]> git.ipfire.org Git - thirdparty/postgresql.git/commitdiff
revert "warn of SECURITY DEFINER schemas for non-sql_body funcs"
authorBruce Momjian <bruce@momjian.us>
Wed, 28 Sep 2022 17:05:20 +0000 (13:05 -0400)
committerBruce Momjian <bruce@momjian.us>
Wed, 28 Sep 2022 17:05:20 +0000 (13:05 -0400)
doc revert of commit 1703726488.  Change was applied to irrelevant
branches, and was not detailed enough to be helpful in relevant
branches.

Reported-by: Peter Eisentraut, Noah Misch
Discussion: https://postgr.es/m/a2dc9de4-24fc-3222-87d3-0def8057d7d8@enterprisedb.com

Backpatch-through: 10

doc/src/sgml/ref/create_function.sgml

index 5762d97309085635d279fa65201cc285c77fb56c..74866e8b353659c2384e7dbbf8bddc2ac83cd3b9 100644 (file)
@@ -715,10 +715,7 @@ SELECT * FROM dup(42);
    <para>
     Because a <literal>SECURITY DEFINER</literal> function is executed
     with the privileges of the user that owns it, care is needed to
-    ensure that the function cannot be misused.  This is particularly
-    important for non-<replaceable>sql_body</replaceable> functions because
-    their function bodies are evaluated at run-time, not creation time.
-    For security,
+    ensure that the function cannot be misused.  For security,
     <xref linkend="guc-search-path"/> should be set to exclude any schemas
     writable by untrusted users.  This prevents
     malicious users from creating objects (e.g., tables, functions, and