{ config, pkgs, lib, ... }: with lib; let cfg = config.services.uptime-kuma; in { options = { services.uptime-kuma = { enable = mkEnableOption (mdDoc "Uptime Kuma, this assumes a reverse proxy to be set."); package = mkOption { type = types.package; example = literalExpression "pkgs.uptime-kuma"; default = pkgs.uptime-kuma; defaultText = "pkgs.uptime-kuma"; description = lib.mdDoc "Uptime Kuma package to use."; }; settings = lib.mkOption { type = lib.types.submodule { freeformType = with lib.types; attrsOf str; }; default = { }; example = { PORT = "4000"; NODE_EXTRA_CA_CERTS = "/etc/ssl/certs/ca-certificates.crt"; }; description = lib.mdDoc '' Additional configuration for Uptime Kuma, see for supported values. ''; }; }; }; config = mkIf cfg.enable { services.uptime-kuma.settings = { DATA_DIR = "/var/lib/uptime-kuma/"; NODE_ENV = mkDefault "production"; }; systemd.services.uptime-kuma = { description = "Uptime Kuma"; after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; environment = cfg.settings; serviceConfig = { Type = "simple"; StateDirectory = "uptime-kuma"; DynamicUser = true; ExecStart = "${cfg.package}/bin/uptime-kuma-server"; Restart = "on-failure"; ProtectHome = true; ProtectSystem = "strict"; PrivateTmp = true; PrivateDevices = true; ProtectHostname = true; ProtectClock = true; ProtectKernelTunables = true; ProtectKernelModules = true; ProtectKernelLogs = true; ProtectControlGroups = true; NoNewPrivileges = true; RestrictRealtime = true; RestrictSUIDSGID = true; RemoveIPC = true; PrivateMounts = true; }; }; }; }