.. code-block:: bash
- java -cp ./data/cache/org.eclipse.osgi/bundles/217/1/.cp/h2-1.4.185.jar
+ java -cp ./system/com/h2database/h2/2.1.214/h2-2.1.214.jar
org.h2.tools.Server -trace -pg -web -webAllowOthers -baseDir `pwd`
::
HTTP Operation:
- put URL: /restconf/config/aaa:http-authorization/policies
+ put URL: /rests/data/aaa:http-authorization/policies
headers: Content-Type: application/json Accept: application/json
body:
- { "aaa:policies":
- { "aaa:policies":
- [ { "aaa:resource": "/restconf/modules/**",
- "aaa:permissions": [ { "aaa:role": "admin",
- "aaa:actions": [ "get",
- "post",
- "put",
- "patch",
- "delete"
- ]
- }
- ]
- }
- ]
- }
+ {
+ "aaa:policies": {
+ "aaa:policies": [
+ {
+ "aaa:resource": "/restconf/modules/**",
+ "aaa:index": 1,
+ "aaa:permissions": [
+ {
+ "aaa:role": "admin",
+ "aaa:actions": [
+ "get",
+ "post",
+ "put",
+ "patch",
+ "delete"
+ ]
+ }
+ ]
+ }
+ ]
+ }
}
The above example locks down access to the modules endpoint (and any URLS
1. It is assumed that there exists an already created OpenDaylight distribution
project following `this guide
- <https://wiki.opendaylight.org/view/OpenDaylight_Controller:MD-SAL:Startup_Project_Archetype#Part_1_-_Build_with_a_simple_.27Example.27_module>`_.
+ <https://docs.opendaylight.org/en/stable-chlorine/developer-guides/developing-apps-on-the-opendaylight-controller.html#building-an-example-module>`_.
2. In the implementation bundle the following artifact must be added to its
*pom.xml* file as dependency.
1. It is assumed that there exists an already created OpenDaylight distribution
project following `this guide
- <https://wiki.opendaylight.org/view/OpenDaylight_Controller:MD-SAL:Startup_Project_Archetype#Part_1_-_Build_with_a_simple_.27Example.27_module>`_.
+ <https://docs.opendaylight.org/en/stable-chlorine/developer-guides/developing-apps-on-the-opendaylight-controller.html#building-an-example-module>`_.
2. In the implementation bundle the following artifact must be added to its
*pom.xml* file as dependency.
::
HTTP Operation:
- put URL: /restconf/config/aaa:http-authorization/policies
-
- or
-
- put RFC8040 URL: /rests/data/aaa:http-authorization/policies
+ put URL: /rests/data/aaa:http-authorization/policies
headers: Content-Type: application/json Accept: application/json
body:
- { "aaa:policies":
- { "aaa:policies":
- [ { "aaa:resource": "/restconf/modules/**",
- "aaa:permissions": [ { "aaa:role": "admin",
- "aaa:actions": [ "get",
- "post",
- "put",
- "patch",
- "delete"
- ]
- }
- ]
- }
- ]
- }
+ {
+ "aaa:policies": {
+ "aaa:policies": [
+ {
+ "aaa:resource": "/restconf/modules/**",
+ "aaa:index": 1,
+ "aaa:permissions": [
+ {
+ "aaa:role": "admin",
+ "aaa:actions": [
+ "get",
+ "post",
+ "put",
+ "patch",
+ "delete"
+ ]
+ }
+ ]
+ }
+ ]
+ }
}
The above example locks down access to the modules endpoint (and any URLS