Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 741ccd5

Browse files
committed
Use gender-neutral language in documentation
Based on patch by Thomas Munro <[email protected]>, although I rephrased most of the initial work.
1 parent 1320077 commit 741ccd5

20 files changed

+57
-58
lines changed

doc/src/sgml/catalogs.sgml

+2-2
Original file line numberDiff line numberDiff line change
@@ -9274,7 +9274,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
92749274
<filename>postgresql.conf</filename> without restarting the server.
92759275
They can also be set for a particular session in the connection request
92769276
packet (for example, via <application>libpq</>'s <literal>PGOPTIONS</>
9277-
environment variable); any user can make such a change for his session.
9277+
environment variable); any user can make such a change for their session.
92789278
However, these settings never change in a session after it is started.
92799279
If you change them in <filename>postgresql.conf</filename>, send a
92809280
<systemitem>SIGHUP</systemitem> signal to the postmaster to cause it to
@@ -9303,7 +9303,7 @@ SELECT * FROM pg_locks pl LEFT JOIN pg_prepared_xacts ppx
93039303
<para>
93049304
These settings can be set from <filename>postgresql.conf</filename>,
93059305
or within a session via the <command>SET</> command. Any user is
9306-
allowed to change his session-local value. Changes in
9306+
allowed to change their session-local value. Changes in
93079307
<filename>postgresql.conf</filename> will affect existing sessions
93089308
only if no session-local value has been established with <command>SET</>.
93099309
</para>

doc/src/sgml/client-auth.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -690,9 +690,9 @@ local db1,db2,@demodbs all md5
690690
</indexterm>
691691

692692
<para>
693-
When using an external authentication system like Ident or GSSAPI,
693+
When using an external authentication system such as Ident or GSSAPI,
694694
the name of the operating system user that initiated the connection
695-
might not be the same as the database user he needs to connect as.
695+
might not be the same as the database user that is to be connect as.
696696
In this case, a user name map can be applied to map the operating system
697697
user name to a database user. To use user name mapping, specify
698698
<literal>map</literal>=<replaceable>map-name</replaceable>
@@ -1185,7 +1185,7 @@ omicron bryanh guest1
11851185
The drawback of this procedure is that it depends on the integrity
11861186
of the client: if the client machine is untrusted or compromised,
11871187
an attacker could run just about any program on port 113 and
1188-
return any user name he chooses. This authentication method is
1188+
return any user name they choose. This authentication method is
11891189
therefore only appropriate for closed networks where each client
11901190
machine is under tight control and where the database and system
11911191
administrators operate in close contact. In other words, you must

doc/src/sgml/ddl.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1492,8 +1492,8 @@ REVOKE ALL ON accounts FROM PUBLIC;
14921492
<command>DROP</>, <command>GRANT</>, <command>REVOKE</>, etc.)
14931493
are always implicit in being the owner,
14941494
and cannot be granted or revoked. But the object owner can choose
1495-
to revoke his own ordinary privileges, for example to make a
1496-
table read-only for himself as well as others.
1495+
to revoke their own ordinary privileges, for example to make a
1496+
table read-only for themselves as well as others.
14971497
</para>
14981498

14991499
<para>
@@ -1816,7 +1816,7 @@ UPDATE 1
18161816
example, both <literal>schema1</> and <literal>myschema</> can
18171817
contain tables named <literal>mytable</>. Unlike databases,
18181818
schemas are not rigidly separated: a user can access objects in any
1819-
of the schemas in the database he is connected to, if he has
1819+
of the schemas in the database they are connected to, if they have
18201820
privileges to do so.
18211821
</para>
18221822

doc/src/sgml/manage-ag.sgml

+3-3
Original file line numberDiff line numberDiff line change
@@ -155,9 +155,9 @@ createdb <replaceable class="parameter">dbname</replaceable>
155155
</note>
156156

157157
<para>
158-
Sometimes you want to create a database for someone else, and have him
159-
become the owner of the new database, so he can
160-
configure and manage it himself. To achieve that, use one of the
158+
Sometimes you want to create a database for someone else, and have them
159+
become the owner of the new database, so they can
160+
configure and manage it themselves. To achieve that, use one of the
161161
following commands:
162162
<programlisting>
163163
CREATE DATABASE <replaceable>dbname</> OWNER <replaceable>rolename</>;

doc/src/sgml/nls.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ msgstr "another translated"
115115
for the translator, such as about expected alignment. The #:
116116
comment indicates the exact location(s) where the message is used
117117
in the source. The translator need not look at the program
118-
source, but he can if there is doubt about the correct
118+
source, but can if there is doubt about the correct
119119
translation. The #, comments contain flags that describe the
120120
message in some way. There are currently two flags:
121121
<literal>fuzzy</literal> is set if the message has possibly been

doc/src/sgml/plpgsql.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3904,7 +3904,7 @@ CREATE FUNCTION emp_stamp() RETURNS trigger AS $emp_stamp$
39043904
RAISE EXCEPTION '% cannot have null salary', NEW.empname;
39053905
END IF;
39063906

3907-
-- Who works for us when she must pay for it?
3907+
-- Who works for us when they must pay for it?
39083908
IF NEW.salary &lt; 0 THEN
39093909
RAISE EXCEPTION '% cannot have a negative salary', NEW.empname;
39103910
END IF;

doc/src/sgml/ref/alter_user_mapping.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ ALTER USER MAPPING FOR { <replaceable class="parameter">user_name</replaceable>
3838
<para>
3939
The owner of a foreign server can alter user mappings for that
4040
server for any user. Also, a user can alter a user mapping for
41-
his own user name if <literal>USAGE</> privilege on the server has
41+
their own user name if <literal>USAGE</> privilege on the server has
4242
been granted to the user.
4343
</para>
4444
</refsect1>

doc/src/sgml/ref/create_schema.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ CREATE VIEW hollywood.winners AS
205205
all objects within it. <productname>PostgreSQL</productname>
206206
allows schemas to contain objects owned by users other than the
207207
schema owner. This can happen only if the schema owner grants the
208-
<literal>CREATE</> privilege on his schema to someone else, or a
208+
<literal>CREATE</> privilege on their schema to someone else, or a
209209
superuser chooses to create objects in it.
210210
</para>
211211

doc/src/sgml/ref/create_user_mapping.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ CREATE USER MAPPING FOR { <replaceable class="parameter">user_name</replaceable>
4141
<para>
4242
The owner of a foreign server can create user mappings for that
4343
server for any user. Also, a user can create a user mapping for
44-
his own user name if <literal>USAGE</> privilege on the server has
44+
their own user name if <literal>USAGE</> privilege on the server has
4545
been granted to the user.
4646
</para>
4747
</refsect1>

doc/src/sgml/ref/drop_schema.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ DROP SCHEMA [ IF EXISTS ] <replaceable class="PARAMETER">name</replaceable> [, .
3535
<para>
3636
A schema can only be dropped by its owner or a superuser. Note that
3737
the owner can drop the schema (and thereby all contained objects)
38-
even if he does not own some of the objects within the schema.
38+
even if they do not own some of the objects within the schema.
3939
</para>
4040
</refsect1>
4141

doc/src/sgml/ref/drop_user_mapping.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ DROP USER MAPPING [ IF EXISTS ] FOR { <replaceable class="parameter">user_name</
3535

3636
<para>
3737
The owner of a foreign server can drop user mappings for that server
38-
for any user. Also, a user can drop a user mapping for his own
38+
for any user. Also, a user can drop a user mapping for their own
3939
user name if <literal>USAGE</> privilege on the server has been
4040
granted to the user.
4141
</para>

doc/src/sgml/ref/grant.sgml

+7-7
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ GRANT <replaceable class="PARAMETER">role_name</replaceable> [, ...] TO <replace
141141
There is no need to grant privileges to the owner of an object
142142
(usually the user that created it),
143143
as the owner has all privileges by default. (The owner could,
144-
however, choose to revoke some of his own privileges for safety.)
144+
however, choose to revoke some of their own privileges for safety.)
145145
</para>
146146

147147
<para>
@@ -365,7 +365,7 @@ GRANT <replaceable class="PARAMETER">role_name</replaceable> [, ...] TO <replace
365365
</para>
366366
<para>
367367
For servers, this privilege enables the grantee to create foreign
368-
tables using the server, and also to create, alter, or drop his own
368+
tables using the server, and also to create, alter, or drop their own
369369
user's user mappings associated with that server.
370370
</para>
371371
</listitem>
@@ -438,9 +438,9 @@ GRANT <replaceable class="PARAMETER">role_name</replaceable> [, ...] TO <replace
438438

439439
<para>
440440
A user may perform <command>SELECT</>, <command>INSERT</>, etc. on a
441-
column if he holds that privilege for either the specific column or
441+
column if they hold that privilege for either the specific column or
442442
its whole table. Granting the privilege at the table level and then
443-
revoking it for one column will not do what you might wish: the
443+
revoking it for one column will not do what one might wish: the
444444
table-level grant is unaffected by a column-level operation.
445445
</para>
446446

@@ -626,13 +626,13 @@ GRANT admins TO joe;
626626
</para>
627627

628628
<para>
629-
<productname>PostgreSQL</productname> allows an object owner to revoke his
629+
<productname>PostgreSQL</productname> allows an object owner to revoke their
630630
own ordinary privileges: for example, a table owner can make the table
631-
read-only to himself by revoking his own <literal>INSERT</>,
631+
read-only to themselves by revoking their own <literal>INSERT</>,
632632
<literal>UPDATE</>, <literal>DELETE</>, and <literal>TRUNCATE</>
633633
privileges. This is not possible according to the SQL standard. The
634634
reason is that <productname>PostgreSQL</productname> treats the owner's
635-
privileges as having been granted by the owner to himself; therefore he
635+
privileges as having been granted by the owner to themselves; therefore they
636636
can revoke them too. In the SQL standard, the owner's privileges are
637637
granted by an assumed entity <quote>_SYSTEM</>. Not being
638638
<quote>_SYSTEM</>, the owner cannot revoke these rights.

doc/src/sgml/ref/revoke.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ REVOKE [ ADMIN OPTION FOR ]
193193
Instead, user A could revoke the grant option from user B and use
194194
the <literal>CASCADE</literal> option so that the privilege is
195195
in turn revoked from user C. For another example, if both A and B
196-
have granted the same privilege to C, A can revoke his own grant
196+
have granted the same privilege to C, A can revoke their own grant
197197
but not B's grant, so C will still effectively have the privilege.
198198
</para>
199199

doc/src/sgml/ref/set_role.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ RESET ROLE
7777

7878
<para>
7979
In particular, when a superuser chooses to <command>SET ROLE</> to a
80-
non-superuser role, she loses her superuser privileges.
80+
non-superuser role, they lose their superuser privileges.
8181
</para>
8282

8383
<para>

doc/src/sgml/rules.sgml

+25-25
Original file line numberDiff line numberDiff line change
@@ -1652,7 +1652,7 @@ CREATE RULE shoelace_ins AS ON INSERT TO shoelace
16521652
Now assume that once in a while, a pack of shoelaces arrives at
16531653
the shop and a big parts list along with it. But you don't want
16541654
to manually update the <literal>shoelace</literal> view every
1655-
time. Instead we setup two little tables: one where you can
1655+
time. Instead we set up two little tables: one where you can
16561656
insert the items from the part list, and one with a special
16571657
trick. The creation commands for these are:
16581658

@@ -2023,57 +2023,57 @@ SELECT * FROM shoelace;
20232023
behavior of the default access control system. Relations that
20242024
are used due to rules get checked against the
20252025
privileges of the rule owner, not the user invoking the rule.
2026-
This means that a user only needs the required privileges
2027-
for the tables/views that he names explicitly in his queries.
2026+
This means that users only need the required privileges
2027+
for the tables/views that are explicitly named in their queries.
20282028
</para>
20292029

20302030
<para>
20312031
For example: A user has a list of phone numbers where some of
2032-
them are private, the others are of interest for the secretary of the office.
2033-
He can construct the following:
2032+
them are private, the others are of interest for the assistant of the office.
2033+
The user can construct the following:
20342034

20352035
<programlisting>
20362036
CREATE TABLE phone_data (person text, phone text, private boolean);
20372037
CREATE VIEW phone_number AS
20382038
SELECT person, CASE WHEN NOT private THEN phone END AS phone
20392039
FROM phone_data;
2040-
GRANT SELECT ON phone_number TO secretary;
2040+
GRANT SELECT ON phone_number TO assistant;
20412041
</programlisting>
20422042

2043-
Nobody except him (and the database superusers) can access the
2043+
Nobody except that user (and the database superusers) can access the
20442044
<literal>phone_data</> table. But because of the <command>GRANT</>,
2045-
the secretary can run a <command>SELECT</command> on the
2045+
the assistant can run a <command>SELECT</command> on the
20462046
<literal>phone_number</> view. The rule system will rewrite the
20472047
<command>SELECT</command> from <literal>phone_number</> into a
20482048
<command>SELECT</command> from <literal>phone_data</>.
20492049
Since the user is the owner of
20502050
<literal>phone_number</> and therefore the owner of the rule, the
2051-
read access to <literal>phone_data</> is now checked against his
2051+
read access to <literal>phone_data</> is now checked against the user's
20522052
privileges and the query is permitted. The check for accessing
20532053
<literal>phone_number</> is also performed, but this is done
20542054
against the invoking user, so nobody but the user and the
2055-
secretary can use it.
2055+
assistant can use it.
20562056
</para>
20572057

20582058
<para>
2059-
The privileges are checked rule by rule. So the secretary is for now the
2060-
only one who can see the public phone numbers. But the secretary can setup
2059+
The privileges are checked rule by rule. So the assistant is for now the
2060+
only one who can see the public phone numbers. But the assistant can set up
20612061
another view and grant access to that to the public. Then, anyone
2062-
can see the <literal>phone_number</> data through the secretary's view.
2063-
What the secretary cannot do is to create a view that directly
2064-
accesses <literal>phone_data</>. (Actually he can, but it will not work since
2062+
can see the <literal>phone_number</> data through the assistant's view.
2063+
What the assistant cannot do is to create a view that directly
2064+
accesses <literal>phone_data</>. (Actually the assistant can, but it will not work since
20652065
every access will be denied during the permission checks.)
2066-
And as soon as the user will notice, that the secretary opened
2067-
his <literal>phone_number</> view, he can revoke his access. Immediately, any
2068-
access to the secretary's view would fail.
2066+
And as soon as the user notices that the assistant opened
2067+
their <literal>phone_number</> view, the user can revoke the assistant's access. Immediately, any
2068+
access to the assistant's view would fail.
20692069
</para>
20702070

20712071
<para>
20722072
One might think that this rule-by-rule checking is a security
2073-
hole, but in fact it isn't. But if it did not work this way, the secretary
2073+
hole, but in fact it isn't. But if it did not work this way, the assistant
20742074
could set up a table with the same columns as <literal>phone_number</> and
2075-
copy the data to there once per day. Then it's his own data and
2076-
he can grant access to everyone he wants. A
2075+
copy the data to there once per day. Then it's the assistant's own data and
2076+
the assistant can grant access to everyone they want. A
20772077
<command>GRANT</command> command means, <quote>I trust you</quote>.
20782078
If someone you trust does the thing above, it's time to
20792079
think it over and then use <command>REVOKE</command>.
@@ -2093,7 +2093,7 @@ CREATE VIEW phone_number AS
20932093
<command>SELECT</command> from <literal>phone_number</> into a
20942094
<command>SELECT</command> from <literal>phone_data</> and add the
20952095
qualification that only entries where <literal>phone</> does not begin
2096-
with 412 are wanted. But if the user can create his or her own functions,
2096+
with 412 are wanted. But if the user can create their own functions,
20972097
it is not difficult to convince the planner to execute the user-defined
20982098
function prior to the <function>NOT LIKE</function> expression.
20992099
For example:
@@ -2124,8 +2124,8 @@ SELECT * FROM phone_number WHERE tricky(person, phone);
21242124
the <literal>shoelace</> view to someone else, but only
21252125
<literal>SELECT</> on <literal>shoelace_log</>. The rule action to
21262126
write log entries will still be executed successfully, and that
2127-
other user could see the log entries. But he cannot create fake
2128-
entries, nor could he manipulate or remove existing ones. In this
2127+
other user could see the log entries. But they could not create fake
2128+
entries, nor could they manipulate or remove existing ones. In this
21292129
case, there is no possibility of subverting the rules by convincing
21302130
the planner to alter the order of operations, because the only rule
21312131
which references <literal>shoelace_log</> is an unqualified
@@ -2333,7 +2333,7 @@ DELETE FROM software WHERE computer.hostname = 'mypc.local.net'
23332333
AND software.hostname = computer.hostname;
23342334
</programlisting>
23352335

2336-
Since there are appropriate indexes setup, the planner
2336+
Since there are appropriate indexes set up, the planner
23372337
will create a plan of
23382338

23392339
<literallayout class="monospaced">

doc/src/sgml/sepgsql.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -570,7 +570,7 @@ postgres=# SELECT cid, cname, show_credit(cid) FROM customer;
570570

571571
<para>
572572
In this case, a regular user cannot reference <literal>customer.credit</>
573-
directly, but a trusted procedure <literal>show_credit</> allows him
573+
directly, but a trusted procedure <literal>show_credit</> allows the user
574574
to print the credit card numbers of customers with some of the digits
575575
masked out.
576576
</para>

doc/src/sgml/sslinfo.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@
9696
Returns serial number of current client certificate. The combination of
9797
certificate serial number and certificate issuer is guaranteed to
9898
uniquely identify a certificate (but not its owner &mdash; the owner
99-
ought to regularly change his keys, and get new certificates from the
99+
ought to regularly change their keys, and get new certificates from the
100100
issuer).
101101
</para>
102102

doc/src/sgml/start.sgml

+1-2
Original file line numberDiff line numberDiff line change
@@ -143,8 +143,7 @@
143143

144144
<para>
145145
Possibly, your site administrator has already created a database
146-
for your use. He should have told you what the name of your
147-
database is. In that case you can omit this step and skip ahead
146+
for your use. In that case you can omit this step and skip ahead
148147
to the next section.
149148
</para>
150149

doc/src/sgml/user-manag.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ SELECT rolname FROM pg_roles;
129129
<xref linkend="client-authentication">. (Thus, a client is not
130130
limited to connect as the role matching
131131
its operating system user, just as a person's login name
132-
need not match her real name.) Since the role
132+
need not match his or her real name.) Since the role
133133
identity determines the set of privileges available to a connected
134134
client, it is important to carefully configure privileges when setting up
135135
a multiuser environment.

doc/src/sgml/xplang.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@
4949
<literal>template1</> will be copied by <command>CREATE DATABASE</>.
5050
So the database administrator can
5151
decide which languages are available in which databases and can make
52-
some languages available by default if he chooses.
52+
some languages available by default if desired.
5353
</para>
5454

5555
<para>

0 commit comments

Comments
 (0)