SQLEscapeXMLSQLEscapeXML
Guide to Escaping XML content for use with SQL insert
Home > Books > NetKernel API and Services Reference > Accessor Listing > RDBMS Accessors and Utilities > SQLEscapeXML

Rate this page:
Really useful
Satisfactory
Not helpful
Confusing
Incorrect
Unsure
Extra comments:


Module

urn:org:ten60:netkernel:mod:db

The SQLEscapeXML accessor is exported by the urn:org:ten60:netkernel:mod:db module. Import this module to gain access to the accessor.

Syntax

URI
active:SQLEscapeXML

ArgumentRulesDescription
operandMandatory the URI of the XML resources

Example Usage

DPML

<instr>
  <type>SQLEscapeXML</type>
  <operand>var:myxml</operand>
  <target>var:escaped</target>
</instr>

NetKernel Foundation API

req=context.createSubRequest("active:SQLEscapeXML");
req.addArgument("operand", [resource representation, aspect, or URI] );
result=context.issueSubRequest(req);

Purpose

The SQLEscapeXML accessor is used to escape all text elements in the operand XML document so that the text may be used in an SQL statement.

SQL parsers require apostrophe " ' " characters to be escaped to double apostrophes " '' ". This accessor escapes all text nodes (attributes and elements) in an XML document so that the text values may be used (substituted into) an SQL statement.

© 2003-2007, 1060 Research Limited. 1060 registered trademark, NetKernel trademark of 1060 Research Limited.