Files
smeserver-bugzilla/root/etc/e-smith/db/configuration/migrate/80bugzilla
2025-09-12 22:13:44 -04:00

73 lines
1.9 KiB
Plaintext

{
use MIME::Base64 qw(encode_base64);
my $service;
my $rec;
my $pw;
# Store the Bugzilla password in the configuration database (if not already there)
$service = 'bugzilla';
$rec = $DB->get($service) || $DB->new_record($service, {type => 'service'});
$pw = $rec->prop('DbPassword');
$adminpw = $rec->prop('AdminPassword');
if (! $pw)
{
if ( open( RANDOM, "/dev/urandom" ) )
{
my $buf;
# 57 bytes is a full line of Base64 coding, and contains
# 456 bits of randomness - given a perfectly random /dev/random
if ( read( RANDOM, $buf, 57 ) != 57 )
{
warn("Short read from /dev/random: $!");
}
else
{
$pw = encode_base64($buf);
chomp $pw;
}
close RANDOM;
}
else
{
warn "Could not open /dev/urandom: $!";
}
$rec->set_prop('DbPassword', $pw);
}
if (! $adminpw)
{
if ( open( RANDOM, "/dev/urandom" ) )
{
my $buf;
# 57 bytes is a full line of Base64 coding, and contains
# 456 bits of randomness - given a perfectly random /dev/random
if ( read( RANDOM, $buf, 57 ) != 57 )
{
warn("Short read from /dev/random: $!");
}
else
{
$adminpw = encode_base64($buf);
chomp $adminpw;
$adminpw = substr $adminpw, 0, 16;
}
close RANDOM;
}
else
{
warn "Could not open /dev/urandom: $!";
}
$rec->set_prop('AdminPassword', $adminpw);
}
}