karakeep
Example
{config, ...}: {
karakeep = {
enable = true;
oidc = {
enable = true;
clientSecretHash = "$pbkdf2-sha512$...";
clientSecretFile = config.sops.secrets."karakeep/authelia/client_secret".path;
};
nextauthSecretFile = config.sops.secrets."karakeep/nextauth_secret".path;
meiliMasterKeyFile = config.sops.secrets."karakeep/meili_master_key".path;
containers.karakeep.extraEnv = {
DISABLE_SIGNUPS = true;
DISABLE_PASSWORD_AUTH = true;
};
};
}Stack Options
nps.stacks.karakeep.containers.karakeep
Alias of {option}services.podman.containers.karakeep.
nps.stacks.karakeep.containers.karakeep-chrome
Alias of {option}services.podman.containers.karakeep-chrome.
nps.stacks.karakeep.containers.karakeep-meilisearch
Alias of {option}services.podman.containers.karakeep-meilisearch.
nps.stacks.karakeep.enable
Whether to enable karakeep.
nps.stacks.karakeep.meiliMasterKeyFile
Path to file containing the MEILI_MASTER_KEY
nps.stacks.karakeep.nextauthSecretFile
Path to file containing the NEXTAUTH_SECRET
nps.stacks.karakeep.oidc.clientSecretFile
The file containing the client secret for the OIDC client that will be registered in Authelia.
nps.stacks.karakeep.oidc.clientSecretHash
The hashed client_secret. Will be set in the Authelia client config. For examples on how to generate a client secret, see
https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
nps.stacks.karakeep.oidc.enable
Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.
For details, see:
nps.stacks.karakeep.oidc.userGroup
Users of this group will be able to log in