8000 doc: Improve hyphenation consistency · postgrespro/postgres@544b280 · GitHub
[go: up one dir, main page]

Skip to content

Commit 544b280

Browse files
committed
doc: Improve hyphenation consistency
1 parent 3286065 commit 544b280

File tree

16 files changed

+31
-31
lines changed

16 files changed

+31
-31
lines changed

doc/src/sgml/catalogs.sgml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1556,7 +1556,7 @@
15561556
<structfield>rolbypassrls</structfield> <type>bool</type>
15571557
</para>
15581558
<para>
1559-
Role bypasses every row level security policy, see
1559+
Role bypasses every row-level security policy, see
15601560
<xref linkend="ddl-rowsecurity"/> for more information.
15611561
</para></entry>
15621562
</row>
@@ -2130,7 +2130,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
21302130
<structfield>relrowsecurity</structfield> <type>bool</type>
21312131
</para>
21322132
<para>
2133-
True if table has row level security enabled; see
2133+
True if table has row-level security enabled; see
21342134
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
21352135
</para></entry>
21362136
</row>
@@ -2140,7 +2140,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
21402140
<structfield>relforcerowsecurity</structfield> <type>bool</type>
21412141
</para>
21422142
<para>
2143-
True if row level security (when enabled) will also apply to table owner; see
2143+
True if row-level security (when enabled) will also apply to table owner; see
21442144
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
21452145
</para></entry>
21462146
</row>
@@ -5531,7 +5531,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
55315531
</indexterm>
55325532

55335533
<para>
5534-
The catalog <structname>pg_policy</structname> stores row level
5534+
The catalog <structname>pg_policy</structname> stores row-level
55355535
security policies for tables. A policy includes the kind of
55365536
command that it applies to (possibly all commands), the roles that it
55375537
applies to, the expression to be added as a security-barrier
@@ -11765,7 +11765,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1176511765
<structfield>rolbypassrls</structfield> <type>bool</type>
1176611766
</para>
1176711767
<para>
11768-
Role bypasses every row level security policy, see
11768+
Role bypasses every row-level security policy, see
1176911769
<xref linkend="ddl-rowsecurity"/> for more information.
1177011770
</para></entry>
1177111771
</row>
@@ -12554,7 +12554,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1255412554
<structfield>usebypassrls</structfield> <type>bool</type>
1255512555
</para>
1255612556
<para>
12557-
User bypasses every row level security policy, see
12557+
User bypasses every row-level security policy, see
1255812558
<xref linkend="ddl-rowsecurity"/> for more information.
1255912559
</para></entry>
1256012560
</row>
@@ -13667,7 +13667,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1366713667
<structfield>usebypassrls</structfield> <type>bool</type>
1366813668
</para>
1366913669
<para>
13670-
User bypasses every row level security policy, see
13670+
User bypasses every row-level security policy, see
1367113671
<xref linkend="ddl-rowsecurity"/> for more information.
1367213672
</para></entry>
1367313673
</row>

doc/src/sgml/ddl.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2382,7 +2382,7 @@ INSERT INTO passwd VALUES
23822382
INSERT INTO passwd VALUES
23832383
('alice','xxx',2,1,'Alice','098-765-4321',null,'/home/alice','/bin/zsh');
23842384

2385-
-- Be sure to enable row level security on the table
2385+
-- Be sure to enable row-level security on the table
23862386
ALTER TABLE passwd ENABLE ROW LEVEL SECURITY;
23872387

23882388
-- Create policies

doc/src/sgml/ref/alter_policy.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>ALTER POLICY</refname>
19-
<r 93C6 efpurpose>change the definition of a row level security policy</refpurpose>
19+
<refpurpose>change the definition of a row-level security policy</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>

doc/src/sgml/ref/alter_table.sgml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -611,7 +611,7 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
611611
These forms control the application of row security policies belonging
612612
to the table. If enabled and no policies exist for the table, then a
613613
default-deny policy is applied. Note that policies can exist for a table
614-
even if row level security is disabled. In this case, the policies will
614+
even if row-level security is disabled. In this case, the policies will
615615
<emphasis>not</emphasis> be applied and the policies will be ignored.
616616
See also
617617
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.
@@ -624,9 +624,9 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
624624
<listitem>
625625
<para>
626626
These forms control the application of row security policies belonging
627-
to the table when the user is the table owner. If enabled, row level
627+
to the table when the user is the table owner. If enabled, row-level
628628
security policies will be applied when the user is the table owner. If
629-
disabled (the default) then row level security will not be applied when
629+
disabled (the default) then row-level security will not be applied when
630630
the user is the table owner.
631631
See also
632632
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.

doc/src/sgml/ref/create_policy.sgml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>CREATE POLICY</refname>
19-
<refpurpose>define a new row level security policy for a table</refpurpose>
19+
<refpurpose>define a new row-level security policy for a table</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>
@@ -188,7 +188,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
188188
Any <acronym>SQL</acronym> conditional expression (returning
189189
<type>boolean</type>). The conditional expression cannot contain
190190
any aggregate or window functions. This expression will be added
191-
to queries that refer to the table if row level security is enabled.
191+
to queries that refer to the table if row-level security is enabled.
192192
Rows for which the expression returns true will be visible. Any
193193
rows for which the expression returns false or null will not be
194194
visible to the user (in a <command>SELECT</command>), and will not be
@@ -207,7 +207,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
207207
<type>boolean</type>). The conditional expression cannot contain
208208
any aggregate or window functions. This expression will be used in
209209
<command>INSERT</command> and <command>UPDATE</command> queries against
210-
the table if row level security is enabled. Only rows for which the
210+
the table if row-level security is enabled. Only rows for which the
211211
expression evaluates to true will be allowed. An error will be thrown
212212
if the expression evaluates to false or null for any of the records
213213
inserted or any of the records that result from the update. Note that

doc/src/sgml/ref/drop_policy.sgml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>DROP POLICY</refname>
19-
<refpurpose>remove a row level security policy from a table</refpurpose>
19+
<refpurpose>remove a row-level security policy from a table</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>
@@ -31,9 +31,9 @@ DROP POLICY [ IF EXISTS ] <replaceable class="parameter">name</replaceable> ON <
3131
<para>
3232
<command>DROP POLICY</command> removes the specified policy from the table.
3333
Note that if the last policy is removed for a table and the table still has
34-
row level security enabled via <command>ALTER TABLE</command>, then the
34+
row-level security enabled via <command>ALTER TABLE</command>, then the
3535
default-deny policy will be used. <literal>ALTER TABLE ... DISABLE ROW
36-
LEVEL SECURITY</literal> can be used to disable row level security for a
36+
LEVEL SECURITY</literal> can be used to disable row-level security for a
3737
table, whether policies for the table exist or not.
3838
</para>
3939
</refsect1>

doc/src/sgml/rules.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2123,7 +2123,7 @@ SELECT * FROM phone_number WHERE tricky(person, phone);
21232123
</para>
21242124

21252125
<para>
2126-
When it is necessary for a view to provide row level security, the
2126+
When it is necessary for a view to provide row-level security, the
21272127
<literal>security_barrier</literal> attribute should be applied to
21282128
the view. This prevents maliciously-chosen functions and operators from
21292129
being passed values from rows until after the view has done its work. For

src/backend/commands/copyto.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -512,7 +512,7 @@ BeginCopyTo(ParseState *pstate,
512512
CURSOR_OPT_PARALLEL_OK, NULL);
513513

514514
/*
515-
* With row level security and a user using "COPY relation TO", we
515+
* With row-level security and a user using "COPY relation TO", we
516516
* have to convert the "COPY relation TO" to a query-based COPY (eg:
517517
* "COPY (SELECT * FROM relation) TO"), to allow the rewriter to add
518518
* in any RLS clauses.

src/backend/commands/functioncmds.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1129,7 +1129,7 @@ CreateFunction(ParseState *pstate, CreateFunctionStmt *stmt)
11291129
/*
11301130
* Only superuser is allowed to create leakproof functions because
11311131
* leakproof functions can see tuples which have not yet been filtered out
1132-
* by security barrier views or row level security policies.
1132+
* by security barrier views or row-level security policies.
11331133
*/
11341134
if (isLeakProof && !superuser())
11351135
ereport(ERROR,

src/backend/executor/execMain.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -558,7 +558,7 @@ ExecutorRewind(QueryDesc *queryDesc)
558558
* Returns true if permissions are adequate. Otherwise, throws an appropriate
559559
* error if ereport_on_violation is true, or simply returns false otherwise.
560560
*
561-
* Note that this does NOT address row level security policies (aka: RLS). If
561+
* Note that this does NOT address row-level security policies (aka: RLS). If
562562
* rows will be returned to the user as a result of this permission check
563563
* passing, then RLS also needs to be consulted (and check_enable_rls()).
564564
*
@@ -1947,7 +1947,7 @@ ExecConstraints(ResultRelInfo *resultRelInfo,
19471947
*
19481948
* Note that this needs to be called multiple times to ensure that all kinds of
19491949
* WITH CHECK OPTIONs are handled (both those from views which have the WITH
1950-
* CHECK OPTION set and from row level security policies). See ExecInsert()
1950+
* CHECK OPTION set and from row-level security policies). See ExecInsert()
19511951
* and ExecUpdate().
19521952
*/
19531953
void

0 commit comments

Comments
 (0)
0