-
-
Notifications
You must be signed in to change notification settings - Fork 16.6k
lldap: document settings related to passwords and secrets #425912
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For adding logic on top of lldap settings, please just document the relevant settings key in the config.services.lldap.settings
freeform type, instead of introducing top-level options.
0433dd2
to
8d75a60
Compare
081018c
to
d7b92a6
Compare
Btw in an ulterior version of LLDAP, this commit makes it mandatory to set the LLDAP password. I propose to leave this PR as-is and I'll make the |
sounds good to me. there are more warnings that might be good to have, like e.g. when using non - |
d7b92a6
to
3b7d45e
Compare
Has been merged as part of #425918 |
Provides first class support for secrets used by LLDAP: the admin password and the jwt secret. Also provides first class support for the option to replace the secrets on each service start.
This PR precedes PR #425923 which adds first class support for the LLDAP bootstrap script.
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.