diff options
author | Bruce Momjian <bruce@momjian.us> | 2016-08-22 17:20:44 -0400 |
---|---|---|
committer | Bruce Momjian <bruce@momjian.us> | 2016-08-22 17:20:48 -0400 |
commit | 221d63c8d0decb58b9b08e265d24700385a9cdbc (patch) | |
tree | 2b4832e5fade9dd10e763e5f78a7dde787d9abc5 | |
parent | 48b9ca0b60ce4e92caf6b2ad68d40d09f1795fca (diff) | |
download | postgresql-221d63c8d0decb58b9b08e265d24700385a9cdbc.tar.gz postgresql-221d63c8d0decb58b9b08e265d24700385a9cdbc.zip |
doc: fix typo in recent patch
Reported-by: Jeff Janes
Backpatch-through: 9.6
-rw-r--r-- | doc/src/sgml/runtime.sgml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index 51d4f9ca1bc..4f73c043ac5 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -1913,7 +1913,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 </para> <para> - On way to prevent spoofing of <literal>local</> + One way to prevent spoofing of <literal>local</> connections is to use a Unix domain socket directory (<xref linkend="guc-unix-socket-directories">) that has write permission only for a trusted local user. This prevents a malicious user from creating |