cocoon-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 18900] - [ESQL] Multibyte chars in esql:query are not escaped
Date Thu, 10 Apr 2003 16:50:51 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=18900>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=18900

[ESQL] Multibyte chars in esql:query are not escaped





------- Additional Comments From tnowak-p@netventure.pl  2003-04-10 16:50 -------
Unfortunatly that doesn't work too (see incoming attachments).
It seems that esql.xsp is totaly "escapeless"
What I get from your idea is:

 String s = "???";

Now I don't see any chances NOT TO MODIFY/PATCH Cocoon's 2.0.4 esql.xsl.
But how do I do it? :) (actually I'm not a Java programmer)
I've already noticed that this statment
_esql_query = new EsqlQuery( _esql_connection, String.valueOf(<xsl:copy-of 
select="$query"/>) );

rewrites sql query into java code.
Is there any standard (?) Java method to escape this in the manner
XSLTExtension class does? I've noticed XSLTExtention class is prepared
especialiy for xsp.xsl which is mostly xsl. But above _sql_query is
a pure java part..

Can I get some help from any real Java programmer here?

Mime
View raw message