You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: EXAMPLES.md
+2-7Lines changed: 2 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,11 +12,11 @@ solid can be started on its own by using the solid binary. Below are some exampl
12
12
13
13
* Starting solid as an HTTPS server with WebID+TLS authentication. This parameter requires that the user specifies the location of the key and the certificate used to start the HTTPS server with the help of the appropriate parameters.
* Start HTTPS with custom error pages. solid will look for a file in the specified directory of the form <error-code>.html. If it's not found it will default to node's error page.
* solid makes use of special files used for things such as access control, metadata management, subscription to changes, etc. These files are recognized by solid because of their suffix, which can be customized with the command line options that start with 'suffix'.
22
22
@@ -47,8 +47,3 @@ var existingApp; //Some existing Express app independent of solid.
Copy file name to clipboardExpand all lines: README.md
+24-3Lines changed: 24 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,15 +72,18 @@ Solid requires SSL certificates to be valid, so you cannot use self-signed certi
72
72
You need an SSL certificate from a _certificate authority_, such as your domain provider or [Let's Encrypt!](https://letsencrypt.org/getting-started/).
73
73
74
74
For testing purposes, you can use `bin/solid-test` with a _self-signed_ certificate, generated as follows:
Note that this example creates the `localhost.cert` and `localhost.key` files
81
+
Note that this example creates the `fullchain.pem` and `privkey.pem` files
81
82
in a directory one level higher from the current, so that you don't
82
83
accidentally commit your certificates to `solid` while you're developing.
83
84
85
+
If you would like to get rid of the browser warnings, import your fullchain.pem certificate into your 'Trusted Root Certificate' store.
86
+
84
87
### Run multi-user server (intermediate)
85
88
86
89
You can run `solid` so that new users can sign up, in other words, get their WebIDs _username.yourdomain.com_.
@@ -168,6 +171,7 @@ $ solid start --help
168
171
--webid Enable WebID authentication and access control (uses HTTPS)
169
172
--mount [value] Serve on a specific URL path (default: '/')
170
173
--config-path [value]
174
+
--config-file [value]
171
175
--db-path [value]
172
176
--auth [value] Pick an authentication strategy for WebID: `tls` or `oidc`
173
177
--owner [value] Set the owner of the storage (overwrites the root ACL file)
@@ -194,9 +198,20 @@ $ solid start --help
194
198
--email-auth-pass [value] Password of your email service
195
199
--useApiApps Do you want to load your default apps on /api/apps?
196
200
--api-apps [value] Path to the folder to mount on /api/apps
201
+
--redirect-http-from [value] HTTP port or ','-separated ports to redirect to the solid server port (e.g. "80,8080").
202
+
--server-name [value] A name for your server (not required, but will be presented on your server's frontpage)
203
+
--server-description [value] A description of your server (not required)
204
+
--server-logo [value] A logo that represents you, your brand, or your server (not required)
197
205
-v, --verbose Print the logs to console
206
+
-h, --help output usage information
198
207
```
199
208
209
+
Instead of using flags, these same options can also be configured via environment variables taking the form of `SOLID_` followed by the `SNAKE_CASE` of the flag. For example `--api-apps` can be set via the `SOLID_API_APPS`environment variable, and `--serverUri` can be set with `SOLID_SERVER_URI`.
210
+
211
+
CLI flags take precedence over Environment variables, which take precedence over entries in the config file.
212
+
213
+
Configuring Solid via the config file can be a concise and convenient method and is the generally recommended approach. CLI flags can be useful when you would like to override a single configuration parameter, and using environment variables can be helpful in situations where you wish to deploy a single generic Docker image to multiple environments.
214
+
200
215
## Use Docker
201
216
202
217
Build with:
@@ -360,6 +375,12 @@ In order to test a single component, you can run
360
375
npm run test-(acl|formats|params|patch)
361
376
```
362
377
378
+
## Blacklisted usernames
379
+
380
+
By default Solid will not allow [certain usernames as they might cause
381
+
confusion or allow vulnerabilies for social engineering](https://github.com/marteinn/The-Big-Username-Blacklist).
382
+
This list is configurable via `config/usernames-blacklist.json`. Solid does not
0 commit comments