"johnf" <[EMAIL PROTECTED]> wrote 

> and should be doing
> tempCursor.execute ( "Select pg_get_serial_sequence ( %s, %s ) as 
> seq", ( 'public.arcust', 'pkid' ) )
> 
> which prevented SQL injection.

The syntax of the execute statement varies by database
Which DB are you using. For example SQLite uses ? 
instead of %s indicators.

Could that be the issue? Have you checked the DB-API 
guide for your database?

HTH,


-- 
Alan Gauld
Author of the Learn to Program web site
http://www.freenetpages.co.uk/hp/alan.gauld

_______________________________________________
Tutor maillist  -  Tutor@python.org
http://mail.python.org/mailman/listinfo/tutor

Reply via email to