Skip to content

Commit 4cb560b

Browse files
committed
Consistently spell "leakproof" without a hyphen.
The overwhelming majority of places already did this, but a small handful of places had a hyphen. Yugo Nagata. Discussion: https://postgr.es/m/CAEZATCXnnuORE2BoGwHw2zbtVvsPOLhbfVmEk9GxRzK%2Bx3OW-Q%40mail.gmail.com
1 parent 2355e51 commit 4cb560b

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

doc/src/sgml/catalogs.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6040,7 +6040,7 @@ SCRAM-SHA-256$<replaceable>&lt;iteration count&gt;</replaceable>:<replaceable>&l
60406040
The function has no side effects. No information about the
60416041
arguments is conveyed except via the return value. Any function
60426042
that might throw an error depending on the values of its arguments
6043-
is not leak-proof.
6043+
is not leakproof.
60446044
</para></entry>
60456045
</row>
60466046

doc/src/sgml/planstats.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -740,7 +740,7 @@ EXPLAIN (ANALYZE, TIMING OFF, BUFFERS OFF) SELECT * FROM t WHERE a &lt;= 49 AND
740740
error, in which case this mechanism is invisible in practice. But if the
741741
user is reading from a security-barrier view, then the planner might wish
742742
to check the statistics of an underlying table that is otherwise
743-
inaccessible to the user. In that case, the operator should be leak-proof
743+
inaccessible to the user. In that case, the operator should be leakproof
744744
or the statistics will not be used. There is no direct feedback about
745745
that, except that the plan might be suboptimal. If one suspects that this
746746
is the case, one could try running the query as a more privileged user,

doc/src/sgml/rules.sgml

+1-1
Original file line numberDiff line numberDiff line change
@@ -2162,7 +2162,7 @@ CREATE VIEW phone_number WITH (security_barrier) AS
21622162
<literal>LEAKPROOF</literal> to be pushed down, as they never receive data
21632163
from the view. In contrast, a function that might throw an error depending
21642164
on the values received as arguments (such as one that throws an error in the
2165-
event of overflow or division by zero) is not leak-proof, and could provide
2165+
event of overflow or division by zero) is not leakproof, and could provide
21662166
significant information about the unseen rows if applied before the security
21672167
view's row filters.
21682168
</para>

src/backend/statistics/extended_stats.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -1397,7 +1397,7 @@ statext_is_compatible_clause_internal(PlannerInfo *root, Node *clause,
13971397
/*
13981398
* If there are any securityQuals on the RTE from security barrier
13991399
* views or RLS policies, then the user may not have access to all the
1400-
* table's data, and we must check that the operator is leak-proof.
1400+
* table's data, and we must check that the operator is leakproof.
14011401
*
14021402
* If the operator is leaky, then we must ignore this clause for the
14031403
* purposes of estimating with MCV lists, otherwise the operator might
@@ -1464,7 +1464,7 @@ statext_is_compatible_clause_internal(PlannerInfo *root, Node *clause,
14641464
/*
14651465
* If there are any securityQuals on the RTE from security barrier
14661466
* views or RLS policies, then the user may not have access to all the
1467-
* table's data, and we must check that the operator is leak-proof.
1467+
* table's data, and we must check that the operator is leakproof.
14681468
*
14691469
* If the operator is leaky, then we must ignore this clause for the
14701470
* purposes of estimating with MCV lists, otherwise the operator might

src/backend/utils/adt/selfuncs.c

+2-2
Original file line numberDiff line numberDiff line change
@@ -5763,7 +5763,7 @@ examine_simple_variable(PlannerInfo *root, Var *var,
57635763
* Check whether it is permitted to call func_oid passing some of the
57645764
* pg_statistic data in vardata. We allow this either if the user has SELECT
57655765
* privileges on the table or column underlying the pg_statistic data or if
5766-
* the function is marked leak-proof.
5766+
* the function is marked leakproof.
57675767
*/
57685768
bool
57695769
statistic_proc_security_check(VariableStatData *vardata, Oid func_oid)
@@ -5778,7 +5778,7 @@ statistic_proc_security_check(VariableStatData *vardata, Oid func_oid)
57785778
return true;
57795779

57805780
ereport(DEBUG2,
5781-
(errmsg_internal("not using statistics because function \"%s\" is not leak-proof",
5781+
(errmsg_internal("not using statistics because function \"%s\" is not leakproof",
57825782
get_func_name(func_oid))));
57835783
return false;
57845784
}

src/include/catalog/pg_proc.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ CATALOG(pg_proc,1255,ProcedureRelationId) BKI_BOOTSTRAP BKI_ROWTYPE_OID(81,Proce
6161
/* security definer */
6262
bool prosecdef BKI_DEFAULT(f);
6363

64-
/* is it a leak-proof function? */
64+
/* is it a leakproof function? */
6565
bool proleakproof BKI_DEFAULT(f);
6666

6767
/* strict with respect to NULLs? */

0 commit comments

Comments
 (0)