Skip to main content

icydb_core/db/session/
mod.rs

1//! Module: session
2//! Responsibility: user-facing query/write execution facade over db executors.
3//! Does not own: planning semantics, cursor validation rules, or storage mutation protocol.
4//! Boundary: converts fluent/query intent calls into executor operations and response DTOs.
5
6mod query;
7mod response;
8#[cfg(feature = "sql")]
9mod sql;
10///
11/// TESTS
12///
13#[cfg(all(test, feature = "sql"))]
14mod tests;
15mod write;
16
17use crate::{
18    db::{
19        Db, EntityFieldDescription, EntityRuntimeHooks, EntitySchemaDescription, FluentDeleteQuery,
20        FluentLoadQuery, IndexState, IntegrityReport, MissingRowPolicy, PersistedRow, Query,
21        QueryError, StorageReport, StoreRegistry, WriteBatchResponse,
22        commit::CommitSchemaFingerprint,
23        executor::{DeleteExecutor, EntityAuthority, LoadExecutor, SaveExecutor},
24        query::plan::{GeneratedExpressionCandidateIndex, VisibleIndexes},
25        schema::{
26            AcceptedRowDecodeContract, AcceptedRowLayoutRuntimeDescriptor, AcceptedSchemaSnapshot,
27            SchemaInfo, accepted_commit_schema_fingerprint_for_model, describe_entity_fields,
28            describe_entity_fields_with_persisted_schema, describe_entity_model,
29            describe_entity_model_with_persisted_schema, ensure_accepted_schema_snapshot,
30            show_indexes_for_model, show_indexes_for_model_with_runtime_state,
31        },
32    },
33    error::InternalError,
34    metrics::sink::{ExecKind, MetricsSink, record_exec_error_for_path, with_metrics_sink},
35    model::entity::EntityModel,
36    traits::{CanisterKind, EntityKind, EntityValue, Path},
37    value::Value,
38};
39use std::thread::LocalKey;
40
41#[cfg(feature = "diagnostics")]
42pub use query::{
43    DirectDataRowAttribution, GroupedCountAttribution, GroupedExecutionAttribution,
44    QueryExecutionAttribution,
45};
46pub(in crate::db) use response::finalize_structural_grouped_projection_result;
47pub(in crate::db) use response::{finalize_scalar_paged_execution, sql_grouped_cursor_from_bytes};
48#[cfg(feature = "sql")]
49pub use sql::SqlStatementResult;
50#[cfg(all(feature = "sql", feature = "diagnostics"))]
51pub use sql::{
52    SqlCompileAttribution, SqlExecutionAttribution, SqlPureCoveringAttribution,
53    SqlQueryCacheAttribution, SqlQueryExecutionAttribution, SqlScalarAggregateAttribution,
54};
55#[cfg(all(feature = "sql", feature = "diagnostics"))]
56pub use sql::{SqlProjectionMaterializationMetrics, with_sql_projection_materialization_metrics};
57
58///
59/// DbSession
60///
61/// Session-scoped database handle with policy (debug, metrics) and execution routing.
62///
63
64pub struct DbSession<C: CanisterKind> {
65    db: Db<C>,
66    debug: bool,
67    metrics: Option<&'static dyn MetricsSink>,
68}
69
70impl<C: CanisterKind> DbSession<C> {
71    /// Construct one session facade for a database handle.
72    #[must_use]
73    pub(crate) const fn new(db: Db<C>) -> Self {
74        Self {
75            db,
76            debug: false,
77            metrics: None,
78        }
79    }
80
81    /// Construct one session facade from store registry and runtime hooks.
82    #[must_use]
83    pub const fn new_with_hooks(
84        store: &'static LocalKey<StoreRegistry>,
85        entity_runtime_hooks: &'static [EntityRuntimeHooks<C>],
86    ) -> Self {
87        Self::new(Db::new_with_hooks(store, entity_runtime_hooks))
88    }
89
90    /// Enable debug execution behavior where supported by executors.
91    #[must_use]
92    pub const fn debug(mut self) -> Self {
93        self.debug = true;
94        self
95    }
96
97    /// Attach one metrics sink for all session-executed operations.
98    #[must_use]
99    pub const fn metrics_sink(mut self, sink: &'static dyn MetricsSink) -> Self {
100        self.metrics = Some(sink);
101        self
102    }
103
104    // Shared fluent load wrapper construction keeps the session boundary in
105    // one place when load entry points differ only by missing-row policy.
106    const fn fluent_load_query<E>(&self, consistency: MissingRowPolicy) -> FluentLoadQuery<'_, E>
107    where
108        E: EntityKind<Canister = C>,
109    {
110        FluentLoadQuery::new(self, Query::new(consistency))
111    }
112
113    // Shared fluent delete wrapper construction keeps the delete-mode handoff
114    // explicit at the session boundary instead of reassembling the same query
115    // shell in each public entry point.
116    fn fluent_delete_query<E>(&self, consistency: MissingRowPolicy) -> FluentDeleteQuery<'_, E>
117    where
118        E: PersistedRow<Canister = C>,
119    {
120        FluentDeleteQuery::new(self, Query::new(consistency).delete())
121    }
122
123    fn with_metrics<T>(&self, f: impl FnOnce() -> T) -> T {
124        if let Some(sink) = self.metrics {
125            with_metrics_sink(sink, f)
126        } else {
127            f()
128        }
129    }
130
131    // Shared save-facade wrapper keeps metrics wiring and response shaping uniform.
132    fn execute_save_with<E, T, R>(
133        &self,
134        op: impl FnOnce(SaveExecutor<E>) -> Result<T, InternalError>,
135        map: impl FnOnce(T) -> R,
136    ) -> Result<R, InternalError>
137    where
138        E: PersistedRow<Canister = C> + EntityValue,
139    {
140        let (contract, schema_info, schema_fingerprint) = match self
141            .with_metrics(|| self.ensure_generated_compatible_accepted_save_schema::<E>())
142        {
143            Ok(authority) => authority,
144            Err(error) => {
145                self.with_metrics(|| record_exec_error_for_path(ExecKind::Save, E::PATH, &error));
146
147                return Err(error);
148            }
149        };
150        let value = self.with_metrics(|| {
151            op(self.save_executor::<E>(contract, schema_info, schema_fingerprint))
152        })?;
153
154        Ok(map(value))
155    }
156
157    // Execute save work after the caller has already proven that the accepted
158    // row contract is generated-compatible. SQL and structural writes use this
159    // after their pre-staging schema guard so mutation staging and save
160    // execution do not rerun schema-store reconciliation in the same statement.
161    fn execute_save_with_checked_accepted_row_contract<E, T, R>(
162        &self,
163        accepted_row_decode_contract: AcceptedRowDecodeContract,
164        accepted_schema_info: SchemaInfo,
165        accepted_schema_fingerprint: CommitSchemaFingerprint,
166        op: impl FnOnce(SaveExecutor<E>) -> Result<T, InternalError>,
167        map: impl FnOnce(T) -> R,
168    ) -> Result<R, InternalError>
169    where
170        E: PersistedRow<Canister = C> + EntityValue,
171    {
172        let value = self.with_metrics(|| {
173            op(self.save_executor::<E>(
174                accepted_row_decode_contract,
175                accepted_schema_info,
176                accepted_schema_fingerprint,
177            ))
178        })?;
179
180        Ok(map(value))
181    }
182
183    // Shared save-facade wrappers keep response shape explicit at call sites.
184    fn execute_save_entity<E>(
185        &self,
186        op: impl FnOnce(SaveExecutor<E>) -> Result<E, InternalError>,
187    ) -> Result<E, InternalError>
188    where
189        E: PersistedRow<Canister = C> + EntityValue,
190    {
191        self.execute_save_with(op, std::convert::identity)
192    }
193
194    fn execute_save_batch<E>(
195        &self,
196        op: impl FnOnce(SaveExecutor<E>) -> Result<Vec<E>, InternalError>,
197    ) -> Result<WriteBatchResponse<E>, InternalError>
198    where
199        E: PersistedRow<Canister = C> + EntityValue,
200    {
201        self.execute_save_with(op, WriteBatchResponse::new)
202    }
203
204    // ---------------------------------------------------------------------
205    // Query entry points (public, fluent)
206    // ---------------------------------------------------------------------
207
208    /// Start a fluent load query with default missing-row policy (`Ignore`).
209    #[must_use]
210    pub const fn load<E>(&self) -> FluentLoadQuery<'_, E>
211    where
212        E: EntityKind<Canister = C>,
213    {
214        self.fluent_load_query(MissingRowPolicy::Ignore)
215    }
216
217    /// Start a fluent load query with explicit missing-row policy.
218    #[must_use]
219    pub const fn load_with_consistency<E>(
220        &self,
221        consistency: MissingRowPolicy,
222    ) -> FluentLoadQuery<'_, E>
223    where
224        E: EntityKind<Canister = C>,
225    {
226        self.fluent_load_query(consistency)
227    }
228
229    /// Start a fluent delete query with default missing-row policy (`Ignore`).
230    #[must_use]
231    pub fn delete<E>(&self) -> FluentDeleteQuery<'_, E>
232    where
233        E: PersistedRow<Canister = C>,
234    {
235        self.fluent_delete_query(MissingRowPolicy::Ignore)
236    }
237
238    /// Start a fluent delete query with explicit missing-row policy.
239    #[must_use]
240    pub fn delete_with_consistency<E>(
241        &self,
242        consistency: MissingRowPolicy,
243    ) -> FluentDeleteQuery<'_, E>
244    where
245        E: PersistedRow<Canister = C>,
246    {
247        self.fluent_delete_query(consistency)
248    }
249
250    /// Return one constant scalar row equivalent to SQL `SELECT 1`.
251    ///
252    /// This terminal bypasses query planning and access routing entirely.
253    #[must_use]
254    pub const fn select_one(&self) -> Value {
255        Value::Int(1)
256    }
257
258    /// Return one stable, human-readable index listing for the entity schema.
259    ///
260    /// Output format mirrors SQL-style introspection:
261    /// - `PRIMARY KEY (field)`
262    /// - `INDEX name (field_a, field_b)`
263    /// - `UNIQUE INDEX name (field_a, field_b)`
264    #[must_use]
265    pub fn show_indexes<E>(&self) -> Vec<String>
266    where
267        E: EntityKind<Canister = C>,
268    {
269        self.show_indexes_for_store_model(E::Store::PATH, E::MODEL)
270    }
271
272    /// Return one stable, human-readable index listing for one schema model.
273    ///
274    /// This model-only helper is schema-owned and intentionally does not
275    /// attach runtime lifecycle state because it does not carry store
276    /// placement context.
277    #[must_use]
278    pub fn show_indexes_for_model(&self, model: &'static EntityModel) -> Vec<String> {
279        show_indexes_for_model(model)
280    }
281
282    // Return one stable, human-readable index listing for one resolved
283    // store/model pair, attaching the current runtime lifecycle state when the
284    // registry can resolve the backing store handle.
285    pub(in crate::db) fn show_indexes_for_store_model(
286        &self,
287        store_path: &str,
288        model: &'static EntityModel,
289    ) -> Vec<String> {
290        let runtime_state = self
291            .db
292            .with_store_registry(|registry| registry.try_get_store(store_path).ok())
293            .map(|store| store.index_state());
294
295        show_indexes_for_model_with_runtime_state(model, runtime_state)
296    }
297
298    /// Return one stable generated-model list of field descriptors.
299    ///
300    /// This infallible Rust metadata helper intentionally reports the compiled
301    /// schema model. Use `try_show_columns` for the accepted persisted-schema
302    /// view used by SQL and diagnostics surfaces.
303    #[must_use]
304    pub fn show_columns<E>(&self) -> Vec<EntityFieldDescription>
305    where
306        E: EntityKind<Canister = C>,
307    {
308        self.show_columns_for_model(E::MODEL)
309    }
310
311    /// Return one stable generated-model list of field descriptors.
312    #[must_use]
313    pub fn show_columns_for_model(
314        &self,
315        model: &'static EntityModel,
316    ) -> Vec<EntityFieldDescription> {
317        describe_entity_fields(model)
318    }
319
320    /// Return field descriptors using the accepted persisted schema snapshot.
321    ///
322    /// This fallible variant is intended for SQL and diagnostics surfaces that
323    /// can report schema reconciliation failures. The infallible
324    /// `show_columns` helper remains generated-model based.
325    pub fn try_show_columns<E>(&self) -> Result<Vec<EntityFieldDescription>, InternalError>
326    where
327        E: EntityKind<Canister = C>,
328    {
329        let snapshot = self.ensure_accepted_schema_snapshot::<E>()?;
330
331        Ok(describe_entity_fields_with_persisted_schema(&snapshot))
332    }
333
334    /// Return one stable list of runtime-registered entity names.
335    #[must_use]
336    pub fn show_entities(&self) -> Vec<String> {
337        self.db.runtime_entity_names()
338    }
339
340    /// Return one stable list of runtime-registered entity names.
341    ///
342    /// `SHOW TABLES` is only an alias for `SHOW ENTITIES`, so the typed
343    /// metadata surface keeps the same alias relationship.
344    #[must_use]
345    pub fn show_tables(&self) -> Vec<String> {
346        self.show_entities()
347    }
348
349    // Resolve the exact secondary-index set that is visible to planner-owned
350    // query planning for one recovered store/model pair.
351    fn visible_indexes_for_store_accepted_schema(
352        &self,
353        store_path: &str,
354        model: &'static EntityModel,
355        schema_info: &SchemaInfo,
356    ) -> Result<VisibleIndexes<'static>, QueryError> {
357        // Phase 1: resolve the recovered store state once at the session
358        // boundary so query/executor planning does not reopen lifecycle checks.
359        let store = self
360            .db
361            .recovered_store(store_path)
362            .map_err(QueryError::execute)?;
363        let state = store.index_state();
364        if state != IndexState::Ready {
365            return Ok(VisibleIndexes::none());
366        }
367        debug_assert_eq!(state, IndexState::Ready);
368
369        // Phase 2: planner-visible field-path indexes are accepted schema
370        // contracts once the recovered store is query-visible. The remaining
371        // generated candidates are expression-index only.
372        let visible_indexes = VisibleIndexes::accepted_schema_visible(model.indexes(), schema_info);
373        debug_assert!(
374            visible_indexes
375                .generated_expression_candidate_indexes()
376                .iter()
377                .all(GeneratedExpressionCandidateIndex::has_expression_key_items),
378        );
379        debug_assert!(visible_indexes.accepted_field_path_contracts_are_consistent());
380
381        Ok(visible_indexes)
382    }
383
384    /// Return one generated-model schema description for the entity.
385    ///
386    /// This is a typed `DESCRIBE`-style introspection surface consumed by
387    /// developer tooling and pre-EXPLAIN debugging when a non-failing compiled
388    /// schema view is required.
389    #[must_use]
390    pub fn describe_entity<E>(&self) -> EntitySchemaDescription
391    where
392        E: EntityKind<Canister = C>,
393    {
394        self.describe_entity_model(E::MODEL)
395    }
396
397    /// Return one generated-model schema description for one schema model.
398    #[must_use]
399    pub fn describe_entity_model(&self, model: &'static EntityModel) -> EntitySchemaDescription {
400        describe_entity_model(model)
401    }
402
403    /// Return a schema description using the accepted persisted schema snapshot.
404    ///
405    /// This is the live-schema counterpart to `describe_entity`. It is fallible
406    /// because loading accepted schema authority can fail if startup
407    /// reconciliation rejects the stored metadata.
408    pub fn try_describe_entity<E>(&self) -> Result<EntitySchemaDescription, InternalError>
409    where
410        E: EntityKind<Canister = C>,
411    {
412        let snapshot = self.ensure_accepted_schema_snapshot::<E>()?;
413
414        Ok(describe_entity_model_with_persisted_schema(
415            E::MODEL,
416            &snapshot,
417        ))
418    }
419
420    // Ensure and return the accepted schema snapshot for one generated entity.
421    // This may write the first snapshot for an empty store; otherwise it loads
422    // the latest stored snapshot and applies the current exact-match policy.
423    fn ensure_accepted_schema_snapshot<E>(&self) -> Result<AcceptedSchemaSnapshot, InternalError>
424    where
425        E: EntityKind<Canister = C>,
426    {
427        let store = self.db.recovered_store(E::Store::PATH)?;
428
429        store.with_schema_mut(|schema_store| {
430            ensure_accepted_schema_snapshot(schema_store, E::ENTITY_TAG, E::PATH, E::MODEL)
431        })
432    }
433
434    // Build the accepted schema-info projection for one typed entity. Fluent
435    // terminal adapters use this before constructing slot-bound descriptors so
436    // field slot authority comes from the accepted schema snapshot.
437    pub(in crate::db) fn accepted_schema_info_for_entity<E>(
438        &self,
439    ) -> Result<SchemaInfo, InternalError>
440    where
441        E: EntityKind<Canister = C>,
442    {
443        let accepted_schema = self.ensure_accepted_schema_snapshot::<E>()?;
444
445        Ok(SchemaInfo::from_accepted_snapshot_for_model(
446            E::MODEL,
447            &accepted_schema,
448        ))
449    }
450
451    // Derive typed executor authority from an accepted snapshot the caller
452    // already loaded, avoiding a second schema-store pass in SQL write/select
453    // adapters that need both write descriptors and read selector authority.
454    pub(in crate::db) fn accepted_entity_authority_for_schema<E>(
455        accepted_schema: &AcceptedSchemaSnapshot,
456    ) -> Result<EntityAuthority, InternalError>
457    where
458        E: EntityKind<Canister = C>,
459    {
460        EntityAuthority::from_accepted_schema_for_type::<E>(accepted_schema)
461    }
462
463    // Load the accepted schema snapshot and derive the matching typed executor
464    // authority as one pair so typed session entrypoints cannot accidentally
465    // mix accepted schema fingerprints with generated row-layout authority.
466    pub(in crate::db) fn accepted_entity_authority<E>(
467        &self,
468    ) -> Result<(AcceptedSchemaSnapshot, EntityAuthority), InternalError>
469    where
470        E: EntityKind<Canister = C>,
471    {
472        let accepted_schema = self.ensure_accepted_schema_snapshot::<E>()?;
473        let authority = Self::accepted_entity_authority_for_schema::<E>(&accepted_schema)?;
474
475        Ok((accepted_schema, authority))
476    }
477
478    // Ensure accepted schema metadata is safe for write paths that still encode
479    // rows through generated field contracts. Returning only the snapshot keeps
480    // SQL write type checks unchanged while the schema-runtime descriptor guard
481    // rejects unsupported layout or payload drift before mutation staging.
482    fn ensure_generated_compatible_accepted_save_schema<E>(
483        &self,
484    ) -> Result<
485        (
486            AcceptedRowDecodeContract,
487            SchemaInfo,
488            CommitSchemaFingerprint,
489        ),
490        InternalError,
491    >
492    where
493        E: EntityKind<Canister = C>,
494    {
495        let accepted_schema = self.ensure_accepted_schema_snapshot::<E>()?;
496        let (accepted_row_layout, _) =
497            AcceptedRowLayoutRuntimeDescriptor::from_generated_compatible_schema(
498                &accepted_schema,
499                E::MODEL,
500            )?;
501        let schema_info = SchemaInfo::from_accepted_snapshot_for_model(E::MODEL, &accepted_schema);
502        let schema_fingerprint =
503            accepted_commit_schema_fingerprint_for_model(E::MODEL, &accepted_schema)?;
504
505        Ok((
506            accepted_row_layout.row_decode_contract(),
507            schema_info,
508            schema_fingerprint,
509        ))
510    }
511
512    /// Build one point-in-time storage report for observability endpoints.
513    pub fn storage_report(
514        &self,
515        name_to_path: &[(&'static str, &'static str)],
516    ) -> Result<StorageReport, InternalError> {
517        self.db.storage_report(name_to_path)
518    }
519
520    /// Build one point-in-time storage report using default entity-path labels.
521    pub fn storage_report_default(&self) -> Result<StorageReport, InternalError> {
522        self.db.storage_report_default()
523    }
524
525    /// Build one point-in-time integrity scan report for observability endpoints.
526    pub fn integrity_report(&self) -> Result<IntegrityReport, InternalError> {
527        self.db.integrity_report()
528    }
529
530    // ---------------------------------------------------------------------
531    // Low-level executors (crate-internal; execution primitives)
532    // ---------------------------------------------------------------------
533
534    #[must_use]
535    pub(in crate::db) const fn load_executor<E>(&self) -> LoadExecutor<E>
536    where
537        E: EntityKind<Canister = C> + EntityValue,
538    {
539        LoadExecutor::new(self.db, self.debug)
540    }
541
542    #[must_use]
543    pub(in crate::db) const fn delete_executor<E>(&self) -> DeleteExecutor<E>
544    where
545        E: PersistedRow<Canister = C> + EntityValue,
546    {
547        DeleteExecutor::new(self.db)
548    }
549
550    #[must_use]
551    pub(in crate::db) const fn save_executor<E>(
552        &self,
553        accepted_row_decode_contract: AcceptedRowDecodeContract,
554        accepted_schema_info: SchemaInfo,
555        accepted_schema_fingerprint: CommitSchemaFingerprint,
556    ) -> SaveExecutor<E>
557    where
558        E: PersistedRow<Canister = C> + EntityValue,
559    {
560        SaveExecutor::new_with_accepted_contract(
561            self.db,
562            self.debug,
563            accepted_row_decode_contract,
564            accepted_schema_info,
565            accepted_schema_fingerprint,
566        )
567    }
568}