desktop-client | Cross Platform Desktop Application for establishing TCP | TCP library

 by   pomerium TypeScript Version: v0.17.1 License: Apache-2.0

kandi X-RAY | desktop-client Summary

kandi X-RAY | desktop-client Summary

desktop-client is a TypeScript library typically used in Networking, TCP applications. desktop-client has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.

Cross Platform Desktop Application for establishing TCP connections through Pomerium
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              desktop-client has a low active ecosystem.
              It has 4 star(s) with 0 fork(s). There are 2 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 3 open issues and 25 have been closed. On average issues are closed in 25 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of desktop-client is v0.17.1

            kandi-Quality Quality

              desktop-client has 0 bugs and 0 code smells.

            kandi-Security Security

              desktop-client has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              desktop-client code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              desktop-client is licensed under the Apache-2.0 License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              desktop-client releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.
              It has 43 lines of code, 0 functions and 44 files.
              It has low code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of desktop-client
            Get all kandi verified functions for this library.

            desktop-client Key Features

            No Key Features are available at this moment for desktop-client.

            desktop-client Examples and Code Snippets

            No Code Snippets are available at this moment for desktop-client.

            Community Discussions

            QUESTION

            Was the google API oath scope authorisation breached in the example below?
            Asked 2020-Sep-25 at 02:47

            The goal of the steps below is to create a custom oath client ID which will be used only for my instance of rclone. rclone already is registered as an app with google API with it's own set of client ID credentials, but the recommended way is create another set for the sake of performance.

            In the google api developers console I create a new project called my-rclone-project.

            Once the project is created I proceed to the OAuth consent screen where I choose the type External. As I proceed to the OAuth consent screen there is a setting paragraps called Scopes for Google APIs. Here I leave the default scopes (email, profile, openid) explicitly not selecting the scopes which would allow access to google drive. I call the application my-rclone-app and use the defaults.

            After that I go to the Credentials screen and do CREARTE CREDENTIALS -> OAuth client ID. I choose the Desktop app and name the client my-rclone-desktop-client. Finishing this results in the reation of the Client ID and Client secret. Given the scope selected in the OAuth consent screen i would expect that these credentials won't allow the app to ask permision for anything besides what was defined in the scope. So it shouln't be able to ask for permission to access the google drive APIs.

            I than proceed to configure the rclone from my pc rclone config. I enter the oauth credentials I created in the step above. During the config process I'm asked to define the scope to use when accessing google drive as if the OAuth consent screen isn't relevant at all. As the config nears it's end, I'm redirected to the browser where the app is requesting to See and download all your Google Drive files. I accept that end end the config with defaults selected.

            As I try listing with ./rclone lsd google-drive: I get an error about the drive API not being enabled with a link in the error on how to enable it. Going on that link and enabling it results in ./rclone lsd google-drive: listing the content of my drive.

            What is the purpose of having to define an OAuth consent screen and the API scope as a part of it when the app can request an arbitrary scope completly bypassing the scope selected in the OAuth consent screen setup?

            Reference: Create a client ID in google API

            ...

            ANSWER

            Answered 2020-Sep-25 at 02:47

            Why you want to have custom OAuth consent page?

            In order for you app to use one of Google's auth servers, your application needs some way to be identified by auth servers and that is where Client ID and Client Secret comes in to play and consent page server as a screen on which you application specific information such as application name, contact info, privacy policy, term of use etc. will be displayed to the user.

            What are scopes that you define on consent screen setup?

            On consent screen set up you are supposed to include all possible scopes that you application is going to request from Google APIs, but that doesn't mean you app is limited to those scopes only. Scope listed here will be used by Google for application verification purpose and once Google verifies you application, it will no longer display This app isn't verified warning page as long as your app is requesting one of those verified scopes.

            Even after verification, if you application completes verification, requesting any scope access which isn't included in this list will still display This app isn't verified warning message.

            and clicking on learn more link will open Google Account help page which clearly states once you provide access to application, when you allow third-party apps to access your Google Account, they can copy and save your data on their own servers. Because Google can’t protect the data on another company’s servers, your data may be subject to greater data security and privacy risks.

            What is the purpose of having to define an OAuth consent screen and the API scope as a part of it when the app can request an arbitrary scope completely bypassing the scope selected in the OAuth consent screen setup?

            The main purpose of the consent screen configuration is to allow app developer to present information about application it's terms and privacy policy during authorization process. And of course not to have warning once application is verified.

            Please refer following link to better understand about unverified apps and scope verification:

            1. https://support.google.com/cloud/answer/7454865?hl=en
            2. https://support.google.com/cloud/answer/9110914
            3. https://www.gmass.co/blog/five-annoying-issues-google-oauth-scope-verification/
            4. https://support.google.com/accounts/answer/3466521?p=app_notverified&visit_id=637365968258169095-220403864&rd=2#notverified

            Source https://stackoverflow.com/questions/63992937

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install desktop-client

            This will internally check out the default branch of pomerium/cli.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/pomerium/desktop-client.git

          • CLI

            gh repo clone pomerium/desktop-client

          • sshUrl

            git@github.com:pomerium/desktop-client.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular TCP Libraries

            masscan

            by robertdavidgraham

            wait-for-it

            by vishnubob

            gnet

            by panjf2000

            Quasar

            by quasar

            mumble

            by mumble-voip

            Try Top Libraries by pomerium

            pomerium

            by pomeriumGo

            autocache

            by pomeriumGo

            pomerium-operator

            by pomeriumGo

            ingress-controller

            by pomeriumGo

            envoy-binaries

            by pomeriumShell