Documentation Source Text

Check-in [6ddbe9cdf0]
Login

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview
Comment:Fix a typo in the limits.html document.
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1: 6ddbe9cdf0b2979704ff1445bf56f0c9977fd51b
User & Date: drh 2009-03-19 00:04:57
Context
2009-03-19
09:01
Update unlock_notify.html to include a wrapper for sqlite3_prepare_v2(). check-in: c020c0034c user: dan tags: trunk
00:04
Fix a typo in the limits.html document. check-in: 6ddbe9cdf0 user: drh tags: trunk
2009-03-18
15:14
Add a new FAQ entry that attempts to explain the difference between single quotes and double quotes. check-in: b405f2eeeb user: drh tags: trunk
Changes
Hide Diffs Unified Diffs Ignore Whitespace Patch

Changes to pages/limits.in.

41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
limits to avoid excess resource utilization in the event of
bug in higher-level SQL statement generators or to help thwart 
attackers who inject malicious SQL statements.
</p>

<p>
Some limits can be changed at run-time on a per-connection basis
using the [sqlite3_limit()] interface with on of the
[SQLITE_LIMIT_LENGTH | limit categories] defined for that interface.
Run-time limits are designed for applications that have multiple
databases, some of which are for internal use only and others which
can be influenced or controlled by potentially hostile external agents.
For example, a web browser application might use an internal database
to track historical page views but have one or more separate databases
that are created and controlled by javascript applications that are







|







41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
limits to avoid excess resource utilization in the event of
bug in higher-level SQL statement generators or to help thwart 
attackers who inject malicious SQL statements.
</p>

<p>
Some limits can be changed at run-time on a per-connection basis
using the [sqlite3_limit()] interface with one of the
[SQLITE_LIMIT_LENGTH | limit categories] defined for that interface.
Run-time limits are designed for applications that have multiple
databases, some of which are for internal use only and others which
can be influenced or controlled by potentially hostile external agents.
For example, a web browser application might use an internal database
to track historical page views but have one or more separate databases
that are created and controlled by javascript applications that are