graphql-engine/server/src-lib/Hasura/RQL/DML/Delete.hs

107 lines
3.4 KiB
Haskell
Raw Normal View History

module Hasura.RQL.DML.Delete
( validateDeleteQWith
, validateDeleteQ
2019-04-17 12:48:41 +03:00
, AnnDelG(..)
, traverseAnnDel
, AnnDel
, execDeleteQuery
, runDelete
) where
2018-06-27 16:11:32 +03:00
import Hasura.Prelude
import qualified Data.Environment as Env
import qualified Data.Sequence as DS
import qualified Database.PG.Query as Q
import Control.Monad.Trans.Control (MonadBaseControl)
2018-06-27 16:11:32 +03:00
import Data.Aeson
import qualified Hasura.Backends.Postgres.SQL.DML as S
import qualified Hasura.Tracing as Tracing
2018-06-27 16:11:32 +03:00
import Hasura.Backends.Postgres.Connection
import Hasura.Backends.Postgres.Execute.Mutation
import Hasura.Backends.Postgres.Translate.Returning
import Hasura.EncJSON
2018-06-27 16:11:32 +03:00
import Hasura.RQL.DML.Internal
import Hasura.RQL.DML.Types
import Hasura.RQL.IR.Delete
2018-06-27 16:11:32 +03:00
import Hasura.RQL.Types
import Hasura.RQL.Types.Run
import Hasura.Server.Version (HasVersion)
2019-04-17 12:48:41 +03:00
2018-06-27 16:11:32 +03:00
validateDeleteQWith
:: (UserInfoM m, QErrM m, TableInfoRM 'Postgres m)
=> SessVarBldr 'Postgres m
-> (ColumnType 'Postgres -> Value -> m S.SQLExp)
2018-06-27 16:11:32 +03:00
-> DeleteQuery
-> m (AnnDel 'Postgres)
2019-04-17 12:48:41 +03:00
validateDeleteQWith sessVarBldr prepValBldr
(DeleteQuery tableName _ rqlBE mRetCols) = do
tableInfo <- askTabInfoSource tableName
let coreInfo = _tiCoreInfo tableInfo
2018-06-27 16:11:32 +03:00
-- If table is view then check if it deletable
mutableView tableName viIsDeletable
(_tciViewInfo coreInfo) "deletable"
2018-06-27 16:11:32 +03:00
-- Check if the role has delete permissions
delPerm <- askDelPermInfo tableInfo
-- Check if all dependent headers are present
validateHeaders $ dpiRequiredHeaders delPerm
-- Check if select is allowed
selPerm <- modifyErr (<> selNecessaryMsg) $
askSelPermInfo tableInfo
let fieldInfoMap = _tciFieldInfoMap coreInfo
allCols = getCols fieldInfoMap
2018-06-27 16:11:32 +03:00
-- convert the returning cols into sql returing exp
mAnnRetCols <- forM mRetCols $ \retCols ->
withPathK "returning" $ checkRetCols fieldInfoMap selPerm retCols
2018-06-27 16:11:32 +03:00
-- convert the where clause
annSQLBoolExp <- withPathK "where" $
2019-04-17 12:48:41 +03:00
convBoolExp fieldInfoMap selPerm rqlBE sessVarBldr prepValBldr
resolvedDelFltr <- convAnnBoolExpPartialSQL sessVarBldr $
dpiFilter delPerm
2018-06-27 16:11:32 +03:00
2019-04-17 12:48:41 +03:00
return $ AnnDel tableName
(resolvedDelFltr, annSQLBoolExp)
(mkDefaultMutFlds mAnnRetCols) allCols
2018-06-27 16:11:32 +03:00
where
selNecessaryMsg =
"; \"delete\" is only allowed if the role "
<> "has \"select\" permission as \"where\" can't be used "
<> "without \"select\" permission on the table"
validateDeleteQ
:: (QErrM m, UserInfoM m, CacheRM m)
=> DeleteQuery -> m (AnnDel 'Postgres, DS.Seq Q.PrepArg)
validateDeleteQ query = do
let source = doSource query
tableCache <- askTableCache source
flip runTableCacheRT (source, tableCache) $ runDMLP1T $
validateDeleteQWith sessVarFromCurrentSetting binRHSBuilder query
2018-06-27 16:11:32 +03:00
runDelete
:: ( HasVersion, QErrM m, UserInfoM m, CacheRM m
, HasSQLGenCtx m, MonadIO m
, Tracing.MonadTrace m, MonadBaseControl IO m
)
=> Env.Environment
-> DeleteQuery
-> m EncJSON
runDelete env q = do
sourceConfig <- _pcConfiguration <$> askPGSourceCache (doSource q)
strfyNum <- stringifyNum <$> askSQLGenCtx
validateDeleteQ q
>>= runQueryLazyTx (_pscExecCtx sourceConfig) Q.ReadWrite
. execDeleteQuery env strfyNum Nothing