Re: [nfsv4] feedback on draft-ietf-nfsv4-versioning-07

Mike Kupfer <mike.kupfer@oracle.com> Thu, 27 October 2016 18:22 UTC

Return-Path: <mike.kupfer@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97D0112954E for <nfsv4@ietfa.amsl.com>; Thu, 27 Oct 2016 11:22:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.632
X-Spam-Level:
X-Spam-Status: No, score=-4.632 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RP_MATCHES_RCVD=-0.431, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EvJYMarITYFU for <nfsv4@ietfa.amsl.com>; Thu, 27 Oct 2016 11:22:36 -0700 (PDT)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E15DD1293FE for <nfsv4@ietf.org>; Thu, 27 Oct 2016 11:22:35 -0700 (PDT)
Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u9RIMYNI030753 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 27 Oct 2016 18:22:34 GMT
Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id u9RIMYBM028366 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 27 Oct 2016 18:22:34 GMT
Received: from abhmp0013.oracle.com (abhmp0013.oracle.com [141.146.116.19]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id u9RIMXRT030161; Thu, 27 Oct 2016 18:22:33 GMT
Received: from jurassic.us.oracle.com (/10.134.8.79) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 27 Oct 2016 11:22:33 -0700
From: Mike Kupfer <mike.kupfer@oracle.com>
To: David Noveck <davenoveck@gmail.com>
References: <ote01sz4f8tk.fsf@athyra-vm1.us.oracle.com> <CADaq8jcSUO5rkf-4+njbk-O0Fv5gTedTRZnceVJRdz1T4zyH1Q@mail.gmail.com> <ote0oa2668pg.fsf@jurassic.us.oracle.com> <CADaq8jcOwbdc8O7am+tSdpa9hFDFfc5ULkM1qhOt9HPn7m-Ujw@mail.gmail.com>
Date: Thu, 27 Oct 2016 11:22:26 -0700
In-Reply-To: <CADaq8jcOwbdc8O7am+tSdpa9hFDFfc5ULkM1qhOt9HPn7m-Ujw@mail.gmail.com> (David Noveck's message of "Thu, 27 Oct 2016 06:01:22 -0400")
Message-ID: <ote0a8dp8xel.fsf@jurassic.us.oracle.com>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.5 (usg-unix-v)
MIME-Version: 1.0
Content-Type: text/plain
X-Source-IP: userv0021.oracle.com [156.151.31.71]
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/PJEgfuvJ3agYWQ2_equsLkm_pxo>
Cc: "nfsv4@ietf.org" <nfsv4@ietf.org>
Subject: Re: [nfsv4] feedback on draft-ietf-nfsv4-versioning-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Oct 2016 18:22:37 -0000

David Noveck <davenoveck@gmail.com> writes:

> Regarding extending enums, it is true that -07 seems to allow this without
> saying how to mange it in general.  It  only discusses expanding switches
> and provides specific rules regarding error codes, operation codes, and
> attribute numbers.
>
> The real problem with allowing general enum extensions is that XDR
> implementations do not check that the values in the fields are valid.  As a
> result, you cannot test that the responder knows about the new values by
> issuing a request containing the new value, as you can with extensions to
> switches.

Well, there won't be a check at the RPC layer.  But presumably the NFS
layer would return something like NFS4ERR_INVAL if it's given a value it
doesn't know about.

> As a result, enum fields are essentially ints, and the restriction to the
> values listed in the XDR file is much like an in-spec-text restriction
> regarding the contents of that particular field. I think the spec should
> make clear it that changing the set of allowed values requires a new minor
> version.

I'm okay with narrowing the scope of what an extension can do.  But if
we require a minor version bump to change the set of allowed values for
an enum, we should do the same for the general case of flag words.  (New
attributes could still be added via an extension.)

mike