Tweak some authentication debug messages to follow project style.
authorTom Lane <[email protected]>
Tue, 5 Nov 2019 19:29:08 +0000 (14:29 -0500)
committerTom Lane <[email protected]>
Tue, 5 Nov 2019 19:29:08 +0000 (14:29 -0500)
Avoid initial capital, since that's not how we do it.

Discussion: https://postgr.es/m/CACP=ajbrFFYUrLyJBLV8=q+eNCapa1xDEyvXhMoYrNphs-xqPw@mail.gmail.com

src/backend/libpq/auth.c

index 5bc42a6726486d9ede27c073103300ca23870f84..909d7369a5fcef8838b41639ffde0a11d3017b33 100644 (file)
@@ -960,7 +960,7 @@ CheckSCRAMAuth(Port *port, char *shadow_pass, char **logdetail)
                        return STATUS_ERROR;
                }
 
-               elog(DEBUG4, "Processing received SASL response of length %d", buf.len);
+               elog(DEBUG4, "processing received SASL response of length %d", buf.len);
 
                /*
                 * The first SASLInitialResponse message is different from the others.
@@ -1151,7 +1151,7 @@ pg_GSS_recvauth(Port *port)
                gbuf.length = buf.len;
                gbuf.value = buf.data;
 
-               elog(DEBUG4, "Processing received GSS token of length %u",
+               elog(DEBUG4, "processing received GSS token of length %u",
                         (unsigned int) gbuf.length);
 
                maj_stat = gss_accept_sec_context(
@@ -1428,8 +1428,7 @@ pg_SSPI_recvauth(Port *port)
                outbuf.pBuffers = OutBuffers;
                outbuf.ulVersion = SECBUFFER_VERSION;
 
-
-               elog(DEBUG4, "Processing received SSPI token of length %u",
+               elog(DEBUG4, "processing received SSPI token of length %u",
                         (unsigned int) buf.len);
 
                r = AcceptSecurityContext(&sspicred,
@@ -2957,7 +2956,7 @@ radius_add_attribute(radius_packet *packet, uint8 type, const unsigned char *dat
                 * fail.
                 */
                elog(WARNING,
-                        "Adding attribute code %d with length %d to radius packet would create oversize packet, ignoring",
+                        "adding attribute code %d with length %d to radius packet would create oversize packet, ignoring",
                         type, len);
                return;
        }