Bridg let's you securely query your database from the client, like Firebase or Supabase, but with the power and type-safety of Prisma.
<input
placeholder="Search for blogs.."
onChange={async (e) => {
const query = e.target.value;
const blogs = await bridg.blog.findMany({
where: { title: { contains: query } },
});
setSearchResults(blogs);
}}
/>
Getting Started
Querying Your Database
Realtime Data
Protecting Your Data
MongoDB, Postgres, MySQL (& Planetscale), SQLite, Microsoft SQL Server, Azure SQL, MariaDB, AWS Aurora, CockroachDB
- Next.js (app router) - Next.js app router example - Codesandbox
- Next.js (pages router) - Next.js pages router example - Codesandbox
- Next.js (blogging app) - Next.js, next-auth authentication, CRUD examples, SQLite
- create-react-app (serverless) - CRA + Postgres + Netlify function (for Bridg)
- React Native - Expo App + Postgres + Netlify
- Vue.js - Simple Vue / Nuxt example with SQLite database
Want an example project for your favorite framework? Feel free to create an issue, or a PR with a sample.
-
Configure your project to use Prisma (Bridg currently requires prisma
5.0.0
or later.)npm i -D prisma npm i @prisma/client npx prisma init --datasource-provider sqlite # opts: postgresql, mysql, sqlite, sqlserver, mongodb, cockroachdb
-
Install Bridg:
npm install bridg
-
Add the Bridg generator to your
schema.prisma
:generator client { provider = "prisma-client-js" } // Add this UNDER your prisma client generator bridg { provider = "bridg" }
-
Generate your clients:
npx prisma generate
-
Expose an API endpoint at
/api/bridg
or configure a custom endpoint to handle requests:// Example Next.js API handler, translate to your JS API framework of choice import { PrismaClient } from '@prisma/client'; import { handleRequest } from 'bridg/server/request-handler'; import { NextRequest, NextResponse } from 'next/server'; const db = new PrismaClient(); // allows all queries, don't ship like this, ya dingus const rules = { default: true }; export async function POST(request: NextRequest) { // Mock authentication, replace with any auth system you want const userId = 'authenticated-user-id'; const body = await request.json(); const { data, status } = await handleRequest(body, { db, uid: userId, rules, }); return NextResponse.json(data, { status }); }
You should be good to go! Try using the Bridg client on your frontend:
// some frontend file
import bridg from 'bridg';
const CreateBlogButton = ({ blog }) => (
<button onClick={() => bridg.blog.create({ data: blog })}>Create Blog</button>
);
generator bridg {
provider = "bridg"
// customize Bridg client output location
output = "/custom/client/path" // (defaults to node_modules/bridg)
// customize api endpoint Bridg will send queries to
api = "https://example.com/api/bridg" // (defaults to /api/bridg)
}
This library has yet to be tested with apps running a server & client as separate projects, but it should π€·ββοΈ work. You would want to install Bridg and Prisma on your server, run the generate
script, and copy the Bridg client (node_modules/bridg/index.js & index.d.ts
) and Prisma types to your client application.
Bridg is built on top of Prisma, you can check out the basics of executing CRUD queries here.
The Prisma documentation is excellent and is highly recommended if you haven't used Prisma in the past.
For security reasons, some functionality isn't available, but I'm working towards full compatibility with Prisma. Currently upsert
, connectOrCreate
, set
, and disconnect
are unavailable inside of nested queries.
Executing queries works like so:
import db from 'bridg';
const data = await bridg.tableName.crudMethod(args);
The following are simplified examples. If you're thinking "I wonder if I could do X with this..", the answer is probably yes. You will just need to search for "pagination with Prisma", or for whatever you're trying to achieve.
// create a single db record
const createdUser = await bridg.user.create({
data: {
name: 'John',
email: 'johndoe@gmail.com',
},
});
// create multiple records at once:
const creationCount = await bridg.user.createMany({
data: [
{ name: 'John', email: 'johndoe@gmail.com' },
{ name: 'Sam', email: 'sam.johnson@outlook.com' },
// ..., ...,
],
});
// create a user, and create a relational blog for them
const createdUser = await bridg.user.create({
data: {
name: 'John',
email: 'johndoe@gmail.com',
blogs: {
create: {
title: 'My first blog',
body: 'And that was my first blog, it was a short one..',
},
},
},
});
// all records within a table:
const users = await bridg.user.findMany();
// all records that satisfy a where clause:
const users = await bridg.user.findMany({ where: { profileIsPublic: true } });
// get the first record that satisfies a where clause:
const user = await bridg.user.findFirst({ where: { email: 'johndoe@gmail.com' } });
// enforce that only one record could ever exist (must pass a unique column id):
const user = await bridg.user.findUnique({ where: { id: 'some-id' } });
// do the same thing, but throw an error if the data is missing
const user = await bridg.user.findUniqueOrThrow({ where: { id: 'some-id' } });
// all users and a list of all their blogs:
const users = await bridg.user.findMany({ include: { blogs: true } });
// where clauses can be applied to relational data:
const users = await bridg.user.findMany({
include: {
blogs: { where: { published: true } },
},
});
// nest all blogs, and all comments on blogs. its just relations all the way down.
const users = await bridg.user.findMany({
include: {
blogs: {
include: { comments: true },
},
},
});
For more details on advanced querying, filtering and sorting, check out this page from the Prisma docs.
// update a single record
const updatedData = await bridg.blog.update({
where: { id: 'some-id' }, // must use a unique db key to use .update
data: { title: 'New Blog title' },
});
// update many records
const updateCount = await bridg.blog.updateMany({
where: { authorId: userId },
data: { isPublished: true },
});
// delete a single record. must use a unique db key to use .delete
const deletedBlog = await bridg.blog.delete({ where: { id: 'some-id' } });
// delete many records
const deleteCount = await bridg.blog.deleteMany({ where: { isPublished: false } });
Bridg supports listening to realtime Database events via Prisma's Pulse extension.
const subscription = await bridg.message.subscribe({
create: {
after: { conversationId: 'convo-id' },
},
});
for await (const event of subscription) {
const newMsg = event.after;
setMessages([...messages, newMsg]);
}
Example chat app with realtime events
Setting this up at the moment is somewhat cumbersome. Making this easier is a big priority.
For setup instructions, see this comment
If you want to ignore this during development, you can set your database rules to the following to allow all requests (this is not secure):
export const rules: DbRules = { default: true };
Because your database is now available on the frontend, that means anyone who can access your website will have access to your database. Fortunately, we can create custom rules to prevent our queries from being used nefariously π₯·.
Your rules could look something like the following:
import { type DbRules } from 'bridg/server';
export const rules: DbRules = {
user: {
find: { profileIsPublic: true }, // only allow reads on public profiles
update: (uid, data) => ({ id: uid }), // update only if its being done by the user
create: (uid, data) => {
// prevent the user from starting themself at level 99
if (data.level !== 1) return false;
return true; // otherwise allow creation
},
delete: false, // never authorize any calls to delete users
},
// table2: {},
// table3: {},...
blog: {
// model default, used if model.method not provided
default: true,
}
// global default, used if model.method and model.default aren't provided
// defaults to 'false' if not provided. set to 'true' only in development
default: false,
};
As you can see, your rules will basically look like:
{
tableName: {
find: validator,
delete: validator,
}
}
NOTE: If you don't provide a rule for a property, it will default to preventing those requests.
In the above example, all update
and create
requests will fail. Since they weren't provided, they default to false
.
The properties available to create rules for are:
find
: authorizes reading data (.findMany, .findFirst, .findFirstOrThrow, .findUnique, .findUniqueOrThrow, .aggregate, .count, .groupBy)update
: authorizes updates (.update, .updateMany, .upsert)create
: authorizes creating data (.create, .createMany, .createManyAndReturn, .upsert)delete
: authorizes deleting data (.delete, .deleteMany)
Note: .upsert uses update
rules, if no data is updated, it will use create
rules for creation
Validators control whether a particular request will be allowed to execute or not.
They can be provided in four ways:
-
boolean - use a boolean when you always know whether a certain request should go through or be blocked
tableName { find: false, // blocks all reads on a model create: true // allows any creation for a model }
-
where clause - You can also apply a Prisma where clause for the given model. This clause will be required to be true, along with whatever input is passed from the client request.
note:
create
does not accept where clausesblog { // allow reads only on blogs where isPublished = true find: { isPublished: true } }
-
callback function - The most powerful option is a callback function. This will allow you to dynamically authorize requests based on the context of the request. You can also pass an
async
function, and make as many async calls as you want in the validator.args:
uid
: the id of the user making the requestdata
: the body data from the request (only available on update, create)return value:
boolean
|where clause
Your callback function should either return a Prisma Where object for the corresponding table, or a boolean indicating whether the request should resolve or not.
Example use of callbacks:
const rules = { blog: { // where clause: allow reads if the blog is published OR if the user authored the blog find: (uid) => ({ OR: [{ isPublished: true }, { authorId: uid }] }), // prevent the user from setting their own vote count create: (uid, data) => (data.voteCount === 0 ? true : false), // make an async call to determine if request should resolve // note: this should USUALLY be done via a relational query, // which only takes 1 trip to the db, but they are not always practical delete: async (uid) => { const userMakingRequest = await prisma.user.findFirst({ where: { id: uid } }); return userMakingRequest.isAdmin ? true : false; }, // you can run literally any javascript you want, anything.. update: async (uid) => { const isTheSunShining = await someWeatherApi.sunIsOut(); const philliesWinWorldSeries = Math.random() < 0.000001; return isTheSunShining && philliesWinWorldSeries; }, }, };
-
Rule object - For advanced use cases, you can pass any of the above via a
rule
property in an object.blog { find: { rule: true // OR whereClause OR callback } } // this is equivalent to: blog { find: true }
This allows the use of extra features built into Bridg's rules, like blacklisting fields, and query lifecycle hooks:
user { find: { rule: (uid) => !!uid, blockedFields: ['password'], // OR you can whitelist fields instead: allowedFields: ['id', 'email', 'name'], // run some code BEFORE a query is executed: before: (uid, queryArgs, context) => { // eg: bridg.blog.findMany({ where: { name: 'Jim' } }); // queryArgs = { where: { name: 'Jim' } } + any additional where clauses from rules // context = { method: 'findMany', originalQuery: queryBeforeRulesApplied } // whatever we return will be the new arguments for the query. // be careful not to overwrite the where clauses applied from your rules! return { ...queryArgs, where: { ...queryArgs.where, profileIsPublic: true }, include: { ...queryArgs.include, posts: true } } }, // modify the result data AFTER the query has been executed: after: (uid, data, context) => { // we can do anything here, like mimic the 'blockedFields' functionality! delete data.password; // whatever we return will be sent to the client return data; } }, // each method can have their own blockedFields: update: { rule: (uid) => ({ userId: uid }), blockedFields: [], // users can update their password, just not read them } }
There may be undiscovered edgecase where a specific type of query could circumvent database rules and access data that it shouldn't be allowed to. Here's a previous example from an early version of Bridg for reference.
If you stumble upon something like this, please π create an issue with a detailed example, so it can be fixed.
To get started, check out the contributing doc. pls send help π