diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index e5ee591051..98e897aeb6 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC; be added through data modification commands. By default, tables do not have any policies and all rows are visible and able to be added, subject to the regular system. This is - also known to as Row Level Security. + also known as Row Level Security. @@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC; Row security policies can be specific to commands, or to roles, or to - both. The commands available are SELECT, INSERT, - UPDATE, and DELETE. Multiple roles can be - assigned to a given policy and normal role membership and inheiritance - rules apply. + both. The commands available are ALL, + SELECT, INSERT, UPDATE, and + DELETE. Multiple roles can be assigned to a given policy + and normal role membership and inheiritance rules apply. diff --git a/src/backend/commands/policy.c b/src/backend/commands/policy.c index 6bff9500c6..33bf031346 100644 --- a/src/backend/commands/policy.c +++ b/src/backend/commands/policy.c @@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name) char cmd; if (!cmd_name) - elog(ERROR, "unregonized command"); + elog(ERROR, "unrecognized command"); if (strcmp(cmd_name, "all") == 0) cmd = 0;