ct_netconfc(3)



ct_netconfc(3erl)          Erlang Module Definition          ct_netconfc(3erl)

NAME
       ct_netconfc - NETCONF client module.

DESCRIPTION
       NETCONF  client  module  compliant with RFC 6241, NETCONF Configuration
       Protocol, and RFC 6242, Using the NETCONF Configuration  Protocol  over
       Secure  SHell (SSH), and with support for RFC 5277, NETCONF Event Noti-
       fications.

       Connecting to a NETCONF server

       Call connect/1,2 to establish a connection to a server, then  pass  the
       returned  handle to session/1-3 to establish a NETCONF session on a new
       SSH channel. Each call to session/1-3 establishes a new session on  the
       same connection, and results in a hello message to the server.

       Alternately,  open/1,2  can  be used to establish a single session on a
       dedicated connection.  (Or,  equivalently,  only_open/1,2  followed  by
       hello/1-3.)

       Connect/session  options  can be specified in a configuration file with
       entries like the following.

        {server_id(), [option()]}.

       The server_id() or an associated ct:target_name() can then be passed to
       the aforementioned functions to use the referenced configuration.

       Signaling

       Protocol operations in the NETCONF protocol are realized as remote pro-
       cedure calls (RPCs) from client to server  and  a  corresponding  reply
       from  server  to  client. RPCs are sent using like-named functions (eg.
       edit_config/3-5 to send an edit-config RPC), with the server  reply  as
       return  value. There are functions for each RPC defined in RFC 6241 and
       the create-subscription RPC from RFC 5277, all of which are wrappers on
       send_rpc/2,3,  that can be used to send an arbitrary RPC not defined in
       RFC 6241 or RFC 5277.

       All of the signaling functions have one variant with a Timeout argument
       and  one  without,  corresponding to an infinite timeout. The latter is
       inappropriate in most cases since a non-response by  the  server  or  a
       missing message-id causes the call to hang indefinitely.

       Logging

       The  NETCONF server uses error_logger for logging of NETCONF traffic. A
       special purpose error handler is implemented in ct_conn_log_h.  To  use
       this  error  handler,  add the cth_conn_log hook in the test suite, for
       example:

        suite() ->
           [{ct_hooks, [{cth_conn_log, [{ct:conn_log_mod(), ct:conn_log_options()}]}]}].

       conn_log_mod() is the name of the Common Test module  implementing  the
       connection protocol, for example, ct_netconfc.

       Hook option log_type specifies the type of logging:

         raw:
           The  sent  and  received  NETCONF data is logged to a separate text
           file "as is" without any formatting. A link to the file is added to
           the test case HTML log.

         pretty:
           The  sent  and  received  NETCONF data is logged to a separate text
           file with XML data nicely indented. A link to the file is added  to
           the test case HTML log.

         html (default):
           The sent and received NETCONF traffic is pretty printed directly in
           the test case HTML log.

         silent:
           NETCONF traffic is not logged.

       By default, all NETCONF traffic is logged in one single log file.  How-
       ever,  different  connections  can  be  logged in separate files. To do
       this, use hook option hosts and list the names of  the  servers/connec-
       tions  to  be used in the suite. The connections must be named for this
       to work, that is, they must be opened with open/2.

       Option hosts has no effect if log_type is set to html or silent.

       The hook options can also be specified in  a  configuration  file  with
       configuration variable ct_conn_log:

        {ct_conn_log,[{ct:conn_log_mod(), ct:conn_log_options()}]}.

       For example:

        {ct_conn_log,[{ct_netconfc,[{log_type,pretty},
                                    {hosts,[ct:key_or_name()]}]}]}

   Note:
       Hook options specified in a configuration file overwrite the hard-coded
       hook options in the test suite.

       Logging Example 1:

       The following ct_hooks statement  causes  pretty  printing  of  NETCONF
       traffic  to  separate  logs  for  the  connections named nc_server1 and
       nc_server2. Any other connections are logged to default NETCONF log.

        suite() ->
           [{ct_hooks, [{cth_conn_log, [{ct_netconfc,[{log_type,pretty}},
                                                      {hosts,[nc_server1,nc_server2]}]}
                                       ]}]}].

       Connections must be opened as follows:

        open(nc_server1,[...]),
        open(nc_server2,[...]).

       Logging Example 2:

       The following configuration file causes  raw  logging  of  all  NETCONF
       traffic in to one single text file:

        {ct_conn_log,[{ct_netconfc,[{log_type,raw}]}]}.

       The ct_hooks statement must look as follows:

        suite() ->
           [{ct_hooks, [{cth_conn_log, []}]}].

       The  same ct_hooks statement without the configuration file would cause
       HTML logging of all NETCONF connections in to the test case HTML log.

DATA TYPES
       client() = handle() | server_id() | ct:target_name()

              Handle to a NETCONF session, as required by signaling functions.

       handle()

              Handle to a connection to a NETCONF server as returned  by  con-
              nect/1,2,  or to a session as returned by session/1-3, open/1,2,
              or only_open/1,2.

       xs_datetime() = string()

              Date and time of a startTime/stopTime element  in  an  RFC  5277
              create-subscription  request.  Of  XML  primitive type dateTime,
              which has the (informal) form

               [-]YYYY-MM-DDThh:mm:ss[.s][Z|(+|-)hh:mm]

              where T and Z are literal and .s is one or more fractional  sec-
              onds.

       event_time() = {eventTime, xml_attributes(), [xs_datetime()]}

       notification_content() = [event_time() | simple_xml()]

       notification() =
           {notification, xml_attributes(), notification_content()}

              Event  notification  messages  sent as a result of calls to cre-
              ate_subscription/2,3.

       option() =
           {host | ssh, host()} |
           {port, inet:port_number()} |
           {timeout, timeout()} |
           {capability, string() | [string()]} |
           ssh:client_option()

              Options host and port specify the server endpoint  to  which  to
              connect,  and are passed directly to ssh:connect/4, as are arbi-
              trary  ssh  options.  Common  options  are  user,  password  and
              user_dir.

              Option timeout specifies the number of milliseconds to allow for
              connection establishment and, if the function  in  question  re-
              sults  in  an  outgoing  hello  message, reception of the server
              hello. The timeout applies  to  connection  and  hello  indepen-
              dently;  one  timeout  for connection establishment, another for
              hello reception.

              Option capability specifies the content of a corresponding  ele-
              ment  in  an  outgoing hello message, each option specifying the
              content of a single element. If no base  NETCONF  capability  is
              configured     then     the    RFC    4741    1.0    capability,
              "urn:ietf:params:netconf:base:1.0", is added, otherwise not.  In
              particular,  the RFC 6241 1.1 capability must be explicitly con-
              figured. NETCONF capabilities can be specified using the  short-
              hand  notation defined in RFC 6241, any capability string start-
              ing with a colon being prefixed by either  "urn:ietf:params:net-
              conf" or "urn:ietf:params:netconf:capability", as appropriate.

              Capability options are ignored by connect/1-3 and only_open/1-2,
              which don't result in an outgoing hello message.

       server_id() = atom()

              Identity of connection or session configuration in a  configura-
              tion file.

       stream_data() =
           {description, string()} |
           {replaySupport, string()} |
           {replayLogCreationTime, string()} |
           {replayLogAgedTime, string()}

       stream_name() = string()

       streams() = [{stream_name(), [stream_data()]}]

              Stream information as returned by get_event_streams/1-3. See RFC
              5277, "XML Schema for Event Notifications", for  detail  on  the
              format of the string values.

       xml_attribute_tag() = atom()

       xml_attribute_value() = string()

       xml_attributes() =
           [{xml_attribute_tag(), xml_attribute_value()}]

       xml_content() = [simple_xml() | iolist()]

       xml_tag() = atom()

       simple_xml() =
           {xml_tag(), xml_attributes(), xml_content()} |
           {xml_tag(), xml_content()} |
           xml_tag()

              Representation of XML, as described in application xmerl.

       xpath() = {xpath, string()}

       error_reason() = term()

       host() = inet:hostname() | inet:ip_address()

       netconf_db() = running | startup | candidate

EXPORTS
       action(Client, Action) -> Result

       action(Client, Action, Timeout) -> Result

              Types:

                 Client = client()
                 Action = simple_xml()
                 Timeout = timeout()
                 Result = ok | {ok, [simple_xml()]} | {error, error_reason()}

              Executes  an  action. If the return type is void, ok is returned
              instead of {ok,[simple_xml()]}.

       close_session(Client) -> Result

       close_session(Client, Timeout) -> Result

              Types:

                 Client = client()
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Requests graceful termination of the session associated with the
              client.

              When  a  NETCONF  server  receives  a  close-session request, it
              gracefully closes the session. The server releases any locks and
              resources  associated with the session and gracefully closes any
              associated connections. Any NETCONF requests  received  after  a
              close-session request are ignored.

       connect(Options) -> Result

              Types:

                 Options = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Opens an SSH connection to a NETCONF server.

              If the server options are specified in a configuration file, use
              connect/2 instead.

              The opaque handle() reference returned from this function is re-
              quired  as connection identifier when opening sessions over this
              connection, see session/1-3.

       connect(KeyOrName, ExtraOptions) -> Result

              Types:

                 KeyOrName = ct:key_or_name()
                 ExtraOptions = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Open an SSH connection to a named NETCONF server.

              If KeyOrName is a configured server_id() or a target_name()  as-
              sociated  with  such an Id, then the options for this server are
              fetched from the configuration file.

              The options list is added to those of the configuration file. If
              an  option  is  specified  in both lists, the configuration file
              takes precedence.

              If the server is not specified in a configuration file, use con-
              nect/1 instead.

              The opaque handle() reference returned from this function can be
              used as connection identifier when opening  sessions  over  this
              connection,  see  session/1-3.  However,  if KeyOrName is a tar-
              get_name(), that is, if the server is named through  a  call  to
              ct:require/2 or a require statement in the test suite, then this
              name can be used instead of handle().

       copy_config(Client, Target, Source) -> Result

       copy_config(Client, Target, Source, Timeout) -> Result

              Types:

                 Client = client()
                 Target = Source = netconf_db()
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Copies configuration data.

              Which source and target options that can be  issued  depends  on
              the  capabilities  supported  by the server. That is, :candidate
              and/or :startup are required.

       create_subscription(Client, Values) -> Result

       create_subscription(Client, Values, Timeout) -> Result

              Types:

                 Client = client()
                 Values =
                     #{stream => Stream,
                       filter => Filter,
                       start => StartTime,
                       stop => StopTime}
                 Stream = stream_name()
                 Filter = simple_xml() | [simple_xml()]
                 StartTime = StopTime = xs_datetime()
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Creates a subscription for event notifications by sending an RFC
              5277  create-subscription RPC to the server. The calling process
              receives events as messages of type notification().

              From RFC 5722, 2.1 Subscribing to Receive Event Notifications:

                Stream:
                  Indicates which stream of  event  is  of  interest.  If  not
                  present, events in the default NETCONF stream are sent.

                Filter:
                  Indicates  which  subset of all possible events is of inter-
                  est. The parameter format is the same as that of the  filter
                  parameter   in  the  NETCONF  protocol  operations.  If  not
                  present, all events not precluded by  other  parameters  are
                  sent.

                StartTime:
                  Used to trigger the replay feature and indicate that the re-
                  play is to start at the time specified. If StartTime is  not
                  present,  this is not a replay subscription. It is not valid
                  to specify start times that are later than the current time.
                  If  StartTime is specified earlier than the log can support,
                  the replay begins with the earliest available  notification.
                  This  parameter  is  of  type  dateTime and compliant to RFC
                  3339. Implementations must support time zones.

                StopTime:
                  Used with the optional replay feature to indicate the newest
                  notifications  of  interest. If StopTime is not present, the
                  notifications continues until  the  subscription  is  termi-
                  nated. Must be used with and be later than StartTime. Values
                  of StopTime in the future are valid. This  parameter  is  of
                  type  dateTime  and  compliant  to RFC 3339. Implementations
                  must support time zones.

              See RFC 5277 for more details.  The  requirement  that  StopTime
              must  only  be  used with StartTime is not enforced, to allow an
              invalid request to be sent to the server.

              Prior to OTP 22.1, this function was  documented  as  having  15
              variants  in  6  arities. These are still exported for backwards
              compatibility, but no longer documented. The map-based  variants
              documented above provide the same functionality with simpler ar-
              guments.

       delete_config(Client, Target) -> Result

       delete_config(Client, Target, Timeout) -> Result

              Types:

                 Client = client()
                 Target = startup | candidate
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Deletes configuration data.

              The running configuration cannot be deleted  and  :candidate  or
              :startup must be advertised by the server.

       disconnect(Conn) -> ok | {error, error_reason()}

              Types:

                 Conn = handle()

              Closes the given SSH connection.

              If there are open NETCONF sessions on the connection, these will
              be brutally aborted. To avoid  this,  close  each  session  with
              close_session/1,2

       edit_config(Client, Target, Config) -> Result

       edit_config(Client, Target, Config, OptParams) -> Result

       edit_config(Client, Target, Config, Timeout) -> Result

       edit_config(Client, Target, Config, OptParams, Timeout) -> Result

              Types:

                 Client = client()
                 Target = netconf_db()
                 Config = simple_xml() | [simple_xml()]
                 OptParams = [simple_xml()]
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Edits configuration data.

              By  default  only  the  running  target is available, unless the
              server includes :candidate or :startup in its list of  capabili-
              ties.

              OptParams  can  be  used for specifying optional parameters (de-
              fault-operation, test-option, or error-option) to  be  added  to
              the  edit-config  request.  The  value must be a list containing
              valid simple XML, for example:

               [{'default-operation', ["none"]},
                {'error-option', ["rollback-on-error"]}]

              If OptParams is not given, the default value [] is used.

       get(Client, Filter) -> Result

       get(Client, Filter, Timeout) -> Result

              Types:

                 Client = client()
                 Filter = simple_xml() | xpath()
                 Timeout = timeout()
                 Result = {ok, [simple_xml()]} | {error, error_reason()}

              Gets data.

              This operation returns both configuration and  state  data  from
              the server.

              Filter  type  xpath  can  be  used  only  if the server supports
              :xpath.

       get_capabilities(Client) -> Result

       get_capabilities(Client, Timeout) -> Result

              Types:

                 Client = client()
                 Timeout = timeout()
                 Result = [string()] | {error, error_reason()}

              Returns the server capabilities as received in  its  hello  mes-
              sage.

       get_config(Client, Source, Filter) -> Result

       get_config(Client, Source, Filter, Timeout) -> Result

              Types:

                 Client = client()
                 Source = netconf_db()
                 Filter = simple_xml() | xpath()
                 Timeout = timeout()
                 Result = {ok, [simple_xml()]} | {error, error_reason()}

              Gets configuration data.

              To  be  able  to  access another source than running, the server
              must advertise :candidate and/or :startup.

              Filter type xpath can  be  used  only  if  the  server  supports
              :xpath.

       get_event_streams(Client) -> Result

       get_event_streams(Client, Timeout) -> Result

       get_event_streams(Client, Streams) -> Result

       get_event_streams(Client, Streams, Timeout) -> Result

              Types:

                 Client = client()
                 Streams = [stream_name()]
                 Timeout = timeout()
                 Result = {ok, streams()} | {error, error_reason()}

              Sends a request to get the specified event streams.

              Streams  is a list of stream names. The following filter is sent
              to the NETCONF server in a get request:

               <netconf xmlns="urn:ietf:params:xml:ns:netmod:notification">
                 <streams>
                   <stream>
                     <name>StreamName1</name>
                   </stream>
                   <stream>
                     <name>StreamName2</name>
                   </stream>
                   ...
                 </streams>
               </netconf>

              If Streams is an empty list, all streams are requested by  send-
              ing the following filter:

               <netconf xmlns="urn:ietf:params:xml:ns:netmod:notification">
                 <streams/>
               </netconf>

              If more complex filtering is needed, use ct_netconfc:get/2,3 and
              specify the exact filter according to "XML Schema for Event  No-
              tifications" in RFC 5277.

       get_session_id(Client) -> Result

       get_session_id(Client, Timeout) -> Result

              Types:

                 Client = client()
                 Timeout = timeout()
                 Result = integer() >= 1 | {error, error_reason()}

              Returns the session Id associated with the specified client.

       hello(Client) -> Result

       hello(Client, Timeout) -> Result

       hello(Client, Options, Timeout) -> Result

              Types:

                 Client = handle()
                 Options = [{capability, [string()]}]
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Exchanges  hello  messages  with  the  server.  Returns when the
              server hello has been received or after the specified timeout.

              Note that capabilities for an outgoing hello can be  passed  di-
              rectly to open/2.

       kill_session(Client, SessionId) -> Result

       kill_session(Client, SessionId, Timeout) -> Result

              Types:

                 Client = client()
                 SessionId = integer() >= 1
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Forces  termination  of the session associated with the supplied
              session Id.

              The server side must abort any ongoing operations,  release  any
              locks  and  resources associated with the session, and close any
              associated connections.

              Only if the server is in the confirmed commit phase, the config-
              uration  is  restored to its state before entering the confirmed
              commit phase. Otherwise, no configuration rollback is performed.

              If the specified SessionId is equal to the current  session  Id,
              an error is returned.

       lock(Client, Target) -> Result

       lock(Client, Target, Timeout) -> Result

              Types:

                 Client = client()
                 Target = netconf_db()
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Locks the configuration target.

              Which  target  parameters that can be used depends on if :candi-
              date and/or :startup are supported by the  server.  If  success-
              full,  the  configuration system of the device is unavailable to
              other clients (NETCONF, CORBA, SNMP, and so on). Locks  are  in-
              tended to be short-lived.

              Operation kill_session/2,3 can be used to force the release of a
              lock owned by another NETCONF session. How this is  achieved  by
              the server side is implementation-specific.

       only_open(Options) -> Result

              Types:

                 Options = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Opens a NETCONF session, but does not send hello.

              As open/1, but does not send a hello message.

       only_open(KeyOrName, ExtraOptions) -> Result

              Types:

                 KeyOrName = ct:key_or_name()
                 ExtraOptions = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Opens a named NETCONF session, but does not send hello.

              As open/2, but does not send a hello message.

       open(Options) -> Result

              Types:

                 Options = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Opens a NETCONF session and exchanges hello messages.

              If  the server options are specified in a configuration file, or
              if a named client is needed for logging  purposes  (see  section
              Logging in this module), use open/2 instead.

              The opaque handle() reference returned from this function is re-
              quired as client identifier when calling any other  function  in
              this module.

       open(KeyOrName, ExtraOption) -> Result

              Types:

                 KeyOrName = ct:key_or_name()
                 ExtraOption = [option()]
                 Result = {ok, handle()} | {error, error_reason()}

              Opens a named NETCONF session and exchanges hello messages.

              If  KeyOrName is a configured server_id() or a target_name() as-
              sociated with such an Id, then the options for this  server  are
              fetched from the configuration file.

              The options list is added to those of the configuration file. If
              an option is specified in both  lists,  the  configuration  file
              take precedence.

              If  the  server  is  not  specified in a configuration file, use
              open/1 instead.

              The opaque handle() reference returned from this function can be
              used  as  client  identifier  when calling any other function in
              this module. However, if KeyOrName is a target_name(), that  is,
              if  the  server is named through a call to ct:require/2 or a re-
              quire statement in the test suite, then this name  can  be  used
              instead of handle().

              See also ct:require/2.

       send(Client, SimpleXml) -> Result

       send(Client, SimpleXml, Timeout) -> Result

              Types:

                 Client = client()
                 SimpleXml = simple_xml()
                 Timeout = timeout()
                 Result = simple_xml() | {error, error_reason()}

              Sends an XML document to the server.

              The  specified  XML document is sent "as is" to the server. This
              function can be used for sending XML documents  that  cannot  be
              expressed by other interface functions in this module.

       send_rpc(Client, SimpleXml) -> Result

       send_rpc(Client, SimpleXml, Timeout) -> Result

              Types:

                 Client = client()
                 SimpleXml = simple_xml()
                 Timeout = timeout()
                 Result = [simple_xml()] | {error, error_reason()}

              Sends a NETCONF rpc request to the server.

              The specified XML document is wrapped in a valid NETCONF rpc re-
              quest and sent to the server. The message-id and  namespace  at-
              tributes are added to element rpc.

              This  function  can be used for sending rpc requests that cannot
              be expressed by other interface functions in this module.

       session(Conn) -> Result

       session(Conn, Options) -> Result

       session(KeyOrName, Conn) -> Result

       session(KeyOrName, Conn, Options) -> Result

              Types:

                 Conn = handle()
                 Options = [session_option()]
                 KeyOrName = ct:key_or_name()
                 Result = {ok, handle()} | {error, error_reason()}
                 session_option() =
                     {timeout, timeout()} | {capability, string() | [string()]}

              Opens a NETCONF session as a channel on the  given  SSH  connec-
              tion, and exchanges hello messages with the server.

              The opaque handle() reference returned from this function can be
              used as client identifier when calling  any  other  function  in
              this  module.  However,  if  KeyOrName  is used and it is a tar-
              get_name(), that is, if the server is named through  a  call  to
              ct:require/2 or a require statement in the test suite, then this
              name can be used instead of handle().

       unlock(Client, Target) -> Result

       unlock(Client, Target, Timeout) -> Result

              Types:

                 Client = client()
                 Target = netconf_db()
                 Timeout = timeout()
                 Result = ok | {error, error_reason()}

              Unlocks the configuration target.

              If the client earlier has acquired a lock through lock/2,3, this
              operation releases the associated lock. To access another target
              than  running,  the  server  must  support   :candidate   and/or
              :startup.

Ericsson AB                    common_test 1.19              ct_netconfc(3erl)

Man(1) output converted with man2html
list of all man pages