app_name: "Super Graph Development" host_port: 0.0.0.0:8080 web_ui: true # debug, info, warn, error, fatal, panic log_level: "debug" # Disable this in development to get a list of # queries used. When enabled super graph # will only allow queries from this list # List saved to ./config/allow.list use_allow_list: false # Throw a 401 on auth failure for queries that need auth # valid values: always, per_query, never auth_fail_block: never # Latency tracing for database queries and remote joins # the resulting latency information is returned with the # response enable_tracing: true # Watch the config folder and reload Super Graph # with the new configs when a change is detected reload_on_config_change: true # File that points to the database seeding script # seed_file: seed.js # Path pointing to where the migrations can be found migrations_path: ./config/migrations # Postgres related environment Variables # SG_DATABASE_HOST # SG_DATABASE_PORT # SG_DATABASE_USER # SG_DATABASE_PASSWORD # Auth related environment Variables # SG_AUTH_RAILS_COOKIE_SECRET_KEY_BASE # SG_AUTH_RAILS_REDIS_URL # SG_AUTH_RAILS_REDIS_PASSWORD # SG_AUTH_JWT_PUBLIC_KEY_FILE # inflections: # person: people # sheep: sheep auth: # Can be 'rails' or 'jwt' type: rails cookie: _app_session # Comment this out if you want to disable setting # the user_id via a header. Good for testing creds_in_header: true rails: # Rails version this is used for reading the # various cookies formats. version: 5.2 # Found in 'Rails.application.config.secret_key_base' secret_key_base: 0a248500a64c01184edb4d7ad3a805488f8097ac761b76aaa6c17c01dcb7af03a2f18ba61b2868134b9c7b79a122bc0dadff4367414a2d173297bfea92be5566 # Remote cookie store. (memcache or redis) # url: redis://redis:6379 # password: "" # max_idle: 80 # max_active: 12000 # In most cases you don't need these # salt: "encrypted cookie" # sign_salt: "signed encrypted cookie" # auth_salt: "authenticated encrypted cookie" # jwt: # provider: auth0 # secret: abc335bfcfdb04e50db5bb0a4d67ab9 # public_key_file: /secrets/public_key.pem # public_key_type: ecdsa #rsa database: type: postgres host: db port: 5432 dbname: app_development user: postgres password: '' #schema: "public" #pool_size: 10 #max_retries: 0 #log_level: "debug" # Define variables here that you want to use in filters # sub-queries must be wrapped in () variables: account_id: "(select account_id from users where id = $user_id)" # Define defaults to for the field key and values below defaults: # filters: ["{ user_id: { eq: $user_id } }"] # Field and table names that you wish to block blocklist: - ar_internal_metadata - schema_migrations - secret - password - encrypted - token tables: - name: customers remotes: - name: payments id: stripe_id url: http://rails_app:3000/stripe/$id path: data # debug: true pass_headers: - cookie set_headers: - name: Host value: 0.0.0.0 # - name: Authorization # value: Bearer - # You can create new fields that have a # real db table backing them name: me table: users roles_query: "SELECT * FROM users as usr WHERE id = $user_id" roles: - name: anon tables: - name: products limit: 10 query: columns: ["id", "name", "description" ] aggregation: false insert: block: false update: block: false delete: block: false - name: user tables: - name: users query: filters: ["{ id: { _eq: $user_id } }"] - name: products query: limit: 50 filters: ["{ user_id: { eq: $user_id } }"] columns: ["id", "name", "description" ] disable_aggregation: false insert: filters: ["{ user_id: { eq: $user_id } }"] columns: ["id", "name", "description" ] set: - created_at: "now" update: filters: ["{ user_id: { eq: $user_id } }"] columns: - id - name set: - updated_at: "now" delete: deny: true - name: admin match: id = 1 tables: - name: users # query: # filters: ["{ account_id: { _eq: $account_id } }"]