Skip to content

Commit 7730a1d

Browse files
suzgoldtmarkwalder
authored andcommitted
Resolve "Editorial review of the ARM prior to 2.6 release"
1 parent 3f7db23 commit 7730a1d

36 files changed

+1124
-1143
lines changed

doc/sphinx/arm/admin.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,11 +48,11 @@ upgrade, and dump lease data to a text file.
4848
``backend``. Additional, non-mandatory options may be specified. The
4949
currently supported commands are:
5050

51-
- ``db-init`` — initializes a new database schema. This is useful
52-
during a new Kea installation. The database is initialized to the
53-
latest version supported by the version of the software being installed.
54-
Called automatically on startup or reconfiguration of Kea DHCP servers if
55-
required.
51+
- ``db-init`` — initializes a new database schema, which is useful
52+
during a new Kea installation. The new database is updated to
53+
match the Kea version being installed. :iscman:`kea-admin` is
54+
automatically invoked with this command if a missing schema is
55+
detected during startup or reconfiguration of Kea DHCP servers.
5656

5757
- ``db-version`` — reports the database backend version number. This
5858
is not necessarily equal to the Kea version number, as each backend

doc/sphinx/arm/classify.rst

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -503,12 +503,12 @@ Notes:
503503
+-----------------------+-------------------------+-----------------------+
504504
| Lcase | lcase('LoWeR') | Converts the value of |
505505
| | | a string expression |
506-
| | | to lower case e.g. |
506+
| | | to lower case, e.g. |
507507
| | | 'lower' |
508508
+-----------------------+-------------------------+-----------------------+
509509
| Ucase | ucase('uPpEr') | Converts the value of |
510510
| | | a string expression |
511-
| | | to upper case e.g. |
511+
| | | to upper case, e.g. |
512512
| | | 'UPPER' |
513513
+-----------------------+-------------------------+-----------------------+
514514
| Split | split('foo.bar', '.', 2)| Return the second |
@@ -759,11 +759,11 @@ domain name servers.
759759
...
760760
}
761761

762-
The next example shows a client class being defined for use by the DHCPv6
763-
server. In it the class named "Client_enterprise" is defined. It is
762+
The next example shows a client class named "Client_enterprise" being defined
763+
for use by the DHCPv6 server. It is
764764
comprised of all clients whose client identifiers start with the given
765-
hex string (which would indicate a DUID based on an enterprise ID of
766-
``0x0002AABBCCDD``). Members of this class will be given 2001:db8:0::1 and
765+
hex string, which would indicate a DUID based on an enterprise ID of
766+
``0x0002AABBCCDD``. Members of this class will be given 2001:db8:0::1 and
767767
2001:db8:2::1 as their domain name servers.
768768

769769
::
@@ -1138,17 +1138,17 @@ Client classes in Kea follow the order in which they are specified in the
11381138
configuration (vs. alphabetical order). Required classes follow the order in
11391139
which they are required.
11401140

1141-
When determining which client-class information (comprising of
1142-
options, lease lifetimes or DHCPv4 field values) that is part of class
1143-
definitions, to include in the response, the server examines the union of
1141+
When determining which client-class information (comprised of
1142+
options, lease lifetimes, or DHCPv4 field values) is part of the class
1143+
definitions to be included in the response, the server examines the union of
11441144
options from all of the assigned classes. If two or more classes include the
11451145
same class information, the value from the first assigned class is used.
1146-
``ALL`` is always the first class, hence the class with the highest
1146+
``ALL`` is always the first class, i.e. the class with the highest
11471147
priority, and matching required classes are last, so they have the
11481148
lowest priority.
11491149

1150-
Optons defined in classes override any global options, and in turn will be
1151-
overridden by options defined for an individual subnet, shared network, pool or
1150+
Options defined in classes override any global options, and in turn are
1151+
overridden by options defined for an individual subnet, shared network, pool, or
11521152
reservation.
11531153

11541154
On the other hand, lease lifetimes and DHCPv4 field values defined at class

doc/sphinx/arm/config-backend.rst

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,21 +12,21 @@ Kea Configuration Backend (CB or config backend) gives Kea servers the ability
1212
to manage and fetch their configuration from one or more databases. In
1313
this documentation, the term "Configuration Backend" may also refer to
1414
the particular Kea module providing support to manage and fetch the
15-
configuration information from the particular database type. For
15+
configuration information from the particular database type. For
1616
example, the MySQL Configuration Backend is the logic implemented within
1717
:ischooklib:`libdhcp_mysql_cb.so`, which provides a complete set of functions to
1818
manage and fetch the configuration information from the MySQL database.
1919
The PostgreSQL Configuration Backend is the logic implemented within
2020
:ischooklib:`libdhcp_pgsql_cb.so`, which provides a complete set of functions to
2121
manage and fetch the configuration information from the PostgreSQL database.
22-
From herein, the term "database" is used to refer to either a MySQL or
22+
From here on, the term "database" is used to refer to either a MySQL or
2323
PostgreSQL database.
2424

2525
In small deployments, e.g. those comprising a single DHCP server
2626
instance with limited and infrequently changing number of subnets, it
2727
may be impractical to use the CB as a configuration repository because
2828
it requires additional third-party software to be installed and
29-
configured - in particular the database server, client and libraries.
29+
configured - in particular the database server, client, and libraries.
3030
Once the number of DHCP servers and/or the number of managed subnets in the
3131
network grows, the usefulness of the CB becomes obvious.
3232

@@ -56,7 +56,7 @@ entire configuration to the new server when a common database is used.
5656
Using the database as a configuration repository for Kea servers also
5757
brings other benefits, such as:
5858

59-
- the ability to use database specific tools to access the configuration
59+
- the ability to use database-specific tools to access the configuration
6060
information;
6161

6262
- the ability to create customized statistics based on the information
@@ -163,13 +163,13 @@ in two independent configuration sources.
163163
CB Components
164164
-------------
165165

166-
To use a MySQL configuration backend you must compile
167-
:ischooklib:`libdhcp_mysql_cb.so` and configure the DHCP servers to load it.
166+
To use a MySQL configuration backend, :ischooklib:`libdhcp_mysql_cb.so`
167+
must be compiled and the DHCP servers must be configured to load it.
168168
It is compiled when the ``--with-mysql`` configuration switch is used during the Kea build.
169169
The MySQL C client libraries must be installed, as explained in :ref:`dhcp-install-configure`.
170170

171-
To use a PostgreSQL configuration backend you must compile :ischooklib:`libdhcp_pgsql_cb.so`
172-
and configure the DHCP servers to load it. It is compiled when
171+
To use a PostgreSQL configuration backend, :ischooklib:`libdhcp_pgsql_cb.so` must
172+
be compiled and the DHCP servers must be configured to load it. It is compiled when
173173
the ``--with-pgsql`` configuration switch is used during the Kea build. The PostgreSQL
174174
C client libraries must be installed, as explained in :ref:`dhcp-install-configure`.
175175

@@ -183,8 +183,8 @@ C client libraries must be installed, as explained in :ref:`dhcp-install-configu
183183
servers' configuration information within the database. This library can
184184
be attached to both DHCPv4 and DHCPv6 server instances. While it is
185185
possible to manage the configuration information without :ischooklib:`libdhcp_cb_cmds.so`
186-
with commonly available tools, such as MySQL Workbench or
187-
the command-line MySQL client, or by directly working with the database;
186+
using commonly available tools, such as MySQL Workbench or
187+
the command-line MySQL client, or by directly working with the database,
188188
these avenues are neither recommended nor supported.
189189

190190
The DHCPv4 and DHCPv6 server-specific configurations of the CB, as well as
@@ -220,7 +220,7 @@ servers in the database.
220220
Commands which contain the logical server `all` are applied to all servers
221221
connecting to the database. The `all` server cannot be
222222
deleted or modified, and it is not returned among other servers
223-
as a result of the :isccmd:`remote-server4-get-all`, :isccmd:`remote-server6-get-all` commands.
223+
as a result of the :isccmd:`remote-server4-get-all` and :isccmd:`remote-server6-get-all` commands.
224224

225225
In most cases, there are no server tags defined in the configuration
226226
database; all connecting servers get the same configuration
@@ -242,7 +242,7 @@ servers.
242242

243243
To differentiate between different Kea server configurations, a
244244
list of the server tags used by the servers must be stored in the
245-
database. For the DHCPv4 and DHCPv6 servers, it can be done using the
245+
database. For the DHCPv4 and DHCPv6 servers, this can be done using the
246246
:isccmd:`remote-server4-set` and :isccmd:`remote-server6-set` commands. The
247247
server tags can then be used to associate the configuration information with
248248
the servers. However, it is important to note that some DHCP

doc/sphinx/arm/config.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -174,17 +174,17 @@ syntax and its top-level element is a map (i.e. the data must be enclosed in
174174
curly brackets). However, some hook libraries may expect specific formatting;
175175
please consult the specific hook library documentation for details.
176176

177-
In a sense the user-context mechanism has superseded the JSON comment
178-
capabilities; ISC encourages administrators to use user-context instead of
179-
the older mechanisms. To promote this way of storing comments, Kea compared
180-
converts JSON comments to user-context on the fly.
177+
The user-context mechanism has superseded the JSON comment
178+
capabilities; ISC encourages administrators to use user context instead of
179+
the older mechanisms. To promote this way of storing comments, Kea
180+
converts JSON comments to user context on the fly.
181181

182182
However, if the configuration uses the old JSON
183-
comment, the :isccmd:`config-get` command returns a slightly modified
184-
configuration. It is not uncommon for a call for :isccmd:`config-set` followed by a
183+
comment method, the :isccmd:`config-get` command returns a slightly modified
184+
configuration. It is not uncommon for a call for :isccmd:`config-set` followed by
185185
:isccmd:`config-get` to receive a slightly different structure.
186186
The best way to avoid this problem is simply to abandon JSON comments and
187-
use user-context.
187+
use user context.
188188

189189
Kea supports user contexts at the following levels: global scope,
190190
interfaces configuration, shared networks,

doc/sphinx/arm/ctrl-channel.rst

Lines changed: 35 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -352,9 +352,9 @@ returned is roughly equal to the configuration that was loaded using the
352352
:isccmd:`config-set` command. However, there may be certain differences, as
353353
comments are not retained. If the original configuration used file
354354
inclusion, the returned configuration includes all parameters from
355-
all included files. Starting with 2.4.0, the successful response also
356-
contains a SHA-256 digest that can be used to easily determine if a
357-
configuration has changed or not.
355+
all included files. In Kea 2.4.0 and later, the successful response also
356+
contains a SHA-256 digest that can be used to easily determine whether a
357+
configuration has changed.
358358

359359
.. warning::
360360

@@ -400,9 +400,9 @@ And the server's response:
400400
}
401401
}
402402

403-
Starting with 2.4.0, also ``config-set`` and ``config-get`` return the SHA-256 hash
404-
of the new or current configuration. This may be used to later determine if a configuration
405-
has changed or not.
403+
In Kea 2.4.0 and later, ``config-set`` and ``config-get`` also return the SHA-256 hash
404+
of the new or current configuration. This may be used to determine whether a configuration
405+
has changed.
406406

407407
.. isccmd:: config-reload
408408
.. _command-config-reload:
@@ -414,9 +414,9 @@ The :isccmd:`config-reload` command instructs Kea to load again the
414414
configuration file that was used previously. This operation is useful if
415415
the configuration file has been changed by some external source; for
416416
example, a system administrator can tweak the configuration file and use this
417-
command to force Kea pick up the changes.
417+
command to force Kea to pick up the changes.
418418

419-
Caution should be taken when mixing this with the :isccmd:`config-set` command. Kea
419+
Care should be taken when using this in conjunction with the :isccmd:`config-set` command. Kea
420420
remembers the location of the configuration file it was started with,
421421
and this configuration can be significantly changed using the :isccmd:`config-set`
422422
command. When :isccmd:`config-reload` is issued after :isccmd:`config-set`, Kea attempts
@@ -550,7 +550,7 @@ loaded hook libraries. This is primarily intended to allow one or more
550550
hook libraries to be replaced with newer versions, without requiring Kea
551551
servers to be reconfigured or restarted. The hook libraries
552552
are passed the same parameter values (if any) that were passed when they
553-
originally loaded.
553+
were originally loaded.
554554

555555
::
556556

@@ -643,9 +643,9 @@ string, ``text``, describing the outcome:
643643

644644
{"result": 1, "text": "unsupported parameter: BOGUS (<string>:16:26)" }
645645

646-
Starting with 2.4.0, the successful response from a DHCPv4, DHCPv6, or DHCP-DDNS daemons
647-
also contain a SHA-256 digest of the newly set configuration. The digest can be used to easily
648-
determine if a configuration has changed or not.
646+
In Kea 2.4.0 and later, the successful response from a DHCPv4, DHCPv6, or DHCP-DDNS daemon
647+
also contains a SHA-256 digest of the newly set configuration. The digest can be used to easily
648+
determine whether a configuration has changed.
649649

650650
.. isccmd:: shutdown
651651
.. _command-shutdown:
@@ -654,7 +654,7 @@ The ``shutdown`` Command
654654
------------------------
655655

656656
The :isccmd:`shutdown` command instructs the server to initiate its shutdown
657-
procedure. It is the equivalent of sending a ``SIGTERM`` signal to the
657+
procedure; it is the equivalent of sending a ``SIGTERM`` signal to the
658658
process. This command does not take any arguments. An example command
659659
may look like this:
660660

@@ -714,24 +714,24 @@ if the :isccmd:`dhcp-enable` command is not sent before this time elapses.
714714
Since Kea 1.9.4, there is an additional ``origin`` parameter that specifies the
715715
command source. A server administrator should typically omit this parameter
716716
because the default value "user" indicates that the administrator sent the
717-
command. In Kea 2.5.5 thru 2.5.7 this parameter was also used in communication
717+
command. In Kea 2.5.5 through 2.5.7, this parameter was also used in communication
718718
between the HA partners to specify the identifier of an HA service sending the command
719-
in a numeric format. However, due to the compatibility issues with the older
720-
Kea versions that did not properly parse the numeric values, it was necessary
719+
in a numeric format. However, due to compatibility issues with older
720+
Kea versions that did not properly parse numeric values, it was necessary
721721
to introduce the new parameter, ``origin-id``, in Kea 2.5.8.
722722

723723
It holds a numeric value representing the origin of the command. The same value
724724
can still be passed using the ``origin`` parameter, but it can cause the
725-
aforementioned compatibility issues between the HA partners running different
726-
Kea versions. Therefore, new Kea versions favor using ``origin-id`` in communication
727-
between the HA partners. The ``origin`` parameter can still be used, but the
728-
``origin-id`` takes precedence. Overall, it is recommended that both parameters be
729-
omitted from the user commands.
725+
aforementioned compatibility issues between HA partners running different
726+
Kea versions; if both are used, ``origin-id`` takes precedence. New Kea versions
727+
favor using ``origin-id`` in communication between the HA partners, but
728+
overall, it is recommended that both parameters be
729+
omitted and the default value used.
730730

731731
The following codes represent the supported origins in numeric format:
732732

733-
- ``1`` - a user command, same as specifying ``"origin": "user"``,
734-
- ``2000``, ``2001``, ``2002`` etc. - origins specified by HA partners where
733+
- ``1`` - a user command; the same as specifying ``"origin": "user"``.
734+
- ``2000``, ``2001``, ``2002``, etc. - origins specified by HA partners where
735735
the increments above ``2000`` are distinct HA service identifiers used when
736736
the partners have many relationships.
737737

@@ -748,7 +748,7 @@ In the following example:
748748
}
749749
}
750750

751-
the effective origin will be ``2002`` which indicates it is an HA partner
751+
the effective origin is ``2002``, which indicates it is an HA partner
752752
sending the command for the service with ID of ``2``. The ``origin``
753753
parameter will be ignored in this case.
754754

@@ -763,24 +763,23 @@ The :isccmd:`dhcp-enable` command globally enables the DHCP service.
763763
Since Kea 1.9.4, there is an additional ``origin`` parameter that specifies the
764764
command source. A server administrator should typically omit this parameter
765765
because the default value "user" indicates that the administrator sent the
766-
command. In Kea 2.5.5 thru 2.5.7 this parameter was also used in communication
766+
command. In Kea 2.5.5 through 2.5.7, this parameter was also used in communication
767767
between the HA partners to specify the identifier of an HA service sending the command
768-
in a numeric format. However, due to the compatibility issues with the older
769-
Kea versions that did not properly parse the numeric values, it was necessary
768+
in a numeric format. However, due to compatibility issues with older
769+
Kea versions that did not properly parse numeric values, it was necessary
770770
to introduce the new parameter, ``origin-id``, in Kea 2.5.8.
771771

772772
It holds a numeric value representing the origin of the command. The same value
773773
can still be passed using the ``origin`` parameter, but it can cause the
774-
aforementioned compatibility issues between the HA partners running different
775-
Kea versions. Therefore, new Kea versions favor using ``origin-id`` in communication
776-
between the HA partners. The ``origin`` parameter can still be used, but the
777-
``origin-id`` takes precedence. Overall, it is recommended that both parameters be
778-
omitted from the user commands.
774+
aforementioned compatibility issues between HA partners running different
775+
Kea versions.; if both are used, ``origin-id`` takes precedence. New Kea versions
776+
favor using ``origin-id`` in communication between the HA partners, but
777+
overall, it is recommended that both
779778

780779
The following codes represent the supported origins in numeric format:
781780

782-
- ``1`` - a user command, same as specifying ``"origin": "user"``,
783-
- ``2000``, ``2001``, ``2002`` etc. - origins specified by HA partners where
781+
- ``1`` - a user command; the same as specifying ``"origin": "user"``.
782+
- ``2000``, ``2001``, ``2002``, etc. - origins specified by HA partners where
784783
the increments above ``2000`` are distinct HA service identifiers used when
785784
the partners have many relationships.
786785

@@ -796,7 +795,7 @@ In the following example:
796795
}
797796
}
798797

799-
the effective origin will be ``2002`` which indicates it is an HA partner
798+
the effective origin is ``2002``, which indicates it is an HA partner
800799
sending the command for the service with ID of ``2``. The ``origin``
801800
parameter will be ignored in this case.
802801

@@ -880,7 +879,7 @@ The ``version-get`` Command
880879
---------------------------
881880

882881
The :isccmd:`version-get` command returns extended information about the Kea
883-
version. It is the same information available via the ``-V``
882+
version; it is the same information available via the ``-V``
884883
command-line argument. This command does not take any parameters.
885884

886885
::

0 commit comments

Comments
 (0)