diff options
author | Sergei Golubchik <serg@mariadb.org> | 2015-12-22 10:32:33 +0100 |
---|---|---|
committer | Sergei Golubchik <serg@mariadb.org> | 2015-12-22 10:32:33 +0100 |
commit | 7697bf0bd7e5b50c1071742ac90539be71f6eabe (patch) | |
tree | 9c4f650d6961467da0bbda23e3697571c984832d /scripts | |
parent | 0686c34d22a5cbf93015012eaf77a4a977b63afb (diff) | |
parent | 080da551ea171f8a43633ab27b56875938643dd0 (diff) | |
download | mariadb-git-7697bf0bd7e5b50c1071742ac90539be71f6eabe.tar.gz |
Merge branch 'github/10.0-galera' into 10.1
Note: some tests fail, just as they failed before the merge!
Diffstat (limited to 'scripts')
-rw-r--r-- | scripts/wsrep_sst_mysqldump.sh | 11 |
1 files changed, 0 insertions, 11 deletions
diff --git a/scripts/wsrep_sst_mysqldump.sh b/scripts/wsrep_sst_mysqldump.sh index 21c4bf62130..5f25c2c9d13 100644 --- a/scripts/wsrep_sst_mysqldump.sh +++ b/scripts/wsrep_sst_mysqldump.sh @@ -76,17 +76,6 @@ fi # word, it is arguably more secure than passing password on the command line. [ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD" -# Refs https://github.com/codership/mysql-wsrep/issues/141 -# Passing password in MYSQL_PWD environment variable is considered -# "extremely insecure" by MySQL Guidelines for Password Security -# (https://dev.mysql.com/doc/refman/5.6/en/password-security-user.html) -# that is even less secure than passing it on a command line! It is doubtful: -# the whole command line is easily observable by any unprivileged user via ps, -# whereas (at least on Linux) unprivileged user can't see process environment -# that he does not own. So while it may be not secure in the NSA sense of the -# word, it is arguably more secure than passing password on the command line. -[ -n "$WSREP_SST_OPT_PSWD" ] && export MYSQL_PWD="$WSREP_SST_OPT_PSWD" - STOP_WSREP="SET wsrep_on=OFF;" # mysqldump cannot restore CSV tables, fix this issue |