-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Placeholder interpolation #309
Conversation
Conflicts: connection.go utils_test.go
Good job! |
I'll hopefully get to review this soon. @arvenil add yourself to the AUTHORS file please. I will probably merge #311 first (it's pretty small), as this also hits Can you change the tests so SELECT ... CAST is used instead of table writes? I don't know if that's applicable here, but I'd love to reduce the amount of disk IO during testing in the long run. See the DATE/TIME tests for example. I don't like the Escape... functions, I prefer an externally controllable buffer and quotes embedded in the function. |
I feel "interpolation" is better word than "substitution." But I'm not sure since I'm native English. @arvenil May I write optimized version of escaping function? |
@methane Yes, I've added you to https://github.com/arvenil/mysql/tree/placeholder as collaborator so you could push to this PR but do whatever suits you better. I will address other questions and issues later, when time allows. |
Hi @arnehormann
For MySQL data is not changed, it is escaped. This is done exactly the same way how MySQL does it. Take a look at https://github.com/mysql/mysql-server/blob/mysql-5.7.5/mysys/charset.c#L823-L932 https://github.com/mysql/mysql-server/blob/mysql-5.7.5/mysys/charset.c#L963-L1038 To prove that data is not changed I've added |
"DROP TABLE IF EXISTS ..." query fails on fresh database.
const ( | ||
statusInTrans statusFlag = 1 << iota | ||
statusInAutocommit | ||
statusUnknown1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
statusReserved // not in documentation
please
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed
benchmark old ns/op new ns/op delta BenchmarkInterpolation 4065 2533 -37.69% benchmark old allocs new allocs delta BenchmarkInterpolation 15 6 -60.00% benchmark old bytes new bytes delta BenchmarkInterpolation 1144 560 -51.05%
|
||
When `interpolateParams` is true, calls to `sql.Db.Query()` and `sql.Db.Exec()` with params interpolates placeholders (`?`) with given params. This reduces roundtrips to database compared with `interpolateParams=false` since it uses prapre, exec and close to support parameters. | ||
|
||
NOTE: It make SQL injection vulnerability when connection encoding is not utf8. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When the connection encoding is not utf8, the connection becomes vulnerable to SQL injection attacks.
Maybe I misread something, but how does this depend on utf8?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If connection encoding is Shift-JIS, 95 5c 27 20
should be encoded into 95 5c 27 20
since 95 5c
represents one multibyte char (表
).
But escapeBytesBackslash and escapeStringBackslash encode it into 95 5c 5c 27 20
since 5c
is \
.
This is famous SQL injection vulnerability in Japan.
Let me also do a final review later before merging. |
@julienschmidt I intended to do so. This is huge... |
Default: false | ||
``` | ||
|
||
When `interpolateParams` is true, calls to `sql.Db.Query()` and `sql.Db.Exec()` with params interpolates placeholders (`?`) with given params. This reduces roundtrips to database compared with `interpolateParams=false` since it uses prepare, exec and close to support parameters. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
use just db.Query()
/ db.Exec()
instead of sql.Db.Query()
/ sql.Db.Exec()
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If interpolateParams
is true, placeholders (?
) in calls to db.Query()
and db.Exec()
are interpolated into a single query string with the given parameters. This reduces the number of roundtrips, since the driver has to prepare a statement, execute it with the given parameters and close the statement again with interpolateParams=false
.
copy(n, buf) | ||
buf = n | ||
} | ||
buf = buf[0:end] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The exact same code from L819-L824 is used 4 times. Move it to a helper function. And rename n
to newBuf
. n
is more or less reserved for numbers 😉
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
And why pos+end
by the way?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
did it.
pos+end
= len(old)*2 + reserved size
. len(buf)*2
is for exponential realloc.
// A whitelist of collations which safe to interpolate parameters. | ||
// ASCII and latin-1 are safe since they are single byte encoding. | ||
// utf-8 is safe since it doesn't conatins ASCII characters in trailing bytes. | ||
safeCollations := []string{"ascii_", "latin1_", "utf8_", "utf8mb4_"} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It might be better to use a blacklist instead. MySQL only supports 5 unsafe collations: big5
, cp932
, gb2312
, gbk
and sjis
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The blacklist would then be:
"big5_chinese_ci": 1,
"sjis_japanese_ci": 13,
"gbk_chinese_ci": 28,
"big5_bin": 84,
"gb2312_bin": 86,
"gbk_bin": 87,
"sjis_bin": 88,
"cp932_japanese_ci": 95,
"cp932_bin": 96,
You can also directly check the ID instead of the name then
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed.
@methane praise your patience and thank you for doing this... 😀 |
LGTM... almost |
@arvenil please add yourself to the AUTHORS file |
Placeholder interpolation
Thank you! |
FYI, I've wrote blog post about optimizing this pull request. |
@methane did awesome job in #297 and since I'm highly interested in this PR I wanted to test it. However #297 was out of sync with master ("This pull request contains merge conflicts that must be resolved.") so I merged changes from master.
Since I was already testing this. I've also:
Feel free to merge this or throw away, I did this mostly to verify correctness.
One more time thanks for this @methane !