Skip to content

Conversation

@dgraham
Copy link
Member

@dgraham dgraham commented Aug 8, 2022

Escape question mark parameters with a built-in sanitization function and allow external libraries to override it. Escaping follows the rules of mysql_real_escape_string().

conn.execute('select * from users where id > ?', [42]) // => 'select * from users where id > 42'
Escape question mark parameters with a built-in sanitization function and allow external libraries to override it. Escaping follows the rules of [`mysql_real_escape_string()`][1]. ```js conn.execute('select * from users where id > ?', [42]) ``` [1]: https://dev.mysql.com/doc/c-api/8.0/en/mysql-real-escape-string.html
@dgraham dgraham requested a review from iheanyi August 8, 2022 21:43
Copy link
Contributor

@iheanyi iheanyi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, but there are some linting errors that need to be fixed.

@dgraham dgraham merged commit 6ed66f1 into main Aug 8, 2022
@dgraham dgraham deleted the quote-values branch August 8, 2022 22:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

2 participants