fraiseql_core/runtime/executor/execution.rs
1//! Core query execution — `execute()`, `execute_internal()`, `execute_with_scopes()`.
2
3use std::{sync::Arc, time::Duration};
4
5use super::{Executor, QueryType, pipeline};
6use crate::{
7 db::traits::DatabaseAdapter,
8 error::{FraiseQLError, Result},
9 security::QueryValidator,
10};
11
12impl<A: DatabaseAdapter> Executor<A> {
13 /// Execute a GraphQL query string and return a serialized JSON response.
14 ///
15 /// Applies the configured query timeout if one is set. Handles queries,
16 /// mutations, introspection, federation, and node lookups.
17 ///
18 /// If `RuntimeConfig::query_validation` is set, `QueryValidator::validate()`
19 /// runs first (before parsing or SQL dispatch) to enforce size, depth, and
20 /// complexity limits. This protects direct `fraiseql-core` embedders that do
21 /// not route through `fraiseql-server`.
22 ///
23 /// # Errors
24 ///
25 /// - `FraiseQLError::Validation` — query violates configured depth/complexity/alias limits
26 /// (only when `RuntimeConfig::query_validation` is `Some`).
27 /// - `FraiseQLError::Timeout` — query exceeded `RuntimeConfig::query_timeout_ms`.
28 /// - Any error returned by `execute_internal`.
29 pub async fn execute(
30 &self,
31 query: &str,
32 variables: Option<&serde_json::Value>,
33 ) -> Result<serde_json::Value> {
34 // GATE 1: Query structure validation (DoS protection for direct embedders).
35 if let Some(ref cfg) = self.config.query_validation {
36 QueryValidator::from_config(cfg.clone()).validate(query).map_err(|e| {
37 FraiseQLError::Validation {
38 message: e.to_string(),
39 path: Some("query".to_string()),
40 }
41 })?;
42 }
43
44 // Apply query timeout if configured
45 if self.config.query_timeout_ms > 0 {
46 let timeout_duration = Duration::from_millis(self.config.query_timeout_ms);
47 tokio::time::timeout(timeout_duration, self.execute_internal(query, variables))
48 .await
49 .map_err(|_| {
50 // Truncate query if too long for error reporting
51 let query_snippet = if query.len() > 100 {
52 format!("{}...", &query[..100])
53 } else {
54 query.to_string()
55 };
56 FraiseQLError::Timeout {
57 timeout_ms: self.config.query_timeout_ms,
58 query: Some(query_snippet),
59 }
60 })?
61 } else {
62 self.execute_internal(query, variables).await
63 }
64 }
65
66 /// Internal execution logic (called by `execute` with the timeout wrapper).
67 ///
68 /// # Errors
69 ///
70 /// - [`FraiseQLError::Parse`] — GraphQL query string is not valid GraphQL syntax.
71 /// - [`FraiseQLError::NotFound`] — the query name does not match any compiled query template.
72 /// - [`FraiseQLError::Database`] — the underlying database returned an error.
73 /// - [`FraiseQLError::Internal`] — response serialisation failed.
74 /// - [`FraiseQLError::Authorization`] — field-level access control denied a field.
75 pub(super) async fn execute_internal(
76 &self,
77 query: &str,
78 variables: Option<&serde_json::Value>,
79 ) -> Result<serde_json::Value> {
80 // 1. Classify query type — also returns the ParsedQuery for Regular
81 // queries so we do not parse the same string twice.
82 //
83 // The parse result is memoised in `parse_cache` (keyed by xxHash64 of
84 // the query string) so repeated identical queries skip re-parsing.
85 let cache_key = xxhash_rust::xxh3::xxh3_64(query.as_bytes());
86 let (query_type, maybe_parsed) = if let Some(arc) = self.parse_cache.get(&cache_key) {
87 arc.as_ref().clone()
88 } else {
89 let pair = self.classify_query_with_parse(query)?;
90 self.parse_cache.insert(cache_key, Arc::new(pair.clone()));
91 pair
92 };
93
94 // 2. Route to appropriate handler
95 match query_type {
96 QueryType::Regular => {
97 // Detect multi-root queries and dispatch them in parallel.
98 // `maybe_parsed` is always Some for Regular queries (see
99 // classify_query_with_parse).
100 let parsed = maybe_parsed.ok_or_else(|| FraiseQLError::Internal {
101 message: "classifier returned Regular without a parsed query — this is a bug"
102 .to_string(),
103 source: None,
104 })?;
105 if pipeline::is_multi_root(&parsed) {
106 let pr = self.execute_parallel(&parsed, variables).await?;
107 let data = pr.merge_into_data_map();
108 return Ok(serde_json::json!({ "data": data }));
109 }
110 self.execute_regular_query(query, variables).await
111 },
112 QueryType::Aggregate(query_name) => {
113 self.execute_aggregate_dispatch(&query_name, variables).await
114 },
115 QueryType::Window(query_name) => {
116 self.execute_window_dispatch(&query_name, variables).await
117 },
118 #[cfg(feature = "federation")]
119 QueryType::Federation(query_name) => {
120 self.execute_federation_query(&query_name, query, variables).await
121 },
122 #[cfg(not(feature = "federation"))]
123 QueryType::Federation(_) => {
124 let _ = (query, variables);
125 Err(FraiseQLError::Validation {
126 message: "Federation is not enabled in this build".to_string(),
127 path: None,
128 })
129 },
130 QueryType::IntrospectionSchema => {
131 // Return pre-built __schema response (zero-cost at runtime)
132 Ok(self.introspection.schema_response.as_ref().clone())
133 },
134 QueryType::IntrospectionType(type_name) => {
135 // Return pre-built __type response (zero-cost at runtime)
136 Ok(self.introspection.get_type_response(&type_name))
137 },
138 QueryType::Mutation {
139 name,
140 type_selections,
141 } => self.execute_mutation_query(&name, variables, &type_selections).await,
142 QueryType::NodeQuery { selections } => {
143 self.execute_node_query(query, variables, &selections).await
144 },
145 }
146 }
147
148 /// Execute a GraphQL query with user context for field-level access control.
149 ///
150 /// This method validates that the user has permission to access all requested
151 /// fields before executing the query. If field filtering is enabled in the
152 /// `RuntimeConfig` and the user lacks required scopes, this returns an error.
153 ///
154 /// # Arguments
155 ///
156 /// * `query` - GraphQL query string
157 /// * `variables` - Query variables (optional)
158 /// * `user_scopes` - User's scopes from JWT token (pass empty slice if unauthenticated)
159 ///
160 /// # Returns
161 ///
162 /// GraphQL response as JSON string, or error if access denied
163 ///
164 /// # Errors
165 ///
166 /// * [`FraiseQLError::Validation`] — query validation fails, or the user's scopes do not
167 /// include a field required by the `field_filter` policy.
168 /// * Propagates errors from query classification and execution.
169 ///
170 /// # Example
171 ///
172 /// ```no_run
173 /// // Requires: a live database adapter and authenticated user context.
174 /// // See: tests/integration/ for runnable examples.
175 /// # async fn example() -> Result<(), Box<dyn std::error::Error>> {
176 /// let query = r#"query { users { id name salary } }"#;
177 /// // let user_scopes = user.scopes.clone();
178 /// // let result = executor.execute_with_scopes(query, None, &user_scopes).await?;
179 /// # Ok(()) }
180 /// ```
181 pub async fn execute_with_scopes(
182 &self,
183 query: &str,
184 variables: Option<&serde_json::Value>,
185 user_scopes: &[String],
186 ) -> Result<serde_json::Value> {
187 // GATE 1: Query structure validation (mirrors execute() — DoS protection).
188 if let Some(ref cfg) = self.config.query_validation {
189 QueryValidator::from_config(cfg.clone()).validate(query).map_err(|e| {
190 FraiseQLError::Validation {
191 message: e.to_string(),
192 path: Some("query".to_string()),
193 }
194 })?;
195 }
196
197 // 2. Classify query type
198 let query_type = self.classify_query(query)?;
199
200 // 3. Validate field access if filter is configured
201 if let Some(ref filter) = self.config.field_filter {
202 // Only validate for regular queries (not introspection)
203 if matches!(query_type, QueryType::Regular) {
204 self.validate_field_access(query, variables, user_scopes, filter)?;
205 }
206 }
207
208 // 4. Delegate to execute_internal — single source of routing truth. Field-access validation
209 // (step 3) has already run for Regular queries; all other query types (introspection,
210 // aggregate, federation, …) are routed correctly via execute_internal without
211 // duplication.
212 self.execute_internal(query, variables).await
213 }
214}