forked from mirrors/nixpkgs
68 lines
1.6 KiB
Nix
68 lines
1.6 KiB
Nix
|
{ config, lib, pkgs }:
|
||
|
|
||
|
with lib;
|
||
|
|
||
|
let
|
||
|
cfg = config.services.prometheus.exporters.unifi;
|
||
|
in
|
||
|
{
|
||
|
port = 9130;
|
||
|
extraOpts = {
|
||
|
unifiAddress = mkOption {
|
||
|
type = types.str;
|
||
|
example = "https://10.0.0.1:8443";
|
||
|
description = ''
|
||
|
URL of the UniFi Controller API.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
unifiInsecure = mkOption {
|
||
|
type = types.bool;
|
||
|
default = false;
|
||
|
description = ''
|
||
|
If enabled skip the verification of the TLS certificate of the UniFi Controller API.
|
||
|
Use with caution.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
unifiUsername = mkOption {
|
||
|
type = types.str;
|
||
|
example = "ReadOnlyUser";
|
||
|
description = ''
|
||
|
username for authentication against UniFi Controller API.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
unifiPassword = mkOption {
|
||
|
type = types.str;
|
||
|
description = ''
|
||
|
Password for authentication against UniFi Controller API.
|
||
|
'';
|
||
|
};
|
||
|
|
||
|
unifiTimeout = mkOption {
|
||
|
type = types.str;
|
||
|
default = "5s";
|
||
|
example = "2m";
|
||
|
description = ''
|
||
|
Timeout including unit for UniFi Controller API requests.
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
serviceOpts = {
|
||
|
serviceConfig = {
|
||
|
DynamicUser = true;
|
||
|
ExecStart = ''
|
||
|
${pkgs.prometheus-unifi-exporter}/bin/unifi_exporter \
|
||
|
-telemetry.addr ${cfg.listenAddress}:${toString cfg.port} \
|
||
|
-unifi.addr ${cfg.unifiAddress} \
|
||
|
-unifi.username ${cfg.unifiUsername} \
|
||
|
-unifi.password ${cfg.unifiPassword} \
|
||
|
-unifi.timeout ${cfg.unifiTimeout} \
|
||
|
${optionalString cfg.unifiInsecure "-unifi.insecure" } \
|
||
|
${concatStringsSep " \\\n " cfg.extraFlags}
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
}
|