Skip to content

Commit 75fa743

Browse files
committed
Fix a typo in ActiveRecord::Sanitization documentation
1 parent d7f36c9 commit 75fa743

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

activerecord/lib/active_record/sanitization.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ module ClassMethods
2323
# Note that this sanitization method is not schema-aware, hence won't do any type casting
2424
# and will directly use the database adapter's +quote+ method.
2525
# For MySQL specifically this means that numeric parameters will be quoted as strings
26-
# to prevent query manimupation attacks.
26+
# to prevent query manipulation attacks.
2727
#
2828
# sanitize_sql_for_conditions(["role = ?", 0])
2929
# # => "role = '0'"
@@ -55,7 +55,7 @@ def sanitize_sql_for_conditions(condition)
5555
# Note that this sanitization method is not schema-aware, hence won't do any type casting
5656
# and will directly use the database adapter's +quote+ method.
5757
# For MySQL specifically this means that numeric parameters will be quoted as strings
58-
# to prevent query manimupation attacks.
58+
# to prevent query manipulation attacks.
5959
#
6060
# sanitize_sql_for_assignment(["role = ?", 0])
6161
# # => "role = '0'"
@@ -145,7 +145,7 @@ def sanitize_sql_like(string, escape_character = "\\")
145145
# Note that this sanitization method is not schema-aware, hence won't do any type casting
146146
# and will directly use the database adapter's +quote+ method.
147147
# For MySQL specifically this means that numeric parameters will be quoted as strings
148-
# to prevent query manimupation attacks.
148+
# to prevent query manipulation attacks.
149149
#
150150
# sanitize_sql_array(["role = ?", 0])
151151
# # => "role = '0'"

0 commit comments

Comments
 (0)