TOC |
|
This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 23, 2010.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
The NETCONF protocol defines the lock and unlock RPCs, used to lock entire configuration datastores. In some situations, a way to lock only parts of a configuration datastore is required. This document defines a capability-based extension to the NETCONF protocol for locking portions of a configuration datastore.
1.
Introduction
1.1.
Definition of Terms
2.
Partial Locking Capability
2.1.
Overview
2.1.1.
Usage Scenarios
2.2.
Dependencies
2.3.
Capability Identifier
2.4.
New Operations
2.4.1.
<partial-lock>
2.4.2.
<partial-unlock>
2.5.
Modifications to Existing Operations
2.6.
Interactions with Other Capabilities
2.6.1.
Candidate Configuration Capability
2.6.2.
Confirmed Commit Capability
2.6.3.
Distinct Startup Capability
3.
Security Considerations
4.
IANA Considerations
5.
Appendix A - XML Schema for Partial Locking (normative)
6.
Appendix B - YANG Module for Partial Locking (non-normative)
7.
Appendix C - Usage Example - Reserving nodes for future editing (non-normative)
8.
Appendix D - Change Log
8.1.
10-11
8.2.
09-10
8.3.
08-09
8.4.
07-08
8.5.
06-07
8.6.
05-06
8.7.
04-05
8.8.
03-04
8.9.
02-03
8.10.
01-02
8.11.
00-01
8.12.
-00
9.
Acknowledgements
10.
References
10.1.
Normative References
10.2.
Informative References
§
Authors' Addresses
TOC |
The [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.) protocol describes the lock and unlock operations that operate on entire configuration datastores. Often, multiple management sessions need to be able to modify the configuration of a managed device in parallel. In these cases, locking only parts of a configuration datastore is needed. This document defines a capability based extension to the NETCONF protocol to support partial locking of the NETCONF running datastore using a mechanism based on the existing XPath filtering mechanisms.
TOC |
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).
Additionally the following terms are defined:
TOC |
TOC |
The :partial-lock capability indicates that the device supports
the locking of its configuration with a more limited scope than a complete
configuration datastore. The scope to be locked is specified by using restricted or full XPath expressions.
Partial locking only affects configuration data and only the running datastore.
The candidate or the start-up datastore are not affected.
The system MUST ensure that configuration resources
covered by the lock are not modified by other
NETCONF or non-NETCONF management operations such as
SNMP and the CLI.
The duration of the partial lock begins when the partial lock is
granted and lasts until (1) either the corresponding <partial-unlock> operation
succeeds or (2) the NETCONF session terminates.
A NETCONF session MAY have multiple parts of the running datastore
locked using partial lock operations.
The <partial-lock> operation returns a
lock-id to identify each successfully acquired lock.
The lock-id is unique at any given time for a NETCONF server for all partial-locks
granted to any NETCONF or non-NETCONF sessions.
TOC |
In the following we describe a few scenarios for partial locking. Besides the two described here, there are many other usage scenarios possible.
TOC |
Multiple managers are handling the same NETCONF agent simultaneously.
The agent is handled via the writable running datastore.
Each manager has his or her own task, which might involve
the modification of overlapping sections of the datastore.
After collecting and analyzing input and preparing the
NETCONF operations off-line,
the manager locks the areas that are important for his task
using one single <partial-lock> operation.
The manager executes a number of <edit-config> operations to modify
the configuration, then releases the partial-lock.
The lock should be held for the shortest possible time (e.g. seconds rather then minutes).
The manager should collect all human input before locking anything.
As each manager locks only a part of the data model, usually multiple operators can
execute the <edit-config> operations simultaneously.
TOC |
Multiple managers are handling the same NETCONF agent simultaneously.
The agent is handled via the writable running datastore.
The agent's data model contains a number of well defined separate
areas that can be configured without impacting other areas. An
example can be a server with multiple applications running on it, or
a number of a network elements with a common NETCONF agent for
management.
Each manager has his or her own task, which does not involve the modification
of overlapping sections of the datastore.
The manager locks his area with a <partial-lock> operation,
uses a number of <edit-config> commands to modify it,
later releases the lock.
As each manager has his functional area assigned to him,
and he locks only that area, multiple managers can edit
the configuration simultaneously.
Locks can be held for extended periods (e.g. minutes, hours),
as this will not hinder other managers.
This scenario assumes that the global lock operation
from [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.) is not used.
TOC |
The device MUST support restricted XPath expressions in the select element, as described in Section 2.4.1 (<partial-lock>). Optionally, if the :xpath capability is also supported (as defined in [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.) chapter 8.9. XPath Capability), the device MUST also support using any XPath 1.0 expression in the select element.
TOC |
urn:ietf:params:netconf:capability:partial-lock:1.0
TOC |
TOC |
The <partial-lock> operation allows the client to lock a portion of
the running datastore. The portion to lock is specified with XPath
expressions in the "select" elements
in the <partial-lock> operation. Each XPath expression
MUST return a node set.
When a NETCONF session holds a lock on a node, no other session or
non-NETCONF mechanism of the system can change that node or any node
in the hierarchy of nodes beneath it.
Locking a node protects the node itself and
the complete subtree under the node from modification by others.
The set of locked nodes is called the scope of the lock, while all the
locked nodes and the nodes in the subtrees under them make up the protected area.
The XPath expressions are evaluated only once at lock time.
Thereafter, the scope of the lock is maintained as a set of nodes,
i.e. the returned nodeset, and not by the XPath expression.
If the configuration data is later altered in a way that
would make the original XPath
expressions evaluate to a different set of nodes, this does not affect the
scope of the partial lock.
Let's say the agent's data model includes a list of interface nodes.
If the XPath expression in the partial lock operation covers all interface nodes at locking,
the scope of the lock will be maintained as the list of interface nodes at the time
when the lock was granted. If someone later creates a new interface, this new
interface will not be included in the locked-nodes list created
previously so the new interface will not be locked.
A <partial-lock> operation MUST be handled atomically by the NETCONF
server. The server either locks all requested parts of the datastore or none.
If during the <partial-lock> operation one of the requested parts cannot be locked, the
server MUST unlock all parts that have already been locked during that operation.
If a node in the scope of the lock is deleted by the session owning the lock, it is removed from the
scope of the lock, so any other session or non-NETCONF mechanism can recreate it.
If all nodes in the scope of the lock are deleted, the
lock will still be present. However, its scope will become empty (since the lock will
not cover any nodes).
A NETCONF server that supports partial locking MUST be able to grant multiple simultaneous partial locks to a
single NETCONF session. If the protected area of the individual locks overlap, nodes in the
common area MUST be protected until all of the overlapping locks are released.
A partial lock operation MUST fail if:
The <partial-lock> operation is designed for simplicity, so when a partial lock is executed you get what you asked for: a set of nodes that are locked for writing. As a consequence users must observe the following:
Note: The <partial-lock> operation does not modify the global <lock> operation defined in the base
NETCONF Protocol [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.). If part of the running
datastore is already locked by <partial-lock>, then a global lock for the running datastore MUST fail even
if the global lock is requested by the NETCONF session that owns the partial lock.
TOC |
Parameters:
- select:
- One or more 'select' elements, each containing an XPath expression. The XPath expression is evaluated in a context where the context node is the root of the server's conceptual data model, and the set of namespace declarations are those in scope on the select element.
The nodes returned from the select expressions are reported in the rpc-reply message.
Each select expression MUST return a node set, and at least one of the node sets MUST be non-empty.
If the device supports the :xpath capability, any valid XPath 1.0 expression can be used. If the device does not support the :xpath capability, the XPath expression MUST be limited to an Instance Identifier expression. An Instance Identifier is an absolute path expression in abbreviated syntax, where predicates are used only to specify values for nodes defined as keys to distinguish multiple instances.
Example: Lock virtual router 1 and interface eth1
<nc:rpc xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="135"> <partial-lock> <select xmlns:rte="http://example.com/ns/route"> /rte:routing/rte:virtualRouter[rte:routerName='router1'] </select> <select xmlns:if="http://example.com/ns/interface"> /if:interfaces/if:interface[if:id='eth1'] </select> </partial-lock> </nc:rpc> <nc:rpc-reply xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" message-id="135"> <lock-id>127</lock-id> <locked-node xmlns:rte="http://example.com/ns/route"> /rte:routing/rte:virtualRouter[rte:routerName='router1'] </locked-node> <locked-node xmlns:if="http://example.com/ns/interface"> /if:interfaces/if:interface[if:id='eth1'] </locked-node> </nc:rpc-reply>
TOC |
As with most locking systems, it is possible that two management sessions trying to lock different
parts of the configuration could become dead-locked.
To avoid this situation, clients SHOULD lock
everything they need in one operation. If locking fails, the client
MUST back-off, release any previously acquired locks, and SHOULD
retry the procedure after waiting some randomized time interval.
TOC |
The operation unlocks the parts of the running datastore that were previously
locked using <partial-lock> during the same session. The operation unlocks the
parts that are covered by the lock identified by the lock-id parameter.
In case of multiple potentially overlapping locks, only the lock identified
by the lock-id is removed.
Parameters:
- lock-id:
- Identity of the lock to be unlocked. This lock-id MUST have been received as a response to a lock request by the manager during the current session, and MUST NOT have been sent in a previous unlock request.
Example: Unlock a previously created lock
<nc:rpc xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="136"> <partial-unlock> <lock-id>127</lock-id> </partial-unlock> </nc:rpc>
TOC |
A successful partial lock will cause a subsequent operation to fail if that operation attempts to modify
nodes in the protected area of the lock
and is executed in a NETCONF session other than the session that has been granted the lock.
The <error-tag> 'in-use' and the <error-app-tag> 'locked' is returned.
All operations that modify the running datastore are affected, including: <edit-config>, <copy-config>,
<delete-config>, <commit> and <discard-changes>.
If partial lock prevents <edit-config> modifying some data, but the
operation includes the continue-on-error option, modification of other
parts of the datastore, which are not protected by partial locking, might
still succeed.
If the datastore contains nodes locked by partial lock, this will cause the (global) <lock> operation to fail. The
<error-tag> element 'lock-denied' and an
<error-info> element including the <session-id> of the lock
owner will be returned. If the lock is held by a non-NETCONF session, a
<session-id> of 0 (zero) is returned.
All of these operations are affected only if they are targeting the running datastore.
TOC |
TOC |
The candidate datastore can not be locked using the <partial-lock> operation.
TOC |
If:
then the lock MUST be denied, because if the confirmation does not arrive,
the running datastore MUST be rolled back to its state before the commit.
The NETCONF server might therefore need to modify the configuration.
In this case the <error-tag> 'in-use' and the
<error-app-tag> 'outstanding-confirmed-commit'
is returned.
TOC |
The startup datastore can not be locked using the <partial-lock> operation.
TOC |
The same considerations are relevant as for the base NETCONF Protocol [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.).
<partial-lock> and <partial-unlock> RPCs MUST only be allowed for an authenticated user.
<partial-lock> and <partial-unlock> RPCs SHOULD only be allowed for an authorized user.
However as NETCONF access control is not standardized and not a mandatory part
of a NETCONF implementation, it is strongly recommended,
but OPTIONAL. (although nearly all implementations include some kind of access control)
A lock (either a partial lock or a global lock) might prevent other users from configuring the system.
The following mechanisms are in place to prevent the misuse of this possibility:
A user, that is not successfully authenticated, MUST NOT be granted a partial lock.
Only an authorized user SHOULD be able to request a partial lock.
The partial lock is automatically released when a session is terminated regardless of how the session ends.
The <kill-session> operation makes it possible to terminate other users's sessions.
The NETCONF server MAY log partial lock requests in an audit trail.
A lock that is hung for some reason (e.g., a broken TCP connection that the server has not yet recognised) can be released
using another NETCONF session by explicitly killing the session owning that lock using the <kill-session> operation.
Partial locking is not an authorization mechanism; it SHOULD NOT be used to provide security or access control.
Partial locking SHOULD only be used as a mechanism for providing consistency
when multiple managers are trying to configure the node.
It is vital that users easily understand the exact scope of a lock.
This is why the scope is determined when granting a lock and is not modified thereafter.
TOC |
This document registers one capability identifier URN from the "Network Configuration Protocol (NETCONF) Capability URNs" registry, and one URI for the NETCONF XML namespace in the "IETF XML registry" [RFC3688] (Mealling, M., “The IETF XML Registry,” January 2004.). Note that the capability URN is compliant to [NETCONF] (Enns, R., “NETCONF Configuration Protocol,” December 2006.) section 10.3.
Index | Capability Identifier |
---|---|
:partial-lock | urn:ietf:params:netconf:capability:partial-lock:1.0 |
URI: urn:ietf:params:xml:ns:netconf:partial-lock:1.0
Registrant Contact: The IESG.
XML: N/A, the requested URI is an XML namespace.
TOC |
The following XML Schema defines the <partial-lock> and <partial-unlock> operations:
-- RFC Ed.: Insert license information for code as appropriate
<CODE BEGINS>
<?xml version="1.0" encoding="UTF-8"?> <xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" targetNamespace="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" elementFormDefault="qualified" attributeFormDefault="unqualified"> <xs:annotation> <xs:documentation> Schema defining the partial-lock and unlock operations. organization "IETF NETCONF Working Group" contact Netconf Working Group Mailing list: netconf@ietf.org Web: http://www.ietf.org/html.charters/netconf-charter.html Balazs Lengyel balazs.lengyel@ericsson.com" revision 2009-10-19 description Initial version, published as RFC yyyy. -- RFC Ed.: replace yyyy with actual RFC number and remove this note. </xs:documentation> </xs:annotation> <xs:import namespace="urn:ietf:params:xml:ns:netconf:base:1.0" schemaLocation="urn:ietf:params:xml:ns:netconf:base:1.0"/> <xs:simpleType name="lock-id-type"> <xs:annotation> <xs:documentation> A number identifying a specific partial-lock granted to a session. It is allocated by the system, and SHOULD be used in the unlock operation. </xs:documentation> </xs:annotation> <xs:restriction base="xs:unsignedInt"/> </xs:simpleType> <xs:complexType name="partialLockType"> <xs:annotation> <xs:documentation> A NETCONF operation that locks parts of the running datastore. </xs:documentation> </xs:annotation> <xs:complexContent> <xs:extension base="nc:rpcOperationType"> <xs:sequence> <xs:element name="select" type="xs:string" maxOccurs="unbounded"> <xs:annotation> <xs:documentation> XPath expression that specifies the scope of the lock. An Instance Identifier expression must be used unless the :xpath capability is supported in which case any XPath 1.0 expression is allowed. </xs:documentation> </xs:annotation> </xs:element> </xs:sequence> </xs:extension> </xs:complexContent> </xs:complexType> <xs:complexType name="partialUnLockType"> <xs:annotation> <xs:documentation> A NETCONF operation that releases a previously acquired partial-lock. </xs:documentation> </xs:annotation> <xs:complexContent> <xs:extension base="nc:rpcOperationType"> <xs:sequence> <xs:element name="lock-id" type="lock-id-type"> <xs:annotation> <xs:documentation> Identifies the lock to be released. MUST be the value received in the response to the partial-lock operation. </xs:documentation> </xs:annotation> </xs:element> </xs:sequence> </xs:extension> </xs:complexContent> </xs:complexType> <!-- <partial-lock> operation --> <xs:element name="partial-lock" type="partialLockType" substitutionGroup="nc:rpcOperation"/> <!-- <partial-unlock> operation --> <xs:element name="partial-unlock" type="partialUnLockType" substitutionGroup="nc:rpcOperation"/> <!-- reply to <partial-lock> --> <xs:complexType name="contentPartInPartialLockReplyType"> <xs:annotation> <xs:documentation> The content of the reply to a successful partial-lock request MUST conform to this complex type. </xs:documentation> </xs:annotation> <xs:sequence> <xs:element name="lock-id" type="lock-id-type"> <xs:annotation> <xs:documentation> Identifies the lock to be released. Must be the value received in the response to a partial-lock operation. </xs:documentation> </xs:annotation> </xs:element> <xs:element name="locked-node" type="xs:string" maxOccurs="unbounded"> <xs:annotation> <xs:documentation> List of locked nodes in the running datastore. </xs:documentation> </xs:annotation> </xs:element> </xs:sequence> </xs:complexType> </xs:schema>
<CODE ENDS>
TOC |
The following YANG module defines the <partial-lock> and <partial-unlock> operations.
The YANG language is defined in [I‑D.ietf‑netmod‑yang] (Bjorklund, M., “YANG - A data modeling language for NETCONF,” July 2009.).
-- RFC Ed.: Insert license information for code as appropriate
<CODE BEGINS>
module ietf-netconf-partial-lock { namespace urn:ietf:params:xml:ns:netconf:partial-lock:1.0; prefix pl; organization "IETF Network Configuration (netconf) Working Group"; contact "Netconf Working Group Mailing list: netconf@ietf.org Web: http://www.ietf.org/html.charters/netconf-charter.html Balazs Lengyel Ericsson balazs.lengyel@ericsson.com"; description "This YANG module defines the <partial-lock> and <partial-unlock> operations."; revision 2009-10-19 { description "Initial version, published as RFC yyyy."; // RFC Ed.: replace yyyy with actual RFC number & remove this note. } typedef lock-id-type { type uint32; description "A number identifying a specific partial-lock granted to a session. It is allocated by the system, and SHOULD be used in the partial-unlock operation."; } rpc partial-lock { description "A NETCONF operation that locks parts of the running datastore."; input { leaf-list select { type string; min-elements 1; description "XPath expression that specifies the scope of the lock. An Instance Identifier expression MUST be used unless the :xpath capability is supported, in which case any XPath 1.0 expression is allowed."; } } output { leaf lock-id { type lock-id-type; description "Identifies the lock, if granted. The lock-id SHOULD be used in the partial-unlock rpc."; } leaf-list locked-node { type instance-identifier; min-elements 1; description "List of locked nodes in the running datastore"; } } } rpc partial-unlock { description "A NETCONF operation that releases a previously acquired partial-lock."; input { leaf lock-id { type lock-id-type; description "Identifies the lock to be released. MUST be the value received in the response to a partial-lock operation."; } } } }
<CODE ENDS>
TOC |
Partial lock cannot be used to lock non-existent nodes, which would effectively attempt to reserve them for future use. To guarantee that a node cannot be created by some other session, the parent node should be locked, the top level node of the new subtree created, and then locked with another <partial-lock> operation. After this, the lock on the parent node should be removed.
In this chapter an example illustrating the above is given.
We want to create <user> Joe under <users>, and start editing it.
Editing might take a number of minutes.
We want to immediately lock Joe so no one will touch it before we are finished with the editing.
We also want to minimize locking other parts of the running datastore as multiple managers might
be adding users near simultaneously.
First we check what users are already defined.
Step 1 - Read existing users
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <get-config> <source> <running/> </source> <filter type="subtree"> <top xmlns="http://example.com/users"> <users/> </top> </filter> </get-config> </rpc>
Step 2 - Receiving existing data
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <data> <top xmlns="http://example.com/users"> <users> <user> <name>fred</name> <phone>8327</phone> </user> </users> </top> </data> </rpc-reply>
Step 3 - Lock users
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" message-id="102"> <partial-lock> <select xmlns:usr="http://example.com/users"> /usr:top/usr:users </select> </partial-lock> </nc:rpc>
Step 4 - Receive lock
<nc:rpc-reply xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" message-id="102"> <lock-id>1</lock-id> <locked-node xmlns:usr="http://example.com/users"> /usr:top/usr:users </locked-node> </nc:rpc-reply>
Step 5 - Create user Joe
<rpc message-id="103" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <edit-config> <target> <running/> </target> <config> <top xmlns:usr="http://example.com/users"> <users> <user> <name>Joe</name> </user> </users> </top> </config> </edit-config> </rpc>
Step 6 - Lock user Joe
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" message-id="104"> <partial-lock> <select xmlns:usr="http://example.com/users"> /usr:top/usr:users/user[usr:name="Joe"]" </select> </partial-lock> </nc:rpc>
Step 7 - Receive lock
<nc:rpc-reply xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" message-id="104"> <lock-id>2</lock-id> <locked-node xmlns:usr="http://example.com/users"> /usr:top/usr:users/user[usr:name="Joe"]" </locked-node> </nc:rpc-reply>
Step 8 - Release lock on <users>
<nc:rpc xmlns="urn:ietf:params:xml:ns:netconf:partial-lock:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="105"> <partial-unlock> <lock-id>1</lock-id> </partial-unlock> </nc:rpc>
TOC |
TOC |
Minor clarifications
TOC |
Clarifications
Only the running datastore can be locked
TOC |
Clarifications
TOC |
Clarifications
TOC |
Changed XSD and YANG to allow additional proprietary datastores to be locked.
TOC |
Added usage example
Clarified error messages
Clarified interaction with edit-config continue-on-error
Improved YANG: indentation, canonical order, contact info
Added usage example in appendix C
Synchronized YANG and XSD
TOC |
Language and editorial updates
all app-tags are with dashes without spaces
Added usage scenarios
Changed encoding
Clarified definitions, separated scope of lock and protected area
TOC |
Minor clarifications
Added list of locked-nodes to the output of partial-lock.
Added <target> wrapper around datastore names.
Allowed atomic/one operation locking of datastore parts in multiple datastores.
Improved English (hopefully)
Removed the <data> element from rpc-reply following the text of rfc4741.
TOC |
Minor clarifications
Same descriptions in XSD and YANG.
TOC |
Made XSD normative
Clarified that no specific access control is assumed.
Clarified that non-existing nodes are NOT covered by the lock, even if they where existing and covered by the lock when it was originally granted.
Some rewording
Added app-tags for two of the error cases.
Made YANG an informative reference
Enhanced security considerations.
TOC |
Added YANG module.
TOC |
Created from draft-lengyel-ngo-partial-lock-01.txt
TOC |
Thanks to Andy Bierman, Sharon Chisholm, Phil Shafer , David Harrington, Mehmet Ersue, Wes Hardaker, Juergen Schoenwaelder, Washam Fan and many other members of the NETCONF WG for providing important input to this document.
TOC |
TOC |
[NETCONF] | Enns, R., “NETCONF Configuration Protocol,” RFC 4741, December 2006 (TXT). |
[RFC2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML). |
[RFC3688] | Mealling, M., “The IETF XML Registry,” BCP 81, RFC 3688, January 2004 (TXT). |
TOC |
[I-D.ietf-netmod-yang] | Bjorklund, M., “YANG - A data modeling language for NETCONF,” draft-ietf-netmod-yang-07 (work in progress), July 2009 (TXT). |
TOC |
Balazs Lengyel | |
Ericsson | |
Email: | balazs.lengyel@ericsson.com |
Martin Bjorklund | |
Tail-f Systems | |
Email: | mbj@tail-f.com |