diff --git a/packages/backend-core/src/features/features.ts b/packages/backend-core/src/features/features.ts
index e2f8d9b6a1..b9302f9bce 100644
--- a/packages/backend-core/src/features/features.ts
+++ b/packages/backend-core/src/features/features.ts
@@ -272,7 +272,6 @@ export const flags = new FlagSet({
[FeatureFlag.SQS]: Flag.boolean(true),
[FeatureFlag.AI_CUSTOM_CONFIGS]: Flag.boolean(env.isDev()),
[FeatureFlag.ENRICHED_RELATIONSHIPS]: Flag.boolean(env.isDev()),
- [FeatureFlag.TABLES_DEFAULT_ADMIN]: Flag.boolean(env.isDev()),
[FeatureFlag.BUDIBASE_AI]: Flag.boolean(env.isDev()),
})
diff --git a/packages/server/src/sdk/app/tables/create.ts b/packages/server/src/sdk/app/tables/create.ts
index fa858522bf..1cba26fc46 100644
--- a/packages/server/src/sdk/app/tables/create.ts
+++ b/packages/server/src/sdk/app/tables/create.ts
@@ -4,7 +4,7 @@ import * as external from "./external"
import * as internal from "./internal"
import { isExternal } from "./utils"
import { setPermissions } from "../permissions"
-import { features, roles } from "@budibase/backend-core"
+import { roles } from "@budibase/backend-core"
export async function create(
table: Omit
,
@@ -18,16 +18,10 @@ export async function create(
createdTable = await internal.create(table, rows, userId)
}
- const setExplicitPermission = await features.flags.isEnabled(
- FeatureFlag.TABLES_DEFAULT_ADMIN
- )
-
- if (setExplicitPermission) {
- await setPermissions(createdTable._id!, {
- writeRole: roles.BUILTIN_ROLE_IDS.ADMIN,
- readRole: roles.BUILTIN_ROLE_IDS.ADMIN,
- })
- }
+ await setPermissions(createdTable._id!, {
+ writeRole: roles.BUILTIN_ROLE_IDS.ADMIN,
+ readRole: roles.BUILTIN_ROLE_IDS.ADMIN,
+ })
return createdTable
}
diff --git a/packages/server/src/sdk/app/views/index.ts b/packages/server/src/sdk/app/views/index.ts
index a259dd5505..9c111ff079 100644
--- a/packages/server/src/sdk/app/views/index.ts
+++ b/packages/server/src/sdk/app/views/index.ts
@@ -2,7 +2,6 @@ import {
BBReferenceFieldSubType,
CalculationType,
canGroupBy,
- FeatureFlag,
FieldType,
isNumeric,
PermissionLevel,
@@ -16,7 +15,7 @@ import {
ViewV2ColumnEnriched,
ViewV2Enriched,
} from "@budibase/types"
-import { context, docIds, features, HTTPError } from "@budibase/backend-core"
+import { context, docIds, HTTPError } from "@budibase/backend-core"
import {
helpers,
PROTECTED_EXTERNAL_COLUMNS,
@@ -287,17 +286,12 @@ export async function create(
await guardViewSchema(tableId, viewRequest)
const view = await pickApi(tableId).create(tableId, viewRequest)
- const setExplicitPermission = await features.flags.isEnabled(
- FeatureFlag.TABLES_DEFAULT_ADMIN
- )
- if (setExplicitPermission) {
- // Set permissions to be the same as the table
- const tablePerms = await sdk.permissions.getResourcePerms(tableId)
- await sdk.permissions.setPermissions(view.id, {
- writeRole: tablePerms[PermissionLevel.WRITE].role,
- readRole: tablePerms[PermissionLevel.READ].role,
- })
- }
+ // Set permissions to be the same as the table
+ const tablePerms = await sdk.permissions.getResourcePerms(tableId)
+ await sdk.permissions.setPermissions(view.id, {
+ writeRole: tablePerms[PermissionLevel.WRITE].role,
+ readRole: tablePerms[PermissionLevel.READ].role,
+ })
return view
}
diff --git a/packages/types/src/sdk/featureFlag.ts b/packages/types/src/sdk/featureFlag.ts
index 99ee0f9996..97d145db6c 100644
--- a/packages/types/src/sdk/featureFlag.ts
+++ b/packages/types/src/sdk/featureFlag.ts
@@ -6,7 +6,6 @@ export enum FeatureFlag {
AI_CUSTOM_CONFIGS = "AI_CUSTOM_CONFIGS",
DEFAULT_VALUES = "DEFAULT_VALUES",
ENRICHED_RELATIONSHIPS = "ENRICHED_RELATIONSHIPS",
- TABLES_DEFAULT_ADMIN = "TABLES_DEFAULT_ADMIN",
BUDIBASE_AI = "BUDIBASE_AI",
}