Both are valid SGML, but let's be consistent.
Author: Peter Smith
Discussion: https://www.postgresql.org/message-id/CAHut%2BPtghjg0SBUTv%3D4Bpcy68d1zD3VAnZ3wX1DQSp39XKD9Sw%40mail.gmail.com
revocation list (CRL). Certificates listed in this file, if it
exists, will be rejected while attempting to authenticate the
server's certificate. If neither
- <xref linkend='libpq-connect-sslcrl'/> nor
- <xref linkend='libpq-connect-sslcrldir'/> is set, this setting is
+ <xref linkend="libpq-connect-sslcrl"/> nor
+ <xref linkend="libpq-connect-sslcrldir"/> is set, this setting is
taken as
<filename>~/.postgresql/root.crl</filename>.
</para>
<entry><structname>pg_stat_progress_analyze</structname><indexterm><primary>pg_stat_progress_analyze</primary></indexterm></entry>
<entry>One row for each backend (including autovacuum worker processes) running
<command>ANALYZE</command>, showing current progress.
- See <xref linkend='analyze-progress-reporting'/>.
+ See <xref linkend="analyze-progress-reporting"/>.
</entry>
</row>
<entry><structname>pg_stat_progress_create_index</structname><indexterm><primary>pg_stat_progress_create_index</primary></indexterm></entry>
<entry>One row for each backend running <command>CREATE INDEX</command> or <command>REINDEX</command>, showing
current progress.
- See <xref linkend='create-index-progress-reporting'/>.
+ See <xref linkend="create-index-progress-reporting"/>.
</entry>
</row>
<entry><structname>pg_stat_progress_vacuum</structname><indexterm><primary>pg_stat_progress_vacuum</primary></indexterm></entry>
<entry>One row for each backend (including autovacuum worker processes) running
<command>VACUUM</command>, showing current progress.
- See <xref linkend='vacuum-progress-reporting'/>.
+ See <xref linkend="vacuum-progress-reporting"/>.
</entry>
</row>
<entry><structname>pg_stat_progress_cluster</structname><indexterm><primary>pg_stat_progress_cluster</primary></indexterm></entry>
<entry>One row for each backend running
<command>CLUSTER</command> or <command>VACUUM FULL</command>, showing current progress.
- See <xref linkend='cluster-progress-reporting'/>.
+ See <xref linkend="cluster-progress-reporting"/>.
</entry>
</row>
<entry><structname>pg_stat_progress_basebackup</structname><indexterm><primary>pg_stat_progress_basebackup</primary></indexterm></entry>
<entry>One row for each WAL sender process streaming a base backup,
showing current progress.
- See <xref linkend='basebackup-progress-reporting'/>.
+ See <xref linkend="basebackup-progress-reporting"/>.
</entry>
</row>
<row>
<entry><structname>pg_stat_progress_copy</structname><indexterm><primary>pg_stat_progress_copy</primary></indexterm></entry>
<entry>One row for each backend running <command>COPY</command>, showing current progress.
- See <xref linkend='copy-progress-reporting'/>.
+ See <xref linkend="copy-progress-reporting"/>.
</entry>
</row>
</tbody>
<structname>pg_stat_progress_cluster</structname>
because both <command>VACUUM FULL</command> and <command>CLUSTER</command>
rewrite the table, while regular <command>VACUUM</command> only modifies it
- in place. See <xref linkend='cluster-progress-reporting'/>.
+ in place. See <xref linkend="cluster-progress-reporting"/>.
</para>
<table id="pg-stat-progress-vacuum-view" xreflabel="pg_stat_progress_vacuum">
These clauses determine whether a role will be permitted to
create, alter, drop, comment on, and change the security label for
other roles.
- See <xref linkend='role-creation' /> for more details about what
+ See <xref linkend="role-creation"/> for more details about what
capabilities are conferred by this privilege.
If not specified, <literal>NOCREATEROLE</literal> is the default.
</para>
Being a superuser implies the ability to bypass all access permission
checks within the database, so superuser access should not be granted
lightly. <literal>CREATEROLE</literal> also conveys
- <link linkend='role-creation'>very extensive privileges</link>.
+ <link linkend="role-creation">very extensive privileges</link>.
</para>
<para>
The new user will be allowed to create, alter, drop, comment on,
change the security label for other roles; that is,
this user will have <literal>CREATEROLE</literal> privilege.
- See <xref linkend='role-creation' /> for more details about what
+ See <xref linkend="role-creation"/> for more details about what
capabilities are conferred by this privilege.
</para>
</listitem>
</para>
<variablelist>
- <varlistentry id='pgbench-metacommand-gset'>
+ <varlistentry id="pgbench-metacommand-gset">
<term>
<literal>\gset [<replaceable>prefix</replaceable>]</literal>
<literal>\aset [<replaceable>prefix</replaceable>]</literal>
</listitem>
</varlistentry>
- <varlistentry id='pgbench-metacommand-set'>
+ <varlistentry id="pgbench-metacommand-set">
<term>
<literal>\set <replaceable>varname</replaceable> <replaceable>expression</replaceable></literal>
</term>
</listitem>
</varlistentry>
- <varlistentry id='pgbench-metacommand-pipeline'>
+ <varlistentry id="pgbench-metacommand-pipeline">
<term><literal>\startpipeline</literal></term>
<term><literal>\endpipeline</literal></term>
</varlistentry>
<varlistentry>
- <term id='role-creation'>role creation<indexterm><primary>role</primary><secondary>privilege to create</secondary></indexterm></term>
+ <term id="role-creation">role creation<indexterm><primary>role</primary><secondary>privilege to create</secondary></indexterm></term>
<listitem>
<para>
A role must be explicitly given permission to create more roles