UNPKG

pg-connection-string

Version:
209 lines (177 loc) 6.08 kB
'use strict' //Parse method copied from https://github.com/brianc/node-postgres //Copyright (c) 2010-2014 Brian Carlson (brian.m.carlson@gmail.com) //MIT License //parses a connection string function parse(str, options = {}) { //unix socket if (str.charAt(0) === '/') { const config = str.split(' ') return { host: config[0], database: config[1] } } // Check for empty host in URL const config = {} let result let dummyHost = false if (/ |%[^a-f0-9]|%[a-f0-9][^a-f0-9]/i.test(str)) { // Ensure spaces are encoded as %20 str = encodeURI(str).replace(/%25(\d\d)/g, '%$1') } try { result = new URL(str, 'postgres://base') } catch (e) { // The URL is invalid so try again with a dummy host result = new URL(str.replace('@/', '@___DUMMY___/'), 'postgres://base') dummyHost = true } // We'd like to use Object.fromEntries() here but Node.js 10 does not support it for (const entry of result.searchParams.entries()) { config[entry[0]] = entry[1] } config.user = config.user || decodeURIComponent(result.username) config.password = config.password || decodeURIComponent(result.password) if (result.protocol == 'socket:') { config.host = decodeURI(result.pathname) config.database = result.searchParams.get('db') config.client_encoding = result.searchParams.get('encoding') return config } const hostname = dummyHost ? '' : result.hostname if (!config.host) { // Only set the host if there is no equivalent query param. config.host = decodeURIComponent(hostname) } else if (hostname && /^%2f/i.test(hostname)) { // Only prepend the hostname to the pathname if it is not a URL encoded Unix socket host. result.pathname = hostname + result.pathname } if (!config.port) { // Only set the port if there is no equivalent query param. config.port = result.port } const pathname = result.pathname.slice(1) || null config.database = pathname ? decodeURI(pathname) : null if (config.ssl === 'true' || config.ssl === '1') { config.ssl = true } if (config.ssl === '0') { config.ssl = false } if (config.sslcert || config.sslkey || config.sslrootcert || config.sslmode) { config.ssl = {} } // Only try to load fs if we expect to read from the disk const fs = config.sslcert || config.sslkey || config.sslrootcert ? require('fs') : null if (config.sslcert) { config.ssl.cert = fs.readFileSync(config.sslcert).toString() } if (config.sslkey) { config.ssl.key = fs.readFileSync(config.sslkey).toString() } if (config.sslrootcert) { config.ssl.ca = fs.readFileSync(config.sslrootcert).toString() } if (options.useLibpqCompat && config.uselibpqcompat) { throw new Error('Both useLibpqCompat and uselibpqcompat are set. Please use only one of them.') } if (config.uselibpqcompat === 'true' || options.useLibpqCompat) { switch (config.sslmode) { case 'disable': { config.ssl = false break } case 'prefer': { config.ssl.rejectUnauthorized = false break } case 'require': { if (config.sslrootcert) { // If a root CA is specified, behavior of `sslmode=require` will be the same as that of `verify-ca` config.ssl.checkServerIdentity = function () {} } else { config.ssl.rejectUnauthorized = false } break } case 'verify-ca': { if (!config.ssl.ca) { throw new Error( 'SECURITY WARNING: Using sslmode=verify-ca requires specifying a CA with sslrootcert. If a public CA is used, verify-ca allows connections to a server that somebody else may have registered with the CA, making you vulnerable to Man-in-the-Middle attacks. Either specify a custom CA certificate with sslrootcert parameter or use sslmode=verify-full for proper security.' ) } config.ssl.checkServerIdentity = function () {} break } case 'verify-full': { break } } } else { switch (config.sslmode) { case 'disable': { config.ssl = false break } case 'prefer': case 'require': case 'verify-ca': case 'verify-full': { break } case 'no-verify': { config.ssl.rejectUnauthorized = false break } } } return config } // convert pg-connection-string ssl config to a ClientConfig.ConnectionOptions function toConnectionOptions(sslConfig) { const connectionOptions = Object.entries(sslConfig).reduce((c, [key, value]) => { // we explicitly check for undefined and null instead of `if (value)` because some // options accept falsy values. Example: `ssl.rejectUnauthorized = false` if (value !== undefined && value !== null) { c[key] = value } return c }, {}) return connectionOptions } // convert pg-connection-string config to a ClientConfig function toClientConfig(config) { const poolConfig = Object.entries(config).reduce((c, [key, value]) => { if (key === 'ssl') { const sslConfig = value if (typeof sslConfig === 'boolean') { c[key] = sslConfig } if (typeof sslConfig === 'object') { c[key] = toConnectionOptions(sslConfig) } } else if (value !== undefined && value !== null) { if (key === 'port') { // when port is not specified, it is converted into an empty string // we want to avoid NaN or empty string as a values in ClientConfig if (value !== '') { const v = parseInt(value, 10) if (isNaN(v)) { throw new Error(`Invalid ${key}: ${value}`) } c[key] = v } } else { c[key] = value } } return c }, {}) return poolConfig } // parses a connection string into ClientConfig function parseIntoClientConfig(str) { return toClientConfig(parse(str)) } module.exports = parse parse.parse = parse parse.toClientConfig = toClientConfig parse.parseIntoClientConfig = parseIntoClientConfig