Subs-Db-postgresql.php 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846
  1. <?php
  2. /**
  3. * This file has all the main functions in it that relate to the database.
  4. *
  5. * Simple Machines Forum (SMF)
  6. *
  7. * @package SMF
  8. * @author Simple Machines http://www.simplemachines.org
  9. * @copyright 2014 Simple Machines and individual contributors
  10. * @license http://www.simplemachines.org/about/smf/license.php BSD
  11. *
  12. * @version 2.1 Alpha 1
  13. */
  14. if (!defined('SMF'))
  15. die('No direct access...');
  16. /**
  17. * Maps the implementations in this file (smf_db_function_name)
  18. * to the $smcFunc['db_function_name'] variable.
  19. * @see Subs-Db-mysql.php#smf_db_initiate
  20. *
  21. * @param type $db_server
  22. * @param type $db_name
  23. * @param type $db_user
  24. * @param type $db_passwd
  25. * @param type $db_prefix
  26. * @param type $db_options
  27. * @return null
  28. */
  29. function smf_db_initiate($db_server, $db_name, $db_user, $db_passwd, &$db_prefix, $db_options = array())
  30. {
  31. global $smcFunc, $mysql_set_mode;
  32. // Map some database specific functions, only do this once.
  33. if (!isset($smcFunc['db_fetch_assoc']) || $smcFunc['db_fetch_assoc'] != 'postg_fetch_assoc')
  34. $smcFunc += array(
  35. 'db_query' => 'smf_db_query',
  36. 'db_quote' => 'smf_db_quote',
  37. 'db_insert' => 'smf_db_insert',
  38. 'db_insert_id' => 'smf_db_insert_id',
  39. 'db_fetch_assoc' => 'smf_db_fetch_assoc',
  40. 'db_fetch_row' => 'smf_db_fetch_row',
  41. 'db_free_result' => 'pg_free_result',
  42. 'db_num_rows' => 'pg_num_rows',
  43. 'db_data_seek' => 'smf_db_data_seek',
  44. 'db_num_fields' => 'pg_num_fields',
  45. 'db_escape_string' => 'pg_escape_string',
  46. 'db_unescape_string' => 'smf_db_unescape_string',
  47. 'db_server_info' => 'smf_db_version',
  48. 'db_affected_rows' => 'smf_db_affected_rows',
  49. 'db_transaction' => 'smf_db_transaction',
  50. 'db_error' => 'pg_last_error',
  51. 'db_select_db' => 'smf_db_select_db',
  52. 'db_title' => 'PostgreSQL',
  53. 'db_sybase' => true,
  54. 'db_case_sensitive' => true,
  55. 'db_escape_wildcard_string' => 'smf_db_escape_wildcard_string',
  56. );
  57. if (!empty($db_options['persist']))
  58. $connection = @pg_pconnect('host=' . $db_server . ' dbname=' . $db_name . ' user=\'' . $db_user . '\' password=\'' . $db_passwd . '\'');
  59. else
  60. $connection = @pg_connect( 'host=' . $db_server . ' dbname=' . $db_name . ' user=\'' . $db_user . '\' password=\'' . $db_passwd . '\'');
  61. // Something's wrong, show an error if its fatal (which we assume it is)
  62. if (!$connection)
  63. {
  64. if (!empty($db_options['non_fatal']))
  65. {
  66. return null;
  67. }
  68. else
  69. {
  70. display_db_error();
  71. }
  72. }
  73. return $connection;
  74. }
  75. /**
  76. * Extend the database functionality. It calls the respective file's init
  77. * to add the implementations in that file to $smcFunc array.
  78. *
  79. * @param string $type = 'extra'
  80. */
  81. function db_extend ($type = 'extra')
  82. {
  83. global $sourcedir, $db_type;
  84. require_once($sourcedir . '/Db' . strtoupper($type[0]) . substr($type, 1) . '-' . $db_type . '.php');
  85. $initFunc = 'db_' . $type . '_init';
  86. $initFunc();
  87. }
  88. /**
  89. * Fix the database prefix if necessary.
  90. * Do nothing on postgreSQL
  91. *
  92. * @param type $db_prefix
  93. * @param type $db_name
  94. * @return type
  95. */
  96. function db_fix_prefix (&$db_prefix, $db_name)
  97. {
  98. return;
  99. }
  100. /**
  101. * Callback for preg_replace_calback on the query.
  102. * It allows to replace on the fly a few pre-defined strings, for
  103. * convenience ('query_see_board', 'query_wanna_see_board'), with
  104. * their current values from $user_info.
  105. * In addition, it performs checks and sanitization on the values
  106. * sent to the database.
  107. *
  108. * @param $matches
  109. */
  110. function smf_db_replacement__callback($matches)
  111. {
  112. global $db_callback, $user_info, $db_prefix, $smcFunc;
  113. list ($values, $connection) = $db_callback;
  114. if ($matches[1] === 'db_prefix')
  115. return $db_prefix;
  116. if ($matches[1] === 'query_see_board')
  117. return $user_info['query_see_board'];
  118. if ($matches[1] === 'query_wanna_see_board')
  119. return $user_info['query_wanna_see_board'];
  120. if ($matches[1] === 'empty')
  121. return '\'\'';
  122. if (!isset($matches[2]))
  123. smf_db_error_backtrace('Invalid value inserted or no type specified.', '', E_USER_ERROR, __FILE__, __LINE__);
  124. if ($matches[1] === 'literal')
  125. return '\'' . pg_escape_string($matches[2]) . '\'';
  126. if (!isset($values[$matches[2]]))
  127. smf_db_error_backtrace('The database value you\'re trying to insert does not exist: ' . (isset($smcFunc['htmlspecialchars']) ? $smcFunc['htmlspecialchars']($matches[2]) : htmlspecialchars($matches[2])), '', E_USER_ERROR, __FILE__, __LINE__);
  128. $replacement = $values[$matches[2]];
  129. switch ($matches[1])
  130. {
  131. case 'int':
  132. if (!is_numeric($replacement) || (string) $replacement !== (string) (int) $replacement)
  133. smf_db_error_backtrace('Wrong value type sent to the database. Integer expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  134. return (string) (int) $replacement;
  135. break;
  136. case 'string':
  137. case 'text':
  138. return sprintf('\'%1$s\'', pg_escape_string($replacement));
  139. break;
  140. case 'array_int':
  141. if (is_array($replacement))
  142. {
  143. if (empty($replacement))
  144. smf_db_error_backtrace('Database error, given array of integer values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  145. foreach ($replacement as $key => $value)
  146. {
  147. if (!is_numeric($value) || (string) $value !== (string) (int) $value)
  148. smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  149. $replacement[$key] = (string) (int) $value;
  150. }
  151. return implode(', ', $replacement);
  152. }
  153. else
  154. smf_db_error_backtrace('Wrong value type sent to the database. Array of integers expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  155. break;
  156. case 'array_string':
  157. if (is_array($replacement))
  158. {
  159. if (empty($replacement))
  160. smf_db_error_backtrace('Database error, given array of string values is empty. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  161. foreach ($replacement as $key => $value)
  162. $replacement[$key] = sprintf('\'%1$s\'', pg_escape_string($value));
  163. return implode(', ', $replacement);
  164. }
  165. else
  166. smf_db_error_backtrace('Wrong value type sent to the database. Array of strings expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  167. break;
  168. case 'date':
  169. if (preg_match('~^(\d{4})-([0-1]?\d)-([0-3]?\d)$~', $replacement, $date_matches) === 1)
  170. return sprintf('\'%04d-%02d-%02d\'', $date_matches[1], $date_matches[2], $date_matches[3]);
  171. else
  172. smf_db_error_backtrace('Wrong value type sent to the database. Date expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  173. break;
  174. case 'float':
  175. if (!is_numeric($replacement))
  176. smf_db_error_backtrace('Wrong value type sent to the database. Floating point number expected. (' . $matches[2] . ')', '', E_USER_ERROR, __FILE__, __LINE__);
  177. return (string) (float) $replacement;
  178. break;
  179. case 'identifier':
  180. return '`' . strtr($replacement, array('`' => '', '.' => '')) . '`';
  181. break;
  182. case 'raw':
  183. return $replacement;
  184. break;
  185. default:
  186. smf_db_error_backtrace('Undefined type used in the database query. (' . $matches[1] . ':' . $matches[2] . ')', '', false, __FILE__, __LINE__);
  187. break;
  188. }
  189. }
  190. /**
  191. * Just like the db_query, escape and quote a string,
  192. * but not executing the query.
  193. *
  194. * @param string $db_string
  195. * @param string $db_values
  196. * @param type $connection
  197. * @return type
  198. */
  199. function smf_db_quote($db_string, $db_values, $connection = null)
  200. {
  201. global $db_callback, $db_connection;
  202. // Only bother if there's something to replace.
  203. if (strpos($db_string, '{') !== false)
  204. {
  205. // This is needed by the callback function.
  206. $db_callback = array($db_values, $connection === null ? $db_connection : $connection);
  207. // Do the quoting and escaping
  208. $db_string = preg_replace_callback('~{([a-z_]+)(?::([a-zA-Z0-9_-]+))?}~', 'smf_db_replacement__callback', $db_string);
  209. // Clear this global variable.
  210. $db_callback = array();
  211. }
  212. return $db_string;
  213. }
  214. /**
  215. * Do a query. Takes care of errors too.
  216. * Special queries may need additional replacements to be appropriate
  217. * for PostgreSQL.
  218. *
  219. * @param string $identifier
  220. * @param string $db_string
  221. * @param string $db_values
  222. * @param type $connection
  223. * @return boolean
  224. */
  225. function smf_db_query($identifier, $db_string, $db_values = array(), $connection = null)
  226. {
  227. global $db_cache, $db_count, $db_connection, $db_show_debug, $time_start;
  228. global $db_unbuffered, $db_callback, $db_last_result, $db_replace_result, $modSettings;
  229. // Decide which connection to use.
  230. $connection = $connection === null ? $db_connection : $connection;
  231. // Special queries that need processing.
  232. $replacements = array(
  233. 'alter_table_boards' => array(
  234. '~(.+)~' => '',
  235. ),
  236. 'ban_suggest_error_ips' => array(
  237. '~RLIKE~' => '~',
  238. '~\\.~' => '\.',
  239. ),
  240. 'ban_suggest_message_ips' => array(
  241. '~RLIKE~' => '~',
  242. '~\\.~' => '\.',
  243. ),
  244. 'consolidate_spider_stats' => array(
  245. '~MONTH\(log_time\), DAYOFMONTH\(log_time\)~' => 'MONTH(CAST(CAST(log_time AS abstime) AS timestamp)), DAYOFMONTH(CAST(CAST(log_time AS abstime) AS timestamp))',
  246. ),
  247. 'delete_subscription' => array(
  248. '~LIMIT 1~' => '',
  249. ),
  250. 'display_get_post_poster' => array(
  251. '~GROUP BY id_msg\s+HAVING~' => 'AND',
  252. ),
  253. 'attach_download_increase' => array(
  254. '~LOW_PRIORITY~' => '',
  255. ),
  256. 'boardindex_fetch_boards' => array(
  257. '~IFNULL\(lb.id_msg, 0\) >= b.id_msg_updated~' => 'CASE WHEN IFNULL(lb.id_msg, 0) >= b.id_msg_updated THEN 1 ELSE 0 END',
  258. '~(.)$~' => '$1 ORDER BY b.board_order',
  259. ),
  260. 'get_random_number' => array(
  261. '~RAND~' => 'RANDOM',
  262. ),
  263. 'insert_log_search_topics' => array(
  264. '~NOT RLIKE~' => '!~',
  265. ),
  266. 'insert_log_search_results_no_index' => array(
  267. '~NOT RLIKE~' => '!~',
  268. ),
  269. 'insert_log_search_results_subject' => array(
  270. '~NOT RLIKE~' => '!~',
  271. ),
  272. 'select_message_icons' => array(
  273. '~(.)$~' => '$1 ORDER BY icon_order',
  274. ),
  275. 'set_character_set' => array(
  276. '~SET\\s+NAMES\\s([a-zA-Z0-9\\-_]+)~' => 'SET NAMES \'$1\'',
  277. ),
  278. 'pm_conversation_list' => array(
  279. '~ORDER\\s+BY\\s+\\{raw:sort\\}~' => 'ORDER BY ' . (isset($db_values['sort']) ? ($db_values['sort'] === 'pm.id_pm' ? 'MAX(pm.id_pm)' : $db_values['sort']) : ''),
  280. ),
  281. 'top_topic_starters' => array(
  282. '~ORDER BY FIND_IN_SET\(id_member,(.+?)\)~' => 'ORDER BY STRPOS(\',\' || $1 || \',\', \',\' || id_member|| \',\')',
  283. ),
  284. 'order_by_board_order' => array(
  285. '~(.)$~' => '$1 ORDER BY b.board_order',
  286. ),
  287. 'unread_replies' => array(
  288. '~SELECT\\s+DISTINCT\\s+t.id_topic~' => 'SELECT t.id_topic, {raw:sort}',
  289. ),
  290. 'profile_board_stats' => array(
  291. '~COUNT\(\*\) \/ MAX\(b.num_posts\)~' => 'CAST(COUNT(*) AS DECIMAL) / CAST(b.num_posts AS DECIMAL)',
  292. ),
  293. );
  294. if (isset($replacements[$identifier]))
  295. $db_string = preg_replace(array_keys($replacements[$identifier]), array_values($replacements[$identifier]), $db_string);
  296. // Limits need to be a little different.
  297. $db_string = preg_replace('~\sLIMIT\s(\d+|{int:.+}),\s*(\d+|{int:.+})\s*$~i', 'LIMIT $2 OFFSET $1', $db_string);
  298. if (trim($db_string) == '')
  299. return false;
  300. // Comments that are allowed in a query are preg_removed.
  301. static $allowed_comments_from = array(
  302. '~\s+~s',
  303. '~/\*!40001 SQL_NO_CACHE \*/~',
  304. '~/\*!40000 USE INDEX \([A-Za-z\_]+?\) \*/~',
  305. '~/\*!40100 ON DUPLICATE KEY UPDATE id_msg = \d+ \*/~',
  306. );
  307. static $allowed_comments_to = array(
  308. ' ',
  309. '',
  310. '',
  311. '',
  312. );
  313. // One more query....
  314. $db_count = !isset($db_count) ? 1 : $db_count + 1;
  315. $db_replace_result = 0;
  316. if (empty($modSettings['disableQueryCheck']) && strpos($db_string, '\'') !== false && empty($db_values['security_override']))
  317. smf_db_error_backtrace('Hacking attempt...', 'Illegal character (\') used in query...', true, __FILE__, __LINE__);
  318. if (empty($db_values['security_override']) && (!empty($db_values) || strpos($db_string, '{db_prefix}') !== false))
  319. {
  320. // Pass some values to the global space for use in the callback function.
  321. $db_callback = array($db_values, $connection);
  322. // Inject the values passed to this function.
  323. $db_string = preg_replace_callback('~{([a-z_]+)(?::([a-zA-Z0-9_-]+))?}~', 'smf_db_replacement__callback', $db_string);
  324. // This shouldn't be residing in global space any longer.
  325. $db_callback = array();
  326. }
  327. // Debugging.
  328. if (isset($db_show_debug) && $db_show_debug === true)
  329. {
  330. // Get the file and line number this function was called.
  331. list ($file, $line) = smf_db_error_backtrace('', '', 'return', __FILE__, __LINE__);
  332. // Initialize $db_cache if not already initialized.
  333. if (!isset($db_cache))
  334. $db_cache = array();
  335. if (!empty($_SESSION['debug_redirect']))
  336. {
  337. $db_cache = array_merge($_SESSION['debug_redirect'], $db_cache);
  338. $db_count = count($db_cache) + 1;
  339. $_SESSION['debug_redirect'] = array();
  340. }
  341. $st = microtime();
  342. // Don't overload it.
  343. $db_cache[$db_count]['q'] = $db_count < 50 ? $db_string : '...';
  344. $db_cache[$db_count]['f'] = $file;
  345. $db_cache[$db_count]['l'] = $line;
  346. $db_cache[$db_count]['s'] = array_sum(explode(' ', $st)) - array_sum(explode(' ', $time_start));
  347. }
  348. // First, we clean strings out of the query, reduce whitespace, lowercase, and trim - so we can check it over.
  349. if (empty($modSettings['disableQueryCheck']))
  350. {
  351. $clean = '';
  352. $old_pos = 0;
  353. $pos = -1;
  354. while (true)
  355. {
  356. $pos = strpos($db_string, '\'', $pos + 1);
  357. if ($pos === false)
  358. break;
  359. $clean .= substr($db_string, $old_pos, $pos - $old_pos);
  360. while (true)
  361. {
  362. $pos1 = strpos($db_string, '\'', $pos + 1);
  363. $pos2 = strpos($db_string, '\\', $pos + 1);
  364. if ($pos1 === false)
  365. break;
  366. elseif ($pos2 == false || $pos2 > $pos1)
  367. {
  368. $pos = $pos1;
  369. break;
  370. }
  371. $pos = $pos2 + 1;
  372. }
  373. $clean .= ' %s ';
  374. $old_pos = $pos + 1;
  375. }
  376. $clean .= substr($db_string, $old_pos);
  377. $clean = trim(strtolower(preg_replace($allowed_comments_from, $allowed_comments_to, $clean)));
  378. // Comments? We don't use comments in our queries, we leave 'em outside!
  379. if (strpos($clean, '/*') > 2 || strpos($clean, '--') !== false || strpos($clean, ';') !== false)
  380. $fail = true;
  381. // Trying to change passwords, slow us down, or something?
  382. elseif (strpos($clean, 'sleep') !== false && preg_match('~(^|[^a-z])sleep($|[^[_a-z])~s', $clean) != 0)
  383. $fail = true;
  384. elseif (strpos($clean, 'benchmark') !== false && preg_match('~(^|[^a-z])benchmark($|[^[a-z])~s', $clean) != 0)
  385. $fail = true;
  386. if (!empty($fail) && function_exists('log_error'))
  387. smf_db_error_backtrace('Hacking attempt...', 'Hacking attempt...' . "\n" . $db_string, E_USER_ERROR, __FILE__, __LINE__);
  388. }
  389. $db_last_result = @pg_query($connection, $db_string);
  390. if ($db_last_result === false && empty($db_values['db_error_skip']))
  391. $db_last_result = smf_db_error($db_string, $connection);
  392. // Debugging.
  393. if (isset($db_show_debug) && $db_show_debug === true)
  394. $db_cache[$db_count]['t'] = array_sum(explode(' ', microtime())) - array_sum(explode(' ', $st));
  395. return $db_last_result;
  396. }
  397. /**
  398. * affected_rows
  399. * @param resource $connection
  400. */
  401. function smf_db_affected_rows($result = null)
  402. {
  403. global $db_last_result, $db_replace_result;
  404. if ($db_replace_result)
  405. return $db_replace_result;
  406. elseif ($result === null && !$db_last_result)
  407. return 0;
  408. return pg_affected_rows($result === null ? $db_last_result : $result);
  409. }
  410. /**
  411. * insert_id
  412. *
  413. * @param string $table
  414. * @param string $field = null
  415. * @param resource $connection = null
  416. */
  417. function smf_db_insert_id($table, $field = null, $connection = null)
  418. {
  419. global $db_connection, $smcFunc, $db_prefix;
  420. $table = str_replace('{db_prefix}', $db_prefix, $table);
  421. if ($connection === false)
  422. $connection = $db_connection;
  423. // Try get the last ID for the auto increment field.
  424. $request = $smcFunc['db_query']('', 'SELECT CURRVAL(\'' . $table . '_seq\') AS insertID',
  425. array(
  426. )
  427. );
  428. if (!$request)
  429. return false;
  430. list ($lastID) = $smcFunc['db_fetch_row']($request);
  431. $smcFunc['db_free_result']($request);
  432. return $lastID;
  433. }
  434. /**
  435. * Do a transaction.
  436. *
  437. * @param string $type - the step to perform (i.e. 'begin', 'commit', 'rollback')
  438. * @param resource $connection = null
  439. */
  440. function smf_db_transaction($type = 'commit', $connection = null)
  441. {
  442. global $db_connection;
  443. // Decide which connection to use
  444. $connection = $connection === null ? $db_connection : $connection;
  445. if ($type == 'begin')
  446. return @pg_query($connection, 'BEGIN');
  447. elseif ($type == 'rollback')
  448. return @pg_query($connection, 'ROLLBACK');
  449. elseif ($type == 'commit')
  450. return @pg_query($connection, 'COMMIT');
  451. return false;
  452. }
  453. /**
  454. * Database error!
  455. * Backtrace, log, try to fix.
  456. *
  457. * @param string $db_string
  458. * @param resource $connection = null
  459. */
  460. function smf_db_error($db_string, $connection = null)
  461. {
  462. global $txt, $context, $sourcedir, $webmaster_email, $modSettings;
  463. global $forum_version, $db_connection, $db_last_error, $db_persist;
  464. global $db_server, $db_user, $db_passwd, $db_name, $db_show_debug, $ssi_db_user, $ssi_db_passwd;
  465. global $smcFunc;
  466. // We'll try recovering the file and line number the original db query was called from.
  467. list ($file, $line) = smf_db_error_backtrace('', '', 'return', __FILE__, __LINE__);
  468. // Decide which connection to use
  469. $connection = $connection === null ? $db_connection : $connection;
  470. // This is the error message...
  471. $query_error = @pg_last_error($connection);
  472. // Log the error.
  473. if (function_exists('log_error'))
  474. log_error($txt['database_error'] . ': ' . $query_error . (!empty($modSettings['enableErrorQueryLogging']) ? "\n\n" .$db_string : ''), 'database', $file, $line);
  475. // Nothing's defined yet... just die with it.
  476. if (empty($context) || empty($txt))
  477. die($query_error);
  478. // Show an error message, if possible.
  479. $context['error_title'] = $txt['database_error'];
  480. if (allowedTo('admin_forum'))
  481. $context['error_message'] = nl2br($query_error) . '<br />' . $txt['file'] . ': ' . $file . '<br />' . $txt['line'] . ': ' . $line;
  482. else
  483. $context['error_message'] = $txt['try_again'];
  484. if (allowedTo('admin_forum') && isset($db_show_debug) && $db_show_debug === true)
  485. {
  486. $context['error_message'] .= '<br /><br />' . nl2br($db_string);
  487. }
  488. // It's already been logged... don't log it again.
  489. fatal_error($context['error_message'], false);
  490. }
  491. /**
  492. * A PostgreSQL specific function for tracking the current row...
  493. *
  494. * @param $request
  495. * @param $counter
  496. */
  497. function smf_db_fetch_row($request, $counter = false)
  498. {
  499. global $db_row_count;
  500. if ($counter !== false)
  501. return pg_fetch_row($request, $counter);
  502. // Reset the row counter...
  503. if (!isset($db_row_count[(int) $request]))
  504. $db_row_count[(int) $request] = 0;
  505. // Return the right row.
  506. return @pg_fetch_row($request, $db_row_count[(int) $request]++);
  507. }
  508. /**
  509. * Get an associative array
  510. *
  511. * @param $request
  512. * @param $counter
  513. */
  514. function smf_db_fetch_assoc($request, $counter = false)
  515. {
  516. global $db_row_count;
  517. if ($counter !== false)
  518. return pg_fetch_assoc($request, $counter);
  519. // Reset the row counter...
  520. if (!isset($db_row_count[(int) $request]))
  521. $db_row_count[(int) $request] = 0;
  522. // Return the right row.
  523. return @pg_fetch_assoc($request, $db_row_count[(int) $request]++);
  524. }
  525. /**
  526. * Reset the pointer...
  527. *
  528. * @param $request
  529. * @param $counter
  530. */
  531. function smf_db_data_seek($request, $counter)
  532. {
  533. global $db_row_count;
  534. $db_row_count[(int) $request] = $counter;
  535. return true;
  536. }
  537. /**
  538. * Unescape an escaped string!
  539. *
  540. * @param $string
  541. */
  542. function smf_db_unescape_string($string)
  543. {
  544. return strtr($string, array('\'\'' => '\''));
  545. }
  546. /**
  547. * insert
  548. *
  549. * @param string $method - options 'replace', 'ignore', 'insert'
  550. * @param $table
  551. * @param $columns
  552. * @param $data
  553. * @param $keys
  554. * @param bool $disable_trans = false
  555. * @param resource $connection = null
  556. */
  557. function smf_db_insert($method = 'replace', $table, $columns, $data, $keys, $disable_trans = false, $connection = null)
  558. {
  559. global $db_replace_result, $db_in_transact, $smcFunc, $db_connection, $db_prefix;
  560. $connection = $connection === null ? $db_connection : $connection;
  561. if (empty($data))
  562. return;
  563. if (!is_array($data[array_rand($data)]))
  564. $data = array($data);
  565. // Replace the prefix holder with the actual prefix.
  566. $table = str_replace('{db_prefix}', $db_prefix, $table);
  567. $priv_trans = false;
  568. if ((count($data) > 1 || $method == 'replace') && !$db_in_transact && !$disable_trans)
  569. {
  570. $smcFunc['db_transaction']('begin', $connection);
  571. $priv_trans = true;
  572. }
  573. // PostgreSQL doesn't support replace: we implement a MySQL-compatible behavior instead
  574. if ($method == 'replace')
  575. {
  576. $count = 0;
  577. $where = '';
  578. foreach ($columns as $columnName => $type)
  579. {
  580. // Are we restricting the length?
  581. if (strpos($type, 'string-') !== false)
  582. $actualType = sprintf($columnName . ' = SUBSTRING({string:%1$s}, 1, ' . substr($type, 7) . '), ', $count);
  583. else
  584. $actualType = sprintf($columnName . ' = {%1$s:%2$s}, ', $type, $count);
  585. // A key? That's what we were looking for.
  586. if (in_array($columnName, $keys))
  587. $where .= (empty($where) ? '' : ' AND ') . substr($actualType, 0, -2);
  588. $count++;
  589. }
  590. // Make it so.
  591. if (!empty($where) && !empty($data))
  592. {
  593. foreach ($data as $k => $entry)
  594. {
  595. $smcFunc['db_query']('', '
  596. DELETE FROM ' . $table .
  597. ' WHERE ' . $where,
  598. $entry, $connection
  599. );
  600. }
  601. }
  602. }
  603. if (!empty($data))
  604. {
  605. // Create the mold for a single row insert.
  606. $insertData = '(';
  607. foreach ($columns as $columnName => $type)
  608. {
  609. // Are we restricting the length?
  610. if (strpos($type, 'string-') !== false)
  611. $insertData .= sprintf('SUBSTRING({string:%1$s}, 1, ' . substr($type, 7) . '), ', $columnName);
  612. else
  613. $insertData .= sprintf('{%1$s:%2$s}, ', $type, $columnName);
  614. }
  615. $insertData = substr($insertData, 0, -2) . ')';
  616. // Create an array consisting of only the columns.
  617. $indexed_columns = array_keys($columns);
  618. // Here's where the variables are injected to the query.
  619. $insertRows = array();
  620. foreach ($data as $dataRow)
  621. $insertRows[] = smf_db_quote($insertData, array_combine($indexed_columns, $dataRow), $connection);
  622. foreach ($insertRows as $entry)
  623. // Do the insert.
  624. $smcFunc['db_query']('', '
  625. INSERT INTO ' . $table . '("' . implode('", "', $indexed_columns) . '")
  626. VALUES
  627. ' . $entry,
  628. array(
  629. 'security_override' => true,
  630. 'db_error_skip' => $method == 'ignore' || $table === $db_prefix . 'log_errors',
  631. ),
  632. $connection
  633. );
  634. }
  635. if ($priv_trans)
  636. $smcFunc['db_transaction']('commit', $connection);
  637. }
  638. /**
  639. * Dummy function really. Doesn't do anything on PostgreSQL.
  640. *
  641. * @param unknown_type $db_name
  642. * @param unknown_type $db_connection
  643. */
  644. function smf_db_select_db($db_name, $db_connection)
  645. {
  646. return true;
  647. }
  648. /**
  649. * Get the current version.
  650. */
  651. function smf_db_version()
  652. {
  653. $version = pg_version();
  654. return $version['client'];
  655. }
  656. /**
  657. * This function tries to work out additional error information from a back trace.
  658. *
  659. * @param $error_message
  660. * @param $log_message
  661. * @param $error_type
  662. * @param $file
  663. * @param $line
  664. */
  665. function smf_db_error_backtrace($error_message, $log_message = '', $error_type = false, $file = null, $line = null)
  666. {
  667. if (empty($log_message))
  668. $log_message = $error_message;
  669. foreach (debug_backtrace() as $step)
  670. {
  671. // Found it?
  672. if (strpos($step['function'], 'query') === false && !in_array(substr($step['function'], 0, 7), array('smf_db_', 'preg_re', 'db_erro', 'call_us')) && strpos($step['function'], '__') !== 0)
  673. {
  674. $log_message .= '<br />Function: ' . $step['function'];
  675. break;
  676. }
  677. if (isset($step['line']))
  678. {
  679. $file = $step['file'];
  680. $line = $step['line'];
  681. }
  682. }
  683. // A special case - we want the file and line numbers for debugging.
  684. if ($error_type == 'return')
  685. return array($file, $line);
  686. // Is always a critical error.
  687. if (function_exists('log_error'))
  688. log_error($log_message, 'critical', $file, $line);
  689. if (function_exists('fatal_error'))
  690. {
  691. fatal_error($error_message, $error_type);
  692. // Cannot continue...
  693. exit;
  694. }
  695. elseif ($error_type)
  696. trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : ''), $error_type);
  697. else
  698. trigger_error($error_message . ($line !== null ? '<em>(' . basename($file) . '-' . $line . ')</em>' : ''));
  699. }
  700. /**
  701. * Escape the LIKE wildcards so that they match the character and not the wildcard.
  702. *
  703. * @param $string
  704. * @param bool $translate_human_wildcards = false, if true, turns human readable wildcards into SQL wildcards.
  705. */
  706. function smf_db_escape_wildcard_string($string, $translate_human_wildcards=false)
  707. {
  708. $replacements = array(
  709. '%' => '\%',
  710. '_' => '\_',
  711. '\\' => '\\\\',
  712. );
  713. if ($translate_human_wildcards)
  714. $replacements += array(
  715. '*' => '%',
  716. );
  717. return strtr($string, $replacements);
  718. }
  719. ?>