diff --git a/doc/src/sgml/datatype.sgml b/doc/src/sgml/datatype.sgml
index a8d07803879..86eb38cc8f7 100644
--- a/doc/src/sgml/datatype.sgml
+++ b/doc/src/sgml/datatype.sgml
@@ -2095,11 +2095,15 @@ January 8 04:05:06 1999 PST
+
or -
symbol and time zone offset after
the time. Hence, according to the standard,
- TIMESTAMP '2004-10-19 10:23:54'
+
+TIMESTAMP '2004-10-19 10:23:54'
+
is a timestamp without time zone, while
- TIMESTAMP '2004-10-19 10:23:54+02'
+
+TIMESTAMP '2004-10-19 10:23:54+02'
+
is a timestamp with time zone.
PostgreSQL never examines the content of a
@@ -2108,7 +2112,9 @@ January 8 04:05:06 1999 PST
ensure that a literal is treated as timestamp with time
zone, give it the correct explicit type:
- TIMESTAMP WITH TIME ZONE '2004-10-19 10:23:54+02'
+
+TIMESTAMP WITH TIME ZONE '2004-10-19 10:23:54+02'
+
In a literal that has been determined to be timestamp without time
zone, PostgreSQL will silently ignore
diff --git a/doc/src/sgml/libpq.sgml b/doc/src/sgml/libpq.sgml
index 5892367c61c..75c7c5837b2 100644
--- a/doc/src/sgml/libpq.sgml
+++ b/doc/src/sgml/libpq.sgml
@@ -790,9 +790,9 @@ void PQsetSSLKeyPassHook(PQsslKeyPassHook_type hook);
The application passes a pointer to a callback function with signature:
-
- int callback_fn(char *buf, int size, PGconn *conn);
-
+
+int callback_fn(char *buf, int size, PGconn *conn);
+
which libpq will then call instead of
its default PQdefaultSSLKeyPassHook handler. The callback
should determine the password for the key and copy it to result-buffer
@@ -1668,7 +1668,7 @@ postgresql://%2Fvar%2Flib%2Fpostgresql/dbname
Specifying this parameter with any non-empty value suppresses the
- Enter PEM passphrase:
+ Enter PEM pass phrase:
prompt that OpenSSL will emit by default when an encrypted client
certificate key is provided to libpq.
@@ -7667,10 +7667,7 @@ ldap://ldap.acme.com/cn=dbserver,cn=hosts?pgconnectinfo?base?(objectclass=*)
may be provided in the connection
option. If an encrypted key is supplied and the sslpassword
option is absent or blank, a password will be prompted for interactively by
- OpenSSL with a
-
- Enter PEM Passphrase:
-
+ OpenSSL with a Enter PEM pass phrase:
prompt if a TTY is available. Applications can override the client certificate
prompt and the handling of the sslpassword parameter by supplying
their own key password callback; see .
diff --git a/doc/src/sgml/postgres-fdw.sgml b/doc/src/sgml/postgres-fdw.sgml
index 94992be4272..eab2cc93784 100644
--- a/doc/src/sgml/postgres-fdw.sgml
+++ b/doc/src/sgml/postgres-fdw.sgml
@@ -151,10 +151,10 @@
A superuser may override this check on a per-user-mapping basis by setting
the user mapping option password_required 'false', e.g.
-
- ALTER USER MAPPING FOR some_non_superuser SERVER loopback_nopw
- OPTIONS (ADD password_required 'false');
-
+
+ALTER USER MAPPING FOR some_non_superuser SERVER loopback_nopw
+OPTIONS (ADD password_required 'false');
+
To prevent unprivileged users from exploiting the authentication rights
of the unix user the postgres server is running as to escalate to superuser
rights, only the superuser may set this option on a user mapping.