Skip to content

Commit 67aabcc

Browse files
committed
WIP - formatting and initial editorial
1 parent eecd795 commit 67aabcc

File tree

1 file changed

+47
-84
lines changed

1 file changed

+47
-84
lines changed

src/pages/blog/2024-06-28-why-i-like-graphql.mdx

+47-84
Original file line numberDiff line numberDiff line change
@@ -5,116 +5,81 @@ date: 2024-06-28
55
byline: Marc-André Giroux, edited by Jeff Auriemma
66
---
77

8-
A recent post, [Why, after 6 years, I’m over GraphQL](https://bessey.dev/blog/2024/05/24/why-im-over-graphql/), made the rounds in the tech circle. The author argues that they would not recommend GraphQL anymore due to concerns like security, performance, and maintainability. In this post, I want to go over some interesting points made, and some points I think don't hold up to scrutiny.
8+
This post is edited from its [original publication](https://www.magiroux.com/eight-years-of-graphql/) on Marc-André Giroux's blog. Though originally intended to respond to a specific article, we at the GraphQL Foundation felt that Marc-André's post would stand well on its own with a few light edits. What follows is a well-informed set of practices and principles that engineers should consider when using GraphQL in production.
99

10-
Always be Persistin'
11-
--------------------
10+
## Use persisted queries
1211

13-
Ok, first of all, let's start with something maybe a little bold: **Persisted Queries are basically essential for building a solid GraphQL API**. If you are not using them, you're doing GraphQL on hard mode. It's not impossible, but it leads to difficult problems, some of them discussed in the post. After 8 years of GraphQL, this has only gotten more and more important to me. Persist all queries, as soon as possible in your GraphQL journey. You'll thank yourself later.
12+
Ok, first of all, let's start with something maybe a little bold: **Persisted Queries are basically essential for building a solid GraphQL API**. If you are not using them, you're doing GraphQL on hard mode. It's not impossible, but it leads to difficult problems that show up in GraphQL debates from time to time. After 8 years of GraphQL, this has only gotten more and more important to me. Persist all queries, as soon as possible in your GraphQL journey. You'll thank yourself later.
1413

15-
It is a little sad that this is basically glossed over and mentionned only in a small note at the bottom:
16-
17-
> Persisted queries are also a mitigation for this and many attacks, but if you actually want to expose a customer facing GraphQL API, persisted queries are not an option.
18-
19-
I assume the author is talking about public APIs here. While I don't think this is necessarily inherently true (One could ask customers to register queries first, figuring out the DX for this would be an interesting task), it's still a valid point. That's why [We Don’t See Many Public GraphQL APIs](https://productionreadygraphql.com/blog/2019-10-21-why-we-dont-see-many-public-graphql-apis) out there, and why I would not pick GraphQL if I were to expose a public API today.
14+
Public APIs are a bit different. To be clear, it's not necessarily true that you can't use Persisted Queries in public APIs; one could ask customers to register queries first. But figuring out the DX for this would be an interesting task. That's why [We Don’t See Many Public GraphQL APIs](https://productionreadygraphql.com/blog/2019-10-21-why-we-dont-see-many-public-graphql-apis) out there, and why I would not pick GraphQL if I were to expose a public API today.
2015

2116
For a public API, a coarser-grained, resource-based API works great, and can be described through OpenAPI. SDKs can be generated through amazing tools like [Kiota](https://learn.microsoft.com/en-us/openapi/kiota/overview). It's hard to beat a well-made SDK for a public API, and in my experience, that's actually what customers expect and want to use. Moving on.
2217

23-
Haxors
24-
------
25-
26-
The author's first point is about GraphQL's allegedly bigger attack surface. Again this focuses more on completely public GraphQL APIs which are relatively rare:
27-
28-
> exposing a query language to untrusted clients increases the attack surface of the application
29-
30-
I think that's right, it's hard to argue about this, hence not exposing a query language to untrusted clients unless you're ready to handle the trade-offs. But let's see what they think is hard to get right here.
31-
32-
Authz is really hard...
33-
-----------------------
34-
35-
Authorization is a challenge with GraphQL. The thing is it's almost always challenging no matter what API style you use. I'd go as far as saying it is a challenge with designing software in general. The example given in the post actually highlights this very well:
36-
37-
query {
38-
user(id: 321) {
39-
handle # ✅ I am allowed to view Users public info
40-
email # 🛑 I shouldn't be able to see their PII just because I can view the User
41-
}
42-
user(id: 123) {
43-
blockedUsers {
44-
# 🛑 And sometimes I shouldn't even be able to see their public info,
45-
# because context matters!
46-
handle
47-
}
48-
}
18+
## Authorization
19+
20+
Authorization is a challenge with GraphQL. The thing is it's almost always challenging no matter what API style you use. I'd go as far as saying it is a challenge with designing software in general. Here's an example from a recent post that actually highlights this very well:
21+
22+
```graphql
23+
query {
24+
user(id: 321) {
25+
handle # ✅ I am allowed to view Users public info
26+
email # 🛑 I shouldn't be able to see their PII just because I can view the User
27+
}
28+
user(id: 123) {
29+
blockedUsers {
30+
# 🛑 And sometimes I shouldn't even be able to see their public info,
31+
# because context matters!
32+
handle
4933
}
50-
34+
}
35+
}
36+
```
5137

5238
`handle` and `email` both have different authorization rules. This is actually quite tricky to handle with a `GET /user/:id` endpoint as well. There's really nothing that makes GraphQL harder here. Yes when fine-grained authorization is needed, you'll need fine-grained authorization checks at that level.
5339

54-
user(id: 123) {
55-
blockedUsers {
56-
# 🛑 And sometimes I shouldn't even be able to see their public info,
57-
# because context matters!
58-
handle
59-
}
60-
}
61-
40+
```graphql
41+
user(id: 123) {
42+
blockedUsers {
43+
# 🛑 And sometimes I shouldn't even be able to see their public info,
44+
# because context matters!
45+
handle
46+
}
47+
}
48+
```
6249

6350
This part is interesting as well and another challenge of authorizing code and models in general. The same "object" accessed through different contexts can actually have different authorization rules. Again, this is common in all API styles as well. That's why I actually usually advise designing this through a different model entirely, since it's likely they'll evolve differently. Here this is even possibly an API design mistake instead. If `handle` should never be seen for `blockedUsers`, then it shouldn't even be part of the schema here. This is a super common mistake where folks try to reuse common models/types instead of being specific.
6451

6552
After 8 years of GraphQL, I realize more and more that authorization is much more than a GraphQL problem. The API layer part is easy, but most code-bases are much more complex and must guard against unauthorized access in much better ways. Companies like [oso](https://www.osohq.com/) and [authzed](https://authzed.com/) and two great examples of how to do this well but also how complex this thing can be in general.
6653

67-
Demand Control
68-
==============
69-
70-
The section on rate limiting starts with this:
54+
## Demand Control
7155

72-
> With GraphQL we cannot assume that all requests are equally hard on the server.
73-
74-
Let me fix this to something I think is more accurate:
75-
76-
> We cannot assume that all requests are equally hard on the server.
77-
78-
There, much better. The truth is that no matter what API style you use, whether that's a binary protocol over UDP or GraphQL, it is extremelly rare, especially as the API surface grows, that all use-cases and "requests" will be equally expensive for a server to process.
56+
We cannot assume that all requests are equally hard on the server, whether we're using GraphQL or not. The truth is that no matter what API style you use, whether that's a binary protocol over UDP or GraphQL, it is extremely rare, especially as the API surface grows, that all use-cases and "requests" will be equally expensive for a server to process.
7957

8058
A very easy example to show this is simply a paginated endpoint:
8159

82-
GET /users?first=100
83-
60+
```
61+
GET /users?first=100
8462
85-
GET /users?first=1
86-
63+
GET /users?first=1
64+
```
8765

8866
Or super expensive mutations:
8967

90-
POST /expensive-creation
91-
68+
```
69+
POST /expensive-creation
70+
```
9271

93-
To be 100% fair, of course GraphQL exposes this problem a bit more, earlier on, especially when not using persisted queries (Which should not happen!!). And while folks building a small RPC API may not need to implement variable rate limiting or some sort of cost categories, they almost always end up having to.
72+
To be 100% fair, of course GraphQL exposes this problem a bit more, earlier on, especially when not using persisted queries (Which should not happen!). And while folks building a small RPC API may not need to implement variable rate limiting or some sort of cost categories, they almost always end up having to.
9473

9574
And again: this focuses on public, unauthenticated public APIs. I think we can agree this is not [GraphQL's Sweet Spot](https://productionreadygraphql.com/blog/2020-05-14-sweetspot).
9675

97-
The rest of the section shows how simple it is to rate limit a simple rest API. Sure? I have never had the chance to work on an API that was that easy to implement demand control for.
98-
99-
Performance
100-
-----------
101-
102-
The performance section focuses mainly on dataloader and n+1s. I think the author makes some good points here. It's true that a GraphQL API must be ready for many query shapes and use cases. It is wise to implement efficient data loader for most fields through dataloaders. In fact, that's why I don't recommend using datafetching techniques that are overly coupled to the query shape, things like AST analysis, lookaheads, and things using context from sibling or parent fields.
103-
104-
The author acknowledges that this is a problem with REST as well, but still makes this statement:
105-
106-
> Meanwhile, in REST, we can generally hoist nested N+1 queries up to the controller, which I think is a pattern much easier to wrap your head around.
107-
108-
Again this is an extremelly simple example, which has a trivial solution. But it's true, an endpoint based API that is simple can usually be kept simple, rather than being part of multiple other use-cases that could affect its performance long term.
109-
110-
Overall I think dataloader is a requirement for GraphQL, and I agree that it's part of the slight complexity add for a GraphQL API, even simple ones. Authorization n+1s are also an issue.
76+
## Performance
11177

112-
> Again, this problem simply does not exist in the REST world.
78+
Many GraphQL critics talk about the N+1 problem and DataLoader. It's true that a GraphQL API must be ready for many query shapes and use cases. It is wise to implement efficient data loader for most fields through dataloaders. In fact, that's why I don't recommend using datafetching techniques that are overly coupled to the query shape, things like AST analysis, lookaheads, and things using context from sibling or parent fields. But an honest observer should acknowledge that this is a problem with REST as well. As the complexity of an endpoint or operation increases, an engineer should expect to have to make more trade-offs in the name of performance.
11379

114-
But that's simply not true. Authz n+1s exist everywhere including in REST given a sufficiently complex API. Performant authz is a problem of its own.
80+
Overall I think dataloader is a requirement for GraphQL, and I agree with critics that it's part of the slight complexity add for a GraphQL API, even simple ones. Authorization N+1s are also an issue, though, again, REST has these issues as well.
11581

116-
Coupling
117-
--------
82+
## Coupling
11883

11984
> In my experience, in a mature GraphQL codebase, your business logic is forced into the transport layer. This happens through a number of mechanisms, some of which we’ve already talked about:
12085
@@ -136,8 +101,7 @@ I actually agree with this one. Data-loading in a performant way can be in tensi
136101
137102
True, similar to the point above.
138103

139-
Breaking Changes??
140-
------------------
104+
## Breaking Changes??
141105

142106
Probably the strangest sentence in the post is this one:
143107

@@ -149,8 +113,7 @@ Arguably one of GraphQL's most powerful tool is around continuous evolution. The
149113

150114
Breaking changes and deprecations suck. We all try to avoid them, and yes it's annoying for clients. But if anything GraphQL makes this easier, not harder.
151115

152-
Conclusion
153-
----------
116+
## Conclusion
154117

155118
Overall, I can feel the pain of the author when it comes to building public GraphQL APIs. It's not easy. But the post in general never really addresses a very common use-case for GraphQL, which is an internal API for known multiple clients. In this context, using persisted queries is easy, and solves a lot of the problems the author encountered in their journey. There are also a lot of problems mentionned here that are hard problems in general, and I don't always buy the fact that GraphQL makes them any harder.
156119

0 commit comments

Comments
 (0)