Did you know ...
Search Documentation:
Predicate pengine_user/1
HOME
DOWNLOAD
SWI-Prolog
Sources/building
Docker images
Add-ons
Browse GIT
DOCUMENTATION
Manual
Packages
FAQ
Command line
PlDoc
Bluffers
▶
Prolog syntax
PceEmacs
HTML generation
License
Publications
Rev 7 Extensions
TUTORIALS
Beginner
▶
Getting started
Learn Prolog Now!
Simply Logical
Debugger
Development tools
Advanced
▶
Modules
Grammars (DCGs)
clp(fd)
Printing messages
PlDoc
Web applications
▶
Web applications
Let's Encrypt!
Pengines
Semantic web
▶
ClioPatria
RDF namespaces
Graphics
▶
XPCE
GUI options
Machine learning
▶
Probabilistic Logic Programming
External collections
▶
Meta level tutorials
For packagers
▶
Linux packages
COMMUNITY
IRC
Forum & mailing list
Blog
News
Report a bug
Submit a patch
Submit an add-on
Roadmap (on GitHub)
External links
Contributing
Code of Conduct
Contributors
SWI-Prolog items
COMMERCIAL
WIKI
Login
View changes
Sandbox
Wiki help
All tags
ext
pengines
pengines.pl -- Pengines: Web Logic Programming Made Easy
create_pool/1
pengine_create/1
pengine_ask/3
pengine_next/2
pengine_stop/2
pengine_abort/1
pengine_destroy/1
pengine_destroy/2
pengine_self/1
pengine_application/1
current_pengine_application/1
pengine_property/2
pengine_output/1
pengine_debug/2
pengine_done/0
prepare_module/3
prepare_goal/3
not_sandboxed/2
pengine_pull_response/2
pengine_input/2
pengine_respond/3
pengine_event_loop/2
pengine_rpc/2
pengine_rpc/3
prompt/3
output/2
portray_blob/2
write_result/3
add_error_details/3
event_to_json/3
authentication_hook/3
pengine_user/1
term_to_json.pl
pengines_io.pl -- Provide Prolog I/O for HTML clients
pengines_sandbox.pl -- Declare Pengine interaction sandbox-safe
pengine_user
(-User)
is
semidet
True when the pengine was create by an HTTP request that authorized
User
.
See also
-
authentication_hook/3
can be used to extract authorization from the HTTP header.