Re: [netmod] Action and RPC statements

Phil Shafer <phil@juniper.net> Wed, 01 November 2017 06:36 UTC

Return-Path: <phil@juniper.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0F4113FDCC for <netmod@ietfa.amsl.com>; Tue, 31 Oct 2017 23:36:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level:
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H-iXVAIjiwm6 for <netmod@ietfa.amsl.com>; Tue, 31 Oct 2017 23:36:54 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0123.outbound.protection.outlook.com [104.47.37.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC63513FDC6 for <netmod@ietf.org>; Tue, 31 Oct 2017 23:36:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=I8QTxN7qkL1a8WSsxTXVbqMyO+UETzzBSDY0+Yj1o/Q=; b=Msf3eHFrlsr6Uu7jkh0uswPT7lBhekXCkicU95JmcI7qJIOrqLax119+tr3XxjqRxZBBC1V3a1ryrbRP4J95oCp0CMyQbmD+KhBZcmJlh74/Ovy/SsOI9QeDalt/LSwfxHtaLZDFM/W5eiGTQoRTvYbjWgxOYEVUoD9pwGdEVkc=
Received: from SN1PR05CA0037.namprd05.prod.outlook.com (10.163.68.175) by BLUPR0501MB2065.namprd05.prod.outlook.com (10.164.23.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.197.4; Wed, 1 Nov 2017 06:36:53 +0000
Received: from DM3NAM05FT042.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e51::200) by SN1PR05CA0037.outlook.office365.com (2a01:111:e400:5197::47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.197.4 via Frontend Transport; Wed, 1 Nov 2017 06:36:53 +0000
Authentication-Results: spf=softfail (sender IP is 66.129.239.12) smtp.mailfrom=juniper.net; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=fail action=none header.from=juniper.net;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.239.12 as permitted sender)
Received: from p-emfe01a-sac.jnpr.net (66.129.239.12) by DM3NAM05FT042.mail.protection.outlook.com (10.152.98.156) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256) id 15.20.197.9 via Frontend Transport; Wed, 1 Nov 2017 06:36:53 +0000
Received: from p-mailhub01.juniper.net (10.47.226.20) by p-emfe01a-sac.jnpr.net (172.24.192.21) with Microsoft SMTP Server (TLS) id 14.3.123.3; Tue, 31 Oct 2017 23:36:36 -0700
Received: from idle.juniper.net (idleski.juniper.net [172.25.4.26]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id vA16aXUH029261; Tue, 31 Oct 2017 23:36:34 -0700 (envelope-from phil@juniper.net)
Received: from idle.juniper.net (localhost [127.0.0.1]) by idle.juniper.net (8.15.2/8.15.2) with ESMTP id vA16aW1S027622; Wed, 1 Nov 2017 02:36:32 -0400 (EDT) (envelope-from phil@juniper.net)
Message-ID: <201711010636.vA16aW1S027622@idle.juniper.net>
From: Phil Shafer <phil@juniper.net>
To: Robert Wilton <rwilton@cisco.com>
CC: Kent Watsen <kwatsen@juniper.net>, Martin Bjorklund <mbj@tail-f.com>, "andy@yumaworks.com" <andy@yumaworks.com>, "netmod@ietf.org" <netmod@ietf.org>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
In-Reply-To: <d93512fd-0fd7-3ea0-7bee-b855acb42ce7@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <27620.1509518191.1@idle.juniper.net>
Date: Wed, 01 Nov 2017 02:36:31 -0400
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:66.129.239.12; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(979002)(6009001)(39860400002)(346002)(376002)(2980300002)(199003)(189002)(86362001)(6916009)(2810700001)(106466001)(50986999)(8936002)(478600001)(54356999)(105596002)(8676002)(76506005)(53416004)(81156014)(23726003)(68736007)(356003)(77096006)(229853002)(1076002)(69596002)(81166006)(316002)(8276002)(2906002)(189998001)(46406003)(305945005)(4326008)(16586007)(47776003)(97756001)(6246003)(2950100002)(7126002)(54906003)(53936002)(5660300001)(50466002)(7696004)(97736004)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB2065; H:p-emfe01a-sac.jnpr.net; FPR:; SPF:SoftFail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM05FT042; 1:Pime64+mCm7hgzh1r6wb1Z/Ngr5DFwUyrJj1t57O3O9GtuGN/xoeGzB9BVtpNC6D3zNiYSkns9iSGtXSBplbwzVCxLNRTKTu+MvIjupCygAaoUknG3Val8Be94ksm96z
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4446d3e4-cc19-4057-409c-08d520f2f093
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(4534020)(4602075)(2017052603199); SRVR:BLUPR0501MB2065;
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2065; 3:W+i4g+byHUc+3lz/p5+E0DL9vbm75S66SZAQrWR8qJdXjXjCvPOGKyOVJUzREHjES+u3boy9FZbqmzrZHRzeKnZLEkhBoRQ4r9yKL9ysnktOSqDixQJ0nZ6siZb6iCz/dPYvfcA4kgLwboDdIuz+Xky9kKaFj6K8l5uKax3dEODKIDMAZ2YZ5ZjOt2gpSdnZAxi9w2OPhU82F6rTkenucOV5xoSDk0o1pVyTcyG0OuT6TYZBMn+Zc7jQl3QK7BW/bggyQ1GxvOxy9PZMI3DtCXaXcDmLTVnaE0xizLwFUrelZpb5Pzl7JTUA/HO6VrjLX1kxesIZx3onYzNAxGop52drtvKImAGKYHPVHUgYhPc=; 25:5QNHltt4LhpxiODlTYlgWVj8GWmFWUQxZbkQXKAsPBvHUBAvo9+GM98/+wxq3nvxhOH/87EIDyYJllEzO0LV/gArnJZiuc/ggKWNL/+0lE93bQv7nTZ088YkcMgcdv69o5ap7/4aDXHH9KuL4RsjLx/9BuH9QxC5axGTBA/6m2lmsqNVcx5yLCryR50SlVmfsePgIcE89sgB4kieNZZtffiPFxMHXX8yAnlJQl8DyiB1AU4KbooqZX3ONIsDxJgA7keeG4XqLbmaDOVyvsUaLpSnklMVA83/vsrwrip6CFk6CEkLtubZAVHmN3mUUo4MXzihK95WAEiDfmEDQSKG9g==
X-MS-TrafficTypeDiagnostic: BLUPR0501MB2065:
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2065; 31:3ry4hYzh5U1vXQLGZamYZyvSOakgxJB0U/rmCfTu5VJ8z+bDWvQGs2tx47Hc5QphNyaw4ZSQvVl+JKkqMHpPEvs/ebYiYMuSmIrHxmnmpSa7EAg3s41RKTH3pr8x1KHYimU5p0TyahIXC5dwf8kHuWO/jvNeaSWBRcGTTsEykRxlexS9mUjjN8Xtgqh9zHYZtAM4YFLXKIQZiwpm4BqDMs/oIj0Uf4mOz05Wla8VU+s=; 20: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
X-Exchange-Antispam-Report-Test: UriScan:;
X-Microsoft-Antispam-PRVS: <BLUPR0501MB2065B84DD26D6C306F44B5AFC95F0@BLUPR0501MB2065.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(8121501046)(5005006)(3231020)(100000703101)(100105400095)(93006095)(93003095)(3002001)(10201501046)(6055026)(6041248)(20161123558100)(20161123564025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BLUPR0501MB2065; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BLUPR0501MB2065;
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2065; 4:q0xrLxOFtd8lgHltiukn73oVyehpKT9Ejwj2/ZiPn5xEJ5zxIWQm+8LWwXCXoL8ZXMdIkeiMecO4b8hNh/02ItAA/+G2yMM2RIUh+JWDQEXrwe7RnwRCsXwalIOgjE0et8rYsg/K0iE/pOn4KQQgHNo1ZHHT3frL//MQeZxNis4YtgDbzR2NGLqTpCZR2tH8EGPgFfkCAxptVz+LyaTxTaj9FZ4tay2tTZsI4bzNcVKkUl5Ho6tISYHvsCvzmRmLh05/xUe9Ww6bIyEQFP0Xiw==
X-Forefront-PRVS: 0478C23FE0
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2065; 23: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
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2065; 6:78WR5ZO7r/D9rl7YgBThHZT0Z+wYM9TkUpRs80WsK26RVgmByXPYFovuu9igCR9W6n5+52HfpwjlJ7N4Mk0BpDGWftr2WuVMLkZHIcGzv/nzTFZ3qBMqU+js8ONnKdD7bGOaekgKy2Hgdez6ZI733R5glv1hbdPUvehH8n6wwp1vdQTxxRv14FtlszprG5JtDIihL1jQVf/27V+74ey7Z+o9CytoFjoNlpkpkQ9eK40Zr9jFMnlmv/1iOAf0rEYIhVpkzDRZhZAuO+FzlpsWf/eRCt6ucoKs5VV0CBmgNhjXps+sXIWw7ssy++gLP0PWQbYjkqWp/nIUcCVEuPx1Vz1Gy39o6CznylGGQ58f8x4=; 5:tKfY8NdY8Z9xUmLMiAAndyMubQJP2A/3dSRRxrfNZcZoi73wLteivicg9xcEC1P9sBOY4K7bXUUXTtr+qpVpTls9w1Yu8AKbLh/8wmxbiCSWgjf6ykmluO+5coYNilEYaiSytkov+PuVoI2H6hK0UxoGDzNdg4HU8xoY8jUL9l4=; 24:/tjyicYwAdqtsMmP8yzOt2sMYAhYLxf1QD4RyICl3xw6Yerb/GStiEj2E5xwORy1nNUnwAwHEHYdh9Ubs+M41KFsmkyVs2FuWnPd2L13A7M=; 7:j1WDohdiXF2+7yQgMC9Q8xRuWLzPGh2GiIyM2HDuyChDDIA8L+QQEdH4ZhdBjCqFNWcCHAGkZ3nN+hFsbdmTRhUjcuW6OZgfZgY3c8DXefXyArZKXG66UnkFvP/y3+45o4cxCKCu1DuCAPqyBtfeKJuBlJg3RnfUb2FPgHVMxbVALQTpMDFsquQBY0DqLE7PhfcLYaDAXtBFYonvdWPWFP12CFEVcpcFXAtl2GWayqLoF0P+efK45YxDPL2pUyzz
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Nov 2017 06:36:53.0024 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4446d3e4-cc19-4057-409c-08d520f2f093
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.239.12]; Helo=[p-emfe01a-sac.jnpr.net]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB2065
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ZH50m3JsHGdCslCbro3mxbGms1A>
Subject: Re: [netmod] Action and RPC statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Nov 2017 06:36:57 -0000

Robert Wilton writes:
>ii) However, as far as I can see, it doesn't make sense for an action to 
>directly affect the contents of any configuration datastore, that should 
>be done via a purpose built rpc (like edit-config).

An example action would be to retrieve the  fingerprint of an ssh
key.  I might want to get the fingerprint of a key in <candidate>
before I commit it.

Or I could have an action that sets the SNMPv3 auth key to a random
value, and I want to invoke that action against <candidate>.

Seems like <startup> might also be an interesting place to target
actions, but I can't think of a good example.

There are always scenarios where something is useful, and the problem
with ruling it out is that it becomes needed at some later point.
We've a habit of ruling out things and later wishing we had them.

Is the easy fix to just put a datastore leaf under rpc/action and
have it default to operational?  Any specific RPC can define its
own datastore leaf of hard-code the database in the description
(explicitly or implicitly <operational>), but the <action> RPC only
gets this if we make a new parameter for it.

Thanks,
 Phil