Re: [netconf] RESTCONF support in private candidates draft

"Robert Wills (rowills)" <rowills@cisco.com> Sun, 17 March 2024 06:21 UTC

Return-Path: <rowills@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0696C14CEFE for <netconf@ietfa.amsl.com>; Sat, 16 Mar 2024 23:21:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.594
X-Spam-Level:
X-Spam-Status: No, score=-9.594 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DzvHhF1qVyeO for <netconf@ietfa.amsl.com>; Sat, 16 Mar 2024 23:21:31 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 282ADC14F6E2 for <netconf@ietf.org>; Sat, 16 Mar 2024 23:21:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=47897; q=dns/txt; s=iport; t=1710656491; x=1711866091; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=VilwywZb2WJWBP2fHLLugUruYlEGryEJ65pmdO+goqk=; b=kfW7qV6NMoM9/GOuX79szU+dzLuNzqRfKt1LC1S8kNc+8VJ5BRUNgTXG +jJ+xSXJjbd/XXEGWG83Am1aKO/VaphT0I7kMHtLofcjnwg1DIzf5wv/z OhFrSWgh9O/lfpbjainYuMX7xhLckYv1qkw7trPqEKcX2oN+HDqeQvslr 8=;
X-CSE-ConnectionGUID: bkWgrp28SZqpfaPsUQe6Pw==
X-CSE-MsgGUID: Kw22ccKISPiwbODhPPZoug==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:RaMPExRQxXWo1P9F4mcTkCUPINpso3TLVj580XJvo7tKdqLm+IztI wmGo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHlcOo1uS24LXYYh5Dg3y2ZrYhZ BmzpB/a49EfmpAqar5k0BbLr3BUM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:vO8ruKiRHm3IkQAa+io0axaBX161HxAKZh0ujC45NGQN5FlHY01je htvWT2Baa7YZjD0ct1/bIzl8EMGv5LQn9NlSgE9+S08EShjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+1H1dOCn9CEgvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWAULOZ82QsaD5MsPvc8EoHUMna4Vv0gHRvPZing3eG/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVTmZk5tZkSXqkMqShrefUoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICXK8jsOJ1xeWSEn12/tnNFoLBIBGwvkiVAmi9 dRAQNwMRhmHg+Tzy7WhR6w2wM8iN8LseogYvxmMzxmAUq1gGs6FGv6MvIQFtNszrpgm8fL2f c0GaD5rdzzLYgZEPREcD5dWcOKA3CKmK2EJ9QjIzUYxy0vMllZ625vMC+LUZdatacVtpnSfu 22TqgwVBTlBaYTAkmDamp62vcfJkD/wX4QcPLy16vAsh0ecrlH/EzUfUV+95PK+kEP7AZRUK lcf/Wwlqq1aGFGXosfVVR6Hr2Sc5E4nacNIHeQC8zy0x/Ts/FPMboQbdQJpZNsjvc4wYDUl0 F6Vgt/kbQCDVpXLERpxEZ/K91uP1TgpEIMUWcMToeI4DzTLqYU3iFfEScxuVfTzhdzuEja2y DePxMTfu1nxpZBVv0lY1Qmb695JmnQvZlVpjukwdjn4hj6VnKb/O+SVBaHztJ6s1rqxQFibp 2QjkMOD9u0IBpzlvHXSGb1TRer5uKfea2W0bbtT838JqmrFF5mLINE43d2CDBoB3jssIGa2M BGJ5Wu9GrcDZiDCgVBLj3KZUJlykvO6SrwJp9jfb8FFZdBqZRSb8SR1LU+W1CaFraTfuf9XB HtvSu71VSxyIf0+lFKeHr5BuZd1nXpW7T2IGvjGI+GPjOD2iIi9E+lVaTNjr4kRscu5neki2 40AZ5fSl0kADrGWj+u+2dd7EG3m5EMTXPjeg8dWbeWEZAFhHQkc5zX5mNvNp6QNc3xpq9r1
IronPort-HdrOrdr: A9a23:aksjXak1cG/FTasSMcQZvKyJOqnpDfNsiWdD5ihNYBxZY6Wkfp +V7ZcmPE7P6Ar5BktApTnZAtj/fZq9z/JICYl4B8bFYOCUghrYEGgC1/qs/9SOIVyFygcw79 YFT0E6MqyOMbEYt7e13ODbKadc/DDvysnB7omurQYJcegpUdAd0+4TMHfjLqQCfng8OXNPLu vl2iMonUvGRV0nKu6AKj0uWe/Fq9fXlJTgTyInKnccgjWmvHeD0pK/NwKX8Cs/flp0rIvK91 KrryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTFkG+TFcRccozHmApwjPCk6V4snt WJiQwnJd5P53TYeXzwiQfx2jPnzC0l5xbZuBylaDrY0I7ErQABeo58bLFiA1zkAo0bzZdBOZ dwriekXlxsfEr9dWrGloD1vlpR5zqJSDIZ4J0uZjpkIMojgHs7l/1EwKuTe61wRx4TouocYZ tTJdCZ6/BMfVyAaXfF+mFp3dy3R3w2WgyLW04Yp6WuonJrdV1CvgMlLfYk7zw93YN4T4MB6/ XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXeD3cZe06EmOIr4Sy7KQ+5emsdpBNxJwumI 7ZWFcdsWIpYUrhBcCHwZUO+BHQR2e2Wyjr16hlltVEk6y5QKCuPTyISVgoncflq/IDAtfDU/ L2I55SC++LFxqmJW+I5XyJZ3B/EwhobCROgKdPZ7unmLO+FrHX
X-Talos-CUID: 9a23:qS0XsGx0svSfp8ON6yVHBgUeGf8qaGWHnEziOle2AF5ydYSYF2ePrfY=
X-Talos-MUID: 9a23:4LUpcAj7NYtPLtUQ6WJ8DsMpF9gyua+lK2E2qZQZse6oNRRICTCAg2Hi
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-8.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2024 06:21:29 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 42H6LTlE023119 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <netconf@ietf.org>; Sun, 17 Mar 2024 06:21:29 GMT
X-CSE-ConnectionGUID: Wn1/6SN/QQO/dBj2H+2jpg==
X-CSE-MsgGUID: lD49gu9tTVyCEPxQq1Y0yg==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rowills@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.07,132,1708387200"; d="scan'208,217";a="26298108"
Received: from mail-bn8nam11lp2169.outbound.protection.outlook.com (HELO NAM11-BN8-obe.outbound.protection.outlook.com) ([104.47.58.169]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2024 06:21:29 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ki1MZUScZD164SaRQli9ojEsFyqWeuMUCkEACb4hwedhtFd9xZOB+PEbZXbkdINeZ7SY6T0fKCSJMfdBgazxCfiMNfzx+6H2+Rdkxkxu5h5XeC0RMAZahvQKcXW1btOu2WLKPdJPbd9dGf4efH3VB0GQNhE3fc92kAuQ8pnu1drV2R5O4g2IJY61C27hGryCuuhuXO6oAOylRspfdQaMpUxV98EZqHM0+gZB8+XOiCgaM2kIgR8JhBCd5YddUfcCdHDpfgE322MScGKk3L87B8rX8GYogKfXykw4Tyo+9sHnJ/cZHFjKtge6wKxD8w+6CXv/VYn5PvzDkKnRvw+vzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VilwywZb2WJWBP2fHLLugUruYlEGryEJ65pmdO+goqk=; b=O5iD+fkP+NypA6xnhkQVGRjiW2/AAskVFSuGI2RjONQiKNNOGFtrx4VnoZNOSNgY0AS+rvaNbJbEZ70GkfY91d08X+mx5mqcOLDom+r9Tur+pneC8SX5sWSnSB2SUHQQqArAlb6S8CdwGrQnfeh0NgVQ6z5tb7C+o++t7tQpDCepG0TRa+7YryewnUnar66HHojPWA9z3bl+OOJRSeXlhxjPc4t7o06OQS4ZQZj05sEYFZy7IbAwdrEUB6HlmfUjCskiHXuPIw1c/UbFuhqZxLVo+laZCbDYN09LXaSucBNJeWB7iTtmrBfzTY8+2TY440CnHh7HLVAN6m9fItJ/1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from MW4PR11MB6839.namprd11.prod.outlook.com (2603:10b6:303:220::20) by LV3PR11MB8765.namprd11.prod.outlook.com (2603:10b6:408:21d::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.10; Sun, 17 Mar 2024 06:21:27 +0000
Received: from MW4PR11MB6839.namprd11.prod.outlook.com ([fe80::2b57:d12f:f593:73e4]) by MW4PR11MB6839.namprd11.prod.outlook.com ([fe80::2b57:d12f:f593:73e4%5]) with mapi id 15.20.7386.017; Sun, 17 Mar 2024 06:21:26 +0000
From: "Robert Wills (rowills)" <rowills@cisco.com>
To: Andy Bierman <andy@yumaworks.com>, Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] RESTCONF support in private candidates draft
Thread-Index: AQHaWC9VxsPjZruZq0G3eE/6IhAYFLD9lW6AgANmKgCAAAjeAIA6sdiA
Date: Sun, 17 Mar 2024 06:21:26 +0000
Message-ID: <4B2A8C69-7C79-4B88-8D4E-D0FE7CACE024@cisco.com>
References: <58EBA620-2449-4A0C-8A53-41DB5113D9D5@cisco.com> <CABCOCHTCftFmvK8p1zQBR74Hs5QauakX_LeG8CASxdzxqt+Q0g@mail.gmail.com> <0100018d8aa0bb70-aa305423-1846-4f81-915f-8815f7b9d169-000000@email.amazonses.com> <CABCOCHQy2fVsXu6S9_jxAQj8ZPhDv1nnZjSpOFv98FNnd8TAOQ@mail.gmail.com>
In-Reply-To: <CABCOCHQy2fVsXu6S9_jxAQj8ZPhDv1nnZjSpOFv98FNnd8TAOQ@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.82.24021813
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MW4PR11MB6839:EE_|LV3PR11MB8765:EE_
x-ms-office365-filtering-correlation-id: 75404c17-4bae-4423-c4ea-08dc464a79fb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW4PR11MB6839.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(1800799015)(366007)(376005)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_4B2A8C697C794B888D4ED0FE7CACE024ciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB6839.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 75404c17-4bae-4423-c4ea-08dc464a79fb
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2024 06:21:26.7628 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: iThH6V4Im4sVQrSqtCR0sXSFlhnN8Hfe79Ri3p00wPq5K7JuCNkK8eao5GFIn+pT3ElRtlbshc/QNzCERDIySg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR11MB8765
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/VMiB4FFOQStJovpnrgNRli1ap2M>
Subject: Re: [netconf] RESTCONF support in private candidates draft
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Mar 2024 06:21:37 -0000

Kent, Andy,

Thank you both for taking the time to provide feedback.

In draft-ietf-netconf-privcand-02, which was recently published, I have attempted to incorporate this feedback.

Summarising:

  1.  With RESTCONF, the private candidate is tied to the client, using the client identity as described in RFC 8040 Section 2.5
  2.  When the private candidate datastore is explicitly referenced in the request, then edits are made to the client’s private candidate and are NOT committed. The client must execute an ietf-netconf:commit operation to commit them.
  3.  When the private candidate datastore is not explicitly referenced in the request, changes are made in a private candidate and the private candidate is instantly committed.

The bulk of the changes are in Section 4.4.3, with small changes elsewhere to make it hang together.

Elaborating on each of the points above:

(1) Private candidate is tied to the client
On re-reading the draft, I think it should be more explicit that it’s tied to the client identity from 8040. I will make this change in -03.

(2) Privcand datastore explicitly referenced in the request
Kent and Andy, you both agree that a candidate datastore that’s instantly committed is not useful. Hopefully what I’ve now written (in Section 4.4.3.2) provides something more useful in implementations that support privcand.

(3) Privcand datastore not explicitly referenced
In this case, the private candidate datastore IS automatically committed. This is for backwards compatibility with clients that aren’t aware of private candidates: they are expecting their changes to be committed. Kent, I hope this captures the spirit of what you were after?

Further comments are very welcome.

Many thanks,
Robert.

From: Andy Bierman <andy@yumaworks.com>
Date: Thursday, 8 February 2024 at 22:02
To: Kent Watsen <kent+ietf@watsen.net>
Cc: "Robert Wills (rowills)" <rowills@cisco.com>, "netconf@ietf.org" <netconf@ietf.org>
Subject: Re: [netconf] RESTCONF support in private candidates draft



On Thu, Feb 8, 2024 at 1:30 PM Kent Watsen <kent+ietf@watsen.net<mailto:kent%2Bietf@watsen.net>> wrote:
Robert, Andy, et. al.,



On Feb 6, 2024, at 12:35 PM, Andy Bierman <andy@yumaworks.com<mailto:andy@yumaworks.com>> wrote:



On Mon, Feb 5, 2024 at 4:32 AM Robert Wills (rowills) <rowills=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Hi Netconf Working Group,

After James and I presented an update on draft-ietf-netconf-privcand-01 at IETF 118, Kent asked about RESTCONF support in the draft, and specifically about the lifecycle of a private candidate when using RESTCONF. This email is to follow up on that question, and to ask the Working Group whether RESTCONF support should be kept in this draft.
Currently, the draft states that
"When a private candidate is used by RESTCONF, it exists only for the duration of the RESTCONF request." (draft-ietf-netconf-privcand-01 Section 2.3).
Later, the draft expands on this by stating that changes made to a private candidate will be committed as part of the same request:
"When the server advertises the :private-candidate capability and the client does not explicitly reference a datastore in their request, all edits are made to a new private candidate, and the private candidate is committed. This is analagous to the behavior of RESTCONF when the :candidate capability is specified by the server.
"When the private-candidate datastore is explicitly referenced, edits are made to a new private candidate and the private candidate is committed."
(draft-ietf-netconf-privcand-01 Section 4.4.3)
It would be better for this draft to define nothing than to define it this way.
But all is not lost.  This is an opportunity to fix it.

This wording is intended to preserve the high-level goal of private candidates, namely allowing multiple clients to make independent configuration changes, and to behave similarly to RESTCONF's current behavior for the (shared) candidate. (RESTCONF RFC 8040 Section 1.4: "The candidate MUST be automatically committed to running immediately after each successful edit").
RFC 8040 should’ve just said to use the operations supported by the various NETCONF’s capabilities under the {+restconf}/operations resource.


I disagree.
RESTCONF does not have sessions.
NETCONF :candidate is session-specific.
No changes to the existing URI s (e.g. /restconf/data) should be made.


As far as I'm aware, RESTCONF doesn't currently have a mechanism for editing a datastore and then committing the changes in a separate request. The authors wanted to avoid having to specify such a mechanism, partly because neither of us are RESTCONF experts, and partly because it could also apply to other datastores (such as the “shared” candidate).
As a RESTCONF expert, I will help.

RFC 8040 only says what happens when certain datastores are supported.   It says nothing about what happens when a datastore called “private-candidate” is implemented.  Thus this draft gets to define that behavior, and it doesn’t have to match RFC 8040’s “support” for :candidate.


As long as new mechanisms and URIs are used, this should be OK.

IMO RESTCONF does not really need its own way of doing everything, because the /restconf/operations interface
is very easy to use.

Andy

This draft can state:

- when "“private-candidate” is implemented:
- edits accumulate in the client-specific candidate datastore
- the client-specific candidate datastore can be committed
  using  {+restconf}/operations/ietf-netconf:commit
- the client-specific candidate datastore can be discarded
  using {+restconf}/operations/ietf-netconf:discard-changes

- if :validate is also implemented:
- the client-specific candidate datastore can be validated
  using {+restconf}/operations/ietf-netconf:validate

- if :confirmed-commit is also implemented:
- the {+restconf}/operations/ietf-netconf:commit operation
  can take the “confirmed” attribute
- the commit can be canceled using
  {+restconf}/operations/ietf-netconf:cancel-commit

Note:  I am not trying at all to introduce to RESTCONF an equivalency to NETCONF’s <target> attribute.  I’m perfectly okay with the following auto-selection:

if :running implemented:
- RC-edits go to <running> and are auto-committed
- this is from RFC 8040 and is fine (matches :writable-running behavior)

else if :candidate is implemented:
- RC-edits go to <candidate> and are auto-committed
- this is from RFC 8040 and is not good (explained above)
- but let’s hope that :candidate becomes a thing of the
  past in an NBC-update to RESTCONF

else if :private-candidate is implemented:
- see behavior described above.
- but, to work, this draft needs to say that neither
  :running nor :candidate can be implemented…
- this would be goodness

If more work is needed on the RESTCONF support for the private candidate datastore, I think it would be better to remove RESTCONF from this draft and address it in a separate draft later, with an author who's a RESTCONF expert.
A common strategy is to have one “place” where protocol-independent behavior is defined, and then a “place” for each protocol, where protocol-specific syntax is defined.   The only question is if the *places* are sections in a draft, or separate drafts (e.g., in the list-pagination work).

IMO, if you want to isolate RESTCONF, then NETCONF should be also be isolated (i.e.: there would be 3 drafts).  Good reasons for doing this are 1) because each is a heavy topic, perhaps too big for all be in one draft) and 2) because independent documents make for better references.

Thoughts and comments are very welcome.
Thank you for sending out this message.


From Andy:

A candidate datastore that can only accept one edit and then automatically commit is not useful.

I agree that it would not be useful.
It was also not useful when RFC 8040 defined it.


Also from Andy:

I agree RESTCONF should be removed from this draft.

This is too important to not support in RESTCONF (and CORECONF, I assume).


Kent // contributor