summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane2009-09-03 01:40:11 +0000
committerTom Lane2009-09-03 01:40:11 +0000
commitfa96a77c97896dceeb5c4f6ecc101d41a18b56f5 (patch)
tree9f8a3968c42898f9de58de76a8c229158e01fe27
parentdbd54863bc347ee52800c65dd7b45c18937882cb (diff)
Remove initdb's rather gratuitous check to see if the backend created a
flat password file, because it never will anymore. We had managed to miss this during the recent flat-file-ectomy because it only happens if --pwfile or --pwprompt is specified to initdb. Apparently, few hackers use those. Reported by Erik Rijkers.
-rw-r--r--src/bin/initdb/initdb.c12
1 files changed, 0 insertions, 12 deletions
diff --git a/src/bin/initdb/initdb.c b/src/bin/initdb/initdb.c
index b6998f36fd..b2e6a23c32 100644
--- a/src/bin/initdb/initdb.c
+++ b/src/bin/initdb/initdb.c
@@ -1434,8 +1434,6 @@ get_set_pwd(void)
char *pwd1,
*pwd2;
- char pwdpath[MAXPGPATH];
- struct stat statbuf;
if (pwprompt)
{
@@ -1505,16 +1503,6 @@ get_set_pwd(void)
PG_CMD_CLOSE;
check_ok();
-
- snprintf(pwdpath, sizeof(pwdpath), "%s/global/pg_auth", pg_data);
- if (stat(pwdpath, &statbuf) != 0 || !S_ISREG(statbuf.st_mode))
- {
- fprintf(stderr,
- _("%s: The password file was not generated. "
- "Please report this problem.\n"),
- progname);
- exit_nicely();
- }
}
/*