summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPeter Eisentraut2016-05-12 12:32:12 +0000
committerPeter Eisentraut2016-05-12 12:32:12 +0000
commit122b99478a7baa3a8deb03938ea5ae15a1ad7584 (patch)
tree75b5adb0c752817932c6b02f87d4d67895981014
parent8a13d5e6d1bb9ff9460c72992657077e57e30c32 (diff)
doc: Small wording change for clarity
From: Martín Marqués <[email protected]>
-rw-r--r--doc/src/sgml/plpgsql.sgml2
-rw-r--r--doc/src/sgml/ref/create_function.sgml2
2 files changed, 2 insertions, 2 deletions
diff --git a/doc/src/sgml/plpgsql.sgml b/doc/src/sgml/plpgsql.sgml
index 978624288e..6da87b5e73 100644
--- a/doc/src/sgml/plpgsql.sgml
+++ b/doc/src/sgml/plpgsql.sgml
@@ -528,7 +528,7 @@ $$ LANGUAGE plpgsql;
</para>
<para>
- The same effect can be had by declaring one or more output parameters as
+ The same effect can be obtained by declaring one or more output parameters as
polymorphic types. In this case the
special <literal>$0</literal> parameter is not used; the output
parameters themselves serve the same purpose. For example:
diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml
index fcf2953da7..097e2bd0f0 100644
--- a/doc/src/sgml/ref/create_function.sgml
+++ b/doc/src/sgml/ref/create_function.sgml
@@ -753,7 +753,7 @@ SELECT * FROM dup(42);
malicious users from creating objects that mask objects used by the
function. Particularly important in this regard is the
temporary-table schema, which is searched first by default, and
- is normally writable by anyone. A secure arrangement can be had
+ is normally writable by anyone. A secure arrangement can be obtained
by forcing the temporary schema to be searched last. To do this,
write <literal>pg_temp</><indexterm><primary>pg_temp</><secondary>securing functions</></> as the last entry in <varname>search_path</>.
This function illustrates safe usage: