mirror of
https://github.com/postgres/postgres.git
synced 2025-07-30 11:03:19 +03:00
doc: Improve hyphenation consistency
This commit is contained in:
@ -1556,7 +1556,7 @@
|
||||
<structfield>rolbypassrls</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
Role bypasses every row level security policy, see
|
||||
Role bypasses every row-level security policy, see
|
||||
<xref linkend="ddl-rowsecurity"/> for more information.
|
||||
</para></entry>
|
||||
</row>
|
||||
@ -2130,7 +2130,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
|
||||
<structfield>relrowsecurity</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
True if table has row level security enabled; see
|
||||
True if table has row-level security enabled; see
|
||||
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
|
||||
</para></entry>
|
||||
</row>
|
||||
@ -2140,7 +2140,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
|
||||
<structfield>relforcerowsecurity</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
True if row level security (when enabled) will also apply to table owner; see
|
||||
True if row-level security (when enabled) will also apply to table owner; see
|
||||
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
|
||||
</para></entry>
|
||||
</row>
|
||||
@ -5531,7 +5531,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
|
||||
</indexterm>
|
||||
|
||||
<para>
|
||||
The catalog <structname>pg_policy</structname> stores row level
|
||||
The catalog <structname>pg_policy</structname> stores row-level
|
||||
security policies for tables. A policy includes the kind of
|
||||
command that it applies to (possibly all commands), the roles that it
|
||||
applies to, the expression to be added as a security-barrier
|
||||
@ -11765,7 +11765,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
|
||||
<structfield>rolbypassrls</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
Role bypasses every row level security policy, see
|
||||
Role bypasses every row-level security policy, see
|
||||
<xref linkend="ddl-rowsecurity"/> for more information.
|
||||
</para></entry>
|
||||
</row>
|
||||
@ -12554,7 +12554,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
|
||||
<structfield>usebypassrls</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
User bypasses every row level security policy, see
|
||||
User bypasses every row-level security policy, see
|
||||
<xref linkend="ddl-rowsecurity"/> for more information.
|
||||
</para></entry>
|
||||
</row>
|
||||
@ -13667,7 +13667,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
|
||||
<structfield>usebypassrls</structfield> <type>bool</type>
|
||||
</para>
|
||||
<para>
|
||||
User bypasses every row level security policy, see
|
||||
User bypasses every row-level security policy, see
|
||||
<xref linkend="ddl-rowsecurity"/> for more information.
|
||||
</para></entry>
|
||||
</row>
|
||||
|
@ -2382,7 +2382,7 @@ INSERT INTO passwd VALUES
|
||||
INSERT INTO passwd VALUES
|
||||
('alice','xxx',2,1,'Alice','098-765-4321',null,'/home/alice','/bin/zsh');
|
||||
|
||||
-- Be sure to enable row level security on the table
|
||||
-- Be sure to enable row-level security on the table
|
||||
ALTER TABLE passwd ENABLE ROW LEVEL SECURITY;
|
||||
|
||||
-- Create policies
|
||||
|
@ -16,7 +16,7 @@ PostgreSQL documentation
|
||||
|
||||
<refnamediv>
|
||||
<refname>ALTER POLICY</refname>
|
||||
<refpurpose>change the definition of a row level security policy</refpurpose>
|
||||
<refpurpose>change the definition of a row-level security policy</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsynopsisdiv>
|
||||
|
@ -611,7 +611,7 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
|
||||
These forms control the application of row security policies belonging
|
||||
to the table. If enabled and no policies exist for the table, then a
|
||||
default-deny policy is applied. Note that policies can exist for a table
|
||||
even if row level security is disabled. In this case, the policies will
|
||||
even if row-level security is disabled. In this case, the policies will
|
||||
<emphasis>not</emphasis> be applied and the policies will be ignored.
|
||||
See also
|
||||
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.
|
||||
@ -624,9 +624,9 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
|
||||
<listitem>
|
||||
<para>
|
||||
These forms control the application of row security policies belonging
|
||||
to the table when the user is the table owner. If enabled, row level
|
||||
to the table when the user is the table owner. If enabled, row-level
|
||||
security policies will be applied when the user is the table owner. If
|
||||
disabled (the default) then row level security will not be applied when
|
||||
disabled (the default) then row-level security will not be applied when
|
||||
the user is the table owner.
|
||||
See also
|
||||
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.
|
||||
|
@ -16,7 +16,7 @@ PostgreSQL documentation
|
||||
|
||||
<refnamediv>
|
||||
<refname>CREATE POLICY</refname>
|
||||
<refpurpose>define a new row level security policy for a table</refpurpose>
|
||||
<refpurpose>define a new row-level security policy for a table</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsynopsisdiv>
|
||||
@ -188,7 +188,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
|
||||
Any <acronym>SQL</acronym> conditional expression (returning
|
||||
<type>boolean</type>). The conditional expression cannot contain
|
||||
any aggregate or window functions. This expression will be added
|
||||
to queries that refer to the table if row level security is enabled.
|
||||
to queries that refer to the table if row-level security is enabled.
|
||||
Rows for which the expression returns true will be visible. Any
|
||||
rows for which the expression returns false or null will not be
|
||||
visible to the user (in a <command>SELECT</command>), and will not be
|
||||
@ -207,7 +207,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
|
||||
<type>boolean</type>). The conditional expression cannot contain
|
||||
any aggregate or window functions. This expression will be used in
|
||||
<command>INSERT</command> and <command>UPDATE</command> queries against
|
||||
the table if row level security is enabled. Only rows for which the
|
||||
the table if row-level security is enabled. Only rows for which the
|
||||
expression evaluates to true will be allowed. An error will be thrown
|
||||
if the expression evaluates to false or null for any of the records
|
||||
inserted or any of the records that result from the update. Note that
|
||||
|
@ -16,7 +16,7 @@ PostgreSQL documentation
|
||||
|
||||
<refnamediv>
|
||||
<refname>DROP POLICY</refname>
|
||||
<refpurpose>remove a row level security policy from a table</refpurpose>
|
||||
<refpurpose>remove a row-level security policy from a table</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsynopsisdiv>
|
||||
@ -31,9 +31,9 @@ DROP POLICY [ IF EXISTS ] <replaceable class="parameter">name</replaceable> ON <
|
||||
<para>
|
||||
<command>DROP POLICY</command> removes the specified policy from the table.
|
||||
Note that if the last policy is removed for a table and the table still has
|
||||
row level security enabled via <command>ALTER TABLE</command>, then the
|
||||
row-level security enabled via <command>ALTER TABLE</command>, then the
|
||||
default-deny policy will be used. <literal>ALTER TABLE ... DISABLE ROW
|
||||
LEVEL SECURITY</literal> can be used to disable row level security for a
|
||||
LEVEL SECURITY</literal> can be used to disable row-level security for a
|
||||
table, whether policies for the table exist or not.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
@ -2123,7 +2123,7 @@ SELECT * FROM phone_number WHERE tricky(person, phone);
|
||||
</para>
|
||||
|
||||
<para>
|
||||
When it is necessary for a view to provide row level security, the
|
||||
When it is necessary for a view to provide row-level security, the
|
||||
<literal>security_barrier</literal> attribute should be applied to
|
||||
the view. This prevents maliciously-chosen functions and operators from
|
||||
being passed values from rows until after the view has done its work. For
|
||||
|
Reference in New Issue
Block a user