diff options
author | Peter Eisentraut | 2016-05-12 12:32:12 +0000 |
---|---|---|
committer | Peter Eisentraut | 2016-05-12 12:32:12 +0000 |
commit | 122b99478a7baa3a8deb03938ea5ae15a1ad7584 (patch) | |
tree | 75b5adb0c752817932c6b02f87d4d67895981014 | |
parent | 8a13d5e6d1bb9ff9460c72992657077e57e30c32 (diff) |
doc: Small wording change for clarity
From: Martín Marqués <[email protected]>
-rw-r--r-- | doc/src/sgml/plpgsql.sgml | 2 | ||||
-rw-r--r-- | doc/src/sgml/ref/create_function.sgml | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/doc/src/sgml/plpgsql.sgml b/doc/src/sgml/plpgsql.sgml index 978624288e..6da87b5e73 100644 --- a/doc/src/sgml/plpgsql.sgml +++ b/doc/src/sgml/plpgsql.sgml @@ -528,7 +528,7 @@ $$ LANGUAGE plpgsql; </para> <para> - The same effect can be had by declaring one or more output parameters as + The same effect can be obtained by declaring one or more output parameters as polymorphic types. In this case the special <literal>$0</literal> parameter is not used; the output parameters themselves serve the same purpose. For example: diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index fcf2953da7..097e2bd0f0 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -753,7 +753,7 @@ SELECT * FROM dup(42); malicious users from creating objects that mask objects used by the function. Particularly important in this regard is the temporary-table schema, which is searched first by default, and - is normally writable by anyone. A secure arrangement can be had + is normally writable by anyone. A secure arrangement can be obtained by forcing the temporary schema to be searched last. To do this, write <literal>pg_temp</><indexterm><primary>pg_temp</><secondary>securing functions</></> as the last entry in <varname>search_path</>. This function illustrates safe usage: |