Skip to content

Commit a891e68

Browse files
author
chegong18
committed
Update user-manag.sgml-200704
——row914至927,增英和翻为: <!--==========================orignal english content========================== <row> <entry>pg_monitor</entry> <entry>Read/execute various monitoring views and functions. This role is a member of <literal>pg_read_all_settings</literal>, <literal>pg_read_all_stats</literal> and <literal>pg_stat_scan_tables</literal>.</entry> </row> ____________________________________________________________________________--> <row> <entry>pg_monitor</entry> <entry>读取/执行各种不同的监控视图和函数。 这角色是<literal>pg_read_all_settings</literal>,<literal>pg_read_all_stats</literal>和<literal>pg_stat_scan_tables</literal>的成员。</entry> </row> ——row931,调英为: <entry>Signal another backend to cancel a query or terminate its session.</entry> ——row936,调翻为: <entry>发信号到其他后端亿取消查询或中止它的会话。</entry> ——row971,删英和翻为: <!--==========================orignal english content========================== <row> <entry>pg_monitor</entry> <entry>Read/execute various monitoring views and functions. This role is a member of <literal>pg_read_all_settings</literal>, <literal>pg_read_all_stats</literal> and <literal>pg_stat_scan_tables</literal>.</entry> </row> ____________________________________________________________________________--> <row> <entry>pg_monitor</entry> <entry>读取/执行各种监控视图和函数。这个角色是<literal>pg_read_all_settings</literal>、<literal>pg_read_all_stats</literal>以及<literal>pg_stat_scan_tables</literal>的成员。</entry> </row> ——row974,删英和翻为: <!--==========================orignal english content========================== <para> The <literal>pg_read_server_files</literal>, <literal>pg_write_server_files</literal> and <literal>pg_execute_server_program</literal> roles are intended to allow administrators to have trusted, but non-superuser, roles which are able to access files and run programs on the database server as the user the database runs as. As these roles are able to access any file on the server file system, they bypass all database-level permission checks when accessing files directly and they could be used to gain superuser-level access, therefore care should be taken when granting these roles to users. </para> ____________________________________________________________________________--> <para> <literal>pg_read_server_files</literal>、<literal>pg_write_server_files</literal>以及<literal>pg_execute_server_program</literal>角色的目的是允许管理员有一些可信但不是超级用户的角色来访问文件以及以运行数据库的用户在数据库服务器上运行程序。由于这些角色能够防伪服务器文件系统上的任何文件,因此在直接访问文件时它们会绕过任何数据库级别的权限检查并且它们可以被用来得到超级用户级别的访问,因此在把这些角色授予给用户时应当非常小心。 </para> ——row989至1019,增英和翻为: <!--==========================orignal english content========================== <para> The <literal>pg_signal_backend</literal> role is intended to allow administrators to enable trusted, but non-superuser, roles to send signals to other backends. Currently this role enables sending of signals for canceling a query on another backend or terminating its session. A user granted this role cannot however send signals to a backend owned by a superuser. See <xref linkend="functions-admin-signal"/>. </para> ____________________________________________________________________________--> <para> <literal>pg_signal_backend</literal>角色想要允许管理员启用受信任的、但是非超级用户的、发送信号给其他后端的角色。 当前,此角色允许发送信号以取消另一个后端上的查询或终止其会话。不过授予此角色的用户不能向属于超级用户的后端发送信号。 参见<xref linkend="functions-admin-signal"/> </para> <!--==========================orignal english content========================== <para> The <literal>pg_read_server_files</literal>, <literal>pg_write_server_files</literal> and <literal>pg_execute_server_program</literal> roles are intended to allow administrators to have trusted, but non-superuser, roles which are able to access files and run programs on the database server as the user the database runs as. As these roles are able to access any file on the server file system, they bypass all database-level permission checks when accessing files directly and they could be used to gain superuser-level access, therefore great care should be taken when granting these roles to users. </para> ____________________________________________________________________________--> <para> <literal>pg_read_server_files</literal>、<literal>pg_write_server_files</literal>以及<literal>pg_execute_server_program</literal>角色的目的是允许管理员有一些可信但不是超级用户的角色来访问文件以及以运行数据库的用户在数据库服务器上运行程序。 由于这些角色能够访问服务器文件系统上的任何文件,因此在直接访问文件时它们会绕过任何数据库级别的权限检查并且它们可以被用来得到超级用户级别的访问,因此在把这些角色授予给用户时应当特别小心。 </para> ——row1034至1035,调英为: Administrators can grant access to these roles to users using the <xref linkend="sql-grant"/> command, for example: ——row1043,调翻为: 管理员可以用<xref linkend="sql-grant"/>命令把对这些角色的访问授予给用户,例如:
1 parent 1939058 commit a891e68

File tree

1 file changed

+53
-35
lines changed

1 file changed

+53
-35
lines changed

postgresql/doc/src/sgml/user-manag.sgml

Lines changed: 53 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -678,7 +678,7 @@ DROP ROLE <replaceable>name</replaceable>;
678678
任何在该组角色中的成员关系会被自动撤销(但是成员角色不会受到影响)。
679679
</para>
680680
</sect1>
681-
681+
682682
<sect1 id="role-removal">
683683
<!--==========================orignal english content==========================
684684
<title>Dropping Roles</title>
@@ -818,7 +818,7 @@ ____________________________________________________________________________-->
818818
消息标识哪些对象需要被重新授予或者删除。
819819
</para>
820820
</sect1>
821-
821+
822822
<sect1 id="default-roles">
823823
<!--==========================orignal english content==========================
824824
<title>Default Roles</title>
@@ -911,15 +911,29 @@ ____________________________________________________________________________-->
911911
<entry>pg_stat_scan_tables</entry>
912912
<entry>执行可能会在表上取得<literal>ACCESS SHARE</literal>锁的监控函数(可能会持锁很长时间)。</entry>
913913
</row>
914+
<!--==========================orignal english content==========================
915+
<row>
916+
<entry>pg_monitor</entry>
917+
<entry>Read/execute various monitoring views and functions.
918+
This role is a member of <literal>pg_read_all_settings</literal>,
919+
<literal>pg_read_all_stats</literal> and
920+
<literal>pg_stat_scan_tables</literal>.</entry>
921+
</row>
922+
____________________________________________________________________________-->
923+
<row>
924+
<entry>pg_monitor</entry>
925+
<entry>读取/执行各种不同的监控视图和函数。
926+
这角色是<literal>pg_read_all_settings</literal>,<literal>pg_read_all_stats</literal>和<literal>pg_stat_scan_tables</literal>的成员。</entry>
927+
</row>
914928
<!--==========================orignal english content==========================
915929
<row>
916930
<entry>pg_signal_backend</entry>
917-
<entry>Send signals to other backends (eg: cancel query, terminate).</entry>
931+
<entry>Signal another backend to cancel a query or terminate its session.</entry>
918932
</row>
919933
____________________________________________________________________________-->
920934
<row>
921935
<entry>pg_signal_backend</entry>
922-
<entry>向其他后端发送信号(例如:取消查询、中止)。</entry>
936+
<entry>发信号到其他后端亿取消查询或中止它的会话。</entry>
923937
</row>
924938
<!--==========================orignal english content==========================
925939
<row>
@@ -954,38 +968,10 @@ ____________________________________________________________________________-->
954968
<entry>pg_execute_server_program</entry>
955969
<entry>允许用运行该数据库的用户执行数据库服务器上的程序来配合COPY和其他允许执行服务器端程序的函数。</entry>
956970
</row>
957-
<!--==========================orignal english content==========================
958-
<row>
959-
<entry>pg_monitor</entry>
960-
<entry>Read/execute various monitoring views and functions.
961-
This role is a member of <literal>pg_read_all_settings</literal>,
962-
<literal>pg_read_all_stats</literal> and
963-
<literal>pg_stat_scan_tables</literal>.</entry>
964-
</row>
965-
____________________________________________________________________________-->
966-
<row>
967-
<entry>pg_monitor</entry>
968-
<entry>读取/执行各种监控视图和函数。这个角色是<literal>pg_read_all_settings</literal>、<literal>pg_read_all_stats</literal>以及<literal>pg_stat_scan_tables</literal>的成员。</entry>
969-
</row>
970971
</tbody>
971972
</tgroup>
972973
</table>
973974

974-
<!--==========================orignal english content==========================
975-
<para>
976-
The <literal>pg_read_server_files</literal>, <literal>pg_write_server_files</literal> and
977-
<literal>pg_execute_server_program</literal> roles are intended to allow administrators to have
978-
trusted, but non-superuser, roles which are able to access files and run programs on the
979-
database server as the user the database runs as. As these roles are able to access any file on
980-
the server file system, they bypass all database-level permission checks when accessing files
981-
directly and they could be used to gain superuser-level access, therefore care should be taken
982-
when granting these roles to users.
983-
</para>
984-
____________________________________________________________________________-->
985-
<para>
986-
<literal>pg_read_server_files</literal>、<literal>pg_write_server_files</literal>以及<literal>pg_execute_server_program</literal>角色的目的是允许管理员有一些可信但不是超级用户的角色来访问文件以及以运行数据库的用户在数据库服务器上运行程序。由于这些角色能够防伪服务器文件系统上的任何文件,因此在直接访问文件时它们会绕过任何数据库级别的权限检查并且它们可以被用来得到超级用户级别的访问,因此在把这些角色授予给用户时应当非常小心。
987-
</para>
988-
989975
<!--==========================orignal english content==========================
990976
<para>
991977
The <literal>pg_monitor</literal>, <literal>pg_read_all_settings</literal>,
@@ -1000,6 +986,38 @@ ____________________________________________________________________________-->
1000986
<literal>pg_monitor</literal>、<literal>pg_read_all_settings</literal>、<literal>pg_read_all_stats</literal>和<literal>pg_stat_scan_tables</literal>角色的目的是允许管理员能为监控数据库服务器的目的很容易地配置角色。它们授予一组常用的特权,这些特权允许角色读取各种有用的配置设置、统计信息以及通常仅限于超级用户的其他系统信息。
1001987
</para>
1002988

989+
<!--==========================orignal english content==========================
990+
<para>
991+
The <literal>pg_signal_backend</literal> role is intended to allow
992+
administrators to enable trusted, but non-superuser, roles to send signals
993+
to other backends. Currently this role enables sending of signals for
994+
canceling a query on another backend or terminating its session. A user
995+
granted this role cannot however send signals to a backend owned by a
996+
superuser. See <xref linkend="functions-admin-signal"/>.
997+
</para>
998+
____________________________________________________________________________-->
999+
<para>
1000+
<literal>pg_signal_backend</literal>角色想要允许管理员启用受信任的、但是非超级用户的、发送信号给其他后端的角色。
1001+
当前,此角色允许发送信号以取消另一个后端上的查询或终止其会话。不过授予此角色的用户不能向属于超级用户的后端发送信号。
1002+
参见<xref linkend="functions-admin-signal"/>
1003+
</para>
1004+
1005+
<!--==========================orignal english content==========================
1006+
<para>
1007+
The <literal>pg_read_server_files</literal>, <literal>pg_write_server_files</literal> and
1008+
<literal>pg_execute_server_program</literal> roles are intended to allow administrators to have
1009+
trusted, but non-superuser, roles which are able to access files and run programs on the
1010+
database server as the user the database runs as. As these roles are able to access any file on
1011+
the server file system, they bypass all database-level permission checks when accessing files
1012+
directly and they could be used to gain superuser-level access, therefore
1013+
great care should be taken when granting these roles to users.
1014+
</para>
1015+
____________________________________________________________________________-->
1016+
<para>
1017+
<literal>pg_read_server_files</literal>、<literal>pg_write_server_files</literal>以及<literal>pg_execute_server_program</literal>角色的目的是允许管理员有一些可信但不是超级用户的角色来访问文件以及以运行数据库的用户在数据库服务器上运行程序。
1018+
由于这些角色能够访问服务器文件系统上的任何文件,因此在直接访问文件时它们会绕过任何数据库级别的权限检查并且它们可以被用来得到超级用户级别的访问,因此在把这些角色授予给用户时应当特别小心。
1019+
</para>
1020+
10031021
<!--==========================orignal english content==========================
10041022
<para>
10051023
Care should be taken when granting these roles to ensure they are only used where
@@ -1013,16 +1031,16 @@ ____________________________________________________________________________-->
10131031

10141032
<!--==========================orignal english content==========================
10151033
<para>
1016-
Administrators can grant access to these roles to users using the GRANT
1017-
command:
1034+
Administrators can grant access to these roles to users using the
1035+
<xref linkend="sql-grant"/> command, for example:
10181036

10191037
<programlisting>
10201038
GRANT pg_signal_backend TO admin_user;
10211039
</programlisting>
10221040
</para>
10231041
____________________________________________________________________________-->
10241042
<para>
1025-
管理员可以用GRANT命令把对这些角色的访问授予给用户
1043+
管理员可以用<xref linkend="sql-grant"/>命令把对这些角色的访问授予给用户,例如
10261044

10271045
<programlisting>
10281046
GRANT pg_signal_backend TO admin_user;

0 commit comments

Comments
 (0)