diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index d6e5d646ee4..207de9b1259 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1735,7 +1735,7 @@ CREATE TABLE public.products ( ... ); - search_path + search_path configuration parameter diff --git a/doc/src/sgml/func.sgml b/doc/src/sgml/func.sgml index c8a2a149fa8..e184d99626e 100644 --- a/doc/src/sgml/func.sgml +++ b/doc/src/sgml/func.sgml @@ -13507,6 +13507,11 @@ SELECT relname FROM pg_class WHERE pg_table_is_visible(oid); + + search path + object visibility + + Schema Visibility Inquiry Functions diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index fee6f53ba24..4ac5bdaf65f 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -673,6 +673,11 @@ SELECT * FROM dup(42); Writing <literal>SECURITY DEFINER</literal> Functions Safely + + search_path configuration parameter + use in securing functions + + Because a SECURITY DEFINER function is executed with the privileges of the user that created it, care is needed to