diff --git a/doc/src/sgml/ddl.sgml b/doc/src/sgml/ddl.sgml index d6e5d646ee462cb7320df9ef3b17d06de93d55f8..207de9b125994c2c08e3e4d9de4b9da62abc6686 100644 --- a/doc/src/sgml/ddl.sgml +++ b/doc/src/sgml/ddl.sgml @@ -1735,7 +1735,7 @@ CREATE TABLE public.products ( ... ); </para> <indexterm> - <primary>search_path</primary> + <primary><varname>search_path</varname> configuration parameter</primary> </indexterm> <para> diff --git a/doc/src/sgml/func.sgml b/doc/src/sgml/func.sgml index c8a2a149fa8c66bc352764406246ba9123d87f14..e184d99626e6a86e36bebc45de2dd20ffd94652a 100644 --- a/doc/src/sgml/func.sgml +++ b/doc/src/sgml/func.sgml @@ -13507,6 +13507,11 @@ SELECT relname FROM pg_class WHERE pg_table_is_visible(oid); </programlisting> </para> + <indexterm> + <primary>search path</primary> + <secondary>object visibility</secondary> + </indexterm> + <table id="functions-info-schema-table"> <title>Schema Visibility Inquiry Functions</title> <tgroup cols="3"> diff --git a/doc/src/sgml/ref/create_function.sgml b/doc/src/sgml/ref/create_function.sgml index fee6f53ba2437ced8b9734bfb1860b54661f0972..4ac5bdaf65ff3b3266af961cdfa4aee3ce1b1eec 100644 --- a/doc/src/sgml/ref/create_function.sgml +++ b/doc/src/sgml/ref/create_function.sgml @@ -673,6 +673,11 @@ SELECT * FROM dup(42); <refsect1 id="sql-createfunction-security"> <title>Writing <literal>SECURITY DEFINER</literal> Functions Safely</title> + <indexterm> + <primary><varname>search_path</varname> configuration parameter</> + <secondary>use in securing functions</> + </indexterm> + <para> Because a <literal>SECURITY DEFINER</literal> function is executed with the privileges of the user that created it, care is needed to