kitchenowl
Example
nix
{config, ...}: {
kitchenowl = {
enable = true;
jwtSecretFile = config.sops.secrets."kitchenowl/jwt_secret".path;
oidc = {
enable = true;
clientSecretFile = config.sops.secrets."kitchenowl/authelia/client_secret".path;
clientSecretHash = "$pbkdf2-sha512$...";
};
};
}Stack Options
nps.stacks.kitchenowl.containers.kitchenowl-backend
Alias of {option}services.podman.containers.kitchenowl-backend.
nps.stacks.kitchenowl.containers.kitchenowl-web
Alias of {option}services.podman.containers.kitchenowl-web.
nps.stacks.kitchenowl.enable
Whether to enable kitchenowl.
nps.stacks.kitchenowl.jwtSecretFile
Path to the file containing the JWT secret.
nps.stacks.kitchenowl.oidc.clientSecretFile
The file containing the client secret for the OIDC client that will be registered in Authelia.
nps.stacks.kitchenowl.oidc.clientSecretHash
The hashed client_secret. Will be set in the Authelia client config. For examples on how to generate a client secret, see
https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
nps.stacks.kitchenowl.oidc.enable
Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.
For details, see:
nps.stacks.kitchenowl.oidc.userGroup
Users of this group will be able to log in