vikunja
Example
{config, ...}: {
vikunja = {
enable = true;
jwtSecretFile = config.sops.secrets."vikunja/jwt_secret".path;
settings = {
service.enableregistration = false;
auth.local.enabled = false;
};
oidc = {
enable = true;
clientSecretFile = config.sops.secrets."vikunja/authelia/client_secret".path;
clientSecretHash = "$pbkdf2-sha512$...";
};
};
}Stack Options
nps.stacks.vikunja.containers.vikunja
Alias of {option}services.podman.containers.vikunja.
nps.stacks.vikunja.containers.vikunja-db
Alias of {option}services.podman.containers.vikunja-db.
nps.stacks.vikunja.db.passwordFile
The file containing the PostgreSQL password for the database. Only used if db.type is set to "postgres".
nps.stacks.vikunja.db.type
Type of the database to use.
Can be set to "sqlite" or "postgres".
If set to "postgres", the passwordFile option must be set.
nps.stacks.vikunja.db.username
The PostgreSQL user to use for the database. Only used if db.type is set to "postgres".
nps.stacks.vikunja.enable
Whether to enable vikunja.
nps.stacks.vikunja.jwtSecretFile
Path to the file containing the JWT secret.
See https://vikunja.io/docs/config-options/#1-service-JWTSecret
nps.stacks.vikunja.oidc.clientSecretFile
The file containing the client secret for the OIDC client that will be registered in Authelia.
nps.stacks.vikunja.oidc.clientSecretHash
The hashed client_secret. Will be set in the Authelia client config. For examples on how to generate a client secret, see
https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
nps.stacks.vikunja.oidc.enable
Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.
For details, see:
nps.stacks.vikunja.oidc.userGroup
Users of this group will be able to log in
nps.stacks.vikunja.settings
Extra settings being provided as the /etc/vikunja/config.yml file.