@@ -1832,7 +1832,7 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
1832
1832
1833
1833
ereport (ERROR ,
1834
1834
(errcode (ERRCODE_WITH_CHECK_OPTION_VIOLATION ),
1835
- errmsg ("new row violatesWITH CHECK OPTION for \"%s\"" ,
1835
+ errmsg ("new row violatescheck option for view \"%s\"" ,
1836
1836
wco -> relname ),
1837
1837
val_desc ?errdetail ("Failing row contains %s." ,
1838
1838
val_desc ) :0 ));
@@ -1842,24 +1842,24 @@ ExecWithCheckOptions(WCOKind kind, ResultRelInfo *resultRelInfo,
1842
1842
if (wco -> polname != NULL )
1843
1843
ereport (ERROR ,
1844
1844
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1845
- errmsg ("new row violates row level security policy \"%s\" for \"%s\"" ,
1845
+ errmsg ("new row violates row- level security policy \"%s\" for table \"%s\"" ,
1846
1846
wco -> polname ,wco -> relname )));
1847
1847
else
1848
1848
ereport (ERROR ,
1849
1849
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1850
- errmsg ("new row violates row level security policy for \"%s\"" ,
1850
+ errmsg ("new row violates row- level security policy for table \"%s\"" ,
1851
1851
wco -> relname )));
1852
1852
break ;
1853
1853
case WCO_RLS_CONFLICT_CHECK :
1854
1854
if (wco -> polname != NULL )
1855
1855
ereport (ERROR ,
1856
1856
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1857
- errmsg ("new row violates row level security policy \"%s\" (USING expression) for \"%s\"" ,
1857
+ errmsg ("new row violates row- level security policy \"%s\" (USING expression) for table \"%s\"" ,
1858
1858
wco -> polname ,wco -> relname )));
1859
1859
else
1860
1860
ereport (ERROR ,
1861
1861
(errcode (ERRCODE_INSUFFICIENT_PRIVILEGE ),
1862
- errmsg ("new row violates row level security policy (USING expression) for \"%s\"" ,
1862
+ errmsg ("new row violates row- level security policy (USING expression) for table \"%s\"" ,
1863
1863
wco -> relname )));
1864
1864
break ;
1865
1865
default :