Re: [netmod] Y34

Ladislav Lhotka <lhotka@nic.cz> Fri, 28 August 2015 13:34 UTC

Return-Path: <lhotka@nic.cz>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFEFC1B2D0D for <netmod@ietfa.amsl.com>; Fri, 28 Aug 2015 06:34:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.661
X-Spam-Level:
X-Spam-Status: No, score=-0.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JUopHGcFh0sW for <netmod@ietfa.amsl.com>; Fri, 28 Aug 2015 06:34:23 -0700 (PDT)
Received: from mail.nic.cz (mail.nic.cz [IPv6:2001:1488:800:400::400]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CBCB1B2C33 for <netmod@ietf.org>; Fri, 28 Aug 2015 06:34:23 -0700 (PDT)
Received: from birdie.labs.nic.cz (unknown [195.113.220.110]) by mail.nic.cz (Postfix) with ESMTPSA id E7AA318046C; Fri, 28 Aug 2015 15:34:21 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nic.cz; s=default; t=1440768861; bh=begVxI4CgFHFzreEiVedw/R86l1in0sSsbcD2UZJ9Gk=; h=From:Date:To; b=dQaqDIwPC0zYY7Vor2ZfAAGutnBkObwzsyLmDWSv+c1o7C/qZkYWkGFnvGwDQ4LRj Cy2QS2bcAu4GNeIkUJkS+YLKOdc2opMdIA+AXeoduEOyCB3Gknmz6CAQY4xkNyaVEx XBWJQE+P8NwCoY+vbgNkUGIj1JiM0IBF3o9+d/Qs=
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2102\))
From: Ladislav Lhotka <lhotka@nic.cz>
In-Reply-To: <55DFC6CF.7060105@hq.sk>
Date: Fri, 28 Aug 2015 15:34:25 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <6FA04E5F-F0FB-45F7-B17F-BDDA1C9C1D18@nic.cz>
References: <m2d1zn0zhm.fsf@dhcp-hotel-wired-13-fe.meeting.ietf.org> <D0153452-D5F5-4E3C-B3D7-7003ACC405EA@nic.cz> <CABCOCHSqbZfKRqGjT1rsphRnw0tYdR3uT=mFvTvJYXMwL3N2uw@mail.gmail.com> <5497CE3E-19A7-4AAC-AE32-AFC9BC2451F1@nic.cz> <CABCOCHRoA9-BP7=OvUGdvXNuowPUty4xy6iai6Q6dVOjD5iGbQ@mail.gmail.com> <06C8EE42-B70D-40A7-8B16-053D37378043@nic.cz> <CABCOCHRS-JF8UK+9fQ=yvZy9ttcj3j6oJn0n3Co6f7kB0tpFgA@mail.gmail.com> <F990644A-4CBE-43D5-AB2B-A20E54A91A65@nic.cz> <20150720210041.GA17614@elstar.local> <4D704311-D5B7-43F3-BD23-C13D5289CF46@nic.cz> <20150721074428.GC18607@elstar.local> <55DFC6CF.7060105@hq.sk>
To: Robert Varga <nite@hq.sk>
X-Mailer: Apple Mail (2.2102)
X-Virus-Scanned: clamav-milter 0.98.7 at mail
X-Virus-Status: Clean
Archived-At: <http://mailarchive.ietf.org/arch/msg/netmod/6WQC75SLrVSkYqys9TR8r01pBlY>
Cc: NETMOD Working Group <netmod@ietf.org>
Subject: Re: [netmod] Y34
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 13:34:24 -0000

Hi Robert,
> On 28 Aug 2015, at 04:26, Robert Varga <nite@hq.sk> wrote:
> 
> On 07/21/2015 09:44 AM, Juergen Schoenwaelder wrote:
>> Lada, you can't simply 'mount' a data model into a different place.
>> Think about paths in must or when expressions, or think about paths
>> contraints in leafrefs etc
> 
> In ODL we already have a language extension which does this. Semantically it embeds the conceptual 'root' node into container/list item. That item becomes the logical root against which all expressions in the embedded models are evaluated against, e.g. it is its own little world, no constraints coming in or out of it. While incoming references could be done (by just crossing the embedding item), we have not found a use case for it yet.

Yes, I think this could work. Two questions:

1. Is it possible to graft the same module multiple times in different places, perhaps in different revisions and with different features?

2. Can you identify a *set* of modules that are chrooted this way? For example, can you say you want to have a common root for ietf-interfaces, ietf-ip and ietf-system, rather than putting each module in its separate little world?

Thanks, Lada

> 
> This works rather well for providing a 'pass-through' function through a network controller down to individual devices: the devices themselves are represented as nodes in the topology model (exposed on the northbound) and a container holding the 'mount-point'. All operations in the mount-point space are mapped to NETCONF operations on the device (and hence it is the device itself who enforces constraints and referential integrity).
> 
> Bye,
> Robert
> 

--
Ladislav Lhotka, CZ.NIC Labs
PGP Key ID: E74E8C0C