Business Document Metadata Service Location Version 1.0
Committee Specification Draft 01 /
Public Review Draft 01
30 October 2013
Specification URIs
This version:
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/csprd01/BDX-Location-v1.0-csprd01.odt (Authoritative)
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/csprd01/BDX-Location-v1.0-csprd01.html
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/csprd01/BDX-Location-v1.0-csprd01.pdf
Previous version:
N/A
Latest version:
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/BDX-Location-v1.0.odt (Authoritative)
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/BDX-Location-v1.0.html
http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/BDX-Location-v1.0.pdf
Technical Committee:
OASIS Business Document Exchange (BDXR) TC
Chair:
Kenneth Bengtsson (kenneth@alfa1lab.com), Alfa1lab
Editor:
Dale Moberg (dmoberg@axway.com), Axway Software
Related work:
This specification is related to:
Abstract:
This specification defines service discovery methods. A method is first specified to query and retrieve a URL for metadata services. Two metadata service types are then defined. Also an auxiliary method pattern for discovering a registration service to enable access to metadata services is described. The methods defined here are instances of the generic pattern defined within IETF RFCs for Dynamic Delegation Discovery Services (DDDS). This specification then defines DDDS applications for metadata and metadata-registration services.
Status:
This document was last revised or approved by the OASIS Business Document Exchange (BDXR) TC on the above date. The level of approval is also listed above. Check the “Latest version” location noted above for possible later revisions of this document.
Technical Committee members should send comments on this Work Product to the Technical Committee’s email list. Others should send comments to the Technical Committee by using the "Send A Comment" button on the Technical Committee’s web page at http://www.oasis-open.org/committees/bdxr/.
For information on whether any patents have been disclosed that may be essential to implementing this Work Product, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page (http://www.oasis-open.org/committees/bdxr/ipr.php).
Citation format:
When referencing this Work Product the
following citation format should be used:
[BDX-Location-v1.0]
Business Document Metadata Service Location Version 1.0. 30 October 2013. OASIS Committee Specification Draft 01 / Public Review Draft 01. http://docs.oasis-open.org/bdxr/BDX-Location/v1.0/csprd01/BDX-Location-v1.0-csprd01.html.
Notices
Copyright © OASIS Open 2013. All Rights Reserved.
All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification.
OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so.
OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims.
The name "OASIS" is a trademark of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see http://www.oasis-open.org/policies-guidelines/trademark for above guidance.
Table of Contents
2 Business Interaction Metadata Services and Location Discovery
2.1 Overview of the Core Service Location Discovery System
2.2 Complications from the Variety of Ways of Identifying Business Interaction Participants
2.2.1 Service Provider Domains
2.2.2 Non-DNS Participant Identifiers
2.2.3 Protocol Specific Names and Addresses
Appendix B Illustrative Core Conformance
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in [RFC2119].
[DNSCORE] Domain Names – Concepts and Facilities,
SCore]http://tools.ietf.org/rfc/rfc1034
[DNSSEC1] DNS Security Introduction and Requirements,
http://tools.ietf.org/rfc/rfc4033
[DNSSEC2] Resource Records for the DNS Security Extensions, http://tools.ietf.org/rfc/rfc4034
[DNSSEC3] Protocol Modifications for the DNS Security Extensions, http://tools.ietf.org/rfc/rfc4035
[ebCorePartyId] OASIS ebCore Party Id Type Technical Specification
Version 1.0.
OASIS Committee Specification, 28 September 2010,
http://docs.oasis-open.org/ebcore/PartyIdType/v1.0/PartyIdType-1.0.odt
[ebCPPA2] Collaboration-Protocol Profile and Agreement Specification Version 2.0. OASIS Standard, September, 2002. http://www.oasis-open.org/committees/ebxml-cppa/documents/ebcpp-2.0.pdf
[ebCPPA3] Collaboration-Protocol Profile and Agreement Specification Version 3.
[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels”, BCP 14, RFC 2119, March 1997. http://www.ietf.org/rfc/rfc2119.txt.
[RFC2616] Hypertext Transfer Protocol -- HTTP/1.1,
http://tools.ietf.org/rfc/rfc2616
[RFC2782] A DNS RR for specifying the location of services (DNS SRV), http://tools.ietf.org/rfc/rfc2782
[RFC2915] The Naming Authority Pointer (NAPTR) DNS Resource Record, http://tools.ietf.org/rfc/rfc2915
[RFC3401] Dynamic Delegation Discovery System (DDDS) Part One: The Comprehensive DDDS. http://tools.ietf.org/html/rfc3401
[RFC3402] Dynamic Delegation Discovery System (DDDS) Part Two: The Algorithm. http://tools.ietf.org/html/rfc3402
[RFC3403] Dynamic Delegation Discovery System (DDDS)
Part Three: The Domain Name System (DNS) Database.
http://tools.ietf.org/rfc/rfc3403
[RFC3404] Dynamic Delegation Discovery System (DDDS)
Part Four: The Uniform Resource Identifiers (URI) Resolution Application http://tools.ietf.org/rfc/rfc3404
[RFC3405] Dynamic Delegation Discovery System (DDDS) Part Five: URI.ARPA Assignment Procedures
http://tools.ietf.org/rfc/rfc3405
[RFC3833] Threat Analysis of the Domain Name System (DNS), http://tools.ietf.org/rfc/rfc3833
[RFC3958] Domain-Based Application Service Location Using SRV RRs and theDynamic Delegation Discovery Service (DDDS).
http://tools.ietf.org/rfc/rfc3958
[RFC3986] Uniform Resource Identifier (URI): Generic Syntax
http://tools.ietf.org/rfc/rfc3986
[RFC4033] DNS Security Introduction and Requirements,
http://tools.ietf.org/rfc/rfc4033
[RFC4034] Resource Records for the DNS Security Extensions,
http://tools.ietf.org/rfc/rfc4034
[RFC4035] Protocol Modifications for the DNS Security Extensions, http://tools.ietf.org/rfc/rfc4035
[RFC4848] Domain-Based Application Service Location Using URIs and
the Dynamic Delegation Discovery Service (DDDS) http://tools.ietf.org/rfc/rfc4848
[RFC5936] DNS Zone Transfer Protocol (AXFR),
http://tools.ietf.org/rfc/rfc5936
[RFC6781] DNSSEC Operational Practices,
http://tools.ietf.org/rfc/rfc6781
[RFC6895] Domain Name System (DNS) IANA Considerations,
http://tools.ietf.org/rfc/rfc6895
[URN] URN Syntax,
http://tools.ietf.org/rfc/rfc2141
[ODataURL] OData Version 4.0 Part 2: URL Conventions,
[RFC1912] Common DNS Operational and Configuration Errors,
http://tools.ietf.org/rfc/rfc1912
[RFC4697] Observed DNS Resolution Misbehavior,
http://tools.ietf.org/rfc/rfc4697
[RFC4398] Storing Certificates in the Domain Name System (DNS), http://tools.ietf.org/rfc/rfc4398
[RFC5011] Automated Updates of DNS Security (DNSSEC) Trust Anchors, http://tools.ietf.org/rfc/rfc5011
[RFC5731] Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP),
http://tools.ietf.org/rfc/rfc5731
[RFC5625] DNS Proxy Implementation Guidelines,
http://tools.ietf.org/rfc/rfc5625
[SML] PEPPOL Transport Infrastructure Service Metadata Locator (SML),
[WSDL] Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language,
A metadata service for business interactions provides information about what kinds of data transactions, and what kinds of enabling technologies for those data transactions, are available for specific business process participants. While a web site that offers natural language “implementation guides” counts as a metadata service broadly viewed, in this document the focus will be on approaches that have emerged to automate the setup and life-cycle management of business interactions.
The location of a metadata service in this document refers primarily to a URL-specified endpoint identifier [RFC3986,2616] For the location of a human-readable and web-browsable document, a link in an email invitation, on a web page or in the results of a web search engine might provide the service location information. For an automated process, however, it is desirable to have a specific way to publish and retrieve location information. Ideally, the procedure for metadata service location would be as reliable and pervasive as the the ability to find the numerical IP address for a given path of domain name system labels. Interestingly enough, the DNS system itself has specified record types that can store URLs [RFC2915,RFC4848], and whose use in building a location finding infrastructure for service location (of any kind) has been specified [RFC3401,3402,3403,3404].
The goal of this specification is to provide ways to find the location of a metadata service of a given type, and then to use information provided by the service to setup and start-up business interactions. Some specific services will be provided with standard designated values for use in DNS records, and the service field will provide an extension point for future service standardizations by communities or other standards bodies.
The goal of a Dynamic Delegation Discovery System (DDDS) application for metadata service discovery is to find URLs of specific types of metadata services, by using a DNS query string that represents an identity of a person or organization. In other words, the goal is to retrieve one or more URLs from the DNS that will enable finding out more about an entity’s enabled metadata services.
The framework for such a DDDS application sets out what kinds of information must be specified:
· A DNS query string which is a string of concatenated, dot-separated labels.
· Types of DNS records to be retrieved.
· Values for fields within DNS record types that are used.
· Processing steps to be taken.
Because the goal is to find URLs, the NAPTR RR with “U” value in its Flags field (U-NAPTR), provides the core framework for producing the desired DDDS application[RFC4848]. The service field of a U-NAPTR can distinguish distinct kinds of metadata services, or supporting services such as registration services to obtain access authorization for metadata services. DNS domain names of organizations or persons provide the core solution for query strings that may be used when trying to locate metadata services for persons or organizations.
So when “example.com” wants to announce the URL for metadata services, its IT services group can add a U-NAPTR record configuration such as:
IN NAPTR 100 10 "U" "Meta:CPPA" "!^.*$!https://example.com/cppa!" .
or
IN NAPTR 100 10 "U" "Meta:SMP" "!^.*$!https://example.com/smp!" .
The service name (such as, Meta:SMP) identifies a kind of metadata service for the organization with the domain name “example.com,” and the URL obtained from the Regexp field provides a secured endpoint to contact. The Regexp field can be used by applying its value to the DNS label-path to carry out string manipulations that produce the URL. However, if the URL alone is needed, a vacuous match using a regular expression such as "^.*$" is applied with the URL returned without modification.
If a registration service is needed to arrange for authorized access, an additional NAPTR record can be added such as:
IN NAPTR 100 10 "U" "Register:CPPA" "!^.*$!https://example.com/register!" .
In essence, the above approach provides a simple but general approach to retrieving URLs for an organization’s metadata and registration services that is usable for both programmatic and human access.
A DDDS approach to metadata and metadata-registration service location obviously is most straightforwardly applied when the interacting participants all make use of DNS domain names associated with their businesses. This is because the business's domain name itself can serve as the business identifier supplied in the DNS query string when retrieving service locations.
However, there are several situations that require more elaborate approaches to what query strings need to be used to retrieve service locations. For these situations, additional conventions are needed for converting other (non-DNS) identification formats into DNS query strings.
The special situations and purposes include the following:
· Service providers may have agreed upon “special” domains within which all metadata service endpoints will be located.[SML] In this case, information encoding the specific person or organization may need to be prefixed to the special domain names to form the DNS query string. The motivation for this is to allow multiple hosts for metadata or registration services, and to allow specific persons or organizations to announce their service hosts by U-NAPTR records within the “special” domains. The PEPPOL and GS1 networks use special domains, within which DNS addresses for service hosts can be published.
· Identity may be symbolically represented in any number of naming authority formats and values. The ISO registered naming authorities have been mapped into URNs in ebXML’s OASIS ebCore Party Id Type Technical Specification Version 1.0. [ebCorePartyID] There is, additionally, a defined BCP (Best Current Practice) RFC that specifies how URNs can be mapped to query strings. The resulting conventions can define one way to store NAPTR RRs for metadata service information.
· Identity may be associated with other identifying addresses, such as email addresses. Privacy of information concerns may require a specialized registration service for converting email addresses in the email domain to URLs for metadata services of the email identified domain.
· If privacy concerns allow use of DNS RRs, nevertheless, authorization for access to the metadata services may be requested. In that case, additional prerequisite registration services may be required so that the seeker of metadata information may be authorized through an authorization request to the “owner” of the metadata information provided by a service.
These more complex use cases will receive additional discussion.
The PEPPOL network is based on a pattern wherein each business participant has one (or more) service providers; in this four-corner model, business document exchange does not require that there is any common “end-to-end” business document exchange protocol between a business sender and business receiver.
It is possible that the business customer of a service provider has its own DNS domain, and in that case the customer can add U-NAPTR records that provide the URL for the customer’s metadata service located on a host in its service provider's domain.
It is also possible that the customer with a DNS name may not manage its own name servers, or has no convenient way to manage U-NAPTR records for metadata service or registration service locations.
It is then possible to place the metadata service location within the service provider's domain by creating a specialized DNS label for the customer. Such a path can encode a name and naming authority identifier within a prefix label for the DNS query path. Then U-NAPTR records can be retrieved for that prefixed DNS query string that return the URL for the metadata (or other) service.
In [SML], for example, the following URL pattern has been utilized:
http://<hash over recipientID>.<schemeID>.<SMLdomain>/<recipientID>/services/<documentType>
Furthermore, [SML] illustrates the hash over a recipientID as follows: "An example participant ID is "0010:5798000000001" ... for which the MD5 hash is "e49b223851f6e97cbfce4f72c3402aac". It is noted that the hash value is prefixed with a "B-" string.
Then a U-NAPTR for a DNS query string "B-e49b223851f6e97cbfce4f72c3402aac.sid.peppol.eu to a SMP metadata service hosted at “serviceprovider.peppol.eu” might be:
IN NAPTR 100 10 "U" "Meta:SMP" "!^.*$!https://serviceprovider.peppol.eu/e49b223851f6e97cbfce4f72c3402aac/!" .
Or, utilizing the regexp capability for group extraction from query strings,
IN NAPTR 100 10 "U" "Meta:SMP" "!^B-(+[0-9a-fA-F]).sid.peppol.eu$!https://serviceprovider.peppol.eu/\\1!" .
should yield the URL, “https://serviceprovider.peppol.eu/e49b223851f6e97cbfce4f72c3402aac”. (Implementations should beware of varying server-side implementations of regexp backslash escaping.)
Notice that U-NAPTR URLs are not really intended to provide detailed URL paths to specific resources, or to add details that might be found in URL query parameters. Instead a URL provided by the NAPTR is one that provides the “service root” for some service type. The service details may then be appended to ther service root as path elements and/or query parameters. The conventions for service details may be generic REST ones, or they may have a machine processable description ([WSDL] or the like), or have a data model for interaction that supports a system of URL conventions for access to data records [ODataURL]. In other words, either paths and/or query parameters may need to be appended to the service root URL when actually using the service located at the U-NAPTR service location URL.
Since PEPPOL location URL templates combined a base service root with additional path information, retrieving the service location from a U-NAPTR record should be regarded as only providing the service root. More detailed URL path or query parameter conventions can then be separately specified in accordance with one of the previously mentioned approaches to service specification details.
Many naming authorities exist that provide and manage business identifiers.
Ways to provide standardized URNs for various registered or unregistered naming authorities and person or organization name values are developed in [ebCorePartyId]:
"Using the IETF/IANA registered NID format “urn:oasis:names:tc:ebcore:partyid-type:” a variety of ways to specify an organizational name are outlined. For example, the DUNS naming authority type can appear as
urn:oasis:names:tc:ebcore:partyid-type:DataUniversalNumberingSystem:0060
urn:oasis:names:tc:ebcore:partyid-type:iso9735:1"
For each of these types, a DUNS value would appear as a suffix and identify a specific organization or business.
The IETF Best Current Practice [RFC3405] established top level domains (such as “URN.ARPA”) within whose authority any registered NID may place NAPTR records that can be retrieved by queries using DNS label paths. URNs are converted to DNS query paths by appending the top level domain “urn.arpa” to the registered NID (“oasis”). [See [URN] for URN syntax and the concepts of NID (Namespace ID) and NSS (Namespace Specific String).]
Then the URN’s NSS is prepended to obtain the full DNS query string:
myOrgIDValue:0060:iso6523:partyid-type:ebcore:tc:names.oasis.urn.arpa.
The registered NAPTRs for this string then provide URLs for metadata services when the metadata services have protected access, such as that enabled by HTTP basic authentication.
The organization or person identifier formats for Email, IM, and SIP VOIP all make use of a format that links registered DNS names with a user name part (User@Domain).
When there are no concerns about publishing metadata service DNS records (which are intrinsically open and not access-control protected), the user name can be prefixed (as a label) to the domain name to form a DNS query string that may be used to retrieve U-NAPTRs for registration and metadata services. Some technical limitations on label length, and overall DNS query length exist. And in practice, some limitations in octets allowed in labels probably exist.
For new deployments, technical and practical implementations may be worked around by restricting the strings allowed for the new “User” part to be acceptable as DNS labels. For workarounds for existing non-conforming user names, conforming aliases may be created for the non-conforming names, and then used when metadata service RRs are created.
If a registration service is a prerequisite for access to the location of a metadata service, its URL can be published in the DNS using a U-NAPTR RR. This specification leaves the interaction with the registration service as implementation dependent.
In accordance with the ABNF in [RFC4848: 4.5 Service Parameters], the convention for a Registration service is to concatenate the app-service, a colon “:”, and the app-protocol (such as “CPPA” or “SMP”.)
IN NAPTR 100 10 "U" "Register:SMP" "!^.*$!https://example.com/register!"3
Other metadata services can of course be introduced with IANA registered or experimental values.
Given a DNS name formed from DNS labels separated by single dots, both metadata service location discovery, as well as associated registration service locations, can be returned as U-NAPTR records.
To support the use of U-NAPTR in obtaining service location URLs, an implementation of this specification MUST minimally provide an application programming interface that given a DNS name returns an array or similar collection of U-NAPTR resource records containing all defined fields.
More useful implementations SHOULD define and specify functionality for a broader range of inputs, and return types.
Some of these enhanced functions and utilities include:
· functions with inputs for selecting fields of the RRs returned for DNS label-path of the organization, person, or business document exchange network returning metadata or registration service locations.
· utility functions that provide transformations to create the DNS label that is prepended to the hosting domain path to form a distinctive DNS query path.
· utility functions constructing URNs for the participant identities within some naming authority in accordance with [ebCorePartyId] and found in the reserved urn.arpa domain.
· functions combining the above URN with a service hosting domain path to create a DNS label that is prepended to the hosting domain to form the DNS query path.
· functions with configurable filters of RRs (using service values, order, preference or other constraints on U-NAPTR RR fields).
· function requests to return particular formats of returned values or RRs such as XML, JSON, or others.
Applications or modules that make use of the DDDS-based discovery of metadata or registration services MUST provide either core support or enhanced support. Core support amounts to the ability to query for a specific organizational or personal domain and return results for all U-NAPTRs for that domain. Enhanced support will provide the capability to make queries and return results such as those enumerated above.
Specific APIs for core or enhanced support are not defined by this specification. An illustrative example for a web module is provided in appendix B.
It is worth noting that enhanced implementation APIs SHOULD allow for inputs of a sequence of strings together with concatenation and other common string operations. Also, various standardized hashing algorithms, such as sha-1, SHOULD be supported to yield short DNS labels allowed by the practical restrictions normally made for domain labels.
DNS information is accessible over the public internet, and is not subject to any authorization restrictions.
While DNS is subject to some security threats [RFC3833], there are several available security enhancements available to establish both the origin of DNS RR data, and the integrity of RR data using DNSSEC security. [RFC4033,4034,4035]
DNS cache poisoning threats can be mitigated by following best practices for DNS data management [RFC5936,6781,6895]
This specification distinguishes two conformance levels for metadata service discovery implementations.
For either level of conformance the DNS record service behavior is fully defined by IETF DNS [RFC4848]. Essentially, U-NAPTR resource records MUST be supported on the server side.
Core Conformance: An implementation exhibits core conformance when it can be given a DNS-based personal or organizational identifier as a DNS label-path and return zero or more DNS RRs in a format containing at least the U-NAPTR RR fields [RFC4848]: order, pref, flags, service, regexp.
A public core-conformant implementation must expose interface and format descriptions and at least one invocation process that enables its use in at least one programming environment. Illustrations of core-conformant implementations are provided in Appendix A.
Enhanced Conformance: An implementation exhibits enhanced conformance when it is core-conformant and additionally is defined for a richer set of inputs, as enumerated in section 2.3 . For an implementation to exhibit enhanced conformance, it must also be a public implementation and define interface and format descriptions as well as one or more invocation procedures usable in one or more programming environments.
The following individuals have participated in the creation of this specification and are gratefully acknowledged:
Participants:
Cruellas, Juan Departamento de Arquitectura de Computadores,
Univ Politecnica de Cataluna
Eijk, Mr. Pim van der Sonnenglanz Consulting
Fieten, Mr. Sander Individual
Forsberg, Mr. Martin Swedish Association of Local Authorities & Regions
Lodi, Mrs. Giorgia Agency for Digital Italy
McGrath, Tim Document Engineering Services Limited
Moberg, Dr. Dale Axway Software
Pedersen, Klaus Difi-Agency for Public Management and eGovernment
Raia, Mr. Alfio Agency for Digital Italy
Rasmussen, Sven Danish Agency for Digitisation, Ministry of Finance
Wigard, Mrs. Susanne Land Nordrhein-Westfalen
1. Unix Shell cli core implementation:
#!/usr/bin/bash
if [ $# == 1 ]
then
dig -t NAPTR $1 | sed 's/^;.*//' | grep $1 > rrs
awk '/IN/ {print $4, $5, $6, $7, $8, $9, $10}' < rrs
else
echo "Missing DNS path."
fi
2. Nodejs core interface description:
Input: meta1.metanet
Json output:
[ '{"name":"meta1.metanet","type":"NAPTR","flags":"u","order":10,"preference":100,"service":"meta:smp",
"value":"http://www.meta1.metanet/smp"}',
'{"name":"meta1.metanet","type": "NAPTR","flags":"u","order":10,"preference":100,"service":"meta:cppa",
"value":"http://www.meta1.metanet/cppa"}' ]
Sample implementation of javascript invocation mechanisms for browsers via Ajax and for shell command lines are provided in a zipped package accompanying this specification.
Revision |
Date |
Editor |
Changes Made |
1 |
October 2012 |
Dale Moberg |
Initial draft |
2 |
December 2012 |
Dale Moberg |
Conformance levels |
3 |
July 2013 |
Dale Moberg |
Security remarks from TC |
4 |
August 2013 |
Dale Moberg |
Sample core conformance interface illustrations |
5 |
September 2013 |
Dale Moberg |
https://lists.oasis-open.org/archives/bdxr/201308/msg00002.html Rework Peppol section 2.2.1 U-Naptr, adding regexp utilization example. |
|
|
|
|
|
|
|
|