Open abierman opened 2 years ago
As Andy mentions, this is not a NETCONF-next issue.
Skip here, create a nacm-next project.
Alternatively specify, that if you are allowed to read/write the /interfaces/interface[name='if9'] that implies read/write(?) access on all parent lists/containers and their keys: in this case /interfaces.
There is no repo for nacm-next so adding it to netconf-next
Customers keep complaining about NACM when they try to use it to partition list entries within another subtree,
Use case:
Problem: NACM data-rules always apply to the entire subtree
e.g. 3 interfaces: allow access to if3
rule1: deny /interfaces/interface[name='if1'] rule2: deny /interfaces/interface[name='if2'] rule3: permit /interfaces
Solution: (Has not been implemented yet!)
this will allow very simple data-rules
rule1: permit-node /interfaces rule 2: permit-subtree /interfaces/interface[name='if3']