Skip to content

Commit 5f90492

Browse files
committed
doc: Make some index terms and terminology more consistent
1 parent 19b06cc commit 5f90492

File tree

3 files changed

+4
-13
lines changed

3 files changed

+4
-13
lines changed

doc/src/sgml/ddl.sgml

+2-11
Original file line numberDiff line numberDiff line change
@@ -1512,20 +1512,11 @@ REVOKE ALL ON accounts FROM PUBLIC;
15121512
<title>Row Security Policies</title>
15131513

15141514
<indexterm zone="ddl-rowsecurity">
1515-
<primary>rowsecurity</primary>
1515+
<primary>row security</primary>
15161516
</indexterm>
15171517

15181518
<indexterm zone="ddl-rowsecurity">
1519-
<primary>rls</primary>
1520-
</indexterm>
1521-
1522-
<indexterm>
1523-
<primary>policies</primary>
1524-
<see>policy</see>
1525-
</indexterm>
1526-
1527-
<indexterm zone="ddl-rowsecurity">
1528-
<primary>POLICY</primary>
1519+
<primary>policy</primary>
15291520
</indexterm>
15301521

15311522
<para>

doc/src/sgml/ref/create_policy.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ CREATE POLICY <replaceable class="parameter">name</replaceable> ON <replaceable
112112
the user running the overall query. Therefore, users who are using a given
113113
policy must be able to access any tables or functions referenced in the
114114
expression or they will simply receive a permission denied error when
115-
attempting to query the RLS-enabled table. This does not change how views
115+
attempting to query the table that has row-level security enabled. This does not change how views
116116
work, however. As with normal queries and views, permission checks and
117117
policies for the tables which are referenced by a view will use the view
118118
owner's rights and any policies which apply to the view owner.

doc/src/sgml/ref/create_role.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ CREATE ROLE <replaceable class="PARAMETER">name</replaceable> [ [ WITH ] <replac
196196
<term><literal>NOBYPASSRLS</literal></term>
197197
<listitem>
198198
<para>
199-
These clauses determine whether a role is allowed to bypass row-security
199+
These clauses determine whether a role is allowed to bypass row-level security (RLS)
200200
policies. A role having the <literal>BYPASSRLS</literal> attribute will
201201
be allowed to bypass row-security policies by setting
202202
<literal>row_security</literal> to

0 commit comments

Comments
 (0)