kanidm: allow hydra to cache alternative build with secret provisioning
This commit is contained in:
parent
924dd67481
commit
91cbd96ffe
@ -734,7 +734,7 @@ in
|
||||
-> cfg.package.enableSecretProvisioning;
|
||||
message = ''
|
||||
Specifying an admin account password or oauth2 basicSecretFile requires kanidm to be built with the secret provisioning patches.
|
||||
You may want to set `services.kanidm.package = pkgs.kanidm.withSecretProvisioning;`.
|
||||
You may want to set `services.kanidm.package = pkgs.kanidmWithSecretProvisioning;`.
|
||||
'';
|
||||
}
|
||||
# Entity names must be globally unique:
|
||||
|
@ -23,7 +23,7 @@ import ./make-test-python.nix (
|
||||
{ pkgs, lib, ... }:
|
||||
{
|
||||
services.kanidm = {
|
||||
package = pkgs.kanidm.withSecretProvisioning;
|
||||
package = pkgs.kanidmWithSecretProvisioning;
|
||||
enableServer = true;
|
||||
serverSettings = {
|
||||
origin = "https://${serverDomain}";
|
||||
|
@ -11761,6 +11761,10 @@ with pkgs;
|
||||
|
||||
jitsi-videobridge = callPackage ../servers/jitsi-videobridge { };
|
||||
|
||||
kanidmWithSecretProvisioning = callPackage ../by-name/ka/kanidm/package.nix {
|
||||
enableSecretProvisioning = true;
|
||||
};
|
||||
|
||||
knot-resolver = callPackage ../servers/dns/knot-resolver {
|
||||
systemd = systemdMinimal; # in closure already anyway
|
||||
};
|
||||
|
Loading…
Reference in New Issue
Block a user