Documentation Index
Fetch the complete documentation index at: https://wundergraphinc-milinda-eng-8701-implement-cache-warmer-from.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Minimum requirements
Make sure you have correctly set up Authentication & Authorization.Definition
Arguments
| Argument Name | Argument Type |
|---|---|
| scopes | [[openfed__Scope!]!]! |
openfed__Scope Scalar, which is an instance of permissions as
defined in your authentication token.
For example, "read:field".
Declaration
OR Scopes
Consider the following@requiresScopes declared on Query.a:
Query.a, it would require EITHER the "read:field" permission OR the "read:scalar"
permission.
AND Scopes
Consider the following @requiresScopes declared onQuery.b:
Query.b, it would require BOTH the "read:field" permission and the "read:scalar"
permission.
Lack of one or both would return an authorization error.
Multiple OR scopes with multiple AND scopes
Consider the following@requiresScopes declared on Query.c:
Query.c, it would require at least one of the following sets of scopes:
(("read:field" AND "read:scalar") OR ("read:query" AND "read:private") OR ("read:all"))
Declaration
The@requiresScopes directive can be declared on Enums, field definitions, Interfaces, Objects, and Scalars.
Declaration on field definitions (Interface and Object fields)
When@requiresScopes is declared on an Object field definition, that specific field will be protected (require
the specified scopes).
For example, given the following federated schema:
Query.ids would be protected in the following operation:
Interface.id would be protected in the following operation
(but note that @requiresScopes declared on an Interface field does not protect the fields of its implementations):
Declaration on the “type level” (Enums, Interfaces, Objects, and Scalars)
When@requiresScopes is declared on the “type level”, all field definitions with that named type (the innermost
response type name) will require those scopes to access.
For example, consider the following federated schema:
@requiresScopes has been declared on:
- The Enum “Enum”
- The Interface “Interface”
- The Object “ObjectB”
- The Scalar “Scalar”
Query.enumsrequires scopes because it returns type “Enum”, which requires the scopes"read:enum".Query.interfacesrequires scopes because it returns type “Interface”, which requires the scopes"read:interface".Query.objectAs.enumrequires scopes because it returns type “Enum”, which requires the scopes"read:enum".Query.objectAs.scalarrequires scopes because it returns type “Scalar”, which requires the scopes"read:scalar".Query.objectBsrequires scopes because it returns type “ObjectB”, which requires the scopes"read:object".Query.scalarsrequires scopes because it returns type “Scalar”, which requires the scopes"read:scalar".
Federation
The@requiresScopes directive will always persist in the federated schema.
Shared fields
If@requiresScopes is declared on a field definition in one subgraph, and another instance of the same
field definition (a shared field) is defined in another subgraph without @requiresScopes, then @requiresScopes
will still be declared on the federated field.
This also means that selecting this field will always require the defined scopes, regardless of whether it would be
resolved from a subgraph that did not declare @requiresScopes.
This is shown in the example below:
Combining scopes in the same subgraph (matrix multiplication)
Disparate sets of OR scopes affecting a single field will always combine through a multiplication matrix. This is to ensure data cannot be accessed without all appropriate permissions. If one set of AND scopes are declared on a field definition and another set of AND scopes are defined on the “type level”, the scopes will be multiplied together resulting in both sets of AND scopes being required. For instance, consider the following federated graph:Query.scalars would require the permissions "read:query" AND "read:scalar".
This is effectively the same as a single set of AND scopes defined as [["read:query", "read:scalar"]].
If there are multiple sets of AND scopes (multiple OR scopes), each set of AND scopes on the “field level” are
multiplied against each set of AND scopes on the “type level”.
Consider the following federated graph:
Query.scalars would require the permissions ("read:query" AND "read:scalar") OR
("read:scalar" AND "read:private").
This is effectively the same as a single set of OR scopes defined as
[["read:query", "read:scalar"], ["read:private", "read:scalar"]].
Each set of AND scopes on the “field level” will be added to each set of AND scopes on the “type level”.
Typically, the number of resultant scopes will be <number of AND scopes on field level> *
<number of AND scopes on type level>.
Consider the following federated graph:
["read:query", "read:field"]from the “field level” would be added to["read:scalar", "read:custom"]from the “type level”, producing["read:query", "read:field", "read:scalar", "read:custom"].["read:query", "read:field"]from the “field level” would be added to["read:sensitive"]from the “type level”, producing["read:query", "read:field", "read:sensitive"].["read:private"]from the “field level” would be added to["read:scalar", "read:custom"]from the “type level”, producing["read:private", "read:scalar", "read:custom"].["read:private"]from the “field level” would be added to["read:sensitive"]from the “type level”, producing["read:private", "read:sensitive"].["read:list"]from the “field level” would be added to["read:scalar", "read:custom"]from the “type level”, producing["read:list", "read:scalar", "read:custom"].["read:list"]from the “field level” would be added to["read:sensitive"]from the “type level”, producing["read:list", "read:sensitive"].
Combining scopes across subgraphs (matrix multiplication)
If multiple instances of a field (shared field) or type define scopes, those scopes will also be multiplied together. Consider the following subgraphs:Combining scopes (superset scope reduction)
In the event that combining scopes would produce superfluous scopes, they will be removed. Consider the following subgraphs:"read:private" now only exists with either "read:id" or "read:field".
This makes "read:private" redundant because if one has either the "read:id" or "read:field" permissions, this is
sufficient to access the field.
This the same case for the combined scopes of "read:id" and "read:field"; just one is sufficient.
And so, the resulting federated graph is actually shown below (note that "read:private" is removed):
Errors
In the event that an agent without relevant permissions selects a non-nullable field that is declared with@requiresScopes, an authorization error will be returned, and the entire data will be null
(see Non-nullable authenticated data requested among unauthenticated data).
@requiresScopes, an authorization error will be returned, and the specific field will be null
(see Partial data):
Partial data (nullable data requiring permissions)
Imagine an agent without relevant permissions selects a field that is declared with @requiresScopes and the response type of that field is nullable. However, the agent also selects a field that is not declared @requiresScopes (nor are any potential nested fields). In this event, an authorization error will still be returned, but the specific data that requires authentication will be null, while the data not requiring authentication will be returned. Consider the following federated graph and corresponding query:Non-nullable data requiring scopes requested among data not requiring scopes
In the event an agent without relevant permissions selects any non-nullable fields that declare@requiresScopes (and
therefore require one or more permissions), an authorization error will be returned, and the entire data will
return null.
This is true even if one or more field selections did not require permissions or are nullable.
Consider the following federated graph and corresponding query:
"read:int" permission sending the query above would receive something like the following:
Partial permissions
An agent must have all relevant permissions within at least one entire set of AND scopes among the OR scopes declared through@requiresScopes for a selected field to return data.
In the event that the agent has some but not all permissions, the error message will be transparent: