hive-router 0.0.55

GraphQL router/gateway for Federation
use std::collections::BTreeMap;

use hive_router_config::introspection_policy::IntrospectionPermissionConfig;
use hive_router_internal::expressions::{
    BooleanOrProgram, CompileExpression, ExpressionCompileError, ProgramHints,
};
use hive_router_plan_executor::execution::client_request_details::ClientRequestDetailsView;
use tracing::debug;
use vrl::core::Value as VrlValue;

use crate::pipeline::error::PipelineError;

pub fn compile_introspection_policy(
    introspection_policy_cfg: &Option<IntrospectionPermissionConfig>,
) -> Result<BooleanOrProgram, ExpressionCompileError> {
    match introspection_policy_cfg {
        Some(IntrospectionPermissionConfig::Boolean(b)) => Ok(BooleanOrProgram::Value(*b)),
        Some(IntrospectionPermissionConfig::Expression { expression }) => {
            expression.compile_expression(None).map(|program| {
                let hints = ProgramHints::from_program(&program);
                BooleanOrProgram::Program(Box::new(program), hints)
            })
        }
        None => Ok(BooleanOrProgram::Value(true)),
    }
}

pub fn handle_introspection_policy(
    introspection_policy_prog: &BooleanOrProgram,
    client_request_details: &impl ClientRequestDetailsView,
) -> Result<(), PipelineError> {
    let is_enabled = introspection_policy_prog
        .resolve(|| {
            let mut context_map = BTreeMap::new();
            context_map.insert("request".into(), client_request_details.to_vrl_value());

            VrlValue::Object(context_map)
        })
        .map_err(|e| PipelineError::IntrospectionPermissionEvaluationError(e.to_string()))?;

    if !is_enabled {
        debug!("graphql request rejected because introspection is disabled");
        Err(PipelineError::IntrospectionDisabled)
    } else {
        Ok(())
    }
}