forked from mirrors/nixpkgs
300226261f
unifi does not shut down properly when stopped via systemd (it always exits with SIGTERM exit status) because systemd wants stop commands to not exit before the main command is gone and unifi does not comply. the easiest way around this is to have systemd send an ignored signal after the stop command has exited. unifi may still throw exceptions during shutdown, but it *does* exit cleanly as far as systemd is concerned now.
226 lines
6.8 KiB
Nix
226 lines
6.8 KiB
Nix
{ config, lib, pkgs, utils, ... }:
|
|
with lib;
|
|
let
|
|
cfg = config.services.unifi;
|
|
stateDir = "/var/lib/unifi";
|
|
cmd = ''
|
|
@${cfg.jrePackage}/bin/java java \
|
|
${optionalString (cfg.initialJavaHeapSize != null) "-Xms${(toString cfg.initialJavaHeapSize)}m"} \
|
|
${optionalString (cfg.maximumJavaHeapSize != null) "-Xmx${(toString cfg.maximumJavaHeapSize)}m"} \
|
|
-jar ${stateDir}/lib/ace.jar
|
|
'';
|
|
mountPoints = [
|
|
{
|
|
what = "${cfg.unifiPackage}/dl";
|
|
where = "${stateDir}/dl";
|
|
}
|
|
{
|
|
what = "${cfg.unifiPackage}/lib";
|
|
where = "${stateDir}/lib";
|
|
}
|
|
{
|
|
what = "${cfg.mongodbPackage}/bin";
|
|
where = "${stateDir}/bin";
|
|
}
|
|
{
|
|
what = "${cfg.dataDir}";
|
|
where = "${stateDir}/data";
|
|
}
|
|
];
|
|
systemdMountPoints = map (m: "${utils.escapeSystemdPath m.where}.mount") mountPoints;
|
|
in
|
|
{
|
|
|
|
options = {
|
|
|
|
services.unifi.enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether or not to enable the unifi controller service.
|
|
'';
|
|
};
|
|
|
|
services.unifi.jrePackage = mkOption {
|
|
type = types.package;
|
|
default = pkgs.jre8;
|
|
defaultText = literalExpression "pkgs.jre8";
|
|
description = ''
|
|
The JRE package to use. Check the release notes to ensure it is supported.
|
|
'';
|
|
};
|
|
|
|
services.unifi.unifiPackage = mkOption {
|
|
type = types.package;
|
|
default = pkgs.unifiLTS;
|
|
defaultText = literalExpression "pkgs.unifiLTS";
|
|
description = ''
|
|
The unifi package to use.
|
|
'';
|
|
};
|
|
|
|
services.unifi.mongodbPackage = mkOption {
|
|
type = types.package;
|
|
default = pkgs.mongodb;
|
|
defaultText = literalExpression "pkgs.mongodb";
|
|
description = ''
|
|
The mongodb package to use.
|
|
'';
|
|
};
|
|
|
|
services.unifi.dataDir = mkOption {
|
|
type = types.str;
|
|
default = "${stateDir}/data";
|
|
description = ''
|
|
Where to store the database and other data.
|
|
|
|
This directory will be bind-mounted to ${stateDir}/data as part of the service startup.
|
|
'';
|
|
};
|
|
|
|
services.unifi.openPorts = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Whether or not to open the minimum required ports on the firewall.
|
|
|
|
This is necessary to allow firmware upgrades and device discovery to
|
|
work. For remote login, you should additionally open (or forward) port
|
|
8443.
|
|
'';
|
|
};
|
|
|
|
services.unifi.initialJavaHeapSize = mkOption {
|
|
type = types.nullOr types.int;
|
|
default = null;
|
|
example = 1024;
|
|
description = ''
|
|
Set the initial heap size for the JVM in MB. If this option isn't set, the
|
|
JVM will decide this value at runtime.
|
|
'';
|
|
};
|
|
|
|
services.unifi.maximumJavaHeapSize = mkOption {
|
|
type = types.nullOr types.int;
|
|
default = null;
|
|
example = 4096;
|
|
description = ''
|
|
Set the maximimum heap size for the JVM in MB. If this option isn't set, the
|
|
JVM will decide this value at runtime.
|
|
'';
|
|
};
|
|
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
users.users.unifi = {
|
|
isSystemUser = true;
|
|
group = "unifi";
|
|
description = "UniFi controller daemon user";
|
|
home = "${stateDir}";
|
|
};
|
|
users.groups.unifi = {};
|
|
|
|
networking.firewall = mkIf cfg.openPorts {
|
|
# https://help.ubnt.com/hc/en-us/articles/218506997
|
|
allowedTCPPorts = [
|
|
8080 # Port for UAP to inform controller.
|
|
8880 # Port for HTTP portal redirect, if guest portal is enabled.
|
|
8843 # Port for HTTPS portal redirect, ditto.
|
|
6789 # Port for UniFi mobile speed test.
|
|
];
|
|
allowedUDPPorts = [
|
|
3478 # UDP port used for STUN.
|
|
10001 # UDP port used for device discovery.
|
|
];
|
|
};
|
|
|
|
# We must create the binary directories as bind mounts instead of symlinks
|
|
# This is because the controller resolves all symlinks to absolute paths
|
|
# to be used as the working directory.
|
|
systemd.mounts = map ({ what, where }: {
|
|
bindsTo = [ "unifi.service" ];
|
|
partOf = [ "unifi.service" ];
|
|
unitConfig.RequiresMountsFor = stateDir;
|
|
options = "bind";
|
|
what = what;
|
|
where = where;
|
|
}) mountPoints;
|
|
|
|
systemd.tmpfiles.rules = [
|
|
"d '${stateDir}' 0700 unifi - - -"
|
|
"d '${stateDir}/data' 0700 unifi - - -"
|
|
"d '${stateDir}/webapps' 0700 unifi - - -"
|
|
"L+ '${stateDir}/webapps/ROOT' - - - - ${cfg.unifiPackage}/webapps/ROOT"
|
|
];
|
|
|
|
systemd.services.unifi = {
|
|
description = "UniFi controller daemon";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ] ++ systemdMountPoints;
|
|
partOf = systemdMountPoints;
|
|
bindsTo = systemdMountPoints;
|
|
unitConfig.RequiresMountsFor = stateDir;
|
|
# This a HACK to fix missing dependencies of dynamic libs extracted from jars
|
|
environment.LD_LIBRARY_PATH = with pkgs.stdenv; "${cc.cc.lib}/lib";
|
|
# Make sure package upgrades trigger a service restart
|
|
restartTriggers = [ cfg.unifiPackage cfg.mongodbPackage ];
|
|
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
ExecStart = "${(removeSuffix "\n" cmd)} start";
|
|
ExecStop = "${(removeSuffix "\n" cmd)} stop";
|
|
Restart = "on-failure";
|
|
TimeoutSec = "5min";
|
|
User = "unifi";
|
|
UMask = "0077";
|
|
WorkingDirectory = "${stateDir}";
|
|
# the stop command exits while the main process is still running, and unifi
|
|
# wants to manage its own child processes. this means we have to set KillSignal
|
|
# to something the main process ignores, otherwise every stop will have unifi.service
|
|
# fail with SIGTERM status.
|
|
KillSignal = "SIGCONT";
|
|
|
|
# Hardening
|
|
AmbientCapabilities = "";
|
|
CapabilityBoundingSet = "";
|
|
# ProtectClock= adds DeviceAllow=char-rtc r
|
|
DeviceAllow = "";
|
|
DevicePolicy = "closed";
|
|
LockPersonality = true;
|
|
NoNewPrivileges = true;
|
|
PrivateDevices = true;
|
|
PrivateMounts = true;
|
|
PrivateTmp = true;
|
|
PrivateUsers = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectSystem = "strict";
|
|
RemoveIPC = true;
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SystemCallErrorNumber = "EPERM";
|
|
SystemCallFilter = [ "@system-service" ];
|
|
|
|
# Required for ProtectSystem=strict
|
|
BindPaths = [ stateDir ];
|
|
|
|
# Needs network access
|
|
PrivateNetwork = false;
|
|
# Cannot be true due to OpenJDK
|
|
MemoryDenyWriteExecute = false;
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
meta.maintainers = with lib.maintainers; [ erictapen ];
|
|
}
|