You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: EXAMPLES.md
+52
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@
9
9
-[Access an External API from an API Route](#access-an-external-api-from-an-api-route)
10
10
-[Create your own instance of the SDK](#create-your-own-instance-of-the-sdk)
11
11
-[Add a signup handler](#add-a-signup-handler)
12
+
-[Use with Base Path and Internationalized Routing](#use-with-base-path-and-internationalized-routing)
12
13
13
14
All examples can be seen running in the [Kitchen Sink example app](./examples/kitchen-sink-example).
14
15
@@ -379,3 +380,54 @@ Users can then sign up using the signup handler.
379
380
```html
380
381
<ahref="/api/signup">Sign up</a>
381
382
```
383
+
384
+
## Use with Base Path and Internationalized Routing
385
+
386
+
With Next.js you can deploy a Next.js application under a sub-path of a domain using [Base Path](https://nextjs.org/docs/api-reference/next.config.js/basepath) and serve internationalized (i18n) routes using [Internationalized Routing](https://nextjs.org/docs/advanced-features/i18n-routing).
387
+
388
+
If you use these features the urls of your application will change and so the urls to the nextjs-auth0 routes will change. To accommodate this there are various places in the SDK that you can customise the url.
389
+
390
+
For example if `basePath: '/foo'` you should prepend this to the `loginUrl` and `profileUrl` specified in your `Auth0Provider`
Also, any links to login or logout should include the `basePath`:
404
+
405
+
```html
406
+
<ahref="/foo/api/auth/login">Login</a><br />
407
+
<ahref="/foo/api/auth/logout">Logout</a>
408
+
```
409
+
410
+
You should configure [baseUrl](https://auth0.github.io/nextjs-auth0/interfaces/config.baseconfig.html#baseurl) (or the `AUTH0_BASE_URL` environment variable) eg
411
+
412
+
```shell
413
+
# .env.local
414
+
AUTH0_BASE_URL=http://localhost:3000/foo
415
+
```
416
+
417
+
For any pages that are protected with the Server Side [withPageAuthRequired](https://auth0.github.io/nextjs-auth0/modules/helpers_with_page_auth_required.html#withpageauthrequired) you should update the `returnTo` parameter depending on the `basePath` and `locale` if necessary.
418
+
419
+
```js
420
+
// ./pages/my-ssr-page.jsx
421
+
exportdefaultMySsrPage= () =><></>;
422
+
423
+
constgetFullReturnTo= (ctx) => {
424
+
// TODO: implement getFullReturnTo based on the ctx.resolvedUrl, ctx.locale
425
+
// and your next.config.js's basePath and i18n settings.
-[Comparison with auth0-react](#comparison-with-the-auth0-react-sdk)
161
-
-[Testing](#testing)
162
-
-[Deploying](#deploying)
163
-
164
-
### Cookies and Security
165
-
166
-
All cookies will be set to `HttpOnly, SameSite=Lax` and will be set to `Secure` if the application's `AUTH0_BASE_URL` is `https`.
167
-
168
-
The `HttpOnly` setting will make sure that client-side JavaScript is unable to access the cookie to reduce the attack surface of [XSS attacks](https://auth0.com/blog/developers-guide-to-common-vulnerabilities-and-how-to-prevent-them/#Cross-Site-Scripting--XSS-).
169
-
170
-
The `SameSite=Lax` setting will help mitigate CSRF attacks. Learn more about SameSite by reading the ["Upcoming Browser Behavior Changes: What Developers Need to Know"](https://auth0.com/blog/browser-behavior-changes-what-developers-need-to-know/) blog post.
171
-
172
-
### Caching and Security
173
-
174
-
Many hosting providers will offer to cache your content at the edge in order to serve data to your users as fast as possible. For example Vercel will [cache your content on the Vercel Edge Network](https://vercel.com/docs/concepts/edge-network/caching) for all static content and Serverless Functions if you provide the necessary caching headers on your response.
175
-
176
-
It's generally a bad idea to cache any response that requires authentication, even if the response's content appears safe to cache there may be other data in the response that isn't.
177
-
178
-
This SDK offers a rolling session by default, which means that any response that reads the session will have a `Set-Cookie` header to update the cookie's expiry. Vercel and potentially other hosting providers include the `Set-Cookie` header in the cached response, so even if you think the response's content can be cached publicly, the responses `Set-Cookie` header cannot.
179
-
180
-
Check your hosting provider's caching rules, but in general you should **never** cache responses that either require authentication or even touch the session to check authentication (eg when using `withApiAuthRequired`, `withPageAuthRequired` or even just `getSession` or `getAccessToken`).
181
-
182
-
### Error Handling and Security
183
-
184
-
The default server side error handler for the `/api/auth/*` routes prints the error message to screen, eg
185
-
186
-
```js
187
-
try {
188
-
awaithandler(req, res);
189
-
} catch (error) {
190
-
res.status(error.status||400).end(error.message);
191
-
}
192
-
```
193
-
194
-
Because the error can come from the OpenID Connect `error` query parameter we do some [basic escaping](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#rule-1-html-encode-before-inserting-untrusted-data-into-html-element-content) which makes sure the default error handler is safe from XSS.
195
-
196
-
If you write your own error handler, you should **not** render the error `message`, or `error` and `error_description` properties without using a templating engine that will properly escape it for other HTML contexts first.
197
-
198
-
### Base Path and Internationalized Routing
199
-
200
-
With Next.js you can deploy a Next.js application under a sub-path of a domain using [Base Path](https://nextjs.org/docs/api-reference/next.config.js/basepath) and serve internationalized (i18n) routes using [Internationalized Routing](https://nextjs.org/docs/advanced-features/i18n-routing).
201
-
202
-
If you use these features the urls of your application will change and so the urls to the nextjs-auth0 routes will change. To accommodate this there are various places in the SDK that you can customise the url.
203
-
204
-
For example if `basePath: '/foo'` you should prepend this to the `loginUrl` and `profileUrl` specified in your `Auth0Provider`
Also, any links to login or logout should include the `basePath`:
218
-
219
-
```html
220
-
<ahref="/foo/api/auth/login">Login</a><br />
221
-
<ahref="/foo/api/auth/logout">Logout</a>
222
-
```
223
-
224
-
You should configure [baseUrl](https://auth0.github.io/nextjs-auth0/interfaces/config.baseconfig.html#baseurl) (or the `AUTH0_BASE_URL` environment variable) eg
225
-
226
-
```shell
227
-
# .env.local
228
-
AUTH0_BASE_URL=http://localhost:3000/foo
229
-
```
230
-
231
-
For any pages that are protected with the Server Side [withPageAuthRequired](https://auth0.github.io/nextjs-auth0/modules/helpers_with_page_auth_required.html#withpageauthrequired) you should update the `returnTo` parameter depending on the `basePath` and `locale` if necessary.
232
-
233
-
```js
234
-
// ./pages/my-ssr-page.jsx
235
-
exportdefaultMySsrPage= () =><></>;
236
-
237
-
constgetFullReturnTo= (ctx) => {
238
-
// TODO: implement getFullReturnTo based on the ctx.resolvedUrl, ctx.locale
239
-
// and your next.config.js's basePath and i18n settings.
240
-
return'/foo/en-US/my-ssr-page';
241
-
};
242
-
243
-
exportconstgetServerSideProps= (ctx) => {
244
-
constreturnTo=getFullReturnTo(ctx.req);
245
-
returnwithPageAuthRequired({ returnTo })(ctx);
246
-
};
247
-
```
248
-
249
-
### Comparison with the Auth0 React SDK
250
-
251
-
We also provide an Auth0 React SDK, [auth0-react](https://github.com/auth0/auth0-react), which may be suitable for your Next.js application.
252
-
253
-
The SPA security model used by `auth0-react` is different from the Web Application security model used by this SDK. In short, this SDK protects pages and API routes with a cookie session (see ["Cookies and Security"](#cookies-and-security)). A SPA library like `auth0-react` will store the user's ID Token and Access Token directly in the browser and use them to access external APIs directly.
254
-
255
-
You should be aware of the security implications of both models. However, [auth0-react](https://github.com/auth0/auth0-react) may be more suitable for your needs if you meet any of the following scenarios:
256
-
257
-
- You are using [Static HTML Export](https://nextjs.org/docs/advanced-features/static-html-export) with Next.js.
258
-
- You do not need to access user data during server-side rendering.
259
-
- You want to get the access token and call external API's directly from the frontend layer rather than using Next.js API Routes as a proxy to call external APIs
260
-
261
-
### Testing
262
-
263
-
By default, the SDK creates and manages a singleton instance to run for the lifetime of the application. When testing your application, you may need to reset this instance, so its state does not leak between tests.
264
-
265
-
If you're using Jest, we recommend using `jest.resetModules()` after each test. Alternatively, you can look at [creating your own instance of the SDK](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md#create-your-own-instance-of-the-sdk), so it can be recreated between tests.
266
-
267
-
For end to end tests, have a look at how we use a [mock OIDC Provider](https://github.com/auth0/open-source-template/blob/master/scripts/oidc-provider.js).
268
-
269
-
### Deploying
270
-
271
-
For deploying, have a look at [how we deploy our example app to Vercel](https://github.com/auth0/open-source-template/blob/master/examples/README.md).
All cookies will be set to `HttpOnly, SameSite=Lax` and will be set to `Secure` if the application's `AUTH0_BASE_URL` is `https`.
6
+
7
+
The `HttpOnly` setting will make sure that client-side JavaScript is unable to access the cookie to reduce the attack surface of [XSS attacks](https://auth0.com/blog/developers-guide-to-common-vulnerabilities-and-how-to-prevent-them/#Cross-Site-Scripting--XSS-).
8
+
9
+
The `SameSite=Lax` setting will help mitigate CSRF attacks. Learn more about SameSite by reading the ["Upcoming Browser Behavior Changes: What Developers Need to Know"](https://auth0.com/blog/browser-behavior-changes-what-developers-need-to-know/) blog post.
10
+
11
+
## Caching and Security
12
+
13
+
Many hosting providers will offer to cache your content at the edge in order to serve data to your users as fast as possible. For example Vercel will [cache your content on the Vercel Edge Network](https://vercel.com/docs/concepts/edge-network/caching) for all static content and Serverless Functions if you provide the necessary caching headers on your response.
14
+
15
+
It's generally a bad idea to cache any response that requires authentication, even if the response's content appears safe to cache there may be other data in the response that isn't.
16
+
17
+
This SDK offers a rolling session by default, which means that any response that reads the session will have a `Set-Cookie` header to update the cookie's expiry. Vercel and potentially other hosting providers include the `Set-Cookie` header in the cached response, so even if you think the response's content can be cached publicly, the responses `Set-Cookie` header cannot.
18
+
19
+
Check your hosting provider's caching rules, but in general you should **never** cache responses that either require authentication or even touch the session to check authentication (eg when using `withApiAuthRequired`, `withPageAuthRequired` or even just `getSession` or `getAccessToken`).
20
+
21
+
## Error Handling and Security
22
+
23
+
The default server side error handler for the `/api/auth/*` routes prints the error message to screen, eg
24
+
25
+
```js
26
+
try {
27
+
awaithandler(req, res);
28
+
} catch (error) {
29
+
res.status(error.status||400).end(error.message);
30
+
}
31
+
```
32
+
33
+
Because the error can come from the OpenID Connect `error` query parameter we do some [basic escaping](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#rule-1-html-encode-before-inserting-untrusted-data-into-html-element-content) which makes sure the default error handler is safe from XSS.
34
+
35
+
If you write your own error handler, you should **not** render the error `message`, or `error` and `error_description` properties without using a templating engine that will properly escape it for other HTML contexts first.
36
+
37
+
## Comparison with the Auth0 React SDK
38
+
39
+
We also provide an Auth0 React SDK, [auth0-react](https://github.com/auth0/auth0-react), which may be suitable for your Next.js application.
40
+
41
+
The SPA security model used by `auth0-react` is different from the Web Application security model used by this SDK. In short, this SDK protects pages and API routes with a cookie session (see ["Cookies and Security"](#cookies-and-security)). A SPA library like `auth0-react` will store the user's ID Token and Access Token directly in the browser and use them to access external APIs directly.
42
+
43
+
You should be aware of the security implications of both models. However, [auth0-react](https://github.com/auth0/auth0-react) may be more suitable for your needs if you meet any of the following scenarios:
44
+
45
+
- You are using [Static HTML Export](https://nextjs.org/docs/advanced-features/static-html-export) with Next.js.
46
+
- You do not need to access user data during server-side rendering.
47
+
- You want to get the access token and call external API's directly from the frontend layer rather than using Next.js API Routes as a proxy to call external APIs
By default, the SDK creates and manages a singleton instance to run for the lifetime of the application. When testing your application, you may need to reset this instance, so its state does not leak between tests.
4
+
5
+
If you're using Jest, we recommend using `jest.resetModules()` after each test. Alternatively, you can look at [creating your own instance of the SDK](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md#create-your-own-instance-of-the-sdk), so it can be recreated between tests.
6
+
7
+
For end to end tests, have a look at how we use a [mock OIDC Provider](https://github.com/auth0/open-source-template/blob/master/scripts/oidc-provider.js).
0 commit comments