diff options
| author | Bruce Momjian | 2022-09-28 17:05:20 +0000 |
|---|---|---|
| committer | Bruce Momjian | 2022-09-28 17:05:20 +0000 |
| commit | e723c3bd6ea3b4502366c28f9c28d3bfb8fc2124 (patch) | |
| tree | b6bd0a88fa1126c8145159e5a58571c3807ed4e5 /doc/src | |
| parent | 1f2f50bc1b488003f0832343758030ef1a661a9b (diff) | |
revert "warn of SECURITY DEFINER schemas for non-sql_body funcs"
doc revert of commit 1703726488. Change was applied to irrelevant
branches, and was not detailed enough to be helpful in relevant
branches.
Reported-by: Peter Eisentraut, Noah Misch
Discussion: https://postgr.es/m/a2dc9de4-24fc-3222-87d3-0def8057d7d8@enterprisedb.com
Backpatch-through: 10
Diffstat (limited to 'doc/src')
| -rw-r--r-- | doc/src/sgml/ref/create_function.sgml | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index 5762d973090..74866e8b353 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -715,10 +715,7 @@ SELECT * FROM dup(42); <para> Because a <literal>SECURITY DEFINER</literal> function is executed with the privileges of the user that owns it, care is needed to - ensure that the function cannot be misused. This is particularly - important for non-<replaceable>sql_body</replaceable> functions because - their function bodies are evaluated at run-time, not creation time. - For security, + ensure that the function cannot be misused. For security, <xref linkend="guc-search-path"/> should be set to exclude any schemas writable by untrusted users. This prevents malicious users from creating objects (e.g., tables, functions, and |
