0.14.0 • Published 1 year ago
@cd2/es-qu-el v0.14.0
ES-QU-EL
yarn add @cd2/es-qu-el
Sanitizing using the SQL function
The SQL
function will automatically escape any interpolated into the string.
import { SQL } from "@cd2/es-qu-el"
const userInput = `dangerous user input ' OR true; `
const sql = SQL`SELECT * FROM table WHERE thing=${userInput}`
A function can be interpolated which will get access to an object with many sanitizers:
const table = `my_table`
const sql = SQL`SELECT * FROM ${as => as.name(table)}`
0.14.0
1 year ago
0.13.1
3 years ago
0.13.2
3 years ago
0.13.0
3 years ago
0.12.0
3 years ago
0.11.0
4 years ago
0.10.0
4 years ago
0.9.0
4 years ago
0.8.3
5 years ago
0.8.2
5 years ago
0.8.1
5 years ago
0.8.0
5 years ago
0.7.0-alpha.1
5 years ago
0.7.0-alpha.0
5 years ago
0.6.0
5 years ago
0.3.1
5 years ago
0.3.0
5 years ago
0.2.3
5 years ago
0.2.2
5 years ago
0.2.1
5 years ago
0.2.0
5 years ago
0.2.0-alpha.14
5 years ago
0.2.0-alpha.13
5 years ago
0.2.0-alpha.12
5 years ago
0.2.0-alpha.11
5 years ago
0.2.0-alpha.10
5 years ago
0.2.0-alpha.9
5 years ago
0.2.0-alpha.8
5 years ago
0.2.0-alpha.7
5 years ago
0.2.0-alpha.6
5 years ago
0.2.0-alpha.5
5 years ago
0.2.0-alpha.4
5 years ago
0.2.0-alpha.3
5 years ago
0.2.0-alpha.2
5 years ago
0.2.0-alpha.1
5 years ago
0.2.0-alpha.0
5 years ago
0.1.0-alpha.8
5 years ago
0.1.0-alpha.7
5 years ago
0.1.0-alpha.6
5 years ago
0.1.0-alpha.5
5 years ago
0.1.0-alpha.4
5 years ago
0.1.0-alpha.3
5 years ago
0.1.0-alpha.2
5 years ago
0.1.0-alpha.1
5 years ago
0.1.0-alpha.0
5 years ago
0.0.2
5 years ago
0.0.1
5 years ago