-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #14 from authzed/8-update-contributing
Flesh out README and CONTRIBUTING
- Loading branch information
Showing
2 changed files
with
99 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,28 +1,33 @@ | ||
# authzed dotnet | ||
[![](https://img.shields.io/badge/discord-spicedb-7289da?style=flat-square "Discord Badge")](https://discord.gg/spicedb) | ||
[![](https://img.shields.io/badge/[email protected]?style=flat-square "Twitter Badge")](https://twitter.com/authzed) | ||
[![](https://img.shields.io/badge/linkedin-+authzed-2D65BC.svg?style=flat-square "LinkedIn Badge")](https://linkedin.com/company/authzed) | ||
# Authzed.Net | ||
[![Nuget](https://img.shields.io/nuget/v/Authzed.Api?color=%23006dad)](https://www.nuget.org/packages/Authzed.Net) | ||
[![License](https://img.shields.io/badge/license-Apache--2.0-blue.svg)](https://www.apache.org/licenses/LICENSE-2.0.html) | ||
[![Build Status](https://github.com/authzed/authzed-dotnet/workflows/Test/badge.svg)](https://github.com/authzed/authzed-dotnet/actions) | ||
[![Mailing List](https://img.shields.io/badge/email-google%20groups-4285F4)](https://groups.google.com/g/authzed-oss) | ||
[![Discord Server](https://img.shields.io/badge/discord-spicedb-7289da?style=flat-square "Discord Badge")](https://discord.gg/spicedb) | ||
[![Twitter](https://img.shields.io/badge/[email protected]?style=flat-square "Twitter Badge")](https://twitter.com/authzed) | ||
[![LinkedIn](https://img.shields.io/badge/linkedin-+authzed-2D65BC.svg?style=flat-square "LinkedIn Badge")](https://linkedin.com/company/authzed) | ||
|
||
This repository houses the official .NET (generated in C#) client library for Authzed and SpiceDB. | ||
|
||
This project is intended to be a canonical source of generated ProtoBuf messages for gRPC communication. | ||
[Authzed] is a database and service that stores, computes, and validates your application's permissions. | ||
|
||
[SpiceDB] is a database system for managing security-critical permissions checking. | ||
Developers create a schema that models their permissions requirements and use a client library, such as this one, to apply the schema to the database, insert data into the database, and query the data to efficiently check permissions in their applications. | ||
|
||
SpiceDB acts as a centralized service that stores authorization data. | ||
Once stored, data can be performantly queried to answer questions such as "Does this user have access to this resource?" and "What are all the resources this user has access to?". | ||
Supported client API versions: | ||
|
||
[Authzed] operates the globally available, serverless database platform for SpiceDB. | ||
- [v1](https://docs.authzed.com/reference/api#authzedapiv1) | ||
|
||
You can find more info about the API in the [Authzed Documentation API Reference] or the [Authzed API Buf Registry repository]. | ||
You can find more info on each API on the [Authzed API reference documentation]. | ||
Additionally, Protobuf API documentation can be found on the [Buf Registry Authzed API repository]. | ||
|
||
See [CONTRIBUTING.md] for instructions on how to contribute and perform common tasks like building the project and running tests. | ||
|
||
[SpiceDB]: https://github.com/authzed/spicedb | ||
[Authzed]: https://authzed.com | ||
[Authzed Documentation API Reference]: https://docs.authzed.com/reference/api | ||
[Authzed API Buf Registry repository]: https://buf.build/authzed/api | ||
[Authzed API Reference documentation]: https://docs.authzed.com/reference/api | ||
[Buf Registry Authzed API repository]: https://buf.build/authzed/api/docs/main | ||
[CONTRIBUTING.md]: CONTRIBUTING.md | ||
|
||
[SpiceDB]: https://github.com/authzed/spicedb | ||
[Discord]: https://authzed.com/discord | ||
[Urgent]: https://github.com/authzed/authzed-rb/labels/priority%2F0%20urgent | ||
[High]: https://github.com/authzed/authzed-rb/labels/priority%2F1%20high | ||
|
@@ -31,8 +36,84 @@ See [CONTRIBUTING.md] for instructions on how to contribute and perform common t | |
[Maybe]: https://github.com/authzed/authzed-rb/labels/priority%2F4%20maybe | ||
[good first issues]: https://github.com/authzed-rb/spicedb/labels/hint%2Fgood%20first%20issue | ||
|
||
## Installation | ||
## Getting Started | ||
|
||
We highly recommend following the **[Protecting Your First App]** guide to learn the latest best practice to integrate an application with Authzed. | ||
|
||
If you're interested in example usages, including integration with a Kestrel API, they can be found in their respective folders in the [examples directory]. | ||
|
||
[Protecting Your First App]: https://docs.authzed.com/guides/first-app | ||
[examples directory]: /examples | ||
|
||
## Basic Usage | ||
### Installation | ||
|
||
With [`dotnet`](https://learn.microsoft.com/en-us/dotnet/core/install/): | ||
```sh | ||
dotnet add package Authzed.Net | ||
``` | ||
|
||
With [`nuget`](https://www.nuget.org/downloads): | ||
```sh | ||
nuget install authzed-dot | ||
nuget install Authzed.Net | ||
``` | ||
|
||
### Initializing a Client | ||
|
||
Currently, everything required to connect and make API calls is located in a module respective to API version. | ||
|
||
In order to successfully connect, you will have to provide a [Bearer Token] with your own API Token from the [Authzed dashboard] in place of `t_your_token_here_1234567deadbeef` in the following example. | ||
|
||
[grpc]: https://grpc.io | ||
[Bearer Token]: https://datatracker.ietf.org/doc/html/rfc6750#section-2.1 | ||
[Authzed Dashboard]: https://app.authzed.com | ||
|
||
```csharp | ||
using Authzed.Api.V1; | ||
using Grpc.Core; | ||
using Grpc.Net.Client; | ||
using System; | ||
|
||
// In some other block | ||
var token = "my super secret key" | ||
var credentials = CallCredentials.FromInterceptor((context, metadata) => | ||
{ | ||
metadata.Add("Authorization", $"Bearer {token}"); | ||
return Task.CompletedTask; | ||
}); | ||
|
||
var options = new GrpcChannelOptions | ||
{ | ||
Credentials = ChannelCredentials.Create(new SslCredentials(), credentials), | ||
}; | ||
var channel = GrpcChannel.ForAddress("https://my.spicedb.service:50051", options); | ||
var client = new PermissionsService.PermissionsServiceClient(channel); | ||
``` | ||
|
||
Note that the above example shows the Permission client specifically; a fully working flow will also require the Schema service. | ||
|
||
Also note that we're using TLS. For an example that does not use TLS, see the API in the [examples directory]. | ||
|
||
### Performing an API Request | ||
```csharp | ||
using Authzed.Api.V1; | ||
using Grpc.Core; | ||
using Google.Protobuf.WellKnownTypes; | ||
|
||
// Continuing from above | ||
var response = await client.CheckPermissionAsync(new CheckPermissionRequest | ||
{ | ||
Resource = new ObjectReference { ObjectType = "post", ObjectId = "post-one" }, | ||
Permission = "view", | ||
Subject = new SubjectReference | ||
{ | ||
Object = new ObjectReference | ||
{ | ||
ObjectType = "user", | ||
ObjectId = "emilia" | ||
} | ||
}, | ||
Consistency = new Consistency { FullyConsistent = true } | ||
}); | ||
Console.WriteLine(response.Permissionship) | ||
``` |