diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2023-05-21 10:55:18 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2023-05-21 10:55:18 -0400 |
commit | a2eb99a01e015a76682911ae3980762f6ee6ac8c (patch) | |
tree | 76f99f8273498cc0e3a11641475e455f348070b4 /src/interfaces/libpq/fe-secure-gssapi.c | |
parent | f4001a553770b3114dd11846c6789ad6c34ef111 (diff) | |
download | postgresql-a2eb99a01e015a76682911ae3980762f6ee6ac8c.tar.gz postgresql-a2eb99a01e015a76682911ae3980762f6ee6ac8c.zip |
Expand some more uses of "deleg" to "delegation" or "delegated".
Complete the task begun in 9c0a0e2ed: we don't want to use the
abbreviation "deleg" for GSS delegation in any user-visible places.
(For consistency, this also changes most internal uses too.)
Abhijit Menon-Sen and Tom Lane
Discussion: https://postgr.es/m/949048.1684639317@sss.pgh.pa.us
Diffstat (limited to 'src/interfaces/libpq/fe-secure-gssapi.c')
-rw-r--r-- | src/interfaces/libpq/fe-secure-gssapi.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/interfaces/libpq/fe-secure-gssapi.c b/src/interfaces/libpq/fe-secure-gssapi.c index 3b2d0fd1401..c77d5cfe9f5 100644 --- a/src/interfaces/libpq/fe-secure-gssapi.c +++ b/src/interfaces/libpq/fe-secure-gssapi.c @@ -622,18 +622,18 @@ pqsecure_open_gss(PGconn *conn) if (ret != STATUS_OK) return PGRES_POLLING_FAILED; - if (conn->gssdeleg && pg_strcasecmp(conn->gssdeleg, "enable") == 0) + if (conn->gssdelegation && pg_strcasecmp(conn->gssdelegation, "enable") == 0) { /* Acquire credentials if possible */ if (conn->gcred == GSS_C_NO_CREDENTIAL) (void) pg_GSS_have_cred_cache(&conn->gcred); /* - * We have credentials and gssdeleg is enabled, so request credential - * delegation. This may or may not actually result in credentials - * being delegated- it depends on if the forwardable flag has been set - * in the credential and if the server is configured to accept - * delegated credentials. + * We have credentials and gssdelegation is enabled, so request + * credential delegation. This may or may not actually result in + * credentials being delegated- it depends on if the forwardable flag + * has been set in the credential and if the server is configured to + * accept delegated credentials. */ if (conn->gcred != GSS_C_NO_CREDENTIAL) gss_flags |= GSS_C_DELEG_FLAG; |