Re: [netmod] [RTG-DIR] handling module incompatibility => handling module transition

Lou Berger <lberger@labn.net> Thu, 12 October 2017 11:33 UTC

Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE36A133229 for <netmod@ietfa.amsl.com>; Thu, 12 Oct 2017 04:33:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.699
X-Spam-Level:
X-Spam-Status: No, score=-4.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SawyYOXbC_-u for <netmod@ietfa.amsl.com>; Thu, 12 Oct 2017 04:33:11 -0700 (PDT)
Received: from gproxy9-pub.mail.unifiedlayer.com (gproxy9-pub.mail.unifiedlayer.com [69.89.20.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 140AC133221 for <netmod@ietf.org>; Thu, 12 Oct 2017 04:33:11 -0700 (PDT)
Received: from cmgw3 (unknown [10.0.90.84]) by gproxy9.mail.unifiedlayer.com (Postfix) with ESMTP id C9E8A1E07B4 for <netmod@ietf.org>; Thu, 12 Oct 2017 05:33:10 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmgw3 with id LbZ61w00j2SSUrH01bZ9QP; Thu, 12 Oct 2017 05:33:10 -0600
X-Authority-Analysis: v=2.2 cv=H76r+6Qi c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=02M-m0pO-4AA:10 a=r77TgQKjGQsHNAKrUKIA:9 a=AUd_NHdVAAAA:8 a=2HyfR_PSAAAA:8 a=uX8G0ybSAAAA:8 a=48vgC7mUAAAA:8 a=x80VczMnsuCSaJI8uN4A:9 a=9yr8KVdBzTrDuJX2:21 a=LlXhZ-qZHYRjd5_5:21 a=QEXdDO2ut3YA:10 a=EbTClS0bprYA:10 a=wU2YTnxGAAAA:8 a=wcU5tIeItnPeHyisM4EA:9 a=FZQf-a6q_S_zZExv:21 a=Ph0Lj2lIrCK3zuwf:21 a=RrarZzIY30Te7Avt:21 a=_W_S_7VecoQA:10 a=0zSPmqmPh2d1CTP8umvz:22 a=uNZJWEtFmtcl922f2nWS:22 a=w1C3t2QeGrPiZgrLijVG:22 a=Yz9wTY_ffGCQnEDHKrcv:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Type:MIME-Version:Subject:References:In-Reply-To: Message-ID:Date:CC:To:From:Sender:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=nrSHdctO3EdZJRoIUghOkY9RuX6O+ivae2YcwpORnQk=; b=aDYAx/gI/s1Lxt4/vPfa8P1h0c t2LQO18fOO+mVU1Do1OQAhr4fzKD/PF89RAlC1fmrmz6T4MmwffIX5LJljfU2KxF/pUpAcZW2GqBT RRYHNJPPbNwakVl5bpbJ+zp22;
Received: from pool-100-15-84-20.washdc.fios.verizon.net ([100.15.84.20]:55803 helo=[11.4.0.6]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from <lberger@labn.net>) id 1e2bje-001fjR-Lw; Thu, 12 Oct 2017 05:33:06 -0600
From: Lou Berger <lberger@labn.net>
To: Benoit Claise <bclaise@cisco.com>, NetMod WG <netmod@ietf.org>
CC: <rtg-dir@ietf.org>, <draft-acee-netmod-rfc8022bis@ietf.org>, <draft-wu-l3sm-rfc8049bis.all@ietf.org>
Date: Thu, 12 Oct 2017 07:33:04 -0400
Message-ID: <15f105bf980.27d3.9b4188e636579690ba6c69f2c8a0f1fd@labn.net>
In-Reply-To: <751fa015-a917-a104-f6c6-25cc9a5accba@cisco.com>
References: <caa884d9-9d71-e7ad-cffd-427b58750c58@labn.net> <751fa015-a917-a104-f6c6-25cc9a5accba@cisco.com>
User-Agent: AquaMail/1.11.0-568 (build: 101100004)
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----------15f105bfd50421d27d3d5b7299"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.84.20
X-Exim-ID: 1e2bje-001fjR-Lw
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-100-15-84-20.washdc.fios.verizon.net ([11.4.0.6]) [100.15.84.20]:55803
X-Source-Auth: lberger@labn.net
X-Email-Count: 8
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/slkWLVTf3ZQNGbxANPIU6Gp5SWw>
Subject: Re: [netmod] [RTG-DIR] handling module incompatibility => handling module transition
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Oct 2017 11:33:15 -0000

So circling back to the original question: what do we do about the non 
backward-compatible module being defined in rfc8049bis?

While being sympathetic to many of the comments made below as well as the 
"do over" concept, I find the comments about adhering to the rules of 7950 
compelling - which leads to renaming the module in the bis to ietf-l3vpn-svc-2.

It would be good to ensure that this is the consensus of the group before 
asking the authors make this change.

This change course doesn't solve the versioning issue discussed below, but 
this is not a new issue it's just the first time we'll actually executing 
the steps envisioned as part of the rules laid out in yang. My personal 
take away is that means that we should immediately start work on an 
extension defining along the lines of  ' obsolete|update' mentioned below.

Lou





On October 8, 2017 10:59:15 AM Benoit Claise <bclaise@cisco.com>; wrote:

> Dear all,
>
> Focusing on draft-wu-l3sm-rfc8049bis, the big problem is: RFC8049 is
> broken. The small problem is: trying to maintain backward compatibility.
> draft-wu-l3sm-rfc8049bis has rightly focused on the big problem.
>
> Let me extend the scope of this email thread from "handling module
> incompatibility" to "handling module incompatibility and NMDA transition".
> As I mentioned in the past (see "semver.org comparison of two YANG
> modules" email in NETMOD), I believe the IETF will have to change its
> way of working in terms of backward compatibility. See also the email
> "ietf-routing or ietf-routing-2? module naming convention for NMDA
> transition. Re: [netmod] upcoming adoptions" in NETMOD.
>
> However, we will have to tackle this discussion one day or the other:
> - we need _an automatic way_ to make the link between the YANG module in
> RFC8049 and the YANG module in draft-wu-l3sm-rfc8049bis, or any non
> backward compatible YANG modules.
> - we need _an automatic way_ to make the link between the YANG module in
> RFC8022 and the YANG module in draft-acee-netmod-rfc8022bis, or any new
> YANG module names used for NMDA transition.
> Note: actually, we face two different problems. draft-wu-l3sm-rfc8049bis
> might be declared backward incompatible with RFC8049, while RFC8022bis
> is backward compatible with RFC8022. The RFC8022bis went for a new YANG
> module name ietf-routing-2 to avoid to document the -state tree (as
> deprecated), based on the argument that ietf-routing is not yet implemented.
>
> Which solutions do we have from here?
> #1. We keep the same module name and express that the YANG module in
> draft-wu-l3sm-rfc8049bis is not backward compatible with the RFC8049
> one. This is the openconfig way. See draft-clacla-netmod-model-catalog
> (and draft-openconfig-netmod-model-catalog before)
>
>        // extension statements
>           extension openconfig-version {
>             argument "semver" {
>               yin-element false;
>             }
>             description
>               "The OpenConfig version number for the module. This is
>               expressed as a semantic version number of the form:
>                 x.y.z
>                where:
>                 * x corresponds to the major version,
>                 * y corresponds to a minor version,
>                 * z corresponds to a patch version.
>               This version corresponds to the model file within which it is
>               defined, and does not cover the whole set of OpenConfig models.
>               Where several modules are used to build up a single block of
>               functionality, the same module version is specified across each
>               file that makes up the module.
>
>               A major version number of 0 indicates that this model is still
>               in development (whether within OpenConfig or with industry
>               partners), and is potentially subject to change.
>
>               Following a release of major version 1, all modules will
>               increment major revision number where backwards incompatible
>               changes to the model are made.
>
>               The minor version is changed when features are added to the
>               model that do not impact current clients use of the model.
>
>               The patch-level version is incremented when non-feature changes
>               (such as bugfixes or clarifications to human-readable
>               descriptions that do not impact model functionality) are made
>               that maintain backwards compatibility.
>
>               The version number is stored in the module meta-data.";
>           }
>
> Similarly, we always keep the same YANG module name in case of NMDA
> transition. So ietf-routing-2 should be changed back to ietf-routing.
> The email thread "[Rtg-dt-yang-arch] ietf-routing or ietf-routing-2?
> module naming convention for NMDA transition. Re: [netmod] upcoming
> adoptions" seems to go in that direction.
>
> #2. Or we have a different module name, let's say ietf-l3vpn-svc-2 or
> ietf-routing-2 but then, how do we make the link with the previous module?
> Then ...  What? We create extension that will link the
> draft-wu-l3sm-rfc8049bis YANG module to the RFC8049 YANG module? Same
> principle as #1, but just more complex.
> Or we have a new YANG keyword (this implies YANG 2.0)
>
>     <CODE BEGINS>file"ietf-l3vpn-svc@2017-09-14.yang";
>     module ietf-l3vpn-svc-2 {
>       yang-version 1.1;
>       namespace "urn:ietf:params:xml:ns:yang:ietf-l3vpn-svc";
>       prefix l3vpn-svc;
>       *_obsolete|update _*ietf-l3vpn-svc@2017-01-2
>
> And whose responsibility is this to warn/push all authors of
> ietf-routing YANG modules to move to ietf-routing-2? (*)
>
> The following are non solution IMO:
> - Going from the draft-wu-l3sm-rfc8049bis YANG _module _to the
> draft-wu-l3sm-rfc8049bis _document _to lookup the IETF "obsolete" flag
> in order to understand that the RFC8049 YANG module is obsolete is not
> an automatic solution.
> - Using the yangcatalog.org might be a solution as we track the derived
> semantic, but this is just an offline trick. This is not what I call
> "automatic way"
> - Using the YANG module description field might be interesting, but
> again this is not an "automatic way":
>
>       description
>        "This YANG module defines a generic service configuration
>         model for Layer 3 VPNs. This model is common across all
>         vendor implementations. This obsoletes the RFC8049 YANG
>         module, ietf-l3vpn-svc@2017-01-2";
>       revision 2017-09-14 {
>        description
>         "First revision ofRFC8049 <https://tools.ietf.org/html/rfc8049>.";;
>        reference
>         "RFC xxxx: YANG Data Model for L3VPN Service Delivery";
>
>
> In conclusion, I believe openconfig got this right and that solution #1
> is the solution to go ... while waiting for a new YANG keyword in YANG 2.0
>
> (*) If you want to change the module from ietf-routing to
> ietf-routing-2, then you should follow with all authors of dependent
> modules to make sure they transition to ietf-routing-2
> In the yangcatalog.org, because I needed the information as OPS AD, we
> created a small script to get that authors list for IETF drafts. For the
> ietf-routing, this produces the following
> {
>      "output": {
>          "author-email": [
> "draft-ietf-mpls-static-yang@ietf.org";,
> "draft-ietf-mpls-base-yang@ietf.org";,
> "draft-ietf-ospf-sr-yang@ietf.org";,
> "draft-ietf-pim-yang@ietf.org";,
> "draft-ietf-bier-bier-yang@ietf.org";,
> "draft-zhang-bier-te-yang@ietf.org";,
> "draft-ietf-isis-yang-isis-cfg@ietf.org";,
> "draft-ietf-teas-yang-rsvp-te@ietf.org";,
> "draft-ietf-mpls-mldp-yang@ietf.org";,
> "draft-zhao-pim-igmp-mld-snooping-yang@ietf.org";,
> "draft-ietf-isis-sr-yang@ietf.org";,
> "draft-acee-rtgwg-yang-rib-extend@ietf.org";,
> "draft-ietf-pim-igmp-mld-yang@ietf.org";,
> "draft-ietf-i2rs-fb-rib-data-model@ietf.org";,
> "draft-ietf-ospf-yang@ietf.org";,
> "draft-ietf-rtgwg-yang-rip@ietf.org";,
> "draft-ietf-spring-sr-yang@ietf.org";,
> "draft-ietf-teas-yang-rsvp@ietf.org";,
> "draft-ietf-i2rs-pkt-eca-data-model@ietf.org";,
> "draft-ietf-mpls-ldp-yang@ietf.org";,
> "draft-ietf-bfd-yang@ietf.org";,
> "draft-ietf-pim-msdp-yang@ietf.org";
>          ]
>      }
> }
>
> Fortunately, we only deal with IETF dependent YANG modules in case of
> the ietf-routing. That's an easier case.
> If we would change ietf-interfaces to ietf-interfaces-2, we would have
> an cross SDO issue ... Btw, there are no automatic ways to extract the
> authors of YANG modules from different SDOs: it's only a metadata that
> that the different SDOs should insert in the yangcatalog. So we would
> have to rely on liaisons or direct emails, assuming we know the authors.
> Time consuming, believe me.
>
> Regards, Benoit
>> Hi,
>>
>>      As part of the my Routing Directorate review of
>> draft-wu-l3sm-rfc8049bis I noted that there were several incompatible
>> changes being made to the ietf-l3vpn-svc module without changing the
>> name.  I raised this with the YANG doctors and others involved with the
>> draft and it surfaced some topics which really should be discussed here
>> in NetMod.
>>
>> The background (as explained off-list by others, so I hope I have it
>> right)  is that one of the YANG Doctors noted that RFC8049 was broken
>> and could not be implemented as defined, and therefore a fix was
>> needed.  L3SM has concluded so the fix is in the individual draft
>> draft-wu-l3sm-rfc8049bis.  Since the rfc8049 version of ietf-l3vpn-svc
>> module could not be implemented, the feeling by the YANG Dr was that
>> even though the new module is incompatible with the original definition
>> the module the rule defined in Section 11 of YANG 1.1 (or section 10 of
>> RFC 6020) didn't have to be followed and the same name could be used.
>>
>> In the subsequent discussion with the YANG Drs., the general discussion
>> was heading down the path of using a new module name, and thereby not
>> violating YANG module update rules.  This lead us back to the a similar
>> discussion we've been having in the context of 8022bis: how best to
>> indicate that a whole module is being obsoleted.  RFCs do this by adding
>> 'metadata' to the headers, e.g., "Obsoletes: 8049", but this doesn't
>> help YANG tooling.  For 8022, we have one approach - publishing an
>> updated rev of the original module marking all nodes as deprecated - but
>> that doesn't really make sense for rfc8049bis.
>>
>> So the discussion for the WG is:
>>
>> How do we handle incompatible module changes, notably when one module
>> 'obsoletes' another module --  from both the process and tooling
>> perspectives?
>>
>> I know Benoit plans to bring in some thoughts/proposals, perhaps there
>> are others.
>>
>> Cheers,
>>
>> Lou
>>
>> (as contributor/reviewer)
>>
>>
>> .
>>
>