diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index e5ee591051374046efb9424da8c9e0a8e47e5938..98e897aeb6cca3b6c1e643f00721ebadd8b4ed1f 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1535,7 +1535,7 @@ REVOKE ALL ON accounts FROM PUBLIC; be added through data modification commands. By default, tables do not have any policies and all rows are visible and able to be added, subject to the regular <xref linkend="ddl-priv"> system. This is - also known to as Row Level Security. + also known as Row Level Security. </para> <para> @@ -1550,10 +1550,10 @@ REVOKE ALL ON accounts FROM PUBLIC; <para> Row security policies can be specific to commands, or to roles, or to - both. The commands available are <literal>SELECT</>, <literal>INSERT</>, - <literal>UPDATE</>, and <literal>DELETE</>. Multiple roles can be - assigned to a given policy and normal role membership and inheiritance - rules apply. + both. The commands available are <literal>ALL</literal>, + <literal>SELECT</>, <literal>INSERT</>, <literal>UPDATE</>, and + <literal>DELETE</>. Multiple roles can be assigned to a given policy + and normal role membership and inheiritance rules apply. </para> <para> diff --git a/src/backend/commands/policy.c b/src/backend/commands/policy.c index 6bff9500c6b9b5bbb199f17efbc2288c20c57e50..33bf031346f52d2f765244eed66cc2db15e847de 100644 --- a/src/backend/commands/policy.c +++ b/src/backend/commands/policy.c @@ -108,7 +108,7 @@ parse_row_security_command(const char *cmd_name) char cmd; if (!cmd_name) - elog(ERROR, "unregonized command"); + elog(ERROR, "unrecognized command"); if (strcmp(cmd_name, "all") == 0) cmd = 0;