[core] Modelling links in CoMI (was: Using CoMI to change resource attributes)

Christian Amsüss <c.amsuess@energyharvesting.at> Thu, 04 January 2018 09:39 UTC

Return-Path: <c.amsuess@energyharvesting.at>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 924961205F1; Thu, 4 Jan 2018 01:39:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDSjFQG4ruEA; Thu, 4 Jan 2018 01:39:39 -0800 (PST)
Received: from prometheus.amsuess.com (prometheus.amsuess.com [5.9.147.112]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06F4F1205F0; Thu, 4 Jan 2018 01:39:35 -0800 (PST)
Received: from poseidon-mailhub.amsuess.com (095129206250.cust.akis.net [95.129.206.250]) by prometheus.amsuess.com (Postfix) with ESMTPS id A10D040562; Thu, 4 Jan 2018 10:39:32 +0100 (CET)
Received: from poseidon-mailbox.amsuess.com (poseidon-mailbox.amsuess.com [10.13.13.231]) by poseidon-mailhub.amsuess.com (Postfix) with ESMTP id 9516A76; Thu, 4 Jan 2018 10:39:31 +0100 (CET)
Received: from hephaistos.amsuess.com (hermes.amsuess.com [10.13.13.254]) by poseidon-mailbox.amsuess.com (Postfix) with ESMTPSA id 3B04D38; Thu, 4 Jan 2018 10:39:31 +0100 (CET)
Received: (nullmailer pid 8284 invoked by uid 1000); Thu, 04 Jan 2018 09:39:29 -0000
Date: Thu, 04 Jan 2018 10:39:29 +0100
From: Christian Amsüss <c.amsuess@energyharvesting.at>
To: Alexander Pelov <a@ackl.io>
Cc: consultancy@vanderstok.org, core@ietf.org, yot@ietf.org
Message-ID: <20180104093928.GB31186@hephaistos>
References: <20180103094329.GA25309@hephaistos> <71fe0b12632f1c413174fafb4d8b7ef1@xs4all.nl> <20180103110413.GI14264@hephaistos> <8bd548e9529e2aed1da57eb6601516ad@xs4all.nl> <20180103121135.GB25309@hephaistos> <8eca4505f6a0793224f8610ad19a3f76@xs4all.nl> <20180103165139.GK14264@hephaistos> <2C63D3DC-2A64-4714-8190-D8057277434E@ackl.io>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="IiVenqGWf+H9Y6IX"
Content-Disposition: inline
In-Reply-To: <2C63D3DC-2A64-4714-8190-D8057277434E@ackl.io>
User-Agent: Mutt/1.9.1 (2017-09-22)
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/SkJ1V-FBSBQtde5KbwxqWu8ps5M>
Subject: [core] Modelling links in CoMI (was: Using CoMI to change resource attributes)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jan 2018 09:39:42 -0000

Hi Alexander,

On Wed, Jan 03, 2018 at 06:49:45PM +0100, Alexander Pelov wrote:
> We’ve had a go on modeling RD with CoMI. As you said, there are no
> difficulties in doing so. The important thing is to get a the right
> people around the table and see some more use-cases. We discussed it
> rapidly on our Yang of Things side meeting in Chicago.

are there any minutes of that? On the YoT list and the repo[1], I only
found Prague's.

The information model of the RD is intentionally close to that of typed
links (link headers / link-format). So far I've only encountered some
weak use cases for managing existing link-format resources (usually for
naming things, like the ins= example for DNS-SD or providing a title)
that would need to operate on the origin resource or its .w-k/c.
What were the discussed uses cases for describing the full RD?

> The one that you mention seems quite interesting to me. I thing the
> YoT could also be the right place to talk it over.

CC'd.

Best regards
Christian

[1]: https://github.com/Ixau/yot

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom