You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,8 @@ The url format for your database may vary! The example below uses a MySQL databa
20
20
set {sql} to the database "mysql://localhost:3306/sys?user=admin&password=12345&useSSL=false"
21
21
```
22
22
23
+
---
24
+
23
25
### Effect `Execute Statement`
24
26
25
27
Executes a statement on a database and optionally stores the result in a variable. Expressions embedded in the query will be escaped to avoid SQL injection.
@@ -40,6 +42,8 @@ execute "select * from table" in {sql} and store the result in {output::*}
40
42
execute "select * from %{table variable}%" in {sql} and store the result in {output::*}
41
43
```
42
44
45
+
---
46
+
43
47
### Expression `Unsafe Expression` => `text`
44
48
45
49
Opts out of automatic SQL injection protection for a specific expression in a statement.
@@ -55,10 +59,14 @@ execute "select %unsafe {columns variable}% from %{table variable}%" in {sql} an
55
59
execute unsafe {fully dynamic query} in {sql}
56
60
```
57
61
62
+
---
63
+
58
64
### Expression `Last Data Source Error` => `text`
59
65
60
66
Stores the error from the last executed statement, if there was one.
0 commit comments