summaryrefslogtreecommitdiff
path: root/doc/src
diff options
context:
space:
mode:
authorStephen Frost <sfrost@snowman.net>2015-01-28 21:47:15 -0500
committerStephen Frost <sfrost@snowman.net>2015-01-28 21:47:15 -0500
commitc7cf9a243336d5f48bb4a4297c9fba4210f3e981 (patch)
treeb0667d17afb41b769ae7f61ddc9ac1c5c032b4a0 /doc/src
parentf8519a6a464c92730dfa21298022f74d105f54d4 (diff)
Add usebypassrls to pg_user and pg_shadow
The row level security patches didn't add the 'usebypassrls' columns to the pg_user and pg_shadow views on the belief that they were deprecated, but we havn't actually said they are and therefore we should include it. This patch corrects that, adds missing documentation for rolbypassrls into the system catalog page for pg_authid, along with the entries for pg_user and pg_shadow, and cleans up a few other uses of 'row-level' cases to be 'row level' in the docs. Pointed out by Amit Kapila. Catalog version bump due to system view changes.
Diffstat (limited to 'doc/src')
-rw-r--r--doc/src/sgml/catalogs.sgml33
1 files changed, 31 insertions, 2 deletions
diff --git a/doc/src/sgml/catalogs.sgml b/doc/src/sgml/catalogs.sgml
index 62305d2bb3e..49891a4a7bf 100644
--- a/doc/src/sgml/catalogs.sgml
+++ b/doc/src/sgml/catalogs.sgml
@@ -1445,6 +1445,15 @@
</row>
<row>
+ <entry><structfield>rolbypassrls</structfield></entry>
+ <entry><type>bool</type></entry>
+ <entry>
+ Role can bypass row level security policies, see
+ <xref linkend="ddl-rowsecurity"> for more information.
+ </entry>
+ </row>
+
+ <row>
<entry><structfield>rolconnlimit</structfield></entry>
<entry><type>int4</type></entry>
<entry>
@@ -1951,7 +1960,7 @@
<entry><type>bool</type></entry>
<entry></entry>
<entry>
- True if table has row-level security enabled; see
+ True if table has row level security enabled; see
<link linkend="catalog-pg-policy"><structname>pg_policy</structname></link> catalog
</entry>
</row>
@@ -4719,7 +4728,7 @@
</indexterm>
<para>
- The catalog <structname>pg_policy</structname> stores row-level
+ The catalog <structname>pg_policy</structname> stores row level
security policies for tables. A policy includes the kind of
command that it applies to (possibly all commands), the roles that it
applies to, the expression to be added as a security-barrier
@@ -9031,6 +9040,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
</row>
<row>
+ <entry><structfield>usebypassrls</structfield></entry>
+ <entry><type>bool</type></entry>
+ <entry></entry>
+ <entry>
+ User can bypass row level security policies, see
+ <xref linkend="ddl-rowsecurity"> for more information.
+ </entry>
+ </row>
+
+ <row>
<entry><structfield>passwd</structfield></entry>
<entry><type>text</type></entry>
<entry></entry>
@@ -9506,6 +9525,16 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
</row>
<row>
+ <entry><structfield>usebypassrls</structfield></entry>
+ <entry><type>bool</type></entry>
+ <entry></entry>
+ <entry>
+ User can bypass row level security policies, see
+ <xref linkend="ddl-rowsecurity"> for more information.
+ </entry>
+ </row>
+
+ <row>
<entry><structfield>passwd</structfield></entry>
<entry><type>text</type></entry>
<entry>Not the password (always reads as <literal>********</>)</entry>