0.14.0 • Published 3 years ago
@cd2/es-qu-el v0.14.0
ES-QU-EL
yarn add @cd2/es-qu-el
Sanitizing using the SQL function
The SQL
function will automatically escape any interpolated into the string.
import { SQL } from "@cd2/es-qu-el"
const userInput = `dangerous user input ' OR true; `
const sql = SQL`SELECT * FROM table WHERE thing=${userInput}`
A function can be interpolated which will get access to an object with many sanitizers:
const table = `my_table`
const sql = SQL`SELECT * FROM ${as => as.name(table)}`
0.14.0
3 years ago
0.13.1
4 years ago
0.13.2
4 years ago
0.13.0
4 years ago
0.12.0
5 years ago
0.11.0
5 years ago
0.10.0
5 years ago
0.9.0
5 years ago
0.8.3
6 years ago
0.8.2
6 years ago
0.8.1
6 years ago
0.8.0
6 years ago
0.7.0-alpha.1
6 years ago
0.7.0-alpha.0
6 years ago
0.6.0
6 years ago
0.3.1
6 years ago
0.3.0
6 years ago
0.2.3
6 years ago
0.2.2
6 years ago
0.2.1
6 years ago
0.2.0
6 years ago
0.2.0-alpha.14
6 years ago
0.2.0-alpha.13
6 years ago
0.2.0-alpha.12
6 years ago
0.2.0-alpha.11
6 years ago
0.2.0-alpha.10
6 years ago
0.2.0-alpha.9
6 years ago
0.2.0-alpha.8
6 years ago
0.2.0-alpha.7
6 years ago
0.2.0-alpha.6
6 years ago
0.2.0-alpha.5
6 years ago
0.2.0-alpha.4
6 years ago
0.2.0-alpha.3
6 years ago
0.2.0-alpha.2
6 years ago
0.2.0-alpha.1
6 years ago
0.2.0-alpha.0
6 years ago
0.1.0-alpha.8
6 years ago
0.1.0-alpha.7
6 years ago
0.1.0-alpha.6
6 years ago
0.1.0-alpha.5
6 years ago
0.1.0-alpha.4
6 years ago
0.1.0-alpha.3
6 years ago
0.1.0-alpha.2
6 years ago
0.1.0-alpha.1
6 years ago
0.1.0-alpha.0
6 years ago
0.0.2
6 years ago
0.0.1
6 years ago