REST API
Last updated
Last updated
Both Gravity Web and Gravity Native communicate with Gravity Server using a REST API.
The API files are located in the /api
folder.
The structure of these files is simple; there is a list of endpoints that connect directly to the relevant controller method.
Each controller call is wrapped in a HOC (higher-order component) called use
. This is a middleware function that catches any errors in the controller methods and then passes these to a global error handler – this prevents you from having to use try...catch
in your application.
You can protect any API route and make it accessible to only a specific user level or API key scope using the auth.verify
middleware method. You simply pass the user permission as the first argument, and an optional API scope as the second.
Learn more about API scopes and find out more about how authentication works in the next section.
You can access the API using one of two methods:
Using a Bearer token issued during the authentication flow
Using an API key
Bearer tokens are JWTs that are used to authenticate the user. You can use a Bearer token with the API by passing it in the Authorization
header.
API keys can be created by either an owner or developer permission and can be used to access any endpoint that has an API scope (see Protected Routes above).
API keys are stored in the database in plain text to remove the decryption overhead on each API call, and so the user can retrieve an API key if they lose it. For most applications this is acceptable, if your database is breached and the API keys are stolen, an attacker already has access to all of your data, so encryption provides minimal protection in this scenario.
The following example demonstrates how to make an API request in Javascript with the Axios package and Basic authentication.
Input validation is handled with JOI, which has been wrapped in a HOF to support locales.
API requests are globally rate-limited as defined by the throttle
settings in config. The following end points have their own lower rate limits for security purposes:
POST /api/account
POST /api/user
POST /api/user/auth
POST /api/user/password/reset/request
POST /api/user/password/reset
Every API request is logged in the log
table by default. You can toggle this on or off using the ENABLE_API_LOGS
environment variable.
There is a swagger file included in api/spec.yaml
with documentation and examples for each endpoint using the OpenAPI 3.0 spec. You can import this into Postman for easy testing.