On 26/05/2010 23:24, Christian Heimes wrote:
Actually, no. The names of tables are not quoted in SQL.
One writes
SELECT ID FROM mytable;
not
SELECT ID FROM mytable;
nit picking mode:
Some RDBMS support case sensitive table names. You have to quote the
table name if you using the feature.
On Tue, 2010-05-25 at 14:45 -0400, Victor Subervi wrote:
Hi;
I have this code:
clientCursor.execute('select ID from %s' % (personalDataTable))
upds = [itm[0] for itm in clientCursor]
print input type='hidden' name='upds' value='%s' / % upds
The problem is that the values
On Wed, May 26, 2010 at 11:25 AM, Kushal Kumaran
kushal.kuma...@gmail.comwrote:
On Tue, 2010-05-25 at 14:45 -0400, Victor Subervi wrote:
Hi;
I have this code:
clientCursor.execute('select ID from %s' % (personalDataTable))
upds = [itm[0] for itm in clientCursor]
print
Kushal Kumaran wrote:
On Tue, 2010-05-25 at 14:45 -0400, Victor Subervi wrote:
Hi;
I have this code:
clientCursor.execute('select ID from %s' % (personalDataTable))
upds = [itm[0] for itm in clientCursor]
print input type='hidden' name='upds' value='%s' / % upds
The problem is
On Wed, 26 May 2010 12:43:29 -0700, John Nagle wrote:
Kushal Kumaran wrote:
On Tue, 2010-05-25 at 14:45 -0400, Victor Subervi wrote:
Hi;
I have this code:
clientCursor.execute('select ID from %s' % (personalDataTable))
upds = [itm[0] for itm in clientCursor] print input
Alister wrote:
I think you should probably also write your execute differently:
clientCursor.execute('select ID from %s' , (personalDataTable,))
this ensures the parameters are correctly escaped to prevent mysql
injection attacks,the , after personalDataTable is necessary to ensure
the
Actually, no. The names of tables are not quoted in SQL.
One writes
SELECT ID FROM mytable;
not
SELECT ID FROM mytable;
nit picking mode:
Some RDBMS support case sensitive table names. You have to quote the
table name if you using the feature. Yeah I know, it's pretty
On Wed, 26 May 2010 15:30:16 -0700, John Nagle wrote:
Alister wrote:
I think you should probably also write your execute differently:
clientCursor.execute('select ID from %s' , (personalDataTable,))
this ensures the parameters are correctly escaped to prevent mysql
injection
Hi;
I have this code:
clientCursor.execute('select ID from %s' % (personalDataTable))
upds = [itm[0] for itm in clientCursor]
print input type='hidden' name='upds' value='%s' / % upds
The problem is that the values passed are 1L, 2L When I retrieve them on
the other end and try