> On 28 Jul 2015, at 15:44, Andy Bierman <a...@yumaworks.com> wrote: > > > > On Tue, Jul 28, 2015 at 2:58 AM, Martin Bjorklund <m...@tail-f.com> wrote: > Ladislav Lhotka <lho...@nic.cz> wrote: > > > > > On 28 Jul 2015, at 11:42, Martin Bjorklund <m...@tail-f.com> wrote: > > > > > > Hi, > > > > > > Andy Bierman <a...@yumaworks.com> wrote: > > >> On Sun, Jul 26, 2015 at 12:16 AM, Juergen Schoenwaelder < > > >> j.schoenwael...@jacobs-university.de> wrote: > > >> > > >>> On Sat, Jul 25, 2015 at 05:17:11PM -0700, Andy Bierman wrote: > > >>>> Hi, > > >>>> > > >>>> I would like to open another issue for YANG 1.1, > > >>>> because I don't want to have 1.1 and then 1.2 right away. > > >>>> The NETMOD WG should evaluate the different ways to > > >>>> support ephemeral state, based on Jeff's draft. > > > > > > [...] > > > > > >> The problem with using YANG extensions for important protocol features > > >> is that the YANG spec says these statements MAY be completely skipped > > >> by a tool implementation. This is not acceptable for ephemeral state > > >> (or operational state either). > > > > > > I don't agree that this is a problem. If i2rs defines an extension, > > > then i2rs implementations will have to support that extension. This > > > is the whole idea behind extensions - we should not have to revise > > > YANG everytime we need a new statement. > > > > > > > Yes, it could work in this case as long as modules containing this > > extension are never advertised to regular NETCONF/RESTCONF clients. > > I think it would. Such nodes would just be seen as config false > nodes. > > > I do not agree that YANG extensions are appropriate for defining standard > protocols. > They are fine for extra tools outside the scope of any protocol. > The "get filter" hack in RFC 6241 does not even work since > any tool is allowed to ignore the extension. > > The solution proposed by I2RS changed the config-stmt. > IMO this is a better solution than defining an extension > that every YANG tool MAY ignore. > > > Ephemeral data can be defined in any YANG module, > not in special hack modules that are not allowed to be shared > by NETCONF or RESTCONF in any way, > That would be a terrible solution for ephemeral data.
I am not sure the ephemeral property required by I2RS only means that a given parameter is is stored in volatile memory. In the meeting with Jeff and Alia on Thursday afternoon we (again) discussed the overlay property: they apparently want to be able to override normal config values with a new (ephemeral) value installed by an I2RS client. This would mean that the same data node exists in two instances - one permanent and one ephemeral, and config true/false/ephemeral is then clearly insufficient. That’s why I asked during the session for clarification of the interactions between ephemeral and standard config values. It also has implications for validation - the running config certainly has to be always valid but what about validity of running + ephemeral data? Jeff’s response was that no semantic validation is done in this case, and it is up to the consuming server application to somehow cope with invalid data and do whatever is the most appropriate action. Lada > > > > > /martin > > Andy -- Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C _______________________________________________ netmod mailing list netmod@ietf.org https://www.ietf.org/mailman/listinfo/netmod