Skip to content

non-appkit Apps guidance#32

Merged
arsenyinfo merged 4 commits intomainfrom
arseny/non-appkit
Mar 13, 2026
Merged

non-appkit Apps guidance#32
arsenyinfo merged 4 commits intomainfrom
arseny/non-appkit

Conversation

@arsenyinfo
Copy link
Collaborator

@arsenyinfo arsenyinfo commented Mar 12, 2026

Summary

Adds platform documentation for Databricks Apps, split into two reference pages:

  • references/platform-guide.md — universal platform rules for ALL apps (AppKit included): SP permissions, resource types & injection, OBO vs SP auth, deployment workflow, runtime environment, compute & limits, HTTP proxy & streaming, common errors.
  • references/other-frameworks.md — non-AppKit framework setup: port/host config, app.yaml/databricks.yml, dependency management, networking/CORS, Streamlit gotchas.

SKILL.md routing table updated to point AppKit agents at platform-guide.md and non-AppKit agents at other-frameworks.md.

Documentation safety checklist

  • Examples use least-privilege permissions (no unnecessary ALL PRIVILEGES, admin tokens, or broad scopes)
  • Elevated permissions are explicitly called out where required
  • Sensitive values are obfuscated (placeholder workspace IDs, URLs, no real tokens)
  • No insecure patterns introduced (e.g. disabled TLS verification, hardcoded credentials)

@arsenyinfo arsenyinfo requested review from a team and lennartkats-db as code owners March 12, 2026 13:34
- fix SQL GRANT syntax: READ_VOLUME → READ VOLUME
- fix Streamlit snippet: use DATABRICKS_WAREHOUSE_ID instead of nonexistent DATABRICKS_HTTP_PATH
- restore deployment safety warning (USER CONSENT REQUIRED)
- use jsonc tag for Next.js snippet with comments
Copy link

@calreynolds calreynolds left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Light feedback in Slack -- otherwise awesome!!

Comment on lines +117 to +118
# 2. deploy code
databricks bundle deploy -t <TARGET> --profile <PROFILE>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

databricks apps deploy works too for this I think no?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good call — databricks apps deploy in a DABs project directory does validate + bundle deploy + bundle run in one shot. Updated the deployment section to recommend it as Option A.

### ⚠️ CRITICAL AGENT BEHAVIOR
After adding ANY resource to the app, IMMEDIATELY grant the SP access. Do NOT wait for a permission error — do it proactively every time.

### How to Grant Permissions
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we actually need this? as long as the resource gets added into the app (basically having it declared as a resource in the databricks.yml) once deploy gets done the resource is added to the app, granting the service principal access to it (but maybe I'm missing something)

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You're right — checked the SDK and CLI code: the permission field on app resources is literally "Permission to grant" (SDK godoc), so the backend auto-grants it to the SP on deploy. Removed the manual set-permissions / put-acl commands and replaced the section with a declarative databricks.yml example + default permissions table.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@arsenyinfo arsenyinfo merged commit b438413 into main Mar 13, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants