Awesome
SQL
A simple SQL injection protection module that allows you to use ES6 template strings for escaped statements. Works with pg, mysql and mysql2 library.
- Install
- Usage
- Methods
- Utilities
- How it works?
- Undefined values and nullable fields
- Testing, linting, & coverage
- Benchmark
- License
Install
npm install @nearform/sql
Usage
const SQL = require('@nearform/sql')
const username = 'user'
const email = 'user@email.com'
const password = 'Password1'
// generate SQL query
const sql = SQL`
INSERT INTO users (username, email, password)
VALUES (${username},${email},${password})
`
pg.query(sql) // execute query in pg
mysql.query(sql) // execute query in mysql
mysql2.query(sql) // execute query in mysql2
Linting
We recommend using eslint-plugin-sql to prevent cases in which the SQL tag is forgotten to be added in front of template strings. Eslint will fail if you write SQL queries without sql
tag in front of the string.
`SELECT 1`
// fails - Message: Use "sql" tag
sql`SELECT 1`
// passes
Methods
⚠️ Warning
The
unsafe
option interprets the interpolated values as literals and it should be used carefully to avoid introducing SQL injection vulnerabilities.
glue(pieces, separator)
const username = 'user1'
const email = 'user1@email.com'
const userId = 1
const updates = []
updates.push(SQL`name = ${username}`)
updates.push(SQL`email = ${email}`)
const sql = SQL`UPDATE users SET ${SQL.glue(updates, ' , ')} WHERE id = ${userId}`
or also
const ids = [1, 2, 3]
const value = 'test'
const sql = SQL`
UPDATE users
SET property = ${value}
WHERE id
IN (${SQL.glue(ids.map(id => SQL`${id}`), ' , ')})
`
Glue can also be used statically:
const ids = [1, 2, 3]
const idsSqls = ids.map(id => SQL`(${id})`)
SQL.glue(idsSqls, ' , ')
Glue can also be used to generate batch operations:
const users = [
{ id: 1, name: 'something' },
{ id: 2, name: 'something-else' },
{ id: 3, name: 'something-other' }
]
const sql = SQL`INSERT INTO users (id, name) VALUES
${SQL.glue(
users.map(user => SQL`(${user.id},${user.name}})`),
' , '
)}
`
map(array, mapperFunction)
Using the default mapperFunction which is just an iteration over the array elements
const ids = [1, 2, 3]
const values = SQL.map(ids)
const sql = SQL`INSERT INTO users (id) VALUES (${values})`
Using an array of objects which requires a mapper function
const objArray = [{
id: 1,
name: 'name1'
},
{
id: 2,
name: 'name2'
},
{
id: 3,
name: 'name3'
}]
const mapperFunction = (objItem) => objItem.id
const values = SQL.map(objArray, mapperFunction)
const sql = SQL`INSERT INTO users (id) VALUES (${values})`
(deprecated) append(statement[, options])
Append has been deprecated in favour of using template literals:
const from = SQL`FROM table`
const sql = SQL`SELECT * ${from}`
For now, you can still use append as follows:
const username = 'user1'
const email = 'user1@email.com'
const userId = 1
const sql = SQL`UPDATE users SET name = ${username}, email = ${email}`
sql.append(SQL`, ${dynamicName} = 'dynamicValue'`, { unsafe: true })
sql.append(SQL`WHERE id = ${userId}`)
Utilities
unsafe(value)
Does a literal interpolation of the provided value, interpreting the provided value as-is.
It works similarly to the unsafe
option of the append
method and requires the same security considerations.
const username = 'john'
const userId = 1
const sql = SQL`
UPDATE users
SET username = '${SQL.unsafe(username)}'
WHERE id = ${userId}
`
quoteIdent(value)
Mimics the native PostgreSQL quote_ident
and MySQL quote_identifier
functions.
In PostgreSQL, it wraps the provided value in double quotes "
and escapes any double quotes existing in the provided value.
In MySQL, it wraps the provided value in backticks `
and escapes any backticks existing in the provided value.
It's convenient to use when schema, table or field names are dynamic and can't be hardcoded in the SQL query string.
const table = 'users'
const username = 'john'
const userId = 1
const sql = SQL`
UPDATE ${SQL.quoteIdent(table)}
SET username = ${username}
WHERE id = ${userId}
`
How it works?
The SQL template string tag parses query and returns an objects that's understandable by pg library:
const username = 'user'
const email = 'user@email.com'
const password = 'Password1'
const sql = SQL`INSERT INTO users (username, email, password) VALUES (${username}, ${email}, ${password})` // generate SQL query
sql.text // INSERT INTO users (username, email, password) VALUES ($1 , $2 , $3) - for pg
sql.sql // INSERT INTO users (username, email, password) VALUES (? , ? , ?) - for mysql and mysql2
sql.values // ['user, 'user@email.com', 'Password1']
To help with debugging, you can view an approximate representation of the SQL query with values filled in. It may differ from the actual SQL executed by your database, but serves as a handy reference when debugging. The debug output should not be executed as it is not guaranteed safe. You can may also inspect the SQL
object via console.log
.
sql.debug // INSERT INTO users (username, email, password) VALUES ('user','user@email.com','Password1')
console.log(sql) // SQL << INSERT INTO users (username, email, password) VALUES ('user','user@email.com','Password1') >>
Undefined values and nullable fields
Don't pass undefined values into the sql query string builder. It throws on undefined values as this is a javascript concept and sql does not handle it.
Sometimes you may expect to not have a value to be provided to the string builder, and this is ok as the coresponding field is nullable. In this or similar cases the recommended way to handle this is to coerce it to a null js value.
Example:
const user = { name: 'foo bar' }
const sql = SQL`INSERT into users (name, address) VALUES (${user.name},${
user.address || null
})`
sql.debug // INSERT INTO users (name, address) VALUES ('foo bar',null)
Example custom utilities
Insert into from a JS object
The below example functions can be used to generate an INSERT INTO statement from an object, which will convert the object keys to snake case.
function insert(table, insertData, { toSnakeCase } = { toSnakeCase: false }) {
const builder = Object.entries(insertData).reduce(
(acc, [column, value]) => {
if (value !== undefined) {
toSnakeCase
? acc.columns.push(pascalOrCamelToSnake(column))
: acc.columns.push(column)
acc.values.push(SQL`${value}`)
}
return acc
},
{ columns: [], values: [] }
)
return SQL`INSERT INTO ${SQL.quoteIdent(table)} (${SQL.unsafe(
builder.columns.join(', ')
)}) VALUES (${SQL.glue(builder.values, ', ')})`
}
const pascalOrCamelToSnake = str =>
str[0].toLowerCase() +
str
.slice(1, str.length)
.replace(/[A-Z]/g, letter => `_${letter.toLowerCase()}`)
Testing, linting, & coverage
This module can be tested and reported on in a variety of ways...
npm run test # runs tap based unit test suite.
npm run test:security # runs sqlmap security tests.
npm run test:typescript # runs type definition tests.
npm run coverage # generates a coverage report in docs dir.
npm run lint # lints via standardJS.
Benchmark
Find more about @nearform/sql
speed here
Editor syntax higlighting
To get syntax higlighting, you can use extension/plugin for these editors:
- Visual studio code: thebearingedge.vscode-sql-lit
License
Copyright NearForm 2021. Licensed under Apache 2.0