|
171 | 171 | }; |
172 | 172 |
|
173 | 173 | ensureClauses = mkOption { |
174 | | - description = lib.mdDoc '' |
| 174 | + description = '' |
175 | 175 | An attrset of clauses to grant to the user. Under the hood this uses the |
176 | 176 | [ALTER USER syntax](https://www.postgresql.org/docs/current/sql-alteruser.html) for each attrName where |
177 | 177 | the attrValue is true in the attrSet: |
|
185 | 185 | } |
186 | 186 | ''; |
187 | 187 | default = {}; |
188 | | - defaultText = lib.literalMD '' |
| 188 | + defaultText = '' |
189 | 189 | If not set then the user created will have the default permissions assigned by postgres |
190 | 190 | ''; |
191 | 191 | type = types.submodule { |
192 | 192 | options = let |
193 | | - defaultText = lib.literalMD '' |
| 193 | + defaultText = '' |
194 | 194 | `null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause. |
195 | 195 | ''; |
196 | 196 | in { |
197 | 197 | superuser = mkOption { |
198 | 198 | type = types.nullOr types.bool; |
199 | | - description = lib.mdDoc '' |
| 199 | + description = '' |
200 | 200 | Grants the user, created by the ensureUser attr, superuser permissions. From the postgres docs: |
201 | 201 |
|
202 | 202 | A database superuser bypasses all permission checks, |
|
213 | 213 | }; |
214 | 214 | createrole = mkOption { |
215 | 215 | type = types.nullOr types.bool; |
216 | | - description = lib.mdDoc '' |
| 216 | + description = '' |
217 | 217 | Grants the user, created by the ensureUser attr, createrole permissions. From the postgres docs: |
218 | 218 |
|
219 | 219 | A role must be explicitly given permission to create more |
|
232 | 232 | }; |
233 | 233 | createdb = mkOption { |
234 | 234 | type = types.nullOr types.bool; |
235 | | - description = lib.mdDoc '' |
| 235 | + description = '' |
236 | 236 | Grants the user, created by the ensureUser attr, createdb permissions. From the postgres docs: |
237 | 237 |
|
238 | 238 | A role must be explicitly given permission to create |
|
247 | 247 | }; |
248 | 248 | "inherit" = mkOption { |
249 | 249 | type = types.nullOr types.bool; |
250 | | - description = lib.mdDoc '' |
| 250 | + description = '' |
251 | 251 | Grants the user created inherit permissions. From the postgres docs: |
252 | 252 |
|
253 | 253 | A role is given permission to inherit the privileges of |
|
262 | 262 | }; |
263 | 263 | login = mkOption { |
264 | 264 | type = types.nullOr types.bool; |
265 | | - description = lib.mdDoc '' |
| 265 | + description = '' |
266 | 266 | Grants the user, created by the ensureUser attr, login permissions. From the postgres docs: |
267 | 267 |
|
268 | 268 | Only roles that have the LOGIN attribute can be used as |
|
284 | 284 | }; |
285 | 285 | replication = mkOption { |
286 | 286 | type = types.nullOr types.bool; |
287 | | - description = lib.mdDoc '' |
| 287 | + description = '' |
288 | 288 | Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs: |
289 | 289 |
|
290 | 290 | A role must explicitly be given permission to initiate |
|
300 | 300 | }; |
301 | 301 | bypassrls = mkOption { |
302 | 302 | type = types.nullOr types.bool; |
303 | | - description = lib.mdDoc '' |
| 303 | + description = '' |
304 | 304 | Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs: |
305 | 305 |
|
306 | 306 | A role must be explicitly given permission to bypass |
|
0 commit comments