Use non-blocking random number device for AES-Key (#77)

/dev/random is blocking if entropy-pool is empty, which is will cause failures on the healthchecks.

Signed-off-by: Thorsten Gawantka <thorsten.gawantka@objective-partner.com>
This commit is contained in:
Thorsten Gawantka
2022-02-23 13:27:44 +01:00
committed by GitHub
parent 6d13bc17b8
commit 9fdb2d38d2

View File

@@ -80,7 +80,7 @@ export PGPOOL_POSTGRES_CUSTOM_PASSWORDS="${PGPOOL_POSTGRES_CUSTOM_PASSWORDS:-}"
export PGPOOL_AUTO_FAILBACK="${PGPOOL_AUTO_FAILBACK:-no}"
export PGPOOL_BACKEND_APPLICATION_NAMES="${PGPOOL_BACKEND_APPLICATION_NAMES:-}"
export PGPOOL_AUTHENTICATION_METHOD="${PGPOOL_AUTHENTICATION_METHOD:-md5}"
export PGPOOL_AES_KEY="${PGPOOL_AES_KEY:-$(head -c 20 /dev/random | base64)}"
export PGPOOL_AES_KEY="${PGPOOL_AES_KEY:-$(head -c 20 /dev/urandom | base64)}"
# SSL
export PGPOOL_ENABLE_TLS="${PGPOOL_ENABLE_TLS:-no}"