Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,10 @@ This can be quite powerful as it allows permissions to be switched from one data
* _role[, ...]_
** The role or roles to associate the privilege with, comma-separated.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.General grant +ON DATABASE+ privilege syntax
[cols="<15s,<85"]
Expand Down
45 changes: 45 additions & 0 deletions modules/ROOT/pages/access-control/dbms-administration.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,11 @@ a|Rows: 3
The DBMS privileges for role management are assignable using Cypher administrative commands.
They can be granted, denied and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Role management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -370,6 +375,11 @@ a|Rows: 1
The DBMS privileges for user management can be assigned using Cypher administrative commands.
They can be granted, denied and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.User management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -697,6 +707,11 @@ Impersonation is the ability of a user to assume another user's roles (and there

The ability to impersonate users can be granted via the `IMPERSONATE` privilege.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Impersonation privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -765,6 +780,11 @@ GRANT IMPERSONATE (alice, bob) ON DBMS TO userImpersonator
The DBMS privileges for database management can be assigned by using Cypher administrative commands.
They can be granted, denied and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Database management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -1020,6 +1040,11 @@ The DBMS privileges for alias management can be assigned by using Cypher adminis
They can be granted, denied and revoked like other privileges.
It is also possible to manage aliases with xref::access-control/dbms-administration.adoc#access-control-dbms-administration-database-management[database management commands].

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Alias management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -1183,6 +1208,11 @@ a|Rows: 1
The DBMS privileges for server management can be assigned using Cypher administrative commands.
They can be granted, denied, and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Server management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand All @@ -1208,6 +1238,11 @@ GRANT SHOW SERVERS
The DBMS privileges for privilege management can be assigned by using Cypher administrative commands.
They can be granted, denied and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Privilege management privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -1355,6 +1390,11 @@ a|Rows: 1
The DBMS privileges for procedure and user defined function execution can be assigned by using Cypher administrative commands.
They can be granted, denied and revoked like other privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Execute privileges command syntax
[options="header", width="100%", cols="3a,2"]
|===
Expand Down Expand Up @@ -1946,6 +1986,11 @@ The right to perform the following privileges can be achieved with a single comm
* Execute all procedures with elevated privileges.
* Execute all user defined functions with elevated privileges.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[source, cypher, role=noplay]
----
GRANT [IMMUTABLE] ALL [[DBMS] PRIVILEGES]
Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/access-control/manage-privileges.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,11 @@ If a user was not also provided with the database `ACCESS` privilege, then acces
Information about the database access privilege can be found in xref::access-control/database-administration.adoc#access-control-database-administration-access[The ACCESS privilege].
====

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====


[role=enterprise-edition]
[[access-control-graph-privileges]]
Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/access-control/manage-roles.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,11 @@ When connected to the DBMS over `bolt`, administration commands are automaticall
[[access-control-role-syntax]]
== Role management command syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[cols="<15s,<85"]
|===

Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/access-control/manage-servers.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,11 @@ When connected to the DBMS over `bolt`, administration commands are automaticall
[[server-management-syntax]]
== Server management command syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[cols="<15s,<85"]
|===
| Command
Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/access-control/manage-users.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,11 @@ When connected to the DBMS over `bolt`, administration commands are automaticall
[[access-control-user-syntax]]
== User management command syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[cols="<15s,<85"]
|===

Expand Down
4 changes: 4 additions & 0 deletions modules/ROOT/pages/access-control/privileges-reads.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,10 @@ There are three separate read privileges:
* xref::access-control/privileges-reads.adoc#access-control-privileges-reads-read[`READ`] - enables the specified properties of the found entities to be read.
* xref::access-control/privileges-reads.adoc#access-control-privileges-reads-match[`MATCH`] - combines both `TRAVERSE` and `READ`, enabling an entity to be found and its properties read.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[[access-control-privileges-reads-traverse]]
== The `TRAVERSE` privilege
Expand Down
4 changes: 4 additions & 0 deletions modules/ROOT/pages/access-control/privileges-writes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,10 @@ There are also compound privileges which combine the above specific privileges:
* xref::access-control/privileges-writes.adoc#access-control-privileges-writes-write[`WRITE`] - allows all `WRITE` operations on an entire graph.
* xref::access-control/privileges-writes.adoc#access-control-privileges-writes-all[`ALL GRAPH PRIVILEGES`] - allows all `READ` and `WRITE` operations on an entire graph.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[[access-control-privileges-writes-create]]
== The `CREATE` privilege
Expand Down
6 changes: 5 additions & 1 deletion modules/ROOT/pages/aliases.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,11 @@ When connected to the DBMS over Bolt, administration commands are automatically

The syntax of the alias management commands is as follows:

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Alias management command syntax
[options="header", width="100%", cols="1,5a"]
|===
Expand Down Expand Up @@ -109,7 +114,6 @@ Drop either a local or remote database alias.

|===


This is the list of the allowed driver settings for remote aliases.

[[remote-alias-driver-settings]]
Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/clauses/listing-functions.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,11 @@ Is `null` without the xref::access-control/dbms-administration.adoc#access-contr

== Syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

List functions, either all or only built-in or user-defined::

[source, syntax, role="noheader", indent=0]
Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/clauses/listing-procedures.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,11 @@ a| Map of extra output, e.g. if the procedure is deprecated.

== Syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

List all procedures::

[source, syntax, role="noheader", indent=0]
Expand Down
10 changes: 10 additions & 0 deletions modules/ROOT/pages/clauses/transaction-clauses.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -209,6 +209,11 @@ The `SHOW TRANSACTIONS` command can be combined with multiple `SHOW TRANSACTIONS

=== Syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

List transactions on the current server::

[source, cypher, role="noheader", indent=0]
Expand Down Expand Up @@ -366,6 +371,11 @@ The `TERMINATE TRANSACTIONS` command can be combined with multiple `SHOW TRANSAC

=== Syntax

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

Terminate transactions by ID on the current server::

[source, cypher, role="noheader", indent=0]
Expand Down
5 changes: 4 additions & 1 deletion modules/ROOT/pages/constraints/syntax.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@
= Syntax
:check-mark: icon:check[]

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

[[administration-constraints-syntax-create]]
== Syntax for creating constraints
Expand All @@ -26,7 +30,6 @@ There is no supported index configuration for range indexes.
Creating a constraint requires the xref::access-control/database-administration.adoc#access-control-database-administration-constraints[`CREATE CONSTRAINT` privilege].
====


[[administration-constraints-syntax-create-unique]]
[discrete]
=== Create a unique node property constraint
Expand Down
6 changes: 5 additions & 1 deletion modules/ROOT/pages/databases.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,11 @@ These administrative commands are automatically routed to the `system` database

The syntax of the database management commands is as follows:

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Database management command syntax
[options="header", width="100%", cols="1m,5a"]
|===
Expand Down Expand Up @@ -104,7 +109,6 @@ DROP [COMPOSITE] DATABASE name [IF EXISTS] [{DUMP\|DESTROY} [DATA]] [WAIT [n [SE

|===


[[administration-databases-show-databases]]
== Listing databases

Expand Down
5 changes: 5 additions & 0 deletions modules/ROOT/pages/indexes-for-full-text-search.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,11 @@ Full-text indexes are created with the `CREATE FULLTEXT INDEX` command.
An index can be given a unique name when created (or get a generated one), which is used to reference the specific index when querying or dropping it.
A full-text index applies to a list of labels or a list of relationship types, for node and relationship indexes respectively, and then a list of property names.

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
====

.Syntax for creating full-text indexes
[options="header", width="100%", cols="5a, 3"]
|===
Expand Down
6 changes: 5 additions & 1 deletion modules/ROOT/pages/indexes-for-search-performance.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,11 @@ With `IF NOT EXISTS`, no error is thrown and nothing happens should an index wit
It may still throw an error if conflicting constraints exist, such as constraints with the same name or schema and backing index type.
====

[NOTE]
====
The syntax descriptions use xref:access-control/index.adoc#access-control-syntax[the style] from access control.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This comment should also be added in:

Since the syntax summary descriptions lives in the access control chapters intro I don't think it needs to be added to all the sections in that part, but otherwise it could be added to these as well:

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, @Hunterness 👍

====


.+Create a range index on nodes+
[options="noheader", width="100%", cols="2, 8a"]
Expand Down Expand Up @@ -1670,4 +1675,3 @@ DROP INDEX missing_index_name IF EXISTS

======