![PyPI Now Supports iOS and Android Wheels for Mobile Python Development](https://cdn.sanity.io/images/cgdhsj6q/production/96416c872705517a6a65ad9646ce3e7caef623a0-1024x1024.webp?w=400&fit=max&auto=format)
Security News
PyPI Now Supports iOS and Android Wheels for Mobile Python Development
PyPI now supports iOS and Android wheels, making it easier for Python developers to distribute mobile packages.
solid-auth-client
Advanced tools
Opaquely authenticates Solid clients
Solid currently supports two cross-origin authentication protocols, WebID-TLS and WebID-OIDC.
This library abstracts away the implementation details of these specs so that clients don't have to handle different authentication protocols.
If you're building a web app and want to identify users with Solid, or store personal information on your user's Solid account, you'll have to authenticate them. This library provides a simple API for logging in, logging out, and fetching resources with authenticated credentials.
The simplest way to use this library is to install it via npm
or yarn
. You can then use the ES6 module (import { login, currentUser, logout } from 'solid-auth-client'
), or you can grab the transpiled UMD bundle from node_modules/solid-auth-client/dist-lib/solid-auth-client.bundle.js
.
This API doc uses flow type annotations for clarity. They're just here to show you the types of arguments expected by exported functions. You don't have to know anything about flow.
login
login (idp: string, {
callbackUri?: string,
storage?: Storage
}): Promise<?session | ?redirectFn>
Authenticates the user with their IDP (identity provider) and promises an object containing the user's session.
When the user is successfully authenticated, the session will be non-null. When
the user is not authenticated by the IDP, the session will be null
.
Auth flows like OIDC require the user to give consent on their identity
provider. In such cases, this function will return a function which
redirects the user to their auth provider, so as not to break the promise.
All you have to do is call that function in order to send the user on their
way. Then, call currentSession
when the user gives consent and lands back
in your app.
If you're using an auth flow with redirections, and don't want to take the user away from your app, consider using the [popup workflow](#Using-the-popup- login-flow).
If there's an error during the auth handshake, the Promise will reject.
Options:
callbackUri
(default current window location): a URI to be redirected back
to with credentials for auth flows which involve redirectsstorage
: An object implementing the storage interface for persisting
credentials. localStorage
is the default in the browser.popupLogin
popupLogin({
popupUri: ?string,
storage: AsyncStorage
}): Promise<?session>
Logs the user in using a popup window so that your app doesn't lose state. See Using the popup login flow.
currentSession
currentSession (storage?: Storage): Promise<?session>
Finds the current session, and returns it if it is still active, otherwise
null
.
logout
logout (storage?: Storage): Promise<void>
Clears the active user session.
WARNING: this is an unsupported use case in WebID-TLS. Once your browser provides its client cert to a web server, there's no going back! So for WebID-TLS, the only thing this will do is clear the session from the store.
fetch
Fetches a resource from the web. Same API as
fetch, but retries with credentials when it
encounters a 401
with a WWW-Authenticate
header which matches a recognized
authenticate scheme.
fetch: (url: RequestInfo, options?: Object) => Promise<Response>
type webIdTlsSession = {
authType: WebIdTls,
idp: string,
webId: string
}
type webIdOidcSession = {
authType: WebIdOidc,
idp: string,
webId: string,
accessToken: string,
idToken: string
}
type session = webIdTlsSession | webIdOidcSession
To use the popup login flow, you'll need a popup application running on a trusted domain which authenticates the user, handles redirects, and messages the authenticated session back to your application.
Due to the possible redirects and the security model of window.postMessage
,
you'll need to build a static popup app bound to your application's origin.
Keeping this in mind, here's how to get things working.
Clone this repo and set up your development environment according to the Developing section.
Create your .env.popup
file. This file declares your application name and
origin.
$ cp .env.popup.example .env.popup
TRUSTED_APP_NAME
and TRUSTED_APP_ORIGIN
fields of the new
.env.popup
file to match your app's name and origin.$ $EDITOR .env.popup # Change TRUSTED_APP_NAME and TRUSTED_APP_ORIGIN
$ yarn build:popup
The app now lives in dist-popup/popup.html
. You can now set up a route in
your application to the popup app.
If your popup now lives at e.g. 'https://localhost:8080/popup.html',
call popupLogin('https://localhost:8080/popup.html')
.
This library assumes you have node >= v7.10.1 and yarn 0.24.6 installed. It may work with earlier versions, but that hasn't been tested thus far.
$ git clone https://github.com/solid/solid-auth-client.git
$ cd solid-auth-client
$ yarn
$ yarn build # build the library and UMD bundle
$ yarn test # run the code formatter, linter, and test suite
$ yarn test:dev # just run the tests in watch mode
$ cp .env.demo.example .env.demo && $EDITOR .env.demo # configure the demo app
$ yarn start:demo
The demo app is configurable via the .env.demo
file. The important fields are:
$ cp .env.popup.example .env.popup && $EDITOR .env.popup # configure the popup app
$ yarn start:popup
The popup app is configurable via the .env.popup
file. The important fields are:
FAQs
Opaquely authenticates solid clients
The npm package solid-auth-client receives a total of 236 weekly downloads. As such, solid-auth-client popularity was classified as not popular.
We found that solid-auth-client demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now supports iOS and Android wheels, making it easier for Python developers to distribute mobile packages.
Security News
Create React App is officially deprecated due to React 19 issues and lack of maintenance—developers should switch to Vite or other modern alternatives.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.