mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-17 04:24:35 +03:00
caf9957aca
GraphQL types can refer to each other in a circular way. The PDV framework used to use values of type `Unique` to recognize two fragments of GraphQL schema as being the same instance. Internally, this is based on `Data.Unique` from the `base` package, which simply increases a counter on every creation of a `Unique` object. **NB**: The `Unique` values are _not_ used for knot tying the schema combinators themselves (i.e. `Parser`s). The knot tying for `Parser`s is purely based on keys provided to `memoizeOn`. The `Unique` values are _only_ used to recognize two pieces of GraphQL _schema_ as being identical. Originally, the idea was that this would help us with a perfectly correct identification of GraphQL types. But this fully correct equality checking of GraphQL types was never implemented, and does not seem to be necessary to prevent bugs. Specifically, these `Unique` values are stored as part of `data Definition a`, which specifies a part of our internal abstract syntax tree for the GraphQL types that we expose. The `Unique` values get initialized by the `SchemaT` effect. In #2894 and #2895, we are experimenting with how (parts of) the GraphQL types can be hidden behind certain permission predicates. This would allow a single GraphQL schema in memory to serve all roles, implementing #2711. The permission predicates get evaluated at query parsing time when we know what role is doing a certain request, thus outputting the correct GraphQL types for that role. If the approach of #2895 is followed, then the `Definition` objects, and thus the `Unique` values, would be hidden behind the permission predicates. Since the permission predicates are evaluated only after the schema is already supposed to be built, this means that the permission predicates would prevent us from initializing the `Unique` values, rendering them useless. The simplest remedy to this is to remove our usage of `Unique` altogether from the GraphQL schema and schema combinators. It doesn't serve a functional purpose, doesn't prevent bugs, and requires extra bookkeeping. PR-URL: https://github.com/hasura/graphql-engine-mono/pull/2980 GitOrigin-RevId: 50d3f9e0b9fbf578ac49c8fc773ba64a94b1f43d
493 lines
15 KiB
Haskell
493 lines
15 KiB
Haskell
{-# LANGUAGE UndecidableInstances #-}
|
||
{-# OPTIONS_GHC -fno-warn-orphans #-}
|
||
|
||
-- A module for postgres execution related types and operations
|
||
|
||
module Hasura.Backends.Postgres.Connection
|
||
( MonadTx (..),
|
||
runTx,
|
||
runTxWithCtx,
|
||
runQueryTx,
|
||
withUserInfo,
|
||
withTraceContext,
|
||
setHeadersTx,
|
||
setTraceContextInTx,
|
||
sessionInfoJsonExp,
|
||
checkDbConnection,
|
||
doesSchemaExist,
|
||
doesTableExist,
|
||
enablePgcryptoExtension,
|
||
dropHdbCatalogSchema,
|
||
PostgresPoolSettings (..),
|
||
PostgresSourceConnInfo (..),
|
||
PostgresConnConfiguration (..),
|
||
PGClientCerts (..),
|
||
CertVar (..),
|
||
CertData (..),
|
||
SSLMode (..),
|
||
DefaultPostgresPoolSettings (..),
|
||
getDefaultPGPoolSettingIfNotExists,
|
||
defaultPostgresPoolSettings,
|
||
setPostgresPoolSettings,
|
||
pccConnectionInfo,
|
||
pccReadReplicas,
|
||
psciDatabaseUrl,
|
||
psciPoolSettings,
|
||
psciUsePreparedStatements,
|
||
psciIsolationLevel,
|
||
psciSslConfiguration,
|
||
module ET,
|
||
)
|
||
where
|
||
|
||
import Control.Lens (makeLenses)
|
||
import Control.Monad.Morph (hoist)
|
||
import Control.Monad.Trans.Control (MonadBaseControl (..))
|
||
import Control.Monad.Validate
|
||
import Data.Aeson
|
||
import Data.Aeson.Casing (aesonDrop)
|
||
import Data.Aeson.Extended
|
||
import Data.Aeson.TH
|
||
import Data.Bifoldable
|
||
import Data.Bifunctor
|
||
import Data.Bitraversable
|
||
import Data.Char (toLower)
|
||
import Data.Either (isRight)
|
||
import Data.Hashable.Time ()
|
||
import Data.Semigroup (Max (..))
|
||
import Data.Text (unpack)
|
||
import Data.Text qualified as T
|
||
import Data.Time
|
||
import Database.PG.Query qualified as Q
|
||
import Database.PG.Query.Connection qualified as Q
|
||
import Hasura.Backends.Postgres.Execute.Types as ET
|
||
import Hasura.Backends.Postgres.SQL.DML qualified as S
|
||
import Hasura.Backends.Postgres.SQL.Types
|
||
import Hasura.Base.Error
|
||
import Hasura.Base.Instances ()
|
||
import Hasura.Incremental (Cacheable (..))
|
||
import Hasura.Prelude
|
||
import Hasura.RQL.Types.Common (UrlConf (..))
|
||
import Hasura.SQL.Types
|
||
import Hasura.Server.Utils (parseConnLifeTime, readIsoLevel)
|
||
import Hasura.Session
|
||
import Hasura.Tracing qualified as Tracing
|
||
import Test.QuickCheck.Instances.Semigroup ()
|
||
import Test.QuickCheck.Instances.Time ()
|
||
|
||
class (MonadError QErr m) => MonadTx m where
|
||
liftTx :: Q.TxE QErr a -> m a
|
||
|
||
instance (MonadTx m) => MonadTx (StateT s m) where
|
||
liftTx = lift . liftTx
|
||
|
||
instance (MonadTx m) => MonadTx (ReaderT s m) where
|
||
liftTx = lift . liftTx
|
||
|
||
instance (Monoid w, MonadTx m) => MonadTx (WriterT w m) where
|
||
liftTx = lift . liftTx
|
||
|
||
instance (MonadTx m) => MonadTx (ValidateT e m) where
|
||
liftTx = lift . liftTx
|
||
|
||
instance (MonadTx m) => MonadTx (Tracing.TraceT m) where
|
||
liftTx = lift . liftTx
|
||
|
||
instance (MonadIO m) => MonadTx (Q.TxET QErr m) where
|
||
liftTx = hoist liftIO
|
||
|
||
-- | Executes the given query in a transaction of the specified
|
||
-- mode, within the provided PGExecCtx.
|
||
runTx ::
|
||
( MonadIO m,
|
||
MonadBaseControl IO m
|
||
) =>
|
||
PGExecCtx ->
|
||
Q.TxAccess ->
|
||
Q.TxET QErr m a ->
|
||
ExceptT QErr m a
|
||
runTx pgExecCtx = \case
|
||
Q.ReadOnly -> _pecRunReadOnly pgExecCtx
|
||
Q.ReadWrite -> _pecRunReadWrite pgExecCtx
|
||
|
||
runTxWithCtx ::
|
||
( MonadIO m,
|
||
MonadBaseControl IO m,
|
||
MonadError QErr m,
|
||
Tracing.MonadTrace m,
|
||
UserInfoM m
|
||
) =>
|
||
PGExecCtx ->
|
||
Q.TxAccess ->
|
||
Q.TxET QErr m a ->
|
||
m a
|
||
runTxWithCtx pgExecCtx txAccess tx = do
|
||
traceCtx <- Tracing.currentContext
|
||
userInfo <- askUserInfo
|
||
liftEitherM $
|
||
runExceptT $
|
||
runTx pgExecCtx txAccess $
|
||
withTraceContext traceCtx $
|
||
withUserInfo userInfo tx
|
||
|
||
-- | This runs the given set of statements (Tx) without wrapping them in BEGIN
|
||
-- and COMMIT. This should only be used for running a single statement query!
|
||
runQueryTx ::
|
||
( MonadIO m,
|
||
MonadError QErr m
|
||
) =>
|
||
PGExecCtx ->
|
||
Q.TxET QErr IO a ->
|
||
m a
|
||
runQueryTx pgExecCtx tx =
|
||
liftEither =<< liftIO (runExceptT $ _pecRunReadNoTx pgExecCtx tx)
|
||
|
||
setHeadersTx :: (MonadIO m) => SessionVariables -> Q.TxET QErr m ()
|
||
setHeadersTx session = do
|
||
Q.unitQE defaultTxErrorHandler setSess () False
|
||
where
|
||
setSess =
|
||
Q.fromText $
|
||
"SET LOCAL \"hasura.user\" = " <> toSQLTxt (sessionInfoJsonExp session)
|
||
|
||
sessionInfoJsonExp :: SessionVariables -> S.SQLExp
|
||
sessionInfoJsonExp = S.SELit . encodeToStrictText
|
||
|
||
withUserInfo :: (MonadIO m) => UserInfo -> Q.TxET QErr m a -> Q.TxET QErr m a
|
||
withUserInfo uInfo tx = setHeadersTx (_uiSession uInfo) >> tx
|
||
|
||
setTraceContextInTx :: (MonadIO m) => Tracing.TraceContext -> Q.TxET QErr m ()
|
||
setTraceContextInTx traceCtx = Q.unitQE defaultTxErrorHandler sql () False
|
||
where
|
||
sql =
|
||
Q.fromText $
|
||
"SET LOCAL \"hasura.tracecontext\" = "
|
||
<> toSQLTxt (S.SELit . encodeToStrictText . Tracing.injectEventContext $ traceCtx)
|
||
|
||
-- | Inject the trace context as a transaction-local variable,
|
||
-- so that it can be picked up by any triggers (including event triggers).
|
||
withTraceContext ::
|
||
(MonadIO m) =>
|
||
Tracing.TraceContext ->
|
||
Q.TxET QErr m a ->
|
||
Q.TxET QErr m a
|
||
withTraceContext ctx tx = setTraceContextInTx ctx >> tx
|
||
|
||
deriving instance Tracing.MonadTrace m => Tracing.MonadTrace (Q.TxET e m)
|
||
|
||
checkDbConnection :: MonadIO m => Q.PGPool -> m Bool
|
||
checkDbConnection pool = do
|
||
e <- liftIO $ runExceptT $ Q.runTx' pool select1Query
|
||
pure $ isRight e
|
||
where
|
||
select1Query :: Q.TxE QErr Int
|
||
select1Query =
|
||
runIdentity . Q.getRow
|
||
<$> Q.withQE defaultTxErrorHandler [Q.sql| SELECT 1 |] () False
|
||
|
||
doesSchemaExist :: MonadTx m => SchemaName -> m Bool
|
||
doesSchemaExist schemaName =
|
||
liftTx $
|
||
(runIdentity . Q.getRow)
|
||
<$> Q.withQE
|
||
defaultTxErrorHandler
|
||
[Q.sql|
|
||
SELECT EXISTS
|
||
( SELECT 1 FROM information_schema.schemata
|
||
WHERE schema_name = $1
|
||
) |]
|
||
(Identity schemaName)
|
||
False
|
||
|
||
doesTableExist :: MonadTx m => SchemaName -> TableName -> m Bool
|
||
doesTableExist schemaName tableName =
|
||
liftTx $
|
||
(runIdentity . Q.getRow)
|
||
<$> Q.withQE
|
||
defaultTxErrorHandler
|
||
[Q.sql|
|
||
SELECT EXISTS
|
||
( SELECT 1 FROM pg_tables
|
||
WHERE schemaname = $1 AND tablename = $2
|
||
) |]
|
||
(schemaName, tableName)
|
||
False
|
||
|
||
isExtensionAvailable :: MonadTx m => Text -> m Bool
|
||
isExtensionAvailable extensionName =
|
||
liftTx $
|
||
(runIdentity . Q.getRow)
|
||
<$> Q.withQE
|
||
defaultTxErrorHandler
|
||
[Q.sql|
|
||
SELECT EXISTS
|
||
( SELECT 1 FROM pg_catalog.pg_available_extensions
|
||
WHERE name = $1
|
||
) |]
|
||
(Identity extensionName)
|
||
False
|
||
|
||
enablePgcryptoExtension :: forall m. MonadTx m => m ()
|
||
enablePgcryptoExtension = do
|
||
pgcryptoAvailable <- isExtensionAvailable "pgcrypto"
|
||
if pgcryptoAvailable
|
||
then createPgcryptoExtension
|
||
else
|
||
throw400 Unexpected $
|
||
"pgcrypto extension is required, but could not find the extension in the "
|
||
<> "PostgreSQL server. Please make sure this extension is available."
|
||
where
|
||
createPgcryptoExtension :: m ()
|
||
createPgcryptoExtension =
|
||
liftTx $
|
||
Q.unitQE
|
||
needsPGCryptoError
|
||
"CREATE EXTENSION IF NOT EXISTS pgcrypto SCHEMA public"
|
||
()
|
||
False
|
||
where
|
||
needsPGCryptoError e@(Q.PGTxErr _ _ _ err) =
|
||
case err of
|
||
Q.PGIUnexpected _ -> requiredError
|
||
Q.PGIStatement pgErr -> case Q.edStatusCode pgErr of
|
||
Just "42501" -> err500 PostgresError permissionsMessage
|
||
_ -> requiredError
|
||
where
|
||
requiredError =
|
||
(err500 PostgresError requiredMessage) {qeInternal = Just $ ExtraInternal $ toJSON e}
|
||
requiredMessage =
|
||
"pgcrypto extension is required, but it could not be created;"
|
||
<> " encountered unknown postgres error"
|
||
permissionsMessage =
|
||
"pgcrypto extension is required, but the current user doesn’t have permission to"
|
||
<> " create it. Please grant superuser permission, or setup the initial schema via"
|
||
<> " https://hasura.io/docs/latest/graphql/core/deployment/postgres-permissions.html"
|
||
|
||
dropHdbCatalogSchema :: (MonadTx m) => m ()
|
||
dropHdbCatalogSchema =
|
||
liftTx $
|
||
Q.catchE defaultTxErrorHandler $
|
||
-- This is where
|
||
-- 1. Metadata storage:- Metadata and its stateful information stored
|
||
-- 2. Postgres source:- Table event trigger related stuff & insert permission check function stored
|
||
Q.unitQ "DROP SCHEMA IF EXISTS hdb_catalog CASCADE" () False
|
||
|
||
data PostgresPoolSettings = PostgresPoolSettings
|
||
{ _ppsMaxConnections :: !(Maybe Int),
|
||
_ppsIdleTimeout :: !(Maybe Int),
|
||
_ppsRetries :: !(Maybe Int),
|
||
_ppsPoolTimeout :: !(Maybe NominalDiffTime),
|
||
_ppsConnectionLifetime :: !(Maybe NominalDiffTime)
|
||
}
|
||
deriving (Show, Eq, Generic)
|
||
|
||
instance Cacheable PostgresPoolSettings
|
||
|
||
instance Hashable PostgresPoolSettings
|
||
|
||
instance NFData PostgresPoolSettings
|
||
|
||
$(deriveToJSON hasuraJSON {omitNothingFields = True} ''PostgresPoolSettings)
|
||
|
||
instance FromJSON PostgresPoolSettings where
|
||
parseJSON = withObject "PostgresPoolSettings" $ \o ->
|
||
PostgresPoolSettings
|
||
<$> o .:? "max_connections"
|
||
<*> o .:? "idle_timeout"
|
||
<*> o .:? "retries"
|
||
<*> o .:? "pool_timeout"
|
||
<*> ((o .:? "connection_lifetime") <&> parseConnLifeTime)
|
||
|
||
data DefaultPostgresPoolSettings = DefaultPostgresPoolSettings
|
||
{ _dppsMaxConnections :: !Int,
|
||
_dppsIdleTimeout :: !Int,
|
||
_dppsRetries :: !Int,
|
||
_dppsConnectionLifetime :: !(Maybe NominalDiffTime)
|
||
}
|
||
deriving (Show, Eq)
|
||
|
||
defaultPostgresPoolSettings :: DefaultPostgresPoolSettings
|
||
defaultPostgresPoolSettings = DefaultPostgresPoolSettings 50 180 1 (Just 600)
|
||
|
||
-- Use this when you want to set only few of the PG Pool settings.
|
||
-- The values which are not set will use the default values.
|
||
setPostgresPoolSettings :: PostgresPoolSettings
|
||
setPostgresPoolSettings =
|
||
PostgresPoolSettings
|
||
{ _ppsMaxConnections = (Just $ _dppsMaxConnections defaultPostgresPoolSettings),
|
||
_ppsIdleTimeout = (Just $ _dppsIdleTimeout defaultPostgresPoolSettings),
|
||
_ppsRetries = (Just $ _dppsRetries defaultPostgresPoolSettings),
|
||
_ppsPoolTimeout = Nothing, -- @Nothing@ is the default value of the pool timeout
|
||
_ppsConnectionLifetime = _dppsConnectionLifetime defaultPostgresPoolSettings
|
||
}
|
||
|
||
-- PG Pool Settings are not given by the user, set defaults
|
||
getDefaultPGPoolSettingIfNotExists :: Maybe PostgresPoolSettings -> DefaultPostgresPoolSettings -> (Int, Int, Int)
|
||
getDefaultPGPoolSettingIfNotExists connSettings defaultPgPoolSettings =
|
||
case connSettings of
|
||
-- Atleast one of the postgres pool settings is set, then set default values to other settings
|
||
Just connSettings' ->
|
||
(maxConnections connSettings', idleTimeout connSettings', retries connSettings')
|
||
-- No PG Pool settings provided by user, set default values for all
|
||
Nothing -> (defMaxConnections, defIdleTimeout, defRetries)
|
||
where
|
||
defMaxConnections = _dppsMaxConnections defaultPgPoolSettings
|
||
defIdleTimeout = _dppsIdleTimeout defaultPgPoolSettings
|
||
defRetries = _dppsRetries defaultPgPoolSettings
|
||
|
||
maxConnections = fromMaybe defMaxConnections . _ppsMaxConnections
|
||
idleTimeout = fromMaybe defIdleTimeout . _ppsIdleTimeout
|
||
retries = fromMaybe defRetries . _ppsRetries
|
||
|
||
data SSLMode
|
||
= Disable
|
||
| Allow
|
||
| Prefer
|
||
| Require
|
||
| VerifyCA
|
||
| VerifyFull
|
||
deriving (Eq, Ord, Generic, Enum, Bounded)
|
||
|
||
instance Cacheable SSLMode
|
||
|
||
instance Hashable SSLMode
|
||
|
||
instance NFData SSLMode
|
||
|
||
instance Show SSLMode where
|
||
show = \case
|
||
Disable -> "disable"
|
||
Allow -> "allow"
|
||
Prefer -> "prefer"
|
||
Require -> "require"
|
||
VerifyCA -> "verify-ca"
|
||
VerifyFull -> "verify-full"
|
||
|
||
deriving via (Max SSLMode) instance Semigroup SSLMode
|
||
|
||
instance FromJSON SSLMode where
|
||
parseJSON = withText "SSLMode" $ \case
|
||
"disable" -> pure Disable
|
||
"allow" -> pure Allow
|
||
"prefer" -> pure Prefer
|
||
"require" -> pure Require
|
||
"verify-ca" -> pure VerifyCA
|
||
"verify-full" -> pure VerifyFull
|
||
err -> fail $ "Invalid SSL Mode " <> unpack err
|
||
|
||
data CertVar
|
||
= CertVar String
|
||
| CertLiteral String
|
||
deriving (Show, Eq, Generic)
|
||
|
||
instance Cacheable CertVar
|
||
|
||
instance Hashable CertVar
|
||
|
||
instance NFData CertVar
|
||
|
||
instance ToJSON CertVar where
|
||
toJSON (CertVar var) = (object ["from_env" .= var])
|
||
toJSON (CertLiteral var) = String (T.pack var)
|
||
|
||
instance FromJSON CertVar where
|
||
parseJSON (String s) = pure (CertLiteral (T.unpack s))
|
||
parseJSON x = withObject "CertVar" (\o -> CertVar <$> o .: "from_env") x
|
||
|
||
newtype CertData = CertData {unCert :: Text}
|
||
deriving (Show, Eq, Generic)
|
||
|
||
instance ToJSON CertData where
|
||
toJSON = String . unCert
|
||
|
||
data PGClientCerts p a = PGClientCerts
|
||
{ pgcSslCert :: a,
|
||
pgcSslKey :: a,
|
||
pgcSslRootCert :: a,
|
||
pgcSslMode :: SSLMode,
|
||
pgcSslPassword :: Maybe p
|
||
}
|
||
deriving (Show, Eq, Generic, Functor, Foldable, Traversable)
|
||
|
||
$(deriveFromJSON (aesonDrop 3 (fmap toLower)) ''PGClientCerts)
|
||
$(deriveToJSON (aesonDrop 3 (fmap toLower)) ''PGClientCerts)
|
||
|
||
instance Bifunctor PGClientCerts where
|
||
bimap f g pgCerts = g <$> pgCerts {pgcSslPassword = f <$> (pgcSslPassword pgCerts)}
|
||
|
||
instance Bifoldable PGClientCerts where
|
||
bifoldMap f g PGClientCerts {..} =
|
||
fold $ fmap g [pgcSslCert, pgcSslKey, pgcSslRootCert] <> maybe [] (pure . f) pgcSslPassword
|
||
|
||
instance Bitraversable PGClientCerts where
|
||
bitraverse f g PGClientCerts {..} =
|
||
PGClientCerts <$> g pgcSslCert <*> g pgcSslKey <*> g pgcSslRootCert <*> pure pgcSslMode <*> traverse f pgcSslPassword
|
||
|
||
instance (Cacheable p, Cacheable a) => Cacheable (PGClientCerts p a)
|
||
|
||
instance (Hashable p, Hashable a) => Hashable (PGClientCerts p a)
|
||
|
||
instance (NFData p, NFData a) => NFData (PGClientCerts p a)
|
||
|
||
instance ToJSON SSLMode where
|
||
toJSON = String . tshow
|
||
|
||
deriving instance Generic Q.TxIsolation
|
||
|
||
instance Cacheable Q.TxIsolation
|
||
|
||
instance NFData Q.TxIsolation
|
||
|
||
instance Hashable Q.TxIsolation
|
||
|
||
instance FromJSON Q.TxIsolation where
|
||
parseJSON = withText "Q.TxIsolation" $ \t ->
|
||
onLeft (readIsoLevel $ T.unpack t) fail
|
||
|
||
instance ToJSON Q.TxIsolation where
|
||
toJSON Q.ReadCommitted = "read-committed"
|
||
toJSON Q.RepeatableRead = "repeatable-read"
|
||
toJSON Q.Serializable = "serializable"
|
||
|
||
data PostgresSourceConnInfo = PostgresSourceConnInfo
|
||
{ _psciDatabaseUrl :: !UrlConf,
|
||
_psciPoolSettings :: !(Maybe PostgresPoolSettings),
|
||
_psciUsePreparedStatements :: !Bool,
|
||
_psciIsolationLevel :: !Q.TxIsolation,
|
||
_psciSslConfiguration :: !(Maybe (PGClientCerts CertVar CertVar))
|
||
}
|
||
deriving (Show, Eq, Generic)
|
||
|
||
instance Cacheable PostgresSourceConnInfo
|
||
|
||
instance Hashable PostgresSourceConnInfo
|
||
|
||
instance NFData PostgresSourceConnInfo
|
||
|
||
$(deriveToJSON hasuraJSON {omitNothingFields = True} ''PostgresSourceConnInfo)
|
||
$(makeLenses ''PostgresSourceConnInfo)
|
||
|
||
instance FromJSON PostgresSourceConnInfo where
|
||
parseJSON = withObject "PostgresSourceConnInfo" $ \o ->
|
||
PostgresSourceConnInfo
|
||
<$> o .: "database_url"
|
||
<*> o .:? "pool_settings"
|
||
<*> o .:? "use_prepared_statements" .!= False -- By default, preparing statements is OFF for postgres source
|
||
<*> o .:? "isolation_level" .!= Q.ReadCommitted
|
||
<*> o .:? "ssl_configuration"
|
||
|
||
data PostgresConnConfiguration = PostgresConnConfiguration
|
||
{ _pccConnectionInfo :: !PostgresSourceConnInfo,
|
||
_pccReadReplicas :: !(Maybe (NonEmpty PostgresSourceConnInfo))
|
||
}
|
||
deriving (Show, Eq, Generic)
|
||
|
||
instance Cacheable PostgresConnConfiguration
|
||
|
||
instance Hashable PostgresConnConfiguration
|
||
|
||
instance NFData PostgresConnConfiguration
|
||
|
||
$(deriveJSON hasuraJSON {omitNothingFields = True} ''PostgresConnConfiguration)
|
||
$(makeLenses ''PostgresConnConfiguration)
|