02324756dd
A recent release added systemd notify support, so I migrated our unit
towards that. The NixOS test did not reveal that the unit would not fully
activate.
Reverts: 165326d2c
(partially)
Closes: #286977
135 lines
3.8 KiB
Nix
135 lines
3.8 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.zigbee2mqtt;
|
|
|
|
format = pkgs.formats.yaml { };
|
|
configFile = format.generate "zigbee2mqtt.yaml" cfg.settings;
|
|
|
|
in
|
|
{
|
|
meta.maintainers = with maintainers; [ sweber hexa ];
|
|
|
|
imports = [
|
|
# Remove warning before the 21.11 release
|
|
(mkRenamedOptionModule [ "services" "zigbee2mqtt" "config" ] [ "services" "zigbee2mqtt" "settings" ])
|
|
];
|
|
|
|
options.services.zigbee2mqtt = {
|
|
enable = mkEnableOption (lib.mdDoc "zigbee2mqtt service");
|
|
|
|
package = mkPackageOption pkgs "zigbee2mqtt" { };
|
|
|
|
dataDir = mkOption {
|
|
description = lib.mdDoc "Zigbee2mqtt data directory";
|
|
default = "/var/lib/zigbee2mqtt";
|
|
type = types.path;
|
|
};
|
|
|
|
settings = mkOption {
|
|
type = format.type;
|
|
default = { };
|
|
example = literalExpression ''
|
|
{
|
|
homeassistant = config.services.home-assistant.enable;
|
|
permit_join = true;
|
|
serial = {
|
|
port = "/dev/ttyACM1";
|
|
};
|
|
}
|
|
'';
|
|
description = lib.mdDoc ''
|
|
Your {file}`configuration.yaml` as a Nix attribute set.
|
|
Check the [documentation](https://www.zigbee2mqtt.io/information/configuration.html)
|
|
for possible options.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = mkIf (cfg.enable) {
|
|
|
|
# preset config values
|
|
services.zigbee2mqtt.settings = {
|
|
homeassistant = mkDefault config.services.home-assistant.enable;
|
|
permit_join = mkDefault false;
|
|
mqtt = {
|
|
base_topic = mkDefault "zigbee2mqtt";
|
|
server = mkDefault "mqtt://localhost:1883";
|
|
};
|
|
serial.port = mkDefault "/dev/ttyACM0";
|
|
# reference device/group configuration, that is kept in a separate file
|
|
# to prevent it being overwritten in the units ExecStartPre script
|
|
devices = mkDefault "devices.yaml";
|
|
groups = mkDefault "groups.yaml";
|
|
};
|
|
|
|
systemd.services.zigbee2mqtt = {
|
|
description = "Zigbee2mqtt Service";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
environment.ZIGBEE2MQTT_DATA = cfg.dataDir;
|
|
serviceConfig = {
|
|
ExecStart = "${cfg.package}/bin/zigbee2mqtt";
|
|
User = "zigbee2mqtt";
|
|
Group = "zigbee2mqtt";
|
|
WorkingDirectory = cfg.dataDir;
|
|
Restart = "on-failure";
|
|
|
|
# Hardening
|
|
CapabilityBoundingSet = "";
|
|
DeviceAllow = [
|
|
config.services.zigbee2mqtt.settings.serial.port
|
|
];
|
|
DevicePolicy = "closed";
|
|
LockPersonality = true;
|
|
MemoryDenyWriteExecute = false;
|
|
NoNewPrivileges = true;
|
|
PrivateDevices = false; # prevents access to /dev/serial, because it is set 0700 root:root
|
|
PrivateUsers = true;
|
|
PrivateTmp = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectProc = "invisible";
|
|
ProcSubset = "pid";
|
|
ProtectSystem = "strict";
|
|
ReadWritePaths = cfg.dataDir;
|
|
RemoveIPC = true;
|
|
RestrictAddressFamilies = [
|
|
"AF_INET"
|
|
"AF_INET6"
|
|
];
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SupplementaryGroups = [
|
|
"dialout"
|
|
];
|
|
SystemCallArchitectures = "native";
|
|
SystemCallFilter = [
|
|
"@system-service @pkey"
|
|
"~@privileged @resources"
|
|
];
|
|
UMask = "0077";
|
|
};
|
|
preStart = ''
|
|
cp --no-preserve=mode ${configFile} "${cfg.dataDir}/configuration.yaml"
|
|
'';
|
|
};
|
|
|
|
users.users.zigbee2mqtt = {
|
|
home = cfg.dataDir;
|
|
createHome = true;
|
|
group = "zigbee2mqtt";
|
|
uid = config.ids.uids.zigbee2mqtt;
|
|
};
|
|
|
|
users.groups.zigbee2mqtt.gid = config.ids.gids.zigbee2mqtt;
|
|
};
|
|
}
|