Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit 0510b62

Browse files
committed
Typo fixes.
All noted by Jaime Casanova.
1 parent 99b60fc commit 0510b62

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

doc/src/sgml/ref/create_view.sgml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ CREATE [ OR REPLACE ] [ TEMP | TEMPORARY ] VIEW <replaceable class="PARAMETER">n
104104
<listitem>
105105
<para>
106106
This clause specifies optional parameters for a view; currently, the
107-
only suppored parameter name is <literal>security_barrier</literal>,
107+
only supported parameter name is <literal>security_barrier</literal>,
108108
which should be enabled when a view is intended to provide row-level
109109
security. See <xref linkend="rules-privileges"> for full details.
110110
</para>

doc/src/sgml/rules.sgml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1876,7 +1876,7 @@ SELECT * FROM phone_number WHERE tricky(person, phone);
18761876
When it is necessary for a view to provide row-level security, the
18771877
<literal>security_barrier</literal> attribute should be applied to
18781878
the view. This prevents maliciously-chosen functions and operators from
1879-
being invoked on rows until afterthe view has done its work. For
1879+
being invoked on rows until after the view has done its work. For
18801880
example, if the view shown above had been created like this, it would
18811881
be secure:
18821882
<programlisting>
@@ -1893,7 +1893,7 @@ CREATE VIEW phone_number WITH (security_barrier) AS
18931893
<para>
18941894
It is important to understand that even a view created with the
18951895
<literal>security_barrier</literal> option is intended to be secure only
1896-
in the limited sense that the contents of the invisible tuples will not
1896+
in the limited sense that the contents of the invisible tuples will not be
18971897
passed to possibly-insecure functions. The user may well have other means
18981898
of making inferences about the unseen data; for example, they can see the
18991899
query plan using <command>EXPLAIN</command>, or measure the runtime of

0 commit comments

Comments
 (0)