initial commit of file from CVS for smeserver-bugzilla on Sat Sep 7 20:11:50 AEST 2024
This commit is contained in:
1
root/etc/e-smith/db/accounts/defaults/bugzilla/comment
Normal file
1
root/etc/e-smith/db/accounts/defaults/bugzilla/comment
Normal file
@@ -0,0 +1 @@
|
||||
Placeholder for bugzilla URL
|
1
root/etc/e-smith/db/accounts/defaults/bugzilla/type
Normal file
1
root/etc/e-smith/db/accounts/defaults/bugzilla/type
Normal file
@@ -0,0 +1 @@
|
||||
url
|
@@ -0,0 +1 @@
|
||||
bugzilla
|
@@ -0,0 +1 @@
|
||||
bugzilla
|
80
root/etc/e-smith/db/configuration/migrate/80bugzilla
Normal file
80
root/etc/e-smith/db/configuration/migrate/80bugzilla
Normal file
@@ -0,0 +1,80 @@
|
||||
{
|
||||
use MIME::Base64 qw(encode_base64);
|
||||
|
||||
my $service;
|
||||
my $rec;
|
||||
my $pw;
|
||||
|
||||
# Enable InnoDB (needed for Bugzilla)
|
||||
$service = 'mysqld';
|
||||
|
||||
$rec = $DB->get($service) || $DB->new_record($service, {type => 'service'});
|
||||
$rec->set_prop('InnoDB', 'enabled');
|
||||
|
||||
# Store the Bugzilla password in the configuration database (if not already there)
|
||||
$service = 'bugzilla';
|
||||
|
||||
$rec = $DB->get($service) || $DB->new_record($service, {type => 'service'});
|
||||
|
||||
$pw = $rec->prop('DbPassword');
|
||||
# return "" if $pw;
|
||||
|
||||
$adminpw = $rec->prop('AdminPassword');
|
||||
# return "" if $pw;
|
||||
|
||||
if (! $pw)
|
||||
{
|
||||
if ( open( RANDOM, "/dev/urandom" ) )
|
||||
{
|
||||
my $buf;
|
||||
# 57 bytes is a full line of Base64 coding, and contains
|
||||
# 456 bits of randomness - given a perfectly random /dev/random
|
||||
if ( read( RANDOM, $buf, 57 ) != 57 )
|
||||
{
|
||||
warn("Short read from /dev/random: $!");
|
||||
}
|
||||
else
|
||||
{
|
||||
$pw = encode_base64($buf);
|
||||
chomp $pw;
|
||||
}
|
||||
close RANDOM;
|
||||
}
|
||||
else
|
||||
{
|
||||
warn "Could not open /dev/urandom: $!";
|
||||
}
|
||||
|
||||
$rec->set_prop('DbPassword', $pw);
|
||||
}
|
||||
|
||||
if (! $adminpw)
|
||||
{
|
||||
if ( open( RANDOM, "/dev/urandom" ) )
|
||||
{
|
||||
my $buf;
|
||||
# 57 bytes is a full line of Base64 coding, and contains
|
||||
# 456 bits of randomness - given a perfectly random /dev/random
|
||||
if ( read( RANDOM, $buf, 57 ) != 57 )
|
||||
{
|
||||
warn("Short read from /dev/random: $!");
|
||||
}
|
||||
else
|
||||
{
|
||||
$adminpw = encode_base64($buf);
|
||||
chomp $adminpw;
|
||||
$adminpw = substr $adminpw, 0, 16;
|
||||
}
|
||||
close RANDOM;
|
||||
}
|
||||
else
|
||||
{
|
||||
warn "Could not open /dev/urandom: $!";
|
||||
}
|
||||
|
||||
$rec->set_prop('AdminPassword', $adminpw);
|
||||
}
|
||||
|
||||
|
||||
|
||||
}
|
Reference in New Issue
Block a user