3
0
mirror of https://github.com/ergochat/ergo.git synced 2025-04-05 15:28:06 +02:00
ergo/docs/API.md
Shivaram Lingamneni ea81ec86e1
MVP for HTTP API (#2231)
Co-authored-by: Klaas Tammling <klaas@tammling.hamburg>
2025-03-18 23:13:03 -04:00

4.0 KiB
Raw Permalink Blame History

     __ __  ______ ___  ______ ___ 
  __/ // /_/ ____/ __ \/ ____/ __ \
 /_  // __/ __/ / /_/ / / __/ / / /
/_  // __/ /___/ _, _/ /_/ / /_/ / 
 /_//_/ /_____/_/ |_|\____/\____/  

    Ergo IRCd API Documentation
        https://ergo.chat/

Copyright © Daniel Oaks daniel@danieloaks.net, Shivaram Lingamneni slingamn@cs.stanford.edu


Ergo has an experimental HTTP API. Some general information about the API:

  1. All requests to the API are via POST.
  2. All requests to the API are authenticated via bearer authentication. This is a header named Authorization with the value Bearer <token>. A list of valid tokens is hardcoded in the Ergo config. Future versions of Ergo may allow additional validation schemes for tokens.
  3. The request parameters are sent as JSON in the POST body.
  4. Any status code other than 200 is an error response; the response body is undefined in this case (likely human-readable text for debugging).
  5. A 200 status code indicates successful execution of the request. The response body will be JSON and may indicate application-level success or failure (typically via the success field, which takes a boolean value).

API endpoints are versioned (currently all endpoints have a /v1/ path prefix). Backwards-incompatible updates will most likely take the form of endpoints with new names, or an increased version prefix. Any exceptions to this will be specifically documented in the changelog.

All API endpoints should be considered highly privileged. Bearer tokens should be kept secret. Access to the API should be either over a trusted link (like loopback) or secured via verified TLS. See the api section of default.yaml for examples of how to configure this.

Heres an example of how to test an API configured to run over loopback TCP in plaintext:

curl -d '{"accountName": "invalidaccountname", "passphrase": "invalidpassphrase"}' -H 'Authorization: Bearer EYBbXVilnumTtfn4A9HE8_TiKLGWEGylre7FG6gEww0' -v http://127.0.0.1:8089/v1/check_auth

This returns:

{"success":false}

Endpoints

/v1/account_details

This endpoint fetches account details and returns them as JSON. The request is a JSON object with fields:

  • accountName: string, name of the account

The response is a JSON object with fields:

  • success: whether the account exists or not
  • accountName: canonical, case-unfolded version of the account name
  • email: email address of the account provided

/v1/check_auth

This endpoint verifies the credentials of a NickServ account; this allows Ergo to be used as the source of truth for authentication by another system. The request is a JSON object with fields:

  • accountName: string, name of the account
  • passphrase: string, alleged passphrase of the account

The response is a JSON object with fields:

  • success: whether the credentials provided were valid
  • accountName: canonical, case-unfolded version of the account name

/v1/rehash

This endpoint rehashes the server (i.e. reloads the configuration file, TLS certificates, and other associated data). The body is ignored. The response is a JSON object with fields:

  • success: boolean, indicates whether the rehash was successful
  • error: string, optional, human-readable description of the failure

/v1/saregister

This endpoint registers an account in NickServ, with the same semantics as NS SAREGISTER. The request is a JSON object with fields:

  • accountName: string, name of the account
  • passphrase: string, passphrase of the account

The response is a JSON object with fields:

  • success: whether the account creation succeeded
  • errorCode: string, optional, machine-readable description of the error. Possible values include: ACCOUNT_EXISTS, INVALID_PASSPHRASE, UNKNOWN_ERROR.
  • error: string, optional, human-readable description of the failure.