3 // MySQL database class
5 // For debugging, insert 'dbg(x);' anywhere in the program flow.
6 // x = 1: display db success/failure following content
7 // x = 2: display full queries following content
8 // x = 3: display full queries using echo; which will mess up display
9 // really bad but will return output in stubborn cases.
11 if(! class_exists('dba')) {
17 function __construct($server,$user,$pass,$db,$install = false) {
18 $this->db = @new mysqli($server,$user,$pass,$db);
19 if((mysqli_connect_errno()) && (! install))
23 public function getdb() {
27 public function q($sql) {
33 $result = @$this->db->query($sql);
39 if($this->db->mysqli->errno)
40 $debug_text .= $this->db->mysqli->error . EOL;
44 elseif($result === true)
47 $mesg = $result->num_rows.' results' . EOL;
49 $str = 'SQL = ' . printable($sql) . EOL . 'SQL returned ' . $mesg . EOL;
51 switch($this->debug) {
61 if(($result === true) || ($result === false))
65 if($result->num_rows) {
66 while($x = $result->fetch_array(MYSQL_ASSOC))
68 $result->free_result();
72 $debug_text .= printable(print_r($r, true). EOL);
73 elseif($this->debug == 3)
74 echo printable(print_r($r, true) . EOL) ;
79 public function dbg($dbg) {
83 public function escape($str) {
84 return @$this->db->real_escape_string($str);
87 function __destruct() {
92 if(! function_exists('printable')) {
93 function printable($s) {
94 $s = preg_replace("~([\x01-\x08\x0E-\x0F\x10-\x1F\x7F-\xFF])~",".", $s);
95 $s = str_replace("\x00",'.',$s);
96 if(x($_SERVER,'SERVER_NAME'))
101 // Procedural functions
102 if(! function_exists('dbg')) {
103 function dbg($state) {
108 if(! function_exists('dbesc')) {
109 function dbesc($str) {
111 return($db->escape($str));
115 // Function: q($sql,$args);
116 // Description: execute SQL query with printf style args.
117 // Example: $r = q("SELECT * FROM `%s` WHERE `uid` = %d",
120 if(! function_exists('q')) {
124 $args = func_get_args();
126 $ret = $db->q(vsprintf($sql,$args));
131 // Caller is responsible for ensuring that any integer arguments to
132 // dbesc_array are actually integers and not malformed strings containing
133 // SQL injection vectors. All integer array elements should be specifically
134 // cast to int to avoid trouble.
137 if(! function_exists('dbesc_array_cb')) {
138 function dbesc_array_cb(&$item, $key) {
140 $item = dbesc($item);
144 if(! function_exists('dbesc_array')) {
145 function dbesc_array(&$arr) {
146 if(is_array($arr) && count($arr)) {
147 array_walk($arr,'dbesc_array_cb');