allow ip range db
This commit is contained in:
@@ -19,6 +19,7 @@ in {
|
|||||||
local all all trust
|
local all all trust
|
||||||
host all all 127.0.0.1/32 trust
|
host all all 127.0.0.1/32 trust
|
||||||
host all all 10.0.0.0/8 scram-sha-256
|
host all all 10.0.0.0/8 scram-sha-256
|
||||||
|
host all all 169.254.0.0/16 scram-sha-256
|
||||||
host all all ::1/128 trust
|
host all all ::1/128 trust
|
||||||
'';
|
'';
|
||||||
ensureDatabases = map (name: "${name}_db") allApps;
|
ensureDatabases = map (name: "${name}_db") allApps;
|
||||||
@@ -42,28 +43,10 @@ in {
|
|||||||
$PSQL -tAc "ALTER DATABASE ${name}_db OWNER TO ${name}_user;"
|
$PSQL -tAc "ALTER DATABASE ${name}_db OWNER TO ${name}_user;"
|
||||||
|
|
||||||
if [ -f "${config.sops.secrets."${lib.toUpper name}".path}" ]; then
|
if [ -f "${config.sops.secrets."${lib.toUpper name}".path}" ]; then
|
||||||
PASS=$(grep "^DB_PASSWORD=" "${config.sops.secrets."${lib.toUpper name}".path}" | cut -d'=' -f2- | tr -d '"' | tr -d "'")
|
PASS=$(grep "^DB_PASSWORD=" "${config.sops.secrets."${lib.toUpper name}".path}" | cut -d'=' -f2-)
|
||||||
$PSQL -tAc "ALTER USER ${name}_user WITH PASSWORD '$PASS';"
|
$PSQL -tAc "ALTER USER ${name}_user WITH PASSWORD '$PASS';"
|
||||||
fi
|
fi
|
||||||
'') allApps}
|
'') allApps}
|
||||||
'';
|
'';
|
||||||
# systemd.services.init-db-permissions = {
|
|
||||||
# description = "Set DB passwords and ownership after Postgres is ready";
|
|
||||||
# after = [ "postgresql.service" ];
|
|
||||||
# requires = [ "postgresql.service" ];
|
|
||||||
# partOf = [ "postgresql.service" ];
|
|
||||||
# wantedBy = [ "multi-user.target" ];
|
|
||||||
|
|
||||||
# serviceConfig = {
|
|
||||||
# Type = "oneshot";
|
|
||||||
# User = "postgres"; # Runs as postgres user directly
|
|
||||||
# RemainAfterExit = true;
|
|
||||||
# ExecStartPre = "${pkgs.coreutils}/bin/sleep 2";
|
|
||||||
# };
|
|
||||||
|
|
||||||
# script = ''
|
|
||||||
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
Reference in New Issue
Block a user