mirror of
https://github.com/hasura/graphql-engine.git
synced 2024-12-17 04:24:35 +03:00
e8e4f30dd6
Remote relationships are now supported on SQL Server and BigQuery. The major change though is the re-architecture of remote join execution logic. Prior to this PR, each backend is responsible for processing the remote relationships that are part of their AST. This is not ideal as there is nothing specific about a remote join's execution that ties it to a backend. The only backend specific part is whether or not the specification of the remote relationship is valid (i.e, we'll need to validate whether the scalars are compatible). The approach now changes to this: 1. Before delegating the AST to the backend, we traverse the AST, collect all the remote joins while modifying the AST to add necessary join fields where needed. 1. Once the remote joins are collected from the AST, the database call is made to fetch the response. The necessary data for the remote join(s) is collected from the database's response and one or more remote schema calls are constructed as necessary. 1. The remote schema calls are then executed and the data from the database and from the remote schemas is joined to produce the final response. ### Known issues 1. Ideally the traversal of the IR to collect remote joins should return an AST which does not include remote join fields. This operation can be type safe but isn't taken up as part of the PR. 1. There is a lot of code duplication between `Transport/HTTP.hs` and `Transport/Websocket.hs` which needs to be fixed ASAP. This too hasn't been taken up by this PR. 1. The type which represents the execution plan is only modified to handle our current remote joins and as such it will have to be changed to accommodate general remote joins. 1. Use of lenses would have reduced the boilerplate code to collect remote joins from the base AST. 1. The current remote join logic assumes that the join columns of a remote relationship appear with their names in the database response. This however is incorrect as they could be aliased. This can be taken up by anyone, I've left a comment in the code. ### Notes to the reviewers I think it is best reviewed commit by commit. 1. The first one is very straight forward. 1. The second one refactors the remote join execution logic but other than moving things around, it doesn't change the user facing functionality. This moves Postgres specific parts to `Backends/Postgres` module from `Execute`. Some IR related code to `Hasura.RQL.IR` module. Simplifies various type class function signatures as a backend doesn't have to handle remote joins anymore 1. The third one fixes partial case matches that for some weird reason weren't shown as warnings before this refactor 1. The fourth one generalizes the validation logic of remote relationships and implements `scalarTypeGraphQLName` function on SQL Server and BigQuery which is used by the validation logic. This enables remote relationships on BigQuery and SQL Server. https://github.com/hasura/graphql-engine-mono/pull/1497 GitOrigin-RevId: 77dd8eed326602b16e9a8496f52f46d22b795598
201 lines
6.9 KiB
Haskell
201 lines
6.9 KiB
Haskell
module Hasura.RQL.DML.Update
|
|
( runUpdate
|
|
) where
|
|
|
|
import Hasura.Prelude
|
|
|
|
import qualified Data.HashMap.Strict as M
|
|
import qualified Data.Sequence as DS
|
|
import qualified Database.PG.Query as Q
|
|
|
|
import Control.Monad.Trans.Control (MonadBaseControl)
|
|
import Data.Aeson.Types
|
|
import Data.Text.Extended
|
|
|
|
import qualified Hasura.Backends.Postgres.SQL.DML as S
|
|
import qualified Hasura.Tracing as Tracing
|
|
|
|
import Hasura.Backends.Postgres.Connection
|
|
import Hasura.Backends.Postgres.Execute.Mutation
|
|
import Hasura.Backends.Postgres.SQL.Types
|
|
import Hasura.Backends.Postgres.Translate.Returning
|
|
import Hasura.Backends.Postgres.Types.Table
|
|
import Hasura.Base.Error
|
|
import Hasura.EncJSON
|
|
import Hasura.RQL.DML.Internal
|
|
import Hasura.RQL.DML.Types
|
|
import Hasura.RQL.IR.BoolExp
|
|
import Hasura.RQL.IR.Update
|
|
import Hasura.RQL.Types
|
|
import Hasura.RQL.Types.Run
|
|
import Hasura.SQL.Types
|
|
import Hasura.Session
|
|
|
|
|
|
convInc
|
|
:: (QErrM m)
|
|
=> ValueParser ('Postgres 'Vanilla) m S.SQLExp
|
|
-> PGCol
|
|
-> ColumnType ('Postgres 'Vanilla)
|
|
-> Value
|
|
-> m (PGCol, S.SQLExp)
|
|
convInc f col colType val = do
|
|
prepExp <- f (CollectableTypeScalar colType) val
|
|
return (col, S.SEOpApp S.incOp [S.mkSIdenExp col, prepExp])
|
|
|
|
convMul
|
|
:: (QErrM m)
|
|
=> ValueParser ('Postgres 'Vanilla) m S.SQLExp
|
|
-> PGCol
|
|
-> ColumnType ('Postgres 'Vanilla)
|
|
-> Value
|
|
-> m (PGCol, S.SQLExp)
|
|
convMul f col colType val = do
|
|
prepExp <- f (CollectableTypeScalar colType) val
|
|
return (col, S.SEOpApp S.mulOp [S.mkSIdenExp col, prepExp])
|
|
|
|
convSet
|
|
:: (QErrM m)
|
|
=> ValueParser ('Postgres 'Vanilla) m S.SQLExp
|
|
-> PGCol
|
|
-> ColumnType ('Postgres 'Vanilla)
|
|
-> Value
|
|
-> m (PGCol, S.SQLExp)
|
|
convSet f col colType val = do
|
|
prepExp <- f (CollectableTypeScalar colType) val
|
|
return (col, prepExp)
|
|
|
|
convDefault :: (Monad m) => PGCol -> ColumnType ('Postgres 'Vanilla) -> () -> m (PGCol, S.SQLExp)
|
|
convDefault col _ _ = return (col, S.SEUnsafe "DEFAULT")
|
|
|
|
convOp
|
|
:: (UserInfoM m, QErrM m)
|
|
=> FieldInfoMap (FieldInfo ('Postgres 'Vanilla))
|
|
-> [PGCol]
|
|
-> UpdPermInfo ('Postgres 'Vanilla)
|
|
-> [(PGCol, a)]
|
|
-> (PGCol -> ColumnType ('Postgres 'Vanilla) -> a -> m (PGCol, S.SQLExp))
|
|
-> m [(PGCol, S.SQLExp)]
|
|
convOp fieldInfoMap preSetCols updPerm objs conv =
|
|
forM objs $ \(pgCol, a) -> do
|
|
-- if column has predefined value then throw error
|
|
when (pgCol `elem` preSetCols) $ throwNotUpdErr pgCol
|
|
checkPermOnCol @('Postgres 'Vanilla) PTUpdate allowedCols pgCol
|
|
colType <- askColumnType fieldInfoMap pgCol relWhenPgErr
|
|
res <- conv pgCol colType a
|
|
-- build a set expression's entry
|
|
withPathK (getPGColTxt pgCol) $ return res
|
|
where
|
|
allowedCols = upiCols updPerm
|
|
relWhenPgErr = "relationships can't be updated"
|
|
throwNotUpdErr c = do
|
|
roleName <- _uiRole <$> askUserInfo
|
|
throw400 NotSupported $ "column " <> c <<> " is not updatable"
|
|
<> " for role " <> roleName <<> "; its value is predefined in permission"
|
|
|
|
validateUpdateQueryWith
|
|
:: (UserInfoM m, QErrM m, TableInfoRM ('Postgres 'Vanilla) m)
|
|
=> SessVarBldr ('Postgres 'Vanilla) m
|
|
-> ValueParser ('Postgres 'Vanilla) m S.SQLExp
|
|
-> UpdateQuery
|
|
-> m (AnnUpd ('Postgres 'Vanilla))
|
|
validateUpdateQueryWith sessVarBldr prepValBldr uq = do
|
|
let tableName = uqTable uq
|
|
tableInfo <- withPathK "table" $ askTabInfoSource tableName
|
|
let coreInfo = _tiCoreInfo tableInfo
|
|
|
|
-- If it is view then check if it is updatable
|
|
mutableView tableName viIsUpdatable
|
|
(_tciViewInfo coreInfo) "updatable"
|
|
|
|
-- Check if the role has update permissions
|
|
updPerm <- askUpdPermInfo tableInfo
|
|
|
|
-- Check if all dependent headers are present
|
|
validateHeaders $ upiRequiredHeaders updPerm
|
|
|
|
-- Check if select is allowed
|
|
selPerm <- modifyErr (<> selNecessaryMsg) $
|
|
askSelPermInfo tableInfo
|
|
|
|
let fieldInfoMap = _tciFieldInfoMap coreInfo
|
|
allCols = getCols fieldInfoMap
|
|
preSetObj = upiSet updPerm
|
|
preSetCols = M.keys preSetObj
|
|
|
|
-- convert the object to SQL set expression
|
|
setItems <- withPathK "$set" $
|
|
convOp fieldInfoMap preSetCols updPerm (M.toList $ uqSet uq) $ convSet prepValBldr
|
|
|
|
incItems <- withPathK "$inc" $
|
|
convOp fieldInfoMap preSetCols updPerm (M.toList $ uqInc uq) $ convInc prepValBldr
|
|
|
|
mulItems <- withPathK "$mul" $
|
|
convOp fieldInfoMap preSetCols updPerm (M.toList $ uqMul uq) $ convMul prepValBldr
|
|
|
|
defItems <- withPathK "$default" $
|
|
convOp fieldInfoMap preSetCols updPerm ((,()) <$> uqDefault uq) convDefault
|
|
|
|
-- convert the returning cols into sql returing exp
|
|
mAnnRetCols <- forM mRetCols $ \retCols ->
|
|
withPathK "returning" $ checkRetCols fieldInfoMap selPerm retCols
|
|
|
|
resolvedPreSetItems <- M.toList <$>
|
|
mapM (convPartialSQLExp sessVarBldr) preSetObj
|
|
|
|
let setExpItems = resolvedPreSetItems ++
|
|
setItems ++
|
|
incItems ++
|
|
mulItems ++
|
|
defItems
|
|
|
|
when (null setExpItems) $
|
|
throw400 UnexpectedPayload "atleast one of $set, $inc, $mul has to be present"
|
|
|
|
-- convert the where clause
|
|
annSQLBoolExp <- withPathK "where" $
|
|
convBoolExp fieldInfoMap selPerm (uqWhere uq) sessVarBldr tableName prepValBldr
|
|
|
|
resolvedUpdFltr <- convAnnBoolExpPartialSQL sessVarBldr $
|
|
upiFilter updPerm
|
|
resolvedUpdCheck <- fromMaybe gBoolExpTrue <$>
|
|
traverse (convAnnBoolExpPartialSQL sessVarBldr)
|
|
(upiCheck updPerm)
|
|
|
|
return $ AnnUpd
|
|
tableName
|
|
(fmap UpdSet <$> setExpItems)
|
|
(resolvedUpdFltr, annSQLBoolExp)
|
|
resolvedUpdCheck
|
|
(mkDefaultMutFlds mAnnRetCols)
|
|
allCols
|
|
where
|
|
mRetCols = uqReturning uq
|
|
selNecessaryMsg =
|
|
"; \"update\" is only allowed if the role "
|
|
<> "has \"select\" permission as \"where\" can't be used "
|
|
<> "without \"select\" permission on the table"
|
|
|
|
validateUpdateQuery
|
|
:: (QErrM m, UserInfoM m, CacheRM m)
|
|
=> UpdateQuery -> m (AnnUpd ('Postgres 'Vanilla), DS.Seq Q.PrepArg)
|
|
validateUpdateQuery query = do
|
|
let source = uqSource query
|
|
tableCache :: TableCache ('Postgres 'Vanilla) <- askTableCache source
|
|
flip runTableCacheRT (source, tableCache) $ runDMLP1T $
|
|
validateUpdateQueryWith sessVarFromCurrentSetting (valueParserWithCollectableType binRHSBuilder) query
|
|
|
|
runUpdate
|
|
:: ( QErrM m, UserInfoM m, CacheRM m
|
|
, HasServerConfigCtx m, MonadBaseControl IO m
|
|
, MonadIO m, Tracing.MonadTrace m, MetadataM m
|
|
)
|
|
=> UpdateQuery -> m EncJSON
|
|
runUpdate q = do
|
|
sourceConfig <- askSourceConfig @('Postgres 'Vanilla) (uqSource q)
|
|
userInfo <- askUserInfo
|
|
strfyNum <- stringifyNum . _sccSQLGenCtx <$> askServerConfigCtx
|
|
validateUpdateQuery q
|
|
>>= runQueryLazyTx (_pscExecCtx sourceConfig) Q.ReadWrite
|
|
. execUpdateQuery strfyNum userInfo
|