flat password file, because it never will anymore. We had managed to
miss this during the recent flat-file-ectomy because it only happens if
--pwfile or --pwprompt is specified to initdb. Apparently, few hackers
use those. Reported by Erik Rijkers.
char *pwd1,
*pwd2;
- char pwdpath[MAXPGPATH];
- struct stat statbuf;
if (pwprompt)
{
PG_CMD_CLOSE;
check_ok();
-
- snprintf(pwdpath, sizeof(pwdpath), "%s/global/pg_auth", pg_data);
- if (stat(pwdpath, &statbuf) != 0 || !S_ISREG(statbuf.st_mode))
- {
- fprintf(stderr,
- _("%s: The password file was not generated. "
- "Please report this problem.\n"),
- progname);
- exit_nicely();
- }
}
/*