Skip to content

Commit 544b280

Browse files
committed
doc: Improve hyphenation consistency
1 parent 3286065 commit 544b280

File tree

16 files changed

+31
-31
lines changed

16 files changed

+31
-31
lines changed

doc/src/sgml/catalogs.sgml

+7-7
Original file line numberDiff line numberDiff line change
@@ -1556,7 +1556,7 @@
15561556
<structfield>rolbypassrls</structfield> <type>bool</type>
15571557
</para>
15581558
<para>
1559-
Role bypasses every row level security policy, see
1559+
Role bypasses every row-level security policy, see
15601560
<xref linkend="ddl-rowsecurity"/> for more information.
15611561
</para></entry>
15621562
</row>
@@ -2130,7 +2130,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
21302130
<structfield>relrowsecurity</structfield> <type>bool</type>
21312131
</para>
21322132
<para>
2133-
True if table has row level security enabled; see
2133+
True if table has row-level security enabled; see
21342134
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
21352135
</para></entry>
21362136
</row>
@@ -2140,7 +2140,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
21402140
<structfield>relforcerowsecurity</structfield> <type>bool</type>
21412141
</para>
21422142
<para>
2143-
True if row level security (when enabled) will also apply to table owner; see
2143+
True if row-level security (when enabled) will also apply to table owner; see
21442144
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
21452145
</para></entry>
21462146
</row>
@@ -5531,7 +5531,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
55315531
</indexterm>
55325532

55335533
<para>
5534-
The catalog <structname>pg_policy</structname> stores row level
5534+
The catalog <structname>pg_policy</structname> stores row-level
55355535
security policies for tables. A policy includes the kind of
55365536
command that it applies to (possibly all commands), the roles that it
55375537
applies to, the expression to be added as a security-barrier
@@ -11765,7 +11765,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1176511765
<structfield>rolbypassrls</structfield> <type>bool</type>
1176611766
</para>
1176711767
<para>
11768-
Role bypasses every row level security policy, see
11768+
Role bypasses every row-level security policy, see
1176911769
<xref linkend="ddl-rowsecurity"/> for more information.
1177011770
</para></entry>
1177111771
</row>
@@ -12554,7 +12554,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1255412554
<structfield>usebypassrls</structfield> <type>bool</type>
1255512555
</para>
1255612556
<para>
12557-
User bypasses every row level security policy, see
12557+
User bypasses every row-level security policy, see
1255812558
<xref linkend="ddl-rowsecurity"/> for more information.
1255912559
</para></entry>
1256012560
</row>
@@ -13667,7 +13667,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
1366713667
<structfield>usebypassrls</structfield> <type>bool</type>
1366813668
</para>
1366913669
<para>
13670-
User bypasses every row level security policy, see
13670+
User bypasses every row-level security policy, see
1367113671
<xref linkend="ddl-rowsecurity"/> for more information.
1367213672
</para></entry>
1367313673
</row>

doc/src/sgml/ddl.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -2382,7 +2382,7 @@ INSERT INTO passwd VALUES
23822382
INSERT INTO passwd VALUES
23832383
('alice','xxx',2,1,'Alice','098-765-4321',null,'/home/alice','/bin/zsh');
23842384

2385-
-- Be sure to enable row level security on the table
2385+
-- Be sure to enable row-level security on the table
23862386
ALTER TABLE passwd ENABLE ROW LEVEL SECURITY;
23872387

23882388
-- Create policies

doc/src/sgml/ref/alter_policy.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>ALTER POLICY</refname>
19-
<refpurpose>change the definition of a row level security policy</refpurpose>
19+
<refpurpose>change the definition of a row-level security policy</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>

doc/src/sgml/ref/alter_table.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -611,7 +611,7 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
611611
These forms control the application of row security policies belonging
612612
to the table. If enabled and no policies exist for the table, then a
613613
default-deny policy is applied. Note that policies can exist for a table
614-
even if row level security is disabled. In this case, the policies will
614+
even if row-level security is disabled. In this case, the policies will
615615
<emphasis>not</emphasis> be applied and the policies will be ignored.
616616
See also
617617
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.
@@ -624,9 +624,9 @@ WITH ( MODULUS <replaceable class="parameter">numeric_literal</replaceable>, REM
624624
<listitem>
625625
<para>
626626
These forms control the application of row security policies belonging
627-
to the table when the user is the table owner. If enabled, row level
627+
to the table when the user is the table owner. If enabled, row-level
628628
security policies will be applied when the user is the table owner. If
629-
disabled (the default) then row level security will not be applied when
629+
disabled (the default) then row-level security will not be applied when
630630
the user is the table owner.
631631
See also
632632
<link linkend="sql-createpolicy"><command>CREATE POLICY</command></link>.

doc/src/sgml/ref/create_policy.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>CREATE POLICY</refname>
19-
<refpurpose>define a new row level security policy for a table</refpurpose>
19+
<refpurpose>define a new row-level security policy for a table</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>
@@ -188,7 +188,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
188188
Any <acronym>SQL</acronym> conditional expression (returning
189189
<type>boolean</type>). The conditional expression cannot contain
190190
any aggregate or window functions. This expression will be added
191-
to queries that refer to the table if row level security is enabled.
191+
to queries that refer to the table if row-level security is enabled.
192192
Rows for which the expression returns true will be visible. Any
193193
rows for which the expression returns false or null will not be
194194
visible to the user (in a <command>SELECT</command>), and will not be
@@ -207,7 +207,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
207207
<type>boolean</type>). The conditional expression cannot contain
208208
any aggregate or window functions. This expression will be used in
209209
<command>INSERT</command> and <command>UPDATE</command> queries against
210-
the table if row level security is enabled. Only rows for which the
210+
the table if row-level security is enabled. Only rows for which the
211211
expression evaluates to true will be allowed. An error will be thrown
212212
if the expression evaluates to false or null for any of the records
213213
inserted or any of the records that result from the update. Note that

doc/src/sgml/ref/drop_policy.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ PostgreSQL documentation
1616

1717
<refnamediv>
1818
<refname>DROP POLICY</refname>
19-
<refpurpose>remove a row level security policy from a table</refpurpose>
19+
<refpurpose>remove a row-level security policy from a table</refpurpose>
2020
</refnamediv>
2121

2222
<refsynopsisdiv>
@@ -31,9 +31,9 @@ DROP POLICY [ IF EXISTS ] <replaceable class="parameter">name</replaceable> ON <
3131
<para>
3232
<command>DROP POLICY</command> removes the specified policy from the table.
3333
Note that if the last policy is removed for a table and the table still has
34-
row level security enabled via <command>ALTER TABLE</command>, then the
34+
row-level security enabled via <command>ALTER TABLE</command>, then the
3535
default-deny policy will be used. <literal>ALTER TABLE ... DISABLE ROW
36-
LEVEL SECURITY</literal> can be used to disable row level security for a
36+
LEVEL SECURITY</literal> can be used to disable row-level security for a
3737
table, whether policies for the table exist or not.
3838
</para>
3939
</refsect1>

doc/src/sgml/rules.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -2123,7 +2123,7 @@ SELECT * FROM phone_number WHERE tricky(person, phone);
21232123
</para>
21242124

21252125
<para>
2126-
When it is necessary for a view to provide row level security, the
2126+
When it is necessary for a view to provide row-level security, the
21272127
<literal>security_barrier</literal> attribute should be applied to
21282128
the view. This prevents maliciously-chosen functions and operators from
21292129
being passed values from rows until after the view has done its work. For

src/backend/commands/copyto.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -512,7 +512,7 @@ BeginCopyTo(ParseState *pstate,
512512
CURSOR_OPT_PARALLEL_OK, NULL);
513513

514514
/*
515-
* With row level security and a user using "COPY relation TO", we
515+
* With row-level security and a user using "COPY relation TO", we
516516
* have to convert the "COPY relation TO" to a query-based COPY (eg:
517517
* "COPY (SELECT * FROM relation) TO"), to allow the rewriter to add
518518
* in any RLS clauses.

src/backend/commands/functioncmds.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1129,7 +1129,7 @@ CreateFunction(ParseState *pstate, CreateFunctionStmt *stmt)
11291129
/*
11301130
* Only superuser is allowed to create leakproof functions because
11311131
* leakproof functions can see tuples which have not yet been filtered out
1132-
* by security barrier views or row level security policies.
1132+
* by security barrier views or row-level security policies.
11331133
*/
11341134
if (isLeakProof && !superuser())
11351135
ereport(ERROR,

src/backend/executor/execMain.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -558,7 +558,7 @@ ExecutorRewind(QueryDesc *queryDesc)
558558
* Returns true if permissions are adequate. Otherwise, throws an appropriate
559559
* error if ereport_on_violation is true, or simply returns false otherwise.
560560
*
561-
* Note that this does NOT address row level security policies (aka: RLS). If
561+
* Note that this does NOT address row-level security policies (aka: RLS). If
562562
* rows will be returned to the user as a result of this permission check
563563
* passing, then RLS also needs to be consulted (and check_enable_rls()).
564564
*
@@ -1947,7 +1947,7 @@ ExecConstraints(ResultRelInfo *resultRelInfo,
19471947
*
19481948
* Note that this needs to be called multiple times to ensure that all kinds of
19491949
* WITH CHECK OPTIONs are handled (both those from views which have the WITH
1950-
* CHECK OPTION set and from row level security policies). See ExecInsert()
1950+
* CHECK OPTION set and from row-level security policies). See ExecInsert()
19511951
* and ExecUpdate().
19521952
*/
19531953
void

src/backend/optimizer/path/allpaths.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -2141,7 +2141,7 @@ set_subquery_pathlist(PlannerInfo *root, RelOptInfo *rel,
21412141

21422142
/*
21432143
* If the subquery has the "security_barrier" flag, it means the subquery
2144-
* originated from a view that must enforce row level security. Then we
2144+
* originated from a view that must enforce row-level security. Then we
21452145
* must not push down quals that contain leaky functions. (Ideally this
21462146
* would be checked inside subquery_is_pushdown_safe, but since we don't
21472147
* currently pass the RTE to that function, we must do it here.)

src/backend/rewrite/rewriteHandler.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -2159,7 +2159,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs)
21592159
QTW_IGNORE_RC_SUBQUERIES);
21602160

21612161
/*
2162-
* Apply any row level security policies. We do this last because it
2162+
* Apply any row-level security policies. We do this last because it
21632163
* requires special recursion detection if the new quals have sublink
21642164
* subqueries, and if we did it in the loop above query_tree_walker would
21652165
* then recurse into those quals a second time.
@@ -2249,7 +2249,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs)
22492249
}
22502250

22512251
/*
2252-
* Make sure the query is marked correctly if row level security
2252+
* Make sure the query is marked correctly if row-level security
22532253
* applies, or if the new quals had sublinks.
22542254
*/
22552255
if (hasRowSecurity)

src/backend/rewrite/rowsecurity.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/*
22
* rewrite/rowsecurity.c
3-
* Routines to support policies for row level security (aka RLS).
3+
* Routines to support policies for row-level security (aka RLS).
44
*
55
* Policies in PostgreSQL provide a mechanism to limit what records are
66
* returned to a user and what records a user is permitted to add to a table.
@@ -100,7 +100,7 @@ row_security_policy_hook_type row_security_policy_hook_restrictive = NULL;
100100
* Get any row security quals and WithCheckOption checks that should be
101101
* applied to the specified RTE.
102102
*
103-
* In addition, hasRowSecurity is set to true if row level security is enabled
103+
* In addition, hasRowSecurity is set to true if row-level security is enabled
104104
* (even if this RTE doesn't have any row security quals), and hasSubLinks is
105105
* set to true if any of the quals returned contain sublinks.
106106
*/

src/include/catalog/pg_authid.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ CATALOG(pg_authid,1260,AuthIdRelationId) BKI_SHARED_RELATION BKI_ROWTYPE_OID(284
3838
bool rolcreatedb; /* allowed to create databases? */
3939
bool rolcanlogin; /* allowed to log in as session user? */
4040
bool rolreplication; /* role used for streaming replication */
41-
bool rolbypassrls; /* bypasses row level security? */
41+
bool rolbypassrls; /* bypasses row-level security? */
4242
int32 rolconnlimit; /* max connections allowed (-1=no limit) */
4343

4444
/* remaining fields may be null; use heap_getattr to read them! */

src/test/regress/expected/rowsecurity.out

+1-1
Original file line numberDiff line numberDiff line change
@@ -3514,7 +3514,7 @@ CREATE POLICY p ON t USING (c % 2 = 1);
35143514
ALTER TABLE t ENABLE ROW LEVEL SECURITY;
35153515
SAVEPOINT q;
35163516
CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD
3517-
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled
3517+
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled
35183518
ERROR: could not convert table "t" to a view because it has row security enabled
35193519
ROLLBACK TO q;
35203520
ALTER TABLE t DISABLE ROW LEVEL SECURITY;

src/test/regress/sql/rowsecurity.sql

+1-1
Original file line numberDiff line numberDiff line change
@@ -1445,7 +1445,7 @@ ALTER TABLE t ENABLE ROW LEVEL SECURITY;
14451445

14461446
SAVEPOINT q;
14471447
CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD
1448-
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled
1448+
SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled
14491449
ROLLBACK TO q;
14501450

14511451
ALTER TABLE t DISABLE ROW LEVEL SECURITY;

0 commit comments

Comments
 (0)