1 /*-------------------------------------------------------------------------
3 * Utility routines for SQL dumping
5 * Basically this is stuff that is useful in both pg_dump and pg_dumpall.
8 * Portions Copyright (c) 1996-2025, PostgreSQL Global Development Group
9 * Portions Copyright (c) 1994, Regents of the University of California
11 * src/bin/pg_dump/dumputils.c
13 *-------------------------------------------------------------------------
15 #include "postgres_fe.h"
19 #include "dumputils.h"
20 #include "fe_utils/string_utils.h"
23 static bool parseAclItem(const char *item
, const char *type
,
24 const char *name
, const char *subname
, int remoteVersion
,
25 PQExpBuffer grantee
, PQExpBuffer grantor
,
26 PQExpBuffer privs
, PQExpBuffer privswgo
);
27 static char *dequoteAclUserName(PQExpBuffer output
, char *input
);
28 static void AddAcl(PQExpBuffer aclbuf
, const char *keyword
,
33 * Build GRANT/REVOKE command(s) for an object.
35 * name: the object name, in the form to use in the commands (already quoted)
36 * subname: the sub-object name, if any (already quoted); NULL if none
37 * nspname: the namespace the object is in (NULL if none); not pre-quoted
38 * type: the object type (as seen in GRANT command: must be one of
39 * TABLE, SEQUENCE, FUNCTION, PROCEDURE, LANGUAGE, SCHEMA, DATABASE, TABLESPACE,
40 * FOREIGN DATA WRAPPER, SERVER, PARAMETER or LARGE OBJECT)
41 * acls: the ACL string fetched from the database
42 * baseacls: the initial ACL string for this object
43 * owner: username of object owner (will be passed through fmtId); can be
44 * NULL or empty string to indicate "no owner known"
45 * prefix: string to prefix to each generated command; typically empty
46 * remoteVersion: version of database
48 * Returns true if okay, false if could not parse the acl string.
49 * The resulting commands (if any) are appended to the contents of 'sql'.
51 * baseacls is typically the result of acldefault() for the object's type
52 * and owner. However, if there is a pg_init_privs entry for the object,
53 * it should instead be the initprivs ACLs. When acls is itself a
54 * pg_init_privs entry, baseacls is what to dump that relative to; then
55 * it can be either an acldefault() value or an empty ACL "{}".
57 * Note: when processing a default ACL, prefix is "ALTER DEFAULT PRIVILEGES "
58 * or something similar, and name is an empty string.
60 * Note: beware of passing a fmtId() result directly as 'name' or 'subname',
61 * since this routine uses fmtId() internally.
64 buildACLCommands(const char *name
, const char *subname
, const char *nspname
,
65 const char *type
, const char *acls
, const char *baseacls
,
66 const char *owner
, const char *prefix
, int remoteVersion
,
70 char **aclitems
= NULL
;
71 char **baseitems
= NULL
;
72 char **grantitems
= NULL
;
73 char **revokeitems
= NULL
;
87 * If the acl was NULL (initial default state), we need do nothing. Note
88 * that this is distinguishable from all-privileges-revoked, which will
89 * look like an empty array ("{}").
91 if (acls
== NULL
|| *acls
== '\0')
92 return true; /* object has default permissions */
94 /* treat empty-string owner same as NULL */
95 if (owner
&& *owner
== '\0')
98 /* Parse the acls array */
99 if (!parsePGArray(acls
, &aclitems
, &naclitems
))
105 /* Parse the baseacls too */
106 if (!parsePGArray(baseacls
, &baseitems
, &nbaseitems
))
114 * Compare the actual ACL with the base ACL, extracting the privileges
115 * that need to be granted (i.e., are in the actual ACL but not the base
116 * ACL) and the ones that need to be revoked (the reverse). We use plain
117 * string comparisons to check for matches. In principle that could be
118 * fooled by extraneous issues such as whitespace, but since all these
119 * strings are the work of aclitemout(), it should be OK in practice.
120 * Besides, a false mismatch will just cause the output to be a little
121 * more verbose than it really needed to be.
123 grantitems
= (char **) pg_malloc(naclitems
* sizeof(char *));
124 for (i
= 0; i
< naclitems
; i
++)
128 for (int j
= 0; j
< nbaseitems
; j
++)
130 if (strcmp(aclitems
[i
], baseitems
[j
]) == 0)
137 grantitems
[ngrantitems
++] = aclitems
[i
];
139 revokeitems
= (char **) pg_malloc(nbaseitems
* sizeof(char *));
140 for (i
= 0; i
< nbaseitems
; i
++)
144 for (int j
= 0; j
< naclitems
; j
++)
146 if (strcmp(baseitems
[i
], aclitems
[j
]) == 0)
153 revokeitems
[nrevokeitems
++] = baseitems
[i
];
156 /* Prepare working buffers */
157 grantee
= createPQExpBuffer();
158 grantor
= createPQExpBuffer();
159 privs
= createPQExpBuffer();
160 privswgo
= createPQExpBuffer();
163 * At the end, these two will be pasted together to form the result.
165 firstsql
= createPQExpBuffer();
166 secondsql
= createPQExpBuffer();
169 * Build REVOKE statements for ACLs listed in revokeitems[].
171 for (i
= 0; i
< nrevokeitems
; i
++)
173 if (!parseAclItem(revokeitems
[i
],
174 type
, name
, subname
, remoteVersion
,
175 grantee
, grantor
, privs
, NULL
))
183 appendPQExpBuffer(firstsql
, "%sREVOKE %s ON %s ",
184 prefix
, privs
->data
, type
);
185 if (nspname
&& *nspname
)
186 appendPQExpBuffer(firstsql
, "%s.", fmtId(nspname
));
188 appendPQExpBuffer(firstsql
, "%s ", name
);
189 appendPQExpBufferStr(firstsql
, "FROM ");
190 if (grantee
->len
== 0)
191 appendPQExpBufferStr(firstsql
, "PUBLIC;\n");
193 appendPQExpBuffer(firstsql
, "%s;\n",
194 fmtId(grantee
->data
));
199 * At this point we have issued REVOKE statements for all initial and
200 * default privileges that are no longer present on the object, so we are
201 * almost ready to GRANT the privileges listed in grantitems[].
203 * We still need some hacking though to cover the case where new default
204 * public privileges are added in new versions: the REVOKE ALL will revoke
205 * them, leading to behavior different from what the old version had,
206 * which is generally not what's wanted. So add back default privs if the
207 * source database is too old to have had that particular priv. (As of
208 * right now, no such cases exist in supported versions.)
212 * Scan individual ACL items to be granted.
214 * The order in which privileges appear in the ACL string (the order they
215 * have been GRANT'd in, which the backend maintains) must be preserved to
216 * ensure that GRANTs WITH GRANT OPTION and subsequent GRANTs based on
217 * those are dumped in the correct order. However, some old server
218 * versions will show grants to PUBLIC before the owner's own grants; for
219 * consistency's sake, force the owner's grants to be output first.
221 for (i
= 0; i
< ngrantitems
; i
++)
223 if (parseAclItem(grantitems
[i
], type
, name
, subname
, remoteVersion
,
224 grantee
, grantor
, privs
, privswgo
))
227 * If the grantor isn't the owner, we'll need to use SET SESSION
228 * AUTHORIZATION to become the grantor. Issue the SET/RESET only
229 * if there's something useful to do.
231 if (privs
->len
> 0 || privswgo
->len
> 0)
235 /* Set owner as grantor if that's not explicit in the ACL */
236 if (grantor
->len
== 0 && owner
)
237 printfPQExpBuffer(grantor
, "%s", owner
);
239 /* Make sure owner's own grants are output before others */
241 strcmp(grantee
->data
, owner
) == 0 &&
242 strcmp(grantor
->data
, owner
) == 0)
248 && (!owner
|| strcmp(owner
, grantor
->data
) != 0))
249 appendPQExpBuffer(thissql
, "SET SESSION AUTHORIZATION %s;\n",
250 fmtId(grantor
->data
));
254 appendPQExpBuffer(thissql
, "%sGRANT %s ON %s ",
255 prefix
, privs
->data
, type
);
256 if (nspname
&& *nspname
)
257 appendPQExpBuffer(thissql
, "%s.", fmtId(nspname
));
259 appendPQExpBuffer(thissql
, "%s ", name
);
260 appendPQExpBufferStr(thissql
, "TO ");
261 if (grantee
->len
== 0)
262 appendPQExpBufferStr(thissql
, "PUBLIC;\n");
264 appendPQExpBuffer(thissql
, "%s;\n", fmtId(grantee
->data
));
266 if (privswgo
->len
> 0)
268 appendPQExpBuffer(thissql
, "%sGRANT %s ON %s ",
269 prefix
, privswgo
->data
, type
);
270 if (nspname
&& *nspname
)
271 appendPQExpBuffer(thissql
, "%s.", fmtId(nspname
));
273 appendPQExpBuffer(thissql
, "%s ", name
);
274 appendPQExpBufferStr(thissql
, "TO ");
275 if (grantee
->len
== 0)
276 appendPQExpBufferStr(thissql
, "PUBLIC");
278 appendPQExpBufferStr(thissql
, fmtId(grantee
->data
));
279 appendPQExpBufferStr(thissql
, " WITH GRANT OPTION;\n");
283 && (!owner
|| strcmp(owner
, grantor
->data
) != 0))
284 appendPQExpBufferStr(thissql
, "RESET SESSION AUTHORIZATION;\n");
289 /* parseAclItem failed, give up */
295 destroyPQExpBuffer(grantee
);
296 destroyPQExpBuffer(grantor
);
297 destroyPQExpBuffer(privs
);
298 destroyPQExpBuffer(privswgo
);
300 appendPQExpBuffer(sql
, "%s%s", firstsql
->data
, secondsql
->data
);
301 destroyPQExpBuffer(firstsql
);
302 destroyPQExpBuffer(secondsql
);
313 * Build ALTER DEFAULT PRIVILEGES command(s) for a single pg_default_acl entry.
315 * type: the object type (TABLES, FUNCTIONS, etc)
316 * nspname: schema name, or NULL for global default privileges
317 * acls: the ACL string fetched from the database
318 * acldefault: the appropriate default ACL for the object type and owner
319 * owner: username of privileges owner (will be passed through fmtId)
320 * remoteVersion: version of database
322 * Returns true if okay, false if could not parse the acl string.
323 * The resulting commands (if any) are appended to the contents of 'sql'.
326 buildDefaultACLCommands(const char *type
, const char *nspname
,
327 const char *acls
, const char *acldefault
,
334 prefix
= createPQExpBuffer();
337 * We incorporate the target role directly into the command, rather than
338 * playing around with SET ROLE or anything like that. This is so that a
339 * permissions error leads to nothing happening, rather than changing
340 * default privileges for the wrong user.
342 appendPQExpBuffer(prefix
, "ALTER DEFAULT PRIVILEGES FOR ROLE %s ",
345 appendPQExpBuffer(prefix
, "IN SCHEMA %s ", fmtId(nspname
));
348 * There's no such thing as initprivs for a default ACL, so the base ACL
349 * is always just the object-type-specific default.
351 if (!buildACLCommands("", NULL
, NULL
, type
,
352 acls
, acldefault
, owner
,
353 prefix
->data
, remoteVersion
, sql
))
355 destroyPQExpBuffer(prefix
);
359 destroyPQExpBuffer(prefix
);
365 * This will parse an aclitem string, having the general form
366 * username=privilegecodes/grantor
368 * Returns true on success, false on parse error. On success, the components
369 * of the string are returned in the PQExpBuffer parameters.
371 * The returned grantee string will be the dequoted username, or an empty
372 * string in the case of a grant to PUBLIC. The returned grantor is the
373 * dequoted grantor name. Privilege characters are translated to GRANT/REVOKE
374 * comma-separated privileges lists. If "privswgo" is non-NULL, the result is
375 * separate lists for privileges with grant option ("privswgo") and without
376 * ("privs"). Otherwise, "privs" bears every relevant privilege, ignoring the
377 * grant option distinction.
379 * Note: for cross-version compatibility, it's important to use ALL to
380 * represent the privilege sets whenever appropriate.
383 parseAclItem(const char *item
, const char *type
,
384 const char *name
, const char *subname
, int remoteVersion
,
385 PQExpBuffer grantee
, PQExpBuffer grantor
,
386 PQExpBuffer privs
, PQExpBuffer privswgo
)
389 bool all_with_go
= true;
390 bool all_without_go
= true;
395 buf
= pg_strdup(item
);
397 /* user or group name is string up to = */
398 eqpos
= dequoteAclUserName(grantee
, buf
);
405 /* grantor should appear after / */
406 slpos
= strchr(eqpos
+ 1, '/');
410 slpos
= dequoteAclUserName(grantor
, slpos
);
423 /* privilege codes */
424 #define CONVERT_PRIV(code, keywd) \
426 if ((pos = strchr(eqpos + 1, code))) \
428 if (*(pos + 1) == '*' && privswgo != NULL) \
430 AddAcl(privswgo, keywd, subname); \
431 all_without_go = false; \
435 AddAcl(privs, keywd, subname); \
436 all_with_go = false; \
440 all_with_go = all_without_go = false; \
443 resetPQExpBuffer(privs
);
444 resetPQExpBuffer(privswgo
);
446 if (strcmp(type
, "TABLE") == 0 || strcmp(type
, "SEQUENCE") == 0 ||
447 strcmp(type
, "TABLES") == 0 || strcmp(type
, "SEQUENCES") == 0)
449 CONVERT_PRIV('r', "SELECT");
451 if (strcmp(type
, "SEQUENCE") == 0 ||
452 strcmp(type
, "SEQUENCES") == 0)
454 CONVERT_PRIV('U', "USAGE");
458 CONVERT_PRIV('a', "INSERT");
459 CONVERT_PRIV('x', "REFERENCES");
460 /* rest are not applicable to columns */
463 CONVERT_PRIV('d', "DELETE");
464 CONVERT_PRIV('t', "TRIGGER");
465 CONVERT_PRIV('D', "TRUNCATE");
466 CONVERT_PRIV('m', "MAINTAIN");
471 CONVERT_PRIV('w', "UPDATE");
473 else if (strcmp(type
, "FUNCTION") == 0 ||
474 strcmp(type
, "FUNCTIONS") == 0)
475 CONVERT_PRIV('X', "EXECUTE");
476 else if (strcmp(type
, "PROCEDURE") == 0 ||
477 strcmp(type
, "PROCEDURES") == 0)
478 CONVERT_PRIV('X', "EXECUTE");
479 else if (strcmp(type
, "LANGUAGE") == 0)
480 CONVERT_PRIV('U', "USAGE");
481 else if (strcmp(type
, "SCHEMA") == 0 ||
482 strcmp(type
, "SCHEMAS") == 0)
484 CONVERT_PRIV('C', "CREATE");
485 CONVERT_PRIV('U', "USAGE");
487 else if (strcmp(type
, "DATABASE") == 0)
489 CONVERT_PRIV('C', "CREATE");
490 CONVERT_PRIV('c', "CONNECT");
491 CONVERT_PRIV('T', "TEMPORARY");
493 else if (strcmp(type
, "TABLESPACE") == 0)
494 CONVERT_PRIV('C', "CREATE");
495 else if (strcmp(type
, "TYPE") == 0 ||
496 strcmp(type
, "TYPES") == 0)
497 CONVERT_PRIV('U', "USAGE");
498 else if (strcmp(type
, "FOREIGN DATA WRAPPER") == 0)
499 CONVERT_PRIV('U', "USAGE");
500 else if (strcmp(type
, "FOREIGN SERVER") == 0)
501 CONVERT_PRIV('U', "USAGE");
502 else if (strcmp(type
, "FOREIGN TABLE") == 0)
503 CONVERT_PRIV('r', "SELECT");
504 else if (strcmp(type
, "PARAMETER") == 0)
506 CONVERT_PRIV('s', "SET");
507 CONVERT_PRIV('A', "ALTER SYSTEM");
509 else if (strcmp(type
, "LARGE OBJECT") == 0)
511 CONVERT_PRIV('r', "SELECT");
512 CONVERT_PRIV('w', "UPDATE");
521 resetPQExpBuffer(privs
);
522 printfPQExpBuffer(privswgo
, "ALL");
524 appendPQExpBuffer(privswgo
, "(%s)", subname
);
526 else if (all_without_go
)
528 resetPQExpBuffer(privswgo
);
529 printfPQExpBuffer(privs
, "ALL");
531 appendPQExpBuffer(privs
, "(%s)", subname
);
540 * Transfer the role name at *input into the output buffer, adding
541 * quoting according to the same rules as putid() in backend's acl.c.
544 quoteAclUserName(PQExpBuffer output
, const char *input
)
549 for (src
= input
; *src
; src
++)
551 /* This test had better match what putid() does */
552 if (!isalnum((unsigned char) *src
) && *src
!= '_')
559 appendPQExpBufferChar(output
, '"');
560 for (src
= input
; *src
; src
++)
562 /* A double quote character in a username is encoded as "" */
564 appendPQExpBufferChar(output
, '"');
565 appendPQExpBufferChar(output
, *src
);
568 appendPQExpBufferChar(output
, '"');
572 * Transfer a user or group name starting at *input into the output buffer,
573 * dequoting if needed. Returns a pointer to just past the input name.
574 * The name is taken to end at an unquoted '=' or end of string.
575 * Note: unlike quoteAclUserName(), this first clears the output buffer.
578 dequoteAclUserName(PQExpBuffer output
, char *input
)
580 resetPQExpBuffer(output
);
582 while (*input
&& *input
!= '=')
585 * If user name isn't quoted, then just add it to the output buffer
588 appendPQExpBufferChar(output
, *input
++);
591 /* Otherwise, it's a quoted username */
593 /* Loop until we come across an unescaped quote */
594 while (!(*input
== '"' && *(input
+ 1) != '"'))
597 return input
; /* really a syntax error... */
600 * Quoting convention is to escape " as "". Keep this code in
601 * sync with putid() in backend's acl.c.
603 if (*input
== '"' && *(input
+ 1) == '"')
605 appendPQExpBufferChar(output
, *input
++);
614 * Append a privilege keyword to a keyword list, inserting comma if needed.
617 AddAcl(PQExpBuffer aclbuf
, const char *keyword
, const char *subname
)
620 appendPQExpBufferChar(aclbuf
, ',');
621 appendPQExpBufferStr(aclbuf
, keyword
);
623 appendPQExpBuffer(aclbuf
, "(%s)", subname
);
628 * buildShSecLabelQuery
630 * Build a query to retrieve security labels for a shared object.
631 * The object is identified by its OID plus the name of the catalog
632 * it can be found in (e.g., "pg_database" for database names).
633 * The query is appended to "sql". (We don't execute it here so as to
634 * keep this file free of assumptions about how to deal with SQL errors.)
637 buildShSecLabelQuery(const char *catalog_name
, Oid objectId
,
640 appendPQExpBuffer(sql
,
641 "SELECT provider, label FROM pg_catalog.pg_shseclabel "
642 "WHERE classoid = 'pg_catalog.%s'::pg_catalog.regclass "
643 "AND objoid = '%u'", catalog_name
, objectId
);
649 * Construct SECURITY LABEL commands using the data retrieved by the query
650 * generated by buildShSecLabelQuery, and append them to "buffer".
651 * Here, the target object is identified by its type name (e.g. "DATABASE")
652 * and its name (not pre-quoted).
655 emitShSecLabels(PGconn
*conn
, PGresult
*res
, PQExpBuffer buffer
,
656 const char *objtype
, const char *objname
)
660 for (i
= 0; i
< PQntuples(res
); i
++)
662 char *provider
= PQgetvalue(res
, i
, 0);
663 char *label
= PQgetvalue(res
, i
, 1);
665 /* must use fmtId result before calling it again */
666 appendPQExpBuffer(buffer
,
667 "SECURITY LABEL FOR %s ON %s",
668 fmtId(provider
), objtype
);
669 appendPQExpBuffer(buffer
,
672 appendStringLiteralConn(buffer
, label
, conn
);
673 appendPQExpBufferStr(buffer
, ";\n");
679 * Detect whether the given GUC variable is of GUC_LIST_QUOTE type.
681 * It'd be better if we could inquire this directly from the backend; but even
682 * if there were a function for that, it could only tell us about variables
683 * currently known to guc.c, so that it'd be unsafe for extensions to declare
684 * GUC_LIST_QUOTE variables anyway. Lacking a solution for that, it doesn't
685 * seem worth the work to do more than have this list, which must be kept in
686 * sync with the variables actually marked GUC_LIST_QUOTE in guc_tables.c.
689 variable_is_guc_list_quote(const char *name
)
691 if (pg_strcasecmp(name
, "local_preload_libraries") == 0 ||
692 pg_strcasecmp(name
, "search_path") == 0 ||
693 pg_strcasecmp(name
, "session_preload_libraries") == 0 ||
694 pg_strcasecmp(name
, "shared_preload_libraries") == 0 ||
695 pg_strcasecmp(name
, "temp_tablespaces") == 0 ||
696 pg_strcasecmp(name
, "unix_socket_directories") == 0)
703 * SplitGUCList --- parse a string containing identifiers or file names
705 * This is used to split the value of a GUC_LIST_QUOTE GUC variable, without
706 * presuming whether the elements will be taken as identifiers or file names.
707 * See comparable code in src/backend/utils/adt/varlena.c.
710 * rawstring: the input string; must be overwritable! On return, it's
711 * been modified to contain the separated identifiers.
712 * separator: the separator punctuation expected between identifiers
713 * (typically '.' or ','). Whitespace may also appear around
716 * namelist: receives a malloc'd, null-terminated array of pointers to
717 * identifiers within rawstring. Caller should free this
718 * even on error return.
720 * Returns true if okay, false if there is a syntax error in the string.
723 SplitGUCList(char *rawstring
, char separator
,
726 char *nextp
= rawstring
;
731 * Since we disallow empty identifiers, this is a conservative
732 * overestimate of the number of pointers we could need. Allow one for
735 *namelist
= nextptr
= (char **)
736 pg_malloc((strlen(rawstring
) / 2 + 2) * sizeof(char *));
739 while (isspace((unsigned char) *nextp
))
740 nextp
++; /* skip leading whitespace */
743 return true; /* allow empty string */
745 /* At the top of the loop, we are at start of a new identifier. */
753 /* Quoted name --- collapse quote-quote pairs */
757 endp
= strchr(nextp
+ 1, '"');
759 return false; /* mismatched quotes */
761 break; /* found end of quoted name */
762 /* Collapse adjacent quotes into one quote, and look again */
763 memmove(endp
, endp
+ 1, strlen(endp
));
766 /* endp now points at the terminating quote */
771 /* Unquoted name --- extends to separator or whitespace */
773 while (*nextp
&& *nextp
!= separator
&&
774 !isspace((unsigned char) *nextp
))
777 if (curname
== nextp
)
778 return false; /* empty unquoted name not allowed */
781 while (isspace((unsigned char) *nextp
))
782 nextp
++; /* skip trailing whitespace */
784 if (*nextp
== separator
)
787 while (isspace((unsigned char) *nextp
))
788 nextp
++; /* skip leading whitespace for next */
789 /* we expect another name, so done remains false */
791 else if (*nextp
== '\0')
794 return false; /* invalid syntax */
796 /* Now safe to overwrite separator with a null */
800 * Finished isolating current name --- add it to output array
802 *nextptr
++ = curname
;
804 /* Loop back if we didn't reach end of string */
812 * Helper function for dumping "ALTER DATABASE/ROLE SET ..." commands.
814 * Parse the contents of configitem (a "name=value" string), wrap it in
815 * a complete ALTER command, and append it to buf.
817 * type is DATABASE or ROLE, and name is the name of the database or role.
818 * If we need an "IN" clause, type2 and name2 similarly define what to put
819 * there; otherwise they should be NULL.
820 * conn is used only to determine string-literal quoting conventions.
823 makeAlterConfigCommand(PGconn
*conn
, const char *configitem
,
824 const char *type
, const char *name
,
825 const char *type2
, const char *name2
,
831 /* Parse the configitem. If we can't find an "=", silently do nothing. */
832 mine
= pg_strdup(configitem
);
833 pos
= strchr(mine
, '=');
841 /* Build the command, with suitable quoting for everything. */
842 appendPQExpBuffer(buf
, "ALTER %s %s ", type
, fmtId(name
));
843 if (type2
!= NULL
&& name2
!= NULL
)
844 appendPQExpBuffer(buf
, "IN %s %s ", type2
, fmtId(name2
));
845 appendPQExpBuffer(buf
, "SET %s TO ", fmtId(mine
));
848 * Variables that are marked GUC_LIST_QUOTE were already fully quoted by
849 * flatten_set_variable_args() before they were put into the setconfig
850 * array. However, because the quoting rules used there aren't exactly
851 * like SQL's, we have to break the list value apart and then quote the
852 * elements as string literals. (The elements may be double-quoted as-is,
853 * but we can't just feed them to the SQL parser; it would do the wrong
854 * thing with elements that are zero-length or longer than NAMEDATALEN.)
856 * Variables that are not so marked should just be emitted as simple
857 * string literals. If the variable is not known to
858 * variable_is_guc_list_quote(), we'll do that; this makes it unsafe to
859 * use GUC_LIST_QUOTE for extension variables.
861 if (variable_is_guc_list_quote(mine
))
866 /* Parse string into list of identifiers */
867 /* this shouldn't fail really */
868 if (SplitGUCList(pos
, ',', &namelist
))
870 for (nameptr
= namelist
; *nameptr
; nameptr
++)
872 if (nameptr
!= namelist
)
873 appendPQExpBufferStr(buf
, ", ");
874 appendStringLiteralConn(buf
, *nameptr
, conn
);
880 appendStringLiteralConn(buf
, pos
, conn
);
882 appendPQExpBufferStr(buf
, ";\n");