Reference Guide
Table Of Contents
- 1 Introduction
- 2 Establishing Your Test and Development Environments
- 3 Developing Applications
- Introduction
- Authentication
- REST API
- Audit Logging
- Alert Logging
- Configuration
- High Availability
- OpenFlow
- Metrics Framework
- GUI
- SKI Framework - Overview
- SKI Framework - Navigation Tree
- SKI Framework - Hash Navigation
- SKI Framework - View Life-Cycle
- SKI Framework - Live Reference Application
- UI Extension
- Introduction
- Controller Teaming
- Distributed Coordination Service
- Persistence
- Backup and Restore
- Device Driver Framework
- 4 Application Security
- 5 Including Debian Packages with Applications
- 6 Sample Application
- Application Description
- Creating Application Development Workspace
- Application Generator (Automatic Workspace Creation)
- Creating Eclipse Projects
- Updating Project Dependencies
- Building the Application
- Installing the Application
- Application Code
- 7 Testing Applications
- 8 Built-In Applications
- Appendix A
- Appendix B
- Bibliography
System Integrity
External applications must run in separate memory spaces.
Software validation
• All downloadable files must be signed.
• All file signatures must be validated 1) at time of file saving and 2) loading.
• Signatures and validation shall apply to script files, e.g., Tcl, Python, as well as to binary
executables and Java .jar files.
• It is highly desirable to validate system integrity on a running system—boot time is good, but
might not be sufficient.
Secure Upgrade
• Updates and configuration changes are to be performed only with sufficient administrative
privilege
• Updates must be logged, including both successful and non-successful attempts
129