diff options
author | Tom Lane | 2009-09-03 01:40:11 +0000 |
---|---|---|
committer | Tom Lane | 2009-09-03 01:40:11 +0000 |
commit | fa96a77c97896dceeb5c4f6ecc101d41a18b56f5 (patch) | |
tree | 9f8a3968c42898f9de58de76a8c229158e01fe27 | |
parent | dbd54863bc347ee52800c65dd7b45c18937882cb (diff) |
Remove initdb's rather gratuitous check to see if the backend created a
flat password file, because it never will anymore. We had managed to
miss this during the recent flat-file-ectomy because it only happens if
--pwfile or --pwprompt is specified to initdb. Apparently, few hackers
use those. Reported by Erik Rijkers.
-rw-r--r-- | src/bin/initdb/initdb.c | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/src/bin/initdb/initdb.c b/src/bin/initdb/initdb.c index b6998f36fd..b2e6a23c32 100644 --- a/src/bin/initdb/initdb.c +++ b/src/bin/initdb/initdb.c @@ -1434,8 +1434,6 @@ get_set_pwd(void) char *pwd1, *pwd2; - char pwdpath[MAXPGPATH]; - struct stat statbuf; if (pwprompt) { @@ -1505,16 +1503,6 @@ get_set_pwd(void) PG_CMD_CLOSE; check_ok(); - - snprintf(pwdpath, sizeof(pwdpath), "%s/global/pg_auth", pg_data); - if (stat(pwdpath, &statbuf) != 0 || !S_ISREG(statbuf.st_mode)) - { - fprintf(stderr, - _("%s: The password file was not generated. " - "Please report this problem.\n"), - progname); - exit_nicely(); - } } /* |