix
|
./services/networking/websockify.nix
|
||||||
|
87
nixos/modules/services/networking/unifi.nix
Normal file
87
nixos/modules/services/networking/unifi.nix
Normal file
@ -0,0 +1,87 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
with lib;
|
||||||
|
let
|
||||||
|
cfg = config.services.unifi;
|
||||||
|
stateDir = "/var/lib/unifi";
|
||||||
|
cmd = "@${pkgs.icedtea7_jre}/bin/java java -jar ${stateDir}/lib/ace.jar";
|
||||||
|
in
|
||||||
|
{
|
||||||
|
|
||||||
|
options = {
|
||||||
|
|
||||||
|
services.unifi.enable = mkOption {
|
||||||
|
type = types.uniq types.bool;
|
||||||
|
default = false;
|
||||||
|
description = ''
|
||||||
|
Whether or not to enable the unifi controller service.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
|
||||||
|
users.extraUsers.unifi = {
|
||||||
|
uid = config.ids.uids.unifi;
|
||||||
|
description = "UniFi controller daemon user";
|
||||||
|
home = "${stateDir}";
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.mounts = [
|
||||||
|
{
|
||||||
|
unitConfig.StopWhenUnneeded = true;
|
||||||
|
requiredBy = [ "unifi.service" ];
|
||||||
|
what = "${pkgs.unifi}/dl";
|
||||||
|
where = "${stateDir}/dl";
|
||||||
|
options = "bind";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
unitConfig.StopWhenUnneeded = true;
|
||||||
|
requiredBy = [ "unifi.service" ];
|
||||||
|
what = "${pkgs.unifi}/lib";
|
||||||
|
where = "${stateDir}/lib";
|
||||||
|
options = "bind";
|
||||||
|
}
|
||||||
|
{
|
||||||
|
unitConfig.StopWhenUnneeded = true;
|
||||||
|
requiredBy = [ "unifi.service" ];
|
||||||
|
what = "${pkgs.mongodb}/bin";
|
||||||
|
where = "${stateDir}/bin";
|
||||||
|
options = "bind";
|
||||||
|
}
|
||||||
|
];
|
||||||
|
|
||||||
|
systemd.services.unifi = {
|
||||||
|
description = "UniFi controller daemon";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
|
||||||
|
preStart = ''
|
||||||
|
# Ensure privacy of state
|
||||||
|
chown unifi "${stateDir}"
|
||||||
|
chmod 0700 "${stateDir}"
|
||||||
|
|
||||||
|
# Create the volatile webapps
|
||||||
|
mkdir -p "${stateDir}/webapps"
|
||||||
|
chown unifi "${stateDir}/webapps"
|
||||||
|
ln -s "${pkgs.unifi}/webapps/ROOT.war" "${stateDir}/webapps/ROOT.war"
|
||||||
|
'';
|
||||||
|
|
||||||
|
postStop = ''
|
||||||
|
rm "${stateDir}/webapps/ROOT.war"
|
||||||
|
'';
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
ExecStart = "${cmd} start";
|
||||||
|
ExecStop = "${cmd} stop";
|
||||||
|
User = "unifi";
|
||||||
|
PermissionsStartOnly = true;
|
||||||
|
UMask = "0077";
|
||||||
|
WorkingDirectory = "${stateDir}";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user