Skip to content

norish

Shared recipe app

Example

nix
{config, ...}: {
  nps.stacks.norish = {
    enable = true;

    masterKeyFile = config.sops.secrets."norish/master_key".path;
    db.passwordFile = config.sops.secrets."norish/db_password".path;
    oidc = {
      enable = true;
      clientSecretFile = config.sops.secrets."norish/authelia/client_secret".path;
      clientSecretHash = "$pbkdf2-sha512$...";
    };
  };
}

Stack Options

nps.stacks.norish.containers.norish

Alias of {option}services.podman.containers.norish.

Type
plaintext
submodule
Declaration

nps.stacks.norish.containers.norish-browser

Alias of {option}services.podman.containers.norish-browser.

Type
plaintext
submodule
Declaration

nps.stacks.norish.containers.norish-db

Alias of {option}services.podman.containers.norish-db.

Type
plaintext
submodule
Declaration

nps.stacks.norish.containers.norish-redis

Alias of {option}services.podman.containers.norish-redis.

Type
plaintext
submodule
Declaration

nps.stacks.norish.db.passwordFile

Path to the file containing the database password

Type
plaintext
absolute path
Declaration

nps.stacks.norish.db.username

Database user name

Type
plaintext
string
Default
nix
"norish"
Declaration

nps.stacks.norish.enable

Whether to enable norish.

Type
plaintext
boolean
Default
nix
false
Example
nix
true
Declaration

nps.stacks.norish.masterKeyFile

Path to the file containing the master encryption key. Can be generated with openssl rand -base64 32. See https://github.com/norish-recipes/norish?tab=readme-ov-file#required-variables

Type
plaintext
absolute path
Declaration

nps.stacks.norish.oidc.adminGroup

Users of this group will be assigned admin rights

Type
plaintext
string
Default
nix
"norish_admin"
Declaration

nps.stacks.norish.oidc.clientSecretFile

The file containing the client secret for the OIDC client that will be registered in Authelia.

For examples on how to generate a client secret, see

https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret

Type
plaintext
string
Example
nix
config.sops.secrets."immich/authelia/client_secret".path"
Declaration

nps.stacks.norish.oidc.clientSecretHash

The client secret hash. For examples on how to generate a client secret, see https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret

The value can be passed in multiple ways:

  1. As a literal string
  2. As an absolute path to a file containing the hash (toFile)
  3. As an absolute oath to a file containing the client_secret, in which case the hash will be automatically computed (toHash)
  4. As null

If left unset (null), the client secret will be read from the file specified in the clientSecretFile option and hashed automatically before being passed to the Authelia container.

Type
plaintext
null or string or (submodule)
Default
nix
null
Example
nix
# Literal String:
"$pbkdf2-sha512$310000$cbOAIWbfz3vCVXIPIp6d2A$J0klwULa6TvPRCU1HAfuKua/dMKTl8gbTYJz2N73ejGUu0LUGz/y3kwmJLuKuAYGg3WQOT0q9ZzVHHUvpKpgvQ"

# Client secret hash stored in a file
{ fromFile = config.sops.secrets."immich/client_secret_hash".path; }

# Client secret stored in a file: Hash will be computed dynamically
{ toHash = config.sops.secrets."immich/client_secret".path; }

# Null (default): Hash will be computed automatically based on the clientSecretFile option
# Equivalent to { toHash = cfg.oidc.clientSecretFile; }
null
Declaration

nps.stacks.norish.oidc.enable

Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.

For details, see:

Type
plaintext
boolean
Default
nix
false
Declaration

nps.stacks.norish.oidc.userGroup

Users of this group will be able to log in

Type
plaintext
string
Default
nix
"norish_user"
Declaration