[NETCONF-595] Unable to configure keys and certificates for southbound Netconf over TLS, using odl-netconf-clustered-topology, Fluorine SR1 Created: 14/Jan/19  Updated: 17/Jan/19  Resolved: 17/Jan/19

Status: Resolved
Project: netconf
Component/s: netconf
Affects Version/s: Fluorine, Neon, Fluorine SR1
Fix Version/s: Neon, Fluorine SR2

Type: Bug Priority: Medium
Reporter: Martin Sandberg Assignee: Jakub Morvay
Resolution: Done Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified


 Description   

To configure keys and certificates to use in southbound Netconf over TLS, the RPCs
netconf-keystore:add-keystore-entry
netconf-keystore:add-private-key
netconf-keystore:add-trusted-certificate

are called over the restconf interface using URL like:

POST /restconf/operations/netconf-keystore:add-keystore-entry HTTP/1.1
Host: localhost:8181
Content-Type: application/json
cache-control: no-cache
Postman-Token: 77554403-01e5-4f99-8ab3-63cdf5c50261
{
 "input": {
  "key-credential": {
   "key-id": "ODL-private-key",
   "private-key" : "<key-data cut out>"
,
   "passphrase" : ""
  }
 }
}-----WebKitFormBoundary7MA4YWxkTrZu0gW-

These work fine when using the non-clustered odl-netconf-topology feature, but when using the odl-netconf-clustered-topology feature, an error message is return that says "No implementation of RPC AbsoluteSchemaPath{path=[(urn:opendaylight:netconf:keystore?revision=2017-10-17)add-keystore-entry]} available" (and likewise for add-private-key and add-trusted-certificate).

A work-around that seems to get past this problem is to install odl-netconf-topology, install the keys and certificates, uninstall odl-netconf-topology and then install odl-netconf-clustered-topology. But it is obviously not a work-around that can be used in practice.



 Comments   
Comment by Jakub Morvay [ 16/Jan/19 ]

Martin_S Can you please try https://git.opendaylight.org/gerrit/#/c/79580/?

Please let me know if this works for you.

Generated at Wed Feb 07 20:15:25 UTC 2024 using Jira 8.20.10#820010-sha1:ace47f9899e9ee25d7157d59aa17ab06aee30d3d.