Logins and passwords are for humans. Communication between applications need to be protected through different means.
ApiAuth is a Ruby gem designed to be used both in your client and server HTTP-based applications. It implements the same authentication methods (HMAC-SHA2) used by Amazon Web Services.
The gem will sign your requests on the client side and authenticate that signature on the server side. If your server resources are implemented as a Rails ActiveResource, it will integrate with that. It will even generate the secret keys necessary for your clients to sign their requests.
Since it operates entirely using HTTP headers, the server component does not have to be written in the same language as the clients.
- A canonical string is first created using your HTTP headers containing the
content-type
,X-Authorization-Content-SHA256
, request path and the date/time stamp. Ifcontent-type
orX-Authorization-Content-SHA256
are not present, then a blank string is used in their place. If the timestamp isn't present, a valid HTTP date is automatically added to the request. The canonical string is computed as follows:
canonical_string = "#{http method},#{content-type},#{X-Authorization-Content-SHA256},#{request URI},#{timestamp}"
Note: As of v3.0 the "request URI" component above is just the path (query parameters are excluded) so signatures remain stable even when intermediaries rewrite a query string.
e.g.,
canonical_string = 'POST,application/json,,request_path,Tue, 30 May 2017 03:51:43 GMT'
-
This string is then used to create the signature which is a Base64 encoded SHA1 HMAC, using the client's private secret key.
-
This signature is then added as the
Authorization
HTTP header in the form:
Authorization = APIAuth "#{client access id}:#{signature from step 2}"
A cURL request would look like:
curl -X POST --header 'Content-Type: application/json' --header "Date: Tue, 30 May 2017 03:51:43 GMT" --header "Authorization: ${AUTHORIZATION}" https://my-app.com/request_path`
- On the server side, the SHA2 HMAC is computed in the same way using the request headers and the client's secret key, which is known to only the client and the server but can be looked up on the server using the client's access id that was attached in the header. The access id can be any integer or string that uniquely identifies the client. The signed request expires after 15 minutes in order to avoid replay attacks.
Versions prior to 3.0 included the query string inside the canonical request URI. If you have to roll out the 3.0 change gradually across multiple services, you can temporarily enable support for legacy signatures on the server side:
ApiAuth.legacy_query_params_compatibility = true
With the flag disabled (the default) only the path segment is considered part of the canonical string.
- Ruby >= 3.2 (for version 3.0+)
- Ruby >= 2.6 (for version 2.x)
- Rails >= 7.2 if using Rails (for version 3.0+)
- Rails >= 6.0 if using Rails (for version 2.x)
The gem doesn't have any dependencies outside of having a working OpenSSL configuration for your Ruby VM. To install:
[sudo] gem install api-auth
Please note the dash in the name versus the underscore.
ApiAuth supports many popular HTTP clients. Support for other clients can be added as a request driver.
- Net::HTTP - Ruby's standard library HTTP client
- ActionController::Request / ActionDispatch::Request - Rails request objects
- Curb (Curl::Easy) - Ruby libcurl bindings
- RestClient - Popular REST client for Ruby
- Faraday - Modular HTTP client library (with middleware support)
- HTTPI - Common interface for Ruby HTTP clients
- HTTP (http.rb) - Fast Ruby HTTP client with a chainable API
- Excon - Pure Ruby HTTP client for API interactions (with middleware support)
- Typhoeus - Libcurl-powered client supporting hydra batching and streaming
- Grape - REST-like API framework for Ruby (via Rack)
- Rack::Request - Generic Rack request objects
Here's a sample implementation of signing a request created with RestClient.
Assuming you have a client access id and secret as follows:
@access_id = "1044"
@secret_key = ApiAuth.generate_secret_key
A typical RestClient PUT request may look like:
headers = { 'X-Authorization-Content-SHA256' => "dWiCWEMZWMxeKM8W8Yuh/TbI29Hw5xUSXZWXEJv63+Y=",
'Content-Type' => "text/plain",
'Date' => "Mon, 23 Jan 1984 03:29:56 GMT"
}
@request = RestClient::Request.new(
url: "/resource.xml?foo=bar&bar=foo",
headers: headers,
method: :put
)
To sign that request, simply call the sign!
method as follows:
@signed_request = ApiAuth.sign!(@request, @access_id, @secret_key)
The proper Authorization
request header has now been added to that request
object and it's ready to be transmitted. It's recommended that you sign the
request as one of the last steps in building the request to ensure the headers
don't change after the signing process which would cause the authentication
check to fail on the server side.
If you are signing a request for a driver that doesn't support automatic http method detection (like Curb or httpi), you can pass the http method as an option into the sign! method like so:
@signed_request = ApiAuth.sign!(@request, @access_id, @secret_key, :override_http_method => "PUT")
If you want to use another digest existing in OpenSSL::Digest
,
you can pass the http method as an option into the sign! method like so:
@signed_request = ApiAuth.sign!(@request, @access_id, @secret_key, :digest => 'sha256')
With the digest
option, the Authorization
header will be change from:
Authorization = APIAuth 'client access id':'signature'
to:
Authorization = APIAuth-HMAC-DIGEST_NAME 'client access id':'signature'
For Ruby's standard Net::HTTP library:
require 'net/http'
require 'api_auth'
uri = URI('https://api.example.com/resource')
request = Net::HTTP::Post.new(uri.path)
request.content_type = 'application/json'
request.body = '{"key": "value"}'
# Sign the request
signed_request = ApiAuth.sign!(request, @access_id, @secret_key)
# Send the request
response = Net::HTTP.start(uri.hostname, uri.port, use_ssl: true) do |http|
http.request(signed_request)
end
For requests using the Curb library:
require 'curb'
require 'api_auth'
request = Curl::Easy.new('https://api.example.com/resource')
request.headers['Content-Type'] = 'application/json'
request.post_body = '{"key": "value"}'
# Sign the request (note: specify the HTTP method for Curb)
ApiAuth.sign!(request, @access_id, @secret_key, override_http_method: 'POST')
# Perform the request
request.perform
For the HTTP.rb library:
require 'http'
require 'api_auth'
request = HTTP.headers('Content-Type' => 'application/json')
.post('https://api.example.com/resource',
body: '{"key": "value"}')
# Sign the request
signed_request = ApiAuth.sign!(request, @access_id, @secret_key)
# The request is automatically executed when you call response methods
response = signed_request.to_s
For HTTPI requests:
require 'httpi'
require 'api_auth'
request = HTTPI::Request.new('https://api.example.com/resource')
request.headers['Content-Type'] = 'application/json'
request.body = '{"key": "value"}'
# Sign the request
ApiAuth.sign!(request, @access_id, @secret_key, override_http_method: 'POST')
# Perform the request
response = HTTPI.post(request)
ApiAuth provides a middleware for adding authentication to a Faraday connection:
require 'faraday'
require 'faraday/api_auth'
# Using middleware (recommended)
connection = Faraday.new(url: 'https://api.example.com') do |faraday|
faraday.request :json
faraday.request :api_auth, @access_id, @secret_key # Add ApiAuth middleware
faraday.response :json
faraday.adapter Faraday.default_adapter
end
# The middleware will automatically sign all requests
response = connection.post('/resource', { key: 'value' })
# Or manually sign a request
request = Faraday::Request.create(:post) do |req|
req.url 'https://api.example.com/resource'
req.headers['Content-Type'] = 'application/json'
req.body = '{"key": "value"}'
end
signed_request = ApiAuth.sign!(request, @access_id, @secret_key)
The order of middlewares is important. You should make sure api_auth is added after any middleware that modifies the request body or content-type header.
Excon can be used with ApiAuth in two ways - with middleware or by manually signing requests.
Using Excon middleware (recommended):
require 'excon'
require 'excon/api_auth' # or require 'api_auth/middleware/excon'
# Configure Excon with ApiAuth credentials
Excon.defaults[:api_auth_access_id] = @access_id
Excon.defaults[:api_auth_secret_key] = @secret_key
Excon.defaults[:middlewares] << ApiAuth::Middleware::Excon
# All requests will be automatically signed
connection = Excon.new('https://api.example.com')
response = connection.post(
path: '/resource',
headers: { 'Content-Type' => 'application/json' },
body: '{"key": "value"}'
)
Manual signing (when you need more control):
require 'excon'
require 'api_auth'
connection = Excon.new('https://api.example.com')
request_params = {
method: :post,
path: '/resource',
headers: { 'Content-Type' => 'application/json' },
body: '{"key": "value"}'
}
# Create a wrapper for signing
request = ApiAuth::Middleware::ExconRequestWrapper.new(request_params, '')
ApiAuth.sign!(request, @access_id, @secret_key)
# Execute the request with signed headers
response = connection.request(request_params)
Typhoeus requests can be signed directly before being queued or run with Hydra:
require 'typhoeus'
require 'api_auth'
request = Typhoeus::Request.new(
'https://api.example.com/resource',
method: :put,
headers: { 'Content-Type' => 'application/json' },
body: '{"key": "value"}'
)
ApiAuth.sign!(request, @access_id, @secret_key)
# Run immediately or add to a Hydra queue
response = request.run
When uploading large files you can pass an IO or File
object as the body. ApiAuth will buffer and rewind the stream while computing the SHA-256 content hash so the upload can continue uninterrupted.
ApiAuth can transparently protect your ActiveResource communications with a single configuration line:
class MyResource < ActiveResource::Base
with_api_auth(access_id, secret_key)
end
This will automatically sign all outgoing ActiveResource requests from your app.
ApiAuth also works with Flexirest (used to be ActiveRestClient, but that is now unsupported) in a very similar way. Simply add this configuration to your Flexirest initializer in your app and it will automatically sign all outgoing requests.
Flexirest::Base.api_auth_credentials(@access_id, @secret_key)
For Grape API applications, the request is automatically accessible:
class API < Grape::API
helpers do
def authenticate!
error!('Unauthorized', 401) unless ApiAuth.authentic?(request, current_account.secret_key)
end
def current_account
@current_account ||= Account.find_by(access_id: ApiAuth.access_id(request))
end
end
before do
authenticate!
end
resource :protected do
get do
{ message: 'Authenticated!' }
end
end
end
You can also implement ApiAuth as Rack middleware for any Rack-based application:
class ApiAuthMiddleware
def initialize(app)
@app = app
end
def call(env)
request = Rack::Request.new(env)
# Skip authentication for certain paths if needed
return @app.call(env) if request.path == '/health'
# Find account by access ID
access_id = ApiAuth.access_id(request)
account = Account.find_by(access_id: access_id)
# Verify authenticity
if account && ApiAuth.authentic?(request, account.secret_key)
env['api_auth.account'] = account
@app.call(env)
else
[401, { 'Content-Type' => 'text/plain' }, ['Unauthorized']]
end
end
end
# In config.ru or Rails application.rb
use ApiAuthMiddleware
ApiAuth provides some built in methods to help you generate API keys for your clients as well as verifying incoming API requests.
To generate a Base64 encoded API key for a client:
ApiAuth.generate_secret_key
To validate whether or not a request is authentic:
ApiAuth.authentic?(signed_request, secret_key)
The authentic?
method uses the digest specified in the Authorization
header.
For example SHA256 for:
Authorization = APIAuth-HMAC-SHA256 'client access id':'signature'
And by default SHA1 if the HMAC-DIGEST is not specified.
If you want to force the usage of another digest method, you should pass it as an option parameter:
ApiAuth.authentic?(signed_request, secret_key, :digest => 'sha256')
For security, requests dated older or newer than a certain timespan are considered inauthentic.
This prevents old requests from being reused in replay attacks, and also ensures requests can't be dated into the far future.
The default span is 15 minutes, but you can override this:
ApiAuth.authentic?(signed_request, secret_key, :clock_skew => 60) # or 1.minute in ActiveSupport
If you want to sign custom headers, you can pass them as an array of strings in the options like so:
ApiAuth.authentic?(signed_request, secret_key, headers_to_sign: %w[HTTP_HEADER_NAME])
With the specified headers values being at the end of the canonical string in the same order.
If your server is a Rails app, the signed request will be the request
object.
In order to obtain the secret key for the client, you first need to look up the client's access_id. ApiAuth can pull that from the request headers for you:
ApiAuth.access_id(signed_request)
Once you've looked up the client's record via the access id, you can then verify whether or not the request is authentic. Typically, the access id for the client will be their record's primary key in the DB that stores the record or some other public unique identifier for the client.
Here's a sample method that can be used in a before_action
if your server is a
Rails app:
before_action :api_authenticate
def api_authenticate
@current_account = Account.find_by_access_id(ApiAuth.access_id(request))
head(:unauthorized) unless @current_account && ApiAuth.authentic?(request, @current_account.secret_key)
end
ApiAuth supports multiple digest algorithms for generating signatures:
- SHA1 (default for backward compatibility)
- SHA256 (recommended for new implementations)
- SHA384
- SHA512
To use a specific digest algorithm:
# Client side - signing
ApiAuth.sign!(request, @access_id, @secret_key, digest: 'sha256')
# Server side - authenticating
ApiAuth.authentic?(request, @secret_key, digest: 'sha256')
When using a non-default digest, the Authorization header format changes to include the algorithm:
Authorization: APIAuth-HMAC-SHA256 access_id:signature
If you're getting authentication failures, check the time synchronization between client and server. By default, requests are valid for 15 minutes. You can adjust this:
# Allow 60 seconds of clock skew
ApiAuth.authentic?(request, secret_key, clock_skew: 60)
Ensure the Content-Type header is set before signing the request. The header is part of the canonical string used for signature generation.
The request path must be properly encoded. Special characters should be URL-encoded:
# Good
'/api/users/john%40example.com'
# Bad
'/api/users/[email protected]'
To debug authentication failures, you can compare the canonical strings:
# Get the canonical string from a request
headers = ApiAuth::Headers.new(request)
canonical_string = headers.canonical_string
# Compare client and server canonical strings to identify mismatches
ApiAuth uses bundler for gem dependencies and RSpec for testing. Developing the gem requires that you have all supported HTTP clients installed. Bundler will take care of all that for you.
To run the tests:
Install the dependencies for a particular Rails version by specifying a gemfile in gemfiles
directory:
BUNDLE_GEMFILE=gemfiles/rails_7.gemfile bundle install
Run the tests with those dependencies:
BUNDLE_GEMFILE=gemfiles/rails_7.gemfile bundle exec rake
If you'd like to add support for additional HTTP clients, check out the already
implemented drivers in lib/api_auth/request_drivers
for reference. All of
the public methods for each driver are required to be implemented by your driver.
Copyright (c) 2014 Mauricio Gomes. See LICENSE.txt for further details.