From afd1d95f5bf0cb48af77e5897eb4c356b5371c7b Mon Sep 17 00:00:00 2001 From: Stephen Frost Date: Wed, 24 Sep 2014 17:45:11 -0400 Subject: [PATCH] Copy-editing of row security Address a few typos in the row security update, pointed out off-list by Adam Brightwell. Also include 'ALL' in the list of commands supported, for completeness. --- doc/src/sgml/ddl.sgml | 10 +++++----- src/backend/commands/policy.c | 2 +- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index e5ee591051..98e897aeb6 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC; be added through data modification commands. By default, tables do not have any policies and all rows are visible and able to be added, subject to the regular system. This is - also known to as Row Level Security. + also known as Row Level Security. @@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC; Row security policies can be specific to commands, or to roles, or to - both. The commands available are SELECT, INSERT, - UPDATE, and DELETE. Multiple roles can be - assigned to a given policy and normal role membership and inheiritance - rules apply. + both. The commands available are ALL, + SELECT, INSERT, UPDATE, and + DELETE. Multiple roles can be assigned to a given policy + and normal role membership and inheiritance rules apply. diff --git a/src/backend/commands/policy.c b/src/backend/commands/policy.c index 6bff9500c6..33bf031346 100644 --- a/src/backend/commands/policy.c +++ b/src/backend/commands/policy.c @@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name) char cmd; if (!cmd_name) - elog(ERROR, "unregonized command"); + elog(ERROR, "unrecognized command"); if (strcmp(cmd_name, "all") == 0) cmd = 0;