1 /*-------------------------------------------------------------------------
3 * String-processing utility routines for frontend code
5 * Assorted utility functions that are useful in constructing SQL queries
6 * and interpreting backend output.
9 * Portions Copyright (c) 1996-2021, PostgreSQL Global Development Group
10 * Portions Copyright (c) 1994, Regents of the University of California
12 * src/fe_utils/string_utils.c
14 *-------------------------------------------------------------------------
16 #include "postgres_fe.h"
20 #include "common/keywords.h"
21 #include "fe_utils/string_utils.h"
23 static PQExpBuffer
defaultGetLocalPQExpBuffer(void);
25 /* Globals exported by this file */
26 int quote_all_identifiers
= 0;
27 PQExpBuffer (*getLocalPQExpBuffer
) (void) = defaultGetLocalPQExpBuffer
;
31 * Returns a temporary PQExpBuffer, valid until the next call to the function.
32 * This is used by fmtId and fmtQualifiedId.
34 * Non-reentrant and non-thread-safe but reduces memory leakage. You can
35 * replace this with a custom version by setting the getLocalPQExpBuffer
39 defaultGetLocalPQExpBuffer(void)
41 static PQExpBuffer id_return
= NULL
;
43 if (id_return
) /* first time through? */
45 /* same buffer, just wipe contents */
46 resetPQExpBuffer(id_return
);
51 id_return
= createPQExpBuffer();
58 * Quotes input string if it's not a legitimate SQL identifier as-is.
60 * Note that the returned string must be used before calling fmtId again,
61 * since we re-use the same return buffer each time.
64 fmtId(const char *rawid
)
66 PQExpBuffer id_return
= getLocalPQExpBuffer();
69 bool need_quotes
= false;
72 * These checks need to match the identifier production in scan.l. Don't
75 if (quote_all_identifiers
)
77 /* slightly different rules for first character */
78 else if (!((rawid
[0] >= 'a' && rawid
[0] <= 'z') || rawid
[0] == '_'))
82 /* otherwise check the entire string */
83 for (cp
= rawid
; *cp
; cp
++)
85 if (!((*cp
>= 'a' && *cp
<= 'z')
86 || (*cp
>= '0' && *cp
<= '9')
98 * Check for keyword. We quote keywords except for unreserved ones.
99 * (In some cases we could avoid quoting a col_name or type_func_name
100 * keyword, but it seems much harder than it's worth to tell that.)
102 * Note: ScanKeywordLookup() does case-insensitive comparison, but
103 * that's fine, since we already know we have all-lower-case.
105 int kwnum
= ScanKeywordLookup(rawid
, &ScanKeywords
);
107 if (kwnum
>= 0 && ScanKeywordCategories
[kwnum
] != UNRESERVED_KEYWORD
)
113 /* no quoting needed */
114 appendPQExpBufferStr(id_return
, rawid
);
118 appendPQExpBufferChar(id_return
, '"');
119 for (cp
= rawid
; *cp
; cp
++)
122 * Did we find a double-quote in the string? Then make this a
123 * double double-quote per SQL99. Before, we put in a
124 * backslash/double-quote pair. - thomas 2000-08-05
127 appendPQExpBufferChar(id_return
, '"');
128 appendPQExpBufferChar(id_return
, *cp
);
130 appendPQExpBufferChar(id_return
, '"');
133 return id_return
->data
;
137 * fmtQualifiedId - construct a schema-qualified name, with quoting as needed.
139 * Like fmtId, use the result before calling again.
141 * Since we call fmtId and it also uses getLocalPQExpBuffer() we cannot
142 * use that buffer until we're finished with calling fmtId().
145 fmtQualifiedId(const char *schema
, const char *id
)
147 PQExpBuffer id_return
;
148 PQExpBuffer lcl_pqexp
= createPQExpBuffer();
150 /* Some callers might fail to provide a schema name */
151 if (schema
&& *schema
)
153 appendPQExpBuffer(lcl_pqexp
, "%s.", fmtId(schema
));
155 appendPQExpBufferStr(lcl_pqexp
, fmtId(id
));
157 id_return
= getLocalPQExpBuffer();
159 appendPQExpBufferStr(id_return
, lcl_pqexp
->data
);
160 destroyPQExpBuffer(lcl_pqexp
);
162 return id_return
->data
;
167 * Format a Postgres version number (in the PG_VERSION_NUM integer format
168 * returned by PQserverVersion()) as a string. This exists mainly to
169 * encapsulate knowledge about two-part vs. three-part version numbers.
171 * For reentrancy, caller must supply the buffer the string is put in.
172 * Recommended size of the buffer is 32 bytes.
174 * Returns address of 'buf', as a notational convenience.
177 formatPGVersionNumber(int version_number
, bool include_minor
,
178 char *buf
, size_t buflen
)
180 if (version_number
>= 100000)
182 /* New two-part style */
184 snprintf(buf
, buflen
, "%d.%d", version_number
/ 10000,
185 version_number
% 10000);
187 snprintf(buf
, buflen
, "%d", version_number
/ 10000);
191 /* Old three-part style */
193 snprintf(buf
, buflen
, "%d.%d.%d", version_number
/ 10000,
194 (version_number
/ 100) % 100,
195 version_number
% 100);
197 snprintf(buf
, buflen
, "%d.%d", version_number
/ 10000,
198 (version_number
/ 100) % 100);
205 * Convert a string value to an SQL string literal and append it to
206 * the given buffer. We assume the specified client_encoding and
207 * standard_conforming_strings settings.
209 * This is essentially equivalent to libpq's PQescapeStringInternal,
210 * except for the output buffer structure. We need it in situations
211 * where we do not have a PGconn available. Where we do,
212 * appendStringLiteralConn is a better choice.
215 appendStringLiteral(PQExpBuffer buf
, const char *str
,
216 int encoding
, bool std_strings
)
218 size_t length
= strlen(str
);
219 const char *source
= str
;
222 if (!enlargePQExpBuffer(buf
, 2 * length
+ 2))
225 target
= buf
->data
+ buf
->len
;
228 while (*source
!= '\0')
234 /* Fast path for plain ASCII */
235 if (!IS_HIGHBIT_SET(c
))
237 /* Apply quoting if needed */
238 if (SQL_STR_DOUBLE(c
, !std_strings
))
240 /* Copy the character */
246 /* Slow path for possible multibyte characters */
247 len
= PQmblen(source
, encoding
);
249 /* Copy the character */
250 for (i
= 0; i
< len
; i
++)
254 *target
++ = *source
++;
258 * If we hit premature end of string (ie, incomplete multibyte
259 * character), try to pad out to the correct length with spaces. We
260 * may not be able to pad completely, but we will always be able to
261 * insert at least one pad space (since we'd not have quoted a
262 * multibyte character). This should be enough to make a string that
263 * the server will error out on.
267 char *stop
= buf
->data
+ buf
->maxlen
- 2;
279 /* Write the terminating quote and NUL character. */
283 buf
->len
= target
- buf
->data
;
288 * Convert a string value to an SQL string literal and append it to
289 * the given buffer. Encoding and string syntax rules are as indicated
290 * by current settings of the PGconn.
293 appendStringLiteralConn(PQExpBuffer buf
, const char *str
, PGconn
*conn
)
295 size_t length
= strlen(str
);
298 * XXX This is a kluge to silence escape_string_warning in our utility
299 * programs. It should go away someday.
301 if (strchr(str
, '\\') != NULL
&& PQserverVersion(conn
) >= 80100)
303 /* ensure we are not adjacent to an identifier */
304 if (buf
->len
> 0 && buf
->data
[buf
->len
- 1] != ' ')
305 appendPQExpBufferChar(buf
, ' ');
306 appendPQExpBufferChar(buf
, ESCAPE_STRING_SYNTAX
);
307 appendStringLiteral(buf
, str
, PQclientEncoding(conn
), false);
312 if (!enlargePQExpBuffer(buf
, 2 * length
+ 2))
314 appendPQExpBufferChar(buf
, '\'');
315 buf
->len
+= PQescapeStringConn(conn
, buf
->data
+ buf
->len
,
317 appendPQExpBufferChar(buf
, '\'');
322 * Convert a string value to a dollar quoted literal and append it to
323 * the given buffer. If the dqprefix parameter is not NULL then the
324 * dollar quote delimiter will begin with that (after the opening $).
326 * No escaping is done at all on str, in compliance with the rules
327 * for parsing dollar quoted strings. Also, we need not worry about
331 appendStringLiteralDQ(PQExpBuffer buf
, const char *str
, const char *dqprefix
)
333 static const char suffixes
[] = "_XXXXXXX";
335 PQExpBuffer delimBuf
= createPQExpBuffer();
337 /* start with $ + dqprefix if not NULL */
338 appendPQExpBufferChar(delimBuf
, '$');
340 appendPQExpBufferStr(delimBuf
, dqprefix
);
343 * Make sure we choose a delimiter which (without the trailing $) is not
344 * present in the string being quoted. We don't check with the trailing $
345 * because a string ending in $foo must not be quoted with $foo$.
347 while (strstr(str
, delimBuf
->data
) != NULL
)
349 appendPQExpBufferChar(delimBuf
, suffixes
[nextchar
++]);
350 nextchar
%= sizeof(suffixes
) - 1;
354 appendPQExpBufferChar(delimBuf
, '$');
356 /* quote it and we are all done */
357 appendPQExpBufferStr(buf
, delimBuf
->data
);
358 appendPQExpBufferStr(buf
, str
);
359 appendPQExpBufferStr(buf
, delimBuf
->data
);
361 destroyPQExpBuffer(delimBuf
);
366 * Convert a bytea value (presented as raw bytes) to an SQL string literal
367 * and append it to the given buffer. We assume the specified
368 * standard_conforming_strings setting.
370 * This is needed in situations where we do not have a PGconn available.
371 * Where we do, PQescapeByteaConn is a better choice.
374 appendByteaLiteral(PQExpBuffer buf
, const unsigned char *str
, size_t length
,
377 const unsigned char *source
= str
;
380 static const char hextbl
[] = "0123456789abcdef";
383 * This implementation is hard-wired to produce hex-format output. We do
384 * not know the server version the output will be loaded into, so making
385 * an intelligent format choice is impossible. It might be better to
386 * always use the old escaped format.
388 if (!enlargePQExpBuffer(buf
, 2 * length
+ 5))
391 target
= buf
->data
+ buf
->len
;
400 unsigned char c
= *source
++;
402 *target
++ = hextbl
[(c
>> 4) & 0xF];
403 *target
++ = hextbl
[c
& 0xF];
406 /* Write the terminating quote and NUL character. */
410 buf
->len
= target
- buf
->data
;
415 * Append the given string to the shell command being built in the buffer,
416 * with shell-style quoting as needed to create exactly one argument.
418 * Forbid LF or CR characters, which have scant practical use beyond designing
419 * security breaches. The Windows command shell is unusable as a conduit for
420 * arguments containing LF or CR characters. A future major release should
421 * reject those characters in CREATE ROLE and CREATE DATABASE, because use
422 * there eventually leads to errors here.
424 * appendShellString() simply prints an error and dies if LF or CR appears.
425 * appendShellStringNoError() omits those characters from the result, and
426 * returns false if there were any.
429 appendShellString(PQExpBuffer buf
, const char *str
)
431 if (!appendShellStringNoError(buf
, str
))
434 _("shell command argument contains a newline or carriage return: \"%s\"\n"),
441 appendShellStringNoError(PQExpBuffer buf
, const char *str
)
444 int backslash_run_length
= 0;
450 * Don't bother with adding quotes if the string is nonempty and clearly
451 * contains only safe characters.
454 strspn(str
, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_./:") == strlen(str
))
456 appendPQExpBufferStr(buf
, str
);
461 appendPQExpBufferChar(buf
, '\'');
462 for (p
= str
; *p
; p
++)
464 if (*p
== '\n' || *p
== '\r')
471 appendPQExpBufferStr(buf
, "'\"'\"'");
473 appendPQExpBufferChar(buf
, *p
);
475 appendPQExpBufferChar(buf
, '\'');
479 * A Windows system() argument experiences two layers of interpretation.
480 * First, cmd.exe interprets the string. Its behavior is undocumented,
481 * but a caret escapes any byte except LF or CR that would otherwise have
482 * special meaning. Handling of a caret before LF or CR differs between
483 * "cmd.exe /c" and other modes, and it is unusable here.
485 * Second, the new process parses its command line to construct argv (see
486 * https://msdn.microsoft.com/en-us/library/17w5ykft.aspx). This treats
487 * backslash-double quote sequences specially.
489 appendPQExpBufferStr(buf
, "^\"");
490 for (p
= str
; *p
; p
++)
492 if (*p
== '\n' || *p
== '\r')
498 /* Change N backslashes before a double quote to 2N+1 backslashes. */
501 while (backslash_run_length
)
503 appendPQExpBufferStr(buf
, "^\\");
504 backslash_run_length
--;
506 appendPQExpBufferStr(buf
, "^\\");
509 backslash_run_length
++;
511 backslash_run_length
= 0;
514 * Decline to caret-escape the most mundane characters, to ease
515 * debugging and lest we approach the command length limit.
517 if (!((*p
>= 'a' && *p
<= 'z') ||
518 (*p
>= 'A' && *p
<= 'Z') ||
519 (*p
>= '0' && *p
<= '9')))
520 appendPQExpBufferChar(buf
, '^');
521 appendPQExpBufferChar(buf
, *p
);
525 * Change N backslashes at end of argument to 2N backslashes, because they
526 * precede the double quote that terminates the argument.
528 while (backslash_run_length
)
530 appendPQExpBufferStr(buf
, "^\\");
531 backslash_run_length
--;
533 appendPQExpBufferStr(buf
, "^\"");
541 * Append the given string to the buffer, with suitable quoting for passing
542 * the string as a value in a keyword/value pair in a libpq connection string.
545 appendConnStrVal(PQExpBuffer buf
, const char *str
)
551 * If the string is one or more plain ASCII characters, no need to quote
552 * it. This is quite conservative, but better safe than sorry.
555 for (s
= str
; *s
; s
++)
557 if (!((*s
>= 'a' && *s
<= 'z') || (*s
>= 'A' && *s
<= 'Z') ||
558 (*s
>= '0' && *s
<= '9') || *s
== '_' || *s
== '.'))
568 appendPQExpBufferChar(buf
, '\'');
571 /* ' and \ must be escaped by to \' and \\ */
572 if (*str
== '\'' || *str
== '\\')
573 appendPQExpBufferChar(buf
, '\\');
575 appendPQExpBufferChar(buf
, *str
);
578 appendPQExpBufferChar(buf
, '\'');
581 appendPQExpBufferStr(buf
, str
);
586 * Append a psql meta-command that connects to the given database with the
587 * then-current connection's user, host and port.
590 appendPsqlMetaConnect(PQExpBuffer buf
, const char *dbname
)
596 * If the name is plain ASCII characters, emit a trivial "\connect "foo"".
597 * For other names, even many not technically requiring it, skip to the
598 * general case. No database has a zero-length name.
602 for (s
= dbname
; *s
; s
++)
604 if (*s
== '\n' || *s
== '\r')
607 _("database name contains a newline or carriage return: \"%s\"\n"),
612 if (!((*s
>= 'a' && *s
<= 'z') || (*s
>= 'A' && *s
<= 'Z') ||
613 (*s
>= '0' && *s
<= '9') || *s
== '_' || *s
== '.'))
619 appendPQExpBufferStr(buf
, "\\connect ");
622 PQExpBufferData connstr
;
624 initPQExpBuffer(&connstr
);
625 appendPQExpBufferStr(&connstr
, "dbname=");
626 appendConnStrVal(&connstr
, dbname
);
628 appendPQExpBufferStr(buf
, "-reuse-previous=on ");
631 * As long as the name does not contain a newline, SQL identifier
632 * quoting satisfies the psql meta-command parser. Prefer not to
633 * involve psql-interpreted single quotes, which behaved differently
634 * before PostgreSQL 9.2.
636 appendPQExpBufferStr(buf
, fmtId(connstr
.data
));
638 termPQExpBuffer(&connstr
);
641 appendPQExpBufferStr(buf
, fmtId(dbname
));
642 appendPQExpBufferChar(buf
, '\n');
647 * Deconstruct the text representation of a 1-dimensional Postgres array
648 * into individual items.
650 * On success, returns true and sets *itemarray and *nitems to describe
651 * an array of individual strings. On parse failure, returns false;
652 * *itemarray may exist or be NULL.
654 * NOTE: free'ing itemarray is sufficient to deallocate the working storage.
657 parsePGArray(const char *atext
, char ***itemarray
, int *nitems
)
665 * We expect input in the form of "{item,item,item}" where any item is
666 * either raw data, or surrounded by double quotes (in which case embedded
667 * characters including backslashes and quotes are backslashed).
669 * We build the result as an array of pointers followed by the actual
670 * string data, all in one malloc block for convenience of deallocation.
671 * The worst-case storage need is not more than one pointer and one
672 * character for each input character (consider "{,,,,,,,,,,}").
676 inputlen
= strlen(atext
);
677 if (inputlen
< 2 || atext
[0] != '{' || atext
[inputlen
- 1] != '}')
678 return false; /* bad input */
679 items
= (char **) malloc(inputlen
* (sizeof(char *) + sizeof(char)));
681 return false; /* out of memory */
683 strings
= (char *) (items
+ inputlen
);
685 atext
++; /* advance over initial '{' */
687 while (*atext
!= '}')
690 return false; /* premature end of string */
691 items
[curitem
] = strings
;
692 while (*atext
!= '}' && *atext
!= ',')
695 return false; /* premature end of string */
697 *strings
++ = *atext
++; /* copy unquoted data */
700 /* process quoted substring */
702 while (*atext
!= '"')
705 return false; /* premature end of string */
710 return false; /* premature end of string */
712 *strings
++ = *atext
++; /* copy quoted data */
722 if (atext
[1] != '\0')
723 return false; /* bogus syntax (embedded '}') */
730 * Format a reloptions array and append it to the given buffer.
732 * "prefix" is prepended to the option names; typically it's "" or "toast.".
734 * Returns false if the reloptions array could not be parsed (in which case
735 * nothing will have been appended to the buffer), or true on success.
737 * Note: this logic should generally match the backend's flatten_reloptions()
738 * (in adt/ruleutils.c).
741 appendReloptionsArray(PQExpBuffer buffer
, const char *reloptions
,
742 const char *prefix
, int encoding
, bool std_strings
)
748 if (!parsePGArray(reloptions
, &options
, &noptions
))
755 for (i
= 0; i
< noptions
; i
++)
757 char *option
= options
[i
];
763 * Each array element should have the form name=value. If the "=" is
764 * missing for some reason, treat it like an empty value.
767 separator
= strchr(option
, '=');
771 value
= separator
+ 1;
777 appendPQExpBufferStr(buffer
, ", ");
778 appendPQExpBuffer(buffer
, "%s%s=", prefix
, fmtId(name
));
781 * In general we need to quote the value; but to avoid unnecessary
782 * clutter, do not quote if it is an identifier that would not need
783 * quoting. (We could also allow numbers, but that is a bit trickier
784 * than it looks --- for example, are leading zeroes significant? We
785 * don't want to assume very much here about what custom reloptions
788 if (strcmp(fmtId(value
), value
) == 0)
789 appendPQExpBufferStr(buffer
, value
);
791 appendStringLiteral(buffer
, value
, encoding
, std_strings
);
802 * processSQLNamePattern
804 * Scan a wildcard-pattern string and generate appropriate WHERE clauses
805 * to limit the set of objects returned. The WHERE clauses are appended
806 * to the already-partially-constructed query in buf. Returns whether
807 * any clause was added.
809 * conn: connection query will be sent to (consulted for escaping rules).
810 * buf: output parameter.
811 * pattern: user-specified pattern option, or NULL if none ("*" is implied).
812 * have_where: true if caller already emitted "WHERE" (clauses will be ANDed
813 * onto the existing WHERE clause).
814 * force_escape: always quote regexp special characters, even outside
815 * double quotes (else they are quoted only between double quotes).
816 * schemavar: name of query variable to match against a schema-name pattern.
817 * Can be NULL if no schema.
818 * namevar: name of query variable to match against an object-name pattern.
819 * altnamevar: NULL, or name of an alternative variable to match against name.
820 * visibilityrule: clause to use if we want to restrict to visible objects
821 * (for example, "pg_catalog.pg_table_is_visible(p.oid)"). Can be NULL.
823 * Formatting note: the text already present in buf should end with a newline.
824 * The appended text, if any, will end with one too.
827 processSQLNamePattern(PGconn
*conn
, PQExpBuffer buf
, const char *pattern
,
828 bool have_where
, bool force_escape
,
829 const char *schemavar
, const char *namevar
,
830 const char *altnamevar
, const char *visibilityrule
)
832 PQExpBufferData schemabuf
;
833 PQExpBufferData namebuf
;
834 bool added_clause
= false;
837 (appendPQExpBufferStr(buf, have_where ? " AND " : "WHERE "), \
838 have_where = true, added_clause = true)
842 /* Default: select all visible objects */
846 appendPQExpBuffer(buf
, "%s\n", visibilityrule
);
851 initPQExpBuffer(&schemabuf
);
852 initPQExpBuffer(&namebuf
);
855 * Convert shell-style 'pattern' into the regular expression(s) we want to
856 * execute. Quoting/escaping into SQL literal format will be done below
857 * using appendStringLiteralConn().
859 patternToSQLRegex(PQclientEncoding(conn
), NULL
, &schemabuf
, &namebuf
,
860 pattern
, force_escape
);
863 * Now decide what we need to emit. We may run under a hostile
864 * search_path, so qualify EVERY name. Note there will be a leading "^("
865 * in the patterns in any case.
867 * We want the regex matches to use the database's default collation where
868 * collation-sensitive behavior is required (for example, which characters
869 * match '\w'). That happened by default before PG v12, but if the server
870 * is >= v12 then we need to force it through explicit COLLATE clauses,
871 * otherwise the "C" collation attached to "name" catalog columns wins.
875 /* We have a name pattern, so constrain the namevar(s) */
877 /* Optimize away a "*" pattern */
878 if (strcmp(namebuf
.data
, "^(.*)$") != 0)
883 appendPQExpBuffer(buf
,
884 "(%s OPERATOR(pg_catalog.~) ", namevar
);
885 appendStringLiteralConn(buf
, namebuf
.data
, conn
);
886 if (PQserverVersion(conn
) >= 120000)
887 appendPQExpBufferStr(buf
, " COLLATE pg_catalog.default");
888 appendPQExpBuffer(buf
,
889 "\n OR %s OPERATOR(pg_catalog.~) ",
891 appendStringLiteralConn(buf
, namebuf
.data
, conn
);
892 if (PQserverVersion(conn
) >= 120000)
893 appendPQExpBufferStr(buf
, " COLLATE pg_catalog.default");
894 appendPQExpBufferStr(buf
, ")\n");
898 appendPQExpBuffer(buf
, "%s OPERATOR(pg_catalog.~) ", namevar
);
899 appendStringLiteralConn(buf
, namebuf
.data
, conn
);
900 if (PQserverVersion(conn
) >= 120000)
901 appendPQExpBufferStr(buf
, " COLLATE pg_catalog.default");
902 appendPQExpBufferChar(buf
, '\n');
907 if (schemabuf
.len
> 2)
909 /* We have a schema pattern, so constrain the schemavar */
911 /* Optimize away a "*" pattern */
912 if (strcmp(schemabuf
.data
, "^(.*)$") != 0 && schemavar
)
915 appendPQExpBuffer(buf
, "%s OPERATOR(pg_catalog.~) ", schemavar
);
916 appendStringLiteralConn(buf
, schemabuf
.data
, conn
);
917 if (PQserverVersion(conn
) >= 120000)
918 appendPQExpBufferStr(buf
, " COLLATE pg_catalog.default");
919 appendPQExpBufferChar(buf
, '\n');
924 /* No schema pattern given, so select only visible objects */
928 appendPQExpBuffer(buf
, "%s\n", visibilityrule
);
932 termPQExpBuffer(&schemabuf
);
933 termPQExpBuffer(&namebuf
);
940 * Transform a possibly qualified shell-style object name pattern into up to
941 * three SQL-style regular expressions, converting quotes, lower-casing
942 * unquoted letters, and adjusting shell-style wildcard characters into regexp
945 * If the dbnamebuf and schemabuf arguments are non-NULL, and the pattern
946 * contains two or more dbname/schema/name separators, we parse the portions of
947 * the pattern prior to the first and second separators into dbnamebuf and
948 * schemabuf, and the rest into namebuf. (Additional dots in the name portion
949 * are not treated as special.)
951 * If dbnamebuf is NULL and schemabuf is non-NULL, and the pattern contains at
952 * least one separator, we parse the first portion into schemabuf and the rest
955 * Otherwise, we parse all the pattern into namebuf.
957 * We surround the regexps with "^(...)$" to force them to match whole strings,
958 * as per SQL practice. We have to have parens in case strings contain "|",
959 * else the "^" and "$" will be bound into the first and last alternatives
960 * which is not what we want.
962 * The regexps we parse into the buffers are appended to the data (if any)
963 * already present. If we parse fewer fields than the number of buffers we
964 * were given, the extra buffers are unaltered.
967 patternToSQLRegex(int encoding
, PQExpBuffer dbnamebuf
, PQExpBuffer schemabuf
,
968 PQExpBuffer namebuf
, const char *pattern
, bool force_escape
)
970 PQExpBufferData buf
[3];
977 Assert(pattern
!= NULL
);
978 Assert(namebuf
!= NULL
);
980 /* callers should never expect "dbname.relname" format */
981 Assert(dbnamebuf
== NULL
|| schemabuf
!= NULL
);
986 if (dbnamebuf
!= NULL
)
988 else if (schemabuf
!= NULL
)
994 initPQExpBuffer(curbuf
);
995 appendPQExpBufferStr(curbuf
, "^(");
1002 if (inquotes
&& cp
[1] == '"')
1004 /* emit one quote, stay in inquotes mode */
1005 appendPQExpBufferChar(curbuf
, '"');
1009 inquotes
= !inquotes
;
1012 else if (!inquotes
&& isupper((unsigned char) ch
))
1014 appendPQExpBufferChar(curbuf
,
1015 pg_tolower((unsigned char) ch
));
1018 else if (!inquotes
&& ch
== '*')
1020 appendPQExpBufferStr(curbuf
, ".*");
1023 else if (!inquotes
&& ch
== '?')
1025 appendPQExpBufferChar(curbuf
, '.');
1030 * When we find a dbname/schema/name separator, we treat it specially
1031 * only if the caller requested more patterns to be parsed than we
1032 * have already parsed from the pattern. Otherwise, dot characters
1035 else if (!inquotes
&& ch
== '.' && curbuf
< maxbuf
)
1037 appendPQExpBufferStr(curbuf
, ")$");
1039 initPQExpBuffer(curbuf
);
1040 appendPQExpBufferStr(curbuf
, "^(");
1046 * Dollar is always quoted, whether inside quotes or not. The
1047 * reason is that it's allowed in SQL identifiers, so there's a
1048 * significant use-case for treating it literally, while because
1049 * we anchor the pattern automatically there is no use-case for
1050 * having it possess its regexp meaning.
1052 appendPQExpBufferStr(curbuf
, "\\$");
1058 * Ordinary data character, transfer to pattern
1060 * Inside double quotes, or at all times if force_escape is true,
1061 * quote regexp special characters with a backslash to avoid
1062 * regexp errors. Outside quotes, however, let them pass through
1063 * as-is; this lets knowledgeable users build regexp expressions
1064 * that are more powerful than shell-style patterns.
1066 * As an exception to that, though, always quote "[]", as that's
1067 * much more likely to be an attempt to write an array type name
1068 * than it is to be the start of a regexp bracket expression.
1070 if ((inquotes
|| force_escape
) &&
1071 strchr("|*+?()[]{}.^$\\", ch
))
1072 appendPQExpBufferChar(curbuf
, '\\');
1073 else if (ch
== '[' && cp
[1] == ']')
1074 appendPQExpBufferChar(curbuf
, '\\');
1075 i
= PQmblenBounded(cp
, encoding
);
1077 appendPQExpBufferChar(curbuf
, *cp
++);
1080 appendPQExpBufferStr(curbuf
, ")$");
1082 appendPQExpBufferStr(namebuf
, curbuf
->data
);
1083 termPQExpBuffer(curbuf
);
1088 appendPQExpBufferStr(schemabuf
, curbuf
->data
);
1089 termPQExpBuffer(curbuf
);
1094 appendPQExpBufferStr(dbnamebuf
, curbuf
->data
);
1095 termPQExpBuffer(curbuf
);