Skip to content

kitchenowl

Example

nix
{config, ...}: {
  kitchenowl = {
    enable = true;

    jwtSecretFile = config.sops.secrets."kitchenowl/jwt_secret".path;
    oidc = {
      enable = true;
      clientSecretFile = config.sops.secrets."kitchenowl/authelia/client_secret".path;
      clientSecretHash = "$pbkdf2-sha512$...";
    };
  };
}

Stack Options

nps.stacks.kitchenowl.containers.kitchenowl-backend

Alias of {option}services.podman.containers.kitchenowl-backend.

Type
plaintext
submodule
Declaration

nps.stacks.kitchenowl.containers.kitchenowl-web

Alias of {option}services.podman.containers.kitchenowl-web.

Type
plaintext
submodule
Declaration

nps.stacks.kitchenowl.enable

Whether to enable kitchenowl.

Type
plaintext
boolean
Default
nix
false
Example
nix
true
Declaration

nps.stacks.kitchenowl.jwtSecretFile

Path to the file containing the JWT secret.

Type
plaintext
absolute path
Declaration

nps.stacks.kitchenowl.oidc.clientSecretFile

The file containing the client secret for the OIDC client that will be registered in Authelia.

Type
plaintext
string
Declaration

nps.stacks.kitchenowl.oidc.clientSecretHash

The hashed client_secret. Will be set in the Authelia client config. For examples on how to generate a client secret, see

https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret

Type
plaintext
string
Declaration

nps.stacks.kitchenowl.oidc.enable

Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.

For details, see:

Type
plaintext
boolean
Default
nix
false
Declaration

nps.stacks.kitchenowl.oidc.userGroup

Users of this group will be able to log in

Type
plaintext
string
Default
nix
"kitchenowl_user"
Declaration