aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2009-09-03 01:40:11 +0000
committerTom Lane <tgl@sss.pgh.pa.us>2009-09-03 01:40:11 +0000
commitb02c32e11b187f2e2ccddd60a702674dec884b4f (patch)
treee5227d716dc111c41ccb023cb4deb46fe5c32c01 /src
parent5c709eecdc323c93a731e1af94dc99bae86ab134 (diff)
downloadpostgresql-b02c32e11b187f2e2ccddd60a702674dec884b4f.tar.gz
postgresql-b02c32e11b187f2e2ccddd60a702674dec884b4f.zip
Remove initdb's rather gratuitous check to see if the backend created a
flat password file, because it never will anymore. We had managed to miss this during the recent flat-file-ectomy because it only happens if --pwfile or --pwprompt is specified to initdb. Apparently, few hackers use those. Reported by Erik Rijkers.
Diffstat (limited to 'src')
-rw-r--r--src/bin/initdb/initdb.c14
1 files changed, 1 insertions, 13 deletions
diff --git a/src/bin/initdb/initdb.c b/src/bin/initdb/initdb.c
index 3ea067190bb..ae400004a22 100644
--- a/src/bin/initdb/initdb.c
+++ b/src/bin/initdb/initdb.c
@@ -42,7 +42,7 @@
* Portions Copyright (c) 1994, Regents of the University of California
* Portions taken from FreeBSD.
*
- * $PostgreSQL: pgsql/src/bin/initdb/initdb.c,v 1.174 2009/09/02 02:40:52 tgl Exp $
+ * $PostgreSQL: pgsql/src/bin/initdb/initdb.c,v 1.175 2009/09/03 01:40:11 tgl Exp $
*
*-------------------------------------------------------------------------
*/
@@ -1434,8 +1434,6 @@ get_set_pwd(void)
char *pwd1,
*pwd2;
- char pwdpath[MAXPGPATH];
- struct stat statbuf;
if (pwprompt)
{
@@ -1505,16 +1503,6 @@ get_set_pwd(void)
PG_CMD_CLOSE;
check_ok();
-
- snprintf(pwdpath, sizeof(pwdpath), "%s/global/pg_auth", pg_data);
- if (stat(pwdpath, &statbuf) != 0 || !S_ISREG(statbuf.st_mode))
- {
- fprintf(stderr,
- _("%s: The password file was not generated. "
- "Please report this problem.\n"),
- progname);
- exit_nicely();
- }
}
/*