Re: SQL safe input?
| От | Bruno Wolff III |
|---|---|
| Тема | Re: SQL safe input? |
| Дата | |
| Msg-id | 20050827033348.GA12398@wolff.to обсуждение исходный текст |
| Ответ на | Re: SQL safe input? (<operationsengineer1@yahoo.com>) |
| Ответы |
Re: SQL safe input?
|
| Список | pgsql-novice |
On Fri, Aug 26, 2005 at 15:40:02 -0700,
operationsengineer1@yahoo.com wrote:
> > IMO the best way to do this is to use bind
> > parameters to pass user input
> > to queries. Then you don't need to escape anything.
> > You might still check
> > for very long strings.
>
> this got me thinking... is this what you are talking
> about (i use ADOdb)?
>
> $db->Execute("INSERT INTO t_customer (customer_name,
> customer_entry_date) VALUES (?,?)",
> array($customer_name, $db->DBDate(time())));
>
> $customer_name is the validated input from the user
> with no escaping of any kind. is this ok?
>
> this query works just dandy. does it mean i can start
> sleeping at night? -lol-
Yes this is the idea. Bad data for the values can't execute unexpected SQL
commands; it can only cause the query to fail.
В списке pgsql-novice по дате отправления: