summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authortalyz <kim.lindberger@gmail.com>2022-01-17 11:46:51 +0100
committertalyz <kim.lindberger@gmail.com>2022-01-17 11:46:51 +0100
commit5010f4fff90803f2026a6d5c8a5bb005434091a1 (patch)
tree00000811b30388c8a814a45f73d9f94cb2570062 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent1ea75adb020b250a8459b6cadcb66543b6c1e217 (diff)
nixos/keycloak: Use LoadCredential to load secrets
Use systemd's LoadCredential mechanism to make the secret files available to the service. This gets rid of the privileged part of the ExecPreStart script which only served to copy these files and assign the correct permissions. There's been issues with this approach when used in combination with DynamicUser, where sometimes the user isn't created before the ExecPreStart script runs, causing the error install: invalid user ‘keycloak’ This should fix that issue. Unfortunately, all of the ExecPreStart script had to be moved to ExecStart, since credentials aren't provided to ExecPreStart. See https://github.com/systemd/systemd/issues/19604.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions