mirror of
https://github.com/postgres/postgres.git
synced 2025-07-28 23:42:10 +03:00
doc: Improve hyphenation consistency
This commit is contained in:
@ -512,7 +512,7 @@ BeginCopyTo(ParseState *pstate,
|
||||
CURSOR_OPT_PARALLEL_OK, NULL);
|
||||
|
||||
/*
|
||||
* With row level security and a user using "COPY relation TO", we
|
||||
* With row-level security and a user using "COPY relation TO", we
|
||||
* have to convert the "COPY relation TO" to a query-based COPY (eg:
|
||||
* "COPY (SELECT * FROM relation) TO"), to allow the rewriter to add
|
||||
* in any RLS clauses.
|
||||
|
@ -1129,7 +1129,7 @@ CreateFunction(ParseState *pstate, CreateFunctionStmt *stmt)
|
||||
/*
|
||||
* Only superuser is allowed to create leakproof functions because
|
||||
* leakproof functions can see tuples which have not yet been filtered out
|
||||
* by security barrier views or row level security policies.
|
||||
* by security barrier views or row-level security policies.
|
||||
*/
|
||||
if (isLeakProof && !superuser())
|
||||
ereport(ERROR,
|
||||
|
@ -558,7 +558,7 @@ ExecutorRewind(QueryDesc *queryDesc)
|
||||
* Returns true if permissions are adequate. Otherwise, throws an appropriate
|
||||
* error if ereport_on_violation is true, or simply returns false otherwise.
|
||||
*
|
||||
* Note that this does NOT address row level security policies (aka: RLS). If
|
||||
* Note that this does NOT address row-level security policies (aka: RLS). If
|
||||
* rows will be returned to the user as a result of this permission check
|
||||
* passing, then RLS also needs to be consulted (and check_enable_rls()).
|
||||
*
|
||||
@ -1947,7 +1947,7 @@ ExecConstraints(ResultRelInfo *resultRelInfo,
|
||||
*
|
||||
* Note that this needs to be called multiple times to ensure that all kinds of
|
||||
* WITH CHECK OPTIONs are handled (both those from views which have the WITH
|
||||
* CHECK OPTION set and from row level security policies). See ExecInsert()
|
||||
* CHECK OPTION set and from row-level security policies). See ExecInsert()
|
||||
* and ExecUpdate().
|
||||
*/
|
||||
void
|
||||
|
@ -2141,7 +2141,7 @@ set_subquery_pathlist(PlannerInfo *root, RelOptInfo *rel,
|
||||
|
||||
/*
|
||||
* If the subquery has the "security_barrier" flag, it means the subquery
|
||||
* originated from a view that must enforce row level security. Then we
|
||||
* originated from a view that must enforce row-level security. Then we
|
||||
* must not push down quals that contain leaky functions. (Ideally this
|
||||
* would be checked inside subquery_is_pushdown_safe, but since we don't
|
||||
* currently pass the RTE to that function, we must do it here.)
|
||||
|
@ -2159,7 +2159,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs)
|
||||
QTW_IGNORE_RC_SUBQUERIES);
|
||||
|
||||
/*
|
||||
* Apply any row level security policies. We do this last because it
|
||||
* Apply any row-level security policies. We do this last because it
|
||||
* requires special recursion detection if the new quals have sublink
|
||||
* subqueries, and if we did it in the loop above query_tree_walker would
|
||||
* then recurse into those quals a second time.
|
||||
@ -2249,7 +2249,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs)
|
||||
}
|
||||
|
||||
/*
|
||||
* Make sure the query is marked correctly if row level security
|
||||
* Make sure the query is marked correctly if row-level security
|
||||
* applies, or if the new quals had sublinks.
|
||||
*/
|
||||
if (hasRowSecurity)
|
||||
|
@ -1,6 +1,6 @@
|
||||
/*
|
||||
* rewrite/rowsecurity.c
|
||||
* Routines to support policies for row level security (aka RLS).
|
||||
* Routines to support policies for row-level security (aka RLS).
|
||||
*
|
||||
* Policies in PostgreSQL provide a mechanism to limit what records are
|
||||
* returned to a user and what records a user is permitted to add to a table.
|
||||
@ -100,7 +100,7 @@ row_security_policy_hook_type row_security_policy_hook_restrictive = NULL;
|
||||
* Get any row security quals and WithCheckOption checks that should be
|
||||
* applied to the specified RTE.
|
||||
*
|
||||
* In addition, hasRowSecurity is set to true if row level security is enabled
|
||||
* In addition, hasRowSecurity is set to true if row-level security is enabled
|
||||
* (even if this RTE doesn't have any row security quals), and hasSubLinks is
|
||||
* set to true if any of the quals returned contain sublinks.
|
||||
*/
|
||||
|
@ -38,7 +38,7 @@ CATALOG(pg_authid,1260,AuthIdRelationId) BKI_SHARED_RELATION BKI_ROWTYPE_OID(284
|
||||
bool rolcreatedb; /* allowed to create databases? */
|
||||
bool rolcanlogin; /* allowed to log in as session user? */
|
||||
bool rolreplication; /* role used for streaming replication */
|
||||
bool rolbypassrls; /* bypasses row level security? */
|
||||
bool rolbypassrls; /* bypasses row-level security? */
|
||||
int32 rolconnlimit; /* max connections allowed (-1=no limit) */
|
||||
|
||||
/* remaining fields may be null; use heap_getattr to read them! */
|
||||
|
@ -3514,7 +3514,7 @@ CREATE POLICY p ON t USING (c % 2 = 1);
|
||||
ALTER TABLE t ENABLE ROW LEVEL SECURITY;
|
||||
SAVEPOINT q;
|
||||
CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD
|
||||
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled
|
||||
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled
|
||||
ERROR: could not convert table "t" to a view because it has row security enabled
|
||||
ROLLBACK TO q;
|
||||
ALTER TABLE t DISABLE ROW LEVEL SECURITY;
|
||||
|
@ -1445,7 +1445,7 @@ ALTER TABLE t ENABLE ROW LEVEL SECURITY;
|
||||
|
||||
SAVEPOINT q;
|
||||
CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD
|
||||
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled
|
||||
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled
|
||||
ROLLBACK TO q;
|
||||
|
||||
ALTER TABLE t DISABLE ROW LEVEL SECURITY;
|
||||
|
Reference in New Issue
Block a user