summaryrefslogtreecommitdiff
path: root/doc/src/sgml/rules.sgml
diff options
context:
space:
mode:
authorPeter Eisentraut2012-06-07 21:06:20 +0000
committerPeter Eisentraut2012-06-07 21:06:20 +0000
commit5baf6da71701abcb76487d9de68f7d7dc6c365e9 (patch)
treefc4b806627f170fcef5a11e8efc1f1dc63149457 /doc/src/sgml/rules.sgml
parent5d0109bd2776ce918821f360e951270caa96ba8a (diff)
Documentation spell and markup checking
Diffstat (limited to 'doc/src/sgml/rules.sgml')
-rw-r--r--doc/src/sgml/rules.sgml6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/src/sgml/rules.sgml b/doc/src/sgml/rules.sgml
index 59a32a8e18b..cc02ada7c71 100644
--- a/doc/src/sgml/rules.sgml
+++ b/doc/src/sgml/rules.sgml
@@ -1892,7 +1892,7 @@ CREATE VIEW phone_number WITH (security_barrier) AS
<para>
The query planner has more flexibility when dealing with functions that
- have no side effects. Such functions are referred to as LEAKPROOF, and
+ have no side effects. Such functions are referred to as <literal>LEAKPROOF</literal>, and
include many simple, commonly used operators, such as many equality
operators. The query planner can safely allow such functions to be evaluated
at any point in the query execution process, since invoking them on rows
@@ -1910,11 +1910,11 @@ CREATE VIEW phone_number WITH (security_barrier) AS
in the limited sense that the contents of the invisible tuples will not be
passed to possibly-insecure functions. The user may well have other means
of making inferences about the unseen data; for example, they can see the
- query plan using <command>EXPLAIN</command>, or measure the runtime of
+ query plan using <command>EXPLAIN</command>, or measure the run time of
queries against the view. A malicious attacker might be able to infer
something about the amount of unseen data, or even gain some information
about the data distribution or most common values (since these things may
- affect the runtime of the plan; or even, since they are also reflected in
+ affect the run time of the plan; or even, since they are also reflected in
the optimizer statistics, the choice of plan). If these types of "covert
channel" attacks are of concern, it is probably unwise to grant any access
to the data at all.