diff options
author | Peter Eisentraut | 2012-06-07 21:06:20 +0000 |
---|---|---|
committer | Peter Eisentraut | 2012-06-07 21:06:20 +0000 |
commit | 5baf6da71701abcb76487d9de68f7d7dc6c365e9 (patch) | |
tree | fc4b806627f170fcef5a11e8efc1f1dc63149457 /doc/src/sgml/rules.sgml | |
parent | 5d0109bd2776ce918821f360e951270caa96ba8a (diff) |
Documentation spell and markup checking
Diffstat (limited to 'doc/src/sgml/rules.sgml')
-rw-r--r-- | doc/src/sgml/rules.sgml | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/src/sgml/rules.sgml b/doc/src/sgml/rules.sgml index 59a32a8e18b..cc02ada7c71 100644 --- a/doc/src/sgml/rules.sgml +++ b/doc/src/sgml/rules.sgml @@ -1892,7 +1892,7 @@ CREATE VIEW phone_number WITH (security_barrier) AS <para> The query planner has more flexibility when dealing with functions that - have no side effects. Such functions are referred to as LEAKPROOF, and + have no side effects. Such functions are referred to as <literal>LEAKPROOF</literal>, and include many simple, commonly used operators, such as many equality operators. The query planner can safely allow such functions to be evaluated at any point in the query execution process, since invoking them on rows @@ -1910,11 +1910,11 @@ CREATE VIEW phone_number WITH (security_barrier) AS in the limited sense that the contents of the invisible tuples will not be passed to possibly-insecure functions. The user may well have other means of making inferences about the unseen data; for example, they can see the - query plan using <command>EXPLAIN</command>, or measure the runtime of + query plan using <command>EXPLAIN</command>, or measure the run time of queries against the view. A malicious attacker might be able to infer something about the amount of unseen data, or even gain some information about the data distribution or most common values (since these things may - affect the runtime of the plan; or even, since they are also reflected in + affect the run time of the plan; or even, since they are also reflected in the optimizer statistics, the choice of plan). If these types of "covert channel" attacks are of concern, it is probably unwise to grant any access to the data at all. |