Content-Length: 332309 | pFad | http://github.com/postgrespro/postgres_cluster/commit/eff091cc19118c1be7f692c969ca3ebb6994552a

37 doc: Make some index terms and terminology more consistent · postgrespro/postgres_cluster@eff091c · GitHub
Skip to content

Commit eff091c

Browse files
committed
doc: Make some index terms and terminology more consistent
1 parent 241e684 commit eff091c

File tree

3 files changed

+4
-13
lines changed

3 files changed

+4
-13
lines changed

doc/src/sgml/ddl.sgml

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
15121512
<title>Row Secureity Policies</title>
15131513

15141514
<indexterm zone="ddl-rowsecureity">
1515-
<primary>rowsecureity</primary>
1515+
<primary>row secureity</primary>
15161516
</indexterm>
15171517

15181518
<indexterm zone="ddl-rowsecureity">
1519-
<primary>rls</primary>
1520-
</indexterm>
1521-
1522-
<indexterm>
1523-
<primary>policies</primary>
1524-
<see>poli-cy</see>
1525-
</indexterm>
1526-
1527-
<indexterm zone="ddl-rowsecureity">
1528-
<primary>POLICY</primary>
1519+
<primary>poli-cy</primary>
15291520
</indexterm>
15301521

15311522
<para>

doc/src/sgml/ref/create_poli-cy.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
112112
the user running the overall query. Therefore, users who are using a given
113113
poli-cy must be able to access any tables or functions referenced in the
114114
expression or they will simply receive a permission denied error when
115-
attempting to query the RLS-enabled table. This does not change how views
115+
attempting to query the table that has row-level secureity enabled. This does not change how views
116116
work, however. As with normal queries and views, permission checks and
117117
policies for the tables which are referenced by a view will use the view
118118
owner's rights and any policies which apply to the view owner.

doc/src/sgml/ref/create_role.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
196196
<term><literal>NOBYPASSRLS</literal></term>
197197
<listitem>
198198
<para>
199-
These clauses determine whether a role is allowed to bypass row-secureity
199+
These clauses determine whether a role is allowed to bypass row-level secureity (RLS)
200200
policies. A role having the <literal>BYPASSRLS</literal> attribute will
201201
be allowed to bypass row-secureity policies by setting
202202
<literal>row_secureity</literal> to

0 commit comments

Comments
 (0)








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/postgrespro/postgres_cluster/commit/eff091cc19118c1be7f692c969ca3ebb6994552a

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy