Update user guide with key-based auth
[netconf.git] / docs / user-guide.rst
1 .. _netconf-user-guide:
2
3 .. |ss| raw:: html
4
5    <strike>
6
7 .. |se| raw:: html
8
9    </strike>
10
11 NETCONF User Guide
12 ==================
13
14 Overview
15 --------
16
17 NETCONF is an XML-based protocol used for configuration and monitoring
18 devices in the network. The base NETCONF protocol is described in
19 `RFC-6241 <https://www.rfc-editor.org/rfc/rfc6241>`__.
20
21 **NETCONF in OpenDaylight:.**
22
23 OpenDaylight supports the NETCONF protocol as a northbound server as
24 well as a southbound plugin. It also includes a set of test tools for
25 simulating NETCONF devices and clients.
26
27 Southbound (netconf-connector)
28 ------------------------------
29
30 The NETCONF southbound plugin is capable of connecting to remote NETCONF
31 devices and exposing their configuration/operational datastores, RPCs
32 and notifications as MD-SAL mount points. These mount points allow
33 applications and remote users (over RESTCONF) to interact with the
34 mounted devices.
35
36 In terms of RFCs, the connector supports:
37
38 -  `RFC-6241 <https://www.rfc-editor.org/rfc/rfc6241>`__
39
40 -  `RFC-5277 <https://www.rfc-editor.org/rfc/rfc5277>`__
41
42 -  `RFC-6022 <https://www.rfc-editor.org/rfc/rfc6022>`__
43
44 -  `RFC-7895 <https://www.rfc-editor.org/rfc/rfc7895>`__
45
46 **Netconf-connector is fully model-driven (utilizing the YANG modeling
47 language) so in addition to the above RFCs, it supports any
48 data/RPC/notifications described by a YANG model that is implemented by
49 the device.**
50
51 .. tip::
52
53     NETCONF southbound can be activated by installing
54     ``odl-netconf-connector-all`` Karaf feature.
55
56 .. _netconf-connector:
57
58 Netconf-connector configuration
59 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
60
61 NETCONF connectors are configured directly through the usage of the
62 network-topology model. You can configure new NETCONF connectors both
63 through the NETCONF server for MD-SAL (port 2830) or RESTCONF. This guide
64 focuses on RESTCONF.
65
66 .. important::
67
68     Since 2022.09 Chlorine there is only one RESTCONF endpoint:
69
70     - | ``http://localhost:8181/rests`` is related to `RFC-8040 <https://www.rfc-editor.org/rfc/rfc8040>`__,
71       | can be activated by installing ``odl-restconf-nb``
72        Karaf feature.
73
74     | Resources for configuration and operational datastores start
75      ``/rests/data/``,
76     | e. g. GET
77      http://localhost:8181/rests/data/network-topology:network-topology
78      with response of both datastores. It's allowed to use query
79      parameters to distinguish between them.
80     | e. g. GET
81      http://localhost:8181/rests/data/network-topology:network-topology?content=config
82      for configuration datastore
83     | and GET
84      http://localhost:8181/rests/data/network-topology:network-topology?content=nonconfig
85      for operational datastore.
86
87     | Also if a data node in the path expression is a YANG leaf-list or list
88      node, the path segment has to be constructed by having leaf-list or
89      list node name, followed by an "=" character, then followed by the
90      leaf-list or list value. Any reserved characters must be
91      percent-encoded.
92     | e. g. GET
93      http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf?content=config
94      for retrieving data from configuration datastore for
95      topology-netconf value of topology list.
96
97 Preconditions
98 ^^^^^^^^^^^^^
99
100 1. OpenDaylight is running
101
102 2. In Karaf, you must have the ``odl-netconf-topology`` or
103    ``odl-netconf-clustered-topology`` feature installed.
104
105 3. Feature ``odl-restconf-nb`` must be installed
106
107 Spawning new NETCONF connectors
108 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
109
110 To create a new NETCONF connector you need to send the following PUT request
111 to RESTCONF:
112
113 .. list-table::
114    :widths: 1 5
115
116    * - rfc8040
117      - http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=new-netconf-device
118
119 You could use the same body to create the new  NETCONF connector with a POST
120 without specifying the node in the URL:
121
122 .. list-table::
123    :widths: 1 5
124
125    * - rfc8040
126      - http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf
127
128 Payload for password authentication:
129
130 .. tabs::
131
132    .. tab:: XML
133
134       **Content-type:** ``application/xml``
135
136       **Accept:** ``application/xml``
137
138       **Authentication:** ``admin:admin``
139
140       .. code-block:: xml
141
142          <node xmlns="urn:TBD:params:xml:ns:yang:network-topology">
143            <node-id>new-netconf-device</node-id>
144            <host xmlns="urn:opendaylight:netconf-node-topology">127.0.0.1</host>
145            <port xmlns="urn:opendaylight:netconf-node-topology">17830</port>
146            <login-password-unencrypted xmlns="urn:opendaylight:netconf-node-topology">
147              <username xmlns="urn:opendaylight:netconf-node-topology">admin</username>
148              <password xmlns="urn:opendaylight:netconf-node-topology">admin</password>
149            </login-password-unencrypted>
150            <tcp-only xmlns="urn:opendaylight:netconf-node-topology">false</tcp-only>
151            <!-- non-mandatory fields with default values, you can safely remove these if you do not wish to override any of these values-->
152            <reconnect-on-changed-schema xmlns="urn:opendaylight:netconf-node-topology">false</reconnect-on-changed-schema>
153            <connection-timeout-millis xmlns="urn:opendaylight:netconf-node-topology">20000</connection-timeout-millis>
154            <max-connection-attempts xmlns="urn:opendaylight:netconf-node-topology">0</max-connection-attempts>
155            <min-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">2000</min-backoff-millis>
156            <max-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">1800000</max-backoff-millis>
157            <backoff-multiplier xmlns="urn:opendaylight:netconf-node-topology">1.5</backoff-multiplier>
158            <!-- keepalive-delay set to 0 turns off keepalives-->
159            <keepalive-delay xmlns="urn:opendaylight:netconf-node-topology">120</keepalive-delay>
160          </node>
161
162    .. tab:: JSON
163
164       **Content-type:** ``application/json``
165
166       **Accept:** ``application/json``
167
168       **Authentication:** ``admin:admin``
169
170       .. code-block:: json
171
172          {
173              "node": [
174                  {
175                      "node-id": "new-netconf-device",
176                      "netconf-node-topology:port": 17830,
177                      "netconf-node-topology:reconnect-on-changed-schema": false,
178                      "netconf-node-topology:connection-timeout-millis": 20000,
179                      "netconf-node-topology:tcp-only": false,
180                      "netconf-node-topology:max-connection-attempts": 0,
181                      "netconf-node-topology:login-password-unencrypted": {
182                         "netconf-node-topology:username": "admin",
183                         "netconf-node-topology:password": "admin"
184                      },
185                      "netconf-node-topology:host": "127.0.0.1",
186                      "netconf-node-topology:min-backoff-millis": 2000,
187                      "netconf-node-topology:max-backoff-millis": 1800000,
188                      "netconf-node-topology:backoff-multiplier": 1.5,
189                      "netconf-node-topology:keepalive-delay": 120
190                  }
191              ]
192          }
193
194 .. note::
195
196     You have the option to use the 'login-password' configuration for authentication as shown below:
197
198     .. code-block:: json
199
200         "login-password": {
201             "netconf-node-topology:username": "netconf",
202             "netconf-node-topology:password": "c5R3aLBss7J8T2VC3pEeAQ=="
203         }
204
205     In OpenDaylight's configuration, the AAAEncryptionServiceImpl generates a new encryption key with
206     each application build. You can use this method if you have access to the current encryption key.
207     Additionally, it is important to ensure that the entire password is encoded in base64 format and
208     that its length is a multiple of 16 bytes for successful authentication.
209
210 There is also option of using key-based authentication instead
211 of password. First we need to create key in datastore.
212
213 *Adding a client private key credential to the netconf-keystore*
214
215 .. code-block::
216
217     POST HTTP/1.1
218     /rests/operations/netconf-keystore:add-keystore-entry
219     Content-Type: application/json
220     Accept: application/json
221
222 .. code-block:: json
223
224   {
225     "input": {
226       "key-credential": [
227         {
228           "key-id": "example-client-key-id",
229           "private-key": "PEM-format-private-key",
230           "passphrase": "passphrase"
231         }
232       ]
233     }
234   }
235
236 After we can use this key to create connector using this key.
237
238 Payload for key-based authentication via SSH:
239
240 .. tabs::
241
242    .. tab:: XML
243
244       **Content-type:** ``application/xml``
245
246       **Accept:** ``application/xml``
247
248       **Authentication:** ``admin:admin``
249
250       .. code-block:: xml
251
252          <node xmlns="urn:TBD:params:xml:ns:yang:network-topology">
253            <node-id>new-netconf-device</node-id>
254            <host xmlns="urn:opendaylight:netconf-node-topology">127.0.0.1</host>
255            <port xmlns="urn:opendaylight:netconf-node-topology">17830</port>
256            <key-based xmlns="urn:opendaylight:netconf-node-topology">
257              <username xmlns="urn:opendaylight:netconf-node-topology">admin</username>
258              <key-id xmlns="urn:opendaylight:netconf-node-topology">key-id</password>
259            </key-based>
260            <tcp-only xmlns="urn:opendaylight:netconf-node-topology">false</tcp-only>
261            <!-- non-mandatory fields with default values, you can safely remove these if you do not wish to override any of these values-->
262            <reconnect-on-changed-schema xmlns="urn:opendaylight:netconf-node-topology">false</reconnect-on-changed-schema>
263            <connection-timeout-millis xmlns="urn:opendaylight:netconf-node-topology">20000</connection-timeout-millis>
264            <max-connection-attempts xmlns="urn:opendaylight:netconf-node-topology">0</max-connection-attempts>
265            <min-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">2000</min-backoff-millis>
266            <max-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">1800000</max-backoff-millis>
267            <backoff-multiplier xmlns="urn:opendaylight:netconf-node-topology">1.5</backoff-multiplier>
268            <!-- keepalive-delay set to 0 turns off keepalives-->
269            <keepalive-delay xmlns="urn:opendaylight:netconf-node-topology">120</keepalive-delay>
270          </node>
271
272    .. tab:: JSON
273
274       **Content-type:** ``application/json``
275
276       **Accept:** ``application/json``
277
278       **Authentication:** ``admin:admin``
279
280       .. code-block:: json
281
282          {
283              "node": [
284                  {
285                      "node-id": "new-netconf-device",
286                      "netconf-node-topology:port": 17830,
287                      "netconf-node-topology:reconnect-on-changed-schema": false,
288                      "netconf-node-topology:connection-timeout-millis": 20000,
289                      "netconf-node-topology:tcp-only": false,
290                      "netconf-node-topology:max-connection-attempts": 0,
291                      "netconf-node-topology:key-based": {
292                         "netconf-node-topology:username": "admin",
293                         "netconf-node-topology:key-id": "key-id"
294                      },
295                      "netconf-node-topology:host": "127.0.0.1",
296                      "netconf-node-topology:min-backoff-millis": 2000,
297                      "netconf-node-topology:max-backoff-millis": 1800000,
298                      "netconf-node-topology:backoff-multiplier": 1.5,
299                      "netconf-node-topology:keepalive-delay": 120
300                  }
301              ]
302          }
303
304 Connecting via TLS protocol is similar to SSH. First setup keystore
305 by using three RPCs from `Configure device to connect over TLS protocol`_
306 to add a client private key, associate a private key with a client and CA
307 certificates chain and add a list of trusted CA and server certificates.
308 Only after that we can process and create a new NETCONF connector you need
309 to send the following PUT request.
310
311 Payload for key-based authentication via TLS:
312
313 .. tabs::
314
315    .. tab:: XML
316
317       **Content-type:** ``application/xml``
318
319       **Accept:** ``application/xml``
320
321       **Authentication:** ``admin:admin``
322
323       .. code-block:: xml
324
325          <node xmlns="urn:TBD:params:xml:ns:yang:network-topology">
326            <node-id>new-netconf-device</node-id>
327            <host xmlns="urn:opendaylight:netconf-node-topology">127.0.0.1</host>
328            <port xmlns="urn:opendaylight:netconf-node-topology">17830</port>
329            <key-based xmlns="urn:opendaylight:netconf-node-topology">
330              <username xmlns="urn:opendaylight:netconf-node-topology">admin</username>
331              <key-id xmlns="urn:opendaylight:netconf-node-topology">key-id</password>
332            </key-based>
333            <tcp-only xmlns="urn:opendaylight:netconf-node-topology">false</tcp-only>
334            <!-- non-mandatory fields with default values, you can safely remove these if you do not wish to override any of these values-->
335            <reconnect-on-changed-schema xmlns="urn:opendaylight:netconf-node-topology">false</reconnect-on-changed-schema>
336            <connection-timeout-millis xmlns="urn:opendaylight:netconf-node-topology">20000</connection-timeout-millis>
337            <max-connection-attempts xmlns="urn:opendaylight:netconf-node-topology">0</max-connection-attempts>
338            <min-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">2000</min-backoff-millis>
339            <max-backoff-millis xmlns="urn:opendaylight:netconf-node-topology">1800000</max-backoff-millis>
340            <backoff-multiplier xmlns="urn:opendaylight:netconf-node-topology">1.5</backoff-multiplier>
341            <!-- keepalive-delay set to 0 turns off keepalives-->
342            <keepalive-delay xmlns="urn:opendaylight:netconf-node-topology">120</keepalive-delay>
343            <protocol xmlns="urn:opendaylight:netconf-node-topology">
344              <name xmlns="urn:opendaylight:netconf-node-topology">TLS</name>
345            </protocol>
346          </node>
347
348    .. tab:: JSON
349
350       **Content-type:** ``application/json``
351
352       **Accept:** ``application/json``
353
354       **Authentication:** ``admin:admin``
355
356       .. code-block:: json
357
358          {
359              "node": [
360                  {
361                      "node-id": "new-netconf-device",
362                      "netconf-node-topology:port": 17830,
363                      "netconf-node-topology:reconnect-on-changed-schema": false,
364                      "netconf-node-topology:connection-timeout-millis": 20000,
365                      "netconf-node-topology:tcp-only": false,
366                      "netconf-node-topology:max-connection-attempts": 0,
367                      "netconf-node-topology:key-based": {
368                         "netconf-node-topology:username": "admin",
369                         "netconf-node-topology:key-id": "key-id"
370                      },
371                      "netconf-node-topology:host": "127.0.0.1",
372                      "netconf-node-topology:min-backoff-millis": 2000,
373                      "netconf-node-topology:max-backoff-millis": 1800000,
374                      "netconf-node-topology:backoff-multiplier": 1.5,
375                      "netconf-node-topology:keepalive-delay": 120,
376                      "protocol": {
377                         "name": "TLS"
378                      }
379                  }
380              ]
381          }
382
383
384 Note that the device name in <node-id> element must match the last
385 element of the restconf URL.
386
387 Reconfiguring an existing connector
388 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
389
390 The steps to reconfigure an existing connector are exactly the same as
391 when spawning a new connector. The old connection will be disconnected
392 and a new connector with the new configuration will be created. This needs
393 to be done with a PUT request because the node already exists. A POST
394 request will fail for that reason.
395
396 Additionally, a PATCH request can be used to modify an existing
397 configuration. Currently, only yang-patch (`RFC-8072 <https://www.rfc-editor.org/rfc/rfc8072>`__)
398 is supported. The URL would be the same as the above PUT examples.
399 Using JSON for the body, the headers needed for the request would
400 be:
401
402 Headers:
403
404 -  Accept: application/yang-data+json
405
406 -  Content-Type: application/yang-patch+json
407
408 Example JSON payload to modify the password entry:
409
410 ::
411
412     {
413       "ietf-restconf:yang-patch" : {
414         "patch-id" : "0",
415         "edit" : [
416           {
417             "edit-id" : "edit1",
418             "operation" : "merge",
419             "target" : "",
420             "value" : {
421              "node": [
422                 {
423                  "node-id": "new-netconf-device",
424                  "netconf-node-topology:password" : "newpassword"
425                 }
426              ]
427             }
428          }
429         ]
430       }
431     }
432
433 Deleting an existing connector
434 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
435
436 To remove an already configured NETCONF connector you need to send a
437 DELETE request to the same PUT request URL that was used to create the
438 device:
439
440 .. list-table::
441    :widths: 1 5
442
443    * - rfc8040
444      - http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=new-netconf-device
445
446 .. note::
447
448     No body is needed to delete the node/device
449
450 Connecting to a device not supporting NETCONF monitoring
451 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
452
453 The netconf-connector in OpenDaylight relies on ietf-netconf-monitoring
454 support when connecting to remote NETCONF device. The
455 ietf-netconf-monitoring support allows netconf-connector to list and
456 download all YANG schemas that are used by the device. NETCONF connector
457 can only communicate with a device if it knows the set of used schemas
458 (or at least a subset). However, some devices use YANG models internally
459 but do not support NETCONF monitoring. Netconf-connector can also
460 communicate with these devices, but you have to side load the necessary
461 yang models into OpenDaylight’s YANG model cache for netconf-connector.
462 In general there are 2 situations you might encounter:
463
464 **1. NETCONF device does not support ietf-netconf-monitoring but it does
465 list all its YANG models as capabilities in HELLO message**
466
467 This could be a device that internally uses only ietf-inet-types YANG
468 model with revision 2010-09-24. In the HELLO message that is sent from
469 this device there is this capability reported:
470
471 ::
472
473     urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&revision=2010-09-24
474
475 **For such devices you only need to put the schema into folder
476 cache/schema inside your Karaf distribution.**
477
478 .. important::
479
480     The file with YANG schema for ietf-inet-types has to be called
481     ietf-inet-types@2010-09-24.yang. It is the required naming format of
482     the cache.
483
484 **2. NETCONF device does not support ietf-netconf-monitoring and it does
485 NOT list its YANG models as capabilities in HELLO message**
486
487 Compared to device that lists its YANG models in HELLO message, in this
488 case there would be no capability with ietf-inet-types in the HELLO
489 message. This type of device basically provides no information about the
490 YANG schemas it uses so its up to the user of OpenDaylight to properly
491 configure netconf-connector for this device.
492
493 Netconf-connector has an optional configuration attribute called
494 yang-module-capabilities and this attribute can contain a list of "YANG
495 module based" capabilities. So by setting this configuration attribute,
496 it is possible to override the "yang-module-based" capabilities reported
497 in HELLO message of the device. To do this, we need to modify the
498 configuration of netconf-connector like in the example below:
499
500 .. tabs::
501
502    .. tab:: XML
503
504       **Content-type:** ``application/xml``
505
506       **Accept:** ``application/xml``
507
508       **Authentication:** ``admin:admin``
509
510       .. code-block:: xml
511
512          <node xmlns="urn:TBD:params:xml:ns:yang:network-topology">
513            <node-id>r5</node-id>
514            <host xmlns="urn:opendaylight:netconf-node-topology">127.0.0.1</host>
515            <port xmlns="urn:opendaylight:netconf-node-topology">8305</port>
516            <login-password-unencrypted xmlns="urn:opendaylight:netconf-node-topology">
517              <username xmlns="urn:opendaylight:netconf-node-topology">root</username>
518              <password xmlns="urn:opendaylight:netconf-node-topology">root</password>
519            </login-password-unencrypted>
520            <tcp-only xmlns="urn:opendaylight:netconf-node-topology">false</tcp-only>
521            <keepalive-delay xmlns="urn:opendaylight:netconf-node-topology">30</keepalive-delay>
522            <yang-module-capabilities xmlns="urn:opendaylight:netconf-node-topology">
523              <override>true</override>
524              <capability xmlns="urn:opendaylight:netconf-node-topology">
525                urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&amp;revision=2013-07-15
526              </capability>
527            </yang-module-capabilities>
528          </node>
529
530    .. tab:: JSON
531
532       **Content-type:** ``application/json``
533
534       **Accept:** ``application/json``
535
536       **Authentication:** ``admin:admin``
537
538       .. code-block:: json
539
540          {
541              "node": [
542                  {
543                      "node-id": "device",
544                      "netconf-node-topology:host": "127.0.0.1",
545                      "netconf-node-topology:login-password-unencrypted": {
546                         "netconf-node-topology:password": "root",
547                         "netconf-node-topology:username": "root"
548                      },
549                      "netconf-node-topology:yang-module-capabilities": {
550                          "override": true,
551                          "capability": [
552                              "urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&revision=2013-07-15"
553                          ]
554                      },
555                      "netconf-node-topology:port": 8305,
556                      "netconf-node-topology:tcp-only": false,
557                      "netconf-node-topology:keepalive-delay": 30
558                  }
559              ]
560          }
561
562 **Remember to also put the YANG schemas into the cache folder.**
563
564 .. note::
565
566     For putting multiple capabilities, you just need to replicate the
567     capability element inside yang-module-capability element.
568     Capability element is modeled as a leaf-list. With this
569     configuration, we would make the remote device report usage of
570     ietf-inet-types in the eyes of netconf-connector.
571
572 Connecting to a device supporting only NETCONF 1.0
573 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
574
575 OpenDaylight is schema-based distribution and heavily depends on YANG
576 models. However some legacy NETCONF devices are not schema-based and
577 implement just RFC 4741. This type of device does not utilize YANG
578 models internally and OpenDaylight does not know how to communicate
579 with such devices, how to validate data, or what the semantics of data
580 are.
581
582 NETCONF connector can communicate also with these devices, but the
583 trade-offs are worsened possibilities in utilization of NETCONF
584 mountpoints. Using RESTCONF with such devices is not supported. Also
585 communicating with schemaless devices from application code is slightly
586 different.
587
588 To connect to schemaless device, there is a optional configuration option
589 in netconf-node-topology model called schemaless. You have to set this
590 option to true.
591
592 Clustered NETCONF connector
593 ~~~~~~~~~~~~~~~~~~~~~~~~~~~
594
595 To spawn NETCONF connectors that are cluster-aware you need to install
596 the ``odl-netconf-clustered-topology`` karaf feature.
597
598 .. warning::
599
600     The ``odl-netconf-topology`` and ``odl-netconf-clustered-topology``
601     features are considered **INCOMPATIBLE**. They both manage the same
602     space in the datastore and would issue conflicting writes if
603     installed together.
604
605 Configuration of clustered NETCONF connectors works the same as the
606 configuration through the topology model in the previous section.
607
608 When a new clustered connector is configured the configuration gets
609 distributed among the member nodes and a NETCONF connector is spawned on
610 each node. From these nodes a master is chosen which handles the schema
611 download from the device and all the communication with the device. You
612 will be able to read/write to/from the device from all slave nodes due
613 to the proxy data brokers implemented.
614
615 You can use the ``odl-netconf-clustered-topology`` feature in a single
616 node scenario as well but the code that uses akka will be used, so for a
617 scenario where only a single node is used, ``odl-netconf-topology``
618 might be preferred.
619
620 Netconf-connector utilization
621 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
622
623 Once the connector is up and running, users can utilize the new mount
624 point instance. By using RESTCONF or from their application code. This
625 chapter deals with using RESTCONF and more information for app
626 developers can be found in the developers guide or in the official
627 tutorial application **ncmount** that can be found in the coretutorials
628 project:
629
630 -  https://github.com/opendaylight/coretutorials/tree/master/ncmount
631
632 Reading data from the device
633 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
634
635 Just invoke (no body needed):
636
637 GET
638 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=new-netconf-device/yang-ext:mount?content=nonconfig
639
640 This will return the entire content of operation datastore from the
641 device. To view just the configuration datastore, change **nonconfig**
642 in this URL to **config**.
643
644 Writing configuration data to the device
645 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
646
647 In general, you cannot simply write any data you want to the device. The
648 data have to conform to the YANG models implemented by the device. In
649 this example we are adding a new interface-configuration to the mounted
650 device (assuming the device supports Cisco-IOS-XR-ifmgr-cfg YANG model).
651 In fact this request comes from the tutorial dedicated to the
652 **ncmount** tutorial app.
653
654 POST
655 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=new-netconf-device/yang-ext:mount/Cisco-IOS-XR-ifmgr-cfg:interface-configurations
656
657 ::
658
659     <interface-configuration xmlns="http://cisco.com/ns/yang/Cisco-IOS-XR-ifmgr-cfg">
660         <active>act</active>
661         <interface-name>mpls</interface-name>
662         <description>Interface description</description>
663         <bandwidth>32</bandwidth>
664         <link-status></link-status>
665     </interface-configuration>
666
667 Should return 200 response code with no body.
668
669 .. tip::
670
671     This call is transformed into a couple of NETCONF RPCs. Resulting
672     NETCONF RPCs that go directly to the device can be found in the
673     OpenDaylight logs after invoking ``log:set TRACE
674     org.opendaylight.controller.sal.connect.netconf`` in the Karaf
675     shell. Seeing the NETCONF RPCs might help with debugging.
676
677 This request is very similar to the one where we spawned a new netconf
678 device. That’s because we used the loopback netconf-connector to write
679 configuration data into config-subsystem datastore and config-subsystem
680 picked it up from there.
681
682 Invoking custom RPC
683 ^^^^^^^^^^^^^^^^^^^
684
685 Devices can implement any additional RPC and as long as it provides YANG
686 models for it, it can be invoked from OpenDaylight. Following example
687 shows how to invoke the get-schema RPC (get-schema is quite common among
688 netconf devices). Invoke:
689
690 POST
691 http://localhost:8181/rests/operations/network-topology:network-topology/topology=topology-netconf/node=new-netconf-device/yang-ext:mount/ietf-netconf-monitoring:get-schema
692
693 ::
694
695     <input xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">
696       <identifier>ietf-yang-types</identifier>
697       <version>2013-07-15</version>
698     </input>
699
700 This call should fetch the source for ietf-yang-types YANG model from
701 the mounted device.
702
703 Receiving Netconf Device Notifications on a http client
704 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
705
706 Devices emit netconf alarms and notifications in certain situations, which can demand
707 attention from Device Administration. The notifications are received as Netconf messages on an
708 active Netconf session.
709
710 Opendaylight provides the way to stream the device notifications over a http session.
711
712 - Step 1: Mount the device (assume node name is test_device)
713
714 - Step 2: Wait for the device to be connected.
715
716 - Step 3: Create the Subscription for notification on the active session.
717
718  .. code-block::
719
720     POST
721     http://localhost:8181/rests/operations/network-topology:network-topology/topology=topology-netconf/node=test_device/yang-ext:mount/notifications:create-subscription
722     Content-Type: application/json
723     Accept: application/json
724
725  .. code-block:: json
726
727     {
728       "input": {
729         "stream": "NETCONF"
730        }
731     }
732
733 - Step 4: Create the http Stream for the events.
734
735 .. code-block::
736
737     POST
738     http://localhost:8181/rests/operations/odl-device-notification:subscribe-device-notification
739     Content-Type: application/json
740     Accept: application/json
741
742 .. code-block:: json
743
744     {
745       "input": {
746          "path":"/network-topology:network-topology/topology[topology-id='topology-netconf']/node[node-id='test_device']"
747       }
748     }
749
750 The response suggests the http url for reading the notifications.
751
752 .. code-block:: json
753
754     {
755        "odl-device-notification:output": {
756             "stream-path": "http://localhost:8181/rests/notif/test_device?notificationType=test_device"
757         }
758     }
759
760 - Step 5: User can access the url in the response and the notifications will be as follows.
761
762 .. code-block::
763
764     GET
765     http://localhost:8181/rests/notif/test_device?notificationType=test_device
766     Content-Type: application/xml
767     Accept: application/xml
768
769
770 .. code-block:: xml
771
772     : ping
773
774     : ping
775
776     : ping
777
778     : ping
779
780     : ping
781
782     data: <notification xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0"><eventTime>2022-06-17T07:01:08.60228Z</eventTime><netconf-session-start xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-notifications"><username>root</username><source-host>127.0.0.1</source-host><session-id>2</session-id></netconf-session-start></notification>
783
784     data: <notification xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0"><eventTime>2022-06-17T07:01:12.458258Z</eventTime><netconf-session-end xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-notifications"><username>root</username><source-host>127.0.0.1</source-host><termination-reason>closed</termination-reason><session-id>2</session-id></netconf-session-end></notification>
785
786 Change event notification subscription tutorial
787 -----------------------------------------------
788
789 Subscribing to data change notifications makes it possible to obtain
790 notifications about data manipulation (insert, change, delete) which are
791 done on any specified **path** of any specified **datastore** with
792 specific **scope**. In following examples *{odlAddress}* is address of
793 server where ODL is running and *{odlPort}* is port on which
794 OpenDaylight is running. OpenDaylight offers two methods for receiving notifications:
795 Server-Sent Events (SSE) and WebSocket. SSE is the default notification mechanism used in OpenDaylight.
796
797 SSE notifications subscription process
798 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
799
800 In this section we will learn what steps need to be taken in order to
801 successfully subscribe to data change event notifications.
802
803 Create stream
804 ^^^^^^^^^^^^^
805
806 In order to use event notifications you first need to call RPC that
807 creates notification stream that you can later listen to. You need to
808 provide three parameters to this RPC:
809
810 -  **path**: data store path that you plan to listen to. You can
811    register listener on containers, lists and leaves.
812
813 -  **datastore**: data store type. *OPERATIONAL* or *CONFIGURATION*.
814
815 -  **scope**: Represents scope of data change. Possible options are:
816
817    -  BASE: only changes directly to the data tree node specified in the
818       path will be reported
819
820    -  ONE: changes to the node and to direct child nodes will be
821       reported
822
823    -  SUBTREE: changes anywhere in the subtree starting at the node will
824       be reported
825
826 The RPC to create the stream can be invoked via RESTCONF like this:
827
828 ::
829
830     OPERATION: POST
831     URI:  http://{odlAddress}:{odlPort}/rests/operations/sal-remote:create-data-change-event-subscription
832     HEADER: Content-Type=application/json
833             Accept=application/json
834
835 .. code-block:: json
836
837        {
838            "input": {
839                "path": "/toaster:toaster/toaster:toasterStatus",
840                "sal-remote-augment:datastore": "OPERATIONAL",
841                "sal-remote-augment:scope": "ONE"
842            }
843        }
844
845 The response should look something like this:
846
847 .. code-block:: json
848
849     {
850         "sal-remote:output": {
851             "stream-name": "data-change-event-subscription/toaster:toaster/toaster:toasterStatus/datastore=CONFIGURATION/scope=SUBTREE"
852         }
853     }
854
855 **stream-name** is important because you will need to use it when you
856 subscribe to the stream in the next step.
857
858 .. note::
859
860     Internally, this will create a new listener for *stream-name* if it
861     did not already exist.
862
863 Subscribe to stream
864 ^^^^^^^^^^^^^^^^^^^
865
866 In order to subscribe to stream and obtain SSE location you need
867 to call *GET* on your stream path. The URI should generally be
868 `http://{odlAddress}:{odlPort}/rests/data/ietf-restconf-monitoring:restconf-state/streams/stream/{streamName}`,
869 where *{streamName}* is the *stream-name* parameter contained in
870 response from *create-data-change-event-subscription* RPC from the
871 previous step.
872
873 ::
874
875    OPERATION: GET
876    URI: http://{odlAddress}:{odlPort}/rests/data/ietf-restconf-monitoring:restconf-state/streams/stream/data-change-event-subscription/toaster:toaster/datastore=CONFIGURATION/scope=SUBTREE
877
878 The subscription call may be modified with the following query parameters defined in the RESTCONF RFC:
879
880 -  `filter <https://www.rfc-editor.org/rfc/rfc8040#section-4.8.4>`__
881
882 -  `start-time <https://www.rfc-editor.org/rfc/rfc8040#section-4.8.7>`__
883
884 -  `end-time <https://www.rfc-editor.org/rfc/rfc8040#section-4.8.8>`__
885
886 In addition, the following ODL extension query parameter is supported:
887
888 :odl-leaf-nodes-only:
889   If this parameter is set to "true", create and update notifications will only
890   contain the leaf nodes modified instead of the entire subscription subtree.
891   This can help in reducing the size of the notifications.
892
893 :odl-skip-notification-data:
894   If this parameter is set to "true", create and update notifications will only
895   contain modified leaf nodes without data.
896   This can help in reducing the size of the notifications.
897
898 The response should look something like this:
899
900 .. code-block:: json
901
902     {
903         "subscribe-to-notification:location": "http://localhost:8181/rests/notif/data-change-event-subscription/network-topology:network-topology/datastore=CONFIGURATION/scope=SUBTREE"
904     }
905
906 .. note::
907
908     During this phase there is an internal check for to see if a
909     listener for the *stream-name* from the URI exists. If not, new a
910     new listener is registered with the DOM data broker.
911
912 Receive notifications
913 ^^^^^^^^^^^^^^^^^^^^^
914
915 Once you got SSE location you can now connect to it and
916 start receiving data change events. The request should look something like this:
917
918 ::
919
920     curl -v -X GET  http://localhost:8181/rests/notif/data-change-event-subscription/toaster:toaster/toasterStatus/datastore=OPERATIONAL/scope=ONE  -H "Content-Type: text/event-stream" -H "Authorization: Basic YWRtaW46YWRtaW4="
921
922
923 WebSocket notifications subscription process
924 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
925
926 Enabling WebSocket notifications in OpenDaylight requires a manual setup before starting the application.
927 The following steps can be followed to enable WebSocket notifications in OpenDaylight:
928
929 1. Open the file `org.opendaylight.restconf.nb.rfc8040.cfg`, at `etc/` folder inside your Karaf distribution. Or create in case it does not exist.
930 2. Locate the `use-sse` configuration parameter and change its value from `true` to `false`. Or add ``use-sse=false`` as new line in case this parameter is not present.
931 3. Save the changes made to the `org.opendaylight.restconf.nb.rfc8040.cfg` file.
932 4. Restart OpenDaylight if it is already running.
933
934 Once these steps are completed, WebSocket notifications will be enabled in OpenDaylight,
935 and they can be used for receiving notifications instead of SSE.
936
937 WebSocket Notifications subscription process is the same as SSE until you receive a location of WebSocket.
938 You can follow steps given above and after subscribing to a notification stream over WebSocket,
939 you will receive a response indicating that the subscription was successful:
940
941 .. code-block:: json
942
943     {
944         "subscribe-to-notification:location": "ws://localhost:8181/rests/notif/data-change-event-subscription/network-topology:network-topology/datastore=CONFIGURATION/scope=SUBTREE"
945     }
946
947 You can use this WebSocket to listen to data
948 change notifications. To listen to notifications you can use a
949 JavaScript client or if you are using chrome browser you can use the
950 `Simple WebSocket
951 Client <https://chrome.google.com/webstore/detail/simple-websocket-client/pfdhoblngboilpfeibdedpjgfnlcodoo>`__.
952
953 Also, for testing purposes, there is simple Java application named
954 WebSocketClient. The application is placed in the
955 */restconf/websocket-client* project. It accepts a WebSocket URI
956 as an input parameter. After starting the utility (WebSocketClient
957 class directly in Eclipse/InteliJ Idea) received notifications should be
958 displayed in console.
959
960 Notifications are always in XML format and look like this:
961
962 .. code-block:: xml
963
964     <notification xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
965         <eventTime>2014-09-11T09:58:23+02:00</eventTime>
966         <data-changed-notification xmlns="urn:opendaylight:params:xml:ns:yang:controller:md:sal:remote">
967             <data-change-event>
968                 <path xmlns:meae="http://netconfcentral.org/ns/toaster">/meae:toaster</path>
969                 <operation>updated</operation>
970                 <data>
971                    <!-- updated data -->
972                 </data>
973             </data-change-event>
974         </data-changed-notification>
975     </notification>
976
977 Example use case
978 ~~~~~~~~~~~~~~~~
979
980 The typical use case is listening to data change events to update web
981 page data in real time. In this tutorial we will be using toaster as the
982 base.
983
984 When you call *make-toast* RPC, it sets *toasterStatus* to "down" to
985 reflect that the toaster is busy making toast. When it finishes,
986 *toasterStatus* is set to "up" again. We will listen to these toaster
987 status changes in data store and will reflect it on our web page in
988 real-time thanks to WebSocket data change notification.
989
990 Simple javascript client implementation
991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
992
993 We will create a simple JavaScript web application that will listen for
994 updates on *toasterStatus* leaf and update some elements of our web page
995 according to the new toaster status state.
996
997 Create stream
998 ^^^^^^^^^^^^^
999
1000 First you need to create stream that you are planning to subscribe to.
1001 This can be achieved by invoking "create-data-change-event-subscription"
1002 RPC on RESTCONF via AJAX request. You need to provide data store
1003 **path** that you plan to listen on, **data store type** and **scope**.
1004 If the request is successful you can extract the **stream-name** from
1005 the response and use that to subscribe to the newly created stream. The
1006 *{username}* and *{password}* fields represent the credentials that you
1007 use to connect to OpenDaylight via RESTCONF:
1008
1009 .. note::
1010
1011     The default user name and password are "admin".
1012
1013 .. code-block:: javascript
1014
1015     function createStream() {
1016         $.ajax(
1017             {
1018                 url: 'http://{odlAddress}:{odlPort}/rests/operations/sal-remote:create-data-change-event-subscription',
1019                 type: 'POST',
1020                 headers: {
1021                   'Authorization': 'Basic ' + btoa('{username}:{password}'),
1022                   'Content-Type': 'application/json'
1023                 },
1024                 data: JSON.stringify(
1025                     {
1026                         'input': {
1027                             'path': '/toaster:toaster/toaster:toasterStatus',
1028                             'sal-remote-augment:datastore': 'OPERATIONAL',
1029                             'sal-remote-augment:scope': 'ONE'
1030                         }
1031                     }
1032                 )
1033             }).done(function (data) {
1034                 // this function will be called when ajax call is executed successfully
1035                 subscribeToStream(data.output['stream-name']);
1036             }).fail(function (data) {
1037                 // this function will be called when ajax call fails
1038                 console.log("Create stream call unsuccessful");
1039             })
1040     }
1041
1042 Subscribe to stream
1043 ^^^^^^^^^^^^^^^^^^^
1044
1045 The Next step is to subscribe to the stream. To subscribe to the stream
1046 you need to call *GET* on
1047 *http://{odlAddress}:{odlPort}/rests/data/ietf-restconf-monitoring:restconf-state/streams/stream/{stream-name}*.
1048 If the call is successful, you get WebSocket address for this stream in
1049 **Location** parameter inside response header. You can get response
1050 header by calling *getResponseHeader(\ *Location*)* on HttpRequest
1051 object inside *done()* function call:
1052
1053 .. code-block:: javascript
1054
1055     function subscribeToStream(streamName) {
1056         $.ajax(
1057             {
1058                 url: 'http://{odlAddress}:{odlPort}/rests/data/ietf-restconf-monitoring:restconf-state/streams/stream/' + streamName;
1059                 type: 'GET',
1060                 headers: {
1061                   'Authorization': 'Basic ' + btoa('{username}:{password}'),
1062                 }
1063             }
1064         ).done(function (data, textStatus, httpReq) {
1065             // we need function that has http request object parameter in order to access response headers.
1066             listenToNotifications(httpReq.getResponseHeader('Location'));
1067         }).fail(function (data) {
1068             console.log("Subscribe to stream call unsuccessful");
1069         });
1070     }
1071
1072 Receive notifications
1073 ^^^^^^^^^^^^^^^^^^^^^
1074
1075 Once you have WebSocket server location you can now connect to it and
1076 start receiving data change events. You need to define functions that
1077 will handle events on WebSocket. In order to process incoming events
1078 from OpenDaylight you need to provide a function that will handle
1079 *onmessage* events. The function must have one parameter that represents
1080 the received event object. The event data will be stored in
1081 *event.data*. The data will be in an XML format that you can then easily
1082 parse using jQuery.
1083
1084 .. code-block:: javascript
1085
1086     function listenToNotifications(socketLocation) {
1087         try {
1088             var notificatinSocket = new WebSocket(socketLocation);
1089
1090             notificatinSocket.onmessage = function (event) {
1091                 // we process our received event here
1092                 console.log('Received toaster data change event.');
1093                 $($.parseXML(event.data)).find('data-change-event').each(
1094                     function (index) {
1095                         var operation = $(this).find('operation').text();
1096                         if (operation == 'updated') {
1097                             // toaster status was updated so we call function that gets the value of toasterStatus leaf
1098                             updateToasterStatus();
1099                             return false;
1100                         }
1101                     }
1102                 );
1103             }
1104             notificatinSocket.onerror = function (error) {
1105                 console.log("Socket error: " + error);
1106             }
1107             notificatinSocket.onopen = function (event) {
1108                 console.log("Socket connection opened.");
1109             }
1110             notificatinSocket.onclose = function (event) {
1111                 console.log("Socket connection closed.");
1112             }
1113             // if there is a problem on socket creation we get exception (i.e. when socket address is incorrect)
1114         } catch(e) {
1115             alert("Error when creating WebSocket" + e );
1116         }
1117     }
1118
1119 The *updateToasterStatus()* function represents function that calls
1120 *GET* on the path that was modified and sets toaster status in some web
1121 page element according to received data. After the WebSocket connection
1122 has been established you can test events by calling make-toast RPC via
1123 RESTCONF.
1124
1125 .. note::
1126
1127     for more information about WebSockets in JavaScript visit `Writing
1128     WebSocket client
1129     applications <https://developer.mozilla.org/en-US/docs/Web/API/WebSockets_API/Writing_WebSocket_client_applications>`__
1130
1131 Netconf-connector + Netopeer
1132 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1133
1134 `Netopeer <https://github.com/cesnet/netopeer>`__ (an open-source
1135 NETCONF server) can be used for testing/exploring NETCONF southbound in
1136 OpenDaylight.
1137
1138 Netopeer installation
1139 ^^^^^^^^^^^^^^^^^^^^^
1140
1141 A `Docker <https://www.docker.com/>`__ container with netopeer will be
1142 used in this guide. To install Docker and start the `netopeer
1143 image <https://hub.docker.com/r/sysrepo/sysrepo-netopeer2>`__ perform
1144 following steps:
1145
1146 1. Install docker https://docs.docker.com/get-started/
1147
1148 2. Start the netopeer image:
1149
1150    ::
1151
1152        docker run -it --name sysrepo -p 830:830 --rm sysrepo/sysrepo-netopeer2:latest
1153
1154 3. Verify netopeer is running by invoking (netopeer should send its
1155    HELLO message right away:
1156
1157    ::
1158
1159        ssh root@localhost -p 830 -s netconf
1160        (password root)
1161
1162 Mounting netopeer NETCONF server
1163 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1164
1165 Preconditions:
1166
1167 -  OpenDaylight is started with features ``odl-restconf-all`` and
1168    ``odl-netconf-connector-all``.
1169
1170 -  Netopeer is up and running in docker
1171
1172 Now just follow the section: `Spawning new NETCONF connectors`_ for
1173 password authentication.
1174 In the payload change the:
1175
1176 -  name, e.g., to netopeer
1177
1178 -  username/password to your system credentials
1179
1180 -  ip to localhost
1181
1182 -  port to 830.
1183
1184 After netopeer is mounted successfully, its configuration can be read
1185 using RESTCONF by invoking:
1186
1187 GET
1188 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=netopeer/yang-ext:mount?content:config
1189
1190 Mounting netopeer NETCONF server using key-based authentication SSH
1191 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1192
1193 1. Install docker https://docs.docker.com/get-started/
1194
1195 2. Create RSA key pair - it will be user for connection.
1196
1197 3. Start the netopeer image(this command will also copy you pub key
1198    into docker container):
1199
1200    ::
1201
1202        docker run -dt -p 830:830 -v {path-to-pub-key}:/home/{netopeer-username}/.ssh/authorized_keys sysrepo/sysrepo-netopeer2:latest netopeer2-server -d -v 2
1203
1204 4. Verify netopeer is running by invoking (netopeer should send its
1205    HELLO message right away:
1206
1207    ::
1208
1209        ssh root@localhost -p 830 -s netconf
1210        (password root)
1211
1212 Now just follow the section: `Spawning new NETCONF connectors`_ for
1213 key-based authentication(SSH) to create device.
1214 In the payload change the:
1215
1216 -  name, e.g., to netopeer
1217
1218 -  username/password to your system credentials
1219
1220 -  ip to localhost
1221
1222 -  port to 830.
1223
1224 After netopeer is mounted successfully, its configuration can be read
1225 using RESTCONF by invoking:
1226
1227 GET
1228 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=netopeer/yang-ext:mount?content:config
1229
1230 Mounting netopeer NETCONF server using key-based authentication TLS
1231 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1232
1233 1. Install docker https://docs.docker.com/get-started/
1234
1235 2. Run netopeer2
1236
1237    ::
1238
1239        docker pull sysrepo/sysrepo-netopeer2
1240        docker run -it --name sysrepo -p 830:830 --rm sysrepo/sysrepo-netopeer2:latest
1241
1242 3. Enable TLS communication on server netopeer2
1243
1244    ::
1245
1246        ssh root@localhost -p 830 -s netconf
1247        (type password root)
1248
1249    After successful connecting to netopeer2 setup your
1250    TLS configuration xml
1251    (See: https://github.com/CESNET/netopeer2/tree/master/example_configuration).
1252
1253 4. Run ODL:
1254
1255 -  :~/netconf/karaf/target/assembly/bin$ ./karaf
1256
1257 -  feature:install odl-netconf-topology odl-restconf-nb-bierman02 odl-mdsal-apidocs
1258
1259 5. Set up ODL netconf keystore
1260
1261    To setup keystore is needed to send three RPCs from
1262    `Configure device to connect over TLS protocol`_
1263    to add a client private key, associate a private key with a client and CA
1264    certificates chain and add a list of trusted CA and server certificates.
1265
1266 Now just follow the section: `Spawning new NETCONF connectors`_ for
1267 key-based authentication(TLS) to create device.
1268 In the payload change the:
1269
1270 -  name, e.g., to netopeer
1271
1272 -  username/password to your system credentials
1273
1274 -  ip to localhost
1275
1276 -  port to 830.
1277
1278 After netopeer is mounted successfully, its configuration can be read
1279 using RESTCONF by invoking:
1280
1281 GET
1282 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=netopeer/yang-ext:mount?content:config
1283
1284 Northbound (NETCONF servers)
1285 ----------------------------
1286
1287 OpenDaylight provides 2 types of NETCONF servers:
1288
1289 -  **NETCONF server for config-subsystem (listening by default on port
1290    1830)**
1291
1292    -  Serves as a default interface for config-subsystem and allows
1293       users to spawn/reconfigure/destroy modules (or applications) in
1294       OpenDaylight
1295
1296 -  **NETCONF server for MD-SAL (listening by default on port 2830)**
1297
1298    -  Serves as an alternative interface for MD-SAL (besides RESTCONF)
1299       and allows users to read/write data from MD-SAL’s datastore and to
1300       invoke its rpcs (NETCONF notifications are not available in the
1301       Boron release of OpenDaylight)
1302
1303 .. note::
1304
1305     The reason for having 2 NETCONF servers is that config-subsystem and
1306     MD-SAL are 2 different components of OpenDaylight and require
1307     different approaches for NETCONF message handling and data
1308     translation. These 2 components will probably merge in the future.
1309
1310 .. note::
1311
1312     Since Nitrogen release, there has been performance regression in NETCONF
1313     servers accepting SSH connections. While opening a connection takes
1314     less than 10 seconds on Carbon, on Nitrogen time can increase up to
1315     60 seconds. Please see https://jira.opendaylight.org/browse/ODLPARENT-112
1316
1317 NETCONF server for config-subsystem
1318 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1319
1320 This NETCONF server is the primary interface for config-subsystem. It
1321 allows the users to interact with config-subsystem in a standardized
1322 NETCONF manner.
1323
1324 In terms of RFCs, these are supported:
1325
1326 -  `RFC-6241 <https://www.rfc-editor.org/rfc/rfc6241>`__
1327
1328 -  `RFC-5277 <https://www.rfc-editor.org/rfc/rfc5277>`__
1329
1330 -  `RFC-6470 <https://www.rfc-editor.org/rfc/rfc6470>`__
1331
1332    -  (partially, only the schema-change notification is available in
1333       Boron release)
1334
1335 -  `RFC-6022 <https://www.rfc-editor.org/rfc/rfc6022>`__
1336
1337 For regular users it is recommended to use RESTCONF + the
1338 controller-config loopback mountpoint instead of using pure NETCONF. How
1339 to do that is specific for each component/module/application in
1340 OpenDaylight and can be found in their dedicated user guides.
1341
1342 NETCONF server for MD-SAL
1343 ~~~~~~~~~~~~~~~~~~~~~~~~~
1344
1345 This NETCONF server is just a generic interface to MD-SAL in
1346 OpenDaylight. It uses the standard MD-SAL APIs and serves as an
1347 alternative to RESTCONF. It is fully model-driven and supports any data
1348 and rpcs that are supported by MD-SAL.
1349
1350 In terms of RFCs, these are supported:
1351
1352 -  `RFC-6241 <https://www.rfc-editor.org/rfc/rfc6241>`__
1353
1354 -  `RFC-6022 <https://www.rfc-editor.org/rfc/rfc6022>`__
1355
1356 -  `RFC-7895 <https://www.rfc-editor.org/rfc/rfc7895>`__
1357
1358 Notifications over NETCONF are not supported in the Boron release.
1359
1360 .. tip::
1361
1362     Install NETCONF northbound for MD-SAL by installing feature:
1363     ``odl-netconf-mdsal`` in karaf. Default binding port is **2830**.
1364
1365 Configuration
1366 ^^^^^^^^^^^^^
1367
1368 The default configuration can be found in file: *08-netconf-mdsal.xml*.
1369 The file contains the configuration for all necessary dependencies and a
1370 single SSH endpoint starting on port 2830. There is also a (by default
1371 disabled) TCP endpoint. It is possible to start multiple endpoints at
1372 the same time either in the initial configuration file or while
1373 OpenDaylight is running.
1374
1375 The credentials for SSH endpoint can also be configured here, the
1376 defaults are admin/admin. Credentials in the SSH endpoint are not yet
1377 managed by the centralized AAA component and have to be configured
1378 separately.
1379
1380 Verifying MD-SAL’s NETCONF server
1381 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1382
1383 After the NETCONF server is available it can be examined by a command
1384 line ssh tool:
1385
1386 ::
1387
1388     ssh admin@localhost -p 2830 -s netconf
1389
1390 The server will respond by sending its HELLO message and can be used as
1391 a regular NETCONF server from then on.
1392
1393 Mounting the MD-SAL’s NETCONF server
1394 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1395
1396 To perform this operation, just spawn a new netconf-connector as
1397 described in `Spawning new NETCONF connectors`_. Just change the ip to
1398 "127.0.0.1" port to "2830" and its name to "controller-mdsal".
1399
1400 Now the MD-SAL’s datastore can be read over RESTCONF via NETCONF by
1401 invoking:
1402
1403 GET
1404 http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=controller-mdsal/yang-ext:mount?content:nonconfig
1405
1406 .. note::
1407
1408     This might not seem very useful, since MD-SAL can be accessed
1409     directly from RESTCONF or from Application code, but the same method
1410     can be used to mount and control other OpenDaylight instances by the
1411     "master OpenDaylight".
1412
1413 NETCONF stress/performance measuring tool
1414 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1415
1416 This is basically a NETCONF client that puts NETCONF servers under heavy
1417 load of NETCONF RPCs and measures the time until a configurable amount
1418 of them is processed.
1419
1420 RESTCONF stress-performance measuring tool
1421 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1422
1423 Very similar to NETCONF stress tool with the difference of using
1424 RESTCONF protocol instead of NETCONF.
1425
1426 YANGLIB remote repository
1427 -------------------------
1428
1429 There are scenarios in NETCONF deployment, that require for a centralized
1430 YANG models repository. YANGLIB plugin provides such remote repository.
1431
1432 To start this plugin, you have to install odl-yanglib feature. Then you
1433 have to configure YANGLIB either through RESTCONF or NETCONF. We will
1434 show how to configure YANGLIB through RESTCONF.
1435
1436 YANGLIB configuration
1437 ~~~~~~~~~~~~~~~~~~~~~
1438 YANGLIB configuration works through OSGi Configuration Admin interface, in the
1439 ``org.opendaylight.netconf.yanglib`` configuration PID. There are three tuneables you can
1440 set:
1441
1442 * ``cache-folder``, which defaults to ``cache/schema``
1443 * ``binding-address``, which defaults to ``localhost``
1444 * ``binding-port``, which defaults to ``8181``
1445
1446 In order to change these settings, you can either modify the corresponding configuration
1447 file, ``etc/org.opendaylight.netconf.yanglib.cfg``, for example:
1448
1449 ::
1450     cache-folder = cache/newSchema
1451     binding-address = localhost
1452     binding-port = 8181
1453
1454 Or use Karaf CLI:
1455
1456 ::
1457     opendaylight-user@root>config:edit org.opendaylight.netconf.yanglib
1458     opendaylight-user@root>config:property-set cache-folder cache/newSchema
1459     opendaylight-user@root>config:property-set binding-address localhost
1460     opendaylight-user@root>config:property-set binding-port 8181
1461     opendaylight-user@root>config:update
1462
1463 This YANGLIB takes all YANG sources from the configured sources folder and
1464 for each generates URL in form:
1465
1466 ::
1467
1468     http://localhost:8181/yanglib/schemas/{modelName}/{revision}
1469
1470 On this URL will be hosted YANG source for particular module.
1471
1472 YANGLIB instance also writes this URL along with source identifier to
1473 ietf-netconf-yang-library/modules-state/module list.
1474
1475 Netconf-connector with YANG library as fallback
1476 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1477
1478 There is an optional configuration in netconf-connector called
1479 yang-library. You can specify YANG library to be plugged as additional
1480 source provider into the mount's schema repository. Since YANGLIB
1481 plugin is advertising provided modules through yang-library model, we
1482 can use it in mount point's configuration as YANG library.  To do this,
1483 we need to modify the configuration of netconf-connector by adding this
1484 XML
1485
1486 ::
1487
1488     <yang-library xmlns="urn:opendaylight:netconf-node-topology">
1489       <yang-library-url xmlns="urn:opendaylight:netconf-node-topology">http://localhost:8181/rests/data/ietf-yang-library:modules-state</yang-library-url>
1490       <username xmlns="urn:opendaylight:netconf-node-topology">admin</username>
1491       <password xmlns="urn:opendaylight:netconf-node-topology">admin</password>
1492     </yang-library>
1493
1494 This will register YANGLIB provided sources as a fallback schemas for
1495 particular mount point.
1496
1497 Restconf northbound configuration
1498 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1499 Restconf-nb configuration works through OSGi Configuration Admin interface, in the
1500 ``org.opendaylight.restconf.nb.rfc8040`` configuration PID. There are six tuneables you can
1501 set:
1502
1503 * ``maximum-fragment-length``, which defaults to ``0``
1504 * ``heartbeat-interval``, which defaults to ``10000``
1505 * ``idle-timeout``, which defaults to ``30000``
1506 * ``ping-executor-name-prefix``, which defaults to ``ping-executor``
1507 * ``max-thread-count``, which defaults to ``1``
1508 * ``use-sse``, which defaults to ``true``
1509
1510 *maximum-fragment-length* â€” Maximum web-socket fragment length in number of Unicode code units (characters)
1511 (exceeded message length leads to fragmentation of messages)
1512
1513 *heartbeat-interval* â€” Interval in milliseconds between sending of ping control frames.
1514
1515 *idle-timeout* â€” Maximum idle time of web-socket session before the session is closed (milliseconds).
1516
1517 *ping-executor-name-prefix* â€” Name of thread group Ping Executor will be run with.
1518
1519 *max-thread-count* â€” Number of threads Ping Executor will be run with.
1520
1521 *use-sse* â€” In case of ``true`` access to notification streams will be via Server-Sent Events.
1522 Otherwise web-socket servlet will be initialized.
1523
1524 In order to change these settings, you can either modify the corresponding configuration
1525 file, ``org.opendaylight.restconf.nb.rfc8040.cfg``, for example:
1526
1527 ::
1528
1529     maximum-fragment-length=0
1530     heartbeat-interval=10000
1531     idle-timeout=30000
1532     ping-executor-name-prefix="ping-executor"
1533     max-thread-count=1
1534     use-sse=true
1535
1536 Or use Karaf CLI:
1537
1538 ::
1539
1540     opendaylight-user@root>config:edit org.opendaylight.restconf.nb.rfc8040
1541     opendaylight-user@root>config:property-set maximum-fragment_length 0
1542     opendaylight-user@root>config:property-set heartbeat-interval 10000
1543     opendaylight-user@root>config:property-set idle-timeout 30000
1544     opendaylight-user@root>config:property-set ping-executor-name-prefix "ping-executor"
1545     opendaylight-user@root>config:property-set max-thread-count 1
1546     opendaylight-user@root>config:property-set use-sse true
1547     opendaylight-user@root>config:update
1548
1549 NETCONF Call Home
1550 -----------------
1551
1552 Call Home Installation
1553 ~~~~~~~~~~~~~~~~~~~~~~
1554
1555 ODL Call-Home server is installed in Karaf by installing karaf feature
1556 ``odl-netconf-callhome-ssh``. RESTCONF feature is recommended for
1557 configuring Call Home & testing its functionality.
1558
1559 ::
1560
1561   feature:install odl-netconf-callhome-ssh
1562
1563
1564 .. note::
1565
1566     In order to test Call Home functionality we recommend Netopeer or
1567     Netopeer2. See `Netopeer Call Home <https://github.com/CESNET/netopeer/wiki/CallHome>`__
1568     or `Netopeer2 <https://github.com/CESNET/netopeer2>`__ to learn how to
1569     enable call-home on Netopeer.
1570
1571 Northbound Call-Home API
1572 ~~~~~~~~~~~~~~~~~~~~~~~~
1573
1574 The northbound Call Home API is used for administering the Call-Home Server. The
1575 following describes this configuration.
1576
1577 Global Configuration
1578 ^^^^^^^^^^^^^^^^^^^^
1579
1580 .. important::
1581   The global configuration is not a part of the `RFC 8071
1582   <https://www.rfc-editor.org/rfc/rfc8071>`__ and, therefore, subject to change.
1583
1584 Configuring global credentials
1585 ''''''''''''''''''''''''''''''
1586
1587 The ODL Call-Home server allows user to configure global credentials, which will be
1588 used for devices connecting over SSH transport protocol that do not have
1589 device-specific credentials configured.
1590
1591 This is done by creating
1592 ``/odl-netconf-callhome-server:netconf-callhome-server/global/credentials``
1593 with username and passwords specified.
1594
1595 *Configuring global username & passwords to try*
1596
1597 .. code-block::
1598
1599     PUT HTTP/1.1
1600     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/global/credentials
1601     Content-Type: application/json
1602     Accept: application/json
1603
1604 .. code-block:: json
1605
1606     {
1607       "credentials":
1608       {
1609         "username": "example",
1610         "passwords": [ "first-password-to-try", "second-password-to-try" ]
1611       }
1612     }
1613
1614 Configuring to accept any ssh server key using global credentials
1615 '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
1616
1617 By default Netconf Call-Home Server accepts only incoming connections
1618 from allowed devices
1619 ``/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices``,
1620 if user desires to allow all incoming connections, it is possible to set
1621 ``accept-all-ssh-keys`` to ``true`` in
1622 ``/odl-netconf-callhome-server:netconf-callhome-server/global``.
1623
1624 The name of these devices in ``netconf-topology`` will be in format
1625 ``ip-address:port``. For naming devices see Device-Specific
1626 Configuration.
1627
1628 *Allowing unknown devices to connect*
1629
1630 This is a debug feature and should not be used in production. Besides being an obvious
1631 security issue, this also causes the Call-Home Server to drastically increase its output
1632 to the log.
1633
1634 .. code-block::
1635
1636     PUT HTTP/1.1
1637     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/global/accept-all-ssh-keys
1638     Content-Type: application/json
1639     Accept: application/json
1640
1641 .. code-block:: json
1642
1643     {
1644         "accept-all-ssh-keys": "true"
1645     }
1646
1647 Device-Specific Configuration
1648 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1649
1650 Netconf Call Home server supports both of the secure transports used
1651 by the Network Configuration Protocol (NETCONF) - Secure Shell (SSH),
1652 and Transport Layer Security (TLS).
1653
1654 Configure device to connect over SSH protocol
1655 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1656
1657 Netconf Call Home Server uses device provided SSH server key (host key)
1658 to identify device. The pairing of name and server key is configured in
1659 ``/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices``.
1660 This list is colloquially called a allowlist.
1661
1662 If the Call-Home Server finds the SSH host key in the allowlist, it continues
1663 to negotiate a NETCONF connection over an SSH session. If the SSH host key is
1664 not found, the connection between the Call Home server and the device is dropped
1665 immediately. In either case, the device that connects to the Call home server
1666 leaves a record of its presence in the operational store.
1667
1668 Configuring Device with Device-specific Credentials
1669 '''''''''''''''''''''''''''''''''''''''''''''''''''
1670
1671 Adding specific device to the allowed list is done by creating
1672 ``/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device={device}``
1673 with device-id and connection parameters inside the ssh-client-params container.
1674
1675 *Configuring Device with Credentials*
1676
1677 .. code-block::
1678
1679     PUT HTTP/1.1
1680     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device=example
1681     Content-Type: application/json
1682     Accept: application/json
1683
1684 .. code-block:: json
1685
1686     {
1687       "device": {
1688         "unique-id": "example",
1689         "ssh-client-params": {
1690           "credentials": {
1691             "username": "example",
1692             "passwords": [ "password" ]
1693           },
1694           "host-key": "AAAAB3NzaC1yc2EAAAADAQABAAABAQDHoH1jMjltOJnCt999uaSfc48ySutaD3ISJ9fSECe1Spdq9o9mxj0kBTTTq+2V8hPspuW75DNgN+V/rgJeoUewWwCAasRx9X4eTcRrJrwOQKzb5Fk+UKgQmenZ5uhLAefi2qXX/agFCtZi99vw+jHXZStfHm9TZCAf2zi+HIBzoVksSNJD0VvPo66EAvLn5qKWQD4AdpQQbKqXRf5/W8diPySbYdvOP2/7HFhDukW8yV/7ZtcywFUIu3gdXsrzwMnTqnATSLPPuckoi0V2jd8dQvEcu1DY+rRqmqu0tEkFBurlRZDf1yhNzq5xWY3OXcjgDGN+RxwuWQK3cRimcosH"
1695         }
1696       }
1697     }
1698
1699 Configuring Device with Global Credentials
1700 '''''''''''''''''''''''''''''''''''''''''''''''''''
1701
1702 It is possible to omit ``username`` and ``password`` for ssh-client-params,
1703 in such case values from global credentials will be used.
1704
1705 *Example of configuring device*
1706
1707 .. code-block::
1708
1709     PUT HTTP/1.1
1710     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device=example
1711     Content-Type: application/json
1712     Accept: application/json
1713
1714 .. code-block:: json
1715
1716     {
1717       "device": {
1718         "unique-id": "example",
1719         "ssh-client-params": {
1720           "host-key": "AAAAB3NzaC1yc2EAAAADAQABAAABAQDHoH1jMjltOJnCt999uaSfc48ySutaD3ISJ9fSECe1Spdq9o9mxj0kBTTTq+2V8hPspuW75DNgN+V/rgJeoUewWwCAasRx9X4eTcRrJrwOQKzb5Fk+UKgQmenZ5uhLAefi2qXX/agFCtZi99vw+jHXZStfHm9TZCAf2zi+HIBzoVksSNJD0VvPo66EAvLn5qKWQD4AdpQQbKqXRf5/W8diPySbYdvOP2/7HFhDukW8yV/7ZtcywFUIu3gdXsrzwMnTqnATSLPPuckoi0V2jd8dQvEcu1DY+rRqmqu0tEkFBurlRZDf1yhNzq5xWY3OXcjgDGN+RxwuWQK3cRimcosH"
1721         }
1722       }
1723     }
1724
1725 Deprecated configuration models for devices accessed with SSH protocol
1726 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
1727
1728 With `RFC 8071 <https://www.rfc-editor.org/rfc/rfc8071>`__ alignment and adding
1729 support for TLS transport following configuration models have been marked
1730 deprecated.
1731
1732 Configuring Device with Global Credentials
1733 '''''''''''''''''''''''''''''''''''''''''''''''''''
1734
1735 *Example of configuring device*
1736
1737 .. code-block::
1738
1739     PUT HTTP/1.1
1740     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device=example
1741     Content-Type: application/json
1742     Accept: application/json
1743
1744 .. code-block:: json
1745
1746     {
1747       "device": {
1748         "unique-id": "example",
1749         "ssh-host-key": "AAAAB3NzaC1yc2EAAAADAQABAAABAQDHoH1jMjltOJnCt999uaSfc48ySutaD3ISJ9fSECe1Spdq9o9mxj0kBTTTq+2V8hPspuW75DNgN+V/rgJeoUewWwCAasRx9X4eTcRrJrwOQKzb5Fk+UKgQmenZ5uhLAefi2qXX/agFCtZi99vw+jHXZStfHm9TZCAf2zi+HIBzoVksSNJD0VvPo66EAvLn5qKWQD4AdpQQbKqXRf5/W8diPySbYdvOP2/7HFhDukW8yV/7ZtcywFUIu3gdXsrzwMnTqnATSLPPuckoi0V2jd8dQvEcu1DY+rRqmqu0tEkFBurlRZDf1yhNzq5xWY3OXcjgDGN+RxwuWQK3cRimcosH"
1750       }
1751     }
1752
1753 Configuring Device with Device-specific Credentials
1754 '''''''''''''''''''''''''''''''''''''''''''''''''''
1755
1756 Call Home Server also allows the configuration of credentials per device basis.
1757 This is done by introducing ``credentials`` container into the
1758 device-specific configuration. Format is same as in global credentials.
1759
1760 *Configuring Device with Credentials*
1761
1762 .. code-block::
1763
1764     PUT HTTP/1.1
1765     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device=example
1766     Content-Type: application/json
1767     Accept: application/json
1768
1769 .. code-block:: json
1770
1771     {
1772       "device": {
1773         "unique-id": "example",
1774         "credentials": {
1775           "username": "example",
1776           "passwords": [ "password" ]
1777         },
1778         "ssh-host-key": "AAAAB3NzaC1yc2EAAAADAQABAAABAQDHoH1jMjltOJnCt999uaSfc48ySutaD3ISJ9fSECe1Spdq9o9mxj0kBTTTq+2V8hPspuW75DNgN+V/rgJeoUewWwCAasRx9X4eTcRrJrwOQKzb5Fk+UKgQmenZ5uhLAefi2qXX/agFCtZi99vw+jHXZStfHm9TZCAf2zi+HIBzoVksSNJD0VvPo66EAvLn5qKWQD4AdpQQbKqXRf5/W8diPySbYdvOP2/7HFhDukW8yV/7ZtcywFUIu3gdXsrzwMnTqnATSLPPuckoi0V2jd8dQvEcu1DY+rRqmqu0tEkFBurlRZDf1yhNzq5xWY3OXcjgDGN+RxwuWQK3cRimcosH"
1779       }
1780     }
1781
1782 Configure device to connect over TLS protocol
1783 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1784
1785 Netconf Call Home Server allows devices to use TLS transport protocol to
1786 establish a connection towards the NETCONF device. This communication
1787 requires proper setup to make two-way TLS authentication possible for client
1788 and server.
1789
1790 The initial step is to configure certificates and keys for two-way TLS by
1791 storing them within the netconf-keystore.
1792
1793 *Adding a client private key credential to the netconf-keystore*
1794
1795 .. code-block::
1796
1797     POST HTTP/1.1
1798     /rests/operations/netconf-keystore:add-keystore-entry
1799     Content-Type: application/json
1800     Accept: application/json
1801
1802 .. code-block:: json
1803
1804   {
1805     "input": {
1806       "key-credential": [
1807         {
1808           "key-id": "example-client-key-id",
1809           "private-key": "PEM-format-private-key",
1810           "passphrase": "passphrase"
1811         }
1812       ]
1813     }
1814   }
1815
1816 *Associate a private key with a client and CA certificates chain*
1817
1818 .. code-block::
1819
1820     POST HTTP/1.1
1821     /rests/operations/netconf-keystore:add-private-key
1822     Content-Type: application/json
1823     Accept: application/json
1824
1825 .. code-block:: json
1826
1827   {
1828     "input": {
1829       "private-key": [
1830         {
1831           "name": "example-client-key-id",
1832           "data": "key-data",
1833           "certificate-chain": [
1834             "certificate-data"
1835           ]
1836         }
1837       ]
1838     }
1839   }
1840
1841 *Add a list of trusted CA and server certificates*
1842
1843 .. code-block::
1844
1845     POST HTTP/1.1
1846     /rests/operations/netconf-keystore:add-trusted-certificate
1847     Content-Type: application/json
1848     Accept: application/json
1849
1850 .. code-block:: json
1851
1852   {
1853     "input": {
1854       "trusted-certificate": [
1855         {
1856           "name": "example-ca-certificate",
1857           "certificate": "ca-certificate-data"
1858         },
1859         {
1860           "name": "example-server-certificate",
1861           "certificate": "server-certificate-data"
1862         }
1863       ]
1864     }
1865   }
1866
1867 In a second step, it is required to create an allowed device associated with
1868 a server certificate and client key. The server certificate will be used to
1869 identify and pin the NETCONF device during SSL handshake and should be unique
1870 among the allowed devices.
1871
1872 *Add device configuration for TLS protocol to allowed devices list*
1873
1874 .. code-block::
1875
1876     PUT HTTP/1.1
1877     /rests/data/odl-netconf-callhome-server:netconf-callhome-server/allowed-devices/device=example-device
1878     Content-Type: application/json
1879     Accept: application/json
1880
1881 .. code-block:: json
1882
1883   {
1884     "device": {
1885       "unique-id": "example-device",
1886       "tls-client-params": {
1887         "key-id": "example-client-key-id",
1888         "certificate-id": "example-server-certificate"
1889       }
1890     }
1891   }
1892
1893 Operational Status
1894 ^^^^^^^^^^^^^^^^^^
1895
1896 Once an entry is made on the config side of "allowed-devices", the Call-Home Server will
1897 populate a corresponding operational device that is the same as the config device but
1898 has an additional status. By default, this status is *DISCONNECTED*. Once a device calls
1899 home, this status will change to one of:
1900
1901 *CONNECTED* â€” The device is currently connected and the NETCONF mount is available for network
1902 management.
1903
1904 *FAILED_AUTH_FAILURE* â€” The last attempted connection was unsuccessful because the Call-Home
1905 Server was unable to provide the acceptable credentials of the device. The device is also
1906 disconnected and not available for network management.
1907
1908 *FAILED_NOT_ALLOWED* â€” The last attempted connection was unsuccessful because the device was
1909 not recognized as an acceptable device. The device is also disconnected and not available for
1910 network management.
1911
1912 *FAILED* â€” The last attempted connection was unsuccessful for a reason other than not
1913 allowed to connect or incorrect client credentials. The device is also disconnected and not
1914 available for network management.
1915
1916 *DISCONNECTED* â€” The device is currently disconnected.
1917
1918 Rogue Devices
1919 '''''''''''''
1920
1921 Devices that are not on the allowlist might try to connect to the Call-Home Server. In
1922 these cases, the server will keep a record by instantiating an operational device. There
1923 will be no corresponding config device for these rogues. They can be identified readily
1924 because their device id, rather than being user-supplied, will be of the form
1925 "address:port". Note that if a device calls back multiple times, there will only be
1926 a single operatinal entry (even if the port changes); these devices are recognized by
1927 their unique host key.
1928
1929 Southbound Call-Home API
1930 ~~~~~~~~~~~~~~~~~~~~~~~~
1931
1932 The Call-Home Server listens for incoming TCP connections and assumes that the other side of
1933 the connection is a device calling home via a NETCONF connection with SSH for
1934 management. The server uses port 4334 by default and this can be configured via a
1935 blueprint configuration file.
1936
1937 The device **must** initiate the connection and the server will not try to re-establish the
1938 connection in case of a drop. By requirement, the server cannot assume it has connectivity
1939 to the device due to NAT or firewalls among others.
1940
1941 Reading data with selected fields
1942 ---------------------------------
1943
1944 Overview
1945 ~~~~~~~~
1946
1947 If user would like to read only selected fields from a NETCONF device, it is possible to use
1948 the fields query parameter that is described by RFC-8040. RESTCONF parses content of query
1949 parameter into format that is accepted by NETCONF subtree filtering - filtering of data is done
1950 on NETCONF server, not on NETCONF client side. This approach optimizes network traffic load,
1951 because data in which user doesn't have interest, is not transferred over network.
1952
1953 Next advantages:
1954
1955 * using single RESTCONF request and single NETCONF RPC for reading multiple subtrees
1956 * possibility to read only selected fields under list node across multiple hierarchies
1957   (it cannot be done without proper selection API)
1958
1959 .. note::
1960
1961   More information about fields query parameter: `RFC 8071 <https://www.rfc-editor.org/rfc/rfc8040#section-4.8.3>`__
1962
1963 Preparation of data
1964 ~~~~~~~~~~~~~~~~~~~
1965
1966 For demonstration, we will define next YANG model:
1967
1968 ::
1969
1970     module test-module {
1971         yang-version 1.1;
1972         namespace "urn:opendaylight:test-module";
1973         prefix "tm";
1974         revision "2023-02-16";
1975
1976         container root {
1977             container simple-root {
1978                 leaf leaf-a {
1979                     type string;
1980                 }
1981                 leaf leaf-b {
1982                     type string;
1983                 }
1984                 leaf-list ll {
1985                     type string;
1986                 }
1987                 container nested {
1988                     leaf sample-x {
1989                         type boolean;
1990                     }
1991                     leaf sample-y {
1992                         type boolean;
1993                     }
1994                 }
1995             }
1996
1997             container list-root {
1998                 leaf branch-ab {
1999                     type int32;
2000                 }
2001                 list top-list {
2002                     key "key-1 key-2";
2003                     ordered-by user;
2004                     leaf key-1 {
2005                         type string;
2006                     }
2007                     leaf key-2 {
2008                         type string;
2009                     }
2010                     container next-data {
2011                         leaf switch-1 {
2012                             type empty;
2013                         }
2014                         leaf switch-2 {
2015                             type empty;
2016                         }
2017                     }
2018                     list nested-list {
2019                         key "identifier";
2020                         leaf identifier {
2021                             type string;
2022                         }
2023                         leaf foo {
2024                             type int32;
2025                         }
2026                     }
2027                 }
2028             }
2029         }
2030     }
2031
2032 Follow the :doc:`testtool` instructions to save this schema and run it with testtool.
2033
2034 Mounting NETCONF device that runs on NETCONF testtool:
2035
2036 .. code-block:: bash
2037
2038   curl --location --request PUT 'http://127.0.0.1:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=testtool' \
2039   --header 'Authorization: Basic YWRtaW46YWRtaW4=' \
2040   --header 'Content-Type: application/json' \
2041   --data-raw '{
2042       "node": [
2043           {
2044               "node-id": "testtool",
2045               "netconf-node-topology:host": "127.0.0.1",
2046               "netconf-node-topology:port": 17830,
2047               "netconf-node-topology:keepalive-delay": 100,
2048               "netconf-node-topology:tcp-only": false,
2049               "netconf-node-topology:login-password-unencrypted": {
2050                   "netconf-node-topology:username": "admin",
2051                   "netconf-node-topology:password": "admin"
2052               },
2053           }
2054       ]
2055   }'
2056
2057 Setting initial configuration on NETCONF device:
2058
2059 .. code-block:: bash
2060
2061   curl --location --request PUT 'http://127.0.0.1:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=testtool/yang-ext:mount/test-module:root' \
2062   --header 'Authorization: Basic YWRtaW46YWRtaW4=' \
2063   --header 'Content-Type: application/json' \
2064   --data-raw '{
2065       "root": {
2066           "simple-root": {
2067               "leaf-a": "asddhg",
2068               "leaf-b": "ffffff",
2069               "ll": [
2070                   "str1",
2071                   "str2",
2072                   "str3"
2073               ],
2074               "nested": {
2075                   "sample-x": true,
2076                   "sample-y": false
2077               }
2078           },
2079           "list-root": {
2080               "branch-ab": 5,
2081               "top-list": [
2082                   {
2083                       "key-1": "ka",
2084                       "key-2": "kb",
2085                       "next-data": {
2086                           "switch-1": [
2087                               null
2088                           ],
2089                           "switch-2": [
2090                               null
2091                           ]
2092                       },
2093                       "nested-list": [
2094                           {
2095                               "identifier": "f1",
2096                               "foo": 1
2097                           },
2098                           {
2099                               "identifier": "f2",
2100                               "foo": 10
2101                           },
2102                           {
2103                               "identifier": "f3",
2104                               "foo": 20
2105                           }
2106                       ]
2107                   },
2108                   {
2109                       "key-1": "kb",
2110                       "key-2": "ka",
2111                       "next-data": {
2112                           "switch-1": [
2113                               null
2114                           ]
2115                       },
2116                       "nested-list": [
2117                           {
2118                               "identifier": "e1",
2119                               "foo": 1
2120                           },
2121                           {
2122                               "identifier": "e2",
2123                               "foo": 2
2124                           },
2125                           {
2126                               "identifier": "e3",
2127                               "foo": 3
2128                           }
2129                       ]
2130                   },
2131                   {
2132                       "key-1": "kc",
2133                       "key-2": "ke",
2134                       "next-data": {
2135                           "switch-2": [
2136                               null
2137                           ]
2138                       },
2139                       "nested-list": [
2140                           {
2141                               "identifier": "q1",
2142                               "foo": 13
2143                           },
2144                           {
2145                               "identifier": "q2",
2146                               "foo": 14
2147                           },
2148                           {
2149                               "identifier": "q3",
2150                               "foo": 15
2151                           }
2152                       ]
2153                   }
2154               ]
2155           }
2156       }
2157   }'
2158
2159 Examples
2160 --------
2161
2162 1. Reading whole leaf-list 'll' and leaf 'nested/sample-x' under 'simple-root' container.
2163
2164 RESTCONF request:
2165
2166 .. code-block:: bash
2167
2168     curl --location --request GET 'http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=testtool/yang-ext:mount/test-module:root/simple-root?content=config&fields=ll;nested/sample-x' \
2169     --header 'Authorization: Basic YWRtaW46YWRtaW4=' \
2170     --header 'Cookie: JSESSIONID=node01h4w82eorc1k61866b71qjgj503.node0'
2171
2172 Generated NETCONF RPC request:
2173
2174 .. code-block:: xml
2175
2176     <rpc message-id="m-18" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
2177         <get-config>
2178             <source>
2179                 <running/>
2180             </source>
2181             <filter xmlns:ns0="urn:ietf:params:xml:ns:netconf:base:1.0" ns0:type="subtree">
2182                 <root xmlns="urn:ietf:params:xml:ns:yang:test-model">
2183                     <simple-root>
2184                         <ll/>
2185                         <nested>
2186                             <sample-x/>
2187                         </nested>
2188                     </simple-root>
2189                 </root>
2190             </filter>
2191         </get-config>
2192     </rpc>
2193
2194 .. note::
2195
2196     Using fields query parameter it is also possible to read whole leaf-list or list without
2197     necessity to specify value / key predicate (without reading parent entity). Such scenario
2198     is not permitted in RFC-8040 paths alone - fields query parameter can be used as
2199     workaround for this case.
2200
2201 RESTCONF response:
2202
2203 .. code-block:: json
2204
2205     {
2206         "test-module:simple-root": {
2207             "ll": [
2208                 "str3",
2209                 "str1",
2210                 "str2"
2211             ],
2212             "nested": {
2213                 "sample-x": true
2214             }
2215         }
2216     }
2217
2218 2. Reading all identifiers of 'nested-list' under all elements of 'top-list'.
2219
2220 RESTCONF request:
2221
2222 .. code-block:: bash
2223
2224     curl --location --request GET 'http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=testtool/yang-ext:mount/test-module:root/list-root?content=config&fields=top-list(nested-list/identifier)' \
2225     --header 'Authorization: Basic YWRtaW46YWRtaW4=' \
2226     --header 'Cookie: JSESSIONID=node01h4w82eorc1k61866b71qjgj503.node0'
2227
2228 Generated NETCONF RPC request:
2229
2230 .. code-block:: xml
2231
2232     <rpc message-id="m-27" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
2233         <get-config>
2234             <source>
2235                 <running/>
2236             </source>
2237             <filter xmlns:ns0="urn:ietf:params:xml:ns:netconf:base:1.0" ns0:type="subtree">
2238                 <root xmlns="urn:ietf:params:xml:ns:yang:test-model">
2239                     <list-root>
2240                         <top-list>
2241                             <nested-list>
2242                                 <identifier/>
2243                             </nested-list>
2244                             <key-1/>
2245                             <key-2/>
2246                         </top-list>
2247                     </list-root>
2248                 </root>
2249             </filter>
2250         </get-config>
2251     </rpc>
2252
2253 .. note::
2254
2255     NETCONF client automatically fetches values of list keys since they are required for correct
2256     deserialization of NETCONF response and at the end serialization of response to RESTCONF
2257     response (JSON/XML).
2258
2259 RESTCONF response:
2260
2261 .. code-block:: json
2262
2263     {
2264         "test-module:list-root": {
2265             "top-list": [
2266                 {
2267                     "key-1": "ka",
2268                     "key-2": "kb",
2269                     "nested-list": [
2270                         {
2271                             "identifier": "f3"
2272                         },
2273                         {
2274                             "identifier": "f2"
2275                         },
2276                         {
2277                             "identifier": "f1"
2278                         }
2279                     ]
2280                 },
2281                 {
2282                     "key-1": "kb",
2283                     "key-2": "ka",
2284                     "nested-list": [
2285                         {
2286                             "identifier": "e3"
2287                         },
2288                         {
2289                             "identifier": "e2"
2290                         },
2291                         {
2292                             "identifier": "e1"
2293                         }
2294                     ]
2295                 },
2296                 {
2297                     "key-1": "kc",
2298                     "key-2": "ke",
2299                     "nested-list": [
2300                         {
2301                             "identifier": "q3"
2302                         },
2303                         {
2304                             "identifier": "q2"
2305                         },
2306                         {
2307                             "identifier": "q1"
2308                         }
2309                     ]
2310                 }
2311             ]
2312         }
2313     }
2314
2315 3. Reading value of leaf 'branch-ab' and all values of leaves 'switch-1' that are placed
2316    under 'top-list' list elements.
2317
2318 RESTCONF request:
2319
2320 .. code-block:: bash
2321
2322     curl --location --request GET 'http://localhost:8181/rests/data/network-topology:network-topology/topology=topology-netconf/node=testtool/yang-ext:mount/test-module:root/list-root?content=config&fields=branch-ab;top-list/next-data/switch-1' \
2323     --header 'Authorization: Basic YWRtaW46YWRtaW4=' \
2324     --header 'Cookie: JSESSIONID=node01jx6o5thwae9t1ft7c2zau5zbz4.node0'
2325
2326 Generated NETCONF RPC request:
2327
2328 .. code-block:: xml
2329
2330     <rpc message-id="m-42" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
2331         <get-config>
2332             <source>
2333                 <running/>
2334             </source>
2335             <filter xmlns:ns0="urn:ietf:params:xml:ns:netconf:base:1.0" ns0:type="subtree">
2336                 <root xmlns="urn:ietf:params:xml:ns:yang:test-model">
2337                     <list-root>
2338                         <branch-ab/>
2339                         <top-list>
2340                             <next-data>
2341                                 <switch-1/>
2342                             </next-data>
2343                             <key-1/>
2344                             <key-2/>
2345                         </top-list>
2346                     </list-root>
2347                 </root>
2348             </filter>
2349         </get-config>
2350     </rpc>
2351
2352 RESTCONF response:
2353
2354 .. code-block:: json
2355
2356     {
2357         "test-module:list-root": {
2358             "branch-ab": 5,
2359             "top-list": [
2360                 {
2361                     "key-1": "ka",
2362                     "key-2": "kb",
2363                     "next-data": {
2364                         "switch-1": [
2365                             null
2366                         ]
2367                     }
2368                 },
2369                 {
2370                     "key-1": "kb",
2371                     "key-2": "ka",
2372                     "next-data": {
2373                         "switch-1": [
2374                             null
2375                         ]
2376                     }
2377                 },
2378                 {
2379                     "key-1": "kc",
2380                     "key-2": "ke"
2381                 }
2382             ]
2383         }
2384     }
2385
2386 RESTCONF OpenAPI
2387 ----------------
2388
2389 Overview
2390 ~~~~~~~~
2391
2392 The OpenAPI provides full API for configurational data which can be edited (by POST, PUT, PATCH and DELETE).
2393 For operational data we only provide GET API. For the majority of requests you can see only config data in examples.
2394 That’s because we can show only one example per request. The exception when you can see operational data in an
2395 example is when data are representing an operational (config false) container with no config data in it.
2396
2397
2398 Using the OpenAPI Explorer through HTTP
2399 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2400
2401 1. Install OpenApi into Karaf by installing karaf feature:
2402
2403 ::
2404
2405     $ feature:install odl-restconf-openapi
2406
2407 2.  Navigate to OpenAPI in your web browser which is available at URLs:
2408
2409 -  http://localhost:8181/openapi/explorer/index.html for general overview
2410
2411 -  http://localhost:8181/openapi/api/v3/single for JSON data
2412
2413 .. note::
2414
2415     In the URL links for OpenAPI, change *localhost* to the IP/Host name of your actual server.
2416
2417 3.  Enter the username and password.
2418     By default the credentials are  *admin/admin*.
2419
2420 4.  Select any model to try out.
2421
2422 5.  Select any available request to try out.
2423
2424 6.  Click on the **Try it out** button.
2425
2426 7.  Provide any required parameters or edit request body.
2427
2428 8.  Click the **Execute** button.
2429
2430 9.  You can see responses to the given request.
2431
2432
2433 OpenAPI Explorer can also be used for connected device. How to connect a device can be found :ref:`here <netconf-connector>`.
2434
2435 OpenAPI URLs in that case would look like this:
2436
2437 -  `http://localhost:8181/openapi/explorer/index.html?urls.primaryName=17830-sim-device resources - RestConf RFC 8040 <http://localhost:8181/openapi/explorer/index.html?urls.primaryName=17830-sim-device%20resources%20-%20RestConf%20RFC%208040>`_ for device overview
2438
2439 -  http://localhost:8181/openapi/api/v3/mounts/1 for JSON data
2440
2441 -  `http://localhost:8181/openapi/api/v3/mounts/1/toaster(2009-11-20) <http://localhost:8181/openapi/api/v3/mounts/1/toaster(2009-11-20)>`__ JSON data for given model
2442
2443 .. note::
2444
2445     The URL links for OpenAPI are made for device with name *17830-sim-device* and model toaster
2446     with *2009-11-20* revision and need to be changed accordingly to connected device.