Re: Protection from SQL injection
| От | PFC |
|---|---|
| Тема | Re: Protection from SQL injection |
| Дата | |
| Msg-id | op.uac2yav2cigqcu@apollo13.peufeu.com обсуждение |
| Ответ на | Re: Protection from SQL injection ("Brendan Jurd" <direvus@gmail.com>) |
| Ответы |
Re: Protection from SQL injection
|
| Список | pgsql-hackers |
On Tue, 29 Apr 2008 01:03:33 +0200, Brendan Jurd <direvus@gmail.com> wrote:
> On Tue, Apr 29, 2008 at 7:00 AM, PFC <lists@peufeu.com> wrote:
>> I have found that the little bit of code posted afterwards did
>> eliminate
>> SQL holes in my PHP applications with zero developer pain, actually it
>> is
>> MORE convenient to use than randomly pasting strings into queries.
>>
>> You just call
>> db_query( "SELECT * FROM table WHERE column1=%s AND column2=%s", array(
>> $var1, $var2 ));
>>
>
> Implementing this for yourself is crazy; PHP's Postgres extension
> already does this for you since 5.1.0:
>
> $result = pg_query_params("SELECT foo FROM bar WHERE baz = $1",
> array($baz));
>
> http://www.php.net/manual/en/function.pg-query-params.php
>
> Cheers,
> BJ
pg_query_params is quite slower actually...
В списке pgsql-hackers по дате отправления: