-
Notifications
You must be signed in to change notification settings - Fork 2k
Clarify the description of REST vs OCS in accordance to sugestions discussed #12264
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
c8441ab
0b3b355
affa355
33976b1
96fcdc3
9a356e0
8f4c3c1
fda691f
82e612e
67e9eb6
2281f60
65800e5
b0084a7
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
|
@@ -6,7 +6,8 @@ REST APIs | |||||
|
||||||
.. sectionauthor:: Bernhard Posselt <[email protected]> | ||||||
|
||||||
Offering a RESTful API is not different from creating a :doc:`route <../basics/routing>` and :doc:`controllers <../basics/controllers>` for the web interface. It is recommended though to inherit from ApiController and add **@CORS** annotations to the methods so that `web applications will also be able to access the API <https://developer.mozilla.org/en-US/docs/Web/HTTP/Access_control_CORS>`_. | ||||||
Offering a RESTful API is not different from creating a :doc:`route <../basics/routing>` and :doc:`controllers <../basics/controllers>` for the web interface. | ||||||
It is recommended though to inherit from ApiController and add **@CORS** annotations to the methods so that `web applications will also be able to access the API <https://developer.mozilla.org/en-US/docs/Web/HTTP/Access_control_CORS>`_. | ||||||
provokateurin marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
|
||||||
.. code-block:: php | ||||||
|
||||||
|
@@ -44,7 +45,8 @@ CORS also needs a separate URL for the preflighted **OPTIONS** request that can | |||||
) | ||||||
|
||||||
|
||||||
Keep in mind that multiple apps will likely depend on the API interface once it is published and they will move at different speeds to react to changes implemented in the API. Therefore it is recommended to version the API in the URL to not break existing apps when backwards incompatible changes are introduced:: | ||||||
Keep in mind that multiple apps will likely depend on the API interface once it is published and they will move at different speeds to react to changes implemented in the API. | ||||||
Therefore it is recommended to version the API in the URL to not break existing apps when backwards incompatible changes are introduced:: | ||||||
provokateurin marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
|
||||||
/index.php/apps/myapp/api/1.0/resource | ||||||
|
||||||
|
@@ -79,3 +81,147 @@ To add an additional method or header or allow less headers, simply pass additio | |||||
} | ||||||
|
||||||
} | ||||||
|
||||||
.. _ocs-vs-rest: | ||||||
|
||||||
Relation of REST and OCS | ||||||
------------------------ | ||||||
|
||||||
There is a close relationship between REST APIs and :ref:`OCS <ocscontroller>`. | ||||||
Both provide a way to transmit data between the backend of the app in the Nextcloud server and some frontend. | ||||||
This is explicitly not about :ref:`HTML template responses <controller_html_responses>`. | ||||||
|
||||||
State-of-the-Art methods and comparison | ||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||||||
|
||||||
The following combinations of attributes might be relevant for various scenarios: | ||||||
|
||||||
#. Plain frontend route: ``Controller`` class | ||||||
#. OCS route: ``OCSController`` class | ||||||
#. OCS route with CORS enabled: ``OCSController`` class and ``#[CORS]`` attribute on the method | ||||||
|
||||||
.. warning:: | ||||||
Adding the ``#[NoCRSFRequired]`` attribute imposes a security risk. | ||||||
You should not add this to your controller methods unless you understand the implications and be sure that you absolutely need the attribute. | ||||||
Typically, you can instead use the ``OCS-APIRequest`` header for data requests, instead. | ||||||
|
||||||
.. warning:: | ||||||
Adding the attribute ``#[CORS]`` alone is not sufficient to allow access using CORS with plain frontend routes. | ||||||
Without further measures, the CSRF checker would fail. | ||||||
So, enabling CORS for plain controllers is generally and highly discouraged. | ||||||
|
||||||
You would have to disable the CSRF checker (one more security risk) or use the ``OCP-APIRequest`` header to successfully pass the checker. | ||||||
The latter requires dedicated JS code on the importing page. | ||||||
|
||||||
There are different ways a clients might interact with your APIs. | ||||||
These ways depend on your API configuration (what you allow) and on which route the request is finally made. | ||||||
|
||||||
- *Access from web frontend* means the user is browses the Nextcloud web frontend with a browser. | ||||||
- *Access from an external app* indicates that the user is not using the normal browser (as logged in) but directly navigates a certain URL directly. | ||||||
This is typically an external program (like an Android app or simply a curl command line). | ||||||
- *Access from external website* means that the user browses some third party web site and data from your Nextcloud server appears. | ||||||
The other website has to embed/load/use images, JSON data, or other resources from a URL pointing to the Nextcloud server, to be able to do this. | ||||||
|
||||||
.. hint:: | ||||||
The discussion here is for data requests only. | ||||||
If you think of controller :ref:`methods serving (HTML) templates <controller_html_responses>`, disabling CSRF is considered fine. | ||||||
|
||||||
.. list-table:: Comparison of different API types | ||||||
:header-rows: 1 | ||||||
:align: center | ||||||
|
||||||
* - Description | ||||||
- ``Controller`` class | ||||||
- ``OCSController`` class | ||||||
- ``OCSController`` class & ``CORS`` on method | ||||||
* - URL prefix (relative to server) | ||||||
- ``/apps/<appid>/`` | ||||||
- ``/ocs/v2.php/apps/<appid>/`` | ||||||
- ``/ocs/v2.php/apps/<appid>/`` | ||||||
* - Access from web frontend | ||||||
- yes | ||||||
- yes | ||||||
- yes | ||||||
* - Access from external app | ||||||
- partial [#]_ | ||||||
- yes | ||||||
- yes | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
OCS is still protected against CSRF attacks using the OCS-APIRequest header or a CSRF token. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Isn't this line disabling the csrf checks for OCS when done with a bearer token? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Not really, it also checks that the custom header is set (https://github.com/nextcloud/server/blob/94c529409813e03d632662283a5cd302ef8e9781/lib/private/AppFramework/Middleware/Security/SecurityMiddleware.php#L235) which is a CSRF check. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think, we are arguing from different viewing angles here. Yes, the custom header is some way to enforce CSRF protection. Either a token or the custom header is a way to prevent access to the endpoint. However, when thinking of external (native) apps, this would allow to access the endpoint just by sending the header without knowing the actual token. PS: Having reread the last comment, I see the point in splitting direct access in browser (which you would not do on OCS directly) from the native app approach. |
||||||
* - Access from external website | ||||||
- --- | ||||||
- --- | ||||||
- yes | ||||||
* - Encapsulated data | ||||||
- no | ||||||
- yes (JSON or XML) | ||||||
- yes (JSON or XML) | ||||||
|
||||||
.. [#] The external app has to satisfy the CSRF checks. | ||||||
That is, you need to have the ``OCS-APIRequest`` HTTP request header set to ``true``. | ||||||
This is only possible for NC 30 onwards, older versions do not respect the header. | ||||||
|
||||||
Methods from ``Controller`` classes can return ``DataResponse`` objects similar to ``OCSController`` class methods. | ||||||
For methods of a ``Controller`` class, the data of this response is sent e.g. as JSON as you provide it. | ||||||
Basically, the output is very similar to what ``json_encode`` would do. | ||||||
In contrast, the OCS controller will encapsulate the data in an outer shell that provides some more (meta) information. | ||||||
For example a status code (similar to the HTTP status code) is transmitted at top level. | ||||||
The actual data is transmitted in the ``data`` property. | ||||||
|
||||||
As a rule of thumb one can conclude that OCS provides a good way to handle most use cases including sufficient security checks. | ||||||
The only exception to this is if you want to provide an API for external usage where you have to comply with an externally defined API scheme. | ||||||
Here, the encapsulation introduced in OCS and CSRF checks might be in your way. | ||||||
|
||||||
|
||||||
Historical options | ||||||
~~~~~~~~~~~~~~~~~~ | ||||||
|
||||||
.. deprecated:: 30 | ||||||
The information in this section are mainly for reference purposes. Do not use the approaches in new code. | ||||||
|
||||||
Before NC server 30 the plain ``Controller`` classes' methods did not respect the ``OCS-APIRequest`` header. | ||||||
Thus, to provide access to this type of controller methods for external apps, it was necessary to use the ``#[NoCSRFRequired]`` attribute (or the corresponding ``@NoCSRFRequired`` annotation). | ||||||
|
||||||
The following combinations of attributes were relevant for various scenarios: | ||||||
|
||||||
#. Plain frontend route: ``Controller`` class | ||||||
#. Plain frontend with CRSF checks disabled: ``Controller`` class and ``#[NoCSRFRequired]`` attribute on the method | ||||||
#. Plain frontend route with CORS enabled: ``Controller`` class and ``#[CORS]`` and ``#[NoCSRFRequired]`` attributes on the route | ||||||
#. OCS route: ``OCSController`` class | ||||||
#. OCS route with CORS enabled: ``OCSController`` class and ``#[CORS]`` attribute on the method | ||||||
|
||||||
.. hint:: | ||||||
The two scenarios involving the ``OCSController`` have not changed and, thus, the state-of-the-art documentation as noted above still holds true. | ||||||
Thus, these options are not reconsidered here again for simplicity reasons and to get the overall view more crisp. | ||||||
|
||||||
The warnings about not using ``NoCSRFRequired`` and ``CORS`` as mentioned in the state-of-the-art section holds true here as well. | ||||||
|
||||||
.. list-table:: Comparison of different API types | ||||||
:header-rows: 1 | ||||||
:align: center | ||||||
|
||||||
* - | Description | ||||||
- | ``Controller`` class | ||||||
- | ``Controller`` class with | ||||||
| ``NoCSRFRequired`` on method | ||||||
- | ``Controller`` class with | ||||||
| ``NoCSRFRequired`` and ``CORS`` | ||||||
| on method | ||||||
* - URL prefix (relative to server) | ||||||
- ``/apps/<appid>/`` | ||||||
- ``/apps/<appid>/`` | ||||||
- ``/apps/<appid>/`` | ||||||
* - Access from web frontend | ||||||
- yes | ||||||
- yes (CSRF risk) | ||||||
- yes (CSRF risk) | ||||||
* - Access from external app | ||||||
- --- | ||||||
- yes | ||||||
- yes | ||||||
* - Access from external website | ||||||
- --- | ||||||
- --- | ||||||
- yes | ||||||
* - Encapsulated data | ||||||
- no | ||||||
- no | ||||||
- no |
Uh oh!
There was an error while loading. Please reload this page.