Loading nixos/modules/services/security/kanidm.nix +5 −12 Original line number Diff line number Diff line Loading @@ -54,15 +54,10 @@ let ++ optional (cfg.provision.extraJsonFile != null) cfg.provision.extraJsonFile ++ mapAttrsToList (_: x: x.basicSecretFile) cfg.provision.systems.oauth2 ); secretDirectories = unique ( map builtins.dirOf ( [ secretPaths = [ cfg.serverSettings.tls_chain cfg.serverSettings.tls_key ] ++ optionals cfg.provision.enable provisionSecretFiles ) ); ] ++ optionals cfg.provision.enable provisionSecretFiles; # Merge bind mount paths and remove paths where a prefix is already mounted. # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is already in the mount Loading Loading @@ -881,7 +876,7 @@ in ( defaultServiceConfig // { BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ secretDirectories); BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ secretPaths); } ) { Loading @@ -895,8 +890,6 @@ in BindPaths = [ # To create the socket "/run/kanidmd:/run/kanidmd" # To store backups cfg.serverSettings.online_backup.path ] Loading Loading
nixos/modules/services/security/kanidm.nix +5 −12 Original line number Diff line number Diff line Loading @@ -54,15 +54,10 @@ let ++ optional (cfg.provision.extraJsonFile != null) cfg.provision.extraJsonFile ++ mapAttrsToList (_: x: x.basicSecretFile) cfg.provision.systems.oauth2 ); secretDirectories = unique ( map builtins.dirOf ( [ secretPaths = [ cfg.serverSettings.tls_chain cfg.serverSettings.tls_key ] ++ optionals cfg.provision.enable provisionSecretFiles ) ); ] ++ optionals cfg.provision.enable provisionSecretFiles; # Merge bind mount paths and remove paths where a prefix is already mounted. # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is already in the mount Loading Loading @@ -881,7 +876,7 @@ in ( defaultServiceConfig // { BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ secretDirectories); BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ secretPaths); } ) { Loading @@ -895,8 +890,6 @@ in BindPaths = [ # To create the socket "/run/kanidmd:/run/kanidmd" # To store backups cfg.serverSettings.online_backup.path ] Loading