doc: Make some index terms and terminology more consistent

This commit is contained in:
Peter Eisentraut 2015-10-02 21:22:44 -04:00
parent 19b06cc669
commit 5f904924bc
3 changed files with 4 additions and 13 deletions

View File

@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
<title>Row Security Policies</title> <title>Row Security Policies</title>
<indexterm zone="ddl-rowsecurity"> <indexterm zone="ddl-rowsecurity">
<primary>rowsecurity</primary> <primary>row security</primary>
</indexterm> </indexterm>
<indexterm zone="ddl-rowsecurity"> <indexterm zone="ddl-rowsecurity">
<primary>rls</primary> <primary>policy</primary>
</indexterm>
<indexterm>
<primary>policies</primary>
<see>policy</see>
</indexterm>
<indexterm zone="ddl-rowsecurity">
<primary>POLICY</primary>
</indexterm> </indexterm>
<para> <para>

View File

@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
the user running the overall query. Therefore, users who are using a given the user running the overall query. Therefore, users who are using a given
policy must be able to access any tables or functions referenced in the policy must be able to access any tables or functions referenced in the
expression or they will simply receive a permission denied error when expression or they will simply receive a permission denied error when
attempting to query the RLS-enabled table. This does not change how views attempting to query the table that has row-level security enabled. This does not change how views
work, however. As with normal queries and views, permission checks and work, however. As with normal queries and views, permission checks and
policies for the tables which are referenced by a view will use the view policies for the tables which are referenced by a view will use the view
owner's rights and any policies which apply to the view owner. owner's rights and any policies which apply to the view owner.

View File

@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
<term><literal>NOBYPASSRLS</literal></term> <term><literal>NOBYPASSRLS</literal></term>
<listitem> <listitem>
<para> <para>
These clauses determine whether a role is allowed to bypass row-security These clauses determine whether a role is allowed to bypass row-level security (RLS)
policies. A role having the <literal>BYPASSRLS</literal> attribute will policies. A role having the <literal>BYPASSRLS</literal> attribute will
be allowed to bypass row-security policies by setting be allowed to bypass row-security policies by setting
<literal>row_security</literal> to <literal>row_security</literal> to