@@ -1808,7 +1808,7 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
18081808
18091809ereport (ERROR ,
18101810(errcode (ERRCODE_WITH_CHECK_OPTION_VIOLATION ),
1811- errmsg ("new row violatesWITH CHECK OPTION for \"%s\"" ,
1811+ errmsg ("new row violatescheck option for view \"%s\"" ,
18121812wco -> relname ),
18131813val_desc ?errdetail ("Failing row contains %s." ,
18141814val_desc ) :0 ));
@@ -1818,24 +1818,24 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
18181818if (wco -> polname != NULL )
18191819ereport (ERROR ,
18201820(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1821- errmsg ("new row violates row level security policy \"%s\" for \"%s\"" ,
1821+ errmsg ("new row violates row- level security policy \"%s\" for table \"%s\"" ,
18221822wco -> polname ,wco -> relname )));
18231823else
18241824ereport (ERROR ,
18251825(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1826- errmsg ("new row violates row level security policy for \"%s\"" ,
1826+ errmsg ("new row violates row- level security policy for table \"%s\"" ,
18271827wco -> relname )));
18281828break ;
18291829case WCO_RLS_CONFLICT_CHECK :
18301830if (wco -> polname != NULL )
18311831ereport (ERROR ,
18321832(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1833- errmsg ("new row violates row level security policy \"%s\" (USING expression) for \"%s\"" ,
1833+ errmsg ("new row violates row- level security policy \"%s\" (USING expression) for table \"%s\"" ,
18341834wco -> polname ,wco -> relname )));
18351835else
18361836ereport (ERROR ,
18371837(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1838- errmsg ("new row violates row level security policy (USING expression) for \"%s\"" ,
1838+ errmsg ("new row violates row- level security policy (USING expression) for table \"%s\"" ,
18391839wco -> relname )));
18401840break ;
18411841default :