| | package graphqlapp |
| |
|
| | import ( |
| | context "context" |
| | "database/sql" |
| | "fmt" |
| | "net/http" |
| | "strconv" |
| | "strings" |
| | "time" |
| |
|
| | "github.com/99designs/gqlgen/graphql" |
| | "github.com/99designs/gqlgen/graphql/errcode" |
| | "github.com/99designs/gqlgen/graphql/handler" |
| | "github.com/99designs/gqlgen/graphql/handler/apollotracing" |
| | "github.com/99designs/gqlgen/graphql/handler/extension" |
| | "github.com/99designs/gqlgen/graphql/handler/lru" |
| | "github.com/99designs/gqlgen/graphql/handler/transport" |
| | "github.com/pkg/errors" |
| | "github.com/target/goalert/alert" |
| | "github.com/target/goalert/alert/alertlog" |
| | "github.com/target/goalert/alert/alertmetrics" |
| | "github.com/target/goalert/apikey" |
| | "github.com/target/goalert/auth" |
| | "github.com/target/goalert/auth/authlink" |
| | "github.com/target/goalert/auth/basic" |
| | "github.com/target/goalert/calsub" |
| | "github.com/target/goalert/config" |
| | "github.com/target/goalert/escalation" |
| | "github.com/target/goalert/event" |
| | "github.com/target/goalert/graphql2" |
| | "github.com/target/goalert/heartbeat" |
| | "github.com/target/goalert/integrationkey" |
| | "github.com/target/goalert/keyring" |
| | "github.com/target/goalert/label" |
| | "github.com/target/goalert/limit" |
| | "github.com/target/goalert/notice" |
| | "github.com/target/goalert/notification" |
| | "github.com/target/goalert/notification/nfydest" |
| | "github.com/target/goalert/notification/slack" |
| | "github.com/target/goalert/notification/twilio" |
| | "github.com/target/goalert/notificationchannel" |
| | "github.com/target/goalert/oncall" |
| | "github.com/target/goalert/override" |
| | "github.com/target/goalert/permission" |
| | "github.com/target/goalert/schedule" |
| | "github.com/target/goalert/schedule/rotation" |
| | "github.com/target/goalert/schedule/rule" |
| | "github.com/target/goalert/service" |
| | "github.com/target/goalert/swo" |
| | "github.com/target/goalert/timezone" |
| | "github.com/target/goalert/user" |
| | "github.com/target/goalert/user/contactmethod" |
| | "github.com/target/goalert/user/favorite" |
| | "github.com/target/goalert/user/notificationrule" |
| | "github.com/target/goalert/util/errutil" |
| | "github.com/target/goalert/util/log" |
| | "github.com/target/goalert/validation" |
| | "github.com/vektah/gqlparser/v2/ast" |
| | "github.com/vektah/gqlparser/v2/gqlerror" |
| | ) |
| |
|
| | type App struct { |
| | DB *sql.DB |
| | AuthBasicStore *basic.Store |
| | UserStore *user.Store |
| | CMStore *contactmethod.Store |
| | NRStore *notificationrule.Store |
| | NCStore *notificationchannel.Store |
| | AlertStore *alert.Store |
| | AlertMetricsStore *alertmetrics.Store |
| | AlertLogStore *alertlog.Store |
| | ServiceStore *service.Store |
| | FavoriteStore *favorite.Store |
| | PolicyStore *escalation.Store |
| | ScheduleStore *schedule.Store |
| | CalSubStore *calsub.Store |
| | RotationStore *rotation.Store |
| | OnCallStore *oncall.Store |
| | IntKeyStore *integrationkey.Store |
| | LabelStore *label.Store |
| | RuleStore *rule.Store |
| | OverrideStore *override.Store |
| | ConfigStore *config.Store |
| | LimitStore *limit.Store |
| | SlackStore *slack.ChannelSender |
| | HeartbeatStore *heartbeat.Store |
| | NoticeStore *notice.Store |
| | APIKeyStore *apikey.Store |
| |
|
| | AuthLinkStore *authlink.Store |
| |
|
| | NotificationManager *notification.Manager |
| |
|
| | AuthHandler *auth.Handler |
| |
|
| | NotificationStore *notification.Store |
| | Twilio *twilio.Config |
| |
|
| | TimeZoneStore *timezone.Store |
| |
|
| | EncryptionKeys keyring.Keys |
| |
|
| | SWO *swo.Manager |
| |
|
| | DestReg *nfydest.Registry |
| | EventBus *event.Bus |
| | } |
| |
|
| | type fieldErr struct { |
| | FieldName string `json:"fieldName"` |
| | Message string `json:"message"` |
| | } |
| |
|
| | type apolloTracer struct { |
| | apollotracing.Tracer |
| | shouldTrace func(context.Context) bool |
| | } |
| |
|
| | func (a apolloTracer) InterceptField(ctx context.Context, next graphql.Resolver) (res interface{}, err error) { |
| | if !a.shouldTrace(ctx) { |
| | return next(ctx) |
| | } |
| |
|
| | return a.Tracer.InterceptField(ctx, next) |
| | } |
| |
|
| | func (a apolloTracer) InterceptResponse(ctx context.Context, next graphql.ResponseHandler) *graphql.Response { |
| | if !a.shouldTrace(ctx) { |
| | return next(ctx) |
| | } |
| |
|
| | return a.Tracer.InterceptResponse(ctx, next) |
| | } |
| |
|
| | func isGQLValidation(gqlErr *gqlerror.Error) bool { |
| | if gqlErr == nil { |
| | return false |
| | } |
| |
|
| | var numErr *strconv.NumError |
| | if errors.As(gqlErr, &numErr) { |
| | return true |
| | } |
| |
|
| | if strings.HasPrefix(gqlErr.Message, "json request body") || strings.HasPrefix(gqlErr.Message, "could not get json request body:") || strings.HasPrefix(gqlErr.Message, "could not read request body:") { |
| | var body string |
| | gqlErr.Message, body, _ = strings.Cut(gqlErr.Message, " body:") |
| | if !strings.HasPrefix(strings.TrimSpace(body), "{") { |
| | |
| | gqlErr.Message = "json request body could not be decoded: body must be an object, missing '{'" |
| | } |
| |
|
| | return true |
| | } |
| |
|
| | if gqlErr.Extensions == nil { |
| | return false |
| | } |
| |
|
| | _, ok := gqlErr.Extensions["code"].(graphql2.ErrorCode) |
| | if ok { |
| | return true |
| | } |
| |
|
| | code, ok := gqlErr.Extensions["code"].(string) |
| | if !ok { |
| | return false |
| | } |
| |
|
| | switch code { |
| | case errcode.ValidationFailed, errcode.ParseFailed: |
| | |
| | return true |
| | } |
| |
|
| | return false |
| | } |
| |
|
| | func (a *App) Handler() http.Handler { |
| | h := handler.New( |
| | graphql2.NewExecutableSchema(graphql2.Config{ |
| | Resolvers: a, |
| | Directives: graphql2.DirectiveRoot{ |
| | Experimental: Experimental, |
| | }, |
| | }), |
| | ) |
| |
|
| | h.AddTransport(transport.Websocket{ |
| | KeepAlivePingInterval: 10 * time.Second, |
| | }) |
| | h.AddTransport(transport.Options{}) |
| | h.AddTransport(transport.GET{}) |
| | h.AddTransport(transport.POST{}) |
| | h.AddTransport(transport.MultipartForm{}) |
| | h.SetQueryCache(lru.New[*ast.QueryDocument](1000)) |
| | h.Use(extension.Introspection{}) |
| | h.Use(extension.AutomaticPersistedQuery{ |
| | Cache: lru.New[string](100), |
| | }) |
| |
|
| | type hasTraceKey int |
| | h.Use(apolloTracer{Tracer: apollotracing.Tracer{}, shouldTrace: func(ctx context.Context) bool { |
| | enabled, ok := ctx.Value(hasTraceKey(1)).(bool) |
| | return ok && enabled |
| | }}) |
| |
|
| | h.Use(apikey.Middleware{}) |
| |
|
| | h.AroundFields(func(ctx context.Context, next graphql.Resolver) (res interface{}, err error) { |
| | defer func() { |
| | err := recover() |
| | if err != nil { |
| | panic(err) |
| | } |
| | }() |
| | fieldCtx := graphql.GetFieldContext(ctx) |
| |
|
| | start := time.Now() |
| | res, err = next(ctx) |
| | errVal := "0" |
| | if err != nil { |
| | errVal = "1" |
| | } |
| | if fieldCtx.IsMethod { |
| | metricResolverHist. |
| | WithLabelValues(fmt.Sprintf("%s.%s", fieldCtx.Object, fieldCtx.Field.Name), errVal). |
| | Observe(time.Since(start).Seconds()) |
| | } |
| | if err == nil && fieldCtx.Object == "Mutation" { |
| | ctx = log.WithFields(ctx, log.Fields{ |
| | "MutationName": fieldCtx.Field.Name, |
| | }) |
| | log.Logf(ctx, "Mutation.") |
| | } |
| |
|
| | return res, err |
| | }) |
| |
|
| | h.Use(&errSkipHandler{}) |
| |
|
| | h.SetErrorPresenter(func(ctx context.Context, err error) *gqlerror.Error { |
| | if errors.Is(err, errAlreadySet) { |
| | |
| | |
| | return &gqlerror.Error{ |
| | Extensions: map[string]interface{}{ |
| | "skip": true, |
| | }, |
| | } |
| | } |
| |
|
| | if errors.Is(err, context.Canceled) { |
| | return &gqlerror.Error{ |
| | Message: "Request canceled.", |
| | } |
| | } |
| |
|
| | var argErr *nfydest.DestArgError |
| | if errors.As(err, &argErr) { |
| | return &gqlerror.Error{ |
| | Message: argErr.Err.Error(), |
| | Path: graphql.GetPath(ctx), |
| | Extensions: map[string]interface{}{ |
| | "code": graphql2.ErrorCodeInvalidDestFieldValue, |
| | "fieldID": argErr.FieldID, |
| | }, |
| | } |
| | } |
| |
|
| | var paramErr *nfydest.ActionParamError |
| | if errors.As(err, ¶mErr) { |
| | return &gqlerror.Error{ |
| | Message: paramErr.Err.Error(), |
| | Path: graphql.GetPath(ctx), |
| | Extensions: map[string]interface{}{ |
| | "code": graphql2.ErrorCodeInvalidMapFieldValue, |
| | "key": paramErr.ParamID, |
| | }, |
| | } |
| | } |
| |
|
| | err = errutil.MapDBError(err) |
| | var gqlErr *gqlerror.Error |
| |
|
| | isUnsafe, safeErr := errutil.ScrubError(err) |
| | if !errors.As(err, &gqlErr) { |
| | gqlErr = &gqlerror.Error{ |
| | Message: safeErr.Error(), |
| | } |
| | } |
| |
|
| | if isUnsafe && !isGQLValidation(gqlErr) { |
| | |
| | if !errors.Is(err, context.Canceled) { |
| | log.Log(ctx, err) |
| | } |
| | gqlErr.Message = safeErr.Error() |
| | } |
| |
|
| | var multiFieldErr validation.MultiFieldError |
| | var singleFieldErr validation.FieldError |
| | if errors.As(err, &multiFieldErr) { |
| | errs := make([]fieldErr, len(multiFieldErr.FieldErrors())) |
| | for i, err := range multiFieldErr.FieldErrors() { |
| | errs[i].FieldName = err.Field() |
| | errs[i].Message = err.Reason() |
| | } |
| | gqlErr.Message = "Multiple fields failed validation." |
| | gqlErr.Extensions = map[string]interface{}{ |
| | "isMultiFieldError": true, |
| | "fieldErrors": errs, |
| | } |
| | } else if errors.As(err, &singleFieldErr) { |
| | type reasonable interface { |
| | Reason() string |
| | } |
| | msg := singleFieldErr.Error() |
| | if rs, ok := singleFieldErr.(reasonable); ok { |
| | msg = rs.Reason() |
| | } |
| | gqlErr.Message = msg |
| | gqlErr.Extensions = map[string]interface{}{ |
| | "fieldName": singleFieldErr.Field(), |
| | "isFieldError": true, |
| | } |
| | } |
| |
|
| | var mapErr graphql2.MapValueError |
| | if errors.As(err, &mapErr) { |
| | gqlErr.Message = mapErr.Err.Error() |
| | gqlErr.Extensions = map[string]interface{}{ |
| | "code": "INVALID_MAP_FIELD_VALUE", |
| | "key": mapErr.Key, |
| | } |
| | } |
| |
|
| | return gqlErr |
| | }) |
| |
|
| | return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { |
| | ctx := req.Context() |
| |
|
| | |
| | err := permission.LimitCheckAny(ctx) |
| | if errutil.HTTPError(ctx, w, err) { |
| | return |
| | } |
| |
|
| | ctx = a.registerLoaders(ctx) |
| | defer a.closeLoaders(ctx) |
| |
|
| | if req.URL.Query().Get("trace") == "1" && permission.Admin(ctx) { |
| | ctx = context.WithValue(ctx, hasTraceKey(1), true) |
| | } |
| |
|
| | h.ServeHTTP(w, req.WithContext(ctx)) |
| | }) |
| | } |
| |
|