drizzle-orm 0.35.3-a43c673 → 0.35.3-d39c24e
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/neon/index.cjs +23 -0
- package/neon/index.cjs.map +1 -0
- package/neon/index.d.cts +1 -0
- package/neon/index.d.ts +1 -0
- package/neon/index.js +2 -0
- package/neon/index.js.map +1 -0
- package/neon/rls.cjs +76 -0
- package/neon/rls.cjs.map +1 -0
- package/neon/rls.d.cts +11 -0
- package/neon/rls.d.ts +11 -0
- package/neon/rls.js +49 -0
- package/neon/rls.js.map +1 -0
- package/package.json +127 -51
- package/pg-core/index.cjs +4 -0
- package/pg-core/index.cjs.map +1 -1
- package/pg-core/index.d.cts +2 -0
- package/pg-core/index.d.ts +2 -0
- package/pg-core/index.js +2 -0
- package/pg-core/index.js.map +1 -1
- package/pg-core/policies.cjs +58 -0
- package/pg-core/policies.cjs.map +1 -0
- package/pg-core/policies.d.cts +24 -0
- package/pg-core/policies.d.ts +24 -0
- package/pg-core/policies.js +33 -0
- package/pg-core/policies.js.map +1 -0
- package/pg-core/roles.cjs +57 -0
- package/pg-core/roles.cjs.map +1 -0
- package/pg-core/roles.d.cts +13 -0
- package/pg-core/roles.d.ts +13 -0
- package/pg-core/roles.js +32 -0
- package/pg-core/roles.js.map +1 -0
- package/pg-core/table.cjs +13 -2
- package/pg-core/table.cjs.map +1 -1
- package/pg-core/table.d.cts +25 -3
- package/pg-core/table.d.ts +25 -3
- package/pg-core/table.js +12 -2
- package/pg-core/table.js.map +1 -1
- package/pg-core/utils.cjs +10 -2
- package/pg-core/utils.cjs.map +1 -1
- package/pg-core/utils.d.cts +3 -0
- package/pg-core/utils.d.ts +3 -0
- package/pg-core/utils.js +10 -2
- package/pg-core/utils.js.map +1 -1
- package/planetscale-serverless/driver.cjs +1 -4
- package/planetscale-serverless/driver.cjs.map +1 -1
- package/planetscale-serverless/driver.d.cts +2 -2
- package/planetscale-serverless/driver.d.ts +2 -2
- package/planetscale-serverless/driver.js +1 -4
- package/planetscale-serverless/driver.js.map +1 -1
- package/supabase/index.cjs +23 -0
- package/supabase/index.cjs.map +1 -0
- package/supabase/index.d.cts +1 -0
- package/supabase/index.d.ts +1 -0
- package/supabase/index.js +2 -0
- package/supabase/index.js.map +1 -0
- package/supabase/rls.cjs +69 -0
- package/supabase/rls.cjs.map +1 -0
- package/supabase/rls.d.cts +85 -0
- package/supabase/rls.d.ts +85 -0
- package/supabase/rls.js +37 -0
- package/supabase/rls.js.map +1 -0
- package/table.cjs.map +1 -1
- package/table.js.map +1 -1
- package/version.cjs +1 -1
- package/version.d.cts +1 -1
- package/version.d.ts +1 -1
- package/version.js +1 -1
package/neon/index.cjs
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __copyProps = (to, from, except, desc) => {
|
|
7
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
8
|
+
for (let key of __getOwnPropNames(from))
|
|
9
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
10
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
11
|
+
}
|
|
12
|
+
return to;
|
|
13
|
+
};
|
|
14
|
+
var __reExport = (target, mod, secondTarget) => (__copyProps(target, mod, "default"), secondTarget && __copyProps(secondTarget, mod, "default"));
|
|
15
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
16
|
+
var neon_exports = {};
|
|
17
|
+
module.exports = __toCommonJS(neon_exports);
|
|
18
|
+
__reExport(neon_exports, require("./rls.cjs"), module.exports);
|
|
19
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
20
|
+
0 && (module.exports = {
|
|
21
|
+
...require("./rls.cjs")
|
|
22
|
+
});
|
|
23
|
+
//# sourceMappingURL=index.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/neon/index.ts"],"sourcesContent":["export * from './rls.ts';\n"],"mappings":";;;;;;;;;;;;;;;AAAA;AAAA;AAAA,yBAAc,qBAAd;","names":[]}
|
package/neon/index.d.cts
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export * from "./rls.cjs";
|
package/neon/index.d.ts
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export * from "./rls.js";
|
package/neon/index.js
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/neon/index.ts"],"sourcesContent":["export * from './rls.ts';\n"],"mappings":"AAAA,cAAc;","names":[]}
|
package/neon/rls.cjs
ADDED
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
var rls_exports = {};
|
|
20
|
+
__export(rls_exports, {
|
|
21
|
+
anonymousRole: () => anonymousRole,
|
|
22
|
+
authUid: () => authUid,
|
|
23
|
+
authenticatedRole: () => authenticatedRole,
|
|
24
|
+
crudPolicy: () => crudPolicy
|
|
25
|
+
});
|
|
26
|
+
module.exports = __toCommonJS(rls_exports);
|
|
27
|
+
var import_entity = require("../entity.cjs");
|
|
28
|
+
var import_pg_core = require("../pg-core/index.cjs");
|
|
29
|
+
var import_roles = require("../pg-core/roles.cjs");
|
|
30
|
+
var import_sql = require("../sql/sql.cjs");
|
|
31
|
+
const crudPolicy = (options) => {
|
|
32
|
+
const read = options.read === true ? import_sql.sql`true` : options.read === false || options.read === void 0 ? import_sql.sql`false` : options.read;
|
|
33
|
+
const modify = options.modify === true ? import_sql.sql`true` : options.modify === false || options.modify === void 0 ? import_sql.sql`false` : options.modify;
|
|
34
|
+
let rolesName = "";
|
|
35
|
+
if (Array.isArray(options.role)) {
|
|
36
|
+
rolesName = options.role.map((it) => {
|
|
37
|
+
return (0, import_entity.is)(it, import_roles.PgRole) ? it.name : it;
|
|
38
|
+
}).join("-");
|
|
39
|
+
} else {
|
|
40
|
+
rolesName = (0, import_entity.is)(options.role, import_roles.PgRole) ? options.role.name : options.role;
|
|
41
|
+
}
|
|
42
|
+
return [
|
|
43
|
+
(0, import_pg_core.pgPolicy)(`crud-${rolesName}-policy-insert`, {
|
|
44
|
+
for: "insert",
|
|
45
|
+
to: options.role,
|
|
46
|
+
withCheck: modify
|
|
47
|
+
}),
|
|
48
|
+
(0, import_pg_core.pgPolicy)(`crud-${rolesName}-policy-update`, {
|
|
49
|
+
for: "update",
|
|
50
|
+
to: options.role,
|
|
51
|
+
using: modify,
|
|
52
|
+
withCheck: modify
|
|
53
|
+
}),
|
|
54
|
+
(0, import_pg_core.pgPolicy)(`crud-${rolesName}-policy-delete`, {
|
|
55
|
+
for: "delete",
|
|
56
|
+
to: options.role,
|
|
57
|
+
using: modify
|
|
58
|
+
}),
|
|
59
|
+
(0, import_pg_core.pgPolicy)(`crud-${rolesName}-policy-select`, {
|
|
60
|
+
for: "select",
|
|
61
|
+
to: options.role,
|
|
62
|
+
using: read
|
|
63
|
+
})
|
|
64
|
+
];
|
|
65
|
+
};
|
|
66
|
+
const authenticatedRole = (0, import_roles.pgRole)("authenticated").existing();
|
|
67
|
+
const anonymousRole = (0, import_roles.pgRole)("anonymous").existing();
|
|
68
|
+
const authUid = (userIdColumn) => import_sql.sql`(select auth.user_id() = ${userIdColumn})`;
|
|
69
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
70
|
+
0 && (module.exports = {
|
|
71
|
+
anonymousRole,
|
|
72
|
+
authUid,
|
|
73
|
+
authenticatedRole,
|
|
74
|
+
crudPolicy
|
|
75
|
+
});
|
|
76
|
+
//# sourceMappingURL=rls.cjs.map
|
package/neon/rls.cjs.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { type AnyPgColumn, pgPolicy, type PgPolicyToOption } from '~/pg-core/index.ts';\nimport { PgRole, pgRole } from '~/pg-core/roles.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":";;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oBAAmB;AACnB,qBAAkE;AAClE,mBAA+B;AAC/B,iBAA8B;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,uBACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,wBACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,uBACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,wBACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,iBAAO,kBAAG,IAAI,mBAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,oBAAY,kBAAG,QAAQ,MAAM,mBAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,QACN,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,QACD,yBAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,wBAAoB,qBAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,oBAAgB,qBAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,0CAA+B,YAAY;","names":[]}
|
package/neon/rls.d.cts
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { type AnyPgColumn, type PgPolicyToOption } from "../pg-core/index.cjs";
|
|
2
|
+
import { PgRole } from "../pg-core/roles.cjs";
|
|
3
|
+
import { type SQL } from "../sql/sql.cjs";
|
|
4
|
+
export declare const crudPolicy: (options: {
|
|
5
|
+
role: PgPolicyToOption;
|
|
6
|
+
read?: SQL | boolean;
|
|
7
|
+
modify?: SQL | boolean;
|
|
8
|
+
}) => import("../pg-core/index.ts").PgPolicy[];
|
|
9
|
+
export declare const authenticatedRole: PgRole;
|
|
10
|
+
export declare const anonymousRole: PgRole;
|
|
11
|
+
export declare const authUid: (userIdColumn: AnyPgColumn) => SQL<unknown>;
|
package/neon/rls.d.ts
ADDED
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { type AnyPgColumn, type PgPolicyToOption } from "../pg-core/index.js";
|
|
2
|
+
import { PgRole } from "../pg-core/roles.js";
|
|
3
|
+
import { type SQL } from "../sql/sql.js";
|
|
4
|
+
export declare const crudPolicy: (options: {
|
|
5
|
+
role: PgPolicyToOption;
|
|
6
|
+
read?: SQL | boolean;
|
|
7
|
+
modify?: SQL | boolean;
|
|
8
|
+
}) => import("../pg-core/index.js").PgPolicy[];
|
|
9
|
+
export declare const authenticatedRole: PgRole;
|
|
10
|
+
export declare const anonymousRole: PgRole;
|
|
11
|
+
export declare const authUid: (userIdColumn: AnyPgColumn) => SQL<unknown>;
|
package/neon/rls.js
ADDED
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
import { is } from "../entity.js";
|
|
2
|
+
import { pgPolicy } from "../pg-core/index.js";
|
|
3
|
+
import { PgRole, pgRole } from "../pg-core/roles.js";
|
|
4
|
+
import { sql } from "../sql/sql.js";
|
|
5
|
+
const crudPolicy = (options) => {
|
|
6
|
+
const read = options.read === true ? sql`true` : options.read === false || options.read === void 0 ? sql`false` : options.read;
|
|
7
|
+
const modify = options.modify === true ? sql`true` : options.modify === false || options.modify === void 0 ? sql`false` : options.modify;
|
|
8
|
+
let rolesName = "";
|
|
9
|
+
if (Array.isArray(options.role)) {
|
|
10
|
+
rolesName = options.role.map((it) => {
|
|
11
|
+
return is(it, PgRole) ? it.name : it;
|
|
12
|
+
}).join("-");
|
|
13
|
+
} else {
|
|
14
|
+
rolesName = is(options.role, PgRole) ? options.role.name : options.role;
|
|
15
|
+
}
|
|
16
|
+
return [
|
|
17
|
+
pgPolicy(`crud-${rolesName}-policy-insert`, {
|
|
18
|
+
for: "insert",
|
|
19
|
+
to: options.role,
|
|
20
|
+
withCheck: modify
|
|
21
|
+
}),
|
|
22
|
+
pgPolicy(`crud-${rolesName}-policy-update`, {
|
|
23
|
+
for: "update",
|
|
24
|
+
to: options.role,
|
|
25
|
+
using: modify,
|
|
26
|
+
withCheck: modify
|
|
27
|
+
}),
|
|
28
|
+
pgPolicy(`crud-${rolesName}-policy-delete`, {
|
|
29
|
+
for: "delete",
|
|
30
|
+
to: options.role,
|
|
31
|
+
using: modify
|
|
32
|
+
}),
|
|
33
|
+
pgPolicy(`crud-${rolesName}-policy-select`, {
|
|
34
|
+
for: "select",
|
|
35
|
+
to: options.role,
|
|
36
|
+
using: read
|
|
37
|
+
})
|
|
38
|
+
];
|
|
39
|
+
};
|
|
40
|
+
const authenticatedRole = pgRole("authenticated").existing();
|
|
41
|
+
const anonymousRole = pgRole("anonymous").existing();
|
|
42
|
+
const authUid = (userIdColumn) => sql`(select auth.user_id() = ${userIdColumn})`;
|
|
43
|
+
export {
|
|
44
|
+
anonymousRole,
|
|
45
|
+
authUid,
|
|
46
|
+
authenticatedRole,
|
|
47
|
+
crudPolicy
|
|
48
|
+
};
|
|
49
|
+
//# sourceMappingURL=rls.js.map
|
package/neon/rls.js.map
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/neon/rls.ts"],"sourcesContent":["import { is } from '~/entity.ts';\nimport { type AnyPgColumn, pgPolicy, type PgPolicyToOption } from '~/pg-core/index.ts';\nimport { PgRole, pgRole } from '~/pg-core/roles.ts';\nimport { type SQL, sql } from '~/sql/sql.ts';\n\nexport const crudPolicy = (options: {\n\trole: PgPolicyToOption;\n\tread?: SQL | boolean;\n\tmodify?: SQL | boolean;\n}) => {\n\tconst read: SQL = options.read === true\n\t\t? sql`true`\n\t\t: options.read === false || options.read === undefined\n\t\t? sql`false`\n\t\t: options.read;\n\n\tconst modify: SQL = options.modify === true\n\t\t? sql`true`\n\t\t: options.modify === false || options.modify === undefined\n\t\t? sql`false`\n\t\t: options.modify;\n\n\tlet rolesName = '';\n\tif (Array.isArray(options.role)) {\n\t\trolesName = options.role\n\t\t\t.map((it) => {\n\t\t\t\treturn is(it, PgRole) ? it.name : (it as string);\n\t\t\t})\n\t\t\t.join('-');\n\t} else {\n\t\trolesName = is(options.role, PgRole)\n\t\t\t? options.role.name\n\t\t\t: (options.role as string);\n\t}\n\n\treturn [\n\t\tpgPolicy(`crud-${rolesName}-policy-insert`, {\n\t\t\tfor: 'insert',\n\t\t\tto: options.role,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-update`, {\n\t\t\tfor: 'update',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t\twithCheck: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-delete`, {\n\t\t\tfor: 'delete',\n\t\t\tto: options.role,\n\t\t\tusing: modify,\n\t\t}),\n\t\tpgPolicy(`crud-${rolesName}-policy-select`, {\n\t\t\tfor: 'select',\n\t\t\tto: options.role,\n\t\t\tusing: read,\n\t\t}),\n\t];\n};\n\n// These are default roles that Neon will set up.\nexport const authenticatedRole = pgRole('authenticated').existing();\nexport const anonymousRole = pgRole('anonymous').existing();\n\nexport const authUid = (userIdColumn: AnyPgColumn) => sql`(select auth.user_id() = ${userIdColumn})`;\n"],"mappings":"AAAA,SAAS,UAAU;AACnB,SAA2B,gBAAuC;AAClE,SAAS,QAAQ,cAAc;AAC/B,SAAmB,WAAW;AAEvB,MAAM,aAAa,CAAC,YAIrB;AACL,QAAM,OAAY,QAAQ,SAAS,OAChC,YACA,QAAQ,SAAS,SAAS,QAAQ,SAAS,SAC3C,aACA,QAAQ;AAEX,QAAM,SAAc,QAAQ,WAAW,OACpC,YACA,QAAQ,WAAW,SAAS,QAAQ,WAAW,SAC/C,aACA,QAAQ;AAEX,MAAI,YAAY;AAChB,MAAI,MAAM,QAAQ,QAAQ,IAAI,GAAG;AAChC,gBAAY,QAAQ,KAClB,IAAI,CAAC,OAAO;AACZ,aAAO,GAAG,IAAI,MAAM,IAAI,GAAG,OAAQ;AAAA,IACpC,CAAC,EACA,KAAK,GAAG;AAAA,EACX,OAAO;AACN,gBAAY,GAAG,QAAQ,MAAM,MAAM,IAChC,QAAQ,KAAK,OACZ,QAAQ;AAAA,EACb;AAEA,SAAO;AAAA,IACN,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,MACP,WAAW;AAAA,IACZ,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,IACD,SAAS,QAAQ,SAAS,kBAAkB;AAAA,MAC3C,KAAK;AAAA,MACL,IAAI,QAAQ;AAAA,MACZ,OAAO;AAAA,IACR,CAAC;AAAA,EACF;AACD;AAGO,MAAM,oBAAoB,OAAO,eAAe,EAAE,SAAS;AAC3D,MAAM,gBAAgB,OAAO,WAAW,EAAE,SAAS;AAEnD,MAAM,UAAU,CAAC,iBAA8B,+BAA+B,YAAY;","names":[]}
|
package/package.json
CHANGED
|
@@ -1,10 +1,11 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "drizzle-orm",
|
|
3
|
-
"version": "0.35.3-
|
|
3
|
+
"version": "0.35.3-d39c24e",
|
|
4
4
|
"description": "Drizzle ORM package for SQL databases",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"scripts": {
|
|
7
|
-
"
|
|
7
|
+
"p": "prisma generate --schema src/prisma/schema.prisma",
|
|
8
|
+
"build": "pnpm p && scripts/build.ts",
|
|
8
9
|
"b": "pnpm build",
|
|
9
10
|
"test:types": "cd type-tests && tsc",
|
|
10
11
|
"test": "vitest run",
|
|
@@ -45,7 +46,7 @@
|
|
|
45
46
|
"peerDependencies": {
|
|
46
47
|
"@aws-sdk/client-rds-data": ">=3",
|
|
47
48
|
"@cloudflare/workers-types": ">=3",
|
|
48
|
-
"@electric-sql/pglite": ">=0.
|
|
49
|
+
"@electric-sql/pglite": ">=0.2.0",
|
|
49
50
|
"@libsql/client": ">=0.10.0",
|
|
50
51
|
"@libsql/client-wasm": ">=0.10.0",
|
|
51
52
|
"@neondatabase/serverless": ">=0.1",
|
|
@@ -130,6 +131,9 @@
|
|
|
130
131
|
"@libsql/client": {
|
|
131
132
|
"optional": true
|
|
132
133
|
},
|
|
134
|
+
"@libsql/client-wasm": {
|
|
135
|
+
"optional": true
|
|
136
|
+
},
|
|
133
137
|
"@opentelemetry/api": {
|
|
134
138
|
"optional": true
|
|
135
139
|
},
|
|
@@ -512,54 +516,6 @@
|
|
|
512
516
|
"types": "./view-common.d.ts",
|
|
513
517
|
"default": "./view-common.js"
|
|
514
518
|
},
|
|
515
|
-
"./better-sqlite3/driver": {
|
|
516
|
-
"import": {
|
|
517
|
-
"types": "./better-sqlite3/driver.d.ts",
|
|
518
|
-
"default": "./better-sqlite3/driver.js"
|
|
519
|
-
},
|
|
520
|
-
"require": {
|
|
521
|
-
"types": "./better-sqlite3/driver.d.cts",
|
|
522
|
-
"default": "./better-sqlite3/driver.cjs"
|
|
523
|
-
},
|
|
524
|
-
"types": "./better-sqlite3/driver.d.ts",
|
|
525
|
-
"default": "./better-sqlite3/driver.js"
|
|
526
|
-
},
|
|
527
|
-
"./better-sqlite3": {
|
|
528
|
-
"import": {
|
|
529
|
-
"types": "./better-sqlite3/index.d.ts",
|
|
530
|
-
"default": "./better-sqlite3/index.js"
|
|
531
|
-
},
|
|
532
|
-
"require": {
|
|
533
|
-
"types": "./better-sqlite3/index.d.cts",
|
|
534
|
-
"default": "./better-sqlite3/index.cjs"
|
|
535
|
-
},
|
|
536
|
-
"types": "./better-sqlite3/index.d.ts",
|
|
537
|
-
"default": "./better-sqlite3/index.js"
|
|
538
|
-
},
|
|
539
|
-
"./better-sqlite3/migrator": {
|
|
540
|
-
"import": {
|
|
541
|
-
"types": "./better-sqlite3/migrator.d.ts",
|
|
542
|
-
"default": "./better-sqlite3/migrator.js"
|
|
543
|
-
},
|
|
544
|
-
"require": {
|
|
545
|
-
"types": "./better-sqlite3/migrator.d.cts",
|
|
546
|
-
"default": "./better-sqlite3/migrator.cjs"
|
|
547
|
-
},
|
|
548
|
-
"types": "./better-sqlite3/migrator.d.ts",
|
|
549
|
-
"default": "./better-sqlite3/migrator.js"
|
|
550
|
-
},
|
|
551
|
-
"./better-sqlite3/session": {
|
|
552
|
-
"import": {
|
|
553
|
-
"types": "./better-sqlite3/session.d.ts",
|
|
554
|
-
"default": "./better-sqlite3/session.js"
|
|
555
|
-
},
|
|
556
|
-
"require": {
|
|
557
|
-
"types": "./better-sqlite3/session.d.cts",
|
|
558
|
-
"default": "./better-sqlite3/session.cjs"
|
|
559
|
-
},
|
|
560
|
-
"types": "./better-sqlite3/session.d.ts",
|
|
561
|
-
"default": "./better-sqlite3/session.js"
|
|
562
|
-
},
|
|
563
519
|
"./bun-sqlite/driver": {
|
|
564
520
|
"import": {
|
|
565
521
|
"types": "./bun-sqlite/driver.d.ts",
|
|
@@ -608,6 +564,54 @@
|
|
|
608
564
|
"types": "./bun-sqlite/session.d.ts",
|
|
609
565
|
"default": "./bun-sqlite/session.js"
|
|
610
566
|
},
|
|
567
|
+
"./better-sqlite3/driver": {
|
|
568
|
+
"import": {
|
|
569
|
+
"types": "./better-sqlite3/driver.d.ts",
|
|
570
|
+
"default": "./better-sqlite3/driver.js"
|
|
571
|
+
},
|
|
572
|
+
"require": {
|
|
573
|
+
"types": "./better-sqlite3/driver.d.cts",
|
|
574
|
+
"default": "./better-sqlite3/driver.cjs"
|
|
575
|
+
},
|
|
576
|
+
"types": "./better-sqlite3/driver.d.ts",
|
|
577
|
+
"default": "./better-sqlite3/driver.js"
|
|
578
|
+
},
|
|
579
|
+
"./better-sqlite3": {
|
|
580
|
+
"import": {
|
|
581
|
+
"types": "./better-sqlite3/index.d.ts",
|
|
582
|
+
"default": "./better-sqlite3/index.js"
|
|
583
|
+
},
|
|
584
|
+
"require": {
|
|
585
|
+
"types": "./better-sqlite3/index.d.cts",
|
|
586
|
+
"default": "./better-sqlite3/index.cjs"
|
|
587
|
+
},
|
|
588
|
+
"types": "./better-sqlite3/index.d.ts",
|
|
589
|
+
"default": "./better-sqlite3/index.js"
|
|
590
|
+
},
|
|
591
|
+
"./better-sqlite3/migrator": {
|
|
592
|
+
"import": {
|
|
593
|
+
"types": "./better-sqlite3/migrator.d.ts",
|
|
594
|
+
"default": "./better-sqlite3/migrator.js"
|
|
595
|
+
},
|
|
596
|
+
"require": {
|
|
597
|
+
"types": "./better-sqlite3/migrator.d.cts",
|
|
598
|
+
"default": "./better-sqlite3/migrator.cjs"
|
|
599
|
+
},
|
|
600
|
+
"types": "./better-sqlite3/migrator.d.ts",
|
|
601
|
+
"default": "./better-sqlite3/migrator.js"
|
|
602
|
+
},
|
|
603
|
+
"./better-sqlite3/session": {
|
|
604
|
+
"import": {
|
|
605
|
+
"types": "./better-sqlite3/session.d.ts",
|
|
606
|
+
"default": "./better-sqlite3/session.js"
|
|
607
|
+
},
|
|
608
|
+
"require": {
|
|
609
|
+
"types": "./better-sqlite3/session.d.cts",
|
|
610
|
+
"default": "./better-sqlite3/session.cjs"
|
|
611
|
+
},
|
|
612
|
+
"types": "./better-sqlite3/session.d.ts",
|
|
613
|
+
"default": "./better-sqlite3/session.js"
|
|
614
|
+
},
|
|
611
615
|
"./d1/driver": {
|
|
612
616
|
"import": {
|
|
613
617
|
"types": "./d1/driver.d.ts",
|
|
@@ -1112,6 +1116,30 @@
|
|
|
1112
1116
|
"types": "./mysql2/session.d.ts",
|
|
1113
1117
|
"default": "./mysql2/session.js"
|
|
1114
1118
|
},
|
|
1119
|
+
"./neon": {
|
|
1120
|
+
"import": {
|
|
1121
|
+
"types": "./neon/index.d.ts",
|
|
1122
|
+
"default": "./neon/index.js"
|
|
1123
|
+
},
|
|
1124
|
+
"require": {
|
|
1125
|
+
"types": "./neon/index.d.cts",
|
|
1126
|
+
"default": "./neon/index.cjs"
|
|
1127
|
+
},
|
|
1128
|
+
"types": "./neon/index.d.ts",
|
|
1129
|
+
"default": "./neon/index.js"
|
|
1130
|
+
},
|
|
1131
|
+
"./neon/rls": {
|
|
1132
|
+
"import": {
|
|
1133
|
+
"types": "./neon/rls.d.ts",
|
|
1134
|
+
"default": "./neon/rls.js"
|
|
1135
|
+
},
|
|
1136
|
+
"require": {
|
|
1137
|
+
"types": "./neon/rls.d.cts",
|
|
1138
|
+
"default": "./neon/rls.cjs"
|
|
1139
|
+
},
|
|
1140
|
+
"types": "./neon/rls.d.ts",
|
|
1141
|
+
"default": "./neon/rls.js"
|
|
1142
|
+
},
|
|
1115
1143
|
"./neon-http/driver": {
|
|
1116
1144
|
"import": {
|
|
1117
1145
|
"types": "./neon-http/driver.d.ts",
|
|
@@ -1400,6 +1428,18 @@
|
|
|
1400
1428
|
"types": "./pg-core/indexes.d.ts",
|
|
1401
1429
|
"default": "./pg-core/indexes.js"
|
|
1402
1430
|
},
|
|
1431
|
+
"./pg-core/policies": {
|
|
1432
|
+
"import": {
|
|
1433
|
+
"types": "./pg-core/policies.d.ts",
|
|
1434
|
+
"default": "./pg-core/policies.js"
|
|
1435
|
+
},
|
|
1436
|
+
"require": {
|
|
1437
|
+
"types": "./pg-core/policies.d.cts",
|
|
1438
|
+
"default": "./pg-core/policies.cjs"
|
|
1439
|
+
},
|
|
1440
|
+
"types": "./pg-core/policies.d.ts",
|
|
1441
|
+
"default": "./pg-core/policies.js"
|
|
1442
|
+
},
|
|
1403
1443
|
"./pg-core/primary-keys": {
|
|
1404
1444
|
"import": {
|
|
1405
1445
|
"types": "./pg-core/primary-keys.d.ts",
|
|
@@ -1412,6 +1452,18 @@
|
|
|
1412
1452
|
"types": "./pg-core/primary-keys.d.ts",
|
|
1413
1453
|
"default": "./pg-core/primary-keys.js"
|
|
1414
1454
|
},
|
|
1455
|
+
"./pg-core/roles": {
|
|
1456
|
+
"import": {
|
|
1457
|
+
"types": "./pg-core/roles.d.ts",
|
|
1458
|
+
"default": "./pg-core/roles.js"
|
|
1459
|
+
},
|
|
1460
|
+
"require": {
|
|
1461
|
+
"types": "./pg-core/roles.d.cts",
|
|
1462
|
+
"default": "./pg-core/roles.cjs"
|
|
1463
|
+
},
|
|
1464
|
+
"types": "./pg-core/roles.d.ts",
|
|
1465
|
+
"default": "./pg-core/roles.js"
|
|
1466
|
+
},
|
|
1415
1467
|
"./pg-core/schema": {
|
|
1416
1468
|
"import": {
|
|
1417
1469
|
"types": "./pg-core/schema.d.ts",
|
|
@@ -2072,6 +2124,30 @@
|
|
|
2072
2124
|
"types": "./sqlite-proxy/session.d.ts",
|
|
2073
2125
|
"default": "./sqlite-proxy/session.js"
|
|
2074
2126
|
},
|
|
2127
|
+
"./supabase": {
|
|
2128
|
+
"import": {
|
|
2129
|
+
"types": "./supabase/index.d.ts",
|
|
2130
|
+
"default": "./supabase/index.js"
|
|
2131
|
+
},
|
|
2132
|
+
"require": {
|
|
2133
|
+
"types": "./supabase/index.d.cts",
|
|
2134
|
+
"default": "./supabase/index.cjs"
|
|
2135
|
+
},
|
|
2136
|
+
"types": "./supabase/index.d.ts",
|
|
2137
|
+
"default": "./supabase/index.js"
|
|
2138
|
+
},
|
|
2139
|
+
"./supabase/rls": {
|
|
2140
|
+
"import": {
|
|
2141
|
+
"types": "./supabase/rls.d.ts",
|
|
2142
|
+
"default": "./supabase/rls.js"
|
|
2143
|
+
},
|
|
2144
|
+
"require": {
|
|
2145
|
+
"types": "./supabase/rls.d.cts",
|
|
2146
|
+
"default": "./supabase/rls.cjs"
|
|
2147
|
+
},
|
|
2148
|
+
"types": "./supabase/rls.d.ts",
|
|
2149
|
+
"default": "./supabase/rls.js"
|
|
2150
|
+
},
|
|
2075
2151
|
"./tidb-serverless/driver": {
|
|
2076
2152
|
"import": {
|
|
2077
2153
|
"types": "./tidb-serverless/driver.d.ts",
|
package/pg-core/index.cjs
CHANGED
|
@@ -22,8 +22,10 @@ __reExport(pg_core_exports, require("./db.cjs"), module.exports);
|
|
|
22
22
|
__reExport(pg_core_exports, require("./dialect.cjs"), module.exports);
|
|
23
23
|
__reExport(pg_core_exports, require("./foreign-keys.cjs"), module.exports);
|
|
24
24
|
__reExport(pg_core_exports, require("./indexes.cjs"), module.exports);
|
|
25
|
+
__reExport(pg_core_exports, require("./policies.cjs"), module.exports);
|
|
25
26
|
__reExport(pg_core_exports, require("./primary-keys.cjs"), module.exports);
|
|
26
27
|
__reExport(pg_core_exports, require("./query-builders/index.cjs"), module.exports);
|
|
28
|
+
__reExport(pg_core_exports, require("./roles.cjs"), module.exports);
|
|
27
29
|
__reExport(pg_core_exports, require("./schema.cjs"), module.exports);
|
|
28
30
|
__reExport(pg_core_exports, require("./sequence.cjs"), module.exports);
|
|
29
31
|
__reExport(pg_core_exports, require("./session.cjs"), module.exports);
|
|
@@ -43,8 +45,10 @@ __reExport(pg_core_exports, require("./view.cjs"), module.exports);
|
|
|
43
45
|
...require("./dialect.cjs"),
|
|
44
46
|
...require("./foreign-keys.cjs"),
|
|
45
47
|
...require("./indexes.cjs"),
|
|
48
|
+
...require("./policies.cjs"),
|
|
46
49
|
...require("./primary-keys.cjs"),
|
|
47
50
|
...require("./query-builders/index.cjs"),
|
|
51
|
+
...require("./roles.cjs"),
|
|
48
52
|
...require("./schema.cjs"),
|
|
49
53
|
...require("./sequence.cjs"),
|
|
50
54
|
...require("./session.cjs"),
|
package/pg-core/index.cjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/pg-core/index.ts"],"sourcesContent":["export * from './alias.ts';\nexport * from './checks.ts';\nexport * from './columns/index.ts';\nexport * from './db.ts';\nexport * from './dialect.ts';\nexport * from './foreign-keys.ts';\nexport * from './indexes.ts';\nexport * from './primary-keys.ts';\nexport * from './query-builders/index.ts';\nexport * from './schema.ts';\nexport * from './sequence.ts';\nexport * from './session.ts';\nexport * from './subquery.ts';\nexport * from './table.ts';\nexport * from './unique-constraint.ts';\nexport * from './utils.ts';\nexport * from './utils/index.ts';\nexport * from './view-common.ts';\nexport * from './view.ts';\n"],"mappings":";;;;;;;;;;;;;;;AAAA;AAAA;AAAA,4BAAc,uBAAd;AACA,4BAAc,wBADd;AAEA,4BAAc,+BAFd;AAGA,4BAAc,oBAHd;AAIA,4BAAc,yBAJd;AAKA,4BAAc,8BALd;AAMA,4BAAc,yBANd;AAOA,4BAAc,
|
|
1
|
+
{"version":3,"sources":["../../src/pg-core/index.ts"],"sourcesContent":["export * from './alias.ts';\nexport * from './checks.ts';\nexport * from './columns/index.ts';\nexport * from './db.ts';\nexport * from './dialect.ts';\nexport * from './foreign-keys.ts';\nexport * from './indexes.ts';\nexport * from './policies.ts';\nexport * from './primary-keys.ts';\nexport * from './query-builders/index.ts';\nexport * from './roles.ts';\nexport * from './schema.ts';\nexport * from './sequence.ts';\nexport * from './session.ts';\nexport * from './subquery.ts';\nexport * from './table.ts';\nexport * from './unique-constraint.ts';\nexport * from './utils.ts';\nexport * from './utils/index.ts';\nexport * from './view-common.ts';\nexport * from './view.ts';\n"],"mappings":";;;;;;;;;;;;;;;AAAA;AAAA;AAAA,4BAAc,uBAAd;AACA,4BAAc,wBADd;AAEA,4BAAc,+BAFd;AAGA,4BAAc,oBAHd;AAIA,4BAAc,yBAJd;AAKA,4BAAc,8BALd;AAMA,4BAAc,yBANd;AAOA,4BAAc,0BAPd;AAQA,4BAAc,8BARd;AASA,4BAAc,sCATd;AAUA,4BAAc,uBAVd;AAWA,4BAAc,wBAXd;AAYA,4BAAc,0BAZd;AAaA,4BAAc,yBAbd;AAcA,4BAAc,0BAdd;AAeA,4BAAc,uBAfd;AAgBA,4BAAc,mCAhBd;AAiBA,4BAAc,uBAjBd;AAkBA,4BAAc,6BAlBd;AAmBA,4BAAc,6BAnBd;AAoBA,4BAAc,sBApBd;","names":[]}
|
package/pg-core/index.d.cts
CHANGED
|
@@ -5,8 +5,10 @@ export * from "./db.cjs";
|
|
|
5
5
|
export * from "./dialect.cjs";
|
|
6
6
|
export * from "./foreign-keys.cjs";
|
|
7
7
|
export * from "./indexes.cjs";
|
|
8
|
+
export * from "./policies.cjs";
|
|
8
9
|
export * from "./primary-keys.cjs";
|
|
9
10
|
export * from "./query-builders/index.cjs";
|
|
11
|
+
export * from "./roles.cjs";
|
|
10
12
|
export * from "./schema.cjs";
|
|
11
13
|
export * from "./sequence.cjs";
|
|
12
14
|
export * from "./session.cjs";
|
package/pg-core/index.d.ts
CHANGED
|
@@ -5,8 +5,10 @@ export * from "./db.js";
|
|
|
5
5
|
export * from "./dialect.js";
|
|
6
6
|
export * from "./foreign-keys.js";
|
|
7
7
|
export * from "./indexes.js";
|
|
8
|
+
export * from "./policies.js";
|
|
8
9
|
export * from "./primary-keys.js";
|
|
9
10
|
export * from "./query-builders/index.js";
|
|
11
|
+
export * from "./roles.js";
|
|
10
12
|
export * from "./schema.js";
|
|
11
13
|
export * from "./sequence.js";
|
|
12
14
|
export * from "./session.js";
|
package/pg-core/index.js
CHANGED
|
@@ -5,8 +5,10 @@ export * from "./db.js";
|
|
|
5
5
|
export * from "./dialect.js";
|
|
6
6
|
export * from "./foreign-keys.js";
|
|
7
7
|
export * from "./indexes.js";
|
|
8
|
+
export * from "./policies.js";
|
|
8
9
|
export * from "./primary-keys.js";
|
|
9
10
|
export * from "./query-builders/index.js";
|
|
11
|
+
export * from "./roles.js";
|
|
10
12
|
export * from "./schema.js";
|
|
11
13
|
export * from "./sequence.js";
|
|
12
14
|
export * from "./session.js";
|
package/pg-core/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../src/pg-core/index.ts"],"sourcesContent":["export * from './alias.ts';\nexport * from './checks.ts';\nexport * from './columns/index.ts';\nexport * from './db.ts';\nexport * from './dialect.ts';\nexport * from './foreign-keys.ts';\nexport * from './indexes.ts';\nexport * from './primary-keys.ts';\nexport * from './query-builders/index.ts';\nexport * from './schema.ts';\nexport * from './sequence.ts';\nexport * from './session.ts';\nexport * from './subquery.ts';\nexport * from './table.ts';\nexport * from './unique-constraint.ts';\nexport * from './utils.ts';\nexport * from './utils/index.ts';\nexport * from './view-common.ts';\nexport * from './view.ts';\n"],"mappings":"AAAA,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;","names":[]}
|
|
1
|
+
{"version":3,"sources":["../../src/pg-core/index.ts"],"sourcesContent":["export * from './alias.ts';\nexport * from './checks.ts';\nexport * from './columns/index.ts';\nexport * from './db.ts';\nexport * from './dialect.ts';\nexport * from './foreign-keys.ts';\nexport * from './indexes.ts';\nexport * from './policies.ts';\nexport * from './primary-keys.ts';\nexport * from './query-builders/index.ts';\nexport * from './roles.ts';\nexport * from './schema.ts';\nexport * from './sequence.ts';\nexport * from './session.ts';\nexport * from './subquery.ts';\nexport * from './table.ts';\nexport * from './unique-constraint.ts';\nexport * from './utils.ts';\nexport * from './utils/index.ts';\nexport * from './view-common.ts';\nexport * from './view.ts';\n"],"mappings":"AAAA,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;AACd,cAAc;","names":[]}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __defProp = Object.defineProperty;
|
|
3
|
+
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
4
|
+
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
5
|
+
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
6
|
+
var __export = (target, all) => {
|
|
7
|
+
for (var name in all)
|
|
8
|
+
__defProp(target, name, { get: all[name], enumerable: true });
|
|
9
|
+
};
|
|
10
|
+
var __copyProps = (to, from, except, desc) => {
|
|
11
|
+
if (from && typeof from === "object" || typeof from === "function") {
|
|
12
|
+
for (let key of __getOwnPropNames(from))
|
|
13
|
+
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
14
|
+
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
15
|
+
}
|
|
16
|
+
return to;
|
|
17
|
+
};
|
|
18
|
+
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
+
var policies_exports = {};
|
|
20
|
+
__export(policies_exports, {
|
|
21
|
+
PgPolicy: () => PgPolicy,
|
|
22
|
+
pgPolicy: () => pgPolicy
|
|
23
|
+
});
|
|
24
|
+
module.exports = __toCommonJS(policies_exports);
|
|
25
|
+
var import_entity = require("../entity.cjs");
|
|
26
|
+
class PgPolicy {
|
|
27
|
+
constructor(name, config) {
|
|
28
|
+
this.name = name;
|
|
29
|
+
if (config) {
|
|
30
|
+
this.as = config.as;
|
|
31
|
+
this.for = config.for;
|
|
32
|
+
this.to = config.to;
|
|
33
|
+
this.using = config.using;
|
|
34
|
+
this.withCheck = config.withCheck;
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
static [import_entity.entityKind] = "PgPolicy";
|
|
38
|
+
as;
|
|
39
|
+
for;
|
|
40
|
+
to;
|
|
41
|
+
using;
|
|
42
|
+
withCheck;
|
|
43
|
+
/** @internal */
|
|
44
|
+
_linkedTable;
|
|
45
|
+
link(table) {
|
|
46
|
+
this._linkedTable = table;
|
|
47
|
+
return this;
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
function pgPolicy(name, config) {
|
|
51
|
+
return new PgPolicy(name, config);
|
|
52
|
+
}
|
|
53
|
+
// Annotate the CommonJS export names for ESM import in node:
|
|
54
|
+
0 && (module.exports = {
|
|
55
|
+
PgPolicy,
|
|
56
|
+
pgPolicy
|
|
57
|
+
});
|
|
58
|
+
//# sourceMappingURL=policies.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/pg-core/policies.ts"],"sourcesContent":["import { entityKind } from '~/entity.ts';\nimport type { SQL } from '~/sql/sql.ts';\nimport type { PgRole } from './roles.ts';\nimport type { PgTable } from './table.ts';\n\nexport type PgPolicyToOption =\n\t| 'public'\n\t| 'current_role'\n\t| 'current_user'\n\t| 'session_user'\n\t| (string & {})\n\t| PgPolicyToOption[]\n\t| PgRole;\n\nexport interface PgPolicyConfig {\n\tas?: 'permissive' | 'restrictive';\n\tfor?: 'all' | 'select' | 'insert' | 'update' | 'delete';\n\tto?: PgPolicyToOption;\n\tusing?: SQL;\n\twithCheck?: SQL;\n}\n\nexport class PgPolicy implements PgPolicyConfig {\n\tstatic readonly [entityKind]: string = 'PgPolicy';\n\n\treadonly as: PgPolicyConfig['as'];\n\treadonly for: PgPolicyConfig['for'];\n\treadonly to: PgPolicyConfig['to'];\n\treadonly using: PgPolicyConfig['using'];\n\treadonly withCheck: PgPolicyConfig['withCheck'];\n\n\t/** @internal */\n\t_linkedTable?: PgTable;\n\n\tconstructor(\n\t\treadonly name: string,\n\t\tconfig?: PgPolicyConfig,\n\t) {\n\t\tif (config) {\n\t\t\tthis.as = config.as;\n\t\t\tthis.for = config.for;\n\t\t\tthis.to = config.to;\n\t\t\tthis.using = config.using;\n\t\t\tthis.withCheck = config.withCheck;\n\t\t}\n\t}\n\n\tlink(table: PgTable): this {\n\t\tthis._linkedTable = table;\n\t\treturn this;\n\t}\n}\n\nexport function pgPolicy(name: string, config?: PgPolicyConfig) {\n\treturn new PgPolicy(name, config);\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,oBAA2B;AAsBpB,MAAM,SAAmC;AAAA,EAY/C,YACU,MACT,QACC;AAFQ;AAGT,QAAI,QAAQ;AACX,WAAK,KAAK,OAAO;AACjB,WAAK,MAAM,OAAO;AAClB,WAAK,KAAK,OAAO;AACjB,WAAK,QAAQ,OAAO;AACpB,WAAK,YAAY,OAAO;AAAA,IACzB;AAAA,EACD;AAAA,EAtBA,QAAiB,wBAAU,IAAY;AAAA,EAE9B;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA;AAAA,EAGT;AAAA,EAeA,KAAK,OAAsB;AAC1B,SAAK,eAAe;AACpB,WAAO;AAAA,EACR;AACD;AAEO,SAAS,SAAS,MAAc,QAAyB;AAC/D,SAAO,IAAI,SAAS,MAAM,MAAM;AACjC;","names":[]}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
import { entityKind } from "../entity.cjs";
|
|
2
|
+
import type { SQL } from "../sql/sql.cjs";
|
|
3
|
+
import type { PgRole } from "./roles.cjs";
|
|
4
|
+
import type { PgTable } from "./table.cjs";
|
|
5
|
+
export type PgPolicyToOption = 'public' | 'current_role' | 'current_user' | 'session_user' | (string & {}) | PgPolicyToOption[] | PgRole;
|
|
6
|
+
export interface PgPolicyConfig {
|
|
7
|
+
as?: 'permissive' | 'restrictive';
|
|
8
|
+
for?: 'all' | 'select' | 'insert' | 'update' | 'delete';
|
|
9
|
+
to?: PgPolicyToOption;
|
|
10
|
+
using?: SQL;
|
|
11
|
+
withCheck?: SQL;
|
|
12
|
+
}
|
|
13
|
+
export declare class PgPolicy implements PgPolicyConfig {
|
|
14
|
+
readonly name: string;
|
|
15
|
+
static readonly [entityKind]: string;
|
|
16
|
+
readonly as: PgPolicyConfig['as'];
|
|
17
|
+
readonly for: PgPolicyConfig['for'];
|
|
18
|
+
readonly to: PgPolicyConfig['to'];
|
|
19
|
+
readonly using: PgPolicyConfig['using'];
|
|
20
|
+
readonly withCheck: PgPolicyConfig['withCheck'];
|
|
21
|
+
constructor(name: string, config?: PgPolicyConfig);
|
|
22
|
+
link(table: PgTable): this;
|
|
23
|
+
}
|
|
24
|
+
export declare function pgPolicy(name: string, config?: PgPolicyConfig): PgPolicy;
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
import { entityKind } from "../entity.js";
|
|
2
|
+
import type { SQL } from "../sql/sql.js";
|
|
3
|
+
import type { PgRole } from "./roles.js";
|
|
4
|
+
import type { PgTable } from "./table.js";
|
|
5
|
+
export type PgPolicyToOption = 'public' | 'current_role' | 'current_user' | 'session_user' | (string & {}) | PgPolicyToOption[] | PgRole;
|
|
6
|
+
export interface PgPolicyConfig {
|
|
7
|
+
as?: 'permissive' | 'restrictive';
|
|
8
|
+
for?: 'all' | 'select' | 'insert' | 'update' | 'delete';
|
|
9
|
+
to?: PgPolicyToOption;
|
|
10
|
+
using?: SQL;
|
|
11
|
+
withCheck?: SQL;
|
|
12
|
+
}
|
|
13
|
+
export declare class PgPolicy implements PgPolicyConfig {
|
|
14
|
+
readonly name: string;
|
|
15
|
+
static readonly [entityKind]: string;
|
|
16
|
+
readonly as: PgPolicyConfig['as'];
|
|
17
|
+
readonly for: PgPolicyConfig['for'];
|
|
18
|
+
readonly to: PgPolicyConfig['to'];
|
|
19
|
+
readonly using: PgPolicyConfig['using'];
|
|
20
|
+
readonly withCheck: PgPolicyConfig['withCheck'];
|
|
21
|
+
constructor(name: string, config?: PgPolicyConfig);
|
|
22
|
+
link(table: PgTable): this;
|
|
23
|
+
}
|
|
24
|
+
export declare function pgPolicy(name: string, config?: PgPolicyConfig): PgPolicy;
|