A simple SQL injection protection module that allows you to use ES6 template strings for escaped statements. Works with pg, mysql and mysql2 library.
- Install
- Usage
- Methods
- How it works?
- Undefined values and nullable fields
- Testing, linting, & coverage
- Benchmark
- License
npm install @nearform/sql
const SQL = require('@nearform/sql')
const username = 'user'
const email = '[email protected]'
const password = 'Password1'
// generate SQL query
const sql = SQL`
INSERT INTO users (username, email, password)
VALUES (${username},${email},${password})
`
pg.query(sql) // execute query in pg
mysql.query(sql) // execute query in mysql
mysql2.query(sql) // execute query in mysql2
We recommend using eslint-plugin-sql to prevent cases in which the SQL tag is forgotten to be added in front of template strings. Eslint will fail if you write SQL queries without sql
tag in front of the string.
`SELECT 1`
// fails - Message: Use "sql" tag
sql`SELECT 1`
// passes
const username = 'user1'
const email = '[email protected]'
const userId = 1
const sql = SQL`UPDATE users SET name = ${username}, email = ${email} `
sql.append(SQL`SET ${dynamicName} = '2'`, { unsafe: true })
sql.append(SQL`WHERE id = ${userId}`)
const username = 'user1'
const email = '[email protected]'
const userId = 1
const sql = SQL` UPDATE users SET `
const updates = []
updates.push(SQL`name = ${username}`)
updates.push(SQL`email = ${email}`)
sql.append(sql.glue(updates, ' , '))
sql.append(SQL`WHERE id = ${userId}`)
or also
const ids = [1, 2, 3]
const value = 'test'
const sql = SQL` UPDATE users SET property = ${value}`
const idsSqls = ids.map(id => SQL`${id}`)
sql.append(SQL`WHERE id IN (`)
sql.append(sql.glue(idsSqls, ' , '))
sql.append(SQL`)`)
Glue can also be used statically:
const ids = [1, 2, 3]
const idsSqls = ids.map(id => SQL`(${id})`)
SQL.glue(idsSqls, ' , ')
Glue can also be used to generate batch operations:
const users = [
{ id: 1, name: 'something' },
{ id: 2, name: 'something-else' },
{ id: 3, name: 'something-other' }
]
const sql = SQL`INSERT INTO users (id, name) VALUES `
sql.append(
SQL.glue(
users.map(user => SQL`(${user.id},${user.name}})`),
' , '
)
)
The SQL template string tag parses query and returns an objects that's understandable by pg library:
const username = 'user'
const email = '[email protected]'
const password = 'Password1'
const sql = SQL`INSERT INTO users (username, email, password) VALUES (${username},${email},${password})` // generate SQL query
sql.text // INSERT INTO users (username, email, password) VALUES ($1 , $2 , $3) - for pg
sql.sql // INSERT INTO users (username, email, password) VALUES (? , ? , ?) - for mysql and mysql2
sql.values // ['user, '[email protected]', 'Password1']
To help with debugging, you can view an approximate representation of the SQL query with values filled in. It may differ from the actual SQL executed by your database, but serves as a handy reference when debugging. The debug output should not be executed as it is not guaranteed safe. You can may also inspect the SQL
object via console.log
.
sql.debug // INSERT INTO users (username, email, password) VALUES ('user','[email protected]','Password1')
console.log(sql) // SQL << INSERT INTO users (username, email, password) VALUES ('user','[email protected]','Password1') >>
Don't pass undefined values into the sql query string builder. It throws on undefined values as this is a javascript concept and sql does not handle it.
Sometimes you may expect to not have a value to be provided to the string builder, and this is ok as the coresponding field is nullable. In this or similar cases the recommended way to handle this is to coerce it to a null js value.
Example:
const user = { name: 'foo bar' }
const sql = SQL`INSERT into users (name, address) VALUES (${user.name},${
user.address || null
})`
sql.debug // INSERT INTO users (name, address) VALUES ('foo bar',null)
This module can be tested and reported on in a variety of ways...
npm run test # runs tap based unit test suite.
npm run test:security # runs sqlmap security tests.
npm run test:typescript # runs type definition tests.
npm run coverage # generates a coverage report in docs dir.
npm run lint # lints via standardJS.
Find more about @nearform/sql
speed here
Copyright NearForm 2020. Licensed under Apache 2.0