Copy-editing of row security

Address a few typos in the row security update, pointed out
off-list by Adam Brightwell.  Also include 'ALL' in the list
of commands supported, for completeness.
This commit is contained in:
Stephen Frost 2014-09-24 17:45:11 -04:00
parent 6550b901fe
commit afd1d95f5b
2 changed files with 6 additions and 6 deletions

View File

@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC;
be added through data modification commands. By default, tables do be added through data modification commands. By default, tables do
not have any policies and all rows are visible and able to be added, not have any policies and all rows are visible and able to be added,
subject to the regular <xref linkend="ddl-priv"> system. This is subject to the regular <xref linkend="ddl-priv"> system. This is
also known to as Row Level Security. also known as Row Level Security.
</para> </para>
<para> <para>
@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC;
<para> <para>
Row security policies can be specific to commands, or to roles, or to Row security policies can be specific to commands, or to roles, or to
both. The commands available are <literal>SELECT</>, <literal>INSERT</>, both. The commands available are <literal>ALL</literal>,
<literal>UPDATE</>, and <literal>DELETE</>. Multiple roles can be <literal>SELECT</>, <literal>INSERT</>, <literal>UPDATE</>, and
assigned to a given policy and normal role membership and inheiritance <literal>DELETE</>. Multiple roles can be assigned to a given policy
rules apply. and normal role membership and inheiritance rules apply.
</para> </para>
<para> <para>

View File

@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name)
char cmd; char cmd;
if (!cmd_name) if (!cmd_name)
elog(ERROR, "unregonized command"); elog(ERROR, "unrecognized command");
if (strcmp(cmd_name, "all") == 0) if (strcmp(cmd_name, "all") == 0)
cmd = 0; cmd = 0;