Re: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 30 June 2023 17:09 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13B46C151996 for <netmod@ietfa.amsl.com>; Fri, 30 Jun 2023 10:09:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.584
X-Spam-Level:
X-Spam-Status: No, score=-9.584 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="bMlTIRUz"; dkim=pass (1024-bit key) header.d=cisco.com header.b="dsfdmRNX"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y5Gfjv8EGnNr for <netmod@ietfa.amsl.com>; Fri, 30 Jun 2023 10:09:26 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF05AC151995 for <netmod@ietf.org>; Fri, 30 Jun 2023 10:09:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=97878; q=dns/txt; s=iport; t=1688144965; x=1689354565; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=RTaymov9w9l96oPXyjvh3LHdnDALAK1USb0WMDDROp0=; b=bMlTIRUzKOoyzlS4bXZsE7FKxlStyvMf/g/L9DjSB3cSz+ShRe3r9YF2 UaB1qbxZoxvkLCbUe6mwZ05TJnz0c8Yk7JvKIFP+sF1Ch9HRJutiV0ckE ED/yO3krkprAv/ufKuFt/Kv2Y0gEjG3xziwZWb1NSvpO3XHs8zOcHzvfo 8=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:MPNVFRR6PuqknuRmPRN6qpbmxNpso3DLVj580XJvo7tKdqLm+IztI wmEo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHldu20/y1/bXYYh5Dg3y2ZrYhZ BmzpB/a49EfmpAqar5k0wbAuHJOZ+VQyCtkJEnGmRH664b48Mto8j9bvLQq8MsobA==
IronPort-Data: A9a23:mTomrq2idw6x6J9NNPbD5alxkn2cJEfYwER7XKvMYLTBsI5bpzUGm GRJWGyCaKyINDH2LosiYYuwoEgDup+DyYc2TlRk3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKiTradUsxNbVU8Enx510k7w7RRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMai4oFN8QlY3pur2uVvIF95 oRW7cGJVlJ8VkHMsLx1vxhwGiV6O+hN/6XKZCb5us2IxEqAeHzpqxlsJBhpZstDpKAuWicXr q1wxDMlNnhvg8qs37O/Vu5qrs8iN8LseogYvxmMyBmAV6t+Ec+TGP2iCdlw+Rgiq+sRB8/iN scaWxoxfjnqQhASNQJCYH45tL742iagG9FCk3qTqLYy5GT7zQFt3v7qKtW9RzCRbcxRmkDdr WXc8iGnRBobL9eYjzGC9xpAm9MjgwuidLwRKoSyy8dO3kGwl2A9WQZOCGKk9KzRZlGFZ/pTL Ekd+ywLpKc09VC2QtSVY/FeiCPa1vL7c4cOe9DW+D1h2YKPuVbEWjRsoippLY146Z5nHVTGw 3fUx7vU6SpTXKp5oJ533pidtze7PyR9wYQqOnJcEVBtDzUOXOgOYv/nR9JnFuu+icf4XG+2y DGRpy94jLIW5SLq60lZ1Q6e695PjsGWJuLQ2ukxdjn1hu+eTNX0D7FEEXCBsZ59wH+xFzFtR kQslcmE9/wpBpqQjiGLS+hlNOj3t6bdbmaA3QUwQ8JJG9GRF5iLI9g4DNZWeh8BDyr4UWSBj LL74FkIv8YDYBNGk4cuOdrrYyjV8UQQPY21Cq+LBja/SpNwbwSAtDp/flKd2nuFraTfuf9XB HtvSu71VSxyIf0+lFKeHr5BuZd1nXpW7T2IGvjGI+GPjOD2iIi9E+lVaTNjr4kRscu5neki2 48OaJfUkU8HCraWj+u+2dd7EG3m5EMTXPjeg8dWbeWEZAFhHQkc5zX5mNvNp6QNc3xpq9r1
IronPort-HdrOrdr: A9a23:+etZRq5pxOGHKYcBBwPXwXqBI+orL9Y04lQ7vn2ZFiY1TiXIra 6TdaoguiMc0AxhJ03I+errBEGBKUmskqKdkrNhQ4tKPTOW9VdASbsD0WKM+UyaJ8STzJ856U 4kSdkDNDSSNyk3sS+Z2njDLz9I+rDum8zY5pa9854ud3AWV0gK1XYeNu/vKDwPeOAwP+tBKH Pz3Lsim9OnQxkqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uHQ9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cyzpAJb4RG4FqjgpF4t1H22xa1e UkZC1Qe/ib3kmhPV1dZyGdnDUIngxerUMKgmXo8EcL6faJNA7STfAxyr6wtnDimhIdVBYW6t MT40uJ85VQFh/OhyL7+pzBUAxrjFO9pT44nfcUlGE3a/pXVFZ9l/1owKpuKuZIIAvqrIQ8VO V+BsDV4/hbNVuccnDCp2FqhNihRG46EBuKSlUL/pX96UkdoFlpi08DgMAPlHYJ85wwD5FC+u TfK6xt0LVDVNUfY65xDPoIBcG3FmvOSxTRN3/6GyWtKIgXf3bW75Ln6rQ84++nPJQO0ZspgZ zEFEhVsGYjEniefvFmHKc7hiwlbF/NKAgFkPsulKSRkoeMNobWDQ==
X-Talos-CUID: 9a23:DVLea2nOwvvVFmNWmgvO7Amq9//XOSTx8nTuGkWFMEI3VJ7ERXHB4/s5qtU7zg==
X-Talos-MUID: 9a23:IKLZMQylL7zWab23md2cXzr30YyaqIGBGm0mzo8/h5iJNh5QZSWwphW6H4Byfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 30 Jun 2023 17:09:24 +0000
Received: from alln-opgw-3.cisco.com (alln-opgw-3.cisco.com [173.37.147.251]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 35UH9NXn011793 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <netmod@ietf.org>; Fri, 30 Jun 2023 17:09:23 GMT
Authentication-Results: alln-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,171,1684800000"; d="scan'208,217";a="3691869"
Received: from mail-bn8nam12lp2176.outbound.protection.outlook.com (HELO NAM12-BN8-obe.outbound.protection.outlook.com) ([104.47.55.176]) by alln-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jun 2023 17:09:23 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SNGib0rgvIilrs6TpTyehW0daYuqnewlstHVLlNWS8yqGVxHqFAd5YxS0/+w5LFENpyafVfAhMPtw2K2/L/1M8yLdbFzuObfd0T7D+IUxieqhqC0bvvYWKauf5yR/00rXBi33d2PYbftx8IzVXsrGsGmBscI1hfOF2ZBeuPUrsglTU1VlCLgXqZtazrb9AFQNVo6UKTGO2LsFHNqQIAixvjp9SOSuKyZZniUHBLNiXT5PTuXet1T2yv2ZR6ahFBR7wPS/pqIzL7veweeBC3JeYw556n+TnBuJwFkDPxrQVZSRg7QBOmvMAOKuG2k0ww6KrvgduOqPG/6b7rdYHrcug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RTaymov9w9l96oPXyjvh3LHdnDALAK1USb0WMDDROp0=; b=eT92w1CXsMjl1a5VoW2QR0AX5LwMay0RAWAuvYmL/URsCoP03EO0T/PUZIKyYOboXH+EhHO2mc4JI+4StlZ5mQjm78Ctzzv4XbkLoS3HRkKUwAjL0ur1Zs4fNEyr0Ybbqsw7vKnAYnFkBaiIrPAXTV6+sfzrM9NueJnt4+QgvVWQGTusP+p92sA//yBHAR4JhIcvu5+Qa10r1OfHKBkLbfojaXiJq/fxGA5mAhX0ZZeaWx5FaqUSPx+gSilESjxu1SIAcNnpl8L0A72E4+wc5gNr2ILRG0WHtPE5iKD1fXneFCXkc3YHhxDZVbJKpwFjb5nhYBTPWa4K4NeGg1aqRg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RTaymov9w9l96oPXyjvh3LHdnDALAK1USb0WMDDROp0=; b=dsfdmRNXWRDa5Sc3hzqPDWwIYsob43N+SkrP8qREhZaUIP6HMc6a4IPyDrfPnqrQQw7kWMkMgSVbmlrAahwOB67EAtPmev1hHfV4RlFpFwaydV400TCCTVsADHWy/8r0HBBKqUUYEjG/kzJ9VLCg2/Ymb9q8Qm6eld/blY0wdCQ=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by SN7PR11MB7419.namprd11.prod.outlook.com (2603:10b6:806:34d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6544.19; Fri, 30 Jun 2023 17:09:20 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::a6a3:7e3b:903b:2035%5]) with mapi id 15.20.6544.019; Fri, 30 Jun 2023 17:09:20 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "maqiufang (A)" <maqiufang1@huawei.com>
CC: Kent Watsen <kent+ietf@watsen.net>, "Jan Lindblad (jlindbla)" <jlindbla@cisco.com>, Jürgen Schönwälder <jschoenwaelder@constructor.university>, Andy Bierman <andy@yumaworks.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt
Thread-Index: AQHZlMteKBPWLGKfl0GNBpoEiFNd7693RzEAgAtgGQCAIPGoEA==
Date: Fri, 30 Jun 2023 17:09:20 +0000
Message-ID: <BY5PR11MB4196386EEC680EC0D3F2E844B52AA@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <9a7d1b8bc5a84ed086816c0e64a6b869@huawei.com> <0100018878be1759-3cc2ba8d-7a67-4c6e-88c6-abfd98441495-000000@email.amazonses.com> <BY5PR11MB41969B4B6E51E261F0404077B54EA@BY5PR11MB4196.namprd11.prod.outlook.com> <fd193929826847af8d2eadf56c8333c5@huawei.com>
In-Reply-To: <fd193929826847af8d2eadf56c8333c5@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|SN7PR11MB7419:EE_
x-ms-office365-filtering-correlation-id: ff1b120b-f9af-4989-c587-08db798cbecb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(346002)(39860400002)(136003)(366004)(376002)(396003)(451199021)(55016003)(66574015)(83380400001)(15650500001)(30864003)(38070700005)(2906002)(166002)(122000001)(38100700002)(9326002)(8936002)(8676002)(5660300002)(52536014)(86362001)(71200400001)(54906003)(966005)(41300700001)(76116006)(66946007)(66556008)(66476007)(66446008)(64756008)(6916009)(4326008)(316002)(7696005)(33656002)(478600001)(186003)(53546011)(9686003)(6506007)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4196386EEC680EC0D3F2E844B52AABY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff1b120b-f9af-4989-c587-08db798cbecb
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jun 2023 17:09:20.5880 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mc9cmSjGut3gTXTv7OHiGZTGmiX09OWewfonOOugO233raljTo1NyNbk1EDCk7rVsHFtYpR8n1+NOWPm3eybwQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB7419
X-Outbound-SMTP-Client: 173.37.147.251, alln-opgw-3.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/1lkA3LylAFQ11q6QPzs-G5AL174>
Subject: Re: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Jun 2023 17:09:31 -0000

Hi Qiufang,

It may be the WG understanding has moved on, but the latest version of the document hasn’t quite caught up, or otherwise I don’t find it clear, or seem to take very different interpretation of it.

Please see inline … (this is all with reference to -07).


From: maqiufang (A) <maqiufang1@huawei.com>
Sent: 09 June 2023 16:39
To: Rob Wilton (rwilton) <rwilton@cisco.com>
Cc: Kent Watsen <kent+ietf@watsen.net>; Jan Lindblad (jlindbla) <jlindbla@cisco.com>; Jürgen Schönwälder <jschoenwaelder@constructor.university>; Andy Bierman <andy@yumaworks.com>; netmod@ietf.org
Subject: RE: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt

Hi, Rob

Thanks for sharing your concerns, but I think there might be some misunderstanding that needs to be clarified, please see my reply inline.

From: Rob Wilton (rwilton) [mailto:rwilton=40cisco.com@dmarc.ietf.org]
Sent: Friday, June 2, 2023 7:01 PM
To: Kent Watsen <kent+ietf@watsen.net<mailto:kent+ietf@watsen.net>>; Jan Lindblad (jlindbla) <jlindbla@cisco.com<mailto:jlindbla@cisco.com>>; Jürgen Schönwälder <jschoenwaelder@constructor.university<mailto:jschoenwaelder@constructor.university>>; Andy Bierman <andy@yumaworks.com<mailto:andy@yumaworks.com>>
Cc: maqiufang (A) <maqiufang1@huawei.com<mailto:maqiufang1@huawei.com>>; netmod@ietf.org<mailto:netmod@ietf.org>
Subject: RE: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt

Hi Kent, all,

Writing as a contributor, I still have strong concerns with this draft.

From a YANG architecture perspective, I believe that the contents of the running datastore should be entirely under the client’s control, and servers should accept any valid configuration, and be able to move from any valid configuration to any other valid configuration.  We also already have the server datastore draft that I think should be the mechanism to allow a server to include server-controlled configuration before it is merged with running and validated as intended, that is somewhat outside the client’s control.  I.e., I think that having a clean split of ownership and responsibilities between a running datastore (managed by the client) and other datastores (e.g., intended and system-controlled) managed by the server is a good clean architecture.
I agree with you that the client should have fully control over the contents of the running datasore, but I don't see this draft(-07) conflicting with that goal. Maybe we should make it more explicit in the document, but it is already the case the immutable configuration can only be created by the system (and present in <system>)
[Rob Wilton (rwilton)]
I think that the document is unclear about how it interplays with the system datastore, e.g., I find very few references to the system datastore, so I think that it would be helpful for that to be clarified.


E.g., section 1.2, starts with: “ The "immutable" concept defined in this document only documents existing write access restrictions to writable datastores.”, which I read as saying that the immutable flag is purely about <startup>/<candidate>/<running> datastores because <system> and <intended> are not writable datastores (as per RFC 8342, section 5), but from your comments below, I don’t think that is now the intent.

Further, even just having the server creating immutable configuration in <system>, and allowing the client to theoretically have complete control over what is in <running>, can still cause the server to reject config changes to running if <running> + <system> is merged to <intended> and the “immutable” configuration in <system> means that <intended> fails to validate, hence causing the change to <running> to be rejected.

If the immutable configuration is always immutable, then that is probably okay, since that configuration will always have been rejected.  But it isn’t clear to me what actual configuration is going to be marked at immutable.  E.g., could this include certificates that you don’t want the client to be able to change?  If so, what happens if the client copies the certificate into <running> to fulfil a leafref dependencies, and then the system certificate gets updated by an out of bound process.  The copy of the certificate in system would have changed and now it would be different and conflict with the version of the certificate in running.

I think that it would be useful to have an example list of configurations that we expect to be handled this way.  I.e., to ensure that add


, other cases like the client creates a node instance but cannot modify that afterwards is the non-transactional behaviour we’ve discussed before and should be avoided.
[Rob Wilton (rwilton)]
I agree that this should be avoided, but section 2 of the document starts with:

2.  Solution Overview

   Already some servers handle immutable configuration data and will
   reject any attempt to the update of such data.  This document allows
   the existing immutable data node or instance to be formally
   documented by YANG extension or metadata annotation rather than be
   written as plain text in the description statement.

I interpret this as: Some servers already do this (i.e., effectively breaking transactional behaviour), and that we accept that this happens and provide a way to document (and implicitly allow) this behaviour.  So, I think that this text also needs to be updated.


That said, only the server can create/update/delete immutable configuration, this has no impact to clients and <running> datastore by default.
[Rob Wilton (rwilton)]
Okay.


Only when the client would like to reference the immutable system configuration, will that configuration be copied and thus appears in <running>.
[Rob Wilton (rwilton)]
Okay – I presume this is just part of the proposed system datastore behaviour defined in the system datastore draft.


But by default, immutable configuration is only seen in <system> (if implements) and <operational>. Hopefully this clarifies.
[Rob Wilton (rwilton)]
Okay, but I don’t think that this is particularly clear in -07.




I appreciate that not all servers allow clients to fully control their running configuration, but I think that a better solution (for management clients) so to encourage servers to migrate towards the goal of giving full ownership over running to the clients.  Hence, I’m particularly concerned about standardizing a YANG meta-data annotation that allows, and arguably even encourages, vendors or other SDOs to build immutable properties into their management models that breaks this goal.  I think that we need to be really careful here that we are not creating yet another fork of NETCONF/YANG with a fairly fundamentally different architecture to what we are currently aiming for.

As I mentioned above, I think it’s not our intention to break the goal of giving full ownership over running to the clients. It is still about the system-controlled configuration immutability declaration. This does not necessarily mean that we are encouraging such behaviour, the introduction section has also states that:

” Immutability is an existing model handling practice.  While in some
  cases it is needed, it also has disadvantages, therefore it MUST be
  avoided wherever possible.”
Would this be sufficient from your perspective?
[Rob Wilton (rwilton)]
So, really, what the immutable flag means is that for a data node in system then the server will reject any attempts by the client to configure a different value.

If this is the case, then I’m not sure that I understand the value of the “extension immutable”, can you give examples of where this would be useful please?



I am somewhat more amenable to an annotation that indicates that if a particular leaf is modified it will potentially cause a more impactful change, by effectively causing a delete and re-add of the parent list/container (changing interface type could be an example of this).  But I don’t think that this stop clients from modifying the leaf to a new valid state, instead, the server should perform any necessary orchestration steps to apply the configuration rather than pushing that as extra orchestrations steps onto the client.  There is also part of me that questions how useful such an annotation or metadata would really be given that there are many other data nodes that have wide impact if they are modified.  So, from this perspective, I think that “immutable” is perhaps the wrong name.
After the previous discussion on the list, we were trying to avoid the non-transactional APIs, and now we are only targeting immutable configuration with the lifecycle totally driven by the system.
[Rob Wilton (rwilton)]
Okay, so from your comments, am I right to understand that the intention of the “immutable” flag is to mark a subset of the configuration in <system> (if it exists) as configuration that can never be overwritten by the client?


So I tend to agree with your proposal to define a flag to indicate a leaf is modified will potentially cause the server to delete it and recreate with its parent node. And I also agree this should not be called “immutable” anymore. But that is not we are trying to achieve in the document now, and is not in the scope of the current document.
[Rob Wilton (rwilton)]
Okay.


Finally, I still question the assertion “Clients believe that "config true" nodes are modifiable even though the server is allowed to reject such a modification at any time.“ and regard it as possibly a bit disingenuous or perhaps being overplayed.  I’m not sure whether this assertion is coming from the YANG language (i.e., does RFC 7950 state this – I couldn’t quickly find it), or from NETCONF?  To me, it makes sense that a NETCONF server can reject a configuration change for various reasons (e.g., invalid yang, out of memory, some bug or flaw in the implementation), but I don’t think that really means that it is okay for a server (from a client’s perspective) to arbitrarily reject configuration.  A slightly strawman, but, e.g., would it be valid for a server to reject a request based on whether a generated random number was odd or even?  Can a server reject a config request because although the YANG schema indicates that it should be a number, the server has decided that sometimes it will only accept the item as string?  Perhaps according to the NETCONF spec these are both valid, but I’m not sure that either of these behaviours are helpful to clients or within the spirit of what is expected.

I think it might be the “at any time” that is overplayed. In NETCONF RFC(https://datatracker.ietf.org/doc/html/rfc6241#section-7) it already mentions that

“A protocol operation can fail for various reasons, including
   "operation not supported".  An initiator SHOULD NOT assume that any
   operation will always succeed.”
Immutable configuration is something the server always rejects, I think it a stable behaviour.
[Rob Wilton (rwilton)]
Okay.



I do think that this is useful and interesting topic to have further discussion, particularly because of the external SDO interest - possibly a dedicated interim may be helpful – if we can get the key parties together?  As to adoption, I’m not necessarily opposed to this because there is definitely interest in this work, but personally I would like to see quite significant changes, and I suspect that more work is required to reach consensus.
Thank you, Rob. I don't object to a dedicated interim meeting personally, but before that I think it might be helpful for us to make sure that we have the same understanding about our scope of immutable configuration, agreed?
[Rob Wilton (rwilton)]
Absolutely agree that we should agree the scope.

Also, with a narrowed scope, I want to ensure that this annotation of behaviour description has enough value to justify the additional complexity.  Possibly, if the WG decides to adopt this work, it might be worth considering whether this would be better documented as part of the system datastore draft?

Regards,
Rob



Regards,
Rob

Best Regards,
Qiufang

From: Kent Watsen <kent+ietf@watsen.net<mailto:kent+ietf@watsen.net>>
Sent: 01 June 2023 21:55
To: Jan Lindblad (jlindbla) <jlindbla@cisco.com<mailto:jlindbla@cisco.com>>; Jürgen Schönwälder <jschoenwaelder@constructor.university<mailto:jschoenwaelder@constructor.university>>; Andy Bierman <andy@yumaworks.com<mailto:andy@yumaworks.com>>; Rob Wilton (rwilton) <rwilton@cisco.com<mailto:rwilton@cisco.com>>
Cc: maqiufang (A) <maqiufang1=40huawei.com@dmarc.ietf.org<mailto:maqiufang1=40huawei.com@dmarc.ietf.org>>; netmod@ietf.org<mailto:netmod@ietf.org>
Subject: Re: [netmod] New Version Notification for draft-ma-netmod-immutable-flag-07.txt

Hi Quifang,

The latest update looks very good to me - IMO, ready for adoption.

Jan, Jurgen, Andy, Rob - can you confirm that your concerns have been addressed?

Thanks,
Kent



On May 25, 2023, at 8:16 AM, maqiufang (A) <maqiufang1=40huawei.com@dmarc.ietf.org<mailto:maqiufang1=40huawei.com@dmarc.ietf.org>> wrote:

Hi, all
This version reflects the input we've received from the mailing list.

Thank you everyone(Jan, Rob, Kent, Jürgen, Andy, Frank et al.) for your great comments and suggestions!
Please see if the following updates are good for you:
   *  Use a Boolean type for the immutable value in YANG extension and
      metadata annotation
   *  Define a "with-immutable" parameter and state that immutable
      metadata annotation is not included in a response unless a client
      explicitly requests them with a "with-immutable" parameter
   *  reword the abstract and related introduction section to highlight
      immutable flag is descriptive
   *  Add a new section to define immutability of interior nodes, and
      merge with "Inheritance of Immutable configuration" section
   *  Add a new section to define what the immutable flag means for each
      YANG data node
   *  Define the "immutable flag" term.
   *  Add an item in the open issues tracking: Should the "immutable"
      metadata annotation also be returned for nodes described as
      immutable in the YANG schema so that there is a single source of
      truth.

Thanks a lot.

Best Regards,
Qiufang

-----Original Message-----
From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> [mailto:internet-drafts@ietf.org]
Sent: Thursday, May 25, 2023 4:52 PM
To: Balazs Lengyel <balazs.lengyel@ericsson.com<mailto:balazs.lengyel@ericsson.com>>; Hongwei Li <flycoolman@gmail.com<mailto:flycoolman@gmail.com>>; Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huawei.com>>; Qin Wu <bill.wu@huawei.com<mailto:bill.wu@huawei.com>>; maqiufang (A) <maqiufang1@huawei.com<mailto:maqiufang1@huawei.com>>
Subject: New Version Notification for draft-ma-netmod-immutable-flag-07.txt


A new version of I-D, draft-ma-netmod-immutable-flag-07.txt
has been successfully submitted by Qiufang Ma and posted to the IETF repository.

Name:                  draft-ma-netmod-immutable-flag
Revision:              07
Title:                      YANG Extension and Metadata Annotation for Immutable Flag
Document date:               2023-05-25
Group:                  Individual Submission
Pages:                   24
URL:            https://www.ietf.org/archive/id/draft-ma-netmod-immutable-flag-07.txt
Status:         https://datatracker.ietf.org/doc/draft-ma-netmod-immutable-flag/
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ma-netmod-immutable-flag
Diff:           https://author-tools.ietf.org/iddiff?url2=draft-ma-netmod-immutable-flag-07

Abstract:
   This document defines a way to formally document existing behavior,
   implemented by servers in production, on the immutability of some
   configuration nodes, using a YANG "extension" and a YANG metadata
   annotation, both called "immutable", which are collectively used to
   flag which data nodes are immutable.

   Clients may use "immutable" statements in the YANG, and annotations
   provided by the server, to know beforehand when certain otherwise
   valid configuration requests will cause the server to return an
   error.

   The immutable flag is descriptive, documenting existing behavior, not
   proscriptive, dictating server behavior.




The IETF Secretariat



_______________________________________________
netmod mailing list
netmod@ietf.org<mailto:netmod@ietf.org>
https://www.ietf.org/mailman/listinfo/netmod