diff options
author | Peter Eisentraut <peter_e@gmx.net> | 2015-10-28 20:23:53 -0400 |
---|---|---|
committer | Peter Eisentraut <peter_e@gmx.net> | 2015-10-28 20:23:53 -0400 |
commit | 0bc3071796b33288cd912db196b90c76fa394c21 (patch) | |
tree | 259a31ba4ca03c0cde90340dae9457138785c165 /src/backend/executor | |
parent | d17d5125f68da155e3a8e555c0699b7679b06e3b (diff) | |
download | postgresql-0bc3071796b33288cd912db196b90c76fa394c21.tar.gz postgresql-0bc3071796b33288cd912db196b90c76fa394c21.zip |
Message style improvements
Message style, plurals, quoting, spelling, consistency with similar
messages
Diffstat (limited to 'src/backend/executor')
-rw-r--r-- | src/backend/executor/execMain.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/backend/executor/execMain.c b/src/backend/executor/execMain.c index c28eb2bca36..cb2e78dca59 100644 --- a/src/backend/executor/execMain.c +++ b/src/backend/executor/execMain.c @@ -1808,7 +1808,7 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo, ereport(ERROR, (errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION), - errmsg("new row violates WITH CHECK OPTION for \"%s\"", + errmsg("new row violates check option for view \"%s\"", wco->relname), val_desc ? errdetail("Failing row contains %s.", val_desc) : 0)); @@ -1818,24 +1818,24 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo, if (wco->polname != NULL) ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), - errmsg("new row violates row level security policy \"%s\" for \"%s\"", + errmsg("new row violates row-level security policy \"%s\" for table \"%s\"", wco->polname, wco->relname))); else ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), - errmsg("new row violates row level security policy for \"%s\"", + errmsg("new row violates row-level security policy for table \"%s\"", wco->relname))); break; case WCO_RLS_CONFLICT_CHECK: if (wco->polname != NULL) ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), - errmsg("new row violates row level security policy \"%s\" (USING expression) for \"%s\"", + errmsg("new row violates row-level security policy \"%s\" (USING expression) for table \"%s\"", wco->polname, wco->relname))); else ereport(ERROR, (errcode(ERRCODE_INSUFFICIENT_PRIVILEGE), - errmsg("new row violates row level security policy (USING expression) for \"%s\"", + errmsg("new row violates row-level security policy (USING expression) for table \"%s\"", wco->relname))); break; default: |