Skip to content

Commit 04fddc4

Browse files
authored
Documentation improvements for Public Preview (#1253)
## Why make this change? Improve documentation ## What is this change? Updating TOC and adding troubleshooting ## How was this tested? N/A ## Sample Request(s) N/A
1 parent e34a804 commit 04fddc4

36 files changed

+507
-391
lines changed

README.md

+16-9
Original file line numberDiff line numberDiff line change
@@ -9,24 +9,29 @@ Latest version of Data API builder is **0.5.34** [What's new?](./docs/whats-new
99

1010
**Data API builder for Azure Databases provides modern REST and GraphQL endpoints to your Azure Databases.**
1111

12-
With Data API builder, database objects can be exposed via REST or GraphQL endpoints so that your data can be accessed using modern techniques on any platform, any language, and any device. With an integrated and flexible policy engine, granular security is assured; integrated with Azure SQL, SQL Server, PostgreSQL, MySQL and Cosmos DB, gives developers an efficiency boost like never seen before.
12+
With data API builder, database objects can be exposed via REST or GraphQL endpoints so that your data can be accessed using modern techniques on any platform, any language, and any device. With an integrated and flexible policy engine, native support for common behavior like pagination, filtering, projection and sorting, the creation of CRUD backend services can be done in minutes instead of hours or days, giving developers an efficiency boost like never seen before.
1313

14-
![Data API builder Architecture Overview Diagram](./docs/media/data-api-builder-overview.png)
14+
Data API builder is Open Source and works on any platform. It can be executed on-premises, in a container or as a Managed Service in Azure, via the new [Database Connection](https://learn.microsoft.com/azure/static-web-apps/database-overview) feature available in Azure Static Web Apps.
15+
16+
![Data API builder Architecture Overview Diagram](./docs/media/dab-architecture-overview.png)
1517

1618
## Features
1719

1820
- Allow collections, tables, views and stored procedures to be accessed via REST and GraphQL
19-
- Support authentication via JWT and EasyAuth
21+
- Support authentication via OAuth2/JWT
22+
- Support for EasyAuth when running in Azure
2023
- Role-based authorization using received claims
2124
- Item-level security via policy expressions
2225
- REST
2326
- CRUD operations via POST, GET, PUT, PATCH, DELETE
24-
- filtering, sorting and pagination
27+
- Filtering, sorting and pagination
2528
- GraphQL
26-
- queries and mutations
27-
- filtering, sorting and pagination
28-
- relationship navigation
29+
- Queries and mutations
30+
- Filtering, sorting and pagination
31+
- Relationship navigation
2932
- Easy development via dedicated CLI
33+
- Full integration with Static Web Apps via Database Connection feature when running in Azure
34+
- Open Source
3035

3136
## Getting Started
3237

@@ -36,9 +41,11 @@ To get started quickly with Data API builder for Azure Databases, you can use th
3641

3742
Documentation is available in the [`docs`](./docs) folder.
3843

39-
## Limitations
44+
## Samples
45+
46+
Several samples are available already. In the `./samples` folder, you'll find the code needed to follow the [Getting Started](./docs/getting-started/getting-started.md) tutorial.
4047

41-
- JWT only supports Azure AD
48+
More samples, including end-to-end samples using the most common frontend framework, are available in the [https://github.com/Azure-Samples/data-api-builder] repository.
4249

4350
## Known Issues
4451

docker/docker-compose-cosmos.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
version: "3.9"
55
services:
66
hawaii:
7-
image: "hawaiiacr.azurecr.io/dab/refs/heads/main:latest"
7+
image: "mcr.microsoft.com/azure-databases/data-api-builder:latest"
88
ports:
99
- "5000:5000"
1010
volumes:

docker/docker-compose-mssql.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
version: "3.9"
55
services:
66
hawaii:
7-
image: "hawaiiacr.azurecr.io/dab/refs/heads/main:latest"
7+
image: "mcr.microsoft.com/azure-databases/data-api-builder:latest"
88
ports:
99
- "5000:5000"
1010
volumes:

docker/docker-compose-mysql.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
version: "3.9"
55
services:
66
hawaii:
7-
image: "hawaiiacr.azurecr.io/dab/refs/heads/main:latest"
7+
image: "mcr.microsoft.com/azure-databases/data-api-builder:latest"
88
ports:
99
- "5000:5000"
1010
volumes:

docker/docker-compose-postgresql.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
version: "3.9"
55
services:
66
hawaii:
7-
image: "hawaiiacr.azurecr.io/dab/refs/heads/main:latest"
7+
image: "mcr.microsoft.com/azure-databases/data-api-builder:latest"
88
ports:
99
- "5000:5000"
1010
volumes:

docs/authentication-azure-ad.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -85,19 +85,19 @@ Where the`APP_ID` is the "Application (client) ID" and the `TENANT_ID` is the "D
8585

8686
Make sure you are logged in to AZ CLI with the account that you want to use to authenticate against Data API builder.
8787

88-
```sh
88+
```shell
8989
az login
9090
```
9191

9292
and select the subscription where you have [configured the Data API builder App Registration](#configure-server-app-registration).
9393

94-
```sh
94+
```shell
9595
az account set --subscription <subscription name or id>
9696
```
9797

9898
then run the following command to try to authenticate against the newly created scope:
9999

100-
```sh
100+
```shell
101101
az account get-access-token --scope api://<Application ID>/Endpoint.Access
102102
```
103103

@@ -107,7 +107,7 @@ It should return an error like the following:
107107
AADSTS65001: The user or administrator has not consented to use the application with ID '<AZ CLI Application ID GUID>' named 'Microsoft Azure CLI'. Send an interactive authorization request for this user and resource.
108108
```
109109

110-
The \<AZ CLI Application ID GUID\>, which represents AZ CLI, must be allowed to authenticate against the Data API builder Azure AD Application. To do that, search for the "Data API builder" application in the Azure Portal or go to the Azure Active Directory portal blade and select **App Registrations**. Select the "Data API builder" application and then:
110+
The '\<AZ CLI Application ID GUID\>', which represents AZ CLI, must be allowed to authenticate against the Data API builder Azure AD Application. To do that, search for the "Data API builder" application in the Azure Portal or go to the Azure Active Directory portal blade and select **App Registrations**. Select the "Data API builder" application and then:
111111

112112
1. Navigate to **Expose an API** from your App Registration overview page.
113113
1. Under *Authorized client applications*, select **Add a client application**
@@ -176,14 +176,14 @@ To test out that authentication is working fine, you can update your configurati
176176

177177
You can use any HTTP client now to send an authenticated request. Firstly get the token:
178178

179-
```sh
179+
```shell
180180
az account get-access-token --scope api://<Application ID>/Endpoint.Access --query "accessToken" -o tsv
181181
```
182182

183183
then you can use the obtained access token to issue a successful authenticated request to a protected endpoint:
184184

185-
```sh
186-
curl -k -r GET -H 'Authorization: Bearer ey...xA' -H 'X-MS-API-ROLE: Sample.Role' https://localhost:5001/api/Book
185+
```shell
186+
curl -k -r GET -H 'Authorization: Bearer ey...' -H 'X-MS-API-ROLE: Sample.Role' https://localhost:5001/api/Book
187187
```
188188

189189
## Create Postman Client App Registration

docs/authentication.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The supported providers are the following:
4343

4444
## Roles Selection
4545

46-
Once a request has been authenticated via any of the available options, the roles defined in the token will be used to help determine how permission rules will be evaluated to [authorize](./authorization.md) the request. Any authenticated request will be automatically assigned to the `authenticated` system role, unless a user role is requested to be used, as described in the [Authorization](./authorization.md.md) document.
46+
Once a request has been authenticated via any of the available options, the roles defined in the token will be used to help determine how permission rules will be evaluated to [authorize](./authorization.md) the request. Any authenticated request will be automatically assigned to the `authenticated` system role, unless a user role is requested to be used, as described in the [Authorization](./authorization.md) document.
4747

4848
## Anonymous Requests
4949

docs/authorization.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ There are two system roles:
1515

1616
### User Roles
1717

18-
An authenticated request comes with a set of role claims that describe the requestor's role membership. When using EasyAuth authentication, the received token can be something like the following:
18+
An authenticated request comes with a set of role claims that describe the requestor's role membership. When using EasyAuth authentication (the default when using `StaticWebApps` as authentication mode), the received token can be something like the following:
1919

2020
```json
2121
{
@@ -33,7 +33,7 @@ An authenticated request comes with a set of role claims that describe the reque
3333
the roles will be used to match any defined role in the configuration file. For example, a request coming in with the aforementioned sample token will be matched with the `author` permissions if the sample `book` entity is configured like the following:
3434

3535
```json
36-
"book": {
36+
"Book": {
3737
"source": "books",
3838
"permissions": [
3939
{
@@ -80,11 +80,11 @@ A request can only be evaluated in the context of a single role. So, if the acce
8080

8181
the desired role must be specified in the `X-MS-API-ROLE` HTTP Header.
8282

83-
If `X-MS-API-ROLE` is not specified for an authenticated request, the request is assumed to be evaluated in the context of the `authenticated` system role.
83+
> ATTENTION! If `X-MS-API-ROLE` is not specified for an authenticated request, the request is assumed to be evaluated in the context of the `authenticated` system role.
8484
8585
## Permissions
8686

87-
Permissions and their components, `roles`, `actions`, `fields` and `policies`, are explained in the [configuration file](./configuration-file.md#permissions) documentation.
87+
Permissions and their components, `roles`, `actions`, `fields` and `policies`, are explained in the [configuration file](./configuration-file.md#permissions) documentation.
8888

8989
There can be multiple roles defined in an entity's permissions configuration. However, a request is only evaluated in the context of a single role. The role evaluated for a request is either a system role automatically assigned by the Data API builder engine or a role manually specified in the `X-MS-API-ROLE` HTTP header.
9090

@@ -141,7 +141,7 @@ For more details, see the [configuration file](./configuration-file.md#actions)
141141

142142
### Item level security
143143

144-
Database policy expressions enable results to be restricted even further. Database policies translate OData expressions to query predicates executed against the database. Database policy expressions are supported for the read, update, and delete actions. See the [configuration file](./configuration-file.md#policies) documentation for a detailed explanation of database policies.
144+
Database policy expressions enable results to be restricted even further. Database policies translate expressions to query predicates executed against the database. Database policy expressions are supported for the read, update, and delete actions. See the [configuration file](./configuration-file.md#policies) documentation for a detailed explanation of database policies.
145145

146146
|Action | Database Policy Support | Details |
147147
|---|:-:|---|

docs/azure-container-self-hosting.md

Whitespace-only changes.

docs/runtime-to-database-authorization.md docs/azure-sql-session-context-rls.md

+23-28
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,22 @@
1-
# Runtime to Database Authorization
1+
# SESSION_CONTEXT and Row Level Security
22

3-
- [MsSql](#mssql)
3+
## SESSION_CONTEXT
44

5-
## MsSql
5+
For Azure SQL and SQL Server, Data API builder can take advantage of `SESSION_CONTEXT` to send user specified metadata to the underlying database. Such metadata is available to Data API builder by virtue of the claims present in the access token. The data sent to the database can then be used to configure an additional level of security (e.g. by configuring Security policies) to further prevent access to data in operations like SELECT, UPDATE, DELETE. The `SESSION_CONTEXT` data is available to the database for the duration of the database connection until that connection is closed. The same data can be used inside a stored procedure as well.
66

7-
### SESSION_CONTEXT
7+
## How to read and write to `SESSION_CONTEXT`
88

9-
For MsSql, Data API builder uses SESSION_CONTEXT to send user specified metadata to the underlying database. Such metadata is available to Data API builder by virtue of the claims present in the access token.
10-
The data sent to the database can then be used to configure an additional level of security (e.g. by configuring Security policies) to further prevent access
11-
to data in operations like SELECT, UPDATE, DELETE. The SESSION_CONTEXT data is available to the database for the duration of the database connection until that connection is closed. The same data can be used inside a stored procedure as well.
9+
Learn more about setting `SESSION_CONTEXT` data from the `sp_set_session_context` [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/system-stored-procedures/sp-set-session-context-transact-sql).
1210

13-
#### How to read and write to SESSION_CONTEXT
11+
## How to enable `SESSION_CONTEXT` in Data API builder
1412

15-
Learn more about setting SESSION_CONTEXT data from the `sp_set_session_context` [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/system-stored-procedures/sp-set-session-context-transact-sql).
13+
In the config file, the `data-source` section sub-key `options` holds database specific configuration properties. To enable `SESSION_CONTEXT`, the user needs to set the property `set-session-context` to `true`. This can be done while generating the config file via CLI at the first time or can be done later as well by setting the property manually in the config file.
1614

17-
#### How to enable SESSION_CONTEXT in Data API builder
15+
## CLI command to set the `SESSION_CONTEXT`
1816

19-
In the config file, the `data-source` section sub-key `options` holds database specific configuration properties. To enable SESSION_CONTEXT, the user needs to set the property `set-session-context` to `true` for MsSql. This can be done while generating the config file via CLI at the first time or can be done later as well by setting the property manually in the config file.
17+
Use the command `dab init` to generate the config file. The `--set-session-context` flag can be used to set the `SESSION_CONTEXT` property to `true`. The command looks like:
2018

21-
##### CLI command to set the SESSION_CONTEXT
22-
23-
```bash
19+
```shell
2420
dab init -c config.json --database-type mssql --connection-string some-connection-string --set-session-context true
2521
```
2622

@@ -36,9 +32,9 @@ This will generate the data-source section in config file as follows:
3632
}
3733
```
3834

39-
#### How and what data is sent via SESSION_CONTEXT (Example)
35+
## How and what data is sent via SESSION_CONTEXT
4036

41-
All the claims present in the EasyAuth/JWT token are sent via the SESSION_CONTEXT to the underlying database. A sample decoded EasyAuth token looks like:
37+
All the claims present in the EasyAuth/JWT token are sent via the `SESSION_CONTEXT` to the underlying database. A sample decoded EasyAuth token looks like:
4238

4339
```json
4440
{
@@ -94,7 +90,7 @@ All the claims present in the EasyAuth/JWT token are sent via the SESSION_CONTEX
9490
}
9591
```
9692

97-
All the claims present in the the token are translated into key-value pairs passed via SESSION_CONTEXT query formulated like below:
93+
All the claims present in the the token are translated into key-value pairs passed via `SESSION_CONTEXT` query formulated like below:
9894

9995
```sql
10096
EXEC sp_set_session_context 'aud', '<AudienceID>', @read_only = 1;
@@ -110,20 +106,19 @@ EXEC sp_set_session_context 'uti', '_sSP3AwBY0SucuqqJyjEAA', @read_only = 1;
110106
EXEC sp_set_session_context 'ver', '2.0', @read_only = 1;
111107
```
112108

113-
#### Example: How to use SESSION_CONTEXT to configure additional level of security (Row Level Security)
109+
## Example: How to use `SESSION_CONTEXT` to leverage Row Level Security (RLS)
114110

115-
For more details about Row Level Security (RLS), please refer this [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/security/row-level-security), but, basically RLS enables us to use group membership or execution context to control access to rows in a database table.
111+
For more details about Row Level Security (RLS), please refer this [Microsoft Learn article](https://learn.microsoft.com/sql/relational-databases/security/row-level-security).
116112

117113
In this demonstration, we will first be creating a database table `revenues`. We will then configure a [Security Policy](https://learn.microsoft.com/sql/t-sql/statements/create-security-policy-transact-sql) which would add a FILTER PREDICATE
118-
to this `revenues` table. The [FILTER PREDICATE](https://learn.microsoft.com/sql/relational-databases/security/row-level-security#Description) is nothing but a table-valued function which will filter the rows accessible to operations SELECT, UPDATE, DELETE
119-
based on the criteria that is configured for the function.
114+
to this `revenues` table. The [FILTER PREDICATE](https://learn.microsoft.com/sql/relational-databases/security/row-level-security#Description) is nothing but a table-valued function which will filter the rows accessible to operations SELECT, UPDATE, DELETE based on the criteria that is configured for the function.
120115
At the end of the demonstration, we will see that only those rows are returned to the user which match the criteria of the filter predicate imposed by the security policy.
121116

122-
##### Laying down the ground work for SESSION_CONTEXT- SQL Queries
117+
### Laying down the ground work for `SESSION_CONTEXT` - SQL Queries
123118

124119
We can execute the below SQL queries in the same order via SSMS or any other SQL client to lay the groundwork for SESSION_CONTEXT.
125120

126-
###### Creating revenues table
121+
#### Creating revenues table
127122

128123
```sql
129124
CREATE TABLE revenues(
@@ -142,9 +137,9 @@ INSERT INTO revenues(id, category, revenue, username) VALUES
142137
(4, 'Series', 40000, 'Davide');
143138
```
144139

145-
###### Creating function to be used as FILTER PREDICATE
140+
#### Creating function to be used as FILTER PREDICATE
146141

147-
Create a function to be used as a filter predicate by the security policy to restrict access to rows in the table for SELECT, UPDATE, DELETE operations. We use the variable @username to store the value of the column revenues.username and then filter the rows accessible to the user using the filter predicate with condition: @username = SESSION_CONTEXT(N'name').
142+
Create a function to be used as a filter predicate by the security policy to restrict access to rows in the table for SELECT, UPDATE, DELETE operations. We use the variable @username to store the value of the column revenues.username and then filter the rows accessible to the user using the filter predicate with condition:` @username = SESSION_CONTEXT(N'name')`.
148143

149144
```sql
150145
CREATE FUNCTION dbo.revenuesPredicate(@username varchar(max))
@@ -154,7 +149,7 @@ AS RETURN SELECT 1 AS fn_securitypredicate_result
154149
WHERE @username = CAST(SESSION_CONTEXT(N'name') AS varchar(max));
155150
```
156151

157-
###### Creating SECURITY POLICY to add to the revenues table
152+
#### Creating SECURITY POLICY to add to the revenues table
158153

159154
Adding a security policy which would restrict access to the rows in revenues table for SELECT, UPDATE, DELETE operations using the filter predicate dbo.revenuesPredicate.
160155

@@ -164,7 +159,7 @@ ADD FILTER PREDICATE dbo.revenuesPredicate(username)
164159
ON dbo.revenues;
165160
```
166161

167-
##### SESSION_CONTEXT in action
162+
#### SESSION_CONTEXT in action
168163

169164
Now that we have laid the groundwork for SESSION_CONTEXT, it's time to see it in action.
170165

@@ -173,7 +168,7 @@ EXEC sp_set_session_context 'name', 'Sean'; -- setting the value of 'name' key i
173168
SELECT * FROM dbo.revenues;
174169
```
175170

176-
###### Result
171+
#### Result
177172

178173
Rows corresponding to `username` = 'Sean' are returned as only these rows match the criteria of the filter predicate imposed by the security policy.
179174

docs/configuration-file.md

+9-2
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,12 @@ make sure to replace the **VERSION-suffix** placeholder with the version you wan
9090
https://dataapibuilder.azureedge.net/schemas/v0.4.11-alpha/dab.draft.schema.json
9191
```
9292

93+
the **latest** version of the schema is always available at
94+
95+
```txt
96+
https://dataapibuilder.azureedge.net/schemas/latest/dab.draft.schema.json
97+
```
98+
9399
### Data Source
94100

95101
The `data-source` element contains the information needed to connect to the backend database.
@@ -104,9 +110,10 @@ The `data-source` element contains the information needed to connect to the back
104110
`database-type` is a `enum string` and is used to specify what is the used backend database. Allowed values are:
105111

106112
+ `mssql`: for Azure SQL DB, Azure SQL MI and SQL Server
107-
+ `postgresql`: for PostgresSQL
113+
+ `postgresql`: for PostgreSQL
108114
+ `mysql`: for MySQL
109-
+ `cosmos`: for Cosmos DB
115+
+ `cosmosdb_nosql`: for Cosmos DB NoSQL API
116+
+ `cosmosdb_postgresql`: for Cosmos DB PostgreSQL API
110117

111118
while `connection-string` contains the ADO.NET connection string that Data API builder will use to connect to the backend database
112119

0 commit comments

Comments
 (0)