About this Document...
This document is a sample of how I will document a customer's API. The document includes sections of a fictional API for the company VH Enterprises.
VHE API for HTTP
The VHE API v1 is a set of HTTP endpoints that help your application integreate with VHE.
We suggest that you use one of our officially supported SDKs. However, the raw HTTP documentation is helpful if your preferred programming language is not supported, or if you prefer not to use an SDK.
VHE API v1
The VHE API allows developers to work with files in VHE, including advanced functionality like full-text search, thumbnails, and sharing.
Request and Response Formats
In general, the VHE API uses HTTP POST requests with JSON arguments and JSON responses. Request authentication is done via OAuth 2.0 using the Authorization request header or Authorization URL parameter.
The .tag field in an object identifies the subtype of a struct or selected member of a union.
When specifying a Void
member of a union, you may supply just the member string in place of the entire tagged union object. For example, when supplying a WriteMode
, you can supply just "mode": "add" instead of "mode": {".tag": "add"}}. This shorthand is not allowed for non-Void
members. For example, the following is not allowed for a WriteMode
, as update
is not a Void
member: "mode": "update".
RPC endpoints
These endpoints accept arguments as JSON in the request body and return results as JSON in the response body. RPC endpoints are on the api.vheapi.com
domain.
Content-upload endpoints
These endpoints accept file content in the request body, so their arguments are instead passed as JSON in the VHE-API-Arg
request header or arg
URL parameter. These endpoints are on the content.vheapi.com
domain.
Content-download endpoints
As with content-upload endpoints, arguments are passed in the VHE-API-Arg
request header or arg
URL parameter. The response body contains file content, so the result will appear as JSON in the VHE-API-Result
response header. These endpoints are also on the content.vheapi.com
domain.
These endpoints also support HTTP GET along with ETag
-based caching (If-None-Match
) and HTTP range requests.
Browser-based JavaScript and CORS pre-flight requests
When browser-based JavaScript code makes a cross-site HTTP request, the browser must sometimes send a "pre-flight" check to make sure the server allows cross-site requests. You can avoid the extra round-trip by ensuring your request meets the CORS definition of a "simple cross-site request".
- Use URL parameters
arg
andauthorization
instead of HTTP headersVHE-API-Arg
andAuthorization
. - Set the
Content-Type
to "text/plain; charset=vhe-cors-hack" instead of "application/json" or "application/octet-stream". - Always set the URL parameter
reject_cors_preflight=true
. This makes it easier to catch cases where your code is unintentionally triggering a pre-flight check.
(More general info about the API... )
Authorization
VHE supports OAuth 2.0 for authorizing API requests. Authorized requests to the API should use an Authorization
header with the value Bearer <TOKEN>
, where <TOKEN>
is an access token obtained through the OAuth flow.
NOTE: OAuth is an authorization protocol, NOT an authentication protocol. VHE should not be used as an identity provider.
/oauth2/authorize
- Description
-
This starts the OAuth 2.0 authorization flow. This isn't an API call—it's the web page that lets the user sign in to VHE and authorize your app. After the user decides whether or not to authorize your app, they will be redirected to the URI specified by
redirect_uri
.OAuth 2.0 supports three authorization flows:
- The
code
flow returns a code via theredirect_uri
callback which should then be converted into a bearer token using the/oauth2/token
call. This is the recommended flow for apps that are running on a server. - The
PKCE
flow is an extension of the code flow that uses dynamically generated codes instead of asecret
to perform an OAuth exchange from public clients. The PKCE flow is a newer, more secure alternative to the token (implicit) flow. It is the recommended flow for client-side apps, such as mobile or JavaScript apps. - [Legacy. We recommend the PKCE flow.] -- The
token
or implicit grant flow returns the bearer token via theredirect_uri
callback, rather than requiring your app to make a second call to a server. This is useful for pure client-side apps, such as mobile apps or JavaScript-based apps.
For more information on the
code
andtoken
flows, see Section 1.3 of the OAuth 2 spec. For more info on the PKCE extension, see RFC 7636Your app should send the user to this app authorization page in their system browser, which will display the permissions being granted. If the user isn't already signed in to the VHE website, they will be prompted to do so on this web page. This web page should not be displayed in a web-view. This is in order to maintain compatibilty with the website and to comply with Google's policy against processing their OAuth flow inside a web-view, to support users who sign in to VHE using their Google accounts.
- The
- URL Structure
-
https://www.vhe.com/oauth2/authorize
NOTE: This is the only step that requires an endpoint on
www.vhe.com
. All other API requests are done viaapi.vheapi.com
,content.vheapi.com
, ornotify.vheapi.com
. - Method
- GET
- Example
-
Example: Auth URL for code flow
https://www.vhe.com/oauth2/authorize?client_id=<APP_KEY>&response_type=code
Example: Auth URL for code flow with offline token access type
https://www.vhe.com/oauth2/authorize?client_id=<APP_KEY>&token_access_type=offline&response_type=code
Example: Auth URL for PKCE code flow
https://www.vhe.com/oauth2/authorize?client_id=<APP_KEY>&response_type=code&code_challenge=<CHALLENGE>&code_challenge_method=<METHOD>
- Parameters
-
response_type
String The grant type requested, eithertoken
orcode
.client_id
String The app's key, found in the App Console.redirect_uri
String? Where to redirect the user after authorization has completed. This must be the exact URI registered in the App Console, even 'localhost' must be listed if it is used for testing. All redirect URIs must be HTTPS except for localhost URIs. A redirect URI is required for thetoken
flow, but optional for thecode
flow. If the redirect URI is omitted, thecode
will be presented directly to the user and they will be invited to enter the information in your app.scope
String? This parameter allows your user to authorize a subset of the scopes selected in the App Console. Multiple scopes are separated by a space. If this parameter is omitted, the authorization page will request all scopes selected on the Permissions tab. Read about scopes in the OAuth Guide.token_access_type
String? If this parameter is set tooffline
, then the access token payload returned by a successful/oauth2/token
call will contain a short-livedaccess_token
and a long-livedrefresh_token
that can be used to request a new short-lived access token as long as a user's approval remains valid. If set toonline
then only a short-livedaccess_token
will be returned. If omitted, the response will default to returning a long-livedaccess_token
if they are allowed in the app console. If long-lived access tokens are disabled in the app console, this parameter defaults toonline
state
String? Up to 500 bytes of arbitrary data that will be passed back to your redirect URI. This parameter should be used to protect against cross-site request forgery (CSRF). See Sections 4.4.1.8 and 4.4.2.5 of the OAuth 2.0 threat model spec.code_challenge
String?(min_length=43, max_length=128) Part of the PKCE flow, the challenge should be an SHA-256 (S256
) encoded value of a string that will serve as thecode_verifier
of the corresponding/oauth2/token
call. Can can also be set to plain (plain
).code_challenge_method
String? Defines the code challenge method. Can be set toS256
(recommended) orplain
.require_role
String? If this parameter is specified, the user will be asked to authorize with a particular type of VHE account, eitherwork
for a team account orpersonal
for a personal account. Your app should still verify the type of VHE account after authorization since the user could modify or remove therequire_role
parameter.force_reapprove
Boolean? Whether or not to force the user to approve the app again if they've already done so. Iffalse
(default), a user who has already approved the application may be automatically redirected to the URI specified byredirect_uri
. Iftrue
, the user will not be automatically redirected and will have to approve the app again.disable_signup
Boolean? When true (default is false) users will not be able to sign up for a VHE account via the authorization page. Instead, the authorization page will show a link to the VHE iOS app in the App Store. This is only intended for use when necessary for compliance with App Store policies.locale
String? If the locale specified is a supported language, VHE will direct users to a translated version of the authorization website. Locale tags should be IETF language tags.force_reauthentication
Boolean? Whentrue
(default isfalse
) users will be signed out if they are currently signed in. This will make sure the user is brought to a page where they can create a new account or sign in to another account. This should only be used when there is a definite reason to believe that the user needs to sign in to a new or different account. - Returns
-
Because
/oauth2/authorize
is a website, there is no direct return value. However, after the user authorizes your app, they will be sent to your redirect URI. The type of response varies based on theresponse_type
.Code flow and PKCE flow
These parameters are passed in the query string (after the ? in the URL):
code
String The authorization code, which can be used to attain a bearer token by calling/oauth2/token
.state
String The state content, if any, originally passed to/oauth2/authorize
.Sample response
[REDIRECT_URI]?code=ABCDEFG&state=[STATE]
Token flow
These parameters are passed in the URL fragment (after the # in the URL).
Note: as fragments, these parameters can be modified by the user and must not be trusted server-side. If any of these fields are being used server-side, please use the PKCE flow, or alternatively using the fields returned from
/get_current_account
instead.access_token
String A token which can be used to make calls to the VHE API.token_type
String The type of token, which will always bebearer
.account_id
String A user's account identifier used by API v2.team_id
String A team's identifier used by API v2.uid
String Deprecated. The API v1 user/team identifier. Please useaccount_id
instead.state
String The state content, if any, originally passed to/oauth2/authorize
.Sample response
[REDIRECT_URI]#access_token=ABCDEFG&token_type=bearer&account_id=dbid%3AAAH4f99T0taONIb-OurWxbNQ6ywGRopQngc&uid=12345&state=[STATE]
- Errors
-
In either flow, if an error occurs, including if the user has chosen not to authorize the app, the following parameters will be included in the redirect URI:
error
String An error code per Section 4.1.2.1 of the OAuth 2.0 spec.error_description
String A user-friendly description of the error that occurred.state
String The state content, if any, originally passed to/oauth2/authorize
.
/oauth2/token
- Description
-
This endpoint only applies to apps using the authorization code flow. An app calls this endpoint to acquire a bearer token once the user has authorized the app.
Calls to
/oauth2/token
need to be authenticated using the apps's key and secret. These can either be passed asapplication/x-www-form-urlencoded
POST parameters (see parameters below) or via HTTP basic authentication. If basic authentication is used, the app key should be provided as the username, and the app secret should be provided as the password. - URL Structure
https://api.vheapi.com/oauth2/token
- Method
- POST
- Example
-
Example: access token request in code flow
curl https://api.vhe.com/oauth2/token \ -d code=<AUTHORIZATION_CODE> \ -d grant_type=authorization_code \ -d redirect_uri=<REDIRECT_URI> \ -u <APP_KEY>:<APP_SECRET>
Example: refresh token request
curl https://api.vhe.com/oauth2/token \ -d grant_type=refresh_token \ -d refresh_token=<REFRESH_TOKEN> \ -u <APP_KEY>:<APP_SECRET>
Example: PKCE code flow token request
curl https://api.vhe.com/oauth2/token \ -d code=<AUTHORIZATION_CODE> \ -d grant_type=authorization_code \ -d redirect_uri=<REDIRECT_URI> \ -d code_verifier=<VERIFICATION_CODE> \ -d client_id=<APP_KEY>
- Parameters
-
code
String The code acquired by directing users to/oauth2/authorize?response_type=code
.grant_type
String The grant type, which must beauthorization_code
for completing a code flow orrefresh_token
for using a refresh token to get a new access token.refresh_token
String? A unique, long-lived token that can be used to request new short-lived access tokens without direct interaction from a user in your app.client_id
String? If credentials are passed inPOST
parameters, this parameter should be present and should be the app's key (found in the App Console).client_secret
String? If credentials are passed inPOST
parameters, this parameter should be present and should be the app's secret.redirect_uri
String? The redirect URI used to receive the authorization code from/oauth2/authorize
, if provided. Only used to validate it matches the redirect URI supplied to/oauth2/authorize
for the current authorization code. It is not used to redirect again.code_verifier
String?(min_length=43, max_length=128) The client-generated string used to verify the encryptedcode_challenge
used in the Authorization URL. - Returns
-
A JSON-encoded dictionary including an access token (
access_token
), the length of time it's valid (expires_in
), token type (token_type
), the permission set applied to the token (scope
), an API v2 user ID (account_id
), or if team-linked, an API v2 team ID (team_id
) instead. If thetoken_access_type
was set tooffline
when calling/oauth2/authorize
, then response will include a refresh token (refresh_token
). The API v1 identifier value (uid
) is deprecated and should no longer be used. The token type will always be "bearer".Sample response
Example: short-lived token
{ "access_token": "sl.AbX9y6Fe3AuH5o66-gmJpR032jwAwQPIVVzWXZNkdzcYT02akC2de219dZi6gxYPVnYPrpvISRSf9lxKWJzYLjtMPH-d9fo_0gXex7X37VIvpty4-G8f4-WX45AcEPfRnJJDwzv-", "expires_in": "13220", "token_type": "bearer", "scope": "account_info.read files.content.read files.content.write files.metadata.read", "account_id": "dbid:AAH4f99T0taONIb-OurWxbNQ6ywGRopQngc", "uid": "12345", }
Example: short-lived "offline" access token
{ "access_token": "sl.abcd1234efg", "expires_in": "13220", "token_type": "bearer", "scope": "account_info.read files.content.read files.content.write files.metadata.read", "refresh_token": "AAEVvIKp9ApA9wkdE", "account_id": "dbid:AAH4f99T0taONIb-OurWxbNQ6ywGRopQngc", "uid": "12345", }
Example: legacy token
{ "access_token": "ABCDEFG", "token_type": "bearer", "account_id": "dbid:AAH4f99T0taONIb-OurWxbNQ6ywGRopQngc", "uid": "12345", }
Errors
Errors are returned using standard HTTP error code syntax. Depending on the status code, the response body may be in JSON or plaintext.
Errors by status code
Code | Description |
---|---|
400 | Bad input parameter. The response body is a plaintext message with more information. |
401 | Bad or expired token. This can happen if the access token is expired or if the access token has been revoked by VHE or the user. To fix this, you should re-authenticate the user. The Content-Type of the response is JSON of type AuthError Example: invalid_access_token
{ "error_summary": "invalid_access_token/...", "error": { ".tag": "invalid_access_token" } } Example: invalid_select_user
{ "error_summary": "invalid_select_user/...", "error": { ".tag": "invalid_select_user" } } Example: invalid_select_admin
{ "error_summary": "invalid_select_admin/...", "error": { ".tag": "invalid_select_admin" } } Example: user_suspended
{ "error_summary": "user_suspended/...", "error": { ".tag": "user_suspended" } } Example: expired_access_token
{ "error_summary": "expired_access_token/...", "error": { ".tag": "expired_access_token" } } Example: route_access_denied
{ "error_summary": "route_access_denied/...", "error": { ".tag": "route_access_denied" } } Example: other
{ "error_summary": "other/...", "error": { ".tag": "other" } } AuthError (open union)
Errors occurred during authentication. This datatype comes from an imported namespace originally defined in the auth namespace. The value will be one of the following datatypes. New values may be introduced as our API evolves.invalid_access_token Void The access token is invalid.
invalid_select_user Void The user specified in 'VHE-API-Select-User' is no longer on the team.
invalid_select_admin Void The user specified in 'VHE-API-Select-Admin' is not a VHE Business team admin.
user_suspended Void The user has been suspended.
expired_access_token Void The access token has expired.
missing_scope TokenScopeError The access token does not have the required scope to access the route.TokenScopeError
This datatype comes from an imported namespace originally defined in the auth namespace.required_scope String The required scope to access the route.
route_access_denied Void The route is not available to public.
|
403 | The user or team account doesn't have access to the endpoint or feature. The Content-Type of the response is JSON of type AccessError AccessError (open union)
Error occurred because the account doesn't have permission to access the resource. This datatype comes from an imported namespace originally defined in the auth namespace. The value will be one of the following datatypes. New values may be introduced as our API evolves.invalid_account_type InvalidAccountTypeError Current account type cannot access the resource.InvalidAccountTypeError (open union)
This datatype comes from an imported namespace originally defined in the auth namespace. The value will be one of the following datatypes. New values may be introduced as our API evolves.endpoint Void Current account type doesn't have permission to access this route endpoint.
feature Void Current account type doesn't have permission to access this feature.
paper_access_denied PaperAccessError Current account cannot access Paper.PaperAccessError (open union)
This datatype comes from an imported namespace originally defined in the auth namespace. The value will be one of the following datatypes. New values may be introduced as our API evolves.paper_disabled Void Paper is disabled.
not_paper_user Void The provided user has not used Paper yet.
|
409 | Endpoint-specific error. Look to the JSON response body for the specifics of the error. |
429 | Your app is making too many requests for the given user or team and is being rate limited. Your app should wait for the number of seconds specified in the "Retry-After" response header before trying again. The Content-Type of the response can be JSON or plaintext. If it is JSON, it will be type RateLimitError. RateLimitError
Error occurred because the app is being rate limited. This datatype comes from an imported namespace originally defined in the auth namespace.reason RateLimitReason The reason why the app is being rate limited.RateLimitReason (open union)
This datatype comes from an imported namespace originally defined in the auth namespace. The value will be one of the following datatypes. New values may be introduced as our API evolves.too_many_requests Void You are making too many requests in the past few minutes.
too_many_write_operations Void There are currently too many write operations happening in the user's VHE Application.
retry_after UInt64 The number of seconds that the app should wait before making another request. The default for this field is 1.
|
5xx | An error occurred on the VHE servers. Check status.vhe.com for announcements about VHE service issues. |
Endpoint-specific errors (409)
The following table describes the top-level JSON object attributes present in the body of 409 responses.Key | Description |
---|---|
error | A value that conforms to the error data type schema defined in the definition of each route. |
error_summary | A string that summarizes the value of the "error" key. It is a concatenation of the hierarchy of union tags that make up the error. This provides a human-readable error string, and can also be used for simple programmatic error handling via prefix matching. To disincentivize exact string matching, we append a random number of "." characters at the end of the string. |
user_message | An optional field. If present, it includes a message that can be shown directly to the end user of your app. You should show this message if your app is unprepared to programmatically handle the error returned by an endpoint. |
account
/set_profile_photo
- Version
-
- Description
-
Sets a user's profile photo.
-
This endpoint does not support apps with the app folder permission.
- URL Structure
https://api.vhe.com/2/account/set_profile_photo
- Authentication
- Endpoint format
- RPC
- Required Scope
- account_info.write
- Example
Get access token for:curl -X POST https://api.vheapi.com/2/account/set_profile_photo \ --header "Authorization: Bearer " \ --header "Content-Type: application/json" \ --data "{\"photo\": {\".tag\": \"base64_data\",\"base64_data\": \"SW1hZ2UgZGF0YSBpbiBiYXNlNjQtZW5jb2RlZCBieXRlcy4gTm90IGEgdmFsaWQgZXhhbXBsZS4=\"}}"
- Parameters
{ "photo": { ".tag": "base64_data", "base64_data": "SW1hZ2UgZGF0YSBpbiBiYXNlNjQtZW5jb2RlZCBieXRlcy4gTm90IGEgdmFsaWQgZXhhbXBsZS4=" } }
SetProfilePhotoArgphoto
PhotoSourceArg Image to set as the user's new profile photo.PhotoSourceArg (open union)The value will be one of the following datatypes. New values may be introduced as our API evolves.base64_data
String Image data in base64-encoded bytes.- Returns
{ "profile_photo_url": "https://dl-web.vhe.com/account_photo/get/dbaphid%3AAAHWGmIXV3sUuOmBfTz0wPsiqHUpBWvv3ZA?vers=1556069330102\u0026size=128x128" }
SetProfilePhotoResultprofile_photo_url
String URL for the photo representing the user, if one is set.- Errors
Example: file_type_error{ "error_summary": "file_type_error/...", "error": { ".tag": "file_type_error" } }
Example: file_size_error{ "error_summary": "file_size_error/...", "error": { ".tag": "file_size_error" } }
Example: dimension_error{ "error_summary": "dimension_error/...", "error": { ".tag": "dimension_error" } }
Example: thumbnail_error{ "error_summary": "thumbnail_error/...", "error": { ".tag": "thumbnail_error" } }
Example: transient_error{ "error_summary": "transient_error/...", "error": { ".tag": "transient_error" } }
Example: other{ "error_summary": "other/...", "error": { ".tag": "other" } }
SetProfilePhotoError (open union)The value will be one of the following datatypes. New values may be introduced as our API evolves.file_type_error
Void File cannot be set as profile photo.file_size_error
Void File cannot exceed 10 MB.dimension_error
Void Image must be larger than 128 x 128.thumbnail_error
Void Image could not be thumbnailed.transient_error
Void Temporary infrastructure failure, please retry.
auth
/token/from_oauth1
- Version
-
- Description
-
Creates an OAuth 2.0 access token from the supplied OAuth 1.0 access token.
- URL Structure
https://api.vheapi.com/2/auth/token/from_oauth1
- Authentication
- App Authentication
- Endpoint format
- RPC
- Required Scope
- None
- Example
-
Get app key and secret for:
curl -X POST https://api.vheapi.com/2/auth/token/from_oauth1 \ --header "Authorization: Basic " \ --header "Content-Type: application/json" \ --data "{\"oauth1_token\": \"qievr8hamyg6ndck\",\"oauth1_token_secret\": \"qomoftv0472git7\"}"
- Parameters
-
{ "oauth1_token": "qievr8hamyg6ndck", "oauth1_token_secret": "qomoftv0472git7" }
TokenFromOAuth1Argoauth1_token
String(min_length=1) The supplied OAuth 1.0 access token.oauth1_token_secret
String(min_length=1) The token secret associated with the supplied access token. - Returns
-
{ "oauth2_token": "9mCrkS7BIdAAAAAAAAAAHHS0TsSnpYvKQVtKdBnN5IuzhYOGblSgTcHgBFKFMmFn" }
TokenFromOAuth1Resultoauth2_token
String(min_length=1) The OAuth 2.0 token generated from the supplied OAuth 1.0 token. - Errors
-
Example: invalid_oauth1_token_info
{ "error_summary": "invalid_oauth1_token_info/...", "error": { ".tag": "invalid_oauth1_token_info" } }
Example: app_id_mismatch{ "error_summary": "app_id_mismatch/...", "error": { ".tag": "app_id_mismatch" } }
Example: other{ "error_summary": "other/...", "error": { ".tag": "other" } }
TokenFromOAuth1Error (open union)The value will be one of the following datatypes. New values may be introduced as our API evolves.invalid_oauth1_token_info
Void Part or all of the OAuth 1.0 access token info is invalid.app_id_mismatch
Void The authorized app does not match the app associated with the supplied access token.
/token/revoke
- Version
-
- Description
-
Disables the access token used to authenticate the call.
- URL Structure
https://api.vheapi.com/2/auth/token/revoke
- Authentication
- User Authentication
- Endpoint format
- RPC
- Required Scope
- None
- Example
-
Get access token for:
curl -X POST https://api.vheapi.com/2/auth/token/revoke \ --header "Authorization: Bearer "
- Parameters
-
No parameters.
- Returns
-
No return values.
- Errors
-
No errors.