Overview:
Lowdefy is a versatile source-available web framework designed for building various types of business applications. It offers a simple YAML or JSON configuration method to create internal tools, web apps, admin panels, BI dashboards, websites, and CRUD apps. With Lowdefy, users can easily build web UIs, connect to databases and APIs, extend app functionality with npm plugins, and host their apps anywhere that supports Next.js deployment.
Features:
- Build Web UIs and Connect to Databases and APIs: Easily create web UIs and establish connections to databases and APIs for dynamic web applications.
- Extend Everything with NPM Plugins: Extend Blocks, Requests, Operators, Actions, Auth Providers, and Adapters using plugins for enhanced flexibility.
- Deploy Anywhere: Run Lowdefy apps as Next.js apps which can be deployed on platforms supporting Next.js deployment like Vercel or Docker.
- Secured with Auth.js: Authentication is built on Auth.js, supporting various authentication methods like SSO, SAML, 2FA, and integration with providers like Google, Okta, and Auth0.
- Git Control for Humans: The configuration structure of Lowdefy is designed for easy readability and understanding, facilitating collaboration in development teams.
- Public, Authenticated, and Role-Based Access: Lowdefy supports building apps with public and private pages and implements role-based access control for secure application usage.
Installation:
To install Lowdefy, follow these steps:
Create a new Next.js app.
Install Lowdefy using npm:
npm install @lowdefy/lowdefy
Create a Lowdefy configuration file (yaml or json) to define the app structure.
Start the Lowdefy development server:
npx lowdefy start
Complete the installation by following the detailed setup guide on the Lowdefy documentation.
Summary:
Lowdefy is a comprehensive web framework that simplifies the development of business applications by offering easy-to-use configuration, a wide range of features including easy database and API connections, npm plugin extensions, and robust security measures. Its flexibility in deployment, authentication methods, and access control make it suitable for developers building various types of applications with different requirements.