@@ -5568,20 +5568,22 @@ COPY postgres_log FROM '/full/path/to/logfile.csv' WITH csv;
5568
5568
<para>
5569
5569
This variable controls if row security policies are to be applied
5570
5570
to queries which are run against tables that have row security enabled.
5571
- The default is 'on'. When set to 'on', all users, except superusers
5572
- and the owner of the table, will have the row policies for the table
5573
- applied to their queries. The table owner and superuser can request
5574
- that row policies be applied to their queries by setting this to
5575
- 'force'. Lastly, this can also be set to 'off' which will bypass row
5576
- policies for the table, if possible, and error if not.
5571
+ The default is <literal>on</>. When set to <literal>on</>, all users,
5572
+ except superusers and the owner of the table, will have the row
5573
+ policies for the table applied to their queries. The table owner and
5574
+ superuser can request that row policies be applied to their queries by
5575
+ setting this to <literal>force</>. Lastly, this can also be set to
5576
+ <literal>off</> which will bypass row policies for the table, if
5577
+ possible, and error if not.
5577
5578
</para>
5578
5579
5579
5580
<para>
5580
5581
For a user who is not a superuser and not the table owner to bypass
5581
- row policies for the table, they must have the BYPASSRLS role attribute.
5582
- If this is set to 'off' and the user queries a table which has row
5583
- policies enabled and the user does not have the right to bypass
5584
- row policies then a permission denied error will be returned.
5582
+ row policies for the table, they must have the <literal>BYPASSRLS</>
5583
+ role attribute. If this is set to <literal>off</> and the user queries
5584
+ a table which has row policies enabled and the user does not have the
5585
+ right to bypass row policies then a permission denied error will be
5586
+ returned.
5585
5587
</para>
5586
5588
5587
5589
<para>
0 commit comments