请输入您要查询的百科知识:

 

词条 Prepared statement
释义

  1. Software support

  2. Examples

      Java JDBC    PHP PDO    Perl DBI    C# ADO.NET    Python DB-API    Magic Direct SQL    PureBasic  

  3. References

In database management systems (DBMS), a prepared statement or parameterized statement is a feature used to execute the same or similar database statements repeatedly with high efficiency. Typically used with SQL statements such as queries or updates, the prepared statement takes the form of a template into which certain constant values are substituted during each execution.

The typical workflow of using a prepared statement is as follows:

  1. Prepare: At first, the application creates the statement template and send it to the DBMS. Certain values are left unspecified, called parameters, placeholders or bind variables (labelled "?" below):
    {{code|lang=sql|INSERT INTO products (name, price) VALUES (?, ?);}}
  2. Then, the DBMS compiles (parses, optimizes and translates) the statement template, and stores the result without executing it.
  3. Execute: At a later time, the application supplies (or binds) values for the parameters of the statement template, and the DBMS executes the statement (possibly returning a result). The application may execute the statement as many times as it wants with different values. In the above example, it might supply "bike" for the first parameter and "10900" for the second parameter.

As compared to executing statements directly, prepared statements offer two main advantages:[1]

  • The overhead of compiling the statement is incurred only once, although the statement is executed multiple times. However not all optimization can be performed at the time the statement template is compiled, for two reasons: the best plan may depend on the specific values of the parameters, and the best plan may change as tables and indexes change over time.[2]
  • Prepared statements are resilient against SQL injection because values which are transmitted later using a different protocol are not compiled like the statement template. If the statement template is not derived from external input, SQL injection cannot occur.

On the other hand, if a query is executed only once, server-side prepared statements can be slower because of the additional round-trip to the server.[3] Implementation limitations may also lead to performance penalties; for example, some versions of MySQL did not cache results of prepared queries.[4]

A stored procedure, which is also precompiled and stored on the server for later execution, has similar advantages. Unlike a stored procedure, a prepared statement is not normally written in a procedural language and cannot use or modify variables or use control flow structures, relying instead on the declarative database query language. Due to their simplicity and client-side emulation, prepared statements are more portable across vendors.

Software support

Major DBMSs, including MySQL,[5] Oracle,[6] DB2,[7] Microsoft SQL Server[8] and PostgreSQL[9] widely support prepared statements. Prepared statements are normally executed through a non-SQL binary protocol for efficiency and protection from SQL injection, but with some DBMSs such as MySQL prepared statements are also available using a SQL syntax for debugging purposes.[10]

A number of programming languages support prepared statements in their standard libraries and will emulate them on the client side even if the underlying DBMS does not support them, including Java's JDBC,[11] Perl's DBI,[12] PHP's PDO [1] and Python's DB-API.[13] Client-side emulation can be faster for queries which are executed only once, by reducing the number of round trips to the server, but is usually slower for queries executed many times. It resists SQL injection attacks equally effectively.

Many types of SQL injection attacks can be eliminated by disabling literals, effectively requiring the use of prepared statements; {{as of | 2007 | lc = on}} only H2 supports this feature.[14]

Examples

Java JDBC

This example uses Java and JDBC:

import com.mysql.jdbc.jdbc2.optional.MysqlDataSource;

import java.sql.Connection;

import java.sql.DriverManager;

import java.sql.PreparedStatement;

import java.sql.ResultSet;

import java.sql.SQLException;

import java.sql.Statement;

public class Main {

  public static void main(String[] args) throws SQLException {    MysqlDataSource ds = new MysqlDataSource();    ds.setDatabaseName("mysql");    ds.setUser("root");
    try (Connection conn = ds.getConnection()) {      try (Statement stmt = conn.createStatement()) {        stmt.executeUpdate("CREATE TABLE IF NOT EXISTS products (name VARCHAR(40), price INT)");      }
      try (PreparedStatement stmt = conn.prepareStatement("INSERT INTO products VALUES (?, ?)")) {        stmt.setString(1, "bike");        stmt.setInt(2, 10900);        stmt.executeUpdate();        stmt.setString(1, "shoes");        stmt.setInt(2, 7400);        stmt.executeUpdate();        stmt.setString(1, "phone");        stmt.setInt(2, 29500);        stmt.executeUpdate();      }
      try (PreparedStatement stmt = conn.prepareStatement("SELECT * FROM products WHERE name = ?")) {        stmt.setString(1, "shoes");        ResultSet rs = stmt.executeQuery();        rs.next();        System.out.println(rs.getInt(2));      }    }  }

}

Java PreparedStatement provides "setters" (setInt(int), setString(String), setDouble(double), etc.) for all major built-in data types.

PHP PDO

This example uses PHP and PDO:

$stmt = null;

try {

    $conn = new PDO("mysql:dbname=mysql", "root");    $conn->exec("CREATE TABLE IF NOT EXISTS products (name VARCHAR(40), price INT)");    $stmt = $conn->prepare("INSERT INTO products VALUES (?, ?)");    $params = array(array("bike", 10900),                    array("shoes", 7400),                    array("phone", 29500));    foreach ($params as $param) {        $stmt->execute($param);    }    $stmt = $conn->prepare("SELECT * FROM products WHERE name = ?");    $params = array("shoes");    $stmt->execute($params);    echo $stmt->fetch()[1];

} finally {

    if ($stmt !== null) {        $stmt->closeCursor();    }

}

?>

Perl DBI

This example uses Perl and DBI:

my $stmt = $db->prepare("SELECT * FROM users WHERE USERNAME = ? AND PASSWORD = ?");

$stmt->execute($username, $password);

C# ADO.NET

This example uses C# and ADO.NET:

using (SqlCommand command = connection.CreateCommand())

{
    command.CommandText = "SELECT * FROM users WHERE USERNAME = @username AND ROOM = @room";    command.Parameters.AddWithValue("@username", username);    command.Parameters.AddWithValue("@room", room);
    using (SqlDataReader dataReader = command.ExecuteReader())    {        // ...    }

}

ADO.NET SqlCommand will accept any type for the value parameter of AddWithValue, and type conversion occurs automatically. Note the use of "named parameters" (i.e. "@username") rather than "?"—this allows you to use a parameter multiple times and in any arbitrary order within the query command text.

However, the AddWithValue method should not be used with variable length data types, like varchar and nvarchar. This is because .NET assumes the length of the parameter to be the length of the given value, rather than getting the actual length from the database via reflection. The consequence of this is that a different query plan is compiled and stored for each different length. In general, the maximum number of "duplicate" plans is the product of the lengths of the variable length columns as specified in the database. For this reason, it is important to use the standard Add method for variable length columns:

{{code|lang=csharp|1=command.Parameters.Add(ParamName, VarChar, ParamLength).Value = ParamValue}}, where ParamLength is the length as specified in the database.

Since the standard Add method needs to be used for variable length data types, it is a good habit to use it for all parameter types.

Python DB-API

This example uses Python and DB-API:

import mysql.connector

conn = None

cursor = None

try:

    conn = mysql.connector.connect(database="mysql", user="root")    cursor = conn.cursor(prepared=True)    cursor.execute("CREATE TABLE IF NOT EXISTS products (name VARCHAR(40), price INT)")    params = [("bike", 10900),              ("shoes", 7400),              ("phone", 29500)]    cursor.executemany("INSERT INTO products VALUES (%s, %s)", params)    params = ("shoes",)    cursor.execute("SELECT * FROM products WHERE name = %s", params)    print(cursor.fetchall()[0][1])

finally:

    if cursor is not None:        cursor.close()    if conn is not None:        conn.close()

Magic Direct SQL

This example uses Direct SQL from Fourth generation language like eDeveloper, uniPaaS and magic XPA from Magic Software Enterprises

 Virtual username  Alpha 20   init: 'sister' Virtual password  Alpha 20   init: 'yellow'  SQL Command:   SELECT * FROM users WHERE USERNAME=:1 AND PASSWORD=:2  Input Arguments:  1:  username 2:  password

PureBasic

PureBasic (since v5.40 LTS) can manage 7 types of link with the following commands

SetDatabaseBlob, SetDatabaseDouble, SetDatabaseFloat, SetDatabaseLong, SetDatabaseNull, SetDatabaseQuad, SetDatabaseString

There are 2 different methods depending on the type of database

For SQLite, ODBC, MariaDB/Mysql use: ?

   SetDatabaseString(#Database, 0, "test")    If DatabaseQuery(#Database, "SELECT * FROM employee WHERE id=?")        ; ...  EndIf  

For PostgreSQL use: $1, $2, $3, ...

  SetDatabaseString(#Database, 0, "Smith") ; -> $1   SetDatabaseString(#Database, 1, "Yes")   ; -> $2  SetDatabaseLong  (#Database, 2, 50)      ; -> $3   If DatabaseQuery(#Database, "SELECT * FROM employee WHERE id=$1 AND active=$2 AND years>$3")        ; ...  EndIf

References

1. ^{{cite web|last=The PHP Documentation Group|title=Prepared statements and stored procedures|url=http://php.net/manual/en/pdo.prepared-statements.php|work=PHP Manual|accessdate=25 September 2011}}
2. ^{{cite web|last=Petrunia|first=Sergey|title=MySQL Optimizer and Prepared Statements|url=http://s.petrunia.net/blog/?p=16|work=Sergey Petrunia's blog|date=28 April 2007|accessdate=25 September 2011}}
3. ^{{cite web|last=Zaitsev|first=Peter|title=MySQL Prepared Statements|url=http://www.mysqlperformanceblog.com/2006/08/02/mysql-prepared-statements/|work=MySQL Performance Blog|date=2 August 2006|accessdate=25 September 2011}}
4. ^{{cite web|title=7.6.3.1. How the Query Cache Operates|url=http://dev.mysql.com/doc/refman/5.1/en/query-cache-operation.html|work=MySQL 5.1 Reference Manual|publisher=Oracle|accessdate=26 September 2011}}
5. ^{{cite web|last= Oracle|title= 20.9.4. C API Prepared Statements|url= http://dev.mysql.com/doc/refman/5.5/en/c-api-prepared-statements.html|work= MySQL 5.5 Reference Manual|accessdate= 27 March 2012}}
6. ^{{cite web|title= 13 Oracle Dynamic SQL|url= http://download.oracle.com/docs/cd/B10501_01/appdev.920/a97269/pc_13dyn.htm|work= Pro*C/C++ Precompiler Programmer's Guide, Release 9.2|publisher= Oracle|accessdate= 25 September 2011}}
7. ^{{cite web|title =Using the PREPARE and EXECUTE statements|url= http://publib.boulder.ibm.com/infocenter/iseries/v5r4/index.jsp?topic=%2Fsqlp%2Frbafyplepexc.htm|work=i5/OS Information Center, Version 5 Release 4|publisher= IBM|accessdate= 25 September 2011}}
8. ^{{cite web|title= SQL Server 2008 R2: Preparing SQL Statements|url= http://msdn.microsoft.com/en-us/library/ms175528.aspx|work= MSDN Library|publisher= Microsoft|accessdate= 25 September 2011}}
9. ^{{cite web|title= PREPARE|url= http://www.postgresql.org/docs/9.5/static/sql-prepare.html|work= PostgreSQL 9.5.1 Documentation|publisher= PostgreSQL Global Development Group|accessdate= 27 February 2016}}
10. ^{{cite web|last= Oracle|title= 12.6. SQL Syntax for Prepared Statements|url= http://dev.mysql.com/doc/refman/5.5/en/sql-syntax-prepared-statements.html|work= MySQL 5.5 Reference Manual|accessdate= 27 March 2012}}
11. ^{{cite web|title= Using Prepared Statements|url= http://download.oracle.com/javase/tutorial/jdbc/basics/prepared.html|work= The Java Tutorials|publisher= Oracle|accessdate= 25 September 2011}}
12. ^{{cite web|last= Bunce|first= Tim|title= DBI-1.616 specification|url= https://metacpan.org/module/DBI#prepare|work= CPAN|accessdate= 26 September 2011}}
13. ^{{cite web|title= Python PEP 289: Python Database API Specification v2.0|url= https://www.python.org/dev/peps/pep-0249/ }}
14. ^{{cite web |url= http://thecodist.com/article/sql-injections-how-not-to-get |title= SQL Injections: How Not To Get Stuck |publisher= The Codist |date= 8 May 2007 |accessdate= February 1, 2010}}

2 : Databases|SQL

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/11 4:05:47