Skip to content

Commit 3febbdd

Browse files
committed
Readme redesign
1 parent f7f4cd3 commit 3febbdd

File tree

4 files changed

+118
-123
lines changed

4 files changed

+118
-123
lines changed

EXAMPLES.md

+52
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
- [Access an External API from an API Route](#access-an-external-api-from-an-api-route)
1010
- [Create your own instance of the SDK](#create-your-own-instance-of-the-sdk)
1111
- [Add a signup handler](#add-a-signup-handler)
12+
- [Use with Base Path and Internationalized Routing](#use-with-base-path-and-internationalized-routing)
1213

1314
All examples can be seen running in the [Kitchen Sink example app](./examples/kitchen-sink-example).
1415

@@ -379,3 +380,54 @@ Users can then sign up using the signup handler.
379380
```html
380381
<a href="/api/signup">Sign up</a>
381382
```
383+
384+
## Use with Base Path and Internationalized Routing
385+
386+
With Next.js you can deploy a Next.js application under a sub-path of a domain using [Base Path](https://nextjs.org/docs/api-reference/next.config.js/basepath) and serve internationalized (i18n) routes using [Internationalized Routing](https://nextjs.org/docs/advanced-features/i18n-routing).
387+
388+
If you use these features the urls of your application will change and so the urls to the nextjs-auth0 routes will change. To accommodate this there are various places in the SDK that you can customise the url.
389+
390+
For example if `basePath: '/foo'` you should prepend this to the `loginUrl` and `profileUrl` specified in your `Auth0Provider`
391+
392+
```jsx
393+
// _app.jsx
394+
function App({ Component, pageProps }) {
395+
return (
396+
<UserProvider loginUrl="/foo/api/auth/login" profileUrl="/foo/api/auth/me">
397+
<Component {...pageProps} />
398+
</UserProvider>
399+
);
400+
}
401+
```
402+
403+
Also, any links to login or logout should include the `basePath`:
404+
405+
```html
406+
<a href="/foo/api/auth/login">Login</a><br />
407+
<a href="/foo/api/auth/logout">Logout</a>
408+
```
409+
410+
You should configure [baseUrl](https://auth0.github.io/nextjs-auth0/interfaces/config.baseconfig.html#baseurl) (or the `AUTH0_BASE_URL` environment variable) eg
411+
412+
```shell
413+
# .env.local
414+
AUTH0_BASE_URL=http://localhost:3000/foo
415+
```
416+
417+
For any pages that are protected with the Server Side [withPageAuthRequired](https://auth0.github.io/nextjs-auth0/modules/helpers_with_page_auth_required.html#withpageauthrequired) you should update the `returnTo` parameter depending on the `basePath` and `locale` if necessary.
418+
419+
```js
420+
// ./pages/my-ssr-page.jsx
421+
export default MySsrPage = () => <></>;
422+
423+
const getFullReturnTo = (ctx) => {
424+
// TODO: implement getFullReturnTo based on the ctx.resolvedUrl, ctx.locale
425+
// and your next.config.js's basePath and i18n settings.
426+
return '/foo/en-US/my-ssr-page';
427+
};
428+
429+
export const getServerSideProps = (ctx) => {
430+
const returnTo = getFullReturnTo(ctx.req);
431+
return withPageAuthRequired({ returnTo })(ctx);
432+
};
433+
```

README.md

+12-123
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,18 @@ The Auth0 Next.js SDK is a library for implementing user authentication in Next.
88
[![License](https://img.shields.io/:license-mit-blue.svg?style=flat)](https://opensource.org/licenses/MIT)
99
![CircleCI](https://img.shields.io/circleci/build/github/auth0/nextjs-auth0)
1010

11-
🚀 [Getting Started](#getting-started) - 📚 [Documentation](#documentation) - 💻 [API Reference](#api-reference) - 💬 [Feedback](#feedback)
11+
📚 [Documentation](#documentation) - 🚀 [Getting Started](#getting-started)- 💻 [API Reference](#api-reference) - 💬 [Feedback](#feedback)
12+
13+
## Documentation
14+
15+
- [QuickStart](https://auth0.com/docs/quickstart/webapp/nextjs)- our guide for adding Auth0 to your Next.js app.
16+
- [FAQs](https://github.com/auth0/open-source-template/blob/master/FAQ.md) - Frequently asked questions about nextjs-auth0.
17+
- [Examples](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md) - lots of examples for your different use cases.
18+
- [Security](https://github.com/auth0/open-source-template/blob/master/SECURITY.md) - Some important security notices that you should check.
19+
- [Architecture](https://github.com/auth0/open-source-template/blob/master/ARCHITECTURE.md) - Architectural overview of the SDK.
20+
- [Testing](https://github.com/auth0/open-source-template/blob/master/TESTING.md) - Some help with testing your nextjs-auth0 application.
21+
- [Deploying](https://github.com/auth0/open-source-template/blob/master/examples/README.md) - How we deploy our example app to Vercel.
22+
- [Docs Site](https://auth0.com/docs) - explore our docs site and learn more about Auth0.
1223

1324
## Getting Started
1425

@@ -148,128 +159,6 @@ There are two additional ways to check for an authenticated user; one for Next.j
148159

149160
For other comprehensive examples, see the [EXAMPLES.md](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md) document.
150161

151-
## Documentation
152-
153-
- [QuickStart](https://auth0.com/docs/quickstart/webapp/nextjs)
154-
- [v1 Migration Guide](https://github.com/auth0/open-source-template/blob/master/V1_MIGRATION_GUIDE.md)
155-
- [Cookies and Security](#cookies-and-security)
156-
- [Caching and Security](#caching-and-security)
157-
- [Error Handling and Security](#error-handling-and-security)
158-
- [Base Path and Internationalized Routing](#base-path-and-internationalized-routing)
159-
- [Architecture](https://github.com/auth0/open-source-template/blob/master/ARCHITECTURE.md)
160-
- [Comparison with auth0-react](#comparison-with-the-auth0-react-sdk)
161-
- [Testing](#testing)
162-
- [Deploying](#deploying)
163-
164-
### Cookies and Security
165-
166-
All cookies will be set to `HttpOnly, SameSite=Lax` and will be set to `Secure` if the application's `AUTH0_BASE_URL` is `https`.
167-
168-
The `HttpOnly` setting will make sure that client-side JavaScript is unable to access the cookie to reduce the attack surface of [XSS attacks](https://auth0.com/blog/developers-guide-to-common-vulnerabilities-and-how-to-prevent-them/#Cross-Site-Scripting--XSS-).
169-
170-
The `SameSite=Lax` setting will help mitigate CSRF attacks. Learn more about SameSite by reading the ["Upcoming Browser Behavior Changes: What Developers Need to Know"](https://auth0.com/blog/browser-behavior-changes-what-developers-need-to-know/) blog post.
171-
172-
### Caching and Security
173-
174-
Many hosting providers will offer to cache your content at the edge in order to serve data to your users as fast as possible. For example Vercel will [cache your content on the Vercel Edge Network](https://vercel.com/docs/concepts/edge-network/caching) for all static content and Serverless Functions if you provide the necessary caching headers on your response.
175-
176-
It's generally a bad idea to cache any response that requires authentication, even if the response's content appears safe to cache there may be other data in the response that isn't.
177-
178-
This SDK offers a rolling session by default, which means that any response that reads the session will have a `Set-Cookie` header to update the cookie's expiry. Vercel and potentially other hosting providers include the `Set-Cookie` header in the cached response, so even if you think the response's content can be cached publicly, the responses `Set-Cookie` header cannot.
179-
180-
Check your hosting provider's caching rules, but in general you should **never** cache responses that either require authentication or even touch the session to check authentication (eg when using `withApiAuthRequired`, `withPageAuthRequired` or even just `getSession` or `getAccessToken`).
181-
182-
### Error Handling and Security
183-
184-
The default server side error handler for the `/api/auth/*` routes prints the error message to screen, eg
185-
186-
```js
187-
try {
188-
await handler(req, res);
189-
} catch (error) {
190-
res.status(error.status || 400).end(error.message);
191-
}
192-
```
193-
194-
Because the error can come from the OpenID Connect `error` query parameter we do some [basic escaping](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#rule-1-html-encode-before-inserting-untrusted-data-into-html-element-content) which makes sure the default error handler is safe from XSS.
195-
196-
If you write your own error handler, you should **not** render the error `message`, or `error` and `error_description` properties without using a templating engine that will properly escape it for other HTML contexts first.
197-
198-
### Base Path and Internationalized Routing
199-
200-
With Next.js you can deploy a Next.js application under a sub-path of a domain using [Base Path](https://nextjs.org/docs/api-reference/next.config.js/basepath) and serve internationalized (i18n) routes using [Internationalized Routing](https://nextjs.org/docs/advanced-features/i18n-routing).
201-
202-
If you use these features the urls of your application will change and so the urls to the nextjs-auth0 routes will change. To accommodate this there are various places in the SDK that you can customise the url.
203-
204-
For example if `basePath: '/foo'` you should prepend this to the `loginUrl` and `profileUrl` specified in your `Auth0Provider`
205-
206-
```jsx
207-
// _app.jsx
208-
function App({ Component, pageProps }) {
209-
return (
210-
<UserProvider loginUrl="/foo/api/auth/login" profileUrl="/foo/api/auth/me">
211-
<Component {...pageProps} />
212-
</UserProvider>
213-
);
214-
}
215-
```
216-
217-
Also, any links to login or logout should include the `basePath`:
218-
219-
```html
220-
<a href="/foo/api/auth/login">Login</a><br />
221-
<a href="/foo/api/auth/logout">Logout</a>
222-
```
223-
224-
You should configure [baseUrl](https://auth0.github.io/nextjs-auth0/interfaces/config.baseconfig.html#baseurl) (or the `AUTH0_BASE_URL` environment variable) eg
225-
226-
```shell
227-
# .env.local
228-
AUTH0_BASE_URL=http://localhost:3000/foo
229-
```
230-
231-
For any pages that are protected with the Server Side [withPageAuthRequired](https://auth0.github.io/nextjs-auth0/modules/helpers_with_page_auth_required.html#withpageauthrequired) you should update the `returnTo` parameter depending on the `basePath` and `locale` if necessary.
232-
233-
```js
234-
// ./pages/my-ssr-page.jsx
235-
export default MySsrPage = () => <></>;
236-
237-
const getFullReturnTo = (ctx) => {
238-
// TODO: implement getFullReturnTo based on the ctx.resolvedUrl, ctx.locale
239-
// and your next.config.js's basePath and i18n settings.
240-
return '/foo/en-US/my-ssr-page';
241-
};
242-
243-
export const getServerSideProps = (ctx) => {
244-
const returnTo = getFullReturnTo(ctx.req);
245-
return withPageAuthRequired({ returnTo })(ctx);
246-
};
247-
```
248-
249-
### Comparison with the Auth0 React SDK
250-
251-
We also provide an Auth0 React SDK, [auth0-react](https://github.com/auth0/auth0-react), which may be suitable for your Next.js application.
252-
253-
The SPA security model used by `auth0-react` is different from the Web Application security model used by this SDK. In short, this SDK protects pages and API routes with a cookie session (see ["Cookies and Security"](#cookies-and-security)). A SPA library like `auth0-react` will store the user's ID Token and Access Token directly in the browser and use them to access external APIs directly.
254-
255-
You should be aware of the security implications of both models. However, [auth0-react](https://github.com/auth0/auth0-react) may be more suitable for your needs if you meet any of the following scenarios:
256-
257-
- You are using [Static HTML Export](https://nextjs.org/docs/advanced-features/static-html-export) with Next.js.
258-
- You do not need to access user data during server-side rendering.
259-
- You want to get the access token and call external API's directly from the frontend layer rather than using Next.js API Routes as a proxy to call external APIs
260-
261-
### Testing
262-
263-
By default, the SDK creates and manages a singleton instance to run for the lifetime of the application. When testing your application, you may need to reset this instance, so its state does not leak between tests.
264-
265-
If you're using Jest, we recommend using `jest.resetModules()` after each test. Alternatively, you can look at [creating your own instance of the SDK](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md#create-your-own-instance-of-the-sdk), so it can be recreated between tests.
266-
267-
For end to end tests, have a look at how we use a [mock OIDC Provider](https://github.com/auth0/open-source-template/blob/master/scripts/oidc-provider.js).
268-
269-
### Deploying
270-
271-
For deploying, have a look at [how we deploy our example app to Vercel](https://github.com/auth0/open-source-template/blob/master/examples/README.md).
272-
273162
## API Reference
274163

275164
- [Configuration Options](https://auth0.github.io/nextjs-auth0/modules/config.html)

SECURITY.md

+47
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
# Security Considerations
2+
3+
## Cookies and Security
4+
5+
All cookies will be set to `HttpOnly, SameSite=Lax` and will be set to `Secure` if the application's `AUTH0_BASE_URL` is `https`.
6+
7+
The `HttpOnly` setting will make sure that client-side JavaScript is unable to access the cookie to reduce the attack surface of [XSS attacks](https://auth0.com/blog/developers-guide-to-common-vulnerabilities-and-how-to-prevent-them/#Cross-Site-Scripting--XSS-).
8+
9+
The `SameSite=Lax` setting will help mitigate CSRF attacks. Learn more about SameSite by reading the ["Upcoming Browser Behavior Changes: What Developers Need to Know"](https://auth0.com/blog/browser-behavior-changes-what-developers-need-to-know/) blog post.
10+
11+
## Caching and Security
12+
13+
Many hosting providers will offer to cache your content at the edge in order to serve data to your users as fast as possible. For example Vercel will [cache your content on the Vercel Edge Network](https://vercel.com/docs/concepts/edge-network/caching) for all static content and Serverless Functions if you provide the necessary caching headers on your response.
14+
15+
It's generally a bad idea to cache any response that requires authentication, even if the response's content appears safe to cache there may be other data in the response that isn't.
16+
17+
This SDK offers a rolling session by default, which means that any response that reads the session will have a `Set-Cookie` header to update the cookie's expiry. Vercel and potentially other hosting providers include the `Set-Cookie` header in the cached response, so even if you think the response's content can be cached publicly, the responses `Set-Cookie` header cannot.
18+
19+
Check your hosting provider's caching rules, but in general you should **never** cache responses that either require authentication or even touch the session to check authentication (eg when using `withApiAuthRequired`, `withPageAuthRequired` or even just `getSession` or `getAccessToken`).
20+
21+
## Error Handling and Security
22+
23+
The default server side error handler for the `/api/auth/*` routes prints the error message to screen, eg
24+
25+
```js
26+
try {
27+
await handler(req, res);
28+
} catch (error) {
29+
res.status(error.status || 400).end(error.message);
30+
}
31+
```
32+
33+
Because the error can come from the OpenID Connect `error` query parameter we do some [basic escaping](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#rule-1-html-encode-before-inserting-untrusted-data-into-html-element-content) which makes sure the default error handler is safe from XSS.
34+
35+
If you write your own error handler, you should **not** render the error `message`, or `error` and `error_description` properties without using a templating engine that will properly escape it for other HTML contexts first.
36+
37+
## Comparison with the Auth0 React SDK
38+
39+
We also provide an Auth0 React SDK, [auth0-react](https://github.com/auth0/auth0-react), which may be suitable for your Next.js application.
40+
41+
The SPA security model used by `auth0-react` is different from the Web Application security model used by this SDK. In short, this SDK protects pages and API routes with a cookie session (see ["Cookies and Security"](#cookies-and-security)). A SPA library like `auth0-react` will store the user's ID Token and Access Token directly in the browser and use them to access external APIs directly.
42+
43+
You should be aware of the security implications of both models. However, [auth0-react](https://github.com/auth0/auth0-react) may be more suitable for your needs if you meet any of the following scenarios:
44+
45+
- You are using [Static HTML Export](https://nextjs.org/docs/advanced-features/static-html-export) with Next.js.
46+
- You do not need to access user data during server-side rendering.
47+
- You want to get the access token and call external API's directly from the frontend layer rather than using Next.js API Routes as a proxy to call external APIs

TESTING.md

+7
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Testing
2+
3+
By default, the SDK creates and manages a singleton instance to run for the lifetime of the application. When testing your application, you may need to reset this instance, so its state does not leak between tests.
4+
5+
If you're using Jest, we recommend using `jest.resetModules()` after each test. Alternatively, you can look at [creating your own instance of the SDK](https://github.com/auth0/open-source-template/blob/master/EXAMPLES.md#create-your-own-instance-of-the-sdk), so it can be recreated between tests.
6+
7+
For end to end tests, have a look at how we use a [mock OIDC Provider](https://github.com/auth0/open-source-template/blob/master/scripts/oidc-provider.js).

0 commit comments

Comments
 (0)