You are viewing the documentation for Blueriq 16. Documentation for other versions is available in our documentation directory.
The AQ_RestServiceClient
service makes it possible to call a REST webservice.
Parameters
The following parameters can be set for the service from Encore:
Name | Description | Type | Required | Direction | Select module |
---|---|---|---|---|---|
restService | The name of the REST service along with the module where it is defined. | Module Element | Yes | Input | Yes |
operation | The name of the operation of the REST service that needs to be called. | String | Yes | Input | No |
url | The URL of the REST webservice. | String Expression | No | Input | No |
connectionOverride | The name to use when overriding connection in the Runtime configuration files (more about this in the following section). Not that if the expression returns the value unknown ( ? ) as result, an error is thrown. In this scenario no fallback is used. | String Expression | No | Input | No |
mapping | The name of the data mapping to use along with the module where it can be found. | Data mapping | No | BiDirectional | No |
username | The username to use in the service calling. | String | No | Input | No |
password | The password to use in the service calling. | String | No | Input | No |
Overriding parameters
The parameters url, username and password can be overridden in the Runtime's configuration files.
To do so, one can use either the name of the service call of type AQ_RestServiceClient in Blueriq Encore or the value given to the connectionOverride field.
Final considerations
One must be consistent in the way it assigns value to the service parameters. Giving value to one parameter in a place and to another parameter in another place might prove faulty. For instance if one overrides the url by using a connection override but keeps the username and password values in Encore, the latter will not be used by the Runtime since it expects them to also be overridden in the configuration files.
Error handling
When the runtime sumbles upon an arror during execution of the AQ_RestServiceClient, there are serveral options to handle this:
- The exception exit can be used to handle exceptions such as a failing data mapping, or a response body that doesn't match the domain schema.
- Use the exit events to handle timeouts, client errors (http status code 4xx), and server errors (http status code 5xx).
- If there is a need to distinguish on a more specific http status code than the aforemantioned ranges, you can use the header in the REST service to map the status code with the name "Status" to the profile.
Exit events
Name | Description | Type |
---|---|---|
Timeout | When the REST request returns a timeout exception. | Continue |
ClientError (since 16.7) | When the REST request returns a 4xx exception. | Continue |
ServerError (since 16.7) | When the REST request returns a 5xx exception. | Continue |
default exit event | All unmapped events will be redirected to the default exit node of the service call, even errors. Therefore it is recommended to always map all possible expected exit events. | Continue |
Authentication options
There are several authentication options, which are configurable per connection with properties:
No authentication
When no username and password are set for the service call (none in Encore and also none in the Connections Properties), then no authentication will be attempted. You should use this when the Rest Endpoint that you are calling is not secured.
Basic authentication
When a username and password are supplied, either in Encore or in the Connections Properties, these credentials will be supplied to the Rest Endpoint.
OpenID Connect authentication
See OpenID Connect for more information.
Oauth2 authentication
OAuth2 describes an authentication scheme. In its specification, it is explained what information should be in requests and responses, but not how this information should be transmitted.
Therefore, we use sensible defaults as described in this section. If you need other behavior, you can develop a custom Blueriq extension, as described below.
When the Rest Endpoint that needs to be called is secured with OAuth2, you can set the property blueriq.connection.<connectionName>.http.authentication
to oauth2
. You need to fill out some extra properties that should be provided by the maintainer of the endpoint. See Connections Properties for those. Blueriq will request a token from the oauth2-token-endpoint
and call the Rest Service with that token.
Since OAuth2 doesn't specify how certain properties are transmitted when requesting a token, we include a set of default behavior:
- When requesting a token, the
grant_type
andscope
attributes will be sent in the request body, using the application/x-www-form-urlencoded encoding scheme. - When requesting a token, the Client ID and the Client Secret will be sent as Basic Authentication.
- When requesting a token, the POST method is used.
In the token response, we expect a JSON structure that at least contains an
access_token
and atoken_type
:{ "access_token": "f608a968-b1ef-457a-8d1a-71ee007ac4d2", "token_type": "bearer" }
Access tokens are not cached. Each Rest Service call will request a new token.
Customization
If you need different behavior, you can write your own custom Access Token Provider, that needs to implement the com.blueriq.component.api.oauth2.Oauth2AccessTokenProvider
interface and you need to define it as a Spring Bean in your application.
Limitations
- The current implementation is limited to one Access Token Provider per Blueriq Runtime, so all of your OAuth2 enabled Rest Service Calls will use the same scheme.
- The current implementation does not support the grant type
password
. We only tested theclient_credentials
grant type. - The current implementation will send the Access Token as
Bearer
to the Rest Service endpoint.