postgresai 0.12.0-beta.7 → 0.14.0-dev.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/lib/init.ts ADDED
@@ -0,0 +1,452 @@
1
+ import * as readline from "readline";
2
+ import { randomBytes } from "crypto";
3
+ import { URL } from "url";
4
+ import type { Client as PgClient } from "pg";
5
+
6
+ export type PgClientConfig = {
7
+ connectionString?: string;
8
+ host?: string;
9
+ port?: number;
10
+ user?: string;
11
+ password?: string;
12
+ database?: string;
13
+ ssl?: any;
14
+ };
15
+
16
+ export type AdminConnection = {
17
+ clientConfig: PgClientConfig;
18
+ display: string;
19
+ };
20
+
21
+ export type InitStep = {
22
+ name: string;
23
+ sql: string;
24
+ params?: unknown[];
25
+ optional?: boolean;
26
+ };
27
+
28
+ export type InitPlan = {
29
+ monitoringUser: string;
30
+ database: string;
31
+ steps: InitStep[];
32
+ };
33
+
34
+ function quoteIdent(ident: string): string {
35
+ // Always quote. Escape embedded quotes by doubling.
36
+ return `"${ident.replace(/"/g, "\"\"")}"`;
37
+ }
38
+
39
+ export function maskConnectionString(dbUrl: string): string {
40
+ // Hide password if present (postgresql://user:pass@host/db).
41
+ try {
42
+ const u = new URL(dbUrl);
43
+ if (u.password) u.password = "*****";
44
+ return u.toString();
45
+ } catch {
46
+ return dbUrl.replace(/\/\/([^:/?#]+):([^@/?#]+)@/g, "//$1:*****@");
47
+ }
48
+ }
49
+
50
+ function isLikelyUri(value: string): boolean {
51
+ return /^postgres(ql)?:\/\//i.test(value.trim());
52
+ }
53
+
54
+ function tokenizeConninfo(input: string): string[] {
55
+ const s = input.trim();
56
+ const tokens: string[] = [];
57
+ let i = 0;
58
+
59
+ const isSpace = (ch: string) => ch === " " || ch === "\t" || ch === "\n" || ch === "\r";
60
+
61
+ while (i < s.length) {
62
+ while (i < s.length && isSpace(s[i]!)) i++;
63
+ if (i >= s.length) break;
64
+
65
+ let tok = "";
66
+ let inSingle = false;
67
+ while (i < s.length) {
68
+ const ch = s[i]!;
69
+ if (!inSingle && isSpace(ch)) break;
70
+
71
+ if (ch === "'" && !inSingle) {
72
+ inSingle = true;
73
+ i++;
74
+ continue;
75
+ }
76
+ if (ch === "'" && inSingle) {
77
+ inSingle = false;
78
+ i++;
79
+ continue;
80
+ }
81
+
82
+ if (ch === "\\" && i + 1 < s.length) {
83
+ tok += s[i + 1]!;
84
+ i += 2;
85
+ continue;
86
+ }
87
+
88
+ tok += ch;
89
+ i++;
90
+ }
91
+
92
+ tokens.push(tok);
93
+ while (i < s.length && isSpace(s[i]!)) i++;
94
+ }
95
+
96
+ return tokens;
97
+ }
98
+
99
+ export function parseLibpqConninfo(input: string): PgClientConfig {
100
+ const tokens = tokenizeConninfo(input);
101
+ const cfg: PgClientConfig = {};
102
+
103
+ for (const t of tokens) {
104
+ const eq = t.indexOf("=");
105
+ if (eq <= 0) continue;
106
+ const key = t.slice(0, eq).trim();
107
+ const rawVal = t.slice(eq + 1);
108
+ const val = rawVal.trim();
109
+ if (!key) continue;
110
+
111
+ switch (key) {
112
+ case "host":
113
+ cfg.host = val;
114
+ break;
115
+ case "port": {
116
+ const p = Number(val);
117
+ if (Number.isFinite(p)) cfg.port = p;
118
+ break;
119
+ }
120
+ case "user":
121
+ cfg.user = val;
122
+ break;
123
+ case "password":
124
+ cfg.password = val;
125
+ break;
126
+ case "dbname":
127
+ case "database":
128
+ cfg.database = val;
129
+ break;
130
+ // ignore everything else (sslmode, options, application_name, etc.)
131
+ default:
132
+ break;
133
+ }
134
+ }
135
+
136
+ return cfg;
137
+ }
138
+
139
+ export function describePgConfig(cfg: PgClientConfig): string {
140
+ if (cfg.connectionString) return maskConnectionString(cfg.connectionString);
141
+ const user = cfg.user ? cfg.user : "<user>";
142
+ const host = cfg.host ? cfg.host : "<host>";
143
+ const port = cfg.port ? String(cfg.port) : "<port>";
144
+ const db = cfg.database ? cfg.database : "<db>";
145
+ // Don't include password
146
+ return `postgresql://${user}:*****@${host}:${port}/${db}`;
147
+ }
148
+
149
+ export function resolveAdminConnection(opts: {
150
+ conn?: string;
151
+ dbUrlFlag?: string;
152
+ host?: string;
153
+ port?: string | number;
154
+ username?: string;
155
+ dbname?: string;
156
+ adminPassword?: string;
157
+ envPassword?: string;
158
+ }): AdminConnection {
159
+ const conn = (opts.conn || "").trim();
160
+ const dbUrlFlag = (opts.dbUrlFlag || "").trim();
161
+
162
+ const hasPsqlParts =
163
+ !!(opts.host || opts.port || opts.username || opts.dbname || opts.adminPassword || opts.envPassword);
164
+
165
+ if (conn && dbUrlFlag) {
166
+ throw new Error("Provide either positional connection string or --db-url, not both");
167
+ }
168
+
169
+ if (conn || dbUrlFlag) {
170
+ const v = conn || dbUrlFlag;
171
+ if (isLikelyUri(v)) {
172
+ return { clientConfig: { connectionString: v }, display: maskConnectionString(v) };
173
+ }
174
+ // libpq conninfo (dbname=... host=...)
175
+ const cfg = parseLibpqConninfo(v);
176
+ if (opts.envPassword && !cfg.password) cfg.password = opts.envPassword;
177
+ return { clientConfig: cfg, display: describePgConfig(cfg) };
178
+ }
179
+
180
+ if (!hasPsqlParts) {
181
+ throw new Error(
182
+ [
183
+ "Connection is required.",
184
+ "",
185
+ "Examples:",
186
+ " postgresai init postgresql://admin@host:5432/dbname",
187
+ " postgresai init \"dbname=dbname host=host user=admin\"",
188
+ " postgresai init -h host -p 5432 -U admin -d dbname",
189
+ "",
190
+ "Admin password:",
191
+ " --admin-password <password> (or set PGPASSWORD)",
192
+ ].join("\n")
193
+ );
194
+ }
195
+
196
+ const cfg: PgClientConfig = {};
197
+ if (opts.host) cfg.host = opts.host;
198
+ if (opts.port !== undefined && opts.port !== "") {
199
+ const p = Number(opts.port);
200
+ if (!Number.isFinite(p) || !Number.isInteger(p) || p <= 0 || p > 65535) {
201
+ throw new Error(`Invalid port value: ${String(opts.port)}`);
202
+ }
203
+ cfg.port = p;
204
+ }
205
+ if (opts.username) cfg.user = opts.username;
206
+ if (opts.dbname) cfg.database = opts.dbname;
207
+ if (opts.adminPassword) cfg.password = opts.adminPassword;
208
+ if (opts.envPassword && !cfg.password) cfg.password = opts.envPassword;
209
+ return { clientConfig: cfg, display: describePgConfig(cfg) };
210
+ }
211
+
212
+ export async function promptHidden(prompt: string): Promise<string> {
213
+ // Implement our own hidden input reader so:
214
+ // - prompt text is visible
215
+ // - only user input is masked
216
+ // - we don't rely on non-public readline internals
217
+ if (!process.stdin.isTTY) {
218
+ throw new Error("Cannot prompt for password in non-interactive mode");
219
+ }
220
+
221
+ const stdin = process.stdin;
222
+ const stdout = process.stdout as NodeJS.WriteStream;
223
+
224
+ stdout.write(prompt);
225
+
226
+ return await new Promise<string>((resolve, reject) => {
227
+ let value = "";
228
+
229
+ const cleanup = () => {
230
+ try {
231
+ stdin.setRawMode(false);
232
+ } catch {
233
+ // ignore
234
+ }
235
+ stdin.removeListener("keypress", onKeypress);
236
+ };
237
+
238
+ const onKeypress = (str: string, key: any) => {
239
+ if (key?.ctrl && key?.name === "c") {
240
+ stdout.write("\n");
241
+ cleanup();
242
+ reject(new Error("Cancelled"));
243
+ return;
244
+ }
245
+
246
+ if (key?.name === "return" || key?.name === "enter") {
247
+ stdout.write("\n");
248
+ cleanup();
249
+ resolve(value);
250
+ return;
251
+ }
252
+
253
+ if (key?.name === "backspace") {
254
+ if (value.length > 0) {
255
+ value = value.slice(0, -1);
256
+ // Erase one mask char.
257
+ stdout.write("\b \b");
258
+ }
259
+ return;
260
+ }
261
+
262
+ // Ignore other control keys.
263
+ if (key?.ctrl || key?.meta) return;
264
+
265
+ if (typeof str === "string" && str.length > 0) {
266
+ value += str;
267
+ stdout.write("*");
268
+ }
269
+ };
270
+
271
+ readline.emitKeypressEvents(stdin);
272
+ stdin.setRawMode(true);
273
+ stdin.on("keypress", onKeypress);
274
+ stdin.resume();
275
+ });
276
+ }
277
+
278
+ function generateMonitoringPassword(): string {
279
+ // URL-safe and easy to copy/paste; length ~32 chars.
280
+ return randomBytes(24).toString("base64url");
281
+ }
282
+
283
+ export async function resolveMonitoringPassword(opts: {
284
+ passwordFlag?: string;
285
+ passwordEnv?: string;
286
+ prompt?: (prompt: string) => Promise<string>;
287
+ monitoringUser: string;
288
+ }): Promise<{ password: string; generated: boolean }> {
289
+ const fromFlag = (opts.passwordFlag || "").trim();
290
+ if (fromFlag) return { password: fromFlag, generated: false };
291
+
292
+ const fromEnv = (opts.passwordEnv || "").trim();
293
+ if (fromEnv) return { password: fromEnv, generated: false };
294
+
295
+ // Default: auto-generate (safer than prompting; works in non-interactive mode).
296
+ return { password: generateMonitoringPassword(), generated: true };
297
+ }
298
+
299
+ export async function buildInitPlan(params: {
300
+ database: string;
301
+ monitoringUser?: string;
302
+ monitoringPassword: string;
303
+ includeOptionalPermissions: boolean;
304
+ roleExists?: boolean;
305
+ }): Promise<InitPlan> {
306
+ const monitoringUser = params.monitoringUser || "postgres_ai_mon";
307
+ const database = params.database;
308
+
309
+ const qRole = quoteIdent(monitoringUser);
310
+ const qDb = quoteIdent(database);
311
+
312
+ const steps: InitStep[] = [];
313
+
314
+ // Role creation/update is done in two alternative steps. Caller decides by checking role existence.
315
+ if (params.roleExists === false) {
316
+ steps.push({
317
+ name: "create monitoring user",
318
+ sql: `create user ${qRole} with password $1;`,
319
+ params: [params.monitoringPassword],
320
+ });
321
+ } else if (params.roleExists === true) {
322
+ steps.push({
323
+ name: "update monitoring user password",
324
+ sql: `alter user ${qRole} with password $1;`,
325
+ params: [params.monitoringPassword],
326
+ });
327
+ } else {
328
+ // Unknown: caller will rebuild after probing role existence.
329
+ }
330
+
331
+ steps.push(
332
+ {
333
+ name: "grant connect on database",
334
+ sql: `grant connect on database ${qDb} to ${qRole};`,
335
+ },
336
+ {
337
+ name: "grant pg_monitor",
338
+ sql: `grant pg_monitor to ${qRole};`,
339
+ },
340
+ {
341
+ name: "grant select on pg_index",
342
+ sql: `grant select on pg_catalog.pg_index to ${qRole};`,
343
+ },
344
+ {
345
+ name: "create or replace public.pg_statistic view",
346
+ sql: `create or replace view public.pg_statistic as
347
+ select
348
+ n.nspname as schemaname,
349
+ c.relname as tablename,
350
+ a.attname,
351
+ s.stanullfrac as null_frac,
352
+ s.stawidth as avg_width,
353
+ false as inherited
354
+ from pg_catalog.pg_statistic s
355
+ join pg_catalog.pg_class c on c.oid = s.starelid
356
+ join pg_catalog.pg_namespace n on n.oid = c.relnamespace
357
+ join pg_catalog.pg_attribute a on a.attrelid = s.starelid and a.attnum = s.staattnum
358
+ where a.attnum > 0 and not a.attisdropped;`,
359
+ },
360
+ {
361
+ name: "grant select on public.pg_statistic",
362
+ sql: `grant select on public.pg_statistic to ${qRole};`,
363
+ },
364
+ {
365
+ name: "ensure access to public schema (for hardened clusters)",
366
+ sql: `grant usage on schema public to ${qRole};`,
367
+ },
368
+ {
369
+ name: "set monitoring user search_path",
370
+ sql: `alter user ${qRole} set search_path = "$user", public, pg_catalog;`,
371
+ }
372
+ );
373
+
374
+ if (params.includeOptionalPermissions) {
375
+ steps.push(
376
+ {
377
+ name: "create rds_tools extension (optional)",
378
+ sql: "create extension if not exists rds_tools;",
379
+ optional: true,
380
+ },
381
+ {
382
+ name: "grant rds_tools.pg_ls_multixactdir() (optional)",
383
+ sql: `grant execute on function rds_tools.pg_ls_multixactdir() to ${qRole};`,
384
+ optional: true,
385
+ },
386
+ {
387
+ name: "grant pg_stat_file(text) (optional)",
388
+ sql: `grant execute on function pg_catalog.pg_stat_file(text) to ${qRole};`,
389
+ optional: true,
390
+ },
391
+ {
392
+ name: "grant pg_stat_file(text, boolean) (optional)",
393
+ sql: `grant execute on function pg_catalog.pg_stat_file(text, boolean) to ${qRole};`,
394
+ optional: true,
395
+ },
396
+ {
397
+ name: "grant pg_ls_dir(text) (optional)",
398
+ sql: `grant execute on function pg_catalog.pg_ls_dir(text) to ${qRole};`,
399
+ optional: true,
400
+ },
401
+ {
402
+ name: "grant pg_ls_dir(text, boolean, boolean) (optional)",
403
+ sql: `grant execute on function pg_catalog.pg_ls_dir(text, boolean, boolean) to ${qRole};`,
404
+ optional: true,
405
+ }
406
+ );
407
+ }
408
+
409
+ return { monitoringUser, database, steps };
410
+ }
411
+
412
+ export async function applyInitPlan(params: {
413
+ client: PgClient;
414
+ plan: InitPlan;
415
+ verbose?: boolean;
416
+ }): Promise<{ applied: string[]; skippedOptional: string[] }> {
417
+ const applied: string[] = [];
418
+ const skippedOptional: string[] = [];
419
+
420
+ // Apply non-optional steps in a single transaction.
421
+ await params.client.query("begin;");
422
+ try {
423
+ for (const step of params.plan.steps.filter((s) => !s.optional)) {
424
+ try {
425
+ await params.client.query(step.sql, step.params as any);
426
+ applied.push(step.name);
427
+ } catch (e) {
428
+ const msg = e instanceof Error ? e.message : String(e);
429
+ throw new Error(`Failed at step "${step.name}": ${msg}`);
430
+ }
431
+ }
432
+ await params.client.query("commit;");
433
+ } catch (e) {
434
+ await params.client.query("rollback;");
435
+ throw e;
436
+ }
437
+
438
+ // Apply optional steps outside of the transaction so a failure doesn't abort everything.
439
+ for (const step of params.plan.steps.filter((s) => s.optional)) {
440
+ try {
441
+ await params.client.query(step.sql, step.params as any);
442
+ applied.push(step.name);
443
+ } catch {
444
+ skippedOptional.push(step.name);
445
+ // best-effort: ignore
446
+ }
447
+ }
448
+
449
+ return { applied, skippedOptional };
450
+ }
451
+
452
+
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "postgresai",
3
- "version": "0.12.0-beta.7",
3
+ "version": "0.14.0-dev.8",
4
4
  "description": "postgres_ai CLI (Node.js)",
5
5
  "license": "Apache-2.0",
6
6
  "private": false,
@@ -25,7 +25,8 @@
25
25
  "build": "tsc",
26
26
  "prepare": "npm run build",
27
27
  "start": "node ./dist/bin/postgres-ai.js --help",
28
- "dev": "tsc --watch"
28
+ "dev": "tsc --watch",
29
+ "test": "npm run build && node --test test/*.test.cjs"
29
30
  },
30
31
  "dependencies": {
31
32
  "@modelcontextprotocol/sdk": "^1.20.2",