mirror of
https://github.com/postgres/postgres.git
synced 2025-06-13 07:41:39 +03:00
Fix some spelling errors in the documentation
Author: Daniel Gustafsson <daniel@yesql.se>
This commit is contained in:
@ -8375,7 +8375,7 @@ main(int argc, char **argv)
|
||||
exit_nicely(conn);
|
||||
}
|
||||
|
||||
/* Set always-secure search path, so malicous users can't take control. */
|
||||
/* Set always-secure search path, so malicious users can't take control. */
|
||||
res = PQexec(conn,
|
||||
"SELECT pg_catalog.set_config('search_path', '', false)");
|
||||
if (PQresultStatus(res) != PGRES_TUPLES_OK)
|
||||
@ -8545,7 +8545,7 @@ main(int argc, char **argv)
|
||||
exit_nicely(conn);
|
||||
}
|
||||
|
||||
/* Set always-secure search path, so malicous users can't take control. */
|
||||
/* Set always-secure search path, so malicious users can't take control. */
|
||||
res = PQexec(conn,
|
||||
"SELECT pg_catalog.set_config('search_path', '', false)");
|
||||
if (PQresultStatus(res) != PGRES_TUPLES_OK)
|
||||
@ -8772,7 +8772,7 @@ main(int argc, char **argv)
|
||||
exit_nicely(conn);
|
||||
}
|
||||
|
||||
/* Set always-secure search path, so malicous users can't take control. */
|
||||
/* Set always-secure search path, so malicious users can't take control. */
|
||||
res = PQexec(conn, "SET search_path = testlibpq3");
|
||||
if (PQresultStatus(res) != PGRES_COMMAND_OK)
|
||||
{
|
||||
|
@ -899,7 +899,7 @@ main(int argc, char **argv)
|
||||
exit_nicely(conn);
|
||||
}
|
||||
|
||||
/* Set always-secure search path, so malicous users can't take control. */
|
||||
/* Set always-secure search path, so malicious users can't take control. */
|
||||
res = PQexec(conn,
|
||||
"SELECT pg_catalog.set_config('search_path', '', false)");
|
||||
if (PQresultStatus(res) != PGRES_TUPLES_OK)
|
||||
|
Reference in New Issue
Block a user