mirror of
https://github.com/postgres/postgres.git
synced 2025-05-03 22:24:49 +03:00
doc: Make some index terms and terminology more consistent
This commit is contained in:
parent
19b06cc669
commit
5f904924bc
@ -1516,16 +1516,7 @@ REVOKE ALL ON accounts FROM PUBLIC;
|
|||||||
</indexterm>
|
</indexterm>
|
||||||
|
|
||||||
<indexterm zone="ddl-rowsecurity">
|
<indexterm zone="ddl-rowsecurity">
|
||||||
<primary>rls</primary>
|
<primary>policy</primary>
|
||||||
</indexterm>
|
|
||||||
|
|
||||||
<indexterm>
|
|
||||||
<primary>policies</primary>
|
|
||||||
<see>policy</see>
|
|
||||||
</indexterm>
|
|
||||||
|
|
||||||
<indexterm zone="ddl-rowsecurity">
|
|
||||||
<primary>POLICY</primary>
|
|
||||||
</indexterm>
|
</indexterm>
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
|
@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
|
|||||||
the user running the overall query. Therefore, users who are using a given
|
the user running the overall query. Therefore, users who are using a given
|
||||||
policy must be able to access any tables or functions referenced in the
|
policy must be able to access any tables or functions referenced in the
|
||||||
expression or they will simply receive a permission denied error when
|
expression or they will simply receive a permission denied error when
|
||||||
attempting to query the RLS-enabled table. This does not change how views
|
attempting to query the table that has row-level security enabled. This does not change how views
|
||||||
work, however. As with normal queries and views, permission checks and
|
work, however. As with normal queries and views, permission checks and
|
||||||
policies for the tables which are referenced by a view will use the view
|
policies for the tables which are referenced by a view will use the view
|
||||||
owner's rights and any policies which apply to the view owner.
|
owner's rights and any policies which apply to the view owner.
|
||||||
|
@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
|
|||||||
<term><literal>NOBYPASSRLS</literal></term>
|
<term><literal>NOBYPASSRLS</literal></term>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>
|
<para>
|
||||||
These clauses determine whether a role is allowed to bypass row-security
|
These clauses determine whether a role is allowed to bypass row-level security (RLS)
|
||||||
policies. A role having the <literal>BYPASSRLS</literal> attribute will
|
policies. A role having the <literal>BYPASSRLS</literal> attribute will
|
||||||
be allowed to bypass row-security policies by setting
|
be allowed to bypass row-security policies by setting
|
||||||
<literal>row_security</literal> to
|
<literal>row_security</literal> to
|
||||||
|
Loading…
x
Reference in New Issue
Block a user