From: Peter Eisentraut Date: Thu, 12 May 2016 12:32:12 +0000 (-0400) Subject: doc: Small wording change for clarity X-Git-Tag: REL9_6_BETA2~188 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=122b99478a7baa3a8deb03938ea5ae15a1ad7584;p=postgresql doc: Small wording change for clarity From: Martín Marqués --- diff --git a/doc/src/sgml/plpgsql.sgml b/doc/src/sgml/plpgsql.sgml index 978624288e..6da87b5e73 100644 --- a/doc/src/sgml/plpgsql.sgml +++ b/doc/src/sgml/plpgsql.sgml @@ -528,7 +528,7 @@ $$ LANGUAGE plpgsql; - The same effect can be had by declaring one or more output parameters as + The same effect can be obtained by declaring one or more output parameters as polymorphic types. In this case the special $0 parameter is not used; the output parameters themselves serve the same purpose. For example: diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index fcf2953da7..097e2bd0f0 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -753,7 +753,7 @@ SELECT * FROM dup(42); malicious users from creating objects that mask objects used by the function. Particularly important in this regard is the temporary-table schema, which is searched first by default, and - is normally writable by anyone. A secure arrangement can be had + is normally writable by anyone. A secure arrangement can be obtained by forcing the temporary schema to be searched last. To do this, write pg_temppg_tempsecuring functions as the last entry in search_path. This function illustrates safe usage: