diff --git a/nixos/modules/services/security/kanidm.nix b/nixos/modules/services/security/kanidm.nix index 67218eb29880..ab85eed34eea 100644 --- a/nixos/modules/services/security/kanidm.nix +++ b/nixos/modules/services/security/kanidm.nix @@ -734,7 +734,7 @@ in -> cfg.package.enableSecretProvisioning; message = '' Specifying an admin account password or oauth2 basicSecretFile requires kanidm to be built with the secret provisioning patches. - You may want to set `services.kanidm.package = pkgs.kanidm.withSecretProvisioning;`. + You may want to set `services.kanidm.package = pkgs.kanidmWithSecretProvisioning;`. ''; } # Entity names must be globally unique: diff --git a/nixos/tests/kanidm-provisioning.nix b/nixos/tests/kanidm-provisioning.nix index 27176c2086fe..b45b972fe449 100644 --- a/nixos/tests/kanidm-provisioning.nix +++ b/nixos/tests/kanidm-provisioning.nix @@ -23,7 +23,7 @@ import ./make-test-python.nix ( { pkgs, lib, ... }: { services.kanidm = { - package = pkgs.kanidm.withSecretProvisioning; + package = pkgs.kanidmWithSecretProvisioning; enableServer = true; serverSettings = { origin = "https://${serverDomain}"; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 7543000e7961..c2f67256ff3f 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -11761,6 +11761,10 @@ with pkgs; jitsi-videobridge = callPackage ../servers/jitsi-videobridge { }; + kanidmWithSecretProvisioning = callPackage ../by-name/ka/kanidm/package.nix { + enableSecretProvisioning = true; + }; + knot-resolver = callPackage ../servers/dns/knot-resolver { systemd = systemdMinimal; # in closure already anyway };