greptilian logo

IRC log for #rest, 2014-12-11

https://trygvis.io/rest-wiki/

| Channels | #rest index | Today | | Search | Google Search | Plain-Text | plain, newest first | summary

All times shown according to UTC.

Time S Nick Message
01:04 Andre-B joined #rest
01:09 Left_Turn joined #rest
01:15 shrink0r_ joined #rest
02:33 shrink0r joined #rest
03:10 lemur joined #rest
03:11 lemur joined #rest
03:46 shrink0r_ joined #rest
03:51 shrink0r joined #rest
03:51 tr3onlin_ joined #rest
03:53 shrink0r_ joined #rest
04:03 proteusguy joined #rest
04:49 tr3online joined #rest
05:12 PalyaPix joined #rest
05:48 lemur joined #rest
06:11 shrink0r joined #rest
06:12 lemur joined #rest
07:17 DrCode joined #rest
08:00 shrink0r joined #rest
08:06 DrCode joined #rest
08:14 _ollie joined #rest
08:30 lufi joined #rest
08:30 lufi joined #rest
08:32 lufi hi. in designing my api. should i send an error code for each error e.g. "username already exists" or "invalid username characters"? my current method is i set the status to 400 and include a "message" key in the json response that explains the error e.g. "USERNAME_EXISTS".
08:42 trygvis sounds good
08:47 lemur joined #rest
08:50 mezod joined #rest
09:01 lemur joined #rest
09:05 rickardo1 joined #rest
09:07 rickardo1 I need a client software for mac which have the ability to group and organize requests from different endpoints. I did try soapUi but think it's to blurry. Also tried the Advanced Rest Client plugin for Chrome but there is not good options for organizing requests. Any tips?
09:08 lufi trygvis: what do you mean sounds good?
09:14 trygvis lufi: your current way is the way I would do it
09:20 DrCode joined #rest
09:23 lufi the app devs are saying that using 'int' is "faster" than 'strings' .i really think its not that big of a deal dont you think? trygvis
09:28 trygvis I would definitely use strings
09:28 lufi hmm to be easily understood?
09:29 trygvis yep
09:36 lemur joined #rest
09:38 DrCode joined #rest
09:49 shrink0r joined #rest
10:03 proteusguy joined #rest
10:05 marcoslamuria joined #rest
10:08 martinfilliau joined #rest
10:36 proteusguy joined #rest
10:37 Left_Turn joined #rest
10:39 Andre-B joined #rest
10:46 codeisgreat joined #rest
11:04 DrCode joined #rest
11:38 shrink0r joined #rest
11:38 * blongden waves
11:39 blongden Is JSON Home still application/json-home instead of what it should be (application/home+json)?
11:39 blongden Because, :(
11:46 _ollie joined #rest
11:51 shrink0r joined #rest
11:53 shrink0r_ joined #rest
11:56 shrink0r joined #rest
12:00 mezod joined #rest
12:12 ramsey_ joined #rest
12:42 _ollie joined #rest
12:45 pdurbin whartung: by you: http://irclog.greptilian.com/sourcefu/2014-12-11#i_87454 :)
12:52 trygvis I'm a big fan of flyway for sql migrations
13:00 * pdurbin should try it
13:08 shrink0r_ joined #rest
13:10 nkoza joined #rest
13:20 mezod joined #rest
13:21 graste joined #rest
13:30 _ollie joined #rest
13:58 znn joined #rest
14:08 mezod_ joined #rest
14:20 shrink0r joined #rest
14:48 marcoslamuria joined #rest
15:06 Mxyzpltk joined #rest
15:09 marcoslamuria joined #rest
15:42 mezod joined #rest
17:09 shrink0r joined #rest
17:14 shrink0r_ joined #rest
17:29 shrink0r joined #rest
17:32 marcoslamuria joined #rest
17:46 DacFarren joined #rest
17:49 DacFarren Hey... is there any info about secure rest apis?,.. trying to find some info on the groups, without success yet....
17:52 pdurbin DacFarren: use HTTPS
17:56 trygvis DacFarren: yeah, and define 'secure'
18:06 mezod joined #rest
18:08 _ollie joined #rest
18:22 proteusguy joined #rest
18:28 znn joined #rest
18:31 DacFarren Hey sorry the delay , so Im trying to send some sensitive data over a request to a rest api (user/pass, etc) and I need to use some secure way to encrypt and validate that info
18:32 DacFarren I have been reading a lot of HMAC, but i havent find yet a proper document on how to implement this
18:33 DacFarren on the other hand theres lot of documentation on securing rest apis with oauth, but I think the complexity this provides makes it worthless
18:39 trygvis sounds like a case where HTTPS covers it
18:50 sulky joined #rest
18:51 DacFarren thanks trygvis ... in which cases would you consider a good solution signing request
18:51 DacFarren like amazon does
18:56 tr3online joined #rest
18:59 sulky_ joined #rest
19:01 whartung simply put, you have to ask a single question.
19:01 whartung Either you trust HTTPS or you don't. If you do, then it's triviall: HTTP BASIC over HTTPS, and all of the work is punted to the transport layer.
19:01 whartung Otherwise, you get to do all of the work youself.
19:04 graste joined #rest
19:04 DacFarren It could be a risk ... sending all that info over one request, even if we are talking on ssl
19:07 whartung how so?
19:07 whartung what does "all that info" have to do with it?
19:15 gamache HTTPS just works, and if TLS handshakes are not a performance concern, it'd be silly to use anything else.
19:15 gamache The handshaking can take annoyingly long on e.g. mobile, so sometimes a secure strategy over HTTP is needed, and that is what Amazon has.
19:16 whartung I used to be an advocate of the AWS approach, but that only makes sense over HTTP. And even then, it doesn't protect the payload (well it does, from modifcation, but not viewing). But if you have HTTPS, then that all washes away -- just use BASIC.
19:17 gamache the only reason to avoid HTTP Basic Auth is if your API also responds to unencrypted requests -- in this case it is possible for a client to send auth info by accident.  The best approach is to not listen to unencrypted traffic; a compromise approach is to respond to unencrypted API calls with a 426 Upgrade Required status.
19:17 whartung yup I'd be onboard with that.
19:22 DacFarren that is great info, thanks a lot, mostly of the search results points to Oauth, i was struggling to find a more lighter design..
19:29 pdurbin DacFarren: how about API tokens, like GitHub has?
19:30 whartung he said he wantd to encrypt the payload
19:30 pdurbin hmm. ok
19:34 DacFarren well I said that ...
19:35 DacFarren but putting that aside, talking about Api Tokens that is Oauth right?, I believe I will be adding a lot of complexity to the implementation
19:36 DacFarren or maybe not, havent got deeply into the oauth protocol
19:37 whartung just because they have "Api Tokens" doesn't mean it has anything to do with OAuth (It may, I haven't looked at Git, I don't even know what "Api Tokens" empower you to do)
19:37 whartung the nice thing about AWS
19:37 whartung is that they cover, and document, and have code for (at least client side) the gamut of authentication scenarios.
19:37 whartung From simple authentication, to leases, ACL, etc.
19:38 whartung So it's a good One Stop Shopping for those facilities if that's something you need
19:56 pdurbin we're using API tokens because we don't want people to send their actual passwords. the API tokens are more limited in what they let you do. you can't change your password with an API token, for example
20:04 DacFarren joined #rest
20:05 shrink0r joined #rest
20:23 gamache DacFarren: Make sure you are looking at OAuth 2.0, not 1.x.  1.x makes a lot of funny decisions instead of making HTTPS mandatory.  OAuth2 makes HTTPS the only acceptable transport, and simplifies the rest of the protocol quite a lot as a result.
20:26 whartung …and if you're using HTTPS… :)
20:26 whartung OAuth is good if yo uneed to federate and share trust. If not, it's overkill.
20:28 gamache there are other reasons which make it attractive
20:28 whartung such as
20:29 gamache so for instance, I'd like to be able to hit my API server directly from the browser side of our front-end website.
20:30 gamache either I need to invent a system where I exchange username and password for a short-lived access token, or I choose the one that other people invented and spent a lot more time on.
20:30 whartung that's the "federation and share trust" thing I was talking about
20:30 gamache I guess what I mean is that the Oauth 2.0 flows are basically the minimum viable flows to accomplish what they do
20:31 gamache so if you are trying to accomplish one or more of them, might as well not fight it
20:31 gamache that said, I was able to use HTTP Basic for almost two years before we started to really need something better
20:32 shrink0r_ joined #rest
20:38 jackalista joined #rest
20:52 DacFarren joined #rest
21:05 DacFarren we are looking into a api management in the future, often those software use oauth in their implementations, I believe it would be better to have a fast solution like http basic
21:10 DacFarren gamache: Im curious about the complexity Oauth2 adds to the implementations
21:11 DacFarren did you have to put a third party app to achieve sso ?
21:28 gamache DacFarren: we're still implementing.  short answer: A Lot
21:28 gamache but anything but no auth is more complex than Basic Auth.
21:28 marcoslamuria joined #rest
21:43 whartung yea, exactly. BASIC is, well, really basic.
21:43 whartung Ouath is orders of magnitude more complciated
21:44 gamache we're starting out with a very simple authorization backend that our oauth server will hook into.  this authz is based on our existing table of credentials
21:44 whartung But I look at it this way.
21:44 whartung for our stuff
21:44 gamache once that is up and running and we're on oauth in a meaningful way, we're going to get into finer-grained authz
21:44 whartung pre-rest, etc.just web app.
21:45 whartung we started with simple password and HTTP sessions.
21:45 whartung now we have all sorts of different mechanisms that we support, but the underlying code hasn't changed.
21:46 gamache that's our goal as well
21:46 whartung simply put, come up with some mechanism to get your security context set up, and then live off of that. Once you're there, HOW that context is stiood up becomes irrelevant to the code.
21:47 whartung we have passwords against a db, passwords against ldap, SAML SSO, AWS token, SSL Mutual auth, 3rd party trust tokens. We have al ltaht now - and the code taht cares, really, hasn't changed
21:47 saml i see
21:48 whartung we could readily add OAuth if we had too
21:48 whartung we haven't had the need yet though
21:48 whartung a servlet filter is an amazing thing.
22:11 Andre-B joined #rest
22:48 acalbaza joined #rest
22:48 marcoslamuria joined #rest
23:14 shrink0r joined #rest
23:16 shrink0r_ joined #rest

| Channels | #rest index | Today | | Search | Google Search | Plain-Text | plain, newest first | summary

https://trygvis.io/rest-wiki/