diff options
Diffstat (limited to 'src/backend')
-rw-r--r-- | src/backend/access/heap/heapam.c | 4 | ||||
-rw-r--r-- | src/backend/access/transam/xlog.c | 16 | ||||
-rw-r--r-- | src/backend/catalog/dependency.c | 4 | ||||
-rw-r--r-- | src/backend/commands/tablecmds.c | 4 | ||||
-rw-r--r-- | src/backend/executor/spi.c | 6 | ||||
-rw-r--r-- | src/backend/libpq/auth.c | 16 | ||||
-rw-r--r-- | src/backend/libpq/hba.c | 18 | ||||
-rw-r--r-- | src/backend/main/main.c | 6 | ||||
-rw-r--r-- | src/backend/port/win32/security.c | 26 | ||||
-rw-r--r-- | src/backend/port/win32/signal.c | 6 | ||||
-rw-r--r-- | src/backend/postmaster/bgwriter.c | 4 | ||||
-rw-r--r-- | src/backend/postmaster/postmaster.c | 6 | ||||
-rw-r--r-- | src/backend/postmaster/syslogger.c | 12 | ||||
-rw-r--r-- | src/backend/tcop/postgres.c | 4 | ||||
-rw-r--r-- | src/backend/utils/adt/misc.c | 4 | ||||
-rw-r--r-- | src/backend/utils/misc/guc.c | 34 |
16 files changed, 85 insertions, 85 deletions
diff --git a/src/backend/access/heap/heapam.c b/src/backend/access/heap/heapam.c index a5426d089a9..b9a6072c799 100644 --- a/src/backend/access/heap/heapam.c +++ b/src/backend/access/heap/heapam.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/access/heap/heapam.c,v 1.177 2004/10/01 16:39:54 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/access/heap/heapam.c,v 1.178 2004/10/12 21:54:34 petere Exp $ * * * INTERFACE ROUTINES @@ -492,7 +492,7 @@ conditional_relation_open(Oid relationId, LOCKMODE lockmode, bool nowait) if (!ConditionalLockRelation(r, lockmode)) ereport(ERROR, (errcode(ERRCODE_LOCK_NOT_AVAILABLE), - errmsg("could not obtain lock on \"%s\"", + errmsg("could not obtain lock on relation \"%s\"", RelationGetRelationName(r)))); } else diff --git a/src/backend/access/transam/xlog.c b/src/backend/access/transam/xlog.c index faa151384dc..52b3066a8d2 100644 --- a/src/backend/access/transam/xlog.c +++ b/src/backend/access/transam/xlog.c @@ -7,7 +7,7 @@ * Portions Copyright (c) 1996-2004, PostgreSQL Global Development Group * Portions Copyright (c) 1994, Regents of the University of California * - * $PostgreSQL: pgsql/src/backend/access/transam/xlog.c,v 1.172 2004/10/09 02:46:40 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/access/transam/xlog.c,v 1.173 2004/10/12 21:54:35 petere Exp $ * *------------------------------------------------------------------------- */ @@ -1933,7 +1933,7 @@ RestoreArchivedFile(char *path, const char *xlogfname, if (errno != ENOENT) ereport(FATAL, (errcode_for_file_access(), - errmsg("could not stat \"%s\": %m", + errmsg("could not stat file \"%s\": %m", xlogpath))); } else @@ -2035,7 +2035,7 @@ RestoreArchivedFile(char *path, const char *xlogfname, if (errno != ENOENT) ereport(FATAL, (errcode_for_file_access(), - errmsg("could not stat \"%s\": %m", + errmsg("could not stat file \"%s\": %m", xlogpath))); } } @@ -2739,7 +2739,7 @@ readTimeLineHistory(TimeLineID targetTLI) if (errno != ENOENT) ereport(FATAL, (errcode_for_file_access(), - errmsg("could not open \"%s\": %m", path))); + errmsg("could not open file \"%s\": %m", path))); /* Not there, so assume no parents */ return list_make1_int((int) targetTLI); } @@ -2829,7 +2829,7 @@ existsTimeLineHistory(TimeLineID probeTLI) if (errno != ENOENT) ereport(FATAL, (errcode_for_file_access(), - errmsg("could not open \"%s\": %m", path))); + errmsg("could not open file \"%s\": %m", path))); return false; } } @@ -2927,7 +2927,7 @@ writeTimeLineHistory(TimeLineID newTLI, TimeLineID parentTLI, if (errno != ENOENT) ereport(FATAL, (errcode_for_file_access(), - errmsg("could not open \"%s\": %m", path))); + errmsg("could not open file \"%s\": %m", path))); /* Not there, so assume parent has no parents */ } else @@ -4077,7 +4077,7 @@ StartupXLOG(void) { ereport(PANIC, (errmsg("could not locate required checkpoint record"), - errhint("If you are not restoring from a backup, try removing $PGDATA/backup_label."))); + errhint("If you are not restoring from a backup, try removing the file \"%s/backup_label\".", DataDir))); } } else @@ -5288,7 +5288,7 @@ pg_start_backup(PG_FUNCTION_ARGS) if (errno != ENOENT) ereport(ERROR, (errcode_for_file_access(), - errmsg("could not stat \"%s\": %m", + errmsg("could not stat file \"%s\": %m", labelfilepath))); } else diff --git a/src/backend/catalog/dependency.c b/src/backend/catalog/dependency.c index 586be553a85..220983c0f9f 100644 --- a/src/backend/catalog/dependency.c +++ b/src/backend/catalog/dependency.c @@ -8,7 +8,7 @@ * Portions Copyright (c) 1994, Regents of the University of California * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/catalog/dependency.c,v 1.39 2004/08/29 05:06:41 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/catalog/dependency.c,v 1.40 2004/10/12 21:54:36 petere Exp $ * *------------------------------------------------------------------------- */ @@ -1623,7 +1623,7 @@ getObjectDescription(const ObjectAddress *object) else nspname = get_namespace_name(opcForm->opcnamespace); - appendStringInfo(&buffer, gettext("operator class %s for %s"), + appendStringInfo(&buffer, gettext("operator class %s for access method %s"), quote_qualified_identifier(nspname, NameStr(opcForm->opcname)), NameStr(amForm->amname)); diff --git a/src/backend/commands/tablecmds.c b/src/backend/commands/tablecmds.c index c8efaa23b1a..9e7f1c812e4 100644 --- a/src/backend/commands/tablecmds.c +++ b/src/backend/commands/tablecmds.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/commands/tablecmds.c,v 1.133 2004/09/23 23:20:24 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/commands/tablecmds.c,v 1.134 2004/10/12 21:54:36 petere Exp $ * *------------------------------------------------------------------------- */ @@ -5392,7 +5392,7 @@ ATPrepSetTableSpace(AlteredTableInfo *tab, Relation rel, char *tablespacename) if (OidIsValid(tab->newTableSpace)) ereport(ERROR, (errcode(ERRCODE_SYNTAX_ERROR), - errmsg("multiple SET TABLESPACE subcommands are not valid"))); + errmsg("cannot have multiple SET TABLESPACE subcommands"))); tab->newTableSpace = tablespaceId; } diff --git a/src/backend/executor/spi.c b/src/backend/executor/spi.c index 3845b94eb92..7d0c9b8a723 100644 --- a/src/backend/executor/spi.c +++ b/src/backend/executor/spi.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/executor/spi.c,v 1.129 2004/09/16 20:17:20 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/executor/spi.c,v 1.130 2004/10/12 21:54:37 petere Exp $ * *------------------------------------------------------------------------- */ @@ -188,7 +188,7 @@ AtEOXact_SPI(bool isCommit) ereport(WARNING, (errcode(ERRCODE_WARNING), errmsg("transaction left non-empty SPI stack"), - errhint("Check for missing \"SPI_finish\" calls"))); + errhint("Check for missing \"SPI_finish\" calls."))); _SPI_current = _SPI_stack = NULL; _SPI_stack_depth = 0; @@ -1571,7 +1571,7 @@ _SPI_error_callback(void *arg) internalerrquery(query); } else - errcontext("SQL query \"%s\"", query); + errcontext("SQL statement \"%s\"", query); } /* diff --git a/src/backend/libpq/auth.c b/src/backend/libpq/auth.c index bce2cdc04bd..b374077ee41 100644 --- a/src/backend/libpq/auth.c +++ b/src/backend/libpq/auth.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.118 2004/08/29 05:06:43 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.119 2004/10/12 21:54:38 petere Exp $ * *------------------------------------------------------------------------- */ @@ -363,24 +363,24 @@ auth_failed(Port *port, int status) switch (port->auth_method) { case uaReject: - errstr = gettext_noop("Rejected host: authentication failed for user \"%s\""); + errstr = gettext_noop("authentication failed for user \"%s\": host rejected"); break; case uaKrb4: - errstr = gettext_noop("Kerberos4 authentication failed for user \"%s\""); + errstr = gettext_noop("Kerberos 4 authentication failed for user \"%s\""); break; case uaKrb5: - errstr = gettext_noop("Kerberos5 authentication failed for user \"%s\""); + errstr = gettext_noop("Kerberos 5 authentication failed for user \"%s\""); break; case uaTrust: - errstr = gettext_noop("Trusted authentication failed for user \"%s\""); + errstr = gettext_noop("\"trust\" authentication failed for user \"%s\""); break; case uaIdent: - errstr = gettext_noop("IDENT authentication failed for user \"%s\""); + errstr = gettext_noop("Ident authentication failed for user \"%s\""); break; case uaMD5: case uaCrypt: case uaPassword: - errstr = gettext_noop("Password authentication failed for user \"%s\""); + errstr = gettext_noop("password authentication failed for user \"%s\""); break; #ifdef USE_PAM case uaPAM: @@ -388,7 +388,7 @@ auth_failed(Port *port, int status) break; #endif /* USE_PAM */ default: - errstr = gettext_noop("Unknown auth method: authentication failed for user \"%s\""); + errstr = gettext_noop("authentication failed for user \"%s\": invalid authentication method"); break; } diff --git a/src/backend/libpq/hba.c b/src/backend/libpq/hba.c index 1e73efbcdfa..c27983e794c 100644 --- a/src/backend/libpq/hba.c +++ b/src/backend/libpq/hba.c @@ -10,7 +10,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/libpq/hba.c,v 1.132 2004/10/09 23:12:57 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/libpq/hba.c,v 1.133 2004/10/12 21:54:38 petere Exp $ * *------------------------------------------------------------------------- */ @@ -737,7 +737,7 @@ parse_hba(List *line, int line_num, hbaPort *port, { ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("invalid IP address \"%s\" in \"%s\" line %d: %s", + errmsg("invalid IP address \"%s\" in file \"%s\" line %d: %s", token, HbaFileName, line_num, gai_strerror(ret)))); if (cidr_slash) @@ -772,7 +772,7 @@ parse_hba(List *line, int line_num, hbaPort *port, { ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("invalid IP mask \"%s\" in \"%s\" line %d: %s", + errmsg("invalid IP mask \"%s\" in file \"%s\" line %d: %s", token, HbaFileName, line_num, gai_strerror(ret)))); if (gai_result) @@ -787,7 +787,7 @@ parse_hba(List *line, int line_num, hbaPort *port, { ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("IP address and mask do not match in \"%s\" line %d", + errmsg("IP address and mask do not match in file \"%s\" line %d", HbaFileName, line_num))); goto hba_other_error; } @@ -845,13 +845,13 @@ hba_syntax: if (line_item) ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("invalid entry in \"%s\" at line %d, token \"%s\"", + errmsg("invalid entry in file \"%s\" at line %d, token \"%s\"", HbaFileName, line_num, (char *) lfirst(line_item)))); else ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("missing field in \"%s\" at end of line %d", + errmsg("missing field in file \"%s\" at end of line %d", HbaFileName, line_num))); /* Come here if suitable message already logged */ @@ -1101,13 +1101,13 @@ ident_syntax: if (line_item) ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("invalid entry in \"%s\" at line %d, token \"%s\"", + errmsg("invalid entry in file \"%s\" at line %d, token \"%s\"", IdentFileName, line_number, (const char *) lfirst(line_item)))); else ereport(LOG, (errcode(ERRCODE_CONFIG_FILE_ERROR), - errmsg("missing entry in \"%s\" at end of line %d", + errmsg("missing entry in file \"%s\" at end of line %d", IdentFileName, line_number))); *error_p = true; @@ -1634,7 +1634,7 @@ authident(hbaPort *port) } ereport(DEBUG1, - (errmsg("IDENT code identifies remote user as \"%s\"", + (errmsg("Ident protocol identifies remote user as \"%s\"", ident_user))); if (check_ident_usermap(port->auth_arg, port->user_name, ident_user)) diff --git a/src/backend/main/main.c b/src/backend/main/main.c index bcab85cbc57..81cba22ae1e 100644 --- a/src/backend/main/main.c +++ b/src/backend/main/main.c @@ -13,7 +13,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/main/main.c,v 1.90 2004/09/24 06:29:07 neilc Exp $ + * $PostgreSQL: pgsql/src/backend/main/main.c,v 1.91 2004/10/12 21:54:38 petere Exp $ * *------------------------------------------------------------------------- */ @@ -243,9 +243,9 @@ main(int argc, char *argv[]) #else /* WIN32 */ if (pgwin32_is_admin()) { - write_stderr("execution of PostgreSQL by a user with administrative permissions is not permitted.\n" + write_stderr("Execution of PostgreSQL by a user with administrative permissions is not permitted.\n" "The server must be started under an unprivileged user ID to prevent\n" - "possible system security compromise. See the documentation for\n" + "possible system security compromises. See the documentation for\n" "more information on how to properly start the server.\n"); exit(1); } diff --git a/src/backend/port/win32/security.c b/src/backend/port/win32/security.c index f546b9cd8a0..033442aa315 100644 --- a/src/backend/port/win32/security.c +++ b/src/backend/port/win32/security.c @@ -6,7 +6,7 @@ * Portions Copyright (c) 1996-2004, PostgreSQL Global Development Group * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/port/win32/security.c,v 1.4 2004/08/29 05:06:46 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/port/win32/security.c,v 1.5 2004/10/12 21:54:39 petere Exp $ * *------------------------------------------------------------------------- */ @@ -36,20 +36,20 @@ pgwin32_is_admin(void) if (!OpenProcessToken(GetCurrentProcess(), TOKEN_READ, &AccessToken)) { - write_stderr("failed to open process token: %d\n", + write_stderr("could not open process token: %d\n", (int) GetLastError()); exit(1); } if (GetTokenInformation(AccessToken, TokenGroups, NULL, 0, &InfoBufferSize)) { - write_stderr("failed to get token information - got zero size!\n"); + write_stderr("could not get token information: got zero size\n"); exit(1); } if (GetLastError() != ERROR_INSUFFICIENT_BUFFER) { - write_stderr("failed to get token information: %d\n", + write_stderr("could not get token information: %d\n", (int) GetLastError()); exit(1); } @@ -57,7 +57,7 @@ pgwin32_is_admin(void) InfoBuffer = malloc(InfoBufferSize); if (!InfoBuffer) { - write_stderr("failed to allocate %i bytes for token information!\n", + write_stderr("could not allocate %i bytes for token information\n", (int) InfoBufferSize); exit(1); } @@ -66,7 +66,7 @@ pgwin32_is_admin(void) if (!GetTokenInformation(AccessToken, TokenGroups, InfoBuffer, InfoBufferSize, &InfoBufferSize)) { - write_stderr("failed to get token information: %d\n", + write_stderr("could not get token information: %d\n", (int) GetLastError()); exit(1); } @@ -77,7 +77,7 @@ pgwin32_is_admin(void) SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsSid)) { - write_stderr("failed to get SID for Administrators group: %d\n", + write_stderr("could not get SID for Administrators group: %d\n", (int) GetLastError()); exit(1); } @@ -86,7 +86,7 @@ pgwin32_is_admin(void) SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_POWER_USERS, 0, 0, 0, 0, 0, 0, &PowerUsersSid)) { - write_stderr("failed to get SID for PowerUsers group: %d\n", + write_stderr("could not get SID for PowerUsers group: %d\n", (int) GetLastError()); exit(1); } @@ -146,7 +146,7 @@ pgwin32_is_service(void) if (!OpenProcessToken(GetCurrentProcess(), TOKEN_READ, &AccessToken)) { - fprintf(stderr, "failed to open process token: %d\n", + fprintf(stderr, "could not open process token: %d\n", (int) GetLastError()); return -1; } @@ -154,7 +154,7 @@ pgwin32_is_service(void) /* First check for local system */ if (!GetTokenInformation(AccessToken, TokenUser, InfoBuffer, 1024, &InfoBufferSize)) { - fprintf(stderr, "failed to get token information: %d\n", + fprintf(stderr, "could not get token information: %d\n", (int) GetLastError()); return -1; } @@ -163,7 +163,7 @@ pgwin32_is_service(void) SECURITY_LOCAL_SYSTEM_RID, 0, 0, 0, 0, 0, 0, 0, &LocalSystemSid)) { - fprintf(stderr, "failed to get SID for local system account\n"); + fprintf(stderr, "could not get SID for local system account\n"); CloseHandle(AccessToken); return -1; } @@ -181,7 +181,7 @@ pgwin32_is_service(void) /* Now check for group SID */ if (!GetTokenInformation(AccessToken, TokenGroups, InfoBuffer, 1024, &InfoBufferSize)) { - fprintf(stderr, "failed to get token information: %d\n", + fprintf(stderr, "could not get token information: %d\n", (int) GetLastError()); return -1; } @@ -190,7 +190,7 @@ pgwin32_is_service(void) SECURITY_SERVICE_RID, 0, 0, 0, 0, 0, 0, 0, &ServiceSid)) { - fprintf(stderr, "failed to get SID for service group\n"); + fprintf(stderr, "could not get SID for service group\n"); CloseHandle(AccessToken); return -1; } diff --git a/src/backend/port/win32/signal.c b/src/backend/port/win32/signal.c index 0a6b68e8fee..566b5075204 100644 --- a/src/backend/port/win32/signal.c +++ b/src/backend/port/win32/signal.c @@ -6,7 +6,7 @@ * Portions Copyright (c) 1996-2004, PostgreSQL Global Development Group * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/port/win32/signal.c,v 1.7 2004/08/29 05:06:46 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/port/win32/signal.c,v 1.8 2004/10/12 21:54:39 petere Exp $ * *------------------------------------------------------------------------- */ @@ -224,7 +224,7 @@ pg_signal_thread(LPVOID param) PIPE_UNLIMITED_INSTANCES, 16, 16, 1000, NULL); if (pipe == INVALID_HANDLE_VALUE) { - write_stderr("failed to create signal listener pipe: %d. Retrying.\n", (int) GetLastError()); + write_stderr("could not create signal listener pipe: %d; retrying\n", (int) GetLastError()); SleepEx(500, FALSE); continue; } @@ -236,7 +236,7 @@ pg_signal_thread(LPVOID param) (LPTHREAD_START_ROUTINE) pg_signal_dispatch_thread, (LPVOID) pipe, 0, NULL); if (hThread == INVALID_HANDLE_VALUE) - write_stderr("failed to create signal dispatch thread: %d\n", + write_stderr("could not create signal dispatch thread: %d\n", (int) GetLastError()); else CloseHandle(hThread); diff --git a/src/backend/postmaster/bgwriter.c b/src/backend/postmaster/bgwriter.c index 5e969d1348c..f0b32b12654 100644 --- a/src/backend/postmaster/bgwriter.c +++ b/src/backend/postmaster/bgwriter.c @@ -37,7 +37,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/postmaster/bgwriter.c,v 1.8 2004/08/29 05:06:46 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/postmaster/bgwriter.c,v 1.9 2004/10/12 21:54:40 petere Exp $ * *------------------------------------------------------------------------- */ @@ -487,7 +487,7 @@ BgWriterShmemInit(void) if (BgWriterShmem == NULL) ereport(FATAL, (errcode(ERRCODE_OUT_OF_MEMORY), - errmsg("insufficient shared memory for bgwriter"))); + errmsg("not enough shared memory for background writer"))); if (found) return; /* already initialized */ diff --git a/src/backend/postmaster/postmaster.c b/src/backend/postmaster/postmaster.c index 1cbe405ea57..509dd7b9b64 100644 --- a/src/backend/postmaster/postmaster.c +++ b/src/backend/postmaster/postmaster.c @@ -37,7 +37,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/postmaster/postmaster.c,v 1.431 2004/10/09 23:13:02 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/postmaster/postmaster.c,v 1.432 2004/10/12 21:54:40 petere Exp $ * * NOTES * @@ -796,7 +796,7 @@ PostmasterMain(int argc, char *argv[]) /* Should we remove the pid file on postmaster exit? */ } else - write_stderr("%s: could not write external pid file \"%s\": %s\n", + write_stderr("%s: could not write external PID file \"%s\": %s\n", progname, external_pid_file, strerror(errno)); } @@ -3759,7 +3759,7 @@ win32_sigchld_waiter(LPVOID param) if (r == WAIT_OBJECT_0) pg_queue_signal(SIGCHLD); else - write_stderr("ERROR: failed to wait on child process handle: %d\n", + write_stderr("could not wait on child process handle: %d\n", (int) GetLastError()); CloseHandle(procHandle); return 0; diff --git a/src/backend/postmaster/syslogger.c b/src/backend/postmaster/syslogger.c index 958af881179..9d05de45e9a 100644 --- a/src/backend/postmaster/syslogger.c +++ b/src/backend/postmaster/syslogger.c @@ -18,7 +18,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/postmaster/syslogger.c,v 1.9 2004/09/21 00:21:25 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/postmaster/syslogger.c,v 1.10 2004/10/12 21:54:40 petere Exp $ * *------------------------------------------------------------------------- */ @@ -402,7 +402,7 @@ SysLogger_Start(void) if (pgpipe(syslogPipe) < 0) ereport(FATAL, (errcode_for_socket_access(), - (errmsg("could not create pipe for syslogging: %m")))); + (errmsg("could not create pipe for syslog: %m")))); } #else if (!syslogPipe[0]) @@ -444,7 +444,7 @@ SysLogger_Start(void) if (!syslogFile) ereport(FATAL, (errcode_for_file_access(), - (errmsg("could not create logfile \"%s\": %m", + (errmsg("could not create log file \"%s\": %m", filename)))); setvbuf(syslogFile, NULL, LBF_MODE, 0); @@ -700,7 +700,7 @@ write_syslogger_file_binary(const char *buffer, int count) if (rc != count) ereport(LOG, (errcode_for_file_access(), - errmsg("could not write to logfile: %m"))); + errmsg("could not write to log file: %m"))); } #ifdef WIN32 @@ -787,7 +787,7 @@ logfile_rotate(bool time_based_rotation) ereport(LOG, (errcode_for_file_access(), - errmsg("could not open new logfile \"%s\": %m", + errmsg("could not open new log file \"%s\": %m", filename))); /* @@ -799,7 +799,7 @@ logfile_rotate(bool time_based_rotation) if (saveerrno != ENFILE && saveerrno != EMFILE) { ereport(LOG, - (errmsg("disabling auto rotation (use SIGHUP to reenable)"))); + (errmsg("disabling automatic rotation (use SIGHUP to reenable)"))); Log_RotationAge = 0; Log_RotationSize = 0; } diff --git a/src/backend/tcop/postgres.c b/src/backend/tcop/postgres.c index 1c668445519..9f4e8b06bad 100644 --- a/src/backend/tcop/postgres.c +++ b/src/backend/tcop/postgres.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/tcop/postgres.c,v 1.434 2004/10/08 01:36:35 tgl Exp $ + * $PostgreSQL: pgsql/src/backend/tcop/postgres.c,v 1.435 2004/10/12 21:54:40 petere Exp $ * * NOTES * this is the "main" module of the postgres backend and @@ -2127,7 +2127,7 @@ usage(const char *progname) printf(gettext(" -o FILENAME send stdout and stderr to given file\n")); printf(gettext(" -P disable system indexes\n")); printf(gettext(" -s show statistics after each query\n")); - printf(gettext(" -S WORK-MEM set amount of memory for sorts (in kbytes)\n")); + printf(gettext(" -S WORK-MEM set amount of memory for sorts (in kB)\n")); printf(gettext(" --describe-config describe configuration parameters, then exit\n")); printf(gettext(" --help show this help, then exit\n")); printf(gettext(" --version output version information, then exit\n")); diff --git a/src/backend/utils/adt/misc.c b/src/backend/utils/adt/misc.c index c7160d1dad4..e0c665eb9f1 100644 --- a/src/backend/utils/adt/misc.c +++ b/src/backend/utils/adt/misc.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/utils/adt/misc.c,v 1.38 2004/08/29 05:06:49 momjian Exp $ + * $PostgreSQL: pgsql/src/backend/utils/adt/misc.c,v 1.39 2004/10/12 21:54:41 petere Exp $ * *------------------------------------------------------------------------- */ @@ -174,7 +174,7 @@ pg_tablespace_databases(PG_FUNCTION_ARGS) errmsg("could not open directory \"%s\": %m", fctx->location))); ereport(WARNING, - (errmsg("%u is not a tablespace oid", tablespaceOid))); + (errmsg("%u is not a tablespace OID", tablespaceOid))); } } funcctx->user_fctx = fctx; diff --git a/src/backend/utils/misc/guc.c b/src/backend/utils/misc/guc.c index deb361e2475..0fcf2b08b3b 100644 --- a/src/backend/utils/misc/guc.c +++ b/src/backend/utils/misc/guc.c @@ -10,7 +10,7 @@ * Written by Peter Eisentraut <peter_e@gmx.net>. * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/utils/misc/guc.c,v 1.242 2004/10/10 23:37:28 neilc Exp $ + * $PostgreSQL: pgsql/src/backend/utils/misc/guc.c,v 1.243 2004/10/12 21:54:42 petere Exp $ * *-------------------------------------------------------------------- */ @@ -489,7 +489,7 @@ static struct config_bool ConfigureNamesBool[] = }, { {"log_disconnections", PGC_BACKEND, LOGGING_WHAT, - gettext_noop("Logs end of a session, including duration"), + gettext_noop("Logs end of a session, including duration."), NULL }, &Log_disconnections, @@ -805,7 +805,7 @@ static struct config_bool ConfigureNamesBool[] = }, { {"default_with_oids", PGC_USERSET, COMPAT_OPTIONS_PREVIOUS, - gettext_noop("By default, newly-created tables should have OIDs"), + gettext_noop("By default, newly-created tables should have OIDs."), NULL }, &default_with_oids, @@ -813,7 +813,7 @@ static struct config_bool ConfigureNamesBool[] = }, { {"redirect_stderr", PGC_POSTMASTER, LOGGING_WHERE, - gettext_noop("Start a subprocess to capture stderr output into log files"), + gettext_noop("Start a subprocess to capture stderr output into log files."), NULL }, &Redirect_stderr, @@ -821,7 +821,7 @@ static struct config_bool ConfigureNamesBool[] = }, { {"log_truncate_on_rotation", PGC_SIGHUP, LOGGING_WHERE, - gettext_noop("Truncate existing log files of same name during log rotation"), + gettext_noop("Truncate existing log files of same name during log rotation."), NULL }, &Log_truncate_on_rotation, @@ -1273,7 +1273,7 @@ static struct config_int ConfigureNamesInt[] = { {"log_rotation_age", PGC_SIGHUP, LOGGING_WHERE, - gettext_noop("Automatic logfile rotation will occur after N minutes"), + gettext_noop("Automatic log file rotation will occur after N minutes"), NULL }, &Log_RotationAge, @@ -1282,7 +1282,7 @@ static struct config_int ConfigureNamesInt[] = { {"log_rotation_size", PGC_SIGHUP, LOGGING_WHERE, - gettext_noop("Automatic logfile rotation will occur after N kilobytes"), + gettext_noop("Automatic log file rotation will occur after N kilobytes"), NULL }, &Log_RotationSize, @@ -1291,7 +1291,7 @@ static struct config_int ConfigureNamesInt[] = { {"max_function_args", PGC_INTERNAL, PRESET_OPTIONS, - gettext_noop("Shows the maximum number of function arguments"), + gettext_noop("Shows the maximum number of function arguments."), NULL, GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE }, @@ -1301,7 +1301,7 @@ static struct config_int ConfigureNamesInt[] = { {"max_index_keys", PGC_INTERNAL, PRESET_OPTIONS, - gettext_noop("Shows the maximum number of index keys"), + gettext_noop("Shows the maximum number of index keys."), NULL, GUC_NOT_IN_SAMPLE | GUC_DISALLOW_IN_FILE }, @@ -1671,8 +1671,8 @@ static struct config_string ConfigureNamesString[] = { {"log_destination", PGC_SIGHUP, LOGGING_WHERE, gettext_noop("Sets the destination for server log output."), - gettext_noop("Valid values are combinations of stderr, syslog " - "and eventlog, depending on platform."), + gettext_noop("Valid values are combinations of \"stderr\", \"syslog\", " + "and \"eventlog\", depending on the platform."), GUC_LIST_INPUT }, &log_destination_string, @@ -1786,7 +1786,7 @@ static struct config_string ConfigureNamesString[] = { {"data_directory", PGC_POSTMASTER, FILE_LOCATIONS, - gettext_noop("Sets the server's data directory"), + gettext_noop("Sets the server's data directory."), NULL }, &data_directory, @@ -1795,7 +1795,7 @@ static struct config_string ConfigureNamesString[] = { {"config_file", PGC_POSTMASTER, FILE_LOCATIONS, - gettext_noop("Sets the server's main configuration file"), + gettext_noop("Sets the server's main configuration file."), NULL, GUC_DISALLOW_IN_FILE }, @@ -1823,7 +1823,7 @@ static struct config_string ConfigureNamesString[] = { {"external_pid_file", PGC_POSTMASTER, FILE_LOCATIONS, - gettext_noop("Writes the postmaster PID to the specified file"), + gettext_noop("Writes the postmaster PID to the specified file."), NULL }, &external_pid_file, @@ -2480,7 +2480,7 @@ SelectConfigFiles(const char *userDoption, const char *progname) else if (!configdir) { write_stderr("%s does not know where to find the server configuration file.\n" - "You must specify the --config_file or -D invocation " + "You must specify the --config-file or -D invocation " "option or set the PGDATA environment variable.\n", progname); return false; @@ -5403,7 +5403,7 @@ assign_log_destination(const char *value, bool doit, GucSource source) if (source >= PGC_S_INTERACTIVE) ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), - errmsg("unrecognised \"log_destination\" key word: \"%s\"", + errmsg("unrecognized \"log_destination\" key word: \"%s\"", tok))); pfree(rawstring); list_free(elemlist); @@ -5685,7 +5685,7 @@ assign_custom_variable_classes(const char *newval, bool doit, GucSource source) */ ereport(LOG, (errcode(ERRCODE_SYNTAX_ERROR), - errmsg("invalid syntax for custom_variable_classes: \"%s\"", newval))); + errmsg("invalid syntax for \"custom_variable_classes\": \"%s\"", newval))); pfree(buf.data); return NULL; } |