* feat(release): add Homebrew tap support and fix artifact naming
- Fix platform naming: binaries now named core-{os}-{arch} instead of
just 'core', preventing collision when artifacts merge
- Add tar.gz archives for non-Windows builds (Homebrew requirement)
- Add update-tap job to alpha-release workflow that auto-updates
host-uk/homebrew-tap with checksums on each alpha release
- Add homebrew publisher to .core/release.yaml for formal releases
- Update install instructions to include brew install
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* feat(unifi): add UniFi Go SDK integration and CLI commands
- Add pkg/unifi SDK wrapping unpoller/unifi with TLS, config resolution,
and typed accessors for sites, clients, devices, networks, and routes
- Add CLI commands: unifi sites, clients, devices, networks, routes, config
- Register unifi commands in full variant build
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(release): set AppVersion ldflags, git config, and tap token
- Set -X pkg/cli.AppVersion in ldflags so core --version reports the
correct version instead of "dev"
- Add git config user.name/email in update-tap job so commit succeeds
- Use HOMEBREW_TAP_TOKEN secret instead of GITHUB_TOKEN for cross-repo
push to host-uk/homebrew-tap
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
* fix(unifi): address CodeRabbit review feedback
- Reject conflicting --wired and --wireless flags in clients command
- Complete --type flag help text with bgp and ospf route types
- URL-escape site name in routes API path
- Wrap all command errors with log.E for contextual diagnostics
- Set TLS MinVersion to 1.2 on UniFi client
- Simplify redundant fmt.Sprintf in Print calls
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
---------
Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
62 lines
2.3 KiB
Go
62 lines
2.3 KiB
Go
package unifi
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/host-uk/core/pkg/log"
|
|
)
|
|
|
|
// NetworkConf represents a UniFi network configuration entry.
|
|
type NetworkConf struct {
|
|
ID string `json:"_id"`
|
|
Name string `json:"name"`
|
|
Purpose string `json:"purpose"` // wan, corporate, remote-user-vpn
|
|
IPSubnet string `json:"ip_subnet"` // CIDR (e.g. "10.69.1.1/24")
|
|
VLAN int `json:"vlan"` // VLAN ID (0 = untagged)
|
|
VLANEnabled bool `json:"vlan_enabled"` // Whether VLAN tagging is active
|
|
Enabled bool `json:"enabled"`
|
|
NetworkGroup string `json:"networkgroup"` // LAN, WAN, WAN2
|
|
NetworkIsolationEnabled bool `json:"network_isolation_enabled"`
|
|
InternetAccessEnabled bool `json:"internet_access_enabled"`
|
|
IsNAT bool `json:"is_nat"`
|
|
DHCPEnabled bool `json:"dhcpd_enabled"`
|
|
DHCPStart string `json:"dhcpd_start"`
|
|
DHCPStop string `json:"dhcpd_stop"`
|
|
DHCPDNS1 string `json:"dhcpd_dns_1"`
|
|
DHCPDNS2 string `json:"dhcpd_dns_2"`
|
|
DHCPDNSEnabled bool `json:"dhcpd_dns_enabled"`
|
|
MDNSEnabled bool `json:"mdns_enabled"`
|
|
FirewallZoneID string `json:"firewall_zone_id"`
|
|
GatewayType string `json:"gateway_type"`
|
|
VPNType string `json:"vpn_type"`
|
|
WANType string `json:"wan_type"` // pppoe, dhcp, static
|
|
WANNetworkGroup string `json:"wan_networkgroup"`
|
|
}
|
|
|
|
// networkConfResponse is the raw API response wrapper.
|
|
type networkConfResponse struct {
|
|
Data []NetworkConf `json:"data"`
|
|
}
|
|
|
|
// GetNetworks returns all network configurations from the controller.
|
|
// Uses the raw controller API for the full networkconf data.
|
|
func (c *Client) GetNetworks(siteName string) ([]NetworkConf, error) {
|
|
if siteName == "" {
|
|
siteName = "default"
|
|
}
|
|
|
|
path := fmt.Sprintf("/api/s/%s/rest/networkconf", siteName)
|
|
|
|
raw, err := c.api.GetJSON(path)
|
|
if err != nil {
|
|
return nil, log.E("unifi.GetNetworks", "failed to fetch networks", err)
|
|
}
|
|
|
|
var resp networkConfResponse
|
|
if err := json.Unmarshal(raw, &resp); err != nil {
|
|
return nil, log.E("unifi.GetNetworks", "failed to parse networks", err)
|
|
}
|
|
|
|
return resp.Data, nil
|
|
}
|