Copy-editing of row security

Address a few typos in the row security update, pointed out
off-list by Adam Brightwell.  Also include 'ALL' in the list
of commands supported, for completeness.
pull/14/head
Stephen Frost 11 years ago
parent 6550b901fe
commit afd1d95f5b
  1. 10
      doc/src/sgml/ddl.sgml
  2. 2
      src/backend/commands/policy.c

@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC;
be added through data modification commands. By default, tables do
not have any policies and all rows are visible and able to be added,
subject to the regular <xref linkend="ddl-priv"> system. This is
also known to as Row Level Security.
also known as Row Level Security.
</para>
<para>
@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC;
<para>
Row security policies can be specific to commands, or to roles, or to
both. The commands available are <literal>SELECT</>, <literal>INSERT</>,
<literal>UPDATE</>, and <literal>DELETE</>. Multiple roles can be
assigned to a given policy and normal role membership and inheiritance
rules apply.
both. The commands available are <literal>ALL</literal>,
<literal>SELECT</>, <literal>INSERT</>, <literal>UPDATE</>, and
<literal>DELETE</>. Multiple roles can be assigned to a given policy
and normal role membership and inheiritance rules apply.
</para>
<para>

@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name)
char cmd;
if (!cmd_name)
elog(ERROR, "unregonized command");
elog(ERROR, "unrecognized command");
if (strcmp(cmd_name, "all") == 0)
cmd = 0;

Loading…
Cancel
Save