ash/README.md

173 lines
14 KiB
Markdown
Raw Normal View History

2019-10-03 16:08:36 +13:00
# Ash
2019-12-06 14:56:01 +13:00
## Quick Links
2020-04-05 22:24:56 +12:00
- [Resource Documentation](https://hexdocs.pm/ash/Ash.Resource.html)
- [DSL Documentation](https://hexdocs.pm/ash/Ash.Resource.DSL.html)
- [Code API documentation](https://hexdocs.pm/ash/Ash.Api.Interface.html)
2019-12-06 14:56:01 +13:00
## Introduction
2019-12-12 10:21:59 +13:00
Traditional MVC Frameworks (Rails, Django, .Net, Phoenix, etc) leave it up to the user to build the glue between requests for data (HTTP requests in various forms as well as server-side domain logic) and their respective ORMs. In that space, there is an incredible amount of boilerplate code that must get written from scratch for each application (authentication, authorization, sorting, filtering, pagination, sideloading relationships, serialization, etc).
2019-10-05 16:16:28 +13:00
2019-12-12 10:21:59 +13:00
Ash is an opinionated yet configurable framework designed to reduce boilerplate in Elixir application. Don't worry Phoenix developers - Ash is designed to play well with Phoenix too :). Ash does this by providing a layer of abstraction over your system's data layer(s) with `Resources`.
2019-10-05 16:16:28 +13:00
2019-12-12 10:21:59 +13:00
To riff on a famous JRR Tolkien quote, a `Resource`is "One Interface to rule them all, One Interface to find them" and will become an indispensable place to define contracts for interacting with data throughout your application.
2019-12-06 09:46:21 +13:00
2019-12-12 10:21:59 +13:00
To start using Ash, first declare your `Resources` using the Ash `Resource` DSL. You could technically stop there, and just leverage the Ash Elixir API to avoid writing boilerplate. More likely, you would use libraries like Ash.JsonApi or Ash.GraphQL(someday) with Phoenix to add external interfaces to those resources without having to write any extra code at all.
2019-12-06 09:46:21 +13:00
2019-12-12 10:21:59 +13:00
Developers should be focusing on their core business logic - not boilerplate code. Ash builds upon the incredible productivity of Phoenix and empowers developers to get up and running with a fully functional app in substantially less time, while still being flexible enough to allow customization when the need inevitably arises.
2019-10-05 16:16:28 +13:00
2019-12-12 10:21:59 +13:00
Ash is an open-source project and draws inspiration from similar ideas in other frameworks and concepts. The goal of Ash is to lower the barrier to adopting and using Elixir and Phoenix, and in doing so help these amazing communities attract new developers, projects, and companies.
2019-10-03 16:08:36 +13:00
2019-12-09 08:48:49 +13:00
## Example Resource
2020-04-05 22:24:56 +12:00
2019-12-09 08:48:49 +13:00
```elixir
defmodule Post do
use Ash.Resource, name: "posts", type: "post"
use AshJsonApi.JsonApiResource
use Ash.DataLayer.Postgres
actions do
read :default,
2020-01-11 18:09:52 +13:00
rules: [
2019-12-16 13:20:44 +13:00
authorize_if: user_is(:admin)
2019-12-09 08:48:49 +13:00
]
create :default,
2020-01-11 18:09:52 +13:00
rules: [
2019-12-16 13:20:44 +13:00
authorize_if: user_is(:admin)
2019-12-09 08:48:49 +13:00
]
2020-04-05 22:24:56 +12:00
2019-12-09 08:48:49 +13:00
end
attributes do
attribute :name, :string
end
relationships do
belongs_to :author, Author
end
end
```
2019-10-06 13:33:38 +13:00
## TODO LIST (in no order)
2020-04-05 22:24:56 +12:00
- Make our router cabaple of describing its routes in `mix phx.routes` Chris McCord says that we could probably power that, seeing as phoenix controls both APIs, and that capability could be added to `Plug.Router`
- Finish the serializer
- DSL level validations! Things like includes validating that their chain exists. All DSL structs should be strictly validated when they are created.
- Especially at compile time, we should _never_ ignore or skip invalid options. If an option is present and invalid, an error is raised.
- break up the `Ash` module
- Wire up/formalize the error handling (this is high priority)
- Ensure that errors are properly propagated up from the data_layer behaviour, and every operation is allowed to fail
- figure out the ecto schema warning
- all actions need to be performed in a transaction
- document authorization thoroughly. _batch_ (default) checks need to return a list of `ids` for which the check passed.
- So many parts of the system are reliant on things having an `id` key explicitly. THis will need to be addressed some day, and will be a huge pain in the ass
- Validate that the user resource has a get action
- `params` should be solidified. Perhaps as a struct. Or perhaps just renamed to `action_params` where it is used.
- Since actions contain rules now, consider making it possible to list each action as its own `do` block, with an internal DSL for configuring the action. (overkill?)
- Validate rules at creation
- Maybe fix the crappy parts of optimal and bring it in for opts validation?
- The ecto internals that live on structs are going to cause problems w/ pluggability of backends, like the `%Ecto.Association.NotLoaded{}`. That backend may need to scrub the ecto specifics off of those structs.
- Add a mixin compatibility checker framework, to allow for mix_ins to declare what features they do/don't support.
- Have ecto types ask the data layer about the kinds of filtering they can do, and that kind of thing.
- Make `Ash.Type` that is a superset of things like `Ecto.Type`. If we bring in ecto database-less(looking like more and more of a good idea to me) that kind of thing gets easier and we can potentially lean on ecto for type validations well.
- use a process to hold constructed DSL state, and then coalesce it all at the end. This can clean things up, and also allow us to potentially eliminate the registry. This will probably go hand in hand w/ the "capabilities" layer, where the DSL confirms that your data layer is capable of performing everything that your DSL declares
- make ets dep optional
- Bake in descriptions to the DSL
- Contributor guideline and code of conduct
- Do branch analysis of each record after authorizing it, in authorizer
- consider moving `type` and `name` for resources out into json api (or perhaps just `name`) since only json api uses that
- When we support embedding, figure out `embed_as` on `Ash.Type`
- Consider allowing declaring a data layer at the _api_ level, or overriding the resource's data layer at the _api_ level
- Since actions can return multiple errors, we need a testing utility to unwrap/assert on them
- Flesh out relationship options
- Flesh out field options (sortable, filterable, other behavior?)
- Unit test the Ets data layer
- Improve pagination in the ETS data layer
- Rearchitect relationship updates so that they can be sensible authorized. As in, which resource is responsible for authorizing updates to a relationship? Should there be some unified way to describe it? Or is updating a user's posts an entirely separate operation from updating a post's user?
- Test authorization
- Validate that all relationships on all resources in the API have destinations _in_ that API, or don't and add in logic to pretend those don't exist through the API.
- Make authorization spit out informative errors (at least for developers)
- Use telemetry and/or some kind of hook system to add metrics
- Forbid impossible auth/creation situations (e.g "the id field is not exposed on a create action, and doesn't have a default, therefore writes will always fail.)
- Don't let users declare `has_one` relationships without claiming that there is a unique constraint on the destination field.
- Set up "atomic updates" (upserts). If an adapter supports them, and the auth passes precheck, we could turn `get + update` combos into `upserts`
- Use data layer compatibility features to disallow incompatible setups. For instance, if the data layer can't transact, then they can't have an editable `has_one` or `many_to_many` resource.
- Add `can?(:bulk_update)` to data layers, so we can more efficiently update relationships
- Figure out under what circumstances we can bulk fetch when reading before updating many_to_many and to_many relationships, and do so.
- most relationship stuff can't be done w/o primary keys
- includer errors are super obscure because you can't tell what action they are about
- Allow encoding database-level constraints into the resource, like "nullable: false" or something. This will let us validate things like not leaving orphans when bulk updating a many to many
- Validate filters, now that there can be duplicates. Doesn't make sense to provide two "exact equals" filters
- Eventually data_layers should state what raw types they support, and the filters they support on those raw types
- Raise on composite primary key if data layer can't do it
- Add impossibility checking for filters to avoid running queries that will never be possible.
- As soon as we add array types, the filter logic is going to break because we use "is a list" as a criterion for "has not been passed a raw value to match". This may not be too big of a problem if we just don't support a list. But using some sort of actual struct to represent "this is constructed filter" may be the real answer.
- Add a runtime-intialization to checks that can return data loading instructions to be executed prior to pre-check
- Naturally, only inner joins are allowed now. I think only inner joins will be necessary, as the pattern in ash would be to side load related data.
- certain attribute names are not going to be allowed, like `or`, `and`, `in`, things like that.
- consider, just for the sake of good old fashion fun/cool factor, a parser that can parse a string into a query at compile time, so that queries can look nice in code.
- validate reverse relationships!!
- Factor out shared relationship options into its own schema, and merge them, for clearer docs.
- Consider making a "params builder" so you can say things like `Ash.Params.add_side_load(params, [:foo, :bar, :baz])` and build params up over time.
- validate using composite primary keys using the `data_layer.can?(:composite_primary_key)`
- Think hard about the data_layer.can? pattern to make sure we're giving enough info, but not too much.
- Use the sat solver at compile time to tell people when requests they've configured (and maybe all combinations of includes they've allowed?) couldn't possibly be allowed together.
- Support arbitrary "through" relationships
- Replace all my ugly `reduce` with tuples with `reduce_while`
- Framework internals need to stop using `api.foo`, because the code interface
is supposed to be optional
2020-04-05 22:24:56 +12:00
- relationships updates are _extremely_ unoptimized
- Clean up and test filter inspecting code.
- Handle related values on delete
- Use ashton to validate interface opts, not just document them: Easy and important
- Make an automatic test suite that confirms that data layers behave the way
2019-12-24 17:22:31 +13:00
they claim to behave, maybe.
2020-04-05 22:24:56 +12:00
- Perhaps, reverse relationships should eliminate the need to set destination field.
- When checking for filter inclusion, we should allow for `and` filters to each
contain _part_ of the filter, requiring that the whole thing is covered by all
2019-12-26 21:42:35 +13:00
of the `and`s at least
2020-04-05 22:24:56 +12:00
- add `init` to checks, and error check their construction when building the DSL
- Support filtering side loads. Especially useful in authorization code?
- Booleans need to not support `nil` values. That has to be a different type.
2019-12-27 10:33:35 +13:00
boolean filter/authorization logic is greatly enhanced if that is the case.
2020-04-05 22:24:56 +12:00
- Consider that authorization steps may eventually need to be able to branch.
This may or may not be difficult :)
- Allow a feature called `verify_after_write` that fetches the final attribute
2019-12-30 11:28:28 +13:00
variable from data somehow. Authorization fetchers will need to take state as
an argument or something like that, and maybe need to specify dependencies?.
2020-04-05 22:24:56 +12:00
- Validate that checks have the correct action type when compiling an action
- Make sure updating foreign key attributes behaves the same as setting a
2019-12-31 16:48:17 +13:00
relationship, or just disallow having editable attributes for relationship fkeys
2020-04-05 22:24:56 +12:00
- Validate `dependencies` and `must_fetch` (all `must_fetch` with dependencies
2019-12-31 16:48:17 +13:00
must have those dependencies as `must_fetch` also)
2020-04-05 22:24:56 +12:00
- Support branching/more complicated control flow in authorization steps
- The Authorization flow for creates/updates may be insufficient. Instead of
2019-12-31 16:48:17 +13:00
adding requests if relationships/attributes are changing, we may instead want
to embed that knowledge inside the sat solver itself. Basically a
`relationship_foo_is_changing?` fact, *and*ed with the resulting conditions.
I'm not even sure if thats possible though.
2020-04-05 22:24:56 +12:00
- We need to validate incoming attributes/relationships better.
- Side load authorization testing
- Validate that params on the way in are either all strings or all atoms
- Make it `rules: :none` (or something better) than `rules: false`
- Support `read_rules`, `create_rules`, `update_rules` for attributes/relationships
- Make an `Ash.Changeset` that is a superset of an ecto changeset
- Engine parallelization!
- Big optimization: If the filter _did_ need to fetch anything, find a way to
2020-01-15 08:00:38 +13:00
get that fetched value into the final query.
2020-04-05 22:24:56 +12:00
- Consider supporting one resource being a "more specific" version of another resource at
the _resource_ level, not the data layer level.
- Add `filter: [relationship_name: [all: [...filter...]]]` so you can assert that _all_ related items match a filter (for to many relationships)
- Right now, includes will be generating their authorization facts independently. This is no great loss because anything that isn't data dependent should be a strict check anyway. However, we may at some point want to check to see if any filter exactly matches a side load filter, and authorize them together/have them share.
- Write the engine as a state machine, not the recursive monster that it currently is
- Add the ability to configure what fields can identify a user (for instance email) and use those in checks.
- Figure out how to handle cross data layer filters for boolean.
- Is it possible/reasonable to do join tables that aren't unique on source_id/destination_id? Probably, but metadata would need to be organized differently.
2020-04-06 06:54:05 +12:00
- relationship changes are an artifact of the old way of doing things and are very ugly right now
2020-04-13 10:33:03 +12:00
- check if preparations have been done on a superset filter of a request and, if so, use it
2020-04-13 10:52:52 +12:00
- without transactions, we can't ensure that all changes are rolled back in the case that relationship updates are included. Don't think there is really anything to do about that, but something worth considering.
2020-04-19 15:26:05 +12:00
- perhaps have auth steps express which fields need to be present, so we can avoid loading things unnecessarily