db-derby-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From scotsmat...@apache.org
Subject svn commit: r589907 - in /db/derby/docs/trunk/src/ref: rrefsqljgrant.dita rrefsqljrevoke.dita
Date Mon, 29 Oct 2007 23:20:55 GMT
Author: scotsmatrix
Date: Mon Oct 29 16:20:54 2007
New Revision: 589907

URL: http://svn.apache.org/viewvc?rev=589907&view=rev
Log:
DERBY-3133: Updated the syntax for grant and revoke. Patch was contributed by me.

Modified:
    db/derby/docs/trunk/src/ref/rrefsqljgrant.dita
    db/derby/docs/trunk/src/ref/rrefsqljrevoke.dita

Modified: db/derby/docs/trunk/src/ref/rrefsqljgrant.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/ref/rrefsqljgrant.dita?rev=589907&r1=589906&r2=589907&view=diff
==============================================================================
--- db/derby/docs/trunk/src/ref/rrefsqljgrant.dita (original)
+++ db/derby/docs/trunk/src/ref/rrefsqljgrant.dita Mon Oct 29 16:20:54 2007
@@ -1,4 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
+
 <!DOCTYPE reference PUBLIC "-//OASIS//DTD DITA Reference//EN"
  "reference.dtd">
 <!--
@@ -51,31 +52,39 @@
 <section><title>Syntax for routines</title><codeblock><b>GRANT
EXECUTE ON { FUNCTION | PROCEDURE } <i><xref
 href="rrefsqljgrant.dita#rrefsqljgrant/grantroutinename">routine-designator</xref></i>
TO <i><xref
 href="rrefsqljgrant.dita#rrefsqljgrant/grantgrantees">grantees</xref></i></b></codeblock></section>
-<section id="grantprivtype"><title>privilege-type</title><codeblock><b>
-  {
-	ALL PRIVILEGES |
-	DELETE |
-	INSERT |
-	REFERENCES [<i>column list</i>] |
- 	SELECT [<i>column list</i>] |
-	TRIGGER |
-	UPDATE [<i>column list</i>}
-  }</b></codeblock><p>Use the DELETE privilege type to grant permission
to
-delete rows from the specified table.</p><p>Use the INSERT privilege type
-to grant permission to insert rows into the specified table.</p><p>Use the
-REFERENCES privilege type to grant permission to create a foreign key reference
-to the specified table. If a column list is specified with the REFERENCES
-privilege, the permission is valid on only the foreign key reference to the
-specified columns.</p><p>Use the SELECT privilege type to grant permission
-to perform SELECT statements on a table or view. If a column list is specified
-with the SELECT privilege, the permission is valid on only those columns.
-If no column list is specified, then the privilege is valid on all of the
-columns in the table.</p><p>Use the TRIGGER privilege type to grant permission
-to create a trigger on the specified table.</p><p>Use the UPDATE privilege
-type to grant permission to use the UPDATE statement on the specified table.
-If a column list is specified, the permission applies only to the specified
-columns. To update a row using a statement that includes a WHERE clause, you
-must have SELECT permission on the columns in the row that you want to update. </p></section>
+<section id="grantprivtype"><title>privilege-types</title><codeblock><b>
 ALL PRIVILEGES |
+  privilege-list
+</b></codeblock></section>
+<section id="grantprivlist"><title>privilege-list</title><codeblock><b>
table-privilege {, table-privilege }*
+</b></codeblock></section>
+<section id="granttablepriv"><title>table-privilege</title><codeblock><b>
 DELETE |
+  INSERT |
+  REFERENCES [<i>column list</i>] |
+  SELECT [<i>column list</i>] |
+  TRIGGER |
+  UPDATE [<i>column list</i>]
+</b></codeblock></section>
+<section id="grantcollist"><title>column list</title><codeblock><b>
 ( column-identifier {, column-identifier}* )
+</b></codeblock></section>
+<section><p>Use the ALL PRIVILEGES privilege type to grant all of the permissions
+to the user for the specified table. You can also grant one or more table
+privileges by specifying a privilege-list.</p><p>Use the DELETE privilege
+type to grant permission to delete rows from the specified table.</p><p>Use
+the INSERT privilege type to grant permission to insert rows into the specified
+table.</p><p>Use the REFERENCES privilege type to grant permission to create
+a foreign key reference to the specified table. If a column list is specified
+with the REFERENCES privilege, the permission is valid on only the foreign
+key reference to the specified columns.</p><p>Use the SELECT privilege type
+to grant permission to perform SELECT statements on a table or view. If a
+column list is specified with the SELECT privilege, the permission is valid
+on only those columns. If no column list is specified, then the privilege
+is valid on all of the columns in the table.</p><p>Use the TRIGGER privilege
+type to grant permission to create a trigger on the specified table.</p><p>Use
+the UPDATE privilege type to grant permission to use the UPDATE statement
+on the specified table. If a column list is specified, the permission applies
+only to the specified columns. To update a row using a statement that includes
+a WHERE clause, you must have SELECT permission on the columns in the row
+that you want to update. </p></section>
 <section id="grantgrantees"><title>grantees</title><codeblock><b>{
<i>authorization ID</i> | PUBLIC } [,{ <i>authorization ID</i> | PUBLIC
} ] *</b
 ></codeblock><p>You can grant privileges for specific users or for all users.
 Use the keyword PUBLIC to specify all users. When PUBLIC is specified, the

Modified: db/derby/docs/trunk/src/ref/rrefsqljrevoke.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/ref/rrefsqljrevoke.dita?rev=589907&r1=589906&r2=589907&view=diff
==============================================================================
--- db/derby/docs/trunk/src/ref/rrefsqljrevoke.dita (original)
+++ db/derby/docs/trunk/src/ref/rrefsqljrevoke.dita Mon Oct 29 16:20:54 2007
@@ -1,4 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
+
 <!DOCTYPE reference PUBLIC "-//OASIS//DTD DITA Reference//EN"
  "reference.dtd">
 <!--
@@ -39,10 +40,9 @@
 </ul></p><p>Before you issue a REVOKE statement, check that the <codeph>derby.database.sqlAuthorization</codeph>
property
 is set to <codeph>true</codeph>. The <codeph>derby.database.sqlAuthorization</codeph>
property
 enables the SQL Authorization mode.</p><p>You can revoke privileges from an
-object if you are the owner of the object or the 
-<xref href="rrefattrib26867.dita#rrefattrib26867">database owner</xref>.</p><p>The
-syntax that you use for the REVOKE statement depends on whether you are revoking
-privileges to a table or to a routine.</p></section>
+object if you are the owner of the object or the  <xref href="rrefattrib26867.dita#rrefattrib26867">database
+owner</xref>.</p><p>The syntax that you use for the REVOKE statement depends
+on whether you are revoking privileges to a table or to a routine.</p></section>
 <section><title>Syntax for tables</title><codeblock><b>REVOKE
<i><xref href="rrefsqljrevoke.dita#rrefsqljrevoke/revokeptype">privilege-type</xref
 ></i> ON [ TABLE ] { <i><xref href="rreftablename.dita#rreftablename"></xref></i>
| <i><xref
 href="rrefviewname.dita#rrefviewname"></xref></i> } FROM <i><xref
href="rrefsqljrevoke.dita#rrefsqljrevoke/revokegrantees">grantees</xref></i></b
@@ -55,18 +55,20 @@
 clause specifies that the EXECUTE privilege cannot be revoked if the specified
 routine is used in a view, trigger, or constraint, and the privilege is being
 revoked from the owner of the view, trigger, or constraint.</p></section>
-<section id="revokeptype"><title>privilege-type</title><codeblock><b>
-  {
-	ALL PRIVILEGES |
-	DELETE |
-	INSERT |
-	REFERENCES [<i>column list</i>] |
- 	SELECT [<i>column list</i>] |
-	TRIGGER |
-	UPDATE [<i>column list</i>}
- }</b></codeblock><p>Use the ALL PRIVILEGES privilege type to revoke all
of
-the permissions from the user for the specified table.</p><p>Use the DELETE
-privilege type to revoke permission to delete rows from the specified table.</p><p>Use
+<section id="revokeprivtype"><title>privilege-types</title><codeblock><b>
 ALL PRIVILEGES |
+  privilege-list </b></codeblock></section>
+<section id="revokeprivlist"><title>privilege-list</title><codeblock><b>
 table-privilege {, table-privilege }* </b></codeblock></section>
+<section id="revoketablepriv"><title>table-privilege</title><codeblock><b>
 DELETE |
+  INSERT |
+  REFERENCES [<i>column list</i>] |
+  SELECT [<i>column list</i>] |
+  TRIGGER |
+  UPDATE [<i>column list</i>] </b></codeblock></section>
+<section id="revokecollist"><title>column list</title><codeblock><b>
 ( column-identifier {, column-identifier}* ) </b></codeblock></section>
+<section><p>Use the ALL PRIVILEGES privilege type to revoke all of the permissions
+from the user for the specified table. You can also revoke one or more table
+privileges by specifying a privilege-list.</p><p>Use the DELETE privilege
+type to revoke permission to delete rows from the specified table.</p><p>Use
 the INSERT privilege type to revoke permission to insert rows into the specified
 table.</p><p>Use the REFERENCES privilege type to revoke permission to create
 a foreign key reference to the specified table. If a column list is specified
@@ -80,7 +82,7 @@
 the UPDATE privilege type to revoke permission to use the UPDATE statement
 on the specified table. If a column list is specified, the permission is revoked
 only on the specified columns.</p></section>
-<section id="revokegrantees"><title>grantees</title><codeblock><b>{
<i>authorization ID</i> | PUBLIC } [,{ <i>authorization ID</i> | PUBLIC
} ] *</b
+<section id="revokegrantees"><title>grantees</title><codeblock><b>
 { <i>authorization ID</i> | PUBLIC } [,{ <i>authorization ID</i>
| PUBLIC } ] *</b
 ></codeblock><p>You can revoke the privileges from specific users or from
 all users. Use the keyword PUBLIC to specify all users. The privileges revoked
 from PUBLIC and from individual users are independent privileges. For example,
@@ -90,9 +92,8 @@
 ID <codeph>harry</codeph> can access the table <codeph>t</codeph>
through
 the PUBLIC privilege.</p><note type="restriction">You cannot revoke the privileges
 of the owner of an object.</note></section>
-<section id="revokeroutinename"><title>routine-designator</title><codeblock><b>
-  {
-		<i>qualified-name</i> [ signature ]
+<section id="revokeroutinename"><title>routine-designator</title><codeblock><b>
 {
+   <i>qualified-name</i> [ signature ]
   }</b></codeblock></section>
 <section><title>Cascading object dependencies</title><p>For views,
triggers,
 and constraints, if the privilege on which the object depends on is revoked,



Mime
View raw message