ops/nixos: remove ensurePermissions

This commit is contained in:
Luke Granger-Brown 2024-04-26 18:54:27 +01:00
parent b201fe69bb
commit de74e5d3f4
9 changed files with 0 additions and 28 deletions

View file

@ -46,9 +46,6 @@
ensureDatabases = [ "matrix-synapse" ]; ensureDatabases = [ "matrix-synapse" ];
ensureUsers = [{ ensureUsers = [{
name = "matrix-synapse"; name = "matrix-synapse";
ensurePermissions = {
"DATABASE \"matrix-synapse\"" = "ALL PRIVILEGES";
};
}]; }];
}; };
services.coturn = { services.coturn = {

View file

@ -45,9 +45,6 @@ in {
enable = true; enable = true;
ensureUsers = [{ ensureUsers = [{
name = "paperless"; name = "paperless";
ensurePermissions = {
"DATABASE paperless" = "ALL PRIVILEGES";
};
}]; }];
ensureDatabases = [ "paperless" ]; ensureDatabases = [ "paperless" ];
}; };

View file

@ -28,7 +28,6 @@
]; ];
ensureUsers = [{ ensureUsers = [{
name = "twitterchiver"; name = "twitterchiver";
ensurePermissions = { "DATABASE twitterchiver" = "ALL PRIVILEGES"; };
}]; }];
}; };
services.postgresqlBackup.enable = true; services.postgresqlBackup.enable = true;

View file

@ -191,10 +191,6 @@ in {
services.postgresql.ensureDatabases = [ "lukegb" ]; services.postgresql.ensureDatabases = [ "lukegb" ];
services.postgresql.ensureUsers = [{ services.postgresql.ensureUsers = [{
name = "lukegb"; name = "lukegb";
ensurePermissions = {
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
"DATABASE lukegb" = "ALL PRIVILEGES";
};
}]; }];
services.postgresql.authentication = '' services.postgresql.authentication = ''
local all all trust local all all trust

View file

@ -51,9 +51,6 @@ in
enable = true; enable = true;
ensureUsers = [{ ensureUsers = [{
name = "baserow"; name = "baserow";
ensurePermissions = {
"DATABASE baserow" = "ALL PRIVILEGES";
};
}]; }];
ensureDatabases = [ "baserow" ]; ensureDatabases = [ "baserow" ];
}; };

View file

@ -60,9 +60,6 @@ in
ensureDatabases = lib.mkAfter [ "quotesdb" ]; ensureDatabases = lib.mkAfter [ "quotesdb" ];
ensureUsers = lib.mkAfter [{ ensureUsers = lib.mkAfter [{
name = "quotesdb"; name = "quotesdb";
ensurePermissions = {
"DATABASE quotesdb" = "ALL PRIVILEGES";
};
}]; }];
}; };

View file

@ -269,10 +269,6 @@ in {
services.postgresql.ensureDatabases = [ "lukegb" ]; services.postgresql.ensureDatabases = [ "lukegb" ];
services.postgresql.ensureUsers = [{ services.postgresql.ensureUsers = [{
name = "lukegb"; name = "lukegb";
ensurePermissions = {
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
"DATABASE lukegb" = "ALL PRIVILEGES";
};
}]; }];
services.postgresql.authentication = '' services.postgresql.authentication = ''
local all all trust local all all trust

View file

@ -333,10 +333,6 @@ in {
services.postgresql.ensureDatabases = [ "lukegb" ]; services.postgresql.ensureDatabases = [ "lukegb" ];
services.postgresql.ensureUsers = [{ services.postgresql.ensureUsers = [{
name = "lukegb"; name = "lukegb";
ensurePermissions = {
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
"DATABASE lukegb" = "ALL PRIVILEGES";
};
}]; }];
services.postgresql.authentication = '' services.postgresql.authentication = ''
local all all trust local all all trust

View file

@ -269,9 +269,6 @@ in {
ensureDatabases = ["pancake"]; ensureDatabases = ["pancake"];
ensureUsers = [{ ensureUsers = [{
name = "pancake"; name = "pancake";
ensurePermissions = {
"pancake.*" = "ALL PRIVILEGES";
};
}]; }];
}; };