Bidly API Gateway
This is the secure public entrypoint for the Bidly platform. It fronts authentication, restaurant discovery, reservations, waitlist, payments, reviews, widgets, and operational gateway services behind one consistent HTTPS host.
Platform overview
Bidly API is designed to serve public discovery traffic and authenticated operational traffic through one gateway with consistent transport, correlation, rate limiting, and authorization enforcement.
- Public discovery and bootstrap flows such as restaurant search, plans, authentication entrypoints, and OpenID discovery remain reachable without a bearer token where intentionally allowed.
- Protected operational routes are challenged centrally at the gateway before they reach downstream services.
- Every request gets correlation, security headers, structured logging, and route-level traffic control.
- The gateway also normalizes downstream service OpenAPI exposure and health surfaces.
How to use this API
Use the public host below for all client traffic. Public routes are intentionally open where the product needs unauthenticated access, while protected routes expect a bearer token.
- Bootstrap and discovery:
/api/plans,/.well-known/openid-configuration - Auth entrypoints:
/api/auth/loginand related authentication flows - Selected restaurant reads: availability, booking summary, media, and other explicitly public catalog routes
Management, tenant-scoped, and operational routes require JWT bearer authentication. If a route is protected, the gateway returns 401 before proxying it downstream.
Example public base URL:
https://api.bidly.online
Live request snapshot
| Method | GET |
|---|---|
| Scheme | https |
| Host | api.bidly.online |
| Path | / |
| Query string | n/a |
| Protocol | HTTP/1.1 |
| Trace identifier | 0HNKHH53SQ34M:00000008 |
| Correlation ID | edcf75fd-bef8-4cd3-aec1-a4310a73c30b |
| Route pattern | / |
| Endpoint | HTTP: GET / |
Client and network
| Resolved client IP | 216.73.216.52 |
|---|---|
| Forwarded for | n/a |
| Real IP | n/a |
| Remote port | 0 |
| Local IP | ::ffff:172.18.0.24 |
| Local port | 8080 |
| TLS client certificate | none |
Authentication and policy
| Authenticated | false |
|---|---|
| User ID | n/a |
| Tenant ID | n/a |
| Identity name | n/a |
| Auth type | n/a |
| Rate-limit partition | ip:216.73.216.52 |
Diagnostics
The snapshot below reflects exactly what the gateway saw for this request. Sensitive headers remain redacted even here.
Identity and claims snapshot
JWT and identity claims
No claims were attached to this request.
Raw request headers
Request headers
| Accept | */* |
|---|---|
| Accept-Encoding | gzip, br, zstd, deflate |
| Host | api.bidly.online |
| User-Agent | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) |
| X-Amzn-Trace-Id | Root=1-69cfcdb9-6eebf0157e64a0ec38f4c898 |
| X-Forwarded-Port | 443 |
| X-Original-For | [::ffff:172.31.46.60]:52920 |
| X-Original-Proto | http |
Sensitive headers such as Authorization and Cookie are intentionally redacted even on this diagnostic page. If you are integrating a client, use this page to confirm the gateway sees the expected host, scheme, user agent, and source IP before testing protected flows.