List Authors (v1.0.0)

Get all authors

Overview

This endpoint retrieves a comprehensive list of all authors available in the catalog domain. The implementation follows Domain-Driven Design principles, separating the concern of querying authors from the domain model through a dedicated query handler.

The query accesses the repository abstraction rather than directly querying the database, maintaining proper encapsulation of the persistence layer. The returned authors are mapped to DTOs using AutoMapper, ensuring that domain entities remain protected from external exposure.

This endpoint supports catalog bounded context operations that require author information, such as book browsing and filtering. It provides a paginated response to handle potentially large datasets efficiently.

Use Cases

  • Displaying author lists in the UI for book browsing
  • Populating author selection dropdowns in forms
  • Supporting author-based filtering and search functionality
  • Integration with other services requiring author information

Architecture

GET (/api/v1/authors)

Request Body

No request body required for this endpoint.

Example Usage

Terminal window
curl -X GET "https://api.bookworm.com/api/v1/authors"

Responses

200 OK

Example Response

200 OK
[
{
"id": "a1e1b3b4-1b1b-4b1b-9b1b-1b1b1b1b1b1b",
"name": "John Doe",
},
{
"id": "b1e1b3b4-1b1b-4b1b-9b1b-1b1b1b1b1b1b",
"name": "Jane Smith",
},
{
"id": "c1e1b3b4-1b1b-4b1b-9b1b-1b1b1b1b1b1b",
"name": "Alice Johnson",
}
]

Rate Limiting

This endpoint is subject to standard API rate limiting. Please refer to the API documentation for specific rate limit details.

Error Handling

The endpoint may return the following error responses:

  • 429 Too Many Requests: Rate limit exceeded
  • 500 Internal Server Error: Server-side processing error

Performance Considerations

  • The response is paginated to handle large datasets efficiently
  • Results are cached at the application level for improved performance
  • Response times may vary based on the total number of authors in the system

Security

  • Requires authentication
  • Implements proper authorization checks
  • Data is sanitized before transmission