summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorSergei Golubchik <serg@mariadb.org>2015-12-22 10:32:33 +0100
committerSergei Golubchik <serg@mariadb.org>2015-12-22 10:32:33 +0100
commit7697bf0bd7e5b50c1071742ac90539be71f6eabe (patch)
tree9c4f650d6961467da0bbda23e3697571c984832d /scripts
parent0686c34d22a5cbf93015012eaf77a4a977b63afb (diff)
parent080da551ea171f8a43633ab27b56875938643dd0 (diff)
downloadmariadb-git-7697bf0bd7e5b50c1071742ac90539be71f6eabe.tar.gz
Merge branch 'github/10.0-galera' into 10.1
Note: some tests fail, just as they failed before the merge!
Diffstat (limited to 'scripts')
-rw-r--r--scripts/wsrep_sst_mysqldump.sh11
1 files changed, 0 insertions, 11 deletions
diff --git a/scripts/wsrep_sst_mysqldump.sh b/scripts/wsrep_sst_mysqldump.sh
index 21c4bf62130..5f25c2c9d13 100644
--- a/scripts/wsrep_sst_mysqldump.sh
+++ b/scripts/wsrep_sst_mysqldump.sh
@@ -76,17 +76,6 @@ fi
# word, it is arguably more secure than passing password on the command line.
[ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD"
-# Refs https://github.com/codership/mysql-wsrep/issues/141
-# Passing password in MYSQL_PWD environment variable is considered
-# "extremely insecure" by MySQL Guidelines for Password Security
-# (https://dev.mysql.com/doc/refman/5.6/en/password-security-user.html)
-# that is even less secure than passing it on a command line! It is doubtful:
-# the whole command line is easily observable by any unprivileged user via ps,
-# whereas (at least on Linux) unprivileged user can't see process environment
-# that he does not own. So while it may be not secure in the NSA sense of the
-# word, it is arguably more secure than passing password on the command line.
-[ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD"
-
STOP_WSREP="SET wsrep_on=OFF;"
# mysqldump cannot restore CSV tables, fix this issue