initial commit of file from CVS for smeserver-phpmyadmin on Sat Sep 7 20:52:31 AEST 2024
This commit is contained in:
1
root/etc/e-smith/db/accounts/defaults/phpmyadmin/type
Normal file
1
root/etc/e-smith/db/accounts/defaults/phpmyadmin/type
Normal file
@@ -0,0 +1 @@
|
||||
reserved
|
@@ -0,0 +1 @@
|
||||
phpmyadmin
|
@@ -0,0 +1 @@
|
||||
phpmyadmin
|
@@ -0,0 +1 @@
|
||||
500M
|
@@ -0,0 +1 @@
|
||||
100M
|
@@ -0,0 +1 @@
|
||||
100M
|
@@ -0,0 +1 @@
|
||||
private
|
@@ -0,0 +1 @@
|
||||
enabled
|
@@ -0,0 +1 @@
|
||||
disabled
|
@@ -0,0 +1 @@
|
||||
enabled
|
@@ -0,0 +1 @@
|
||||
configuration
|
32
root/etc/e-smith/db/configuration/migrate/addBlowfishSecret
Normal file
32
root/etc/e-smith/db/configuration/migrate/addBlowfishSecret
Normal file
@@ -0,0 +1,32 @@
|
||||
{
|
||||
my $rec = $DB->get('phpmyadmin')
|
||||
|| $DB->new_record('phpmyadmin', {type => 'configuration'});
|
||||
my $pw = $rec->prop('BlowfishSecret');
|
||||
if (not $pw or length($pw) < 57){
|
||||
my $pw = gen_pw();
|
||||
$rec->set_prop('BlowfishSecret', $pw);
|
||||
}
|
||||
|
||||
sub gen_pw {
|
||||
use MIME::Base64 qw(encode_base64);
|
||||
my $p = "not set due to error";
|
||||
if ( open( RANDOM, "/dev/urandom" ) ){
|
||||
my $buf;
|
||||
# 57 bytes is a full line of Base64 coding, and contains
|
||||
# 456 bits of randomness - given a perfectly random /dev/random
|
||||
if ( read( RANDOM, $buf, 57 ) != 57 ){
|
||||
warn("Short read from /dev/random: $!");
|
||||
}
|
||||
else{
|
||||
$p = encode_base64($buf);
|
||||
chomp $p;
|
||||
}
|
||||
close RANDOM;
|
||||
}
|
||||
else{
|
||||
warn "Could not open /dev/urandom: $!";
|
||||
}
|
||||
return $p;
|
||||
}
|
||||
}
|
||||
|
37
root/etc/e-smith/db/configuration/migrate/phpmyadmin
Normal file
37
root/etc/e-smith/db/configuration/migrate/phpmyadmin
Normal file
@@ -0,0 +1,37 @@
|
||||
{
|
||||
my $rec = $DB->get('phpmyadmin')
|
||||
|| $DB->new_record('phpmyadmin', {type => 'configuration'});
|
||||
my $pw = $rec->prop('DbPassword');
|
||||
if (not $pw or length($pw) < 57){
|
||||
my $pw = gen_pw();
|
||||
$rec->set_prop('DbPassword', $pw);
|
||||
}
|
||||
$pw = $rec->prop('sqladminPassword');
|
||||
if (not $pw or length($pw) < 57){
|
||||
my $pw = gen_pw();
|
||||
$rec->set_prop('sqladminPassword', $pw);
|
||||
}
|
||||
|
||||
sub gen_pw {
|
||||
use MIME::Base64 qw(encode_base64);
|
||||
my $p = "not set due to error";
|
||||
if ( open( RANDOM, "/dev/urandom" ) ){
|
||||
my $buf;
|
||||
# 57 bytes is a full line of Base64 coding, and contains
|
||||
# 456 bits of randomness - given a perfectly random /dev/random
|
||||
if ( read( RANDOM, $buf, 57 ) != 57 ){
|
||||
warn("Short read from /dev/random: $!");
|
||||
}
|
||||
else{
|
||||
$p = encode_base64($buf);
|
||||
chomp $p;
|
||||
}
|
||||
close RANDOM;
|
||||
}
|
||||
else{
|
||||
warn "Could not open /dev/urandom: $!";
|
||||
}
|
||||
return $p;
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user