UNPKG

conf

Version:

Simple config handling for your app or module

312 lines (251 loc) 12.5 kB
import { type JSONSchema as TypedJSONSchema } from 'json-schema-typed'; import type { Options as AjvOptions_ } from 'ajv'; import type Conf from './index.js'; export type AjvOptions = AjvOptions_; export type Options<T extends Record<string, unknown>> = { /** Config used if there are no existing config. **Note:** The values in `defaults` will overwrite the `default` key in the `schema` option. */ defaults?: Readonly<T>; /** [JSON Schema](https://json-schema.org) to validate your config data. This will be the [`properties`](https://json-schema.org/understanding-json-schema/reference/object.html#properties) object of the JSON schema. That is, define `schema` as an object where each key is the name of your data's property and each value is a JSON schema used to validate that property. **Note:** The ajv dependency may cause CSP violations. See readme FAQ for workarounds. @example ``` import Conf from 'conf'; const schema = { foo: { type: 'number', maximum: 100, minimum: 1, default: 50 }, bar: { type: 'string', format: 'url' } }; const config = new Conf({ projectName: 'foo', schema }); console.log(config.get('foo')); //=> 50 config.set('foo', '1'); // [Error: Config schema violation: `foo` should be number] ``` **Note:** The `default` value will be overwritten by the `defaults` option if set. */ schema?: Schema<T>; /** Top-level properties for the schema, excluding `properties` field. @example ``` import Conf from 'conf'; const store = new Conf({ projectName: 'foo', schema: {}, rootSchema: { additionalProperties: false } }); ``` */ rootSchema?: Omit<TypedJSONSchema, 'properties'>; /** [Options passed to AJV](https://ajv.js.org/options.html). Under the hood, the JSON Schema validator [ajv](https://ajv.js.org/json-schema.html) is used to validate your config. We use [JSON Schema draft-2020-12](https://json-schema.org/draft/2020-12/release-notes) and support all validation keywords and formats. **Note:** By default, `allErrors` and `useDefaults` are both set to `true`, but can be overridden. @example ``` import Conf from 'conf'; const store = new Conf({ projectName: 'foo', schema: {}, rootSchema: { additionalProperties: false }, ajvOptions: { removeAdditional: true } }); ``` */ ajvOptions?: AjvOptions; /** Name of the config file (without extension). Useful if you need multiple config files for your app or module. For example, different config files between two major versions. @default 'config' */ configName?: string; /** __Required unless you specify the `cwd` option.__ You can fetch the `name` field from package.json. */ projectName?: string; /** __Required if you specify the `migrations` option.__ You can fetch the `version` field from package.json. */ projectVersion?: string; /** You can use migrations to perform operations to the store whenever a version is changed. The `migrations` object should consist of a key-value pair of `'version': handler`. The `version` can also be a [semver range](https://github.com/npm/node-semver#ranges). Note: The version the migrations use refers to the __project version__ by default. If you want to change this behavior, specify the `projectVersion` option. @example ``` import Conf from 'conf'; const store = new Conf({ projectName: 'foo', projectVersion: …, migrations: { '0.0.1': store => { store.set('debugPhase', true); }, '1.0.0': store => { store.delete('debugPhase'); store.set('phase', '1.0.0'); }, '1.0.2': store => { store.set('phase', '1.0.2'); }, '>=2.0.0': store => { store.set('phase', '>=2.0.0'); } } }); ``` */ migrations?: Migrations<T>; /** The given callback function will be called before each migration step. This can be useful for logging purposes, preparing migration data, etc. */ beforeEachMigration?: BeforeEachMigrationCallback<T>; /** __You most likely don't need this. Please don't use it unless you really have to.__ Default: System default user [config directory](https://github.com/sindresorhus/env-paths#pathsconfig). Overrides `projectName`. By default the config is stored in the [system user's config directory](https://github.com/sindresorhus/env-paths#pathsconfig); running under another user reads a different store. Set `cwd` to share across users. The only use-case I can think of is having the config located in the app directory or on some external storage. */ cwd?: string; /** Note that this is __not intended for security purposes__, since the encryption key would be easily found inside a plain-text Node.js app. Its main use is for obscurity. If a user looks through the config directory and finds the config file, since it's just a JSON file, they may be tempted to modify it. By providing an encryption key, the file will be obfuscated, which should hopefully deter any users from doing so. When using `aes-256-gcm`, the config file is authenticated. If the file is changed in any way, the decryption will fail. With `aes-256-cbc` and `aes-256-ctr`, tampering can go undetected. When specified, the store will be encrypted using the `encryptionAlgorithm` option (defaults to `aes-256-cbc`). */ encryptionKey?: string | Uint8Array | NodeJS.TypedArray | DataView; /** Encryption algorithm to use when `encryptionKey` is set. Use `aes-256-gcm` if you want authentication, otherwise use `aes-256-cbc` or `aes-256-ctr`. Changing `encryptionAlgorithm` will make existing encrypted data unreadable. When using `aes-256-gcm` or `aes-256-ctr`, existing plaintext config files are not supported. Delete the config file or migrate it before enabling encryption. With `aes-256-cbc`, existing plaintext config files are still readable for backward compatibility. @default 'aes-256-cbc' */ encryptionAlgorithm?: 'aes-256-cbc' | 'aes-256-gcm' | 'aes-256-ctr'; /** Extension of the config file. You would usually not need this, but could be useful if you want to interact with a file with a custom file extension that can be associated with your app. These might be simple save/export/preference files that are intended to be shareable or saved outside of the app. @default 'json' */ fileExtension?: string; /** The config is cleared if reading the config file causes a `SyntaxError` (malformed JSON), a schema validation error when using the `schema` option, or a decryption failure when using `encryptionKey`. This is a good behavior for unimportant data, as the config file is not intended to be hand-edited, so it usually means the config is corrupt and there's nothing the user can do about it anyway. However, if you let the user edit the config file directly, mistakes might happen and it could be more useful to throw an error when the config is invalid instead of clearing. @default false */ clearInvalidConfig?: boolean; /** Function to serialize the config object to a UTF-8 string when writing the config file. You would usually not need this, but it could be useful if you want to use a format other than JSON. @default value => JSON.stringify(value, null, '\t') */ readonly serialize?: Serialize<T>; /** Function to deserialize the config object from a UTF-8 string when reading the config file. You would usually not need this, but it could be useful if you want to use a format other than JSON. @default JSON.parse */ readonly deserialize?: Deserialize<T>; /** __You most likely don't need this. Please don't use it unless you really have to.__ Suffix appended to `projectName` during config file creation to avoid name conflicts with native apps. You can pass an empty string to remove the suffix. For example, on macOS, the config file will be stored in the `~/Library/Preferences/foo-nodejs` directory, where `foo` is the `projectName`. @default 'nodejs' */ readonly projectSuffix?: string; /** Access nested properties by dot notation. @default true @example ``` const config = new Conf({projectName: 'foo'}); config.set({ foo: { bar: { foobar: '🦄' } } }); console.log(config.get('foo.bar.foobar')); //=> '🦄' ``` Alternatively, you can set this option to `false` so the whole string would be treated as one key. @example ``` const config = new Conf({ projectName: 'foo', accessPropertiesByDotNotation: false }); config.set({ 'foo.bar.foobar': '🦄' }); console.log(config.get('foo.bar.foobar')); //=> '🦄' ``` */ readonly accessPropertiesByDotNotation?: boolean; /** Watch for any changes in the config file and call the callback for `onDidChange` or `onDidAnyChange` if set. This is useful if there are multiple processes changing the same config file. @default false */ readonly watch?: boolean; /** The [mode](https://en.wikipedia.org/wiki/File-system_permissions#Numeric_notation) used when creating the config file. The mode is modified by the [process umask](https://en.wikipedia.org/wiki/Umask). With the typical umask of `0o022`, the default results in `0o644`. Config files are also stored in the user's home directory (`~/.config/`), which is typically protected. You would usually not need this, but it could be useful if you use a custom `cwd`. Setting `0o600` would make the file only readable by the owner. Note that setting restrictive permissions can cause problems if different users need to read the file. A common problem is a user running your tool with and without `sudo` and then not being able to access the config the second time. @default 0o666 */ readonly configFileMode?: number; }; export type Migrations<T extends Record<string, unknown>> = Record<string, (store: Conf<T>) => void>; export type BeforeEachMigrationContext = { fromVersion: string; toVersion: string; finalVersion: string; versions: string[]; }; export type BeforeEachMigrationCallback<T extends Record<string, unknown>> = (store: Conf<T>, context: BeforeEachMigrationContext) => void; export type Schema<T> = { [Property in keyof T]: ValueSchema; }; export type ValueSchema = TypedJSONSchema; export type Serialize<T> = (value: T) => string; export type Deserialize<T> = (text: string) => T; export type OnDidChangeCallback<T> = (newValue?: T, oldValue?: T) => void; export type OnDidAnyChangeCallback<T> = (newValue: Readonly<T>, oldValue?: Readonly<T>) => void; export type Unsubscribe = () => void; export type DotNotationKeyOf<T extends Record<string, unknown>> = { [K in keyof Required<T>]: K extends string ? Required<T>[K] extends Record<string, unknown> ? K | `${K}.${DotNotationKeyOf<Required<T>[K]>}` : K : never; }[keyof T]; export type DotNotationValueOf<T extends Record<string, unknown>, K extends DotNotationKeyOf<T>> = K extends `${infer Head}.${infer Tail}` ? Head extends keyof T ? T[Head] extends Record<string, unknown> ? Tail extends DotNotationKeyOf<T[Head]> ? DotNotationValueOf<T[Head], Tail> : never : Required<T>[Head] extends Record<string, unknown> ? Tail extends DotNotationKeyOf<Required<T>[Head]> ? DotNotationValueOf<Required<T>[Head], Tail> | undefined : never : never : never : K extends keyof T ? T[K] : never; type ImmutablePrimitives = Date | RegExp | URL | Error; export type PartialObjectDeep<T> = T extends ImmutablePrimitives ? T : T extends Map<infer K, infer V> ? Map<PartialObjectDeep<K>, PartialObjectDeep<V>> : T extends Set<infer U> ? Set<PartialObjectDeep<U>> : T extends Array<infer U> ? Array<PartialObjectDeep<U>> : T extends (...args: unknown[]) => unknown ? T : T extends Record<string, unknown> ? { [K in keyof T]?: PartialObjectDeep<T[K]>; } : T; export {};