Open a01fe opened 1 week ago
I'm not sure what you mean with dynamic SQL.
Under the hood, any parameter to the sql
interpolator will be replaced with a '?' in the query string, and a matching JDBC parameter will be set. I guess you could create the string manually, but that seems like a recipe for injection attacks.
Is there an escape hatch to run dynamic SQL in situations where SQL parameters aren't supported? For example, this doesn't work: