1
0
mirror of https://github.com/postgres/postgres.git synced 2025-12-21 05:21:08 +03:00

Update documentation on may/can/might:

Standard English uses "may", "can", and "might" in different ways:

        may - permission, "You may borrow my rake."

        can - ability, "I can lift that log."

        might - possibility, "It might rain today."

Unfortunately, in conversational English, their use is often mixed, as
in, "You may use this variable to do X", when in fact, "can" is a better
choice.  Similarly, "It may crash" is better stated, "It might crash".

Also update two error messages mentioned in the documenation to match.
This commit is contained in:
Bruce Momjian
2007-01-31 20:56:20 +00:00
parent 67a1ae9f05
commit a134ee3379
70 changed files with 729 additions and 731 deletions

View File

@@ -1,4 +1,4 @@
<!-- $PostgreSQL: pgsql/doc/src/sgml/user-manag.sgml,v 1.37 2006/09/05 21:08:34 tgl Exp $ -->
<!-- $PostgreSQL: pgsql/doc/src/sgml/user-manag.sgml,v 1.38 2007/01/31 20:56:19 momjian Exp $ -->
<chapter id="user-manag">
<title>Database Roles and Privileges</title>
@@ -126,7 +126,7 @@ SELECT rolname FROM pg_roles;
</para>
<para>
The set of database roles a given client connection may connect as
The set of database roles a given client connection can connect as
is determined by the client authentication setup, as explained in
<xref linkend="client-authentication">. (Thus, a client is not
necessarily limited to connect as the role with the same name as
@@ -142,7 +142,7 @@ SELECT rolname FROM pg_roles;
<title>Role Attributes</title>
<para>
A database role may have a number of attributes that define its
A database role can have a number of attributes that define its
privileges and interact with the client authentication system.
<variablelist>
@@ -482,7 +482,7 @@ DROP ROLE <replaceable>name</replaceable>;
<para>
Functions and triggers allow users to insert code into the backend
server that other users may execute unintentionally. Hence, both
server that other users might execute unintentionally. Hence, both
mechanisms permit users to <quote>Trojan horse</quote>
others with relative ease. The only real protection is tight
control over who can define functions.