-
-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Database user is not allowed to re-create the database #819
Comments
Could we test it with a local setup (and only local...)? |
Yes, we can totally test it locally. That's what I mean in the testing steps with |
Ok so I tried to provision and deploy. Provisionning: diff --git a/inventory/hosts b/inventory/hosts
index 419cff3..0e1b0af 100644
--- a/inventory/hosts
+++ b/inventory/hosts
@@ -2,7 +2,7 @@
# Local containers for testing
[vagrant]
-local_vagrant ansible_host=127.0.0.1 ansible_user=vagrant ansible_port=2222 ansible_ssh_private_key_file=~/.vagrant.d/insecure_private_key ansible_ssh_common_args='-o StrictHostKeyChecking=no'
+local_vagrant ansible_host=127.0.0.1 ansible_user=vagrant ansible_port=2222 ansible_ssh_private_key_file=~/.vagrant.d/insecure_private_key ansibl
e_ssh_common_args='-o StrictHostKeyChecking=no' ansible_python_interpreter=/usr/bin/python3
[lxc]
ofn.local But the provisioning failed:
Deploying:
|
Did you run setup.yml first? That one links |
Description
A change in the way we use the postgresql role means that the CREATEDB privilege is not passed on to the user creation. We can't drop and create the database. That is useful when importing another database, for example when switching production servers.
Expected Behavior
Actual Behaviour
Steps to Reproduce
vagrant destroy; vagrant up
.Animated Gif/Screenshot
Severity
Your Environment
Possible Fix
We added some workarounds in ebd62cd which could now be removed if we upgrade the postgresql role.
Workaround
Give the user permission manually:
The text was updated successfully, but these errors were encountered: