jskos-server
v2.4.0
Published
JSKOS database and web service
Readme
JSKOS Server
Web service to access [JSKOS] data.
JSKOS Server implements the JSKOS API web service and storage for [JSKOS] data such as controlled vocabularies, concepts, and concept mappings.
Table of Contents
- Install
- Usage
- API
- General
- GET /status
- GET /checkAuth
- POST /validate
- GET /validate
- GET /data
- GET /concordances
- GET /concordances/:_id
- POST /concordances
- PUT /concordances/:_id
- PATCH /concordances/:_id
- DELETE /concordances/:_id
- GET /mappings
- GET /mappings/suggest
- GET /mappings/voc
- GET /mappings/infer
- GET /mappings/:_id
- POST /mappings
- PUT /mappings/:_id
- PATCH /mappings/:_id
- DELETE /mappings/:_id
- GET /voc
- POST /voc
- PUT /voc
- DELETE /voc
- GET /voc/top
- GET /voc/concepts
- DELETE /voc/concepts
- GET /voc/suggest
- GET /voc/search
- GET /concepts
- POST /concepts
- PUT /concepts
- DELETE /concepts
- GET /concepts/narrower
- GET /concepts/ancestors
- GET /concepts/suggest
- GET /concepts/search
- GET /registries
- GET /registries/suggest
- POST /registries
- PUT /registries
- DELETE /registries
- GET /annotations
- GET /annotations/:_id
- POST /annotations
- PUT /annotations/:_id
- PATCH /annotations/:_id
- DELETE /annotations/:_id
- Change Stream Endpoints
- Errors
- Deployment
- Data flow
- Related works
- Maintainers
- Contribute
- License
Install
Requirements
You need Node.js 22 or higher and access to a MongoDB database (minimun v4; v6 or v7 recommended).
To enable optional Change Stream endpoints the MongoDB database must be configured as a replica set. When using Docker please refer to our Docker documentation for instructions on setting up a replica set. For a non‐Docker setup, start mongod with the --replSet flag, then once connect with the MongoDB Shell and execute:
rs.initiate({ _id: "rs0", members: [{ _id: 0, host: "localhost:27017" }] });If the replica set is initialized, JSKOS Server will detect it at startup (the replSetGetStatus command is retried up to changes.retries times). If Change Streams are configured but no replica set was detected, JSKOS Server will log an error during startup but continue running with Change Streams disabled.
Docker
The easiest way to install and use JSKOS Server as stand-alone application is with Docker and Docker Compose. Please refer to our Docker documentation for more information and instructions.
Configuration
You can customize the application settings via a configuration file. By default, this configuration file resides in config/config.json. However, it is possible to adjust this path via the CONFIG_FILE environment variable. Note that the given path has to be either absolute (i.e. starting with /) or relative to the config/ folder (i.e. it defaults to ./config.json). Note that the path to the configuration file needs to be valid and writable because a namespace key will be generated and written to the file if it doesn't currently exist. Note that if the file exists and contains invalid JSON data, JSKOS Server will refuse to start.
Currently, there are only two environment variables:
NODE_ENV- eitherdevelopment(default) orproduction; currently, the only difference is that inproduction, HTTPS URIs are forced for entities created on POST requests.CONFIG_FILE- alternate path to a configuration file, relative to theconfig/folder; defaults to./config.json.
You can either provide the environment variables during the command to start the server, or in a .env file in the root folder.
It is also possible to have more specific configuration based on the environment. These are set in config/config.development.json or config/config.production.json. Values from these files have precedent over the user configuration.
Validation of configuration
The provided configuration files (user config and environment config) will be validated with the provided JSON Schema file under config/config.schema.json (public URI: https://gbv.github.io/jskos-server/status.schema.json). If validation fails, JSON Server will refuse to start! Please check whether your configuration is correct after each change. If there is something wrong, the console output will try to provide you with enough detail to fix the issue.
Function validateConfig is exported for used as module:
import { validateConfig } from "jskos-server"
try {
validateConfig(config)
} catch(error) {
console.error(`Invalid configuration: ${error}`)
}Default configuration
All missing keys will be defaulted from config/config.default.json. See endpoint configuration below for additional settings being merged into the configuration.
{
"verbosity": "warn",
"baseUrl": null,
"env": "development",
"title": "JSKOS Server",
"version": null,
"closedWorldAssumption": true,
"port": 3000,
"proxies": [],
"mongo": {
"user": "",
"pass": "",
"host": "127.0.0.1",
"port": 27017,
"db": "jskos-server",
"options": {
"connectTimeoutMS": 360000,
"socketTimeoutMS": 360000,
"heartbeatFrequencyMS": 10000
}
},
"auth": {
"algorithm": "RS256",
"key": null
},
"schemes": true,
"concepts": true,
"mappings": {
"read": {
"auth": false
},
"create": {
"auth": true
},
"update": {
"auth": true,
"crossUser": false
},
"delete": {
"auth": true,
"crossUser": false
},
"fromSchemeWhitelist": null,
"toSchemeWhitelist": null,
"cardinality": "1-to-n"
},
"concordances": true,
"registries": {
"read": {
"auth": false
},
"create": {
"auth": true
},
"update": {
"auth": true,
"crossUser": false
},
"delete": {
"auth": true,
"crossUser": false
},
"mixedTypes": false
},
"annotations": {
"read": {
"auth": false
},
"create": {
"auth": true
},
"update": {
"auth": true,
"crossUser": false
},
"delete": {
"auth": true,
"crossUser": false
},
"moderatingIdentities": [],
"mismatchTagVocabulary": null
},
"changes": false,
"anonymous": false,
"identityProviders": null,
"identityGroups": {},
"identities": null,
"ips": null
}Server configuration
If you are running jskos-server behind a reverse proxy, it is necessary to provide the baseUrl key as well as the proxies key in your configuration. For example:
{
"baseUrl": "https://coli-conc.gbv.de/api/",
"proxies": ["123.456.789.101", "234.567.891.011"]
}Endpoint Configuration
With the keys schemes, concepts, mappings, concordances, registries, and annotations, you can configure whether endpoints related to the specific functionality should be available. A minimal configuration file to just server read-only vocabulary and concept information could look like this:
{
"mappings": false,
"annotations": false,
"concordances": false
}Available actions for each of these endpoints are read, create, update, and delete. By default, all types can be read, while mappings, annotations, and registries can be created, updated, and deleted with authentication.
Explanations for additional options:
auth: Boolean. Can be defined only on actions. Defines whether access will require authentication via JWT. By defaultfalseforread, andtruefor all other actions.crossUser: Boolean or list of URI strings. Can be defined only onupdateanddeleteactions whenauthistrue. Defines whether it is possible to edit an entity from a different user than the authenticated one (true= allowed for all users, list = allowed for specified user URIs).falseby default.anonymous: Boolean. Can be defined on any level (deeper levels will take the values from higher levels if necessary*). If set, no creator and contributor is saved.falseby default.cardinality: String. Can be defined only on typemappings. Currently possible values:1-to-n(default),1-to-1. If1-to-1is configured, mappings with multiple concepts intowill be rejected.identities: List of URI strings. Can be defined on any level (deeper levels will take the values from higher levels if necessary*). If set, an action withauthset totruecan only be used by users with an URI given in the list.nullby default (no restrictions).identityProviders: List of strings. Can be defined on any level (deeper levels will take the values from higher levels if necessary*). If set, an action can only be used by users who have that identity associated with them.nullby default (no restrictions).identityGroups: Object mapping URIs to objects with only fieldidentities. Keys of this option can be used in fieldidentitieselsewhere in the configuration to refer to a group of identities.ips: List of strings. Strings can be IPv4 addresses (e.g.127.0.0.1,123.234.123.234) or CIDR ranges (e.g.192.168.0.1/24). Can be defined on any level (deeper levels will take the values from higher levels if necessary*). If set, an action can only be used by clients with a whitelisted IP address.nullby default (no restrictions). Note: An empty array will allow all IPs. Note: This property will be removed for security reasons when accessing GET /status (meaning that clients will not be able to see the whitelisted IP addresses).fromSchemeWhitelist/toSchemeWhitelist: Can be defined only on typemappings. List of scheme objects that are allowed forfromScheme/toSchemerespectively.nullallows all schemes.mismatchTagVocabulary: Can be defined only on typeannotations. A [JSKOS Concept Schemes] object with required propertyuri. When configured, concept URIs belonging to this vocabulary can be used to tag mapping mismatches in mapping annotations. See below for detailed information about configuration and usage of this feature.
* Only applies to actions create, update, and delete.
Note that any properties not mentioned here are not allowed!
Origin of URIs
This fields are hardcoded in the current version so they don't affect configuration yet!
The create field of configuration can have two field that control where URIs of newly created URIs come from:
uriBase: a string or Boolean (false by default). Value true is replaced by the baseUrl of the server. URIs of newly created items must start with this string.uriOrigin: where URIs of new items orgin from. Default valueexternalrequires clients to provide an URI. Valueuuidcan be used whenuriBaseis set to generate URIs based on UUIDs.
Registries configuration
Endpoint configuration key registries can further contain key types to control object types collected in registries. By default it is set to true for every type with endpoint enabled in [endpoint configuration](#endpoint configuration). Setting a type to false will disallow creation and import of registry having this field. By default, a registry can only have one type of members. Registry configuration key mixedTypes can be set to true to allow registries to have multiple member types.
Member types can further the configured with three Boolean keys:
uriRequired(defaulttrue) whether members must have a valid fieldurimustExist(defaultfalse) whether members must exist in the database (and have the right type)skipInvalid(defaultfalse) to filter out members that don't fulfill requirement oruriRequiredormustExist
Setting mustExist to true and uriRequired to false results in an invalid configuration because URIs are required to check whether an item exists.
Example:
{
"types": {
"schemes": true,
"concepts": {
"uriRequired": true,
"mustExist": false,
"skipInvalid": false
},
},
"mixedTypes": true
}Change Streams Configuration
Change Stream Endpoints are only enabled if changes is set to true or to an object with the following optional keys:
retries(integer, default20) How many times to retry thereplSetGetStatuscommand while waiting for the replica set to initialise before giving up.interval(integer, default5000) Milliseconds to wait between each retry attempt when checking replica-set status.
Only once the replica set is confirmed will the /…/changes endpoints become active, unless MongoDB does is not running with replica set.
Mapping Mismatch Tagging for Negative Assessment Annotations
To differentiate why a mapping was annotated with a negative assessment, a mismatch tagging vocabulary can now be configured under annotations.mismatchTagVocabulary. In theory, any vocabulary can be used, but our instance will use a very small "mismatch" vocabulary available in https://github.com/gbv/jskos-data/tree/master/mismatch.
To set up mapping mismatch tagging, add the vocabulary to the configuration:
{
"annotations": {
"mismatchTagVocabulary": {
"uri": "https://uri.gbv.de/terminology/mismatch/"
}
}
}Currently, the vocabulary and its concepts are required to be imported in the same JSKOS Server instance:
# Import vocabulary metadata
npm run import schemes https://raw.githubusercontent.com/gbv/jskos-data/master/mismatch/mismatch-scheme.json
# Reset existing concepts (e.g. if old version has been imported previously)
npm run reset -- -t concepts -s "https://uri.gbv.de/terminology/mismatch/"
# Import vocabulary concepts
npm run import concepts -- --set-api https://raw.githubusercontent.com/gbv/jskos-data/master/mismatch/mismatch-concepts.jsonAfter restarting JSKOS Server, mapping mismatch tagging is available for annotations. To add such a tag to an annotation, add a body field like this:
{
"motivation": "assessing",
"bodyValue": "-1",
"body": [
{
"type": "SpecificResource",
"value": "https://uri.gbv.de/terminology/mismatch/scope",
"purpose": "tagging"
}
]
}Currently, this is the only supported format, i.e. body as an array containing an object with type of "SpecificResource", purpose of "tagging", and the tag concept's URI as value.
To identify whether a JSKOS Server instance supports this kind of tagging, check the /status endpoint for the config.annotations.mismatchTagVocabulary key.
User accounts
jskos-server does not store user accounts but refers to external identity providers and JSON Web Tokens (JWT) for authentication. Users are identified from field user of a valid JWT passed to jskos-server with a request, having the following subfields:
uriprimary identity of the user.nameoptional name of the user for display (must be a string)identitiesoptional object mapping names of identity providers to identities, each having fielduriadditional identities of the usernameoptional name of the user for display- optional arbitrary fields
- optional arbitrary fields
Optional arbitrary fields don't have semantics in jskos-server and their values are never written into the database but they can be used for extended access control.
So a user can have multiple identities, each being an URI. For example, the following user has ORCID https://orcid.org/0000-0002-2771-9344 and the fictitious GitHub account https://github.com/account. Both can be used interchangeably for access control, but the ORCID is stored (as part of field creator or contributor) when entities are written into the database.
{
"uri": "https://orcid.org/0000-0002-2771-9344",
"name": "Sofia",
"affiliation": "http://example.org/university",
"identities": {
"github": {
"uri": "https://github.com/account",
"name": "Sofia Coding"
}
]
}User names are not unique and not mandatory. Identity and user name can also be passed with query parameters identity and identityName, respectively. The latter can be set to any string, including the empty string to avoid any user name being written to the database. Query parameter identity is ignored if authentication is enabled and its value does not match any of the identities listed in the JWT used for authentication.
User groups are not fully supported yet (see this issue) but
- identities can be grouped in configuration of access control with
identityGroups. - access control can be limited to identity providers with
identityProviders.
Access control
The rights to read, create, update and delete entities via API can be controlled via several configuration settings described above (data import is not limited by these restrictions):
Restricted access via
ipsis always applied in addition to other settingsWithout authentication (
authset tofalse) the server does not know about user accounts. In this case thecreatorandcontributorfields of an object can be set without limitations (default) or they are ignored whenanonymousis set totrue.With authentication an action can be limited to accounts listed in
identities(if set). Rights tocreate,update, anddeleteentities can further depend on two controls:- value of
creatorandcontributorof a superordinated object. Concepts always belong to vocabularies viainSchemeortopConceptOfand mappings can belong to concordances viapartOf. - settings of
crossUsertogether with value ofcreatorandcontributorof the object
- value of
The first control is only checked if it has a superordinated object with contributor and/or creator. This can only be the case for mappings and concepts. The connection to a superordinated object is checked on both the stored object and its modified value, so moving a mapping from one concordance to another is only allowed if access is granted for both. The authenticated user must be listed as creator or contributor of the superordinated object to pass this control.
The second control is only checked when the first control cannot be applied and only on authenticated actions update or delete where anonymous is set to false (this is the default). With crossUser set to false, the authenticated user must be listed as creator of the stored object. With crossUser set to true any authenticated user (optionally limited to those listed in identities) can update or delete the object.
For authenticated actions with anonymous being false creation of a new object will always set its initial creator to the autenticated user and update of an object will always add the user to contributor unless it is already included as creator or contributor. Further modification of creator and contributor (removal and addition of entries) is limited to vocabularies and concordance by authenticated users listed as creator of the object.
Here are some helpful example presets for configuration of "concordances, "mappings", "annotations", or "registries".
Read-only access (does not make sense for annotations):
{
"read": {
"auth": false
}
}Anyone can create, but only logged-in users can update and delete (and only their own items):
{
"read": {
"auth": false
},
"create": {
"auth": false
},
"update": {
"auth": true,
"crossUser": false
},
"delete": {
"auth": true,
"crossUser": false
}
}Anyone can create, logged-in users can update (independent of creator), logged-in users can delete their own items:
{
"read": {
"auth": false
},
"create": {
"auth": false
},
"update": {
"auth": true,
"crossUser": true
},
"delete": {
"auth": true,
"crossUser": false
}
}Anyone can create, as well as update and delete, independent of creator:
{
"read": {
"auth": false
},
"create": {
"auth": false
},
"update": {
"auth": false,
"crossUser": true
},
"delete": {
"auth": false,
"crossUser": true
}
}If write access for concept schemes and/or concepts is necessary, it is recommended that they are secured by only allowing certain users (via identities) or only allowing certain IP addresses (via ips):
Only user with URI https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619 can write:
{
"read": {
"auth": false
},
"create": {
"auth": true,
"identities": ["https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619"]
},
"update": {
"auth": true,
"identities": ["https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619"]
},
"delete": {
"auth": true,
"identities": ["https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619"]
}
}Only localhost can write:
{
"read": {
"auth": false
},
"create": {
"auth": false,
"ips": ["127.0.0.1"]
},
"update": {
"auth": false,
"ips": ["127.0.0.1"]
},
"delete": {
"auth": false,
"ips": ["127.0.0.1"]
}
}Note that auth is set to false because it refers to authentication via JWT. The IP filter is separate from that. An even more secure way would be to use both JWT authentication with an identities filter as well as an IP filter.
Only user with URI https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619 can create, but others can update/delete if they are creator/contributor of an entity:
{
"read": {
"auth": false
},
"create": {
"auth": true,
"identities": ["https://coli-conc.gbv.de/login/users/c0c1914a-f9d6-4b92-a624-bf44118b6619"]
},
"update": {
"auth": true
},
"delete": {
"auth": true
}
}A configuration like this will be used to handle concordances in Cocoda. Only selected accounts will be able to create new concordances, but they will be able to add other accounts as creator/contributor so that those accounts will be able to assign mappings to the concordance and edit mappings that belong to the concordance.
Authentication
It is possible to limit certain actions to authenticated users, indicated by the auth option (see example configurations above). Authorization is performed via JWTs (JSON Web Tokens). To configure authentication, you need to provide the JWT algorithm and the key/secret in the configuration file, like this:
"auth": {
"algorithm": "RS256",
"key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA57ZWRoOjXYTQ9yujxAu7\ne3k4+JRBAqGdDVIRRq5vXB2D5nJBIhQjVjylumn+QnTX/MdZx8qn7X96npUwHwIh\nylCgUmsYXcjP08X/AXEcP5bPOkgBBCKjWmcm+p01RQSOM0nSptyxpyXzr2ppWe1b\nuYdRYDWj+JV7vm+jJA4NiFv4UnAhoG5lRATADzu0/6wpMK3dVMBL7L0jQoV5xBAb\nLADOy5hD9XEII3VPkUqDGIKM+Z24flkCIf0lQ7FjsoZ2mmM1SZJ5vPDcjMKreFkX\ncWlcwGHN0PUWZWLhb7c8yYa1rauMcwFwv0d2XyOEfgkqEJdCh8mVT/5jR48D2PNG\ncwIDAQAB\n-----END PUBLIC KEY-----\n"
}The JWT has to be provided as a Bearer token in the authorization header, e.g. Authorization: Bearer <token>. The authentication is designed to be used together with an instance of [login-server], but it is also possible to use your own JWTs.
JWT Example
The recommended Node.js library for creating JWTs is jsonwebtoken. Note that for simplicity, we are using the HS256 algorithm which is symmetrical. In most cases, it would be better to use RS256 with a libarary like node-rsa instead.
Simple config, restricting the /mappings endpoint with authentication:
{
"auth": {
"algorithm": "HS256",
"key": "yoursecret"
},
"mappings": {
"read": {
"auth": true
}
}
}Creating a JWT:
const jwt = require("jsonwebtoken")
// Payload is an object containing the user object with an URI:
const data = {
user: { uri: "urn:test:hallo" }
}
// Sign the token with our secret
const token = jwt.sign(data, "yoursecret", {
algorithm: "HS256",
expiresIn: "7d" // valid for 7 days
})Using the token in a request (using curl):
# Request without header should return ForbiddenAccessError (code 403)
curl localhost:3000/mappings
# Request with header should return JSON data (insert your own token and jskos-server URL of course)
curl -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjp7InVyaSI6InRlc3Q6aGFsbG8ifSwiaWF0IjoxNTg5NTMyNDU3LCJleHAiOjE1OTAxMzcyNTd9.fXIxgS0QyFk9Lvz7Z-fkb4tAueMTSNZ4zAuB6iwePq4" localhost:3000/mappingsIf you are the only user that is supposed to be authenticated for your instance of jskos-server, you could in theory use something like this to create a token with a long lifetime and use it for all your requests. Please consider the security implications before doing this though.
Login Server Example
If you have multiple users using your instance of jskos-server, it is recommended to use [login-server] for authentication. login-server uses the asymmetrical RS256 algorithm by default and will create a public/private key pair on first launch. The public key will be in ./public.key and you will need that for the configuration:
{
"auth": {
"algorith": "RS256",
"key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA57ZWRoOjXYTQ9yujxAu7\ne3k4+JRBAqGdDVIRRq5vXB2D5nJBIhQjVjylumn+QnTX/MdZx8qn7X96npUwHwIh\nylCgUmsYXcjP08X/AXEcP5bPOkgBBCKjWmcm+p01RQSOM0nSptyxpyXzr2ppWe1b\nuYdRYDWj+JV7vm+jJA4NiFv4UnAhoG5lRATADzu0/6wpMK3dVMBL7L0jQoV5xBAb\nLADOy5hD9XEII3VPkUqDGIKM+Z24flkCIf0lQ7FjsoZ2mmM1SZJ5vPDcjMKreFkX\ncWlcwGHN0PUWZWLhb7c8yYa1rauMcwFwv0d2XyOEfgkqEJdCh8mVT/5jR48D2PNG\ncwIDAQAB\n-----END PUBLIC KEY-----\n"
}
}After that, you can use login-client to interact with your login-server instance and receive JWTs. When using WebSockets, login-server will periodically send a new JWT before the previous one expires. You can then use that to authenticate your requests to jskos-server. (An example on how to use login-client can be found in the source code of login-server.)
For testing your authentication without a full-fledged solution using login-client, you can use http://localhost:3004/token (where localhost:3004 is your instance of login-server) to request a JWT.
Data Import
JSKOS Server provides scripts to import JSKOS data into the database or delete data from the database. Right now, mappings, terminologies (concept schemes), concepts, concordances, and annotations, in JSON (object or array of objects) or NDJSON format are supported.
Import Script
By default the import script has enabled bulk import so invalid entities are filtered out and reported only.
Examples of using the import script:
# Create indexes for all types
npm run import -- --indexes
# Import RVK scheme (from coli-conc API)
npm run import -- schemes https://coli-conc.gbv.de/rvk/api/voc
# Import RVK concepts (this will take a while)
npm run import -- concepts https://coli-conc.gbv.de/rvk/data/2019_1/rvko_2019_1.ndjson
# Import coli-conc concordances
npm run import -- concordances https://coli-conc.gbv.de/api/concordances
# Batch import multiple files or URLs
npm run import-batch -- mappings files.txt
# files.txt should contain one file or URL per line with the full path and no escaping.
# You can, for example, store these batch import files in folder `imports` which is ignored in git.Note: If you have concepts in your database, make sure to run npm run import -- --indexes at least once. This will make sure all necessary indexes are created. Without this step, the /concepts/suggest and /concepts/search endpoints will not work.
For more information about the import script, run npm run import -- --help.
Reset Script
It is also possible to delete entities from the server via the command line. Running the command will first determine what exactly will be deleted and ask you for confirmation:
# Will delete everything from database
npm run reset
# Will delete mappings from database
npm run reset -- -t mappings
# Will delete all concepts that belong to a certain concept scheme URI
npm run reset -- -s http://uri.gbv.de/terminology/rvk/
# Will delete all mappings that belong to a certain concordance URI
npm run reset -- -c https://gbv.github.io/jskos/context.json
# Will delete entities with certain URIs
npm run reset -- http://rvk.uni-regensburg.de/nt/A http://rvk.uni-regensburg.de/nt/B
# Will show help for more information
npm run reset -- --helpFor scripting, you can use the yes command to skip confirmation. Make sure you know what you're doing! Example: yes | npm run reset -- urn:test:uri.
Specifics of importing concepts
Only the broader field will be used during import of concepts: both ancestors and narrower will be removed and the respective endpoints (GET /concepts/ancestors and GET /concepts/narrower) will dynamically rebuild these properties. That means that when converting your data, please normalize it so that the hierarchy is expressed via the broader field in JSKOS.
Example scheme (as JSON object) with concepts in a hierarchy (as NDJSON):
{
"uri": "urn:test:scheme",
"notation": [
"TEST"
],
"uriPattern": "^urn:test:concept-(.+)$"
}{ "topConceptOf": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-a" }
{ "inScheme": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-a.1", "broader": [{ "uri": "urn:test:concept-a" }] }
{ "inScheme": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-a.2", "broader": [{ "uri": "urn:test:concept-a" }] }
{ "topConceptOf": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-b" }
{ "inScheme": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-b.1", "broader": [{ "uri": "urn:test:concept-b" }] }
{ "inScheme": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-b.1.1", "broader": [{ "uri": "urn:test:concept-b.1" }] }
{ "inScheme": [{ "uri": "urn:test:scheme" }], "uri": "urn:test:concept-b.1.2", "broader": [{ "uri": "urn:test:concept-b.1" }] }(Note that a notation for the concepts can be omitted because we have defined uriPattern on the concept scheme. Also, we don't need to define inScheme for concepts with topConceptOf.)
Specifics of importing concept schemes
The import script uses the bulk write endpoints to import data. For concept schemes, this means that any existing data for imported schemes will be overwritten and replaced with the new data. This includes especially the created property which might not exist in your source data and will be set on import if necessary. If you need a consistent created date, make sure that your source data already includes this field.
Usage
Run Server
# Development server with hot reload and auto reconnect at localhost:3000 (default)
npm run start
# To run the server in production, run this:
NODE_ENV=production node ./server.jsSupplemental Scripts
In addition to data import there are some supplemental scripts that were added to deal with specific sitatuations. These can be called with npm run extra name-of-script. The following scripts are available:
supplementNotationsInMappings: This will look for mappings where the fieldnotationis missing for any of the concepts, and it will attempt to supplement those notations. This only works for vocabularies which are also imported into the same jskos-server instance and where eitheruriPatternornamespaceare given.
Use as Module
Use as module is experimental. Authentication is ignored on direct access to services!
import { validateConfig, createServices } from "jskos-server"
try {
validateConfig(config)
} catch(error) {
console.error(`Invalid configuration: ${error}`)
}
const services = createServices(config)
const scheme = await services.scheme.getScheme(schemeUri)Development and Testing
Tests use an ephemeral, in-memory MongoDB server powered by mongodb-memory-server.
npm testThis will:
- Start a MongoDB (sometimes also a replica-set) entirely in memory.
- Connect Mongoose to that in-memory server.
- Create all JSKOS collections & indexes via services.
- Drop the database before and after each test suite, ensuring full isolation.
- Tear down the in-memory server when the suite completes.
Code coverage can be calculated with npm run coverage but numbers should be taken with a grain of salt. By the way, lines of code can be calculated with cloc $(git ls-files).
You can also start an in-memory MongoDB with local configuration:
npm run mongodb # not verbose
npm run mongodb -- --debug # very verboseAnd then start jskos-server:
npm run startAPI
General
All API methods stick to the following rules, unless otherwise specified.
Requests
- All URL parameters are optional.
POST/PUT/PATCHrequests require a JSON body.- Alternatively,
POSTcan also receive the following inputs:- any kind of JSON stream
- mutlipart/form-data with the file in
data - a URL with JSON data as
urlin the request params - Note: The
typerequest param might be required (eitherjson,ndjson, ormultipart)
- All
GETendpoints returning a certain type of JSKOS data offer theproperties=[list]parameter, with[list]being a comma-separated list of properties.- All JSKOS types allow removing properties by prefixing the property with
-. All following properties in the list will also be removed. - For concepts and mappings, the property
annotationscan be specified to add all annotations in the database for a certain item. - For concepts, the properties
narrowerandancestorscan be specified to add narrower/ancestor concepts to a certain concept. - Specifying a
*adds all available properties. - Example:
properties=*,-narrower,notationwill add propertiesannotationsandancestors, and remove thenotationproperty from all return items. - Properties can be explicitly re-added by prefixing them with
+, e.g.properties=-from,to,+fromwill only remove thetoproperty. - Note that the
+sign has to be properly encoded as%2B, otherwise it will be interpreted as a space.
- All JSKOS types allow removing properties by prefixing the property with
- All
GETendpoints (except for/statusand those with:_id) offer pagination vialimit=[number](default: 100) andoffset=[number](default: 0) parameters. In the response, there will be aLinkheader like described in the GitHub API documentation, as well as aX-Total-Countheader containing the total number of results.
Write access
POST/PUT/PATCH/DELETErequests require authentication via a JWT from login-server in the header. Exception: Authentication for certain actions on certain endpoints can be disabled (see configuration).PUT/PATCH/DELETErequests are required to come from the owner of the entity that is being modified.POST/PUT/PATCHendpoints will overridecreatorandcontributorof submitted objects (see this comment for more details)PATCHrequest bodies are merged on the top level, so it's enough to include object properties to be modified. To remove a top-level property, set it tonull.
Responses
GETrequests will return code 200 on success.POSTrequests will return code 201 on success.DELETErequests will return code 204 on success.- For possible error responses, see Errors.
GET /status
Returns a status object.
There is a JSON Schema for the format of this endpoint. It is available under /status.schema.json for every jskos-server installation (starting from version 1.0.0). The most recent schema can be accessed here: https://gbv.github.io/jskos-server/status.schema.json
Note that certain properties from the actual configuration will not be shown in the result for /status:
verbosityportmongonamespaceproxiesips(including inside of actions)auth.keyif a symmetrical algorithm is used (HS256, HS384, HS512)
Success Response
{ "config": { "env": "development", "baseUrl": "http://localhost:3000/", "version": "1.1", "auth": { "algorithm": "RS256", "key": null }, "schemes": { "read": { "auth": false } }, "concepts": { "read": { "auth": false } }, "mappings": { "read": { "auth": false }, "create": { "auth": true }, "update": { "auth": true, "crossUser": false }, "delete": { "auth": true, "crossUser": false }, "fromSchemeWhitelist": null, "toSchemeWhitelist": null, "anonymous": false, "cardinality": "1-to-n" }, "concordances": { "read": { "auth": false } }, "annotations": { "read": { "auth": false }, "create": { "auth": true }, "update": { "auth": true, "crossUser": false }, "delete": { "auth": true, "crossUser": false }, "registries": { "read": { "auth": false }, "create": { "auth": true }, "update": { "auth": true, "crossUser": false }, "delete": { "auth": true, "crossUser": false }, "mismatchTagVocabulary": { "uri": "https://uri.gbv.de/terminology/mismatch/", "API": [ { "type": "http://bartoc.org/api-type/jskos", "url": "http://localhost:3000/" } ] } }, "identityProviders": null, "identities": null }, "data": "http://localhost:3000/data", "schemes": "http://localhost:3000/voc", "top": "http://localhost:3000/voc/top", "voc-search": "http://localhost:3000/voc/search", "voc-suggest": "http://localhost:3000/voc/suggest", "voc-concepts": "http://localhost:3000/voc/concepts", "concepts": "http://localhost:3000/concepts", "narrower": "http://localhost:3000/concepts/narrower", "ancestors": "http://localhost:3000/concepts/ancestors", "search": "http://localhost:3000/concepts/search", "suggest": "http://localhost:3000/concepts/suggest", "mappings": "http://localhost:3000/mappings", "concordances": "http://localhost:3000/concordances", "annotations": "http://localhost:3000/annotations", "registries": "http://localhost:3000/registries", "types": null, "validate": "http://localhost:3000/validate", "ok": 1 }Error Response
In case of an error, for instance a failed database connection, the value of response property
okis set to0.
GET /checkAuth
Endpoint to check whether a user is authorized (see user accounts and access control). If type or action are not set, it will use identities, identityProviders, and identityGroups that are defined directly under config.
URL Params
type=[type]one of "schemes", "concepts", "mappings", "concordances, "registries", "annotations" (optional)action=[action]one of "read", "create", "update", "delete" (optional)
POST /validate
Endpoint to validate JSKOS objects via [jskos-validate].
URL Params
type=[type]a JSKOS object type that all objects must have (optional)unknownFields=[boolean]with1ortrueto allow unknown fields inside objects (by default, unknown fields do not pass validation)knownSchemes=[boolean]with1ortrueto use concept schemes available in this jskos-server instance for validation of concepts. Impliestype=conceptand all concept must reference a known concept scheme viainScheme.
If neither type nor knownSchemes are specified, concept schemes in the data to be validated can be used to validate following concepts in the same request array (see last example below).
Success Response
Array with the JSON response provided by [jskos-validate]. The indices of the array correspond to the order of the given data. An element is
truewhen the object passed validation, or an array of errors when the object failed validation. Data format of error objects may change in future versions but there is always at least fieldmessage.Sample Call
In the following example, an empty object is validated. Since no type is specified, it is validated as a Resource which does not have required field names and therefore passes validation.
curl -X POST "https://coli-conc.gbv.de/dev-api/validate" -H 'Content-Type: application/json' -d '{}'[ true ]In the following example, the same call is given, but the parameter
typeis set tomapping. Mappings require the fieldsfromandto, therefore the empty object fails validation and errors are returned.curl -X POST "https://coli-conc.gbv.de/dev-api/validate?type=mapping" -H 'Content-Type: application/json' -d '{}'[ [ { "instancePath": "", "schemaPath": "#/required", "keyword": "required", "params": { "missingProperty": "from" }, "message": "must have required property 'from'" }, { "instancePath": "", "schemaPath": "#/required", "keyword": "required", "params": { "missingProperty": "to" }, "message": "must have required property 'to'" } ] ]In this example, an array of mixed typed objects is validated (given in file
example.json):[ { "type": [ "http://www.w3.org/2004/02/skos/core#ConceptScheme" ], "uri": "http://example.org/voc", "notationPattern": "[a-z]+" }, { "type": [ "http://www.w3.org/2004/02/skos/core#Concept" ], "uri": "http://example.org/1", "notation": [ "abc" ], "inScheme": [ { "uri": "http://example.org/voc" } ] }, { "type": [ "http://www.w3.org/2004/02/skos/core#Concept" ], "uri": "http://example.org/2", "notation": [ "123" ], "inScheme": [ { "uri": "http://example.org/voc" } ] } ]The first object is a concept scheme with
notationPattern. Since the other two elements are concepts of that concept scheme (seeinScheme), the concepts must additionally pass tests related to URI or notation patterns of the given schemes. Since the last concept has a notation that does not match the pattern, it fails the validation. Note that only object with appropriatetypefield are included in this additional part of validation.curl -X POST "https://coli-conc.gbv.de/dev-api/validate" -H 'Content-Type: application/json' -d @example.json[ true, true, [ { "message": "concept notation 123 does not match [a-z]+" } ] ]
GET /validate
Same as POST /validate but JSKOS data to be validated is passed via URL.
URL Params
url=[url]URL to load JSKOS data fromtype=[type]see POST /validateunknownFields=[boolean]see POST /validateknownSchemes=[boolean]see POST /validate
GET /data
Returns data for a certain URI or URIs. Can return concept schemes, concepts, concordances, mappings, annotations, and registries. This endpoint does not offer pagination via limit and offset. It will always return all results. Furthermore, there is no certain order to the result set (but it should be consistent across requests). If a certain type of data requires authentication and the user is not authenticated, that type of data will simply not be returned.
Note: As of version 2.0, this endpoint was adjusted to return all types of items that are available in the database, instead of just concepts and concept schemes. The additional parameters, apart from uri, were also removed. For the previous behavior (only without returning concept schemes), see GET /concepts.
URL Params
uri=[uri]URIs for JSKOS items separated by|(annotations, despite usingidinstead ofuri, can also be queried here)properties=[list]with[list]being a comma-separated list of properties (currently supportingancestors,narrower, andannotations)Success Response
JSON array of [JSKOS Items]
GET /concordances
Lists all concordances for mappings.
URL Params
uri=[uri]URIs for concordances separated by|fromScheme=[uri|notation]only show concordances from concept scheme (URI or notation) (separated by|)toScheme=[uri|notation]only show concordances to concept scheme (URI or notation) (separated by|)creator=[creator]only show concordances from creator (separated by|)mode=[mode]specify the mode for the parameters above, one ofand(default) andordownload=[type]returns the whole result as a download (available types arejsonandndjson), ignoreslimitandoffsetSuccess Response
JSON array of JSKOS Concordances
Sample Call
curl https://coli-conc.gbv.de/api/concordances?limit=1[ { "@context": "https://gbv.github.io/jskos/context.json", "creator": [ { "prefLabel": { "de": "VZG" } } ], "distributions": [ { "download": "https://coli-conc.gbv.de/api/mappings?partOf=http://coli-conc.gbv.de/concordances/ddc_rvk_recht&download=ndjson", "format": "http://format.gbv.de/jskos", "mimetype": "application/x-ndjson; charset=utf-8" } ], "extent": "2267", "fromScheme": { "notation": [ "DDC" ], "uri": "http://bartoc.org/en/node/241" }, "notation": [ "ddc_rvk_recht" ], "scopeNote": { "de": [ "Recht" ] }, "toScheme": { "notation": [ "RVK" ], "uri": "http://bartoc.org/en/node/533" }, "type": [ "http://rdfs.org/ns/void#Linkset" ], "uri": "http://coli-conc.gbv.de/concordances/ddc_rvk_recht" } ]
GET /concordances/:_id
Returns a specific concordance.
URL Params
None
Success Response
JSKOS object for concordance.
Error Response
If no concordance with
_idcould be found, it will return a 404 not found error.
POST /concordances
Saves one or more concordances in the database. Note that fromScheme and toScheme must be supported by the jskos-server instance.
URL Params
None
Success Reponse
JSKOS Concordance object(s) as were saved in the database.
Error Response
When a single concordance is provided, an error can be returned if there's something wrong with it (see errors). When multiple concordances are provided, the first error will be returned.
PUT /concordances/:_id
Overwrites a concordance in the database.
Success Reponse
JSKOS Concordance object as it was saved in the database.
Note that any changes to the uri, notation, fromScheme, toScheme, extent, distributions, and created properties will be ignored. (No error will be thrown in this case.)
PATCH /concordances/:_id
Adjusts a concordance in the database.
Success Reponse
JSKOS Concordance object as it was saved in the database.
Note that changes to the properties uri, notation, fromScheme, toScheme, created, extent, and distributions are currently not allowed and will result in an InvalidBodyError.
DELETE /concordances/:_id
Deletes a concordance from the database.
Success Reponse
Status 204, no content.
Note that only concordances which have no mappings associated can be deleted.
GET /mappings
Returns an array of mappings. Each mapping has a property uri under which the specific mapping can be accessed.
URL Params
identifier=[identifier1|identifier2|...]specify mapping identifiers separated by|from=[uriOrNotation1|uriOrNotation2|...]specify the source URI or notation (truncated search possible by appending a*, multiple URIs/notations separated by|)fromScheme=[uriOrNotation1|uriOrNotation2|...]only show mappings from concept scheme (URI or notation, multiple URIs/notations separated by|)to=[uriOrNotation1|uriOrNotation2|...]specify the target URI or notation (truncated search possible by appending a*, multiple URIs/notations separated by|)toScheme=[uriOrNotation1|uriOrNotation2|...]only show mappings to concept scheme (URI or notation, multiple URIs/notations separated by|)mode=[mode]specify the mode forfrom/fromScheme,to/toScheme, andidentifier, one ofand(default) andor; note that 1) multiple values given for a single parameter are always connected via "or", and 2)fromandfromScheme/toandtoSchemeare always connected via "and"direction=[direction]specify the direction of the mapping. Available values are:forward(default),backward(essentially swapsfromandto),both(combines forward and backward).type=[uri1|uri2|...]only show mappings that conform to a certain type or types (see [JSKOS Concept Mappings]) (URIs separated by|)partOf=[uri1|uri2|...]only show mappings that are part of certain concordances (URIs separated by|); valuenonereturns mappings that are not part of a concordance, valueanyreturns mappings that are part of any concordancecreator=[string1|string2|...]only show mappings that have a certain creator (separated by|)annotatedBy=[uri1|uri2|...]has annotations by user with URI(s)annotatedFor=[motivation]has annotations with a certain motivation (e.g.assessing); valuenonereturns mappings that have no annotations at all, valueanyreturns mappings that have any kind of annotation, values starting with!(e.g.!assessing) filter out annotations with that motivation. Note that to mitigate performance issues with negative assertions (noneor!xyz), jskos-server will return the number 9999999 in theX-Total-Countheader (see this).annotatedWith=[body]has annotations with a certain body value (e.g.+1) OR has a sum of assessment annotations that conforms to the given comparison operation; for the latter, eitherfromortomust be given,annotatedFormust be either not set or set toassessing, and the value of this parameter needs to consist of a comparison operator (=,<,>,<=, or>=) followed by a number. Example:annotatedWith=>0returns mappings with a positive assessment sum (equivalent toannotatedWith=>=1).properties=[list]with[list]being a comma-separated list of properties (currently supporting onlyannotationsfor mappings)download=[type]returns the whole result as a download (available types arejson,ndjson,csv, andtsv), ignoreslimitandoffset; note:csvandtsvare restricted (and fixed) to 5 target concepts, meaning that if the data set includes a mapping with more than 5 target concepts, only the first 5 will appear in the exportsort=[sort]sorts by a specific field. Available arecreated,modified, andmappingRelevance(default). Results will always be additionally sorted byfrom.memberSet.uriand_idin order to create a stable and sensible sort.order=[order]order to use for sorting. Available areascanddesc(default).cardinality=[cardinality]cardinality of the mapping. Available are1-to-n(default) and1-to-1.Success Response
JSON array of [JSKOS Concept Mappings]
Sample Call
curl https://coli-conc.gbv.de/api/mappings?from=http://dewey.info/class/612.116/e23/[ { "from": { "memberSet": [ { "uri": "http://dewey.info/class/612.116/e23/", "notation": [ "612.116" ] } ] }, "to": { "memberSet": [ { "uri": "http://rvk.uni-regensburg.de/nt/WW_8800-WW_8839", "notation": [ "WW 8800-WW 8839" ] } ] }, "fromScheme": { "uri": "http://bartoc.org/en/node/241", "notation": [ "DDC" ] }, "toScheme": { "uri": "http://bartoc.org/en/node/533", "notation": [ "RVK" ] }, "identifier": [ "urn:jskos:mapping:content:fb92cbed7466764dd2ca5fdf054bf55e65ec6b87", "urn:jskos:mapping:members:5aa92285bba839954baccdadc7df5ef4558860ed" ], "@context": "https://gbv.github.io/jskos/context.json" } ]
GET /mappings/suggest
Suggests notations used in mappings.
URL Params
search=[notation]specifies the notation (prefix) to search forSuccess Response
JSON array of suggestions in OpenSearch Suggest Format.
Sample Call
curl https://coli-conc.gbv.de/api/mappings/suggest?search=A&limit=5[ "A", [ "AN 74800", "AN 78950", "AN 70000", "AN 71000", "AN 96900" ], [ 42, 25, 19, 18, 17 ], [] ]
GET /mappings/voc
Lists all concept schemes used in mappings.
URL Params
from=[uri|notation]restrict mappings to those from a conceptto=[uri|notation]restrict mappings to those to a conceptmode=[mode]specify the mode forfromandto, one ofandandor(default)Success Response
JSON array of [JSKOS Concept Schemes]
Sample Call
curl https://coli-conc.gbv.de/api/mappings/voc?from=612.112&to=612.112[ { "uri": "http://bartoc.org/en/node/430", "notation": [ "GND" ], "fromCount": 2 }, { "uri": "http://bartoc.org/en/node/241", "notation": [ "DDC" ], "fromCount": 2, "toCount": 2 }, { "uri": "http://bartoc.org/en/node/533", "notation": [ "RVK" ], "toCount": 2 } ]
GET /mappings/infer
Returns mappings based on stored mappings and mappings derived by inference. If a request to GET /mappings results in stored mappings, only those are returned. If no stored mappings match the request, the following algorithm is applied to infer virtual mappings (this is experimental and not all source schemes are supported):
Ancestors of the requested concept (
from) are traversed from narrower to broader until matching mapping(s) from one of the ancestor concepts are found.The resulting mappings are filtered and transformed based on their mapping type:
exactMatchandnarrowMatchresult innarrowMatch(for instance Optics < Sciences when no mappings from Optics are stored but e.g. Physics is ancestor of Optics and mapped to Sciences)closeMatchresults innarrowMatchunless query parameterstrictis set to a true value. In this case mappings of this type are ignored (for instance Optics < Alchemy when Physics is ancestor of Optics and mapped to Alchemy but this may lead to doubtful mappings such as Computational Physics < Alchemy)relatedMatchandmappingRelationare not changed.
Inferred mappings don't have fields such as uri, identifier, creator, created... but uri of the mapping used for inference is included in source.
URL Params
This endpoint takes the same parameters as GET /mappings, except that
to,download, andcardinality(fixed to "1-to-1") are not supported. Parameterdirectiononly supports the default value "forward". ParametersfromandfromSchemeare mandatory to get a non-empty result.strict=[boolean]values1ortruedisallow mapping type "closeMatch" for inferred mappings (defaultfalse)depth=[number]a non-negative number of the depth used to infer mappings (not set by default);0means no inference,1means only the next ancestor concept (= broader) is used for inference, etc.Success Response
JSON array of [JSKOS Concept Mappings]
Sample Call
curl https://coli-conc.gbv.de/api/mappings/infer?from=http%3A%2F%2Frvk.uni-regensburg.de%2Fnt%2FWI%25203130&fromScheme=http%3A%2F%2Fbartoc.org%2Fen%2Fnode%2F533&toScheme=http%3A%2F%2Fbartoc.org%2Fen%2Fnode%2F18785[ { "from": { "memberSet": [ { "uri": "http://rvk.uni-regensburg.de/nt/WI%203130", "notation": [ "WI 3130" ] } ] }, "to": { "memberSet": [ { "uri": "http://uri.gbv.de/terminology/bk/42.42", "notation": [ "42.42" ] } ] }, "fromScheme": { "uri": "http://bartoc.org/en/node/533", "notation": [ "RVK" ] }, "toScheme": { "uri": "http://bartoc.org/en/node/18785", "notation": [ "BK" ] }, "type": [ "http://www.w3.org/2004/02/skos/core#narrowMatch" ], "source": [ { "uri": "https://coli-conc.gbv.de/api/mappings/ef121206-a42d-4c3c-9ef3-b597c000acb4" } ], "identifier": [ "urn:jskos:mapping:content:1b0fb2343795db4de7e1f8c7207b94a789614a15", "urn:jskos:mapping:members:2d22b62a0295959d587487d228d51836d05b1c50" ], "@context": "https://gbv.github.io/jskos/context.json" }, { "from": { "memberSet": [ { "uri": "http://rvk.uni-regensburg.de/nt/WI%203130", "notation": [ "WI 3130" ] } ] }, "to": { "memberSet": [ { "uri": "http://uri.gbv.de/terminology/bk/42.44", "notation": [ "42.44" ] } ] }, "fromScheme": { "uri": "http://bartoc.org/en/node/533", "notation": [ "RVK" ] }, "toScheme": { "uri": "http://bartoc.org/en/node/18785", "notation": [ "BK" ] }, "type": [ "http://www.w3.org/2004/02/skos/core#narrowMatch" ], "source": [ { "uri": "https://coli-conc.gbv.de/api/mappings/6b920456-db5d-49b1-a197-b851df6f9dbd", } ], "identifier": [ "urn:jskos:mapping:content:8bb72e1605f9c25b0c97889439e6dde952e0cbd0", "urn:jskos:mapping:members:5870d87ec08c9a9a5ccba182bd96b92ad2f9d688" ], "@context": "https://gbv.github.io/jskos/context.json" } ]
GET /mappings/:_id
Returns a specific mapping.
URL Params
properties=[list]with[list]being a comma-separated list of properties (currently supporting onlyannotationsfor mappings)Success Response
JSKOS object for mapping.
Error Response
If no mapping with
_idcould be found, it will return a 404 not found error.Sample Call
curl https://coli-conc.gbv.de/api/mappings/5c450ba1a32a4a82d0f3fbf3{ "from": { "memberSet": [ { "uri": "http://rvk.uni-regensburg.de/nt/TA-TD", "notation": [ "TA - TD" ] } ] }, "toScheme": { "template": "http://dewey.info/class/(.+)/e23/", "pattern": "[0-9][0-9]?|[0-9]{3}(-[0-9]{3})?|[0-9]{3}\\.[0-9]+(-[0-9]{3}\\.[0-9]+)?|[1-9][A-Z]?--[0-9]+|[1-9][A-Z]?--[0-9]+(-[1-9][A-Z]?--[0-9]+)?", "uri": "http://bartoc.org/en/node/241", "notation": [ "DDC" ] }, "fromScheme": { "notation": [ "RVK" ], "uri": "http://bartoc.org/en/node/533" }, "to": { "memberSet": [ { "uri": "http://dewey.info/class/500/e23/", "notation": [ "500" ] } ] }, "identifier": [ "urn:jskos:mapping:content:d37d117b5e3d811447bc332b184ac6e5ac4bde6b", "urn:jskos:mapping:members:4c480744ea32e7e71ba39fae6cc8d8e4e0382912" ], "partOf": [ { "uri": "http://coli-conc.gbv.de/concordances/rvk_ddc_ta-td" } ], "creator": [ { "prefLabel": { "de": "GESIS" } } ], "url": "https://coli-conc.gbv.de/api/mappings/5c450ba1a32a4a82d0f3fbf3", "@context": "https://gbv.github.io/jskos/context.json" }
POST /mappings
Saves a mapping or multiple mappin
