Copy-editing of row security

Address a few typos in the row security update, pointed out
off-list by Adam Brightwell.  Also include 'ALL' in the list
of commands supported, for completeness.
This commit is contained in:
Stephen Frost 2014-09-24 17:45:11 -04:00
parent 6550b901fe
commit afd1d95f5b
2 changed files with 6 additions and 6 deletions

View File

@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC;
be added through data modification commands. By default, tables do
not have any policies and all rows are visible and able to be added,
subject to the regular <xref linkend="ddl-priv"> system. This is
also known to as Row Level Security.
also known as Row Level Security.
</para>
<para>
@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC;
<para>
Row security policies can be specific to commands, or to roles, or to
both. The commands available are <literal>SELECT</>, <literal>INSERT</>,
<literal>UPDATE</>, and <literal>DELETE</>. Multiple roles can be
assigned to a given policy and normal role membership and inheiritance
rules apply.
both. The commands available are <literal>ALL</literal>,
<literal>SELECT</>, <literal>INSERT</>, <literal>UPDATE</>, and
<literal>DELETE</>. Multiple roles can be assigned to a given policy
and normal role membership and inheiritance rules apply.
</para>
<para>

View File

@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name)
char cmd;
if (!cmd_name)
elog(ERROR, "unregonized command");
elog(ERROR, "unrecognized command");
if (strcmp(cmd_name, "all") == 0)
cmd = 0;