mirror of
https://git.postgresql.org/git/postgresql.git
synced 2025-02-23 19:39:53 +08:00
Fix some typos and some incorrectly duplicated words
Author: Justin Pryzby Reviewed-by: David Rowley Discussion: https://postgr.es/m/ZD3D1QxoccnN8A1V@telsasoft.com
This commit is contained in:
parent
b4dbf3e924
commit
eef231e816
@ -428,7 +428,7 @@ SELECT data FROM pg_logical_slot_get_changes('regression_slot', NULL, NULL, 'inc
|
||||
-- test whether a known, but not yet logged toplevel xact, followed by a
|
||||
-- subxact commit is handled correctly
|
||||
BEGIN;
|
||||
SELECT pg_current_xact_id() != '0'; -- so no fixed xid apears in the outfile
|
||||
SELECT pg_current_xact_id() != '0'; -- so no fixed xid appears in the outfile
|
||||
?column?
|
||||
----------
|
||||
t
|
||||
|
@ -236,7 +236,7 @@ SELECT data FROM pg_logical_slot_get_changes('regression_slot', NULL, NULL, 'inc
|
||||
-- test whether a known, but not yet logged toplevel xact, followed by a
|
||||
-- subxact commit is handled correctly
|
||||
BEGIN;
|
||||
SELECT pg_current_xact_id() != '0'; -- so no fixed xid apears in the outfile
|
||||
SELECT pg_current_xact_id() != '0'; -- so no fixed xid appears in the outfile
|
||||
SAVEPOINT a;
|
||||
INSERT INTO tr_sub(path) VALUES ('4-top-1-#1');
|
||||
RELEASE SAVEPOINT a;
|
||||
|
@ -346,7 +346,7 @@ ALTER ROLE myname SET enable_indexscan TO off;
|
||||
role using <literal>SET ROLE</literal>. However, since any user who has
|
||||
<literal>ADMIN OPTION</literal> on a role can grant membership in that
|
||||
role to any other user, the <literal>CREATEROLE</literal> user can gain
|
||||
access to the created role by simplying granting that role back to
|
||||
access to the created role by simply granting that role back to
|
||||
themselves with the <literal>INHERIT</literal> and/or <literal>SET</literal>
|
||||
options. Thus, the fact that privileges are not inherited by default nor
|
||||
is <literal>SET ROLE</literal> granted by default is a safeguard against
|
||||
|
@ -4051,7 +4051,7 @@ recurse_push_qual(Node *setOp, Query *topquery,
|
||||
*
|
||||
* extra_used_attrs can be passed as non-NULL to mark any columns (offset by
|
||||
* FirstLowInvalidHeapAttributeNumber) that we should not remove. This
|
||||
* parameter is modifed by the function, so callers must make a copy if they
|
||||
* parameter is modified by the function, so callers must make a copy if they
|
||||
* need to use the passed in Bitmapset after calling this function.
|
||||
*
|
||||
* To avoid affecting column numbering in the targetlist, we don't physically
|
||||
|
@ -436,7 +436,7 @@ get_relation_info(PlannerInfo *root, Oid relationObjectId, bool inhparent,
|
||||
* the number-of-tuples estimate to equal the parent table; if it
|
||||
* is partial then we have to use the same methods as we would for
|
||||
* a table, except we can be sure that the index is not larger
|
||||
* than the table. We must ignore partitioned indexes here as as
|
||||
* than the table. We must ignore partitioned indexes here as
|
||||
* there are not physical indexes.
|
||||
*/
|
||||
if (indexRelation->rd_rel->relkind != RELKIND_PARTITIONED_INDEX)
|
||||
|
@ -1771,7 +1771,7 @@ static void
|
||||
pgoutput_stream_stop(struct LogicalDecodingContext *ctx,
|
||||
ReorderBufferTXN *txn)
|
||||
{
|
||||
/* we should be streaming a trasanction */
|
||||
/* we should be streaming a transaction */
|
||||
Assert(in_streaming);
|
||||
|
||||
OutputPluginPrepareWrite(ctx, true);
|
||||
|
@ -678,7 +678,7 @@ pg_xact_status(PG_FUNCTION_ARGS)
|
||||
Assert(TransactionIdIsValid(xid));
|
||||
|
||||
/*
|
||||
* Like when doing visiblity checks on a row, check whether the
|
||||
* Like when doing visibility checks on a row, check whether the
|
||||
* transaction is still in progress before looking into the CLOG.
|
||||
* Otherwise we would incorrectly return "committed" for a transaction
|
||||
* that is committing and has already updated the CLOG, but hasn't
|
||||
|
@ -324,7 +324,7 @@ $node->command_checks_all(
|
||||
qr/pg_amcheck: warning: no connectable databases to check matching "no_such_database\.public\.foo_idx"/,
|
||||
qr/pg_amcheck: error: no relations to check/,
|
||||
],
|
||||
'checking otherwise existent objets in the wrong databases');
|
||||
'checking otherwise existent objects in the wrong databases');
|
||||
|
||||
|
||||
#########################################
|
||||
|
@ -165,7 +165,7 @@ bbstreamer_buffer_bytes(bbstreamer *streamer, const char **data, int *len,
|
||||
}
|
||||
|
||||
/*
|
||||
* This is a convenence method for use when implementing a bbstreamer; it is
|
||||
* This is a convenience method for use when implementing a bbstreamer; it is
|
||||
* not for use by outsider callers. It attempts to add enough data to the
|
||||
* bbstreamer's buffer to reach a length of target_bytes and adjusts '*len'
|
||||
* and '*data' accordingly. It returns true if the target length has been
|
||||
|
@ -997,11 +997,11 @@ dumpRoleMembership(PGconn *conn)
|
||||
/*
|
||||
* We can't dump these GRANT commands in arbitrary order, because a role
|
||||
* that is named as a grantor must already have ADMIN OPTION on the
|
||||
* role for which it is granting permissions, except for the boostrap
|
||||
* role for which it is granting permissions, except for the bootstrap
|
||||
* superuser, who can always be named as the grantor.
|
||||
*
|
||||
* We handle this by considering these grants role by role. For each role,
|
||||
* we initially consider the only allowable grantor to be the boostrap
|
||||
* we initially consider the only allowable grantor to be the bootstrap
|
||||
* superuser. Every time we grant ADMIN OPTION on the role to some user,
|
||||
* that user also becomes an allowable grantor. We make repeated passes
|
||||
* over the grants for the role, each time dumping those whose grantors
|
||||
|
@ -3541,7 +3541,7 @@ printVerboseErrorMessages(CState *st, pg_time_usec_t *now, bool is_retry)
|
||||
"ends the failed transaction"));
|
||||
appendPQExpBuffer(buf, " (try %u", st->tries);
|
||||
|
||||
/* Print max_tries if it is not unlimitted. */
|
||||
/* Print max_tries if it is not unlimited. */
|
||||
if (max_tries)
|
||||
appendPQExpBuffer(buf, "/%u", max_tries);
|
||||
|
||||
@ -5303,7 +5303,7 @@ GetTableInfo(PGconn *con, bool scale_given)
|
||||
pg_log_error_hint("Perhaps you need to do initialization (\"pgbench -i\") in database \"%s\".", PQdb(con));
|
||||
exit(1);
|
||||
}
|
||||
else /* PQntupes(res) == 1 */
|
||||
else /* PQntuples(res) == 1 */
|
||||
{
|
||||
/* normal case, extract partition information */
|
||||
if (PQgetisnull(res, 0, 1))
|
||||
|
@ -1895,7 +1895,7 @@ table_relation_toast_am(Relation rel)
|
||||
*
|
||||
* toastrel is the relation in which the toasted value is stored.
|
||||
*
|
||||
* valueid identifes which toast value is to be fetched. For the heap,
|
||||
* valueid identifies which toast value is to be fetched. For the heap,
|
||||
* this corresponds to the values stored in the chunk_id column.
|
||||
*
|
||||
* attrsize is the total size of the toast value to be fetched.
|
||||
|
@ -26,7 +26,7 @@ typedef struct BaseBackupTargetHandle BaseBackupTargetHandle;
|
||||
* and either throws an error (if the target detail is not valid or some other
|
||||
* problem, such as a permissions issue, is detected) or returns a pointer to
|
||||
* the data that will be needed to create a bbsink implementing that target.
|
||||
* The second argumnt will be NULL if the TARGET_DETAIL option to the
|
||||
* The second argument will be NULL if the TARGET_DETAIL option to the
|
||||
* BASE_BACKUP command was not specified.
|
||||
*
|
||||
* 'get_sink' is a function that creates the bbsink. The first argument
|
||||
|
@ -112,7 +112,7 @@ typedef bool (*LogicalDecodeFilterPrepareCB) (struct LogicalDecodingContext *ctx
|
||||
const char *gid);
|
||||
|
||||
/*
|
||||
* Callback called for every BEGIN of a prepared trnsaction.
|
||||
* Callback called for every BEGIN of a prepared transaction.
|
||||
*/
|
||||
typedef void (*LogicalDecodeBeginPrepareCB) (struct LogicalDecodingContext *ctx,
|
||||
ReorderBufferTXN *txn);
|
||||
|
@ -321,7 +321,7 @@ tas(volatile slock_t *lock)
|
||||
/*
|
||||
* Solaris has always run sparc processors in TSO (total store) mode, but
|
||||
* linux didn't use to and the *BSDs still don't. So, be careful about
|
||||
* acquire/release semantics. The CPU will treat superfluous membars as
|
||||
* acquire/release semantics. The CPU will treat superfluous members as
|
||||
* NOPs, so it's just code space.
|
||||
*/
|
||||
#define HAS_TEST_AND_SET
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Exercise the case where a read-only serializable transaction has
|
||||
# SXACT_FLAG_RO_SAFE set in a parallel query. This variant is like
|
||||
# two copies of #2 running at the same time, and excercises the case
|
||||
# two copies of #2 running at the same time, and exercises the case
|
||||
# where another transaction has the same xmin, and it is the oldest.
|
||||
|
||||
setup
|
||||
|
@ -337,7 +337,7 @@ GRANT SET, ALTER SYSTEM ON PARAMETER
|
||||
autovacuum_work_mem, hash_mem_multiplier, max_stack_depth,
|
||||
shared_buffers, temp_file_limit, work_mem
|
||||
TO regress_host_resource_admin;
|
||||
-- Check the new role now has privilges on parameters
|
||||
-- Check the new role now has privileges on parameters
|
||||
SELECT has_parameter_privilege('regress_host_resource_admin', 'work_mem', 'SET, ALTER SYSTEM');
|
||||
has_parameter_privilege
|
||||
-------------------------
|
||||
|
@ -133,7 +133,7 @@ GRANT SET, ALTER SYSTEM ON PARAMETER
|
||||
autovacuum_work_mem, hash_mem_multiplier, max_stack_depth,
|
||||
shared_buffers, temp_file_limit, work_mem
|
||||
TO regress_host_resource_admin;
|
||||
-- Check the new role now has privilges on parameters
|
||||
-- Check the new role now has privileges on parameters
|
||||
SELECT has_parameter_privilege('regress_host_resource_admin', 'work_mem', 'SET, ALTER SYSTEM');
|
||||
SELECT has_parameter_privilege('regress_host_resource_admin', 'work_mem', 'SET');
|
||||
SELECT has_parameter_privilege('regress_host_resource_admin', 'work_mem', 'ALTER SYSTEM');
|
||||
|
@ -1,7 +1,7 @@
|
||||
/* $FreeBSD$ */
|
||||
/* See r303484 and r309342 */
|
||||
void t(void) {
|
||||
/* The two if statements below excercise two different code paths. */
|
||||
/* The two if statements below exercise two different code paths. */
|
||||
|
||||
if (1) /* a */ int a; else /* b */ int b;
|
||||
|
||||
|
@ -3,7 +3,7 @@
|
||||
void
|
||||
t(void)
|
||||
{
|
||||
/* The two if statements below excercise two different code paths. */
|
||||
/* The two if statements below exercise two different code paths. */
|
||||
|
||||
if (1) /* a */
|
||||
int a;
|
||||
|
Loading…
Reference in New Issue
Block a user