Websvc » History » Version 25
Shuvam Misra, 05/04/2020 04:35 PM
1 | 24 | Shuvam Misra | # Web service design standards |
---|---|---|---|
2 | 1 | Shuvam Misra | |
3 | {{>toc}} |
||
4 | |||
5 | 18 | Shuvam Misra | ## Web services: basic rules |
6 | 1 | Shuvam Misra | |
7 | 19 | Shuvam Misra | * We will expect requests in `POST`, not `GET`. We will not design URLs to communicate request parameters. The only exception will be in "deep URL" cases where we need to supply a link or button somewhere which will take the user directly to a specific object instance within a module, for instance, the edit screen of a specific voucher within the FA module. In such cases, we can append the object ID to the URL, and use `GET`. |
8 | 1 | Shuvam Misra | * All JSON data structures will have member names in full lowercase. No mixed-case will be used. |
9 | 19 | Shuvam Misra | * We will use only HTTPS for all web services traffic. Calls must fail if HTTP is attempted. |
10 | 23 | Shuvam Misra | * HTTP response codes should not be examined by the caller to decide success or failure of the call -- any HTTP code in the range `200` to `299` should be accepted as success. HTTP protocol response codes are supposed to indicate protocol level and basic transport level issues -- not application level success or failure. |
11 | 1 | Shuvam Misra | |
12 | ## Web service request format |
||
13 | |||
14 | * Example |
||
15 | 2 | Shuvam Misra | |
16 | 6 | Shuvam Misra | ``` json |
17 | 1 | Shuvam Misra | { |
18 | 2 | Shuvam Misra | "ver": 1, |
19 | 9 | Shuvam Misra | "uid": "xpq1234", |
20 | 8 | Shuvam Misra | "authtoken": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ", |
21 | 2 | Shuvam Misra | "data": { |
22 | 4 | Sachin Divekar | "goal_id": 23 |
23 | 2 | Shuvam Misra | } |
24 | 1 | Shuvam Misra | } |
25 | 3 | Sachin Divekar | ``` |
26 | 1 | Shuvam Misra | |
27 | 9 | Shuvam Misra | * **`ver`** is the API version to be used. See the section on "API version" below. |
28 | * **`uid`** is user id for user-oriented applications. It will be an opaque one-word string. The field may be called **`boxid`** for embedded applications where IoT boxes invoke web services. It may be **`sysid`** or **`serverid`** where there are no human users, but servers invoke web services. For some web service calls it will be optional, _e.g._ for operations which do not need any user identification or box identification. |
||
29 | * **`authtoken`** is the (optional) JWT authentication token, which will be one long, opaque string in three sections, separated by periods, as can be seen here. Some web services may not require authenticated access, and for those calls, this field may be dropped. See the section on "Authentication" below. |
||
30 | 8 | Shuvam Misra | * **`data`** is the request data object. Each web service will define its own data object, with some mandatory and some optional fields. |
31 | 1 | Shuvam Misra | |
32 | 5 | Shuvam Misra | In some cases, a web service only requires `uid` or `boxid` as input. In those cases value of `data` will be an empty object. |
33 | 1 | Shuvam Misra | |
34 | e.g. |
||
35 | |||
36 | 3 | Sachin Divekar | |
37 | 6 | Shuvam Misra | ``` json |
38 | 1 | Shuvam Misra | { |
39 | "ver": 1, |
||
40 | 5 | Shuvam Misra | "boxid": 1234, |
41 | 1 | Shuvam Misra | "data": {} |
42 | 3 | Sachin Divekar | } |
43 | 1 | Shuvam Misra | ``` |
44 | |||
45 | ## Web service response format |
||
46 | |||
47 | 5 | Shuvam Misra | A consistent JSON data structure will be returned by the API for success or errors. For successes, the following JSON structure will be returned: |
48 | 1 | Shuvam Misra | |
49 | 25 | Shuvam Misra | ``` json |
50 | 1 | Shuvam Misra | { |
51 | 5 | Shuvam Misra | "status": "success", |
52 | "data": { |
||
53 | 1 | Shuvam Misra | /* Application-specific data payload goes here. */ |
54 | 5 | Shuvam Misra | }, |
55 | 17 | Shuvam Misra | "messages": [] /* Or optional success message */ |
56 | 1 | Shuvam Misra | } |
57 | 3 | Sachin Divekar | ``` |
58 | 1 | Shuvam Misra | |
59 | 21 | Shuvam Misra | The contents of `data` for each web service call is provided in its detailed documentation. Note how the `message` block is an empty array here. The `status` attribute will always be returned in every response. |
60 | 10 | Shuvam Misra | |
61 | For errors, the following JSON structure will be returned: |
||
62 | 3 | Sachin Divekar | |
63 | 25 | Shuvam Misra | ``` json |
64 | 1 | Shuvam Misra | { |
65 | 5 | Shuvam Misra | "status": "error", |
66 | "data": {}, |
||
67 | 17 | Shuvam Misra | "messages": [{ |
68 | 5 | Shuvam Misra | "code": "code1", |
69 | "msg": "message1" |
||
70 | }, { |
||
71 | "code": "code2", |
||
72 | "msg": "message2" |
||
73 | }] |
||
74 | 3 | Sachin Divekar | } |
75 | ``` |
||
76 | 11 | Shuvam Misra | Note that the `data` block is empty in case of errors, and the error messages will be listed in `message`. An example of an error response: |
77 | 3 | Sachin Divekar | |
78 | 7 | Shuvam Misra | ``` json |
79 | 1 | Shuvam Misra | { |
80 | 5 | Shuvam Misra | "status": "error", |
81 | "data": {}, |
||
82 | 17 | Shuvam Misra | "messages": [{ |
83 | 5 | Shuvam Misra | "code": "permission_denied", |
84 | "msg": "No permission for the requested operation." |
||
85 | }, { |
||
86 | "code": "account_restricted", |
||
87 | "msg": "The user account is disabled." |
||
88 | }] |
||
89 | 1 | Shuvam Misra | } |
90 | ``` |
||
91 | 21 | Shuvam Misra | |
92 | The `data` block is an object, not an array. And the `messages` array is always an array, never an object. |
||
93 | 1 | Shuvam Misra | |
94 | ## Reporting errors by web services |
||
95 | |||
96 | 12 | Shuvam Misra | Each error reported has two parts: |
97 | |||
98 | 1 | Shuvam Misra | * the error code |
99 | * the human readable error message |
||
100 | |||
101 | The code is always going to be one word, always in lower case, with letters, digits, and/or underscore characters. |
||
102 | |||
103 | 7 | Shuvam Misra | The code is the real indicator of the type of error, and must be used by the client code. It may handle the error, it may retry the operation, it may branch into a different path in the code, it may select a message to show the end-user, _etc_, as needed. The error message supplied by the web service is meant for the programmer of the client software to understand and debug the web service call. It is _not_ meant to be used for end-user display. |
104 | 1 | Shuvam Misra | |
105 | 7 | Shuvam Misra | In multi-lingual user interfaces, the error message must be indexed to the combination of `(language, errcode)` and the appropriate language-specific error message must be selected from a table and displayed to end-users. The responsibility of designing and selecting meaningful error messages in the correct language lies with the client software. The client software dev team must build error message tables in each supported language. The error message supplied by the web service will always be in English, and may not have appropriate wording to display directly to the end-user. Its audience is the programmer of the client software. |
106 | 1 | Shuvam Misra | |
107 | ## Authentication |
||
108 | |||
109 | 7 | Shuvam Misra | Typically, the web services layer will need to authenticate clients which are invoking them. If it's a human-user oriented application, then the human will need to be authenticated sometime. If the web services are invoked by devices, then each device will need to be authenticated at least once, maybe periodically, to ensure that the API does not remain completely open to outside access. |
110 | 1 | Shuvam Misra | |
111 | 7 | Shuvam Misra | Therefore, there will be at least one `login()` web service in every application, where the client will identify itself. |
112 | |||
113 | **User-based authentication**: The `login()` call may accept a username and password, or there may be a back-end OTP loop where the user just submits his username and the system sends an OTP to his registered mobile number which is later submitted through a second web service. |
||
114 | |||
115 | Finally, on successful authentication, the web service will return a JWT token to the client. This JWT token will need to be submitted as part of the fixed header fields of all subsequent web services which expect authenticated access. |
||
116 | |||
117 | **Device-based authentication**: The `login()` call may be designed to require a unique ID. This ID may be generated from some unique aspects of the device hardware (_e.g._ |
||
118 | |||
119 | ``` |
||
120 | dmidecode | grep relevant-lines | md5sum |
||
121 | ``` |
||
122 | on Linux, as a very rough mechanism, or some ROM-embedded unique serial number embedded there by the hardware manufacturer, or some other naturally occurring unique ID like Ethernet MAC address. |
||
123 | |||
124 | This ID will uniquely (we assume) identify one device. The web service will check to see if this device is authorised to access the system, and may do some back-end cross-checks using OTP to some authorised person's mobile phone or some other two-factor authentication. The device may then have to make a second call to submit the second factor for the authentication to complete. Finally, when the web service is satisfied that all is well, it will issue a JWT token to the client. This client will need to be included as part of the fixed header of all subsequent web service requests. All web services which expected authenticated access will first check the validity of the token before processing other parameters. If the token is invalid, the web service will respond with a `authtoken_invalid` error. |
||
125 | |||
126 | **JWT token replacement**: All JWT tokens expire, and it is a good idea to let them refresh, for security reasons. When a web service receives an expired token in its request, it will respond immediately with a special error code indicating `authtoken_expired` without looking at other parameters. What happens next will depend on the application design. |
||
127 | |||
128 | * **Token replacement**: One approach will be to issue a fresh token in lieu of the old one. There will be a special web service whose only job will be to issue a new token. It will take the old token, check all other fields for validity, check that the internal user tables or device masters still permit this client to continue using the services, and then it will create and send back a new token with a fresh expiry date. The client will receive this new token and will use it henceforth for all accesses. To use this approach, the client code will have to be designed to detect `authtoken_expired` errors and automatically make this call for generating a fresh token. |
||
129 | * **Fresh authentication**: For higher security, it may be necessary, specially in user-based applications, to do a full authentication afresh. In this approach, the user will simply be logged out and will be asked to "sign in again". Therefore, whatever was done the first time to authenticate the user or device will now have to be re-done, and manual intervention may be needed at the client end. |
||
130 | |||
131 | |||
132 | 1 | Shuvam Misra | ## API versions |
133 | |||
134 | Any web service (we will refer to it as "service" here) which is exposed to multiple clients (software systems which send web services requests to our service) will, over time, have to serve old clients and new ones. |
||
135 | |||
136 | Our service will grow in features and functionality, and the semantics of some web services may change. For instance, a particular web service may have been released initially with just three parameters in its input, but a fourth parameter was felt necessary after two years of service. Some older clients will still access the web service with three parameters and newer clients will pass four parameters to it. _C'est la vie_. One of the most obvious examples of this is when mobile apps access a web service. Some phones will have older releases of the mobile app and others will have newer releases. This makes it necessary for the web service to serve all generations of clients without breaking any. |
||
137 | |||
138 | 7 | Shuvam Misra | One way to handle this is by adding an "API version number" parameter to each web service. This will be a mandatory parameter from Day 1. Initial versions of clients will all be designed to use **`"ver": 1`** in their requests. When the software on the server-side application is upgraded and the semantics of a web service change, then it will support the old semantics under **`"ver" = 1`** and newer semantics with **`"ver" = 2`**. Newer clients which are aware of the updated semantics will use **`ver=2`** in their requests, with the new semantics. Older clients will not be aware of any changes. |
139 | 1 | Shuvam Misra | |
140 | The version number applies to each web service in isolation. The service as a whole may have versions 1 and 2 supported for some calls, 1, 2 and 3 for other calls, and just 1 for calls which have not changed at all. |
||
141 | |||
142 | 7 | Shuvam Misra | This will go on, and new generations of web services will keep getting released. This will allow a single service to service multiple generations of clients at the same time. |