[Netmod-ver-dt] Meeting minutes [was Today's Ver DT meeting]

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 10 January 2020 10:09 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod-ver-dt@ietfa.amsl.com
Delivered-To: netmod-ver-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7BA57120889 for <netmod-ver-dt@ietfa.amsl.com>; Fri, 10 Jan 2020 02:09:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=cV3ie62m; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=DqkjbJa5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Ylj_lPc45i4 for <netmod-ver-dt@ietfa.amsl.com>; Fri, 10 Jan 2020 02:09:25 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AAB5120096 for <netmod-ver-dt@ietf.org>; Fri, 10 Jan 2020 02:09:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=43872; q=dns/txt; s=iport; t=1578650965; x=1579860565; h=from:to:subject:date:message-id:mime-version; bh=6yyHZEKWlTgvmeZnR73m+hy0OCuLajmzDcH7Mg8CeZc=; b=cV3ie62m3LBt250pPiaVboHO3IKJPFM4nSQqnQwrCPNuWbd/IUtib9Ss z9Vw071InJVjD8rW6Iyv/lVIDIaRR3aKDpzL3ezr8ioMpKhJFBFcZ6Z/l s/mNCGHA6J9+G1oEJ+Cng9lgFZcAt3OF12mfFLJZnKcX8pt+oxoIwDUR5 4=;
IronPort-PHdr: 9a23:J3HziB/Jw4vVtf9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CqCgD7TBhe/5ldJa1bCoJBgSUvJCwFbFggBAsqCoN/g0YDiwJOmh6BLhSBEANUCQEBAQwBAS0CAQGEQAIXgVkkNAkOAgMNAQEEAQEBAgEFBG2FNwELhV4BARcRChMBATAIEQEGEwQBASEBCQIEMB0JAQQTCBqDBYF9TQMuAQKPWZBkAoE4iGF1gTKCfgEBBYUaGIIMCYE2jBkagUE/gViHIAEHCwEJGIMOMoIsjVQBMgOCQYVXiWuPLQqCNwSWRIJHjEOLXo5ZmnICBAIEBQIOAQEFgVI5Z3FwFYMnUBgNklsXg1CKU3SBKI16gSIBgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.69,415,1571702400"; d="scan'208,217";a="401316400"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Jan 2020 10:09:05 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 00AA92Jo005536 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <netmod-ver-dt@ietf.org>; Fri, 10 Jan 2020 10:09:04 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 Jan 2020 04:09:03 -0600
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 10 Jan 2020 04:09:01 -0600
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 10 Jan 2020 04:09:01 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HCH/uwi+5G4nqBsjwTQ8xedEkfyJTlMPqkbE8I36Ale4TLbA6Vp3ufLZ7mIz9VSMxK9y2MiFnk1jiShZHTAR2HV04Id6HO8hOvI+VdRNna99uIxihMd9WamO/zC3qzu28iexrdhHzNrb7AA2O2UuUXLDD/liEb8qYl4Z/hQZgRO6YJlqZBfuJ/JZEb5hVFnPWVKvY2qolDR8X1na43WcGWdeezcc9pY88b0D6wt2dW6pcooZqDkTyFbN8vU1rQjQASkb5S+GuL1mAE8P9kpZ23SdvNnofUzhnbaL4frThEBxYLcoTupVJYFVK5FdJiVXBqdmJTch1iEHLMCp1x8umw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6yyHZEKWlTgvmeZnR73m+hy0OCuLajmzDcH7Mg8CeZc=; b=SeNvL7t1n56x9iaKqwybW4mwxjwmbeCq0Q52H5W+1nWDNRH9tgxBjHPu9BBZ7LWEZj2gkwvujuGPeu6Wijs5zTxzeDXQg/UNmMjKUHhzBHnfWAxKRJEoCWCr5JlHRtRESoMLDeLcfJ27tBK1jkC1NQnujnO4n48RCiPc/QL/QtX5311QAbG9gtJrhpfDgbf9IJqsSNkHCEjXgiUPZ2+gKCGaLri3zilzRtEzdxdVc0EyuSTrWl/I+uTxUqLaGeGy0QOIjAKTAGJ4Q9dppTebgXyMVnc0l93dIjImEDrkXHLzT76eRqmZUex8oz01+pX673OgS9vFXGmmh0VoPhlNFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6yyHZEKWlTgvmeZnR73m+hy0OCuLajmzDcH7Mg8CeZc=; b=DqkjbJa5i0Ca8ghIk0Fepeo1AT+0icfwcizOfizfgHnqN24p/sZrAWtuEoPGnuHzp0DdwgsdBQceYpSnfk8eEfZL8GWZNDtPUnZ+MUNg8z6DHxKL6WhURxws78MwoCtvFTARmLp9D+cctI+Pul1v43vl6Manpmavi/vx04vU8P0=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB3982.namprd11.prod.outlook.com (10.255.181.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.9; Fri, 10 Jan 2020 10:09:00 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2623.013; Fri, 10 Jan 2020 10:09:00 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "netmod-ver-dt@ietf.org" <netmod-ver-dt@ietf.org>
Thread-Topic: Meeting minutes [was Today's Ver DT meeting]
Thread-Index: AdXHmld13jvhI/wQRxCV2HHooG51Ig==
Date: Fri, 10 Jan 2020 10:09:00 +0000
Message-ID: <MN2PR11MB43668363A657E52D0E9C7AB2B5380@MN2PR11MB4366.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com;
x-originating-ip: [173.38.220.52]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cc3dc877-0806-442e-1f9a-08d795b51d23
x-ms-traffictypediagnostic: MN2PR11MB3982:
x-microsoft-antispam-prvs: <MN2PR11MB398285211D2DB042A35C636AB5380@MN2PR11MB3982.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02788FF38E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(396003)(136003)(346002)(366004)(39860400002)(51444003)(199004)(189003)(5660300002)(2906002)(6916009)(6506007)(33656002)(81166006)(81156014)(53546011)(8676002)(26005)(186003)(8936002)(66556008)(66476007)(71200400001)(316002)(66446008)(64756008)(66946007)(7696005)(9686003)(478600001)(55016002)(86362001)(52536014)(76116006); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3982; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB43668363A657E52D0E9C7AB2B5380MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: cc3dc877-0806-442e-1f9a-08d795b51d23
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jan 2020 10:09:00.4835 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Vlcj6zvwmc6aI0ZbZvQqdoaqu7v/kxNVq3EAzTzEAYNiHufmFjKfweWRXq+HJBOWhyfANTEoIbWvluh/bJ+GoQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3982
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod-ver-dt/PM3JVDFN8U1Z2E3sEHvCu56WAr8>
Subject: [Netmod-ver-dt] Meeting minutes [was Today's Ver DT meeting]
X-BeenThere: netmod-ver-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NetMod WG YANG Model Versioning Design Team <netmod-ver-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod-ver-dt>, <mailto:netmod-ver-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod-ver-dt/>
List-Post: <mailto:netmod-ver-dt@ietf.org>
List-Help: <mailto:netmod-ver-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod-ver-dt>, <mailto:netmod-ver-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 10:09:28 -0000

Points from the meeting what would be good for further discussion.  I think that a lot of these issues are probably still open and require further discussion:


  1.  It is clear that we need to standardize supporting different versions of a schema, but do we also want to support different schema families (e.g. vendor vs IETF vs OC)?
     *    My personal view is that it would be good if the model is general enough that this can be described (and I think that it might be useful if there are some examples given in the appendix).
  2.  For supporting non-native schema, there seem to be two approaches:

                                                    i.     always translate into the native schema, reads from say OC convert back from the native schema

                                                   ii.     store/persist configuration in the external schema (e.g. OC).  E.g. so a get-config on OC would only get back what had been written to the OC schema, not any other schema.

     *   Do we need to describe these two approaches?  For secondary schema does the model need to indicate which method is being performed, or is that purely an implementation detail?
  1.  Can both of the approaches described in (2) above work for different versions of the schema?  Or must these always be handled by dynamic translation.
  2.  What is the schema that the configuration is persisted in?  Should this automatically be tied to the default schema, or should this a separate data node, that could potentially be configurable?
     *   Related to this, how does the system handle changing the default schema?  Can that be done as part of a config request?  Does the connection have to be closed and re-opened?  Or should it be an RPC outside of configuration?
  3.  We need a concise way of describing the relationship between schema and datastores.  The current approach in the model is somewhat verbose, if every datastore needs to be described separately (but is somewhat aligned to YANG library style).
     *   Should we allow schema to only support some datastores (e.g. only operational, or only conventional configuration)?
  4.  Do we need secondary schema to have the ability to be defined or described as only being read-only?
     *   E.g. I can see a requirement to allow a client a configure a device using an older version of the schema.  I can also see a requirement of allowing a client to see what the instance data against a older version of a schema would look like in a more current version.  But I’m less convinced of the need to be able to convert a current configuration back into an older format.

Perhaps we can discuss some of these over email, and try and reach consensus, or otherwise we will pick up discussion in next week’s meeting.

Was there anything else that I missed?

Thanks,
Rob


From: Netmod-ver-dt <netmod-ver-dt-bounces@ietf.org> On Behalf Of Rob Wilton (rwilton)
Sent: 09 January 2020 14:11
To: netmod-ver-dt@ietf.org
Subject: [Netmod-ver-dt] Today's Ver DT meeting

Happy New Year!

From the last meeting I did say that I would work on producing some concrete examples of version selection 😊

I’ve started working on this, but more work is required.  I have attached one example that we can discuss in the meeting, more may be forthcoming before the meeting.

As part of that work, I’ve been thinking more about the default/secondary schema.

As a recap, I think that this is roughly where I am at:


  1.  The default schema:

     *   is the schema that is used if a client doesn’t specify a secondary schema during their connection (i.e. NETCONF capabilities negotiation, or RESTCONF path).
     *   is also the schema used for the persistent configuration (and the <startup> datastore). [I think that this is probably right, but might need further thought/discussion]


  1.  Secondary schema:

     *   are additional schema that clients can choose to use, and are specified during their session (i.e. NETCONF capabilities negotiation, or RESTCONF path).
     *   can probably take several forms:

        *   A filtered view on the default schema (e.g. if the default schema supported vendor native + IETF + OC schema) then a filtered schema view might just be the OC subset.  This should be simple to support since it broadly equivalent to a subtree filter on any get operations.
        *   A translated view on the default schema (e.g. perhaps a different version of a schema),  All reads/writes to a translated schema are converted to/from the default schema.  The configuration is persisted in the “default schema”.

     *   It might be useful if some of the secondary schema could be labelled as read-only views on the data.  E.g. it might be reasonable to see the configuration using a secondary schema non native version, but not allow it to be modified.

Attached example:

Example 1, a simple example of a server supporting two schema versions, and the client can choose between which version is used for the primary schema.

  *   One question related to this example is what happens to the current configuration if a client changes the default schema to a different version.  Does that configuration also automatically get translated as well?  What happens if that translation fails?
  *   Do we need a simpler way to reporting the per datastore schema?  E.g. should we have a special value to identify all datastores, or all conventional datastores?

Thanks,
Rob