diff options
Diffstat (limited to 'src/backend/utils/adt')
-rw-r--r-- | src/backend/utils/adt/acl.c | 4 | ||||
-rw-r--r-- | src/backend/utils/adt/array_userfuncs.c | 2 |
2 files changed, 3 insertions, 3 deletions
diff --git a/src/backend/utils/adt/acl.c b/src/backend/utils/adt/acl.c index 8f7522d1033..c5a6babccc2 100644 --- a/src/backend/utils/adt/acl.c +++ b/src/backend/utils/adt/acl.c @@ -4825,7 +4825,7 @@ RoleMembershipCacheCallback(Datum arg, int cacheid, uint32 hashvalue) * Get a list of roles that the specified roleid is a member of * * Type ROLERECURSE_MEMBERS recurses through all grants; ROLERECURSE_PRIVS - * recurses only through inheritable grants; and ROLERECURSE_SETROLe recurses + * recurses only through inheritable grants; and ROLERECURSE_SETROLE recurses * only through grants with set_option. * * Since indirect membership testing is relatively expensive, we cache @@ -5020,7 +5020,7 @@ member_can_set_role(Oid member, Oid role) } /* - * Permission violation eror unless able to SET ROLE to target role. + * Permission violation error unless able to SET ROLE to target role. */ void check_can_set_role(Oid member, Oid role) diff --git a/src/backend/utils/adt/array_userfuncs.c b/src/backend/utils/adt/array_userfuncs.c index 33e2b98307d..171fdc67bb2 100644 --- a/src/backend/utils/adt/array_userfuncs.c +++ b/src/backend/utils/adt/array_userfuncs.c @@ -1043,7 +1043,7 @@ array_agg_array_combine(PG_FUNCTION_ARGS) state1->nitems += state2->nitems; state1->dims[0] += state2->dims[0]; - /* remaing dims already match, per test above */ + /* remaining dims already match, per test above */ Assert(state1->array_type == state2->array_type); Assert(state1->element_type == state2->element_type); |