DatabaseNameNotAllowed
DatabaseNameNotAllowed
is a custom policy check that prevents a database name from occurring in an object prefix, such as EDS.lion.table1
.
regex: (?is)(?=create|drop|alter|insert|update|delete|select)(.+)\.(.+)\.(.+)(.+)
This example utilizes Snowflake. You can use this check as it is or customize it further to fit your needs in your SQL database. All Regex Custom Policy Checks can only run against the changelog
, not against the database.
Scope | Database |
---|---|
changelog | Snowflake |

- Install Liquibase 4.29.0+
- Configure a valid Liquibase Pro license key
- Ensure the Liquibase Checks extension is installed. In Liquibase 4.31.0+, it is already installed in the
/liquibase/internal/lib
directory, so no action is needed. If the checks JAR is not installed, downloadliquibase-checks-<version>.jar
and put it in theliquibase/lib
directory.- Maven users only: Add this dependency to your
pom.xml
file:
- Maven users only: Add this dependency to your
<dependency>
<groupId>org.liquibase.ext</groupId>
<artifactId>liquibase-checks</artifactId>
<version>2.0.0</version>
</dependency>

Before creating a custom policy check with Python, we recommend being familiar with:
- Python 3.10.14+. (See here for the official Python tutorial)
- Optional: General coding and Python best practices which will improve your check performance:
- Efficient handling of structured data objects
- Effective and targeted parsing of text, objects, and SQL
- Using regular expressions and other pattern-matching tools within Python
- Using Python virtual environments. Liquibase comes with a built-in virtual environment for Liquibase Custom Policy Checks. The built-in environment includes Liquibase Python modules and some common external Python modules—no configuration needed. However, if you want to install additional modules, or if you want your IDE to recognize the Liquibase modules, you must Create a Python Virtual Environment separately.
Tip: Downloading Python itself is not required to create custom checks in the Liquibase checks framework, but it may be useful to test checks against Python 3.10.14+.
Step-by-Step
Note: These steps describe how to create the custom policy check. It does not exist by default in Liquibase Pro.
- Enter this command into the CLI:
liquibase checks customize --check-name=SqlUserDefinedPatternCheck
- Give your check a short name for easier identification. In this example we will title the check:
DatabaseNameNotAllowed
-
Set the Severity to return a code of 0-4 when triggered.
Options:'INFO'=0, 'MINOR'=1, 'MAJOR'=2, 'CRITICAL'=3, 'BLOCKER'=4
-
Set the SEARCH_STRING to this valid regular expression:
(?is)(?=create|drop|alter|insert|update|delete|select)(.+)\.(.+)\.(.+)(.+)
-
Set the MESSAGE for when a match for regular expression <SEARCH_STRING> is found in a Changeset:
Example:
Error! Database name in object prefix is not allowed.
-
Set STRIP_COMMENTS to
true
if you want to remove the comments from the output.The regex custom policy check is created successfully.
Sample Passing Scripts
CREATE TABLE lion.table1 (val1 number, val2 date);
Sample Failing Scripts
CREATE TABLE EDS.lion.table1 (val1 number, val2 date);
Sample Error Message
CHANGELOG CHECKS
----------------
Checks completed validation of the changelog and found the following issues:
Check Name: Check for specific patterns in sql (DatabaseNameNotAllowed)
Changeset ID: 2
Changeset Filepath: Changelogs/adeel1.sql: Line 1
Check Severity: MAJOR (Return code: 2)
Message: Error! Database name in object prefix is not allowed.