A battle-tested Node.js PostgreSQL client with strict types, detailed logging and assertions.
(The above GIF shows Slonik producing query logs. Slonik produces logs using Roarr. Logs include stack trace of the actual query invocation location and values used to execute the query.)
If you value my work and want to see Slonik and many other of my Open-Source projects to be continuously improved, then please consider becoming a patron:
Read: Stop using Knex.js
Note: Using this project does not require TypeScript. It is a regular ES6 module. Ignore the type definitions used in the documentation if you do not use a type system.
sql
tag
node-postgres
errorBackendTerminatedError
CheckIntegrityConstraintViolationError
ConnectionError
DataIntegrityError
ForeignKeyIntegrityConstraintViolationError
NotFoundError
NotNullIntegrityConstraintViolationError
StatementCancelledError
StatementTimeoutError
UniqueIntegrityConstraintViolationError
TupleMovedToAnotherPartitionError
Slonik began as a collection of utilities designed for working with node-postgres
. It continues to use node-postgres
driver as it provides a robust foundation for interacting with PostgreSQL. However, what once was a collection of utilities has since grown into a framework that abstracts repeating code patterns, protects against unsafe connection handling and value interpolation, and provides a rich debugging experience.
Slonik has been battle-tested with large data volumes and queries ranging from simple CRUD operations to data-warehousing needs.
The name of the elephant depicted in the official PostgreSQL logo is Slonik. The name itself is derived from the Russian word for "little elephant".
Read: The History of Slonik, the PostgreSQL Elephant Logo
Among the primary reasons for developing Slonik, was the motivation to reduce the repeating code patterns and add a level of type safety. This is primarily achieved through the methods such as one
, many
, etc. But what is the issue? It is best illustrated with an example.
Suppose the requirement is to write a method that retrieves a resource ID given values defining (what we assume to be) a unique constraint. If we did not have the aforementioned helper methods available, then it would need to be written as:
import { sql, type DatabaseConnection } from 'slonik'; type DatabaseRecordIdType = number; const getFooIdByBar = async (connection: DatabaseConnection, bar: string): Promise<DatabaseRecordIdType> => { const fooResult = await connection.query(sql.typeAlias('id')` SELECT id FROM foo WHERE bar = ${bar} `); if (fooResult.rowCount === 0) { throw new Error('Resource not found.'); } if (fooResult.rowCount > 1) { throw new Error('Data integrity constraint violation.'); } return fooResult[0].id; };
oneFirst
method abstracts all of the above logic into:
const getFooIdByBar = (connection: DatabaseConnection, bar: string): Promise<DatabaseRecordIdType> => { return connection.oneFirst(sql.typeAlias('id')` SELECT id FROM foo WHERE bar = ${bar} `); };
oneFirst
throws:
NotFoundError
if query returns no rowsDataIntegrityError
if query returns multiple rowsDataIntegrityError
if query returns multiple columnsIn the absence of helper methods, the overhead of repeating code becomes particularly visible when writing routines where multiple queries depend on the proceeding query results. Using methods with inbuilt assertions ensures that in case of an error, the error points to the source of the problem. In contrast, unless assertions for all possible outcomes are typed out as in the previous example, the unexpected result of the query will be fed to the next operation. If you are lucky, the next operation will simply break; if you are unlucky, you are risking data corruption and hard-to-locate bugs.
Furthermore, using methods that guarantee the shape of the results allows us to leverage static type checking and catch some of the errors even before executing the code, e.g.
const fooId = await connection.many(sql.typeAlias('id')` SELECT id FROM foo WHERE bar = ${bar} `); await connection.query(sql.typeAlias('void')` DELETE FROM baz WHERE foo_id = ${fooId} `);
Static type check of the above example will produce a warning as the fooId
is guaranteed to be an array and binding of the last query is expecting a primitive value.
Slonik only allows to check out a connection for the duration of the promise routine supplied to the pool#connect()
method.
The primary reason for implementing only this connection pooling method is because the alternative is inherently unsafe, e.g.
// This is not valid Slonik API const main = async () => { const connection = await pool.connect(); await connection.query(sql.typeAlias('foo')`SELECT foo()`); await connection.release(); };
In this example, if SELECT foo()
produces an error, then connection is never released, i.e. the connection hangs indefinitely.
A fix to the above is to ensure that connection#release()
is always called, i.e.
// This is not valid Slonik API const main = async () => { const connection = await pool.connect(); let lastExecutionResult; try { lastExecutionResult = await connection.query(sql.typeAlias('foo')`SELECT foo()`); } finally { await connection.release(); } return lastExecutionResult; };
Slonik abstracts the latter pattern into pool#connect()
method.
const main = () => { return pool.connect((connection) => { return connection.query(sql.typeAlias('foo')`SELECT foo()`); }); };
Using this pattern, we guarantee that connection is always released as soon as the connect()
routine resolves or is rejected.
After the connection is released, Slonik resets the connection state. This is to prevent connection state from leaking between queries.
The default behaviour is to execute DISCARD ALL
command. This behaviour can be adjusted by configuring resetConnection
routine, e.g.
import { createPool, sql } from 'slonik'; const pool = createPool('postgres://', { resetConnection: async (connection) => { await connection.query('DISCARD ALL'); } });
[!NOTE] Reseting a connection is a heavy operation. Depending on the application requirements, it may make sense to disable connection reset, e.g.
import { createPool, } from 'slonik'; const pool = createPool('postgres://', { resetConnection: async () => {} });
Just like in the unsafe connection handling example, Slonik only allows to create a transaction for the duration of the promise routine supplied to the connection#transaction()
method.
connection.transaction(async (transactionConnection) => { await transactionConnection.query(sql.typeAlias('void')`INSERT INTO foo (bar) VALUES ('baz')`); await transactionConnection.query(sql.typeAlias('void')`INSERT INTO qux (quux) VALUES ('quuz')`); });
This pattern ensures that the transaction is either committed or aborted the moment the promise is either resolved or rejected.
[!NOTE] If you receive an error
UnexpectedForeignConnectionError
, then you are trying to execute a query using a connection that is not associated with the transaction. This error is thrown to prevent accidental unsafe transaction handling, e.g.pool.transaction(async (transactionConnection) => { await pool.query(sql.typeAlias('void')`INSERT INTO foo (bar) VALUES ('baz')`); });
In this example, the query is executed using the
connection
that is not associated with the transaction. This is unsafe because the query is not part of the transaction and will not be rolled back if the transaction is aborted. This behaviour can be disabled by settingdangerouslyAllowForeignConnections
totrue
in theClientConfiguration
.
SQL injections are one of the most well known attack vectors. Some of the biggest data leaks were the consequence of improper user-input handling. In general, SQL injections are easily preventable by using parameterization and by restricting database permissions, e.g.
// This is not valid Slonik API connection.query('SELECT $1', [ userInput ]);
In this example, the query text (SELECT $1
) and parameters (userInput
) are passed separately to the PostgreSQL server where the parameters are safely substituted into the query. This is a safe way to execute a query using user-input.
The vulnerabilities appear when developers cut corners or when they do not know about parameterization, i.e. there is a risk that someone will instead write:
// This is not valid Slonik API connection.query('SELECT \'' + userInput + '\'');
As evident by the history of the data leaks, this happens more often than anyone would like to admit. This security vulnerability is especially a significant risk in Node.js community, where a predominant number of developers are coming from frontend and have not had training working with RDBMSes. Therefore, one of the key selling points of Slonik is that it adds multiple layers of protection to prevent unsafe handling of user input.
To begin with, Slonik does not allow running plain-text queries.
// This is not valid Slonik API connection.query('SELECT
AI辅助编程,代码自动修复
Trae是一种自适应的集成开发环境(IDE),通过自动化和多元协作改变开发流程。利用Trae,团队能够更快速、精确地编写和部署代码,从而提高编程效率和项目交付速度。Trae具备上下文感知和代码自动完成功能,是提升开发效率的理想工具。
AI小说写作 助手,一站式润色、改写、扩写
蛙蛙写作—国内先进的AI写作平台,涵盖小说、学术、社交媒体等多场景。提供续写、改写、润色等功能,助力创作者高效优化写作流程。界面简洁,功能全面,适合各类写作者提升内容品质和工作效率。
全能AI智能助手,随时解答生活与工作的多样问题
问小白,由元石科技研发的AI智能助手,快速准确地解答各种生活和工作问题,包括但不限于搜索、规划和社交互动,帮助用户在日常生活中提高效率,轻松管理个人事务。