Skip to content

Commit 6d5f6c1

Browse files
Copilotjason810496
andcommitted
Add queue name validation to read_archive methods for SQL injection prevention
Co-authored-by: jason810496 <[email protected]>
1 parent 539ff8c commit 6d5f6c1

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

pgmq_sqlalchemy/queue.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1509,6 +1509,8 @@ def read_archive(self, queue_name: str) -> Optional[Message]:
15091509
print(archived_msg.message)
15101510
15111511
"""
1512+
# Validate queue name first to prevent SQL injection
1513+
self.validate_queue_name(queue_name)
15121514
if self.is_async:
15131515
return self.loop.run_until_complete(self._read_archive_async(queue_name))
15141516
return self._read_archive_sync(queue_name)
@@ -1589,6 +1591,8 @@ def read_archive_batch(
15891591
print(msg.message)
15901592
15911593
"""
1594+
# Validate queue name first to prevent SQL injection
1595+
self.validate_queue_name(queue_name)
15921596
if self.is_async:
15931597
return self.loop.run_until_complete(
15941598
self._read_archive_batch_async(queue_name, batch_size)

0 commit comments

Comments
 (0)