diff options
author | Peter Eisentraut <peter@eisentraut.org> | 2021-04-21 08:14:43 +0200 |
---|---|---|
committer | Peter Eisentraut <peter@eisentraut.org> | 2021-04-21 08:14:43 +0200 |
commit | 544b28088f9d41750ccf193812da62bdfe4bd98a (patch) | |
tree | 673e26f4392f53a9abb34f21b450600213588230 /src | |
parent | 3286065651477c2060910dfb42b3cedbd79a7980 (diff) | |
download | postgresql-544b28088f9d41750ccf193812da62bdfe4bd98a.tar.gz postgresql-544b28088f9d41750ccf193812da62bdfe4bd98a.zip |
doc: Improve hyphenation consistency
Diffstat (limited to 'src')
-rw-r--r-- | src/backend/commands/copyto.c | 2 | ||||
-rw-r--r-- | src/backend/commands/functioncmds.c | 2 | ||||
-rw-r--r-- | src/backend/executor/execMain.c | 4 | ||||
-rw-r--r-- | src/backend/optimizer/path/allpaths.c | 2 | ||||
-rw-r--r-- | src/backend/rewrite/rewriteHandler.c | 4 | ||||
-rw-r--r-- | src/backend/rewrite/rowsecurity.c | 4 | ||||
-rw-r--r-- | src/include/catalog/pg_authid.h | 2 | ||||
-rw-r--r-- | src/test/regress/expected/rowsecurity.out | 2 | ||||
-rw-r--r-- | src/test/regress/sql/rowsecurity.sql | 2 |
9 files changed, 12 insertions, 12 deletions
diff --git a/src/backend/commands/copyto.c b/src/backend/commands/copyto.c index 7257a54e935..67bac9ccab6 100644 --- a/src/backend/commands/copyto.c +++ b/src/backend/commands/copyto.c @@ -512,7 +512,7 @@ BeginCopyTo(ParseState *pstate, CURSOR_OPT_PARALLEL_OK, NULL); /* - * With row level security and a user using "COPY relation TO", we + * With row-level security and a user using "COPY relation TO", we * have to convert the "COPY relation TO" to a query-based COPY (eg: * "COPY (SELECT * FROM relation) TO"), to allow the rewriter to add * in any RLS clauses. diff --git a/src/backend/commands/functioncmds.c b/src/backend/commands/functioncmds.c index e7cb5c65e9a..95482872174 100644 --- a/src/backend/commands/functioncmds.c +++ b/src/backend/commands/functioncmds.c @@ -1129,7 +1129,7 @@ CreateFunction(ParseState *pstate, CreateFunctionStmt *stmt) /* * Only superuser is allowed to create leakproof functions because * leakproof functions can see tuples which have not yet been filtered out - * by security barrier views or row level security policies. + * by security barrier views or row-level security policies. */ if (isLeakProof && !superuser()) ereport(ERROR, diff --git a/src/backend/executor/execMain.c b/src/backend/executor/execMain.c index 8638bd3dd96..8d0f3de76ed 100644 --- a/src/backend/executor/execMain.c +++ b/src/backend/executor/execMain.c @@ -558,7 +558,7 @@ ExecutorRewind(QueryDesc *queryDesc) * Returns true if permissions are adequate. Otherwise, throws an appropriate * error if ereport_on_violation is true, or simply returns false otherwise. * - * Note that this does NOT address row level security policies (aka: RLS). If + * Note that this does NOT address row-level security policies (aka: RLS). If * rows will be returned to the user as a result of this permission check * passing, then RLS also needs to be consulted (and check_enable_rls()). * @@ -1947,7 +1947,7 @@ ExecConstraints(ResultRelInfo *resultRelInfo, * * Note that this needs to be called multiple times to ensure that all kinds of * WITH CHECK OPTIONs are handled (both those from views which have the WITH - * CHECK OPTION set and from row level security policies). See ExecInsert() + * CHECK OPTION set and from row-level security policies). See ExecInsert() * and ExecUpdate(). */ void diff --git a/src/backend/optimizer/path/allpaths.c b/src/backend/optimizer/path/allpaths.c index 30728be85af..353454b183e 100644 --- a/src/backend/optimizer/path/allpaths.c +++ b/src/backend/optimizer/path/allpaths.c @@ -2141,7 +2141,7 @@ set_subquery_pathlist(PlannerInfo *root, RelOptInfo *rel, /* * If the subquery has the "security_barrier" flag, it means the subquery - * originated from a view that must enforce row level security. Then we + * originated from a view that must enforce row-level security. Then we * must not push down quals that contain leaky functions. (Ideally this * would be checked inside subquery_is_pushdown_safe, but since we don't * currently pass the RTE to that function, we must do it here.) diff --git a/src/backend/rewrite/rewriteHandler.c b/src/backend/rewrite/rewriteHandler.c index da78f027751..497d30d8a93 100644 --- a/src/backend/rewrite/rewriteHandler.c +++ b/src/backend/rewrite/rewriteHandler.c @@ -2159,7 +2159,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs) QTW_IGNORE_RC_SUBQUERIES); /* - * Apply any row level security policies. We do this last because it + * Apply any row-level security policies. We do this last because it * requires special recursion detection if the new quals have sublink * subqueries, and if we did it in the loop above query_tree_walker would * then recurse into those quals a second time. @@ -2249,7 +2249,7 @@ fireRIRrules(Query *parsetree, List *activeRIRs) } /* - * Make sure the query is marked correctly if row level security + * Make sure the query is marked correctly if row-level security * applies, or if the new quals had sublinks. */ if (hasRowSecurity) diff --git a/src/backend/rewrite/rowsecurity.c b/src/backend/rewrite/rowsecurity.c index fc26cb23a21..e10f94904e1 100644 --- a/src/backend/rewrite/rowsecurity.c +++ b/src/backend/rewrite/rowsecurity.c @@ -1,6 +1,6 @@ /* * rewrite/rowsecurity.c - * Routines to support policies for row level security (aka RLS). + * Routines to support policies for row-level security (aka RLS). * * Policies in PostgreSQL provide a mechanism to limit what records are * returned to a user and what records a user is permitted to add to a table. @@ -100,7 +100,7 @@ row_security_policy_hook_type row_security_policy_hook_restrictive = NULL; * Get any row security quals and WithCheckOption checks that should be * applied to the specified RTE. * - * In addition, hasRowSecurity is set to true if row level security is enabled + * In addition, hasRowSecurity is set to true if row-level security is enabled * (even if this RTE doesn't have any row security quals), and hasSubLinks is * set to true if any of the quals returned contain sublinks. */ diff --git a/src/include/catalog/pg_authid.h b/src/include/catalog/pg_authid.h index 1a5c7a73c7c..609bd7fcbcc 100644 --- a/src/include/catalog/pg_authid.h +++ b/src/include/catalog/pg_authid.h @@ -38,7 +38,7 @@ CATALOG(pg_authid,1260,AuthIdRelationId) BKI_SHARED_RELATION BKI_ROWTYPE_OID(284 bool rolcreatedb; /* allowed to create databases? */ bool rolcanlogin; /* allowed to log in as session user? */ bool rolreplication; /* role used for streaming replication */ - bool rolbypassrls; /* bypasses row level security? */ + bool rolbypassrls; /* bypasses row-level security? */ int32 rolconnlimit; /* max connections allowed (-1=no limit) */ /* remaining fields may be null; use heap_getattr to read them! */ diff --git a/src/test/regress/expected/rowsecurity.out b/src/test/regress/expected/rowsecurity.out index b02a6824711..367ecace472 100644 --- a/src/test/regress/expected/rowsecurity.out +++ b/src/test/regress/expected/rowsecurity.out @@ -3514,7 +3514,7 @@ CREATE POLICY p ON t USING (c % 2 = 1); ALTER TABLE t ENABLE ROW LEVEL SECURITY; SAVEPOINT q; CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD - SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled + SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled ERROR: could not convert table "t" to a view because it has row security enabled ROLLBACK TO q; ALTER TABLE t DISABLE ROW LEVEL SECURITY; diff --git a/src/test/regress/sql/rowsecurity.sql b/src/test/regress/sql/rowsecurity.sql index d7a5a36cf86..281ae74b9ca 100644 --- a/src/test/regress/sql/rowsecurity.sql +++ b/src/test/regress/sql/rowsecurity.sql @@ -1445,7 +1445,7 @@ ALTER TABLE t ENABLE ROW LEVEL SECURITY; SAVEPOINT q; CREATE RULE "_RETURN" AS ON SELECT TO t DO INSTEAD - SELECT * FROM generate_series(1,5) t0(c); -- fails due to row level security enabled + SELECT * FROM generate_series(1,5) t0(c); -- fails due to row-level security enabled ROLLBACK TO q; ALTER TABLE t DISABLE ROW LEVEL SECURITY; |