[Tools-discuss] Re: [abnf-discuss] Re: [art] Re: Exploring ABNF extracts from RFCs
Paul Kyzivat <pkyzivat@alum.mit.edu> Mon, 29 July 2024 15:26 UTC
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: tools-discuss@ietfa.amsl.com
Delivered-To: tools-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0E75C151532; Mon, 29 Jul 2024 08:26:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level:
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qim747GRYMAc; Mon, 29 Jul 2024 08:26:25 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2096.outbound.protection.outlook.com [40.107.93.96]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DEF74C14CE31; Mon, 29 Jul 2024 08:26:24 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UWAeJQX7/lVHxaaejU5QJZHZPRfIcG8neqjPUKbnQec5+hBXD4SYSzeRedcwrp/lWLspHIpVW/Uq79bCUDClCDtIgW1i3vHTW+dool51EtyS2Ri1EilCyE0MwvAVAL1FChRq0uuaKn3DSjX5UmTLi58a6jQxUAMy0xgBDS1NNjjS/AaijD0XKb8NtErRhEEDLsG/vPYy/hHOj7MK5Zm1w2DTwg97odLB+I4q8skNLnDPI7fQNhpYStLl4Unl34jrRL+3V9zudrPdiq+L4lUub+4goMIJP9e8sbheRJoh4mpf+yTnL33systHNG+H6vnxvUkxxm8gL9owWJIS9QXc4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4hw0wKyMnAWjGoaiu4JkHvM/wuz8kTZu9Hjl3nuDkUU=; b=QA7ZUqlAxzbBsHoov9+kp3uJH9gmWg6YbSTmgRv1Vg9JvbU/MI5uY2jxLa5Di2a5svBwQcwqrl9INs9gd/koYp5jnp2IU1ENGZjfhDxjlly0tDR7rtYvKWldVxVFPGjMLLJYAqHJ+HzBrpfguF/3b4H5OqTcBnNwtagJ+naOfymEIs1xRD8PBBqBW9bSdLmFAr2FyOIeftnBn1mzc1Nvwykv8sr0X+r2J4ObLxcg6Mgn3i/qkpdkEK5KvM95v2QkD4floFFob1SUwQhZAn5Ly2UN5UGI8WyLlJNYbvokT634bv75V3YLXcDLvJOk5oqCQcD2f+s7RMBnyeSwEv6Bbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=pass (p=none sp=none pct=100) action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4hw0wKyMnAWjGoaiu4JkHvM/wuz8kTZu9Hjl3nuDkUU=; b=XzXF6/6D2Ovn0ZDgLLZO5f9SOeW3SAh3pEM0aNm4bpL+gC1cSvEghPoiHvt5POxBJ++UlsgbxblYauPrhHqN1o5h/oxfNKdnP8QoLJnoc3gnoE4lXfDM4nSN+T9CAF1CLjCmB5hm/N3JUe3/7Cs15S1bK68a3/G4FyP4UmR7HjA=
Received: from PH7PR17CA0037.namprd17.prod.outlook.com (2603:10b6:510:323::28) by CH3PR12MB8756.namprd12.prod.outlook.com (2603:10b6:610:17f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7807.27; Mon, 29 Jul 2024 15:26:22 +0000
Received: from SN1PEPF00036F43.namprd05.prod.outlook.com (2603:10b6:510:323:cafe::2b) by PH7PR17CA0037.outlook.office365.com (2603:10b6:510:323::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.34 via Frontend Transport; Mon, 29 Jul 2024 15:26:22 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu; pr=C
Received: from outgoing-alum.mit.edu (18.7.68.33) by SN1PEPF00036F43.mail.protection.outlook.com (10.167.248.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7828.19 via Frontend Transport; Mon, 29 Jul 2024 15:26:21 +0000
Received: from [192.168.1.52] (c-76-19-71-248.hsd1.ma.comcast.net [76.19.71.248]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 46TFQJA7021630 (version=TLSv1/SSLv3 cipher=AES128-GCM-SHA256 bits=128 verify=NOT); Mon, 29 Jul 2024 11:26:19 -0400
Message-ID: <d8097d37-e24c-442f-8cb3-e230eb6b9eb5@alum.mit.edu>
Date: Mon, 29 Jul 2024 11:26:19 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Dave Crocker <dcrocker@gmail.com>, Carsten Bormann <cabo@tzi.org>
References: <89a4a566-8ffe-413e-9196-3f08bebe8d20@w3.org> <99E8B992-AF60-4CD6-9786-2EC180E95E4D@tzi.org> <2867abac-8c62-41b2-a20c-cb9fe8d3736d@alum.mit.edu> <ff29ebe0-efbc-4bfc-8c79-f09ccbe3ffe3@w3.org> <b864092b-477b-4866-a2b1-481313545917@alum.mit.edu> <da4c5ded-24dc-46c8-b011-cea627107f19@gmail.com> <99B795A8-DC51-409A-8395-A0CD5E5C24BF@tzi.org> <5f0ada79-2520-4460-a558-919b40943cdc@gmail.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
In-Reply-To: <5f0ada79-2520-4460-a558-919b40943cdc@gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: SN1PEPF00036F43:EE_|CH3PR12MB8756:EE_
X-MS-Office365-Filtering-Correlation-Id: e91161a6-d551-4d91-5334-08dcafe2cd63
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;ARA:13230040|41320700013|82310400026|1800799024|376014|36860700013;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:18.7.68.33;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:outgoing-alum.mit.edu;PTR:outgoing-alum.mit.edu;CAT:NONE;SFS:(13230040)(41320700013)(82310400026)(1800799024)(376014)(36860700013);DIR:OUT;SFP:1102;
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Jul 2024 15:26:21.8701 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e91161a6-d551-4d91-5334-08dcafe2cd63
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f;Ip=[18.7.68.33];Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF00036F43.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR12MB8756
Message-ID-Hash: 6KCU3GTBQQM5KOJGST5Z53QJQPN7SW7Q
X-Message-ID-Hash: 6KCU3GTBQQM5KOJGST5Z53QJQPN7SW7Q
X-MailFrom: pkyzivat@alum.mit.edu
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tools-discuss.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Dominique Hazael-Massieux <dom@w3.org>, art@ietf.org, tools-discuss <tools-discuss@ietf.org>, CBOR <cbor@ietf.org>, abnf-discuss@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: Exploring ABNF extracts from RFCs
List-Id: IETF Tools Discussion <tools-discuss.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tools-discuss/srAy2400hGe86i_c5glnqsshLaE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tools-discuss>
List-Help: <mailto:tools-discuss-request@ietf.org?subject=help>
List-Owner: <mailto:tools-discuss-owner@ietf.org>
List-Post: <mailto:tools-discuss@ietf.org>
List-Subscribe: <mailto:tools-discuss-join@ietf.org>
List-Unsubscribe: <mailto:tools-discuss-leave@ietf.org>
I'm not wed to any particular solution. But I think we need to work to come to some consensus on one. I'm looking for something that allows automated verification of language source embedded in drafts and RFCs, including cross references to other documents. It would be *nice* if we could find an approach that works for at least the languages most commonly embedded in RFCs. That seems challenging given the variety of language syntax/semantics. Embedding some parts in comments is interesting, but of course the comment syntax varies. ISTM the namespace issues are more challenging. Discussing this from multiple language perspectives could provide some insights. What sort of organization makes sense to work on this? A WG? Task force? Thanks, Paul On 7/29/24 10:59 AM, Dave Crocker wrote: > On 7/29/2024 7:54 AM, Carsten Bormann wrote: >> On 2024-07-29, at 16:47, Dave Crocker <dcrocker@gmail.com> wrote: >>> As for namespaces, something like organization-document probably >>> suffice to take care of the global uniqueness part. So, for example, >>> ietf-rfc-nnn-… >> Generally, it is advantageous to separate the document reference >> (which may need to carry a lot of information to properly select the >> document, its revision, provenance, ...) from how the referenced item >> is used in the actual specification. >> >> So in CDDL, we do something like >> >> ;# import cose.label, cose.values from rfc9052 as cose >> >> Which makes cose.label (cose--label when using ABNF name characters >> only) the rule name to be used in the CDDL (ABNF) and keeps the >> detailed document reference (in this example rfc9052) in the import >> statement, which acts as the glue. > > Unless I'm misreading, I think we are agreeing on the major point I was > making, although differing on what I think is an important detail. > > Your example uses rfc9052 as the external reference. Mine is meant to > allow more variation in source and indentification of publication. An I > meant the ellipsis in my example to refer to lower-level detail withn > the document. > > Your 'as' construct is interesting. I hadn't thought about mapping > between rule names. fwiw, it makes me uncomfortable, though I > understand the motivation and possibly even the need... > > d/ > >
- [Tools-discuss] Exploring ABNF extracts from RFCs Dominique Hazael-Massieux
- [Tools-discuss] Re: Exploring ABNF extracts from … Carsten Bormann
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Paul Kyzivat
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Carsten Bormann
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Dominique Hazael-Massieux
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Paul Kyzivat
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Paul Kyzivat
- [Tools-discuss] Re: [art] Re: Exploring ABNF extr… Carsten Bormann
- [Tools-discuss] Re: [art] Exploring ABNF extracts… Carsten Bormann
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Dave Crocker
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Carsten Bormann
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Dave Crocker
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Paul Kyzivat
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Dave Crocker
- [Tools-discuss] Re: [abnf-discuss] Re: [art] Re: … Carsten Bormann