This method has been moved to hydra-eval-jobset a long time ago.
FSG2TTSKS3HT5MZ2KNXK7OH5IUXBSMJYLKXQP5KYHZGALZAW5DBQC foreach my $attr (@attrs) {$attr =~ /^([\w-]+)=([\w-]*)$/ or die "invalid attribute in view: $attr";my $name = $1;my $value = $2;# !!! Yes, this is horribly injection-prone... (though# name/value are filtered above). Should use SQL::Abstract,# but it can't deal with subqueries. At least we should use# placeholders.$query .= " and exists (select 1 from buildinputs where build = $id and name = '$name' and value = '$value')";}return $query;}