graphql-engine/server/src-lib/Hasura/RQL/DML/Delete.hs

99 lines
3.1 KiB
Haskell
Raw Normal View History

module Hasura.RQL.DML.Delete
( validateDeleteQWith
, validateDeleteQ
2019-04-17 12:48:41 +03:00
, AnnDelG(..)
, traverseAnnDel
, AnnDel
, execDeleteQuery
, runDelete
) where
2018-06-27 16:11:32 +03:00
import Hasura.Prelude
import qualified Data.Environment as Env
import qualified Data.Sequence as DS
import qualified Database.PG.Query as Q
2018-06-27 16:11:32 +03:00
import Data.Aeson
import Instances.TH.Lift ()
2018-06-27 16:11:32 +03:00
import qualified Hasura.Backends.Postgres.SQL.DML as S
import qualified Hasura.Tracing as Tracing
2018-06-27 16:11:32 +03:00
import Hasura.Backends.Postgres.Connection
import Hasura.Backends.Postgres.Execute.Mutation
import Hasura.Backends.Postgres.Translate.Returning
import Hasura.EncJSON
2018-06-27 16:11:32 +03:00
import Hasura.RQL.DML.Internal
import Hasura.RQL.IR.Delete
2018-06-27 16:11:32 +03:00
import Hasura.RQL.Types
import Hasura.Server.Version (HasVersion)
2019-04-17 12:48:41 +03:00
2018-06-27 16:11:32 +03:00
validateDeleteQWith
:: (UserInfoM m, QErrM m, CacheRM m)
=> SessVarBldr 'Postgres m
-> (ColumnType 'Postgres -> Value -> m S.SQLExp)
2018-06-27 16:11:32 +03:00
-> DeleteQuery
-> m (AnnDel 'Postgres)
2019-04-17 12:48:41 +03:00
validateDeleteQWith sessVarBldr prepValBldr
(DeleteQuery tableName rqlBE mRetCols) = do
2018-06-27 16:11:32 +03:00
tableInfo <- askTabInfo tableName
let coreInfo = _tiCoreInfo tableInfo
2018-06-27 16:11:32 +03:00
-- If table is view then check if it deletable
mutableView tableName viIsDeletable
(_tciViewInfo coreInfo) "deletable"
2018-06-27 16:11:32 +03:00
-- Check if the role has delete permissions
delPerm <- askDelPermInfo tableInfo
-- Check if all dependent headers are present
validateHeaders $ dpiRequiredHeaders delPerm
-- Check if select is allowed
selPerm <- modifyErr (<> selNecessaryMsg) $
askSelPermInfo tableInfo
let fieldInfoMap = _tciFieldInfoMap coreInfo
allCols = getCols fieldInfoMap
2018-06-27 16:11:32 +03:00
-- convert the returning cols into sql returing exp
mAnnRetCols <- forM mRetCols $ \retCols ->
withPathK "returning" $ checkRetCols fieldInfoMap selPerm retCols
2018-06-27 16:11:32 +03:00
-- convert the where clause
annSQLBoolExp <- withPathK "where" $
2019-04-17 12:48:41 +03:00
convBoolExp fieldInfoMap selPerm rqlBE sessVarBldr prepValBldr
resolvedDelFltr <- convAnnBoolExpPartialSQL sessVarBldr $
dpiFilter delPerm
2018-06-27 16:11:32 +03:00
2019-04-17 12:48:41 +03:00
return $ AnnDel tableName
(resolvedDelFltr, annSQLBoolExp)
(mkDefaultMutFlds mAnnRetCols) allCols
2018-06-27 16:11:32 +03:00
where
selNecessaryMsg =
"; \"delete\" is only allowed if the role "
<> "has \"select\" permission as \"where\" can't be used "
<> "without \"select\" permission on the table"
validateDeleteQ
:: (QErrM m, UserInfoM m, CacheRM m)
=> DeleteQuery -> m (AnnDel 'Postgres, DS.Seq Q.PrepArg)
validateDeleteQ =
runDMLP1T . validateDeleteQWith sessVarFromCurrentSetting binRHSBuilder
2018-06-27 16:11:32 +03:00
runDelete
:: ( HasVersion, QErrM m, UserInfoM m, CacheRM m
, MonadTx m, HasSQLGenCtx m, MonadIO m
, Tracing.MonadTrace m
)
=> Env.Environment
-> DeleteQuery
-> m EncJSON
runDelete env q = do
strfyNum <- stringifyNum <$> askSQLGenCtx
validateDeleteQ q >>= execDeleteQuery env strfyNum Nothing