diff options
-rw-r--r-- | doc/src/sgml/ddl.sgml | 10 | ||||
-rw-r--r-- | src/backend/commands/policy.c | 2 |
2 files changed, 6 insertions, 6 deletions
diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index e5ee5910513..98e897aeb6c 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC; be added through data modification commands. By default, tables do not have any policies and all rows are visible and able to be added, subject to the regular <xref linkend="ddl-priv"> system. This is - also known to as Row Level Security. + also known as Row Level Security. </para> <para> @@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC; <para> Row security policies can be specific to commands, or to roles, or to - both. The commands available are <literal>SELECT</>, <literal>INSERT</>, - <literal>UPDATE</>, and <literal>DELETE</>. Multiple roles can be - assigned to a given policy and normal role membership and inheiritance - rules apply. + both. The commands available are <literal>ALL</literal>, + <literal>SELECT</>, <literal>INSERT</>, <literal>UPDATE</>, and + <literal>DELETE</>. Multiple roles can be assigned to a given policy + and normal role membership and inheiritance rules apply. </para> <para> diff --git a/src/backend/commands/policy.c b/src/backend/commands/policy.c index 6bff9500c6b..33bf031346f 100644 --- a/src/backend/commands/policy.c +++ b/src/backend/commands/policy.c @@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name) char cmd; if (!cmd_name) - elog(ERROR, "unregonized command"); + elog(ERROR, "unrecognized command"); if (strcmp(cmd_name, "all") == 0) cmd = 0; |