this post was submitted on 30 Aug 2024
130 points (99.2% liked)

Programming

17666 readers
58 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities [email protected]



founded 2 years ago
MODERATORS
 

I prefer simplicity and using the first example but I'd be happy to hear other options. Here's a few examples:

HTTP/1.1 403 POST /endpoint
{ "message": "Unauthorized access" }
HTTP/1.1 403 POST /endpoint
Unauthorized access (no json)
HTTP/1.1 403 POST /endpoint
{ "error": "Unauthorized access" }
HTTP/1.1 403 POST /endpoint
{
  "code": "UNAUTHORIZED",
  "message": "Unauthorized access",
}
HTTP/1.1 200 (🤡) POST /endpoint
{
  "error": true,
  "message": "Unauthorized access",
}
HTTP/1.1 403 POST /endpoint
{
  "status": 403,
  "code": "UNAUTHORIZED",
  "message": "Unauthorized access",
}

Or your own example.

(page 2) 40 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 3 months ago

The last one is very convenient. As an API consumer you can get all the necessary info from the returned payload, and the 403 will trigger the error path.

[–] [email protected] 7 points 3 months ago* (last edited 3 months ago)

1 or 4 but wrapped in a top level error object. It’s usually best to not use the top level namespace because then you can’t add meta details about the request easily later without changing the original response schema.

Codes are great but I’m usually too lazy to introduce them right away, so I instead have message (which is guaranteed to come back) and context, which is any JSON object and doesn’t adhere to a guaranteed structure. Another poster pointed out that code is way easier for localization since you are probably not localizing your message.

The HTTP status code is generally sufficient to describe what happened without having to catalogue every error with a unique “code”. A context blob is useful for dumping validation errors or any other details about the error that a human could at least rely on for help.

Putting the status code on the body seems helpful but is actually useless, since the only place you can assume it’s always provided is on the response itself and not the body.

[–] [email protected] 2 points 3 months ago* (last edited 3 months ago)

I like the last one, I think having the status code in the body could help clarify where the error is coming from when traversing a reverse proxy.

[–] [email protected] 8 points 3 months ago (1 children)

just 403 and leave the body empty

load more comments (1 replies)
[–] [email protected] 5 points 3 months ago

I like the fourth or the last one since it encourages all other error responses to follow a similar standard. That will allow the client to have a reusable error model and error checking.

I've had to use APIs where every response was 200 ok with json, 400 bad request with pain text that said unauthorized, or a 500 error that returned an HTML error page. The worst.

[–] [email protected] 2 points 3 months ago (2 children)

There are competing interests here: normal consumers and script kiddies. If I build an API that follows good design, RFCs, pretty specs, all of that, my normal users have a very good time. Since script kiddies brute force off examples from those areas, so do they. If I return 200s for everything without a response body unless authenticated and doing something legit, I can defeat a huge majority of script kiddies (really leaving denial of service). When I worked in video games and healthcare, this was a very good idea to do because an educated API consumer and a sufficiently advanced attacker both have no trouble while the very small amount of gate keeping locks out a ton of annoying traffic. Outside of these high traffic domains, normal design is usually fine unless you catch someone’s attention.

load more comments (2 replies)
[–] [email protected] 67 points 3 months ago (5 children)

Giving back a 200 for an error always makes me bristle. Return correct codes people. “But the request to the web server was successful!”

[–] [email protected] 1 points 3 months ago

It's usually such an easy thing to do as well, in all the web frameworks I've used it's literally a case of changing Ok to Forbidden, 200 to 403 or something very similar

[–] [email protected] 16 points 3 months ago (1 children)

I use this big expensive simulator called Questa, and if there's an error during the simulation it prints Errors: 1, Warnings: 0 and then exits with EXIT_SUCCESS (0)! I tried to convince them that this is wrong but they're like "but it successfully simulated the error". 🤦🏻‍♂️

We end up parsing the output which is very dumb but also seems to be industry standard in the silicon industry unfortunately (hardware people are not very good at software engineering).

[–] [email protected] 11 points 3 months ago* (last edited 3 months ago) (1 children)

That's when you use different exit codes. 1 for failure during simulation, 2 for simulation failed.

Shame they wouldn't listen.

load more comments (1 replies)
load more comments (3 replies)
[–] [email protected] 95 points 3 months ago (3 children)

Respect the Accept header from the client. If they need JSON, send JSON, otherwise don't.

Repeating an HTTP status code in the body is redundant and error prone. Never do it.

Error codes are great. Ensure to prefix yours and keep them unique.

Error messages can be helpful, but often lead developers to just display them in the frontend, breaking i18n. Some people supply error messages in multiple languages, depending on the Accept-Language header.

[–] [email protected] 5 points 3 months ago (2 children)

To be fair if it's an exceptional error message (i.e. database timeout; not incorrect password) I don't think i18n matters that much. Most people will just be googling the error message anyway, and if not it should be rare enough that using Google translate isn't an issue.

load more comments (2 replies)
[–] [email protected] 32 points 3 months ago

This guy backends ☝️

load more comments (1 replies)
[–] [email protected] 6 points 3 months ago (1 children)

Message straight on the body is the worst possible response for an error here, it is bad design to straight up show the error from the back end to the user, usually it needs translation and/or adaptation due to message size on the front-end to show properly, and applying those on top of a message will make it stop working as soon as anyone in the backend decide to change a dot or comma anywhere. It is a bad idea to let the backend make direct impact in the front when you can because backend devs won't even know what impact they are causing until later in testing and it will be harder to trace back and fix.

IMO you need at least a json with code and message, the front will ignore the message for everything but testing and use the code to match a translation file that will get the proper message, making it easy to translate and change as needed without having to rebuild the whole backend along with front changes. You may also have an extra parameter there in some cases when you want to return where more specifically the error occurred or an array of errors. Status usually not needed as you can get those from the http code itself.

[–] [email protected] 1 points 3 months ago (1 children)

I've mistyped, I meant message in JSON body :)

[–] [email protected] 2 points 3 months ago

I see, but the first example option having no code still makes it harder to translate and show the user, so my vote is for the option with a code and message in the json.

[–] [email protected] 13 points 3 months ago

My favourite is when every error is an HTTP Bad Request with no body. Absolutely wonderful to use those APIs

[–] [email protected] 13 points 3 months ago (2 children)

I don't have a response to share but I always lose my mind when I see AWS error messages, especially when using bazillion layers like CDK for Terraform, executed from the shell script that runs a python script in the CI/CD pipeline.

One of the issues I will never forget was the debugging of permission issue. Dev reported an issue, something like "cannot access the SQS queue from a recently deployed script". The error message was like "cannot access the queue due to missing policy in assumed role" (or something similar). So, I have checked the python script and related policies - all good. Next I've moved to a shell script, still no luck. After that I went through the CDK files, no issues. I was about to involve the AWS support when it turned out that the queue name has been changed manually in the AWS console. AWS, instead of point out that the queue is missing, raised an error about missing access permissions...

[–] [email protected] 1 points 3 months ago

Ugh, poor error reporting is such a frustrating time sink.

[–] [email protected] 1 points 3 months ago

It usually goes down like this on some security heavy system: It does not know that a queue is missing. It does however know that it cannot access that queue. When an error is thrown on a secure system, usually the first thing to check is the privilege. If the queue does not exist, so does the privilege to access said queue hence the first error being thrown.

[–] [email protected] -4 points 3 months ago (1 children)

The clown, but flipped with a success field. If it is true then command succeeded, if it false something was wrong and there should be an error field as well.

HTTP codes should be used for the actual transport, not shoe-horned to fit the data. I know not everyone will agree with this, but we don't have to.

[–] [email protected] 1 points 3 months ago (1 children)

The transport is usually TCP/IP tho. But nowadays QUIC is trying to make it UDP. HTTP is specifically an Application Layer Protocol from OSI model

load more comments (1 replies)
[–] [email protected] 3 points 3 months ago

I really like the fifth one. So you might always get a surprise message in your response

[–] [email protected] 22 points 3 months ago (1 children)

I think the general rule of thumb is: Keep it Simple, Stupid.

Don’t include fields “just in case”. If you don’t have a use for a field right now, then don’t include it. It’s often easier to add fields than removing.

Avoid having fields that can be derived from other fields. Code “UNAUTHORIZED” can be derived from 403. Having both adds confusion. It adds the question whether the code field be something other than “UNAUTHORIZED” when the response is 403.

Just 403 with empty body is fine. Add message in a JSON in case it’s useful for the user. If the user needs more fields in the future, then it’s easy to expand the JSON.

[–] [email protected] 15 points 3 months ago (3 children)

403 is a category, not a code. Yes I know they're called http codes but REST calls are more complex than they were in 2001. There are hundreds of reasons you might not be authorized.

Is it insufficient permissions? Authentication required? Blocked by security? Too many users concurrently active?

I'd argue the minimum for modern services is:

403 category
Code for front end error displays
Message as default front end code interpretation

As json usually but if you're all using protobuf, go off King.

[–] [email protected] -2 points 3 months ago* (last edited 3 months ago) (4 children)

REST calls are same as in 2001. There is no REST 2.0 or REST 2024. Because REST is architecture guideline. It’s just more data sent over it today. HTTP code IS code. Why your system issued it is implementation detail and have nothing to do with resource representation. Examples you provided are not 403. “Too many users active” does not exist in REST because REST is stateless, closest you can get is “too many requests” - 429. Insufficient permissions is 401. I don’t even know what is “blocked by security” but sounds like 401 too. Regardless, you should not provide any details on 401 or 403 to client as it is security concern. No serious app will tell you “password is wrong” or “user does not exist”. Maximum what client should hope for is input validation errors in 400.

For those with “internal tool, I don’t care” argument - you either do not know what security in depth is or you don’t have 403 or 401 scenario in the system in the first place.

Now hear me out, you all can do whatever you want or need with your API. Have state, respond with images instead of error codes, whatever, but calling it REST is wrong by definition

load more comments (4 replies)
[–] [email protected] 0 points 3 months ago (1 children)

I've never heard of using protobuf in an HTTP API... But, I guess that should be fine.

[–] [email protected] 1 points 3 months ago

The thing is, it does exists a way to convert grpc protobuf to json one

load more comments (1 replies)
[–] [email protected] 12 points 3 months ago (1 children)

since none of your examples add anything of value in the body: a plain old 403 is enough.

response bodies for 400 responses are more interesting, since you can often tell why a request was bad and the client can use that information to communicate to the user what went wrong.

best error code remains 418, though.

[–] [email protected] 3 points 3 months ago (1 children)

I was annoyed that the one time I wanted to use 418 as a filler Dotnets http library didn't support returning it.

[–] [email protected] 1 points 3 months ago

Well it's not an HTTP status code; it's an HTCPCP status code.

[–] [email protected] 5 points 3 months ago* (last edited 3 months ago) (1 children)

GitHub has OpenAPI specification. Latest version is 3.1, I think.

[–] [email protected] 3 points 3 months ago

Looks like they're recommending object of error code (number) and message.

[–] [email protected] 11 points 3 months ago (1 children)

When consuming APIs you often want JSON in successful scenario. Which means, if you also have JSON in unsuccessful scenario it's a bit more uniform, because you don't have to deal with JSON in one case and plaintext response in other. Also, it sometimes can be useful to have additional details there like server's stacktrace or some identifiers that help troubleshoot complex issues.

[–] [email protected] 6 points 3 months ago (1 children)

Probably not great to return server stack traces. Otherwise, yeah

[–] [email protected] 1 points 3 months ago

It's ok for internal admin panels and their backends as there are no security concerns in this case.

[–] [email protected] 27 points 3 months ago (4 children)
[–] [email protected] 2 points 3 months ago

Don't know what are the changes since 7807 (which this one obsoletes) but this article helped me quickly understand the first one, hopefully it's still somewhat relevant.
https://lakitna.medium.com/understanding-problem-json-adf68e5cf1f8

[–] [email protected] 4 points 3 months ago

This is the right answer imo. While it might be an overkill for sth like 404s, it's amazing for describing different bad requests.

[–] [email protected] 4 points 3 months ago

This one looks nice. Very detailed.

load more comments (1 replies)
load more comments
view more: ‹ prev next ›