{-# LANGUAGE UndecidableInstances #-} -- | Define and handle v1/metadata API operations to track, untrack, and get logical models. module Hasura.LogicalModel.API ( GetLogicalModel (..), TrackLogicalModel (..), UntrackLogicalModel (..), runGetLogicalModel, runTrackLogicalModel, runUntrackLogicalModel, dropLogicalModelInMetadata, CreateLogicalModelPermission (..), DropLogicalModelPermission (..), runCreateSelectLogicalModelPermission, runDropSelectLogicalModelPermission, getCustomTypes, module Hasura.LogicalModel.Types, ) where import Autodocodec (HasCodec) import Autodocodec qualified as AC import Control.Lens (Traversal', has, preview, traversed, (^..), (^?)) import Data.Aeson import Data.HashMap.Strict.InsOrd.Extended qualified as InsOrdHashMap import Data.Text.Extended (toTxt, (<<>)) import Hasura.Base.Error import Hasura.EncJSON import Hasura.LogicalModel.Metadata (LogicalModelMetadata (..), lmmSelectPermissions) import Hasura.LogicalModel.Types (LogicalModelField, LogicalModelName, logicalModelFieldMapCodec) import Hasura.NativeQuery.Metadata (NativeQueryMetadata (..)) import Hasura.Prelude import Hasura.RQL.Types.Backend (Backend (..)) import Hasura.RQL.Types.BackendTag (backendPrefix) import Hasura.RQL.Types.BackendType import Hasura.RQL.Types.Common (SourceName, defaultSource, sourceNameToText, successMsg) import Hasura.RQL.Types.Metadata import Hasura.RQL.Types.Metadata.Backend import Hasura.RQL.Types.Metadata.Object import Hasura.RQL.Types.Permission (PermDef (_pdRole), SelPerm) import Hasura.RQL.Types.Roles (RoleName) import Hasura.RQL.Types.SchemaCache.Build import Hasura.SQL.AnyBackend qualified as AB import Hasura.Server.Init.FeatureFlag (HasFeatureFlagChecker (..)) import Hasura.Server.Init.FeatureFlag qualified as FF -- | Default implementation of the 'track_logical_model' request payload. data TrackLogicalModel (b :: BackendType) = TrackLogicalModel { tlmSource :: SourceName, tlmName :: LogicalModelName, tlmDescription :: Maybe Text, tlmFields :: InsOrdHashMap.InsOrdHashMap (Column b) (LogicalModelField b) } instance (Backend b) => HasCodec (TrackLogicalModel b) where codec = AC.CommentCodec ("A request to track a logical model") $ AC.object (backendPrefix @b <> "TrackLogicalModel") $ TrackLogicalModel <$> AC.requiredField "source" sourceDoc AC..= tlmSource <*> AC.requiredField "name" nameDoc AC..= tlmName <*> AC.optionalField "description" descriptionDoc AC..= tlmDescription <*> AC.requiredFieldWith "fields" logicalModelFieldMapCodec fieldsDoc AC..= tlmFields where sourceDoc = "The source in which this logical model should be tracked" nameDoc = "Root field name for the logical model" fieldsDoc = "Return type of the expression" descriptionDoc = "A description of the query which appears in the graphql schema" deriving via (AC.Autodocodec (TrackLogicalModel b)) instance (Backend b) => FromJSON (TrackLogicalModel b) deriving via (AC.Autodocodec (TrackLogicalModel b)) instance (Backend b) => ToJSON (TrackLogicalModel b) -- | Validate a logical model and extract the logical model info from the request. logicalModelTrackToMetadata :: forall b. TrackLogicalModel b -> LogicalModelMetadata b logicalModelTrackToMetadata TrackLogicalModel {..} = LogicalModelMetadata { _lmmName = tlmName, _lmmFields = tlmFields, _lmmSelectPermissions = mempty, _lmmDescription = tlmDescription } -- | API payload for the 'get_logical_model' endpoint. data GetLogicalModel (b :: BackendType) = GetLogicalModel { glmSource :: SourceName } deriving instance Backend b => Show (GetLogicalModel b) deriving instance Backend b => Eq (GetLogicalModel b) instance Backend b => FromJSON (GetLogicalModel b) where parseJSON = withObject "GetLogicalModel" $ \o -> do glmSource <- o .: "source" pure GetLogicalModel {..} instance Backend b => ToJSON (GetLogicalModel b) where toJSON GetLogicalModel {..} = object [ "source" .= glmSource ] -- | Handler for the 'get_logical_model' endpoint. runGetLogicalModel :: forall b m. ( BackendMetadata b, MetadataM m, HasFeatureFlagChecker m, MonadError QErr m ) => GetLogicalModel b -> m EncJSON runGetLogicalModel q = do throwIfFeatureDisabled metadata <- getMetadata let logicalModels :: Maybe (LogicalModels b) logicalModels = metadata ^? getCustomTypes (glmSource q) pure (encJFromJValue (InsOrdHashMap.elems <$> logicalModels)) getCustomTypes :: forall b. (Backend b) => SourceName -> Traversal' Metadata (LogicalModels b) getCustomTypes sourceName = metaSources . ix sourceName . toSourceMetadata . smLogicalModels @b -- | Handler for the 'track_logical_model' endpoint. The type 'TrackLogicalModel b' -- (appearing here in wrapped as 'BackendTrackLogicalModel b' for 'AnyBackend' -- compatibility) is defined in 'class LogicalModelMetadata'. runTrackLogicalModel :: forall b m. ( BackendMetadata b, CacheRWM m, MetadataM m, MonadError QErr m, HasFeatureFlagChecker m ) => TrackLogicalModel b -> m EncJSON runTrackLogicalModel trackLogicalModelRequest = do throwIfFeatureDisabled sourceMetadata <- maybe (throw400 NotFound $ "Source " <> sourceNameToText source <> " not found.") pure . preview (metaSources . ix source . toSourceMetadata @b) =<< getMetadata let (metadata :: LogicalModelMetadata b) = logicalModelTrackToMetadata trackLogicalModelRequest let fieldName = _lmmName metadata metadataObj = MOSourceObjId source $ AB.mkAnyBackend $ SMOLogicalModel @b fieldName existingLogicalModels = InsOrdHashMap.keys (_smLogicalModels sourceMetadata) when (fieldName `elem` existingLogicalModels) do throw400 AlreadyTracked $ "Logical model '" <> toTxt fieldName <> "' is already tracked." buildSchemaCacheFor metadataObj $ MetadataModifier $ (metaSources . ix source . toSourceMetadata @b . smLogicalModels) %~ InsOrdHashMap.insert fieldName metadata pure successMsg where source = tlmSource trackLogicalModelRequest -- | API payload for the 'untrack_logical_model' endpoint. data UntrackLogicalModel (b :: BackendType) = UntrackLogicalModel { utlmSource :: SourceName, utlmName :: LogicalModelName } deriving instance Show (UntrackLogicalModel b) deriving instance Eq (UntrackLogicalModel b) instance FromJSON (UntrackLogicalModel b) where parseJSON = withObject "UntrackLogicalModel" $ \o -> do utlmSource <- o .: "source" utlmName <- o .: "name" pure UntrackLogicalModel {..} instance ToJSON (UntrackLogicalModel b) where toJSON UntrackLogicalModel {..} = object [ "source" .= utlmSource, "name" .= utlmName ] -- | Handler for the 'untrack_logical_model' endpoint. runUntrackLogicalModel :: forall b m. ( BackendMetadata b, MonadError QErr m, CacheRWM m, MetadataM m ) => UntrackLogicalModel b -> m EncJSON runUntrackLogicalModel q = do -- we do not check for feature flag here as we always want users to be able -- to remove logical models if they'd like assertLogicalModelExists @b source fieldName let metadataObj = MOSourceObjId source $ AB.mkAnyBackend $ SMOLogicalModel @b fieldName metadata <- getMetadata let nativeQueries :: [NativeQueryMetadata b] nativeQueries = metadata ^.. metaSources . ix source . toSourceMetadata @b . smNativeQueries . traversed case find ((== fieldName) . _nqmReturns) nativeQueries of Just NativeQueryMetadata {_nqmRootFieldName} -> throw400 ConstraintViolation $ "Logical model " <> fieldName <<> " still being used by native query " <> _nqmRootFieldName <<> "." Nothing -> pure () buildSchemaCacheFor metadataObj $ dropLogicalModelInMetadata @b source fieldName pure successMsg where source = utlmSource q fieldName = utlmName q -- | A permission for logical models is tied to a specific name and -- source. This wrapper adds both of those things to the JSON object that -- describes the permission. data CreateLogicalModelPermission a (b :: BackendType) = CreateLogicalModelPermission { clmpSource :: SourceName, clmpName :: LogicalModelName, clmpInfo :: PermDef b a } deriving stock (Generic) instance FromJSON (PermDef b a) => FromJSON (CreateLogicalModelPermission a b) where parseJSON = withObject "CreateLogicalModelPermission" \obj -> do clmpSource <- obj .:? "source" .!= defaultSource clmpName <- obj .: "name" clmpInfo <- parseJSON (Object obj) pure CreateLogicalModelPermission {..} runCreateSelectLogicalModelPermission :: forall b m. (Backend b, CacheRWM m, MetadataM m, MonadError QErr m, HasFeatureFlagChecker m) => CreateLogicalModelPermission SelPerm b -> m EncJSON runCreateSelectLogicalModelPermission CreateLogicalModelPermission {..} = do throwIfFeatureDisabled assertLogicalModelExists @b clmpSource clmpName let metadataObj :: MetadataObjId metadataObj = MOSourceObjId clmpSource $ AB.mkAnyBackend $ SMOLogicalModel @b clmpName buildSchemaCacheFor metadataObj $ MetadataModifier $ logicalModelMetadataSetter @b clmpSource clmpName . lmmSelectPermissions %~ InsOrdHashMap.insert (_pdRole clmpInfo) clmpInfo pure successMsg -- | To drop a permission, we need to know the source and name of -- the logical model, as well as the role whose permission we want to drop. data DropLogicalModelPermission (b :: BackendType) = DropLogicalModelPermission { dlmpSource :: SourceName, dlmpName :: LogicalModelName, dlmpRole :: RoleName } deriving stock (Generic) instance FromJSON (DropLogicalModelPermission b) where parseJSON = withObject "DropLogicalModelPermission" \obj -> do dlmpSource <- obj .:? "source" .!= defaultSource dlmpName <- obj .: "name" dlmpRole <- obj .: "role" pure DropLogicalModelPermission {..} runDropSelectLogicalModelPermission :: forall b m. (Backend b, CacheRWM m, MetadataM m, MonadError QErr m, HasFeatureFlagChecker m) => DropLogicalModelPermission b -> m EncJSON runDropSelectLogicalModelPermission DropLogicalModelPermission {..} = do throwIfFeatureDisabled assertLogicalModelExists @b dlmpSource dlmpName let metadataObj :: MetadataObjId metadataObj = MOSourceObjId dlmpSource $ AB.mkAnyBackend $ SMOLogicalModel @b dlmpName buildSchemaCacheFor metadataObj $ MetadataModifier $ logicalModelMetadataSetter @b dlmpSource dlmpName . lmmSelectPermissions %~ InsOrdHashMap.delete dlmpRole pure successMsg -- | TODO: should this cascade and also delete associated permissions? dropLogicalModelInMetadata :: forall b. BackendMetadata b => SourceName -> LogicalModelName -> MetadataModifier dropLogicalModelInMetadata source name = do MetadataModifier $ metaSources . ix source . toSourceMetadata @b . smLogicalModels %~ InsOrdHashMap.delete name -- | check feature flag is enabled before carrying out any actions throwIfFeatureDisabled :: (HasFeatureFlagChecker m, MonadError QErr m) => m () throwIfFeatureDisabled = do enableLogicalModels <- checkFlag FF.nativeQueryInterface unless enableLogicalModels $ throw500 "LogicalModels is disabled!" -- | Check whether a logical model with the given root field name exists for -- the given source. assertLogicalModelExists :: forall b m. (Backend b, MetadataM m, MonadError QErr m) => SourceName -> LogicalModelName -> m () assertLogicalModelExists sourceName name = do metadata <- getMetadata let sourceMetadataTraversal :: Traversal' Metadata (SourceMetadata b) sourceMetadataTraversal = metaSources . ix sourceName . toSourceMetadata @b sourceMetadata <- preview sourceMetadataTraversal metadata `onNothing` throw400 NotFound ("Source " <> sourceName <<> " not found.") let desiredLogicalModel :: Traversal' (SourceMetadata b) (LogicalModelMetadata b) desiredLogicalModel = smLogicalModels . ix name unless (has desiredLogicalModel sourceMetadata) do throw400 NotFound ("Logical model " <> name <<> " not found in source " <> sourceName <<> ".")