2019-04-08 10:22:38 +03:00
|
|
|
import pytest
|
2020-05-21 18:50:25 +03:00
|
|
|
from validate import check_query_f, check_query, get_conf_f
|
2020-05-05 22:57:17 +03:00
|
|
|
from context import PytestConf
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2020-02-13 12:14:02 +03:00
|
|
|
# Mark that all tests in this module can be run as server upgrade tests
|
|
|
|
pytestmark = pytest.mark.allow_server_upgrade_test
|
|
|
|
|
|
|
|
usefixtures = pytest.mark.usefixtures
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2021-07-15 15:44:26 +03:00
|
|
|
|
|
|
|
@pytest.mark.parametrize("backend", ['mysql'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBasicMySQL:
|
|
|
|
|
2021-07-21 20:22:08 +03:00
|
|
|
# initialize the metadata with default 'http' transport fixture
|
|
|
|
def test_replace_metadata(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/replace_metadata.yaml')
|
2021-07-15 15:44:26 +03:00
|
|
|
|
2021-08-04 14:42:24 +03:00
|
|
|
def test_select_query_author(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/basic.yaml')
|
|
|
|
|
|
|
|
def test_select_quoted_col(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_quoted_col.yaml')
|
|
|
|
|
|
|
|
def test_select_offset_limit(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_limit.yaml')
|
|
|
|
|
|
|
|
def test_select_query_ignore_author(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author.yaml')
|
|
|
|
|
|
|
|
def test_select_offset(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_offset.yaml')
|
|
|
|
|
|
|
|
def test_select_limit(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_limit.yaml')
|
|
|
|
|
|
|
|
def test_col_not_present(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_col_not_present_err.yaml')
|
|
|
|
|
|
|
|
def test_non_tracked_table(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_non_tracked_table_err.yaml')
|
|
|
|
|
2021-07-15 15:44:26 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/mysql'
|
|
|
|
|
|
|
|
|
2021-09-16 10:41:52 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
class TestGraphQLEmpty:
|
|
|
|
|
|
|
|
def test_no_empty_roots(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/check_no_empty_roots.yaml', transport)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/empty'
|
|
|
|
|
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2021-04-22 14:31:54 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['bigquery'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-08-26 21:11:12 +03:00
|
|
|
class TestGraphQLQueryTableCustomizationsBigquery:
|
2021-04-22 14:31:54 +03:00
|
|
|
|
2021-06-25 16:35:39 +03:00
|
|
|
def test_global_limit(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/global_limit.yaml", transport)
|
|
|
|
|
Bigquery/fix limit offset for array aggregates
Blocked on https://github.com/hasura/graphql-engine-mono/pull/1640.
While fiddling with BigQuery I noticed a severe issue with offset/limit for array-aggregates. I've fixed it now.
The basic problem was that I was using a query like this:
```graphql
query MyQuery {
hasura_Artist(order_by: {artist_self_id: asc}) {
artist_self_id
albums_aggregate(order_by: {album_self_id: asc}, limit: 2) {
nodes {
album_self_id
}
aggregate {
count
}
}
}
}
```
Producing this SQL:
```sql
SELECT `t_Artist1`.`artist_self_id` AS `artist_self_id`,
STRUCT(IFNULL(`aa_albums1`.`nodes`, NULL) AS `nodes`, IFNULL(`aa_albums1`.`aggregate`, STRUCT(0 AS `count`)) AS `aggregate`) AS `albums_aggregate`
FROM `hasura`.`Artist` AS `t_Artist1`
LEFT OUTER JOIN (SELECT ARRAY_AGG(STRUCT(`t_Album1`.`album_self_id` AS `album_self_id`) ORDER BY (`t_Album1`.`album_self_id`) ASC) AS `nodes`,
STRUCT(COUNT(*) AS `count`) AS `aggregate`,
`t_Album1`.`artist_other_id` AS `artist_other_id`
FROM (SELECT *
FROM `hasura`.`Album` AS `t_Album1`
ORDER BY (`t_Album1`.`album_self_id`) ASC NULLS FIRST
-- PROBLEM HERE
LIMIT @param0) AS `t_Album1`
GROUP BY `t_Album1`.`artist_other_id`)
AS `aa_albums1`
ON (`aa_albums1`.`artist_other_id` = `t_Artist1`.`artist_self_id`)
ORDER BY (`t_Artist1`.`artist_self_id`) ASC NULLS FIRST
```
Note the `LIMIT @param0` -- that is incorrect because we want to limit
per artist. Instead, we want:
```sql
SELECT `t_Artist1`.`artist_self_id` AS `artist_self_id`,
STRUCT(IFNULL(`aa_albums1`.`nodes`, NULL) AS `nodes`, IFNULL(`aa_albums1`.`aggregate`, STRUCT(0 AS `count`)) AS `aggregate`) AS `albums_aggregate`
FROM `hasura`.`Artist` AS `t_Artist1`
LEFT OUTER JOIN (SELECT ARRAY_AGG(STRUCT(`t_Album1`.`album_self_id` AS `album_self_id`) ORDER BY (`t_Album1`.`album_self_id`) ASC) AS `nodes`,
STRUCT(COUNT(*) AS `count`) AS `aggregate`,
`t_Album1`.`artist_other_id` AS `artist_other_id`
FROM (SELECT *,
-- ADDED
ROW_NUMBER() OVER(PARTITION BY artist_other_id) artist_album_index
FROM `hasura`.`Album` AS `t_Album1`
ORDER BY (`t_Album1`.`album_self_id`) ASC NULLS FIRST
) AS `t_Album1`
-- CHANGED
WHERE artist_album_index <= @param
GROUP BY `t_Album1`.`artist_other_id`)
AS `aa_albums1`
ON (`aa_albums1`.`artist_other_id` = `t_Artist1`.`artist_self_id`)
ORDER BY (`t_Artist1`.`artist_self_id`) ASC NULLS FIRST
```
That serves both the LIMIT/OFFSET function in the where clause. Then,
both the ARRAY_AGG and the COUNT are correct per artist.
I've updated my Haskell test suite to add regression tests for this. I'll push a commit for Python tests shortly. The tests still pass there.
This just fixes a case that we hadn't noticed.
https://github.com/hasura/graphql-engine-mono/pull/1641
GitOrigin-RevId: 49933fa5e09a9306c89565743ecccf2cb54eaa80
2021-07-06 11:28:42 +03:00
|
|
|
def test_offset_regression(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/offset_regression.yaml", transport)
|
|
|
|
|
2021-08-18 16:00:05 +03:00
|
|
|
def test_track_table_with_customization(self, hge_ctx, transport):
|
|
|
|
if transport == 'http':
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/track_table_with_customization_and_test_query.yaml')
|
|
|
|
|
|
|
|
def test_set_table_customization(self, hge_ctx, transport):
|
|
|
|
if transport == 'http':
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/set_table_customization_and_test_query.yaml')
|
|
|
|
|
2021-08-26 21:11:12 +03:00
|
|
|
def test_replace_metadata_with_customization(self, hge_ctx, transport):
|
|
|
|
if transport == 'http':
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/replace_metadata_with_customization_and_test_query.yaml')
|
|
|
|
|
2021-08-18 16:00:05 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/bigquery'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['bigquery'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBasicBigquery:
|
|
|
|
|
2021-04-22 14:31:54 +03:00
|
|
|
def test_user_perms(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/user_perms.yaml", transport)
|
|
|
|
|
|
|
|
def test_empty_perms(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/empty_perms.yaml", transport)
|
|
|
|
|
|
|
|
def test_timestamp_perm(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/timestamp_perm.yaml", transport)
|
|
|
|
|
|
|
|
def test_exact_article_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/exact_article_id.yaml", transport)
|
|
|
|
|
|
|
|
def test_perms_published_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/perms_published_articles.yaml", transport)
|
|
|
|
|
|
|
|
# types
|
|
|
|
def test_select_query_all_types(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_all_types.yaml", transport)
|
|
|
|
|
|
|
|
# relational queries
|
|
|
|
def test_select_query_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_pk(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_by_pkey.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_quoted_col(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_col_quoted.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_with_skip_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_skip_directive.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_with_include_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_include_directive.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_where.yaml', transport)
|
|
|
|
|
|
|
|
def test_nested_select_query_article_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_article_author.yaml', transport)
|
|
|
|
|
|
|
|
def test_nested_select_query_deep(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_deep.yaml', transport)
|
|
|
|
|
|
|
|
def test_nested_select_query_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_where_query_author_article.yaml', transport)
|
|
|
|
|
|
|
|
def test_nested_select_query_where_on_relationship(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_article_author_where_on_relationship.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_non_tracked_table(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_non_tracked_table_err.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_col_not_present_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_author_col_not_present_err.yaml", transport)
|
|
|
|
|
|
|
|
# batching # works only with http, not with websocket
|
|
|
|
def test_select_query_batching(self, hge_ctx, transport):
|
|
|
|
if transport == 'http':
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_batching.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_batching_with_one_error(self, hge_ctx, transport):
|
|
|
|
if transport == 'http':
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_batching_with_one_error.yaml", transport)
|
|
|
|
|
|
|
|
# fragments
|
|
|
|
def test_select_query_top_level_fragment(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_top_level_fragment.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_nested_fragment(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_nested_fragment.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_fragment_cycles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_fragment_cycles.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_fragment_with_variable(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_fragment_with_variable.yaml', transport)
|
|
|
|
|
|
|
|
# invalid # this is not applicable to bigquery, it simply returns empty results
|
|
|
|
def test_select_query_invalid_escape_sequence(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_invalid_escape_sequence.yaml", transport)
|
|
|
|
|
2021-06-15 11:58:21 +03:00
|
|
|
# aggregates
|
|
|
|
def test_select_join_provenance_queries(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_join_provenance.yaml", transport)
|
|
|
|
|
2021-04-22 14:31:54 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/bigquery'
|
|
|
|
|
2021-08-18 16:00:05 +03:00
|
|
|
|
2021-04-22 14:31:54 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2021-05-21 05:46:58 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['citus', 'mssql', 'postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-11 21:17:41 +03:00
|
|
|
class TestGraphQLQueryBasicCommon:
|
2021-03-16 19:41:21 +03:00
|
|
|
# This also exercises support for multiple operations in a document:
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_select_query_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2021-07-16 19:08:23 +03:00
|
|
|
def test_select_query_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_v1alpha1.yaml', transport)
|
|
|
|
|
2021-03-16 19:41:21 +03:00
|
|
|
def test_select_query_author_quoted_col(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_col_quoted.yaml', transport)
|
|
|
|
|
2019-10-20 14:59:41 +03:00
|
|
|
def test_select_query_author_with_skip_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_skip_directive.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_with_include_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_include_directive.yaml', transport)
|
2020-05-13 11:09:44 +03:00
|
|
|
|
2021-05-20 13:03:02 +03:00
|
|
|
def test_select_query_author_with_skip_include_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_skip_include_directives.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_author_with_wrong_directive_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_wrong_directive_err.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_select_query_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_where.yaml', transport)
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_nested_select_query_article_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_article_author.yaml', transport)
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_nested_select_query_deep(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_deep.yaml', transport)
|
2018-10-12 12:28:43 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_nested_select_query_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_where_query_author_article.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_nested_select_query_where_on_relationship(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/nested_select_query_article_author_where_on_relationship.yaml', transport)
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_select_query_non_tracked_table(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_non_tracked_table_err.yaml", transport)
|
2018-10-05 08:16:21 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_select_query_col_not_present_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_author_col_not_present_err.yaml", transport)
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2021-05-21 05:46:58 +03:00
|
|
|
def test_select_query_multiple_columns_arr_fkey(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_multiple_columns_arr_fkey.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_multiple_columns_obj_fkey(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_multiple_columns_obj_fkey.yaml", transport)
|
|
|
|
|
|
|
|
|
2021-03-16 19:41:21 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/basic'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-16 19:41:21 +03:00
|
|
|
class TestGraphQLQueryBasicMSSQL:
|
2021-07-08 23:49:10 +03:00
|
|
|
|
2021-03-16 19:41:21 +03:00
|
|
|
def test_select_various_mssql_types(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_test_types_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_user(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_user_mssql.yaml", transport)
|
|
|
|
|
2019-05-02 15:31:32 +03:00
|
|
|
def test_select_query_user_col_change(self, hge_ctx, transport):
|
2021-03-16 19:41:21 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_user_col_change_mssql.yaml")
|
2019-05-02 15:31:32 +03:00
|
|
|
|
2021-07-08 23:49:10 +03:00
|
|
|
def test_nodes_aggregates_mssql(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/nodes_aggregates_mssql.yaml", transport)
|
|
|
|
|
|
|
|
def test_nodes_aggregates_conditions_mssql(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/nodes_aggregates_conditions_mssql.yaml", transport)
|
|
|
|
|
2021-03-16 19:41:21 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/basic'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-16 19:41:21 +03:00
|
|
|
class TestGraphQLQueryBasicPostgres:
|
|
|
|
# Can't run server upgrade tests, as this test has a schema change
|
|
|
|
@pytest.mark.skip_server_upgrade_test
|
|
|
|
def test_select_various_postgres_types(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_test_types_postgres.yaml', transport)
|
|
|
|
|
2021-05-21 05:46:58 +03:00
|
|
|
# TODO: https://github.com/hasura/graphql-engine-mono/issues/866
|
|
|
|
# This test currently fails on MSSQL.
|
|
|
|
# Move to TestGraphQLQueryBasicCommon once linked issue is fixed.
|
2021-03-16 19:41:21 +03:00
|
|
|
def test_select_query_author_pk(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_author_by_pkey.yaml', transport)
|
2019-08-08 23:57:42 +03:00
|
|
|
|
|
|
|
def test_select_query_invalid_escape_sequence(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_invalid_escape_sequence.yaml", transport)
|
2019-06-03 13:21:55 +03:00
|
|
|
|
2021-03-16 19:41:21 +03:00
|
|
|
def test_nested_select_with_foreign_key_alter(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/nested_select_with_foreign_key_alter.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_user(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_user_postgres.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_user_col_change(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_user_col_change_postgres.yaml")
|
|
|
|
|
2020-02-11 13:32:13 +03:00
|
|
|
def test_select_query_person_citext(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_person_citext.yaml", transport)
|
|
|
|
|
2019-12-20 19:04:02 +03:00
|
|
|
def test_select_query_batching(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_batching.yaml", transport)
|
|
|
|
|
2019-12-31 02:18:20 +03:00
|
|
|
def test_select_query_batching_with_mutation(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_batching_with_mutation.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_query_batching_with_one_error(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_batching_with_one_error.yaml", transport)
|
|
|
|
|
2021-05-25 16:54:18 +03:00
|
|
|
def test_create_invalid_fkey_relationship(self, hge_ctx, transport):
|
|
|
|
st_code, resp = hge_ctx.v1q_f(self.dir() + '/setup_invalid_fkey_relationship.yaml')
|
|
|
|
assert st_code == 400, resp
|
|
|
|
assert resp['error'] == "Expecting object { table, columns }."
|
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/basic'
|
|
|
|
|
2019-10-20 14:59:41 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2021-05-21 05:46:58 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['citus'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-05-21 05:46:58 +03:00
|
|
|
class TestGraphQLQueryBasicCitus:
|
|
|
|
def test_nested_select_with_foreign_key_alter(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/nested_select_with_foreign_key_alter_citus.yaml", transport)
|
|
|
|
|
|
|
|
@pytest.mark.skip(reason="TODO: https://github.com/hasura/graphql-engine-mono/issues/1224")
|
|
|
|
def test_select_query_user_col_change(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_user_col_change_citus.yaml")
|
|
|
|
|
|
|
|
@pytest.mark.skip(reason="TODO: https://github.com/hasura/graphql-engine-mono/issues/1224")
|
|
|
|
def test_select_query_person_citext(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_person_citext.yaml", transport)
|
|
|
|
|
|
|
|
# relationships test cases described at
|
|
|
|
# https://github.com/hasura/graphql-engine-mono/blob/vamshi/rfc/citus-support/rfcs/citus-support.md
|
|
|
|
def test_select_relationships_distributed(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_disaster_relationships_distributed.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_relationships_reference(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_disaster_relationships_reference.yaml", transport)
|
|
|
|
|
|
|
|
def test_select_functions(self, hge_ctx, transport):
|
|
|
|
transport = 'http'
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/select_query_disaster_functions.yaml", transport)
|
|
|
|
|
2021-05-25 16:54:18 +03:00
|
|
|
def test_create_invalid_fkey_relationship(self, hge_ctx, transport):
|
|
|
|
st_code, resp = hge_ctx.v1metadataq_f(self.dir() + '/setup_invalid_fkey_relationship.yaml')
|
|
|
|
assert st_code == 400, resp
|
2021-09-20 22:49:33 +03:00
|
|
|
assert resp['error'] == "Error when parsing command create_array_relationship.\nSee our documentation at https://hasura.io/docs/latest/graphql/core/api-reference/metadata-api/index.html#metadata-apis.\nInternal error message: Expecting object { table, columns }."
|
2021-05-25 16:54:18 +03:00
|
|
|
|
2021-05-21 05:46:58 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/citus'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['citus', 'postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-08-12 19:47:33 +03:00
|
|
|
class TestGraphQLQueryFragmentsCommon:
|
2019-10-20 14:59:41 +03:00
|
|
|
|
|
|
|
def test_select_query_top_level_fragment(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_top_level_fragment.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_nested_fragment(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_nested_fragment.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_query_fragment_cycles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_fragment_cycles.yaml', transport)
|
|
|
|
|
2020-12-22 13:41:39 +03:00
|
|
|
def test_select_query_fragment_with_variable(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_fragment_with_variable.yaml', transport)
|
|
|
|
|
2019-10-20 14:59:41 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/basic'
|
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryAgg:
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_article_agg_count_sum_avg_max_min_with_aliases(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_agg_count_sum_avg_max_min_with_aliases.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_article_agg_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_agg_where.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_agg_with_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_agg_with_articles.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_agg_with_articles_where(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_agg_with_articles_where.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_article_deeply_nested_aggregate(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_deeply_nested_aggregate.yaml', transport)
|
2018-11-12 10:28:46 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/aggregations'
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryAggPerm:
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_agg_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_agg_articles.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_article_agg_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_agg_fail.yaml', transport)
|
2018-10-26 12:02:44 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_articles_agg_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_articles_agg_fail.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-08-01 08:09:52 +03:00
|
|
|
def test_author_post_agg_order_by(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_post_agg_order_by.yaml', transport)
|
|
|
|
|
Rewrite GraphQL schema generation and query parsing (close #2801) (#4111)
Aka “the PDV refactor.” History is preserved on the branch 2801-graphql-schema-parser-refactor.
* [skip ci] remove stale benchmark commit from commit_diff
* [skip ci] Check for root field name conflicts between remotes
* [skip ci] Additionally check for conflicts between remotes and DB
* [skip ci] Check for conflicts in schema when tracking a table
* [skip ci] Fix equality checking in GraphQL AST
* server: fix mishandling of GeoJSON inputs in subscriptions (fix #3239) (#4551)
* Add support for multiple top-level fields in a subscription to improve testability of subscriptions
* Add an internal flag to enable multiple subscriptions
* Add missing call to withConstructorFn in live queries (fix #3239)
Co-authored-by: Alexis King <lexi.lambda@gmail.com>
* Scheduled triggers (close #1914) (#3553)
server: add scheduled triggers
Co-authored-by: Alexis King <lexi.lambda@gmail.com>
Co-authored-by: Marion Schleifer <marion@hasura.io>
Co-authored-by: Karthikeyan Chinnakonda <karthikeyan@hasura.io>
Co-authored-by: Aleksandra Sikora <ola.zxcvbnm@gmail.com>
* dev.sh: bump version due to addition of croniter python dependency
* server: fix an introspection query caching issue (fix #4547) (#4661)
Introspection queries accept variables, but we need to make sure to
also touch the variables that we ignore, so that an introspection
query is marked not reusable if we are not able to build a correct
query plan for it.
A better solution here would be to deal with such unused variables
correctly, so that more introspection queries become reusable.
An even better solution would be to type-safely track *how* to reuse
which variables, rather than to split the reusage marking from the
planning.
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* flush log buffer on exception in mkWaiApp ( fix #4772 ) (#4801)
* flush log buffer on exception in mkWaiApp
* add comment to explain the introduced change
* add changelog
* allow logging details of a live query polling thread (#4959)
* changes for poller-log
add various multiplexed query info in poller-log
* minor cleanup, also fixes a bug which will return duplicate data
* Live query poller stats can now be logged
This also removes in-memory stats that are collected about batched
query execution as the log lines when piped into an monitoring tool
will give us better insights.
* allow poller-log to be configurable
* log minimal information in the livequery-poller-log
Other information can be retrieved from /dev/subscriptions/extended
* fix few review comments
* avoid marshalling and unmarshalling from ByteString to EncJSON
* separate out SubscriberId and SubscriberMetadata
Co-authored-by: Anon Ray <rayanon004@gmail.com>
* Don't compile in developer APIs by default
* Tighten up handling of admin secret, more docs
Store the admin secret only as a hash to prevent leaking the secret
inadvertently, and to prevent timing attacks on the secret.
NOTE: best practice for stored user passwords is a function with a
tunable cost like bcrypt, but our threat model is quite different (even
if we thought we could reasonably protect the secret from an attacker
who could read arbitrary regions of memory), and bcrypt is far too slow
(by design) to perform on each request. We'd have to rely on our
(technically savvy) users to choose high entropy passwords in any case.
Referencing #4736
* server/docs: add instructions to fix loss of float precision in PostgreSQL <= 11 (#5187)
This adds a server flag, --pg-connection-options, that can be used to set a PostgreSQL connection parameter, extra_float_digits, that needs to be used to avoid loss of data on older versions of PostgreSQL, which have odd default behavior when returning float values. (fixes #5092)
* [skip ci] Add new commits from master to the commit diff
* [skip ci] serve default directives (skip & include) over introspection
* [skip ci] Update non-Haskell assets with the version on master
* server: refactor GQL execution check and config API (#5094)
Co-authored-by: Vamshi Surabhi <vamshi@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] fix js issues in tests by pinning dependencies version
* [skip ci] bump graphql version
* [skip ci] Add note about memory usage
* generalize query execution logic on Postgres (#5110)
* generalize PGExecCtx to support specialized functions for various operations
* fix tests compilation
* allow customising PGExecCtx when starting the web server
* server: changes catalog initialization and logging for pro customization (#5139)
* new typeclass to abstract the logic of QueryLog-ing
* abstract the logic of logging websocket-server logs
introduce a MonadWSLog typeclass
* move catalog initialization to init step
expose a helper function to migrate catalog
create schema cache in initialiseCtx
* expose various modules and functions for pro
* [skip ci] cosmetic change
* [skip ci] fix test calling a mutation that does not exist
* [skip ci] minor text change
* [skip ci] refactored input values
* [skip ci] remove VString Origin
* server: fix updating of headers behaviour in the update cron trigger API and create future events immediately (#5151)
* server: fix bug to update headers in an existing cron trigger and create future events
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* Lower stack chunk size in RTS to reduce thread STACK memory (closes #5190)
This reduces memory consumption for new idle subscriptions significantly
(see linked ticket).
The hypothesis is: we fork a lot of threads per websocket, and some of
these use slightly more than the initial 1K stack size, so the first
overflow balloons to 32K, when significantly less is required.
However: running with `+RTS -K1K -xc` did not seem to show evidence of
any overflows! So it's a mystery why this improves things.
GHC should probably also be doubling the stack buffer at each overflow
or doing something even smarter; the knobs we have aren't so helpful.
* [skip ci] fix todo and schema generation for aggregate fields
* 5087 libpq pool leak (#5089)
Shrink libpq buffers to 1MB before returning connection to pool. Closes #5087
See: https://github.com/hasura/pg-client-hs/pull/19
Also related: #3388 #4077
* bump pg-client-hs version (fixes a build issue on some environments) (#5267)
* do not use prepared statements for mutations
* server: unlock scheduled events on graceful shutdown (#4928)
* Fix buggy parsing of new --conn-lifetime flag in 2b0e3774
* [skip ci] remove cherry-picked commit from commit_diff.txt
* server: include additional fields in scheduled trigger webhook payload (#5262)
* include scheduled triggers metadata in the webhook body
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* server: call the webhook asynchronously in event triggers (#5352)
* server: call the webhook asynchronosly in event triggers
* Expose all modules in Cabal file (#5371)
* [skip ci] update commit_diff.txt
* [skip ci] fix cast exp parser & few TODOs
* [skip ci] fix remote fields arguments
* [skip ci] fix few more TODO, no-op refactor, move resolve/action.hs to execute/action.hs
* Pass environment variables around as a data structure, via @sordina (#5374)
* Pass environment variables around as a data structure, via @sordina
* Resolving build error
* Adding Environment passing note to changelog
* Removing references to ILTPollerLog as this seems to have been reintroduced from a bad merge
* removing commented-out imports
* Language pragmas already set by project
* Linking async thread
* Apply suggestions from code review
Use `runQueryTx` instead of `runLazyTx` for queries.
* remove the non-user facing entry in the changelog
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] fix: restrict remote relationship field generation for hasura queries
* [skip ci] no-op refactor; move insert execution code from schema parser module
* server: call the webhook asynchronously in event triggers (#5352)
* server: call the webhook asynchronosly in event triggers
* Expose all modules in Cabal file (#5371)
* [skip ci] update commit_diff.txt
* Pass environment variables around as a data structure, via @sordina (#5374)
* Pass environment variables around as a data structure, via @sordina
* Resolving build error
* Adding Environment passing note to changelog
* Removing references to ILTPollerLog as this seems to have been reintroduced from a bad merge
* removing commented-out imports
* Language pragmas already set by project
* Linking async thread
* Apply suggestions from code review
Use `runQueryTx` instead of `runLazyTx` for queries.
* remove the non-user facing entry in the changelog
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] implement header checking
Probably closes #14 and #3659.
* server: refactor 'pollQuery' to have a hook to process 'PollDetails' (#5391)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* update pg-client (#5421)
* [skip ci] update commit_diff
* Fix latency buckets for telemetry data
These must have gotten messed up during a refactor. As a consequence
almost all samples received so far fall into the single erroneous 0 to
1K seconds (originally supposed to be 1ms?) bucket.
I also re-thought what the numbers should be, but these are still
arbitrary and might want adjusting in the future.
* [skip ci] include the latest commit compared against master in commit_diff
* [skip ci] include new commits from master in commit_diff
* [skip ci] improve description generation
* [skip ci] sort all introspect arrays
* [skip ci] allow parsers to specify error codes
* [skip ci] fix integer and float parsing error code
* [skip ci] scalar from json errors are now parse errors
* [skip ci] fixed negative integer error message and code
* [skip ci] Re-fix nullability in relationships
* [skip ci] no-op refactor and removed couple of FIXMEs
* [skip ci] uncomment code in 'deleteMetadataObject'
* [skip ci] Fix re-fix of nullability for relationships
* [skip ci] fix default arguments error code
* [skip ci] updated test error message
!!! WARNING !!!
Since all fields accept `null`, they all are technically optional in
the new schema. Meaning there's no such thing as a missing mandatory
field anymore: a field that doesn't have a default value, and which
therefore isn't labelled as "optional" in the schema, will be assumed
to be null if it's missing, meaning it isn't possible anymore to have
an error for a missing mandatory field. The only possible error is now
when a optional positional argument is omitted but is not the last
positional argument.
* [skip ci] cleanup of int scalar parser
* [skip ci] retro-compatibility of offset as string
* [skip ci] Remove commit from commit_diff.txt
Although strictly speaking we don't know if this will work correctly in PDV
if we would implement query plan caching, the fact is that in the theoretical
case that we would have the same issue in PDV, it would probably apply not just
to introspection, and the fix would be written completely differently. So this
old commit is of no value to us other than the heads-up "make sure query plan
caching works correctly even in the presence of unused variables", which is
already part of the test suite.
* Add MonadTrace and MonadExecuteQuery abstractions (#5383)
* [skip ci] Fix accumulation of input object types
Just like object types, interface types, and union types, we have to avoid
circularities when collecting input types from the GraphQL AST.
Additionally, this fixes equality checks for input object types (whose fields
are unordered, and hence should be compared as sets) and enum types (ditto).
* [skip ci] fix fragment error path
* [skip ci] fix node error code
* [skip ci] fix paths in insert queries
* [skip ci] fix path in objects
* [skip ci] manually alter node id path for consistency
* [skip ci] more node error fixups
* [skip ci] one last relay error message fix
* [skip ci] update commit_diff
* Propagate the trace context to event triggers (#5409)
* Propagate the trace context to event triggers
* Handle missing trace and span IDs
* Store trace context as one LOCAL
* Add migrations
* Documentation
* changelog
* Fix warnings
* Respond to code review suggestions
* Respond to code review
* Undo changelog
* Update CHANGELOG.md
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* server: log request/response sizes for event triggers (#5463)
* server: log request/response sizes for event triggers
event triggers (and scheduled triggers) now have request/response size
in their logs.
* add changelog entry
* Tracing: Simplify HTTP traced request (#5451)
Remove the Inversion of Control (SuspendRequest) and simplify
the tracing of HTTP Requests.
Co-authored-by: Phil Freeman <phil@hasura.io>
* Attach request ID as tracing metadata (#5456)
* Propagate the trace context to event triggers
* Handle missing trace and span IDs
* Store trace context as one LOCAL
* Add migrations
* Documentation
* Include the request ID as trace metadata
* changelog
* Fix warnings
* Respond to code review suggestions
* Respond to code review
* Undo changelog
* Update CHANGELOG.md
* Typo
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* server: add logging for action handlers (#5471)
* server: add logging for action handlers
* add changelog entry
* change action-handler log type from internal to non-internal
* fix action-handler-log name
* server: pass http and websocket request to logging context (#5470)
* pass request body to logging context in all cases
* add message size logging on the websocket API
this is required by graphql-engine-pro/#416
* message size logging on websocket API
As we need to log all messages recieved/sent by the websocket server,
it makes sense to log them as part of the websocket server event logs.
Previously message recieved were logged inside the onMessage handler,
and messages sent were logged only for "data" messages (as a server event log)
* fix review comments
Co-authored-by: Phil Freeman <phil@hasura.io>
* server: stop eventing subsystem threads when shutting down (#5479)
* server: stop eventing subsystem threads when shutting down
* Apply suggestions from code review
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
* [skip ci] update commit_diff with new commits added in master
* Bugfix to support 0-size HASURA_GRAPHQL_QUERY_PLAN_CACHE_SIZE
Also some minor refactoring of bounded cache module:
- the maxBound check in `trim` was confusing and unnecessary
- consequently trim was unnecessary for lookupPure
Also add some basic tests
* Support only the bounded cache, with default HASURA_GRAPHQL_QUERY_PLAN_CACHE_SIZE of 4000. Closes #5363
* [skip ci] remove merge commit from commit_diff
* server: Fix compiler warning caused by GHC upgrade (#5489)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] update all non server code from master
* [skip ci] aligned object field error message with master
* [skip ci] fix remaining undefined?
* [skip ci] remove unused import
* [skip ci] revert to previous error message, fix tests
* Move nullableType/nonNullableType to Schema.hs
These are functions on Types, not on Parsers.
* [skip ci] fix setup to fix backend only test
the order in which permission checks are performed on the branch is
slightly different than on master, resulting in a slightly different
error if there are no other mutations the user has access to. By
adding update permissions, we go back to the expected case.
* [skip ci] fix insert geojson tests to reflect new paths
* [skip ci] fix enum test for better error message
* [skip ci] fix header test for better error message
* [skip ci] fix fragment cycle test for better error message
* [skip ci] fix error message for type mismatch
* [skip ci] fix variable path in test
* [skip ci] adjust tests after bug fix
* [skip ci] more tests fixing
* Add hdb_catalog.current_setting abstraction for reading Hasura settings
As the comment in the function’s definition explains, this is needed to
work around an awkward Postgres behavior.
* [skip ci] Update CONTRIBUTING.md to mention Node setup for Python tests
* [skip ci] Add missing Python tests env var to CONTRIBUTING.md
* [skip ci] fix order of result when subscription is run with multiple nodes
* [skip ci] no-op refactor: fix a warning in Internal/Parser.hs
* [skip ci] throw error when a subscription contains remote joins
* [skip ci] Enable easier profiling by hiding AssertNF behind a flag
In order to compile a profiling build, run:
$ cabal new-build -f profiling --enable-profiling
* [skip ci] Fix two warnings
We used to lookup the objects that implement a given interface by filtering all
objects in the schema document. However, one of the tests expects us to
generate a warning if the provided `implements` field of an introspection query
specifies an object not implementing some interface. So we use that field
instead.
* [skip ci] Fix warnings by commenting out query plan caching
* [skip ci] improve masking/commenting query caching related code & few warning fixes
* [skip ci] Fixed compiler warnings in graphql-parser-hs
* Sync non-Haskell assets with master
* [skip ci] add a test inserting invalid GraphQL but valid JSON value in a jsonb column
* [skip ci] Avoid converting to/from Map
* [skip ci] Apply some hlint suggestions
* [skip ci] remove redundant constraints from buildLiveQueryPlan and explainGQLQuery
* [skip ci] add NOTEs about missing Tracing constraints in PDV from master
* Remove -fdefer-typed-holes, fix warnings
* Update cabal.project.freeze
* Limit GHC’s heap size to 8GB in CI to avoid the OOM killer
* Commit package-lock.json for Python tests’ remote schema server
* restrict env variables start with HASURA_GRAPHQL_ for headers configuration in actions, event triggers & remote schemas (#5519)
* restrict env variables start with HASURA_GRAPHQL_ for headers definition in actions & event triggers
* update CHANGELOG.md
* Apply suggestions from code review
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* add test for table_by_pk node when roles doesn't have permission to PK
* [skip ci] fix introspection query if any enum column present in primary key (fix #5200) (#5522)
* [skip ci] test case fix for a6450e126bc2d98bcfd3791501986e4627ce6c6f
* [skip ci] add tests to agg queries when role doesn't have access to any cols
* fix backend test
* Simplify subscription execution
* [skip ci] add test to check if required headers are present while querying
* Suppose, table B is related to table A and to query B certain headers are
necessary, then the test checks that we are throwing error when the header
is not set when B is queried through A
* fix mutations not checking for view mutability
* [skip ci] add variable type checking and corresponding tests
* [skip ci] add test to check if update headers are present while doing an upsert
* [skip ci] add positive counterparts to some of the negative permission tests
* fix args missing their description in introspect
* [skip ci] Remove unused function; insert missing markNotReusable call
* [skip ci] Add a Note about InputValue
* [skip ci] Delete LegacySchema/ 🎉
* [skip ci] Delete GraphQL/{Resolve,Validate}/ 🎉
* [skip ci] Delete top-level Resolve/Validate modules; tidy .cabal file
* [skip ci] Delete LegacySchema top-level module
Somehow I missed this one.
* fix input value to json
* [skip ci] elaborate on JSON objects in GraphQL
* [skip ci] add missing file
* [skip ci] add a test with subscription containing remote joins
* add a test with remote joins in mutation output
* [skip ci] Add some comments to Schema/Mutation.hs
* [skip ci] Remove no longer needed code from RemoteServer.hs
* [skip ci] Use a helper function to generate conflict clause parsers
* [skip ci] fix type checker error in fields with default value
* capitalize the header keys in select_articles_without_required_headers
* Somehow, this was the reason the tests were failing. I have no idea, why!
* [skip ci] Add a long Note about optional fields and nullability
* Improve comments a bit; simplify Schema/Common.hs a bit
* [skip ci] full implementation of 5.8.5 type checking.
* [skip ci] fix validation test teardown
* [skip ci] fix schema stitching test
* fix remote schema ignoring enum nullability
* [skip ci] fix fieldOptional to not discard nullability
* revert nullability of use_spheroid
* fix comment
* add required remote fields with arguments for tests
* [skip ci] add missing docstrings
* [skip ci] fixed description of remote fields
* [skip ci] change docstring for consistency
* fix several schema inconsistencies
* revert behaviour change in function arguments parsing
* fix remaining nullability issues in new schema
* minor no-op refactor; use isListType from graphql-parser-hs
* use nullability of remote schema node, while creating a Remote reln
* fix 'ID' input coercing & action 'ID' type relationship mapping
* include ASTs in MonadExecuteQuery
* needed for PRO code-base
* Delete code for "interfaces implementing ifaces" (draft GraphQL spec)
Previously I started writing some code that adds support for a future GraphQL
feature where interfaces may themselves be sub-types of other interfaces.
However, this code was incomplete, and partially incorrect. So this commit
deletes support for that entirely.
* Ignore a remote schema test during the upgrade/downgrade test
The PDV refactor does a better job at exposing a minimal set of types through
introspection. In particular, not every type that is present in a remote schema
is re-exposed by Hasura. The test
test_schema_stitching.py::TestRemoteSchemaBasic::test_introspection assumed that
all types were re-exposed, which is not required for GraphQL compatibility, in
order to test some aspect of our support for remote schemas.
So while this particular test has been updated on PDV, the PDV branch now does
not pass the old test, which we argue to be incorrect. Hence this test is
disabled while we await a release, after which we can re-enable it.
This also re-enables a test that was previously disabled for similar, though
unrelated, reasons.
* add haddock documentation to the action's field parsers
* Deslecting some tests in server-upgrade
Some tests with current build are failing on server upgrade
which it should not. The response is more accurate than
what it was.
Also the upgrade tests were not throwing errors when the test is
expected to return an error, but succeeds. The test framework is
patched to catch this case.
* [skip ci] Add a long Note about interfaces and object types
* send the response headers back to client after running a query
* Deselect a few more tests during upgrade/downgrade test
* Update commit_diff.txt
* change log kind from db_migrate to catalog_migrate (#5531)
* Show method and complete URI in traced HTTP calls (#5525)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* restrict env variables start with HASURA_GRAPHQL_ for headers configuration in actions, event triggers & remote schemas (#5519)
* restrict env variables start with HASURA_GRAPHQL_ for headers definition in actions & event triggers
* update CHANGELOG.md
* Apply suggestions from code review
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* fix introspection query if any enum column present in primary key (fix #5200) (#5522)
* Fix telemetry reporting of transport (websocket was reported as http)
* add log kinds in cli-migrations image (#5529)
* add log kinds in cli-migrations image
* give hint to resolve timeout error
* minor changes and CHANGELOG
* server: set hasura.tracecontext in RQL mutations [#5542] (#5555)
* server: set hasura.tracecontext in RQL mutations [#5542]
* Update test suite
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* Add bulldozer auto-merge and -update configuration
We still need to add the github app (as of time of opening this PR)
Afterwards devs should be able to allow bulldozer to automatically
"update" the branch, merging in parent when it changes, as well as
automatically merge when all checks pass.
This is opt-in by adding the `auto-update-auto-merge` label to the PR.
* Remove 'bulldozer' config, try 'kodiak' for auto-merge
see: https://github.com/chdsbd/kodiak
The main issue that bit us was not being able to auto update forked
branches, also:
https://github.com/palantir/bulldozer/issues/66
https://github.com/palantir/bulldozer/issues/145
* Cherry-picked all commits
* [skip ci] Slightly improve formatting
* Revert "fix introspection query if any enum column present in primary key (fix #5200) (#5522)"
This reverts commit 0f9a5afa59a88f6824f4d63d58db246a5ba3fb03.
This undoes a cherry-pick of 34288e1eb5f2c5dad9e6d1e05453dd52397dc970 that was
already done previously in a6450e126bc2d98bcfd3791501986e4627ce6c6f, and
subsequently fixed for PDV in 70e89dc250f8ddc6e2b7930bbe2b3eeaa6dbe1db
* Do a small bit of tidying in Hasura.GraphQL.Parser.Collect
* Fix cherry-picking work
Some previous cherry-picks ended up modifying code that is commented out
* [skip ci] clarified comment regarding insert representation
* [skip ci] removed obsolete todos
* cosmetic change
* fix action error message
* [skip ci] remove obsolete comment
* [skip ci] synchronize stylish haskell extensions list
* use previously defined scalar names in parsers rather than ad-hoc literals
* Apply most syntax hlint hints.
* Clarify comment on update mutation.
* [skip ci] Clarify what fields should be specified for objects
* Update "_inc" description.
* Use record types rather than tuples fo IntrospectionResult and ParsedIntrospection
* Get rid of checkFieldNamesUnique (use Data.List.Extended.duplicates)
* Throw more errors when collecting query root names
* [skip ci] clean column parser comment
* Remove dead code inserted in ab65b39
* avoid converting to non-empty list where not needed
* add note and TODO about the disabled checks in PDV
* minor refactor in remoteField' function
* Unify two getObject methods
* Nitpicks in Remote.hs
* Update CHANGELOG.md
* Revert "Unify two getObject methods"
This reverts commit bd6bb40355b3d189a46c0312eb52225e18be57b3.
We do need two different getObject functions as the corresponding error message is different
* Fix error message in Remote.hs
* Update CHANGELOG.md
Co-authored-by: Auke Booij <auke@tulcod.com>
* Apply suggested Changelog fix.
Co-authored-by: Auke Booij <auke@tulcod.com>
* Fix typo in Changelog.
* [skip ci] Update changelog.
* reuse type names to avoid duplication
* Fix Hashable instance for Definition
The presence of `Maybe Unique`, and an optional description, as part of
`Definition`s, means that `Definition`s that are considered `Eq`ual may get
different hashes. This can happen, for instance, when one object is memoized
but another is not.
* [skip ci] Update commit_diff.txt
* Bump parser version.
* Bump freeze file after changes in parser.
* [skip ci] Incorporate commits from master
* Fix developer flag in server/cabal.project.freeze
Co-authored-by: Auke Booij <auke@tulcod.com>
* Deselect a changed ENUM test for upgrade/downgrade CI
* Deselect test here as well
* [skip ci] remove dead code
* Disable more tests for upgrade/downgrade
* Fix which test gets deselected
* Revert "Add hdb_catalog.current_setting abstraction for reading Hasura settings"
This reverts commit 66e85ab9fbd56cca2c28a80201f6604fbe811b85.
* Remove circular reference in cabal.project.freeze
Co-authored-by: Karthikeyan Chinnakonda <karthikeyan@hasura.io>
Co-authored-by: Auke Booij <auke@hasura.io>
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
Co-authored-by: Marion Schleifer <marion@hasura.io>
Co-authored-by: Aleksandra Sikora <ola.zxcvbnm@gmail.com>
Co-authored-by: Brandon Simmons <brandon.m.simmons@gmail.com>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
Co-authored-by: Anon Ray <rayanon004@gmail.com>
Co-authored-by: rakeshkky <12475069+rakeshkky@users.noreply.github.com>
Co-authored-by: Anon Ray <ecthiender@users.noreply.github.com>
Co-authored-by: Vamshi Surabhi <vamshi@hasura.io>
Co-authored-by: Antoine Leblanc <antoine@hasura.io>
Co-authored-by: Brandon Simmons <brandon@hasura.io>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Lyndon Maydwell <lyndon@sordina.net>
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Naveen Naidu <naveennaidu479@gmail.com>
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
Co-authored-by: Nizar Malangadan <nizar-m@users.noreply.github.com>
Co-authored-by: Antoine Leblanc <crucuny@gmail.com>
Co-authored-by: Auke Booij <auke@tulcod.com>
2020-08-21 20:27:01 +03:00
|
|
|
def test_article_agg_without_select_access_to_any_col(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_agg_with_role_without_select_access.yaml', transport)
|
|
|
|
|
|
|
|
def test_article_agg_with_select_access(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_agg_with_role_with_select_access.yaml', transport)
|
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/agg_perm'
|
2018-10-26 12:02:44 +03:00
|
|
|
|
|
|
|
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryLimits:
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_limit_1(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_limit_1.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_limit_2(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_limit_2.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2018-11-27 15:24:51 +03:00
|
|
|
def test_limit_null(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_limit_null.yaml')
|
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_err_str_limit_error(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_string_limit_error.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_err_neg_limit_error(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_neg_limit_error.yaml', transport)
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/limits'
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryOffsets:
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_offset_1_limit_2(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_offset_1_limit_2.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_offset_2_limit_1(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_offset_2_limit_1.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_int_as_string_offset(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_string_offset.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
|
|
|
def test_err_neg_offset_error(self, hge_ctx):
|
2018-10-28 21:27:49 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_article_neg_offset_error.yaml')
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/offset'
|
2018-09-18 09:21:57 +03:00
|
|
|
|
2021-05-26 12:06:02 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket', 'subscription'])
|
2021-03-17 13:56:07 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['mssql', 'postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-17 13:56:07 +03:00
|
|
|
class TestGraphQLQueryBoolExpBasicCommon:
|
|
|
|
def test_order_delivered_at_is_null(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_order_delivered_at_is_null.yaml', transport)
|
|
|
|
|
|
|
|
def test_order_delivered_at_is_not_null(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_order_delivered_at_is_not_null.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_not_equal(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_neq.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_greater_than(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_gt.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_greater_than_or_equal(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_gte.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_less_than(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_lt.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-03-17 13:56:07 +03:00
|
|
|
def test_author_article_where_not_less_than(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_not_lt.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_less_than_or_equal(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_lte.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-03-17 13:56:07 +03:00
|
|
|
def test_article_author_is_published_and_registered(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_article_author_is_published_and_registered.yaml', transport)
|
|
|
|
|
|
|
|
def test_article_author_not_published_nor_registered(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_article_author_not_published_or_not_registered.yaml', transport)
|
|
|
|
|
2021-03-19 15:42:09 +03:00
|
|
|
def test_author_article_where_in(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_in.yaml', transport)
|
|
|
|
|
|
|
|
def test_author_article_where_nin(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_nin.yaml', transport)
|
|
|
|
|
2021-05-24 12:08:52 +03:00
|
|
|
def test_author_article_where_permissions(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_permissions.yaml', transport)
|
|
|
|
|
2021-03-17 13:56:07 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/basic'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-17 13:56:07 +03:00
|
|
|
class TestGraphQLQueryBoolExpBasicPostgres:
|
|
|
|
def test_author_article_operator_ne_not_found_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_operator_ne_not_found_err_postgres.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_in_empty_array(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_in_empty_array_postgres.yaml', transport)
|
2018-11-21 09:58:29 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_author_article_where_nin_empty_array(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_where_nin_empty_array_postgres.yaml', transport)
|
2018-11-21 09:58:29 +03:00
|
|
|
|
2021-03-19 15:42:09 +03:00
|
|
|
def test_article_author_unexpected_operator_in_where_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_unexpected_operator_in_where_err_postgres.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_uuid_test_in_uuid_col(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_uuid_test_in_uuid_col_postgres.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_self_referential_relationships(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/self_referential_relationships.yaml', transport)
|
2018-11-16 15:40:23 +03:00
|
|
|
|
2019-09-05 10:34:53 +03:00
|
|
|
def test_query_account_permission_success(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_account_permission_success.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_account_permission_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_account_permission_fail.yaml', transport)
|
|
|
|
|
2019-12-13 11:26:39 +03:00
|
|
|
def test_in_sql_identifier_array(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/in_sql_identifier_array.yaml', transport)
|
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/basic'
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-03-17 13:56:07 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-17 13:56:07 +03:00
|
|
|
class TestGraphQLQueryBoolExpBasicMSSQL:
|
|
|
|
def test_author_article_operator_ne_not_found_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_operator_ne_not_found_err_mssql.yaml', transport)
|
|
|
|
|
2021-03-19 15:42:09 +03:00
|
|
|
def test_article_author_unexpected_operator_in_where_err(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_unexpected_operator_in_where_err_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_uuid_test_in_uuid_col(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_uuid_test_in_uuid_col_mssql.yaml', transport)
|
|
|
|
|
2021-05-21 15:27:44 +03:00
|
|
|
def test_bools(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_bools_mssql.yaml', transport)
|
|
|
|
|
2021-05-25 16:54:18 +03:00
|
|
|
def test_create_invalid_fkey_relationship(self, hge_ctx, transport):
|
|
|
|
st_code, resp = hge_ctx.v1metadataq_f(self.dir() + '/setup_invalid_fkey_relationship_mssql.yaml')
|
|
|
|
assert st_code == 400, resp
|
2021-09-20 22:49:33 +03:00
|
|
|
assert resp['error'] == "Error when parsing command create_array_relationship.\nSee our documentation at https://hasura.io/docs/latest/graphql/core/api-reference/metadata-api/index.html#metadata-apis.\nInternal error message: Expecting object { table, columns }."
|
2021-05-25 16:54:18 +03:00
|
|
|
|
2021-03-17 13:56:07 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/basic'
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphqlQueryPermissions:
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_select_unpublished_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_select_query_unpublished_articles.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2020-06-25 06:33:37 +03:00
|
|
|
def test_user_select_query_article_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_select_query_article_author.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_only_other_users_published_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_can_query_other_users_published_articles.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_anonymous_only_published_articles(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/anonymous_can_only_get_published_articles.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-07-16 19:08:23 +03:00
|
|
|
def test_anonymous_only_published_articles_v1alpha1(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/anonymous_can_only_get_published_articles_v1alpha1.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_cannot_access_remarks_col(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_cannot_access_remarks_col.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_can_query_geometry_values_filter(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_can_query_geometry_values_filter.yaml', transport)
|
2019-01-28 20:46:31 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_can_query_geometry_values_filter_session_vars(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_can_query_geometry_values_filter_session_vars.yaml', transport)
|
2019-01-28 20:46:31 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_can_query_jsonb_values_filter(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_can_query_jsonb_values_filter.yaml', transport)
|
2019-01-28 20:46:31 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_user_can_query_jsonb_values_filter_session_vars(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_can_query_jsonb_values_filter_session_vars.yaml', transport)
|
2019-01-28 20:46:31 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_artist_select_query_Track_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/artist_select_query_Track_fail.yaml', transport)
|
2018-11-02 12:36:33 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_artist_select_query_Track(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/artist_select_query_Track.yaml', transport)
|
2018-11-02 12:36:33 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_artist_search_tracks(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/artist_search_tracks.yaml', transport)
|
2019-01-25 06:31:54 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_artist_search_tracks_aggregate(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/artist_search_tracks_aggregate.yaml', transport)
|
2019-01-25 06:31:54 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_staff_passed_students(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/staff_passed_students.yaml', transport)
|
2019-02-22 13:27:38 +03:00
|
|
|
|
2019-04-24 13:28:10 +03:00
|
|
|
def test_user_query_auction(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_query_auction.yaml', transport)
|
|
|
|
|
2019-10-30 06:59:55 +03:00
|
|
|
# FIXME: This test fails nondeterministically: strict=false doesn't seem to
|
|
|
|
# work on CI, so just disable for now:
|
|
|
|
# @pytest.mark.xfail(reason="Refer https://github.com/hasura/graphql-engine-internal/issues/252")
|
|
|
|
# def test_jsonb_has_all(self, hge_ctx, transport):
|
|
|
|
# check_query_f(hge_ctx, self.dir() + '/jsonb_has_all.yaml', transport)
|
2019-07-10 13:19:58 +03:00
|
|
|
|
|
|
|
def test_jsonb_has_any(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/jsonb_has_any.yaml', transport)
|
|
|
|
|
|
|
|
def test_in_and_nin(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/in_and_nin.yaml', transport)
|
|
|
|
|
2020-11-27 13:53:58 +03:00
|
|
|
def test_iregex(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/iregex.yaml', transport)
|
|
|
|
|
Rewrite GraphQL schema generation and query parsing (close #2801) (#4111)
Aka “the PDV refactor.” History is preserved on the branch 2801-graphql-schema-parser-refactor.
* [skip ci] remove stale benchmark commit from commit_diff
* [skip ci] Check for root field name conflicts between remotes
* [skip ci] Additionally check for conflicts between remotes and DB
* [skip ci] Check for conflicts in schema when tracking a table
* [skip ci] Fix equality checking in GraphQL AST
* server: fix mishandling of GeoJSON inputs in subscriptions (fix #3239) (#4551)
* Add support for multiple top-level fields in a subscription to improve testability of subscriptions
* Add an internal flag to enable multiple subscriptions
* Add missing call to withConstructorFn in live queries (fix #3239)
Co-authored-by: Alexis King <lexi.lambda@gmail.com>
* Scheduled triggers (close #1914) (#3553)
server: add scheduled triggers
Co-authored-by: Alexis King <lexi.lambda@gmail.com>
Co-authored-by: Marion Schleifer <marion@hasura.io>
Co-authored-by: Karthikeyan Chinnakonda <karthikeyan@hasura.io>
Co-authored-by: Aleksandra Sikora <ola.zxcvbnm@gmail.com>
* dev.sh: bump version due to addition of croniter python dependency
* server: fix an introspection query caching issue (fix #4547) (#4661)
Introspection queries accept variables, but we need to make sure to
also touch the variables that we ignore, so that an introspection
query is marked not reusable if we are not able to build a correct
query plan for it.
A better solution here would be to deal with such unused variables
correctly, so that more introspection queries become reusable.
An even better solution would be to type-safely track *how* to reuse
which variables, rather than to split the reusage marking from the
planning.
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* flush log buffer on exception in mkWaiApp ( fix #4772 ) (#4801)
* flush log buffer on exception in mkWaiApp
* add comment to explain the introduced change
* add changelog
* allow logging details of a live query polling thread (#4959)
* changes for poller-log
add various multiplexed query info in poller-log
* minor cleanup, also fixes a bug which will return duplicate data
* Live query poller stats can now be logged
This also removes in-memory stats that are collected about batched
query execution as the log lines when piped into an monitoring tool
will give us better insights.
* allow poller-log to be configurable
* log minimal information in the livequery-poller-log
Other information can be retrieved from /dev/subscriptions/extended
* fix few review comments
* avoid marshalling and unmarshalling from ByteString to EncJSON
* separate out SubscriberId and SubscriberMetadata
Co-authored-by: Anon Ray <rayanon004@gmail.com>
* Don't compile in developer APIs by default
* Tighten up handling of admin secret, more docs
Store the admin secret only as a hash to prevent leaking the secret
inadvertently, and to prevent timing attacks on the secret.
NOTE: best practice for stored user passwords is a function with a
tunable cost like bcrypt, but our threat model is quite different (even
if we thought we could reasonably protect the secret from an attacker
who could read arbitrary regions of memory), and bcrypt is far too slow
(by design) to perform on each request. We'd have to rely on our
(technically savvy) users to choose high entropy passwords in any case.
Referencing #4736
* server/docs: add instructions to fix loss of float precision in PostgreSQL <= 11 (#5187)
This adds a server flag, --pg-connection-options, that can be used to set a PostgreSQL connection parameter, extra_float_digits, that needs to be used to avoid loss of data on older versions of PostgreSQL, which have odd default behavior when returning float values. (fixes #5092)
* [skip ci] Add new commits from master to the commit diff
* [skip ci] serve default directives (skip & include) over introspection
* [skip ci] Update non-Haskell assets with the version on master
* server: refactor GQL execution check and config API (#5094)
Co-authored-by: Vamshi Surabhi <vamshi@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] fix js issues in tests by pinning dependencies version
* [skip ci] bump graphql version
* [skip ci] Add note about memory usage
* generalize query execution logic on Postgres (#5110)
* generalize PGExecCtx to support specialized functions for various operations
* fix tests compilation
* allow customising PGExecCtx when starting the web server
* server: changes catalog initialization and logging for pro customization (#5139)
* new typeclass to abstract the logic of QueryLog-ing
* abstract the logic of logging websocket-server logs
introduce a MonadWSLog typeclass
* move catalog initialization to init step
expose a helper function to migrate catalog
create schema cache in initialiseCtx
* expose various modules and functions for pro
* [skip ci] cosmetic change
* [skip ci] fix test calling a mutation that does not exist
* [skip ci] minor text change
* [skip ci] refactored input values
* [skip ci] remove VString Origin
* server: fix updating of headers behaviour in the update cron trigger API and create future events immediately (#5151)
* server: fix bug to update headers in an existing cron trigger and create future events
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* Lower stack chunk size in RTS to reduce thread STACK memory (closes #5190)
This reduces memory consumption for new idle subscriptions significantly
(see linked ticket).
The hypothesis is: we fork a lot of threads per websocket, and some of
these use slightly more than the initial 1K stack size, so the first
overflow balloons to 32K, when significantly less is required.
However: running with `+RTS -K1K -xc` did not seem to show evidence of
any overflows! So it's a mystery why this improves things.
GHC should probably also be doubling the stack buffer at each overflow
or doing something even smarter; the knobs we have aren't so helpful.
* [skip ci] fix todo and schema generation for aggregate fields
* 5087 libpq pool leak (#5089)
Shrink libpq buffers to 1MB before returning connection to pool. Closes #5087
See: https://github.com/hasura/pg-client-hs/pull/19
Also related: #3388 #4077
* bump pg-client-hs version (fixes a build issue on some environments) (#5267)
* do not use prepared statements for mutations
* server: unlock scheduled events on graceful shutdown (#4928)
* Fix buggy parsing of new --conn-lifetime flag in 2b0e3774
* [skip ci] remove cherry-picked commit from commit_diff.txt
* server: include additional fields in scheduled trigger webhook payload (#5262)
* include scheduled triggers metadata in the webhook body
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* server: call the webhook asynchronously in event triggers (#5352)
* server: call the webhook asynchronosly in event triggers
* Expose all modules in Cabal file (#5371)
* [skip ci] update commit_diff.txt
* [skip ci] fix cast exp parser & few TODOs
* [skip ci] fix remote fields arguments
* [skip ci] fix few more TODO, no-op refactor, move resolve/action.hs to execute/action.hs
* Pass environment variables around as a data structure, via @sordina (#5374)
* Pass environment variables around as a data structure, via @sordina
* Resolving build error
* Adding Environment passing note to changelog
* Removing references to ILTPollerLog as this seems to have been reintroduced from a bad merge
* removing commented-out imports
* Language pragmas already set by project
* Linking async thread
* Apply suggestions from code review
Use `runQueryTx` instead of `runLazyTx` for queries.
* remove the non-user facing entry in the changelog
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] fix: restrict remote relationship field generation for hasura queries
* [skip ci] no-op refactor; move insert execution code from schema parser module
* server: call the webhook asynchronously in event triggers (#5352)
* server: call the webhook asynchronosly in event triggers
* Expose all modules in Cabal file (#5371)
* [skip ci] update commit_diff.txt
* Pass environment variables around as a data structure, via @sordina (#5374)
* Pass environment variables around as a data structure, via @sordina
* Resolving build error
* Adding Environment passing note to changelog
* Removing references to ILTPollerLog as this seems to have been reintroduced from a bad merge
* removing commented-out imports
* Language pragmas already set by project
* Linking async thread
* Apply suggestions from code review
Use `runQueryTx` instead of `runLazyTx` for queries.
* remove the non-user facing entry in the changelog
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] implement header checking
Probably closes #14 and #3659.
* server: refactor 'pollQuery' to have a hook to process 'PollDetails' (#5391)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* update pg-client (#5421)
* [skip ci] update commit_diff
* Fix latency buckets for telemetry data
These must have gotten messed up during a refactor. As a consequence
almost all samples received so far fall into the single erroneous 0 to
1K seconds (originally supposed to be 1ms?) bucket.
I also re-thought what the numbers should be, but these are still
arbitrary and might want adjusting in the future.
* [skip ci] include the latest commit compared against master in commit_diff
* [skip ci] include new commits from master in commit_diff
* [skip ci] improve description generation
* [skip ci] sort all introspect arrays
* [skip ci] allow parsers to specify error codes
* [skip ci] fix integer and float parsing error code
* [skip ci] scalar from json errors are now parse errors
* [skip ci] fixed negative integer error message and code
* [skip ci] Re-fix nullability in relationships
* [skip ci] no-op refactor and removed couple of FIXMEs
* [skip ci] uncomment code in 'deleteMetadataObject'
* [skip ci] Fix re-fix of nullability for relationships
* [skip ci] fix default arguments error code
* [skip ci] updated test error message
!!! WARNING !!!
Since all fields accept `null`, they all are technically optional in
the new schema. Meaning there's no such thing as a missing mandatory
field anymore: a field that doesn't have a default value, and which
therefore isn't labelled as "optional" in the schema, will be assumed
to be null if it's missing, meaning it isn't possible anymore to have
an error for a missing mandatory field. The only possible error is now
when a optional positional argument is omitted but is not the last
positional argument.
* [skip ci] cleanup of int scalar parser
* [skip ci] retro-compatibility of offset as string
* [skip ci] Remove commit from commit_diff.txt
Although strictly speaking we don't know if this will work correctly in PDV
if we would implement query plan caching, the fact is that in the theoretical
case that we would have the same issue in PDV, it would probably apply not just
to introspection, and the fix would be written completely differently. So this
old commit is of no value to us other than the heads-up "make sure query plan
caching works correctly even in the presence of unused variables", which is
already part of the test suite.
* Add MonadTrace and MonadExecuteQuery abstractions (#5383)
* [skip ci] Fix accumulation of input object types
Just like object types, interface types, and union types, we have to avoid
circularities when collecting input types from the GraphQL AST.
Additionally, this fixes equality checks for input object types (whose fields
are unordered, and hence should be compared as sets) and enum types (ditto).
* [skip ci] fix fragment error path
* [skip ci] fix node error code
* [skip ci] fix paths in insert queries
* [skip ci] fix path in objects
* [skip ci] manually alter node id path for consistency
* [skip ci] more node error fixups
* [skip ci] one last relay error message fix
* [skip ci] update commit_diff
* Propagate the trace context to event triggers (#5409)
* Propagate the trace context to event triggers
* Handle missing trace and span IDs
* Store trace context as one LOCAL
* Add migrations
* Documentation
* changelog
* Fix warnings
* Respond to code review suggestions
* Respond to code review
* Undo changelog
* Update CHANGELOG.md
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* server: log request/response sizes for event triggers (#5463)
* server: log request/response sizes for event triggers
event triggers (and scheduled triggers) now have request/response size
in their logs.
* add changelog entry
* Tracing: Simplify HTTP traced request (#5451)
Remove the Inversion of Control (SuspendRequest) and simplify
the tracing of HTTP Requests.
Co-authored-by: Phil Freeman <phil@hasura.io>
* Attach request ID as tracing metadata (#5456)
* Propagate the trace context to event triggers
* Handle missing trace and span IDs
* Store trace context as one LOCAL
* Add migrations
* Documentation
* Include the request ID as trace metadata
* changelog
* Fix warnings
* Respond to code review suggestions
* Respond to code review
* Undo changelog
* Update CHANGELOG.md
* Typo
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* server: add logging for action handlers (#5471)
* server: add logging for action handlers
* add changelog entry
* change action-handler log type from internal to non-internal
* fix action-handler-log name
* server: pass http and websocket request to logging context (#5470)
* pass request body to logging context in all cases
* add message size logging on the websocket API
this is required by graphql-engine-pro/#416
* message size logging on websocket API
As we need to log all messages recieved/sent by the websocket server,
it makes sense to log them as part of the websocket server event logs.
Previously message recieved were logged inside the onMessage handler,
and messages sent were logged only for "data" messages (as a server event log)
* fix review comments
Co-authored-by: Phil Freeman <phil@hasura.io>
* server: stop eventing subsystem threads when shutting down (#5479)
* server: stop eventing subsystem threads when shutting down
* Apply suggestions from code review
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
* [skip ci] update commit_diff with new commits added in master
* Bugfix to support 0-size HASURA_GRAPHQL_QUERY_PLAN_CACHE_SIZE
Also some minor refactoring of bounded cache module:
- the maxBound check in `trim` was confusing and unnecessary
- consequently trim was unnecessary for lookupPure
Also add some basic tests
* Support only the bounded cache, with default HASURA_GRAPHQL_QUERY_PLAN_CACHE_SIZE of 4000. Closes #5363
* [skip ci] remove merge commit from commit_diff
* server: Fix compiler warning caused by GHC upgrade (#5489)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* [skip ci] update all non server code from master
* [skip ci] aligned object field error message with master
* [skip ci] fix remaining undefined?
* [skip ci] remove unused import
* [skip ci] revert to previous error message, fix tests
* Move nullableType/nonNullableType to Schema.hs
These are functions on Types, not on Parsers.
* [skip ci] fix setup to fix backend only test
the order in which permission checks are performed on the branch is
slightly different than on master, resulting in a slightly different
error if there are no other mutations the user has access to. By
adding update permissions, we go back to the expected case.
* [skip ci] fix insert geojson tests to reflect new paths
* [skip ci] fix enum test for better error message
* [skip ci] fix header test for better error message
* [skip ci] fix fragment cycle test for better error message
* [skip ci] fix error message for type mismatch
* [skip ci] fix variable path in test
* [skip ci] adjust tests after bug fix
* [skip ci] more tests fixing
* Add hdb_catalog.current_setting abstraction for reading Hasura settings
As the comment in the function’s definition explains, this is needed to
work around an awkward Postgres behavior.
* [skip ci] Update CONTRIBUTING.md to mention Node setup for Python tests
* [skip ci] Add missing Python tests env var to CONTRIBUTING.md
* [skip ci] fix order of result when subscription is run with multiple nodes
* [skip ci] no-op refactor: fix a warning in Internal/Parser.hs
* [skip ci] throw error when a subscription contains remote joins
* [skip ci] Enable easier profiling by hiding AssertNF behind a flag
In order to compile a profiling build, run:
$ cabal new-build -f profiling --enable-profiling
* [skip ci] Fix two warnings
We used to lookup the objects that implement a given interface by filtering all
objects in the schema document. However, one of the tests expects us to
generate a warning if the provided `implements` field of an introspection query
specifies an object not implementing some interface. So we use that field
instead.
* [skip ci] Fix warnings by commenting out query plan caching
* [skip ci] improve masking/commenting query caching related code & few warning fixes
* [skip ci] Fixed compiler warnings in graphql-parser-hs
* Sync non-Haskell assets with master
* [skip ci] add a test inserting invalid GraphQL but valid JSON value in a jsonb column
* [skip ci] Avoid converting to/from Map
* [skip ci] Apply some hlint suggestions
* [skip ci] remove redundant constraints from buildLiveQueryPlan and explainGQLQuery
* [skip ci] add NOTEs about missing Tracing constraints in PDV from master
* Remove -fdefer-typed-holes, fix warnings
* Update cabal.project.freeze
* Limit GHC’s heap size to 8GB in CI to avoid the OOM killer
* Commit package-lock.json for Python tests’ remote schema server
* restrict env variables start with HASURA_GRAPHQL_ for headers configuration in actions, event triggers & remote schemas (#5519)
* restrict env variables start with HASURA_GRAPHQL_ for headers definition in actions & event triggers
* update CHANGELOG.md
* Apply suggestions from code review
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* add test for table_by_pk node when roles doesn't have permission to PK
* [skip ci] fix introspection query if any enum column present in primary key (fix #5200) (#5522)
* [skip ci] test case fix for a6450e126bc2d98bcfd3791501986e4627ce6c6f
* [skip ci] add tests to agg queries when role doesn't have access to any cols
* fix backend test
* Simplify subscription execution
* [skip ci] add test to check if required headers are present while querying
* Suppose, table B is related to table A and to query B certain headers are
necessary, then the test checks that we are throwing error when the header
is not set when B is queried through A
* fix mutations not checking for view mutability
* [skip ci] add variable type checking and corresponding tests
* [skip ci] add test to check if update headers are present while doing an upsert
* [skip ci] add positive counterparts to some of the negative permission tests
* fix args missing their description in introspect
* [skip ci] Remove unused function; insert missing markNotReusable call
* [skip ci] Add a Note about InputValue
* [skip ci] Delete LegacySchema/ 🎉
* [skip ci] Delete GraphQL/{Resolve,Validate}/ 🎉
* [skip ci] Delete top-level Resolve/Validate modules; tidy .cabal file
* [skip ci] Delete LegacySchema top-level module
Somehow I missed this one.
* fix input value to json
* [skip ci] elaborate on JSON objects in GraphQL
* [skip ci] add missing file
* [skip ci] add a test with subscription containing remote joins
* add a test with remote joins in mutation output
* [skip ci] Add some comments to Schema/Mutation.hs
* [skip ci] Remove no longer needed code from RemoteServer.hs
* [skip ci] Use a helper function to generate conflict clause parsers
* [skip ci] fix type checker error in fields with default value
* capitalize the header keys in select_articles_without_required_headers
* Somehow, this was the reason the tests were failing. I have no idea, why!
* [skip ci] Add a long Note about optional fields and nullability
* Improve comments a bit; simplify Schema/Common.hs a bit
* [skip ci] full implementation of 5.8.5 type checking.
* [skip ci] fix validation test teardown
* [skip ci] fix schema stitching test
* fix remote schema ignoring enum nullability
* [skip ci] fix fieldOptional to not discard nullability
* revert nullability of use_spheroid
* fix comment
* add required remote fields with arguments for tests
* [skip ci] add missing docstrings
* [skip ci] fixed description of remote fields
* [skip ci] change docstring for consistency
* fix several schema inconsistencies
* revert behaviour change in function arguments parsing
* fix remaining nullability issues in new schema
* minor no-op refactor; use isListType from graphql-parser-hs
* use nullability of remote schema node, while creating a Remote reln
* fix 'ID' input coercing & action 'ID' type relationship mapping
* include ASTs in MonadExecuteQuery
* needed for PRO code-base
* Delete code for "interfaces implementing ifaces" (draft GraphQL spec)
Previously I started writing some code that adds support for a future GraphQL
feature where interfaces may themselves be sub-types of other interfaces.
However, this code was incomplete, and partially incorrect. So this commit
deletes support for that entirely.
* Ignore a remote schema test during the upgrade/downgrade test
The PDV refactor does a better job at exposing a minimal set of types through
introspection. In particular, not every type that is present in a remote schema
is re-exposed by Hasura. The test
test_schema_stitching.py::TestRemoteSchemaBasic::test_introspection assumed that
all types were re-exposed, which is not required for GraphQL compatibility, in
order to test some aspect of our support for remote schemas.
So while this particular test has been updated on PDV, the PDV branch now does
not pass the old test, which we argue to be incorrect. Hence this test is
disabled while we await a release, after which we can re-enable it.
This also re-enables a test that was previously disabled for similar, though
unrelated, reasons.
* add haddock documentation to the action's field parsers
* Deslecting some tests in server-upgrade
Some tests with current build are failing on server upgrade
which it should not. The response is more accurate than
what it was.
Also the upgrade tests were not throwing errors when the test is
expected to return an error, but succeeds. The test framework is
patched to catch this case.
* [skip ci] Add a long Note about interfaces and object types
* send the response headers back to client after running a query
* Deselect a few more tests during upgrade/downgrade test
* Update commit_diff.txt
* change log kind from db_migrate to catalog_migrate (#5531)
* Show method and complete URI in traced HTTP calls (#5525)
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* restrict env variables start with HASURA_GRAPHQL_ for headers configuration in actions, event triggers & remote schemas (#5519)
* restrict env variables start with HASURA_GRAPHQL_ for headers definition in actions & event triggers
* update CHANGELOG.md
* Apply suggestions from code review
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
* fix introspection query if any enum column present in primary key (fix #5200) (#5522)
* Fix telemetry reporting of transport (websocket was reported as http)
* add log kinds in cli-migrations image (#5529)
* add log kinds in cli-migrations image
* give hint to resolve timeout error
* minor changes and CHANGELOG
* server: set hasura.tracecontext in RQL mutations [#5542] (#5555)
* server: set hasura.tracecontext in RQL mutations [#5542]
* Update test suite
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
* Add bulldozer auto-merge and -update configuration
We still need to add the github app (as of time of opening this PR)
Afterwards devs should be able to allow bulldozer to automatically
"update" the branch, merging in parent when it changes, as well as
automatically merge when all checks pass.
This is opt-in by adding the `auto-update-auto-merge` label to the PR.
* Remove 'bulldozer' config, try 'kodiak' for auto-merge
see: https://github.com/chdsbd/kodiak
The main issue that bit us was not being able to auto update forked
branches, also:
https://github.com/palantir/bulldozer/issues/66
https://github.com/palantir/bulldozer/issues/145
* Cherry-picked all commits
* [skip ci] Slightly improve formatting
* Revert "fix introspection query if any enum column present in primary key (fix #5200) (#5522)"
This reverts commit 0f9a5afa59a88f6824f4d63d58db246a5ba3fb03.
This undoes a cherry-pick of 34288e1eb5f2c5dad9e6d1e05453dd52397dc970 that was
already done previously in a6450e126bc2d98bcfd3791501986e4627ce6c6f, and
subsequently fixed for PDV in 70e89dc250f8ddc6e2b7930bbe2b3eeaa6dbe1db
* Do a small bit of tidying in Hasura.GraphQL.Parser.Collect
* Fix cherry-picking work
Some previous cherry-picks ended up modifying code that is commented out
* [skip ci] clarified comment regarding insert representation
* [skip ci] removed obsolete todos
* cosmetic change
* fix action error message
* [skip ci] remove obsolete comment
* [skip ci] synchronize stylish haskell extensions list
* use previously defined scalar names in parsers rather than ad-hoc literals
* Apply most syntax hlint hints.
* Clarify comment on update mutation.
* [skip ci] Clarify what fields should be specified for objects
* Update "_inc" description.
* Use record types rather than tuples fo IntrospectionResult and ParsedIntrospection
* Get rid of checkFieldNamesUnique (use Data.List.Extended.duplicates)
* Throw more errors when collecting query root names
* [skip ci] clean column parser comment
* Remove dead code inserted in ab65b39
* avoid converting to non-empty list where not needed
* add note and TODO about the disabled checks in PDV
* minor refactor in remoteField' function
* Unify two getObject methods
* Nitpicks in Remote.hs
* Update CHANGELOG.md
* Revert "Unify two getObject methods"
This reverts commit bd6bb40355b3d189a46c0312eb52225e18be57b3.
We do need two different getObject functions as the corresponding error message is different
* Fix error message in Remote.hs
* Update CHANGELOG.md
Co-authored-by: Auke Booij <auke@tulcod.com>
* Apply suggested Changelog fix.
Co-authored-by: Auke Booij <auke@tulcod.com>
* Fix typo in Changelog.
* [skip ci] Update changelog.
* reuse type names to avoid duplication
* Fix Hashable instance for Definition
The presence of `Maybe Unique`, and an optional description, as part of
`Definition`s, means that `Definition`s that are considered `Eq`ual may get
different hashes. This can happen, for instance, when one object is memoized
but another is not.
* [skip ci] Update commit_diff.txt
* Bump parser version.
* Bump freeze file after changes in parser.
* [skip ci] Incorporate commits from master
* Fix developer flag in server/cabal.project.freeze
Co-authored-by: Auke Booij <auke@tulcod.com>
* Deselect a changed ENUM test for upgrade/downgrade CI
* Deselect test here as well
* [skip ci] remove dead code
* Disable more tests for upgrade/downgrade
* Fix which test gets deselected
* Revert "Add hdb_catalog.current_setting abstraction for reading Hasura settings"
This reverts commit 66e85ab9fbd56cca2c28a80201f6604fbe811b85.
* Remove circular reference in cabal.project.freeze
Co-authored-by: Karthikeyan Chinnakonda <karthikeyan@hasura.io>
Co-authored-by: Auke Booij <auke@hasura.io>
Co-authored-by: Tirumarai Selvan <tiru@hasura.io>
Co-authored-by: Marion Schleifer <marion@hasura.io>
Co-authored-by: Aleksandra Sikora <ola.zxcvbnm@gmail.com>
Co-authored-by: Brandon Simmons <brandon.m.simmons@gmail.com>
Co-authored-by: Vamshi Surabhi <0x777@users.noreply.github.com>
Co-authored-by: Anon Ray <rayanon004@gmail.com>
Co-authored-by: rakeshkky <12475069+rakeshkky@users.noreply.github.com>
Co-authored-by: Anon Ray <ecthiender@users.noreply.github.com>
Co-authored-by: Vamshi Surabhi <vamshi@hasura.io>
Co-authored-by: Antoine Leblanc <antoine@hasura.io>
Co-authored-by: Brandon Simmons <brandon@hasura.io>
Co-authored-by: Phil Freeman <phil@hasura.io>
Co-authored-by: Lyndon Maydwell <lyndon@sordina.net>
Co-authored-by: Phil Freeman <paf31@cantab.net>
Co-authored-by: Naveen Naidu <naveennaidu479@gmail.com>
Co-authored-by: Karthikeyan Chinnakonda <chkarthikeyan95@gmail.com>
Co-authored-by: Nizar Malangadan <nizar-m@users.noreply.github.com>
Co-authored-by: Antoine Leblanc <crucuny@gmail.com>
Co-authored-by: Auke Booij <auke@tulcod.com>
2020-08-21 20:27:01 +03:00
|
|
|
def test_user_accessing_books_by_pk_should_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/user_should_not_be_able_to_access_books_by_pk.yaml')
|
|
|
|
|
|
|
|
def test_author_articles_without_required_headers_set(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_articles_without_required_headers.yaml', transport)
|
|
|
|
|
2021-07-28 11:09:32 +03:00
|
|
|
def test_reader_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/reader_author.yaml', transport)
|
|
|
|
|
|
|
|
def test_tutor_get_students(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/tutor_get_students.yaml', transport)
|
|
|
|
|
|
|
|
def test_tutor_get_students_session(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/tutor_get_students_session.yaml', transport)
|
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/permissions'
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-07-17 00:18:58 +03:00
|
|
|
# These tests only test the schema specific stuff which will
|
|
|
|
# be common across all the backends, to add DB specific tests
|
|
|
|
# look for the TestGraphQLInheritedRoles<backend> test classes
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
2021-09-16 09:24:00 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-07-17 00:18:58 +03:00
|
|
|
class TestGraphQLInheritedRolesSchema:
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/permissions/inherited_roles'
|
|
|
|
|
|
|
|
setup_metadata_api_version = "v2"
|
|
|
|
|
|
|
|
def test_basic_inherited_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/basic_inherited_roles.yaml')
|
|
|
|
|
|
|
|
def test_inherited_role_when_some_roles_may_not_have_permission_configured(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/inherited_role_with_some_roles_having_no_permissions.yaml')
|
|
|
|
|
|
|
|
def test_throw_error_when_roles_form_a_cycle(self, hge_ctx, transport):
|
|
|
|
export_metadata_query = {
|
|
|
|
"type": "export_metadata",
|
|
|
|
"args": {}
|
|
|
|
}
|
|
|
|
st_code, resp = hge_ctx.v1q(export_metadata_query)
|
|
|
|
assert st_code == 200, resp
|
|
|
|
circular_roles_metadata = [
|
|
|
|
{
|
|
|
|
"role_name": "intermediate_circular_role_1",
|
|
|
|
"role_set": [
|
|
|
|
"manager_employee",
|
|
|
|
"circular_role"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"role_name": "intermediate_circular_role_2",
|
|
|
|
"role_set": [
|
|
|
|
"intermediate_circular_role_1",
|
|
|
|
"employee"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"role_name": "circular_role",
|
|
|
|
"role_set": [
|
|
|
|
"intermediate_circular_role_2",
|
|
|
|
"author"
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
|
|
|
]
|
|
|
|
resp["inherited_roles"] = resp["inherited_roles"] + circular_roles_metadata
|
|
|
|
import_metadata_query = {
|
|
|
|
"type": "replace_metadata",
|
|
|
|
"args": {
|
|
|
|
"metadata": resp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
st_code, resp = hge_ctx.v1q(import_metadata_query)
|
|
|
|
assert st_code == 400, resp
|
|
|
|
assert resp['error'] == '''found cycle(s) in roles: ["circular_role","intermediate_circular_role_2","intermediate_circular_role_1","circular_role"]'''
|
|
|
|
|
|
|
|
def test_explicit_metadata_permission_should_override_role_inheritance(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/override_inherited_permission.yaml')
|
|
|
|
|
|
|
|
def test_inherited_role_inherits_from_inherited_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/inherited_role_parent_is_another_inherited_role.yaml')
|
|
|
|
|
[Preview] Inherited roles for postgres read queries
fixes #3868
docker image - `hasura/graphql-engine:inherited-roles-preview-48b73a2de`
Note:
To be able to use the inherited roles feature, the graphql-engine should be started with the env variable `HASURA_GRAPHQL_EXPERIMENTAL_FEATURES` set to `inherited_roles`.
Introduction
------------
This PR implements the idea of multiple roles as presented in this [paper](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/FGALanguageICDE07.pdf). The multiple roles feature in this PR can be used via inherited roles. An inherited role is a role which can be created by combining multiple singular roles. For example, if there are two roles `author` and `editor` configured in the graphql-engine, then we can create a inherited role with the name of `combined_author_editor` role which will combine the select permissions of the `author` and `editor` roles and then make GraphQL queries using the `combined_author_editor`.
How are select permissions of different roles are combined?
------------------------------------------------------------
A select permission includes 5 things:
1. Columns accessible to the role
2. Row selection filter
3. Limit
4. Allow aggregation
5. Scalar computed fields accessible to the role
Suppose there are two roles, `role1` gives access to the `address` column with row filter `P1` and `role2` gives access to both the `address` and the `phone` column with row filter `P2` and we create a new role `combined_roles` which combines `role1` and `role2`.
Let's say the following GraphQL query is queried with the `combined_roles` role.
```graphql
query {
employees {
address
phone
}
}
```
This will translate to the following SQL query:
```sql
select
(case when (P1 or P2) then address else null end) as address,
(case when P2 then phone else null end) as phone
from employee
where (P1 or P2)
```
The other parameters of the select permission will be combined in the following manner:
1. Limit - Minimum of the limits will be the limit of the inherited role
2. Allow aggregations - If any of the role allows aggregation, then the inherited role will allow aggregation
3. Scalar computed fields - same as table column fields, as in the above example
APIs for inherited roles:
----------------------
1. `add_inherited_role`
`add_inherited_role` is the [metadata API](https://hasura.io/docs/1.0/graphql/core/api-reference/index.html#schema-metadata-api) to create a new inherited role. It accepts two arguments
`role_name`: the name of the inherited role to be added (String)
`role_set`: list of roles that need to be combined (Array of Strings)
Example:
```json
{
"type": "add_inherited_role",
"args": {
"role_name":"combined_user",
"role_set":[
"user",
"user1"
]
}
}
```
After adding the inherited role, the inherited role can be used like single roles like earlier
Note:
An inherited role can only be created with non-inherited/singular roles.
2. `drop_inherited_role`
The `drop_inherited_role` API accepts the name of the inherited role and drops it from the metadata. It accepts a single argument:
`role_name`: name of the inherited role to be dropped
Example:
```json
{
"type": "drop_inherited_role",
"args": {
"role_name":"combined_user"
}
}
```
Metadata
---------
The derived roles metadata will be included under the `experimental_features` key while exporting the metadata.
```json
{
"experimental_features": {
"derived_roles": [
{
"role_name": "manager_is_employee_too",
"role_set": [
"employee",
"manager"
]
}
]
}
}
```
Scope
------
Only postgres queries and subscriptions are supported in this PR.
Important points:
-----------------
1. All columns exposed to an inherited role will be marked as `nullable`, this is done so that cell value nullification can be done.
TODOs
-------
- [ ] Tests
- [ ] Test a GraphQL query running with a inherited role without enabling inherited roles in experimental features
- [] Tests for aggregate queries, limit, computed fields, functions, subscriptions (?)
- [ ] Introspection test with a inherited role (nullability changes in a inherited role)
- [ ] Docs
- [ ] Changelog
Co-authored-by: Vamshi Surabhi <6562944+0x777@users.noreply.github.com>
GitOrigin-RevId: 3b8ee1e11f5ceca80fe294f8c074d42fbccfec63
2021-03-08 14:14:13 +03:00
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
2021-09-16 09:24:00 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-07-08 23:49:10 +03:00
|
|
|
class TestGraphQLInheritedRolesPostgres:
|
[Preview] Inherited roles for postgres read queries
fixes #3868
docker image - `hasura/graphql-engine:inherited-roles-preview-48b73a2de`
Note:
To be able to use the inherited roles feature, the graphql-engine should be started with the env variable `HASURA_GRAPHQL_EXPERIMENTAL_FEATURES` set to `inherited_roles`.
Introduction
------------
This PR implements the idea of multiple roles as presented in this [paper](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/FGALanguageICDE07.pdf). The multiple roles feature in this PR can be used via inherited roles. An inherited role is a role which can be created by combining multiple singular roles. For example, if there are two roles `author` and `editor` configured in the graphql-engine, then we can create a inherited role with the name of `combined_author_editor` role which will combine the select permissions of the `author` and `editor` roles and then make GraphQL queries using the `combined_author_editor`.
How are select permissions of different roles are combined?
------------------------------------------------------------
A select permission includes 5 things:
1. Columns accessible to the role
2. Row selection filter
3. Limit
4. Allow aggregation
5. Scalar computed fields accessible to the role
Suppose there are two roles, `role1` gives access to the `address` column with row filter `P1` and `role2` gives access to both the `address` and the `phone` column with row filter `P2` and we create a new role `combined_roles` which combines `role1` and `role2`.
Let's say the following GraphQL query is queried with the `combined_roles` role.
```graphql
query {
employees {
address
phone
}
}
```
This will translate to the following SQL query:
```sql
select
(case when (P1 or P2) then address else null end) as address,
(case when P2 then phone else null end) as phone
from employee
where (P1 or P2)
```
The other parameters of the select permission will be combined in the following manner:
1. Limit - Minimum of the limits will be the limit of the inherited role
2. Allow aggregations - If any of the role allows aggregation, then the inherited role will allow aggregation
3. Scalar computed fields - same as table column fields, as in the above example
APIs for inherited roles:
----------------------
1. `add_inherited_role`
`add_inherited_role` is the [metadata API](https://hasura.io/docs/1.0/graphql/core/api-reference/index.html#schema-metadata-api) to create a new inherited role. It accepts two arguments
`role_name`: the name of the inherited role to be added (String)
`role_set`: list of roles that need to be combined (Array of Strings)
Example:
```json
{
"type": "add_inherited_role",
"args": {
"role_name":"combined_user",
"role_set":[
"user",
"user1"
]
}
}
```
After adding the inherited role, the inherited role can be used like single roles like earlier
Note:
An inherited role can only be created with non-inherited/singular roles.
2. `drop_inherited_role`
The `drop_inherited_role` API accepts the name of the inherited role and drops it from the metadata. It accepts a single argument:
`role_name`: name of the inherited role to be dropped
Example:
```json
{
"type": "drop_inherited_role",
"args": {
"role_name":"combined_user"
}
}
```
Metadata
---------
The derived roles metadata will be included under the `experimental_features` key while exporting the metadata.
```json
{
"experimental_features": {
"derived_roles": [
{
"role_name": "manager_is_employee_too",
"role_set": [
"employee",
"manager"
]
}
]
}
}
```
Scope
------
Only postgres queries and subscriptions are supported in this PR.
Important points:
-----------------
1. All columns exposed to an inherited role will be marked as `nullable`, this is done so that cell value nullification can be done.
TODOs
-------
- [ ] Tests
- [ ] Test a GraphQL query running with a inherited role without enabling inherited roles in experimental features
- [] Tests for aggregate queries, limit, computed fields, functions, subscriptions (?)
- [ ] Introspection test with a inherited role (nullability changes in a inherited role)
- [ ] Docs
- [ ] Changelog
Co-authored-by: Vamshi Surabhi <6562944+0x777@users.noreply.github.com>
GitOrigin-RevId: 3b8ee1e11f5ceca80fe294f8c074d42fbccfec63
2021-03-08 14:14:13 +03:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/permissions/inherited_roles'
|
|
|
|
|
2021-07-01 12:20:53 +03:00
|
|
|
setup_metadata_api_version = "v2"
|
|
|
|
|
[Preview] Inherited roles for postgres read queries
fixes #3868
docker image - `hasura/graphql-engine:inherited-roles-preview-48b73a2de`
Note:
To be able to use the inherited roles feature, the graphql-engine should be started with the env variable `HASURA_GRAPHQL_EXPERIMENTAL_FEATURES` set to `inherited_roles`.
Introduction
------------
This PR implements the idea of multiple roles as presented in this [paper](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/FGALanguageICDE07.pdf). The multiple roles feature in this PR can be used via inherited roles. An inherited role is a role which can be created by combining multiple singular roles. For example, if there are two roles `author` and `editor` configured in the graphql-engine, then we can create a inherited role with the name of `combined_author_editor` role which will combine the select permissions of the `author` and `editor` roles and then make GraphQL queries using the `combined_author_editor`.
How are select permissions of different roles are combined?
------------------------------------------------------------
A select permission includes 5 things:
1. Columns accessible to the role
2. Row selection filter
3. Limit
4. Allow aggregation
5. Scalar computed fields accessible to the role
Suppose there are two roles, `role1` gives access to the `address` column with row filter `P1` and `role2` gives access to both the `address` and the `phone` column with row filter `P2` and we create a new role `combined_roles` which combines `role1` and `role2`.
Let's say the following GraphQL query is queried with the `combined_roles` role.
```graphql
query {
employees {
address
phone
}
}
```
This will translate to the following SQL query:
```sql
select
(case when (P1 or P2) then address else null end) as address,
(case when P2 then phone else null end) as phone
from employee
where (P1 or P2)
```
The other parameters of the select permission will be combined in the following manner:
1. Limit - Minimum of the limits will be the limit of the inherited role
2. Allow aggregations - If any of the role allows aggregation, then the inherited role will allow aggregation
3. Scalar computed fields - same as table column fields, as in the above example
APIs for inherited roles:
----------------------
1. `add_inherited_role`
`add_inherited_role` is the [metadata API](https://hasura.io/docs/1.0/graphql/core/api-reference/index.html#schema-metadata-api) to create a new inherited role. It accepts two arguments
`role_name`: the name of the inherited role to be added (String)
`role_set`: list of roles that need to be combined (Array of Strings)
Example:
```json
{
"type": "add_inherited_role",
"args": {
"role_name":"combined_user",
"role_set":[
"user",
"user1"
]
}
}
```
After adding the inherited role, the inherited role can be used like single roles like earlier
Note:
An inherited role can only be created with non-inherited/singular roles.
2. `drop_inherited_role`
The `drop_inherited_role` API accepts the name of the inherited role and drops it from the metadata. It accepts a single argument:
`role_name`: name of the inherited role to be dropped
Example:
```json
{
"type": "drop_inherited_role",
"args": {
"role_name":"combined_user"
}
}
```
Metadata
---------
The derived roles metadata will be included under the `experimental_features` key while exporting the metadata.
```json
{
"experimental_features": {
"derived_roles": [
{
"role_name": "manager_is_employee_too",
"role_set": [
"employee",
"manager"
]
}
]
}
}
```
Scope
------
Only postgres queries and subscriptions are supported in this PR.
Important points:
-----------------
1. All columns exposed to an inherited role will be marked as `nullable`, this is done so that cell value nullification can be done.
TODOs
-------
- [ ] Tests
- [ ] Test a GraphQL query running with a inherited role without enabling inherited roles in experimental features
- [] Tests for aggregate queries, limit, computed fields, functions, subscriptions (?)
- [ ] Introspection test with a inherited role (nullability changes in a inherited role)
- [ ] Docs
- [ ] Changelog
Co-authored-by: Vamshi Surabhi <6562944+0x777@users.noreply.github.com>
GitOrigin-RevId: 3b8ee1e11f5ceca80fe294f8c074d42fbccfec63
2021-03-08 14:14:13 +03:00
|
|
|
def test_basic_inherited_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/basic_inherited_roles.yaml')
|
|
|
|
|
2021-03-18 18:28:25 +03:00
|
|
|
def test_inherited_role_when_some_roles_may_not_have_permission_configured(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/inherited_role_with_some_roles_having_no_permissions.yaml')
|
|
|
|
|
2021-07-08 23:49:10 +03:00
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize('backend', ['mssql'])
|
2021-09-16 09:24:00 +03:00
|
|
|
@usefixtures('per_backend_tests', 'per_class_tests_db_state')
|
2021-07-08 23:49:10 +03:00
|
|
|
class TestGraphQLInheritedRolesMSSQL:
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/permissions/inherited_roles_mssql'
|
|
|
|
|
|
|
|
def test_basic_inherited_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/basic_inherited_roles.yaml')
|
|
|
|
|
|
|
|
def test_inherited_role_when_some_roles_may_not_have_permission_configured(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/inherited_role_with_some_roles_having_no_permissions.yaml')
|
|
|
|
|
2021-05-26 12:06:02 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket', 'subscription'])
|
2021-03-19 15:42:09 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['postgres', 'mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-19 15:42:09 +03:00
|
|
|
class TestGraphQLQueryBoolExpSearchCommon:
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_like(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_like.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_not_like(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_nlike.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-03-19 15:42:09 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/search'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['postgres'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-19 15:42:09 +03:00
|
|
|
class TestGraphQLQueryBoolExpSearchPostgres:
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_ilike(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_ilike_postgres.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_not_ilike(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_nilike_postgres.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_similar(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_similar_postgres.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_city_where_not_similar(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_not_similar_postgres.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2020-11-27 13:53:58 +03:00
|
|
|
def test_city_where_regex(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_regex_postgres.yaml', transport)
|
2020-11-27 13:53:58 +03:00
|
|
|
|
|
|
|
def test_city_where_nregex(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_nregex_postgres.yaml', transport)
|
2020-11-27 13:53:58 +03:00
|
|
|
|
|
|
|
def test_city_where_iregex(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_iregex_postgres.yaml', transport)
|
2020-11-27 13:53:58 +03:00
|
|
|
|
|
|
|
def test_city_where_niregex(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_niregex_postgres.yaml', transport)
|
2020-11-27 13:53:58 +03:00
|
|
|
|
2021-02-22 13:20:27 +03:00
|
|
|
def test_project_where_ilike(self, hge_ctx, transport):
|
2021-03-19 15:42:09 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_project_where_ilike_postgres.yaml', transport)
|
2021-02-22 13:20:27 +03:00
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/search'
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2021-03-19 15:42:09 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-19 15:42:09 +03:00
|
|
|
class TestGraphQLQueryBoolExpSearchMSSQL:
|
|
|
|
|
|
|
|
def test_city_where_like(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_like_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_city_where_not_like(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_city_where_nlike_mssql.yaml', transport)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/search'
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBoolExpJsonB:
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_contains_article_latest(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_article_author_jsonb_contains_latest.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_contains_article_beststeller(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_author_article_jsonb_contains_bestseller.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_contained_in_latest(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_article_author_jsonb_contained_in_latest.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_contained_in_bestseller_latest(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_article_author_jsonb_contained_in_bestseller_latest.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_has_key_sim_type(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_product_jsonb_has_key_sim_type.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_has_keys_any_os_operating_system(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_product_jsonb_has_keys_any_os_operating_system.yaml', transport)
|
2018-10-04 15:44:15 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_jsonb_has_keys_all_touchscreen_ram(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_product_jsonb_has_keys_all_ram_touchscreen.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/jsonb'
|
|
|
|
|
2020-05-13 11:09:44 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket', 'subscription'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBoolExpPostGIS:
|
2019-01-17 09:21:38 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_query_using_point(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_using_point.yaml', transport)
|
2019-01-17 09:21:38 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_query_using_line(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_using_line.yaml', transport)
|
2019-01-17 09:21:38 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_query_using_polygon(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_using_polygon.yaml', transport)
|
2019-01-17 09:21:38 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_query_geography_spatial_ops(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_geography_spatial_ops.yaml', transport)
|
2019-03-25 15:29:52 +03:00
|
|
|
|
2021-04-14 16:02:16 +03:00
|
|
|
def test_query_geometry_3d_spatial_ops(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_geometry_3d_spatial_ops.yaml', transport)
|
|
|
|
|
2019-07-15 11:52:45 +03:00
|
|
|
def test_query_cast_geometry_to_geography(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_cast_geometry_to_geography.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_cast_geography_to_geometry(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_cast_geography_to_geometry.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_illegal_cast_is_not_allowed(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_illegal_cast_is_not_allowed.yaml', transport)
|
|
|
|
|
2019-01-17 09:21:38 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/postgis'
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBoolExpRaster:
|
2019-08-29 16:07:05 +03:00
|
|
|
|
|
|
|
def test_query_st_intersects_geom_nband(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_st_intersects_geom_nband.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_st_intersects_geom_nband_no_rows(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_st_intersects_geom_nband_no_rows.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_st_intersects_rast(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_st_intersects_rast.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_st_intersects_rast_no_rows(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_st_intersects_rast_no_rows.yaml', transport)
|
|
|
|
|
|
|
|
def test_query_st_intersects_rast_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_st_intersects_rast_fail.yaml', transport)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/raster'
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryOrderBy:
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_articles_order_by_without_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/articles_order_by_without_id.yaml', transport)
|
2018-10-26 14:57:33 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_articles_order_by_rel_author_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/articles_order_by_rel_author_id.yaml', transport)
|
2018-10-26 14:57:33 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_articles_order_by_rel_author_rel_contact_phone(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/articles_order_by_rel_author_rel_contact_phone.yaml', transport)
|
2018-10-28 21:27:49 +03:00
|
|
|
|
2019-08-22 11:14:27 +03:00
|
|
|
def test_articles_order_by_null(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/articles_order_by_null.yaml', transport)
|
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_album_order_by_tracks_count(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/album_order_by_tracks_count.yaml', transport)
|
2018-12-12 15:58:39 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_album_order_by_tracks_duration_avg(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/album_order_by_tracks_duration_avg.yaml', transport)
|
2018-12-12 15:58:39 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_album_order_by_tracks_max_name(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/album_order_by_tracks_max_name.yaml', transport)
|
2018-12-12 15:58:39 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_album_order_by_tracks_bytes_stddev(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/album_order_by_tracks_bytes_stddev.yaml', transport)
|
2018-12-12 15:58:39 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_employee_distinct_department_order_by_salary_desc(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/employee_distinct_department_order_by_salary_desc.yaml', transport)
|
2018-11-23 04:53:56 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_employee_distinct_department_order_by_salary_asc(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/employee_distinct_department_order_by_salary_asc.yaml', transport)
|
2018-11-23 04:53:56 +03:00
|
|
|
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_employee_distinct_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/employee_distinct_fail.yaml', transport)
|
2018-11-23 04:53:56 +03:00
|
|
|
|
2019-10-05 07:00:53 +03:00
|
|
|
def test_album_order_by_tracks_tags(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/album_order_by_tracks_tags.yaml', transport)
|
|
|
|
|
2021-07-27 19:27:28 +03:00
|
|
|
def test_Track_order_by_size(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/Track_order_by_size.yaml', transport)
|
|
|
|
|
|
|
|
def test_author_order_by_get_articles_aggregate(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_order_by_get_articles_aggregate.yaml', transport)
|
|
|
|
|
2018-10-28 21:27:49 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/order_by'
|
2019-01-25 06:31:54 +03:00
|
|
|
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryFunctions:
|
2019-01-25 06:31:54 +03:00
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_search_posts(self, hge_ctx, transport):
|
2019-01-25 06:31:54 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + "/query_search_posts.yaml")
|
|
|
|
|
2019-05-10 09:05:11 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2019-04-08 10:22:38 +03:00
|
|
|
def test_search_posts_aggregate(self, hge_ctx, transport):
|
2019-01-25 06:31:54 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + "/query_search_posts_aggregate.yaml")
|
|
|
|
|
2019-08-28 22:27:15 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_get_users(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/query_get_users.yaml", transport)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_get_users_arguments_error(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/query_get_users_arguments_error.yaml", transport)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_get_users_default_arguments_error(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/query_get_users_default_arguments_error.yaml", transport)
|
|
|
|
|
2019-02-05 08:57:03 +03:00
|
|
|
def test_alter_function_error(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/alter_function_error.yaml')
|
|
|
|
|
2019-02-14 07:05:18 +03:00
|
|
|
def test_overloading_function_error(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/overloading_function_error.yaml')
|
|
|
|
|
2019-04-08 09:58:56 +03:00
|
|
|
def test_query_get_test_uuid(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_get_test_uuid.yaml')
|
|
|
|
|
2019-06-04 15:43:28 +03:00
|
|
|
def test_query_my_add(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_my_add.yaml')
|
|
|
|
|
2019-11-20 09:47:06 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_get_session_var(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_get_session_var.yaml', transport)
|
|
|
|
|
|
|
|
def test_track_function_v2_errors(self, hge_ctx):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/track_function_v2_errors.yaml')
|
|
|
|
|
2019-12-27 01:32:48 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_get_test_session_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_get_test_session_id.yaml')
|
2020-10-29 15:48:45 +03:00
|
|
|
|
2020-10-22 16:26:42 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
def test_query_search_author_mview(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/query_search_author_mview.yaml')
|
2019-12-27 01:32:48 +03:00
|
|
|
|
2021-03-23 19:03:07 +03:00
|
|
|
def test_tracking_function_with_composite_type_argument(self, hge_ctx):
|
2021-03-18 15:49:57 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/track_non_base_function_arg_type.yaml')
|
|
|
|
|
2019-01-25 06:31:54 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/functions'
|
2019-07-22 15:47:13 +03:00
|
|
|
|
2019-09-19 07:47:36 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryCustomSchema:
|
2019-09-19 07:47:36 +03:00
|
|
|
|
|
|
|
def test_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author.yaml', transport)
|
|
|
|
|
|
|
|
def test_article(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/article.yaml', transport)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/custom_schema'
|
|
|
|
|
2020-10-29 15:48:45 +03:00
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryCustomTableName:
|
|
|
|
|
|
|
|
def test_author(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + 'author.yaml', transport)
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/custom_schema/custom_table_name/'
|
|
|
|
|
2019-07-22 15:47:13 +03:00
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryEnums:
|
2019-07-22 15:47:13 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/enums'
|
|
|
|
|
|
|
|
def test_introspect(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/introspect.yaml', transport)
|
|
|
|
|
2020-08-05 17:08:36 +03:00
|
|
|
def test_introspect_user_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/introspect_user_role.yaml', transport)
|
|
|
|
|
2019-07-22 15:47:13 +03:00
|
|
|
def test_select_enum_field(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_enum_field.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_where_enum_eq(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_where_enum_eq_bad_value(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq_bad_value.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_where_enum_eq_string(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq_string.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_where_enum_eq_variable(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq_variable.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_where_enum_eq_variable_bad_value(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq_variable_bad_value.yaml', transport)
|
2019-10-11 05:22:16 +03:00
|
|
|
|
|
|
|
def test_select_where_enum_eq_without_enum_table_visibility(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_where_enum_eq_without_enum_table_visibility.yaml', transport)
|
2019-10-16 17:33:34 +03:00
|
|
|
|
2019-10-18 11:29:47 +03:00
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryComputedFields:
|
2019-10-18 11:29:47 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/computed_fields'
|
|
|
|
|
|
|
|
def test_computed_fields(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/computed_fields.yaml', transport)
|
|
|
|
|
|
|
|
def test_computed_fields_permission(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/computed_fields_permission.yaml', transport)
|
|
|
|
|
2019-11-07 17:39:48 +03:00
|
|
|
def test_locations(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/locations.yaml', transport)
|
|
|
|
|
2020-01-11 07:05:07 +03:00
|
|
|
def test_float_test(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/float_test.yaml', transport)
|
|
|
|
|
2021-05-20 09:28:35 +03:00
|
|
|
def test_tracked_function_as_computed_field(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/tracked_function_as_comp_field.yaml')
|
|
|
|
|
2021-07-07 14:58:37 +03:00
|
|
|
def test_scalar_computed_field_filter(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/scalar_computed_field_filter.yaml')
|
|
|
|
|
|
|
|
def test_table_computed_field_filter(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/table_computed_field_filter.yaml')
|
|
|
|
|
|
|
|
def test_table_computed_field_filter_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/table_computed_field_filter_fail.yaml')
|
|
|
|
|
2019-10-16 17:33:34 +03:00
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
2020-02-13 12:14:02 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryCaching:
|
2019-10-16 17:33:34 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/caching'
|
|
|
|
|
|
|
|
def test_include_directive(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/include_directive.yaml', transport)
|
2020-05-18 15:27:56 +03:00
|
|
|
|
|
|
|
def test_introspection(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/introspection.yaml', transport)
|
2020-05-05 22:57:17 +03:00
|
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
|
|
not PytestConf.config.getoption("--test-unauthorized-role"),
|
|
|
|
reason="--test-unauthorized-role missing"
|
|
|
|
)
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestUnauthorizedRolePermission:
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/unauthorized_role'
|
|
|
|
|
|
|
|
def test_unauth_role(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/unauthorized_role.yaml', transport, False)
|
2020-05-21 18:50:25 +03:00
|
|
|
|
2021-08-30 14:53:48 +03:00
|
|
|
@pytest.mark.parametrize("backend", ['postgres', 'mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2020-05-21 18:50:25 +03:00
|
|
|
class TestGraphQLExplain:
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/explain'
|
|
|
|
|
2021-07-16 19:08:23 +03:00
|
|
|
def test_simple_query_as_admin(self, hge_ctx, backend):
|
|
|
|
q = {"query": {"query": "query abc { __typename }", "operationName": "abc"}}
|
|
|
|
st_code, resp = hge_ctx.v1GraphqlExplain(q)
|
|
|
|
assert st_code == 200, resp
|
|
|
|
|
|
|
|
def test_simple_query_as_user(self, hge_ctx, backend):
|
|
|
|
q = {"query": {"query": "query abc { __typename }", "operationName": "abc"}}
|
|
|
|
st_code, resp = hge_ctx.v1GraphqlExplain(q, {"x-hasura-role": "random_user"})
|
|
|
|
assert st_code == 400, resp
|
|
|
|
|
|
|
|
def test_simple_query_as_admin_with_user_role(self, hge_ctx, backend):
|
|
|
|
self.with_admin_secret(hge_ctx, self.dir() + hge_ctx.backend_suffix('/permissions_query') + ".yaml")
|
|
|
|
|
2021-05-11 13:04:38 +03:00
|
|
|
def test_simple_query(self, hge_ctx, backend):
|
|
|
|
self.with_admin_secret(hge_ctx, self.dir() + hge_ctx.backend_suffix('/simple_query') + ".yaml")
|
2020-05-21 18:50:25 +03:00
|
|
|
|
2021-05-11 13:04:38 +03:00
|
|
|
def test_permissions_query(self, hge_ctx, backend):
|
|
|
|
self.with_admin_secret(hge_ctx, self.dir() + hge_ctx.backend_suffix('/permissions_query') + ".yaml")
|
2020-05-21 18:50:25 +03:00
|
|
|
|
2021-07-16 19:08:23 +03:00
|
|
|
def with_admin_secret(self, hge_ctx, f, hdrs=None, req_st=200):
|
2020-05-21 18:50:25 +03:00
|
|
|
conf = get_conf_f(f)
|
|
|
|
admin_secret = hge_ctx.hge_key
|
|
|
|
headers = {}
|
2021-07-16 19:08:23 +03:00
|
|
|
if hdrs != None:
|
|
|
|
headers = hdrs
|
|
|
|
elif admin_secret and hdrs == None:
|
|
|
|
headers['X-Hasura-Admin-Secret'] = admin_secret
|
2020-05-21 18:50:25 +03:00
|
|
|
status_code, resp_json, _ = hge_ctx.anyq(conf['url'], conf['query'], headers)
|
2021-07-16 19:08:23 +03:00
|
|
|
assert status_code == req_st, resp_json
|
|
|
|
|
|
|
|
if req_st != 200:
|
|
|
|
# return early in case we're testing for failures
|
|
|
|
return
|
2021-07-21 20:22:08 +03:00
|
|
|
|
2021-05-11 13:04:38 +03:00
|
|
|
# Comparing only with generated 'sql' since the 'plan' may differ
|
2020-05-21 18:50:25 +03:00
|
|
|
resp_sql = resp_json[0]['sql']
|
|
|
|
exp_sql = conf['response'][0]['sql']
|
|
|
|
assert resp_sql == exp_sql, resp_json
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
2020-06-16 17:25:49 +03:00
|
|
|
class TestRelayQueriesBasic:
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
2020-06-16 17:25:49 +03:00
|
|
|
return 'queries/graphql_query/relay/basic'
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
def test_article_connection(self, hge_ctx, transport):
|
2020-06-16 17:25:49 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/article_connection.yaml', transport)
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
def test_author_connection(self, hge_ctx, transport):
|
2020-06-16 17:25:49 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_connection.yaml', transport)
|
2020-06-08 15:13:01 +03:00
|
|
|
|
2020-06-16 17:25:49 +03:00
|
|
|
def test_author_with_articles_view_connection(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_with_articles_view_connection.yaml', transport)
|
|
|
|
|
|
|
|
def test_search_articles_connection(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/search_articles_connection.yaml', transport)
|
2020-06-08 15:13:01 +03:00
|
|
|
|
2020-06-16 17:25:49 +03:00
|
|
|
def test_node(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node.yaml', transport)
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
def test_only_pageinfo(self, hge_ctx, transport):
|
2020-06-16 17:25:49 +03:00
|
|
|
check_query_f(hge_ctx, self.dir() + '/only_pageinfo.yaml', transport)
|
2020-06-08 15:13:01 +03:00
|
|
|
|
|
|
|
# Articles forward pagination
|
|
|
|
def test_article_no_orderby_forward_pagination(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + "/article_pagination_no_orderby/forward", 3)
|
|
|
|
|
|
|
|
# Articles backward pagination
|
|
|
|
def test_article_no_orderby_backward_pagination(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + "/article_pagination_no_orderby/backward", 3)
|
|
|
|
|
|
|
|
# Authors forward pagination
|
|
|
|
def test_author_orderby_articles_aggregate_orderby_forward_pagination(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + "/author_pagination_articles_aggregate_orderby/forward", 2)
|
|
|
|
|
|
|
|
# Authors backward pagination
|
|
|
|
def test_author_orderby_articles_aggregate_orderby_backward_pagination(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + "/author_pagination_articles_aggregate_orderby/backward", 3)
|
|
|
|
|
|
|
|
# Pagination errors
|
|
|
|
def test_first_and_last_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/pagination_errors/first_and_last.yaml", transport)
|
|
|
|
|
|
|
|
def test_after_and_before_fail(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + "/pagination_errors/after_and_before.yaml", transport)
|
|
|
|
|
2020-06-16 17:25:49 +03:00
|
|
|
# Node id errors
|
|
|
|
def test_insufficient_data(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/insufficient_data.yaml', transport)
|
|
|
|
|
|
|
|
def test_invalid_column_value(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/invalid_column_value.yaml', transport)
|
|
|
|
|
|
|
|
def test_invalid_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/invalid_id.yaml', transport)
|
|
|
|
|
|
|
|
def test_missing_columns(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/missing_columns.yaml', transport)
|
|
|
|
|
|
|
|
def test_non_array_id(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/non_array_id.yaml', transport)
|
|
|
|
|
|
|
|
def test_unexpected_columns(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/unexpected_columns.yaml', transport)
|
|
|
|
|
|
|
|
def test_invalid_node_id_version(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/invalid_node_id_version.yaml', transport)
|
|
|
|
|
|
|
|
def test_non_integer_version(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/node_id_errors/non_integer_version.yaml', transport)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestRelayQueriesPermissions:
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/relay/permissions'
|
|
|
|
|
|
|
|
def test_author_connection(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_connection.yaml', transport)
|
|
|
|
|
|
|
|
def test_author_node(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_node.yaml', transport)
|
|
|
|
|
|
|
|
def test_author_node_null(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/author_node_null.yaml', transport)
|
|
|
|
|
|
|
|
# Article forward pagination
|
|
|
|
def test_article_pagination_forward(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + '/article_pagination/forward', 2)
|
|
|
|
|
|
|
|
def test_article_pagination_backward(self, hge_ctx, transport):
|
|
|
|
_test_relay_pagination(hge_ctx, transport, self.dir() + '/article_pagination/backward', 2)
|
|
|
|
|
2020-06-08 15:13:01 +03:00
|
|
|
def _test_relay_pagination(hge_ctx, transport, test_file_prefix, no_of_pages):
|
|
|
|
for i in range(no_of_pages):
|
|
|
|
page_no = i + 1
|
|
|
|
test_file = "page_" + str(page_no) + ".yaml"
|
|
|
|
check_query_f(hge_ctx, test_file_prefix + "/" + test_file, transport)
|
2021-01-29 08:48:17 +03:00
|
|
|
|
|
|
|
use_function_permission_fixtures = pytest.mark.usefixtures(
|
|
|
|
'per_method_tests_db_state',
|
|
|
|
'functions_permissions_fixtures'
|
|
|
|
)
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@use_function_permission_fixtures
|
|
|
|
class TestGraphQLQueryFunctionPermissions:
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/functions/permissions/'
|
|
|
|
|
|
|
|
def test_access_function_without_permission_configured(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + 'get_articles_without_permission_configured.yaml')
|
|
|
|
|
|
|
|
def test_access_function_with_permission_configured(self, hge_ctx, transport):
|
|
|
|
st_code, resp = hge_ctx.v1metadataq_f(self.dir() + 'add_function_permission_get_articles.yaml')
|
|
|
|
assert st_code == 200, resp
|
|
|
|
check_query_f(hge_ctx, self.dir() + 'get_articles_with_permission_configured.yaml')
|
2021-02-25 14:05:51 +03:00
|
|
|
|
|
|
|
@pytest.mark.parametrize('transport', ['http', 'websocket'])
|
|
|
|
@usefixtures('per_class_tests_db_state')
|
|
|
|
class TestGraphQLQueryBoolExpLtree:
|
|
|
|
def test_select_path_where_ancestor(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_ancestor.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_ancestor_array(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_ancestor_array.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_descendant(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_descendant.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_descendant_array(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_descendant_array.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_matches(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_matches.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_matches_array(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_matches_array.yaml')
|
|
|
|
|
|
|
|
def test_select_path_where_matches_ltxtquery(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_path_where_matches_ltxtquery.yaml')
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/ltree'
|
2021-03-24 16:43:40 +03:00
|
|
|
|
|
|
|
@pytest.mark.parametrize("transport", ['http', 'websocket'])
|
|
|
|
@pytest.mark.parametrize("backend", ['mssql'])
|
2021-05-25 16:54:18 +03:00
|
|
|
@usefixtures('per_class_tests_db_state')
|
2021-03-24 16:43:40 +03:00
|
|
|
class TestGraphQLQueryBoolExpSpatialMSSQL:
|
|
|
|
@pytest.mark.skip_server_upgrade_test
|
|
|
|
def test_select_spatial_mssql_types(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_equals(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_equals_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_contains(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_contains_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_crosses(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_geom_where_st_crosses_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_intersects(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_intersects_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_overlaps(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_overlaps_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_within(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_within_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_touches(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_touches_mssql.yaml', transport)
|
|
|
|
|
2021-03-26 19:59:16 +03:00
|
|
|
def test_select_spatial_mssql_types_where_st_crosses_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_geom_where_st_crosses_geojson_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_contains_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_contains_geojson_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_equals_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_equals_geojson_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_intersects_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_intersects_geojson_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_touches_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_touches_geojson_mssql.yaml', transport)
|
|
|
|
|
|
|
|
def test_select_spatial_mssql_types_where_st_within_geojson(self, hge_ctx, transport):
|
|
|
|
check_query_f(hge_ctx, self.dir() + '/select_query_spatial_types_where_st_within_geojson_mssql.yaml', transport)
|
|
|
|
|
2021-03-24 16:43:40 +03:00
|
|
|
@classmethod
|
|
|
|
def dir(cls):
|
|
|
|
return 'queries/graphql_query/boolexp/spatial'
|