Skip to content

eclipse-arrowhead/core-java-spring

Repository files navigation

Arrowhead Framework 4.5.0

Arrowhead (and its continuation, Productive4.0) is an ambitious holistic innovation project, meant to open the doors to the potentials of Digital Industry and to maintain a leadership position of the industries in Europe. All partners involved will work on creating the capability to efficiently design and integrate hardware and software of Internet of Things (IoT) devices. Linking the real with the digital world takes more than just adding software to the hardware.

Disclaimer

Please be aware, that versions starting from 4.1.3 are NOT backwards compatible with 4.1.2. If you have older systems please refer to the Migration Guide

Table of Contents

  1. Quick Start Guide
    1. Docker
    2. Debian Installer
    3. Compile Code
  2. Migration Guide 4.1.2 -> 4.1.3
  3. Certificates
  4. Gatekeeper and Gateway Setup with ActiveMQ Relay
  5. Continuous Integration / Continuous Delivery
  6. How to Contribute
  7. Documentation
    1. Service Registry
    2. Authorization
    3. Orchestrator
    4. EventHandler
    5. Gatekeeper
    6. Gateway
    7. DataManager
    8. TimeManager
    9. Certificate Authority
    10. Onboarding Controller
    11. Device Registry
    12. System Registry
    13. Choreographer
    14. Plant Description Engine
    15. HawkBit Configuration Manager
    16. Device Hub with Eclipse Hono

Docker is a container platform that can be used to package and deploy applications in server environments, among other. In particular, the docker-compose utility may with advantage be used during application development to test integration with the Arrowhead Core systems. Here, we provide brief instructions on how to install and run both Docker and container images for the Arrowhead Core systems.

Note: A system with 4GB of RAM is advised.

Don't forget to create a volume for mysql: docker volume create --name=mysql
Don't forget to copy the initSQL.sh script next to the docker-compose file and execute it! On the first run it initializes the Database!
Example copy command which does this for you, execute from the project root directory.

cp scripts/initSQL.sh docker/
cd docker
./initSQL.sh

We provide two examples of how Docker containers can be used to host Arrowhead Core systems in this repository. The first one is located in the docker folder and the second one in the docker-all folder. The former example shows how some prebuilt Docker images can be used to bring up networks, while the second describes how a Docker image can be constructed that contains all Arrowhead Core systems. Please refer to those folders for more information. In particular, each folder contains its own README.md file with more instructions.

Note: Don't forget to set domain.name and domain.port properties!

Example Docker Compose file is located here. The interesting part is the volumes section. Format is /path/on/your/local/machine:/path/inside/docker/container

You may want to copy the config files elsewhere with the compose file too. If you copy them, please don't forget to change the volume mounting point, but DON'T change the volume mounting point inside the container, otherwise it will start up with default config.

To update the images: execute docker-compose pull command in the directory where the compose file is.

To start the containers: execute docker-compose up -d command in the directory where the compose file is.

Don't forget to check, are all containers up and running?

docker ps -a

If all of their is Up, you are all set. If they die, please check their logs.

If you change your config you have to restart the appropriate container

docker restart <containerName>

Command Description
docker ps -a List all containers
docker images List all images
docker-compose up -d Starts the Docker containers
docker-compose down Destroys the Docker containers
docker restart <containerName> Restarts a container, making it re-read its configuration files
docker logs <containerName> Shows logs for the container
docker volume create --name=<volumeName> Creates a named volume
docker volume rm <volumeName> Removes the specified named volume

Q: MySQL won't start. What did went wrong?
A: Probably you missed to copy the init SQL script next to the compose file, or you have a typo in its name. Solution: https://github.com/arrowhead-f/core-java-spring/issues/105

The Debian installer files are located in the deb-installer/package/arrowhead-installers-4.1.3 folder. Please follow this guide to install them: Debian Installer Guide

Note: Preferred installation mode for Raspberry Pi.

Requirements

Note: A system with 2GB of RAM is advised.

The project has the following dependencies:

Verify that you have Java (java -version), Maven (mvn -version), MySQL installed properly!

Pull this code and enter the directory. git clone https://github.com/arrowhead-f/core-java-spring.git

Go to the scripts folder, execute mysql -u root -p < create_empty_arrowhead_db.sql and mysql -u root -p < create_arrowhead_tables.sql MySQL script. If you won't run these scripts first, the project won't build.

cd core-java-spring

Execute mvn install -DskipTests command. Wait until the build succeeds. This command builds all available projects.

After the build is complete, the jars with the appropriate application.properites will be available in their directory.

Starting the core systems manually:

Change directory to:

  • serviceregistry/target directory. cd serviceregistry/target
    and execute: java -jar arrowhead-serviceregistry-4.1.3.jar
  • authorization/target directory. cd authorization/target
    and execute: java -jar arrowhead-authorization-4.1.3.jar
  • orchestrator/target directory. orchestrator/target
    and execute: java -jar arrowhead-orchestrator-4.1.3.jar

Starting the core system automatically:

After successful build enter the scripts folder and execute start_core_systems.sh or start_core_systems.bat depending on your operating system.

Wait until servers start...

Note: By default servers start in SECURE mode. To access them, you need to use an example certificate, provided in the certificate directory.

Note: If you wish to change the the configuration, do it by by modifying the application.properties file in the target directory! Don't forget to change all of them!

Service Registry will be available on https://localhost:8443
Authorization will be available on https://localhost:8445
Orchestrator will be available on https://localhost:8441
Event Handler will be available on https://localhost:8455
DataManager will be available on https://localhost:8461
TimeManager will be available on https://localhost:8463
Gatekeeper will be available on https://localhost:8449
Gateway will be available on https://localhost:8453

Swagger with API documentation is available in the root route.

Insecure Mode - (not recommended)

To start in insecure mode, you have to change the server.ssl.enabled property to false. You'll have to do it for each core system, under the path target/application.properties. Note that if you recompile after the changes, the target/application.properties file will be overwritten by the default ones in the src/main/resources/application.properties.

The Gatekeeper and Gateway use encryption based on the certificates, hence there is no way to start the Gatekeeper and Gateway in insecure mode. But you can use the local cloud without these core systems. All you have to do is to set gatekeeper_is_present=false in the application.properties of the ochestrator, and start the script start_coresystems_local.bat or start_coresystems_local.sh depending on your operating system.

4.1.3 is NOT backwards compatible with 4.1.2! Earlier it was redundant and contained gaps. Now the database and the endpoints are redesigned, they are clean, more logical and easier to use.

You can migrate your existing database manually. See the Quick Start Guide, how to deploy the Core Systems.

Major endpoint changes:

Service Registry Core System:

The following endpoints no longer exist, instead use the ones on the right:

  • PUT /mgmt/services -> POST /serviceregistry/mgmt/services

  • PUT /mgmt/systems -> POST /serviceregistry/mgmt/systems

  • GET /serviceregistry/mgmt/systemId/{systemId} -> GET /serviceregistry/mgmt/systems/{id}

  • GET /serviceregistry/mgmt/serviceId/{serviceId}/providers

  • PUT /serviceregistry/mgmt/query -> POST /serviceregistry/query

  • PUT /serviceregistry/mgmt/subscriptions/{id}

  • PUT /serviceregistry/support/remove -> DELETE /serviceregistry/unregister

  • DELETE /serviceregistry/mgmt/all

  • serviceregistry/register - data structure changed

Description for this endpoint is available here: Register

Old payload, which is no longer usable

{
 "providedService" : {
   "serviceDefinition" : "IndoorTemperature",
   "interfaces" : [ "JSON", "XML" ],
   "serviceMetadata" : {
     "unit" : "celsius"
   }
 },
 "provider" : {
   "systemName" : "InsecureTemperatureSensor",
   "address" : "192.168.0.2",
   "port" : 8080
 },
 "serviceURI" : "temperature",
 "version" : 1,
 "udp" : false,
 "ttl" : 0
} 

New payload - you can easily map the old fields to the new ones.

{
 "serviceDefinition": "IndoorTemperature",
 "providerSystem": {
   "systemName": "InsecureTemperatureSensor",
   "address": "192.168.0.2",
   "port": 8080,
 "authenticationInfo": "eyJhbGciOiJIUzI1Ni..."
},
 "serviceUri": "temperature",
 "endOfValidity": "2019-12-05T12:00:00",
 "secure": "TOKEN",
 "metadata": {
   "unit": "celsius"
},
 "version": 1,
 "interfaces": [
   "HTTP-SECURE-JSON"
 ]
}

Authorization Core System:

  • /mgmt/intracloud - data structure changed
  • /mgmt/intercloud - data structure changed

How to Add Intracloud rules
How to Add Intercloud rules

Orchestration Core System:

  • /mgmt/store - data structure changed
  • /orchestrator/orchestration - data structure changed

Description for this endpoint is available here: Orchestration

Old payload, which is no longer usable

{
 "requesterSystem" : {
   "systemName" : "client1",
   "address" : "localhost",
   "port" : 0,
   "authenticationInfo" : "null"
 },
 "requestedService" : {
   "serviceDefinition" : "IndoorTemperature",
   "interfaces" : [ "json" ],
   "serviceMetadata" : {
     "unit" : "celsius"
   }
 },
 "orchestrationFlags" : {
   "onlyPreferred" : false,
   "overrideStore" : true,
   "externalServiceRequest" : false,
   "enableInterCloud" : true,
   "enableQoS" : false,
   "matchmaking" : false,
   "metadataSearch" : true,
   "triggerInterCloud" : false,
   "pingProviders" : false
 },
 "preferredProviders" : [ ],
 "requestedQoS" : { },
 "commands" : { }
}

New payload - you can easily map the old fields to the new ones.

{
  "requesterSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "requestedService": {
    "serviceDefinitionRequirement": "string",
    "interfaceRequirements": [
      "string"
    ],
    "securityRequirements": [
      "NOT_SECURE", "CERTIFICATE", "TOKEN"
    ],
    "metadataRequirements": {
      "additionalProp1": "string",
      "additionalProp2": "string",
      "additionalProp3": "string"
    },
    "versionRequirement": 0,
    "maxVersionRequirement": 0,
   "minVersionRequirement": 0
  },
  "preferredProviders": [
    {
      "providerCloud": {
        "operator": "string",
        "name": "string"
      },
      "providerSystem": {
        "systemName": "string",
        "address": "string",
        "port": 0
      }
    }
  ],
  "orchestrationFlags": {
    "additionalProp1": true,
    "additionalProp2": true,
    "additionalProp3": true
  }
}

Arrowhead Framework's security is relying on SSL Certificate Trust Chains. The Arrowhead trust chain consists of three level:

  1. Master certificate: arrowhead.eu
  2. Cloud certificate: my-cloud.my-company.arrowhead.eu
  3. Client certificate: my-client.my-cloud.my-company.arrowhead.eu The certificate naming convention have strict rules:
  • The different parts are delimited by dots, therefore parts are not allowed to contain any of them.
  • A single part is allowed to contain maximum 63 character of letters (english alphabet), numbers and dash (-), and has to start with a letter (also cannot ends with dash).
  • A cloud certificate name has to consist of four part and the last two part have to be 'arrowhead' and 'eu'.
  • A client certificate name has to consist of five part and the last two part have to be 'arrowhead' and 'eu'.

The trust chain is created by issuing the cloud certificate from the master certificate and the client certificate from the cloud certificate. With other words, the cloud certificate is signed by the master certificate's private key and the client certificate is signed by the cloud certificate's private key which makes the whole chain trustworthy.

The Key-Store

The Key-Store is intended to store the certificates and/or key-pair certificates. Key-pair certificates are contain the certificate chain with some additinal data, such as the private-public keys, which are necessary for the secure operation. Certificates located in this store (without the keys) will be attached to the outcoming HTTPS requests. Arrowhead Framework is designed for handling the p12 type of Key-Stores.

(Note: When you creating a new key-pair certificate, then the key-password and the key-store-password must be the same.)

The Trust-Store

The Trust-Store is containing those certificates, what the web-server considers as trusted ones. Arrowhead Framework is designed for handling the p12 type of Trust-Stores. Typically your Trust-Store should contain only the cloud certificate, which ensures that only those incoming HTTPS requests are authorized to access, which are having this certificate within their certificate chain.

How to create my own certificates?

Method A

Currently Arrowhead community have the possibility to create only "self signed" certifications. See the tutorials:

Method B

If you wish to generate all Certificates by a script, you can use the scripts in the scripts/certificate_generation folder.

Note: Basic scripting knowledge is required!

  • lib_certs.sh - Certificate generation code
  • mk_certs.sh - Usage example
  • rm_certs.sh - Delete generated certs

Method C

You can also use the arrowhead script. For this barely any scripting knowledge is needed, just follow the instructions.

Arrowhead scripts.

System Operator Certificate

The System Operator Certificate is a special client certificate with the naming convention of sysop.my-cloud.my-company.arrowhead.eu. SysOp certificate allows the client to use the management endpoints of the Arrowhead Core Systems. Typical usage of SysOp certificate is by front end applications running in a web browser (for example if you want to access the Swagger or use the Management Tool in secure mode.

Include certificate in Docker container

The following guide describes step by step, how to include your own certificates into a Docker container.

Please follow this guide to setup the Arrowhead Gatekeeper and Gateway core systems: Gatekeeper & Gateway Setup Guide with ActiveMQ Relay

Arrowhead's CI/CD pipeline is based on the work of Haris Isakovic and Peter Ketcher from TU Wien. Thank you for providing this amazing guide and countless hours of help setting it up properly. CI/CD Tutorial for Arrowhead Framework

Open Development

All work on Arrowhead repositories happens directly on GitHub. Both core team members and external contributors send pull requests which go through the same review process.

Branch Organization

The latest version of the core systems are available in the master branch. The code for the next release is merged in the development branch. If you would like to contribute, please check out the development branch. Create a new branch from development. Don't forget do write documentation, unit and integration tests. When finished, create a pull request back into development. If accepted, your contribution will be in the next release. :)

Useful Guides about Java Coding Practices

Before you make a pull request, please make sure you clean your code as best as you can. The following resources can help to understand what clean code means:

Bugs

Where To Find Known Issues

We are using GitHub Issues for our public bugs. We keep a close eye on this and try to make it clear when we have an internal fix in progress. Before filing a new task, try to make sure your problem doesn’t already exist.

Reporting New Issues

The best way to get your bug fixed is to provide a reduced test case.

How to Get in Touch

Join our developer team on Slack. Write an email to szvetlin@aitia.ai for an invite.

This System provides the database, which stores information related to the currently actively offered Services within the Local Cloud.

The purpose of this System is therefore to allow:

  • Application Systems to register what Services they offer at the moment, making this announcement available to other Application Systems on the network.
  • They are also allowed to remove or update their entries when it is necessary.
  • All Application Systems can utilize the lookup functionality of the Registry to find Public Core System Service offerings in the network, otherwise the Orchestrator has to be used.

However, it is worth noting, that within this generation the lookup functionality of Services is integrated within the “orchestration process”. Therefore, in the primary scenario, when an Application System is looking for a Service to consume, it shall ask the Orchestrator System via the Orchestration Service to locate one or more suitable Service Providers and help establish the connection based on metadata submitted in the request. Direct lookups from Application Systems within the network is not advised in this generation, due to security reasons.

However, the lookup of other Application Systems and Services directly is not within the primary use, since access will not be given without the Authorization JWT (JSON Web Token). The use of the TokenGeneration is restricted to the Orchestrator for general System accountability reasons.

This System only provides one Core Service the Service Discovery

There are two use case scenarios connected to the Service Registry.

  • Service registration, de-registration
  • Service Registry querying (lookup)

The register method is used to register services. The services will contain various metadata as well as a physical endpoint. The various parameters are representing the endpoint information that should be registered.

The unregister method is used to unregister service instances that were previously registered in the Registry. The instance parameter is representing the endpoint information that should be removed.

The query method is used to find and translate a symbolic service name into a physical endpoint, for example an IP address and a port. The query parameter is used to request a subset of all the registered services fulfilling the demand of the user of the service. The returned listing contains service endpoints that have been fulfilling the query.

There is another functionality that does not bound to any Services, just an internal part of the Service Registry. There are two optional cleanup tasks within the Service Registry, which can be used to remove old, inactive service offerings. The first task is based on pinging the service provider and if the provider does not respond to the ping, its offered services will be deleted. The second task is based on a feature, called “Time to Live”. Service providers upon registration can provide a timestamp called “end_of_validity” number, which specifies how long the service will be offered by the provider, making the service de-registrations unnecessary, if this task is active. The task is used to remove expired services. The third task is using a feature called "Heartbeat" (Not yet implemented), where the Service provider periodically signals to the Service Registry that it is still alive. When it misses it will be removed. All of these internal tasks can be configured in the application.properties file.

This System can be secured via the HTTPS protocol. If it is started in secure mode, it verifies whether the Application System possesses a proper X.509 identity certificate and whether that certificate is Arrowhead compliant in its making. This certificate structure and creation guidelines ensure:

  • Application System is properly bootstrapped into the Local Cloud
  • The Application System indeed belongs to this Local Cloud
  • The Application System then automatically has the right to register its Services in the Registry.

If these criteria are met, the Application System’s registration or removal message is processed. An Application System can only delete or alter entries that contain the Application System as the Service Provider in the entry.

The Service Registry offers three types of endpoints. Client, Management and Private.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/serviceregistry

Function URL subpath Method Input Output
Echo /echo GET - OK
Query /query POST ServiceQueryForm ServiceQueryList
Register /register POST ServiceRegistryEntry ServiceRegistryEntry
Unregister /unregister DELETE Address, Port, Service Definition, System Name in query parameters OK

These services can only be used by other core services, therefore they are not part of the public API.

Function URL subpath Method Input Output
Query System /query/system POST System System
Query System By ID /query/system/{id} GET ID System

There endpoints are mainly used by the Management Tool and Cloud Administrators.

Function URL subpath Method Input Output
Get all entries /mgmt/ GET - ServiceRegistryEntryList
Add an entry /mgmt/ POST ServiceRegistryEntry ServiceRegistryEntry
Get an entry by ID /mgmt/{id} GET ServiceID ServiceRegistryEntry
Replace an entry by ID /mgmt/{id} PUT ServiceRegistryEntry ServiceRegistryEntry
Modify an entry by ID /mgmt/{id} PATCH Key value pairs of ServiceRegistryEntry ServiceRegistryEntry
Delete and entry by ID /mgmt/{id} DELETE ServiceRegistryEntryID -
Get grouped view /mgmt/grouped GET - ServiceRegistryGrouped
Get Service Registry Entries by Service Definition /mgmt/servicedef/
{serviceDefinition}
GET ServiceDefinition ServiceRegistryEntryList
Get all services /mgmt/services GET - ServiceDefinitionList
Add a service /mgmt/services POST ServiceDefinition ServiceDefinition
Get a service by ID /mgmt/services/{id} GET ServiceID ServiceDefinition
Replace a service by ID /mgmt/services/(id} PUT Service ServiceDefinition
Modify a service by ID /mgmt/services/{id} PATCH Key value pairs of ServiceDefinition ServiceDefinition
Delete a service by ID /mgmt/services/{id} DELETE ServiceID -
Get all systems /mgmt/systems GET - SystemList
Add a system /mgmt/systems POST System System
Get a system by ID /mgmt/systems/{id} GET SystemID System
Replace a system by ID /mgmt/systems/{id} PUT System System
Modify a system by ID /mgmt/systems/{id} PATCH Key value pairs of System System
Delete a system by ID /mgmt/systems/{id} DELETE SystemID -

The following endpoints no longer exist:

  • PUT /mgmt/services
  • PUT /mgmgt/systems
  • GET /serviceregistry/mgmt
  • GET /serviceregistry/mgmt/systemId/{systemId}
  • GET /serviceregistry/mgmt/serviceId/{serviceId}/providers
  • PUT /serviceregistry/mgmt/query
  • PUT /serviceregistry/mgmt/subscriptions/{id}
  • PUT /serviceregistry/support/remove
  • DELETE /serviceregistry/mgmt/all
GET /serviceregistry/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

Note: 4.1.2 version: GET /serviceregistry

POST /serviceregistry/query

Returns ServiceQueryList that fits the input specification. Mainly used by the Orchestrator.

ServiceQueryForm is the input

{
 "serviceDefinitionRequirement": "string",
 "interfaceRequirements": [
   "string"
 ],
 "securityRequirements": [
   "NOT_SECURE"
 ],
 "metadataRequirements": {
   "additionalProp1": "string",
   "additionalProp2": "string",
   "additionalProp3": "string"
 },
 "versionRequirement": 0,
 "maxVersionRequirement": 0,
 "minVersionRequirement": 0,
 "pingProviders": true
}
Field Description Mandatory
serviceDefinitionRequirement Name of the required Service Definition yes
interfaceRequirements List of required interfaces no
securityRequirements List of required security settings no
metadataRequirements Key value pairs of required metadata no
versionRequirement Required version number no
maxVersionRequirement Maximum version requirement no
minVersionRequirement Minimum version requirement no
pingProviders Return only available providers no

Note: Valid interfaceRequirements name pattern: protocol-SECURE or INSECURE format. (e.g.: HTTP-SECURE-JSON)

Note: Possible values for securityRequirements are:

  • NOT_SECURE
  • CERTIFICATE
  • TOKEN
  • not defined, if you don't want to filter on security type

Returns a ServiceQueryList

{
 "serviceQueryData": [
   {
     "id": 0,
     "serviceDefinition": {
       "id": 0,
       "serviceDefinition": "string",
       "createdAt": "string",
       "updatedAt": "string"
     },
     "provider": {
       "id": 0,
       "systemName": "string",
       "address": "string",
       "port": 0,
       "authenticationInfo": "string",
       "createdAt": "string",
       "updatedAt": "string"
     },
     "serviceUri": "string",
     "endOfValidity": "string",
     "secure": "NOT_SECURE",
     "metadata": {
       "additionalProp1": "string",
       "additionalProp2": "string",
       "additionalProp3": "string"
     },
     "version": 0,
     "interfaces": [
       {
         "id": 0,
         "interfaceName": "string",
         "createdAt": "string",
         "updatedAt": "string"
       }
     ],
     "createdAt": "string",
     "updatedAt": "string"
    }
 ],
 "unfilteredHits": 0
}
Field Description
serviceQueryData The array of objects containing the data
id ID of the entry, used by the Orchestrator
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp.
secure Security info
metadata Metadata
version Version of the Service
interfaces List of interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated
unfilteredHits Number of hits based on service definition without filters

Note: 4.1.2 version: PUT /serviceregistry /query
This version always returned the records in an array of JSON objects. The response did not contain any information about the unfiltered hits and the objects did not contain any modification related timestamp information. Interfaces and metadata were bound to the service definition and security type was not defined. Service Registry object did contain an "udp" flag beside the interface definition.

Alt text

Register

POST /serviceregistry/register

Registers a service. A provider is allowed to register only its own services. It means that provider system name and certificate common name must match for successful registration.

ServiceRegistryEntry is the input

{
  "serviceDefinition": "string",
  "providerSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    "string"
  ]
}
Field Description Mandatory
serviceDefinition Service Definition yes
providerSystem Provider System yes
serviceUri URI of the service yes
endOfValidity Service is available until this UTC timestamp no
secure Security info no
metadata Metadata no
version Version of the Service no
interfaces List of the interfaces the Service supports yes

Note: Valid interfaces name pattern: protocol-SECURE or INSECURE format. (e.g.: HTTP-SECURE-JSON)

Note: authenticationInfo is the public key of the system. In Insecure mode you can omit sending this key.

Note: Possible values for secure are:

  • NOT_SECURE (default value if field is not defined)
  • CERTIFICATE
  • TOKEN

Returns a ServiceRegistryEntry

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "provider": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
 }
 ],
 "createdAt": "string",
 "updatedAt": "string"
}
Field Description
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /serviceregistry/register
In this version interfaces and metadata were bound to the service definition and security type was not defined at all. The response object did not contain any modification related time stamp information. Service Registry object did contain an "udp" flag beside the interface definition.

Alt text

Unregister

DELETE /serviceregistry/unregister

Removes a registered service. A provider is allowed to unregister only its own services. It means that provider system name and certificate common name must match for successful unregistration.

Query params:

Field Description Mandatory
service_definition Name of the service to be removed yes
system_name Name of the Provider yes
address Address of the Provider yes
port Port of the Provider yes

Note: 4.1.2 version: PUT /serviceregistry/remove
In this version the input was a JSON object with many unnecessary information.

Alt text

Query System

POST /serviceregistry/query/system

This service can only be used by other core services, therefore is not part of the public API.

GET /serviceregistry/system/{id}

This service can only be used by other core services, therefore is not part of the public API.

Get all entries

GET /serviceregistry/mgmt

Returns a list of Service Registry records. If page and item_per_page are not defined, returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a ServiceRegistryEntryList

{
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceUri": "string",
      "endOfValidity": "string",
      "secure": "NOT_SECURE",
      "metadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "version": 0,
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ],
  "count": 0
}
Field Description
data Array of ServiceRegistryEntry
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated
count Number of entries found

Note 4.1.2 version: GET /serviceregistry/mgmt/all
This version always returned the records in an array of JSON objects. The objects did not contain any modification related time stamp information. Interfaces and metadata were bound to the service definition and security type was not defined. Service Registry object did contain an "udp" flag beside the interface definition.

POST /serviceregistry/mgmt

Creates service registry record and returns the newly created record.

ServiceRegistryEntry is the input

{
  "serviceDefinition": "string",
  "providerSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    "string"
 ]
}
Field Description Mandatory
serviceDefinition Service Definition yes
providerSystem Provider System yes
serviceUri URI of the Service no
endOfValidity Service is available until this UTC timestamp. no
secure Security info no
metadata Metadata no
version Version of the Service no
interfaces List of the interfaces the Service supports yes

Note: Valid interfaces name pattern: protocol-SECURE or INSECURE format. (e.g.: HTTP-SECURE-JSON)

Note: Possible values for secure are:

  • NOT_SECURE (default value if field is not defined)
  • CERTIFICATE
  • TOKEN

Returns a ServiceRegistryEntry

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "provider": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
 }
 ],
 "createdAt": "string",
 "updatedAt": "string"
}
Field Description
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /serviceregistry/support/register
It was available for clients as well, not only for the system operator of the local cloud. Interfaces and metadata were bound to the service definition and security type was not defined at all. The response object did not contain any modification related time stamp information. Service Registry object did contain an "udp" flag beside the interface definition.

GET /serviceregistry/mgmt/{id}

Returns the Service Registry Entry specified by the ID path parameter.

Returns a ServiceRegistryEntry

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "provider": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
 }
 ],
 "createdAt": "string",
 "updatedAt": "string"
}
Field Description
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /serviceregistry/mgmt/id/{id}
In this version interfaces and metadata were bound to the service definition and security type was not defined at all. The response object did not contain any modification related time stamp information. Service Registry object did contain an "udp" flag beside the interface definition.

PUT /serviceregistry/mgmt/{id}

Updates and returns the modified service registry record specified by the id path parameter. Not defined fields are going to be updated to "null" value.

ServiceRegistryEntry is the input

{
  "serviceDefinition": "string",
  "providerSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    "string"
 ]
}
Field Description Mandatory
serviceDefinition Service Definition yes
providerSystem Provider System yes
serviceUri URI of the Service no
endOfValidity Service is available until this UTC timestamp. no
secure Security info no
metadata Metadata no
version Version of the Service no
interfaces List of the interfaces the Service supports yes

Note: Valid interfaces name pattern: protocol-SECURE or INSECURE format. (e.g.: HTTP-SECURE-JSON)

Note: Possible values for secure are:

  • NOT_SECURE (default value if field is not defined)
  • CERTIFICATE
  • TOKEN

Returns a ServiceRegistryEntry

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "provider": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
 }
 ],
 "createdAt": "string",
 "updatedAt": "string"
}
Field Description
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: PUT /serviceregistry/mgmt/update/{id}
In this version interfaces and metadata were bound to the service definition and security type was not defined at all. The response object did not contain any modification related time stamp information. Service Registry object did contain an "udp" flag beside the interface definition.

PATCH /serviceregistry/mgmt/{id}

Updates and returns the modified service registry record specified by the id path parameter. Not defined fields are NOT going to be updated.

ServiceRegistryEntry is the input

{
  "serviceDefinition": "string",
  "providerSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    "string"
 ]
}
Field Description Mandatory
serviceDefinition Service Definition no
providerSystem Provider System no
serviceUri URI of the Service no
endOfValidity Service is available until this UTC timestamp. no
secure Security info no
metadata Metadata no
version Version of the Service no
interfaces List of the interfaces the Service supports no

Note: Valid interfaces name pattern: protocol-SECURE or INSECURE format. (e.g.: HTTP-SECURE-JSON)

Note: Possible values for secure are:

  • NOT_SECURE (default value if field is not defined)
  • CERTIFICATE
  • TOKEN

Returns a ServiceRegistryEntry

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "provider": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceUri": "string",
  "endOfValidity": "string",
  "secure": "NOT_SECURE",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0,
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
 }
 ],
 "createdAt": "string",
 "updatedAt": "string"
}
Field Description
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: Not existed

DELETE /serviceregistry/mgmt/{id}

Remove the service registry record specified by the id path parameter.

Note: 4.1.2 version: DELETE /serviceregistry/mgmt/{entryId}
This version did return Http 404 (not found), when record was not found by id.

GET /serviceregistry/mgmt/grouped

Returns all Service Registry Entries grouped for the purpose of the Management Tools' Service Registry view:

  • autoCompleteData
  • servicesGroupedByServiceDefinition
  • servicesGroupedBySystems

Returns a ServiceRegistryGrouped

{
  "autoCompleteData": {
    "interfaceList": [
      {
        "id": 0,
        "value": "string"
      }
    ],
    "serviceList": [
      {
        "id": 0,
        "value": "string"
      }
    ],
    "systemList": [
      {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      }
    ]
  },
  "servicesGroupedByServiceDefinition": [
    {
      "serviceDefinitionId": 0,
      "serviceDefinition": "string",
      "providerServices": [
        {
          "id": 0,
          "serviceDefinition": {
            "id": 0,
            "serviceDefinition": "string",
            "createdAt": "string",
            "updatedAt": "string"
          },
          "provider": {
            "id": 0,
            "systemName": "string",
            "address": "string",
            "port": 0,
            "authenticationInfo": "string",
            "createdAt": "string",
            "updatedAt": "string"
          },
          "serviceUri": "string",
          "endOfValidity": "string",
          "secure": "NOT_SECURE",
          "metadata": {
            "additionalProp1": "string",
            "additionalProp2": "string",
            "additionalProp3": "string"
          },
          "version": 0,
          "interfaces": [
            {
              "id": 0,
              "interfaceName": "string",
              "createdAt": "string",
              "updatedAt": "string"
            }
          ],
          "createdAt": "string",
          "updatedAt": "string"
        }
      ]
    }
  ],
  "servicesGroupedBySystems": [
    {
      "systemId": 0,
      "systemName": "string",
      "address": "string",
      "port": 0,
      "services": [
        {
          "id": 0,
          "serviceDefinition": {
            "id": 0,
            "serviceDefinition": "string",
            "createdAt": "string",
            "updatedAt": "string"
          },
          "provider": {
            "id": 0,
            "systemName": "string",
            "address": "string",
            "port": 0,
            "authenticationInfo": "string",
            "createdAt": "string",
            "updatedAt": "string"
          },
          "serviceUri": "string",
          "endOfValidity": "string",
          "secure": "NOT_SECURE",
          "metadata": {
            "additionalProp1": "string",
            "additionalProp2": "string",
            "additionalProp3": "string"
          },
          "version": 0,
          "interfaces": [
            {
              "id": 0,
              "interfaceName": "string",
              "createdAt": "string",
              "updatedAt": "string"
            }
          ],
          "createdAt": "string",
          "updatedAt": "string"
        }
      ]
    }
  ]
}
Field Description
autocompleteData Data for the Management Tools' autocomplete engine
servicesGroupedByServiceDefinitionAndInterface Services Grouped by Service Definition and Interface
servicesGroupedBySystems Services Grouped By Systems

Note: 4.1.2 version: Not existed

GET /serviceregistry/mgmt/servicedef/{serviceDefinition}

Returns a list of Service Registry records specified by the serviceDefinition path parameter. If page and item_per_page are not defined, returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a ServiceRegistryEntryList

{
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceUri": "string",
      "endOfValidity": "string",
      "secure": "NOT_SECURE",
      "metadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "version": 0,
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ],
  "count": 0
}
Field Description
data Array of ServiceRegistryEntry
id ID of the ServiceRegistryEntry
serviceDefinition Service Definition
provider Provider System
serviceUri URI of the Service
endOfValidity Service is available until this UTC timestamp
secure Security info
metadata Metadata
version Version of the Service
interfaces List of the interfaces the Service supports
createdAt Creation date of the entry
updatedAt When the entry was last updated
count Number of entries found

Note: 4.1.2 version: GET /serviceregistry/mgmt/servicedef/{serviceDefinition}
This version always returned the records in an array of JSON objects. The objects did not contain any modification related time stamp information. Interfaces and metadata were bound to the service definition and security type was not defined. Service Registry object did contain an "udp" flag beside the interface definition.

GET /serviceregistry/mgmt/services

Returns a list of Service Definition records. If page and item_per_page are not defined, returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a ServiceDefinitionList

{
  "data": [
    {
      "id": 0,
      "serviceDefinition": "string",
      "createdAt": "string",
      "updatedAt": "string"
    }
   ],
  "count": 0
}

Note: 4.1.2 version: GET /mgmt/services
This version always returned the records in an array of JSON objects. The objects did not contain any modification related time stamp information. Interfaces and metadata were part of the service definition entity.

POST /serviceregistry/mgmt/services

Creates service definition record and returns the newly created record.

Service Definition is the input

{
  "serviceDefinition": "string"
}
Field Description Mandatory
serviceDefinition Service Definition yes

Returns a Service Definition

{
  "id": 0,
  "serviceDefinition": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
serviceDefinition Service Definition
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /mgmt/services
In this version interfaces and metadata were part of the service definition entity. The response object did not contain any modification related time stamp information.

GET /serviceregistry/mgmt/services/{id}

Returns the Service Definition record specified by the id path parameter.

Returns a ServiceDefinition

{
  "id": 0,
  "serviceDefinition": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
serviceDefinition Service Definition
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /mgmt/services/{serviceId} The response object did not contain any modification related time stamp information. Interfaces and metadata were part of the service definition entity.

PUT /serviceregistry/mgmt/services/{id}

Updates and returns the modified Service Definition record specified by the ID path parameter.

ServiceDefinition is the input

{
  "serviceDefinition": "string"
}
Field Description Mandatory
serviceDefinition Service Definition yes

Returns a ServiceDefinition

{
  "id": 0,
  "serviceDefinition": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
serviceDefinition Service Definition
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: PUT /mgmt/services/{serviceId}
The response object did not contain any modification related time stamp information. Interfaces and metadata were part of the service definition entity.

PATCH /serviceregistry/mgmt/services/{id}

Updates and returns the modified Service Definition record specified by the ID path parameter.

ServiceDefinition is the input

{
  "serviceDefinition": "string"
}
Field Description Mandatory
serviceDefinition Service Definition no

Returns a ServiceDefinition

{
  "id": 0,
  "serviceDefinition": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
serviceDefinition Service Definition
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: Not existed

DELETE /serviceregistry/mgmt/services/{id}

Removes the service definition record specified by the id path parameter.

Note: 4.1.2 version: DELETE /mgmt/services/{serviceId} This version did return HTTP 404 (Not Found), when record was not found by ID.

GET /serviceregistry/mgmt/systems

Returns a list of System records. If page and item_per_page are not defined, it returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a SystemList

{
  "data": [
    {
      "id": 0,
      "systemName": "string",
      "address": "string",
      "port": 0,
      "authenticationInfo": "string",
      "createdAt": "string",
      "updatedAt": "string"
    }
  ],
  "count": 0
}
Field Description
id ID of the entry
systemName Name of the System
address Address
port Port
authenticationInfo Authentication Info
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /mgmt/systems This version always returned the records in an array of JSON objects. The objects did not contain any modification related time stamp information.

POST /serviceregistry/mgmt/systems

Creates a System record and returns the newly created record.

System is the input

{
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string"
}
Field Description Mandatory
systemName Name of the System yes
address Address yes
port Port yes
authenticationInfo Authentication Info no

Returns a System

{
  "id": 0,
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
systemName Name of the System
address Address
port Port
authenticationInfo Authentication Info
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /mgmt/systems
In this version the response object did not contain any modification related time stamp information.

GET /serviceregistry/systems/{id}

Returns the System record specified by the ID path parameter.

Returns a System

{
  "id": 0,
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
systemName Name of the System
address Address
port Port
authenticationInfo Authentication Info
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /mgmt/systems/{systemId}
In this version the response object did not contain any modification related time stamp information

PUT /serviceregistry/mgmt/systems/{id}

Updates and returns the modified System record specified by the ID path parameter. Not defined fields are going to be updated to "null" value.

System is the input

{
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string"
}
Field Description Mandatory
systemName Name of the System yes
address Address yes
port Port yes
authenticationInfo Authentication Info no

Returns a System

{
  "id": 0,
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
systemName Name of the System
address Address
port Port
authenticationInfo Authentication Info
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: PUT /mgmt/systems/{systemId}
In this version the response object did not contain any modification related time stamp information.

PATCH /serviceregistry/mgmt/systems/{id}

Updates and returns the modified system record specified by the id path parameter. Not defined fields are going to be NOT updated.

System is the input

{
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string"
}
Field Description Mandatory
systemName Name of the System no
address Address no
port Port no
authenticationInfo Authentication Info no

Returns a System

{
  "id": 0,
  "systemName": "string",
  "address": "string",
  "port": 0,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
systemName Name of the System
address Address
port Port
authenticationInfo Authentication Info
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: Not existed

DELETE /serviceregistry/mgmt/systems/{id}

Removes the System record specified by the ID path parameter.

Note: 4.1.2 version: DELETE /mgmt/systems/{systemId}
This version did return HTTP 404 (Not Found), when record was not found by ID.

This System has:

  • A database that describes which Application System can consume what Services from which Application Systems (Intra-Cloud access rules)
  • A database that describes which other Local Clouds are allowed to consume what Services from this Cloud (Inter-Cloud authorization rules)

The purpose of this System is therefore to:

  • Provide AuthorizationControl Service (both intra- and inter-Cloud)
  • Provide a TokenGeneration Service for allowing session control within the Local Cloud

The purpose of the TokenGeneration functionality is to create session control functionality through the Core Sytems. The output is JSON Web Token that validates the Service Consumer system when it will try to access the Service from another Application System (Service Provider). This Token shall be primarily generated during the orchestration process and only released to the Service Consumer when all affected Core Systems are notified and agreed to the to-be-established Service connection.

This System (in line with all core Systems) utilizes the X.509 certificate Common Name naming convention in order to work.

This System only provides two Core Services:

  • AuthorizationControl
  • TokenGeneration

There are two use cases connected to the Authorization System:

  • Check access rights (invoke the AuthorizationControl)
  • Generate an access token (the Orchestrator invokes the TokenGeneration)

Authorization Cross check Figure 1. Authorization crosscheck during orchestration process

The AuthorizationControl Service provides 2 different interfaces to look up authorization rights:

  • Intra-Cloud authorization: defines an authorization right between a consumer and provider system in the same Local Cloud for a specific Service.
  • Inter-Cloud authorization: defines an authorization right for an external Cloud to consume a specific Service from the Local Cloud.

The Authorization offers three types of endpoints. Client, Management and Private.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/authorization

Function URL subpath Method Input Output
Echo /echo GET - OK
Get Public Key /publickey GET - Public Key

These services can only be used by other core services, therefore they are not part of the public API.

Function URL subpath Method Input Output
Check an Intercloud rule /intercloud/check POST InterCloudRule InterCloudResult
Check an Intracloud rule /intracloud/check POST IntraCloudRule IntraCloudResult
Generate Token /token POST TokenRule TokenData

There endpoints are mainly used by the Management Tool and Cloud Administrators.

Function URL subpath Method Input Output
Get all Intracloud rules /mgmt/intracloud GET - IntracloudRuleList
Add Intracloud rules /mgmt/intracloud POST IntracloudRuleForm IntracloudRuleList
Get an Intracloud rule by ID /mgmt/intracloud/{id} GET IntracloudRuleID IntracloudRule
Delete an Intracloud rule by ID /mgmt/intracloud/{id} DELETE IntracloudRuleID -
Get all Intercloud rules /mgmt/intercloud GET - IntercloudRuleList
Add Intercloud rules /mgmt/intercloud POST IntercloudRuleForm IntercloudRuleList
Get an Intercloud rule by ID /mgmt/intercloud/{id} GET IntercloudRuleID IntercloudRuleList
Delete an Intercloud rule by ID /mgmt/intercloud/{id} DELETE IntercloudRuleID -

The following services no longer exist:

  • GET /authorization/mgmt/intracloud/systemId/{systemId}/services
  • GET /authorization/mgmt/intracloud/systemId/{systemId}
  • GET /authorization/mgmt/intracloud/servicedef/{serviceDefinition}
  • PUT /authorization/mgmt/intracloud
  • DELETE /authorization/mgmt/intracloud/systemId/{systemId}
  • GET /authorization/mgmt/intercloud/operator/{operator}/cloudname/{cloudName}/services
  • GET /authorization/mgmt/intercloud/operator/{operator}/cloudname/{cloudName}
  • GET /authorization/mgmt/intercloud/servicedef/{serviceDefinition}
  • PUT /authorization/mgmt/intercloud
  • DELETE /authorization/mgmt/intercloud/operator/{operator}/cloudname/{cloudName}
GET /authorization/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

Note: 4.1.2 version: GET /authorization/mgmt It was only available for the system operator of the local cloud.

GET /authorization/publickey

Returns the public key of the Authorization core service as a (Base64 encoded) text. This service is necessary for providers if they want to utilize the token based security.

Note:: 4.1.2 version: GET /authorization/mgmt/publickey It was only available for system operator of the local cloud.

POST /authorization/intercloud/check

This service can only be used by other core services, therefore is not part of the public API.

Checks whether a Cloud is authorized to use a Service

InterCloudRule is the input

{
  "cloud": {
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ],
    "name": "string",
    "neighbor": true,
    "operator": "string",
    "secure": true
  },
  "providerIdsWithInterfaceIds": [
    {
      "id": 0,
      "idList": [
        0
      ]
    }
  ],
  "serviceDefinition": "string"
}
Field Description Mandatory
cloud Cloud yes
providerIdsWithInterfaceIds Provider IDs with Interface IDs yes

Returns an InterCloudResult

{
  "authorizedProviderIdsWithInterfaceIds": [
    {
      "id": 0,
      "idList": [
        0
      ]
    }
  ],
  "cloud": {
    "authenticationInfo": "string",
    "createdAt": "string",
    "id": 0,
    "name": "string",
    "neighbor": true,
    "operator": "string",
    "ownCloud": true,
    "secure": true,
    "updatedAt": "string"
  },
  "serviceDefinition": "string"
}
Field Description
authorizedProviderIdsWithInterfaceIds Authorized Provider IDs with Interface IDs
cloud Cloud
POST /authorization/intracloud/check

This service can only be used by other core services, therefore is not part of the public API.

Checks whether the consumer System can use a Service from a list of provider Systems

IntraCloudRule is the input

{
  "consumer": {
    "address": "string",
    "authenticationInfo": "string",
    "port": 0,
    "systemName": "string"
  },
  "providerIdsWithInterfaceIds": [
    {
      "id": 0,
      "idList": [
        0
      ]
    }
  ],
  "serviceDefinitionId": 0
}
Field Description Mandatory
consumer Consumer yes
providerIdsWithInterfaceIds Provider IDs with Interface IDs yes
serviceDefinitionId Service Definition ID yes

Returns a IntraCloudResult

{
  "authorizedProviderIdsWithInterfaceIds": [
    {
      "id": 0,
      "idList": [
        0
      ]
    }
  ],
  "consumer": {
    "address": "string",
    "authenticationInfo": "string",
    "createdAt": "string",
    "id": 0,
    "port": 0,
    "systemName": "string",
    "updatedAt": "string"
  },
  "serviceDefinitionId": 0
}
Field Description
authorizedProviderIdsWithInterfaceIds Authorized Provider IDs with Interface IDs
consumer Consumer
serviceDefinitionId Service Definition ID
POST /authorization/token

This service can only be used by other core services, therefore is not part of the public API.

Generates a JWT for Authentication

TokenRule is the input

{
  "consumer": {
    "address": "string",
    "authenticationInfo": "string",
    "port": 0,
    "systemName": "string"
  },
  "consumerCloud": {
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ],
    "name": "string",
    "neighbor": true,
    "operator": "string",
    "secure": true
  },
  "duration": 0,
  "providers": [
    {
      "provider": {
        "address": "string",
        "authenticationInfo": "string",
        "port": 0,
        "systemName": "string"
      },
      "serviceInterfaces": [
        "string"
      ]
    }
  ],
  "service": "string"
}
Field Description Mandatory
consumer Consumer yes
consumerCloud Cloud of the Consumer yes
duration Validity duration of the Token yes
providers Providers yes
service Service yes

Returns a TokenData

{
  "tokenData": [
    {
      "providerAddress": "string",
      "providerName": "string",
      "providerPort": 0,
      "tokens": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      }
    }
  ]
}
Field Description
tokenData Token Data

###Get all Intracloud rules

GET /authorization/mgmt/intracloud

Returns a list of Intracloud authorization records. If page and item_per_page are not defined, it returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns an IntracloudRuleList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count number of records
data An array containing the data
id ID of the entry
consumerSystem Consumer System
providerSystem Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: Authorization is a little stricter than before: the access now depends on specific interfaces besides provider and service.

Note: 4.1.2 version: GET /authorization/mgmt/intracloud
This version always returned all records in an array of JSON objects. The objects did not contain any time information. Access didn't depend on interface.

POST /authorization/mgmt/intracloud

Creates Intracloud authorization rules and returns the newly created rules.

IntracloudRuleForm is the input

{
  "consumerId": 0,
  "providerIds": [
    0
  ],
  "interfaceIds": [
    0
  ],
  "serviceDefinitionIds": [
    0
  ]
}

Note: This is a very general stucture, however only two possible combinations are allowed:

  • One provider ID, one interface ID with multiple service definition IDs
  • Multiple provider IDs, multiple interface IDs with one service definition ID.
Field Description Mandatory
consumerId ID of the consumer yes
providerIds IDs of the providers yes
interfaceIds IDs of the interfaces yes
serviceDefinitionIds IDs of the Service Definitions yes

Returns an IntracloudRuleList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count number of records
data An array containing the data
id ID of the entry
consumerSystem Consumer System
providerSystem Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /authorization/mgmt/intracloud
This version required whole JSON objects as consumer, provider and service instead of ids and didn't use interface restrictions.

GET /authorization/mgmt/intracloud/{id}

Returns the Intracloud related authorization rule specified by the ID path parameter.

Returns an IntraCloudRule

{
  "id": 0,
  "consumerSystem": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "providerSystem": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "interfaces": [
    {
      "id": 0,
      "interfaceName": "string",
      "createdAt": "string",
      "updatedAt": "string"
    }
  ],
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the entry
consumerSystem Consumer System
providerSystem Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /authorization/mgmt/intracloud/{id}
The returned structure did not contain time information and interface restrictions

DELETE /authorization/mgmt/intracloud/{id}

Removes the Intracloud related authorization rule specified by the ID path parameter.

Note: 4.1.2 version: DELETE /authorization/mgmt/intracloud/{id} Same the new version.

GET authorization/mgmt/intercloud

Returns a list of Intercloud related authorization rules. If page and item_per_page are not defined, it returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns an IntercloudRuleList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "cloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": true,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count number of records
data An array containing the data
id ID of the entry
cloud Cloud information
provider Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: Authorization is stricter than before: the access now depends on specific provider and interfaces besides service.

Note: 4.1.2 version: GET /authorization/mgmt/intercloud
This version always returned all records in an array of JSON objects. The objects did not contain any time information. Access didn't depend on provider and interface.

POST /authorization/mgmt/intercloud

Creates Intercloud authorization rules and returns the newly created rules.

Input is IntercloudRuleForm

{
  "cloudId": 0,
  "providerIdList": [
    0
  ],
  "interfaceIdList": [
    0
  ],
  "serviceDefinitionIdList": [
    0
  ]
}

Note: This is a very general stucture, however only two possible combinations are allowed:

  • One provider ID, one interface ID with multiple service definition IDs
  • Multiple provider IDs, multiple interface IDs with one service definition ID.
Field Description Mandatory
cloudId ID of the Cloud yes
providerIds IDs of the providers yes
interfaceIds IDs of the interfaces yes
serviceDefinitionIds IDs of the Service Definitions yes

Returns an IntercloudRuleList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "cloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": true,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count number of records
data An array containing the data
id ID of the entry
cloud Cloud information
provider Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /authorization/mgmt/intercloud
This version required whole JSON objects as consumer cloud and service instead of ids and didn't use provider and interface restrictions.

GET /authorization/mgmt/intercloud/{id}

Returns the Intercloud related authorization record specified by the ID path parameter.

Returns an IntercloudRuleList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "cloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": true,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count number of records
data An array containing the data
id ID of the entry
cloud Cloud information
provider Provider System
serviceDefinition Service Definition
interfaces Interfaces
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /authorization/mgmt/intercloud/{id}
The returned structure did not contain time information, provider and interface restrictions.

Removes the Intercloud related authorization record specified by the ID path parameter.

Note: 4.1.2 version: DELETE /authorization/mgmt/intercloud/{id} Same as the new version.

The Orchestrator provides runtime (late) binding between Application Systems.

The primary purpose for the Orchestrator System is to provide Application Systems with orchestration information: where they need to connect to. The outcome of the "Orchestration Service" include rules that will tell the Application System what Service provider System(s) it should connect to and how (acting as a Service Consumer). Such orchestration rules include:

  • Accessibility information details of a Service provider (e.g network address and port),
  • Details of the Service instance within the provider System (e.g. base URL, IDD specification and other metadata),
  • Authorization-related information (e.g. access token and signature),
  • Additional information that is necessary for establishing connection.

This orchestration rule information can reach the given Application System (consumer) in two different ways: the System itself can request it ("pull") or the Orchestrator itself can update the System when it is needed ("push method"). However, in both cases, there shall be an underlying, hidden process ("orchestration process"), which ensures the consistence of state between the various Core Systems.

In G4.0, only the pull method is implemented and the Orchestrator shall negotiate with the other Core Systems while trying to facilitate the new service request (or trying to push a new status). This is necessary for the following cases and requirements (basically, when ad hoc, unsupervised connections are not allowed):

  • When accountability is required for all Systems in the Local Cloud: connections cannot be established without the knowledge, approval and logged orchestration events of the Core Systems ("central governance").
  • QoS and resource management reasons: ad hoc peer-to-peer connections cannot be allowed in certain managed networks and deployment scenarios. Every connection attempt shall be properly authorized and its QoS expectations (resource reservations) handled.
  • Inter-Cloud orchestration can only happen via negotiations between the two Core System sets. Ad hoc inter-cloud connections shall not be allowed in the Arrowhead framework.

In these cases, when the Orchestrator is the sole entry point to establishing new connections within the Local Cloud, Application Systems do not have the possibility to skip any of the control loops with all the appropriate Core Systems. When such security and safety concerns are not present, the orchestration process might be cut back or these interactions between Core Systems might be limited. Within G4.0, this is not the primary use case, but it is allowed. With the proper self-implemented (modified) and a self-compiled Orchestrator can fit the deployment best.

Therefore, the Orchestrator provides two core Services and may consume many other ones, but at least two -- again, depending on its deployment. This figure depicts the mandatory and optional interfaces of this System.

Overview of the Orchestrator

In here, the provided Services are:

  • Orchestration Service
  • OrchestrationStoreManagement Service

Meanwhile the consumed Services can vary, depending on the instantiation/installation of this System. For example, the Orchestrator can utilize the services of:

  • ServiceDiscovery Service from the ServiceRegistry,
  • AuthorizationControl Service from the Authorization System,
  • TokenGeneration Service from the Authorization System,
  • GlobalServiceDiscovery from the Gatekeeper,
  • Inter-CloudNegotiations from the Gatekeeper,
  • QoSVerify from the QoS Manager,
  • QoSReserve from the QoS Manager,
  • Logging services from other supporting Systems, e.g. Historian,
  • and any other service from Core Systems that are necessary to settle during orchestration.

The Orchestrator mainly consumes services from other Core Systems in order to fulfil its primary functionality: provide connection targets for Application Systems in a secure and resource managed manner -- hence build an SoS.

During this orchestration process the Orchestrator either facilitates a service request from an Application System or processes a system-of-systems (SoS) level choreography push from the Plant Description Engine ("Choreographer"). For the latter case, the Orchestrator System consumes the OrchestrationPush from affected Application Systems in order to deliver a renewed set of connection rules to them.

Within the Orchestrator, there is a database which captures design time bindings between Application Systems, the Orchestration Store. Operators of the Cloud and other System-of-Systems designer tools ("SoS Choreographers") are allowed to modify the rules stored in the Orchestration Store, other generic Application Systems are not.

The ServiceDiscovery Service is used to publish the Orchestration Service in the Service Registry. This Service is also used to query the Service Registry and fetch (metadata) information on other Application Systems.

The Services of the Authorization System can be used to verify access control and implement other security-related administration tasks.

The Services of the Gatekeeper can be utilized when inter-Cloud collaboration, servicing is required.

The Services of the QoS management System can be used to manage device, network and service-level Quality of Service agreements and configurations.

Orchestrator can be used in two ways. The first one uses predefined rules (coming from the Orchestrator Store DB) to find the appropriate providers for the consumer. The second option is the dynamic orchestration in which case the core service searches the whole local cloud (and maybe some other clouds) to find matching providers.

Store Orchestration:

  • requester system is mandatory,
  • requested service and all the other parameters are optional,
  • if requested service is not specified, then this service returns the top priority local provider of all services contained by the orchestrator store database for the requester system. if requested service is specified, then you have to define the service definition and exactly one interface (all other service requirements are optional). In this case, it returns all accessible providers from the orchestrator store database that provides the specified service via the specified interface to the specified consumer.

Dynamic Orchestration:

  • requester system is mandatory,
  • requested service is mandatory, but just the service definition part, all other parameters of the requested service are optional,
  • all other parameters are optional

Orchestration flags:

  • matchmaking: the service automatically selects exactly one provider from the appropriate providers (if any),
  • metadataSearch: query in the Service Registry uses metadata filtering,
  • onlyPreferred: the service filters the results with the specified provider list,
  • pingProviders: the service checks whether the returning providers are online and remove the unaccessible ones from the results,
  • overrideStore: Services uses dynamic orchestration if this flag is true, otherwise it uses the orchestration store,
  • enableInterCloud: the service can search another clouds for providers if none of the local cloud providers match the requirements,
  • triggerInterCloud: the service skipped the search in the local cloud and tries to find providers in other clouds instead.

For the Orchestrator System, the primary scenario is to provide Application Systems with orchestration information upon request (Service Request). The outcome (Orchestration Response) include orchestration rules that will tell the Application System what service provider(s) it should connect to and how.

An alternative, secondary version of this scenario involves the same information, however, provided by a connection initialized by the Orchestrator, rather than the Application Service itself ("orchestration push"). This is used to relay changes made in the Orchestration Store to the Application Systems ("changes information exchange setup within the SoS").

Another scenario is when the Orchestration Store (that stores design time orchestration-related information) of the Orchestrator is being configured via an HMI or via the Plant Description Engine (SoS Choreographer) by the operators of the Local Cloud.

Use case 1: Service Request From Application System

Name Description
ID Orchestration Pull
Brief Description An Application System requests a Service
Primary Actors Service Consumer System
Secondary Actors - the other Core System instances of the Local Cloud
- the Core Systems instance of another Local Cloud (in case of inter-Cloud orchestration)
Preconditions -
Main Flow - The Application System requests orchestration.
- The Orchestrator System begins the orchestration process with the other Core Systems.
- The Orchestrator System responds to the Application System based on the request.
Postconditions -

Use case 2: Orchestration information pushed to Application System

Name Description
ID Orchestration Push
Brief Description The Orchestrator pushes new information on Application Systems
Primary Actors Orchestrator
Secondary Actors the other Core Systems instances of the Local Cloud
Preconditions Change in the Orchestration Store.
Main flow - The Orchestrator detects a change in the Orchestration Store.
- The Orchestrator begins the orchestration process with the other Core Systems for every change in the Store.
- The orchestrator pushes new connection rules to the Application Systems based on the new Store entry.
Postconditions -

Use case 3: Orchestration information pushed to Application System

Name Description
ID Orchestration Push
Brief Description The Orchestrator pushes new information on Application Systems
Primary Actors Orchestrator
Secondary Actors the other Core Systems instances of the Local Cloud
Preconditions Change in the Orchestration Store.
Main flow - The Orchestrator detects a change in the Orchestration Store.
- The Orchestrator begins the orchestration process with the other Core Systems for every change in the Store.
- The orchestrator pushes new connection rules to the Application Systems based on the new Store entry.
Postconditions -

The Orchestrator offers three types of endpoints. Client, Management and Private.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/orchestrator

Function URL subpath Method Input Output
Echo /echo GET - OK
Orchestration /orchestration POST ServiceRequestForm Orchestration Response
Start store Orchestration by ID /orchestration/{id} GET StoreEntryID Orchestration Response

These services can only be used by other core services, therefore they are not part of the public API.

Function URL subpath Method Input Output

There endpoints are mainly used by the Management Tool and Cloud Administrators.

Function URL subpath Method Input Output
Get all Store Entries /mgmt/store GET - StoreEntryList
Add Store Entries /mgmt/store POST StoreRules StoreEntryList
Get Store Entry by ID /mgmt/store/{id} GET StoreEntryID StoreEntry
Delete Store Entry by ID /mgmt/store/{id} DELETE StoreEntryID -
Get Entries by Consumer /mgmt/store/
all_by_consumer
POST ConsumerRule StoreEntryList
Get Top Priority Entries /mgmt/store/
all_top_priority
GET - StoreEntryList
Modify Priorities /mgmt/store/
modify_priorities
POST PriorityList -

The following services no longer exist:

  • GET /orchestrator/mgmt/store/default/{id}
  • PUT /orchestrator/mgmt/store/update/{id}
  • DELETE /orchestrator/mgmt/store/consumerId/{systemId}
GET /orchestrator/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

Note: 4.1.2 version: GET /orchestrator/orchestration It was basically the same with a slightly different return message

POST /orchestrator/orchestration

Initializes the orchestration process in which the Orchestrator Core System tries to find providers that match the specified requirements (and the consumer have right to use them).

ServiceRequestForm is the input

{
  "requesterSystem": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "requestedService": {
    "serviceDefinitionRequirement": "string",
    "interfaceRequirements": [
      "string"
    ],
    "securityRequirements": [
      "NOT_SECURE", "CERTIFICATE", "TOKEN"
    ],
    "metadataRequirements": {
      "additionalProp1": "string",
      "additionalProp2": "string",
      "additionalProp3": "string"
    },
    "versionRequirement": 0,
    "maxVersionRequirement": 0,
   "minVersionRequirement": 0
  },
  "preferredProviders": [
    {
      "providerCloud": {
        "operator": "string",
        "name": "string"
      },
      "providerSystem": {
        "systemName": "string",
        "address": "string",
        "port": 0
      }
    }
  ],
  "orchestrationFlags": {
    "additionalProp1": true,
    "additionalProp2": true,
    "additionalProp3": true
  }
}
Field Description Mandatory
requesterSystem Requester System yes
requestedService Requested Service no
preferredProviders Preferred Providers no
orchestrationFlags Orchestration Flags no

Orchestrator can be used in two ways. The first one uses predefined rules (coming from the Orchestrator Store DB) to find the appropriate providers for the consumer. The second option is the dynamic orchestration in which case the core service searches the whole local cloud (and maybe some other clouds) to find matching providers.

  • requester system is mandatory,
  • requested service and all the other parameters are optional,
  • if requested service is not specified, then this service returns the top priority local provider of all services contained by the orchestrator store database for the requester system. if requested service is specified, then you have to define the service definition and exactly one interface (all other service requirements are optional). In this case, it returns all accessible providers from the orchestrator store database that provides the specified service via the specified interface to the specified consumer.
Field Description Mandatory
requesterSystem Requester System yes
requestedService Requested Service no
preferredProviders Preferred Providers no
orchestrationFlags Orchestration Flags no

Dynamic Orchestration:

  • requester system is mandatory,
  • requested service is mandatory, but just the service definition part, all other parameters of the requested service are optional,
  • all other parameters are optional
Field Description Mandatory
requesterSystem Requester System yes
requestedService Requested Service yes
preferredProviders Preferred Providers no
orchestrationFlags Orchestration Flags no

Orchestration flags:

  • matchmaking: the service automatically selects exactly one provider from the appropriate providers (if any),
  • metadataSearch: query in the Service Registry uses metadata filtering,
  • onlyPreferred: the service filters the results with the specified provider list,
  • pingProviders: the service checks whether the returning providers are online and remove the unaccessible ones from the results,
  • overrideStore: Services uses dynamic orchestration if this flag is true, otherwise it uses the orchestration store,
  • enableInterCloud: the service can search another clouds for providers if none of the local cloud providers match the requirements,
  • triggerInterCloud: the service skipped the search in the local cloud and tries to find providers in other clouds instead.

Returns an Orchestration Response

{
  "response": [
    {
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "service": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceUri": "string",
      "secure": "TOKEN",
      "metadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },  
      "interfaces": [
        {
          "id": 0,
          "createdAt": "string",
          "interfaceName": "string",
          "updatedAt": "string"
        }
      ],
      "version": 0,
      "authorizationTokens": {
        "interfaceName1": "token1",
        "interfaceName2": "token2"
      },
      "warnings": [
        "FROM_OTHER_CLOUD", "TTL_UNKNOWN"
      ]
    }
  ]
}
Field Description
resposne Array containing the data
provider Provider System
service Service
serviceUri URI of the Service
secure Security info
metadata Metadata
interfaces List of the interfaces the Service supports
version Version of the Service
authorizationTokens Authorization Tokens
warnings Warnings

Note: authorizationTokens object only appears if the provider requires token authentication, authorizationTokens is interface-specific

Note: warnings array can contains the following texts:

  • FROM_OTHER_CLOUD (if the provider is in an other cloud)
  • TTL_EXPIRED (the provider is no longer accessible)
  • TTL_EXPIRING (the provider will be inaccessible in a matter of minutes),
  • TTL_UNKNOWN (the provider does not specified expiration time)

Note: 4.1.2 version: POST /orchestrator/orchestration
It was basically the same, however security requirement was not available.

Alt text

Start store Orchestration by ID

GET /orchestrator/orchestration/{id}

If the consumer knows its' ID, it can used this service as shortcut for store-based orchestration when the service returns the top priority local provider of all services contained by the orchestrator store database for the requester system (identified by the ID)

Returns an Orchestration Response

{
  "response": [
    {
      "provider": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "service": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceUri": "string",
      "secure": "TOKEN",
      "metadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },  
      "interfaces": [
        {
          "id": 0,
          "createdAt": "string",
          "interfaceName": "string",
          "updatedAt": "string"
        }
      ],
      "version": 0,
      "authorizationTokens": {
        "interfaceName1": "token1",
        "interfaceName2": "token2"
      },
      "warnings": [
        "FROM_OTHER_CLOUD", "TTL_UNKNOWN"
      ]
    }
  ]
}
Field Description
resposne Array containing the data
provider Provider System
service Service
serviceUri URI of the Service
secure Security info
metadata Metadata
interfaces List of the interfaces the Service supports
version Version of the Service
authorizationTokens Authorization Tokens
warnings Warnings

Note: authorizationTokens object only appears if the provider requires token authentication, authorizationTokens is interface-specific

Note: warnings array can contains the following texts:

  • FROM_OTHER_CLOUD (if the provider is in an other cloud)
  • TTL_EXPIRED (the provider is no longer accessible)
  • TTL_EXPIRING (the provider will be inaccessible in a matter of minutes),
  • TTL_UNKNOWN (the provider does not specified expiration time)

Alt text

Get all Store Entries

GET /orchestrator/mgmt/store

Returns a list of orchestrator store rule records. If page and item_per_page are not defined, returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a StoreEntryList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "foreign": true,
      "providerCloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": false,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceInterface": {
        "id": 0,
        "interfaceName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "priority": 1,
      "attribute": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of records found
data Array of data
id ID of the Store Entry
serviceDefinition Service Definition
consumerSystem Consumer System
foreign Provider System in Foreign Cloud
providerCloud Provider Cloud
providerSystem Provider System
serviceInterface Service Interface
priority Priority
metadata Metadata
attribute Attributes
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: Rules are a little stricter than before: the service interface is also part of it. But the defaultEntry flag is no longer supported; now, entries with priority 1 is considered as defaults.

Note: 4.1.2 version: GET /orchestrator/mgmt/store/all
This version always returned all records in an array of JSON objects. The objects did not contain any time information. Rules didn't depend on interface.

POST /orchestrator/mgmt/store

Creates Orchestrator Store records and returns the newly created records.

StoreRules is the input

[
  {
    "serviceDefinitionName": "string",
    "consumerSystemId": 0,
    "attribute": {
      "additionalProp1": "string",
      "additionalProp2": "string",
      "additionalProp3": "string"
    },
    "providerSystem": {
      "systemName": "string",
      "address": "string",
      "port": 0
    },
    "cloud": {
      "operator": "string",
      "name": "string"
    },
    "serviceInterfaceName": "string",
    "priority": 1
  }
]
Field Description Mandatory
serviceDefinitionName Service Definition yes
consumerSystemId Consumer System ID yes
attribute Attributes no
providerSystem Provider System yes
cloud Cloud yes
serviceInterfaceName Service Interface Name yes
priority Priority yes

Returns a StoreEntryList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "foreign": true,
      "providerCloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": false,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceInterface": {
        "id": 0,
        "interfaceName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "priority": 1,
      "attribute": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of records found
data Array of data
id ID of the Store Entry
serviceDefinition Service Definition
consumerSystem Consumer System
foreign Provider System in Foreign Cloud
providerCloud Provider Cloud
providerSystem Provider System
serviceInterface Service Interface
priority Priority
metadata Metadata
attribute Attributes
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: POST /orchestrator/mgmt/store<br/ > This version required whole JSON objects as consumer instead of id and didn't contains interface names. Also, it used defaultEntry flags.

GET /orchestrator/mgmt/store/{id}

Returns the orchestrator store rule record specified by the ID path parameter.

{
  "id": 0,
  "serviceDefinition": {
    "id": 0,
    "serviceDefinition": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "consumerSystem": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "foreign": true,
  "providerCloud": {
    "id": 0,
    "operator": "string",
    "name": "string",
    "authenticationInfo": "string",
    "secure": true,
    "neighbor": true,
    "ownCloud": false,
    "createdAt": "string",
    "updatedAt": "string"
  },
  "providerSystem": {
    "id": 0,
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "serviceInterface": {
    "id": 0,
    "interfaceName": "string",
    "createdAt": "string",
    "updatedAt": "string"
  },
  "priority": 1,
  "attribute": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the Store Entry
serviceDefinition Service Definition
consumerSystem Consumer System
foreign Provider System in Foreign Cloud
providerCloud Provider Cloud
providerSystem Provider System
serviceInterface Service Interface
priority Priority
metadata Metadata
attribute Attributes
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /orchestrator/mgmt/store/{id}
The returned structure did not contain time information and interface names

DELETE /orchestrator/mgmt/store/{id}

Removes the Orchestrator Store rule record specified by the ID path parameter.

Note: 4.1.2 version: DELETE /orchestrator/mgmt/store/{id}
Same as the new version.

GET /orchestrator/mgmt/store/all_by_consumer

Returns a list of Orchestrator Store rule records related to consumer, service definition and optionally service interface. If page and item_per_page are not defined, no paging is involved.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

ConsumerRule is the input

{
 "consumerSystemId": 0,
 "serviceDefinitionName": "string",
 "serviceInterfaceName": "string"
}
Field Description Mandatory
consumerSystemId ID of the Consumer yes
serviceDefinitionName Service Definition yes
serviceInterfaceName Service Interface no

Returns a StoreEntryList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "foreign": true,
      "providerCloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": false,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceInterface": {
        "id": 0,
        "interfaceName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "priority": 1,
      "attribute": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of records found
data Array of data
id ID of the Store Entry
serviceDefinition Service Definition
consumerSystem Consumer System
foreign Provider System in Foreign Cloud
providerCloud Provider Cloud
providerSystem Provider System
serviceInterface Service Interface
priority Priority
metadata Metadata
attribute Attributes
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: PUT /orchestrator/mgmt/store
This version always returned all matching records in an array of JSON objects. The objects did not contain any time information and filtering by interface name was not available.

GET /orchestrator/mgmt/store/all_top_priority

Returns a list of orchestrator store rule records whose priority is 1. If page and item_per_page are not defined, no paging is involved.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a StoreEntryList

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "serviceDefinition": {
        "id": 0,
        "serviceDefinition": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "consumerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "foreign": true,
      "providerCloud": {
        "id": 0,
        "operator": "string",
        "name": "string",
        "authenticationInfo": "string",
        "secure": true,
        "neighbor": true,
        "ownCloud": false,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "providerSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "serviceInterface": {
        "id": 0,
        "interfaceName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "priority": 1,
      "attribute": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of records found
data Array of data
id ID of the Store Entry
serviceDefinition Service Definition
consumerSystem Consumer System
foreign Provider System in Foreign Cloud
providerCloud Provider Cloud
providerSystem Provider System
serviceInterface Service Interface
priority Priority
metadata Metadata
attribute Attributes
createdAt Creation date of the entry
updatedAt When the entry was last updated

Note: 4.1.2 version: GET /orchestrator/mgmt/store/all_default
This version always returned all records where defaultEntry flag is true in an array of JSON objects. The objects did not contain any time information.

POST /orchestrator/mgmt/store/modify_priorities

Changes the priority field of the specified entries.

PriorityList is the input

{
  "priorityMap": {
    "{id1}": 1,
    "{id2}": 2,
    "{id3}": 3
 }
}
Field Description Mandatory
priorityMap Priority List yes

Note: The keys of the map are Orcherstrator store rule IDs, the values are the new priorities.

Note: 4.1.2 version: PUT /orchestrator/mgmt/store/priorities
Same as the new version

The purpose of Event Handler supporting core system is providing authorized publish-subscribe messaging system to the Arrowhead Framework.

#1589F0 AH Service Registry #f03c15 AH Authorization #c5f015 AH Orchestrator #ffcc44 AH Event Handler Alt text

Alt text

The Event Handler provides the following services:

The Event Handler consumes the following services:

  • CheckAuthorizationSubscription private service from the Authorization core system
  • Notification service from the subscriber client system

The Event Handler has the following use cases:

Function URL subpath Method Input Output
Echo /echo GET - OK
Subscribe /subscribe POST - OK
Unsubscribe /unsubscribe DELETE - OK
Publish /publish POST - OK
Function URL subpath Method Input Output
Get subscriptions /mgmt/subscriptions GET direction && item_per_page && page && sort_field Subscription list response
Get subscription by id /mgmt/subscriptions/{id} GET id Subscription response
Update subscription /mgmt/subscriptions/{id} PUT id && Subscription request Subscription response
Delete subscription /mgmt/subscriptions/{id} DELETE id OK
Function URL subpath Method Input Output
AuthorizationUpdate /publish/authupdate POST - OK
GET /eventhandler/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

POST /eventhandler/subscribe

Creates a subscription record specified by parameters.

SubscriptionRequest is the input.

{
  "eventType": "string",
  "filterMetaData": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "matchMetaData": true,
  "notifyUri": "string",
  "sources": [
    {
      "systemName": "string",
      "address": "string",
      "authenticationInfo": "string",
      "port": 0
    }
  ],
  "startDate": "string",
  "endDate": "string",
  "subscriberSystem": {
    "systemName": "string",
    "address": "string",
    "authenticationInfo": "string",
    "port": 0
  }
}
SubscriptionRequest fields
Field Description Necessity Format/Limitations
eventType Type of event to subscribe to mandatory max. length = 255
filterMetaData The received event has to contain all the "key - value" pairs defined here optional max.length = 65535
matchMetaData A flag to turn on/off metadata filtering mandatory true or false
notifyUri Url subpath of the subscriber system's notification endpoint mandatory max.length = 65535
sources List of publisher systems optional (if not defined or empty, all publishers will be able to send requests which are authorized and allowed by the other filtering options ) not defined
startDate If startDate is defined, the subscriber system will only receive events when the event's timestamp is after startDate. optional ( StartDate must be after the current date/time. ) UTC time in yyyy-MM-dd HH:mm:ss format
endDate If endDate is defined, the subscriber system will only receive events when the event's timestamp is before endDate. optional ( EndDate must be after the current date/time. If startDate is defined endDate must be after startDate. ) UTC time in yyyy-MM-dd HH:mm:ss format
subscriberSystem Details of subscriber system mandatory as in system
System fields
Field Description Necessity Format/Limitations
systemName The name of the system. mandatory max. length = 255
address Domain name or IP of the system. mandatory max. length = 255
authenticationInfo Public key of the system. optional single line string without the "-----BEGIN PUBLIC KEY-----" prefix and the "-----END PUBLIC KEY-----" suffix
port The port where the system provides services mandatory max.length = defined by local cloud operator ( default valid range: 1-65535 )

SubscriptionRequest output:

{
        "id": 0,
        "eventType": {
        "eventTypeName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "filterMetaData": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "id": 0,
      "matchMetaData": true,
      "notifyUri": "string",
      "sources": [
        {
          "id": 0,
          "systemName": "string",
          "address": "string",
          "authenticationInfo": "string",
          "port": 0,
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "startDate": "string",
      "endDate": "string",
      "subscriberSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "authenticationInfo": "string",
        "port": 0,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
DELETE /eventhandler/unsubscribe

Removes the subscription record specified by parameters.

Unsubscribe query parameters are the input : https://eventhandler_ip:unsubscribe_port/eventhandler/unsubscribe?address=192.168.0.1&event_type=EVENT_TYPE_1&port=9009&system_name=test_consumer`

Unsubscribe query parameters
Parameter Description Necessity Format/Limitations
address Domain name or IP of the system. mandatory max. length = 255
event_type Type of event to subscribe to mandatory max. length = 255
port The port where the system provides services mandatory max.length = defined by local cloud operator ( default valid range: 1-65535 )
system_name The name of the system. mandatory max. length = 255
POST /eventhandler/publish

Start the publishing process to deliver the event to the subscribers.

PublishRequest is the input:

{
  "eventType": "string",
  "metaData": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "payload": "string",
  "source": {
    "address": "string",
    "authenticationInfo": "string",
    "port": 0,
    "systemName": "string"
  },
  "timeStamp": "string"
}
PublishRequest fields
Field Description Necessity Format/Limitations
eventType Type of event. mandatory max. length = 255
metaData The "key - value" pairs for event filtering. optional max.length = 65535
payload String representation of the event. mandatory not defined
source Details of the publisher system. mandatory as in system
timestamp The time of publishing mandatory UTC time in yyyy-MM-dd HH:mm:ss format
System fields
Field Description Necessity Format/Limitations
systemName The name of the system. mandatory max. length = 255
address Domain name or IP of the system. mandatory max. length = 255
authenticationInfo Public key of the system. optional single line string without the "-----BEGIN PUBLIC KEY-----" prefix and the "-----END PUBLIC KEY-----" suffix
port The port where the system provides services mandatory max.length = defined by local cloud operator ( default valid range: 1-65535 )
GET /mgmt/eventhandler/subscriptions

Get subscriptions query parameters the input :

https://eventhandler_ip:eventhandler_port/eventhandler/mgmt/subscriptions?dirction=ASC&item_per_page=100&page=0&sort_field=id

Get subscriptions query parameters
Parameter Description Necessity Format/Limitations
direction Direction of sorting. optional valid values: "ASC", "DESC" - default: "ASC"
item_per_page Maximum number of items returned. optional (mandatory, if page is defined) integer
page Zero based page index. optional (mandatory, if item_per_page is defined) integer
sort_field The field to sort the results by. optional valid values: "id", "updatedAt", "createdAt" - default: "id"

Get subscriptions query parameters the output :

{
  "count": 0,
  "data": [
    {
        "id": 0,
        "eventType": {
        "eventTypeName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "filterMetaData": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "id": 0,
      "matchMetaData": true,
      "notifyUri": "string",
      "sources": [
        {
          "id": 0,
          "systemName": "string",
          "address": "string",
          "authenticationInfo": "string",
          "port": 0,
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "startDate": "string",
      "endDate": "string",
      "subscriberSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "authenticationInfo": "string",
        "port": 0,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
GET /mgmt/eventhandler/subscriptions/{id}

Get subscriptions query parameters the input :

https://eventhandler_ip:eventhandler_port/eventhandler/mgmt/subscriptions/1

Get subscription by id path parameter
Parameter Description Necessity Format/Limitations
id Id of subscription mandatory integer

Get subscription by id the output :

    {
        "id": 0,
        "eventType": {
        "eventTypeName": "string",
        "createdAt": "string",
        "updatedAt": "string"
      },
      "filterMetaData": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "id": 0,
      "matchMetaData": true,
      "notifyUri": "string",
      "sources": [
        {
          "id": 0,
          "systemName": "string",
          "address": "string",
          "authenticationInfo": "string",
          "port": 0,
          "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "startDate": "string",
      "endDate": "string",
      "subscriberSystem": {
        "id": 0,
        "systemName": "string",
        "address": "string",
        "authenticationInfo": "string",
        "port": 0,
        "createdAt": "string",
        "updatedAt": "string"
      },
      "createdAt": "string",
      "updatedAt": "string"
    }
PUT /mgmt/eventhandler/subscriptions/{id}

Update subscription request the input :

https://eventhandler_ip:eventhandler_port/eventhandler/mgmt/subscriptions/1

Update subscription path parameter
Parameter Description Necessity Format/Limitations
id Id of subscription mandatory integer
{
  "eventType": "string",
  "filterMetaData": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "matchMetaData": true,
  "notifyUri": "string",
  "sources": [
    {
      "systemName": "string",
      "address": "string",
      "authenticationInfo": "string",
      "port": 0
    }
  ],
  "startDate": "string",
  "endDate": "string",
  "subscriberSystem": {
    "systemName": "string",
    "address": "string",
    "authenticationInfo": "string",
    "port": 0
  }
}
SubscriptionRequest fields
Field Description Necessity Format/Limitations
eventType Type of event to subscribe to mandatory max. length = 255
filterMetaData The received event has to contain all the "key - value" pairs defined here optional max.length = 65535
matchMetaData A flag to turn on/off metadata filtering mandatory true or false
notifyUri Url subpath of the subscriber system's notification endpoint mandatory max.length = 65535
sources List of publisher systems optional (if not defined or empty, all publishers will be able to send requests which are authorized and allowed by the other filtering options ) not defined
startDate If startDate is defined, the subscriber system will only receive events when the event's timestamp is after startDate. optional ( StartDate must be after the current date/time. ) UTC time in yyyy-MM-dd HH:mm:ss format
endDate If endDate is defined, the subscriber system will only receive events when the event's timestamp is before endDate. optional ( EndDate must be after the current date/time. If startDate is defined endDate must be after startDate. ) UTC time in yyyy-MM-dd HH:mm:ss format
subscriberSystem Details of subscriber system mandatory as in system
DELETE /mgmt/eventhandler/subscriptions/{id}

Delete subscription parameters the input :

https://eventhandler_ip:eventhandler_port/eventhandler/mgmt/subscriptions/1

Get subscription by id path parameter
Parameter Description Necessity Format/Limitations
id Id of subscription mandatory integer

This service can only be used by other core services, therefore this is not part of the public API.

The purpose of DataManager supporting core system is to provide storage of sensor data.

The DataManager provides features for producers and consumers to:

  • Store SenML sensor and actuator data,
  • Fetch cached data,
  • and perform database queries.

Type support data model is SenML https://tools.ietf.org/html/rfc8428

The DataManager provides the following services:

The DataManager consumes the following services:

None currently, but will consume Orchestration later on.

The DataManager has the following use cases:

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/datamanager

Function URL subpath Method Input Output
Echo /echo GET - OK
Get system list /historian GET - SystemList
Get service list /historian/{systemName} GET - ServiceList
Fetch data from db /historian/{systemName}/{serviceName} GET - SenML
Store data in db /historian/{systemName}/{serviceName} PUT SenML -
Get system list /proxy GET - SystemList
Get service list /proxy/{systemName} GET - ServiceList
Fetch data from cache /proxy/{systemName}/{serviceName} GET - SenML
Store data in cache /proxy/{systemName}/{serviceName} PUT SenML -
GET /datamanager/echo

Returns a "Got it!" message with the purpose of testing the system availability.

GET /datamanager/proxy/

Returns a list of all systems that have at least one active service endpoint.

GetSystemListResponse output:

{
  "systems": ["systemName1", "systemNameX"]
}
GET /datamanager/proxy/{systemName}

Returns a list of all service endpoints that are active.

GetServicesResponse output:

{
  "services": ["serviceDefinition1", "serviceDefinitionX"]
}
GET /datamanager/proxy/{systemName}/{serviceName}

Returns sensor data from a service endpoint from the cache.

GetServiceDataResponse output:

[
  {
    "bn": "string",
    "bt": 0.0,
    "bu": "string",
    "bver": 0
  }, {
    "n": "string",
    "t": 0.0,
    "u": "string",
    "v": 0.0,
    "vs": "string",
    "vb": false,
    "vd": "string"
  }
]
PUT /datamanager/proxy/{systemName}/{serviceName}

Stores sensor data in a service endpoint in the proxy cache.

PutServiceDataRequest input:

[
  {
    "bn": "string",
    "bt": 0.0,
    "bu": "string",
    "bver": 0
  }, {
    "n": "string",
    "t": 0.0,
    "u": "string",
    "v": 0.0,
    "vs": "string",
    "vb": false,
    "vd": "string"
  }
]
GET /datamanager/historian

Returns a list of all systems that have at least one service endpoint in the database.

GetSystemListResponse output:

{
  "systems": ["systemName1", "systemNameX"]
}
GET /datamanager/historian/{systemName}

Returns a list of all service endpoints that have data stored in the database.

GetServicesResponse output:

{
  "services": ["serviceDefinition1", "serviceDefinitionX"]
}
GET /datamanager/historian/{systemName}/{serviceName}

Returns sensor data from a service endpoint from the database.

GetServiceDataResponse output:

[
  {
    "bn": "string",
    "bt": 0.0,
    "bu": "string",
    "bver": 0
  }, {
    "n": "string",
    "t": 0.0,
    "u": "string",
    "v": 0.0,
    "vs": "string",
    "vb": false,
    "vd": "string"
  }
]
PUT /datamanager/historian/{systemName}/{serviceName}

Stores sensor data in a service endpoint in the database.

PutServiceDataRequest input:

[
  {
    "bn": "string",
    "bt": 0.0,
    "bu": "string",
    "bver": 0
  }, {
    "n": "string",
    "t": 0.0,
    "u": "string",
    "v": 0.0,
    "vs": "string",
    "vb": false,
    "vd": "string"
  }
]

The purpose of TimeManager supporting core system is to provide time and location based services.

The TimeManager provides features for a local cloud systems to :

  • Fetch accurate and trusted time and location information,

The TimeManager provides the following services:

The TimeManager consumes the following services:

None currently, but will consume Orchestration later on.

The TimeManager has the following use cases:

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/timemanager

Function URL subpath Method Input Output
Echo /echo GET - OK
Time /time GET - TimeResponse
GET /timemanager/echo

Returns a "Got it!" message with the purpose of testing the system availability.

GET /timemanager/time

Returns time stamps (UNIX in seconds and millseconds), time zone ("Europe/Budapest"), Daylist savings active (true/false) and if the time is trusted (true/false).

TimeResponse output:

{
  "epoch": 1627844812,
  "epochMs": 1627844812102,
  "tz": "string",
  "dst": true,
  "trusted": true
}

This supporting core system has the purpose of providing inter-Cloud servicing capabilities in the Arrowhead Framework by its following services:

  • Global Service Discovery (GSD)
  • Inter-Cloud Negotiation (ICN)

These Services are part of the inter-Cloud orchestration process, but the Gatekeeper is only available for the other core systems. Gatekeeper is the only one core system which has the functionality of discovering other Clouds via Relay systems. Neighbor Clouds and Relay systems are stored in the MySQL database of this module.
During the inter-Cloud orchestration, the Global Service Discovery is the first process which aims to collect the known clouds with providers serving the specified service. After GSD, the Inter Cloud Negotiation process steps in place with the purpose of establishing the way of collaboration. Working together with the Orchestrators of both Clouds, at the end a servicing instace can be created.

Alt text

Please follow this guide to setup the Arrowhead Gatekeeper and Gateway core systems: Gatekeeper & Gateway Setup Guide with ActiveMQ Relay

Use case 1: Global Service Discovery request

Name Description
ID GSD-1
Brief Description The Gatekeeper is tasked to find a Service in other Local Clouds
Primary Actors Gatekeeper
Secondary Actors - Relays used by the Gatekeeper
- The Gatekeeper instances of another Clouds
Preconditions Orchestration process was started by an Application System.
Main Flow - The Orchestrator consumes the GSD Initialization Service of its local Gatekeeper.
- Gatekeeper collects the preferred or neighbor Clouds and one of its Relays.
- The Gatekeeper queries the other Gatekeepers via the Relays.
- These Gatekeepers verify whether they could facilitate this request or not.
- The requester Gatekeeper collects these answers and respond via the GSD Initialization Service to its Orchestrator
Postconditions The Orchestrator has a list of other Local Clouds that can provide the Service we are looking for.

Use case 2: Inter-Cloud Negotiation request

Name Description
ID ICN-1
Brief Description The Gatekeeper is tasked to start negotiating with another Cloud.
Primary Actors Gatekeeper
Secondary Actors - Relays used by the Gatekeeper
- The Gatekeeper instances of another Clouds
- The other Orchestrator from the second Cloud
Preconditions Orchestration process was started by an Application System. The GSD process has ended, the requester Orchestrator has chosen a partnering Cloud, where it wants to connect to.
Main Flow - The Orchestrator consumes the ICN Initialization Service of its local Gatekeeper.
- The Gatekeeper consumes the other Gatekeeper's ICN Proposal service via an Relay.
- The secondary Gatekeeper validates the AuthorizationControl and requests Orchestration from its own Orchestrator
- The secondary Orhestrator responds to the secondary Gatekeeper with an Orchestration result.
- The secondary Gatekeeper responds to the primary, requester Gatekeeper.
- Additional administrative tasks are executed (e.g. configuration of the Gateway modules)
- The primary, requester Orchestrator is receiving the response via the ICN initialization service.
Function URL subpath Method Input Output
Echo /echo GET - OK
Function URL subpath Method Input Output
Init GSD /gatekeeper/init_gsd POST GSDQueryForm GSDQueryResult
Init ICN /gatekeeper/init_icn POST ICNRequestForm ICNResult
Function URL subpath Method Input Output
Get all Cloud entries /mgmgt/clouds GET - CloudWithRelaysListResponse
Get Cloud by ID /mgmgt/clouds/{id} GET cloudId CloudWithRelaysResponse
Register Clouds /mgmgt/clouds POST CloudRequest list CloudWithRelaysListResponse
Update Cloud /mgmgt/clouds/{id} PUT CloudRequest CloudWithRelaysResponse
Assign Relays to Cloud /mgmgt/clouds/assign POST CloudRelaysAssignmentRequest CloudWithRelaysResponse
Delete Cloud /mgmgt/clouds/{id} DELETE cloudId -
Get all Relay entries /mgmgt/relays GET - RelayListResponse
Get Relay by ID /mgmgt/relays/{id} GET relayId RelayResponse
Get Relay by Address and Port /mgmgt/relays/{address}/{port} GET address, port RelayResponse
Register Relays /mgmgt/relays POST RelayRequest list RelayListResponse
Update Relay /mgmgt/relays/{id} PUT RelayRequest RelayResponse
Delete Relay /mgmgt/relays/{id} DELETE relayId -

The following endpoints no longer exist:

  • GET /gatekeeper/mgmt/neighborhood/operator/{operator}/cloudname/{cloudName}
  • DELETE /gatekeeper/mgmt/neighborhood/operator/{operator}/cloudname/{cloudName}
  • GET /gatekeeper/mgmt/brokers/brokername/{brokerName}
  • GET /gatekeeper/mgmt/brokers/address/{address}
GET /gatekeeper/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

POST /gatekeeper/init_gsd

Returns the result of Global Service Discovery.

GSDQueryForm is the input

{
  "requestedService": {
	"serviceDefinitionRequirement": "string",
    "interfaceRequirements": [
      "string"
    ],
	"securityRequirements": [
      "NOT_SECURE"
    ],
	"versionRequirement": 0,
    "maxVersionRequirement": 0,
    "minVersionRequirement": 0,
    "pingProviders": true,
	"metadataRequirements": {
      "additionalProp1": "string",
      "additionalProp2": "string",
      "additionalProp3": "string"
    }
  },
  "preferredClouds": [
    {
	  "name": "string",
      "operator": "string",
	  "neighbor": true,
      "secure": true,
      "authenticationInfo": "string",
      "gatekeeperRelayIds": [
        0
      ],
      "gatewayRelayIds": [
        0
      ]
    }
  ]
}
Field Description Mandatory
requestedService Object describes the requested service yes
serviceDefinitionRequirement Service Definition yes
interfaceRequirements List of interfaces no
securityRequirements List of required security levels no
versionRequirement Version of the Service no
maxVersionRequirement Maximum version of the Service no
minVersionRequirement Minimum version of the Service no
pingProviders Whether or not the providers should be pinged no
metadataRequirements Metadata no
preferredClouds List of preferred clouds no

GSDQueryResult is the output

{
  "results": [
    {
      "providerCloud": {
	    "id": 0,
		"name": "string",
		"operator": "string",
        "authenticationInfo": "string",        
        "neighbor": true,        
        "ownCloud": true,
        "secure": true,
		"createdAt": "string",
        "updatedAt": "string"
      },
	  "requiredServiceDefinition": "string",
	  "availableInterfaces": [
        "string"
      ],
      "serviceMetadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
	   "numOfProviders": 0
    }
  ],
  "unsuccessfulRequests": 0
}
Field Description
results List of result objects
providerCloud Cloud where the result coming from
requiredServiceDefinition Service Definition
availableInterfaces List of available interfaces
serviceMetadata Metadata
numOfProviders Number of providers serving the service within the cloud
unsuccessfulRequests Number of clouds not responded
POST /gatekeeper/init_icn

Returns the result of Inter-Cloud Negotiation.

ICNRequestForm is the input

{
  "targetCloudId": 0,
  "requestedService": {
    "serviceDefinitionRequirement": "string",
    "interfaceRequirements": [
      "string"
    ],
    "securityRequirements": [
      "NOT_SECURE"
    ],
	"versionRequirement": 0,
    "maxVersionRequirement": 0,
    "minVersionRequirement": 0,
    "pingProviders": true,	
	"metadataRequirements": {
      "additionalProp1": "string",
      "additionalProp2": "string",
      "additionalProp3": "string"
    }
  },
  "preferredSystems": [
    {
      "systemName": "string",
	  "address": "string",
	  "port": 0,
      "authenticationInfo": "string"
    }
  ],
  "requesterSystem": {
	"systemName": "string",
    "address": "string",
	"port": 0,
    "authenticationInfo": "string"
  },
  "negotiationFlags": {
    "additionalProp1": true,
    "additionalProp2": true,
    "additionalProp3": true
  }
}
Field Description Mandatory
targetCloudId Local ID of the target cloud yes
requestedService Object describes the requested service yes
serviceDefinitionRequirement Service Definition yes
interfaceRequirements List of interfaces no
securityRequirements List of required security levels no
versionRequirement Version of the Service no
maxVersionRequirement Maximum version of the Service no
minVersionRequirement Minimum version of the Service no
pingProviders Whether or not the providers should be pinged no
metadataRequirements Metadata no
preferredSystems List of perferred systems no
requesterSystem Requester Cloud details (Own cloud) yes
negotiationFlags Orchestration flags no

ICNResult is the output

{
  "response": [
    {
      "service": {
	    "id": 0,       
        "serviceDefinition": "string",
		"createdAt": "string", 
        "updatedAt": "string"
      },
	  "serviceUri": "string",
	  "provider": {
	    "id": 0,
		"systemName": "string",
        "address": "string",
		"port": 0,
        "authenticationInfo": "string",
        "createdAt": "string",        
        "updatedAt": "string"
      },
	  "interfaces": [
        {
          "id": 0,
          "interfaceName": "string",
		  "createdAt": "string",
          "updatedAt": "string"
        }
      ],      
      "secure": "NOT_SECURE",     
      "version": 0,
	  "metadata": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
	  "authorizationTokens": {
        "additionalProp1": "string",
        "additionalProp2": "string",
        "additionalProp3": "string"
      },
      "warnings": [
        "FROM_OTHER_CLOUD"
      ]
    }
  ]
}
Field Description
results List of result objects
service Required service
serviceUri URI of the service
provider Provider details
interfaces List of available interfaces
secure Level of security
version Version number
metadata Service metadata
authorizationTokens Authorization Tokens per interfaces
warnings Warnings
GET /gatekeeper/mgmgt/clouds

Returns Cloud entries by the given paging parameters. If page and item_per_page are not defined, no paging is involved.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

CloudWithRelaysListRespone is the output.

{
  "count": 0,
  "data": [
    {
	  "id": 0,
      "name": "string",
	  "operator": "string",
      "neighbor": true,      
      "ownCloud": true,
      "secure": true,
      "authenticationInfo": "string",
      "createdAt": "string",
	  "updatedAt": "string",
      "gatekeeperRelays": [
        {
          "id": 0,
		  "address": "string",
          "port": 0,		            
          "exclusive": true,
          "secure": true,
          "type": "GATEKEEPER_RELAY",
		  "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "gatewayRelays": [
        {
          "id": 0,
		  "address": "string",
          "port": 0,		            
          "exclusive": true,
          "secure": true,
          "type": "GATEWAY_RELAY",
		  "createdAt": "string",
          "updatedAt": "string"
        }
      ]
    }
  ]
}
Field Description
count Number of record found
data Array of data
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
ownCloud Whether or not it is the own Cloud
secure Whether or not it is a secured Cloud/Relay
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelays List of Relays uesd by Gatekeeper
gatewayRelays List of Relays uesd by Gateway
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
GET /gatekeeper/mgmgt/clouds/{id}

Returns the Cloud Entry specified by the ID path parameter.

CloudWithRelaysResponse is the output.

{
  "id": 0,
  "name": "string",
  "operator": "string",
  "neighbor": true,      
  "ownCloud": true,
  "secure": true,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string",
  "gatekeeperRelays": [
      {
       "id": 0,
       "address": "string",
       "port": 0,		            
       "exclusive": true,
       "secure": true,
       "type": "GATEKEEPER_RELAY",
       "createdAt": "string",
       "updatedAt": "string"
      }
    ],
    "gatewayRelays": [
      {
        "id": 0,
	"address": "string",
        "port": 0,		            
        "exclusive": true,
        "secure": true,
        "type": "GATEWAY_RELAY",
        "createdAt": "string",
        "updatedAt": "string"
      }
    ]
}
Field Description
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
ownCloud Whether or not it is the own Cloud
secure Whether or not it is a secured Cloud/Relay
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelays List of Relays used by Gatekeeper
gatewayRelays List of Relays used by Gateway
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
POST /gatekeeper/mgmgt/clouds

Returns created Cloud entries.

CloudRequest list is the input.

[
  {   
    "name": "string",
    "operator": "string",
    "neighbor": true,    
    "secure": true,
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  }
]
Field Description
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
secure Whether or not it is a secured Cloud
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelayIds List of Relay IDs used by Gatekeeper
gatewayRelayIds List of Relay IDs used by Gateway

CloudWithRelaysListResponse is the output.

{
  "count": 0,
  "data": [
    {
      "id": 0,
      "name": "string",
      "operator": "string",
      "neighbor": true,      
      "ownCloud": true,
      "secure": true,
      "authenticationInfo": "string",
      "createdAt": "string",
      "updatedAt": "string",
      "gatekeeperRelays": [
        {
          "id": 0,
	  "address": "string",
          "port": 0,		            
          "exclusive": true,
          "secure": true,
          "type": "GATEKEEPER_RELAY",
	  "createdAt": "string",
          "updatedAt": "string"
        }
      ],
      "gatewayRelays": [
        {
          "id": 0,
	  "address": "string",
          "port": 0,		            
          "exclusive": true,
          "secure": true,
          "type": "GATEWAY_RELAY",
          "createdAt": "string",
          "updatedAt": "string"
        }
      ]
    }
  ]
}
Field Description
count Number of record found
data Array of data
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
ownCloud Whether or not it is the own Cloud
secure Whether or not it is a secured Cloud/Relay
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelays List of Relays uesd by Gatekeeper
gatewayRelays List of Relays uesd by Gateway
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
PUT /gatekeeper/mgmgt/clouds/{id}

Returns updated Cloud entry specified by the ID path parameter.

CloudRequest is the input.

{
  "name": "string",
  "operator": "string",
  "neighbor": true,
  "secure": true,
  "authenticationInfo": "string",
  "gatekeeperRelayIds": [
    0
  ],
  "gatewayRelayIds": [
    0
  ]
}
Field Description
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
secure Whether or not it is a secured Cloud
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelayIds List of Relay IDs used by Gatekeeper
gatewayRelayIds List of Relay IDs used by Gateway

CloudWithRelaysResponse is the output.

{
  "id": 0,
  "name": "string",
  "operator": "string",
  "neighbor": true,      
  "ownCloud": true,
  "secure": true,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string",
  "gatekeeperRelays": [
      {
       "id": 0,
       "address": "string",
       "port": 0,		            
       "exclusive": true,
       "secure": true,
       "type": "GATEKEEPER_RELAY",
       "createdAt": "string",
       "updatedAt": "string"
      }
    ],
    "gatewayRelays": [
      {
        "id": 0,
	"address": "string",
        "port": 0,		            
        "exclusive": true,
        "secure": true,
        "type": "GATEWAY_RELAY",
        "createdAt": "string",
        "updatedAt": "string"
      }
    ]
}
Field Description
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
ownCloud Whether or not it is the own Cloud
secure Whether or not it is a secured Cloud/Relay
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelays List of Relays uesd by Gatekeeper
gatewayRelays List of Relays uesd by Gateway
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
POST /gatekeeper/mgmgt/clouds/assign

Returns updated Cloud entry.

CloudRelaysAssignmentRequest is the input.

{
  "cloudId": 0,
  "gatekeeperRelayIds": [
    0
  ],
  "gatewayRelayIds": [
    0
  ]
}
Field Description
cloudId ID of the cloud
gatekeeperRelayIds List of Relay IDs used by Gatekeeper
gatewayRelayIds List of Relay IDs used by Gateway

CloudWithRelaysResponse is the output.

{
  "id": 0,
  "name": "string",
  "operator": "string",
  "neighbor": true,      
  "ownCloud": true,
  "secure": true,
  "authenticationInfo": "string",
  "createdAt": "string",
  "updatedAt": "string",
  "gatekeeperRelays": [
      {
       "id": 0,
       "address": "string",
       "port": 0,		            
       "exclusive": true,
       "secure": true,
       "type": "GATEKEEPER_RELAY",
       "createdAt": "string",
       "updatedAt": "string"
      }
    ],
    "gatewayRelays": [
      {
        "id": 0,
	"address": "string",
        "port": 0,		            
        "exclusive": true,
        "secure": true,
        "type": "GATEWAY_RELAY",
        "createdAt": "string",
        "updatedAt": "string"
      }
    ]
}
Field Description
name Name of the cloud
operator Operator of the cloud
neighbor Whether or not it is a neighbor Cloud
ownCloud Whether or not it is the own Cloud
secure Whether or not it is a secured Cloud/Relay
authenticationInfo Base64 encoded public key of the Cloud
gatekeeperRelays List of Relays used by Gatekeeper
gatewayRelays List of Relays used by Gateway
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
DELETE /gatekeeper/mgmgt/clouds/{id}

Remove requested Cloud entry

GET /gatekeeper/mgmgt/relays

Returns Relay entries by the given paging parameters. If page and item_per_page are not defined, no paging is involved.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

RelayListResponse is the output.

{
  "count": 0,
  "data": [
    {      
      "id": 0,
      "address": "string",
      "port": 0,
      "exclusive": true,
      "secure": true,
      "type": "GATEKEEPER_RELAY",
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of record found
data Array of data
id ID of the Relay
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
GET /gatekeeper/mgmgt/relays/{id}

Returns the Relay Entry specified by the ID path parameter.

RelayResponse is the output.

{      
  "id": 0,
  "address": "string",
  "port": 0,
  "exclusive": true,
  "secure": true,
  "type": "GATEKEEPER_RELAY",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the Relay
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
GET /gatekeeper/mgmgt/relays/{address}/{port}

Returns the Relay Entry specified by the address and port path parameter.

RelayResponse is the output.

{      
  "id": 0,
  "address": "string",
  "port": 0,
  "exclusive": true,
  "secure": true,
  "type": "GATEKEEPER_RELAY",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the Relay
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
POST /gatekeeper/mgmgt/relays

RelayRequest list is the input

[
 {      
  "address": "string",
  "port": 0,
  "exclusive": true,
  "secure": true,
  "type": "GATEKEEPER_RELAY",
  "createdAt": "string",
  "updatedAt": "string"
 }
]
Field Description
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')

RelayListResponse is the output.

{
  "count": 0,
  "data": [
    {      
      "id": 0,
      "address": "string",
      "port": 0,
      "exclusive": true,
      "secure": true,
      "type": "GATEKEEPER_RELAY",
      "createdAt": "string",
      "updatedAt": "string"
    }
  ]
}
Field Description
count Number of record found
data Array of data
id ID of the Relay
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
PUT /gatekeeper/mgmgt/relays/{id}

Returns updated Relay entry specified by the ID path parameter.

RelayRequest is the input.

{      
  "address": "string",
  "port": 0,
  "exclusive": true,
  "secure": true,
  "type": "GATEKEEPER_RELAY",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')

RelayResponse is the output.

{      
  "id": 0,
  "address": "string",
  "port": 0,
  "exclusive": true,
  "secure": true,
  "type": "GATEKEEPER_RELAY",
  "createdAt": "string",
  "updatedAt": "string"
}
Field Description
id ID of the Relay
address Host of the Relay
port Port of the Relay
exclusive Whether or not is is a not public Relay
secure Whether or not it is a secured Relay
type Type of the Relay (Possible values: 'GENERAL_RELAY, 'GATEKEEPER_RELAY', 'GATEWAY_RELAY')
DELETE /gatekeeper/mgmgt/relays/{id}

Remove requested Relay entry.

Gateway

This supporting core system has the purpose of establishing a secured datapath - if required - between a consumer and a provider located in different clouds by its following services:

  • Connect to Consumer
  • Connect to Provider

These Services are part of the Inter-Cloud Negotiation (ICN) process initiated by the requester cloud's Gatekeeper. During the ICN process, when a Gateway is required by one of the cloud, then the Gatekeepers in both cloud establish a new datapath to their application systems and ensure the data exchange via a Relay system.

Alt text

Please follow this guide to setup the Arrowhead Gatekeeper and Gateway core systems: Gatekeeper & Gateway Setup Guide with ActiveMQ Relay

Use case 1: Connect to Consumer

Name Description
ID Connect-To-Consumer
Brief Description The Gateway is tasked to connect to the Consumer and mediate between the Relay and the Consumer.
Primary Actors Gatekeeper
Secondary Actors - Arrowhead compliant ActiveMQ Relay
Preconditions Inter-Cloud orchestration process was started by a consuming Application System.
Main Flow - The Gatekeeper sends a ConnectToConsumerRequest to the Gateway.
- The Gateway internally creates a new ActiveSession object.
- The Gateway starts a new thread.
- The Gateway creates a sslServerSocket.
- The Consumer connects to the port of the serverSocket.
- The Gateway gets the request from the Consumer through the SSLSocket forwards it to the Relay.
- The Gateway gets the response from the Provider via the Relay, decrypts and forwards it to the Consumer through the socket.
- The Gateway checks the control messages from the Relay and if a "close" message is received, than close the session.

Use case 2: Connect to Provider

Name Description
ID Connect-To-Provider
Brief Description The Gateway is tasked to connect to the Provider and mediate between the Relay and the Provider.
Primary Actors Gatekeeper
Secondary Actors - Arrowhead compliant ActiveMQ Relay
Preconditions Inter-Cloud orchestration process was started by a consuming Application System.
Main Flow - The Gatekeeper sends a ConnectToProviderRequest to the Gateway.
- The Gateway internally creates a new ActiveSession object with new queues for a choosen Relay.
- The Gateway starts a new thread.
- The Gateway creates a sslServerSocket.
- The Gateway gets the request from the Consumer through the Relay.
- The Gateway gets the response from the Provider via the SSLSocket, then encrypts and forwards it to the Relay.
- The Gateway checks the control messages from the Relay and if a "close" message is received, than close the session.
Function URL subpath Method Input Output
Echo /echo GET - OK
Function URL subpath Method Input Output
Connect To Consumer /connect_consumer POST GatewayConsumerConnectionRequest Server Port number
Connect To Provider /connect_provider POST GatewayProviderConnectionRequest GatewayProviderConnectionResponse
Get Public Key /publickey GET - Public Key string
Function URL subpath Method Input Output
Get Active Sessions /mgmgt/sessions GET - ActiveSessionList
Close Session /mgmgt/sessions/close POST ActiveSession OK
GET /gateway/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

POST /gateway/connect_consumer

Creates a ServerSocket between the given Relay and Consumer and return the ServerSocket port.

GatewayConsumerConnectionRequest is the input.

{
  "consumer": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"    
  },
  "consumerCloud": {    
    "name": "string",
    "operator": "string",
    "neighbor": true,
    "secure": true,
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },
  "provider": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "providerCloud": {
    "name": "string",
    "operator": "string",
    "neighbor": true,
    "secure": true,
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },
  "providerGWPublicKey": "string",
  "peerName": "string",
  "queueId": "string",
  "relay": {
    "address": "string",
    "port": 0,
    "exclusive": true,
    "secure": true,
    "type": "string"
  },
  "serviceDefinition": "string"
}
Field Description
consumer Consumer Application System
consumerCloud Cloud of Consumer Application System
provider Provider Application System
providerCloud Cloud of Provider Application System
providerGWPublicKey Base64 encoded public key of provider cloud's Gateway
peerName Server Common Name of provider cloud's Gateway
queueId ID of the message queue in the Relay created by the provider
relay Messaging Relay system
serviceDefinition Definition of the service.
POST /gateway/connect_provider

Creates a Socket and Message queue between the given Relay and Provider and returns the necessary connection information.

GatewayProviderConnectionRequest is the input.

{
  "consumer": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"    
  },
  "consumerCloud": {    
    "name": "string",
    "operator": "string",
    "neighbor": true,
    "secure": true,
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },
  "provider": {
    "systemName": "string",
    "address": "string",
    "port": 0,
    "authenticationInfo": "string"
  },
  "providerCloud": {
    "name": "string",
    "operator": "string",
    "neighbor": true,
    "secure": true,
    "authenticationInfo": "string",
    "gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },
  "consumerGWPublicKey": "string",
  "relay": {
    "address": "string",
    "port": 0,
    "exclusive": true,
    "secure": true,
    "type": "string"
  },
  "serviceDefinition": "string"
}
Field Description
consumer Consumer Application System
consumerCloud Cloud of Consumer Application System
provider Provider Application System
providerCloud Cloud of Provider Application System
consumerGWPublicKey Base64 encoded public key of consumer cloud's Gateway
relay Messaging Relay system
serviceDefinition Definition of the service.

GatewayProviderConnectionResponse is the output.

{
  "peerName": "string",
  "queueId": "string",
  "providerGWPublicKey": "string"  
}
Field Description
peerName Server Common Name of provider cloud's Gateway
queueId ID of the message queue in the Relay created by the provider
providerGWPublicKey Base64 encoded public key of provider cloud's Gateway
GET /gateway/publickey

Returns the public key of the Gateway core service as a Base64 encoded text.

GET /gateway/mgmgt/sessions

Returns active Gateway sessions by the given paging parameters. If page and item_per_page are not defined, no paging is involved.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no

ActiveSessionList is the output.

{
  "count": 0,
  "data": [
    {
      "queueId": "string",
	  "peerName": "string",
	  "consumer": {
        "systemName": "string",
		"address": "string",
        "port": 0,
		"authenticationInfo": "string"        
      },
      "consumerCloud": {
        "name": "string",
		"operator": "string",
		"authenticationInfo": "string",        
        "neighbor": true,        
        "secure": true,
		"gatekeeperRelayIds": [
          0
        ],
        "gatewayRelayIds": [
          0
        ]
      },      
      "provider": {
        "systemName": "string",
		"address": "string",
        "port": 0,
		"authenticationInfo": "string"
      },
      "providerCloud": {
        "name": "string",
		"operator": "string",
		"authenticationInfo": "string",        
        "neighbor": true,        
        "secure": true,
		"gatekeeperRelayIds": [
          0
        ],
        "gatewayRelayIds": [
          0
        ]
      },
	  "serviceDefinition": "string",
      "relay": {
        "address": "string",
		"port": 0,
        "exclusive": true,        
        "secure": true,
        "type": "GATEWAY_RELAY"
      },
      "requestQueue": "string",
	  "requestControlQueue": "string",
      "responseQueue": "string",
      "responseControlQueue": "string",      
      "sessionStartedAt": "string",
	  "consumerServerSocketPort": 0
    }
  ]
}
Field Description
count Number of record found
data Array of data
queueId ID of the message queue in the Relay created by the provider
peerName Server Common Name of provider cloud's Gateway
consumer Consumer Application System
consumerCloud Cloud of Consumer Application System
provider Provider Application System
providerCloud Cloud of Provider Application System
serviceDefinition Definition of the service.
relay Messaging Relay system
requestQueue request messaging queue through the the Relay
requestControlQueue control queue of request messaging through the the Relay
responseQueue response messaging queue through the the Relay
responseControlQueue control queue of response messaging through the the Relay
sessionStartedAt Time stamp of session start
consumerServerSocketPort Port number delegated to consumer connection
POST /gateway/mgmgt/sessions/close

Closing the requested active gateway session.

ActiveSession is the output.

{
  "queueId": "string",
  "peerName": "string",
	"consumer": {
    "systemName": "string",
	"address": "string",
    "port": 0,
	"authenticationInfo": "string"        
  },
  "consumerCloud": {
    "name": "string",
	"operator": "string",
	"authenticationInfo": "string",        
    "neighbor": true,        
    "secure": true,
	"gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },      
  "provider": {
    "systemName": "string",
	"address": "string",
    "port": 0,
	"authenticationInfo": "string"
  },
  "providerCloud": {
    "name": "string",
	"operator": "string",
	"authenticationInfo": "string",        
    "neighbor": true,        
    "secure": true,
	"gatekeeperRelayIds": [
      0
    ],
    "gatewayRelayIds": [
      0
    ]
  },
  "serviceDefinition": "string",
  "relay": {
    "address": "string",
	"port": 0,
    "exclusive": true,        
    "secure": true,
    "type": "GATEWAY_RELAY"
  },
  "requestQueue": "string",
  "requestControlQueue": "string",
  "responseQueue": "string",
  "responseControlQueue": "string",      
  "sessionStartedAt": "string",
  "consumerServerSocketPort": 0
}
Field Description
queueId ID of the message queue in the Relay created by the provider
peerName Server Common Name of provider cloud's Gateway
consumer Consumer Application System
consumerCloud Cloud of Consumer Application System
provider Provider Application System
providerCloud Cloud of Provider Application System
serviceDefinition Definition of the service.
relay Messaging Relay system
requestQueue request messaging queue through the the Relay
requestControlQueue control queue of request messaging through the the Relay
responseQueue response messaging queue through the the Relay
responseControlQueue control queue of response messaging through the the Relay
sessionStartedAt Time stamp of session start

The main purpose of the Certificate Authority supporting core system is issuing signed certificates to be used in the local cloud. The issued certificates may be revoked from the Management Interface. Systems may check whether a certificate has been revoked, and refuse their acceptance.

The Certificate Authority provides the following services:

  1. Issue signed certificates to new consumers coming via the Onboarding Controller.
  2. Handle certificate revocation.
  3. Act as a trusted public key store.
Function URL subpath Method Input Output
Echo /echo GET - OK
Check certificate validity /checkCertificate POST CertificateCheckRequest CertificateCheckResponse
Function URL subpath Method Input Output
Sign CSR with the Cloud Certificate /sign POST CertificateSigningRequest CertificateSigningResponse
Check trusted key /checkTrustedKey POST TrustedKeyCheckRequest TrustedKeyCheckResponse
Function URL subpath Method Input Output
Get issued certificates /mgmt/certificates GET - IssuedCertificatesResponse
Revoke certificate /mgmt/certificates/{id} DELETE Certificate record id OK
Get trusted keys /mgmt/keys GET - TrustedKeysResponse
Add trusted key /mgmt/keys PUT AddTrustedKeyRequest AddTrustedKeyResponse
Delete trusted key /mgmt/keys/{id} DELETE Key record id 204 No Content
GET /certificate-authority/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

POST /certificate-authority/checkCertificate

Returns whether the given certificate is valid or has been revoked. The client SHALL not trust a revoked certificate.

CertificateCheckRequest is the input:

{
  "version": "integer",
  "certificate": "string"
}
Parameter Description Necessity Format/Limitations
version Version of the check protocol mandatory integer, currently must be 1
certificate The certificate to check mandatory Base64 encoded X.509 certificate (PEM without headers)

Returns a CertificateCheckResponse:

{
  "version": "integer",
  "producedAt": "string",
  "endOfValidity": "string",
  "commonName": "string",
  "serialNumber": "string",
  "status": "string"
}
Field Description
version Version of the check protocol
producedAt The time at wich the response has been created
commonName Common name of the certificate
serialNumber Serial number of the certificate
endOfValidity End of validity due to expiration or revocation
status One of the following: good, revoked, expired, unknown
POST /certificate-authority/sign

Returns the whole certificate chain beginning with the newly generated leaf certificate and ending with the root certificate.

Each certificate's issuer is the same as the subject of the following one. The issuer of the root certificate is the same as the subject.

The request may contain validAfter and validBefore fields to limit the validity range of the Certificate to be generated more than the default values set in Certificate Authority.

Metadata of each generated certificate is stored in the database to allow handling revocation and validity checking.

A request for signing a certificate with restricted common name is only accepted if it is requested by sysop. Common names starting with the name of a Core System or sysop are restricted.

CertificateSigningRequest is the input:

{
  "encodedCSR": "string",
  "validAfter": "string",
  "validBefore": "string"
}
Parameter Description Necessity Format/Limitations
encodedCSR PKCS #10 Certificate Signing Request mandatory Base64 encoded CSR
validAfter Beginning of Certificate validity optional ISO 8601 date/time string
validBefore End of Certificate validity optional ISO 8601 date/time string

Returns CertificateSigningResponse:

{
  "id": "integer",
  "certificateChain": [
    "<generated client certificate>",
    "<cloud certificate>",
    "<root certificate>"
  ]
}
Field Description
id ID of the newly generated Certificate in the database
certificateChain The whole certificate chain in an array of Base64 encoded DER strings (PEM without headers)
POST /certificate-authority/checkTrustedKey

Returns whether the given public key has been registered as trusted or not.

TrustedKeyCheckRequest is the input:

{
  "publicKey": "string"
}
Field Description Necessity Format/Limitations
publicKey The public key to check mandatory Base64 encoded DER public key (PEM without headers)

Returns a TrustedKeyCheckResponse:

{
  "id": "integer",
  "createdAt": "string",
  "description": "string"
}
Field Description Format/Limitations
id Record Id integer
createdAt The time at which the key has been added ISO 8601 date/time string
description Description of the key, e.g. device identifier string
GET /certificate-authority/mgmt/certificates

Returns data about every certificate issued by the Certificate Authority. If page and item_per_page are not defined, returns all records.

Query params:

Parameter Description Necessity
page zero based page index optional
item_per_page maximum number of items returned optional
sort_field sorts by the given column optional
direction direction of sorting optional

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • createdBy
  • validfrom
  • validUntil
  • commonName

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a IssuedCertificatesResponse:

{
  "count": "integer",
  "issuedCertificates": [
    "id": "integer",
    "createdAt": "string",
    "createdBy": "string",
    "validfrom": "string",
    "validUntil": "string",
    "revokedAt": "string",
    "commonName": "string",
    "serialNumber": "string",
    "status": "string"
  ]
}
Field Description
count Number of issued certificate records
id ID of the certificate record
createdAt The time at wich the record has been created
createdBy Name of the system which requested the certificate
validFrom Beginning of validity of the certificate
validUntil End of validity of the certificate
revokedAt The time at which the certificate has been revoked or null
commonName Common name of the certificate
serialNumber Serial number of the certificate
status One of the following: good, revoked, expired
DELETE /certificate-authority/mgmt/certificate/{id}

Revoke a previously issued certificate. Revocation means that subsequent requests to the Check certificate validity service return with revoked status. The client SHALL not trust the revoked certificate.

Query params:

Parameter Description Necessity
id Certificate record ID mandatory

Returns HTTP 200 OK on success.

GET /certificate-authority/mgmt/keys

Returns the list of public keys that are added to be trusted. The keys may be used e.g. by the Onboarding Controller to identify a device. If page and item_per_page are not defined, returns all records.

Query params:

Parameter Description Necessity
page zero based page index optional
item_per_page maximum number of items returned optional
sort_field sorts by the given column optional
direction direction of sorting optional

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a TrustedKeysResponse:

{
  "count": "integer",
  "trustedKeys": [
    "id": "integer",
    "createdAt": "string",
    "description": "string"
  ]
}
Field Description
count The total number of the trusted keys
id Record ID
createdAt The time at which the key has been added
description Description of the key; e.g. device identifier
PUT /certificate-authority/mgmt/keys

Add a public key to the list of trusted keys. This key may be used by e.g. the Onboarding Controller to onboard a device with known public key.

AddTrustedKeyRequest is the input:

{
  "publicKey": "string",
  "description": "string",
  "validAfter": "string",
  "validBefore": "string"
}
Field Description Necessity Format/Limitations
publicKey The public key to add as trusted mandatory Base64 encoded DER public key (PEM without headers)
description Description of the key; e.g. device identifier mandatory string
validAfter Beginning of validity mandatory ISO 8601 date/time string
validBefore End of validity mandatory ISO 8601 date/time string

Returns an AddTrustedKeyResponse with HTTP 201 Created on success:

{
  "id": "integer",
  "validAfter": "string",
  "validBefore": "string"
}
Field Description
id Record ID
validAfter Beginning of validity
validBefore End of validity
DELETE /certificate-authority/mgmt/keys/{id}

Delete a public key from the list of trusted keys.

Query params:

Parameter Description Necessity
id Key record ID mandatory

Returns HTTP 204 No Content on success.

This supporting core system makes it possible to execute pre-defined workflows through orchestration and service consumption.

Each workflow can be divided into three segments:

  • Plans,
  • Actions,
  • and Steps.

Plans define the whole workflow by name and they contain Actions which group coherent Steps together for greater transparency and enabling sequentialization of these Step groups.

Workflow execution in this generation can only be accomplished if the requested providers in each Step are all available (they are registered with the same name in the service registry as in the plan description) and the requested services call back (notify) to the Choreographer through the Choreography service that the execution on their end is done. Only this way can the Choreographer continue the execution of the Plan.

This Supporting Core System provides the Choreographer Service which only has one use-case scenario: notifying the Choreographer from the providers' side that the executed Step is done.

The Choreographer offers two types of endpoints: Client and Management.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/choreographer

Function URL subpath Method Input Output
Echo /echo GET - OK
Notify that a step is done /notifyStepDone POST SessionRunningStepData OK

These endpoints are mainly used by the Management Tool and Cloud Administrators.

Function URL subpath Method Input Output
Get all plan entries /mgmt/plan GET - ChoreographerPlanEntryList
Add a plan entry /mgmt/plan POST ChoreographerPlanEntry CREATED
Get a plan entry by ID /mgmt/plan/{id} GET ChoreographerPlanID ChoreographerPlanEntry
Delete a plan entry by ID /mgmt/plan/{id} DELETE ChoreographerPlanID NO CONTENT
Start one or more sessions executing a plan /mgmt/session/start POST ChoreographerPlanIDList CREATED
Change a running step to finished /mgmt/session/stepFinished POST SessionRunningStepData OK
GET /choreographer/echo

Returns a "Got it!" message with the purpose of testing the core service availability.

POST /choreographer/notifyStepDone

Returns HTTP 200 - OK if the notification of the Choreographer is successful.

SessionRunningStepData is the input

{
  "runningStepId": 0,
  "sessionId": 0
}
Field Description Mandatory
runningStepId The id of the running step which the provider gets from the Choreographer yes
sessionId The id of the session in which the step is running yes
GET /choreographer/mgmt/plan

Returns a list of Choreographer Plan records. If page and item_per_page are not defined, returns all records.

Query params:

Field Description Mandatory
page zero based page index no
item_per_page maximum number of items returned no
sort_field sorts by the given column no
direction direction of sorting no

Note: Default value for sort_field is id. All possible values are:

  • id
  • createdAt
  • updatedAt
  • name

Note: Default value for direction is ASC. All possible values are:

  • ASC
  • DESC

Returns a ChoreographerPlanEntryList

[
  { 
    "id": 0,
    "name": "string",
    "firstActionName": "string",
    "createdAt": "string", 
    "updatedAt": "string",
    "actions": [
      {
	"id": 0,
        "name": "string",
        "createdAt": "string",
	"updatedAt": "string",
        "firstStepNames": [
          "string"
        ],
        "nextActionName": "string",
        "steps": [
          {
	    "id": 0,
	    "name": "string",
	    "serviceName": "string",
            "metadata": "string",
	    "parameters": "string",
            "quantity": 0,
	    "createdAt": "string",
            "updatedAt": "string",
            "nextSteps": [
              {
                "id": 0,
                "stepName": "string"
              }
            ]
          }
        ]
      }
    ]
  }
]
Field Description
id ID of the PlanEntry
name Name of the PlanEntry
firstActionName Name of the First Action
createdAt Creation date of the entry
updatedAt When the entry was last updated
actions Array of the ActionEntries in a Plan

Contains a list of ActionEntires.

{
  "id": 0,
  "name": "string",
  "createdAt": "string",
  "updatedAt": "string",
  "firstStepNames": [
    "string"
  ],
  "nextActionName": "string",
  "steps": [
    {
      "id": 0,
      "name": "string",
      "serviceName": "string",
      "metadata": "string",
      "parameters": "string",
      "quantity": 0,
      "createdAt": "string",
      "updatedAt": "string",
      "nextSteps": [
        {
          "id": 0,
          "stepName": "string"
        }
      ]
    }
  ]
}
Field Description
id ID of an Action entry
name Name of an Action entry
createdAt Creation date of the entry
updatedAt When the entry was last updated
firstStepNames The names of the first steps within this Action
nextActionName The name of the Action which follows the current Action
steps Array of StepEntries in an Action

Contains a list of StepEntries.

{
  "id": 0,
  "name": "string",
  "serviceName": "string",
  "metadata": "string",
  "parameters": "string",
  "quantity": 0,
  "createdAt": "string",
  "updatedAt": "string",
  "nextSteps": [
    {
      "id": 0,
      "stepName": "string"
    }
  ]
}
Field Description
id ID of a Step entry
name Name of a Step entry
serviceName Name of the service which the step uses
metadata Additional metadata needed for step execution
parameters Parameters needed by the device to run this step
quantity How many times should the step run in its current position
createdAt Creation date of the entry
updatedAt When the entry was last updated
nextSteps Array of next steps following the Step entry

Note: In the current version the parameters, the metadata and the quantity fields cannot be used when executing plans. These will be implemented in future versions.

POST choreographer/mgmt/plan

Creates a plan record and returns HTTP 201 - CREATED if the entry creation is successful or the proper error message if the entry creation failed.

ChoreographerPlanEntry is the input

{
  "actions": [
    {
      "firstStepNames": [
        "string"
      ],
      "name": "string",
      "nextActionName": "string",
      "steps": [
        {
          "metadata": "string",
          "name": "string",
          "nextStepNames": [
            "string"
          ],
          "parameters": "string",
          "quantity": 0,
          "serviceName": "string"
        }
      ]
    }
  ],
  "firstActionName": "string",
  "name": "string"
}
Field Description Mandatory
name Name of the PlanEntry yes
firstActionName Name of the First Action yes
actions Array of the ActionEntries in a Plan yes
GET /choreographer/mgmt/plan/{id}

Returns the Choreographer Plan Entry specified by the ID path parameter.

Returns a ChoreographerPlanEntry

{
  "actions": [
    {
      "createdAt": "string",
      "firstStepNames": [
        "string"
      ],
      "id": 0,
      "name": "string",
      "nextActionName": "string",
      "steps": [
        {
          "createdAt": "string",
          "id": 0,
          "metadata": "string",
          "name": "string",
          "nextSteps": [
            {
              "id": 0,
              "stepName": "string"
            }
          ],
          "parameters": "string",
          "quantity": 0,
          "serviceName": "string",
          "updatedAt": "string"
        }
      ],
      "updatedAt": "string"
    }
  ],
  "createdAt": "string",
  "firstActionName": "string",
  "id": 0,
  "name": "string",
  "updatedAt": "string"
}
Field Description
id ID of the PlanEntry
name Name of the PlanEntry
firstActionName Name of the First Action
createdAt Creation date of the entry
updatedAt When the entry was last updated
actions Array of the ActionEntries in a Plan
DELETE /choreographer/plan/{id}

Remove the Choreographer Plan record specified by the id path parameter.

POST /choreographer/mgmt/session/start

Starts one or more plans in sessions.

ChoreographerPlanIDList is the input

[
  {
    "id": 0
  }
]
Field Description Mandatory
id ID of a plan to be executed yes
POST /choreographer/mgmt/session/stepFinished

Returns HTTP 200 - OK if the notification of the Choreographer is successful.

SessionRunningStepData is the input

{
  "runningStepId": 0,
  "sessionId": 0
}

<br /

System Design Description Overview


The purpose of this System is to be the entry board for the onboarding procedure. The onboarding controller sits at the edge of the Arrowhead local cloud. It is not only reachable from within the cloud by authorized systems, but also from the public through its "accept all" interfaces. Any client may authenticate itself through an Arrowhead certificate, through an authorized manufacturer certificate, or simply through a shared secret.

onboarding_controller

Services and Use Cases

The only use case is the onboarding procedure.

The onboarding procedure is needed when a new device produced by any vendor (e.g. Siemens, Infineon, Bosch, etc.), containing a security controller (e.g. TPM), wants to interact with the Arrowhead local cloud. To assure that the cloud is not compromised upon the arrival of this new device, it is important to establish a chain of trust from the new hardware device, to its hosted application systems and their services. Thus, the onboarding procedure makes possible that the device, systems and services are authenticated and authorized to connect to the Arrowhead local cloud.

The use cases in which the external actor interacts with the Arrowhead local cloud during onboarding include:

  • Initialize Device Onboarding (via the Onboarding Controller system)
  • Register a Device in the DeviceRegistry (via the DeviceRegistry system)
  • Register a System in the SystemRegistry (via the SystemRegistry system)
  • Register a Service in the ServiceRegistry (via the ServiceRegistry system)
  • Start normal operation (e.g., service lookup, service consumption, etc.)

The onboarding controller can either relay a PKCS #10 Certificate Signing Request or generate one on behalf of the client.

This System can be secured via the HTTPS protocol. If it is started in secure mode, it verifies whether the Application System

  • possesses a proper X.509 identity certificate and whether that certificate is Arrowhead compliant
  • possesses a proper X.509 identity certificate and whether that certificate is trusted by the CA
  • provides a shared secret through HTTP Basic Authentication

The Onboarding Controller offers two types of authentication (certificate or HTTP Basic) and two types operation (provide CSR or generate CSR), thus having four different endpoint. No management or private endpoint exists.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: https://<host>:<port>/onboarding

The general scheme of the URLs is https://<host>:<port>/onboarding/<authentication_type>/<operation_type>

Function URL subpath Method Input Output
Echo /echo GET - OK
Onboard with Name /certificate/name POST OnboardingWithNameRequest OnboardingWithNameResponse
Onboard with Name /sharedsecret/name POST OnboardingWithNameRequest OnboardingWithNameResponse
Onboard with CSR /certificate/csr POST OnboardingWithCsrRequest OnboardingWithCsrResponse
Onboard with CSR /sharedsecret/csr POST OnboardingWithCsrRequest OnboardingWithCsrResponse
POST /certificate/name
POST /sharedsecret/name

Creates a CSR on behalf of the client and eventually returns an onboarding certificate which may be used in the next step of the onboarding controller.

{
  "creationRequestDTO": {
    "commonName": "string",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  }
}
Field Description
commonName The common name field for the new certificate
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key
{
  "rootCertificate": "string",
  "intermediateCertificate": "string",
  "onboardingCertificate": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_ONBOARDING",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "deviceRegistry": {
    "service": "DEVICE_REGISTRY_ONBOARDING_WITH_NAME_SERVICE",
    "uri": "string"
  },
  "systemRegistry": {
    "service": "SYSTEM_REGISTRY_ONBOARDING_WITH_NAME_SERVICE",
    "uri": "string"
  },
  "serviceRegistry": {
    "service": "SERVICE_REGISTRY_REGISTER_SERVICE",
        "uri": "string"
  },
  "orchestrationService": {
    "service": "ORCHESTRATION_SERVICE",
    "uri": "string"
  }
}
Field Description
rootCertificate The Arrowhead master certificate
intermediateCertificate The Arrowhead local cloud certificate
onboardingCertificate The onboarding certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_ONBOARDING for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key
service The service which is reachable under uri
uri The uri under which the depicted service is reachable
POST /certificate/csr
POST /sharedsecret/csr

Creates a CSR on behalf of the client and eventually returns an onboarding certificate which may be used in the next step of the onboarding controller.

{
  "certificateSigningRequest": "string"
}
Field Description
certificateSigningRequest Base64 encoded certificate signing request
{
  "rootCertificate": "string",
  "intermediateCertificate": "string",
  "onboardingCertificate": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_ONBOARDING",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "deviceRegistry": {
    "service": "DEVICE_REGISTRY_ONBOARDING_WITH_CSR_SERVICE",
    "uri": "string"
  },
  "systemRegistry": {
    "service": "SYSTEM_REGISTRY_ONBOARDING_WITH_CSR_SERVICE",
    "uri": "string"
  },
  "serviceRegistry": {
    "service": "SERVICE_REGISTRY_REGISTER_SERVICE",
        "uri": "string"
  },
  "orchestrationService": {
    "service": "ORCHESTRATION_SERVICE",
    "uri": "string"
  }
}
Field Description
rootCertificate The Arrowhead master certificate
intermediateCertificate The Arrowhead local cloud certificate
onboardingCertificate The onboarding certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_ONBOARDING for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key. Always empty for this operation
publicKey Base64 encoded public key
service The service which is reachable under uri
uri The uri under which the depicted service is reachable


System Design Description Overview


This System provides the database, which stores information related to the Devices within the Local Cloud.

The purpose of this System is therefore to allow:

  • Devices to register themselves, making this announcement available to other Application Systems on the network.
  • They are also allowed to remove or update their entries when it is necessary.
  • Generate a client certificate which can be used by the Device to register its Systems

Services and Use Cases

This System provides two Core Service: the device registration and de-registration. Further it provides two Onboarding Services: the onboarding with name and onboarding with CSR.

The register method is used to register a device. The device will contain various metadata as well as a physical endpoint. The various parameters are representing the endpoint information that should be registered.

The unregister method is used to unregister device instances that were previously registered in the Registry. The instance parameter is representing the endpoint information that should be removed.

The onboarding methods are used to register a device and to retrieve a device certificate which must be used on the next step of the onboarding procedure.

This System can be secured via the HTTPS protocol. If it is started in secure mode, it verifies whether the Application System possesses a proper X.509 identity certificate and whether that certificate is Arrowhead compliant in its making. This certificate structure and creation guidelines ensure:

  • Application System is properly bootstrapped into the Local Cloud
  • The Application System indeed belongs to this Local Cloud
  • The Application System then automatically has the right to register its Systems in the Registry.

If these criteria are met, the Application System’s registration or removal message is processed. An Application System can only delete or alter entries that contain the Device as the System Provider in the entry.

The System Registry offers four types of endpoints. Onboarding, Client, Management and Private.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/deviceregistry

Function URL subpath Method Input Output
Onboard with Name /onboarding/name POST DeviceOnboardingWithNameRequest DeviceOnboardingWithNameResponse
Onboard with CSR /onboarding/csr POST DeviceOnboardingWithCsrRequest DeviceOnboardingWithCsrResponse
Function URL subpath Method Input Output
Echo /echo GET - OK
Query /query POST DeviceQueryForm DeviceQueryList
Register /register POST DeviceRegistryEntry DeviceRegistryEntry
Unregister /unregister DELETE Device Name and Mac Address in query parameters OK

A detailed description of management and private endpoints is available in the release notes.

Onboard with Name

POST /onboarding/name

Creates a CSR on behalf of the client, registers the device and eventually returns a device certificate which may be used in the next step of the onboarding controller.

{
  "certificateCreationRequest": {
    "commonName": "string",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "device": {
    "address": "string",
    "authenticationInfo": "string",
    "deviceName": "string",
    "macAddress": "string"
  },
  "endOfValidity": "string",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0
}
Field Description
commonName The common name field for the new certificate
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key
address The optional IP address of the device
authenticationInfo Base64 encoded public key of the certificate this device
deviceName The device name
macAddress The MAC address of the device
endOfValidity The validity of this entry
metadata Various meta information as map
version The version of this entry
{
  "certificateResponse": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_DEVICE",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "createdAt": "string",
  "device": {
    "address": "string",
    "authenticationInfo": "string",
    "createdAt": "string",
    "deviceName": "string",
    "id": 0,
    "macAddress": "string",
    "updatedAt": "string"
  },
  "endOfValidity": "string",
  "id": 0,
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "updatedAt": "string",
  "version": 0
}
Field Description
certificate The Base64 device certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_DEVICE for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key

Additionally all fields from DeviceRegistryEntry are returned.

Onboard with CSR

POST /onboarding/csr

Signs the CSR, registers the device and eventually returns a device certificate which may be used in the next step of the onboarding controller.

{
  "certificateSigningRequest": "string",
  "device": {
    "address": "string",
    "authenticationInfo": "string",
    "deviceName": "string",
    "macAddress": "string"
  },
  "endOfValidity": "string",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0
}
Field Description
certificateSigningRequest Base64 encoded certificate signing request
address The optional IP address of the device
authenticationInfo Base64 encoded public key of the certificate this device
deviceName The device name
macAddress The MAC address of the device
endOfValidity The validity of this entry
metadata Various meta information as map
version The version of this entry
{
  "certificateResponse": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_DEVICE",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "createdAt": "string",
  "device": {
    "address": "string",
    "authenticationInfo": "string",
    "createdAt": "string",
    "deviceName": "string",
    "id": 0,
    "macAddress": "string",
    "updatedAt": "string"
  },
  "endOfValidity": "string",
  "id": 0,
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "updatedAt": "string",
  "version": 0
}
Field Description
certificate The Base64 device certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_DEVICE for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key. Always empty for this operation
publicKey Base64 encoded public key

Additionally all fields from DeviceRegistryEntry are returned.

System Registry

This System provides the database, which stores information related to the System of the currently actively offered Services within the Local Cloud.

The purpose of this System is therefore to allow:

  • Devices to register which Systems they offer at the moment, making this announcement available to other Application Systems on the network.
  • They are also allowed to remove or update their entries when it is necessary.
  • Generate a client certificate which can be used by the System to offer Services

This System provides two Core Service the system registration and de-registration

The register method is used to register a system. The system will contain various metadata as well as a physical endpoint. The various parameters are representing the endpoint information that should be registered.

The unregister method is used to unregister system instances that were previously registered in the Registry. The instance parameter is representing the endpoint information that should be removed.

This System can be secured via the HTTPS protocol. If it is started in secure mode, it verifies whether the Application System possesses a proper X.509 identity certificate and whether that certificate is Arrowhead compliant in its making. This certificate structure and creation guidelines ensure:

  • Application System is properly bootstrapped into the Local Cloud
  • The Application System indeed belongs to this Local Cloud
  • The Application System then automatically has the right to register its Services in the Registry.

If these criteria are met, the Application System’s registration or removal message is processed. An Application System can only delete or alter entries that contain the Device as the System Provider in the entry.

The System Registry offers three types of endpoints. Client, Management and Private.

Swagger API documentation is available on: https://<host>:<port>
The base URL for the requests: http://<host>:<port>/systemregistry

Function URL subpath Method Input Output
Onboard with Name /onboarding/name POST SystemOnboardingWithNameRequest SystemOnboardingWithNameResponse
Onboard with CSR /onboarding/csr POST SystemOnboardingWithCsrRequest SystemOnboardingWithCsrResponse
Function URL subpath Method Input Output
Echo /echo GET - OK
Query /query POST SystemQueryForm SystemQueryList
Register /register POST SystenRegistryEntry SystenRegistryEntry
Unregister /unregister DELETE System Name, Address and Port in query parameters OK

A detailed description of public, management and private endpoints is available in the release notes.

Onboard with Name

POST /onboarding/name

Creates a CSR on behalf of the client, registers the system and eventually returns a system certificate which is valid in the Arrowhead local cloud.

{
  "certificateCreationRequest": {
    "commonName": "string",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "provider": {
    "address": "string",
    "authenticationInfo": "string",
    "deviceName": "string",
    "macAddress": "string"
  },
  "system": {
    "address": "string",
    "authenticationInfo": "string",
    "port": 0,
    "systemName": "string"
  },
  "endOfValidity": "string",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0
}
Field Description
commonName The common name field for the new certificate
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key
address The IP address of the device/system
authenticationInfo Base64 encoded public key of the certificate this device/system
deviceName The device name
macAddress The MAC address of the device
systemName The system name
port The port under which this system's services are available
endOfValidity The validity of this entry
metadata Various meta information as map
version The version of this entry
{
  "certificateResponse": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_SYSTEM",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "createdAt": "string",
    "provider": {
      "address": "string",
      "authenticationInfo": "string",
      "createdAt": "string",
      "deviceName": "string",
      "id": 0,
      "macAddress": "string",
      "updatedAt": "string"
    },
    "system": {
      "address": "string",
      "authenticationInfo": "string",
      "createdAt": "string",
      "id": 0,
      "port": 0,
      "systemName": "string",
      "updatedAt": "string"
    },
  "endOfValidity": "string",
  "id": 0,
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "updatedAt": "string",
  "version": 0
}
Field Description
certificate The Base64 device certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_SYSTEM for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key
publicKey Base64 encoded public key

Additionally all fields from SystemRegistryEntry are returned.

Onboard with CSR

POST /onboarding/csr

Signs the CSR, registers the device and eventually returns a device certificate which may be used in the next step of the onboarding controller.

{
  "certificateSigningRequest": "string",
  "provider": {
    "address": "string",
    "authenticationInfo": "string",
    "deviceName": "string",
    "macAddress": "string"
  },
  "system": {
    "address": "string",
    "authenticationInfo": "string",
    "port": 0,
    "systemName": "string"
  },
  "endOfValidity": "string",
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "version": 0
}
Field Description
certificateSigningRequest Base64 encoded certificate signing request
address The IP address of the device/system
authenticationInfo Base64 encoded public key of the certificate this device/system
deviceName The device name
macAddress The MAC address of the device
systemName The system name
port The port under which this system's services are available
endOfValidity The validity of this entry
metadata Various meta information as map
version The version of this entry
{
  "certificateResponse": {
    "certificate": "string",
    "certificateFormat": "string",
    "certificateType": "AH_SYSTEM",
    "keyPairDTO": {
      "keyAlgorithm": "string",
      "keyFormat": "string",
      "privateKey": "string",
      "publicKey": "string"
    }
  },
  "createdAt": "string",
    "provider": {
      "address": "string",
      "authenticationInfo": "string",
      "createdAt": "string",
      "deviceName": "string",
      "id": 0,
      "macAddress": "string",
      "updatedAt": "string"
    },
    "system": {
      "address": "string",
      "authenticationInfo": "string",
      "createdAt": "string",
      "id": 0,
      "port": 0,
      "systemName": "string",
      "updatedAt": "string"
    },
  "endOfValidity": "string",
  "id": 0,
  "metadata": {
    "additionalProp1": "string",
    "additionalProp2": "string",
    "additionalProp3": "string"
  },
  "updatedAt": "string",
  "version": 0
}
Field Description
certificate The Base64 device certificate for the next step
certificateFormat The certificate format (usually X.509)
certificateType The certificate type. Always AH_DEVICE for this operation
keyAlgorithm The key algorithm of the provided keys
keyFormat The key format of the provided keys
privateKey Base64 encoded private key. Always empty for this operation
publicKey Base64 encoded public key

Additionally all fields from SystemRegistryEntry are returned.

Plant Description Engine

This supporting core system has the purpose of choreographing the consumers and producers in the plant (System of Systems / Local cloud). An abstract view, on which systems the plant contains and how they are connected as consumers and producers, is used to populate the Orchestrator with store rules for each of the consumers. The abstract view does not contain any instance specific information, instead meta-data about each system is used to identify the service producers.

The plant description engine (PDE) can be configured with several variants of the plant description of which at most one can be active. The active plant description is used to populate the orchestrator and if no plant description is active the orchestrator does not contain any store rules populated by the PDE. This can be used to establish alternativ plants (plan A, plan B, etc).

The PDE gathers information about the presence of all specified systems in the active plant description. If a system is not present it raises an alarm. If it detects that an unknown system has registered a service in the service registry it also raises an alarm. For a consumer system to be monitored the system must produce the Monitorable service and hence also register in the service registry.

Please see the Plant Description Engine - System of systems Description (SosD) and Plant Description Engine HTTP(S)/JSON - System Description (SysD) for further details.

Services

The PDE produces two different services:

The PDE consumes the following services:

HawkBit Configuration Manager

The HawkBit configuration manager is responsible for managing software rollouts and configuration updates to the actual hardware devices. This implementation is based on Eclipse HawkBit and is explained in more detail here.

Device Hub with Eclipse Hono

The Device Hub allows devices to publish telemetry information and events or receive commands using various protocols like HTTP, MQTT, or CoAP. In turn, other applications can consume this information from a single Hub using a single protocol (AMQP 1.0) without individually interacting with each device protocol directly. The Device Hub is an integration of Eclipse Hono with the Arrowhead core systems. For more details, see the description and example configuration files for a Helm Chart in the Device Hub folder.