I have the same problem. This slash is a system error, it shouldn't be there. If in the above example the parameter "query" is entered without a value, then it will be included in the string as "query=".
Help me create an API request like this: https://api.privatbank.ua/p24api/pubinfo?json&exchange&coursid=NUMBER where NUMBER is a user variable
I'm fascinated by the platform and features, but this is the second time I've run into the same problem that I can't solve with web searches.
Please help me with this example...
I am creating an API request. I receive the answer in which there is a key-value. Next, I create a SQL query to create a table into which to transfer all received key-values. There is a problem at the stage of creating a SQL request. Key values ββin the query itself are displayed in quotes, which cause an error. But if I use the value of this key in a text field, then there are no quotes there.
I've read all the instructions and can't find anything similar. Sometimes quotes or slashes appear where they should not be, and there is no way to remove them. Help me!
The second problem is more technical, the same as the topic starter. Most likely, this is a system problem - adding extra characters. It is better to remove them, the user can always add them himself.
Thank you for sharing those super detailed screenshots! Hmm, for your first question, have you tried disabling prepared statements?
By default, all of our SQL queries are converted to prepared statements to prevent SQL injection, meaning that table/database names and SQL functions aren't able to be defined using a string created dynamically. The main reason we currently convert all statements into prepared statements, is so that users can't enter malicious syntax (like DROP TABLE) into the variable fields.
You can disable this setting in the resource setup, but keep in mind the potential of submitting dangerous SQL through any of the variables referenced in a query. Disabling prepared statements can also break other existing queries. If that's something you'd like to explore, I often recommend setting up another copy of a resource with that setting enabled to help limit the surface area that you have to keep in mind SQL injection for.