-
-
Notifications
You must be signed in to change notification settings - Fork 16.5k
nixos/openafsServer: give users the possibility of specifying privileged administrators declaratively #336793
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
1df58da
to
4d6eaca
Compare
4d6eaca
to
575d6bd
Compare
690ec8a
to
fa76fcf
Compare
I know this is not directly related to this PR but it also highlights the issue: Hard-coding The logic should be as follows:
This makes it an error to use The user interface could be made safer by abstracting Otherwise the PR looks fine. Thank you. |
@spacefrogg sorry for taking so long to respond, I have been on a hiatus from NixOS contributions, but now I'm back. I am sorry I cannot quite understand your comment, or get any suggestion on how to improve my PR from it. Did I do something wrong? Could you link any relevant issues that could be related to your concern? I might find some time to spare and work on it. If you do not find any reason to keep this PR from being merged, could you also approve it? |
I would ask you to update your PR in the following way:
|
While I was at it, I implemented the same logic for |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While I was at it, I implemented the same logic for
ExecStop
as well, so that we can save on another PR. Is it ok?
Perfect! :)
Since you removed the backport tag (understandable, although not having this functionality in release 24.11 for a 2-days deadline overrun is quite sad) should I further alter the release notes to target 25.05? |
6f3e338
to
050b7c5
Compare
Moved the release notes to the 25.05 file, as it became highly unlikely that this change could land in 24.11 (and maybe that's for the better?). |
Yes, you did right. Although, I removed the backport label, because these kinds of improvements are not to be backported. |
Sure, no offense taken, I understand my mistake, but please, if you modify something I did, let me at least know why you did it, however stupid my misstep might have been. Anyway, thanks for sticking with me until this point! It is difficult to find people willing to review these niche systems and actually know what they're doing. |
050b7c5
to
94b33d8
Compare
Resolved merge conflict on release notes, all other modifications left unchanged. |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/5030 |
Allow users to set the list of privileged administrators declaratively.
12d9603
to
1244dd0
Compare
Resolved merge conflict on release notes, all other modifications left unchanged. |
Description of changes
OpenAFS has the concept of "privileged administrators", a set of users that are given the ability of executing administrative operations on the local AFS server (see UserList(5)). In order to configure this list of users, the system administrator must construct it imperatively via successive
bos adduser
/bos removeuser
commands.This change introduces a new setting, named
privilegedAdministrators
, which allows a system administrator to configure the list of privileged users declaratively, overwriting any pre-existing list. The original behavior is retained by default, or by settingprivilegedAdministrators = null
.This addition represents a step forward towards achieving complete automatic deployment, easing the configuration of machines with volatile root partitions, and implementing automated tests.
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.