diff options
author | Nirbhay Choubey <nirbhay@mariadb.com> | 2015-11-20 12:31:22 -0500 |
---|---|---|
committer | Nirbhay Choubey <nirbhay@mariadb.com> | 2015-11-20 12:31:22 -0500 |
commit | 0d8eb20cb0a9972121e8e5e7b6bbd1fcc5ff8177 (patch) | |
tree | f7e6b4d7036b25896df7df15858a2bb9a1360bb4 /scripts/wsrep_sst_mysqldump.sh | |
parent | f4421c893b50f05078f14d33c47d21f52f59f8a7 (diff) | |
download | mariadb-git-0d8eb20cb0a9972121e8e5e7b6bbd1fcc5ff8177.tar.gz |
Remove duplicate code.
Diffstat (limited to 'scripts/wsrep_sst_mysqldump.sh')
-rw-r--r-- | scripts/wsrep_sst_mysqldump.sh | 11 |
1 files changed, 0 insertions, 11 deletions
diff --git a/scripts/wsrep_sst_mysqldump.sh b/scripts/wsrep_sst_mysqldump.sh index 7a5695851d4..9a061f89e43 100644 --- a/scripts/wsrep_sst_mysqldump.sh +++ b/scripts/wsrep_sst_mysqldump.sh @@ -76,17 +76,6 @@ fi # word, it is arguably more secure than passing password on the command line. [ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD" -# Refs https://github.com/codership/mysql-wsrep/issues/141 -# Passing password in MYSQL_PWD environment variable is considered -# "extremely insecure" by MySQL Guidelines for Password Security -# (https://dev.mysql.com/doc/refman/5.6/en/password-security-user.html) -# that is even less secure than passing it on a command line! It is doubtful: -# the whole command line is easily observable by any unprivileged user via ps, -# whereas (at least on Linux) unprivileged user can't see process environment -# that he does not own. So while it may be not secure in the NSA sense of the -# word, it is arguably more secure than passing password on the command line. -[ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD" - STOP_WSREP="SET wsrep_on=OFF;" # mysqldump cannot restore CSV tables, fix this issue |