drizzle-orm 0.35.3-4cb1bdb → 0.35.3-6a162f5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/neon/rls.cjs CHANGED
@@ -26,6 +26,7 @@ __export(rls_exports, {
26
26
  module.exports = __toCommonJS(rls_exports);
27
27
  var import_entity = require("../entity.cjs");
28
28
  var import_pg_core = require("../pg-core/index.cjs");
29
+ var import_roles = require("../pg-core/roles.cjs");
29
30
  var import_sql = require("../sql/sql.cjs");
30
31
  const crudPolicy = (options) => {
31
32
  const read = options.read === true ? import_sql.sql`true` : options.read === false || options.read === void 0 ? import_sql.sql`false` : options.read;
@@ -33,10 +34,10 @@ const crudPolicy = (options) => {
33
34
  let rolesName = "";
34
35
  if (Array.isArray(options.role)) {
35
36
  rolesName = options.role.map((it) => {
36
- return (0, import_entity.is)(it, import_pg_core.PgRole) ? it.name : it;
37
+ return (0, import_entity.is)(it, import_roles.PgRole) ? it.name : it;
37
38
  }).join("-");
38
39
  } else {
39
- rolesName = (0, import_entity.is)(options.role, import_pg_core.PgRole) ? options.role.name : options.role;
40
+ rolesName = (0, import_entity.is)(options.role, import_roles.PgRole) ? options.role.name : options.role;
40
41
  }
41
42
  return [
42
43
  (0, import_pg_core.pgPolicy)(`crud-${rolesName}-policy-insert`, {
@@ -62,8 +63,8 @@ const crudPolicy = (options) => {
62
63
  })
63
64
  ];
64
65
  };
65
- const authenticatedRole = (0, import_pg_core.pgRole)("authenticated").existing();
66
- const anonymousRole = (0, import_pg_core.pgRole)("anonymous").existing();
66
+ const authenticatedRole = (0, import_roles.pgRole)("authenticated").existing();
67
+ const anonymousRole = (0, import_roles.pgRole)("anonymous").existing();
67
68
  const authUid = (userIdColumn) => import_sql.sql`(select auth.user_id() = ${userIdColumn})`;
68
69
  // Annotate the CommonJS export names for ESM import in node:
69
70
  0 && (module.exports = {
package/neon/rls.cjs.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { pgPolicy, PgRole, pgRole } from '~/pg-core/index.ts';\nimport type { AnyPgColumn, PgPolicyToOption } from '~/pg-core/index.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":";;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oBAAmB;AACnB,qBAAyC;AAEzC,iBAA8B;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,uBACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,wBACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,uBACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,wBACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,iBAAO,kBAAG,IAAI,qBAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,oBAAY,kBAAG,QAAQ,MAAM,qBAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,QACN,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,wBAAoB,uBAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,oBAAgB,uBAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,0CAA+B,YAAY;","names":[]}
1
+ {"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { type AnyPgColumn, pgPolicy, type PgPolicyToOption } from '~/pg-core/index.ts';\nimport { PgRole, pgRole } from '~/pg-core/roles.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":";;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oBAAmB;AACnB,qBAAkE;AAClE,mBAA+B;AAC/B,iBAA8B;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,uBACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,wBACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,uBACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,wBACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,iBAAO,kBAAG,IAAI,mBAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,oBAAY,kBAAG,QAAQ,MAAM,mBAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,QACN,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,wBAAoB,qBAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,oBAAgB,qBAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,0CAA+B,YAAY;","names":[]}
package/neon/rls.d.cts CHANGED
@@ -1,5 +1,5 @@
1
- import { PgRole } from "../pg-core/index.cjs";
2
- import type { AnyPgColumn, PgPolicyToOption } from "../pg-core/index.cjs";
1
+ import { type AnyPgColumn, type PgPolicyToOption } from "../pg-core/index.cjs";
2
+ import { PgRole } from "../pg-core/roles.cjs";
3
3
  import { type SQL } from "../sql/sql.cjs";
4
4
  export declare const crudPolicy: (options: {
5
5
  role: PgPolicyToOption;
package/neon/rls.d.ts CHANGED
@@ -1,5 +1,5 @@
1
- import { PgRole } from "../pg-core/index.js";
2
- import type { AnyPgColumn, PgPolicyToOption } from "../pg-core/index.js";
1
+ import { type AnyPgColumn, type PgPolicyToOption } from "../pg-core/index.js";
2
+ import { PgRole } from "../pg-core/roles.js";
3
3
  import { type SQL } from "../sql/sql.js";
4
4
  export declare const crudPolicy: (options: {
5
5
  role: PgPolicyToOption;
package/neon/rls.js CHANGED
@@ -1,5 +1,6 @@
1
1
  import { is } from "../entity.js";
2
- import { pgPolicy, PgRole, pgRole } from "../pg-core/index.js";
2
+ import { pgPolicy } from "../pg-core/index.js";
3
+ import { PgRole, pgRole } from "../pg-core/roles.js";
3
4
  import { sql } from "../sql/sql.js";
4
5
  const crudPolicy = (options) => {
5
6
  const read = options.read === true ? sql`true` : options.read === false || options.read === void 0 ? sql`false` : options.read;
package/neon/rls.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { pgPolicy, PgRole, pgRole } from '~/pg-core/index.ts';\nimport type { AnyPgColumn, PgPolicyToOption } from '~/pg-core/index.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":"AAAA,SAAS,UAAU;AACnB,SAAS,UAAU,QAAQ,cAAc;AAEzC,SAAmB,WAAW;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,YACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,aACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,YACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,aACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,aAAO,GAAG,IAAI,MAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,gBAAY,GAAG,QAAQ,MAAM,MAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,IACN,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,oBAAoB,OAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,gBAAgB,OAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,+BAA+B,YAAY;","names":[]}
1
+ {"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { type AnyPgColumn, pgPolicy, type PgPolicyToOption } from '~/pg-core/index.ts';\nimport { PgRole, pgRole } from '~/pg-core/roles.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":"AAAA,SAAS,UAAU;AACnB,SAA2B,gBAAuC;AAClE,SAAS,QAAQ,cAAc;AAC/B,SAAmB,WAAW;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,YACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,aACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,YACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,aACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,aAAO,GAAG,IAAI,MAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,gBAAY,GAAG,QAAQ,MAAM,MAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,IACN,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,oBAAoB,OAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,gBAAgB,OAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,+BAA+B,YAAY;","names":[]}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "drizzle-orm",
3
- "version": "0.35.3-4cb1bdb",
3
+ "version": "0.35.3-6a162f5",
4
4
  "description": "Drizzle ORM package for SQL databases",
5
5
  "type": "module",
6
6
  "scripts": {
@@ -512,54 +512,6 @@
512
512
  "types": "./view-common.d.ts",
513
513
  "default": "./view-common.js"
514
514
  },
515
- "./better-sqlite3/driver": {
516
- "import": {
517
- "types": "./better-sqlite3/driver.d.ts",
518
- "default": "./better-sqlite3/driver.js"
519
- },
520
- "require": {
521
- "types": "./better-sqlite3/driver.d.cts",
522
- "default": "./better-sqlite3/driver.cjs"
523
- },
524
- "types": "./better-sqlite3/driver.d.ts",
525
- "default": "./better-sqlite3/driver.js"
526
- },
527
- "./better-sqlite3": {
528
- "import": {
529
- "types": "./better-sqlite3/index.d.ts",
530
- "default": "./better-sqlite3/index.js"
531
- },
532
- "require": {
533
- "types": "./better-sqlite3/index.d.cts",
534
- "default": "./better-sqlite3/index.cjs"
535
- },
536
- "types": "./better-sqlite3/index.d.ts",
537
- "default": "./better-sqlite3/index.js"
538
- },
539
- "./better-sqlite3/migrator": {
540
- "import": {
541
- "types": "./better-sqlite3/migrator.d.ts",
542
- "default": "./better-sqlite3/migrator.js"
543
- },
544
- "require": {
545
- "types": "./better-sqlite3/migrator.d.cts",
546
- "default": "./better-sqlite3/migrator.cjs"
547
- },
548
- "types": "./better-sqlite3/migrator.d.ts",
549
- "default": "./better-sqlite3/migrator.js"
550
- },
551
- "./better-sqlite3/session": {
552
- "import": {
553
- "types": "./better-sqlite3/session.d.ts",
554
- "default": "./better-sqlite3/session.js"
555
- },
556
- "require": {
557
- "types": "./better-sqlite3/session.d.cts",
558
- "default": "./better-sqlite3/session.cjs"
559
- },
560
- "types": "./better-sqlite3/session.d.ts",
561
- "default": "./better-sqlite3/session.js"
562
- },
563
515
  "./bun-sqlite/driver": {
564
516
  "import": {
565
517
  "types": "./bun-sqlite/driver.d.ts",
@@ -608,6 +560,54 @@
608
560
  "types": "./bun-sqlite/session.d.ts",
609
561
  "default": "./bun-sqlite/session.js"
610
562
  },
563
+ "./better-sqlite3/driver": {
564
+ "import": {
565
+ "types": "./better-sqlite3/driver.d.ts",
566
+ "default": "./better-sqlite3/driver.js"
567
+ },
568
+ "require": {
569
+ "types": "./better-sqlite3/driver.d.cts",
570
+ "default": "./better-sqlite3/driver.cjs"
571
+ },
572
+ "types": "./better-sqlite3/driver.d.ts",
573
+ "default": "./better-sqlite3/driver.js"
574
+ },
575
+ "./better-sqlite3": {
576
+ "import": {
577
+ "types": "./better-sqlite3/index.d.ts",
578
+ "default": "./better-sqlite3/index.js"
579
+ },
580
+ "require": {
581
+ "types": "./better-sqlite3/index.d.cts",
582
+ "default": "./better-sqlite3/index.cjs"
583
+ },
584
+ "types": "./better-sqlite3/index.d.ts",
585
+ "default": "./better-sqlite3/index.js"
586
+ },
587
+ "./better-sqlite3/migrator": {
588
+ "import": {
589
+ "types": "./better-sqlite3/migrator.d.ts",
590
+ "default": "./better-sqlite3/migrator.js"
591
+ },
592
+ "require": {
593
+ "types": "./better-sqlite3/migrator.d.cts",
594
+ "default": "./better-sqlite3/migrator.cjs"
595
+ },
596
+ "types": "./better-sqlite3/migrator.d.ts",
597
+ "default": "./better-sqlite3/migrator.js"
598
+ },
599
+ "./better-sqlite3/session": {
600
+ "import": {
601
+ "types": "./better-sqlite3/session.d.ts",
602
+ "default": "./better-sqlite3/session.js"
603
+ },
604
+ "require": {
605
+ "types": "./better-sqlite3/session.d.cts",
606
+ "default": "./better-sqlite3/session.cjs"
607
+ },
608
+ "types": "./better-sqlite3/session.d.ts",
609
+ "default": "./better-sqlite3/session.js"
610
+ },
611
611
  "./d1/driver": {
612
612
  "import": {
613
613
  "types": "./d1/driver.d.ts",
@@ -2120,6 +2120,30 @@
2120
2120
  "types": "./sqlite-proxy/session.d.ts",
2121
2121
  "default": "./sqlite-proxy/session.js"
2122
2122
  },
2123
+ "./supabase": {
2124
+ "import": {
2125
+ "types": "./supabase/index.d.ts",
2126
+ "default": "./supabase/index.js"
2127
+ },
2128
+ "require": {
2129
+ "types": "./supabase/index.d.cts",
2130
+ "default": "./supabase/index.cjs"
2131
+ },
2132
+ "types": "./supabase/index.d.ts",
2133
+ "default": "./supabase/index.js"
2134
+ },
2135
+ "./supabase/rls": {
2136
+ "import": {
2137
+ "types": "./supabase/rls.d.ts",
2138
+ "default": "./supabase/rls.js"
2139
+ },
2140
+ "require": {
2141
+ "types": "./supabase/rls.d.cts",
2142
+ "default": "./supabase/rls.cjs"
2143
+ },
2144
+ "types": "./supabase/rls.d.ts",
2145
+ "default": "./supabase/rls.js"
2146
+ },
2123
2147
  "./tidb-serverless/driver": {
2124
2148
  "import": {
2125
2149
  "types": "./tidb-serverless/driver.d.ts",
@@ -0,0 +1,23 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __copyProps = (to, from, except, desc) => {
7
+ if (from && typeof from === "object" || typeof from === "function") {
8
+ for (let key of __getOwnPropNames(from))
9
+ if (!__hasOwnProp.call(to, key) && key !== except)
10
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
11
+ }
12
+ return to;
13
+ };
14
+ var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
15
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
16
+ var supabase_exports = {};
17
+ module.exports = __toCommonJS(supabase_exports);
18
+ __reExport(supabase_exports, require("./rls.cjs"), module.exports);
19
+ // Annotate the CommonJS export names for ESM import in node:
20
+ 0 && (module.exports = {
21
+ ...require("./rls.cjs")
22
+ });
23
+ //# sourceMappingURL=index.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/supabase/index.ts"],"sourcesContent":["export * from './rls.ts';\n"],"mappings":";;;;;;;;;;;;;;;AAAA;AAAA;AAAA,6BAAc,qBAAd;","names":[]}
@@ -0,0 +1 @@
1
+ export * from "./rls.cjs";
@@ -0,0 +1 @@
1
+ export * from "./rls.js";
@@ -0,0 +1,2 @@
1
+ export * from "./rls.js";
2
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/supabase/index.ts"],"sourcesContent":["export * from './rls.ts';\n"],"mappings":"AAAA,cAAc;","names":[]}
@@ -0,0 +1,39 @@
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
+ var __export = (target, all) => {
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
10
+ var __copyProps = (to, from, except, desc) => {
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
+ var rls_exports = {};
20
+ __export(rls_exports, {
21
+ anonRole: () => anonRole,
22
+ authenticatedRole: () => authenticatedRole,
23
+ postgresRole: () => postgresRole,
24
+ serviceRole: () => serviceRole
25
+ });
26
+ module.exports = __toCommonJS(rls_exports);
27
+ var import_roles = require("../pg-core/roles.cjs");
28
+ const anonRole = (0, import_roles.pgRole)("anon").existing();
29
+ const authenticatedRole = (0, import_roles.pgRole)("authenticated").existing();
30
+ const serviceRole = (0, import_roles.pgRole)("service_role").existing();
31
+ const postgresRole = (0, import_roles.pgRole)("postgres_role").existing();
32
+ // Annotate the CommonJS export names for ESM import in node:
33
+ 0 && (module.exports = {
34
+ anonRole,
35
+ authenticatedRole,
36
+ postgresRole,
37
+ serviceRole
38
+ });
39
+ //# sourceMappingURL=rls.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/supabase/rls.ts"],"sourcesContent":["import { pgRole } from '~/pg-core/roles.ts';\n\n// These are default roles that Supabase will set up.\nexport const anonRole = pgRole('anon').existing();\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const serviceRole = pgRole('service_role').existing();\nexport const postgresRole = pgRole('postgres_role').existing();\n"],"mappings":";;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,mBAAuB;AAGhB,MAAM,eAAW,qBAAO,MAAM,EAAE,SAAS;AACzC,MAAM,wBAAoB,qBAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,kBAAc,qBAAO,cAAc,EAAE,SAAS;AACpD,MAAM,mBAAe,qBAAO,eAAe,EAAE,SAAS;","names":[]}
@@ -0,0 +1,4 @@
1
+ export declare const anonRole: import("../pg-core/roles.ts").PgRole;
2
+ export declare const authenticatedRole: import("../pg-core/roles.ts").PgRole;
3
+ export declare const serviceRole: import("../pg-core/roles.ts").PgRole;
4
+ export declare const postgresRole: import("../pg-core/roles.ts").PgRole;
@@ -0,0 +1,4 @@
1
+ export declare const anonRole: import("../pg-core/roles.js").PgRole;
2
+ export declare const authenticatedRole: import("../pg-core/roles.js").PgRole;
3
+ export declare const serviceRole: import("../pg-core/roles.js").PgRole;
4
+ export declare const postgresRole: import("../pg-core/roles.js").PgRole;
@@ -0,0 +1,12 @@
1
+ import { pgRole } from "../pg-core/roles.js";
2
+ const anonRole = pgRole("anon").existing();
3
+ const authenticatedRole = pgRole("authenticated").existing();
4
+ const serviceRole = pgRole("service_role").existing();
5
+ const postgresRole = pgRole("postgres_role").existing();
6
+ export {
7
+ anonRole,
8
+ authenticatedRole,
9
+ postgresRole,
10
+ serviceRole
11
+ };
12
+ //# sourceMappingURL=rls.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../src/supabase/rls.ts"],"sourcesContent":["import { pgRole } from '~/pg-core/roles.ts';\n\n// These are default roles that Supabase will set up.\nexport const anonRole = pgRole('anon').existing();\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const serviceRole = pgRole('service_role').existing();\nexport const postgresRole = pgRole('postgres_role').existing();\n"],"mappings":"AAAA,SAAS,cAAc;AAGhB,MAAM,WAAW,OAAO,MAAM,EAAE,SAAS;AACzC,MAAM,oBAAoB,OAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,cAAc,OAAO,cAAc,EAAE,SAAS;AACpD,MAAM,eAAe,OAAO,eAAe,EAAE,SAAS;","names":[]}
package/version.cjs CHANGED
@@ -26,7 +26,7 @@ __export(version_exports, {
26
26
  module.exports = __toCommonJS(version_exports);
27
27
 
28
28
  // package.json
29
- var version = "0.35.3-4cb1bdb";
29
+ var version = "0.35.3-6a162f5";
30
30
 
31
31
  // src/version.ts
32
32
  var compatibilityVersion = 9;
package/version.d.cts CHANGED
@@ -1,4 +1,4 @@
1
- var version = "0.35.3-4cb1bdb";
1
+ var version = "0.35.3-6a162f5";
2
2
 
3
3
  declare const compatibilityVersion = 9;
4
4
 
package/version.d.ts CHANGED
@@ -1,4 +1,4 @@
1
- var version = "0.35.3-4cb1bdb";
1
+ var version = "0.35.3-6a162f5";
2
2
 
3
3
  declare const compatibilityVersion = 9;
4
4
 
package/version.js CHANGED
@@ -1,5 +1,5 @@
1
1
  // package.json
2
- var version = "0.35.3-4cb1bdb";
2
+ var version = "0.35.3-6a162f5";
3
3
 
4
4
  // src/version.ts
5
5
  var compatibilityVersion = 9;