allow ip range db
This commit is contained in:
@@ -19,6 +19,7 @@ in {
|
||||
local all all trust
|
||||
host all all 127.0.0.1/32 trust
|
||||
host all all 10.0.0.0/8 scram-sha-256
|
||||
host all all 169.254.0.0/16 scram-sha-256
|
||||
host all all ::1/128 trust
|
||||
'';
|
||||
ensureDatabases = map (name: "${name}_db") allApps;
|
||||
@@ -42,28 +43,10 @@ in {
|
||||
$PSQL -tAc "ALTER DATABASE ${name}_db OWNER TO ${name}_user;"
|
||||
|
||||
if [ -f "${config.sops.secrets."${lib.toUpper name}".path}" ]; then
|
||||
PASS=$(grep "^DB_PASSWORD=" "${config.sops.secrets."${lib.toUpper name}".path}" | cut -d'=' -f2- | tr -d '"' | tr -d "'")
|
||||
PASS=$(grep "^DB_PASSWORD=" "${config.sops.secrets."${lib.toUpper name}".path}" | cut -d'=' -f2-)
|
||||
$PSQL -tAc "ALTER USER ${name}_user WITH PASSWORD '$PASS';"
|
||||
fi
|
||||
'') allApps}
|
||||
'';
|
||||
# systemd.services.init-db-permissions = {
|
||||
# description = "Set DB passwords and ownership after Postgres is ready";
|
||||
# after = [ "postgresql.service" ];
|
||||
# requires = [ "postgresql.service" ];
|
||||
# partOf = [ "postgresql.service" ];
|
||||
# wantedBy = [ "multi-user.target" ];
|
||||
|
||||
# serviceConfig = {
|
||||
# Type = "oneshot";
|
||||
# User = "postgres"; # Runs as postgres user directly
|
||||
# RemainAfterExit = true;
|
||||
# ExecStartPre = "${pkgs.coreutils}/bin/sleep 2";
|
||||
# };
|
||||
|
||||
# script = ''
|
||||
|
||||
# '';
|
||||
# };
|
||||
};
|
||||
}
|
||||
Reference in New Issue
Block a user