We moved this package to another repository.
5.1.0 was the last release from this repository. 5.2.0 was the first release from the new repository.
This deprecated repository will be archived.
The main JavaScript client for the w3up platform by https://web3.storage
Please read the beta Terms of Service (web3.storage, NFT.Storage) for more details.
Open an issue on the repo or reach out to the #web3-storage channel on IPFS Discord if you have any questions!
@web3-storage/w3up-client
is a JavaScript library that provides a convenient interface to the w3up platform, a simple "on-ramp" to the content-addressed decentralized IPFS network.
This library is the user-facing "porcelain" client for interacting with w3up services from JavaScript. It wraps the lower-level @web3-storage/access
and @web3-storage/upload-client
client packages, which target individual w3up services. We recommend using w3up-client
instead of using those "plumbing" packages directly, but you may find them useful if you need more context on w3up's architecture and internals.
⚠️ ❗ Public Data 🌎: All data uploaded to w3up is available to anyone who requests it using the correct CID. Do not store any private or sensitive information in an unencrypted form using w3up.
⚠️ ❗ Permanent Data ♾️: Removing files from w3up will remove them from the file listing for your account, but that doesn’t prevent nodes on the decentralized storage network from retaining copies of the data indefinitely. Do not use w3up for data that may need to be permanently deleted in the future.
You can add the @web3-storage/w3up-client
package to your JavaScript or TypeScript project with npm
:
npm install @web3-storage/w3up-client
w3up services use ucanto, a Remote Procedure Call (RPC) framework built around UCAN, or User Controlled Authorization Networks. UCANs are a powerful capability-based authorization system that allows fine-grained sharing of permissions through a process called delegation. See our intro to UCAN blog post for an overview of UCAN.
w3up-client
and ucanto
take care of the details of UCANs for you, but a few of the underlying terms and concepts may "bubble up" to the surface of the API, so we'll cover the basics here. We'll also go over some terms that are specific to w3up that you might not have encountered elsewhere.
UCAN-based APIs are centered around capabilities, which are comprised of an ability and a resource. Together, the ability and resource determine what action a client can perform and what objects in the system can be acted upon. When invoking a service method, a client will present a UCAN token that includes an ability and resource, along with proofs that verify that they should be allowed to exercise the capability.
To invoke a capability, the client must have a private signing key, which is managed by a component called an Agent. When you create a client object with w3up-client
, an Agent is automatically created for you and used when making requests. The Agent's keys and metadata are securely stored and are loaded the next time you create a client.
Each device or browser should create its own Agent, so that private keys are never shared across multiple devices. Instead of sharing keys, a user can delegate some or all of their capabilities from one Agent to another.
When you upload data to w3up, your uploads are linked to a unique Space acts as a "namespace" for the data you upload. Spaces are used to keep track of which uploads belong to which users, among other things.
When invoking storage capabilities, the Space ID is the "resource" portion of the capability, while the ability is an action like store/add
or store/remove
.
Both Agents and Spaces are identified using DIDs, or Decentralized Identity Documents. DIDs are a W3C specification for verifiable identities in decentralized systems. There are several DID "methods," but the ones most commonly used by w3up are did:key
, which includes a public key directly in the DID string. Agents and Spaces both use did:key
URI strings as their primary identifiers. The other DID method used by w3up is did:web
, which is used to identify the service providers.
Agents and Spaces are both generated by w3up-client
on the user's local machine. Before they can be used for storage, the user will need to register the space by confirming their email address. Once registered, a Space can be used to upload files and directories.
This section shows some of the basic operations available in the w3up-client
package. See the API reference docs or the source code of the w3up-cli
package, which uses w3up-client
throughout.
Before data can be uploaded via the client, the client needs to have permissions to upload to the target service either by having permissions to a registered Space
. This means either you (the developer) or your user needs to have a registered Space.
Currently, w3up-client
offers as defaults two beta services to register Spaces with and upload data to that the w3up core maintainers also run:
- web3.storage w3up beta: A developer storage platform for any data
- NFT.Storage w3up beta: A free service for archiving specifically off-chain NFT data
However, w3up-client
can be used for any service that complies to the w3up specs and protocol.
By you or your users registering a w3up beta Space via email confirmation with either NFT.Storage or web3.storage, you agree to the relevant w3up beta Terms of Service (web3.storage, NFT.Storage). If you have an existing non-w3up beta account with NFT.Storage or web3.storage and register for the w3up beta version of the same product (NFT.Storage or web3.storage) using the same email, then at the end of the beta period, these accounts will be combined. Until the beta period is over and this migration occurs, uploads to w3up will not appear in your NFT.Storage or web3.storage account (and vice versa), even if you register with the same email (coming soon!).
In terms of whether you or your user should register the Space (and more broadly how to integrate w3up-client
), there are three general wasy to integrate.
- (Simplest) Client-server: You (the developer) own the Space and register it with the service of your choosing, and your user uploads to your backend infra before you upload it to the service
- (More complex) Server-owned space with direct upload from end-user: You own the Space and register it with the service of your choosing, but you give a delegated UCAN token to your user to upload directly to the service
- (Most complex) User-owned: Your user owns the Space and registers it (likely with the service you choose for them in your code, but not necessarily), and they use it to upload directly with the service (if you want to instrument visibility into what they’re uploading, you’ll have to write separate code in your app for it)
The first and simplest of these options (client-server) is covered in-depth in this section, though the other two options are discussed further down in the README as well.
The package provides a static create
function that returns a Client
object.
import { create } from '@web3-storage/w3up-client'
const client = await create()
By default, clients will be configured to use the production w3up service endpoints, and the client will create a new Agent
with a persistent Store
if it can't find one locally to load.
Agents are entities that control the private signing keys used to interact with the w3up service layer. You can access the client's Agent
with the agent()
accessor method.
create
accepts an optional ClientFactoryOptions
object, which can be used to target a non-production instance of the w3up access and upload services, or to use a non-default persistent Store
. See the @web3-storage/access
docs for more about Store
configuration.
In order to store data with w3up, you'll need to authorize your agent. Currently you can only authorize your agent by confirming your email address. By confirming your email address w3up will attest that you are not a robot and are ok to upload data to the service! Hooray.
Authorizing your agent allows you to claim spaces and other delegations that you created on a different agent that is authorized to the same email account. Authorization needs to happen only once per agent.
await client.authorize('[email protected]')
Calling authorize
will cause an email to be sent to the given address. Once a user clicks the confirmation link in the email, the authorize
method will resolve. Make sure to check for errors, as authorize
will fail if the email is not confirmed within the expiration timeout.
Note: Alternatively, you can add a delegation for access to a space created by a different authorized agent, see the addSpace
client method.
If this is not the first time you authorized an agent with your email, then you'll want to claim any spaces and delegations you have on your other agent(s):
await client.capability.access.claim()
Before you can upload data, you'll need to create a Space
and register it with the service. A Space acts as a namespace for your uploads. Spaces are created using the createSpace
client method:
const space = await client.createSpace('my-awesome-space')
The name parameter is optional. If provided, it will be stored in your client's local state store and can be used to provide a friendly name for user interfaces.
After creating a Space
, you'll need to register it with the w3up service before you can upload data.
First, set the space as your "current" space using the setCurrentSpace
method, passing in the DID of the space
object you created above:
await client.setCurrentSpace(space.did())
Next, call the registerSpace
method, passing in the same email address you used to authorize your agent. You
can specify a storage provider for the space to use by passing a provider DID as the provider
option:
try {
await client.registerSpace('[email protected]', { provider: 'did:web:web3.storage' })
} catch (err) {
console.error('registration failed: ', err)
}
By default, calling registerSpace
registers the Space with web3.storage w3up. You can pass the optional provider
param to register with NFT.Storage w3up instead.
try {
await client.registerSpace('[email protected]', { provider: 'did:web:nft.storage' })
} catch (err) {
console.error('registration failed: ', err)
}
Once you've authorized, created and registered a space, you can upload files to the w3up platform.
Call uploadFile
to upload a single file, or uploadDirectory
to upload multiple files.
uploadFile
expects a "Blob like" input, which can be a Blob
or File
when running in a browser. On node.js, see the filesFromPath
library, which can load compatible objects from the local filesystem.
uploadDirectory
requires File
-like objects instead of Blob
s, as the file's name
property is used to build the directory hierarchy.
You can control the directory layout and create nested directory structures by using /
delimited paths in your filenames:
const files = [
new File(['some-file-content'], 'readme.md'),
new File(['import foo'], 'src/main.py'),
new File([someBinaryData], 'images/example.png'),
]
const directoryCid = await client.storeDirectory(files)
In the example above, directoryCid
resolves to an IPFS directory with the following layout:
.
├── images
│ └── example.png
├── readme.md
└── src
└── main.py
As discussed above, there are options outside the traditional client-server model that w3up supports. We how to use w3up-client
to achieve these options in this section.
In this option, you (the developer) own your Space, but delegate permissions to your users to directly upload content to the service on your behalf. This isn’t completely “serverless” - you still need some infrastructure to create delegated UCAN tokens, but it’s minimal, and potentially saves a ton of bandwidth and overhead.
🔜 More detail coming soon!
If you explore this option, contributions are welcome to these docs to help others in the future (and to reveal feature requests and bugs that we can patch to improve this implementation path)! Also feel free to chime into the discussion here.
In this option, your user owns their own Space. This option is the most web3-native (since your user owns their own identity, and thus their own data) and probably the most interesting one. It comes with a world of possibilities; for instance, instead of generating a new Space keypair for your user, you might look into using the existing keypair from their Metamask wallet or Apple Passkey. However, there are also likely edge cases that will appear early on for developers developing these types of apps that we haven’t had a chance to think much about yet, best-practices for various requirements (e.g., how much visibility do you want into user activity), and useful features that we could support.
🔜 More detail coming soon!
If you explore this option, contributions are welcome to these docs to help others in the future (and to reveal feature requests and bugs that we can patch to improve this implementation path)! Also feel free to chime into the discussion here.
create
Client
uploadDirectory
uploadFile
uploadCAR
agent
authorize
currentSpace
setCurrentSpace
spaces
createSpace
registerSpace
addSpace
proofs
addProof
delegations
createDelegation
capability.access.authorize
capability.access.claim
capability.space.info
capability.space.recover
capability.store.add
capability.store.list
capability.store.remove
capability.upload.add
capability.upload.list
capability.upload.remove
- Types
function create (options?: ClientFactoryOptions): Promise<Client>
Create a new w3up client.
If no backing store is passed one will be created that is appropriate for the environment.
If the backing store is empty, a new signing key will be generated and persisted to the store. In the browser an unextractable RSA key will be generated by default. In other environments an Ed25519 key is generated.
If the backing store already has data stored, it will be loaded and used.
More information: ClientFactoryOptions
function uploadDirectory (
files: File[],
options: {
retries?: number
signal?: AbortSignal
onShardStored?: ShardStoredCallback
shardSize?: number
concurrentRequests?: number
} = {}
): Promise<CID>
Uploads a directory of files to the service and returns the root data CID for the generated DAG. All files are added to a container directory, with paths in file names preserved.
More information: ShardStoredCallback
function uploadFile (
file: Blob,
options: {
retries?: number
signal?: AbortSignal
onShardStored?: ShardStoredCallback
shardSize?: number
concurrentRequests?: number
} = {}
): Promise<CID>
Uploads a file to the service and returns the root data CID for the generated DAG.
More information: ShardStoredCallback
function uploadCAR (
car: Blob,
options: {
retries?: number
signal?: AbortSignal
onShardStored?: ShardStoredCallback
shardSize?: number
concurrentRequests?: number
rootCID?: CID
} = {}
): Promise<void>
Uploads a CAR file to the service. The difference between this function and capability.store.add is that the CAR file is automatically sharded and an "upload" is registered (see capability.upload.add
), linking the individual shards. Use the onShardStored
callback to obtain the CIDs of the CAR file shards.
More information: ShardStoredCallback
function agent (): Signer
The user agent. The agent is a signer - an entity that can sign UCANs with keys from a Principal
using a signing algorithm.
function authorize (email: string, options?: { signal?: AbortSignal }): Promise<void>
Authorize the current agent to use capabilities granted to the passed email account.
function currentSpace (): Space|undefined
The current space in use by the agent.
function setCurrentSpace (did: DID): Promise<void>
Use a specific space.
function spaces (): Space[]
Spaces available to this agent.
async function createSpace (name?: string): Promise<Space>
Create a new space with an optional name.
async function registerSpace (
email: string,
options?: { provider?: string, signal?: AbortSignal }
): Promise<Space>
Register the current space with the service.
By default, the provider is set to web3.storage w3up, but you can register instead of NFT.Storage w3up by setting provider
to did:web:nft.storage
.
async function addSpace (proof: Delegation): Promise<Space>
Add a space from a received proof. Proofs are delegations with an audience matching the agent DID.
function proofs (capabilities?: Capability[]): Delegation[]
Get all the proofs matching the capabilities. Proofs are delegations with an audience matching the agent DID.
function addProof (proof: Delegation): Promise<void>
Add a proof to the agent. Proofs are delegations with an audience matching the agent DID. Note: you probably want to use addSpace
unless you know the delegation you received targets a resource other than a w3 space.
function delegations (capabilities?: Capability[]): Delegation[]
Get delegations created by the agent for others. Filtered optionally by capability.
function createDelegation (
audience: Principal,
abilities: string[],
options?: UCANOptions
): Promise<Delegation>
Create a delegation to the passed audience for the given abilities with the current space as the resource.
function authorize (
email: string,
options: { signal?: AbortSignal } = {}
): Promise<void>
Authorize the current agent to use capabilities granted to the passed email account.
function claim (): Promise<Delegation<Capabilities>[]>
Claim delegations granted to the account associated with this agent. Note: the received delegations are added to the agent's persistent store.
function add (
car: Blob,
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<CID>
Store a CAR file to the service.
function list (
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<ListResponse<StoreListResult>>
List CAR files stored in the current space.
More information: StoreListResult
, ListResponse
function remove (
link: CID,
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<void>
Remove a stored CAR file by CAR CID.
function add (
root: CID,
shards: CID[],
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<UploadAddResponse>
Register a set of stored CAR files as an "upload" in the system. A DAG can be split between multiple CAR files. Calling this function allows multiple stored CAR files to be considered as a single upload.
function list(
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<ListResponse<UploadListResult>>
List uploads created in the current space.
More information: UploadListResult
, ListResponse
function remove(
link: CID,
options: { retries?: number; signal?: AbortSignal } = {}
): Promise<void>
Remove a upload by root data CID.
An object describing a UCAN capability, which specifies what action the UCAN holder can
perform with
some resource.
Defined by the @ipld/dag-ucan
package.
export interface Capability<
Can extends Ability = Ability,
With extends Resource = Resource,
Caveats extends unknown = unknown
> {
with: With
can: Can
nb?: Caveats
}
export type Ability = `${string}/${string}` | "*"
export type Resource = `${string}:${string}`
The can
field contains a string ability identifier, e.g. store/add
or space/info
.
The with
field contains a resource URI, often a did:key
URI that identifies a Space.
The optional nb
(nota bene) field contains "caveats" that add supplemental information to a UCAN invocation or delegation.
See the capability spec for more information about capabilities and how they are defined in w3up services.
Metadata pertaining to a CAR file.
export interface CARMetadata {
/**
* CAR version number.
*/
version: number
/**
* Root CIDs present in the CAR header.
*/
roots: CID[]
/**
* CID of the CAR file (not the data it contains).
*/
cid: CID
/**
* Size of the CAR file in bytes.
*/
size: number
}
Options for constructing new Client
instances.
interface ClientFactoryOptions {
/**
* A storage driver that persists exported agent data.
*/
store?: Driver<AgentDataExport>
/**
* Service DID and URL configuration.
*/
serviceConf?: ServiceConf
}
More information: Driver
, ServiceConf
An in-memory view of a UCAN delegation, including proofs that can be used to invoke capabilities or delegate to other agents.
import { Delegation as CoreDelegation } from '@ucanto/core/delegation'
export interface Delegation extends CoreDelegation {
/**
* User defined delegation metadata.
*/
meta(): Record<string, any>
}
The Delegation
type in w3up-client
extends the Delegation
type defined by ucanto
:
export interface Delegation<C extends Capabilities = Capabilities> {
readonly root: UCANBlock<C>
readonly blocks: Map<string, Block>
readonly cid: UCANLink<C>
readonly bytes: ByteView<UCAN.UCAN<C>>
readonly data: UCAN.View<C>
asCID: UCANLink<C>
export(): IterableIterator<Block>
issuer: UCAN.Principal
audience: UCAN.Principal
capabilities: C
expiration?: UCAN.UTCUnixTimestamp
notBefore?: UCAN.UTCUnixTimestamp
nonce?: UCAN.Nonce
facts: Fact[]
proofs: Proof[]
iterate(): IterableIterator<Delegation>
}
Delegations can be serialized by calling export()
and piping the returned Block
iterator into a CarWriter
from the @ipld/car
package.
Storage drivers can be obtained from @web3-storage/access/stores
. They persist data created and managed by an agent.
A paginated list of items.
interface ListResponse<R> {
cursor?: string
size: number
results: R[]
}
Service DID and URL configuration.
A function called after a DAG shard has been successfully stored by the service:
type ShardStoredCallback = (meta: CARMetadata) => void
More information: CARMetadata
An object representing a storage location. Spaces must be registered with the service before they can be used for storage.
interface Space {
/**
* The given space name.
*/
name(): string
/**
* The DID of the space.
*/
did(): string
/**
* Whether the space has been registered with the service.
*/
registered(): boolean
/**
* User defined space metadata.
*/
meta(): Record<string, any>
}
interface StoreListResult {
link: CID
size: number
origin?: CID
}
interface UploadListResult {
root: CID
shards?: CID[]
}
Feel free to join in. All welcome. Please open an issue!
Dual-licensed under MIT + Apache 2.0