kanidm: allow hydra to cache alternative build with secret provisioning (#358782)

This commit is contained in:
Ilan Joselevich 2024-11-28 19:35:25 +02:00 committed by GitHub
commit c7c136a610
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 6 additions and 2 deletions

View File

@ -734,7 +734,7 @@ in
-> cfg.package.enableSecretProvisioning;
message = ''
Specifying an admin account password or oauth2 basicSecretFile requires kanidm to be built with the secret provisioning patches.
You may want to set `services.kanidm.package = pkgs.kanidm.withSecretProvisioning;`.
You may want to set `services.kanidm.package = pkgs.kanidmWithSecretProvisioning;`.
'';
}
# Entity names must be globally unique:

View File

@ -23,7 +23,7 @@ import ./make-test-python.nix (
{ pkgs, lib, ... }:
{
services.kanidm = {
package = pkgs.kanidm.withSecretProvisioning;
package = pkgs.kanidmWithSecretProvisioning;
enableServer = true;
serverSettings = {
origin = "https://${serverDomain}";

View File

@ -11731,6 +11731,10 @@ with pkgs;
jitsi-videobridge = callPackage ../servers/jitsi-videobridge { };
kanidmWithSecretProvisioning = callPackage ../by-name/ka/kanidm/package.nix {
enableSecretProvisioning = true;
};
knot-resolver = callPackage ../servers/dns/knot-resolver {
systemd = systemdMinimal; # in closure already anyway
};