1556
1556
<structfield>rolbypassrls</structfield> <type>bool</type>
1557
1557
</para>
1558
1558
<para>
1559
- Role bypasses every row level security policy, see
1559
+ Role bypasses every row- level security policy, see
1560
1560
<xref linkend="ddl-rowsecurity"/> for more information.
1561
1561
</para></entry>
1562
1562
</row>
@@ -2130,7 +2130,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
2130
2130
<structfield>relrowsecurity</structfield> <type>bool</type>
2131
2131
</para>
2132
2132
<para>
2133
- True if table has row level security enabled; see
2133
+ True if table has row- level security enabled; see
2134
2134
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
2135
2135
</para></entry>
2136
2136
</row>
@@ -2140,7 +2140,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
2140
2140
<structfield>relforcerowsecurity</structfield> <type>bool</type>
2141
2141
</para>
2142
2142
<para>
2143
- True if row level security (when enabled) will also apply to table owner; see
2143
+ True if row- level security (when enabled) will also apply to table owner; see
2144
2144
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
2145
2145
</para></entry>
2146
2146
</row>
@@ -5531,7 +5531,7 @@ SCRAM-SHA-256$<replaceable><iteration count></replaceable>:<replaceable>&l
5531
5531
</indexterm>
5532
5532
5533
5533
<para>
5534
- The catalog <structname>pg_policy</structname> stores row level
5534
+ The catalog <structname>pg_policy</structname> stores row- level
5535
5535
security policies for tables. A policy includes the kind of
5536
5536
command that it applies to (possibly all commands), the roles that it
5537
5537
applies to, the expression to be added as a security-barrier
@@ -11765,7 +11765,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
11765
11765
<structfield>rolbypassrls</structfield> <type>bool</type>
11766
11766
</para>
11767
11767
<para>
11768
- Role bypasses every row level security policy, see
11768
+ Role bypasses every row- level security policy, see
11769
11769
<xref linkend="ddl-rowsecurity"/> for more information.
11770
11770
</para></entry>
11771
11771
</row>
@@ -12554,7 +12554,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
12554
12554
<structfield>usebypassrls</structfield> <type>bool</type>
12555
12555
</para>
12556
12556
<para>
12557
- User bypasses every row level security policy, see
12557
+ User bypasses every row- level security policy, see
12558
12558
<xref linkend="ddl-rowsecurity"/> for more information.
12559
12559
</para></entry>
12560
12560
</row>
@@ -13667,7 +13667,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
13667
13667
<structfield>usebypassrls</structfield> <type>bool</type>
13668
13668
</para>
13669
13669
<para>
13670
- User bypasses every row level security policy, see
13670
+ User bypasses every row- level security policy, see
13671
13671
<xref linkend="ddl-rowsecurity"/> for more information.
13672
13672
</para></entry>
13673
13673
</row>
0 commit comments