Api registry in a container platform for automatically generating client code libraries

ABSTRACT

A method of providing Application Programming Interface (API) functions for registered service endpoints in container environments may include receiving, at an API registry, a request from a second service to use a first service in a container environment, where the API registry may list one or more API functions that call the first service. The method may also include generating, by the API registry, a client library for the second service that includes the one or more API functions to execute calls from the second service to the first service in the container environment.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/826,629 filed Mar. 23, 2020, which is a continuation of U.S.application Ser. No. 16/147,334 filed on Sep. 28, 2018, each of whichare hereby incorporated herein by reference. U.S. application Ser. No.16/147,334 claims benefit of U.S. Provisional Application No. 62/566,351filed on Sep. 30, 2017, which is also hereby incorporated herein byreference. This application is also related to the following commonlyassigned applications:

-   -   U.S. patent application Ser. No. 16/147,305 filed on Sep. 28,        2018, titled API REGISTRY IN A CONTAINER PLATFORM PROVIDING        PROPERTY-BASED API FUNCTIONALITY, which is incorporated herein        by reference;    -   U.S. patent application Ser. No. 16/147,343 filed on Sep. 28,        2018, titled DYNAMIC NODE REBALANCING BETWEEN CONTAINER        PLATFORMS, which is incorporated herein by reference;    -   U.S. patent application Ser. No. 16/147,332 filed on Sep. 28,        2018, titled OPTIMIZING REDEPLOYMENT OF FUNCTIONS AND SERVICES        ACROSS MULTIPLE CONTAINER PLATFORMS AND INSTALLATIONS, which is        incorporated herein by reference; and    -   U.S. patent application Ser. No. 16/147,351 filed on Sep. 28,        2018, titled REAL-TIME DEBUGGING INSTANCES IN A DEPLOYED        CONTAINER PLATFORM, which is incorporated herein by reference.

BACKGROUND

In the abstract, containers in any form represent a standardized methodof packaging and interacting with information. Containers can beisolated from each other and used in parallel without any risk ofcross-contamination. In the modern software world, the term “container”has gained a specific meaning. A software container, such as a Docker®container, is a software construct the logically encapsulates anddefines a piece of software. The most common type of software to beencapsulated in the container is an application, service, ormicroservice. Modern containers also include all of the software supportrequired for the application/service to operate, such as an operatingsystem, libraries, storage volumes, configuration files, applicationbinaries, and other parts of a technology stack that would be found in atypical computing environment. This container environment can then beused to create multiple containers that each run their own services inany environment. Containers can be deployed in a production data center,an on-premises data center, a cloud computing platform, and so forthwithout any changes. Spinning up a container on the cloud is the same asspinning up a container on a local workstation.

Modern service-oriented architectures and cloud computing platformsbreak up large tasks into many small, specific tasks. Containers can beinstantiated to focus on individual specific tasks, and multiplecontainers can then work in concert to implement sophisticatedapplications. This may be referred to as a microservice architecture,and each container can use different versions of programming languagesand libraries that can be upgraded independently. The isolated nature ofthe processing within containers allows them to be upgraded and replacedwith little effort or risk compared to changes that will be made to alarger, more monolithic architectures. Container platforms are much moreefficient than traditional virtual machines in running this microservicearchitecture, although virtual machines can be used to run a containerplatform.

BRIEF SUMMARY

In some embodiments, a method of providing Application ProgrammingInterface (API) functions for registered service endpoints in containerenvironments may include receiving, at an API registry, an APIdefinition that may include an endpoint of a first service that isencapsulated in a container that is deployed in a container environmentand one or more API functions. The method may also include creating, bythe API registry, a binding between the one or more API functions andthe endpoint of the service; receiving, by the API registry, a requestfrom a second service to use the first service; and providing, by theAPI registry, the one or more API functions to the second service.

In some embodiments, a non-transitory, computer-readable medium mayinclude instructions that, when executed by one or more processors,causes the one or more processors to perform operations includingreceiving, at an API registry, an API definition that may include anendpoint of a first service that is encapsulated in a container that isdeployed in a container environment and one or more API functions. Theoperations may also include creating, by the API registry, a bindingbetween the one or more API functions and the endpoint of the service;receiving, by the API registry, a request from a second service to usethe first service; and providing, by the API registry, the one or moreAPI functions to the second service.

In some embodiments, a system may include one or more processors and oneor more memory devices comprising instructions that, when executed bythe one or more processors, cause the one or more processors to performoperations including receiving, at an API registry, an API definitionthat may include an endpoint of a first service that is encapsulated ina container that is deployed in a container environment and one or moreAPI functions. The operations may also include creating, by the APIregistry, a binding between the one or more API functions and theendpoint of the service; receiving, by the API registry, a request froma second service to use the first service; and providing, by the APIregistry, the one or more API functions to the second service.

In any embodiments, any or all of the following features may be includedin any combination and without limitation. The method/operations mayalso include generating a client library for the second service thatincludes the one or more API functions. The client library may includean object class with member functions that implement the API functions.The client library may include a direct call to the endpoint of thefirst service. The client library may include code that updates theendpoint of the first service at runtime when one of the one or more APIfunctions is called by the second service. The client library mayreformat data received as one or more parameters of the one or more APIfunctions into an HTTP call to the endpoint of the first service. Theclient library may request additional information from a third serviceto add to the HTTP call of the endpoint of the first service. The clientlibrary may include code that retries unsuccessful calls to the firstservice. The client library may include code that extracts a resultvalue from a result set of the first service and packages the resultvalue as a return value for the one or more API functions. The endpointof the first service may include an IP address and a port number. Thecontainer environment may include a plurality of services encapsulatedin containers. The API registry may be deployed as a serviceencapsulated in a container in the container environment. the APIregistry is available to services in development in an IntegratedDevelopment Environment (IDE) and services already deployed in thecontainer environment. The method/operations may also includeidentifying, by the API registry, any available endpoints forcontainerized services that have been deployed to the containerenvironment. The method/operations may further include causing a list ofAPI functions for all services registered with the API registry to bedisplayed in a user interface. The request from the second service touse the first service may be received by receiving a selection of one ofthe one or more API functions displayed in the user interface. The userinterface may include a command line interface. The user interface mayinclude a graphical user interface.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the presentinvention may be realized by reference to the remaining portions of thespecification and the drawings, wherein like reference numerals are usedthroughout the several drawings to refer to similar components. In someinstances, a sub-label is associated with a reference numeral to denoteone of multiple similar components. When reference is made to areference numeral without specification to an existing sub-label, it isintended to refer to all such multiple similar components.

FIG. 1 illustrates a software structure and logical arrangement ofdevelopment and runtime environments for services in a containerplatform, according to some embodiments.

FIG. 2 illustrates a specialized computer hardware system that isspecifically designed to run the embodiments described herein.

FIG. 3 illustrates a data organization that may be specific to thecontainer platform used by some of the embodiments described herein.

FIG. 4 illustrates an API registry that can be deployed to the IDE andthe production/runtime environment, according to some embodiments.

FIG. 5 illustrates the deployment of the API registry for use with thecontainer platform at runtime, according to some embodiments.

FIG. 6A illustrates a flowchart of a method for deploying the APIregistry, according to some embodiments.

FIG. 6B illustrates a software structure of a container platform whenthe API registry is deployed using the flowchart in FIG. 6A, accordingto some embodiments.

FIG. 7A illustrates a flowchart of a method for registering a servicewith the API registry, according to some embodiments.

FIG. 7B illustrates a hardware/software diagram of the steps forregistering an API with the API registry, according to some embodiments.

FIG. 8 illustrates examples of a graphical interface and a command lineinterface for browsing and selecting APIs that are registered with theAPI registry, according to some embodiments.

FIG. 9 illustrates a flowchart of a method for using a service and itscorresponding function registered with the API registry, according tosome embodiments.

FIG. 10 illustrates how a selection may be received by the API registrythrough the graphical interface of the CreateUser( ) function.

FIG. 11 illustrates an example of a client library generatedautomatically for a service by the API registry, according to someembodiments.

FIG. 12 illustrates an embodiment of a client library that accommodatesdynamic binding between service endpoints and API functions, accordingto some embodiments.

FIG. 13 illustrates an embodiment of a client library that can marshaladditional data to complete an input data set for a service call,according to some embodiments.

FIG. 14 illustrates a client library that can handle retries whencalling a service, according to some embodiments.

FIG. 15 illustrates a simplified block diagram of a distributed systemfor implementing some of the embodiments.

FIG. 16 illustrates a simplified block diagram of components of a systemenvironment by which services provided by the components of anembodiment system may be offered as cloud services.

FIG. 17 illustrates an exemplary computer system, in which variousembodiments may be implemented.

DETAILED DESCRIPTION

Described herein, are embodiments for an Application ProgrammingInterface (API) registry that is part of an Integrated DevelopmentEnvironment (IDE) that allows developers to register services duringdevelopment and make those services available to other services bothduring and after deployment. The API registry can be deployed as part ofan orchestrated container platform, operating as a containerizedapplication on the container platform. As services or microservices aredeveloped and deployed into containers on the container platform, theAPI registry can execute a discovery process to locate availableendpoints (e.g., IP addresses and port numbers) within the containerplatform that correspond to available services. The API registry canalso accept an upload of an API definition file that can be used to turnthe raw service endpoint into an API function made available through theAPI registry. The API registry can dynamically bind the discoveredendpoint to an API function that be kept up-to-date and made availableto other services in the container platform. This provides a stableendpoint that other services can statically call while the API registrymanages any changes to the binding between the API function in theservice endpoint. This also simplifies the process for using services inthe container platform. Instead of writing code for an HTTP call, newservices can simply use the API interface to access registered services.

In some embodiments, the IDE can provide a navigation/browse interfacefor developers to locate services that are available in the containerplatform and registered with the API registry. When calls to existingservices are created by the API registry for new services underdevelopment, the API registry can automatically generate a set of clientlibraries that include all the necessary functionality to interact withthe registered service. For example, some embodiments may generate anobject class that includes member functions corresponding to API calls.During development, new services can simply instantiate these objectsand/or use their member functions to make a call to the correspondingAPI. The code in the client libraries governs a direct connectionbetween the calling service and the endpoint of the registered serviceand may include code that handles all the functionality necessary forthis interaction. For example, the automatically generated clientlibraries may include: code for packaging and formatting parameters fromthe API call into an HTTP call to the service endpoint, code formarshaling data to complete parameter sets for the call, code forpackaging information into a compatible packet (JSON, XML, etc.), codefor receiving and parsing result packets, code for handling retries anderror conditions, and so forth. From the calling service's perspective,the code to handle all of this functionality is automatically generatedby the API registry and therefore abstracts and encapsulates the detailsof the service call into the client library object. All that is requiredof the calling service is to execute a member function of the clientlibrary object created by the API registry.

In some embodiments, the API registry can also accept an upload of a setof properties that may define the runtime execution of the registeredservice. This set of properties can be uploaded during development alongwith the API definition file. These properties can define runtimecharacteristics, such as end-to-end encryption, usage/loggingrequirements, user authentication, on-demand service instantiation,multiple service deployment instances for high availability, rate/usagelimiting, and other runtime characteristics. The API registry can ensurethat these properties are met by interacting with the containerenvironment during development, during deployment, and during runtime.During development, the automatically generated client libraries forcalling services can include code that may be required to execute theseproperties, such as encryption code, usage logging code, and/orinteraction with a user authentication service. When a registeredservice is being deployed, the API registry can instruct the containerplatform to instantiate multiple instances of the service and/oradditional load-balancing modules to ensure high reliability of theservice during runtime. During runtime when a service is called, the APIregistry can cause the service to be instantiated for on-demandinstantiation, limit the number of API calls that can be made tothrottle usage, and perform other runtime functions.

FIG. 1 illustrates a software structure and logical arrangement ofdevelopment and runtime environments for services in a containerplatform, according to some embodiments. The environments may include anIDE 102 that may be used to develop services and microservices to bedeployed on a container platform. An IDE is a software suite thatconsolidates and provides all of the basic tools that service developerscan use to write and test new services. The IDE 102 may include a sourcecode editor 106 with a graphical user interface (GUI), code completionfunctions, and navigate/browse interfaces that allow a developer towrite, navigate, integrate, and visualize the source-code-writingprocess. The IDE 102 may also include a debugger 110 that includesvariable interfaces, immediate variable interfaces, expressionevaluation interfaces, memory content interfaces, breakpointvisualization and functionality, and other debugging functions. The IDE102 may also include a compiler and/or interpreter 108 for compiling andrunning compiled machine code or interpreted byte code. Thecompiler/interpreter 108 can include build tools that allow developersto use/generate makefiles another build automation constructs. Someembodiments of the IDE 102 may include code libraries 112 that includecommon code functions, objects, interfaces, and/or other structures thatcan be linked into a service under development and reused acrossmultiple developments.

Services can be developed and thoroughly tested within the IDE 102 untilthey are ready for deployment. The services can then be deployed to aproduction/deployment environment 104. The production/developmentenvironment 104 may include many different hardware and/or softwarestructures, including dedicated hardware, virtual machines, andcontainerized platforms. Prior to this disclosure, when a service 114was deployed into the production/deployment environment 104, the service114 would no longer have runtime access to many of the tools used in theIDE 102. Any functionality needed by the service 114 to run in theproduction/development environment 104 needed to be packaged from thecode libraries 112 and deployed with the service 114 into theproduction/deployment environment 104. Additionally, the service 114would typically be deployed without any of the functionality for thedebugger 110 or a copy of the source code from the source code editor106. Essentially, the service 114 would be deployed to theproduction/deployment environment 104 with all of the functionalityrequired for runtime operation, but would be stripped of the informationthat was only used during development.

FIG. 2 illustrates a specialized computer hardware system that isspecifically designed to run the embodiments described herein. By way ofexample, the service 114 can be deployed into an Infrastructure as aService (IaaS) cloud computing environment 202. This is a form of cloudcomputing that provides virtualized or shared computing resources over anetwork. The IaaS cloud computing environment 202 may also include or becoupled with other cloud computing environments arranged as Software asa Service (SaaS) and/or Platform as a Service (PaaS) architetures. Inthis environment, the cloud provider can host an infrastructure ofhardware and/or software components that were traditionally present inan on-premises data center. This hardware may include servers, storage,networking hardware, disk arrays, software libraries, and virtualizationutilities such as a hypervisor layer. The IaaS environment 202 can beprovided by a commercial source, such as Oracle® or other publiclyavailable cloud platforms. The IaaS environment 202 may also be deployedas a private cloud using a private infrastructure of hardware andsoftware.

Regardless of the type of cloud environment, the service 114 can bedeployed onto a number of different types of hardware/software systems.For example, the service 114 can be deployed to dedicated hardware 206.The dedicated hardware 206 may include hardware resources, such asservers, disks, operating systems, software packages, and so forth, thatare specifically assigned to the service 114. For example, a specificserver may be allocated to handle traffic flowing to and from theservice 114.

In another example, the service 114 can be deployed to hardware/softwarethat is operated as one or more virtual machines 208. A virtual machineis an emulation of a computer system that provides the functionality ofthe dedicated computer hardware 206. However, instead of being dedicatedto a specific function, the physical hardware can be shared by number ofdifferent virtual machines. Each virtual machine can provide all thefunctionality needed to execute including a complete operating system.This allows virtual machines having different operating systems to runon the same physical hardware and allows multiple services to share asingle piece of hardware.

In a another example, the service 114 can be deployed to a containerplatform 210. The container platform differs from the virtual machines208 in a number of important ways. First, the container platform 210packages individual services into containers as described in greaterdetail below in FIG. 3. Each container shares a host operating systemkernel, and they also share binaries, libraries, and other read-onlycomponents. This allows containers to be exceptionally light—often onlya few megabytes in size. Additionally, a lightweight container is veryefficient, taking just seconds to start versus the minutes required toboot up a virtual machine. Containers also reduce management overhead bysharing the operating system and other libraries that can be maintainedtogether for the entire set of containers in the container platform 210.Even though containers share the same operating system, they provide anisolated platform, as the operating system provides virtual-memorysupport for isolation. Container technologies may include Docker®containers, the Linux Libcontainer®, the Open Container Initiative(OCI), Kubernetes®, CoeOS, Apache® Mesos, along with others. Thesecontainers can be deployed to a container orchestration platform, whichmay be referred to herein as simply the “container platform” 210. Acontainer platform manages the automated arrangement, coordination, andmanagement of deployed software containers. The container platform 210can provide service discovery, load-balancing, health checks, multipledeployments, and so forth. The container platform 210 may be implementedby any publicly available container platform, such as Kubernetes, thatruns containers organized in nodes and pods.

Regardless of the platform 206, 208, 210 on which the service 114 isdeployed, each of the platforms 206, 208, 210 can provide serviceendpoints 212, 214, 216 that provide public access for calling theservice 114. Generally, these endpoints can be accessed through an HTTPcall and are associated with an IP address and a port number. Byconnecting to the correct IP address and port number, other services cancall services deployed to any of the platforms 206, 208, 210 when theyare made publicly available. Each service, such as service 114, mayinclude its own proprietary formats and data requirements for callingthe service. Similarly, each service may return results that arespecific in format and data type to that service 114. In addition to theservice-specific requirements, the particular deployment platform 206,208, 210 may also include additional requirements for interacting withthe service 114, such as programming languages, package formats (JSON,XML, etc.) that need to be complied with to properly interact with theservice, and so forth.

Although the examples above allow the service 114 to be deployed to anyof the described platforms 206, 208, 210, the embodiments describedherein are specifically designed for the container platform 210described above. Thus, embodiments that are specifically recited to bedeployed in a “container platform” can be distinguished from otherembodiments that are specifically recited to be deployed in a virtualmachine platform, on the server or dedicated hardware platform, orgenerally in an IaaS environment.

FIG. 3 illustrates a data organization that may be specific to thecontainer platform 210 used by some of the embodiments described herein.Generally, any deployment of a service to the container platform will bedeployed to a pod 304, 306. A pod is an abstraction that represents agroup of one or more application containers (e.g., Docker or rkt). A podmay also include some shared resources that are commonly available toall of the containers within the pod. For example, pod 304 includescontainer 310 and container 312. Pod 304 also includes a shared resource308. The resource may include a storage volume or other informationabout how containers are run or connected within the pod 304. The pod304 can model an application-specific logical host that containsdifferent service containers 310, 312 that are relatively tightlycoupled. For example, service 326 in container 310 can utilize theresource 308 and call service 320 in container 312. Service 320 can alsocall service 322, which in turn calls service 324, each of which aredeployed to container 312. The output of service 324 can be provided toa network IP address and port 318, which is another common resourceshared by the pod 304. Thus, the services 320, 322, 324, 326 all worktogether with the shared resource 308 to provide a single service thatcan be accessed by the IP address and port number 318 by services run inother containers. The service can also be accessed through the IPaddress and port 318 by computer systems that are external to thecontainer platform, such as a workstation, a laptop computer, a smartphone, or other computing device that is not part of the containerplatform or IaaS environment.

In the simplest deployment, each container may include a single service,and each pod may include a single container that encapsulates theservice. For example, pod 306 includes only a single container 314 witha single service 328. The single service is accessible through the IPaddress and port number 316 of the pod 306. Typically, when a service isdeployed to the container platform, a container and a pod will beinstantiated to hold the service. A number of different pods can bedeployed to a container node 302. Generally, pods run within nodes. Anode represents a worker machine (either virtual or physical) in thecontainer platform. Each node is managed by a “master” thatautomatically handles scheduling pods within each of the nodes. Eachnode can run a process that is responsible for communication between themaster and the node and for managing the pods in containers on themachine represented by the node. Each node may also include a containerruntime responsible for pulling a container image from a registry,unpacking the container, and running the service.

FIG. 4 illustrates an API registry 404 that can be deployed to the IDE102 and the production/runtime environment 104, according to someembodiments. As described above, a technical problem exists wherein whenthe service 114 is deployed from the IDE 102 to theproduction/deployment environment 104, the service 114 loses runtimeaccess to information that is exclusively available in the IDE 102. TheAPI registry 404 is accessible by the service 114 while it is deployedand operating during runtime in the production/development environment104. The previous technical problem that isolated development functionsfrom runtime functions is overcome by the API registry 404 by theregistration of services with the API registry 404 during developmentand providing an API definition and/or API properties to the APIregistry 404. The information defining the API can be used by newservices in development in the IDE 102 as well as services that havebeen deployed to the production/deployment environment 104. After thisregistration process is complete, the service 114 can operate usingclient libraries that access the API registry 404 during runtime toensure that the API functions are correctly bound to the current IPaddress and port number of the corresponding service. The API registry404 represents a new data structure and processing unit that wasspecifically designed to solve these technical problems.

Another technical problem that existed in the art was implementingservice properties as they are deployed to the production/developmentenvironment 104. For example, if a service was to be deployed with highavailability, the developer would need to build container deploymentfiles that specifically instantiated multiple instances of the servicein the container platform and balanced traffic in such a way that theservice was always available. Service developers did not always havethis expertise, nor were they often able to manage the deployment oftheir service. As described below, the API registry 404 allows a serviceto simply select properties, such as high availability, that can then beimplemented automatically by the API registry 404. This technicalsolution is possible because the API registry 404 bridges the gapbetween the IDE 102 and the production/deployment environment 104.

FIG. 5 illustrates the deployment of the API registry 404 for use withthe container platform 210 at runtime, according to some embodiments.One of the technical solutions and improvements to the existingtechnology offered by the API registry 404 is the maintenance of stableendpoints for service calls, as well as the simplification and automaticcode generation for accessing the service calls. Prior to thisdisclosure, calls between services were point-to-point connectionsusing, for example, an HTTP call to an IP address and port number. Asservices are updated, replaced, relocated, and redeployed in thecontainer platform 210, the IP address and port number may changefrequently. This required all services that called an updated service toupdate their IP address and port numbers in the actual code that calledthat service. The API registry 404 solves this technical problem byproviding a dynamic binding between the IP address and port number of aservice and an API function that is made available through the APIregistry. The client libraries that are automatically generated by theAPI registry 404 can include a function that accesses the API registry404 to retrieve and/or verify a current IP address and port number for aparticular service. Thus, a first service connecting to a second serviceneed only perform a one-time generation of a client library to provide alifetime-stable connection to the second service.

Another technical problem solved by the API registry 404 is theautomatic generation of client libraries. Prior to this disclosure, afirst service accessing a second service required the developer to writecustom code for accessing the second service. Because this code couldchange over time, incompatibilities would a rise between the first andsecond services that required updates to both services. The API registry404 solves this technical problem by uploading an API definition filethat is used to automatically generate client libraries for callingservices. Therefore, a service can specify specifically how the callingcode in any other service should operate, which guaranteescompatibility. These client libraries also greatly simplify andencapsulate the code for calling the service. As described below, acomplicated HTTP call using IP address and a port numbers can bereplaced with a simple member function call in a language that isspecific to the calling service (e.g., Java, C#, etc.). This allows acalling service to select an API function from the API registry 404, andthe code that implements at function can be downloaded to the callingservice as a client library.

FIG. 6A illustrates a flowchart of a method for deploying the APIregistry 404, according to some embodiments. The method may includedeploying the API registry service to the container environment (601).The API registry can be implemented as a service operating in thecontainer environment within the container. Thus, the API registry canbe actively running after services are deployed within the containerenvironment such that it can be accessed at run time. The API registrycan also be linked to the existing IDE described above. The method mayfurther include discovering ports for available services in thecontainer platform (603). As services are deployed to the containerplatform, the API registry can launch a discovery process thatsequentially traverses each of the services deployed to the containerplatform. For each service, the API registry can detect and record an IPaddress and a port number. The listing of IP address and port numbersdiscovered by this process can be stored in a data structure, such as atable associated with the API registry. Each IP address and port numbercan also be stored with a name for the service or other identifier thatuniquely identifies the service on the container platform. These initialsteps shown in flowchart in FIG. 6A provide a starting point for the APIregistry to begin operating in the runtime environment of the containerplatform and to be available to services under development in the IDE.

FIG. 6B illustrates a software structure of the container platform 210when the API registry is deployed using the flowchart in FIG. 6A,according to some embodiments. As described above, the API registry 404can be deployed to a container 620 in the container platform 210. Thecontainer 620 can operate within one or more pods and within a node asdescribed above in FIG. 3. The API registry 404 can be made privatelyavailable to any of the other containers in the container platform 210.In some embodiments, the API registry 404 can also be made publiclyavailable to other devices that are not part of the container platform210. As a containerized service, the API registry 404 may have an IPaddress and port number that are available to other services. However,the IP address and port number of the API registry 404 would only beused by the code that is automatically generated in client libraries,therefore some embodiments do not need to publish the IP address andport number for the API registry 404. Instead, the client libraries inthe IDE itself can maintain an up-to-date listing of the IP address andport number for the API registry 404 such that it can be contactedduring development, deployment, and runtime of other services.

After deploying the API registry 404 to the container 620, the APIregistry 404 can execute a discovery process. The discovery process canuse a directory listing for nodes in the container platform to identifypods that implement services with an IP address and port number. The APIregistry 404 can then access a unique identifier, such as a number orname for each available service, and store an identifier with each IPaddress and port number in the container platform 210. This discoveryprocess can be periodically executed to detect new services that areadded to the container platform 210, as well as to identify existingservices that are removed from the container platform 210. As describedbelow, this discovery process can also be used to detect when an IPaddress and port number change for an existing service. For example, theAPI registry 404 can discover services having endpoints 602, 604, 606,608. In the process described below, the API registry 404 can bind eachof these endpoints 602, 604, 606, 608 to an API function that isregistered with the API registry 404. At some point after this initialdiscovery, the IP address and/or port number for endpoint 602 may bechanged when the service associated with endpoint 602 is replaced,updated, or revised. The API registry 404 can detect this change toendpoint 602 and update a binding to an existing API function providedby the API registry 44.

Similarly, the API registry 404 can use the discovery process to detectwhen endpoints are no longer available, and then remove the APIfunctions associated with the service. In some embodiments, when aservice has been registered with the API registry 404, but thecorresponding API functions are not currently bound to a valid endpoint,the API registry 404 can provide a mock response to any service callingthe corresponding API functions. For example, if an API has beenregistered for the service corresponding to endpoint 604, but endpoint604 is not currently available, the API registry 404 can intercept acall made to endpoint 604 and provide default or dummy data in response.This allows services that call the service associated with endpoint 604to maintain functionality and/or continue the design process without“breaking” the connection to this particular service. Mock/testing datascenarios will be described in greater detail below.

FIG. 7A illustrates a flowchart of a method for registering a servicewith the API registry 404, according to some embodiments. The method mayinclude receiving an upload of an API definition (701). The APIdefinition may be provided in the form of a data packet, file, or a linkto an information repository. The API definition may include anyinformation that can be used to identify and define API functions thatshould be bound to endpoints associated with the service. For example,some embodiments of the API definition may include the following data: aservice name or other unique identifier; function names corresponding toservice endpoints and calls, data inputs required to call the servicewith corresponding descriptions and data types; result data formats anddata types; a current IP address and/or port number; documentation thatdescribes the functionality of the API functions that will be associatedwith the endpoint; default or dummy data values that should be returnedduring mock/test scenarios; and any other information that may be usedby the API registry 404 to translate the HTTP request received by theendpoint into a client library that uses API function calls of classdata objects.

The method may also include creating corresponding API functions basedon the uploaded API definitions (703). These API functions can begenerated automatically based on the API definition. Each endpoint for aservice may be associated with a plurality of different API functions.For example, an endpoint implementing a RESTful interface may receiveHTTP calls for POST, GET, PUT, and DELETE functions at the same IPaddress and port number. This may result in, for example, for differentAPI functions. For example, if the interface represents a list of users,this can correspond to at least four different API functions, such asGetUser( ) AddUser( ) RemoveUser( ) and UpdateUser( ). Additionally,each API function may include a number of different parameter lists,such as UpdateUser(id), UpdateUser(name), UpdateUser(firstname,lastname), and so forth. These API functions can be generated and madeavailable to other services through the API registry. As will bedescribed in greater detail below, it should be noted that services arenot required to call these functions through the API registry. Instead,these functions are made available to browse in the API registry, andwhen selected, the API registry can generate client libraries thatimplement these functions in the calling service.

The method may additionally include creating a binding in the APIregistry between the API function and the corresponding endpoint of theservice (705). Based on the discovery process described above and theregistration process of steps 701, the API registry can now create adynamic binding between an endpoint for a service in the containerplatform and the API function created by the API registry. In the datastructure formed above when discovering available endpoints andservices, the API registry can now store a corresponding function or setof functions for each endpoint. As described above, this binding can beconstantly updated as the discovery process determines when services areupdated, moved, replaced, or added to the container platform. Thisallows the client libraries created in a calling service to first checkwith the API registry to verify or receive a current IP address and portnumber for the service.

FIG. 7B illustrates a hardware/software diagram of the steps forregistering an API with the API registry 404, according to someembodiments. As described above, the API registry 404 can beinstantiated and running in a container 620 in the container platform210. Even though the container platform 210 represents aproduction/deployment environment, the API registry 404 can still beaccessed by the IDE 102 used to develop the service. Thus, the IDE 102can provide a mechanism for uploading the API definition files 702 tothe API registry 404. Specifically, the user interface of the IDE 102may include a window or interface that allows the developer to defineand/or populate fields for the API definition files 702. Thisinformation described above may include function names, parameter lists,data types, field lengths, object class definitions, an IP address andport number, a service name or other unique identifier, and so forth.This information can be uploaded to the API registry 404 and linked in adynamic binding to a particular IP address and port number for theendpoint 602. Finally, the API registry 404 can generate one or more APIfunctions 704 that can be made available through the API registry 404.

After registering a service with the API registry 404 and generating oneor more API functions, the API registry can then make those functionsavailable for developers as they design services. FIG. 8 illustratesexamples of a graphical interface 802 and a command line interface 804for browsing and selecting APIs that are registered with the APIregistry 804, according to some embodiments. When programming anddeveloping a new service for the container platform, the developer canaccess the graphical interface 802 to browse and select API functionsthat can be used in their service. This graphical interface 802 ismerely an example and not meant to be limiting of the types of graphicalinterfaces that can be used to browse and select API functions.

In this embodiment, the IDE 102 can summon the graphical interface 802to provide a list of APIs that are registered with the API registry. Inthis embodiment, the APIs are categorized based on endpoint. Forexample, one endpoint corresponding to a service may offer a RESTfulinterface for storing user records (e.g., “UserStorage”). The graphicalinterface 802 can display all of the API functions (e.g., “CreateUser”,“DeleteUser”, “UpdateUser”, etc.) that are available through theselected endpoint. Other embodiments may group functions based on theoverall service in cases where the service offers multiple endpoints.The graphical interface 802 can receive a selection of one or more APIfunctions to be used in a calling the service. The API registry can thenprovide documentation that illustrates how to use the API function,including required parameters and return values. One having ordinaryskill in the art will understand that the command line interface 804 canprovide similar information and can receive similar inputs as thegraphical interface 802.

The interfaces 802, 804 illustrated in FIG. 8 provide a number oftechnical benefits. First, these interfaces 802, 804 provide anup-to-date listing of all APIs that are registered with the APIregistry. This corresponds to a list of all services currently availablein the container platform. Instead of being required to look updocumentation, contact a service developer, and/or perform otherinefficient tasks for locating a list of available services, a servicedeveloper can retrieve and display this information in real-time.Additionally, as services are updated, the API definition files can beupdated in a corresponding fashion. This then updates the displayillustrated in FIG. 8 to provide up-to-date availability information foreach API function.

FIG. 9 illustrates a flowchart of a method for using a service and itscorresponding function registered with the API registry, according tosome embodiments. The method may include providing a listing ofregistered APIs (901). This step may be omitted in cases where thedesired service is already known. However, generally the services can bedisplayed for browsing and navigation using the interfaces describedabove in FIG. 8. The method may also include receiving a selection of anAPI function (901). This selection may be received by the API registryfrom a developer of the service. For example, a developer may decide toupdate a database of user records using the CreateUser( ) functiondescribed above. FIG. 10 illustrates how a selection 1002 may bereceived by the API registry through the graphical interface 802 for theCreateUser( ) function. Other embodiments may receive the selectionthrough the command line interface or through other input methodsprovided by the IDE.

Referring back to FIG. 9, once the selection of an API function isreceived, the API registry can generate one or more client libraries forthe calling service (905). Generating client libraries may provide thecalling service with the service endpoint that is dynamically bound tothe API function. Specifically, the IDE can generate a set of classobjects in the IDE that encapsulate the functionality required tointerface directly with the service endpoint in the container platform.In some embodiments, client libraries may include object classes thatcan be instantiated or used to call member functions that embody thecode required to communicate with the service. Examples of these clientlibraries will be described in greater detail below.

The method may additionally include providing test data (907). When aservice is registered with the API registry, it need not be complete.Instead, the service can indicate to the API registry that it is not yetready to provide functional responses to calling services. In someembodiments, the API definition file that is uploaded to the APIregistry can include a specification of the type of information thatshould be returned before the service is functional. When the callingservice calls the API function, the client library generated by the APIregistry can route requests to the API registry instead of the serviceendpoint. The API registry can then provide a response using dummy,null, or default values. Alternatively, the code within the clientlibraries themselves can generate the default data to be returned to thecalling service.

It should be appreciated that the specific steps illustrated in FIG. 9provide particular methods of using an API registry according to variousembodiments of the present invention. Other sequences of steps may alsobe performed according to alternative embodiments. For example,alternative embodiments of the present invention may perform the stepsoutlined above in a different order. Moreover, the individual stepsillustrated in FIG. 9 may include multiple sub-steps that may beperformed in various sequences as appropriate to the individual step.Furthermore, additional steps may be added or removed depending on theparticular applications. One of ordinary skill in the art wouldrecognize many variations, modifications, and alternatives.

FIG. 11 illustrates an example of a client library generated for aservice automatically by the API registry, according to someembodiments. This client library 1102 may correspond to a service thatstores user records. This client library 1102 and the correspondingclass and service are provided merely by way of example and not meant tobe limiting. As described above, each API function and service canspecify how client libraries should be generated by virtue of the APIdefinition file uploaded to the API registry. Therefore, the principlesdescribed below in relation to the “User” service may be applied toother services.

To represent the User service, the API registry can generate a class fora User. When the calling service requests client libraries to begenerated by the API registry, the calling service can specify aprogramming language being used by the calling service. For example, ifthe calling service is being written in Java in the IDE, then the APIregistry can generate class libraries in the Java programming language.Alternatively, if the calling service is being written in C#, then theAPI registry can generate class libraries in the C# programminglanguage. The User class can be generated to have member functions thatcorrespond to different operations that may be performed through theservice endpoint. These member functions can be static such that they donot require an instantiated instance of the User class, or they may beused with instantiated User objects.

In this example, the User service may use a RESTful interface to editindividual user records that are stored by the service. For example, theAPI registry can generate the CreateUser( ) function to implement a POSTcall to the User service. One of the functions that can be performed bythe class library is to parse, filter, and format data provided asparameters to the API function to be sent as a data packet directly tothe service. In this example, the CreateUser( ) function can acceptparameters that are formatted for the convenience of the callingservice. For example, the calling service may separately store stringsfor the user first name and the user last. However, the POST command mayrequire a concatenated string of the first name in the last nametogether. In order to accommodate a user-friendly set of parameters, theclient library 1102 can perform a set operations that format the datareceived as parameters to the function into a format that is compatiblewith the service endpoint. This may include generating headerinformation, altering the format of certain data fields, concatenatingdata fields, requesting addional data from other sources, performingcalculations or data transforms, and so forth. This may also includepackaging the reformatted parameters into a format, such as JSON, XML,etc.

Once the parameters are correctly formatted into a package for theservice endpoint, the client library 1102 can also handle the POST callto the service. When the client library is generated, the IP address andport number for the service can be inserted into the CreateUser( )function to be used in an HTTP request to the service. Note that thedetails of the HTTP request are encapsulated in the CreateUser( )function. When a developer for a calling service wants to use the POSTfunction made available by the service, instead of writing the code inthe library 1102 themselves, they can instead select the User servicefrom the API registry. The API registry will then automatically generatethe client library 1102 that includes the User class. Then, to use thePOST function, the service developer can simply use theUser.CreateUser(“John”, “Smith”, 2112) function to add the user JohnSmith to the service.

FIG. 12 illustrates an embodiment of a client library 1202 thataccommodates dynamic binding between service endpoints and APIfunctions, according to some embodiments. In this example, when the APIregistry generates the client library 1202, the CreateUser( ) functioncan include code 1204 that dynamically retrieves the IP address and portnumber for the service. The calling service 114 can use the GetIPPort( )function to send a request to the API registry 404 at run time when thecalling service 114 is operating in the production/deploymentenvironment 104, such as the container platform. The API registry 404can access its internal table that is consistently updated to maintainup-to-date bindings between the API functions and the service endpoints.The API registry 404 can then return a current IP address and portnumber to the calling service 114. The client library 1202 can theninsert the IP address and port number into the HTTP POST code thatconnects to the service. Because the API registry 404 can be accessed atrun time by any calling service in the container platform, none of theseservices need to be updated or patched when the IP address for portnumber for the service being called changes. Instead, the API registry404 can provide up-to-date information every time a service is called.In some embodiments, the GetIPPort( ) function may only need to call theAPI registry 404 once an hour, once a day, once a week, and so forth, tominimize the number of function calls made outside of the container forthe service 114 under the assumption that the service endpoints do notchange frequently in the production environment.

FIG. 13 illustrates an embodiment of a client library 1302 that canmarshal additional data to complete an input data set for a servicecall, according to some embodiments. To simplify using the clientlibrary 1302, the client library 1302 may minimize the number ofparameters required from the service developer. Additional data that maybe required to make the service call can be retrieved from other sourcesand thus may be omitted from the parameter list. These additionalparameters can instead be retrieved directly by the client library 1302from these other sources. For example, creating a new user may includespecifying a user role for the user. Instead of requiring the servicedeveloper to provide a user role as one of the parameters, the clientlibrary 1302 can instead include code 1304 that automatically retrievesa role for the user from some other source. In this example, the userrole can be retrieved from a database, from another service in thecontainer platform, or from another class storing user roles within thecalling service. In any of these cases, the code 1304 can automaticallyretrieve the user role and package it as part of the input data for theHTTP POST command sent to the service.

In addition to marshaling and formatting data for inputs to the service,the client library 1302 can also parse and return data received from theservice and handle error conditions. In this example, the POST commandmay return a data packet into the Result variable. Often times, aservice may return a data packet that includes more information than thecalling service needs. Therefore, the client library 1302 can parse thedata fields in the Result variable and extract, format, and package datafrom the Result variable into a format that is more usable and expectedby the User class. In this example, the code 1306 can extract fieldsfrom the Result variable and use them to create a new User object thatis returned from the API function. In another example using a GETcommand, individual API functions can be generated in the User classthat extract different fields from the Result variable from the GETcommand. For example, the User class could provide a GetFirstName(id)function, a GetLastName(id) function, a GetRole(id) function, and soforth. Each of these functions may include very similar code whilereturning different fields from the Result variable.

In addition to parsing results, the client library 1302 may alsogenerate code 1308 that handles error conditions associated with usingthe service. In this example, the code 1308 can test a status field inthe Result variable to determine whether the POST command wassuccessful. If the command was successful, then the CreateUser( )function can return a new User object. In cases where the Post commandfailed, the function can instead return a null object and/or retry thecall to the service.

FIG. 14 illustrates a client library 1402 that can handle retries whencalling a service, according to some embodiments. Like the example ofFIG. 13, the client library 1402 uses a status in a Result variablepopulated by the POST HTTP call to determine whether the call wassuccessful or not. While the result is unsuccessful, the client library1402 can continue to retry until the call is successful. Someembodiments may use a counter or other mechanism to limit the number ofretries or add a wait time between retries.

Each of the methods described herein may be implemented by a specializedcomputer system. Each step of these methods may be executedautomatically by the computer system, and/or may be provided withinputs/outputs involving a user. For example, a user may provide inputsfor each step in a method, and each of these inputs may be in responseto a specific output requesting such an input, wherein the output isgenerated by the computer system. Each input may be received in responseto a corresponding requesting output. Furthermore, inputs may bereceived from a user, from another computer system as a data stream,retrieved from a memory location, retrieved over a network, requestedfrom a web service, and/or the like. Likewise, outputs may be providedto a user, to another computer system as a data stream, saved in amemory location, sent over a network, provided to a web service, and/orthe like. In short, each step of the methods described herein may beperformed by a computer system, and may involve any number of inputs,outputs, and/or requests to and from the computer system which may ormay not involve a user. Those steps not involving a user may be said tobe performed automatically by the computer system without humanintervention. Therefore, it will be understood in light of thisdisclosure, that each step of each method described herein may bealtered to include an input and output to and from a user, or may bedone automatically by a computer system without human intervention whereany determinations are made by a processor. Furthermore, someembodiments of each of the methods described herein may be implementedas a set of instructions stored on a tangible, non-transitory storagemedium to form a tangible software product.

FIG. 15 depicts a simplified diagram of a distributed system 1500 thatmay interact with any of the embodiments described above. In theillustrated embodiment, distributed system 1500 includes one or moreclient computing devices 1502, 1504, 1506, and 1508, which areconfigured to execute and operate a client application such as a webbrowser, proprietary client (e.g., Oracle Forms), or the like over oneor more network(s) 1510. Server 1512 may be communicatively coupled withremote client computing devices 1502, 1504, 1506, and 1508 via network1510.

In various embodiments, server 1512 may be adapted to run one or moreservices or software applications provided by one or more of thecomponents of the system. In some embodiments, these services may beoffered as web-based or cloud services or under a Software as a Service(SaaS) model to the users of client computing devices 1502, 1504, 1506,and/or 1508. Users operating client computing devices 1502, 1504, 1506,and/or 1508 may in turn utilize one or more client applications tointeract with server 1512 to utilize the services provided by thesecomponents.

In the configuration depicted in the figure, the software components1518, 1520 and 1522 of system 1500 are shown as being implemented onserver 1512. In other embodiments, one or more of the components ofsystem 1500 and/or the services provided by these components may also beimplemented by one or more of the client computing devices 1502, 1504,1506, and/or 1508. Users operating the client computing devices may thenutilize one or more client applications to use the services provided bythese components. These components may be implemented in hardware,firmware, software, or combinations thereof. It should be appreciatedthat various different system configurations are possible, which may bedifferent from distributed system 1500. The embodiment shown in thefigure is thus one example of a distributed system for implementing anembodiment system and is not intended to be limiting.

Client computing devices 1502, 1504, 1506, and/or 1508 may be portablehandheld devices (e.g., an iPhone®, cellular telephone, an iPad®,computing tablet, a personal digital assistant (PDA)) or wearabledevices (e.g., a Google Glass® head mounted display), running softwaresuch as Microsoft Windows Mobile®, and/or a variety of mobile operatingsystems such as iOS, Windows Phone, Android, BlackBerry 10, Palm OS, andthe like, and being Internet, e-mail, short message service (SMS),Blackberry®, or other communication protocol enabled. The clientcomputing devices can be general purpose personal computers including,by way of example, personal computers and/or laptop computers runningvarious versions of Microsoft Windows®, Apple Macintosh®, and/or Linuxoperating systems. The client computing devices can be workstationcomputers running any of a variety of commercially-available UNIX® orUNIX-like operating systems, including without limitation the variety ofGNU/Linux operating systems, such as for example, Google Chrome OS.Alternatively, or in addition, client computing devices 1502, 1504,1506, and 1508 may be any other electronic device, such as a thin-clientcomputer, an Internet-enabled gaming system (e.g., a Microsoft Xboxgaming console with or without a Kinect® gesture input device), and/or apersonal messaging device, capable of communicating over network(s)1510.

Although exemplary distributed system 1500 is shown with four clientcomputing devices, any number of client computing devices may besupported. Other devices, such as devices with sensors, etc., mayinteract with server 1512.

Network(s) 1510 in distributed system 1500 may be any type of networkfamiliar to those skilled in the art that can support datacommunications using any of a variety of commercially-availableprotocols, including without limitation TCP/IP (transmission controlprotocol/Internet protocol), SNA (systems network architecture), IPX(Internet packet exchange), AppleTalk, and the like. Merely by way ofexample, network(s) 1510 can be a local area network (LAN), such as onebased on Ethernet, Token-Ring and/or the like. Network(s) 1510 can be awide-area network and the Internet. It can include a virtual network,including without limitation a virtual private network (VPN), anintranet, an extranet, a public switched telephone network (PSTN), aninfra-red network, a wireless network (e.g., a network operating underany of the Institute of Electrical and Electronics (IEEE) 802.11 suiteof protocols, Bluetooth®, and/or any other wireless protocol); and/orany combination of these and/or other networks.

Server 1512 may be composed of one or more general purpose computers,specialized server computers (including, by way of example, PC (personalcomputer) servers, UNIX® servers, mid-range servers, mainframecomputers, rack-mounted servers, etc.), server farms, server clusters,or any other appropriate arrangement and/or combination. In variousembodiments, server 1512 may be adapted to run one or more services orsoftware applications described in the foregoing disclosure. Forexample, server 1512 may correspond to a server for performingprocessing described above according to an embodiment of the presentdisclosure.

Server 1512 may run an operating system including any of those discussedabove, as well as any commercially available server operating system.Server 1512 may also run any of a variety of additional serverapplications and/or mid-tier applications, including HTTP (hypertexttransport protocol) servers, FTP (file transfer protocol) servers, CGI(common gateway interface) servers, JAVA® servers, database servers, andthe like. Exemplary database servers include without limitation thosecommercially available from Oracle, Microsoft, Sybase, IBM(International Business Machines), and the like.

In some implementations, server 1512 may include one or moreapplications to analyze and consolidate data feeds and/or event updatesreceived from users of client computing devices 1502, 1504, 1506, and1508. As an example, data feeds and/or event updates may include, butare not limited to, Twitter® feeds, Facebook® updates or real-timeupdates received from one or more third party information sources andcontinuous data streams, which may include real-time events related tosensor data applications, financial tickers, network performancemeasuring tools (e.g., network monitoring and traffic managementapplications), clickstream analysis tools, automobile trafficmonitoring, and the like. Server 1512 may also include one or moreapplications to display the data feeds and/or real-time events via oneor more display devices of client computing devices 1502, 1504, 1506,and 1508.

Distributed system 1500 may also include one or more databases 1514 and1516. Databases 1514 and 1516 may reside in a variety of locations. Byway of example, one or more of databases 1514 and 1516 may reside on anon-transitory storage medium local to (and/or resident in) server 1512.Alternatively, databases 1514 and 1516 may be remote from server 1512and in communication with server 1512 via a network-based or dedicatedconnection. In one set of embodiments, databases 1514 and 1516 mayreside in a storage-area network (SAN). Similarly, any necessary filesfor performing the functions attributed to server 1512 may be storedlocally on server 1512 and/or remotely, as appropriate. In one set ofembodiments, databases 1514 and 1516 may include relational databases,such as databases provided by Oracle, that are adapted to store, update,and retrieve data in response to SQL-formatted commands.

FIG. 16 is a simplified block diagram of one or more components of asystem environment 1600 by which services provided by one or morecomponents of an embodiment system may be offered as cloud services, inaccordance with an embodiment of the present disclosure. In theillustrated embodiment, system environment 1600 includes one or moreclient computing devices 1604, 1606, and 1608 that may be used by usersto interact with a cloud infrastructure system 1602 that provides cloudservices. The client computing devices may be configured to operate aclient application such as a web browser, a proprietary clientapplication (e.g., Oracle Forms), or some other application, which maybe used by a user of the client computing device to interact with cloudinfrastructure system 1602 to use services provided by cloudinfrastructure system 1602.

It should be appreciated that cloud infrastructure system 1602 depictedin the figure may have other components than those depicted. Further,the embodiment shown in the figure is only one example of a cloudinfrastructure system that may incorporate an embodiment of theinvention. In some other embodiments, cloud infrastructure system 1602may have more or fewer components than shown in the figure, may combinetwo or more components, or may have a different configuration orarrangement of components.

Client computing devices 1604, 1606, and 1608 may be devices similar tothose described above for 1502, 1504, 1506, and 1508.

Although exemplary system environment 1600 is shown with three clientcomputing devices, any number of client computing devices may besupported. Other devices such as devices with sensors, etc. may interactwith cloud infrastructure system 1602.

Network(s) 1610 may facilitate communications and exchange of databetween clients 1604, 1606, and 1608 and cloud infrastructure system1602. Each network may be any type of network familiar to those skilledin the art that can support data communications using any of a varietyof commercially-available protocols, including those described above fornetwork(s) 1510.

Cloud infrastructure system 1602 may comprise one or more computersand/or servers that may include those described above for server 1512.

In certain embodiments, services provided by the cloud infrastructuresystem may include a host of services that are made available to usersof the cloud infrastructure system on demand, such as online datastorage and backup solutions, Web-based e-mail services, hosted officesuites and document collaboration services, database processing, managedtechnical support services, and the like. Services provided by the cloudinfrastructure system can dynamically scale to meet the needs of itsusers. A specific instantiation of a service provided by cloudinfrastructure system is referred to herein as a “service instance.” Ingeneral, any service made available to a user via a communicationnetwork, such as the Internet, from a cloud service provider's system isreferred to as a “cloud service.” Typically, in a public cloudenvironment, servers and systems that make up the cloud serviceprovider's system are different from the customer's own on-premisesservers and systems. For example, a cloud service provider's system mayhost an application, and a user may, via a communication network such asthe Internet, on demand, order and use the application.

In some examples, a service in a computer network cloud infrastructuremay include protected computer network access to storage, a hosteddatabase, a hosted web server, a software application, or other serviceprovided by a cloud vendor to a user, or as otherwise known in the art.For example, a service can include password-protected access to remotestorage on the cloud through the Internet. As another example, a servicecan include a web service-based hosted relational database and ascript-language middleware engine for private use by a networkeddeveloper. As another example, a service can include access to an emailsoftware application hosted on a cloud vendor's web site.

In certain embodiments, cloud infrastructure system 1602 may include asuite of applications, middleware, and database service offerings thatare delivered to a customer in a self-service, subscription-based,elastically scalable, reliable, highly available, and secure manner. Anexample of such a cloud infrastructure system is the Oracle Public Cloudprovided by the present assignee.

In various embodiments, cloud infrastructure system 1602 may be adaptedto automatically provision, manage and track a customer's subscriptionto services offered by cloud infrastructure system 1602. Cloudinfrastructure system 1602 may provide the cloud services via differentdeployment models. For example, services may be provided under a publiccloud model in which cloud infrastructure system 1602 is owned by anorganization selling cloud services (e.g., owned by Oracle) and theservices are made available to the general public or different industryenterprises. As another example, services may be provided under aprivate cloud model in which cloud infrastructure system 1602 isoperated solely for a single organization and may provide services forone or more entities within the organization. The cloud services mayalso be provided under a community cloud model in which cloudinfrastructure system 1602 and the services provided by cloudinfrastructure system 1602 are shared by several organizations in arelated community. The cloud services may also be provided under ahybrid cloud model, which is a combination of two or more differentmodels.

In some embodiments, the services provided by cloud infrastructuresystem 1602 may include one or more services provided under Software asa Service (SaaS) category, Platform as a Service (PaaS) category,Infrastructure as a Service (IaaS) category, or other categories ofservices including hybrid services. A customer, via a subscriptionorder, may order one or more services provided by cloud infrastructuresystem 1602. Cloud infrastructure system 1602 then performs processingto provide the services in the customer's subscription order.

In some embodiments, the services provided by cloud infrastructuresystem 1602 may include, without limitation, application services,platform services and infrastructure services. In some examples,application services may be provided by the cloud infrastructure systemvia a SaaS platform. The SaaS platform may be configured to providecloud services that fall under the SaaS category. For example, the SaaSplatform may provide capabilities to build and deliver a suite ofon-demand applications on an integrated development and deploymentplatform. The SaaS platform may manage and control the underlyingsoftware and infrastructure for providing the SaaS services. Byutilizing the services provided by the SaaS platform, customers canutilize applications executing on the cloud infrastructure system.Customers can acquire the application services without the need forcustomers to purchase separate licenses and support. Various differentSaaS services may be provided. Examples include, without limitation,services that provide solutions for sales performance management,enterprise integration, and business flexibility for largeorganizations.

In some embodiments, platform services may be provided by the cloudinfrastructure system via a PaaS platform. The PaaS platform may beconfigured to provide cloud services that fall under the PaaS category.Examples of platform services may include without limitation servicesthat enable organizations (such as Oracle) to consolidate existingapplications on a shared, common architecture, as well as the ability tobuild new applications that leverage the shared services provided by theplatform. The PaaS platform may manage and control the underlyingsoftware and infrastructure for providing the PaaS services. Customerscan acquire the PaaS services provided by the cloud infrastructuresystem without the need for customers to purchase separate licenses andsupport. Examples of platform services include, without limitation,Oracle Java Cloud Service (JCS), Oracle Database Cloud Service (DBCS),and others.

By utilizing the services provided by the PaaS platform, customers canemploy programming languages and tools supported by the cloudinfrastructure system and also control the deployed services. In someembodiments, platform services provided by the cloud infrastructuresystem may include database cloud services, middleware cloud services(e.g., Oracle Fusion Middleware services), and Java cloud services. Inone embodiment, database cloud services may support shared servicedeployment models that enable organizations to pool database resourcesand offer customers a Database as a Service in the form of a databasecloud. Middleware cloud services may provide a platform for customers todevelop and deploy various business applications, and Java cloudservices may provide a platform for customers to deploy Javaapplications, in the cloud infrastructure system.

Various different infrastructure services may be provided by an IaaSplatform in the cloud infrastructure system. The infrastructure servicesfacilitate the management and control of the underlying computingresources, such as storage, networks, and other fundamental computingresources for customers utilizing services provided by the SaaS platformand the PaaS platform.

In certain embodiments, cloud infrastructure system 1602 may alsoinclude infrastructure resources 1630 for providing the resources usedto provide various services to customers of the cloud infrastructuresystem. In one embodiment, infrastructure resources 1630 may includepre-integrated and optimized combinations of hardware, such as servers,storage, and networking resources to execute the services provided bythe PaaS platform and the SaaS platform.

In some embodiments, resources in cloud infrastructure system 1602 maybe shared by multiple users and dynamically re-allocated per demand.Additionally, resources may be allocated to users in different timezones. For example, cloud infrastructure system 1630 may enable a firstset of users in a first time zone to utilize resources of the cloudinfrastructure system for a specified number of hours and then enablethe re-allocation of the same resources to another set of users locatedin a different time zone, thereby maximizing the utilization ofresources.

In certain embodiments, a number of internal shared services 1632 may beprovided that are shared by different components or modules of cloudinfrastructure system 1602 and by the services provided by cloudinfrastructure system 1602. These internal shared services may include,without limitation, a security and identity service, an integrationservice, an enterprise repository service, an enterprise managerservice, a virus scanning and white list service, a high availability,backup and recovery service, service for enabling cloud support, anemail service, a notification service, a file transfer service, and thelike.

In certain embodiments, cloud infrastructure system 1602 may providecomprehensive management of cloud services (e.g., SaaS, PaaS, and IaaSservices) in the cloud infrastructure system. In one embodiment, cloudmanagement functionality may include capabilities for provisioning,managing and tracking a customer's subscription received by cloudinfrastructure system 1602, and the like.

In one embodiment, as depicted in the figure, cloud managementfunctionality may be provided by one or more modules, such as an ordermanagement module 1620, an order orchestration module 1622, an orderprovisioning module 1624, an order management and monitoring module1626, and an identity management module 1628. These modules may includeor be provided using one or more computers and/or servers, which may begeneral purpose computers, specialized server computers, server farms,server clusters, or any other appropriate arrangement and/orcombination.

In exemplary operation 1634, a customer using a client device, such asclient device 1604, 1606 or 1608, may interact with cloud infrastructuresystem 1602 by requesting one or more services provided by cloudinfrastructure system 1602 and placing an order for a subscription forone or more services offered by cloud infrastructure system 1602. Incertain embodiments, the customer may access a cloud User Interface(UI), cloud UI 1612, cloud UI 1614 and/or cloud UI 1616 and place asubscription order via these UIs. The order information received bycloud infrastructure system 1602 in response to the customer placing anorder may include information identifying the customer and one or moreservices offered by the cloud infrastructure system 1602 that thecustomer intends to subscribe to.

After an order has been placed by the customer, the order information isreceived via the cloud UIs, 1612, 1614 and/or 1616.

At operation 1636, the order is stored in order database 1618. Orderdatabase 1618 can be one of several databases operated by cloudinfrastructure system 1618 and operated in conjunction with other systemelements.

At operation 1638, the order information is forwarded to an ordermanagement module 1620. In some instances, order management module 1620may be configured to perform billing and accounting functions related tothe order, such as verifying the order, and upon verification, bookingthe order.

At operation 1640, information regarding the order is communicated to anorder orchestration module 1622. Order orchestration module 1622 mayutilize the order information to orchestrate the provisioning ofservices and resources for the order placed by the customer. In someinstances, order orchestration module 1622 may orchestrate theprovisioning of resources to support the subscribed services using theservices of order provisioning module 1624.

In certain embodiments, order orchestration module 1622 enables themanagement of business processes associated with each order and appliesbusiness logic to determine whether an order should proceed toprovisioning. At operation 1642, upon receiving an order for a newsubscription, order orchestration module 1622 sends a request to orderprovisioning module 1624 to allocate resources and configure thoseresources needed to fulfill the subscription order. Order provisioningmodule 1624 enables the allocation of resources for the services orderedby the customer. Order provisioning module 1624 provides a level ofabstraction between the cloud services provided by cloud infrastructuresystem 1600 and the physical implementation layer that is used toprovision the resources for providing the requested services. Orderorchestration module 1622 may thus be isolated from implementationdetails, such as whether or not services and resources are actuallyprovisioned on the fly or pre-provisioned and only allocated/assignedupon request.

At operation 1644, once the services and resources are provisioned, anotification of the provided service may be sent to customers on clientdevices 1604, 1606 and/or 1608 by order provisioning module 1624 ofcloud infrastructure system 1602.

At operation 1646, the customer's subscription order may be managed andtracked by an order management and monitoring module 1626. In someinstances, order management and monitoring module 1626 may be configuredto collect usage statistics for the services in the subscription order,such as the amount of storage used, the amount data transferred, thenumber of users, and the amount of system up time and system down time.

In certain embodiments, cloud infrastructure system 1600 may include anidentity management module 1628. Identity management module 1628 may beconfigured to provide identity services, such as access management andauthorization services in cloud infrastructure system 1600. In someembodiments, identity management module 1628 may control informationabout customers who wish to utilize the services provided by cloudinfrastructure system 1602. Such information can include informationthat authenticates the identities of such customers and information thatdescribes which actions those customers are authorized to performrelative to various system resources (e.g., files, directories,applications, communication ports, memory segments, etc.) Identitymanagement module 1628 may also include the management of descriptiveinformation about each customer and about how and by whom thatdescriptive information can be accessed and modified.

FIG. 17 illustrates an exemplary computer system 1700, in which variousembodiments of the present invention may be implemented. The system 1700may be used to implement any of the computer systems described above. Asshown in the figure, computer system 1700 includes a processing unit1704 that communicates with a number of peripheral subsystems via a bussubsystem 1702. These peripheral subsystems may include a processingacceleration unit 1706, an I/O subsystem 1708, a storage subsystem 1718and a communications subsystem 1724. Storage subsystem 1718 includestangible computer-readable storage media 1722 and a system memory 1710.

Bus subsystem 1702 provides a mechanism for letting the variouscomponents and subsystems of computer system 1700 communicate with eachother as intended. Although bus subsystem 1702 is shown schematically asa single bus, alternative embodiments of the bus subsystem may utilizemultiple buses. Bus subsystem 1702 may be any of several types of busstructures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. Forexample, such architectures may include an Industry StandardArchitecture (ISA) bus, Micro Channel Architecture (MCA) bus, EnhancedISA (EISA) bus, Video Electronics Standards Association (VESA) localbus, and Peripheral Component Interconnect (PCI) bus, which can beimplemented as a Mezzanine bus manufactured to the IEEE P1386.1standard.

Processing unit 1704, which can be implemented as one or more integratedcircuits (e.g., a conventional microprocessor or microcontroller),controls the operation of computer system 1700. One or more processorsmay be included in processing unit 1704. These processors may includesingle core or multicore processors. In certain embodiments, processingunit 1704 may be implemented as one or more independent processing units1732 and/or 1734 with single or multicore processors included in eachprocessing unit. In other embodiments, processing unit 1704 may also beimplemented as a quad-core processing unit formed by integrating twodual-core processors into a single chip.

In various embodiments, processing unit 1704 can execute a variety ofprograms in response to program code and can maintain multipleconcurrently executing programs or processes. At any given time, some orall of the program code to be executed can be resident in processor(s)1704 and/or in storage subsystem 1718. Through suitable programming,processor(s) 1704 can provide various functionalities described above.Computer system 1700 may additionally include a processing accelerationunit 1706, which can include a digital signal processor (DSP), aspecial-purpose processor, and/or the like.

I/O subsystem 1708 may include user interface input devices and userinterface output devices. User interface input devices may include akeyboard, pointing devices such as a mouse or trackball, a touchpad ortouch screen incorporated into a display, a scroll wheel, a click wheel,a dial, a button, a switch, a keypad, audio input devices with voicecommand recognition systems, microphones, and other types of inputdevices. User interface input devices may include, for example, motionsensing and/or gesture recognition devices such as the Microsoft Kinect®motion sensor that enables users to control and interact with an inputdevice, such as the Microsoft Xbox® 360 game controller, through anatural user interface using gestures and spoken commands. Userinterface input devices may also include eye gesture recognition devicessuch as the Google Glass® blink detector that detects eye activity(e.g., ‘blinking’ while taking pictures and/or making a menu selection)from users and transforms the eye gestures as input into an input device(e.g., Google Glass®). Additionally, user interface input devices mayinclude voice recognition sensing devices that enable users to interactwith voice recognition systems (e.g., Siri® navigator), through voicecommands.

User interface input devices may also include, without limitation, threedimensional (3D) mice, joysticks or pointing sticks, gamepads andgraphic tablets, and audio/visual devices such as speakers, digitalcameras, digital camcorders, portable media players, webcams, imagescanners, fingerprint scanners, barcode reader 3D scanners, 3D printers,laser rangefinders, and eye gaze tracking devices. Additionally, userinterface input devices may include, for example, medical imaging inputdevices such as computed tomography, magnetic resonance imaging,position emission tomography, medical ultrasonography devices. Userinterface input devices may also include, for example, audio inputdevices such as MIDI keyboards, digital musical instruments and thelike.

User interface output devices may include a display subsystem, indicatorlights, or non-visual displays such as audio output devices, etc. Thedisplay subsystem may be a cathode ray tube (CRT), a flat-panel device,such as that using a liquid crystal display (LCD) or plasma display, aprojection device, a touch screen, and the like. In general, use of theterm “output device” is intended to include all possible types ofdevices and mechanisms for outputting information from computer system1700 to a user or other computer. For example, user interface outputdevices may include, without limitation, a variety of display devicesthat visually convey text, graphics and audio/video information such asmonitors, printers, speakers, headphones, automotive navigation systems,plotters, voice output devices, and modems.

Computer system 1700 may comprise a storage subsystem 1718 thatcomprises software elements, shown as being currently located within asystem memory 1710. System memory 1710 may store program instructionsthat are loadable and executable on processing unit 1704, as well asdata generated during the execution of these programs.

Depending on the configuration and type of computer system 1700, systemmemory 1710 may be volatile (such as random access memory (RAM)) and/ornon-volatile (such as read-only memory (ROM), flash memory, etc.) TheRAM typically contains data and/or program modules that are immediatelyaccessible to and/or presently being operated and executed by processingunit 1704. In some implementations, system memory 1710 may includemultiple different types of memory, such as static random access memory(SRAM) or dynamic random access memory (DRAM). In some implementations,a basic input/output system (BIOS), containing the basic routines thathelp to transfer information between elements within computer system1700, such as during start-up, may typically be stored in the ROM. Byway of example, and not limitation, system memory 1710 also illustratesapplication programs 1712, which may include client applications, Webbrowsers, mid-tier applications, relational database management systems(RDBMS), etc., program data 1714, and an operating system 1716. By wayof example, operating system 1716 may include various versions ofMicrosoft Windows®, Apple Macintosh®, and/or Linux operating systems, avariety of commercially-available UNIX® or UNIX-like operating systems(including without limitation the variety of GNU/Linux operatingsystems, the Google Chrome® OS, and the like) and/or mobile operatingsystems such as iOS, Windows® Phone, Android® OS, BlackBerry® 10 OS, andPalm® OS operating systems.

Storage subsystem 1718 may also provide a tangible computer-readablestorage medium for storing the basic programming and data constructsthat provide the functionality of some embodiments. Software (programs,code modules, instructions) that when executed by a processor providethe functionality described above may be stored in storage subsystem1718. These software modules or instructions may be executed byprocessing unit 1704. Storage subsystem 1718 may also provide arepository for storing data used in accordance with the presentinvention.

Storage subsystem 1700 may also include a computer-readable storagemedia reader 1720 that can further be connected to computer-readablestorage media 1722. Together and, optionally, in combination with systemmemory 1710, computer-readable storage media 1722 may comprehensivelyrepresent remote, local, fixed, and/or removable storage devices plusstorage media for temporarily and/or more permanently containing,storing, transmitting, and retrieving computer-readable information.

Computer-readable storage media 1722 containing code, or portions ofcode, can also include any appropriate media known or used in the art,including storage media and communication media, such as but not limitedto, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information. This can include tangible computer-readable storagemedia such as RAM, ROM, electronically erasable programmable ROM(EEPROM), flash memory or other memory technology, CD-ROM, digitalversatile disk (DVD), or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or other tangible computer readable media. This can also includenontangible computer-readable media, such as data signals, datatransmissions, or any other medium which can be used to transmit thedesired information and which can be accessed by computing system 1700.

By way of example, computer-readable storage media 1722 may include ahard disk drive that reads from or writes to non-removable, nonvolatilemagnetic media, a magnetic disk drive that reads from or writes to aremovable, nonvolatile magnetic disk, and an optical disk drive thatreads from or writes to a removable, nonvolatile optical disk such as aCD ROM, DVD, and Blu-Ray® disk, or other optical media.Computer-readable storage media 1722 may include, but is not limited to,Zip® drives, flash memory cards, universal serial bus (USB) flashdrives, secure digital (SD) cards, DVD disks, digital video tape, andthe like. Computer-readable storage media 1722 may also include,solid-state drives (SSD) based on non-volatile memory such asflash-memory based SSDs, enterprise flash drives, solid state ROM, andthe like, SSDs based on volatile memory such as solid state RAM, dynamicRAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, andhybrid SSDs that use a combination of DRAM and flash memory based SSDs.The disk drives and their associated computer-readable media may providenon-volatile storage of computer-readable instructions, data structures,program modules, and other data for computer system 1700.

Communications subsystem 1724 provides an interface to other computersystems and networks. Communications subsystem 1724 serves as aninterface for receiving data from and transmitting data to other systemsfrom computer system 1700. For example, communications subsystem 1724may enable computer system 1700 to connect to one or more devices viathe Internet. In some embodiments communications subsystem 1724 caninclude radio frequency (RF) transceiver components for accessingwireless voice and/or data networks (e.g., using cellular telephonetechnology, advanced data network technology, such as 3G, 4G or EDGE(enhanced data rates for global evolution), WiFi (IEEE 802.11 familystandards, or other mobile communication technologies, or anycombination thereof), global positioning system (GPS) receivercomponents, and/or other components. In some embodiments communicationssubsystem 1724 can provide wired network connectivity (e.g., Ethernet)in addition to or instead of a wireless interface.

In some embodiments, communications subsystem 1724 may also receiveinput communication in the form of structured and/or unstructured datafeeds 1726, event streams 1728, event updates 1730, and the like onbehalf of one or more users who may use computer system 1700.

By way of example, communications subsystem 1724 may be configured toreceive data feeds 1726 in real-time from users of social networksand/or other communication services such as Twitter® feeds, Facebook®updates, web feeds such as Rich Site Summary (RSS) feeds, and/orreal-time updates from one or more third party information sources.

Additionally, communications subsystem 1724 may also be configured toreceive data in the form of continuous data streams, which may includeevent streams 1728 of real-time events and/or event updates 1730, thatmay be continuous or unbounded in nature with no explicit end. Examplesof applications that generate continuous data may include, for example,sensor data applications, financial tickers, network performancemeasuring tools (e.g. network monitoring and traffic managementapplications), clickstream analysis tools, automobile trafficmonitoring, and the like.

Communications subsystem 1724 may also be configured to output thestructured and/or unstructured data feeds 1726, event streams 1728,event updates 1730, and the like to one or more databases that may be incommunication with one or more streaming data source computers coupledto computer system 1700.

Computer system 1700 can be one of various types, including a handheldportable device (e.g., an iPhone® cellular phone, an iPad® computingtablet, a PDA), a wearable device (e.g., a Google Glass® head mounteddisplay), a PC, a workstation, a mainframe, a kiosk, a server rack, orany other data processing system.

Due to the ever-changing nature of computers and networks, thedescription of computer system 1700 depicted in the figure is intendedonly as a specific example. Many other configurations having more orfewer components than the system depicted in the figure are possible.For example, customized hardware might also be used and/or particularelements might be implemented in hardware, firmware, software (includingapplets), or a combination. Further, connection to other computingdevices, such as network input/output devices, may be employed. Based onthe disclosure and teachings provided herein, a person of ordinary skillin the art will appreciate other ways and/or methods to implement thevarious embodiments.

In the foregoing description, for the purposes of explanation, numerousspecific details were set forth in order to provide a thoroughunderstanding of various embodiments of the present invention. It willbe apparent, however, to one skilled in the art that embodiments of thepresent invention may be practiced without some of these specificdetails. In other instances, well-known structures and devices are shownin block diagram form.

The foregoing description provides exemplary embodiments only, and isnot intended to limit the scope, applicability, or configuration of thedisclosure. Rather, the foregoing description of the exemplaryembodiments will provide those skilled in the art with an enablingdescription for implementing an exemplary embodiment. It should beunderstood that various changes may be made in the function andarrangement of elements without departing from the spirit and scope ofthe invention as set forth in the appended claims.

Specific details are given in the foregoing description to provide athorough understanding of the embodiments. However, it will beunderstood by one of ordinary skill in the art that the embodiments maybe practiced without these specific details. For example, circuits,systems, networks, processes, and other components may have been shownas components in block diagram form in order not to obscure theembodiments in unnecessary detail. In other instances, well-knowncircuits, processes, algorithms, structures, and techniques may havebeen shown without unnecessary detail in order to avoid obscuring theembodiments.

Also, it is noted that individual embodiments may have been described asa process which is depicted as a flowchart, a flow diagram, a data flowdiagram, a structure diagram, or a block diagram. Although a flowchartmay have described the operations as a sequential process, many of theoperations can be performed in parallel or concurrently. In addition,the order of the operations may be re-arranged. A process is terminatedwhen its operations are completed, but could have additional steps notincluded in a figure. A process may correspond to a method, a function,a procedure, a subroutine, a subprogram, etc. When a process correspondsto a function, its termination can correspond to a return of thefunction to the calling function or the main function.

The term “computer-readable medium” includes, but is not limited toportable or fixed storage devices, optical storage devices, wirelesschannels and various other mediums capable of storing, containing, orcarrying instruction(s) and/or data. A code segment ormachine-executable instructions may represent a procedure, a function, asubprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, etc., may be passed, forwarded, or transmitted via anysuitable means including memory sharing, message passing, token passing,network transmission, etc.

Furthermore, embodiments may be implemented by hardware, software,firmware, middleware, microcode, hardware description languages, or anycombination thereof. When implemented in software, firmware, middlewareor microcode, the program code or code segments to perform the necessarytasks may be stored in a machine readable medium. A processor(s) mayperform the necessary tasks.

In the foregoing specification, aspects of the invention are describedwith reference to specific embodiments thereof, but those skilled in theart will recognize that the invention is not limited thereto. Variousfeatures and aspects of the above-described invention may be usedindividually or jointly. Further, embodiments can be utilized in anynumber of environments and applications beyond those described hereinwithout departing from the broader spirit and scope of thespecification. The specification and drawings are, accordingly, to beregarded as illustrative rather than restrictive.

Additionally, for the purposes of illustration, methods were describedin a particular order. It should be appreciated that in alternateembodiments, the methods may be performed in a different order than thatdescribed. It should also be appreciated that the methods describedabove may be performed by hardware components or may be embodied insequences of machine-executable instructions, which may be used to causea machine, such as a general-purpose or special-purpose processor orlogic circuits programmed with the instructions to perform the methods.These machine-executable instructions may be stored on one or moremachine readable mediums, such as CD-ROMs or other type of opticaldisks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magnetic oroptical cards, flash memory, or other types of machine-readable mediumssuitable for storing electronic instructions. Alternatively, the methodsmay be performed by a combination of hardware and software.

What is claimed is:
 1. A method of providing Application ProgrammingInterface (API) functions for registered service endpoints in containerenvironments, the method comprising: receiving, at an API registry, arequest from a second service to use a first service in a containerenvironment, wherein the API registry lists one or more API functionsthat call the first service; and generating, by the API registry, aclient library for the second service that includes the one or more APIfunctions to execute calls from the second service to the first servicein the container environment.
 2. The method of claim 1, wherein themethod further comprises: receiving, at the API registry, a request fromthe one or more API functions for an endpoint of the first service; andproviding, by the API registry, the endpoint of the first service suchthat the one or more API functions in the second service can execute acall to the endpoint of the first service in the container environment.3. The method of claim 1, wherein the request from the second service touse the first service is received in a development environment.
 4. Themethod of claim 2, wherein the request from the one or more APIfunctions for the endpoint of the first service is received in aproduction environment.
 5. The method of claim 1, further comprising:receiving, at the API registry, an API definition comprising: anendpoint of the first service that is encapsulated in a container thatis deployed in the container environment; and the one or more APIfunctions; creating, by the API registry, a binding between the one ormore API functions and the endpoint of the first service.
 6. The methodof claim 1, further comprising: after providing the client library tothe second service, receiving an change to the endpoint of the firstservice; and before receiving a request from the one or more APIfunctions, creating a new binding between the first service and theendpoint after the change to the endpoint.
 7. The method of claim 1,wherein the client library comprises an object class with memberfunctions that implement the API functions.
 8. The method of claim 1,wherein the client library comprises a direct call to the endpoint ofthe first service.
 9. The method of claim 1, wherein the client libraryreformats data received as one or more parameters of the one or more APIfunctions into an HTTP call to the endpoint of the first service. 10.The method of claim 9, wherein the client library requests additionalinformation from a third service to add to the HTTP call of the endpointof the first service.
 11. The method of claim 1, wherein the clientlibrary comprises code that retries unsuccessful calls to the firstservice.
 12. The method of claim 1, wherein the client library comprisescode that extracts a result value from a result set of the firstservice, and packages the result value as a return value for the one ormore API functions.
 13. A non-transitory computer-readable mediumcomprising instructions that, when executed by one or more processors,causes the one or more processors to perform operations comprising:receiving, at an API registry, a request from a second service to use afirst service in a container environment, wherein the API registry listsone or more API functions that call the first service; and generating,by the API registry, a client library for the second service thatincludes the one or more API functions to execute calls from the secondservice to the first service in the container environment.
 14. Thenon-transitory computer-readable medium of claim 13, wherein an endpointof the first service comprises: an IP address; and a port number. 15.The non-transitory computer-readable medium of claim 13, wherein thecontainer environment comprises a plurality of services encapsulated incontainers.
 16. The non-transitory computer-readable medium of claim 13,wherein the API registry is deployed as a service encapsulated in acontainer in the container environment.
 17. The non-transitorycomputer-readable medium of claim 13, wherein the operations furthercomprise: identifying, by the API registry, any available endpoints forcontainerized services that have been deployed to the containerenvironment.
 18. A system comprising: one or more processors; and one ormore memory devices comprising instructions that, when executed by theone or more processors, cause the one or more processors to performoperations comprising: receiving, at an API registry, a request from asecond service to use a first service in a container environment,wherein the API registry lists one or more API functions that call thefirst service; and generating, by the API registry, a client library forthe second service that includes the one or more API functions toexecute calls from the second service to the first service in thecontainer environment.
 19. The system of claim 18, wherein theoperations further comprise: causing a list of API functions for allservices registered with the API registry to be displayed in a userinterface.
 20. The system of claim 19, wherein the request from thesecond service to use the first service is received by receiving aselection of one of the one or more API functions displayed in the userinterface.