Idempotency - what is it, and how can it help our Laravel APIs?
When developing APIs, idempotency is an important concept to be aware of. If an API supports idempotency, a client passes a unique key per request, which the server uses to avoid re-processing requests submitted multiple times. This helps to avoid, for example, issues with payments being processed multiple times or forms re-processed when a user has a poor connection. It's a concept supported in some of the most widely-used SDKs, from companies like Stripe, Paypal, Amazon, and Shopify. In this post, we'll cover the specific benefits idempotency brings to our APIs, and introduce a package which makes it trivial to add idempotency support to any Laravel API!
What is Idempotency?
Idempotency is the name given to the ability to make multiple identical requests, and only have the changes applied once. By adding a unique key to each incoming request, the server can detect a repeated request. If it has not seen that request before, the server can safely process it. If the key has been seen previously, the server can return the previous response, without re-processing the request. This is particularly useful if there are API clients operating with unreliable network conditions, where requests get automatically re-tried once a connection is re-established.
Consider the example of a payment request being made to an API.
In this scenario, the client has poor connectivity, so does not always receive the Confirmation #1
response. When connectivity is lost then restored, the client will re-send the request. The risk here is that the original request has been processed correctly, leading to a duplicate payment request processed by the retried transaction, leading ultimately to Confirmation #2
.
In the above flow, our user will have been charged twice. Now, let's see how the same payment flow works when that same API and client implement idempotency.
In this flow, the client is generating an idempotent key for each request. The first payment request is made, and once again, the client does not receive the Confirmation #1
response. However, when re-trying, the client is sending the same idempotency key. When this happens, the server recognises that it has already handled this request. The request is not re-processed on the backend (no communication at all with the bank to process the transaction!), and the original response is returned again (Confirmation #1
).
Adding idempotency support to the API creates a more robust and stable API, regardless of client connection issues, or poorer implementation client-side (forms still active while processing, for example).
Having implemented this process at Square1 on a number of different projects, we've wrapped up the functionality in an easy-to-use package to make adding idempotency support to your own API a breeze! Our Idempotency package has a number of key features out of the box:
- Idempotency Key Validation: Ensures that each API request is unique and processed only once, preventing duplicate operations.
- User-Specific Caching: Idempotency keys are unique per user, based on Laravel's default authentication.
- Customizable Cache Duration: Set the default cache duration and customize it as needed.
- Configurable Idempotency Header: Customize the name of the idempotency header.
- Flexible User ID Retrieval: Change the method of retrieving the user ID based on your application's needs.
Installation
This documentation covers the installation of the Idempotency package on the server side. The format of the idempotency keys generated by the client is not mandated by the package. Current best practice would be to use V4 UUIDs, or similar length random keys with sufficient entropy to avoid collisions.
First, require the package via Composer
$ composer require square1/laravel-idempotency
The package will be automatically registered.
Publish Configuration (Optional)
php artisan vendor:publish --provider="Square1\LaravelIdempotency\IdempotencyServiceProvider"
This will create a config/idempotency.php
file in your config
directory.
Usage
The package's core functionality is provided through middleware. To use it, you simply need to add the middleware to your routes or controller.
N.B As this package needs to be aware of the current user, ensure that the middleware is added after any user authentication actions are performed.
Global Usage
To apply the middleware to all routes, add it to the $middlewareGroups
array in your app/Http/Kernel.php
:
protected $middlewareGroups = [
'api' => [
// other middleware...
\Square1\LaravelIdempotency\Http\Middleware\IdempotencyMiddleware::class,
],
];
This will run the middleware on all of the routes in the application. However, the enforced_verbs
value in the package configuration will control whether the middleware has any impact on a given route (by default the middleware won't interfere with GET
or HEAD
requests).
Specific Routes
Alternatively, you can apply the middleware to specific routes:
// App\Http\Kernel
protected $middlewareAliases = [
...
'idempotency' => \Square1\LaravelIdempotency\Http\Middleware\IdempotencyMiddleware::class,
...
// routes/api.php
Route::middleware('idempotency')->group(function () {
Route::post('/your-api-endpoint', 'YourController@method');
// other routes
});
Recognising Idempotent Responses
When a request is successfully performed, it will be returned to the client, and the response cached. After a repeat idempotency key is seen, this cache value is returned. In this case, an additional header, Idempotency-Relayed
, is returned. This header contains the same idempotency key sent by the client, and is a signal to clients that this response has been repeated. This header is only present on the repeated response, never the original one.
Configuration Options
After publishing the configuration file, you can modify it as per your requirements. The main configuration options available are:
- cache_duration: Time for which responses should be cached, in seconds. This value controls the period after which a re-used idempotency key would be treated as a new request. Defaults to 1 day.
- idempotency_header: The name of the request header used by the client to pass the idempotency key. Defaults to
Idempotency-Key
. - ignore_empty_key: By default, if no idempotency key is passed when we expect one, a
MissingIdempotencyKeyException
exception will be thrown. If you wish to support requests where the key is missing, this can be set to true to prevent that exception being thrown. This may be useful during a period of api client update to roll out the key, for example. Defaults tofalse
. - enforced_verbs: An array of HTTP verbs against which idempotency checks should be applied. Typically
GET
andHEAD
requests don't change state, so don't require idempotency checks, but this array can be edited if there are different verbs you wish to check against. Defaults to['POST', 'PUT', 'PATCH', 'DELETE']
. - on_duplicate_behaviour: By default, the package will replay previously-seen responses when an idempotency key is re-used. Your application may wish to handle this duplication differently - throwing an error, for example. Setting this value to exception will cause a
DuplicateRequestException
to be thrown in this case. Defaults toreplay
. - user_id_resolver: Idempotent keys are unique per-user, meaning that if two different users somehow use the same key, there won't be a key collision. This requires the package to build a cache key using the current authenticated user when building the cache. By default, the package will use Laravel's
auth()->user()->id
value. If you want to use a different value to uniquely identify your users, a class-method pair can be added to this value to implement that custom value.
// Define custom resolver of per-user identifier.
'user_id_resolver' => [ExampleUserIdResolver::class, 'resolveUserId'],
// App\Services\ExampleUserIdResolver
namespace App\Services;
class ExampleUserIdResolver
{
public function resolveUserId()
{
// Implement custom logic to return the user ID
return session()->special_user_token;
}
}
Exception Handling
This package potentially throws a number of exceptions, all under the Square1\LaravelIdempotency\Exceptions
namespace:
MismatchedPathException
: Thrown if a repeated request with the same idempotency key has a different request path. This is typically the sign of a bug in the client, where the key is not changed on each request, e.g. a client re-using the same key to requestPOST /users
thenPOST /accounts
.DuplicateRequestException
: By default the package will replay a response when a previous idempotency key is seen again. Changing the config valueon_duplicate_behaviour
toexception
will cause an exception to be thrown instead (useful for applications when a re-sent request is more likely a bug in the client).MissingIdempotencyKeyException
: Thrown when a request handled by the idempotency middleware does not have a key present. This check is performed after theenforced_verbs
check, so, for example, ifGET
requests are not to be considered by the middleware, aGET
request without a key won't trigger this exception. This exception will be thrown, unless the config valueignore_empty_key
has been changed to true.
Conclusion
The goal of implementing idempotency is to bring a level of stability and reliability to API interactions. Idempotency is key in ensuring that repeated requests don't lead to unexpected outcomes - a feature that's not just beneficial but often necessary, particularly in systems dealing with critical operations like payments or data submissions.
Our idempotency package is designed to integrate seamlessly into your existing Laravel projects, making it easier to manage repeated API calls effectively. By handling potential duplicates gracefully, it saves time and headaches for developers while providing a smoother experience for end-users.
We encourage you to give our Laravel Idempotency Package a try. It's a practical step towards more reliable and efficient API interactions, and we're eager to see how it can enhance your projects. Whether you're dealing with occasional network hiccups or building a system that demands high-level consistency, this package is here to help!
CyberWiseCon 2025
In May 2025, I'll be giving a talk at CyberWiseCon 2025 in Vilnius, Lithuania. From selling 10 Downing St, to moving the Eiffel Tower to Dublin, this talk covers real-world examples of unconventional ways to stop scrapers, phishers, and content thieves. You'll gain practical insights to protect assets, outsmart bad actors, and avoid the mistakes we made along the way!
Get your ticket now and I'll see you there!