openconfig macsec sak-rekey-on-live-peer-loss description update#1456
openconfig macsec sak-rekey-on-live-peer-loss description update#1456ishwarbnaik wants to merge 4 commits intoopenconfig:masterfrom
Conversation
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request enhances the clarity of the OpenConfig MACsec model by refining the description of a key configuration leaf. The update ensures that implementers and users have a comprehensive understanding of how the system handles Security Association Key (SAK) rekeying when a peer is lost, particularly in scenarios where no other live peers remain and traffic policies come into play. This change improves the model's accuracy and reduces potential ambiguities in network device configurations. Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request updates the openconfig-macsec.yang model by adding a new revision 2026-03-24 (version 1.2.1) and expanding the description for the sak-rekey-on-live-peer-loss leaf. An indentation issue was also corrected. Feedback includes updating the oc-ext:openconfig-version to 1.2.1 for consistency and changing the spelling of 'behaviour' to 'behavior'.
|
/gcbrun |
|
No major YANG version changes in commit 0aef5d5 |
Change Scope
Related Issues
Fixes #1446
Platform Implementations
Implementation A: AristaNetworks
When the traffic policy is "traffic unprotected allow active-sak" (Arista), the MACsec KaY will not perform a rekey on live peer loss. Instead, preserves the current SAK, and allows traffic exchange to continue using that SAK when there are no live peers.
If the policy is
traffic unprotected allowortraffic unprotected dropthen the traffic will be handled accordingly, when the session fails. No sak rekey required.Tree View
No changes to tree view