# frozen_string_literal: true require "arel/errors" require "arel/crud" require "arel/factory_methods" require "arel/expressions" require "arel/predications" require "arel/filter_predications" require "arel/window_predications" require "arel/math" require "arel/alias_predication" require "arel/order_predications" require "arel/table" require "arel/attributes/attribute" require "arel/visitors" require "arel/collectors/sql_string" require "arel/tree_manager" require "arel/insert_manager" require "arel/select_manager" require "arel/update_manager" require "arel/delete_manager" require "arel/nodes" module Arel VERSION = "10.0.0" # Wrap a known-safe SQL string for passing to query methods, e.g. # # Post.order(Arel.sql("REPLACE(title, 'misc', 'zzzz') asc")).pluck(:id) # # Great caution should be taken to avoid SQL injection vulnerabilities. # This method should not be used with unsafe values such as request # parameters or model attributes. def self.sql(raw_sql) Arel::Nodes::SqlLiteral.new raw_sql end def self.star # :nodoc: sql "*" end def self.arel_node?(value) # :nodoc: value.is_a?(Arel::Nodes::Node) || value.is_a?(Arel::Attribute) || value.is_a?(Arel::Nodes::SqlLiteral) end def self.fetch_attribute(value, &block) # :nodoc: unless String === value value.fetch_attribute(&block) end end end