debian-mirror-gitlab/app/graphql/gitlab_schema.rb

159 lines
4.7 KiB
Ruby
Raw Normal View History

2018-12-05 23:21:45 +05:30
# frozen_string_literal: true
2018-11-08 19:23:39 +05:30
class GitlabSchema < GraphQL::Schema
2019-07-07 11:18:12 +05:30
# Currently an IntrospectionQuery has a complexity of 179.
# These values will evolve over time.
DEFAULT_MAX_COMPLEXITY = 200
AUTHENTICATED_COMPLEXITY = 250
ADMIN_COMPLEXITY = 300
2019-09-04 21:01:54 +05:30
DEFAULT_MAX_DEPTH = 15
AUTHENTICATED_MAX_DEPTH = 20
2020-04-22 19:07:51 +05:30
use GraphQL::Pagination::Connections
2018-11-08 19:23:39 +05:30
use BatchLoader::GraphQL
use Gitlab::Graphql::Authorize
use Gitlab::Graphql::Present
2019-09-30 21:07:59 +05:30
use Gitlab::Graphql::CallsGitaly
2020-04-22 19:07:51 +05:30
use Gitlab::Graphql::Pagination::Connections
2019-07-31 22:56:46 +05:30
use Gitlab::Graphql::GenericTracing
2020-04-08 14:13:33 +05:30
use Gitlab::Graphql::Timeout, max_seconds: Gitlab.config.gitlab.graphql_timeout
2019-07-07 11:18:12 +05:30
2019-09-04 21:01:54 +05:30
query_analyzer Gitlab::Graphql::QueryAnalyzers::LoggerAnalyzer.new
2019-10-31 01:37:42 +05:30
query_analyzer Gitlab::Graphql::QueryAnalyzers::RecursionAnalyzer.new
2019-07-07 11:18:12 +05:30
max_complexity DEFAULT_MAX_COMPLEXITY
2019-09-04 21:01:54 +05:30
max_depth DEFAULT_MAX_DEPTH
2019-07-07 11:18:12 +05:30
2019-10-31 01:37:42 +05:30
query Types::QueryType
mutation Types::MutationType
default_max_page_size 100
2019-07-07 11:18:12 +05:30
2019-09-04 21:01:54 +05:30
class << self
def multiplex(queries, **kwargs)
kwargs[:max_complexity] ||= max_query_complexity(kwargs[:context])
2019-07-07 11:18:12 +05:30
2019-09-04 21:01:54 +05:30
queries.each do |query|
query[:max_depth] = max_query_depth(kwargs[:context])
end
super(queries, **kwargs)
end
def execute(query_str = nil, **kwargs)
kwargs[:max_complexity] ||= max_query_complexity(kwargs[:context])
kwargs[:max_depth] ||= max_query_depth(kwargs[:context])
super(query_str, **kwargs)
end
2019-12-26 22:10:19 +05:30
def id_from_object(object, _type = nil, _ctx = nil)
2019-09-04 21:01:54 +05:30
unless object.respond_to?(:to_global_id)
# This is an error in our schema and needs to be solved. So raise a
2019-12-04 20:38:33 +05:30
# more meaningful error message
2019-09-04 21:01:54 +05:30
raise "#{object} does not implement `to_global_id`. "\
"Include `GlobalID::Identification` into `#{object.class}"
end
object.to_global_id
end
2020-03-13 15:44:24 +05:30
# Find an object by looking it up from its global ID, passed as a string.
#
# This is the composition of 'parse_gid' and 'find_by_gid', see these
# methods for further documentation.
def object_from_id(global_id, ctx = {})
gid = parse_gid(global_id, ctx)
find_by_gid(gid)
end
2019-09-04 21:01:54 +05:30
2020-03-13 15:44:24 +05:30
# Find an object by looking it up from its 'GlobalID'.
#
# * For `ApplicationRecord`s, this is equivalent to
# `global_id.model_class.find(gid.model_id)`, but more efficient.
# * For classes that implement `.lazy_find(global_id)`, this class method
# will be called.
# * All other classes will use `GlobalID#find`
def find_by_gid(gid)
2019-09-04 21:01:54 +05:30
if gid.model_class < ApplicationRecord
Gitlab::Graphql::Loaders::BatchModelLoader.new(gid.model_class, gid.model_id).find
2019-09-30 21:07:59 +05:30
elsif gid.model_class.respond_to?(:lazy_find)
gid.model_class.lazy_find(gid.model_id)
2019-09-04 21:01:54 +05:30
else
gid.find
end
end
2020-03-13 15:44:24 +05:30
# Parse a string to a GlobalID, raising ArgumentError if there are problems
# with it.
#
# Problems that may occur:
# * it may not be syntactically valid
# * it may not match the expected type (see below)
#
# Options:
# * :expected_type [Class] - the type of object this GlobalID should refer to.
#
# e.g.
#
# ```
# gid = GitlabSchema.parse_gid(my_string, expected_type: ::Project)
# project_id = gid.model_id
# gid.model_class == ::Project
# ```
def parse_gid(global_id, ctx = {})
expected_type = ctx[:expected_type]
gid = GlobalID.parse(global_id)
raise Gitlab::Graphql::Errors::ArgumentError, "#{global_id} is not a valid GitLab id." unless gid
if expected_type && !gid.model_class.ancestors.include?(expected_type)
vars = { global_id: global_id, expected_type: expected_type }
msg = _('%{global_id} is not a valid id for %{expected_type}.') % vars
raise Gitlab::Graphql::Errors::ArgumentError, msg
end
gid
end
2019-09-04 21:01:54 +05:30
private
def max_query_complexity(ctx)
current_user = ctx&.fetch(:current_user, nil)
if current_user&.admin
ADMIN_COMPLEXITY
elsif current_user
AUTHENTICATED_COMPLEXITY
else
DEFAULT_MAX_COMPLEXITY
end
end
2019-07-07 11:18:12 +05:30
2019-09-04 21:01:54 +05:30
def max_query_depth(ctx)
current_user = ctx&.fetch(:current_user, nil)
2019-07-07 11:18:12 +05:30
2019-09-04 21:01:54 +05:30
if current_user
AUTHENTICATED_MAX_DEPTH
else
DEFAULT_MAX_DEPTH
end
2019-07-07 11:18:12 +05:30
end
end
2018-11-08 19:23:39 +05:30
end
2020-04-08 14:13:33 +05:30
2020-04-22 19:07:51 +05:30
GitlabSchema.prepend_if_ee('EE::GitlabSchema') # rubocop: disable Cop/InjectEnterpriseEditionModule
# Force the schema to load as a workaround for intermittent errors we
# see due to a lack of thread safety.
#
# TODO: We can remove this workaround when we convert the schema to use
# the new query interpreter runtime.
#
# See:
# - https://gitlab.com/gitlab-org/gitlab/-/issues/211478
# - https://gitlab.com/gitlab-org/gitlab/-/issues/210556
GitlabSchema.graphql_definition