mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-16 06:45:16 +01:00
81 lines
2.2 KiB
Nix
81 lines
2.2 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.uptime-kuma;
|
|
in
|
|
{
|
|
|
|
meta.maintainers = [ lib.maintainers.julienmalka ];
|
|
|
|
options = {
|
|
services.uptime-kuma = {
|
|
enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set");
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default = pkgs.uptime-kuma;
|
|
defaultText = literalExpression "pkgs.uptime-kuma";
|
|
description = lib.mdDoc "Uptime Kuma package to use.";
|
|
};
|
|
|
|
appriseSupport = mkEnableOption (mdDoc "apprise support for notifications");
|
|
|
|
settings = lib.mkOption {
|
|
type = lib.types.submodule { freeformType = with lib.types; attrsOf str; };
|
|
default = { };
|
|
example = {
|
|
PORT = "4000";
|
|
NODE_EXTRA_CA_CERTS = "/etc/ssl/certs/ca-certificates.crt";
|
|
};
|
|
description = lib.mdDoc ''
|
|
Additional configuration for Uptime Kuma, see
|
|
<https://github.com/louislam/uptime-kuma/wiki/Environment-Variables>
|
|
for supported values.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
services.uptime-kuma.settings = {
|
|
DATA_DIR = "/var/lib/uptime-kuma/";
|
|
NODE_ENV = mkDefault "production";
|
|
HOST = mkDefault "127.0.0.1";
|
|
PORT = mkDefault "3001";
|
|
};
|
|
|
|
systemd.services.uptime-kuma = {
|
|
description = "Uptime Kuma";
|
|
after = [ "network.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
environment = cfg.settings;
|
|
path = with pkgs; [ unixtools.ping ] ++ lib.optional cfg.appriseSupport apprise;
|
|
serviceConfig = {
|
|
Type = "simple";
|
|
StateDirectory = "uptime-kuma";
|
|
DynamicUser = true;
|
|
ExecStart = "${cfg.package}/bin/uptime-kuma-server";
|
|
Restart = "on-failure";
|
|
ProtectHome = true;
|
|
ProtectSystem = "strict";
|
|
PrivateTmp = true;
|
|
PrivateDevices = true;
|
|
ProtectHostname = true;
|
|
ProtectClock = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectControlGroups = true;
|
|
NoNewPrivileges = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
RemoveIPC = true;
|
|
PrivateMounts = true;
|
|
};
|
|
};
|
|
};
|
|
}
|
|
|