ownacl
v0.0.19
Published
A library to manage access in solid pods.
Downloads
28
Maintainers
Readme
ownacl
A library to make managing file permissions in solid pods easier.
If you are unfamiliar with the Solid Project, this is a good first read. This library is intended for acl files that were created in accordance with the WAC standards. All the functionality was implemented on top of the rdflib.js library.
Features | Usage | Installing | Contributing
Features
At the moment the library supports the following functionality:
- Reading permissions
- Adding permissions
- Deleting permissions
Features that are planned for the future as of right now include:
- Add Access Groups with member
- Support a local mode that only updates a local graph
Usage
The acl client object needs to be instantiated with the url of the access control file that is supposed to be read (In this example it would be the acl file for the root folder):
import aclClient from 'ownacl'
const acl = new aclClient("https://bob.solid.community/.acl")
Every function of this object will return a promise that needs to be awaited.
Reading Permissions
To read all agents and their access use readAccessControl()
:
acl.readAccessControl().then((accessControl) => {
// do something with the results in here
})
The result would look something like this:
[{
'name': 'https://bob.solid.community/profile/card#me',
'identifier': 'https://bob.solid.community/.acl#owner'
'type': 'Agent',
'access': ['Control', 'Read', 'Write']
}, ...]
To read all agents that are mentioned in the file use readAgents()
:
acl.readAgents().then((agents) => {
// do something with the results in here
})
The result would look something like this:
[{
'name': 'https://bob.solid.community/profile/card#me',
'identifier': 'https://bob.solid.community/.acl#owner'
'type': 'Agent',
}, ...]
To read an acl file or its default file use read()
:
acl.read().then((aclBody) => {
// do something with the results in here
})
The result would look something like this:
@prefix : <#>.
@prefix n0: <http://www.w3.org/ns/auth/acl#>.
@prefix pro: <./>.
@prefix c: <card#>.
@prefix n1: <http://xmlns.com/foaf/0.1/>.
:ControlReadWrite
a n0:Authorization;
n0:accessTo pro:;
n0:agent c:me;
n0:default pro:;
n0:mode n0:Control, n0:Read, n0:Write.
:Read
a n0:Authorization;
n0:accessTo pro:;
n0:agentClass n1:Agent;
n0:default pro:;
n0:mode n0:Read.
The resulting array of agents and the identifier property of each agent object can be used with readAccess(identifier)
to get the access of a single agent.
The same can be done with AgentGroups or Origins by using readAgentGroups()
or readOrigins()
.
Adding or removing permissions
To add permissions for some agent you can use addAgent(agent)
.
You'll need to pass an object containing a valid webId in a name property and an access property that contains the permissions you want to give:
const alice = { name: 'https://alice.solid.community/profile/card#me', access: ['Read', 'Write'] }
acl.addAgent(alice).then(() => {
// Alice has been added
...
})
The same can be done for AgentGroups or Origins by using addAgentGroup(agentGroup)
or addOrigin(origin)
and by passing an AgentGroup or Origin object.
If there is an Agent, an AgentGroup or an Origin that already has the access the new enitity is supposed to have, they will share an identifier.
To remove permissions for an agent you'll need to pass an object with just the agents name to deleteAgent(agent)
:
const alice = { name: 'https://alice.solid.community/profile/card#me' }
acl.deleteAgent(alice).then(() => {
// alice's permissions have been removed
...
})
The same can be done for AgentGroups and Origins by using deleteAgentGroup(agentGroup)
or deleteOrigin(origin)
.
Installing
The library can be installed with the npm package manager by running npm install ownacl
. It can be used for both a node environment (at least v12.0) and a browser environment.
Contributing
(0. Create an issue)
- Create a Pull Request, in which you link to an issue or explain why this change was necessary
- Run the tests and or write a test for the feature. Explain how this feature can be tested in your PR description when you are done
- Assign a reviewer
- After your code was reviewed, apply the changes that may be requested from the reviewer
- Then after your PR has been approved, squash and merge the PR with a senseful commit message in the format of '[Feature that you worked on]: [What you did exactly]' e.g. 'Updating permissions: Refactor util functions'
Running the tests
You'll need to install and setup the solid-auth-cli package to authenticate from the command line, instructions can be found here.
Then you can run the tests by running npm test
.