mirror of
https://github.com/n8n-io/n8n.git
synced 2024-12-28 05:59:42 -08:00
e77fd5d286
Ensure all errors in `nodes-base` are `ApplicationError` or children of it and contain no variables in the message, to continue normalizing all the backend errors we report to Sentry. Also, skip reporting to Sentry errors from user input and from external APIs. In future we should refine `ApplicationError` to more specific errors. Follow-up to: [#7877](https://github.com/n8n-io/n8n/pull/7877) - [x] Test workflows: https://github.com/n8n-io/n8n/actions/runs/7084627970 - [x] e2e: https://github.com/n8n-io/n8n/actions/runs/7084936861 --------- Co-authored-by: Michael Kret <michael.k@radency.com>
145 lines
4.8 KiB
TypeScript
145 lines
4.8 KiB
TypeScript
import { ApplicationError } from 'n8n-workflow';
|
|
import type {
|
|
ITriggerFunctions,
|
|
IDataObject,
|
|
ILoadOptionsFunctions,
|
|
INodeListSearchResult,
|
|
INodeListSearchItems,
|
|
} from 'n8n-workflow';
|
|
import pgPromise from 'pg-promise';
|
|
import type pg from 'pg-promise/typescript/pg-subset';
|
|
|
|
export function prepareNames(id: string, mode: string, additionalFields: IDataObject) {
|
|
let suffix = id.replace(/-/g, '_');
|
|
|
|
if (mode === 'manual') {
|
|
suffix = `${suffix}_manual`;
|
|
}
|
|
|
|
let functionName =
|
|
(additionalFields.functionName as string) || `n8n_trigger_function_${suffix}()`;
|
|
|
|
if (!(functionName.includes('(') && functionName.includes(')'))) {
|
|
functionName = `${functionName}()`;
|
|
}
|
|
|
|
const triggerName = (additionalFields.triggerName as string) || `n8n_trigger_${suffix}`;
|
|
const channelName = (additionalFields.channelName as string) || `n8n_channel_${suffix}`;
|
|
|
|
if (channelName.includes('-')) {
|
|
throw new ApplicationError('Channel name cannot contain hyphens (-)', { level: 'warning' });
|
|
}
|
|
|
|
return { functionName, triggerName, channelName };
|
|
}
|
|
|
|
export async function pgTriggerFunction(
|
|
this: ITriggerFunctions,
|
|
db: pgPromise.IDatabase<{}, pg.IClient>,
|
|
additionalFields: IDataObject,
|
|
functionName: string,
|
|
triggerName: string,
|
|
channelName: string,
|
|
): Promise<void> {
|
|
const schema = this.getNodeParameter('schema', 'public', { extractValue: true }) as string;
|
|
const tableName = this.getNodeParameter('tableName', undefined, {
|
|
extractValue: true,
|
|
}) as string;
|
|
|
|
const target = `${schema}."${tableName}"`;
|
|
|
|
const firesOn = this.getNodeParameter('firesOn', 0) as string;
|
|
|
|
const functionReplace =
|
|
"CREATE OR REPLACE FUNCTION $1:raw RETURNS trigger LANGUAGE 'plpgsql' COST 100 VOLATILE NOT LEAKPROOF AS $BODY$ begin perform pg_notify('$2:raw', row_to_json($3:raw)::text); return null; end; $BODY$;";
|
|
|
|
const dropIfExist = 'DROP TRIGGER IF EXISTS $1:raw ON $2:raw';
|
|
|
|
const functionExists =
|
|
"CREATE FUNCTION $1:raw RETURNS trigger LANGUAGE 'plpgsql' COST 100 VOLATILE NOT LEAKPROOF AS $BODY$ begin perform pg_notify('$2:raw', row_to_json($3:raw)::text); return null; end; $BODY$";
|
|
|
|
const trigger =
|
|
'CREATE TRIGGER $4:raw AFTER $3:raw ON $1:raw FOR EACH ROW EXECUTE FUNCTION $2:raw';
|
|
|
|
const whichData = firesOn === 'DELETE' ? 'old' : 'new';
|
|
|
|
if (channelName.includes('-')) {
|
|
throw new ApplicationError('Channel name cannot contain hyphens (-)', { level: 'warning' });
|
|
}
|
|
|
|
const replaceIfExists = additionalFields.replaceIfExists ?? false;
|
|
|
|
try {
|
|
if (replaceIfExists || !(additionalFields.triggerName ?? additionalFields.functionName)) {
|
|
await db.any(functionReplace, [functionName, channelName, whichData]);
|
|
await db.any(dropIfExist, [triggerName, target, whichData]);
|
|
} else {
|
|
await db.any(functionExists, [functionName, channelName, whichData]);
|
|
}
|
|
await db.any(trigger, [target, functionName, firesOn, triggerName]);
|
|
} catch (error) {
|
|
if ((error as Error).message.includes('near "-"')) {
|
|
throw new ApplicationError('Names cannot contain hyphens (-)', { level: 'warning' });
|
|
}
|
|
throw error;
|
|
}
|
|
}
|
|
|
|
export async function initDB(this: ITriggerFunctions | ILoadOptionsFunctions) {
|
|
const credentials = await this.getCredentials('postgres');
|
|
const pgp = pgPromise({
|
|
// prevent spam in console "WARNING: Creating a duplicate database object for the same connection."
|
|
noWarnings: true,
|
|
});
|
|
const config: IDataObject = {
|
|
host: credentials.host as string,
|
|
port: credentials.port as number,
|
|
database: credentials.database as string,
|
|
user: credentials.user as string,
|
|
password: credentials.password as string,
|
|
};
|
|
|
|
if (credentials.allowUnauthorizedCerts === true) {
|
|
config.ssl = {
|
|
rejectUnauthorized: false,
|
|
};
|
|
} else {
|
|
config.ssl = !['disable', undefined].includes(credentials.ssl as string | undefined);
|
|
config.sslmode = (credentials.ssl as string) || 'disable';
|
|
}
|
|
|
|
const db = pgp(config);
|
|
return { db, pgp };
|
|
}
|
|
|
|
export async function searchSchema(this: ILoadOptionsFunctions): Promise<INodeListSearchResult> {
|
|
const { db } = await initDB.call(this);
|
|
const schemaList = await db.any('SELECT schema_name FROM information_schema.schemata');
|
|
const results: INodeListSearchItems[] = (schemaList as IDataObject[]).map((s) => ({
|
|
name: s.schema_name as string,
|
|
value: s.schema_name as string,
|
|
}));
|
|
await db.$pool.end();
|
|
return { results };
|
|
}
|
|
|
|
export async function searchTables(this: ILoadOptionsFunctions): Promise<INodeListSearchResult> {
|
|
const schema = this.getNodeParameter('schema', 0) as IDataObject;
|
|
const { db } = await initDB.call(this);
|
|
let tableList = [];
|
|
try {
|
|
tableList = await db.any(
|
|
'SELECT table_name FROM information_schema.tables WHERE table_schema = $1',
|
|
[schema.value],
|
|
);
|
|
} catch (error) {
|
|
throw new ApplicationError(error as string);
|
|
}
|
|
const results: INodeListSearchItems[] = (tableList as IDataObject[]).map((s) => ({
|
|
name: s.table_name as string,
|
|
value: s.table_name as string,
|
|
}));
|
|
await db.$pool.end();
|
|
return { results };
|
|
}
|