diff --git a/doc/src/sgml/datatype.sgml b/doc/src/sgml/datatype.sgml index a8d07803879..86eb38cc8f7 100644 --- a/doc/src/sgml/datatype.sgml +++ b/doc/src/sgml/datatype.sgml @@ -2095,11 +2095,15 @@ January 8 04:05:06 1999 PST + or - symbol and time zone offset after the time. Hence, according to the standard, - TIMESTAMP '2004-10-19 10:23:54' + +TIMESTAMP '2004-10-19 10:23:54' + is a timestamp without time zone, while - TIMESTAMP '2004-10-19 10:23:54+02' + +TIMESTAMP '2004-10-19 10:23:54+02' + is a timestamp with time zone. PostgreSQL never examines the content of a @@ -2108,7 +2112,9 @@ January 8 04:05:06 1999 PST ensure that a literal is treated as timestamp with time zone, give it the correct explicit type: - TIMESTAMP WITH TIME ZONE '2004-10-19 10:23:54+02' + +TIMESTAMP WITH TIME ZONE '2004-10-19 10:23:54+02' + In a literal that has been determined to be timestamp without time zone, PostgreSQL will silently ignore diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml index 5892367c61c..75c7c5837b2 100644 --- a/doc/src/sgml/libpq.sgml +++ b/doc/src/sgml/libpq.sgml @@ -790,9 +790,9 @@ void PQsetSSLKeyPassHook(PQsslKeyPassHook_type hook); The application passes a pointer to a callback function with signature: - - int callback_fn(char *buf, int size, PGconn *conn); - + +int callback_fn(char *buf, int size, PGconn *conn); + which libpq will then call instead of its default PQdefaultSSLKeyPassHook handler. The callback should determine the password for the key and copy it to result-buffer @@ -1668,7 +1668,7 @@ postgresql://%2Fvar%2Flib%2Fpostgresql/dbname Specifying this parameter with any non-empty value suppresses the - Enter PEM passphrase: + Enter PEM pass phrase: prompt that OpenSSL will emit by default when an encrypted client certificate key is provided to libpq. @@ -7667,10 +7667,7 @@ ldap://ldap.acme.com/cn=dbserver,cn=hosts?pgconnectinfo?base?(objectclass=*) may be provided in the connection option. If an encrypted key is supplied and the sslpassword option is absent or blank, a password will be prompted for interactively by - OpenSSL with a - - Enter PEM Passphrase: - + OpenSSL with a Enter PEM pass phrase: prompt if a TTY is available. Applications can override the client certificate prompt and the handling of the sslpassword parameter by supplying their own key password callback; see . diff --git a/doc/src/sgml/postgres-fdw.sgml b/doc/src/sgml/postgres-fdw.sgml index 94992be4272..eab2cc93784 100644 --- a/doc/src/sgml/postgres-fdw.sgml +++ b/doc/src/sgml/postgres-fdw.sgml @@ -151,10 +151,10 @@ A superuser may override this check on a per-user-mapping basis by setting the user mapping option password_required 'false', e.g. - - ALTER USER MAPPING FOR some_non_superuser SERVER loopback_nopw - OPTIONS (ADD password_required 'false'); - + +ALTER USER MAPPING FOR some_non_superuser SERVER loopback_nopw +OPTIONS (ADD password_required 'false'); + To prevent unprivileged users from exploiting the authentication rights of the unix user the postgres server is running as to escalate to superuser rights, only the superuser may set this option on a user mapping.