跳到內文 跳到搜尋
方法
S

執行個體公開的方法

sanitize_sql(condition)

sanitize_sql_array(ary)

接受條件陣列。陣列中每個值均已過消毒並內插到 SQL 陳述式中。若在需要使用冒號的 SQL 陳述式中使用命名繫結變數,請使用反斜線進行跳脫。

sanitize_sql_array(["name=? and group_id=?", "foo'bar", 4])
# => "name='foo''bar' and group_id=4"

sanitize_sql_array(["name=:name and group_id=:group_id", name: "foo'bar", group_id: 4])
# => "name='foo''bar' and group_id=4"

sanitize_sql_array(["TO_TIMESTAMP(:date, 'YYYY/MM/DD HH12\\:MI\\:SS')", date: "foo"])
# => "TO_TIMESTAMP('foo', 'YYYY/MM/DD HH12:MI:SS')"

sanitize_sql_array(["name='%s' and group_id='%s'", "foo'bar", 4])
# => "name='foo''bar' and group_id='4'"

請注意,此消毒方法不具備架構辨識功能,因此不會進行任何類型轉換,並會直接使用資料庫適配器的 quote 方法。特別是 MySQL 的部分,這表示數值參數會標示為字串以防止查詢處理攻擊。

sanitize_sql_array(["role = ?", 0])
# => "role = '0'"
# File activerecord/lib/active_record/sanitization.rb, line 164
def sanitize_sql_array(ary)
  statement, *values = ary
  if values.first.is_a?(Hash) && /:\w+/.match?(statement)
    with_connection do |c|
      replace_named_bind_variables(c, statement, values.first)
    end
  elsif statement.include?("?")
    with_connection do |c|
      replace_bind_variables(c, statement, values)
    end
  elsif statement.blank?
    statement
  else
    with_connection do |c|
      statement % values.collect { |value| c.quote_string(value.to_s) }
    end
  end
end

sanitize_sql_for_assignment(assignments, default_table_name = table_name)

接受 SQL 條件陣列或雜湊,並將它們消毒成 SET 子句的有效 SQL 片段。

sanitize_sql_for_assignment(["name=? and group_id=?", nil, 4])
# => "name=NULL and group_id=4"

sanitize_sql_for_assignment(["name=:name and group_id=:group_id", name: nil, group_id: 4])
# => "name=NULL and group_id=4"

Post.sanitize_sql_for_assignment({ name: nil, group_id: 4 })
# => "`posts`.`name` = NULL, `posts`.`group_id` = 4"

此方法不會消毒 SQL 字串,因為它不會包含任何條件,且會按原樣回傳字串。

sanitize_sql_for_assignment("name=NULL and group_id='4'")
# => "name=NULL and group_id='4'"

請注意,此消毒方法不具備架構辨識功能,因此不會進行任何類型轉換,並會直接使用資料庫適配器的 quote 方法。特別是 MySQL 的部分,這表示數值參數會標示為字串以防止查詢處理攻擊。

sanitize_sql_for_assignment(["role = ?", 0])
# => "role = '0'"
# File activerecord/lib/active_record/sanitization.rb, line 68
def sanitize_sql_for_assignment(assignments, default_table_name = table_name)
  case assignments
  when Array; sanitize_sql_array(assignments)
  when Hash;  sanitize_sql_hash_for_assignment(assignments, default_table_name)
  else        assignments
  end
end

sanitize_sql_for_conditions(condition)

接受 SQL 條件陣列,並將它們消毒成 WHERE 子句的有效 SQL 片段。

sanitize_sql_for_conditions(["name=? and group_id=?", "foo'bar", 4])
# => "name='foo''bar' and group_id=4"

sanitize_sql_for_conditions(["name=:name and group_id=:group_id", name: "foo'bar", group_id: 4])
# => "name='foo''bar' and group_id='4'"

sanitize_sql_for_conditions(["name='%s' and group_id='%s'", "foo'bar", 4])
# => "name='foo''bar' and group_id='4'"

此方法不會消毒 SQL 字串,因為它不會包含任何條件,且會按原樣回傳字串。

sanitize_sql_for_conditions("name='foo''bar' and group_id='4'")
# => "name='foo''bar' and group_id='4'"

請注意,此消毒方法不具備架構辨識功能,因此不會進行任何類型轉換,並會直接使用資料庫適配器的 quote 方法。特別是 MySQL 的部分,這表示數值參數會標示為字串以防止查詢處理攻擊。

sanitize_sql_for_conditions(["role = ?", 0])
# => "role = '0'"
別名也稱為: sanitize_sql
# File activerecord/lib/active_record/sanitization.rb, line 33
def sanitize_sql_for_conditions(condition)
  return nil if condition.blank?

  case condition
  when Array; sanitize_sql_array(condition)
  else        condition
  end
end

sanitize_sql_for_order(condition)

接受 SQL 條件陣列或字串,並將它們消毒成 ORDER 子句的有效 SQL 片段。

sanitize_sql_for_order([Arel.sql("field(id, ?)"), [1,3,2]])
# => "field(id, 1,3,2)"

sanitize_sql_for_order("id ASC")
# => "id ASC"
# File activerecord/lib/active_record/sanitization.rb, line 84
def sanitize_sql_for_order(condition)
  if condition.is_a?(Array) && condition.first.to_s.include?("?")
    disallow_raw_sql!(
      [condition.first],
      permit: adapter_class.column_name_with_order_matcher
    )

    # Ensure we aren't dealing with a subclass of String that might
    # override methods we use (e.g. Arel::Nodes::SqlLiteral).
    if condition.first.kind_of?(String) && !condition.first.instance_of?(String)
      condition = [String.new(condition.first), *condition[1..-1]]
    end

    Arel.sql(sanitize_sql_array(condition))
  else
    condition
  end
end

sanitize_sql_hash_for_assignment(attrs, table)

將屬性/值配對雜湊消毒成 SET 子句的 SQL 條件。

sanitize_sql_hash_for_assignment({ status: nil, group_id: 1 }, "posts")
# => "`posts`.`status` = NULL, `posts`.`group_id` = 1"
# File activerecord/lib/active_record/sanitization.rb, line 107
def sanitize_sql_hash_for_assignment(attrs, table)
  with_connection do |c|
    attrs.map do |attr, value|
      type = type_for_attribute(attr)
      value = type.serialize(type.cast(value))
      "#{c.quote_table_name_for_assignment(table, attr)} = #{c.quote(value)}"
    end.join(", ")
  end
end

sanitize_sql_like(字串, 逃逸字元 = "\\")

清除 sanitizes 一個 字串,使其可以在 SQL LIKE 語句中安全使用。此方法使用 escape_character 來逃逸所有本身、“_”及 "%” 的出現。

sanitize_sql_like("100% true!")
# => "100\\% true!"

sanitize_sql_like("snake_cased_string")
# => "snake\\_cased\\_string"

sanitize_sql_like("100% true!", "!")
# => "100!% true!!"

sanitize_sql_like("snake_cased_string", "!")
# => "snake!_cased!_string"
# File activerecord/lib/active_record/sanitization.rb, line 132
def sanitize_sql_like(string, escape_character = "\\")
  if string.include?(escape_character) && escape_character != "%" && escape_character != "_"
    string = string.gsub(escape_character, '\0\0')
  end

  string.gsub(/(?=[%_])/, escape_character)
end