Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit a8d585c

Browse files
committed
Message style improvements
Message style, plurals, quoting, spelling, consistency with similar messages
1 parent d455651 commit a8d585c

File tree

24 files changed

+101
-93
lines changed

24 files changed

+101
-93
lines changed

contrib/test_decoding/expected/binary.out

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ SELECT data FROM pg_logical_slot_get_changes('regression_slot', NULL, NULL, 'for
1414

1515
-- fails, binary plugin, textual consumer
1616
SELECT data FROM pg_logical_slot_get_changes('regression_slot', NULL, NULL, 'force-binary', '1', 'skip-empty-xacts', '1');
17-
ERROR: logical decoding output plugin "test_decoding" produces binary output, but "pg_logical_slot_get_changes(name,pg_lsn,integer,text[])" expects textual data
17+
ERROR: logical decoding output plugin "test_decoding" produces binary output, but function "pg_logical_slot_get_changes(name,pg_lsn,integer,text[])" expects textual data
1818
-- succeeds, textual plugin, binary consumer
1919
SELECT data FROM pg_logical_slot_get_binary_changes('regression_slot', NULL, NULL, 'force-binary', '0', 'skip-empty-xacts', '1');
2020
data

src/backend/access/transam/multixact.c

+3-1
Original file line numberDiff line numberDiff line change
@@ -1140,7 +1140,9 @@ GetNewMultiXactId(int nmembers, MultiXactOffset *offset)
11401140
nmembers + MULTIXACT_MEMBERS_PER_PAGE * SLRU_PAGES_PER_SEGMENT * OFFSET_WARN_SEGMENTS))
11411141
ereport(WARNING,
11421142
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
1143-
errmsg("database with OID %u must be vacuumed before %d more multixact members are used",
1143+
errmsg_plural("database with OID %u must be vacuumed before %d more multixact member is used",
1144+
"database with OID %u must be vacuumed before %d more multixact members are used",
1145+
MultiXactState->offsetStopLimit - nextOffset + nmembers,
11441146
MultiXactState->oldestMultiXactDB,
11451147
MultiXactState->offsetStopLimit - nextOffset + nmembers),
11461148
errhint("Execute a database-wide VACUUM in that database with reduced vacuum_multixact_freeze_min_age and vacuum_multixact_freeze_table_age settings.")));

src/backend/catalog/dependency.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1619,7 +1619,7 @@ find_expr_references_walker(Node *node,
16191619
case REGROLEOID:
16201620
ereport(ERROR,
16211621
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
1622-
errmsg("constant of the type \'regrole\' cannot be used here")));
1622+
errmsg("constant of the type \"regrole\" cannot be used here")));
16231623
break;
16241624
}
16251625
}

src/backend/catalog/objectaddress.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1740,7 +1740,7 @@ get_object_address_defacl(List *objname, List *objargs, bool missing_ok)
17401740
ereport(ERROR,
17411741
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
17421742
errmsg("unrecognized default ACL object type %c", objtype),
1743-
errhint("Valid object types are 'r', 'S', 'f', and 'T'.")));
1743+
errhint("Valid object types are \"r\", \"S\", \"f\", and \"T\".")));
17441744
}
17451745

17461746
/*

src/backend/commands/copy.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -875,7 +875,7 @@ DoCopy(const CopyStmt *stmt, const char *queryString, uint64 *processed)
875875
ereport(ERROR,
876876
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
877877
errmsg("COPY FROM not supported with row level security."),
878-
errhint("Use direct INSERT statements instead.")));
878+
errhint("Use INSERT statements instead.")));
879879

880880
/* Build target list */
881881
cr = makeNode(ColumnRef);

src/backend/commands/matview.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -608,7 +608,7 @@ refresh_by_match_merge(Oid matviewOid, Oid tempOid, Oid relowner,
608608
*/
609609
ereport(ERROR,
610610
(errcode(ERRCODE_CARDINALITY_VIOLATION),
611-
errmsg("new data for \"%s\" contains duplicate rows without any null columns",
611+
errmsg("new data for materialized view \"%s\" contains duplicate rows without any null columns",
612612
RelationGetRelationName(matviewRel)),
613613
errdetail("Row: %s",
614614
SPI_getvalue(SPI_tuptable->vals[0], SPI_tuptable->tupdesc, 1))));

src/backend/commands/tablecmds.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -9811,7 +9811,7 @@ AlterTableMoveAll(AlterTableMoveAllStmt *stmt)
98119811
!ConditionalLockRelationOid(relOid, AccessExclusiveLock))
98129812
ereport(ERROR,
98139813
(errcode(ERRCODE_OBJECT_IN_USE),
9814-
errmsg("aborting because lock on relation \"%s\".\"%s\" is not available",
9814+
errmsg("aborting because lock on relation \"%s.%s\" is not available",
98159815
get_namespace_name(relForm->relnamespace),
98169816
NameStr(relForm->relname))));
98179817
else

src/backend/commands/tablespace.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -857,7 +857,7 @@ remove_tablespace_symlink(const char *linkloc)
857857
return;
858858
ereport(ERROR,
859859
(errcode_for_file_access(),
860-
errmsg("could not stat \"%s\": %m", linkloc)));
860+
errmsg("could not stat file \"%s\": %m", linkloc)));
861861
}
862862

863863
if (S_ISDIR(st.st_mode))

src/backend/commands/vacuumlazy.c

+6-2
Original file line numberDiff line numberDiff line change
@@ -1124,9 +1124,13 @@ lazy_scan_heap(Relation onerel, LVRelStats *vacrelstats,
11241124
nkeep);
11251125
appendStringInfo(&buf, _("There were %.0f unused item pointers.\n"),
11261126
nunused);
1127-
appendStringInfo(&buf, _("Skipped %u pages due to buffer pins.\n"),
1127+
appendStringInfo(&buf, ngettext("Skipped %u page due to buffer pins.\n",
1128+
"Skipped %u pages due to buffer pins.\n",
1129+
vacrelstats->pinskipped_pages),
11281130
vacrelstats->pinskipped_pages);
1129-
appendStringInfo(&buf, _("%u pages are entirely empty.\n"),
1131+
appendStringInfo(&buf, ngettext("%u page is entirely empty.\n",
1132+
"%u pages are entirely empty.\n",
1133+
empty_pages),
11301134
empty_pages);
11311135
appendStringInfo(&buf, _("%s."),
11321136
pg_rusage_show(&ru0));

src/backend/executor/execMain.c

+5-5
Original file line numberDiff line numberDiff line change
@@ -1832,7 +1832,7 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
18321832

18331833
ereport(ERROR,
18341834
(errcode(ERRCODE_WITH_CHECK_OPTION_VIOLATION),
1835-
errmsg("new row violates WITH CHECK OPTION for \"%s\"",
1835+
errmsg("new row violates check option for view \"%s\"",
18361836
wco->relname),
18371837
val_desc ? errdetail("Failing row contains %s.",
18381838
val_desc) : 0));
@@ -1842,24 +1842,24 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
18421842
if (wco->polname != NULL)
18431843
ereport(ERROR,
18441844
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
1845-
errmsg("new row violates row level security policy \"%s\" for \"%s\"",
1845+
errmsg("new row violates row-level security policy \"%s\" for table \"%s\"",
18461846
wco->polname, wco->relname)));
18471847
else
18481848
ereport(ERROR,
18491849
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
1850-
errmsg("new row violates row level security policy for \"%s\"",
1850+
errmsg("new row violates row-level security policy for table \"%s\"",
18511851
wco->relname)));
18521852
break;
18531853
case WCO_RLS_CONFLICT_CHECK:
18541854
if (wco->polname != NULL)
18551855
ereport(ERROR,
18561856
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
1857-
errmsg("new row violates row level security policy \"%s\" (USING expression) for \"%s\"",
1857+
errmsg("new row violates row-level security policy \"%s\" (USING expression) for table \"%s\"",
18581858
wco->polname, wco->relname)));
18591859
else
18601860
ereport(ERROR,
18611861
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
1862-
errmsg("new row violates row level security policy (USING expression) for \"%s\"",
1862+
errmsg("new row violates row-level security policy (USING expression) for table \"%s\"",
18631863
wco->relname)));
18641864
break;
18651865
default:

src/backend/parser/parse_clause.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -2867,15 +2867,15 @@ transformOnConflictArbiter(ParseState *pstate,
28672867
if (IsCatalogRelation(pstate->p_target_relation))
28682868
ereport(ERROR,
28692869
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
2870-
errmsg("ON CONFLICT not supported with system catalog tables"),
2870+
errmsg("ON CONFLICT is not supported with system catalog tables"),
28712871
parser_errposition(pstate,
28722872
exprLocation((Node *) onConflictClause))));
28732873

28742874
/* Same applies to table used by logical decoding as catalog table */
28752875
if (RelationIsUsedAsCatalogTable(pstate->p_target_relation))
28762876
ereport(ERROR,
28772877
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
2878-
errmsg("ON CONFLICT not supported on table \"%s\" used as a catalog table",
2878+
errmsg("ON CONFLICT is not supported on table \"%s\" used as a catalog table",
28792879
RelationGetRelationName(pstate->p_target_relation)),
28802880
parser_errposition(pstate,
28812881
exprLocation((Node *) onConflictClause))));

src/backend/replication/logical/logicalfuncs.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ pg_logical_slot_get_changes_guts(FunctionCallInfo fcinfo, bool confirm, bool bin
403403
ctx->options.output_type !=OUTPUT_PLUGIN_TEXTUAL_OUTPUT)
404404
ereport(ERROR,
405405
(errcode(ERRCODE_FEATURE_NOT_SUPPORTED),
406-
errmsg("logical decoding output plugin \"%s\" produces binary output, but \"%s\" expects textual data",
406+
errmsg("logical decoding output plugin \"%s\" produces binary output, but function \"%s\" expects textual data",
407407
NameStr(MyReplicationSlot->data.plugin),
408408
format_procedure(fcinfo->flinfo->fn_oid))));
409409

src/backend/replication/logical/origin.c

+8-8
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ replorigin_create(char *roname)
313313
if (tuple == NULL)
314314
ereport(ERROR,
315315
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
316-
errmsg("no free replication origin oid could be found")));
316+
errmsg("could not find free replication origin OID")));
317317

318318
heap_freetuple(tuple);
319319
return roident;
@@ -350,7 +350,7 @@ replorigin_drop(RepOriginId roident)
350350
{
351351
ereport(ERROR,
352352
(errcode(ERRCODE_OBJECT_IN_USE),
353-
errmsg("cannot drop replication origin with oid %d, in use by pid %d",
353+
errmsg("could not drop replication origin with OID %d, in use by PID %d",
354354
state->roident,
355355
state->acquired_by)));
356356
}
@@ -728,7 +728,7 @@ StartupReplicationOrigin(void)
728728
if (last_state == max_replication_slots)
729729
ereport(PANIC,
730730
(errcode(ERRCODE_CONFIGURATION_LIMIT_EXCEEDED),
731-
errmsg("no free replication state could be found, increase max_replication_slots")));
731+
errmsg("could not find free replication state, increase max_replication_slots")));
732732

733733
/* copy data to shared memory */
734734
replication_states[last_state].roident = disk_state.roident;
@@ -746,7 +746,7 @@ StartupReplicationOrigin(void)
746746
if (file_crc != crc)
747747
ereport(PANIC,
748748
(errcode(ERRCODE_CONFIGURATION_LIMIT_EXCEEDED),
749-
errmsg("replication_slot_checkpoint has wrong checksum %u, expected %u",
749+
errmsg("replication slot checkpoint has wrong checksum %u, expected %u",
750750
crc, file_crc)));
751751

752752
CloseTransientFile(fd);
@@ -870,7 +870,7 @@ replorigin_advance(RepOriginId node,
870870
{
871871
ereport(ERROR,
872872
(errcode(ERRCODE_OBJECT_IN_USE),
873-
errmsg("replication origin with oid %d is already active for pid %d",
873+
errmsg("replication origin with OID %d is already active for PID %d",
874874
replication_state->roident,
875875
replication_state->acquired_by)));
876876
}
@@ -881,7 +881,7 @@ replorigin_advance(RepOriginId node,
881881
if (replication_state == NULL && free_state == NULL)
882882
ereport(ERROR,
883883
(errcode(ERRCODE_CONFIGURATION_LIMIT_EXCEEDED),
884-
errmsg("no free replication state slot could be found for replication origin with oid %u",
884+
errmsg("could not find free replication state slot for replication origin with OID %u",
885885
node),
886886
errhint("Increase max_replication_slots and try again.")));
887887

@@ -1049,7 +1049,7 @@ replorigin_session_setup(RepOriginId node)
10491049
{
10501050
ereport(ERROR,
10511051
(errcode(ERRCODE_OBJECT_IN_USE),
1052-
errmsg("replication identifier %d is already active for pid %d",
1052+
errmsg("replication identifier %d is already active for PID %d",
10531053
curstate->roident, curstate->acquired_by)));
10541054
}
10551055

@@ -1061,7 +1061,7 @@ replorigin_session_setup(RepOriginId node)
10611061
if (session_replication_state == NULL && free_slot == -1)
10621062
ereport(ERROR,
10631063
(errcode(ERRCODE_CONFIGURATION_LIMIT_EXCEEDED),
1064-
errmsg("no free replication state slot could be found for replication origin with oid %u",
1064+
errmsg("could not find free replication state slot for replication origin with OID %u",
10651065
node),
10661066
errhint("Increase max_replication_slots and try again.")));
10671067
else if (session_replication_state == NULL)

src/backend/replication/logical/snapbuild.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -1677,12 +1677,12 @@ SnapBuildRestore(SnapBuild *builder, XLogRecPtr lsn)
16771677

16781678
if (ondisk.magic != SNAPBUILD_MAGIC)
16791679
ereport(ERROR,
1680-
(errmsg("snapbuild state file \"%s\" has wrong magic %u instead of %u",
1680+
(errmsg("snapbuild state file \"%s\" has wrong magic number: %u instead of %u",
16811681
path, ondisk.magic, SNAPBUILD_MAGIC)));
16821682

16831683
if (ondisk.version != SNAPBUILD_VERSION)
16841684
ereport(ERROR,
1685-
(errmsg("snapbuild state file \"%s\" has unsupported version %u instead of %u",
1685+
(errmsg("snapbuild state file \"%s\" has unsupported version: %u instead of %u",
16861686
path, ondisk.version, SNAPBUILD_VERSION)));
16871687

16881688
INIT_CRC32C(checksum);
@@ -1738,7 +1738,7 @@ SnapBuildRestore(SnapBuild *builder, XLogRecPtr lsn)
17381738
if (!EQ_CRC32C(checksum, ondisk.checksum))
17391739
ereport(ERROR,
17401740
(errcode_for_file_access(),
1741-
errmsg("snapbuild state file %s: checksum mismatch, is %u, should be %u",
1741+
errmsg("checksum mismatch for snapbuild state file \"%s\": is %u, should be %u",
17421742
path, checksum, ondisk.checksum)));
17431743

17441744
/*

src/backend/replication/slot.c

+3-3
Original file line numberDiff line numberDiff line change
@@ -344,7 +344,7 @@ ReplicationSlotAcquire(const char *name)
344344
if (active_pid != 0)
345345
ereport(ERROR,
346346
(errcode(ERRCODE_OBJECT_IN_USE),
347-
errmsg("replication slot \"%s\" is already active for pid %d",
347+
errmsg("replication slot \"%s\" is already active for PID %d",
348348
name, active_pid)));
349349

350350
/* We made this slot active, so it's ours now. */
@@ -1179,7 +1179,7 @@ RestoreSlotFromDisk(const char *name)
11791179
if (cp.magic != SLOT_MAGIC)
11801180
ereport(PANIC,
11811181
(errcode_for_file_access(),
1182-
errmsg("replication slot file \"%s\" has wrong magic %u instead of %u",
1182+
errmsg("replication slot file \"%s\" has wrong magic number: %u instead of %u",
11831183
path, cp.magic, SLOT_MAGIC)));
11841184

11851185
/* verify version */
@@ -1223,7 +1223,7 @@ RestoreSlotFromDisk(const char *name)
12231223

12241224
if (!EQ_CRC32C(checksum, cp.checksum))
12251225
ereport(PANIC,
1226-
(errmsg("replication slot file %s: checksum mismatch, is %u, should be %u",
1226+
(errmsg("checksum mismatch for replication slot file \"%s\": is %u, should be %u",
12271227
path, checksum, cp.checksum)));
12281228

12291229
/*

src/backend/tcop/postgres.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -3900,7 +3900,7 @@ PostgresMain(int argc, char *argv[],
39003900
if (pq_is_reading_msg())
39013901
ereport(FATAL,
39023902
(errcode(ERRCODE_PROTOCOL_VIOLATION),
3903-
errmsg("terminating connection because protocol sync was lost")));
3903+
errmsg("terminating connection because protocol synchronization was lost")));
39043904

39053905
/* Now we can allow interrupts again */
39063906
RESUME_INTERRUPTS();

src/backend/utils/adt/jsonb.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -721,7 +721,7 @@ datum_to_jsonb(Datum val, bool is_null, JsonbInState *result,
721721
{
722722
ereport(ERROR,
723723
(errcode(ERRCODE_INVALID_PARAMETER_VALUE),
724-
errmsg("key value must be scalar, not array, composite or json")));
724+
errmsg("key value must be scalar, not array, composite, or json")));
725725
}
726726
else
727727
{

src/backend/utils/adt/misc.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ pg_cancel_backend(PG_FUNCTION_ARGS)
168168
if (r == SIGNAL_BACKEND_NOPERMISSION)
169169
ereport(ERROR,
170170
(errcode(ERRCODE_INSUFFICIENT_PRIVILEGE),
171-
(errmsg("must be a member of the role whose query is being cancelled"))));
171+
(errmsg("must be a member of the role whose query is being canceled"))));
172172

173173
PG_RETURN_BOOL(r == SIGNAL_BACKEND_SUCCESS);
174174
}

src/bin/psql/command.c

+3-1
Original file line numberDiff line numberDiff line change
@@ -2805,7 +2805,9 @@ printPsetInfo(const char *param, struct printQueryOpt *popt)
28052805
/* show minimum lines for pager use */
28062806
else if (strcmp(param, "pager_min_lines") == 0)
28072807
{
2808-
printf(_("Pager won't be used for less than %d lines\n"),
2808+
printf(ngettext("Pager won't be used for less than %d line.\n",
2809+
"Pager won't be used for less than %d lines.\n",
2810+
popt->topt.pager_min_lines),
28092811
popt->topt.pager_min_lines);
28102812
}
28112813

src/test/modules/test_rls_hooks/expected/test_rls_hooks.out

+12-12
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ SELECT * FROM rls_test_permissive;
6262
INSERT INTO rls_test_permissive VALUES ('r1','s1',10);
6363
-- failure
6464
INSERT INTO rls_test_permissive VALUES ('r4','s4',10);
65-
ERROR: new row violates row level security policy for "rls_test_permissive"
65+
ERROR: new row violates row-level security policy for table "rls_test_permissive"
6666
SET ROLE s1;
6767
-- With only the hook's policies, restrictive
6868
-- hook's policy is current_user = supervisor
@@ -83,7 +83,7 @@ SELECT * FROM rls_test_restrictive;
8383
INSERT INTO rls_test_restrictive VALUES ('r1','s1',10);
8484
-- failure
8585
INSERT INTO rls_test_restrictive VALUES ('r4','s4',10);
86-
ERROR: new row violates row level security policy "extension policy" for "rls_test_restrictive"
86+
ERROR: new row violates row-level security policy "extension policy" for table "rls_test_restrictive"
8787
SET ROLE s1;
8888
-- With only the hook's policies, both
8989
-- permissive hook's policy is current_user = username
@@ -103,13 +103,13 @@ SELECT * FROM rls_test_both;
103103

104104
-- failure
105105
INSERT INTO rls_test_both VALUES ('r1','s1',10);
106-
ERROR: new row violates row level security policy for "rls_test_both"
106+
ERROR: new row violates row-level security policy for table "rls_test_both"
107107
-- failure
108108
INSERT INTO rls_test_both VALUES ('r4','s1',10);
109-
ERROR: new row violates row level security policy for "rls_test_both"
109+
ERROR: new row violates row-level security policy for table "rls_test_both"
110110
-- failure
111111
INSERT INTO rls_test_both VALUES ('r4','s4',10);
112-
ERROR: new row violates row level security policy for "rls_test_both"
112+
ERROR: new row violates row-level security policy for table "rls_test_both"
113113
RESET ROLE;
114114
-- Create "internal" policies, to check that the policies from
115115
-- the hooks are combined correctly.
@@ -141,7 +141,7 @@ INSERT INTO rls_test_permissive VALUES ('r1','s1',7);
141141
INSERT INTO rls_test_permissive VALUES ('r3','s3',10);
142142
-- failure
143143
INSERT INTO rls_test_permissive VALUES ('r4','s4',7);
144-
ERROR: new row violates row level security policy for "rls_test_permissive"
144+
ERROR: new row violates row-level security policy for table "rls_test_permissive"
145145
SET ROLE s1;
146146
-- With both internal and hook policies, restrictive
147147
EXPLAIN (costs off) SELECT * FROM rls_test_restrictive;
@@ -163,13 +163,13 @@ SELECT * FROM rls_test_restrictive;
163163
INSERT INTO rls_test_restrictive VALUES ('r1','s1',8);
164164
-- failure
165165
INSERT INTO rls_test_restrictive VALUES ('r3','s3',10);
166-
ERROR: new row violates row level security policy "extension policy" for "rls_test_restrictive"
166+
ERROR: new row violates row-level security policy "extension policy" for table "rls_test_restrictive"
167167
-- failure
168168
INSERT INTO rls_test_restrictive VALUES ('r1','s1',7);
169-
ERROR: new row violates row level security policy for "rls_test_restrictive"
169+
ERROR: new row violates row-level security policy for table "rls_test_restrictive"
170170
-- failure
171171
INSERT INTO rls_test_restrictive VALUES ('r4','s4',7);
172-
ERROR: new row violates row level security policy for "rls_test_restrictive"
172+
ERROR: new row violates row-level security policy for table "rls_test_restrictive"
173173
-- With both internal and hook policies, both permissive
174174
-- and restrictive hook policies
175175
EXPLAIN (costs off) SELECT * FROM rls_test_both;
@@ -190,13 +190,13 @@ SELECT * FROM rls_test_both;
190190
INSERT INTO rls_test_both VALUES ('r1','s1',8);
191191
-- failure
192192
INSERT INTO rls_test_both VALUES ('r3','s3',10);
193-
ERROR: new row violates row level security policy "extension policy" for "rls_test_both"
193+
ERROR: new row violates row-level security policy "extension policy" for table "rls_test_both"
194194
-- failure
195195
INSERT INTO rls_test_both VALUES ('r1','s1',7);
196-
ERROR: new row violates row level security policy for "rls_test_both"
196+
ERROR: new row violates row-level security policy for table "rls_test_both"
197197
-- failure
198198
INSERT INTO rls_test_both VALUES ('r4','s4',7);
199-
ERROR: new row violates row level security policy for "rls_test_both"
199+
ERROR: new row violates row-level security policy for table "rls_test_both"
200200
RESET ROLE;
201201
DROP TABLE rls_test_restrictive;
202202
DROP TABLE rls_test_permissive;

0 commit comments

Comments
 (0)