sepgsql: update TAP test to use fat comma style
[pgsql.git] / src / backend / utils / adt / arrayutils.c
blob650bb51d4cdb39df369ecd38dca5b47a8439fca5
1 /*-------------------------------------------------------------------------
3 * arrayutils.c
4 * This file contains some support routines required for array functions.
6 * Portions Copyright (c) 1996-2025, PostgreSQL Global Development Group
7 * Portions Copyright (c) 1994, Regents of the University of California
10 * IDENTIFICATION
11 * src/backend/utils/adt/arrayutils.c
13 *-------------------------------------------------------------------------
16 #include "postgres.h"
18 #include "catalog/pg_type.h"
19 #include "common/int.h"
20 #include "utils/array.h"
21 #include "utils/builtins.h"
22 #include "utils/memutils.h"
26 * Convert subscript list into linear element number (from 0)
28 * We assume caller has already range-checked the dimensions and subscripts,
29 * so no overflow is possible.
31 int
32 ArrayGetOffset(int n, const int *dim, const int *lb, const int *indx)
34 int i,
35 scale = 1,
36 offset = 0;
38 for (i = n - 1; i >= 0; i--)
40 offset += (indx[i] - lb[i]) * scale;
41 scale *= dim[i];
43 return offset;
47 * Convert array dimensions into number of elements
49 * This must do overflow checking, since it is used to validate that a user
50 * dimensionality request doesn't overflow what we can handle.
52 * The multiplication overflow check only works on machines that have int64
53 * arithmetic, but that is nearly all platforms these days, and doing check
54 * divides for those that don't seems way too expensive.
56 int
57 ArrayGetNItems(int ndim, const int *dims)
59 return ArrayGetNItemsSafe(ndim, dims, NULL);
63 * This entry point can return the error into an ErrorSaveContext
64 * instead of throwing an exception. -1 is returned after an error.
66 int
67 ArrayGetNItemsSafe(int ndim, const int *dims, struct Node *escontext)
69 int32 ret;
70 int i;
72 if (ndim <= 0)
73 return 0;
74 ret = 1;
75 for (i = 0; i < ndim; i++)
77 int64 prod;
79 /* A negative dimension implies that UB-LB overflowed ... */
80 if (dims[i] < 0)
81 ereturn(escontext, -1,
82 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
83 errmsg("array size exceeds the maximum allowed (%d)",
84 (int) MaxArraySize)));
86 prod = (int64) ret * (int64) dims[i];
88 ret = (int32) prod;
89 if ((int64) ret != prod)
90 ereturn(escontext, -1,
91 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
92 errmsg("array size exceeds the maximum allowed (%d)",
93 (int) MaxArraySize)));
95 Assert(ret >= 0);
96 if ((Size) ret > MaxArraySize)
97 ereturn(escontext, -1,
98 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
99 errmsg("array size exceeds the maximum allowed (%d)",
100 (int) MaxArraySize)));
101 return (int) ret;
105 * Verify sanity of proposed lower-bound values for an array
107 * The lower-bound values must not be so large as to cause overflow when
108 * calculating subscripts, e.g. lower bound 2147483640 with length 10
109 * must be disallowed. We actually insist that dims[i] + lb[i] be
110 * computable without overflow, meaning that an array with last subscript
111 * equal to INT_MAX will be disallowed.
113 * It is assumed that the caller already called ArrayGetNItems, so that
114 * overflowed (negative) dims[] values have been eliminated.
116 void
117 ArrayCheckBounds(int ndim, const int *dims, const int *lb)
119 (void) ArrayCheckBoundsSafe(ndim, dims, lb, NULL);
123 * This entry point can return the error into an ErrorSaveContext
124 * instead of throwing an exception.
126 bool
127 ArrayCheckBoundsSafe(int ndim, const int *dims, const int *lb,
128 struct Node *escontext)
130 int i;
132 for (i = 0; i < ndim; i++)
134 /* PG_USED_FOR_ASSERTS_ONLY prevents variable-isn't-read warnings */
135 int32 sum PG_USED_FOR_ASSERTS_ONLY;
137 if (pg_add_s32_overflow(dims[i], lb[i], &sum))
138 ereturn(escontext, false,
139 (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
140 errmsg("array lower bound is too large: %d",
141 lb[i])));
144 return true;
148 * Compute ranges (sub-array dimensions) for an array slice
150 * We assume caller has validated slice endpoints, so overflow is impossible
152 void
153 mda_get_range(int n, int *span, const int *st, const int *endp)
155 int i;
157 for (i = 0; i < n; i++)
158 span[i] = endp[i] - st[i] + 1;
162 * Compute products of array dimensions, ie, scale factors for subscripts
164 * We assume caller has validated dimensions, so overflow is impossible
166 void
167 mda_get_prod(int n, const int *range, int *prod)
169 int i;
171 prod[n - 1] = 1;
172 for (i = n - 2; i >= 0; i--)
173 prod[i] = prod[i + 1] * range[i + 1];
177 * From products of whole-array dimensions and spans of a sub-array,
178 * compute offset distances needed to step through subarray within array
180 * We assume caller has validated dimensions, so overflow is impossible
182 void
183 mda_get_offset_values(int n, int *dist, const int *prod, const int *span)
185 int i,
188 dist[n - 1] = 0;
189 for (j = n - 2; j >= 0; j--)
191 dist[j] = prod[j] - 1;
192 for (i = j + 1; i < n; i++)
193 dist[j] -= (span[i] - 1) * prod[i];
198 * Generates the tuple that is lexicographically one greater than the current
199 * n-tuple in "curr", with the restriction that the i-th element of "curr" is
200 * less than the i-th element of "span".
202 * Returns -1 if no next tuple exists, else the subscript position (0..n-1)
203 * corresponding to the dimension to advance along.
205 * We assume caller has validated dimensions, so overflow is impossible
208 mda_next_tuple(int n, int *curr, const int *span)
210 int i;
212 if (n <= 0)
213 return -1;
215 curr[n - 1] = (curr[n - 1] + 1) % span[n - 1];
216 for (i = n - 1; i && curr[i] == 0; i--)
217 curr[i - 1] = (curr[i - 1] + 1) % span[i - 1];
219 if (i)
220 return i;
221 if (curr[0])
222 return 0;
224 return -1;
228 * ArrayGetIntegerTypmods: verify that argument is a 1-D cstring array,
229 * and get the contents converted to integers. Returns a palloc'd array
230 * and places the length at *n.
232 int32 *
233 ArrayGetIntegerTypmods(ArrayType *arr, int *n)
235 int32 *result;
236 Datum *elem_values;
237 int i;
239 if (ARR_ELEMTYPE(arr) != CSTRINGOID)
240 ereport(ERROR,
241 (errcode(ERRCODE_ARRAY_ELEMENT_ERROR),
242 errmsg("typmod array must be type cstring[]")));
244 if (ARR_NDIM(arr) != 1)
245 ereport(ERROR,
246 (errcode(ERRCODE_ARRAY_SUBSCRIPT_ERROR),
247 errmsg("typmod array must be one-dimensional")));
249 if (array_contains_nulls(arr))
250 ereport(ERROR,
251 (errcode(ERRCODE_NULL_VALUE_NOT_ALLOWED),
252 errmsg("typmod array must not contain nulls")));
254 deconstruct_array_builtin(arr, CSTRINGOID, &elem_values, NULL, n);
256 result = (int32 *) palloc(*n * sizeof(int32));
258 for (i = 0; i < *n; i++)
259 result[i] = pg_strtoint32(DatumGetCString(elem_values[i]));
261 pfree(elem_values);
263 return result;