Skip to content

Commit f10fc5a

Browse files
committed
Replace all mentions of we, our, and us with you and yours (neo4j#2674)
1 parent 54b674d commit f10fc5a

File tree

10 files changed

+33
-32
lines changed

10 files changed

+33
-32
lines changed

modules/ROOT/pages/authentication-authorization/manage-privileges.adoc

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,20 @@
77
Role-based access control (_RBAC_) is a method of restricting access to authorized users, by assigning users to specific roles with a particular set of privileges granted to them.
88
Privileges control the access rights to graph elements using a combined allowlist/denylist mechanism.
99
It is possible to grant or deny access, or use a combination of the two.
10-
The user will be able to access the resource if they have a `GRANT` (allowlist) and do not have a `DENY` (denylist) relevant to that resource.
11-
All other combinations of `GRANT` and `DENY` will result in the matching path being inaccessible.
12-
What this means in practice depends on whether we are talking about a xref:authentication-authorization/privileges-reads.adoc[read privilege] or a xref:authentication-authorization/privileges-writes.adoc[write privilege]:
10+
You are able to access a resource if you have a `GRANT` (allowlist) and do not have a `DENY` (denylist) relevant to that resource.
11+
All other combinations of `GRANT` and `DENY` result in the matching path being inaccessible.
12+
What this means in practice depends on whether you have a xref:authentication-authorization/privileges-reads.adoc[read privilege] or a xref:authentication-authorization/privileges-writes.adoc[write privilege]:
1313

14-
* If an entity is not accessible due to xref:authentication-authorization/privileges-reads.adoc[read privileges], the data will become invisible.
15-
It will appear to the user as if they had a smaller database (smaller graph).
16-
* If an entity is not accessible due to xref:authentication-authorization/privileges-writes.adoc[write privileges], an error will occur on any attempt to write that data.
14+
* If an entity is not accessible due to xref:authentication-authorization/privileges-reads.adoc[read privileges], the data is invisible.
15+
It appears to you as if you had a smaller database (smaller graph).
16+
* If an entity is not accessible due to xref:authentication-authorization/privileges-writes.adoc[write privileges], an error occurs on any attempt to write that data.
1717

1818
[NOTE]
1919
====
20-
In this document we will often use the terms _'allows'_ and _'enables'_ in seemingly identical ways. However, there is a subtle difference.
21-
We will use _'enables'_ to refer to the consequences of xref:authentication-authorization/privileges-reads.adoc[read privileges] where a restriction will not cause an error, only a reduction in the apparent graph size.
22-
We will use _'allows'_ to refer to the consequence of xref:authentication-authorization/privileges-writes.adoc[write privileges] where a restriction can result in an error.
20+
This page often uses the terms _'allows'_ and _'enables'_ in seemingly identical ways.
21+
However, there is a subtle difference.
22+
_'enables'_ refers to the consequences of xref:authentication-authorization/privileges-reads.adoc[read privileges] where a restriction will not cause an error, only a reduction in the apparent graph size.
23+
_'allows'_ refers to the consequence of xref:authentication-authorization/privileges-writes.adoc[write privileges] where a restriction can result in an error.
2324
====
2425

2526
[NOTE]

modules/ROOT/pages/authentication-authorization/password-and-user-recovery.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ GRANT ALL ON DATABASE * TO admin;
200200
+
201201
[NOTE]
202202
====
203-
Before running the `:exit` command, we suggest granting the newly created role to a user.
203+
Before running the `:exit` command, grant the newly created role to a user.
204204
Although this is optional, without this step you will have only collected all admin privileges in a role that no one is assigned to.
205205
206206
To grant the role to a user (assuming your existing user is named `neo4j`), you can run `GRANT ROLE admin TO neo4j;`

modules/ROOT/pages/authentication-authorization/privileges-reads.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ DENY [IMMUTABLE] TRAVERSE
6464
TO role[, ...]
6565
----
6666

67-
For example, we can disable users with the role `regularUsers` from finding all nodes with the label `Payments`:
67+
For example, you can disable users with the role `regularUsers` from finding all nodes with the label `Payments`:
6868

6969
[source, cypher, role=noplay]
7070
----
@@ -146,7 +146,7 @@ DENY [IMMUTABLE] READ "{" { * | property[, ...] } "}"
146146
TO role[, ...]
147147
----
148148

149-
Although we just granted the role `regularUsers` the right to read all properties, we may want to hide the `secret` property.
149+
Although you just granted the role `regularUsers` the right to read all properties, you may want to hide the `secret` property.
150150
The following example shows how to do that:
151151

152152
[source, cypher, role=noplay]

modules/ROOT/pages/clustering/multi-region-deployment/multi-data-center-routing.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -348,7 +348,7 @@ The DSL is made available by selecting the `user-defined` catch-up strategy as f
348348
server.cluster.catchup.upstream_strategy=user-defined
349349
----
350350

351-
Once the user-defined strategy has been specified, we can add configuration to the xref:configuration/configuration-settings.adoc#config_server.cluster.catchup.user_defined_upstream_strategy[`server.cluster.catchup.user_defined_upstream_strategy`] setting based on the server tags that have been set for the cluster.
351+
Once the user-defined strategy has been specified, you can add configuration to the xref:configuration/configuration-settings.adoc#config_server.cluster.catchup.user_defined_upstream_strategy[`server.cluster.catchup.user_defined_upstream_strategy`] setting based on the server tags that have been set for the cluster.
352352

353353
This functionality is described with two examples:
354354

@@ -358,7 +358,7 @@ This functionality is described with two examples:
358358
For illustrative purposes four regions are proposed: `north`, `south`, `east`, and `west` and within each region there is a number of data centers such as `north1` or `west2`.
359359
The server tags are configured so that each data center maps to its own server tag.
360360
Additionally it is assumed that each data center fails independently from the others and that a region can act as a supergroup of its constituent data centers.
361-
So a server in the `north` region might have configuration like `initial.server.tags=north2,north` which puts it in two groups that match to our physical topology as shown in the diagram below.
361+
So a server in the `north` region might have configuration like `initial.server.tags=north2,north` which puts it in two groups that match to your physical topology as shown in the diagram below.
362362
363363
[[img-nesw-regions-and-dcs]]
364364
image::nesw-regions-and-dcs.svg[title="Mapping regions and data centers onto server tags", role="middle"]
@@ -410,25 +410,25 @@ The `min()` filter is a simple but reasonable health indicator of a set of serve
410410
// === Building upstream strategy plugins using Java
411411

412412
// Neo4j supports an API which advanced users may use to enhance upstream recommendations in arbitrary ways: load, subnet, machine size, or anything else accessible from the JVM.
413-
// In such cases we are invited to build our own implementations of `org.neo4j.causalclustering.upstream.UpstreamDatabaseSelectionStrategy` to suit our own needs, and register them with the catch-up strategy selection pipeline just like the pre-packaged plugins.
413+
// In such cases you are invited to build your own implementations of `org.neo4j.causalclustering.upstream.UpstreamDatabaseSelectionStrategy` to suit your own needs, and register them with the catch-up strategy selection pipeline just like the pre-packaged plugins.
414414

415-
// We have to override the `org.neo4j.causalclustering.upstream.UpstreamDatabaseSelectionStrategy#upstreamDatabase()` method in our code.
416-
// Overriding that class gives us access to the following items:
415+
// You have to override the `org.neo4j.causalclustering.upstream.UpstreamDatabaseSelectionStrategy#upstreamDatabase()` method in your code.
416+
// Overriding that class gives you access to the following items:
417417

418418
// [options="header"]
419419
// |===
420420
// | Resource | Description
421421
// | `org.neo4j.causalclustering.discovery.TopologyService` | This is a directory service which provides access to the addresses of all servers and server groups in the cluster.
422422
// | `org.neo4j.kernel.configuration.Config` | This provides the configuration from _neo4j.conf_ for the local instance.
423-
// Configuration for our own plugin can reside here.
423+
// Configuration for your own plugin can reside here.
424424
// | `org.neo4j.causalclustering.identity.MemberId` | This provides the unique cluster `MemberId` of the current instance.
425425
// |===
426426

427-
// Once our code is written and tested, we have to prepare it for deployment.
427+
// Once your code is written and tested, you have to prepare it for deployment.
428428
// `UpstreamDatabaseSelectionStrategy` plugins are loaded via the Java Service Loader.
429-
// This means when we package our code into a jar file, we'll have to create a file _META-INF.services/org.neo4j.upstream.readreplica.UpstreamDatabaseSelectionStrategy_ in which we write the fully qualified class name(s) of the plugins, e.g. `org.example.myplugins.PreferServersWithHighIOPS`.
429+
// This means when you package your code into a jar file, you'll have to create a file _META-INF.services/org.neo4j.upstream.readreplica.UpstreamDatabaseSelectionStrategy_ in which you write the fully qualified class name(s) of the plugins, e.g. `org.example.myplugins.PreferServersWithHighIOPS`.
430430

431-
// To deploy this jar into the Neo4j server we copy it into the xref:configuration/file-locations.adoc[_plugins_] directory and restart the instance.
431+
// To deploy this jar into the Neo4j server you copy it into the xref:configuration/file-locations.adoc[_plugins_] directory and restart the instance.
432432

433433
[[mdc-favoring-data-centers]]
434434
=== Favoring data centers

modules/ROOT/pages/clustering/setup/encryption.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ This could be verified from within the certificate details:
5050
----
5151
openssl x509 -in public.crt -noout -text
5252
----
53-
We should see that the X509v3 Extended Key Usage section shows both the usages listed:
53+
You should see that the X509v3 Extended Key Usage section shows both the usages listed:
5454
5555
----
5656
X509v3 Extended Key Usage:

modules/ROOT/pages/database-administration/composite-databases/querying-composite-databases.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
= Set up and query composite databases
66

77
//Make an image that sets up the example?
8-
//The query examples assume that we have a setup similar to that in <<example-create-a-single-instance-fabric-setup>>.
8+
//The query examples assume that you have a setup similar to that in <<example-create-a-single-instance-fabric-setup>>.
99

1010
The examples featured in this section make use of the two Cypher clauses: link:{neo4j-docs-base-uri}/cypher-manual/5/clauses/use[`USE`] and link:{neo4j-docs-base-uri}/cypher-manual/5/subqueries/call-subquery/[`CALL {}`].
1111

@@ -106,7 +106,7 @@ RETURN movie.title AS title
106106
----
107107
====
108108
In the example above, the part of the query accessing graph data, `MATCH (movie:Movie)`, is wrapped in a sub-query with a dynamic `USE` clause.
109-
`UNWIND` is used to get the names of our graphs, each on one row.
109+
`UNWIND` is used to get the names of your graphs, each on one row.
110110
The `CALL {}` sub-query executes once per input row.
111111
In this case, once selecting `cineasts.latest`, and once selecting `cineasts.upcoming`.
112112

@@ -198,7 +198,7 @@ RETURN movie
198198
====
199199

200200
The first part of the query finds the movie with the longest running time from `cineasts.latest`, and returns its release month.
201-
The second part of the query finds all movies in `cineasts.upcoming` that fulfill our condition and returns them.
201+
The second part of the query finds all movies in `cineasts.upcoming` that fulfill your condition and returns them.
202202
The sub-query imports the `monthOfLongest` variable using `WITH monthOfLongest`, to make it accessible.
203203

204204
[[composite-databases-queries-updates]]

modules/ROOT/pages/database-administration/syntax.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Needs to be part of a grouping.
2929
| `[` and `]`
3030
| Used to indicate an optional part of the command.
3131
It also groups alternatives together, when there can be either of the alternatives or nothing.
32-
| If a keyword in the syntax can either be in singular or plural, we can indicate that the `S` is optional with `GRAPH[S]`.
32+
| If a keyword in the syntax can either be in singular or plural, you can indicate that the `S` is optional with `GRAPH[S]`.
3333

3434
| `+...+`
3535
|
@@ -38,7 +38,7 @@ Related to the command part immediately before this is repeated.
3838
| A comma separated list of names would be `+name[, ...]+`.
3939

4040
| `"`
41-
| When a special character is part of the syntax itself, we surround it with `"` to indicate this.
41+
| When a special character is part of the syntax itself, surround it with `"` to indicate this.
4242
|
4343
To include `+{+` in the syntax use `+"{" { * \| name } "}"+`.
4444
In this case, you will get either `+{ * }+` or `+{ name }+`.

modules/ROOT/pages/kubernetes/monitoring.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ debug.log neo4j.log query.log security.log
3333
== Log collection
3434

3535
The Neo4j log output can be collected from the log files and sent to a unified location using tools, such as Fluentd (https://www.fluentd.org) or Logstash (https://www.elastic.co/logstash).
36-
We recommend running these either as "sidecar" containers in the Neo4j pods or as separate DaemonSets.
36+
It is recommended to run these either as "sidecar" containers in the Neo4j pods or as separate DaemonSets.
3737

3838
* For more information about Pods and the sidecar pattern, see link:https://kubernetes.io/docs/concepts/workloads/pods/[Kubernetes Pod documentation].
3939
* For more information about DaemonSets, see link:https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/[Kubernetes DaemonSet documentation].

modules/ROOT/pages/performance/bolt-thread-pool-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You should also account for non-transaction operations that will take place on t
6060

6161
.Configure the thread pool for a Bolt connector
6262
====
63-
In this example we configure the Bolt thread pool to be of minimum size `5`, maximum size `100`, and have a keep-alive time of `10 minutes`.
63+
In this example, you configure the Bolt thread pool to be of minimum size `5`, maximum size `100`, and have a keep-alive time of `10 minutes`.
6464
6565
[source, properties]
6666
----

modules/ROOT/pages/security/securing-extensions.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ The list may contain both fully qualified procedure names, and partial names wit
2020
.Allow listing
2121
====
2222
23-
In this example, we need to allow the use of the method `apoc.load.json` as well as all the methods under `apoc.coll`.
24-
We do not want to make available any additional extensions from the `apoc` library, other than the ones matching these criteria.
23+
In this example, you need to allow the use of the method `apoc.load.json` as well as all the methods under `apoc.coll`.
24+
You do not want any additional extensions from the `apoc` library to become available, other than the ones matching these criteria.
2525
2626
[source, properties]
2727
----
@@ -56,7 +56,7 @@ The list may contain both fully qualified procedure and function names, and part
5656
.Unrestricting
5757
====
5858
59-
In this example, we need to unrestict the use of the procedures `apoc.cypher.runFirstColumn` and `apoc.cypher.doIt`.
59+
In this example, you need to unrestict the use of the procedures `apoc.cypher.runFirstColumn` and `apoc.cypher.doIt`.
6060
6161
[source, properties]
6262
----

0 commit comments

Comments
 (0)