Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
-
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Thanks for sharing! I'm so annoyed of Yazio, that I was close to start developing a simple calories tracker myself. Glad I can just use this instead.
You asked for feature ideas in a comment. How about OIDC support? My wife is good at forgetting (to add) her passwords (to a password manager). So instead of resetting password xyz each week, i installed pocketid and integrated it to every app I host, that supports OIDC.
OIDC has been planned, but since now i have had multiple requests, i have started working on it. Will be implemented most likely in next RC release. Keep an eye out!
Awesome! Thanks
OIDC feature has been added to app in latest build (1.0.0-rc9). Please test and let me know how it works for you. I successfully tested with Authentik.
Thanks for implementing it that fast! Unfortunately I wasn't able to test it.
I found the new section in the readme. So I followed it. I created an admin account (which confused me a bit - my user already had admin permissions. So why is it necessary to create another admin user?). Then I wanted to logout and login with the admin again. But I wasn't able to figure out how to log out. So I just deleted the cookies and local storage.
After that I was greeted by the login page. So I logged in as admin, entered the User Management - and found an interface to manage users. Ok, sounds logic to find a user management tool in the "user management" menu entry. But the readme said, that there should be oidc settings. Maybe they got lost in a merge conflict or something like that. I was testing on rc12.
Anyways I would prefer an env variable to configure oidc. I like to separate the technical configuration (like credentials, etc) from the user space configuration.
This comment may sound super negative, but I'm actually very grateful you addressed this feature. Thanks!
Thanks for the detailed walkthrough. A few of the rough edges you ran into are fixed in the latest release:
The admin-account confusion makes sense in hindsight. If you were already running NutriTrace single-user, you genuinely didn't need an admin account, that step exists because OIDC requires user management to be on. The README now spells that out as a prerequisite up front so it doesn't feel like surprise paperwork.
Logout has a real home now. Profile lives at the very top of Settings as a card showing your name and photo, and Log Out is right there inside it. No more digging through the cookie jar.
The "where are the OIDC settings" question was on me. They were buried inside User Management. They're now their own top-level section called Authentication, sitting right under User Management, with presets for Authentik, Keycloak, Authelia, Pocket ID, Auth0, Google, and a generic OIDC option for anything else.
And on your env-var preference, that's in too. You can configure providers entirely from .env or docker-compose.yml. Single-provider shorthand:
OIDC_ISSUER=https://auth.example.com/ OIDC_CLIENT_ID=nutritrace OIDC_CLIENT_SECRET=... OIDC_DISPLAY_NAME=Authentik OIDC_REDIRECT_URIS=https://nutritrace.example.com/api/auth/oidc/callback/1
Multi-provider works with OIDC_PROVIDER_2_, OIDC_PROVIDER_3_, etc. Anything you define this way shows up in the Settings UI with a lock badge and is read-only there, so it's clear where the source of truth lives. Full doc in .env.example and the README.
Pull the latest and give it another shot when you have a minute. Please confirm the env-var path actually works for your IdP when you have a chance.
Thanks again.