
- Updated package.json to use PostgreSQL dependencies (pg, @types/pg)
- Removed SQLite dependency
- Updated TypeORM configuration for PostgreSQL connection
- Modified database entities to use PostgreSQL-compatible column types (jsonb, timestamp)
- Created comprehensive database migration script for initial schema
- Updated environment configuration with PostgreSQL variables
- Updated README with PostgreSQL setup instructions and database migration steps
- Ensured storage directories are properly configured
🤖 Generated with BackendIM
Co-Authored-By: Claude <noreply@anthropic.com>
214 lines
6.1 KiB
JavaScript
214 lines
6.1 KiB
JavaScript
'use strict'
|
|
|
|
//Parse method copied from https://github.com/brianc/node-postgres
|
|
//Copyright (c) 2010-2014 Brian Carlson (brian.m.carlson@gmail.com)
|
|
//MIT License
|
|
|
|
//parses a connection string
|
|
function parse(str, options = {}) {
|
|
//unix socket
|
|
if (str.charAt(0) === '/') {
|
|
const config = str.split(' ')
|
|
return { host: config[0], database: config[1] }
|
|
}
|
|
|
|
// Check for empty host in URL
|
|
|
|
const config = {}
|
|
let result
|
|
let dummyHost = false
|
|
if (/ |%[^a-f0-9]|%[a-f0-9][^a-f0-9]/i.test(str)) {
|
|
// Ensure spaces are encoded as %20
|
|
str = encodeURI(str).replace(/%25(\d\d)/g, '%$1')
|
|
}
|
|
|
|
try {
|
|
try {
|
|
result = new URL(str, 'postgres://base')
|
|
} catch (e) {
|
|
// The URL is invalid so try again with a dummy host
|
|
result = new URL(str.replace('@/', '@___DUMMY___/'), 'postgres://base')
|
|
dummyHost = true
|
|
}
|
|
} catch (err) {
|
|
// Remove the input from the error message to avoid leaking sensitive information
|
|
err.input && (err.input = '*****REDACTED*****')
|
|
}
|
|
|
|
// We'd like to use Object.fromEntries() here but Node.js 10 does not support it
|
|
for (const entry of result.searchParams.entries()) {
|
|
config[entry[0]] = entry[1]
|
|
}
|
|
|
|
config.user = config.user || decodeURIComponent(result.username)
|
|
config.password = config.password || decodeURIComponent(result.password)
|
|
|
|
if (result.protocol == 'socket:') {
|
|
config.host = decodeURI(result.pathname)
|
|
config.database = result.searchParams.get('db')
|
|
config.client_encoding = result.searchParams.get('encoding')
|
|
return config
|
|
}
|
|
const hostname = dummyHost ? '' : result.hostname
|
|
if (!config.host) {
|
|
// Only set the host if there is no equivalent query param.
|
|
config.host = decodeURIComponent(hostname)
|
|
} else if (hostname && /^%2f/i.test(hostname)) {
|
|
// Only prepend the hostname to the pathname if it is not a URL encoded Unix socket host.
|
|
result.pathname = hostname + result.pathname
|
|
}
|
|
if (!config.port) {
|
|
// Only set the port if there is no equivalent query param.
|
|
config.port = result.port
|
|
}
|
|
|
|
const pathname = result.pathname.slice(1) || null
|
|
config.database = pathname ? decodeURI(pathname) : null
|
|
|
|
if (config.ssl === 'true' || config.ssl === '1') {
|
|
config.ssl = true
|
|
}
|
|
|
|
if (config.ssl === '0') {
|
|
config.ssl = false
|
|
}
|
|
|
|
if (config.sslcert || config.sslkey || config.sslrootcert || config.sslmode) {
|
|
config.ssl = {}
|
|
}
|
|
|
|
// Only try to load fs if we expect to read from the disk
|
|
const fs = config.sslcert || config.sslkey || config.sslrootcert ? require('fs') : null
|
|
|
|
if (config.sslcert) {
|
|
config.ssl.cert = fs.readFileSync(config.sslcert).toString()
|
|
}
|
|
|
|
if (config.sslkey) {
|
|
config.ssl.key = fs.readFileSync(config.sslkey).toString()
|
|
}
|
|
|
|
if (config.sslrootcert) {
|
|
config.ssl.ca = fs.readFileSync(config.sslrootcert).toString()
|
|
}
|
|
|
|
if (options.useLibpqCompat && config.uselibpqcompat) {
|
|
throw new Error('Both useLibpqCompat and uselibpqcompat are set. Please use only one of them.')
|
|
}
|
|
|
|
if (config.uselibpqcompat === 'true' || options.useLibpqCompat) {
|
|
switch (config.sslmode) {
|
|
case 'disable': {
|
|
config.ssl = false
|
|
break
|
|
}
|
|
case 'prefer': {
|
|
config.ssl.rejectUnauthorized = false
|
|
break
|
|
}
|
|
case 'require': {
|
|
if (config.sslrootcert) {
|
|
// If a root CA is specified, behavior of `sslmode=require` will be the same as that of `verify-ca`
|
|
config.ssl.checkServerIdentity = function () {}
|
|
} else {
|
|
config.ssl.rejectUnauthorized = false
|
|
}
|
|
break
|
|
}
|
|
case 'verify-ca': {
|
|
if (!config.ssl.ca) {
|
|
throw new Error(
|
|
'SECURITY WARNING: Using sslmode=verify-ca requires specifying a CA with sslrootcert. If a public CA is used, verify-ca allows connections to a server that somebody else may have registered with the CA, making you vulnerable to Man-in-the-Middle attacks. Either specify a custom CA certificate with sslrootcert parameter or use sslmode=verify-full for proper security.'
|
|
)
|
|
}
|
|
config.ssl.checkServerIdentity = function () {}
|
|
break
|
|
}
|
|
case 'verify-full': {
|
|
break
|
|
}
|
|
}
|
|
} else {
|
|
switch (config.sslmode) {
|
|
case 'disable': {
|
|
config.ssl = false
|
|
break
|
|
}
|
|
case 'prefer':
|
|
case 'require':
|
|
case 'verify-ca':
|
|
case 'verify-full': {
|
|
break
|
|
}
|
|
case 'no-verify': {
|
|
config.ssl.rejectUnauthorized = false
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
return config
|
|
}
|
|
|
|
// convert pg-connection-string ssl config to a ClientConfig.ConnectionOptions
|
|
function toConnectionOptions(sslConfig) {
|
|
const connectionOptions = Object.entries(sslConfig).reduce((c, [key, value]) => {
|
|
// we explicitly check for undefined and null instead of `if (value)` because some
|
|
// options accept falsy values. Example: `ssl.rejectUnauthorized = false`
|
|
if (value !== undefined && value !== null) {
|
|
c[key] = value
|
|
}
|
|
|
|
return c
|
|
}, {})
|
|
|
|
return connectionOptions
|
|
}
|
|
|
|
// convert pg-connection-string config to a ClientConfig
|
|
function toClientConfig(config) {
|
|
const poolConfig = Object.entries(config).reduce((c, [key, value]) => {
|
|
if (key === 'ssl') {
|
|
const sslConfig = value
|
|
|
|
if (typeof sslConfig === 'boolean') {
|
|
c[key] = sslConfig
|
|
}
|
|
|
|
if (typeof sslConfig === 'object') {
|
|
c[key] = toConnectionOptions(sslConfig)
|
|
}
|
|
} else if (value !== undefined && value !== null) {
|
|
if (key === 'port') {
|
|
// when port is not specified, it is converted into an empty string
|
|
// we want to avoid NaN or empty string as a values in ClientConfig
|
|
if (value !== '') {
|
|
const v = parseInt(value, 10)
|
|
if (isNaN(v)) {
|
|
throw new Error(`Invalid ${key}: ${value}`)
|
|
}
|
|
|
|
c[key] = v
|
|
}
|
|
} else {
|
|
c[key] = value
|
|
}
|
|
}
|
|
|
|
return c
|
|
}, {})
|
|
|
|
return poolConfig
|
|
}
|
|
|
|
// parses a connection string into ClientConfig
|
|
function parseIntoClientConfig(str) {
|
|
return toClientConfig(parse(str))
|
|
}
|
|
|
|
module.exports = parse
|
|
|
|
parse.parse = parse
|
|
parse.toClientConfig = toClientConfig
|
|
parse.parseIntoClientConfig = parseIntoClientConfig
|