parent
b605fdc30a
commit
d9b90e84b4
File diff suppressed because it is too large
Load Diff
@ -1,8 +1,9 @@ |
||||
[ |
||||
{ |
||||
"podName": "example", |
||||
"email": "hello@example.com", |
||||
"password": "abc123", |
||||
"template": "./template" |
||||
"pods": [ |
||||
{ "name": "example" } |
||||
] |
||||
} |
||||
] |
@ -0,0 +1 @@ |
||||
module.exports = { presets: ["@babel/preset-env"] }; |
@ -1 +0,0 @@ |
||||
{"key":"accounts/cookies/6ee53737-216c-4984-b530-95b3ff8784ea","payload":{"expires":"2024-11-01T02:16:14.618Z","payload":"93dbc3a7-58f0-424f-be3d-96a7f9eedf33"}} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/data/93dbc3a7-58f0-424f-be3d-96a7f9eedf33","payload":{"linkedLoginsCount":1,"id":"93dbc3a7-58f0-424f-be3d-96a7f9eedf33","**password**":{"decb4d7a-0853-47b0-aeae-d1f98506052f":{"accountId":"93dbc3a7-58f0-424f-be3d-96a7f9eedf33","email":"hello@example.com","password":"$2a$10$UTqS/jXMtrsa9FzMKEw1XeLUi29wqKs16qf8Opx0rF.KACOu6CE2K","verified":true,"id":"decb4d7a-0853-47b0-aeae-d1f98506052f"}},"**clientCredentials**":{},"**pod**":{"b9f98f5e-653d-480c-9e04-78a567580c24":{"baseUrl":"http://localhost:3001/example/","accountId":"93dbc3a7-58f0-424f-be3d-96a7f9eedf33","id":"b9f98f5e-653d-480c-9e04-78a567580c24","**owner**":{"e7464d2a-9987-4564-b7e2-670a3c5c1af4":{"podId":"b9f98f5e-653d-480c-9e04-78a567580c24","webId":"http://localhost:3001/example/profile/card#me","visible":false,"id":"e7464d2a-9987-4564-b7e2-670a3c5c1af4"}}}},"**webIdLink**":{"28985848-10cd-429f-85fa-d1cc78484c52":{"webId":"http://localhost:3001/example/profile/card#me","accountId":"93dbc3a7-58f0-424f-be3d-96a7f9eedf33","id":"28985848-10cd-429f-85fa-d1cc78484c52"}},"rememberLogin":false}} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/owner/e7464d2a-9987-4564-b7e2-670a3c5c1af4","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/password/decb4d7a-0853-47b0-aeae-d1f98506052f","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/password/email/hello%40example.com","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/pod/b9f98f5e-653d-480c-9e04-78a567580c24","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/pod/baseUrl/http%3A%2F%2Flocalhost%3A3001%2Fexample%2F","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/webIdLink/28985848-10cd-429f-85fa-d1cc78484c52","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"accounts/index/webIdLink/webId/http%3A%2F%2Flocalhost%3A3001%2Fexample%2Fprofile%2Fcard%23me","payload":["93dbc3a7-58f0-424f-be3d-96a7f9eedf33"]} |
@ -1 +0,0 @@ |
||||
{"key":"idp/keys/cookie-secret","payload":["aa579c6db82269c7b53b347a94c95ddef902adca35b9094f837748b196b00c94d12c062612cb116a81345c77a7275c02ab112d6c4eb82288d5857570498e67fa"]} |
@ -1 +0,0 @@ |
||||
{"key":"idp/keys/jwks","payload":{"keys":[{"kty":"EC","x":"ZFsT8AmP1xjP28ty6KZx_gWfA9sPycaO9magjOcOVVg","y":"P3hMr5z0q6c4opLXkmKAMyvWRxHIlBLMQ3OFDrl1B1c","crv":"P-256","d":"wF0eIwetdxmZ8fTj5vLAjda13eKzFuOlz72aldsmV7Y","alg":"ES256"}]}} |
@ -1 +0,0 @@ |
||||
{"key":"setup/current-base-url","payload":"http://localhost:3001/"} |
@ -1 +0,0 @@ |
||||
{"key":"setup/current-server-version","payload":"7.1.3"} |
@ -1 +0,0 @@ |
||||
{"key":"setup/v6-migration","payload":true} |
@ -1,26 +0,0 @@ |
||||
# Root ACL resource for the agent account |
||||
@prefix acl: <http://www.w3.org/ns/auth/acl#>. |
||||
@prefix foaf: <http://xmlns.com/foaf/0.1/>. |
||||
|
||||
# The homepage is readable by the public |
||||
<#public> |
||||
a acl:Authorization; |
||||
acl:agentClass foaf:Agent; |
||||
acl:accessTo <./>; |
||||
acl:mode acl:Read. |
||||
|
||||
# The owner has full access to every resource in their pod. |
||||
# Other agents have no access rights, |
||||
# unless specifically authorized in other .acl resources. |
||||
<#owner> |
||||
a acl:Authorization; |
||||
acl:agent <http://localhost:3001/example/profile/card#me>; |
||||
# Optional owner email, to be used for account recovery: |
||||
|
||||
# Set the access to the root storage folder itself |
||||
acl:accessTo <./>; |
||||
# All resources will inherit this authorization, by default |
||||
acl:default <./>; |
||||
# The owner has all of the access modes allowed |
||||
acl:mode |
||||
acl:Read, acl:Write, acl:Control. |
@ -1 +0,0 @@ |
||||
<http://localhost:3001/example/> a <http://www.w3.org/ns/pim/space#Storage>. |
@ -1,27 +0,0 @@ |
||||
# Welcome to your pod |
||||
|
||||
## A place to store your data |
||||
Your pod is a **secure storage space** for your documents and data. |
||||
<br> |
||||
You can choose to share those with other people and apps. |
||||
|
||||
As the owner of this pod, |
||||
identified by <a href="http://localhost:3001/example/profile/card#me">http://localhost:3001/example/profile/card#me</a>, |
||||
you have access to all of your documents. |
||||
|
||||
## Working with your pod |
||||
The easiest way to interact with pods |
||||
is through Solid apps. |
||||
<br> |
||||
For example, |
||||
you can open your pod in [Databrowser](https://solidos.github.io/mashlib/dist/browse.html?uri=http://localhost:3001/example/). |
||||
|
||||
## Accessing your account |
||||
To keep track of your pods, webIDs and any other resources, |
||||
you can [log in](http://localhost:3001/.account/) to your account. |
||||
There you can, for example, update the owners of this pod. |
||||
|
||||
## Learn more |
||||
The [Solid website](https://solidproject.org/) |
||||
and the people on its [forum](https://forum.solidproject.org/) |
||||
will be glad to help you on your journey. |
@ -1,14 +0,0 @@ |
||||
@prefix acl: <http://www.w3.org/ns/auth/acl#>. |
||||
@prefix foaf: <http://xmlns.com/foaf/0.1/>. |
||||
|
||||
<#public> |
||||
a acl:Authorization; |
||||
acl:accessTo <./README>; |
||||
acl:agentClass foaf:Agent; |
||||
acl:mode acl:Read. |
||||
|
||||
<#owner> |
||||
a acl:Authorization; |
||||
acl:accessTo <./README>; |
||||
acl:agent <http://localhost:3001/example/profile/card#me>; |
||||
acl:mode acl:Read, acl:Write, acl:Control. |
@ -1,12 +0,0 @@ |
||||
@prefix foaf: <http://xmlns.com/foaf/0.1/>. |
||||
@prefix solid: <http://www.w3.org/ns/solid/terms#>. |
||||
|
||||
<> |
||||
a foaf:PersonalProfileDocument; |
||||
foaf:maker <http://localhost:3001/example/profile/card#me>; |
||||
foaf:primaryTopic <http://localhost:3001/example/profile/card#me>. |
||||
|
||||
<http://localhost:3001/example/profile/card#me> |
||||
|
||||
solid:oidcIssuer <http://localhost:3001/>; |
||||
a foaf:Person. |
@ -1,19 +0,0 @@ |
||||
# ACL resource for the WebID profile document |
||||
@prefix acl: <http://www.w3.org/ns/auth/acl#>. |
||||
@prefix foaf: <http://xmlns.com/foaf/0.1/>. |
||||
|
||||
# The WebID profile is readable by the public. |
||||
# This is required for discovery and verification, |
||||
# e.g. when checking identity providers. |
||||
<#public> |
||||
a acl:Authorization; |
||||
acl:agentClass foaf:Agent; |
||||
acl:accessTo <./card>; |
||||
acl:mode acl:Read. |
||||
|
||||
# The owner has full access to the profile |
||||
<#owner> |
||||
a acl:Authorization; |
||||
acl:agent <http://localhost:3001/example/profile/card#me>; |
||||
acl:accessTo <./card>; |
||||
acl:mode acl:Read, acl:Write, acl:Control. |
Loading…
Reference in new issue