
From nobody Thu Aug  2 12:28:46 2018
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA4511286E3 for <netmod@ietfa.amsl.com>; Thu,  2 Aug 2018 12:28:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.791
X-Spam-Level: 
X-Spam-Status: No, score=-1.791 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (768-bit key) reason="fail (body has been altered)" header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Htp-vdc1gebs for <netmod@ietfa.amsl.com>; Thu,  2 Aug 2018 12:28:42 -0700 (PDT)
Received: from gproxy9-pub.mail.unifiedlayer.com (gproxy9-pub.mail.unifiedlayer.com [69.89.20.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 368071277C8 for <netmod@ietf.org>; Thu,  2 Aug 2018 12:28:42 -0700 (PDT)
Received: from cmgw12.unifiedlayer.com (unknown [10.9.0.12]) by gproxy9.mail.unifiedlayer.com (Postfix) with ESMTP id 0300C1E06B8 for <netmod@ietf.org>; Thu,  2 Aug 2018 13:28:42 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id lJH7f8Oy2ak7tlJH7fMPsS; Thu, 02 Aug 2018 13:28:41 -0600
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From: References:To:Subject:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID :Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To: Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe :List-Post:List-Owner:List-Archive; bh=fbjottetmZpJhinkTBd3zZR7AisPDOXskri7vOEU3HU=; b=2jrYtmCVBbXG7RZAKvHgGz/bbW VhIssKGTUxzOxPTidL3jbsquU8ngkRRjl2rDBiz3tAChxKabJDMaByDkWoPIEsy+3npsJ6D3OG4/M ha8r6bkAOOXI4FieVVihiZgAW;
Received: from pool-100-15-106-211.washdc.fios.verizon.net ([100.15.106.211]:44470 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1flJH7-001IAk-IK; Thu, 02 Aug 2018 13:28:41 -0600
To: Hayden Brown <Hayden.Brown@Aviatnet.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn>
From: Lou Berger <lberger@labn.net>
Message-ID: <a6ad2e01-48e6-455a-7bbc-6ac5f58b9e07@labn.net>
Date: Thu, 2 Aug 2018 15:28:40 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn>
Content-Type: multipart/alternative; boundary="------------0C65124D0E3B3DF92F8F2AC6"
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.106.211
X-Source-L: No
X-Exim-ID: 1flJH7-001IAk-IK
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: pool-100-15-106-211.washdc.fios.verizon.net ([IPv6:::1]) [100.15.106.211]:44470
X-Source-Auth: lberger@labn.net
X-Email-Count: 4
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/gnbbmQS13HzY0Iocm0iv_8YXJ_g>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2018 19:28:44 -0000

This is a multi-part message in MIME format.
--------------0C65124D0E3B3DF92F8F2AC6
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

     hopefully others will chime in too, but here's my view (as a user 
of schema mount, see 
https://tools.ietf.org/html/draft-ietf-rtgwg-ni-model)...


On 7/30/2018 7:27 PM, Hayden Brown wrote:
>
> Hi everyone,
>
> I just wanted to ask if it would be possible to clarify the intentions 
> around some of the wording of the draft schema mount standard 
> (Rev-10). In particular, regarding entries of the 
> /schema-mounts/mount-points list.
>
> My interpretation is that the intended use of the 
> /schema-mounts/mount-points list entries are to specify the *parent 
> modules* that contain a mount point.
>
yes
>
> Following on from this, the client should use the YANG library 
> instance to determine which schema options can be mounted at the root 
> of a mount point. This seems consistent with the examples of Appendix 
> A of the draft standard.
>
if you drop the word "options", then yes.  Other examples can be found 
in draft-ietf-rtgwg-ni-model

> In this email I wanted to highlight the following sections of the 
> draft RFC below. In my view they seem to me to be somewhat ambiguous, 
> in implying that the mount-point list entries specify the /*child* 
> /module (sub-schema):
>
>
> >From 
> https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/?include_text=1
>
> *Section 3.3 – Page 7*
> > The "/schema-mounts" container has the "mount-point" list as one of its children. Every entry of this list 
> refers through its key to a mount point and specifies the mounted schema.
>
> *Section 3.3 - Page 8*
> > An entry of the "mount-point" list can specify the mounted schema in two different ways, "inline" or 
> "shared-schema".
>
>
> *Section 9 - Page *13
> > A mount point defines a place in the node hierarchy where other data models may be attached. A server that 
> implements a module with a mount point populates the 
> /schema-mounts/mount-point list with detailed information onwhich data 
> models are mounted at each mount point.
>
> *Section 9 - Page *14
> list mount-point {
>     key "module label";
>     description
>     "Each entry of this list specifies a schema for a particular mount 
> point.
>

I have reread the a few times and am having a hard time understand what 
should be changed.  Can you suggest specific changes that would address 
your concern/comment?  This might help to understand the issue you are 
seeing.

>
> The wording makes me wonder if these passages might actually just be 
> "left-over" context from earlier revisions of the draft standard 
> (Revision 8 and prior) -- effectively referring back to the 
> schema-mount '/use-schema/' list.
>
Again, I'm seeing the issue.

>
> I do of course acknowledge that it is entirely possible that I've 
> misinterpreted the wording of the passages above, however if that is 
> the case, I suspect I may not be the only one in future.
>
And I'm sure I'm suffering from having spent way too much time on this 
topic so may be seeing things in the text that aren't actually there!

Cheers,
Lou
(no hats)


> Many thanks for your time on this matter.
>
> Best regards,
> Hayden
>
> On 20/07/2018 8:09 PM, Juergen Schoenwaelder wrote:
>
> On Wed, Jul 11, 2018 at 09:43:32AM +1200, hayden wrote:
>    
> I understand that the schema mount proposal is still effectively in a
> state of flux, but are there any publicly visible implementations or
> deployments of a NETCONF or RESTCONF server that those interested could
> experiment with (e.g. to aid in client development)?
> State of flux? It is past WG last call and IETF last call.
> https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/history/
> /js
>
>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--------------0C65124D0E3B3DF92F8F2AC6
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html;
      charset=windows-1252">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hi,</p>
    <p>    hopefully others will chime in too, but here's my view (as a
      user of schema mount, see
      <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-ietf-rtgwg-ni-model">https://tools.ietf.org/html/draft-ietf-rtgwg-ni-model</a>)...<br>
    </p>
    <br>
    <div class="moz-cite-prefix">On 7/30/2018 7:27 PM, Hayden Brown
      wrote:<br>
    </div>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:windowtext;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";
	color:black;
	mso-fareast-language:EN-NZ;}
..MsoChpDefault
	{mso-style-type:export-only;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p><span
            style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Hi
            everyone,<br>
            <br>
            I just wanted to ask if it would be possible to clarify the
            intentions around some of the wording of the draft schema
            mount standard (Rev-10). In particular, regarding entries of
            the /schema-mounts/mount-points list.</span><o:p></o:p></p>
        <p><span
            style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">My
            interpretation is that the intended use of the
            /schema-mounts/mount-points list entries are to specify the
            <b>parent modules</b> that contain a mount point. </span></p>
      </div>
    </blockquote>
    yes<br>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <div class="WordSection1">
        <p><span
            style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Following
            on from this, the client should use the YANG library
            instance to determine which schema options can be mounted at
            the root of a mount point. This seems consistent with the
            examples of Appendix A of the draft standard.</span></p>
      </div>
    </blockquote>
    if you drop the word "options", then yes.  Other examples can be
    found in draft-ietf-rtgwg-ni-model<br>
    <br>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <div class="WordSection1">
        <p><o:p></o:p></p>
        <p style="margin-bottom:12.0pt"><span
            style="font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">In
            this email I wanted to highlight the following sections of
            the draft RFC below. In my view they seem to me to be
            somewhat ambiguous, in implying that the mount-point list
            entries specify the <i>*child* </i>module (sub-schema):<br>
            <br>
            <br>
            &gt;From <a
href="https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/?include_text=1"
              moz-do-not-send="true">
https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/?include_text=1</a></span><o:p></o:p></p>
        <p class="MsoNormal"><b><span style="font-size:12.0pt">Section
              3.3 – Page 7</span></b><span style="font-size:12.0pt"><br>
          </span><span style="font-size:12.0pt;font-family:&quot;Courier
            New&quot;">&gt; The "/schema-mounts" container has the
            "mount-point" list as one of its children. Every entry of
            this list refers through its key to a mount point and
            <span style="color:red">specifies the mounted schema</span>.</span><span
            style="font-size:12.0pt"><br>
            <br>
          </span><b><span style="font-size:12.0pt">Section 3.3 - Page 8</span></b><span
            style="font-size:12.0pt"><br>
          </span><span style="font-size:12.0pt;font-family:&quot;Courier
            New&quot;">&gt; An entry of the "mount-point" list can
            specify
            <span style="color:red">the mounted schema</span> in two
            different ways, "inline" or "shared-schema".</span><span
            style="font-size:12.0pt"><br>
            <br>
            <br>
          </span><b><span style="font-size:12.0pt">Section 9 - Page </span></b><span
            style="font-size:12.0pt">13</span><span
            style="font-size:12.0pt"><br>
          </span><span style="font-size:12.0pt;font-family:&quot;Courier
            New&quot;">&gt; A mount point defines a place in the node
            hierarchy where other data models may be attached. A server
            that implements a module with a mount point populates the
            /schema-mounts/mount-point list with detailed information on<span
              style="color:red"> which data models are mounted at each
              mount point</span>.<br>
          </span><span style="font-size:12.0pt"><br>
          </span><b><span style="font-size:12.0pt">Section 9 - Page </span></b><span
            style="font-size:12.0pt">14</span><span
            style="font-size:12.0pt"><br>
          </span><span style="font-size:12.0pt;font-family:&quot;Courier
            New&quot;">list mount-point {<br>
                key "module label";<br>
                description<br>
                "<span style="color:red">Each entry of this list
              specifies a schema for a particular mount point</span>.</span><span
            style="font-size:12.0pt"><o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt"><o:p> </o:p></span></p>
      </div>
    </blockquote>
    <br>
    I have reread the a few times and am having a hard time understand
    what should be changed.  Can you suggest specific changes that would
    address your concern/comment?  This might help to understand the
    issue you are seeing.<br>
    <br>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size:12.0pt"><br>
          </span><span style="font-size:12.0pt">The wording makes me
            wonder if these passages might actually just be "left-over"
            context from earlier revisions of the draft standard
            (Revision 8 and prior) -- effectively referring back to the
            schema-mount '<i>use-schema</i>' list.<br>
            <br>
          </span></p>
      </div>
    </blockquote>
    Again, I'm seeing the issue.<br>
    <br>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size:12.0pt">
          </span><span style="font-size:12.0pt"><o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt"><br>
            I do of course acknowledge that it is entirely possible that
            I've misinterpreted the wording of the passages above,
            however if that is the case, I suspect I may not be the only
            one in future.<br>
          </span></p>
      </div>
    </blockquote>
    And I'm sure I'm suffering from having spent way too much time on
    this topic so may be seeing things in the text that aren't actually
    there!<br>
    <br>
    Cheers,<br>
    Lou <br>
    (no hats)<br>
    <br>
    <br>
    <blockquote type="cite"
cite="mid:5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn">
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size:12.0pt">Many thanks
            for your time on this matter.<br>
            <br>
            Best regards,<br>
            Hayden<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size:12.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><span style="font-size:10.0pt"><o:p> </o:p></span></p>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal">On 20/07/2018 8:09 PM, Juergen
          Schoenwaelder wrote:<o:p></o:p></p>
        <pre>On Wed, Jul 11, 2018 at 09:43:32AM +1200, hayden wrote:<o:p></o:p></pre>
        <pre>  <o:p></o:p></pre>
        <pre>I understand that the schema mount proposal is still effectively in a <o:p></o:p></pre>
        <pre>state of flux, but are there any publicly visible implementations or <o:p></o:p></pre>
        <pre>deployments of a NETCONF or RESTCONF server that those interested could <o:p></o:p></pre>
        <pre>experiment with (e.g. to aid in client development)?<o:p></o:p></pre>
        <pre><o:p> </o:p></pre>
        <pre>State of flux? It is past WG last call and IETF last call.<o:p></o:p></pre>
        <pre><o:p> </o:p></pre>
        <pre><a href="https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/history/" moz-do-not-send="true">https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/history/</a><o:p></o:p></pre>
        <pre><o:p> </o:p></pre>
        <pre>/js<o:p></o:p></pre>
        <pre><o:p> </o:p></pre>
        <p class="MsoNormal"><o:p> </o:p></p>
        <p class="MsoNormal"><o:p> </o:p></p>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
netmod mailing list
<a class="moz-txt-link-abbreviated" href="mailto:netmod@ietf.org">netmod@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/netmod">https://www.ietf.org/mailman/listinfo/netmod</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------0C65124D0E3B3DF92F8F2AC6--


From nobody Fri Aug  3 08:59:32 2018
Return-Path: <Janos.Farkas@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5030131057 for <netmod@ietfa.amsl.com>; Fri,  3 Aug 2018 08:59:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.309
X-Spam-Level: 
X-Spam-Status: No, score=-4.309 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4YVZU5i6SerG for <netmod@ietfa.amsl.com>; Fri,  3 Aug 2018 08:59:21 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B3C3513105D for <netmod@ietf.org>; Fri,  3 Aug 2018 08:59:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1533311958; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=DazQfWDLYkcwcfxVxTqW1smMvgh2xJVH2NjHsCJRiTs=; b=YBmYbUiBWOedGwSoUvmZ/+sr1nj7xU2JFHofnvE/CN+gVTXHujV/m5YQiS0ndiRY Fxm2YXGLYtkYTVwvhE7NS8upjONJ0lGbys35JhB9S8eu4L1z2gnONA231URh5I8S ESZ1yaja9xr5gv+RZ5xa4Ydr4Si4HFU3qlm9iR/ed74=;
X-AuditID: c1b4fb25-b05ff70000006cb9-d9-5b647bd6192a
Received: from ESESSMB503.ericsson.se (Unknown_Domain [153.88.183.121]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id AE.CA.27833.6DB746B5; Fri,  3 Aug 2018 17:59:18 +0200 (CEST)
Received: from ESESSMB503.ericsson.se (153.88.183.164) by ESESSMB503.ericsson.se (153.88.183.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 3 Aug 2018 17:59:17 +0200
Received: from [159.107.143.207] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.191) with Microsoft SMTP Server id 15.1.1466.3 via Frontend Transport; Fri, 3 Aug 2018 17:59:17 +0200
To: Vladimir Vassilev <vladimir@transpacket.com>
References: <153163104655.12797.4549822574205791661.idtracker@ietfa.amsl.com> <1671ad91-5627-fedf-ef1c-9a2a790accd4@transpacket.com>
CC: "netmod@ietf.org" <netmod@ietf.org>, <detnet@ietf.org>, "ieee-ietf-coord@ietf.org" <ieee-ietf-coord@ietf.org>
From: =?UTF-8?Q?J=c3=a1nos_Farkas?= <janos.farkas@ericsson.com>
Message-ID: <bb04cb6f-5940-f883-ba80-ad110d192eb2@ericsson.com>
Date: Fri, 3 Aug 2018 17:59:17 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <1671ad91-5627-fedf-ef1c-9a2a790accd4@transpacket.com>
Content-Type: multipart/alternative; boundary="------------FB280D5B0EFA0EC005ED21E8"
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrALMWRmVeSWpSXmKPExsUyM2J7pe616pRog86nUha/P81msbi05h+T xfyLjawWp+Z/Y3Vg8Viy5CeTx9UPJ1kCmKK4bFJSczLLUov07RK4Mhbfu8BUMM2rYv0C0QbG k9ZdjJwcEgImEhcWzGDqYuTiEBI4yijxvfUXlPOVUeLevyUImQkb+5hAWoQFUiVWz77F2sXI wSEiYCCx+Yg1RE0bo8T0+z0sIDXMAsUSV9pegtWzCdhL3L20gRnE5gWyb89ZzgpiswioSNx9 tZINZI6oQIzE+r4EiBJBiZMzn4CN4RRwlpi9bQozSAmzQJjE5/3VIGEhATWJT28fsk9gFJiF pGMWQtUssBssJGbOP88IYctLbH87hxnC1pBonTOXHSbevHU28wJGtlWMosWpxUm56UbGeqlF mcnFxfl5enmpJZsYgeF+cMtv1R2Ml984HmIU4GBU4uGdlZUSLcSaWFZcmXuIUYKDWUmE921n crQQb0piZVVqUX58UWlOavEhRmkOFiVx3ofmm6OEBNITS1KzU1MLUotgskwcnFINjKmz25c3 suapfjs7s+NJR9o+noLIHee43F+mOfzf9OBmvonP/hpub4nz1clT3qsIvljQqNH7uoJNUlQ8 6UmoPH+i6Zmj9cdO3/uouPpHtcqiDoPjW+wmTfytznFXbGLhoi9ibpYp87dvO5z/zHvBBFF9 Z+kJr5K2eOhPKjnw2e7lfUXeux8Y/yuxFGckGmoxFxUnAgCWUQnEcwIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/uyG5tJ16UEpPy9xUUULzxskj8Sc>
Subject: Re: [netmod] [Detnet] Fwd: New Version Notification for draft-vassilev-netmod-network-bridge-00.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Aug 2018 15:59:24 -0000

--------------FB280D5B0EFA0EC005ED21E8
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit

Hi Vladimir,

Bridging including bridge management belong to IEEE 802.1: 
https://1.ieee802.org/. You may consider contributing to IEEE 802.1. The 
next Interim is hosed by your company in Oslo: 
https://1.ieee802.org/meetings.

IEEE 802.1Qcp is the basic bridge management specification, which is an 
approved draft standard to be published soon: 
http://standards.ieee.org/findstds/standard/802.1Qcp-2018.html. (The 
archived web page of the finished project: 
https://1.ieee802.org/tsn/802-1qcp.)

The pages of the ongoing projects are available via the TSN page: 
https://1.ieee802.org/tsn/#Ongoing_TSN_Projects, including P802.1Qcw 
(https://1.ieee802.org/tsn/802-1qcw/), which specifies YANG for various 
bridge scheduling mechanisms.

Best regards,
Janos


On 7/17/2018 4:26 PM, Vladimir Vassilev wrote:
> Hi,
>
> I have submitted a draft 
> https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/ 
> that proposes a model for network bridge management based on the 
> concept of flows. The model has 2 components 1. Forwarding based on 
> flows. 2. Scheduling/QoS based on gate controller topologies that 
> provide a new and very generic way of modeling and managing the actual 
> scheduler design and map the flows to scheduler topology inputs.
>
> There is similar work on the flow based forwarding in detnet however I 
> am not sure detnet is the right workgroup to be defining the flow 
> model.  I think the flow concept is important and general. It is as 
> significant as the concept of interfaces and is not only relevant to 
> detnet. Let me know what is your opinion of the draft and the proposed 
> network bridge concept.
>
> Vladimir
>
> -------- Forwarded Message --------
> Subject:     New Version Notification for 
> draft-vassilev-netmod-network-bridge-00.txt
> Date:     Sat, 14 Jul 2018 22:04:06 -0700
> From:     internet-drafts@ietf.org
> To:     Vladimir Vassilev <vladimir@transpacket.com>
>
>
>
> A new version of I-D, draft-vassilev-netmod-network-bridge-00.txt
> has been successfully submitted by Vladimir Vassilev and posted to the
> IETF repository.
>
> Name:        draft-vassilev-netmod-network-bridge
> Revision:    00
> Title:        A YANG Data Model for Network Bridge Management
> Document date:    2018-07-14
> Group:        Individual Submission
> Pages:        44
> URL: 
> https://www.ietf.org/internet-drafts/draft-vassilev-netmod-network-bridge-00.txt
> Status: 
> https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/
> Htmlized: 
> https://tools.ietf.org/html/draft-vassilev-netmod-network-bridge-00
> Htmlized: 
> https://datatracker.ietf.org/doc/html/draft-vassilev-netmod-network-bridge
>
>
> Abstract:
>    This document introduces new YANG model of a network bridge.
>
>
>
> Please note that it may take a couple of minutes from the time of 
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
> _______________________________________________
> detnet mailing list
> detnet@ietf.org
> https://www.ietf.org/mailman/listinfo/detnet


--------------FB280D5B0EFA0EC005ED21E8
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=utf-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Hi Vladimir,<br>
    <br>
    Bridging including bridge management belong to IEEE 802.1:
    <a class="moz-txt-link-freetext" href="https://1.ieee802.org/">https://1.ieee802.org/</a>. You may consider contributing to IEEE 802.1.
    The next Interim is hosed by your company in Oslo:
    <a class="moz-txt-link-freetext" href="https://1.ieee802.org/meetings">https://1.ieee802.org/meetings</a>.<br>
    <br>
    IEEE 802.1Qcp is the basic bridge management specification, which is
    an approved draft standard to be published soon:
    <a class="moz-txt-link-freetext" href="http://standards.ieee.org/findstds/standard/802.1Qcp-2018.html">http://standards.ieee.org/findstds/standard/802.1Qcp-2018.html</a>. (The
    archived web page of the finished project:
    <a class="moz-txt-link-freetext" href="https://1.ieee802.org/tsn/802-1qcp">https://1.ieee802.org/tsn/802-1qcp</a>.)<br>
    <br>
    The pages of the ongoing projects are available via the TSN page:
    <a class="moz-txt-link-freetext" href="https://1.ieee802.org/tsn/#Ongoing_TSN_Projects">https://1.ieee802.org/tsn/#Ongoing_TSN_Projects</a>, including P802.1Qcw
    (<a class="moz-txt-link-freetext" href="https://1.ieee802.org/tsn/802-1qcw/">https://1.ieee802.org/tsn/802-1qcw/</a>), which specifies YANG for
    various bridge scheduling mechanisms.<br>
    <br>
    Best regards,<br>
    Janos <font size="+1"><br>
      <br>
    </font><br>
    <div class="moz-cite-prefix">On 7/17/2018 4:26 PM, Vladimir Vassilev
      wrote:<br>
    </div>
    <blockquote
      cite="mid:1671ad91-5627-fedf-ef1c-9a2a790accd4@transpacket.com"
      type="cite">Hi,
      <br>
      <br>
      I have submitted a draft
      <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/">https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/</a>
      that proposes a model for network bridge management based on the
      concept of flows. The model has 2 components 1. Forwarding based
      on flows. 2. Scheduling/QoS based on gate controller topologies
      that provide a new and very generic way of modeling and managing
      the actual scheduler design and map the flows to scheduler
      topology inputs.
      <br>
      <br>
      There is similar work on the flow based forwarding in detnet
      however I am not sure detnet is the right workgroup to be defining
      the flow model.Â  I think the flow concept is important and
      general. It is as significant as the concept of interfaces and is
      not only relevant to detnet. Let me know what is your opinion of
      the draft and the proposed network bridge concept.
      <br>
      <br>
      Vladimir
      <br>
      <br>
      -------- Forwarded Message --------
      <br>
      Subject:Â Â Â Â  New Version Notification for
      draft-vassilev-netmod-network-bridge-00.txt
      <br>
      Date:Â Â Â Â  Sat, 14 Jul 2018 22:04:06 -0700
      <br>
      From:Â Â Â Â  <a class="moz-txt-link-abbreviated" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>
      <br>
      To:Â Â Â Â  Vladimir Vassilev <a class="moz-txt-link-rfc2396E" href="mailto:vladimir@transpacket.com">&lt;vladimir@transpacket.com&gt;</a>
      <br>
      <br>
      <br>
      <br>
      A new version of I-D, draft-vassilev-netmod-network-bridge-00.txt
      <br>
      has been successfully submitted by Vladimir Vassilev and posted to
      the
      <br>
      IETF repository.
      <br>
      <br>
      Name:Â Â Â Â Â Â Â  draft-vassilev-netmod-network-bridge
      <br>
      Revision:Â Â Â  00
      <br>
      Title:Â Â Â Â Â Â Â  A YANG Data Model for Network Bridge Management
      <br>
      Document date:Â Â Â  2018-07-14
      <br>
      Group:Â Â Â Â Â Â Â  Individual Submission
      <br>
      Pages:Â Â Â Â Â Â Â  44
      <br>
      URL:Â Â Â Â Â Â Â Â Â Â Â 
<a class="moz-txt-link-freetext" href="https://www.ietf.org/internet-drafts/draft-vassilev-netmod-network-bridge-00.txt">https://www.ietf.org/internet-drafts/draft-vassilev-netmod-network-bridge-00.txt</a><br>
      Status:Â Â Â Â Â Â Â Â 
      <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/">https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/</a>
      <br>
      Htmlized:Â Â Â Â Â Â 
      <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-vassilev-netmod-network-bridge-00">https://tools.ietf.org/html/draft-vassilev-netmod-network-bridge-00</a>
      <br>
      Htmlized:Â Â Â Â Â Â 
<a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/html/draft-vassilev-netmod-network-bridge">https://datatracker.ietf.org/doc/html/draft-vassilev-netmod-network-bridge</a><br>
      <br>
      <br>
      Abstract:
      <br>
      Â Â  This document introduces new YANG model of a network bridge.
      <br>
      <br>
Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 
      <br>
      <br>
      Please note that it may take a couple of minutes from the time of
      submission
      <br>
      until the htmlized version and diff are available at
      tools.ietf.org.
      <br>
      <br>
      The IETF Secretariat
      <br>
      <br>
      _______________________________________________
      <br>
      detnet mailing list
      <br>
      <a class="moz-txt-link-abbreviated" href="mailto:detnet@ietf.org">detnet@ietf.org</a>
      <br>
      <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/detnet">https://www.ietf.org/mailman/listinfo/detnet</a>
      <br>
    </blockquote>
    <br>
  </body>
</html>

--------------FB280D5B0EFA0EC005ED21E8--


From nobody Fri Aug  3 12:10:29 2018
Return-Path: <nite@hq.sk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B89E130FFF for <netmod@ietfa.amsl.com>; Fri,  3 Aug 2018 12:10:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hq.sk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3ekAt5Vnx5Po for <netmod@ietfa.amsl.com>; Fri,  3 Aug 2018 12:10:26 -0700 (PDT)
Received: from mail.hq.sk (hq.sk [81.89.59.181]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41642129385 for <netmod@ietf.org>; Fri,  3 Aug 2018 12:10:26 -0700 (PDT)
Received: from nitebug.localdomain (chello085216197060.chello.sk [85.216.197.60]) by mail.hq.sk (Postfix) with ESMTPSA id 1CA84241EBE for <netmod@ietf.org>; Fri,  3 Aug 2018 21:10:24 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hq.sk; s=mail; t=1533323424; bh=RnKuO7aGC5eS1LWUB2QUd8l1w/SBLHN7NCmcKWsvzPE=; h=To:From:Subject:Date; b=OKHt8W3Manp2bDJVykhKcfrHEWVQysvs6X8qpuNDMFUDCy8J7EqDUxI2Nopvqo77x cjysiJDgTMNIW0D+x2Fqqw2iAvCzZkVvlf/93BlYnCxIyEjaWPZ7mHbt23Zsixs03r ia2oJyPQd3ORjsyeFCvqZSySmyLsCH+CWW29Fytw=
To: "netmod@ietf.org" <netmod@ietf.org>
From: Robert Varga <nite@hq.sk>
Openpgp: preference=signencrypt
Message-ID: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk>
Date: Fri, 3 Aug 2018 21:10:17 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="DtY4j1LORN4dacMPIt73BgbxPMwLrifru"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9JgPZphOdim-wLZA3NrSe3I1un4>
Subject: [netmod] if-feature vs. Identifiers and Their Namespaces
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Aug 2018 19:10:28 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--DtY4j1LORN4dacMPIt73BgbxPMwLrifru
Content-Type: multipart/mixed; boundary="OyWwHmKEemqmkaOW1Szpjj4I1bmT6HnYD";
 protected-headers="v1"
From: Robert Varga <nite@hq.sk>
To: "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk>
Subject: if-feature vs. Identifiers and Their Namespaces

--OyWwHmKEemqmkaOW1Szpjj4I1bmT6HnYD
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

Hello,

I have went through RFC7950, but I cannot find the text which would give
answer whether:

feature foo;
feature bar;

container baz {
   if-feature "foo and (not baz)";
}

list baz {
   if-feature "(not foo) and baz";
}

is valid YANG or not. The two statements violate Section 6.1.2, but they
are mutually exlusive when conformance comes into play.

Does compliance (Section 5.6) have any bearing on namespaces (Section
6.1.2)?

Thanks,
Robert


--OyWwHmKEemqmkaOW1Szpjj4I1bmT6HnYD--

--DtY4j1LORN4dacMPIt73BgbxPMwLrifru
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=FscU
-----END PGP SIGNATURE-----

--DtY4j1LORN4dacMPIt73BgbxPMwLrifru--


From nobody Sun Aug  5 04:32:13 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C6AE130E1D for <netmod@ietfa.amsl.com>; Sun,  5 Aug 2018 04:32:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hw0L5Vr66MhS for <netmod@ietfa.amsl.com>; Sun,  5 Aug 2018 04:32:09 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8E09C1294D7 for <netmod@ietf.org>; Sun,  5 Aug 2018 04:32:09 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id 9C5B81AE0144; Sun,  5 Aug 2018 13:32:06 +0200 (CEST)
Date: Sun, 05 Aug 2018 13:32:06 +0200 (CEST)
Message-Id: <20180805.133206.1339559704042694800.mbj@tail-f.com>
To: nite@hq.sk
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk>
References: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/2kNg-Bc7oawq5fV6UBwvMnSBG-Q>
Subject: Re: [netmod] if-feature vs. Identifiers and Their Namespaces
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Aug 2018 11:32:12 -0000

Robert Varga <nite@hq.sk> wrote:
> Hello,
> 
> I have went through RFC7950, but I cannot find the text which would give
> answer whether:
> 
> feature foo;
> feature bar;
> 
> container baz {
>    if-feature "foo and (not baz)";
> }
> 
> list baz {
>    if-feature "(not foo) and baz";
> }
> 
> is valid YANG or not. The two statements violate Section 6.1.2, but they
> are mutually exlusive when conformance comes into play.

I think you mean 6.2.1.  You are right; these two statements violate
6.2.1 and this is thus not legal.

Consider what this would mean in the model above:

  augement /baz {
    ...
  }

> Does compliance (Section 5.6) have any bearing on namespaces (Section
> 6.1.2)?

Section 5.6 is about server conformance, and the first sentence is:

   Conformance to a model is a measure of how accurately a server
   follows the model.

Namespaces are not related to how accurately a server follows a model.



/martin


From nobody Mon Aug  6 03:41:21 2018
Return-Path: <Hayden.Brown@Aviatnet.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 100BB128CF3 for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 03:41:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aviatus.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tKtlsGm5hw_h for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 03:41:15 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0040.outbound.protection.outlook.com [104.47.36.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 918DC1277CC for <netmod@ietf.org>; Mon,  6 Aug 2018 03:41:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aviatus.onmicrosoft.com; s=selector1-aviatnet-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8Fj9vN586dCLGbOSe0NDfh4dSP4NO8HlV0qtUkwW+Kc=; b=miDBTPgPTOaBXVN/RtR2eMe3adGtQuFHXZtzc4kA9YXqTFXIuiW3pEik0Gh21fBslfAX0n/AEjuN9+JDDsrGIG+2qhcAJnfqItolVN7y+IY7pkP603D0XcHsFldVQt5kvUNaVWoQjxL/DRpJYM4OqJ/c3BSCCf8tWfD4uq0w8zE=
Received: from DM3PR08CA0023.namprd08.prod.outlook.com (2603:10b6:0:52::33) by DM2PR08MB1435.namprd08.prod.outlook.com (2a01:111:e400:50cd::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1017.18; Mon, 6 Aug 2018 10:41:13 +0000
Received: from CO1NAM03FT051.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e48::200) by DM3PR08CA0023.outlook.office365.com (2603:10b6:0:52::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1017.14 via Frontend Transport; Mon, 6 Aug 2018 10:41:13 +0000
Authentication-Results: spf=pass (sender IP is 192.147.115.54) smtp.mailfrom=Aviatnet.com; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=Aviatnet.com;
Received-SPF: Pass (protection.outlook.com: domain of Aviatnet.com designates 192.147.115.54 as permitted sender) receiver=protection.outlook.com;  client-ip=192.147.115.54; helo=mail-send.aviatnet.com;
Received: from mail-send.aviatnet.com (192.147.115.54) by CO1NAM03FT051.mail.protection.outlook.com (10.152.80.242) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.20.1038.3 via Frontend Transport; Mon, 6 Aug 2018 10:41:13 +0000
From: Hayden Brown <Hayden.Brown@Aviatnet.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Fwd: Re: YANG schema mount - any early implementations?
Thread-Index: AQHULXHnf0j4w06BJUK15TD2/0e+zA==
Date: Mon, 6 Aug 2018 10:41:11 +0000
Message-ID: <1533552073111.98355@Aviatnet.com>
References: <5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn>,  <a6ad2e01-48e6-455a-7bbc-6ac5f58b9e07@labn.net>
In-Reply-To: <a6ad2e01-48e6-455a-7bbc-6ac5f58b9e07@labn.net>
Accept-Language: en-NZ, en-US
Content-Language: en-NZ
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.15.6.10]
Content-Type: multipart/alternative; boundary="_000_153355207311198355Aviatnetcom_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:192.147.115.54; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(346002)(136003)(376002)(396003)(39850400004)(2980300002)(438002)(53754006)(199004)(189003)(336012)(6916009)(86362001)(16586007)(1730700003)(476003)(561944003)(7696005)(72206003)(478600001)(8676002)(36756003)(5024004)(5640700003)(25786009)(118246002)(2906002)(6246003)(84326002)(486006)(33964004)(11346002)(446003)(2616005)(956004)(76176011)(126002)(246002)(316002)(7636002)(8936002)(2501003)(4546004)(7736002)(36736006)(2351001)(356003)(106466001)(26005)(53546011)(30436002)(229853002)(53416004)(102836004)(3846002)(5660300001)(19627405001)(6116002)(6306002)(54896002)(106002)(966005)(345774005)(7596002)(606006)(186003)(97876018)(6486002)(236005)(117636001)(19607625011); DIR:OUT; SFP:1101; SCL:1; SRVR:DM2PR08MB1435; H:mail-send.aviatnet.com; FPR:;  SPF:Pass; LANG:en; PTR:mail-send.aviatnet.com; A:1; MX:1; 
X-Microsoft-Exchange-Diagnostics: 1; CO1NAM03FT051; 1:7rmcLS0c/+T2oc545uLkHRsrfv7lI8RvpzNlEm1wtZd363dEsvP6mwZ/ss+wHgsiin9CwyrXJM7by/bv0vNLMAbHU17ScMDFalhHtw41CRFiLsfJBG/FuKPWwOs8mgRg
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: faf06ec0-298f-4aef-9643-08d5fb892171
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4608076)(2017052603328)(7153060)(7193020); SRVR:DM2PR08MB1435; 
X-Microsoft-Exchange-Diagnostics: 1; DM2PR08MB1435; 3:gq0Bb8izMZJNveVNwSxQjlRxjLfS+LwDs2IjkuD59jnZM/UsQ5lnCplJeM8RCnE6cXfNqe0WRXXJjZ81YZinJmH96HS7qLGOTGasJAeqZnY4WScsz5rsgcJHH4odTS3iJW27nxUUZI4OhH250TK39uDP8KosXH037ZnlUETehtA89Pf3VfnO85XyBvKb3m7w5HTbzIBZXs0dwed7+vlhFBjd5mHomWghWjyEB4fsGNzPDvbigYfbQvtqH/36W5kXSAvoEGuWzMp7YLA7inPeApSwoqBqo/iy2TXdUVYddiHpPm7CPTxWW6TF8BEv/xaSAl1ugZwgbPCjYE+Hxtv72T4O2qUqXG03BRyZJkD4/MA=; 25:8EsABwWM01mC8JcrabSBPA+n9dUY7CAkkoqiUIZewMd6y7G2IyN5aF4672zyq4vg5WPEjfYrnFiW6sXXTSsEJRON77QNKL/UAy4IYJEw3ZyXQIgCJR7wXfXNmXQUKSg7G+f8NQz71o713Qik8vShYvzJvl1i6P5w5AmMnfS5Zre0PcnxRVBLZykI89b1x+5dl7NAEsRQ7MJ9BqX47KRpLnwVmudnqGxwiQD1wcb3IkCvlHxzXDZk51CqSeHkx4p0HHs1y0thqZWkv+LEMClReeAoM3dtKptWB77k+8zeBI2QqsWQLxo4inDkdACk/0Pk7sYzZnzAVSHKs7ZTiG778Q==
X-MS-TrafficTypeDiagnostic: DM2PR08MB1435:
X-Microsoft-Exchange-Diagnostics: 1; DM2PR08MB1435; 31:LB/Iy5w66fuwu8NGJ9GRbKlXfXZgb7NtFMgWMqc4f1mXyeLwVqyDFsIRkOpCgrQY9Q6KNyoUaLzB9ut52KYjdhSEjG2kaH4BaRMBLIrI8dZHdSVENBl/5+UUq96c/i1T2ZHdCLwFxlQh0c/ul4OOxI6DLJM3OZ3BFNOAh7jt0vE7vlBDD1Xzw5tzKUZAqLnQB4dlGkj4XrlEAQJo9t01hweDr9gSau5NbCdhBa67qSI=; 20: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
X-Microsoft-Antispam-PRVS: <DM2PR08MB1435BE455331157BF3ABBF18F6200@DM2PR08MB1435.namprd08.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(120809045254105);
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93004095)(3002001)(3231311)(944501410)(52105095)(10201501046)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:DM2PR08MB1435; BCL:0; PCL:0; RULEID:; SRVR:DM2PR08MB1435; 
X-Microsoft-Exchange-Diagnostics: 1; DM2PR08MB1435; 4:/iL2My3gIv+cvJbv0oRkRmUcDEqXn/M83QnT+3o4361/pkV2qR5W/CaxyMPvvRiMd9gPM3kxoTIAdvG0CcSbBdeoWAqK/eFuL0pPoaRz3Qe/+r82Hw9pGlbT8JnrngrHsVQuc+NygOqVSf7aIl+mwYrntUNrZqtKyiQg8IdsRnIJtfxXg8+o11KbPGhNP2MkpCvPN+JkhlKvTtR38tYXa5W/KyF+g9JFVHeHpSZCzTFlrwnOTcR7pLtV9h2PDeUXQLtmNyH/GzVCKAxEIxOrunzt03T0eA3doGDayr/qNZSbzFAFqtz3CKMHChMAd9i483szsD5fec/NGXOz18bdwI3L5N3+B0j+8jET9yWokAY=
X-Forefront-PRVS: 07562C22DA
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM2PR08MB1435; 23:mNQcw91PIa/P4vEvzDQ26SqBDom9LXSQ6kBuq/Wv/?= =?us-ascii?Q?ln+vBvlwVC2b5+PmejDk/Hk9Lk7SLFw/NekZ75nyK0XEEPr4dOhL/vj/L7GB?= =?us-ascii?Q?WelswR4EZJRRRwxe7S6Wf0JDclMOSrELM3yX59nAaqKoehqsAQjFoJn8gTwS?= =?us-ascii?Q?3iLBU1uW9fU0fjcAMJlnPXZOyCnPWUoKslBRx0vBrvkRHQNAzcCpg0u235nX?= =?us-ascii?Q?HgFBOc2t4JPc+Gdgs8+K3IDqmXzIxKDLX1L8VF1Hjzo9z6s9FX4C+n6WSgPT?= =?us-ascii?Q?LqDjEvC2Kb9JT+TSKoapzKYy85I/A2scFn+5KKUeDiw7l9lskJfohoWhCGne?= =?us-ascii?Q?cQq9wCaA0YcBJFlWGI3Y8EAtRKtAvdd8UQ0ExMfYZ+Ixs+e7xT4ZDp7xST+c?= =?us-ascii?Q?rFu5eOViOWAp6ZURsjSglvPSh8+eZd7GNgcXXi8AcuNAY5R8EGaiy1Pro/yu?= =?us-ascii?Q?RFSlr90m6aCIDDv7fNzL1qr/ul6g69oBN7WWTI1pesDAVfLr5fSabFOq6o5G?= =?us-ascii?Q?+1u+jHG8bkvadEofQy5skvyH3cJvxwyApeZITiumLi7xC9rzdo8ngTk1WeZt?= =?us-ascii?Q?q5QstHC8hdUJUTWIXrVvJAjdQDxONlEHNcS8c6SQeZRUt8pLp8lXG1djWGZk?= =?us-ascii?Q?1pG9hJ0FCgU2zLGqEBl+PNIIcxJbC2VboiImNC3g9DdwlHKv0zX8hXqKz+Sr?= =?us-ascii?Q?ZG7jQsq6h8l9FkPcOeN8dCmGkZAR0dFMkNljDngU55dMk23HbPe+9z6w3r9S?= =?us-ascii?Q?gZhm4EKbKUyYDK8Q5+/IVVd5BdTqkTlHt2ynS8/HUmfFa9QBsvkkO6adQCM0?= =?us-ascii?Q?npj1qWsoWZMcTZC0Ntf1xB0zQ/09f0I98jPKCTaKEfmbl5cPO3bHf3vHZVDV?= =?us-ascii?Q?W9KbvCzoJzuh4mHekPUcaE7LDjYlpCNMdbpi5O/OeOZ/GxaKGwxHgggPNhXr?= =?us-ascii?Q?D81cJIgljsKuDlITh62bebQWHjn2XlunutzlD5dJECZkfEkwSQgPRHEwT5gs?= =?us-ascii?Q?CUVB7/mrxZ+/gXBHUMkHDO9qHblVO8J7QbcTgX6Zqbt5fb4zYn8UoWCyyE29?= =?us-ascii?Q?DGkWOtXTaHhMZNpDaZYaNqwv8GNjOhNjE67+YYBqKWFoug0tazvysEp2ddKH?= =?us-ascii?Q?kGBT/A1oX4hYTK8jQxL6LgmKe5ghUGuZn7RGTtV/z0ITSQUi6IJJGFhauPdk?= =?us-ascii?Q?OhLbS/ZuS/HRSvfIVj9hr4bV+GfUCyvKW46Zf9w/QkBoAmZl+jlmLAGsDLEO?= =?us-ascii?Q?ezHPKhuNtOFxcTOpYXsa5sMsrKkfzY5a49ldqtIhZiUsFqznV8yImF7Dt+ix?= =?us-ascii?Q?MYArKDBBSBaLbagbrBlhSP6JSZyuqcFx+d3eSh1FRXZZScUez/dJM/bROrxP?= =?us-ascii?Q?5ntjHFbBeJDCxp9YO27kQZ+VJLNLzg4Gw3zciVLf/w1JF2U+tT1/eA1KgCGU?= =?us-ascii?Q?kaQK4LsbsgMDihi6WQ5AHC4YPCsVg3PHxT5d4U10f9UXuinO3YoLdeLAX6jA?= =?us-ascii?Q?hb+ZxMU7jEIqpo80WGofhib1c6AW6yeQvqYRM/0mm2/ea0gSLzK7J9V?=
X-Microsoft-Antispam-Message-Info: F3kA45oiXU2KkJHxStQjSe9GVwF13WYY0HnwTLGtAEkNUeB6eD7kPvc0y27n0QWvM4/7AJplgvNdtXZ+R8I64GNoH5XfsKng/+tdoGClJEvOYYqkl2OhevQOZRnbcAIf+z7eF5UJaua4XyNKSKq4UAotdz0b43H8f8vpvs+Af4lfvBaWJyun3OpFlHt/cSN22dnPx6OtQe90tQIk5H+i5fZ6pTJzEI+7v/y5a2DyqYKN0ldw2oCDaRqc+2xnU19Xx8qAwCGfCN8nxQCej6Hqf88vPn0JhdZPOwBM2aHWGO5/1GbeS/mjOfpU4qP1SSAF7QP8RJGDIyoEO7Uzdf538lLb+m+LEjyaYZp2JSGB3mI=
X-Microsoft-Exchange-Diagnostics: 1; DM2PR08MB1435; 6:FT2uAL9imvAqZ6xPiYA71UBZT9IO6btSQO+eMgeVeeXKFmzDv41zZ1lzSKa1I614E4kKAqsW6iDWz9G+c5siR77YvtzohBMCNFm6R463KNgXpO0zt8QnZmZMRTtEpRzxqbhHKLQHp4+6ApXGs7mbftnYDkU8cyvvOBeg8LJy+7KgZleBqsqnbI7sHFDvf/sU/EcIWuM2GIPdNgqKi65EpM+6HpB14mlJNAIxbRIug1bSvKeAqdhSIAuB0JcBz12vtJ1BGXZNWc/uHAAMOfP7MYI1v7R8c2eCSME0uTG52j+8tAwnBQmdjdgQRMydfAZHWNh/3msYmc3bBrGz2VUrcgrGRiIHwoW9cNicJWtKuDShNOaBo7Elv3YndvlFcRNH2UKaWOhsdS5NiD8ZLCsDejfscJvFMDGIaG6nUDQiJca/zBggwamY0SHhsUzFHUQKEzNCxkBWB22fVNI8XErR1A==; 5:5ckSLIeRBqEsieOgzp61MSwmwFD1i4NMSRYhh0YQ0OuglbERS8wSva+Z2oidIGUqvubMGoAWQ5gDa1Zat5GlAoQ95S9l6j6xODofvHuuUq8ID/4rAvXFZgeyB29AGPjUeQ2ScSY+Vg0OmB1lNYqp//v33XN0U+JWJ9J9q3moY1Q=; 7:yFuxiAGqUeXIR5tI27DHI5EF/gbGoOCWs3a8DgCvWfgcMuFpl4g8vthe0wf4jcdsUoyNaeVunBOY27bJ2PoZBph5s8SD7zq8r54fFvYBGwL9wGt768MZtqLzsGoQh2EEP8MNaC8IQ5DDhr0db04kAxi1l4pKIg0IeyBjfGN8bwMNANY2isGkfEkSnlRhd/UapLnL2xiNG6yAi4DKqxBd1GXSiVxczlEl0tyKutsbp8oX3UeY3wWTyK3hDgFITR3p
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: aviatnet.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Aug 2018 10:41:13.1726 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: faf06ec0-298f-4aef-9643-08d5fb892171
X-MS-Exchange-CrossTenant-Id: 8d7d22b9-3890-4eef-95a6-a226e64151be
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=8d7d22b9-3890-4eef-95a6-a226e64151be; Ip=[192.147.115.54];  Helo=[mail-send.aviatnet.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR08MB1435
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/yIXOHz5qZt56TFSA-7SmEdhdeZ4>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 10:41:19 -0000

--_000_153355207311198355Aviatnetcom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_153355207311198355Aviatnetcom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxzdHlsZSB0eXBlPSJ0ZXh0L2NzcyIgc3R5bGU9
ImRpc3BsYXk6bm9uZSI+PCEtLSBwIHsgbWFyZ2luLXRvcDogMHB4OyBtYXJnaW4tYm90dG9tOiAw
cHg7IH0gQGZvbnQtZmFjZSB7IGZvbnQtZmFtaWx5OiBDYWxpYnJpOyB9IHAuTXNvTm9ybWFsLCBs
aS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3JtYWwgeyBtYXJnaW46IDBjbSAwY20gMC4wMDAxcHQ7IGZv
bnQtc2l6ZTogMTFwdDsgZm9udC1mYW1pbHk6IENhbGlicmksIHNhbnMtc2VyaWY7IGNvbG9yOiB3
aW5kb3d0ZXh0OyB9IGE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsgeyBjb2xvcjogYmx1ZTsgdGV4
dC1kZWNvcmF0aW9uOiB1bmRlcmxpbmU7IH0gYTp2aXNpdGVkLCBzcGFuLk1zb0h5cGVybGlua0Zv
bGxvd2VkIHsgY29sb3I6IHB1cnBsZTsgdGV4dC1kZWNvcmF0aW9uOiB1bmRlcmxpbmU7IH0gcHJl
IHsgbWFyZ2luOiAwY20gMGNtIDAuMDAwMXB0OyBmb250LXNpemU6IDEwcHQ7IGZvbnQtZmFtaWx5
OiAiQ291cmllciBOZXciOyBjb2xvcjogYmxhY2s7IH0gc3Bhbi5FbWFpbFN0eWxlMTcgeyBmb250
LWZhbWlseTogQ2FsaWJyaSwgc2Fucy1zZXJpZjsgY29sb3I6IHdpbmRvd3RleHQ7IH0gc3Bhbi5I
VE1MUHJlZm9ybWF0dGVkQ2hhciB7IGZvbnQtZmFtaWx5OiAiQ291cmllciBOZXciOyBjb2xvcjog
YmxhY2s7IH0gQHBhZ2UgV29yZFNlY3Rpb24xIHsgbWFyZ2luOiA3MnB0OyB9IGRpdi5Xb3JkU2Vj
dGlvbjEgeyB9LS0+PC9zdHlsZT4NCjwvaGVhZD4NCjxib2R5IGRpcj0ibHRyIiBzdHlsZT0iZm9u
dC1zaXplOjEycHQ7Y29sb3I6IzAwMDAwMDtiYWNrZ3JvdW5kLWNvbG9yOiNGRkZGRkY7Zm9udC1m
YW1pbHk6Q2FsaWJyaSxBcmlhbCxIZWx2ZXRpY2Esc2Fucy1zZXJpZjsiPg0KPHA+4oCLSGkgTG91
LDxicj4NCjwvcD4NCjxwPjxicj4NCjwvcD4NCjxwPlRoYW5rIHlvdSZuYnNwO2ZvciB5b3VyIHJl
c3BvbnNlLiBJbiB0aGUgbmV3IGNvcHkgb2YgdGhlIHNlY3Rpb25zIGJlbG93Jm5ic3A7SSd2ZSBh
dHRlbXB0ZWQgdG8gY29udmV5Jm5ic3A7aG93IEkgdGhpbmsmbmJzcDt0aGUgcGFyYWdyYXBocyBj
b3VsZCByZWFkLiZuYnNwOzwvcD4NCjxwPjxicj4NCjwvcD4NCjxwPkluIG15IG1pbmQsIHRoZSZu
YnNwO21haW4gJnF1b3Q7cG9pbnQmbmJzcDtvZiBhbWJpZ3VpdHkmcXVvdDsgaXMgdGhhdCBpdCBz
ZWVtZWQmbmJzcDt0aGUgZXhpc3RpbmcmbmJzcDt3b3JkaW5nIGltcGxpZXM6PGJyPg0KPC9wPg0K
PHVsIGRpcj0iIiBjbGFzcz0iIiBzdHlsZT0iIj4NCjxsaT7igIsmbmJzcDs8c3BhbiBzdHlsZT0i
Zm9udC1zaXplOiAxMnB0OyI+dGhlJm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
IDEycHQ7Ij5tb3VudC1wb2ludCZuYnNwO2xpc3QNCjwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1z
aXplOiAxMnB0OyI+c3BlY2lmaWVzIHdoaWNoJm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6IDEycHQ7Ij5tb2R1bGVzJm5ic3A7YXJlIG1vdW50ZWQgYmVsb3cmbmJzcDt0aGUgcm9v
dCBvZiB0aGUmbmJzcDttb3VudCBwb2ludC48L3NwYW4+PGJyPg0KPC9saT48L3VsPg0KPHA+PC9w
Pg0KPHA+aG93ZXZlciwgSSB0aGluayB3ZSBoYXZlIGFsbCZuYnNwOzxzcGFuIHN0eWxlPSJmb250
LXNpemU6IDEycHQ7Ij5hZ3JlZWQgdGhhdDo8L3NwYW4+PC9wPg0KPHA+PC9wPg0KPHVsPg0KPGxp
PuKAi3RoZSA8c3BhbiBzdHlsZT0iZm9udC1zaXplOiAxMnB0OyI+bW/igIt1bnQtPC9zcGFuPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij5wb2ludCBsaXN0IHNwZWNpZmllcyB0aGUmbmJz
cDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsiPnBhcmVudCBtb2R1bGUmbmJz
cDt0aGF0Jm5ic3A7PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij5jb250PC9z
cGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij5hPC9zcGFuPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6IDEycHQ7Ij5pbnM8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsi
PiZuYnNwO3RoZTwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOiAxMnB0OyI+DQo8L3NwYW4+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsiPm1vdW50LTwvc3Bhbj48c3BhbiBzdHlsZT0i
Zm9udC1zaXplOiAxMnB0OyI+cG88L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsi
PmludCw8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsiPi48L3NwYW4+PGJyPg0K
PC9saT48L3VsPg0KPHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsiPjwvc3Bhbj4NCjxwPjwv
cD4NCjxwPkkgc2VlIHRoaXMgYXMganVzdCZuYnNwO2Egc3VidGxlIGludGVycHJldGF0aW9uIDxz
cGFuIHN0eWxlPSJmb250LWZhbWlseTogQ2FsaWJyaSwgQXJpYWwsIEhlbHZldGljYSwgc2Fucy1z
ZXJpZjsgZm9udC1zaXplOiAxNnB4OyBiYWNrZ3JvdW5kLWNvbG9yOiByZ2IoMjU1LCAyNTUsIDI1
NSk7Ij4NCmRpZmZlcmVuY2UmbmJzcDs8L3NwYW4+aW4mbmJzcDt0aGUgd29yZGluZyZuYnNwOyZx
dW90OzxlbT5zcGVjaWZpZXMgdGhlIG1vdW50ZWQmbmJzcDtzY2hlbWE8L2VtPiZxdW90Oy48YnI+
DQo8L3A+DQo8cD48YnI+DQo8L3A+DQo8cD48YnI+DQo8L3A+DQo8cD5Ib3BlZnVsbHkgdGhlIHdv
cmRpbmcgKDxzcGFuIHN0eWxlPSJmb250LWZhbWlseTogQ2FsaWJyaSwgQXJpYWwsIEhlbHZldGlj
YSwgc2Fucy1zZXJpZjsgZm9udC1zaXplOiAxNnB4OyBiYWNrZ3JvdW5kLWNvbG9yOiByZ2IoMjU1
LCAyNTUsIDI1NSk7Ij5lZDwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6IENhbGlicmks
IEFyaWFsLCBIZWx2ZXRpY2EsIHNhbnMtc2VyaWY7IGZvbnQtc2l6ZTogMTZweDsgYmFja2dyb3Vu
ZC1jb2xvcjogcmdiKDI1NSwgMjU1LCAyNTUpOyI+aXQ8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQt
ZmFtaWx5OiBDYWxpYnJpLCBBcmlhbCwgSGVsdmV0aWNhLCBzYW5zLXNlcmlmOyBmb250LXNpemU6
IDE2cHg7IGJhY2tncm91bmQtY29sb3I6IHJnYigyNTUsIDI1NSwgMjU1KTsiPmVkDQogaW4mbmJz
cDt0aGUmbmJzcDs8L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OiBDYWxpYnJpLCBBcmlh
bCwgSGVsdmV0aWNhLCBzYW5zLXNlcmlmOyBmb250LXNpemU6IDE2cHg7IGJhY2tncm91bmQtY29s
b3I6IHJnYigyNTUsIDI1NSwgMjU1KTsiPmJyYWNrZXRzKTwvc3Bhbj4mbmJzcDtiZWxvdyBiZXR0
ZXImbmJzcDtjb252ZXlzIG15IHRob3VnaHRzLiBQbGVhc2UgZmVlbCBmcmVlIHRvIGNvcnJlY3Qg
bWUsIG9yIGltcHJvdmUgdGhlIHdvcmRpbmcgYmVsb3cmbmJzcDthcyB5b3Ugc2VlDQogZml0Ljxi
cj4NCjwvcD4NCjxwPjxicj4NCjwvcD4NCjxibG9ja3F1b3RlIHR5cGU9ImNpdGUiIHN0eWxlPSJj
b2xvcjogcmdiKDMzLCAzMywgMzMpOyBmb250LWZhbWlseTogQ2FsaWJyaSwgQXJpYWwsIEhlbHZl
dGljYSwgc2Fucy1zZXJpZjsgZm9udC1zaXplOiAxNnB4OyBiYWNrZ3JvdW5kLWNvbG9yOiByZ2Io
MjU1LCAyNTUsIDI1NSk7Ij4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIiBzdHlsZT0iZm9udC1mYW1pbHk6IENhbGlicmksIHNhbnMtc2VyaWY7Ij48c3Ry
b25nPjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij5TZWN0aW9uIDMuMyDigJMgUGFnZSA3
PC9zcGFuPjwvc3Ryb25nPjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij48YnI+DQo8L3Nw
YW4+Jmd0OyBUaGUgJnF1b3Q7L3NjaGVtYS1tb3VudHMmcXVvdDsgY29udGFpbmVyIGhhcyB0aGUg
JnF1b3Q7bW91bnQtcG9pbnQmcXVvdDsgbGlzdCBhcyBvbmUgb2YgaXRzIGNoaWxkcmVuLiBFdmVy
eSBlbnRyeSBvZiB0aGlzIGxpc3QgcmVmZXJzIHRocm91Z2ggaXRzIGtleSB0byBhIG1vdW50IHBv
aW50IGFuZCZuYnNwOzxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDAsIDAsIDApOyB0ZXh0LWRlY29y
YXRpb246IG5vbmUgc29saWQgcmdiKDAsIDAsIDApOyI+PHNwYW4gc3R5bGU9ImNvbG9yOiByZ2Io
MCwgMCwgMCk7IHRleHQtZGVjb3JhdGlvbjogbm9uZSBzb2xpZCByZ2IoMCwgMCwgMCk7Ij5zcGVj
aWZpZXMNCiB0aGUmbmJzcDs8c3Ryb25nIHN0eWxlPSJjb2xvcjogcmdiKDc1LCAxNjUsIDM2KTsg
dGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJnYig3NSwgMTY1LCAzNik7Ij48c3BhbiBzdHls
ZT0iY29sb3I6IHJnYig3NSwgMTY1LCAzNik7IHRleHQtZGVjb3JhdGlvbjogbm9uZSBzb2xpZCBy
Z2IoNzUsIDE2NSwgMzYpOyI+W3R5cGUgb2ZdJm5ic3A7PC9zcGFuPjwvc3Ryb25nPm1vdW50ZWQg
c2NoZW1hPHNwYW4gc3R5bGU9ImNvbG9yOiByZ2IoNzUsIDE2NSwgMzYpOyB0ZXh0LWRlY29yYXRp
b246IG5vbmUgc29saWQgcmdiKDc1LCAxNjUsIDM2KTsiPiZuYnNwOzxzdHJvbmc+W2FzJm5ic3A7
JnF1b3Q7aW5saW5lJnF1b3Q7DQogb3IgJnF1b3Q7c2hhcmVkLXNjaGVtYSZxdW90O108L3N0cm9u
Zz48L3NwYW4+Ljwvc3Bhbj48L3NwYW4+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTogMTJwdDsiPjxi
cj4NCjxicj4NCjwvc3Bhbj48c3Ryb25nPjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij5T
ZWN0aW9uIDMuMyAtIFBhZ2UgODwvc3Bhbj48L3N0cm9uZz48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OiAxMnB0OyI+PGJyPg0KPC9zcGFuPiZndDsgQW4gZW50cnkgb2YgdGhlICZxdW90O21vdW50LXBv
aW50JnF1b3Q7IGxpc3QgY2FuIHM8c3BhbiBzdHlsZT0iY29sb3I6IHJnYigwLCAwLCAwKTsgdGV4
dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJnYigwLCAwLCAwKTsiPnBlY2lmeSZuYnNwOzwvc3Bh
bj48c3BhbiBzdHlsZT0iY29sb3I6IHJnYigwLCAwLCAwKTsgdGV4dC1kZWNvcmF0aW9uOiBub25l
IHNvbGlkIHJnYigwLCAwLCAwKTsiPjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDAsIDAsIDApOyB0
ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDAsIDAsIDApOyI+dGhlDQo8c3Ryb25nIHN0
eWxlPSJjb2xvcjogcmdiKDc1LCAxNjUsIDM2KTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlk
IHJnYig3NSwgMTY1LCAzNik7Ij4NCjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDc1LCAxNjUsIDM2
KTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJnYig3NSwgMTY1LCAzNik7Ij5bdHlwZSBv
Zl08L3NwYW4+PC9zdHJvbmc+IG1vdW50ZWQgc2NoZW1hPC9zcGFuPjwvc3Bhbj48c3BhbiBzdHls
ZT0iY29sb3I6IHJnYigwLCAwLCAwKTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJnYigw
LCAwLCAwKTsiPiZuYnNwO2luIHQ8L3NwYW4+d28gZGlmZmVyZW50IHdheXMsICZxdW90O2lubGlu
ZSZxdW90OyBvcg0KICZxdW90O3NoYXJlZC1zY2hlbWEmcXVvdDsuPHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZTogMTJwdDsiPjxicj4NCjxicj4NCjxicj4NCjwvc3Bhbj48c3Ryb25nPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6IDEycHQ7Ij5TZWN0aW9uIDkgLSBQYWdlJm5ic3A7PC9zcGFuPjwvc3Ryb25n
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij48c3Ryb25nPjEzPC9zdHJvbmc+PC9zcGFu
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij48YnI+DQo8L3NwYW4+Jmd0OyBBIG1vdW50
IHBvaW50IGRlZmluZXMgYSBwbGFjZSBpbiB0aGUgbm9kZSBoaWVyYXJjaHkgd2hlcmUgb3RoZXIg
ZGF0YSBtb2RlbHMgbWF5IGJlIGF0dGFjaGVkLiBBIHNlcnZlciB0aGF0IGltcGxlbWVudHMgYSBt
b2R1bGUgd2l0aCBhIG1vdW50IHBvaW50IHBvcHVsYXRlcyB0aGUgL3NjaGVtYS1tb3VudHMvbW91
bnQtcG9pbnQgbGlzdCB3aXRoIGRldGFpbGVkIGluZm9ybWF0aW9uIG9uIHdoZXRoZXIgdGhlPHNw
YW4gc3R5bGU9ImNvbG9yOiByZ2IoNzUsIDE2NSwgMzYpOyB0ZXh0LWRlY29yYXRpb246IG5vbmUg
c29saWQgcmdiKDc1LCAxNjUsIDM2KTsiPiZuYnNwOzxzdHJvbmc+Wzwvc3Ryb25nPjwvc3Bhbj48
c3BhbiBzdHlsZT0iY29sb3I6IHJnYig3NSwgMTY1LCAzNik7IHRleHQtZGVjb3JhdGlvbjogbm9u
ZSBzb2xpZCByZ2IoNzUsIDE2NSwgMzYpOyI+PHNwYW4gc3R5bGU9ImNvbG9yOiByZ2IoNzUsIDE2
NSwgMzYpOyB0ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDc1LCAxNjUsIDM2KTsiPjxz
dHJvbmc+ZGF0YQ0KIG1vZGVscyBtb3VudGVkIGF0IGVhY2ggaW5zdGFuY2Ugb2YgYSZuYnNwO21v
dW50IHBvaW50IE1BWSBiZSBkaWZmZXJlbnQmbmJzcDsoJnF1b3Q7aW5saW5lJnF1b3Q7IGNhc2Up
IG9yIE1VU1QmbmJzcDthbGwgaGF2ZSB0aGUgc2FtZSBZQU5HJm5ic3A7bGlicmFyeSBjaGVja3N1
bSAoJnF1b3Q7c2hhcmVkLXNjaGVtYSZxdW90OyBjYXNlKTwvc3Ryb25nPjwvc3Bhbj48L3NwYW4+
PHNwYW4gc3R5bGU9ImNvbG9yOiByZ2IoNzUsIDE2NSwgMzYpOyB0ZXh0LWRlY29yYXRpb246IG5v
bmUgc29saWQgcmdiKDc1LCAxNjUsIDM2KTsiPjxzdHJvbmc+LiZuYnNwOzwvc3Ryb25nPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0iZm9udC1mYW1pbHk6IENhbGlicmks
IHNhbnMtc2VyaWY7Ij48c3BhbiBzdHlsZT0iY29sb3I6IHJnYig3NSwgMTY1LCAzNik7IHRleHQt
ZGVjb3JhdGlvbjogbm9uZSBzb2xpZCByZ2IoNzUsIDE2NSwgMzYpOyI+PHN0cm9uZz48YnI+DQo8
L3N0cm9uZz48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9ImZvbnQtZmFt
aWx5OiBDYWxpYnJpLCBzYW5zLXNlcmlmOyI+PHNwYW4gc3R5bGU9ImNvbG9yOiByZ2IoNzUsIDE2
NSwgMzYpOyB0ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDc1LCAxNjUsIDM2KTsiPjxz
dHJvbmc+Rm9yIGEmbmJzcDsmcXVvdDtzaGFyZWQtc2NoZW1hJnF1b3Q7IG1vdW50LXBvaW50IGxp
c3QmbmJzcDtlbnRyeSwmbmJzcDt0aGUgZW50cnkmbmJzcDtNQVkgaW5jbHVkZSBvbmUgb3IgbW9y
ZSZuYnNwOyZxdW90O3BhcmVudC1yZWZlcmVuY2UmcXVvdDsgbGlzdA0KIGVudHJpZXMmbmJzcDt0
aGF0IGFyZSB1c2VkIHRvIHNwZWNpZnkgdGhlJm5ic3A7Y29udGV4dCBub2Rlc2V0Jm5ic3A7Zm9y
IGFueSZuYnNwO1hQYXRoIDEuMCBleHByZXNzaW9ucyBkZWZpbmVkJm5ic3A7d2l0aGluIHRoZSBt
b3VudGVkIHNjaGVtYS5dPC9zdHJvbmc+PC9zcGFuPjxicj4NCjxzcGFuIHN0eWxlPSJmb250LXNp
emU6IDEycHQ7Ij48YnI+DQo8YnI+DQo8L3NwYW4+PHN0cm9uZz48c3BhbiBzdHlsZT0iZm9udC1z
aXplOiAxMnB0OyI+U2VjdGlvbiA5IC0gUGFnZSZuYnNwOzwvc3Bhbj48L3N0cm9uZz48c3BhbiBz
dHlsZT0iZm9udC1zaXplOiAxMnB0OyI+PHN0cm9uZz4xNDwvc3Ryb25nPjwvc3Bhbj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOiAxMnB0OyI+PGJyPg0KPC9zcGFuPmxpc3QgbW91bnQtcG9pbnQgezxi
cj4NCiZuYnNwOyZuYnNwOyZuYnNwOyBrZXkgJnF1b3Q7bW9kdWxlIGxhYmVsJnF1b3Q7Ozxicj4N
CiZuYnNwOyZuYnNwOyZuYnNwOyBkZXNjcmlwdGlvbjxicj4NCiZuYnNwOyZuYnNwOyZuYnNwOyA8
c3BhbiBzdHlsZT0iY29sb3I6IHJnYigwLCAwLCAwKTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNv
bGlkIHJnYigwLCAwLCAwKTsiPg0KJnF1b3Q7PC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjogcmdi
KDAsIDAsIDApOyB0ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDAsIDAsIDApOyI+PHNw
YW4gc3R5bGU9ImNvbG9yOiByZ2IoMCwgMCwgMCk7IHRleHQtZGVjb3JhdGlvbjogbm9uZSBzb2xp
ZCByZ2IoMCwgMCwgMCk7Ij5FYWNoIGVudHJ5IG9mIHRoaXMgbGlzdCBzcGVjaWZpZXMNCjxzcGFu
IHN0eWxlPSJjb2xvcjogcmdiKDc1LCAxNjUsIDM2KTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNv
bGlkIHJnYig3NSwgMTY1LCAzNik7Ij4NCjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDc1LCAxNjUs
IDM2KTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJnYig3NSwgMTY1LCAzNik7Ij48c3Ry
b25nPlt0aGUgdHlwZSBvZl08L3N0cm9uZz48c3BhbiBzdHlsZT0idGV4dC1kZWNvcmF0aW9uOiBu
b25lIHNvbGlkIHJnYig3NSwgMTY1LCAzNik7IGNvbG9yOiByZ2IoMCwgMCwgMCk7Ij48c3BhbiBz
dHlsZT0iY29sb3I6IHJnYigwLCAwLCAwKTsgdGV4dC1kZWNvcmF0aW9uOiBub25lIHNvbGlkIHJn
YigwLCAwLCAwKTsiPiZuYnNwO3NjaGVtYQ0KPC9zcGFuPjwvc3Bhbj48L3NwYW4+PC9zcGFuPjxz
cGFuIHN0eWxlPSJ0ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDc1LCAxNjUsIDM2KTsg
Y29sb3I6IHJnYigwLCAwLCAwKTsiPjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDAsIDAsIDApOyB0
ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDAsIDAsIDApOyI+Zm9yDQo8L3NwYW4+PC9z
cGFuPjxzcGFuIHN0eWxlPSJjb2xvcjogcmdiKDAsIDAsIDApOyB0ZXh0LWRlY29yYXRpb246IG5v
bmUgc29saWQgcmdiKDAsIDAsIDApOyI+YSBwYXJ0aWN1bDwvc3Bhbj5hciBtb3VudCBwb2ludA0K
PHN0cm9uZyBzdHlsZT0iY29sb3I6IHJnYig3NSwgMTY1LCAzNik7IHRleHQtZGVjb3JhdGlvbjog
bm9uZSBzb2xpZCByZ2IoNzUsIDE2NSwgMzYpOyI+DQo8c3BhbiBzdHlsZT0iY29sb3I6IHJnYig3
NSwgMTY1LCAzNik7IHRleHQtZGVjb3JhdGlvbjogbm9uZSBzb2xpZCByZ2IoNzUsIDE2NSwgMzYp
OyI+WyAoJnF1b3Q7aW5saW5lJnF1b3Q7IG9yICZxdW90O3NoYXJlZC1zY2hlbWEmcXVvdDspJm5i
c3A7XTwvc3Bhbj48L3N0cm9uZz48L3NwYW4+PC9zcGFuPjxzcGFuIHN0eWxlPSJjb2xvcjogcmdi
KDAsIDAsIDApOyB0ZXh0LWRlY29yYXRpb246IG5vbmUgc29saWQgcmdiKDAsIDAsIDApOyI+Ljwv
c3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOiAxMnB0OyI+PC9zcGFuPjwvcD4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJmb250LWZhbWlseTogQ2FsaWJyaSwgc2Fucy1zZXJpZjsiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6IDEycHQ7Ij4mbmJzcDs8L3NwYW4+PC9wPg0KPC9kaXY+DQo8
L2Jsb2NrcXVvdGU+DQo8cD5UaGFua3MgYW5kIGJlc3QgcmVnYXJkcyw8YnI+DQo8L3A+DQo8cD5I
YXlkZW48YnI+DQo8L3A+DQo8cD48YnI+DQo8L3A+DQo8cD48YnI+DQo8L3A+DQo8cD48YnI+DQo8
L3A+DQo8cD48YnI+DQo8L3A+DQo8ZGl2IHN0eWxlPSJjb2xvcjogcmdiKDMzLCAzMywgMzMpOyI+
DQo8aHIgdGFiaW5kZXg9Ii0xIiBzdHlsZT0iZGlzcGxheTppbmxpbmUtYmxvY2s7IHdpZHRoOjk4
JSI+DQo8ZGl2IGlkPSJkaXZScGx5RndkTXNnIiBkaXI9Imx0ciI+PGZvbnQgZmFjZT0iQ2FsaWJy
aSwgc2Fucy1zZXJpZiIgY29sb3I9IiMwMDAwMDAiIHN0eWxlPSJmb250LXNpemU6MTFwdCI+PGI+
RnJvbTo8L2I+IExvdSBCZXJnZXIgJmx0O2xiZXJnZXJAbGFibi5uZXQmZ3Q7PGJyPg0KPGI+U2Vu
dDo8L2I+IEZyaWRheSwgMyBBdWd1c3QgMjAxOCA3OjI4IGEubS48YnI+DQo8Yj5Ubzo8L2I+IEhh
eWRlbiBCcm93bjsgbmV0bW9kQGlldGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IEVYVEVSTkFM
OiBSZTogW25ldG1vZF0gRndkOiBSZTogWUFORyBzY2hlbWEgbW91bnQgLSBhbnkgZWFybHkgaW1w
bGVtZW50YXRpb25zPzwvZm9udD4NCjxkaXY+Jm5ic3A7PC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8
cD5IaSw8L3A+DQo8cD4mbmJzcDsmbmJzcDsmbmJzcDsgaG9wZWZ1bGx5IG90aGVycyB3aWxsIGNo
aW1lIGluIHRvbywgYnV0IGhlcmUncyBteSB2aWV3IChhcyBhIHVzZXIgb2Ygc2NoZW1hIG1vdW50
LCBzZWUNCjxhIGNsYXNzPSJtb3otdHh0LWxpbmstZnJlZXRleHQiIGhyZWY9Imh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLXJ0Z3dnLW5pLW1vZGVsIj4NCmh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLXJ0Z3dnLW5pLW1vZGVsPC9hPikuLi48YnI+DQo8
L3A+DQo8YnI+DQo8ZGl2IGNsYXNzPSJtb3otY2l0ZS1wcmVmaXgiPk9uIDcvMzAvMjAxOCA3OjI3
IFBNLCBIYXlkZW4gQnJvd24gd3JvdGU6PGJyPg0KPC9kaXY+DQo8YmxvY2txdW90ZSB0eXBlPSJj
aXRlIj4NCjxtZXRhIG5hbWU9IkdlbmVyYXRvciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTQg
KGZpbHRlcmVkCiAgICAgICAgbWVkaXVtKSI+DQo8c3R5bGU+CjwhLS0KQGZvbnQtZmFjZQoJe2Zv
bnQtZmFtaWx5OkNhbGlicml9CnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3Jt
YWwKCXttYXJnaW46MGNtOwoJbWFyZ2luLWJvdHRvbTouMDAwMXB0OwoJZm9udC1zaXplOjExLjBw
dDsKCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Cgljb2xvcjp3aW5kb3d0ZXh0
fQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rCgl7Y29sb3I6Ymx1ZTsKCXRleHQtZGVjb3JhdGlv
bjp1bmRlcmxpbmV9CmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dlZAoJe2NvbG9y
OnB1cnBsZTsKCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmV9CnByZQoJe21hcmdpbjowY207Cglt
YXJnaW4tYm90dG9tOi4wMDAxcHQ7Cglmb250LXNpemU6MTAuMHB0OwoJZm9udC1mYW1pbHk6IkNv
dXJpZXIgTmV3IjsKCWNvbG9yOmJsYWNrfQpzcGFuLkVtYWlsU3R5bGUxNwoJe2ZvbnQtZmFtaWx5
OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Cgljb2xvcjp3aW5kb3d0ZXh0fQpzcGFuLkhUTUxQcmVm
b3JtYXR0ZWRDaGFyCgl7Zm9udC1mYW1pbHk6IkNvdXJpZXIgTmV3IjsKCWNvbG9yOmJsYWNrfQpA
cGFnZSBXb3JkU2VjdGlvbjEKCXttYXJnaW46NzIuMHB0IDcyLjBwdCA3Mi4wcHQgNzIuMHB0fQpk
aXYuV29yZFNlY3Rpb24xCgl7fQotLT4KPC9zdHlsZT4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9u
MSI+DQo8cD48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVv
dDtzYW5zLXNlcmlmJnF1b3Q7Ij5IaSBldmVyeW9uZSw8YnI+DQo8YnI+DQpJIGp1c3Qgd2FudGVk
IHRvIGFzayBpZiBpdCB3b3VsZCBiZSBwb3NzaWJsZSB0byBjbGFyaWZ5IHRoZSBpbnRlbnRpb25z
IGFyb3VuZCBzb21lIG9mIHRoZSB3b3JkaW5nIG9mIHRoZSBkcmFmdCBzY2hlbWEgbW91bnQgc3Rh
bmRhcmQgKFJldi0xMCkuIEluIHBhcnRpY3VsYXIsIHJlZ2FyZGluZyBlbnRyaWVzIG9mIHRoZSAv
c2NoZW1hLW1vdW50cy9tb3VudC1wb2ludHMgbGlzdC48L3NwYW4+PC9wPg0KPHA+PHNwYW4gc3R5
bGU9ImZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
OyI+TXkgaW50ZXJwcmV0YXRpb24gaXMgdGhhdCB0aGUgaW50ZW5kZWQgdXNlIG9mIHRoZSAvc2No
ZW1hLW1vdW50cy9tb3VudC1wb2ludHMgbGlzdCBlbnRyaWVzIGFyZSB0byBzcGVjaWZ5IHRoZQ0K
PGI+cGFyZW50IG1vZHVsZXM8L2I+IHRoYXQgY29udGFpbiBhIG1vdW50IHBvaW50LiA8L3NwYW4+
PC9wPg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQp5ZXM8YnI+DQo8YmxvY2txdW90ZSB0eXBlPSJj
aXRlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cD48c3BhbiBzdHlsZT0iZm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5Gb2xsb3dp
bmcgb24gZnJvbSB0aGlzLCB0aGUgY2xpZW50IHNob3VsZCB1c2UgdGhlIFlBTkcgbGlicmFyeSBp
bnN0YW5jZSB0byBkZXRlcm1pbmUgd2hpY2ggc2NoZW1hIG9wdGlvbnMgY2FuIGJlIG1vdW50ZWQg
YXQgdGhlIHJvb3Qgb2YgYSBtb3VudCBwb2ludC4gVGhpcyBzZWVtcyBjb25zaXN0ZW50IHdpdGgg
dGhlIGV4YW1wbGVzIG9mIEFwcGVuZGl4IEENCiBvZiB0aGUgZHJhZnQgc3RhbmRhcmQuPC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KaWYgeW91IGRyb3AgdGhlIHdvcmQgJnF1b3Q7
b3B0aW9ucyZxdW90OywgdGhlbiB5ZXMuJm5ic3A7IE90aGVyIGV4YW1wbGVzIGNhbiBiZSBmb3Vu
ZCBpbiBkcmFmdC1pZXRmLXJ0Z3dnLW5pLW1vZGVsPGJyPg0KPGJyPg0KPGJsb2NrcXVvdGUgdHlw
ZT0iY2l0ZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHA+PC9wPg0KPHAgc3R5bGU9
Im1hcmdpbi1ib3R0b206MTIuMHB0Ij48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7Q2Fs
aWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7Ij5JbiB0aGlzIGVtYWlsIEkgd2FudGVk
IHRvIGhpZ2hsaWdodCB0aGUgZm9sbG93aW5nIHNlY3Rpb25zIG9mIHRoZSBkcmFmdCBSRkMgYmVs
b3cuIEluIG15IHZpZXcgdGhleSBzZWVtIHRvIG1lIHRvIGJlIHNvbWV3aGF0IGFtYmlndW91cywg
aW4gaW1wbHlpbmcgdGhhdCB0aGUgbW91bnQtcG9pbnQgbGlzdCBlbnRyaWVzDQogc3BlY2lmeSB0
aGUgPGk+KmNoaWxkKiA8L2k+bW9kdWxlIChzdWItc2NoZW1hKTo8YnI+DQo8YnI+DQo8YnI+DQom
Z3Q7RnJvbSA8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1p
ZXRmLW5ldG1vZC1zY2hlbWEtbW91bnQvP2luY2x1ZGVfdGV4dD0xIj4NCmh0dHBzOi8vZGF0YXRy
YWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbmV0bW9kLXNjaGVtYS1tb3VudC8/aW5jbHVk
ZV90ZXh0PTE8L2E+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTIuMHB0Ij5TZWN0aW9uIDMuMyDigJMgUGFnZSA3PC9zcGFuPjwvYj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+PGJyPg0KPC9zcGFuPjxzcGFuIHN0eWxlPSIi
PiZndDsgVGhlICZxdW90Oy9zY2hlbWEtbW91bnRzJnF1b3Q7IGNvbnRhaW5lciBoYXMgdGhlICZx
dW90O21vdW50LXBvaW50JnF1b3Q7IGxpc3QgYXMgb25lIG9mIGl0cyBjaGlsZHJlbi4gRXZlcnkg
ZW50cnkgb2YgdGhpcyBsaXN0IHJlZmVycyB0aHJvdWdoIGl0cyBrZXkgdG8gYSBtb3VudCBwb2lu
dCBhbmQNCjxzcGFuIHN0eWxlPSJjb2xvcjpyZWQiPnNwZWNpZmllcyB0aGUgbW91bnRlZCBzY2hl
bWE8L3NwYW4+Ljwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+PGJyPg0KPGJy
Pg0KPC9zcGFuPjxiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0Ij5TZWN0aW9uIDMuMyAt
IFBhZ2UgODwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPjxicj4NCjwv
c3Bhbj48c3BhbiBzdHlsZT0iIj4mZ3Q7IEFuIGVudHJ5IG9mIHRoZSAmcXVvdDttb3VudC1wb2lu
dCZxdW90OyBsaXN0IGNhbiBzcGVjaWZ5IDxzcGFuIHN0eWxlPSJjb2xvcjpyZWQiPg0KdGhlIG1v
dW50ZWQgc2NoZW1hPC9zcGFuPiBpbiB0d28gZGlmZmVyZW50IHdheXMsICZxdW90O2lubGluZSZx
dW90OyBvciAmcXVvdDtzaGFyZWQtc2NoZW1hJnF1b3Q7Ljwvc3Bhbj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEyLjBwdCI+PGJyPg0KPGJyPg0KPGJyPg0KPC9zcGFuPjxiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTIuMHB0Ij5TZWN0aW9uIDkgLSBQYWdlIDwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMi4wcHQiPjEzPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0
Ij48YnI+DQo8L3NwYW4+PHNwYW4gc3R5bGU9IiI+Jmd0OyBBIG1vdW50IHBvaW50IGRlZmluZXMg
YSBwbGFjZSBpbiB0aGUgbm9kZSBoaWVyYXJjaHkgd2hlcmUgb3RoZXIgZGF0YSBtb2RlbHMgbWF5
IGJlIGF0dGFjaGVkLiBBIHNlcnZlciB0aGF0IGltcGxlbWVudHMgYSBtb2R1bGUgd2l0aCBhIG1v
dW50IHBvaW50IHBvcHVsYXRlcyB0aGUgL3NjaGVtYS1tb3VudHMvbW91bnQtcG9pbnQgbGlzdCB3
aXRoIGRldGFpbGVkIGluZm9ybWF0aW9uIG9uPHNwYW4gc3R5bGU9ImNvbG9yOnJlZCI+DQogd2hp
Y2ggZGF0YSBtb2RlbHMgYXJlIG1vdW50ZWQgYXQgZWFjaCBtb3VudCBwb2ludDwvc3Bhbj4uPGJy
Pg0KPC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0Ij48YnI+DQo8L3NwYW4+PGI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPlNlY3Rpb24gOSAtIFBhZ2UgPC9zcGFuPjwv
Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+MTQ8L3NwYW4+PHNwYW4gc3R5bGU9ImZv
bnQtc2l6ZToxMi4wcHQiPjxicj4NCjwvc3Bhbj48c3BhbiBzdHlsZT0iIj5saXN0IG1vdW50LXBv
aW50IHs8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsga2V5ICZxdW90O21vZHVsZSBsYWJlbCZxdW90
Ozs8YnI+DQombmJzcDsmbmJzcDsmbmJzcDsgZGVzY3JpcHRpb248YnI+DQombmJzcDsmbmJzcDsm
bmJzcDsgJnF1b3Q7PHNwYW4gc3R5bGU9ImNvbG9yOnJlZCI+RWFjaCBlbnRyeSBvZiB0aGlzIGxp
c3Qgc3BlY2lmaWVzIGEgc2NoZW1hIGZvciBhIHBhcnRpY3VsYXIgbW91bnQgcG9pbnQ8L3NwYW4+
Ljwvc3Bhbj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+PC9zcGFuPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0Ij4mbmJzcDs8L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8YnI+DQpJIGhhdmUgcmVyZWFkIHRoZSBh
IGZldyB0aW1lcyBhbmQgYW0gaGF2aW5nIGEgaGFyZCB0aW1lIHVuZGVyc3RhbmQgd2hhdCBzaG91
bGQgYmUgY2hhbmdlZC4mbmJzcDsgQ2FuIHlvdSBzdWdnZXN0IHNwZWNpZmljIGNoYW5nZXMgdGhh
dCB3b3VsZCBhZGRyZXNzIHlvdXIgY29uY2Vybi9jb21tZW50PyZuYnNwOyBUaGlzIG1pZ2h0IGhl
bHAgdG8gdW5kZXJzdGFuZCB0aGUgaXNzdWUgeW91IGFyZSBzZWVpbmcuPGJyPg0KPGJyPg0KPGJs
b2NrcXVvdGUgdHlwZT0iY2l0ZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPjxicj4NCjwvc3Bh
bj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+VGhlIHdvcmRpbmcgbWFrZXMgbWUgd29u
ZGVyIGlmIHRoZXNlIHBhc3NhZ2VzIG1pZ2h0IGFjdHVhbGx5IGp1c3QgYmUgJnF1b3Q7bGVmdC1v
dmVyJnF1b3Q7IGNvbnRleHQgZnJvbSBlYXJsaWVyIHJldmlzaW9ucyBvZiB0aGUgZHJhZnQgc3Rh
bmRhcmQgKFJldmlzaW9uIDggYW5kIHByaW9yKSAtLSBlZmZlY3RpdmVseSByZWZlcnJpbmcgYmFj
ayB0byB0aGUgc2NoZW1hLW1vdW50ICc8aT51c2Utc2NoZW1hPC9pPicNCiBsaXN0Ljxicj4NCjxi
cj4NCjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCkFnYWluLCBJJ20gc2VlaW5n
IHRoZSBpc3N1ZS48YnI+DQo8YnI+DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIj4NCjxkaXYgY2xh
c3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9u
dC1zaXplOjEyLjBwdCI+PC9zcGFuPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0Ij48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4w
cHQiPjxicj4NCkkgZG8gb2YgY291cnNlIGFja25vd2xlZGdlIHRoYXQgaXQgaXMgZW50aXJlbHkg
cG9zc2libGUgdGhhdCBJJ3ZlIG1pc2ludGVycHJldGVkIHRoZSB3b3JkaW5nIG9mIHRoZSBwYXNz
YWdlcyBhYm92ZSwgaG93ZXZlciBpZiB0aGF0IGlzIHRoZSBjYXNlLCBJIHN1c3BlY3QgSSBtYXkg
bm90IGJlIHRoZSBvbmx5IG9uZSBpbiBmdXR1cmUuPGJyPg0KPC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PC9ibG9ja3F1b3RlPg0KQW5kIEknbSBzdXJlIEknbSBzdWZmZXJpbmcgZnJvbSBoYXZpbmcgc3Bl
bnQgd2F5IHRvbyBtdWNoIHRpbWUgb24gdGhpcyB0b3BpYyBzbyBtYXkgYmUgc2VlaW5nIHRoaW5n
cyBpbiB0aGUgdGV4dCB0aGF0IGFyZW4ndCBhY3R1YWxseSB0aGVyZSE8YnI+DQo8YnI+DQpDaGVl
cnMsPGJyPg0KTG91IDxicj4NCihubyBoYXRzKTxicj4NCjxicj4NCjxicj4NCjxibG9ja3F1b3Rl
IHR5cGU9ImNpdGUiPg0KPGRpdiBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0Ij5NYW55IHRoYW5rcyBmb3IgeW91
ciB0aW1lIG9uIHRoaXMgbWF0dGVyLjxicj4NCjxicj4NCkJlc3QgcmVnYXJkcyw8YnI+DQpIYXlk
ZW48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMi4wcHQiPiZuYnNwOzwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdCI+Jm5ic3A7PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPiZuYnNwOzwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPiZuYnNwOzwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
Pk9uIDIwLzA3LzIwMTggODowOSBQTSwgSnVlcmdlbiBTY2hvZW53YWVsZGVyIHdyb3RlOjwvcD4N
CjxwcmU+T24gV2VkLCBKdWwgMTEsIDIwMTggYXQgMDk6NDM6MzJBTSAmIzQzOzEyMDAsIGhheWRl
biB3cm90ZTo8L3ByZT4NCjxwcmU+Jm5ic3A7IDwvcHJlPg0KPHByZT5JIHVuZGVyc3RhbmQgdGhh
dCB0aGUgc2NoZW1hIG1vdW50IHByb3Bvc2FsIGlzIHN0aWxsIGVmZmVjdGl2ZWx5IGluIGEgPC9w
cmU+DQo8cHJlPnN0YXRlIG9mIGZsdXgsIGJ1dCBhcmUgdGhlcmUgYW55IHB1YmxpY2x5IHZpc2li
bGUgaW1wbGVtZW50YXRpb25zIG9yIDwvcHJlPg0KPHByZT5kZXBsb3ltZW50cyBvZiBhIE5FVENP
TkYgb3IgUkVTVENPTkYgc2VydmVyIHRoYXQgdGhvc2UgaW50ZXJlc3RlZCBjb3VsZCA8L3ByZT4N
CjxwcmU+ZXhwZXJpbWVudCB3aXRoIChlLmcuIHRvIGFpZCBpbiBjbGllbnQgZGV2ZWxvcG1lbnQp
PzwvcHJlPg0KPHByZT4mbmJzcDs8L3ByZT4NCjxwcmU+U3RhdGUgb2YgZmx1eD8gSXQgaXMgcGFz
dCBXRyBsYXN0IGNhbGwgYW5kIElFVEYgbGFzdCBjYWxsLjwvcHJlPg0KPHByZT4mbmJzcDs8L3By
ZT4NCjxwcmU+PGEgaHJlZj0iaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQt
aWV0Zi1uZXRtb2Qtc2NoZW1hLW1vdW50L2hpc3RvcnkvIj5odHRwczovL2RhdGF0cmFja2VyLmll
dGYub3JnL2RvYy9kcmFmdC1pZXRmLW5ldG1vZC1zY2hlbWEtbW91bnQvaGlzdG9yeS88L2E+PC9w
cmU+DQo8cHJlPiZuYnNwOzwvcHJlPg0KPHByZT4vanM8L3ByZT4NCjxwcmU+Jm5ic3A7PC9wcmU+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4m
bmJzcDs8L3A+DQo8L2Rpdj4NCjxicj4NCjxmaWVsZHNldCBjbGFzcz0ibWltZUF0dGFjaG1lbnRI
ZWFkZXIiPjwvZmllbGRzZXQ+IDxicj4NCjxwcmU+X19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX18KbmV0bW9kIG1haWxpbmcgbGlzdAo8YSBjbGFzcz0ibW96LXR4
dC1saW5rLWFiYnJldmlhdGVkIiBocmVmPSJtYWlsdG86bmV0bW9kQGlldGYub3JnIj5uZXRtb2RA
aWV0Zi5vcmc8L2E+CjxhIGNsYXNzPSJtb3otdHh0LWxpbmstZnJlZXRleHQiIGhyZWY9Imh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kIj5odHRwczovL3d3dy5pZXRm
Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL25ldG1vZDwvYT4KPC9wcmU+DQo8L2Jsb2NrcXVvdGU+DQo8
YnI+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_153355207311198355Aviatnetcom_--


From nobody Mon Aug  6 03:46:08 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D099130DBE; Mon,  6 Aug 2018 03:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Aj_Snp6e3IZ; Mon,  6 Aug 2018 03:45:59 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id DE421128CF3; Mon,  6 Aug 2018 03:45:55 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id D7C531AE0141; Mon,  6 Aug 2018 12:45:53 +0200 (CEST)
Date: Mon, 06 Aug 2018 12:45:52 +0200 (CEST)
Message-Id: <20180806.124552.546267868496801549.mbj@tail-f.com>
To: matthew.bocci@nokia.com
Cc: rtg-ads@ietf.org, rtg-dir@ietf.org, netmod@ietf.org, draft-ietf-netmod-schema-mount.all@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <8072D6C6-B951-4836-A423-9E71BED4F8DD@nokia.com>
References: <8072D6C6-B951-4836-A423-9E71BED4F8DD@nokia.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/WHbQaZflQVVzabsI1VKoEQg5fmo>
Subject: Re: [netmod] RtgDir review: draft-ietf-netmod-schema-mount-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 10:46:02 -0000
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=


From nobody Mon Aug  6 04:06:35 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F5AB130EB7 for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 04:06:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P6F9Q4YTXstL for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 04:06:31 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id F0057130DE2 for <netmod@ietf.org>; Mon,  6 Aug 2018 04:06:30 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id DE4DD1AE0141; Mon,  6 Aug 2018 13:06:29 +0200 (CEST)
Date: Mon, 06 Aug 2018 13:06:29 +0200 (CEST)
Message-Id: <20180806.130629.1938294228104902998.mbj@tail-f.com>
To: Hayden.Brown@Aviatnet.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <1533552073111.98355@Aviatnet.com>
References: <5df7eb40589d4631a33c704358bc8f8e@USP-EXCHPROD01.GNET.global.vpn> <a6ad2e01-48e6-455a-7bbc-6ac5f58b9e07@labn.net> <1533552073111.98355@Aviatnet.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EIKwOR50FNaT04WVgpgXMGzWyK8>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 11:06:33 -0000
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From nobody Mon Aug  6 11:50:53 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD39B130EE4 for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 11:50:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0JSaBvtySmDq for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 11:50:47 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id DDF29130EE2 for <netmod@ietf.org>; Mon,  6 Aug 2018 11:50:46 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id 2C9051AE0141 for <netmod@ietf.org>; Mon,  6 Aug 2018 20:50:46 +0200 (CEST)
Date: Mon, 06 Aug 2018 20:50:46 +0200 (CEST)
Message-Id: <20180806.205046.1122451156895376424.mbj@tail-f.com>
To: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <87muvjges7.fsf@nic.cz>
References: <87muvjges7.fsf@nic.cz>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jumtkcZPqHdoWkk-F9JQtblJGXQ>
Subject: Re: [netmod] 6087bis - Security Considerations template
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 18:50:50 -0000

Hi,

Ladislav Lhotka <lhotka@nic.cz> wrote:
> Hi,
> 
> Shawn Emery reviewed draft-ietf-netmod-schema-mount-10 and made this
> editorial comment:
> 
> OLD:
> 
> These are the subtrees and data nodes and their sensitivity/vulnerability:
> 
> NEW:
> 
> The following should be considered for subtrees/data nodes and their
> corresponding sensitivity/vulnerability:
> 
> However, the OLD fomulation comes from RFC 6087, so perhaps this change
> should be applied in draft-ietf-netmod-rfc6087bis in the first
> place. The NEW formulation indeed looks better to me.

What is the WG's opinion on this proposed text change?  6087bis is in
AUTH48 so if it needs to be changed it must happen now.

Of course, we can update
https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines even when
6087bis has been published.

If we don't want to update the template, I don't think we should
update the schema mount draft either.


/martin




> 
> Lada
> 
> -- 
> Ladislav Lhotka
> Head, CZ.NIC Labs
> PGP Key ID: 0xB8F92B08A9F76C67
> 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
> 


From nobody Mon Aug  6 12:03:45 2018
Return-Path: <acee@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 146FA130E3C for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 12:03:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GMsgDD9phxb3 for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 12:03:42 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42C3C130934 for <netmod@ietf.org>; Mon,  6 Aug 2018 12:03:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2814; q=dns/txt; s=iport; t=1533582222; x=1534791822; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=A1GghvDqUw3RRSdkrMJXspgyv9TQEcuzf+udmA+GjoA=; b=UTAavTSppWcyZraydmBe1etqz4atNixHNsrB6wbfkZFipxcsxF2vd6xD v9wYmN8mGN0ZEWtAapunHK1ET01cn1reZzV8jxOHMZjbqJlJoTabjk3u+ wKDrOL6AHitNlMzz94gcd9cCpy5D3mj5t/XNHVuplQofi45MS0dcNLOnQ M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0A6AgATm2hb/40NJK1cGwEBAQEDAQE?= =?us-ascii?q?BCQEBAYNOY38oCoN0iAmMR4INgzySK4F6CxgLhANGAheDECE0GAECAQECAQE?= =?us-ascii?q?CbRwMhTcBAQEBAgEBASEROhsCAQgOCgICJgICAiULFRACBAESgyABgXcID6x?= =?us-ascii?q?lgS6EX4VpBYELh34XggCBOR+CTIMbAQGEYjGCJAKaMwkChhiJK4FNjFOIH4J?= =?us-ascii?q?Mh0wCERSBJB04gVJwFTsqAYI+ixWFPm8MjmKBGwEB?=
X-IronPort-AV: E=Sophos;i="5.51,452,1526342400"; d="scan'208";a="423992877"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Aug 2018 19:03:41 +0000
Received: from XCH-RTP-012.cisco.com (xch-rtp-012.cisco.com [64.101.220.152]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id w76J3fEG004882 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 6 Aug 2018 19:03:41 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-012.cisco.com (64.101.220.152) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Mon, 6 Aug 2018 15:03:40 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1320.000; Mon, 6 Aug 2018 15:03:40 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Martin Bjorklund <mbj@tail-f.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] 6087bis - Security Considerations template
Thread-Index: AQHULbZt2jGZOy5KzkmIJbbiWMaPpaSzFPIA
Date: Mon, 6 Aug 2018 19:03:40 +0000
Message-ID: <A6F5E3F7-68FC-4A52-A1DD-2383169145B0@cisco.com>
References: <87muvjges7.fsf@nic.cz> <20180806.205046.1122451156895376424.mbj@tail-f.com>
In-Reply-To: <20180806.205046.1122451156895376424.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.201]
Content-Type: text/plain; charset="utf-8"
Content-ID: <C018011777FC1F4CA209176564AD11D6@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.152, xch-rtp-012.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/v30GSuKFYIG9MwTz-cdZPP7LKko>
Subject: Re: [netmod] 6087bis - Security Considerations template
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 19:03:44 -0000
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From nobody Mon Aug  6 12:21:58 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F394F130F1C for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 12:21:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VJAA0Y5HRA9N for <netmod@ietfa.amsl.com>; Mon,  6 Aug 2018 12:21:54 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B58E130EDF for <netmod@ietf.org>; Mon,  6 Aug 2018 12:21:54 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id 203-v6so11454335ljj.13 for <netmod@ietf.org>; Mon, 06 Aug 2018 12:21:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=MYPBXQOIzV9lyF+1AuchaVXaSaTmnFtf4FpdwVKltI8=; b=T1jqVDZARao5nSSDQUH6RkEQRaZimtySM7QruEqLowlykRlmuUyYG6c3w8gGUayc2n QAz5GV5fL0i6/TcO0kq4ITbDBw09BxY7DuSLCTDGp4ont3qso9flmxCC7hmCL3GpHL8K MA5sHcHsv16JndIdTSkdWysjS44K/gzU6QWNGyAK/TqDBmpY+vJqJKjEHaUnn30W9cVm GZJ0tTTPdfmms6bILpUQrgxekPdd6N9On/Vh1sfEZN2KWmFgqVZ0l54G3v6fz7Riqjxc Mq7oFwg4QaENz4lM0CWraohqQ3Yd4WcufvgrvzpNM9Kg37rVyy8gnA6jhUXBCmDD2pxm 6Pdg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=MYPBXQOIzV9lyF+1AuchaVXaSaTmnFtf4FpdwVKltI8=; b=qwqsHtQVz8Y4Q8Iys1IhDYnCpFVNGepNHp97uhArvjLp72XNMfclpD+T4qIO2YwYc/ mbWTvDnPLUNh89o5HlY3TV270qiBfNRBhm/IZnIfl93CznEWJwxEwmV4WNNDI1IdiBXb TvnRh7udybbqZE6tkRbERWzT23vADykrRB4bGjBG7rbDC8QS1EMGfjW+K4GKnoqpCOFl sR8v6pmb+bKhrv1Hu1yeeyMJ6mkXSJOsmgjYeoUABfv59DXTCgTdOrQtMTjE0uGFz6bh h8TzY0qkZVZ7t2vGyjprqxZ1tUkOdWniSkkuEeLtKu3lK0+xtLiYI4SU7/NQjfkUAhWf wiKQ==
X-Gm-Message-State: AOUpUlFmd/hznz5afxo8OLfEfuSgfdnqiRmVFvLEfUOb/+TIPhehrACZ 3w2Qfs080rjpJ0MxEGoUiX41+H3BCK+Akc+DW3tTS2PJ
X-Google-Smtp-Source: AAOMgpeVyBPUT43zRfJToNw3MK9a6S8pEapzEUoY/Xgk0L1rjqWtyU+HWu4Jo4WM6nAySUlt8F26SThglt5BJkMiCT4=
X-Received: by 2002:a2e:1dc8:: with SMTP id w69-v6mr14431835lje.110.1533583312603;  Mon, 06 Aug 2018 12:21:52 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a19:aa46:0:0:0:0:0 with HTTP; Mon, 6 Aug 2018 12:21:51 -0700 (PDT)
In-Reply-To: <20180806.205046.1122451156895376424.mbj@tail-f.com>
References: <87muvjges7.fsf@nic.cz> <20180806.205046.1122451156895376424.mbj@tail-f.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Mon, 6 Aug 2018 12:21:51 -0700
Message-ID: <CABCOCHSOZrBXFooP7jr78nvTNwitmo118qPQw-5sMvSTB6v1qQ@mail.gmail.com>
To: Martin Bjorklund <mbj@tail-f.com>
Cc: NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000094dfb60572c930c4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/pEwvR3CACVbFPh4C0nqfgVbHZ1w>
Subject: Re: [netmod] 6087bis - Security Considerations template
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2018 19:21:57 -0000

--00000000000094dfb60572c930c4
Content-Type: text/plain; charset="UTF-8"

On Mon, Aug 6, 2018 at 11:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:

> Hi,
>
> Ladislav Lhotka <lhotka@nic.cz> wrote:
> > Hi,
> >
> > Shawn Emery reviewed draft-ietf-netmod-schema-mount-10 and made this
> > editorial comment:
> >
> > OLD:
> >
> > These are the subtrees and data nodes and their
> sensitivity/vulnerability:
> >
> > NEW:
> >
> > The following should be considered for subtrees/data nodes and their
> > corresponding sensitivity/vulnerability:
> >
>


I do not think the new text is better.
I think 6087bis is already stuck waiting for AD approval for a tiny change
to the security template.



> > However, the OLD fomulation comes from RFC 6087, so perhaps this change
> > should be applied in draft-ietf-netmod-rfc6087bis in the first
> > place. The NEW formulation indeed looks better to me.
>
> What is the WG's opinion on this proposed text change?  6087bis is in
> AUTH48 so if it needs to be changed it must happen now.
>
> Of course, we can update
> https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines even when
> 6087bis has been published.
>
> If we don't want to update the template, I don't think we should
> update the schema mount draft either.
>
>
> /martin
>
>
>
Andy


>
>
> >
> > Lada
> >
> > --
> > Ladislav Lhotka
> > Head, CZ.NIC Labs
> > PGP Key ID: 0xB8F92B08A9F76C67
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
> >
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--00000000000094dfb60572c930c4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Mon, Aug 6, 2018 at 11:50 AM, Martin Bjorklund <span dir=3D"ltr">&lt=
;<a href=3D"mailto:mbj@tail-f.com" target=3D"_blank">mbj@tail-f.com</a>&gt;=
</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br>
<br>
Ladislav Lhotka &lt;<a href=3D"mailto:lhotka@nic.cz">lhotka@nic.cz</a>&gt; =
wrote:<br>
&gt; Hi,<br>
&gt; <br>
&gt; Shawn Emery reviewed draft-ietf-netmod-schema-<wbr>mount-10 and made t=
his<br>
&gt; editorial comment:<br>
&gt; <br>
&gt; OLD:<br>
&gt; <br>
&gt; These are the subtrees and data nodes and their sensitivity/vulnerabil=
ity:<br>
&gt; <br>
&gt; NEW:<br>
&gt; <br>
&gt; The following should be considered for subtrees/data nodes and their<b=
r>
&gt; corresponding sensitivity/vulnerability:<br>
&gt; <br></blockquote><div><br></div><div><br></div><div>I do not think the=
 new text is better.</div><div>I think 6087bis is already stuck waiting for=
 AD approval for a tiny change</div><div>to the security template.</div><di=
v><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt; However, the OLD fomulation comes from RFC 6087, so perhaps this chang=
e<br>
&gt; should be applied in draft-ietf-netmod-rfc6087bis in the first<br>
&gt; place. The NEW formulation indeed looks better to me.<br>
<br>
What is the WG&#39;s opinion on this proposed text change?=C2=A0 6087bis is=
 in<br>
AUTH48 so if it needs to be changed it must happen now.<br>
<br>
Of course, we can update<br>
<a href=3D"https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines" re=
l=3D"noreferrer" target=3D"_blank">https://trac.ietf.org/trac/<wbr>ops/wiki=
/yang-security-<wbr>guidelines</a> even when<br>
6087bis has been published.<br>
<br>
If we don&#39;t want to update the template, I don&#39;t think we should<br=
>
update the schema mount draft either.<br>
<br>
<br>
/martin<br>
<br>
<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex">
<br>
<br>
&gt; <br>
&gt; Lada<br>
&gt; <br>
&gt; -- <br>
&gt; Ladislav Lhotka<br>
&gt; Head, CZ.NIC Labs<br>
&gt; PGP Key ID: 0xB8F92B08A9F76C67<br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; netmod mailing list<br>
&gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/netmod</=
a><br>
&gt; <br>
<br>
______________________________<wbr>_________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/netmod</a><br=
>
</blockquote></div><br></div></div>

--00000000000094dfb60572c930c4--


From nobody Tue Aug  7 01:46:16 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3517B130F59 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 01:46:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZjErw3REGdKX for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 01:46:13 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 1CAC1130F58 for <netmod@ietf.org>; Tue,  7 Aug 2018 01:46:13 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id BD7931AE0144; Tue,  7 Aug 2018 10:46:10 +0200 (CEST)
Date: Tue, 07 Aug 2018 10:46:10 +0200 (CEST)
Message-Id: <20180807.104610.1015666485913815937.mbj@tail-f.com>
To: andy@yumaworks.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <CABCOCHSOZrBXFooP7jr78nvTNwitmo118qPQw-5sMvSTB6v1qQ@mail.gmail.com>
References: <87muvjges7.fsf@nic.cz> <20180806.205046.1122451156895376424.mbj@tail-f.com> <CABCOCHSOZrBXFooP7jr78nvTNwitmo118qPQw-5sMvSTB6v1qQ@mail.gmail.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/e4VU6iVd_OYzzRa1yB6kkaFxZsA>
Subject: Re: [netmod] 6087bis - Security Considerations template
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 08:46:15 -0000

Andy Bierman <andy@yumaworks.com> wrote:
> On Mon, Aug 6, 2018 at 11:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> 
> > Hi,
> >
> > Ladislav Lhotka <lhotka@nic.cz> wrote:
> > > Hi,
> > >
> > > Shawn Emery reviewed draft-ietf-netmod-schema-mount-10 and made this
> > > editorial comment:
> > >
> > > OLD:
> > >
> > > These are the subtrees and data nodes and their
> > sensitivity/vulnerability:
> > >
> > > NEW:
> > >
> > > The following should be considered for subtrees/data nodes and their
> > > corresponding sensitivity/vulnerability:
> > >
> >
> 
> 
> I do not think the new text is better.

I agree.  So I suggest we keep the text also in schema mount.


/martin


> I think 6087bis is already stuck waiting for AD approval for a tiny change
> to the security template.
> 
> 
> 
> > > However, the OLD fomulation comes from RFC 6087, so perhaps this change
> > > should be applied in draft-ietf-netmod-rfc6087bis in the first
> > > place. The NEW formulation indeed looks better to me.
> >
> > What is the WG's opinion on this proposed text change?  6087bis is in
> > AUTH48 so if it needs to be changed it must happen now.
> >
> > Of course, we can update
> > https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines even when
> > 6087bis has been published.
> >
> > If we don't want to update the template, I don't think we should
> > update the schema mount draft either.
> >
> >
> > /martin
> >
> >
> >
> Andy
> 
> 
> >
> >
> > >
> > > Lada
> > >
> > > --
> > > Ladislav Lhotka
> > > Head, CZ.NIC Labs
> > > PGP Key ID: 0xB8F92B08A9F76C67
> > >
> > > _______________________________________________
> > > netmod mailing list
> > > netmod@ietf.org
> > > https://www.ietf.org/mailman/listinfo/netmod
> > >
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
> >


From nobody Tue Aug  7 06:40:35 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A54F130F17; Tue,  7 Aug 2018 06:40:34 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <153364923397.21543.11288931143232716711@ietfa.amsl.com>
Date: Tue, 07 Aug 2018 06:40:34 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Ymzbzu6uo_HMtdRcznY7vYson3k>
Subject: [netmod] I-D Action: draft-ietf-netmod-schema-mount-11.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 13:40:34 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : YANG Schema Mount
        Authors         : Martin Bjorklund
                          Ladislav Lhotka
	Filename        : draft-ietf-netmod-schema-mount-11.txt
	Pages           : 28
	Date            : 2018-08-07

Abstract:
   This document defines a mechanism to add the schema trees defined by
   a set of YANG modules onto a mount point defined in the schema tree
   in some YANG module.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-schema-mount/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-schema-mount-11
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-schema-mount-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-schema-mount-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Aug  7 07:05:25 2018
Return-Path: <nite@hq.sk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB1AA130FE8 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 07:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=hq.sk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LR5OX2MSKuTY for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 07:05:21 -0700 (PDT)
Received: from mail.hq.sk (hq.sk [81.89.59.181]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96823130EED for <netmod@ietf.org>; Tue,  7 Aug 2018 07:05:20 -0700 (PDT)
Received: from nitebug.localdomain (unknown [46.229.239.158]) by mail.hq.sk (Postfix) with ESMTPSA id AD21C241A05; Tue,  7 Aug 2018 16:05:18 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hq.sk; s=mail; t=1533650718; bh=ONjbP/Ru10PktJowUcdxa90y+a9LfcQwAWaU1E0s+GQ=; h=Subject:To:Cc:References:From:Date:In-Reply-To; b=KNXaYBZ4/jq8HuncXciI6BHiYlTqdQ+fwLF8tJVS69eDTGcf4U8hMPlOmqc+ytK3C xJlh/3Rv+hWzf6R8nwut+S5G1G9RXkb+4qiKqmY8cEeMLhX/tSqbyhrDS4OmC06Cjc AyOoOoIO6IrtX7klKBZJD3nHDwQmb3aQ3eWQfk4Q=
To: Martin Bjorklund <mbj@tail-f.com>
Cc: netmod@ietf.org
References: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk> <20180805.133206.1339559704042694800.mbj@tail-f.com>
From: Robert Varga <nite@hq.sk>
Openpgp: preference=signencrypt
Message-ID: <7e4fecc8-9556-4fc2-e9da-2be24fa80c6d@hq.sk>
Date: Tue, 7 Aug 2018 16:05:11 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <20180805.133206.1339559704042694800.mbj@tail-f.com>
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="jw19bWMHYQdQc5bMv7SK9cik2bo4CWfoD"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DbuZ9mUsicxm7te-aR8vBQdpjjU>
Subject: Re: [netmod] if-feature vs. Identifiers and Their Namespaces
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 14:05:23 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--jw19bWMHYQdQc5bMv7SK9cik2bo4CWfoD
Content-Type: multipart/mixed; boundary="xkaX7JzGWxzGgayUWEsMu2cJGW0wPJamf";
 protected-headers="v1"
From: Robert Varga <nite@hq.sk>
To: Martin Bjorklund <mbj@tail-f.com>
Cc: netmod@ietf.org
Message-ID: <7e4fecc8-9556-4fc2-e9da-2be24fa80c6d@hq.sk>
Subject: Re: [netmod] if-feature vs. Identifiers and Their Namespaces
References: <357fbf04-0092-93f4-1cb1-f8e27cf639c2@hq.sk>
 <20180805.133206.1339559704042694800.mbj@tail-f.com>
In-Reply-To: <20180805.133206.1339559704042694800.mbj@tail-f.com>

--xkaX7JzGWxzGgayUWEsMu2cJGW0wPJamf
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

On 05/08/18 13:32, Martin Bjorklund wrote:
> Robert Varga <nite@hq.sk> wrote:
>> Hello,
>>
>> I have went through RFC7950, but I cannot find the text which would gi=
ve
>> answer whether:
>>
>> feature foo;
>> feature bar;
>>
>> container baz {
>>    if-feature "foo and (not baz)";
>> }
>>
>> list baz {
>>    if-feature "(not foo) and baz";
>> }
>>
>> is valid YANG or not. The two statements violate Section 6.1.2, but th=
ey
>> are mutually exlusive when conformance comes into play.

Hello Martin,

thanks for your reply.

> I think you mean 6.2.1.  You are right; these two statements violate
> 6.2.1 and this is thus not legal.
>=20
> Consider what this would mean in the model above:
>=20
>   augement /baz {
>     ...
>   }

This is precisely what I considered and in the specific case of list vs.
container, both being mutually exclusive, I have not found a case which
would break down.

>> Does compliance (Section 5.6) have any bearing on namespaces (Section
>> 6.1.2)?
>=20
> Section 5.6 is about server conformance, and the first sentence is:
>=20
>    Conformance to a model is a measure of how accurately a server
>    follows the model.
>=20
> Namespaces are not related to how accurately a server follows a model.

My mistake for not being quite clear. In this context both the list and
container are optional to implement and cannot, obviously, be
implemented at the same time.

That having been said, I much prefer this being invalid YANG to needing
to support it -- just because it keeps my implementation simple :)

Regards,
Robert


--xkaX7JzGWxzGgayUWEsMu2cJGW0wPJamf--

--jw19bWMHYQdQc5bMv7SK9cik2bo4CWfoD
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=JKtg
-----END PGP SIGNATURE-----

--jw19bWMHYQdQc5bMv7SK9cik2bo4CWfoD--


From nobody Tue Aug  7 08:17:45 2018
Return-Path: <vladimir@transpacket.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C88FF130E47; Tue,  7 Aug 2018 08:17:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qUUPdy1e_v6U; Tue,  7 Aug 2018 08:17:34 -0700 (PDT)
Received: from mail.transpacket.com (s91205186171.blix.com [91.205.186.171]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9F6E130E54; Tue,  7 Aug 2018 08:17:33 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.transpacket.com (Postfix) with ESMTP id 4C5E61561735; Tue,  7 Aug 2018 17:17:31 +0200 (CEST)
Received: from mail.transpacket.com ([127.0.0.1]) by localhost (mail.transpacket.com [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id Srwd0ETsFbP8; Tue,  7 Aug 2018 17:17:31 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.transpacket.com (Postfix) with ESMTP id 1E0E61561733; Tue,  7 Aug 2018 17:17:31 +0200 (CEST)
Received: from mail.transpacket.com ([127.0.0.1]) by localhost (mail.transpacket.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id NGkk4FihiVw3; Tue,  7 Aug 2018 17:17:31 +0200 (CEST)
Received: from [192.168.209.122] (s1853520235.blix.com [185.35.202.35]) by mail.transpacket.com (Postfix) with ESMTPSA id E54A21561730; Tue,  7 Aug 2018 17:17:30 +0200 (CEST)
To: =?UTF-8?Q?J=c3=a1nos_Farkas?= <janos.farkas@ericsson.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, detnet@ietf.org, "ieee-ietf-coord@ietf.org" <ieee-ietf-coord@ietf.org>
References: <153163104655.12797.4549822574205791661.idtracker@ietfa.amsl.com> <1671ad91-5627-fedf-ef1c-9a2a790accd4@transpacket.com> <bb04cb6f-5940-f883-ba80-ad110d192eb2@ericsson.com>
From: Vladimir Vassilev <vladimir@transpacket.com>
Message-ID: <ef0e9999-e1f7-bc15-3335-f3f49d869ca7@transpacket.com>
Date: Tue, 7 Aug 2018 17:17:30 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <bb04cb6f-5940-f883-ba80-ad110d192eb2@ericsson.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ssCGeIAaDUFFRsCFoNJx0IZac_Q>
Subject: Re: [netmod] [Detnet] Fwd: New Version Notification for draft-vassilev-netmod-network-bridge-00.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 15:17:38 -0000

Hi Janos,

The concept defined in this draft goes outside the scope of 802.1Q.=20
Taking a subset of the OpenFlow 1.0 spec and defining corresponding=20
node-side YANG model with transactional flow table (/flows) and=C2=A0=20
optional support for controller introducing single RPC (transmit-packet)=20
and notification (packet-received) corresponding to OFPT_PACKET_OUT and=20
OFPT_PACKET_IN messages seemed like a natural evolution of the SDN=20
concept for the specification of alternative to OpenFlow southbound=20
protocol (e.g. over NETCONF). With OpenFlow-derived flow model=20
addressing 1. forwarding (switching) and adding a=C2=A0 2. flexible sched=
uler=20
model referencing the flows a complete bridge model is presented. It can=20
be implemented seamlessly on all OpenFlow 1.0 and above supporting=20
hardware and more importantly extensions (to flow forwarding or=20
scheduling) to the OpenFlow spec can be specified in YANG.

A device implementing this model can implement the 802.1Q family of=20
models with proper controller software (STP, LLDP etc. which is readily=20
available) but it is not limited to that.

We have been following closely the models developed by the IEEE TSN and=20
we have both reused terminology and ensured all of those standard=20
solutions can be represented with the generic scheduler model part of=20
this draft. The IEEE YANG model is great reference but is not suitable=20
for all applications especially when more flexibility is required and=20
being able to augment a module to document our vendor specific=20
extensions. The 802.1Q are limited in certain ways to 802.1Q (for=20
example fixed to 8 traffic classes either priority or time slots).

Attempts to make 802.1Q configuration more generic and a subset to a=20
more generic forwarding configuration mechanism are not unprecedented=C2=A0=
=20
(see=20
https://datatracker.ietf.org/doc/draft-ietf-netmod-sub-intf-vlan-model/=20
). Here virtual interfaces instead of flows are introduced.

IMO a standard flows model is needed starting from something with=20
running software and trying to find consensus. I see this goal is=20
already part of the detnet focus=20
https://tools.ietf.org/html/draft-ietf-detnet-flow-information-model and=20
https://datatracker.ietf.org/doc/draft-geng-detnet-conf-yang

Requesting comments on the ietf netmod list seemed like a good place to=20
start to allow for open discussion and if we manage to identify anything=20
that falls into the scope of IEEE 802.1Q except the name "bridge" I=20
would be glad to contribute there. Same goes for the detnet WG.

Vladimir


On 08/03/2018 05:59 PM, J=C3=A1nos Farkas wrote:
> Hi Vladimir,
>
> Bridging including bridge management belong to IEEE 802.1:=20
> https://1.ieee802.org/. You may consider contributing to IEEE 802.1.=20
> The next Interim is hosed by your company in Oslo:=20
> https://1.ieee802.org/meetings.
>
> IEEE 802.1Qcp is the basic bridge management specification, which is=20
> an approved draft standard to be published soon:=20
> http://standards.ieee.org/findstds/standard/802.1Qcp-2018.html. (The=20
> archived web page of the finished project:=20
> https://1.ieee802.org/tsn/802-1qcp.)
>
> The pages of the ongoing projects are available via the TSN page:=20
> https://1.ieee802.org/tsn/#Ongoing_TSN_Projects, including P802.1Qcw=20
> (https://1.ieee802.org/tsn/802-1qcw/), which specifies YANG for=20
> various bridge scheduling mechanisms.
>
> Best regards,
> Janos
>
>
> On 7/17/2018 4:26 PM, Vladimir Vassilev wrote:
>> Hi,
>>
>> I have submitted a draft=20
>> https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/=
=20
>> that proposes a model for network bridge management based on the=20
>> concept of flows. The model has 2 components 1. Forwarding based on=20
>> flows. 2. Scheduling/QoS based on gate controller topologies that=20
>> provide a new and very generic way of modeling and managing the=20
>> actual scheduler design and map the flows to scheduler topology inputs=
.
>>
>> There is similar work on the flow based forwarding in detnet however=20
>> I am not sure detnet is the right workgroup to be defining the flow=20
>> model.=C2=A0 I think the flow concept is important and general. It is =
as=20
>> significant as the concept of interfaces and is not only relevant to=20
>> detnet. Let me know what is your opinion of the draft and the=20
>> proposed network bridge concept.
>>
>> Vladimir
>>
>> -------- Forwarded Message --------
>> Subject:=C2=A0=C2=A0=C2=A0=C2=A0 New Version Notification for=20
>> draft-vassilev-netmod-network-bridge-00.txt
>> Date:=C2=A0=C2=A0=C2=A0=C2=A0 Sat, 14 Jul 2018 22:04:06 -0700
>> From: internet-drafts@ietf.org
>> To:=C2=A0=C2=A0=C2=A0=C2=A0 Vladimir Vassilev <vladimir@transpacket.co=
m>
>>
>>
>>
>> A new version of I-D, draft-vassilev-netmod-network-bridge-00.txt
>> has been successfully submitted by Vladimir Vassilev and posted to the
>> IETF repository.
>>
>> Name:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 draft-vassilev-netmod-=
network-bridge
>> Revision:=C2=A0=C2=A0=C2=A0 00
>> Title:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 A YANG Data Model for=
 Network Bridge Management
>> Document date:=C2=A0=C2=A0=C2=A0 2018-07-14
>> Group:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Individual Submission
>> Pages:=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 44
>> URL:=20
>> https://www.ietf.org/internet-drafts/draft-vassilev-netmod-network-bri=
dge-00.txt
>> Status:=20
>> https://datatracker.ietf.org/doc/draft-vassilev-netmod-network-bridge/
>> Htmlized:=20
>> https://tools.ietf.org/html/draft-vassilev-netmod-network-bridge-00
>> Htmlized:=20
>> https://datatracker.ietf.org/doc/html/draft-vassilev-netmod-network-br=
idge
>>
>>
>> Abstract:
>> =C2=A0=C2=A0 This document introduces new YANG model of a network brid=
ge.
>>
>>
>>
>> Please note that it may take a couple of minutes from the time of=20
>> submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>
>> The IETF Secretariat
>>
>> _______________________________________________
>> detnet mailing list
>> detnet@ietf.org
>> https://www.ietf.org/mailman/listinfo/detnet
>


From nobody Tue Aug  7 10:37:08 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0604130E0F for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 10:37:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mBmeFnD7PvyH for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 10:37:03 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0136.outbound.protection.outlook.com [104.47.0.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D7651277BB for <netmod@ietf.org>; Tue,  7 Aug 2018 10:37:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F2YErPuZlSbWYszfnq6Nf/VCmTj/9GGTyr3+uaRGOg4=; b=hS9us3Xo5rYQvS88PEbuLFhyP41PvIl3gfMwBJFjJnmC3xkx8Qtmh2/g15sjkOh9h/HlJbWyMOICRoiOZKHtMBj0B6eqGATv9N/DyjlnArMFgf18kwuT2suZses5w26FmhIaq4ru40c1LsW9X5dpygCZuLCgLXoQ7b63rT4okJs=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB4061.eurprd07.prod.outlook.com (52.134.20.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.13; Tue, 7 Aug 2018 17:36:59 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1038.013; Tue, 7 Aug 2018 17:36:59 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: false() vs 'false' in 'when' statements
Thread-Index: AdQudRPPuaY7IZR/R5mIg6eZugDJwA==
Date: Tue, 7 Aug 2018 17:36:59 +0000
Message-ID: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4061; 6:WwqDTGqPLa7iD7Ua/rW123af1R5qMCEPQdllFgrutacqHdNnS9xq4OCetxcQyzj35tboWJ2G8udw4RGhE0RNARCt+QBGXMC3dNL2jaRRYRN3ubEW21hQQF0kYsq2aWFMwq/hzNtJGXczBI9LjbSC3idhxx2pY+OCONaaIx0JIivdpxnVTTNAm7Ef7hiRbx0VXdH2S+7lGVRO/JQWAD/dIhD4GEhZGPOvydpgY/snCQrPalrm+6rEp1df7HJEwYYWRyn0RyyIEB0ooJss1HYhY8oh0eqY1aKP2GVL99fi3cYDT7i0PKIf3GBtdfWmB4BfnBTt9lthFD8xyDsZLeWQTcKpSFYf57p23WEi5P5xFT3CywOFn6BLiC90ct/hVtv9S/Dfx98T2NzuS1QCBM/qwLPDMnaPlZuDCnYswzsUf1wW6dU+DEDwuNxgBsSuzC9mp7Q0sIYdtHGtDyD9X6RJdA==; 5:dJvWZ1KdiYpxpNC1lILDtTG7LTifokNuEI9W6ZiiMfiDJCSxIVrtlFce6TKJXdDT+Ywx4FFJ+wNhXVuth1WSddkfkKc/ADypAlKsc70PkAgWZdOSSNukRSh+b7JVZLGPi0gf3rsL1k1ZxJyBcCip+BVuaoSpNIM8kEKQSUObPO4=; 7:6IbLyPMiNh89waJnl3TGGjAhsIODMQE5Kczor0hwK8o8RJE0p/VquTEIrrX6btYSd4TW6s6TRwfI8OdPtRFxXVEcFeXNfYOmnU6FBntCuScu9a2al6pDSSRCS+GVUk9CMH9F6ixXIbeIApeSB6374AfOWJ9QoiFhDDa9q+qrk3xX3mvihX4v/A08CknPveRY2ha+2rfeWwV75xA5EFxjxXLwLIHuYO4gxWBOAjGqER+VPTymPeeAhn+v9ZEuuoaK
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 9d2bb2ac-67bc-4315-923c-08d5fc8c6127
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB4061; 
x-ms-traffictypediagnostic: VI1PR07MB4061:
x-microsoft-antispam-prvs: <VI1PR07MB40613908F512187726EE262F9B270@VI1PR07MB4061.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(788757137089)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123558120)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB4061; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4061; 
x-forefront-prvs: 0757EEBDCA
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(39860400002)(136003)(366004)(396003)(189003)(199004)(53754006)(102836004)(8676002)(5660300001)(256004)(33656002)(2906002)(99286004)(8936002)(105586002)(81166006)(81156014)(106356001)(2501003)(6916009)(26005)(478600001)(25786009)(5250100002)(14454004)(316002)(186003)(6436002)(5640700003)(54896002)(6306002)(66066001)(9686003)(5630700001)(68736007)(2900100001)(55016002)(7696005)(97736004)(74316002)(2351001)(53936002)(486006)(7736002)(6506007)(6116002)(1730700003)(86362001)(476003)(790700001)(3846002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4061; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 2ckFxZfMa+HLxAvzeOLBGZsXYANlSGvbjHTuW79uKbSL275sv6cdvkm0H+Bm2grrCQl1dzWlIc00pIiQAKJZ67wFfGM4vair6Zf1hwuXc5dhAP9zxqdxSQR4ewXK1dwjclEcDJvqQ+rIEAxXkj4rgN3MAeRmEPpQJWSNPUyMMUh2Ff0gqHcvcifeD51IT5680aW0wJ7pwtHpV3jQC769Z7kNFHh4AvXS0Qa+tW6v0f80HQeUVro4cxyh7zeuIOeo0GF10yXBV2x7mbrpPFTnJmTZuLZI8KwTzNUjr+muTadqPRM2qSGMYyG6FpQ/qX7LgKXZDexXAGdPzPvqmkRbgOvyNrU7ZRuWIdK4AXu7MXS0jjvhEWztwNI+/uEEIBfvWV27b5I/NfMPnVGovXqQgA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270VI1PR07MB3981eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9d2bb2ac-67bc-4315-923c-08d5fc8c6127
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Aug 2018 17:36:59.7416 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4061
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/guIa38N0eEOJwebNeg5KtW6gHv8>
Subject: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 17:37:06 -0000

--_000_VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270VI1PR07MB3981eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

When comparing the value of a boolean leaf in a 'when' statement (or a 'mus=
t' statement), is an equality comparison to 'true' or 'false' the same as a=
 check against true() or false() ?

For example:

leaf a {
    type boolean;
}
leaf b {
    type uint32;
    when "../a =3D 'true'";
}
leaf c {
    type uint32;
    when "../a =3D 'false'";
}
(note that neither b nor c can be configured if leaf a isn't explicitly con=
figured with a value since there is no default)

If I replace the two 'when' statements above with the following instead, is=
 the behavior the same ?
    ...
    when "../a =3D true()";
    ...
    when "../a =3D false()";
    ...

Or does "../a =3D true()" behave as an existence check on leaf a and would =
be enabled whether a is configured as true or false ?

Regards,
Jason



--_000_VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270VI1PR07MB3981eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-CA" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">When comparing the value of a b=
oolean leaf in a 'when' statement (or a 'must' statement), is an equality c=
omparison to 'true' or 'false' the same as a check against true() or false(=
) ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">For example:<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">leaf a {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; type boolean=
;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">leaf b {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; type uint32;=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; when &quot;.=
./a =3D 'true'&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">leaf c {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; type uint32;=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; when &quot;.=
./a =3D 'false'&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">(note that neither b nor c can =
be configured if leaf a isn't explicitly configured with a value since ther=
e is no default)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">If I replace the two 'when' sta=
tements above with the following instead, is the behavior the same ?<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &#8230;<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; when &quot;.=
./a =3D true()&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &#8230;<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; when &quot;.=
./a =3D false()&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &#8230;<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Or does &quot;../a =3D true()&q=
uot; behave as an existence check on leaf a and would be enabled whether a =
is configured as true or false ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Jason<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</body>
</html>

--_000_VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270VI1PR07MB3981eurp_--


From nobody Tue Aug  7 13:47:50 2018
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE4501310D4 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 13:47:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, WEIRD_PORT=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id el9J3cG0SVmX for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 13:47:47 -0700 (PDT)
Received: from outbound-ss-348.hostmonster.com (outbound-ss-348.hostmonster.com [74.220.202.212]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E3E8129AB8 for <netmod@ietf.org>; Tue,  7 Aug 2018 13:47:47 -0700 (PDT)
Received: from cmgw10.unifiedlayer.com (unknown [10.9.0.10]) by gproxy6.mail.unifiedlayer.com (Postfix) with ESMTP id 906241E094F for <netmod@ietf.org>; Tue,  7 Aug 2018 14:47:40 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id n8tIfYnNhuL2Qn8tIf9MQF; Tue, 07 Aug 2018 14:47:40 -0600
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Date: Message-ID:Subject:From:Cc:To:Sender:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=y3jvcbHXG+QQ9xBN4a/tvuy6o8pRO714qsR3DDf96nc=; b=14VixLwUEFigHckYGrkchWahUN xGsPr6AIcLTnhy6vrXR3wXh03ekStxqVFyDCreP9q3ONWdJHEJtps0zNpZOytqJ5azZCsapZVSUFM TE/Zutqp+85Xbh64YMG0gWcYi;
Received: from pool-100-15-106-211.washdc.fios.verizon.net ([100.15.106.211]:60354 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.91) (envelope-from <lberger@labn.net>) id 1fn8tI-0018Rp-6o; Tue, 07 Aug 2018 14:47:40 -0600
To: NETMOD Group <netmod@ietf.org>
Cc: NetMod WG Chairs <netmod-chairs@ietf.org>
From: Lou Berger <lberger@labn.net>
Message-ID: <07d13f36-66e3-e6dc-7bb0-6b8f8482d508@labn.net>
Date: Tue, 7 Aug 2018 16:47:39 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.106.211
X-Source-L: No
X-Exim-ID: 1fn8tI-0018Rp-6o
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: pool-100-15-106-211.washdc.fios.verizon.net ([IPv6:::1]) [100.15.106.211]:60354
X-Source-Auth: lberger@labn.net
X-Email-Count: 4
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/P_hMTnolKmEWOtAE2Jgn7_PB6qQ>
Subject: [netmod] Draft minutes posted
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 20:47:49 -0000

Hi,

Draft minutes have been posted based on the current etherpad 
http://etherpad.tools.ietf.org:9000/p/notes-ietf-102-netmod

Thanks to all who contributed!

Please feel free to make corrections (based on what was actually said) 
and let the list know that you made changes...

Cheers,

Lou (and co-chairs)



From nobody Tue Aug  7 15:00:33 2018
Return-Path: <acee@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4ABD131100 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 15:00:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mAq_rdUhJUlF for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 15:00:26 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13CF0130DC3 for <netmod@ietf.org>; Tue,  7 Aug 2018 15:00:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3308; q=dns/txt; s=iport; t=1533679226; x=1534888826; h=from:to:subject:date:message-id:mime-version; bh=HRyPJtRCdOXCdDhb2mMXIbeo11iybudDeK5epnpxDX8=; b=JeZsvKjr3voNK8/n1c5q5b/OSU4iCxCuHQf6+ctVmZ19hNdXW5HbGD/Q qPbcamITx7CGkaihvGakynK9UD4G0zGG0nNiDtldcT1C0emTRBLNeGy+3 pIYkEYBcFhmIlXOriZ1j8qQJuTJaC7rD8vVvBLSTP9e8UPxBHCgSbI9TR M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DHBABQFWpb/5FdJa1cHAEBAQQBAQo?= =?us-ascii?q?BAYJXd2N/MoN0lFGSXIcYC4UFgywhOBQBAgEBAgEBAm0dC4VhaAEMPgIEMB8?= =?us-ascii?q?IBIMzAYEbZKw5gS6EYIVviQ8XggCBOR+KSzGCJAKaOQkCj0WOJ5I9AhEUgSQ?= =?us-ascii?q?0IYFScBVlAYI/kFKONoEbAQE?=
X-IronPort-AV: E=Sophos;i="5.51,456,1526342400";  d="scan'208,217";a="434851343"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Aug 2018 22:00:25 +0000
Received: from XCH-RTP-011.cisco.com (xch-rtp-011.cisco.com [64.101.220.151]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id w77M0OE0007031 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <netmod@ietf.org>; Tue, 7 Aug 2018 22:00:25 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-011.cisco.com (64.101.220.151) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Tue, 7 Aug 2018 18:00:24 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1320.000; Tue, 7 Aug 2018 18:00:24 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9Q==
Date: Tue, 7 Aug 2018 22:00:24 +0000
Message-ID: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.201]
Content-Type: multipart/alternative; boundary="_000_3FBE6E063C424CFE9A4CFAC55572901Cciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.151, xch-rtp-011.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/3QqTNSGMzacRS_hodlZkkdKhy4M>
Subject: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 22:00:32 -0000

--_000_3FBE6E063C424CFE9A4CFAC55572901Cciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SXMgaXQgcG9zc2libGUgdG8gaW5kaWNhdGUgdGhhdCBjaG9pY2Ugc3RhdGVtZW50IG11c3QgYmUg
c3BlY2lmaWVkIGluIGEgWUFORyAxLjEg4oCcbXVzdOKAnSBjbGF1c2Ugdy9vIHNwZWNpZnlpbmcg
ZXZlcnkgY2FzZT8gU2ltaWxhcmx5LCBpdCBpcyB0aGVyZSBhIHdheSBzcGVjaWZ5IHRoYXQgYSBj
b250YWluZXIgY2Fubm90IGJlIGVtcHR5IGluIOKAnG11c3TigJ0gY2xhdXNlPw0KVGhhbmtzLA0K
QWNlZQ0K

--_000_3FBE6E063C424CFE9A4CFAC55572901Cciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <B30C32857BDFE749A02C93CD0B64C9B7@emea.cisco.com>
Content-Transfer-Encoding: base64
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--_000_3FBE6E063C424CFE9A4CFAC55572901Cciscocom_--


From nobody Tue Aug  7 16:06:23 2018
Return-Path: <Hayden.Brown@Aviatnet.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85AA4131106 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 16:06:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aviatus.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WzXC8LyZM2L8 for <netmod@ietfa.amsl.com>; Tue,  7 Aug 2018 16:06:19 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on061b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe46::61b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2A7B12426A for <netmod@ietf.org>; Tue,  7 Aug 2018 16:06:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aviatus.onmicrosoft.com; s=selector1-aviatnet-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kJJgrdtI9p5wWx83VcoQ16w+b+xHx13uU+7sZ+78Ik0=; b=Re1WxUvlYgdGOhy3TlegV1Q7k0fsuEKaxgdMSlnTGo0Z/H0X1bSTOVFa2CanI5c9OT4fJkb8WMkTJakN2VmlKUF5rKZPS0Xiz+Hw0kDATPgzoNZBXachW4Kodt8jhL6GZAk2wz9sadSnF9b4tu9fgyklqI3jyeinn3/56D1vVy4=
Received: from DM3PR08CA0015.namprd08.prod.outlook.com (2603:10b6:0:52::25) by CO2PR0801MB2200.namprd08.prod.outlook.com (2603:10b6:102:17::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1017.18; Tue, 7 Aug 2018 23:06:16 +0000
Received: from CO1NAM03FT046.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e48::206) by DM3PR08CA0015.outlook.office365.com (2603:10b6:0:52::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1017.15 via Frontend Transport; Tue, 7 Aug 2018 23:06:16 +0000
Authentication-Results: spf=pass (sender IP is 192.147.115.54) smtp.mailfrom=Aviatnet.com; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=Aviatnet.com;
Received-SPF: Pass (protection.outlook.com: domain of Aviatnet.com designates 192.147.115.54 as permitted sender) receiver=protection.outlook.com;  client-ip=192.147.115.54; helo=mail-send.aviatnet.com;
Received: from mail-send.aviatnet.com (192.147.115.54) by CO1NAM03FT046.mail.protection.outlook.com (10.152.81.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.20.1038.3 via Frontend Transport; Tue, 7 Aug 2018 23:06:15 +0000
From: Hayden Brown <Hayden.Brown@Aviatnet.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Fwd: Re: YANG schema mount - any early implementations?
Thread-Index: AdQumiQm93yhBkLaTcew2i5f51k2NQ==
Date: Tue, 7 Aug 2018 23:06:15 +0000
Message-ID: <6e99c5ca12bc44f28e2554dde4bc11e7@USP-EXCHPROD01.GNET.global.vpn>
Accept-Language: en-NZ, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.15.6.10]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:192.147.115.54; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(376002)(346002)(136003)(396003)(39850400004)(2980300002)(438002)(53754006)(13464003)(189003)(199004)(336012)(86362001)(436003)(2486003)(106002)(23676004)(2906002)(53416004)(486006)(24736004)(108616005)(3846002)(118246002)(5024004)(106466001)(345774005)(6116002)(2501003)(476003)(956004)(561944003)(478600001)(126002)(50466002)(356003)(6246003)(72206003)(47776003)(102836004)(7636002)(7736002)(305945005)(7596002)(5660300001)(8936002)(25786009)(1730700003)(8676002)(246002)(6916009)(53546011)(229853002)(36736006)(186003)(26005)(6306002)(6486002)(2351001)(316002)(5640700003)(9686003)(6512007)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:CO2PR0801MB2200; H:mail-send.aviatnet.com; FPR:; SPF:Pass; LANG:en; PTR:mail-send.aviatnet.com; MX:1; A:1; 
X-Microsoft-Exchange-Diagnostics: 1; CO1NAM03FT046; 1:iqKX0852XFPM3ph5H/3AtQH3JeM4C376GTVixpJiJlC4y6tVOgXKXd8BC/aUzWNLN62MpdgfCs/WijKbLsq80rr5V72KG9mkXkYPyiMx//+ROM0Kb0j6+IAQ5RZgfrT9
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e546103b-843d-490f-1c92-08d5fcba60b9
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4608076)(2017052603328)(7153060)(7193020); SRVR:CO2PR0801MB2200; 
X-Microsoft-Exchange-Diagnostics: 1; CO2PR0801MB2200; 3:4GR9HWut49vtFOnRE6TbnQf8pzKWQp4actLd+X6lbzLuCrNsw+NO+x6uTC40kzMf9+P3SgUnd2AeWaFiX01R29VjCHMrLbbff1Wb3k8uUxoubdQRkIUPHBMDSMxbo3HS3ISAncFQDmzZ3WIzAh0oe+c6MGNXz18s/+Y9TmNQMF4xxq6BmPHVfuhltSKMzh2fSbEtXSbTlRZ5ELWAdHxVD0QYgfInIZurH3qLITPtZkPvyBwe+uB0nr/jouwYo78GSds0z9ur2hFuPg/+zG/C8Zn5ojK6LzTMElbIB8ZR8y54b+xfa1XhrgOZ9yATMLXnrtSFaUCT+TOgFtlnhXSFt6Hev+pyAViIRbBhbwXYRug=; 25:bebCiFU5aVly5GOSS30PjHZHgFVa5QyXCpH9mWXZVw48YCRyc7rGLuMzg5WyL2H5t9nvKOEtA2zz6oqgmUsX4ID0dPLbwSiDGdU1GaCqtWcE9WB+4Iu8GwMjYVEDBpXxV7NdVCP6LKPXOV7rsqQJ9bf13mYTX1rqhLDQxMzDi6mJOPPvLtAOSF1rZ3VxGxSAK9eniP08mIURomGtY3QM0onxo2QHxodjmPriDilReyvS8WzYW7SO8UxNGf4g/2LmAtetvXlPBF4acb+MRA0BrUuzsZMe+D4YDeJu/9VrUreXcHI8kIbKp0gDNvSchp+4zZMCyikVrtrKCdW3ICkZ4Q==
X-MS-TrafficTypeDiagnostic: CO2PR0801MB2200:
X-Microsoft-Exchange-Diagnostics: 1; CO2PR0801MB2200; 31:M+gGjcts3M1kL8DFUU1Yzv9Flf/OuaGUF56lkZeVPS6W35SNnyralomID1C+BUfTzFQ+inzixGIgc3bLYlyDbEgJ2r1dkzVrYwS6aJIJWozt8CW+GTYMLdaQEpuGap8Pz1rjwIW0WBY2sPZd1Yd9/1zZmUWGYncegxYn6AnJc+trffj9gJqrPFi91JiPJMI8hZBQnPbYVoZyju0IEUGWyrYi+2L7cJjnjqqiz+aMnRk=; 20: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
X-Microsoft-Antispam-PRVS: <CO2PR0801MB22004DAD612A5E49E5C052D6F6270@CO2PR0801MB2200.namprd08.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(120809045254105);
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93004095)(3231311)(944501410)(52105095)(10201501046)(3002001)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:CO2PR0801MB2200; BCL:0; PCL:0; RULEID:; SRVR:CO2PR0801MB2200; 
X-Microsoft-Exchange-Diagnostics: 1; CO2PR0801MB2200; 4:h+5kc9Lj/X3M4u8m89uwcI4ioBMezWpdDgeq7mHb2+QPUQ8G9D6za1fNABGqvIDDMc5GGLbAwgrLDG4RV4soWskR0kqDFHP1N48ZZ2/fvnwpk1BT0pru2NueC4dr2SeZCA4HLbJ7BkgoNtGfo4noINds/QC2NjOcyUO5xcAPkHNSB9w93qzv7a/yNbCHST1c679ItQnR+Ikhi1FzvocYfaSMiJGrtpi+ePHXcQKupv/N/nSNbzOcqSHbkxHiY/6wrV1uXnSGksJ2Wm8QORIouMs1NNapcQ1I53c82Kh8uHzrOE2qaqcPcL8ODThZykV5Ek8MLQ9Ap2LDvK0NKtRIOJYzKdn1dOrVzQ1QouVVLdY=
X-Forefront-PRVS: 0757EEBDCA
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtDTzJQUjA4MDFNQjIyMDA7MjM6eDFsNGxCREJHNUVaeHRPMy9GdU5QeFIr?= =?utf-8?B?NHRvVG4zS0dDM0t1RWpkNjd4UEc5azRBbUVXcGlKeWNIL2FpT3ZBbXA5YmJq?= =?utf-8?B?Q1JEbmQ5aEYrR2dGSW5HNzJlamlZMGtud2ZveHZNZElnL24yRVBpNmh6cDVM?= =?utf-8?B?L3YxL0Nwcm93UW0rS3EzM3J2ZlNsZ1VoRS9ocm5OUG1WaXBzRnN3TW1tYUpU?= =?utf-8?B?dHhhYmZxRGU1V2ZNT005TjRoczlKZnRuR2tTQzFmUHNucHFZa3BVTmU4a3Zv?= =?utf-8?B?WERuVWNDR0xFdHdDMjFKUy9xWEowYURGL1ZtbjJZRXpMOGQ4N2NETWFzcmg5?= =?utf-8?B?blVYcXEyZ2FaRk1PRTh4ZElGOFJIWG5NZjdZTVM0WjhSMW9YUTk1VUREOWNW?= =?utf-8?B?RWF3MVBRQ2x0UTl1RldVWUNFSTc2VXg5MmFialRZRWZjN2N4Uk5GWGdkZ1Yx?= =?utf-8?B?Z2dXVEkrNEdnUE9qZkxaZllVTDlMZ21qNkhwNU5SdDcwYWljb1pFWHlmUFVS?= =?utf-8?B?Uk9vUXNBNWUwREhiMXZmWFptaXdIaEhoaElQajAxMVp2dE82V2xmRHFRMDVy?= =?utf-8?B?dE5jM1hNNGZZSW9SV3dzM1MzTXhoNmZVWGtlNGFtcTYrZ0w5dG9DYll0c25P?= =?utf-8?B?NC96dlBHV0pXS2lQblZBYmVZZFFSOW9JcWlWNlgzTmZERXZYamp6T0FmRnpD?= =?utf-8?B?ZVh4Ty9mTmNNc1ZRbzVxbXU0SmcrT3BYWitESkJxZ1JETFl1d2ZjZWNabW1y?= =?utf-8?B?cWI3blZNQlpPWEJwZ0haaEN6ZDgvMWcyWGIzMEJrNC9OOUovbU90MjBIdlBR?= =?utf-8?B?UFRtQWo3b2V5RzN4WGp4VDB1eURwQ0hNSHYwZlpFa3hkZzd6R0k4VDJSUkNv?= =?utf-8?B?U2RiN3VtSHltUGVtVXdmRVpkQ2tFRHQ0aEFuUDA2N3piMlNaTklhSVZOZnpV?= =?utf-8?B?QzVkOTEyRnN2bmRydnl0N0tOU0FIbTlaQ3VNc05ueWk4T0w3L1ROZXl5ckdO?= =?utf-8?B?MmpXVlE5Wk84Wm5ZVWsyNnJwWjlxZS8yekkyV2JhanF3UWQxamFtdURPQTJ1?= =?utf-8?B?OVlibERsUFVKK2tUTEdBUWpSUERNMnU4dmFKM2ZKYnNhVURJNXB1T0lNdTF2?= =?utf-8?B?YkNwdnNJa3pwb3JJdFhFMmJsQXNJV2ljTnRYT3RveldlVHVGV2Zad1dQOVkz?= =?utf-8?B?MjVuU2w3RktGYkZCYWRMa1p5MjlJQVYwa2FSaHl5c2I3VWVNMHJOWFl6azQr?= =?utf-8?B?UGxKOHlYR3Z0bCtlblYyT3c0bWtScGc0cHFwVEtXc1VjaVZHVEZJemFjZ2I2?= =?utf-8?B?cGRhTDUxYkxKeCtvNkhPdzU4aStMSFptVHFVc3pqVzlCb3IxdTl1YUpaemVI?= =?utf-8?B?N1VwNDdoZlArT3p5V3k3bE1hZDNYdG1ucERodURCZndtdzB1UWQ2N0tGeWpE?= =?utf-8?B?VHYwZ3lTNTlXajdITlp5a0hMVWJqaWZ5cWRNZzhNRFkvK2xtK25MNHVUVHZp?= =?utf-8?B?eDBuakVLclRRM3g0clpMYTJVZndWODU1UmdXVXJBU1YrYWlBOWZ4SXl3L3Mr?= =?utf-8?B?NjV1d1ZZSURxS0xYUFdRblFzK3NYcitmWkxsR3ZsaTd3Y0o4VUNlbVowOW8z?= =?utf-8?B?UFNXNEsyVVVDOENhVHFUbkpVQzJWUlU0NnR4Ykt4Wkg1OWR4K3Q2elpwSVZa?= =?utf-8?B?TDJzRFpLemRxZ21VWFpNUFk3UkJVNUM1b0crK0xRSU9nZDByUDJyM3dKT2NN?= =?utf-8?B?L2QxQVhMRXNMczBzc3d0Qjl6bFBpN1Jzb05rRks5eVZ3WlhONURIdnF1YkZr?= =?utf-8?B?ZkVKMDN6YzlQa1pCWlZjdFVvK0szWFlZR3o2TDRyTTNzY21KazNnUllmUmtx?= =?utf-8?Q?sJdAnmdvgoXYE=3D?=
X-Microsoft-Antispam-Message-Info: La850+FFwGf1vUlOu5xpvMK5AL9VxBuBfBbamcA4f9dQai6Au80ZLYL2Kh0bU1cYAmdACBoQLs8JpKRb3PlQxq0Ek8Jngm3p7M7IwVL0j5lv6w7w97VrHLQh4NJSeMG2iY3sTMq2j3C0rJdKMYWSGRiLgqs6nBkqJhGn4nsgrbgN21JkjTBZ2nG39WG7ZNNPGSh1a1WsLVK96FqV07KZjch/Xc90hfwX+0TaTaf36mM2ClaFcI3BHiHo6W8cTx2yoykZ8k3v+0zmZX+1zT+C3RJZzl76Mr21WhOBsrIBwvA1kvlLEA0Mh7GWut0R6/Sb/q9LHM1oirnnBgUyS8BRpR2iHVgnM3BHzCIJgmEvYNk=
X-Microsoft-Exchange-Diagnostics: 1; CO2PR0801MB2200; 6:kioUktZuHqP+lZfQj+dbES6G28B22OJaKKrZfhDVyxJW095jiq4WspxJlOmvCNih3o8yzVJWwYypvqYqxA/Ki1dMS102anQcL9oDlqbRpG2GcFKeTc/kK2nM8YW/16npQ7RN1UwBbgKmEGWyFlEIK5KGVUZD7PcIcX+vxMnrg5rhEf0v0o7UiGz4QirCa3APEBW9bbSBj782BKp5HGgBcoexs67UHlrNwuLfY1Z2pc8nqPu4N8vO25XaNSg3laLx4k54F1/draJ0fwKhXK6P8lBBAj1RPu8KKxpPNv4Mw14Uo4e616zYV8kal+FdxvYZgNWjieGu9rogR7h5MZuTbe2g8FObdanfMND3ZZsgFKbW2/glhLpjH3AieOQRcfuitxZb9P0OuIE7hV5KklIXvN6bIFHvVmwoHqzkSgdlUOPs+ZRmfcON8psOg08Rbrpr+hLXHtNz50U89yATjllC+w==; 5:gRcmZcZQtSnQZy0ZZbK6BGDUJSsLLztk/uCn2hccMO5ETpjluC15LctKx+JmWjkT2vBql4Iun0zsMIzUzYOLF45BLQRtEd7c3MYpKDXpWXq5mCOuHj92jMNRCIUg4waUaxNmkfDY0tmnRruAY3zXlfvMg5Xfj9EeRHvT75dFZJ4=; 7:pNoRpXxebtLq4051l0gPStu8S+Q3vMxGf2Jd39qkmFbvu9XW7FIS3Qv8U4wlwk2dlGxEvwANfPLouh3xIKKep+QOs0JRrDnGj+vMRwmQNHPV0aW9j3K0/j7sJ70Zkp5ZfgXDC/kaxVPVdsc7HtBSqvVK+zG09F1NT1ezEwv0WgVFiDhqJ/p9mLdZwkMW8xH5/KpfhBrtBYcmM9jGVUpUAJXohDqyoGcLgDyis7qejoWeHlezW4yAyGyvt+9W6a2D
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: aviatnet.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Aug 2018 23:06:15.8247 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e546103b-843d-490f-1c92-08d5fcba60b9
X-MS-Exchange-CrossTenant-Id: 8d7d22b9-3890-4eef-95a6-a226e64151be
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=8d7d22b9-3890-4eef-95a6-a226e64151be; Ip=[192.147.115.54];  Helo=[mail-send.aviatnet.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR0801MB2200
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EL44fQMzTublbjwvRxZIE8fPy6E>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Aug 2018 23:06:21 -0000
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From nobody Wed Aug  8 00:14:02 2018
Return-Path: <william.ivory@intl.att.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B440C130DD1 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:14:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BUvKxzg406jn for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:13:59 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33112130DC9 for <netmod@ietf.org>; Wed,  8 Aug 2018 00:13:59 -0700 (PDT)
Received: from pps.filterd (m0049287.ppops.net [127.0.0.1]) by m0049287.ppops.net-00191d01. (8.16.0.22/8.16.0.22) with SMTP id w78752cG001112; Wed, 8 Aug 2018 03:13:58 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049287.ppops.net-00191d01. with ESMTP id 2kqnvqwwhu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 Aug 2018 03:13:58 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787Dv2V026400; Wed, 8 Aug 2018 03:13:57 -0400
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [135.66.87.47]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787Dqr6026367; Wed, 8 Aug 2018 03:13:52 -0400
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [127.0.0.1]) by zlp27126.vci.att.com (Service) with ESMTP id 066584000380; Wed,  8 Aug 2018 07:13:52 +0000 (GMT)
Received: from gbcdccas01.intl.att.com (unknown [135.76.180.9]) by zlp27126.vci.att.com (Service) with ESMTPS id B00C74000394; Wed,  8 Aug 2018 07:13:51 +0000 (GMT)
Received: from GBCDCMBX03.intl.att.com ([135.76.31.134]) by gbcdccas01.intl.att.com ([135.76.180.9]) with mapi id 14.03.0399.000; Wed, 8 Aug 2018 08:13:50 +0100
From: "Ivory, William" <william.ivory@intl.att.com>
To: "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9Q==
Date: Wed, 8 Aug 2018 07:13:50 +0000
Message-ID: <E3378E0605547F4E854DEE0CB1116AB03A8B5C@gbcdcmbx03.intl.att.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.76.180.249]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-08_02:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=1 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=1 clxscore=1011 lowpriorityscore=0 mlxscore=1 impostorscore=0 mlxlogscore=211 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808080075
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/g3p8DP30IAe_TOZpDQlbrVl16f0>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 07:14:01 -0000

On 07/08/18 23:01, Acee Lindem (acee) wrote:
Is it possible to indicate that choice statement must be specified in a YAN=
G 1.1 =93must=94 clause w/o specifying every case? Similarly, it is there a=
 way specify that a container cannot be empty in =93must=94 clause?
Thanks,
Acee

For the second, just check the container has children:

    must "<path_to_container>/*";

Regards,

William


From nobody Wed Aug  8 00:27:39 2018
Return-Path: <william.ivory@intl.att.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71D3C130DCF for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:27:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b8qTFqNVCDoa for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:27:35 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D1E8130E5C for <netmod@ietf.org>; Wed,  8 Aug 2018 00:27:35 -0700 (PDT)
Received: from pps.filterd (m0049462.ppops.net [127.0.0.1]) by m0049462.ppops.net-00191d01. (8.16.0.22/8.16.0.22) with SMTP id w787PSHn033329; Wed, 8 Aug 2018 03:27:34 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049462.ppops.net-00191d01. with ESMTP id 2kqut3gadu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 Aug 2018 03:27:34 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787RXWx000410; Wed, 8 Aug 2018 03:27:33 -0400
Received: from zlp27130.vci.att.com (zlp27130.vci.att.com [135.66.87.38]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787RSJY000373; Wed, 8 Aug 2018 03:27:28 -0400
Received: from zlp27130.vci.att.com (zlp27130.vci.att.com [127.0.0.1]) by zlp27130.vci.att.com (Service) with ESMTP id 3C86440F6CE9; Wed,  8 Aug 2018 07:27:28 +0000 (GMT)
Received: from gbcdccas01.intl.att.com (unknown [135.76.180.9]) by zlp27130.vci.att.com (Service) with ESMTPS id E4D534000527; Wed,  8 Aug 2018 07:27:27 +0000 (GMT)
Received: from GBCDCMBX03.intl.att.com ([135.76.31.134]) by gbcdccas01.intl.att.com ([135.76.180.9]) with mapi id 14.03.0399.000; Wed, 8 Aug 2018 08:27:26 +0100
From: "Ivory, William" <william.ivory@intl.att.com>
To: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] false() vs 'false' in 'when' statements
Thread-Index: AdQudRPPuaY7IZR/R5mIg6eZugDJwA==
Date: Wed, 8 Aug 2018 07:27:25 +0000
Message-ID: <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com>
References: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.76.180.249]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-08_02:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808080078
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/J-D51ERBN83D4fGu_72j0PB_MsQ>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 07:27:38 -0000

On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
Hi all,

When comparing the value of a boolean leaf in a 'when' statement (or a 'mus=
t' statement), is an equality comparison to 'true' or 'false' the same as a=
 check against true() or false() ?

For example:

leaf a {
    type boolean;
}
leaf b {
    type uint32;
    when ".../a =3D 'true'";
}
leaf c {
    type uint32;
    when ".../a =3D 'false'";
}
(note that neither b nor c can be configured if leaf a isn't explicitly con=
figured with a value since there is no default)

If I replace the two 'when' statements above with the following instead, is=
 the behavior the same ?
    =85
    when ".../a =3D true()";
    =85
    when ".../a =3D false()";
    =85

Or does "../a =3D true()" behave as an existence check on leaf a and would =
be enabled whether a is configured as true or false ?

Regards,
Jason



See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans

(a) "../a =3D 'true'"

Compares 'string-value' (same as value of node if a leaf, rather more inter=
esting if a list / container!) of each node in nodeset generated by '../a' =
and if any node in the nodeset matches 'true', expression is true.

(b) "../a =3D true()"

Similar to above but after getting the string-value, this is converted to a=
 boolean before comparing with the boolean true.

(c) '../a'

True if the nodeset generated by this expression is not empty.

---

Caveats alluded to above are that if '../a' matches multiple nodes, then on=
ly one of these nodes needs to pass the test for the test to be true.  Sepa=
rately, if any of the nodes are not leaves, the 'string-value' is a concate=
nated string of the values of the node's child / grandchild leaves.

Hope that helps.  You wouldn't believe the number of unit tests I have to m=
ake sure we get this logic right!  Using '!=3D' when comparing a nodeset wi=
th >1 node with other values is very likely not to give the answer you expe=
ct (-:

Regards,

William



From nobody Wed Aug  8 00:41:28 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C09AC130DD1 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:41:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tGI0Xoia5WmJ for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:41:25 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 50300126CB6 for <netmod@ietf.org>; Wed,  8 Aug 2018 00:41:25 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id 9227A1AE018A; Wed,  8 Aug 2018 09:41:24 +0200 (CEST)
Date: Wed, 08 Aug 2018 09:41:24 +0200 (CEST)
Message-Id: <20180808.094124.1561349700462768151.mbj@tail-f.com>
To: william.ivory@intl.att.com
Cc: acee=40cisco.com@dmarc.ietf.org, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <E3378E0605547F4E854DEE0CB1116AB03A8B5C@gbcdcmbx03.intl.att.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com> <E3378E0605547F4E854DEE0CB1116AB03A8B5C@gbcdcmbx03.intl.att.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OGHuGbPmbi9MoT_E1wfCut0_X_M>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 07:41:27 -0000
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From nobody Wed Aug  8 00:42:53 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F96A130DE4 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:42:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2x-80nk6wsK1 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 00:42:50 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 16229130DC9 for <netmod@ietf.org>; Wed,  8 Aug 2018 00:42:50 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id 61BB61AE018A; Wed,  8 Aug 2018 09:42:49 +0200 (CEST)
Date: Wed, 08 Aug 2018 09:42:49 +0200 (CEST)
Message-Id: <20180808.094249.655098716605272274.mbj@tail-f.com>
To: acee=40cisco.com@dmarc.ietf.org
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/bzpKsmrwLuZiO-2frLyRrhtzY4o>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 07:42:52 -0000
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From nobody Wed Aug  8 01:02:22 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CDB2130DDA for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 01:02:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_RED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b2mMx6Ld5UuS for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 01:02:17 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 94ABD126CB6 for <netmod@ietf.org>; Wed,  8 Aug 2018 01:02:17 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id DBD501AE018A; Wed,  8 Aug 2018 10:02:16 +0200 (CEST)
Date: Wed, 08 Aug 2018 10:02:16 +0200 (CEST)
Message-Id: <20180808.100216.200497868973697779.mbj@tail-f.com>
To: Hayden.Brown@Aviatnet.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <6e99c5ca12bc44f28e2554dde4bc11e7@USP-EXCHPROD01.GNET.global.vpn>
References: <6e99c5ca12bc44f28e2554dde4bc11e7@USP-EXCHPROD01.GNET.global.vpn>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-sqCqsdkizxjM3elsgVj7CboPm8>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 08:02:20 -0000

SGksDQoNCkknbSBub3Qgc3VyZSBpZiB0aGVzZSBjaGFuZ2VzIG1ha2UgdGhlIGRvYyBiZXR0ZXIu
ICAiaG93IHRoZSBzY2hlbWEgaXMNCm1vdW50ZWQiIGlzIG5vdCBqdXN0ICJpbmxpbmUiIC8gInNo
YXJlZC1zY2hlbWEiLCBidXQgdGhlcmUgaXMgYWxzbyB0aGUNCiJjb25maWciIGxlYWYuICBBbmQg
aGF2aW5nIHRvIHJlcGVhdCB0aGF0IGluIG1hbnkgcGxhY2VzIG1ha2VzIHRoZQ0KdGV4dCBhIGJp
dCBjbHVtc3kgaW1vLiAgIE1heWJlIG90aGVycyBjYW4gY2hpbWUgaW4gYXMgd2VsbD8NCg0KDQoN
Ci9tYXJ0aW4NCg0KDQpIYXlkZW4gQnJvd24gPEhheWRlbi5Ccm93bkBBdmlhdG5ldC5jb20+IHdy
b3RlOg0KPiBIaSBNYXJ0aW4sDQo+IA0KPiBUaGFuayB5b3UgZm9yIHlvdXIgY29tbWVudHMuIE9r
LCBhZ3JlZWQgLSBpdCB3b3VsZCBiZSBiZXR0ZXIgdG8gbm90IGludHJvZHVjZSBhIG5ldyBtb3Vu
dGVkLXNjaGVtYSAndHlwZScgdGVybS4gUGVyaGFwcyB0aGUgd29yZGluZyAiaG93IHRoZSBzY2hl
bWEgaXMgbW91bnRlZCIgaXMgYSBiZXR0ZXIgYWx0ZXJuYXRpdmU/DQo+IEkndmUgcHJvdmlkZWQg
cG9zc2libGUgd29yZGluZyBzdWdnZXN0aW9ucyBhZ2FpbiBiZWxvdyBpbiBicmFja2V0cy4NCj4g
IA0KPiANCj4gU2VjdGlvbiAzLjMg4oCTIFBhZ2UgNw0KPiBUaGUgIi9zY2hlbWEtbW91bnRzIiBj
b250YWluZXIgaGFzIHRoZSAibW91bnQtcG9pbnQiIGxpc3QgYXMgb25lIG9mIGl0cyBjaGlsZHJl
bi4gRXZlcnkgZW50cnkgb2YgdGhpcyBsaXN0IHJlZmVycyB0aHJvdWdoIGl0cyBrZXkgdG8gYSBt
b3VudCBwb2ludCBhbmQgc3BlY2lmaWVzIFtob3cgdGhlIHNjaGVtYSBpcyBtb3VudGVkLCBhcyBl
aXRoZXIgImlubGluZSIgb3IgInNoYXJlZC1zY2hlbWEiXS4NCj4gDQo+IA0KPiBTZWN0aW9uIDMu
MyAtIFBhZ2UgOA0KPiBBbiBlbnRyeSBvZiB0aGUgIm1vdW50LXBvaW50IiBsaXN0IGNhbiBzcGVj
aWZ5IFtob3cgdGhlIHNjaGVtYSBpcyBtb3VudGVkXSBpbiB0d28gZGlmZmVyZW50IHdheXMsICJp
bmxpbmUiIG9yICJzaGFyZWQtc2NoZW1hIi4NCj4gDQo+IA0KPiBTZWN0aW9uIDkgLSBQYWdlIDEz
DQo+IEEgbW91bnQgcG9pbnQgZGVmaW5lcyBhIHBsYWNlIGluIHRoZSBub2RlIGhpZXJhcmNoeSB3
aGVyZSBvdGhlciBkYXRhIG1vZGVscyBtYXkgYmUgYXR0YWNoZWQuIEEgc2VydmVyIHRoYXQgaW1w
bGVtZW50cyBhIG1vZHVsZSB3aXRoIGEgbW91bnQgcG9pbnQgcG9wdWxhdGVzIHRoZSAvc2NoZW1h
LW1vdW50cy9tb3VudC1wb2ludCBsaXN0IHdpdGggZGV0YWlsZWQgaW5mb3JtYXRpb24gb24gW3do
ZXRoZXIgdGhlIGRhdGEgbW9kZWxzIG1vdW50ZWQgYXQgZWFjaCBpbnN0YW5jZSBvZiBhIG1vdW50
IHBvaW50IE1BWSBiZSBkaWZmZXJlbnQgKCJpbmxpbmUiIGNhc2UpIG9yIGlmIHRoZXkgTVVTVCBh
bGwgaGF2ZSB0aGUgc2FtZSBZQU5HIGxpYnJhcnkgY2hlY2tzdW0gKCJzaGFyZWQtc2NoZW1hIiBj
YXNlKS4gXQ0KPiANCj4gW0ZvciBhICJzaGFyZWQtc2NoZW1hIiBtb3VudC1wb2ludCBsaXN0IGVu
dHJ5LCB0aGUgZW50cnkgTUFZIGluY2x1ZGUgb25lIG9yIG1vcmUgInBhcmVudC1yZWZlcmVuY2Ui
IGxpc3QgZW50cmllcyB0aGF0IGFyZSB1c2VkIHRvIHNwZWNpZnkgdGhlIGNvbnRleHQgbm9kZXNl
dCBmb3IgYW55IFhQYXRoIDEuMCBleHByZXNzaW9ucyBkZWZpbmVkIHdpdGhpbiB0aGUgbW91bnRl
ZCBzY2hlbWEuXQ0KPiANCj4gDQo+IFNlY3Rpb24gOSAtIFBhZ2UgMTQNCj4gbGlzdCBtb3VudC1w
b2ludCB7DQo+ICAgICBrZXkgIm1vZHVsZSBsYWJlbCI7DQo+ICAgICBkZXNjcmlwdGlvbg0KPiAg
ICAgIkVhY2ggZW50cnkgb2YgdGhpcyBsaXN0IHNwZWNpZmllcyBbaG93IHRoZV0gc2NoZW1hIGZv
ciBhIHBhcnRpY3VsYXIgbW91bnQgcG9pbnQgW2lzIG1vdW50ZWQgKCJpbmxpbmUiIG9yICJzaGFy
ZWQtc2NoZW1hIikuIF0NCj4gDQo+IA0KPiBSZWdhcmRzLA0KPiBIYXlkZW4NCj4gDQo+IA0KPiAN
Cj4gDQo+IA0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBNYXJ0aW4gQmpv
cmtsdW5kIFttYWlsdG86bWJqQHRhaWwtZi5jb21dIA0KPiBTZW50OiBNb25kYXksIDYgQXVndXN0
IDIwMTggMTE6MDYgUE0NCj4gVG86IEhheWRlbiBCcm93bg0KPiBDYzogbmV0bW9kQGlldGYub3Jn
DQo+IFN1YmplY3Q6IEVYVEVSTkFMOiBSZTogW25ldG1vZF0gRndkOiBSZTogWUFORyBzY2hlbWEg
bW91bnQgLSBhbnkgZWFybHkgaW1wbGVtZW50YXRpb25zPw0KPiANCj4gSGksDQo+IA0KPiBIYXlk
ZW4gQnJvd24gPEhheWRlbi5Ccm93bkBBdmlhdG5ldC5jb20+IHdyb3RlOg0KPiA+IOKAi0hpIExv
dSwNCj4gPiANCj4gPiANCj4gPiBUaGFuayB5b3UgZm9yIHlvdXIgcmVzcG9uc2UuIEluIHRoZSBu
ZXcgY29weSBvZiB0aGUgc2VjdGlvbnMgYmVsb3cgSSd2ZSBhdHRlbXB0ZWQgdG8gY29udmV5IGhv
dyBJIHRoaW5rIHRoZSBwYXJhZ3JhcGhzIGNvdWxkIHJlYWQuDQo+ID4gDQo+ID4gDQo+ID4gSW4g
bXkgbWluZCwgdGhlIG1haW4gInBvaW50IG9mIGFtYmlndWl0eSIgaXMgdGhhdCBpdCBzZWVtZWQg
dGhlIGV4aXN0aW5nIHdvcmRpbmcgaW1wbGllczoNCj4gPiANCj4gPiAgICogICDigIsgdGhlIG1v
dW50LXBvaW50IGxpc3Qgc3BlY2lmaWVzIHdoaWNoIG1vZHVsZXMgYXJlIG1vdW50ZWQgYmVsb3cg
dGhlIHJvb3Qgb2YgdGhlIG1vdW50IHBvaW50Lg0KPiA+IA0KPiA+IGhvd2V2ZXIsIEkgdGhpbmsg
d2UgaGF2ZSBhbGwgYWdyZWVkIHRoYXQ6DQo+ID4gDQo+ID4gICAqICAg4oCLdGhlIG1v4oCLdW50
LXBvaW50IGxpc3Qgc3BlY2lmaWVzIHRoZSBwYXJlbnQgbW9kdWxlIHRoYXQgY29udGFpbnMgdGhl
IG1vdW50LXBvaW50LC4NCj4gPiANCj4gPiBJIHNlZSB0aGlzIGFzIGp1c3QgYSBzdWJ0bGUgaW50
ZXJwcmV0YXRpb24gZGlmZmVyZW5jZSBpbiB0aGUgd29yZGluZyAic3BlY2lmaWVzIHRoZSBtb3Vu
dGVkIHNjaGVtYSIuDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gSG9wZWZ1bGx5IHRoZSB3b3JkaW5n
IChlZGl0ZWQgaW4gdGhlIGJyYWNrZXRzKSBiZWxvdyBiZXR0ZXIgY29udmV5cyBteSB0aG91Z2h0
cy4gUGxlYXNlIGZlZWwgZnJlZSB0byBjb3JyZWN0IG1lLCBvciBpbXByb3ZlIHRoZSB3b3JkaW5n
IGJlbG93IGFzIHlvdSBzZWUgZml0Lg0KPiA+IA0KPiA+IFNlY3Rpb24gMy4zIOKAkyBQYWdlIDcN
Cj4gPiA+IFRoZSAiL3NjaGVtYS1tb3VudHMiIGNvbnRhaW5lciBoYXMgdGhlICJtb3VudC1wb2lu
dCIgbGlzdCBhcyBvbmUgb2YgaXRzIGNoaWxkcmVuLiBFdmVyeSBlbnRyeSBvZiB0aGlzIGxpc3Qg
cmVmZXJzIHRocm91Z2ggaXRzIGtleSB0byBhIG1vdW50IHBvaW50IGFuZCBzcGVjaWZpZXMgdGhl
IFt0eXBlIG9mXSBtb3VudGVkIHNjaGVtYSBbYXMgImlubGluZSIgb3IgInNoYXJlZC1zY2hlbWEi
XS4NCj4gPiANCj4gPiBTZWN0aW9uIDMuMyAtIFBhZ2UgOA0KPiA+ID4gQW4gZW50cnkgb2YgdGhl
ICJtb3VudC1wb2ludCIgbGlzdCBjYW4gc3BlY2lmeSB0aGUgW3R5cGUgb2ZdIG1vdW50ZWQgc2No
ZW1hIGluIHR3byBkaWZmZXJlbnQgd2F5cywgImlubGluZSIgb3IgInNoYXJlZC1zY2hlbWEiLg0K
PiANCj4gVGhlIGRvY3VtZW50IGRvZXMgbm90IGRlZmluZSB0aGUgInR5cGUiIG9mIGEgbW91bnRl
ZCBzY2hlbWEsIHNvIEkNCj4gZG9uJ3QgdGhpbmsgd2Ugc2hvdWxkIHVzZSB0aGF0IHRlcm0gaW4g
anVzdCBhIGZldyBwbGFjZXMuDQo+IA0KPiA+IFNlY3Rpb24gOSAtIFBhZ2UgMTMNCj4gPiA+IEEg
bW91bnQgcG9pbnQgZGVmaW5lcyBhIHBsYWNlIGluIHRoZSBub2RlIGhpZXJhcmNoeSB3aGVyZSBv
dGhlciBkYXRhIG1vZGVscyBtYXkgYmUgYXR0YWNoZWQuIEEgc2VydmVyIHRoYXQgaW1wbGVtZW50
cyBhIG1vZHVsZSB3aXRoIGEgbW91bnQgcG9pbnQgcG9wdWxhdGVzIHRoZSAvc2NoZW1hLW1vdW50
cy9tb3VudC1wb2ludCBsaXN0IHdpdGggZGV0YWlsZWQgaW5mb3JtYXRpb24gb24gd2hldGhlciB0
aGUgW2RhdGEgbW9kZWxzIG1vdW50ZWQgYXQgZWFjaCBpbnN0YW5jZSBvZiBhIG1vdW50IHBvaW50
IE1BWSBiZSBkaWZmZXJlbnQgKCJpbmxpbmUiIGNhc2UpIG9yIE1VU1QgYWxsIGhhdmUgdGhlIHNh
bWUgWUFORyBsaWJyYXJ5IGNoZWNrc3VtICgic2hhcmVkLXNjaGVtYSIgY2FzZSkuDQo+ID4gDQo+
ID4gRm9yIGEgInNoYXJlZC1zY2hlbWEiIG1vdW50LXBvaW50IGxpc3QgZW50cnksIHRoZSBlbnRy
eSBNQVkgaW5jbHVkZSBvbmUgb3IgbW9yZSAicGFyZW50LXJlZmVyZW5jZSIgbGlzdCBlbnRyaWVz
IHRoYXQgYXJlIHVzZWQgdG8gc3BlY2lmeSB0aGUgY29udGV4dCBub2Rlc2V0IGZvciBhbnkgWFBh
dGggMS4wIGV4cHJlc3Npb25zIGRlZmluZWQgd2l0aGluIHRoZSBtb3VudGVkIHNjaGVtYS5dDQo+
ID4gDQo+ID4gDQo+ID4gU2VjdGlvbiA5IC0gUGFnZSAxNA0KPiA+IGxpc3QgbW91bnQtcG9pbnQg
ew0KPiA+ICAgICBrZXkgIm1vZHVsZSBsYWJlbCI7DQo+ID4gICAgIGRlc2NyaXB0aW9uDQo+ID4g
ICAgICJFYWNoIGVudHJ5IG9mIHRoaXMgbGlzdCBzcGVjaWZpZXMgW3RoZSB0eXBlIG9mXSBzY2hl
bWEgZm9yIGEgcGFydGljdWxhciBtb3VudCBwb2ludCBbICgiaW5saW5lIiBvciAic2hhcmVkLXNj
aGVtYSIpIF0uDQo+ID4gDQo+ID4gDQo+ID4gVGhhbmtzIGFuZCBiZXN0IHJlZ2FyZHMsDQo+ID4g
DQo+ID4gSGF5ZGVuDQo+ID4gDQo+IA0KPiANCj4gL21hcnRpbg0KPiANCj4gDQo+IA0KPiA+IA0K
PiA+IA0KPiA+IA0KPiA+IA0KPiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+
ID4gRnJvbTogTG91IEJlcmdlciA8bGJlcmdlckBsYWJuLm5ldD4NCj4gPiBTZW50OiBGcmlkYXks
IDMgQXVndXN0IDIwMTggNzoyOCBhLm0uDQo+ID4gVG86IEhheWRlbiBCcm93bjsgbmV0bW9kQGll
dGYub3JnDQo+ID4gU3ViamVjdDogRVhURVJOQUw6IFJlOiBbbmV0bW9kXSBGd2Q6IFJlOiBZQU5H
IHNjaGVtYSBtb3VudCAtIGFueSBlYXJseSBpbXBsZW1lbnRhdGlvbnM/DQo+ID4gDQo+ID4gDQo+
ID4gSGksDQo+ID4gDQo+ID4gICAgIGhvcGVmdWxseSBvdGhlcnMgd2lsbCBjaGltZSBpbiB0b28s
IGJ1dCBoZXJlJ3MgbXkgdmlldyAoYXMgYSB1c2VyIG9mIHNjaGVtYSBtb3VudCwgc2VlIGh0dHBz
Oi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLXJ0Z3dnLW5pLW1vZGVsKS4uLg0KPiA+
IA0KPiA+IE9uIDcvMzAvMjAxOCA3OjI3IFBNLCBIYXlkZW4gQnJvd24gd3JvdGU6DQo+ID4gDQo+
ID4gSGkgZXZlcnlvbmUsDQo+ID4gDQo+ID4gSSBqdXN0IHdhbnRlZCB0byBhc2sgaWYgaXQgd291
bGQgYmUgcG9zc2libGUgdG8gY2xhcmlmeSB0aGUgaW50ZW50aW9ucyBhcm91bmQgc29tZSBvZiB0
aGUgd29yZGluZyBvZiB0aGUgZHJhZnQgc2NoZW1hIG1vdW50IHN0YW5kYXJkIChSZXYtMTApLiBJ
biBwYXJ0aWN1bGFyLCByZWdhcmRpbmcgZW50cmllcyBvZiB0aGUgL3NjaGVtYS1tb3VudHMvbW91
bnQtcG9pbnRzIGxpc3QuDQo+ID4gDQo+ID4gTXkgaW50ZXJwcmV0YXRpb24gaXMgdGhhdCB0aGUg
aW50ZW5kZWQgdXNlIG9mIHRoZSAvc2NoZW1hLW1vdW50cy9tb3VudC1wb2ludHMgbGlzdCBlbnRy
aWVzIGFyZSB0byBzcGVjaWZ5IHRoZSBwYXJlbnQgbW9kdWxlcyB0aGF0IGNvbnRhaW4gYSBtb3Vu
dCBwb2ludC4NCj4gPiANCj4gPiB5ZXMNCj4gPiANCj4gPiBGb2xsb3dpbmcgb24gZnJvbSB0aGlz
LCB0aGUgY2xpZW50IHNob3VsZCB1c2UgdGhlIFlBTkcgbGlicmFyeSBpbnN0YW5jZSB0byBkZXRl
cm1pbmUgd2hpY2ggc2NoZW1hIG9wdGlvbnMgY2FuIGJlIG1vdW50ZWQgYXQgdGhlIHJvb3Qgb2Yg
YSBtb3VudCBwb2ludC4gVGhpcyBzZWVtcyBjb25zaXN0ZW50IHdpdGggdGhlIGV4YW1wbGVzIG9m
IEFwcGVuZGl4IEEgb2YgdGhlIGRyYWZ0IHN0YW5kYXJkLg0KPiA+IA0KPiA+IGlmIHlvdSBkcm9w
IHRoZSB3b3JkICJvcHRpb25zIiwgdGhlbiB5ZXMuICBPdGhlciBleGFtcGxlcyBjYW4gYmUgZm91
bmQgaW4gZHJhZnQtaWV0Zi1ydGd3Zy1uaS1tb2RlbA0KPiA+IA0KPiA+IA0KPiA+IEluIHRoaXMg
ZW1haWwgSSB3YW50ZWQgdG8gaGlnaGxpZ2h0IHRoZSBmb2xsb3dpbmcgc2VjdGlvbnMgb2YgdGhl
IGRyYWZ0IFJGQyBiZWxvdy4gSW4gbXkgdmlldyB0aGV5IHNlZW0gdG8gbWUgdG8gYmUgc29tZXdo
YXQgYW1iaWd1b3VzLCBpbiBpbXBseWluZyB0aGF0IHRoZSBtb3VudC1wb2ludCBsaXN0IGVudHJp
ZXMgc3BlY2lmeSB0aGUgKmNoaWxkKiBtb2R1bGUgKHN1Yi1zY2hlbWEpOg0KPiA+IA0KPiA+IA0K
PiA+ID5Gcm9tIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbmV0
bW9kLXNjaGVtYS1tb3VudC8/aW5jbHVkZV90ZXh0PTENCj4gPiBTZWN0aW9uIDMuMyDigJMgUGFn
ZSA3DQo+ID4gPiBUaGUgIi9zY2hlbWEtbW91bnRzIiBjb250YWluZXIgaGFzIHRoZSAibW91bnQt
cG9pbnQiIGxpc3QgYXMgb25lIG9mIGl0cyBjaGlsZHJlbi4gRXZlcnkgZW50cnkgb2YgdGhpcyBs
aXN0IHJlZmVycyB0aHJvdWdoIGl0cyBrZXkgdG8gYSBtb3VudCBwb2ludCBhbmQgc3BlY2lmaWVz
IHRoZSBtb3VudGVkIHNjaGVtYS4NCj4gPiANCj4gPiBTZWN0aW9uIDMuMyAtIFBhZ2UgOA0KPiA+
ID4gQW4gZW50cnkgb2YgdGhlICJtb3VudC1wb2ludCIgbGlzdCBjYW4gc3BlY2lmeSB0aGUgbW91
bnRlZCBzY2hlbWEgaW4gdHdvIGRpZmZlcmVudCB3YXlzLCAiaW5saW5lIiBvciAic2hhcmVkLXNj
aGVtYSIuDQo+ID4gDQo+ID4gDQo+ID4gU2VjdGlvbiA5IC0gUGFnZSAxMw0KPiA+ID4gQSBtb3Vu
dCBwb2ludCBkZWZpbmVzIGEgcGxhY2UgaW4gdGhlIG5vZGUgaGllcmFyY2h5IHdoZXJlIG90aGVy
IGRhdGEgbW9kZWxzIG1heSBiZSBhdHRhY2hlZC4gQSBzZXJ2ZXIgdGhhdCBpbXBsZW1lbnRzIGEg
bW9kdWxlIHdpdGggYSBtb3VudCBwb2ludCBwb3B1bGF0ZXMgdGhlIC9zY2hlbWEtbW91bnRzL21v
dW50LXBvaW50IGxpc3Qgd2l0aCBkZXRhaWxlZCBpbmZvcm1hdGlvbiBvbiB3aGljaCBkYXRhIG1v
ZGVscyBhcmUgbW91bnRlZCBhdCBlYWNoIG1vdW50IHBvaW50Lg0KPiA+IA0KPiA+IFNlY3Rpb24g
OSAtIFBhZ2UgMTQNCj4gPiBsaXN0IG1vdW50LXBvaW50IHsNCj4gPiAgICAga2V5ICJtb2R1bGUg
bGFiZWwiOw0KPiA+ICAgICBkZXNjcmlwdGlvbg0KPiA+ICAgICAiRWFjaCBlbnRyeSBvZiB0aGlz
IGxpc3Qgc3BlY2lmaWVzIGEgc2NoZW1hIGZvciBhIHBhcnRpY3VsYXIgbW91bnQgcG9pbnQuDQo+
ID4gDQo+ID4gDQo+ID4gSSBoYXZlIHJlcmVhZCB0aGUgYSBmZXcgdGltZXMgYW5kIGFtIGhhdmlu
ZyBhIGhhcmQgdGltZSB1bmRlcnN0YW5kIHdoYXQgc2hvdWxkIGJlIGNoYW5nZWQuICBDYW4geW91
IHN1Z2dlc3Qgc3BlY2lmaWMgY2hhbmdlcyB0aGF0IHdvdWxkIGFkZHJlc3MgeW91ciBjb25jZXJu
L2NvbW1lbnQ/ICBUaGlzIG1pZ2h0IGhlbHAgdG8gdW5kZXJzdGFuZCB0aGUgaXNzdWUgeW91IGFy
ZSBzZWVpbmcuDQo+ID4gDQo+ID4gDQo+ID4gVGhlIHdvcmRpbmcgbWFrZXMgbWUgd29uZGVyIGlm
IHRoZXNlIHBhc3NhZ2VzIG1pZ2h0IGFjdHVhbGx5IGp1c3QgYmUgImxlZnQtb3ZlciIgY29udGV4
dCBmcm9tIGVhcmxpZXIgcmV2aXNpb25zIG9mIHRoZSBkcmFmdCBzdGFuZGFyZCAoUmV2aXNpb24g
OCBhbmQgcHJpb3IpIC0tIGVmZmVjdGl2ZWx5IHJlZmVycmluZyBiYWNrIHRvIHRoZSBzY2hlbWEt
bW91bnQgJ3VzZS1zY2hlbWEnIGxpc3QuDQo+ID4gDQo+ID4gQWdhaW4sIEknbSBzZWVpbmcgdGhl
IGlzc3VlLg0KPiA+IA0KPiA+IA0KPiA+IEkgZG8gb2YgY291cnNlIGFja25vd2xlZGdlIHRoYXQg
aXQgaXMgZW50aXJlbHkgcG9zc2libGUgdGhhdCBJJ3ZlIG1pc2ludGVycHJldGVkIHRoZSB3b3Jk
aW5nIG9mIHRoZSBwYXNzYWdlcyBhYm92ZSwgaG93ZXZlciBpZiB0aGF0IGlzIHRoZSBjYXNlLCBJ
IHN1c3BlY3QgSSBtYXkgbm90IGJlIHRoZSBvbmx5IG9uZSBpbiBmdXR1cmUuDQo+ID4gQW5kIEkn
bSBzdXJlIEknbSBzdWZmZXJpbmcgZnJvbSBoYXZpbmcgc3BlbnQgd2F5IHRvbyBtdWNoIHRpbWUg
b24gdGhpcyB0b3BpYyBzbyBtYXkgYmUgc2VlaW5nIHRoaW5ncyBpbiB0aGUgdGV4dCB0aGF0IGFy
ZW4ndCBhY3R1YWxseSB0aGVyZSENCj4gPiANCj4gPiBDaGVlcnMsDQo+ID4gTG91DQo+ID4gKG5v
IGhhdHMpDQo+ID4gDQo+ID4gDQo+ID4gTWFueSB0aGFua3MgZm9yIHlvdXIgdGltZSBvbiB0aGlz
IG1hdHRlci4NCj4gPiANCj4gPiBCZXN0IHJlZ2FyZHMsDQo+ID4gSGF5ZGVuDQo+ID4gDQo+ID4g
DQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gT24gMjAvMDcvMjAxOCA4OjA5IFBN
LCBKdWVyZ2VuIFNjaG9lbndhZWxkZXIgd3JvdGU6DQo+ID4gDQo+ID4gT24gV2VkLCBKdWwgMTEs
IDIwMTggYXQgMDk6NDM6MzJBTSArMTIwMCwgaGF5ZGVuIHdyb3RlOg0KPiA+IA0KPiA+IA0KPiA+
IA0KPiA+IEkgdW5kZXJzdGFuZCB0aGF0IHRoZSBzY2hlbWEgbW91bnQgcHJvcG9zYWwgaXMgc3Rp
bGwgZWZmZWN0aXZlbHkgaW4gYQ0KPiA+IA0KPiA+IHN0YXRlIG9mIGZsdXgsIGJ1dCBhcmUgdGhl
cmUgYW55IHB1YmxpY2x5IHZpc2libGUgaW1wbGVtZW50YXRpb25zIG9yDQo+ID4gDQo+ID4gZGVw
bG95bWVudHMgb2YgYSBORVRDT05GIG9yIFJFU1RDT05GIHNlcnZlciB0aGF0IHRob3NlIGludGVy
ZXN0ZWQgY291bGQNCj4gPiANCj4gPiBleHBlcmltZW50IHdpdGggKGUuZy4gdG8gYWlkIGluIGNs
aWVudCBkZXZlbG9wbWVudCk/DQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gU3RhdGUgb2YgZmx1eD8g
SXQgaXMgcGFzdCBXRyBsYXN0IGNhbGwgYW5kIElFVEYgbGFzdCBjYWxsLg0KPiA+IA0KPiA+IA0K
PiA+IA0KPiA+IGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtbmV0
bW9kLXNjaGVtYS1tb3VudC9oaXN0b3J5Lw0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IC9qcw0KPiA+
IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IF9fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4gbmV0bW9kIG1haWxpbmcgbGlz
dA0KPiA+IG5ldG1vZEBpZXRmLm9yZzxtYWlsdG86bmV0bW9kQGlldGYub3JnPg0KPiA+IGh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo+ID4gDQo+ID4gDQo+IF9f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+IG5ldG1vZCBt
YWlsaW5nIGxpc3QNCj4gbmV0bW9kQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vbmV0bW9kDQo=


From nobody Wed Aug  8 01:41:07 2018
Return-Path: <william.ivory@intl.att.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E260D130DD6 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 01:41:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yub8hLVVpycR for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 01:41:04 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5D1B12F1AB for <netmod@ietf.org>; Wed,  8 Aug 2018 01:41:04 -0700 (PDT)
Received: from pps.filterd (m0053301.ppops.net [127.0.0.1]) by mx0a-00191d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7874qGQ025310; Wed, 8 Aug 2018 03:14:43 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by mx0a-00191d01.pphosted.com with ESMTP id 2kqntedyns-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 Aug 2018 03:14:42 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787EfVE026688; Wed, 8 Aug 2018 03:14:41 -0400
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [135.66.87.31]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id w787EcDm026675; Wed, 8 Aug 2018 03:14:38 -0400
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [127.0.0.1]) by zlp27127.vci.att.com (Service) with ESMTP id 0D24F4048B4D; Wed,  8 Aug 2018 07:14:38 +0000 (GMT)
Received: from gbcdccas03.intl.att.com (unknown [135.76.180.11]) by zlp27127.vci.att.com (Service) with ESMTPS id B822D40002B8; Wed,  8 Aug 2018 07:14:37 +0000 (GMT)
Received: from GBCDCMBX03.intl.att.com ([135.76.31.134]) by gbcdccas03.intl.att.com ([135.76.180.11]) with mapi id 14.03.0399.000; Wed, 8 Aug 2018 08:14:36 +0100
From: "Ivory, William" <william.ivory@intl.att.com>
To: "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9Q==
Date: Wed, 8 Aug 2018 07:14:35 +0000
Message-ID: <E3378E0605547F4E854DEE0CB1116AB03A8B6D@gbcdcmbx03.intl.att.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.76.180.249]
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-08-08_02:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=1 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=1 clxscore=1015 lowpriorityscore=0 mlxscore=1 impostorscore=0 mlxlogscore=229 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808080075
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9TRlSloZXN8554rlu4y7I_kgxuM>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 08:41:06 -0000

On 07/08/18 23:01, Acee Lindem (acee) wrote:
Is it possible to indicate that choice statement must be specified in a YAN=
G 1.1 =93must=94 clause w/o specifying every case? Similarly, it is there a=
 way specify that a container cannot be empty in =93must=94 clause?
Thanks,
Acee

[to list this time ...]

For the second, just check the container has children:

    must "<path_to_container>/*";

Regards,

William


From nobody Wed Aug  8 04:28:24 2018
Return-Path: <acee@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECA21128C65 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:28:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SjQt88oveIMb for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:28:21 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31400128B14 for <netmod@ietf.org>; Wed,  8 Aug 2018 04:28:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1266; q=dns/txt; s=iport; t=1533727701; x=1534937301; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=rmUFcEhtHJBszK9g1hFvyLFrLVr4TkccRggbFq/F2a4=; b=QsBVMHPXZULhk3SERvLiBiWWUaBIaOvOAK176EDv7LcMzviOUgJ7nIZ/ qIgu8yUdC18eglUffCkXm1VoHARpeYyleJr7xFs/1iqc7oZ4QQvPyGskr gjeMIlIDuznn7fY+Kc/NBuzWJQgCBfF8kXRKML2Pmnff2zQZh6gwwXm49 A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BjAQCC0mpb/5JdJa1cGgEBAQEBAgE?= =?us-ascii?q?BAQEIAQEBAYNOgWIoCoN0iAqMRoFoJYM8kjWBeguEbAIXgnchNBgBAgEBAgE?= =?us-ascii?q?BAm0ohTcBAQEBAgEjEUUQAgEIDgoCAiYCAgIwFRACBA4FgyCBeQiqZ4EuhGa?= =?us-ascii?q?FcoELiAkXggCBOQwTgkyDGwSEYDGCJAKaRQkCj0eOLJJOAhEUgSQdOIFScBV?= =?us-ascii?q?lAYI+kFNvAY0ggRsBAQ?=
X-IronPort-AV: E=Sophos;i="5.51,457,1526342400"; d="scan'208";a="433217575"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Aug 2018 11:28:20 +0000
Received: from XCH-RTP-012.cisco.com (xch-rtp-012.cisco.com [64.101.220.152]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id w78BSJ3U016081 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 8 Aug 2018 11:28:20 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-012.cisco.com (64.101.220.152) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 8 Aug 2018 07:28:19 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1320.000; Wed, 8 Aug 2018 07:28:19 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9aS1vKmA///78QA=
Date: Wed, 8 Aug 2018 11:28:19 +0000
Message-ID: <6BAF8353-6863-4B26-AB65-88CFBFC85E77@cisco.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com> <20180808.094249.655098716605272274.mbj@tail-f.com>
In-Reply-To: <20180808.094249.655098716605272274.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.201]
Content-Type: text/plain; charset="utf-8"
Content-ID: <D3E1EE0158DCFF4A994D27628A9F9F8C@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.152, xch-rtp-012.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/j8r_YCBRvmeFZ_SWPhV_opQOFyI>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 11:28:23 -0000

VGhhbmtzIE1hcnRpbiAtIHNlZSBpbmxpbmUuIA0KDQrvu79PbiA4LzgvMTgsIDM6NDMgQU0sICJN
YXJ0aW4gQmpvcmtsdW5kIiA8bWJqQHRhaWwtZi5jb20+IHdyb3RlOg0KDQogICAgSGksDQogICAg
DQogICAgIkFjZWUgTGluZGVtIFwoYWNlZVwpIiA8YWNlZT00MGNpc2NvLmNvbUBkbWFyYy5pZXRm
Lm9yZz4gd3JvdGU6DQogICAgPiBJcyBpdCBwb3NzaWJsZSB0byBpbmRpY2F0ZSB0aGF0IGNob2lj
ZSBzdGF0ZW1lbnQgbXVzdCBiZSBzcGVjaWZpZWQNCiAgICA+IGluIGEgWUFORyAxLjEg4oCcbXVz
dOKAnSBjbGF1c2Ugdy9vIHNwZWNpZnlpbmcgZXZlcnkgY2FzZT8NCiAgICANCiAgICBEbyB5b3Ug
bWVhbiB0aGF0IHlvdSB0byBlbnN1cmUgdGhhdCBhIGNhc2UgaXMgYWx3YXlzIGNvbmZpZ3VyZWQ/
ICBJZg0KICAgIHNvLCBtYXJrIHRoZSBjaG9pY2UgYXMgIm1hbmRhdG9yeSB0cnVlIi4gIEl0IGNh
bid0IGJlIGRvbmUgd2l0aCBhbg0KICAgIFhQYXRoIGV4cHJlc3Npb24uDQoNCkl0J3Mgbm90IHRo
YXQgZWFzeSBzaW5jZSBhdCB0aGUgbGVhc3QgdGhlIGNob2ljZSBvciBhbm90aGVyIGxlYWYgbXVz
dCBiZSBzcGVjaWZpZWQuIEkgZm91bmQgdGhhdCB0aGUgY2hvaWNlIGFuZCBjYXNlIGlkZW50aWZp
ZXJzIGFyZSBub3QgcGFydCBvZiB0aGUgWHBhdGguIEV2ZW4gYWZ0ZXIgcmVyZWFkaW5nIHNvbWUg
c2VjdGlvbnMgb2YgUkZDNzk1MCwgdGhpcyB3YXNuJ3QgaW50dWl0aXZlLg0KDQpUaGFua3MsDQpB
Y2VlIA0KICAgIA0KICAgIA0KICAgIC9tYXJ0aW4NCiAgICANCiAgICANCiAgICANCiAgICA+IFNp
bWlsYXJseSwgaXQgaXMgdGhlcmUgYSB3YXkgc3BlY2lmeSB0aGF0IGEgY29udGFpbmVyIGNhbm5v
dCBiZSBlbXB0eSBpbiDigJxtdXN04oCdIGNsYXVzZT8NCiAgICA+IFRoYW5rcywNCiAgICA+IEFj
ZWUNCiAgICANCg0K


From nobody Wed Aug  8 04:30:06 2018
Return-Path: <acee@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5989130DC0 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:30:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zMqeDtR5DYSV for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:30:03 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EB37128B14 for <netmod@ietf.org>; Wed,  8 Aug 2018 04:30:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1274; q=dns/txt; s=iport; t=1533727803; x=1534937403; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=OVBnCGPOq8yYNRQTKL3KTwnIDygqXizWjsm75Y1gtV0=; b=mQFFm37ca2LKtZ1XbeZMbgZFc95TCpPqwHdVQzbJgANNBTpeAf9L6ZNw 5P9I+4wCkDoK75BmIQ04EJ2chCi4Br2LzOeCukIReoakikVSRtIyAro/r cx7D6njj4E4aWExeeQXS7lhx3eB5LykAO8exo+53ZOfw7mjN6ptRRXY6e w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BlAQCq02pb/4cNJK1cGgEBAQEBAgE?= =?us-ascii?q?BAQEIAQEBAYNOY38oCoN0iAqMRoFog2GSNYF6CxgLhANGAheCdyE0GAECAQE?= =?us-ascii?q?CAQECbRwMhTgCAQMBASEROhsCAQgaAiYCAgIlCxUQAgQBEoMgAYIAD6prgS6?= =?us-ascii?q?KUwWBC4gJF4IAgTkME4JMgxsBAYF4gmoxgiQCmkUJAo9HjiySTgIRFIEkHTi?= =?us-ascii?q?BUnAVOyoBgj6LFYU+bwGNIIEbAQE?=
X-IronPort-AV: E=Sophos;i="5.51,457,1526342400"; d="scan'208";a="433218110"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Aug 2018 11:30:02 +0000
Received: from XCH-RTP-014.cisco.com (xch-rtp-014.cisco.com [64.101.220.154]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id w78BU0L7031177 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 8 Aug 2018 11:30:01 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-014.cisco.com (64.101.220.154) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 8 Aug 2018 07:30:00 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1320.000; Wed, 8 Aug 2018 07:30:00 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: "Ivory, William" <william.ivory@intl.att.com>, "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9aS1uROA
Date: Wed, 8 Aug 2018 11:30:00 +0000
Message-ID: <DF510721-9F7C-4899-8799-F09B14D3BB82@cisco.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com> <E3378E0605547F4E854DEE0CB1116AB03A8B6D@gbcdcmbx03.intl.att.com>
In-Reply-To: <E3378E0605547F4E854DEE0CB1116AB03A8B6D@gbcdcmbx03.intl.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.201]
Content-Type: text/plain; charset="utf-8"
Content-ID: <38B862483F165848ABD0C873A029C023@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.154, xch-rtp-014.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Qc1gvhyzTYTNuM-yo6t-vZ_z56M>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 11:30:05 -0000
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From nobody Wed Aug  8 04:31:50 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F914128C65 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:31:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qPE_yC4KXEZp for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 04:31:47 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id E9216128B14 for <netmod@ietf.org>; Wed,  8 Aug 2018 04:31:46 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id D89121AE018A; Wed,  8 Aug 2018 13:31:45 +0200 (CEST)
Date: Wed, 08 Aug 2018 13:31:45 +0200 (CEST)
Message-Id: <20180808.133145.603038015628507205.mbj@tail-f.com>
To: acee@cisco.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <6BAF8353-6863-4B26-AB65-88CFBFC85E77@cisco.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com> <20180808.094249.655098716605272274.mbj@tail-f.com> <6BAF8353-6863-4B26-AB65-88CFBFC85E77@cisco.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/4gOCpuk4wgLrPh3NsO9cZlHJBsY>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 11:31:49 -0000
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From nobody Wed Aug  8 06:35:00 2018
Return-Path: <acee@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C678E12785F for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level: 
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBAwsG3of5cj for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:34:57 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD07A1277C8 for <netmod@ietf.org>; Wed,  8 Aug 2018 06:34:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6392; q=dns/txt; s=iport; t=1533735297; x=1534944897; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=ZJSrEtTwEVvCEf3J5eTYapHeNBK5WmcGvdYtw17AS3k=; b=BFQO/Uj/8DehyMUrkDCBHJVIQrOx+0LOurCM2CiP1c44bwUFoGCzK+n/ rRJfx/UMj/1OEyI95CZbzt6EsShyZyIJNs+f/lh/XPcwbXMEPlADus0jh NWk9i9YoDCcuPi+36Rv3SS1ojMyize5n/jcaTy5dy/gQCyLqOGgopG9gT 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BiAQBT8Gpb/4ENJK1cGgEBAQEBAgE?= =?us-ascii?q?BAQEIAQEBAYMgLmN/KAqDdIgKjECCDYM8kjWBegsjhEkCF4J6ITQYAQIBAQI?= =?us-ascii?q?BAQJtHAyFNwEBAQECASMRRRACAQgOCgICJgICAjAVEAIEDgWDIAGBeAgPqn+?= =?us-ascii?q?BLoQoAT2FbQWBC4gJF4IAgTkfgkyDGwICgS4xgwExgiQCjHiNTQkChhqCboY?= =?us-ascii?q?/jiyKdYdZAhEUgSQdOIFScBU7KgGCPoYBilJvAYtzgS2BGwEB?=
X-IronPort-AV: E=Sophos;i="5.51,457,1526342400"; d="scan'208";a="424899486"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Aug 2018 13:34:56 +0000
Received: from XCH-RTP-011.cisco.com (xch-rtp-011.cisco.com [64.101.220.151]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id w78DYuXh010126 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 8 Aug 2018 13:34:56 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-011.cisco.com (64.101.220.151) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 8 Aug 2018 09:34:55 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1320.000; Wed, 8 Aug 2018 09:34:55 -0400
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] xpath for must statements
Thread-Index: AQHULpoKt9x7V9xDM0K8KDBrtthF9aS1vKmA///78QCAAEQFgP//31yA
Date: Wed, 8 Aug 2018 13:34:55 +0000
Message-ID: <39C9167F-F484-4F53-A6F2-2144C26A2C9F@cisco.com>
References: <3FBE6E06-3C42-4CFE-9A4C-FAC55572901C@cisco.com> <20180808.094249.655098716605272274.mbj@tail-f.com> <6BAF8353-6863-4B26-AB65-88CFBFC85E77@cisco.com> <20180808.133145.603038015628507205.mbj@tail-f.com>
In-Reply-To: <20180808.133145.603038015628507205.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.201]
Content-Type: text/plain; charset="utf-8"
Content-ID: <22C2B2E1DA239942980322D7CD3514E3@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.151, xch-rtp-011.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jNs-tyUgncRqn5W8kKe1fe2Uyp4>
Subject: Re: [netmod] xpath for must statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 13:35:00 -0000
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=


From nobody Wed Aug  8 06:36:52 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AE361277C8 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:36:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id njX-81gMPFc4 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:36:47 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30101.outbound.protection.outlook.com [40.107.3.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 469CD1252B7 for <netmod@ietf.org>; Wed,  8 Aug 2018 06:36:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cHuEeZfZwQEAsg7vJTUEhVx5fCwKIcYyLOMMZFAqmt8=; b=UE22eCbEYBO5OfUiYsUOxS8XDPt3/m1ylHwSTSmCPDB8pODv6GtmImHAFBUaED9U5liyVEbFDOFEfUHbb5u5tFMI3XySjPXSjvwEuufsupNsdATZWX/qHs3bnT6lf8wAaSK0uPovQdkiwf0HyALgM4mEh5QcvK9GDwhpogvCnyg=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB4368.eurprd07.prod.outlook.com (20.176.7.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.17; Wed, 8 Aug 2018 13:36:45 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1038.013; Wed, 8 Aug 2018 13:36:45 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "Ivory, William" <william.ivory@intl.att.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] false() vs 'false' in 'when' statements
Thread-Index: AdQudRPPuaY7IZR/R5mIg6eZugDJwAApuzeA
Date: Wed, 8 Aug 2018 13:36:45 +0000
Message-ID: <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com> <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com>
In-Reply-To: <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4368; 6:6mq/ViNFOOYc6mIMuEgbpO4jzbCDMSX6STRGYP81JIF8TagckyREUZUhI589BJOO7DpYBjq/Uwl9PclMUoq03G7Tx/aZ8ROSjYiETZw7qwYtgvtApED8dU3rklVdHPNm6pDAyFNT0u4tvniSwbW6fysaiivyi4sev7cxN8phmK/ogGTh8GL2EpB9OYMCTV7Ov4Ng6PLhkiQNCOocCgLqg+gPPJyRToBYM3CG72yzZGhKSQ8q9nKI0xn9YVvpe0yc2ycsiSuicRs7o0TU9ZgPvB1utUdbxZQVzIp61H+hil4flSArtNEnDkLt8la/XTOli/EVF5gJI9ZR9zbtcUJ+CI5lWUQGUk8/C4DqiXC7+w2n7quOnJas94mf1CONibtiTULrH6QxwrMfaxG5/s8cGkuC5vwujJtc9z9BFEhedwbiv0SKwn6xnM5WtN+fTbhbTOSFtajg5TGwdNH/UnbnTw==; 5:ovQ9QXXTimugOi8uJ9FK8V88wkh3Zg9zYrt+X6mCQFhXmYqVKIyA2B2mPaEQDskj9wLFFWrdXG08397nzd6weh6Ez2aTW6IAmbz1Th5qI06bJ3JHfScL2KAuBUg31QQCFZyAaMMtAEuhTN7HMMGWrJoNKBnNgvwpgSk6GeF+LT4=; 7:lA1FU8zFZeTcIYb0vdC6DYAFL3jzGS/emJ5d5npM3Bv2nh0FJD3F8vZzv9tcD9BsOrqe7VYyRSJI/AMX+bucXTKN9R7Wfi1LsH/meql78UD9l1qq4rU+Q4HNLq5Al9JmYdGXpCzY4bqGVNxcskJmPoRbpCgModzAL7ZqnIPqIogTxjeeyc61laow5kMEQlj8Wj3fsP+xpO5VfxbqYxoyPjmvR6t4EC8/BE0c8VkYwo7qpziPqGlLo/IRf13vKl8i
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 5c083af0-b9d0-4f74-d48b-08d5fd33fbbb
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB4368; 
x-ms-traffictypediagnostic: VI1PR07MB4368:
x-microsoft-antispam-prvs: <VI1PR07MB43682F8BAE2EBE6EAE32D1989B260@VI1PR07MB4368.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(82608151540597)(97927398514766)(195916259791689)(788757137089)(109105607167333);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB4368; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4368; 
x-forefront-prvs: 07584EDBCD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(396003)(39860400002)(136003)(366004)(13464003)(53754006)(199004)(189003)(74316002)(229853002)(305945005)(8676002)(7736002)(966005)(99286004)(478600001)(486006)(81166006)(81156014)(8936002)(7696005)(14454004)(76176011)(476003)(106356001)(3846002)(33656002)(105586002)(6116002)(110136005)(6436002)(316002)(2906002)(68736007)(53936002)(9686003)(5660300001)(6246003)(5250100002)(66066001)(2501003)(256004)(25786009)(446003)(53546011)(55016002)(102836004)(2900100001)(6506007)(11346002)(186003)(86362001)(6306002)(26005)(97736004)(6346003); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4368; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-microsoft-antispam-message-info: egFOLVtVbApU9k4bh0tFvKIymDG0r4rP0nICpiZ3gRa5MF5E/e7FERokM/NJnFRomeY4y75ltPmuB3br7WWKk6XvVbacbZ9RvsPBkZTq5D+m9Wuq2c26rpMkAjXWBhiqdVMSge2krFMlRB+4Li16ffW7spDtHsBI2/H/BXBDBsEagsnaeoOCTeqE1SLFxKxAlzIvJT21JlpvjQ7vH+ox9ezK9dPJX3g1RKBQYlsKLaRBDnKaitgGINYXgqOwDz1yCAL5CTF1XMwewxcYmEEZLOYyocDmdCPJqd6pFJqJA8vIHiQuRaVoSox4PHgdLu3KB1Fm9vK4NeNfYRPQSVAKuHMfftCfRmDTaXw/5SrLQ4d2JYJ4H/VvwN/5CgnQr+SHCB9haHZV7W6WOlvg81ETcw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5c083af0-b9d0-4f74-d48b-08d5fd33fbbb
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Aug 2018 13:36:45.0983 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4368
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/InXSHaaWlT41e6RgSMXu4yvAJUY>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 13:36:51 -0000

Thanks William.
Please see below.
Regards,
Jason

> -----Original Message-----
> From: Ivory, William <william.ivory@intl.att.com>
> Sent: Wednesday, August 8, 2018 3:27 AM
> To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> netmod@ietf.org
> Subject: Re: [netmod] false() vs 'false' in 'when' statements
>=20
> On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> Hi all,
>=20
> When comparing the value of a boolean leaf in a 'when' statement (or a 'm=
ust'
> statement), is an equality comparison to 'true' or 'false' the same as a =
check
> against true() or false() ?
>=20
> For example:
>=20
> leaf a {
>     type boolean;
> }
> leaf b {
>     type uint32;
>     when ".../a =3D 'true'";
> }
> leaf c {
>     type uint32;
>     when ".../a =3D 'false'";
> }
> (note that neither b nor c can be configured if leaf a isn't explicitly c=
onfigured
> with a value since there is no default)
>=20
> If I replace the two 'when' statements above with the following instead, =
is the
> behavior the same ?
>     ...
>     when ".../a =3D true()";
>     ...
>     when ".../a =3D false()";
>     ...
>=20
> Or does "../a =3D true()" behave as an existence check on leaf a and woul=
d be
> enabled whether a is configured as true or false ?
>=20
> Regards,
> Jason
>=20
>=20
>=20
> See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
>=20
> (a) "../a =3D 'true'"
>=20
> Compares 'string-value' (same as value of node if a leaf, rather more
> interesting if a list / container!) of each node in nodeset generated by =
'../a' and
> if any node in the nodeset matches 'true', expression is true.

[>>JTS: ] In my specific example, leaf a is a single Boolean leaf.  In that=
 case, are these equivalent ?
    when ".../a =3D 'true'";
    when ".../a =3D true()";
and are these also equivalent ?
    when ".../a =3D 'false'";
    when ".../a =3D false()";
(sorry if I'm being dense here, but I'm not 100% positive if I'm interpreti=
ng your explanations correctly and getting the right conclusion.  I've neve=
r seen must or when statements that use =3D false() or =3D true()).

[>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that you m=
ention above) for a Boolean leaf ?
'a' is a single Boolean leaf so the nodeset is that single leaf and the val=
ue is 'true' or 'false'.

>=20
> (b) "../a =3D true()"
>=20
> Similar to above but after getting the string-value, this is converted to=
 a
> boolean before comparing with the boolean true.

[>>JTS: ] I'm a bit confused here.  Are you saying that the string-value of=
 leaf a is converted to a Boolean ?
Do the string-values of a convert to something that is equal to true() or f=
alse() ?

>=20
> (c) '../a'
>=20
> True if the nodeset generated by this expression is not empty.
>=20
> ---
>=20
> Caveats alluded to above are that if '../a' matches multiple nodes, then =
only
> one of these nodes needs to pass the test for the test to be true.  Separ=
ately, if
> any of the nodes are not leaves, the 'string-value' is a concatenated str=
ing of
> the values of the node's child / grandchild leaves.
>=20
> Hope that helps.  You wouldn't believe the number of unit tests I have to=
 make
> sure we get this logic right!  Using '!=3D' when comparing a nodeset with=
 >1 node
> with other values is very likely not to give the answer you expect (-:
>=20
> Regards,
>=20
> William
>=20


From nobody Wed Aug  8 06:45:50 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 028CA12F1A2 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:45:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i6u38MHDScYO for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:45:46 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03on0721.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0a::721]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4B3A1252B7 for <netmod@ietf.org>; Wed,  8 Aug 2018 06:45:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R+t/1Xb00uUT/ZQc/C5muxyqPi4knS5/Y4DSSxIIkpQ=; b=okh0DkfaY+5qCpkUnk36EXPe94UiBzN+NzZAvW0K24ovEMpfVV+bqtdzDumh7jqE5VMN/aKVOKHbRbVvqhtFMoGB7uFwvJ5tQSKOOn+SzSYpuX85K/I0oy541gYNrS6JsZMDJLAzTQQnTg6vPk5skI0SWLwqs8nSW2ogPQaZiXg=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB1248.eurprd07.prod.outlook.com (10.164.92.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.15; Wed, 8 Aug 2018 13:45:42 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1038.013; Wed, 8 Aug 2018 13:45:42 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "Ivory, William" <william.ivory@intl.att.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] false() vs 'false' in 'when' statements
Thread-Index: AdQudRPPuaY7IZR/R5mIg6eZugDJwAApuzeAAAB4NKA=
Date: Wed, 8 Aug 2018 13:45:42 +0000
Message-ID: <VI1PR07MB3981F1D3F78AAC3D953CC0069B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com> <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com> <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB1248; 6:2aepx3dM2BSmuAgYl9qu9lBfpLqmyKu47XXC0CPBx26Dd2QXrmdVPl36mZv/ggTPNYjFF1Ntgo4Q1ZDtI2GzJZZRrVWAaq3FFxQ1ZX/B6kOz5xPX1mCVpviDm0u3/FY1Qdlr6e9SwfZll/nVXk6iqVt39fZ/uPeWhpTGstZNBX4i1vjQC+Dubos9EiL9akv7FjtLArltrrM/p3w5nLCAWx711ws6fdLDOi5hdlAr4D395IeOPd4qYApTwPVfXeMYEfFJRqDVw1REPDUoYftAInrCYpQq0KP299Qwx/Q16LqfNWi3GUtI/VVKJ4UfodsW7hhmx/FujJ91/C9Qi/9OA6iGBqZTVCFFL4cUKDJNvkmWWm5X1RY8zR03XDafMUQx00tTGwNSDWHHBmHqK2ge88xvB5QLm2MB5BKgGYEpEXpNG0/vjCS6ODpp8/j1dNnjp3byNUolV1/VpfPw5NvzyA==; 5:kZlkW30K2KTwsCAeiuKS40wjsuiXURZv9t9JQmTHj4G34Z0VUJ5a/mynIjMbDsM/gl6Tggfcs6DWl9K1x6i4ouk8FdINjuLF/xOjRNO0RDptB8vrUf8ou3UoUd3Fr5AKhebypphg759rMv3+ma+gDLUzz0mQVW1+/BLZHwblJaM=; 7:GjvjbPwevU78qNBjKwNLHYnvNk9gZ+tjbgTjk3nNdlRWFDnlD1CwipVKwFk4BeyYC1Ns2EvKFvuWkhM9Xb/np7ToWy2NHNV1qhaNP1z6TAyCtfLPAtT53XJAlk+0lNAD5fgCq7EbGqK8O0n8stg7MNCQGBULtWoeiJlG6E5Zpz7nZ7p4e4wqmBQijSGorsAhxGtwKLVw60tgygDsyBVq7HkKtpM3t4Qay+OGiLs3kwD+qBK+RFLDovKo/yoEYKP1
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: ac534c40-cdbe-4693-1e02-08d5fd353c36
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB1248; 
x-ms-traffictypediagnostic: VI1PR07MB1248:
x-microsoft-antispam-prvs: <VI1PR07MB12482035A9BED811DEAD1E9E9B260@VI1PR07MB1248.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(82608151540597)(97927398514766)(195916259791689)(788757137089)(109105607167333);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB1248; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB1248; 
x-forefront-prvs: 07584EDBCD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(366004)(39860400002)(396003)(136003)(53754006)(13464003)(199004)(189003)(99286004)(97736004)(74316002)(256004)(5250100002)(33656002)(229853002)(2501003)(8936002)(2906002)(25786009)(86362001)(3846002)(5660300001)(6116002)(305945005)(6246003)(55016002)(81156014)(9686003)(2940100002)(76176011)(966005)(81166006)(105586002)(476003)(486006)(446003)(186003)(6306002)(68736007)(106356001)(14454004)(11346002)(53936002)(7736002)(6436002)(26005)(316002)(53546011)(66066001)(110136005)(6506007)(102836004)(7696005)(2900100001)(478600001)(8676002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB1248; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: CCmNtrtpvhvze8Bn+8GJRz3z/LPmo/oM+IVJLzPdCvgficO4pgR22zXHqS53FYCm5yNNLUnS7TcZh4IOiWhYtZRvc63UGF+Cbrt8UGs4fM7qm/8Z7htHxsuDWPWpETIn5IfGuJjtvjM/taYH3AV75aHzRJGDr8qjh7QzU7qwDH/YeDUbhET9gUrqf/C/0W6lZox75stj0fFQjSCLO/OHoxsxMtJvXkl5rcCRc6+CnA42jjfd8ZQXvsjCtbpeFBiH1sUGiywxs69LoOmYkEwPccGEki27WSPTI4PM5UhTSBOW/MAXe/ghrEes9PDmNia/5mLMdmFd+Tv+FVAPwtRnVX8kF5VkLdI+x45G+q6TW5ob+VtSnyicZKbkQZW54uAW5Cfvb0rOcCHgCo2rhF++kw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ac534c40-cdbe-4693-1e02-08d5fd353c36
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Aug 2018 13:45:42.7426 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB1248
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/vLYWz_WanAcxRnnn5kt-J6Dwph0>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 13:45:48 -0000

What I'm also a little worried about is whether
    when "../a =3D true()"=20
is actually checking the *existence* of leaf a. =20

In other words, could that expression be evaluated as enabling the when whe=
ther leaf a is set to 'true' or if it is set to 'false' ?  In either case i=
t has a value and exists.

Jason

> -----Original Message-----
> From: Sterne, Jason (Nokia - CA/Ottawa)
> Sent: Wednesday, August 8, 2018 9:37 AM
> To: 'Ivory, William' <william.ivory@intl.att.com>; netmod@ietf.org
> Subject: RE: [netmod] false() vs 'false' in 'when' statements
>=20
> Thanks William.
> Please see below.
> Regards,
> Jason
>=20
> > -----Original Message-----
> > From: Ivory, William <william.ivory@intl.att.com>
> > Sent: Wednesday, August 8, 2018 3:27 AM
> > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > netmod@ietf.org
> > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> >
> > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > Hi all,
> >
> > When comparing the value of a boolean leaf in a 'when' statement (or a =
'must'
> > statement), is an equality comparison to 'true' or 'false' the same as =
a check
> > against true() or false() ?
> >
> > For example:
> >
> > leaf a {
> >     type boolean;
> > }
> > leaf b {
> >     type uint32;
> >     when ".../a =3D 'true'";
> > }
> > leaf c {
> >     type uint32;
> >     when ".../a =3D 'false'";
> > }
> > (note that neither b nor c can be configured if leaf a isn't explicitly=
 configured
> > with a value since there is no default)
> >
> > If I replace the two 'when' statements above with the following instead=
, is the
> > behavior the same ?
> >     ...
> >     when ".../a =3D true()";
> >     ...
> >     when ".../a =3D false()";
> >     ...
> >
> > Or does "../a =3D true()" behave as an existence check on leaf a and wo=
uld be
> > enabled whether a is configured as true or false ?
> >
> > Regards,
> > Jason
> >
> >
> >
> > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> >
> > (a) "../a =3D 'true'"
> >
> > Compares 'string-value' (same as value of node if a leaf, rather more
> > interesting if a list / container!) of each node in nodeset generated b=
y '../a'
> and
> > if any node in the nodeset matches 'true', expression is true.
>=20
> [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.  In th=
at case, are
> these equivalent ?
>     when ".../a =3D 'true'";
>     when ".../a =3D true()";
> and are these also equivalent ?
>     when ".../a =3D 'false'";
>     when ".../a =3D false()";
> (sorry if I'm being dense here, but I'm not 100% positive if I'm interpre=
ting your
> explanations correctly and getting the right conclusion.  I've never seen=
 must or
> when statements that use =3D false() or =3D true()).
>=20
> [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that you=
 mention
> above) for a Boolean leaf ?
> 'a' is a single Boolean leaf so the nodeset is that single leaf and the v=
alue is
> 'true' or 'false'.
>=20
> >
> > (b) "../a =3D true()"
> >
> > Similar to above but after getting the string-value, this is converted =
to a
> > boolean before comparing with the boolean true.
>=20
> [>>JTS: ] I'm a bit confused here.  Are you saying that the string-value =
of leaf a is
> converted to a Boolean ?
> Do the string-values of a convert to something that is equal to true() or=
 false() ?
>=20
> >
> > (c) '../a'
> >
> > True if the nodeset generated by this expression is not empty.
> >
> > ---
> >
> > Caveats alluded to above are that if '../a' matches multiple nodes, the=
n only
> > one of these nodes needs to pass the test for the test to be true.  Sep=
arately,
> if
> > any of the nodes are not leaves, the 'string-value' is a concatenated s=
tring of
> > the values of the node's child / grandchild leaves.
> >
> > Hope that helps.  You wouldn't believe the number of unit tests I have =
to
> make
> > sure we get this logic right!  Using '!=3D' when comparing a nodeset wi=
th >1
> node
> > with other values is very likely not to give the answer you expect (-:
> >
> > Regards,
> >
> > William
> >


From nobody Wed Aug  8 06:51:02 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA1A8130DC0 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:51:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tVx9mM2BgyGL for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 06:50:58 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id A37B2130DBE for <netmod@ietf.org>; Wed,  8 Aug 2018 06:50:58 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id F25D01AE018A; Wed,  8 Aug 2018 15:50:56 +0200 (CEST)
Date: Wed, 08 Aug 2018 15:50:48 +0200 (CEST)
Message-Id: <20180808.155048.1116801606990172501.mbj@tail-f.com>
To: jason.sterne@nokia.com
Cc: william.ivory@intl.att.com, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com> <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com> <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/6dKkQbbNzfJmkMxJec1s51K-H1k>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 13:51:01 -0000

Hi,

"Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> Thanks William.
> Please see below.
> Regards,
> Jason
> 
> > -----Original Message-----
> > From: Ivory, William <william.ivory@intl.att.com>
> > Sent: Wednesday, August 8, 2018 3:27 AM
> > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > netmod@ietf.org
> > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> > 
> > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > Hi all,
> > 
> > When comparing the value of a boolean leaf in a 'when' statement (or a
> > 'must'
> > statement), is an equality comparison to 'true' or 'false' the same as
> > a check
> > against true() or false() ?
> > 
> > For example:
> > 
> > leaf a {
> >     type boolean;
> > }
> > leaf b {
> >     type uint32;
> >     when ".../a = 'true'";
> > }
> > leaf c {
> >     type uint32;
> >     when ".../a = 'false'";
> > }
> > (note that neither b nor c can be configured if leaf a isn't
> > explicitly configured
> > with a value since there is no default)
> > 
> > If I replace the two 'when' statements above with the following
> > instead, is the
> > behavior the same ?
> >     ...
> >     when ".../a = true()";
> >     ...
> >     when ".../a = false()";
> >     ...
> > 
> > Or does "../a = true()" behave as an existence check on leaf a and
> > would be
> > enabled whether a is configured as true or false ?
> > 
> > Regards,
> > Jason
> > 
> > 
> > 
> > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > 
> > (a) "../a = 'true'"
> > 
> > Compares 'string-value' (same as value of node if a leaf, rather more
> > interesting if a list / container!) of each node in nodeset generated
> > by '../a' and
> > if any node in the nodeset matches 'true', expression is true.
> 
> [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.  In
> that case, are these equivalent ?
>     when ".../a = 'true'";
>     when ".../a = true()";

No...

> and are these also equivalent ?
>     when ".../a = 'false'";
>     when ".../a = false()";

... and no.

What you probably want is ".../a = 'true'" (or 'false').

The expression:

    ".../a = true()";

will first take the string value of ".../a", which e.g. is "false".
This string value is then converted to a boolean, resulting in the
boolean value True (b/c the string is non-empty).

This means that if "a" is set at all (to true or false), the
expression ".../a = true()" returns true.  The expression ".../a =
false()" will only return true if "a" is unset.

> (sorry if I'm being dense here, but I'm not 100% positive if I'm
> interpreting your explanations correctly and getting the right
> conclusion.  I've never seen must or when statements that use =
> false() or = true()).
> 
> [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that
> you mention above) for a Boolean leaf ?

Yes, according to 9.5.1 in RFC 7950.

> 'a' is a single Boolean leaf so the nodeset is that single leaf and
> the value is 'true' or 'false'.
> 
> > 
> > (b) "../a = true()"
> > 
> > Similar to above but after getting the string-value, this is converted
> > to a
> > boolean before comparing with the boolean true.
> 
> [>>JTS: ] I'm a bit confused here.  Are you saying that the
> string-value of leaf a is converted to a Boolean ?
> Do the string-values of a convert to something that is equal to true()
> or false() ?

See above.


/martin


> 
> > 
> > (c) '../a'
> > 
> > True if the nodeset generated by this expression is not empty.
> > 
> > ---
> > 
> > Caveats alluded to above are that if '../a' matches multiple nodes,
> > then only
> > one of these nodes needs to pass the test for the test to be true.
> > Separately, if
> > any of the nodes are not leaves, the 'string-value' is a concatenated
> > string of
> > the values of the node's child / grandchild leaves.
> > 
> > Hope that helps.  You wouldn't believe the number of unit tests I have
> > to make
> > sure we get this logic right!  Using '!=' when comparing a nodeset
> > with >1 node
> > with other values is very likely not to give the answer you expect (-:
> > 
> > Regards,
> > 
> > William
> > 
> 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
> 


From nobody Wed Aug  8 08:13:47 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06649130E13 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 08:13:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vd8SeZKy_4Jw for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 08:13:36 -0700 (PDT)
Received: from mail-lj1-x244.google.com (mail-lj1-x244.google.com [IPv6:2a00:1450:4864:20::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CBE01292AD for <netmod@ietf.org>; Wed,  8 Aug 2018 08:13:35 -0700 (PDT)
Received: by mail-lj1-x244.google.com with SMTP id j19-v6so2004403ljc.7 for <netmod@ietf.org>; Wed, 08 Aug 2018 08:13:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=B2O9XzwppyV8Pg6r6bWKodxLOJ3Trbb7Rg7whwIgm0Q=; b=ewJI6B2YJftkP6NZTxX5oMKkX+4UfuQgyGTsvEOcOUGr7+Jjk3YupooeXj4TtIBrmD mDRZJm/6XUJ85AUOYRWZ2StHVZ/ms/yhG9mRnPVIUzLyXOTeYiYFF9aZV3ccXuIlEKZG 6Pl1iCp/zJkt75Cm9TZsxYkVHSou/GsKJYv0PW5BkjTr9tcOqUx5J6R9z5PofmRL4ePN gdnEpQv54iJ1q1HhOneznW98iOiz053FpmCNunpF5xU2350Yidq9HdRv7GAIfY+xEHi+ ZKKoUzltrnZR1L3VJF9ijRMrrM4nXbeDmFpQl957/KV0Hs5qQKflw1DnBlfeOBe4Pcpw KSfw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=B2O9XzwppyV8Pg6r6bWKodxLOJ3Trbb7Rg7whwIgm0Q=; b=NntVnKe3vbr7FY/NjHJ8sEFx7ZVroBbRO5TQrUaaRZJ16XYVOoNiKMeSK20Z2p6C6U zIMep+TQI0KS9+NzJ+Cw3txOyu/wCE9Ib2s08XhrdTf+SKLS4KR0ACBWSrteg51YKm5G goy2N5cQGFF2WOnVnrKuKk3AqzoIxI0mGwgNyjzNCX95ENhf6izgrXgkmSZ5K/vaj4j+ ksk29DKcl3D/mAzdUCt39FcRd9IB2M9+OzCUE+gm3sQ0bzXTPit9h+caGMNDgu7QW+rg Z4J95zz/j7AoozrbzDH/I3tSVu4TLCLcDvs2/HPmw/2LF/O2w/C+DagB/qMzhqQs5jng Cq+Q==
X-Gm-Message-State: AOUpUlHrSSgQv+ZrFZQLDa4vO2lNfYuDYPQcg3MptC5YJcSSZTi8JsKy RX6c6U6KwuczaGl/WGQJIMGyUMD+8Op+3Qki2BkOGQ==
X-Google-Smtp-Source: AA+uWPwtXcybFID6WS9pI8/yYeiPkJlSaICE60CzZvO9DRQLms7fxDRtQrv9/DmSzbx/ZRdd3TZ7kW5r2i0TIb98e50=
X-Received: by 2002:a2e:9f4d:: with SMTP id v13-v6mr2313105ljk.42.1533741213753;  Wed, 08 Aug 2018 08:13:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a19:aa46:0:0:0:0:0 with HTTP; Wed, 8 Aug 2018 08:13:32 -0700 (PDT)
In-Reply-To: <20180808.155048.1116801606990172501.mbj@tail-f.com>
References: <VI1PR07MB3981A0DC1F7069AFC5BE72AD9B270@VI1PR07MB3981.eurprd07.prod.outlook.com> <E3378E0605547F4E854DEE0CB1116AB03A8BA8@gbcdcmbx03.intl.att.com> <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com> <20180808.155048.1116801606990172501.mbj@tail-f.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Wed, 8 Aug 2018 08:13:32 -0700
Message-ID: <CABCOCHTUEedds_164G7cF=T6=9-Jd4HJG=bc7JyBGTpKf0-4Mg@mail.gmail.com>
To: Martin Bjorklund <mbj@tail-f.com>
Cc: "Sterne, Jason (Nokia - CA)" <jason.sterne@nokia.com>, NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000393bf10572edf4af"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wBDKdh6dzc008fwcU4UNitYO1zY>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 15:13:44 -0000

--000000000000393bf10572edf4af
Content-Type: text/plain; charset="UTF-8"

On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:

> Hi,
>
> "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > Thanks William.
> > Please see below.
> > Regards,
> > Jason
> >
> > > -----Original Message-----
> > > From: Ivory, William <william.ivory@intl.att.com>
> > > Sent: Wednesday, August 8, 2018 3:27 AM
> > > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > > netmod@ietf.org
> > > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> > >
> > > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > > Hi all,
> > >
> > > When comparing the value of a boolean leaf in a 'when' statement (or a
> > > 'must'
> > > statement), is an equality comparison to 'true' or 'false' the same as
> > > a check
> > > against true() or false() ?
> > >
> > > For example:
> > >
> > > leaf a {
> > >     type boolean;
> > > }
> > > leaf b {
> > >     type uint32;
> > >     when ".../a = 'true'";
> > > }
> > > leaf c {
> > >     type uint32;
> > >     when ".../a = 'false'";
> > > }
> > > (note that neither b nor c can be configured if leaf a isn't
> > > explicitly configured
> > > with a value since there is no default)
> > >
> > > If I replace the two 'when' statements above with the following
> > > instead, is the
> > > behavior the same ?
> > >     ...
> > >     when ".../a = true()";
> > >     ...
> > >     when ".../a = false()";
> > >     ...
> > >
> > > Or does "../a = true()" behave as an existence check on leaf a and
> > > would be
> > > enabled whether a is configured as true or false ?
> > >
> > > Regards,
> > > Jason
> > >
> > >
> > >
> > > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > >
> > > (a) "../a = 'true'"
> > >
> > > Compares 'string-value' (same as value of node if a leaf, rather more
> > > interesting if a list / container!) of each node in nodeset generated
> > > by '../a' and
> > > if any node in the nodeset matches 'true', expression is true.
> >
> > [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.  In
> > that case, are these equivalent ?
> >     when ".../a = 'true'";
> >     when ".../a = true()";
>
> No...
>
> > and are these also equivalent ?
> >     when ".../a = 'false'";
> >     when ".../a = false()";
>
> .... and no.
>
> What you probably want is ".../a = 'true'" (or 'false').
>
> The expression:
>
>     ".../a = true()";
>
> will first take the string value of ".../a", which e.g. is "false".
> This string value is then converted to a boolean, resulting in the
> boolean value True (b/c the string is non-empty).
>
> This means that if "a" is set at all (to true or false), the
> expression ".../a = true()" returns true.  The expression ".../a =
> false()" will only return true if "a" is unset.
>
>

I suggest reading the XPath definition of boolean comparisons:
https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans

It is a bit complicated, but generally, a node-set is converted
to a boolean (==false for empty, ==true for not empty) when
compared to a boolean for equality/inequality.

 false is a boolean
 'false' is a string
 false() is a function that return a boolean


Andy


> (sorry if I'm being dense here, but I'm not 100% positive if I'm
> > interpreting your explanations correctly and getting the right
> > conclusion.  I've never seen must or when statements that use =
> > false() or = true()).
> >
> > [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that
> > you mention above) for a Boolean leaf ?
>
> Yes, according to 9.5.1 in RFC 7950.
>
> > 'a' is a single Boolean leaf so the nodeset is that single leaf and
> > the value is 'true' or 'false'.
> >
> > >
> > > (b) "../a = true()"
> > >
> > > Similar to above but after getting the string-value, this is converted
> > > to a
> > > boolean before comparing with the boolean true.
> >
> > [>>JTS: ] I'm a bit confused here.  Are you saying that the
> > string-value of leaf a is converted to a Boolean ?
> > Do the string-values of a convert to something that is equal to true()
> > or false() ?
>
> See above.
>
>
> /martin
>
>
> >
> > >
> > > (c) '../a'
> > >
> > > True if the nodeset generated by this expression is not empty.
> > >
> > > ---
> > >
> > > Caveats alluded to above are that if '../a' matches multiple nodes,
> > > then only
> > > one of these nodes needs to pass the test for the test to be true.
> > > Separately, if
> > > any of the nodes are not leaves, the 'string-value' is a concatenated
> > > string of
> > > the values of the node's child / grandchild leaves.
> > >
> > > Hope that helps.  You wouldn't believe the number of unit tests I have
> > > to make
> > > sure we get this logic right!  Using '!=' when comparing a nodeset
> > > with >1 node
> > > with other values is very likely not to give the answer you expect (-:
> > >
> > > Regards,
> > >
> > > William
> > >
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
> >
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--000000000000393bf10572edf4af
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund <span dir=3D"ltr">&lt;=
<a href=3D"mailto:mbj@tail-f.com" target=3D"_blank">mbj@tail-f.com</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
&quot;Sterne, Jason (Nokia - CA/Ottawa)&quot; &lt;<a href=3D"mailto:jason.s=
terne@nokia.com">jason.sterne@nokia.com</a>&gt; wrote:<br>
&gt; Thanks William.<br>
&gt; Please see below.<br>
&gt; Regards,<br>
&gt; Jason<br>
&gt; <br>
&gt; &gt; -----Original Message-----<br>
&gt; &gt; From: Ivory, William &lt;<a href=3D"mailto:william.ivory@intl.att=
.com">william.ivory@intl.att.com</a>&gt;<br>
&gt; &gt; Sent: Wednesday, August 8, 2018 3:27 AM<br>
&gt; &gt; To: Sterne, Jason (Nokia - CA/Ottawa) &lt;<a href=3D"mailto:jason=
.sterne@nokia.com">jason.sterne@nokia.com</a>&gt;;<br>
&gt; &gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
&gt; &gt; Subject: Re: [netmod] false() vs &#39;false&#39; in &#39;when&#39=
; statements<br>
&gt; &gt; <br>
&gt; &gt; On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:<br>
&gt; &gt; Hi all,<br>
&gt; &gt; <br>
&gt; &gt; When comparing the value of a boolean leaf in a &#39;when&#39; st=
atement (or a<br>
&gt; &gt; &#39;must&#39;<br>
&gt; &gt; statement), is an equality comparison to &#39;true&#39; or &#39;f=
alse&#39; the same as<br>
&gt; &gt; a check<br>
&gt; &gt; against true() or false() ?<br>
&gt; &gt; <br>
&gt; &gt; For example:<br>
&gt; &gt; <br>
&gt; &gt; leaf a {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0type boolean;<br>
&gt; &gt; }<br>
&gt; &gt; leaf b {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0type uint32;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;true&#39;&quot;;<br>
&gt; &gt; }<br>
&gt; &gt; leaf c {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0type uint32;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;false&#39;&quot;;<br=
>
&gt; &gt; }<br>
&gt; &gt; (note that neither b nor c can be configured if leaf a isn&#39;t<=
br>
&gt; &gt; explicitly configured<br>
&gt; &gt; with a value since there is no default)<br>
&gt; &gt; <br>
&gt; &gt; If I replace the two &#39;when&#39; statements above with the fol=
lowing<br>
&gt; &gt; instead, is the<br>
&gt; &gt; behavior the same ?<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D true()&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D false()&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt; <br>
&gt; &gt; Or does &quot;../a =3D true()&quot; behave as an existence check =
on leaf a and<br>
&gt; &gt; would be<br>
&gt; &gt; enabled whether a is configured as true or false ?<br>
&gt; &gt; <br>
&gt; &gt; Regards,<br>
&gt; &gt; Jason<br>
&gt; &gt; <br>
&gt; &gt; <br>
&gt; &gt; <br>
&gt; &gt; See <a href=3D"https://www.w3.org/TR/1999/REC-xpath-19991116/#boo=
leans" rel=3D"noreferrer" target=3D"_blank">https://www.w3.org/TR/1999/<wbr=
>REC-xpath-19991116/#booleans</a><br>
&gt; &gt; <br>
&gt; &gt; (a) &quot;../a =3D &#39;true&#39;&quot;<br>
&gt; &gt; <br>
&gt; &gt; Compares &#39;string-value&#39; (same as value of node if a leaf,=
 rather more<br>
&gt; &gt; interesting if a list / container!) of each node in nodeset gener=
ated<br>
&gt; &gt; by &#39;../a&#39; and<br>
&gt; &gt; if any node in the nodeset matches &#39;true&#39;, expression is =
true.<br>
&gt; <br>
&gt; [&gt;&gt;JTS: ] In my specific example, leaf a is a single Boolean lea=
f.=C2=A0 In<br>
&gt; that case, are these equivalent ?<br>
&gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;true&#39;&quot;;<br>
&gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D true()&quot;;<br>
<br>
No...<br>
<br>
&gt; and are these also equivalent ?<br>
&gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;false&#39;&quot;;<br>
&gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D false()&quot;;<br>
<br>
.... and no.<br>
<br>
What you probably want is &quot;.../a =3D &#39;true&#39;&quot; (or &#39;fal=
se&#39;).<br>
<br>
The expression:<br>
<br>
=C2=A0 =C2=A0 &quot;.../a =3D true()&quot;;<br>
<br>
will first take the string value of &quot;.../a&quot;, which e.g. is &quot;=
false&quot;.<br>
This string value is then converted to a boolean, resulting in the<br>
boolean value True (b/c the string is non-empty).<br>
<br>
This means that if &quot;a&quot; is set at all (to true or false), the<br>
expression &quot;.../a =3D true()&quot; returns true.=C2=A0 The expression =
&quot;.../a =3D<br>
false()&quot; will only return true if &quot;a&quot; is unset.<br>
<br></blockquote><div><br></div><div><br></div><div>I suggest reading the X=
Path definition of boolean comparisons:</div><div><a href=3D"https://www.w3=
.org/TR/1999/REC-xpath-19991116/#booleans">https://www.w3.org/TR/1999/REC-x=
path-19991116/#booleans</a></div><div><br></div><div>It is a bit complicate=
d, but generally, a node-set is converted</div><div>to a boolean (=3D=3Dfal=
se for empty, =3D=3Dtrue for not empty) when</div><div>compared to a boolea=
n for equality/inequality.</div><div><br></div><div>=C2=A0false is a boolea=
n</div><div>=C2=A0&#39;false&#39; is a string</div><div>=C2=A0false() is a =
function that return a boolean</div><div><br></div><div><br></div><div>Andy=
</div><div><br></div><div><br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">
&gt; (sorry if I&#39;m being dense here, but I&#39;m not 100% positive if I=
&#39;m<br>
&gt; interpreting your explanations correctly and getting the right<br>
&gt; conclusion.=C2=A0 I&#39;ve never seen must or when statements that use=
 =3D<br>
&gt; false() or =3D true()).<br>
&gt; <br>
&gt; [&gt;&gt;JTS: ] Are the strings &#39;true&#39; and &#39;false&#39; the=
 &quot;string-value&quot; (that<br>
&gt; you mention above) for a Boolean leaf ?<br>
<br>
Yes, according to 9.5.1 in RFC 7950.<br>
<br>
&gt; &#39;a&#39; is a single Boolean leaf so the nodeset is that single lea=
f and<br>
&gt; the value is &#39;true&#39; or &#39;false&#39;.<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; (b) &quot;../a =3D true()&quot;<br>
&gt; &gt; <br>
&gt; &gt; Similar to above but after getting the string-value, this is conv=
erted<br>
&gt; &gt; to a<br>
&gt; &gt; boolean before comparing with the boolean true.<br>
&gt; <br>
&gt; [&gt;&gt;JTS: ] I&#39;m a bit confused here.=C2=A0 Are you saying that=
 the<br>
&gt; string-value of leaf a is converted to a Boolean ?<br>
&gt; Do the string-values of a convert to something that is equal to true()=
<br>
&gt; or false() ?<br>
<br>
See above.<br>
<br>
<br>
/martin<br>
<br>
<br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; (c) &#39;../a&#39;<br>
&gt; &gt; <br>
&gt; &gt; True if the nodeset generated by this expression is not empty.<br=
>
&gt; &gt; <br>
&gt; &gt; ---<br>
&gt; &gt; <br>
&gt; &gt; Caveats alluded to above are that if &#39;../a&#39; matches multi=
ple nodes,<br>
&gt; &gt; then only<br>
&gt; &gt; one of these nodes needs to pass the test for the test to be true=
.<br>
&gt; &gt; Separately, if<br>
&gt; &gt; any of the nodes are not leaves, the &#39;string-value&#39; is a =
concatenated<br>
&gt; &gt; string of<br>
&gt; &gt; the values of the node&#39;s child / grandchild leaves.<br>
&gt; &gt; <br>
&gt; &gt; Hope that helps.=C2=A0 You wouldn&#39;t believe the number of uni=
t tests I have<br>
&gt; &gt; to make<br>
&gt; &gt; sure we get this logic right!=C2=A0 Using &#39;!=3D&#39; when com=
paring a nodeset<br>
&gt; &gt; with &gt;1 node<br>
&gt; &gt; with other values is very likely not to give the answer you expec=
t (-:<br>
&gt; &gt; <br>
&gt; &gt; Regards,<br>
&gt; &gt; <br>
&gt; &gt; William<br>
&gt; &gt; <br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; netmod mailing list<br>
&gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/netmod</=
a><br>
&gt; <br>
<br>
______________________________<wbr>_________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/netmod</a><br=
>
</blockquote></div><br></div></div>

--000000000000393bf10572edf4af--


From nobody Wed Aug  8 08:44:11 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52421130E6B for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 08:44:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YWAEGAjaRM4E for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 08:44:06 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 98BAF130E6D for <netmod@ietf.org>; Wed,  8 Aug 2018 08:44:06 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id 057931AE018A; Wed,  8 Aug 2018 17:44:04 +0200 (CEST)
Date: Wed, 08 Aug 2018 17:44:03 +0200 (CEST)
Message-Id: <20180808.174403.1373198576462216929.mbj@tail-f.com>
To: andy@yumaworks.com
Cc: jason.sterne@nokia.com, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <CABCOCHTUEedds_164G7cF=T6=9-Jd4HJG=bc7JyBGTpKf0-4Mg@mail.gmail.com>
References: <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com> <20180808.155048.1116801606990172501.mbj@tail-f.com> <CABCOCHTUEedds_164G7cF=T6=9-Jd4HJG=bc7JyBGTpKf0-4Mg@mail.gmail.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QjmfVq0vGc6MLbYnNYYyoh-tDQ8>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 15:44:09 -0000

Andy Bierman <andy@yumaworks.com> wrote:
> On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> 
> > Hi,
> >
> > "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > > Thanks William.
> > > Please see below.
> > > Regards,
> > > Jason
> > >
> > > > -----Original Message-----
> > > > From: Ivory, William <william.ivory@intl.att.com>
> > > > Sent: Wednesday, August 8, 2018 3:27 AM
> > > > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > > > netmod@ietf.org
> > > > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> > > >
> > > > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > > > Hi all,
> > > >
> > > > When comparing the value of a boolean leaf in a 'when' statement (or a
> > > > 'must'
> > > > statement), is an equality comparison to 'true' or 'false' the same as
> > > > a check
> > > > against true() or false() ?
> > > >
> > > > For example:
> > > >
> > > > leaf a {
> > > >     type boolean;
> > > > }
> > > > leaf b {
> > > >     type uint32;
> > > >     when ".../a = 'true'";
> > > > }
> > > > leaf c {
> > > >     type uint32;
> > > >     when ".../a = 'false'";
> > > > }
> > > > (note that neither b nor c can be configured if leaf a isn't
> > > > explicitly configured
> > > > with a value since there is no default)
> > > >
> > > > If I replace the two 'when' statements above with the following
> > > > instead, is the
> > > > behavior the same ?
> > > >     ...
> > > >     when ".../a = true()";
> > > >     ...
> > > >     when ".../a = false()";
> > > >     ...
> > > >
> > > > Or does "../a = true()" behave as an existence check on leaf a and
> > > > would be
> > > > enabled whether a is configured as true or false ?
> > > >
> > > > Regards,
> > > > Jason
> > > >
> > > >
> > > >
> > > > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > > >
> > > > (a) "../a = 'true'"
> > > >
> > > > Compares 'string-value' (same as value of node if a leaf, rather more
> > > > interesting if a list / container!) of each node in nodeset generated
> > > > by '../a' and
> > > > if any node in the nodeset matches 'true', expression is true.
> > >
> > > [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.  In
> > > that case, are these equivalent ?
> > >     when ".../a = 'true'";
> > >     when ".../a = true()";
> >
> > No...
> >
> > > and are these also equivalent ?
> > >     when ".../a = 'false'";
> > >     when ".../a = false()";
> >
> > .... and no.
> >
> > What you probably want is ".../a = 'true'" (or 'false').
> >
> > The expression:
> >
> >     ".../a = true()";
> >
> > will first take the string value of ".../a", which e.g. is "false".
> > This string value is then converted to a boolean, resulting in the
> > boolean value True (b/c the string is non-empty).
> >
> > This means that if "a" is set at all (to true or false), the
> > expression ".../a = true()" returns true.  The expression ".../a =
> > false()" will only return true if "a" is unset.
> >
> >
> 
> I suggest reading the XPath definition of boolean comparisons:
> https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> 
> It is a bit complicated, but generally, a node-set is converted
> to a boolean (==false for empty, ==true for not empty) when
> compared to a boolean for equality/inequality.

You're right.   But the result is the same in the example above; i.e.,
"../a = true()" is true iff a exists.


>  false is a boolean

There are no boolean literals in XPath 1.0.  So false would refer to a
node with the name "false".

>  'false' is a string
>  false() is a function that return a boolean


/martin


> 
> 
> Andy
> 
> 
> > (sorry if I'm being dense here, but I'm not 100% positive if I'm
> > > interpreting your explanations correctly and getting the right
> > > conclusion.  I've never seen must or when statements that use =
> > > false() or = true()).
> > >
> > > [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that
> > > you mention above) for a Boolean leaf ?
> >
> > Yes, according to 9.5.1 in RFC 7950.
> >
> > > 'a' is a single Boolean leaf so the nodeset is that single leaf and
> > > the value is 'true' or 'false'.
> > >
> > > >
> > > > (b) "../a = true()"
> > > >
> > > > Similar to above but after getting the string-value, this is converted
> > > > to a
> > > > boolean before comparing with the boolean true.
> > >
> > > [>>JTS: ] I'm a bit confused here.  Are you saying that the
> > > string-value of leaf a is converted to a Boolean ?
> > > Do the string-values of a convert to something that is equal to true()
> > > or false() ?
> >
> > See above.
> >
> >
> > /martin
> >
> >
> > >
> > > >
> > > > (c) '../a'
> > > >
> > > > True if the nodeset generated by this expression is not empty.
> > > >
> > > > ---
> > > >
> > > > Caveats alluded to above are that if '../a' matches multiple nodes,
> > > > then only
> > > > one of these nodes needs to pass the test for the test to be true.
> > > > Separately, if
> > > > any of the nodes are not leaves, the 'string-value' is a concatenated
> > > > string of
> > > > the values of the node's child / grandchild leaves.
> > > >
> > > > Hope that helps.  You wouldn't believe the number of unit tests I have
> > > > to make
> > > > sure we get this logic right!  Using '!=' when comparing a nodeset
> > > > with >1 node
> > > > with other values is very likely not to give the answer you expect (-:
> > > >
> > > > Regards,
> > > >
> > > > William
> > > >
> > >
> > > _______________________________________________
> > > netmod mailing list
> > > netmod@ietf.org
> > > https://www.ietf.org/mailman/listinfo/netmod
> > >
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
> >


From nobody Wed Aug  8 09:03:17 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4086F130E6B for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 09:03:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z87lH_5FH-_7 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 09:03:11 -0700 (PDT)
Received: from mail-lj1-x244.google.com (mail-lj1-x244.google.com [IPv6:2a00:1450:4864:20::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69940130E5A for <netmod@ietf.org>; Wed,  8 Aug 2018 09:03:10 -0700 (PDT)
Received: by mail-lj1-x244.google.com with SMTP id w16-v6so2115434ljh.12 for <netmod@ietf.org>; Wed, 08 Aug 2018 09:03:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=rO0QpwW9agGSCDo/U/r5fBwXUgNIuOe45cg2+IaLwpQ=; b=z6xHEqWML/zGBPUmi/PO6u6sh3Cyekly/vierSqVz5mfAzDAC80ISAIP8N4e0p6ReG s4fzlvhy0j9EF+PVuzziCf9IY8ODl8fG+JOT/YRlReYrMYAdW+nnLYgHrmMR+JpnmX0k /taOlTyl23oeRQSjVkgj4YA8JP3BZGZ4MYnFHjX+mdr5LFYJawg1ZlLv8cVcHwEg3uep fkyIxWnxAWO79of6+IvnWge/Y+pBCssbqS1qf1eC9NMTZQ+Cs8GaNbpeHwBmn4MsqBFf 7Rya8CZ639RNcEeqjWz+08bV5cYYkZyeMknb5yw0GDz7gk7tUdpxBqjii+hzpxLuTPhL 8fLg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=rO0QpwW9agGSCDo/U/r5fBwXUgNIuOe45cg2+IaLwpQ=; b=AtFwwdhcuEItgVFpc7roCnacbc4Fqm8HPut1Hj/gdQcsokqoiUYDPWRt3ewB8wrKmR 7x7g5Ar9GbHn4suOfIqCunA5Jk02mk/HndzzXTEOSdiqu9fH76AFXrcuFXuh5gTjTuKw cfYi/cruYKGGtgr3bjumn3q3SRpVtdqrPFgZ0Mceq3BejhcbQRmkN7rOffP/DUUjJL4v xRX2Lz5YI+CGik83kaXCwyN2Y+/o8h7RPuiHLb18dyEDlASSANnPRsEk/ZfsrRyvumMw EDHXTVBC2wn8ANR8NiPFIFwbA8Dz54m7rSHIuKtwRMrAchXwWuC4aemfSfktyd2znL00 pwLg==
X-Gm-Message-State: AOUpUlEIRNhFDAejoJH5/+AjJIm61i+7edkcLwQEcv5oMCH42YLkz3dC 8mD3DqckBqM2b6dOU8HDDpOkGmUd8/tbTEG+SrtuHoxjX4U=
X-Google-Smtp-Source: AA+uWPyIAUaUzFUuJv+YEdEYfww6vSXLT2VXvNpEZTTzubzuLcRUivC1z+3W/xGf+xLO9bXgV/raMdjge6//TOuel0o=
X-Received: by 2002:a2e:1dc8:: with SMTP id w69-v6mr2662989lje.110.1533743823730;  Wed, 08 Aug 2018 08:57:03 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a19:aa46:0:0:0:0:0 with HTTP; Wed, 8 Aug 2018 08:57:02 -0700 (PDT)
In-Reply-To: <20180808.174403.1373198576462216929.mbj@tail-f.com>
References: <VI1PR07MB39813DB16C1AF2314EBD14EE9B260@VI1PR07MB3981.eurprd07.prod.outlook.com> <20180808.155048.1116801606990172501.mbj@tail-f.com> <CABCOCHTUEedds_164G7cF=T6=9-Jd4HJG=bc7JyBGTpKf0-4Mg@mail.gmail.com> <20180808.174403.1373198576462216929.mbj@tail-f.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Wed, 8 Aug 2018 08:57:02 -0700
Message-ID: <CABCOCHQp3DbryGcGk1+orgoNnv3Aw+ujG-v8JA+DASr++icFsQ@mail.gmail.com>
To: Martin Bjorklund <mbj@tail-f.com>
Cc: "Sterne, Jason (Nokia - CA)" <jason.sterne@nokia.com>, NetMod WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ca4f280572ee8f38"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/2SDYkAZqxDSmw38uVZ-SZ6uARXM>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 16:03:15 -0000

--000000000000ca4f280572ee8f38
Content-Type: text/plain; charset="UTF-8"

On Wed, Aug 8, 2018 at 8:44 AM, Martin Bjorklund <mbj@tail-f.com> wrote:

> Andy Bierman <andy@yumaworks.com> wrote:
> > On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> >
> > > Hi,
> > >
> > > "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > > > Thanks William.
> > > > Please see below.
> > > > Regards,
> > > > Jason
> > > >
> > > > > -----Original Message-----
> > > > > From: Ivory, William <william.ivory@intl.att.com>
> > > > > Sent: Wednesday, August 8, 2018 3:27 AM
> > > > > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > > > > netmod@ietf.org
> > > > > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> > > > >
> > > > > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > > > > Hi all,
> > > > >
> > > > > When comparing the value of a boolean leaf in a 'when' statement
> (or a
> > > > > 'must'
> > > > > statement), is an equality comparison to 'true' or 'false' the
> same as
> > > > > a check
> > > > > against true() or false() ?
> > > > >
> > > > > For example:
> > > > >
> > > > > leaf a {
> > > > >     type boolean;
> > > > > }
> > > > > leaf b {
> > > > >     type uint32;
> > > > >     when ".../a = 'true'";
> > > > > }
> > > > > leaf c {
> > > > >     type uint32;
> > > > >     when ".../a = 'false'";
> > > > > }
> > > > > (note that neither b nor c can be configured if leaf a isn't
> > > > > explicitly configured
> > > > > with a value since there is no default)
> > > > >
> > > > > If I replace the two 'when' statements above with the following
> > > > > instead, is the
> > > > > behavior the same ?
> > > > >     ...
> > > > >     when ".../a = true()";
> > > > >     ...
> > > > >     when ".../a = false()";
> > > > >     ...
> > > > >
> > > > > Or does "../a = true()" behave as an existence check on leaf a and
> > > > > would be
> > > > > enabled whether a is configured as true or false ?
> > > > >
> > > > > Regards,
> > > > > Jason
> > > > >
> > > > >
> > > > >
> > > > > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > > > >
> > > > > (a) "../a = 'true'"
> > > > >
> > > > > Compares 'string-value' (same as value of node if a leaf, rather
> more
> > > > > interesting if a list / container!) of each node in nodeset
> generated
> > > > > by '../a' and
> > > > > if any node in the nodeset matches 'true', expression is true.
> > > >
> > > > [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.
> In
> > > > that case, are these equivalent ?
> > > >     when ".../a = 'true'";
> > > >     when ".../a = true()";
> > >
> > > No...
> > >
> > > > and are these also equivalent ?
> > > >     when ".../a = 'false'";
> > > >     when ".../a = false()";
> > >
> > > .... and no.
> > >
> > > What you probably want is ".../a = 'true'" (or 'false').
> > >
> > > The expression:
> > >
> > >     ".../a = true()";
> > >
> > > will first take the string value of ".../a", which e.g. is "false".
> > > This string value is then converted to a boolean, resulting in the
> > > boolean value True (b/c the string is non-empty).
> > >
> > > This means that if "a" is set at all (to true or false), the
> > > expression ".../a = true()" returns true.  The expression ".../a =
> > > false()" will only return true if "a" is unset.
> > >
> > >
> >
> > I suggest reading the XPath definition of boolean comparisons:
> > https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> >
> > It is a bit complicated, but generally, a node-set is converted
> > to a boolean (==false for empty, ==true for not empty) when
> > compared to a boolean for equality/inequality.
>
> You're right.   But the result is the same in the example above; i.e.,
> "../a = true()" is true iff a exists.
>
>
> >  false is a boolean
>
> There are no boolean literals in XPath 1.0.  So false would refer to a
> node with the name "false".
>


But there is the string() function is 4.2:


   -

   The boolean false value is converted to the string false. The boolean
   true value is converted to the string true.


> >  'false' is a string
> >  false() is a function that return a boolean
>
>
>
compare node-set to boolean will not work correctly. It tests existence.

    ../a = false

If one object to be compared is a node-set and the other is a boolean, then
the comparison will be true if and only if the result of performing the
comparison on the boolean and on the result of converting the node-set to a
boolean using the *boolean
<https://www.w3.org/TR/1999/REC-xpath-19991116/#function-boolean>* function
is true.


compare node-set to string will work as expected

  ../a = 'false'

If one object to be compared is a node-set and the other is a string, then
the comparison will be true if and only if there is a node in the node-set
such that the result of performing the comparison on the string-value
<https://www.w3.org/TR/1999/REC-xpath-19991116/#dt-string-value> of the
node and the other string is true.





> /martin
>
>
>

Andy



> >
> >
> > Andy
> >
> >
> > > (sorry if I'm being dense here, but I'm not 100% positive if I'm
> > > > interpreting your explanations correctly and getting the right
> > > > conclusion.  I've never seen must or when statements that use =
> > > > false() or = true()).
> > > >
> > > > [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that
> > > > you mention above) for a Boolean leaf ?
> > >
> > > Yes, according to 9.5.1 in RFC 7950.
> > >
> > > > 'a' is a single Boolean leaf so the nodeset is that single leaf and
> > > > the value is 'true' or 'false'.
> > > >
> > > > >
> > > > > (b) "../a = true()"
> > > > >
> > > > > Similar to above but after getting the string-value, this is
> converted
> > > > > to a
> > > > > boolean before comparing with the boolean true.
> > > >
> > > > [>>JTS: ] I'm a bit confused here.  Are you saying that the
> > > > string-value of leaf a is converted to a Boolean ?
> > > > Do the string-values of a convert to something that is equal to
> true()
> > > > or false() ?
> > >
> > > See above.
> > >
> > >
> > > /martin
> > >
> > >
> > > >
> > > > >
> > > > > (c) '../a'
> > > > >
> > > > > True if the nodeset generated by this expression is not empty.
> > > > >
> > > > > ---
> > > > >
> > > > > Caveats alluded to above are that if '../a' matches multiple nodes,
> > > > > then only
> > > > > one of these nodes needs to pass the test for the test to be true.
> > > > > Separately, if
> > > > > any of the nodes are not leaves, the 'string-value' is a
> concatenated
> > > > > string of
> > > > > the values of the node's child / grandchild leaves.
> > > > >
> > > > > Hope that helps.  You wouldn't believe the number of unit tests I
> have
> > > > > to make
> > > > > sure we get this logic right!  Using '!=' when comparing a nodeset
> > > > > with >1 node
> > > > > with other values is very likely not to give the answer you expect
> (-:
> > > > >
> > > > > Regards,
> > > > >
> > > > > William
> > > > >
> > > >
> > > > _______________________________________________
> > > > netmod mailing list
> > > > netmod@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/netmod
> > > >
> > >
> > > _______________________________________________
> > > netmod mailing list
> > > netmod@ietf.org
> > > https://www.ietf.org/mailman/listinfo/netmod
> > >
>

--000000000000ca4f280572ee8f38
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Wed, Aug 8, 2018 at 8:44 AM, Martin Bjorklund <span dir=3D"ltr">&lt;=
<a href=3D"mailto:mbj@tail-f.com" target=3D"_blank">mbj@tail-f.com</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Andy Bie=
rman &lt;<a href=3D"mailto:andy@yumaworks.com">andy@yumaworks.com</a>&gt; w=
rote:<br>
&gt; On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund &lt;<a href=3D"mailto=
:mbj@tail-f.com">mbj@tail-f.com</a>&gt; wrote:<br>
&gt; <br>
&gt; &gt; Hi,<br>
&gt; &gt;<br>
&gt; &gt; &quot;Sterne, Jason (Nokia - CA/Ottawa)&quot; &lt;<a href=3D"mail=
to:jason.sterne@nokia.com">jason.sterne@nokia.com</a>&gt; wrote:<br>
&gt; &gt; &gt; Thanks William.<br>
&gt; &gt; &gt; Please see below.<br>
&gt; &gt; &gt; Regards,<br>
&gt; &gt; &gt; Jason<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; -----Original Message-----<br>
&gt; &gt; &gt; &gt; From: Ivory, William &lt;<a href=3D"mailto:william.ivor=
y@intl.att.com">william.ivory@intl.att.com</a>&gt;<br>
&gt; &gt; &gt; &gt; Sent: Wednesday, August 8, 2018 3:27 AM<br>
&gt; &gt; &gt; &gt; To: Sterne, Jason (Nokia - CA/Ottawa) &lt;<a href=3D"ma=
ilto:jason.sterne@nokia.com">jason.sterne@nokia.com</a>&gt;;<br>
&gt; &gt; &gt; &gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><=
br>
&gt; &gt; &gt; &gt; Subject: Re: [netmod] false() vs &#39;false&#39; in &#3=
9;when&#39; statements<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wr=
ote:<br>
&gt; &gt; &gt; &gt; Hi all,<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; When comparing the value of a boolean leaf in a &#39;wh=
en&#39; statement (or a<br>
&gt; &gt; &gt; &gt; &#39;must&#39;<br>
&gt; &gt; &gt; &gt; statement), is an equality comparison to &#39;true&#39;=
 or &#39;false&#39; the same as<br>
&gt; &gt; &gt; &gt; a check<br>
&gt; &gt; &gt; &gt; against true() or false() ?<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; For example:<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; leaf a {<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0type boolean;<br>
&gt; &gt; &gt; &gt; }<br>
&gt; &gt; &gt; &gt; leaf b {<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0type uint32;<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;true&#39;&=
quot;;<br>
&gt; &gt; &gt; &gt; }<br>
&gt; &gt; &gt; &gt; leaf c {<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0type uint32;<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;false&#39;=
&quot;;<br>
&gt; &gt; &gt; &gt; }<br>
&gt; &gt; &gt; &gt; (note that neither b nor c can be configured if leaf a =
isn&#39;t<br>
&gt; &gt; &gt; &gt; explicitly configured<br>
&gt; &gt; &gt; &gt; with a value since there is no default)<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; If I replace the two &#39;when&#39; statements above wi=
th the following<br>
&gt; &gt; &gt; &gt; instead, is the<br>
&gt; &gt; &gt; &gt; behavior the same ?<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D true()&quot;;<b=
r>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D false()&quot;;<=
br>
&gt; &gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0...<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Or does &quot;../a =3D true()&quot; behave as an existe=
nce check on leaf a and<br>
&gt; &gt; &gt; &gt; would be<br>
&gt; &gt; &gt; &gt; enabled whether a is configured as true or false ?<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Regards,<br>
&gt; &gt; &gt; &gt; Jason<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; See <a href=3D"https://www.w3.org/TR/1999/REC-xpath-199=
91116/#booleans" rel=3D"noreferrer" target=3D"_blank">https://www.w3.org/TR=
/1999/<wbr>REC-xpath-19991116/#booleans</a><br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; (a) &quot;../a =3D &#39;true&#39;&quot;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Compares &#39;string-value&#39; (same as value of node =
if a leaf, rather more<br>
&gt; &gt; &gt; &gt; interesting if a list / container!) of each node in nod=
eset generated<br>
&gt; &gt; &gt; &gt; by &#39;../a&#39; and<br>
&gt; &gt; &gt; &gt; if any node in the nodeset matches &#39;true&#39;, expr=
ession is true.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; [&gt;&gt;JTS: ] In my specific example, leaf a is a single B=
oolean leaf.=C2=A0 In<br>
&gt; &gt; &gt; that case, are these equivalent ?<br>
&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;true&#39;&quot;=
;<br>
&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D true()&quot;;<br>
&gt; &gt;<br>
&gt; &gt; No...<br>
&gt; &gt;<br>
&gt; &gt; &gt; and are these also equivalent ?<br>
&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D &#39;false&#39;&quot=
;;<br>
&gt; &gt; &gt;=C2=A0 =C2=A0 =C2=A0when &quot;.../a =3D false()&quot;;<br>
&gt; &gt;<br>
&gt; &gt; .... and no.<br>
&gt; &gt;<br>
&gt; &gt; What you probably want is &quot;.../a =3D &#39;true&#39;&quot; (o=
r &#39;false&#39;).<br>
&gt; &gt;<br>
&gt; &gt; The expression:<br>
&gt; &gt;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0&quot;.../a =3D true()&quot;;<br>
&gt; &gt;<br>
&gt; &gt; will first take the string value of &quot;.../a&quot;, which e.g.=
 is &quot;false&quot;.<br>
&gt; &gt; This string value is then converted to a boolean, resulting in th=
e<br>
&gt; &gt; boolean value True (b/c the string is non-empty).<br>
&gt; &gt;<br>
&gt; &gt; This means that if &quot;a&quot; is set at all (to true or false)=
, the<br>
&gt; &gt; expression &quot;.../a =3D true()&quot; returns true.=C2=A0 The e=
xpression &quot;.../a =3D<br>
&gt; &gt; false()&quot; will only return true if &quot;a&quot; is unset.<br=
>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; <br>
&gt; I suggest reading the XPath definition of boolean comparisons:<br>
&gt; <a href=3D"https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans" re=
l=3D"noreferrer" target=3D"_blank">https://www.w3.org/TR/1999/<wbr>REC-xpat=
h-19991116/#booleans</a><br>
&gt; <br>
&gt; It is a bit complicated, but generally, a node-set is converted<br>
&gt; to a boolean (=3D=3Dfalse for empty, =3D=3Dtrue for not empty) when<br=
>
&gt; compared to a boolean for equality/inequality.<br>
<br>
You&#39;re right.=C2=A0 =C2=A0But the result is the same in the example abo=
ve; i.e.,<br>
&quot;../a =3D true()&quot; is true iff a exists.<br>
<br>
<br>
&gt;=C2=A0 false is a boolean<br>
<br>
There are no boolean literals in XPath 1.0.=C2=A0 So false would refer to a=
<br>
node with the name &quot;false&quot;.<br></blockquote><div><br></div><div><=
br></div><div>But there is the string() function is 4.2:</div><div><br></di=
v><ul style=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:medium"><l=
i><p>The boolean false value is converted to the string=C2=A0<code>false</c=
ode>. The boolean true value is converted to the string=C2=A0<code>true</co=
de>.</p></li></ul><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
&gt;=C2=A0 &#39;false&#39; is a string<br>
&gt;=C2=A0 false() is a function that return a boolean<br>
<br>
<br></blockquote><div><br></div><div>compare node-set to boolean will not w=
ork correctly. It tests existence.=C2=A0</div><div><br></div><div>=C2=A0 =
=C2=A0 ../a =3D false</div><div><br></div><div><span style=3D"color:rgb(0,0=
,0);font-family:sans-serif;font-size:medium">If one object to be compared i=
s a node-set and the other is a boolean, then the comparison will be true i=
f and only if the result of performing the comparison on the boolean and on=
 the result of converting the node-set to a boolean using the=C2=A0</span><=
b style=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:medium"><a hre=
f=3D"https://www.w3.org/TR/1999/REC-xpath-19991116/#function-boolean" style=
=3D"color:rgb(102,0,153);background-image:initial;background-position:initi=
al;background-size:initial;background-repeat:initial;background-origin:init=
ial;background-clip:initial;background-color:transparent">boolean</a></b><s=
pan style=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:medium">=C2=
=A0function is true.</span><br></div><div><span style=3D"color:rgb(0,0,0);f=
ont-family:sans-serif;font-size:medium"><br></span></div><div><span style=
=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:medium"><br></span></=
div><div>compare node-set to string will work as expected<span style=3D"col=
or:rgb(0,0,0);font-family:sans-serif;font-size:medium"><br></span></div><di=
v><br></div><div>=C2=A0 ../a =3D &#39;false&#39;</div><div><br></div><div><=
span style=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:medium">If =
one object to be compared is a node-set and the other is a string, then the=
 comparison will be true if and only if there is a node in the node-set suc=
h that the result of performing the comparison on the=C2=A0</span><a href=
=3D"https://www.w3.org/TR/1999/REC-xpath-19991116/#dt-string-value" style=
=3D"color:rgb(102,0,153);background-image:initial;background-position:initi=
al;background-size:initial;background-repeat:initial;background-origin:init=
ial;background-clip:initial;font-family:sans-serif;font-size:medium">string=
-value</a><span style=3D"color:rgb(0,0,0);font-family:sans-serif;font-size:=
medium">=C2=A0of the node and the other string is true.</span><br></div><di=
v><br></div><div><br></div><div><br></div><div>=C2=A0</div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex">
/martin<br>
<br>
<br></blockquote><div><br></div><div><br></div><div>Andy</div><div><br></di=
v><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0p=
x 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; <br>
&gt; <br>
&gt; Andy<br>
&gt; <br>
&gt; <br>
&gt; &gt; (sorry if I&#39;m being dense here, but I&#39;m not 100% positive=
 if I&#39;m<br>
&gt; &gt; &gt; interpreting your explanations correctly and getting the rig=
ht<br>
&gt; &gt; &gt; conclusion.=C2=A0 I&#39;ve never seen must or when statement=
s that use =3D<br>
&gt; &gt; &gt; false() or =3D true()).<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; [&gt;&gt;JTS: ] Are the strings &#39;true&#39; and &#39;fals=
e&#39; the &quot;string-value&quot; (that<br>
&gt; &gt; &gt; you mention above) for a Boolean leaf ?<br>
&gt; &gt;<br>
&gt; &gt; Yes, according to 9.5.1 in RFC 7950.<br>
&gt; &gt;<br>
&gt; &gt; &gt; &#39;a&#39; is a single Boolean leaf so the nodeset is that =
single leaf and<br>
&gt; &gt; &gt; the value is &#39;true&#39; or &#39;false&#39;.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; (b) &quot;../a =3D true()&quot;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Similar to above but after getting the string-value, th=
is is converted<br>
&gt; &gt; &gt; &gt; to a<br>
&gt; &gt; &gt; &gt; boolean before comparing with the boolean true.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; [&gt;&gt;JTS: ] I&#39;m a bit confused here.=C2=A0 Are you s=
aying that the<br>
&gt; &gt; &gt; string-value of leaf a is converted to a Boolean ?<br>
&gt; &gt; &gt; Do the string-values of a convert to something that is equal=
 to true()<br>
&gt; &gt; &gt; or false() ?<br>
&gt; &gt;<br>
&gt; &gt; See above.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; /martin<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; (c) &#39;../a&#39;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; True if the nodeset generated by this expression is not=
 empty.<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; ---<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Caveats alluded to above are that if &#39;../a&#39; mat=
ches multiple nodes,<br>
&gt; &gt; &gt; &gt; then only<br>
&gt; &gt; &gt; &gt; one of these nodes needs to pass the test for the test =
to be true.<br>
&gt; &gt; &gt; &gt; Separately, if<br>
&gt; &gt; &gt; &gt; any of the nodes are not leaves, the &#39;string-value&=
#39; is a concatenated<br>
&gt; &gt; &gt; &gt; string of<br>
&gt; &gt; &gt; &gt; the values of the node&#39;s child / grandchild leaves.=
<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Hope that helps.=C2=A0 You wouldn&#39;t believe the num=
ber of unit tests I have<br>
&gt; &gt; &gt; &gt; to make<br>
&gt; &gt; &gt; &gt; sure we get this logic right!=C2=A0 Using &#39;!=3D&#39=
; when comparing a nodeset<br>
&gt; &gt; &gt; &gt; with &gt;1 node<br>
&gt; &gt; &gt; &gt; with other values is very likely not to give the answer=
 you expect (-:<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Regards,<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; William<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; ______________________________<wbr>_________________<br>
&gt; &gt; &gt; netmod mailing list<br>
&gt; &gt; &gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
&gt; &gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=
=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinf=
o/netmod</a><br>
&gt; &gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; ______________________________<wbr>_________________<br>
&gt; &gt; netmod mailing list<br>
&gt; &gt; <a href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/net=
mod</a><br>
&gt; &gt;<br>
</blockquote></div><br></div></div>

--000000000000ca4f280572ee8f38--


From nobody Wed Aug  8 09:09:14 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14BA8130E47 for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 09:09:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AYd9WPMkwFwZ for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 09:09:10 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 93ADE130E6B for <netmod@ietf.org>; Wed,  8 Aug 2018 09:09:10 -0700 (PDT)
Received: from localhost (h-80-27.A165.priv.bahnhof.se [212.85.80.27]) by mail.tail-f.com (Postfix) with ESMTPSA id DCB4D1AE018A; Wed,  8 Aug 2018 18:09:09 +0200 (CEST)
Date: Wed, 08 Aug 2018 18:09:09 +0200 (CEST)
Message-Id: <20180808.180909.900924776176911353.mbj@tail-f.com>
To: andy@yumaworks.com
Cc: jason.sterne@nokia.com, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <CABCOCHQp3DbryGcGk1+orgoNnv3Aw+ujG-v8JA+DASr++icFsQ@mail.gmail.com>
References: <CABCOCHTUEedds_164G7cF=T6=9-Jd4HJG=bc7JyBGTpKf0-4Mg@mail.gmail.com> <20180808.174403.1373198576462216929.mbj@tail-f.com> <CABCOCHQp3DbryGcGk1+orgoNnv3Aw+ujG-v8JA+DASr++icFsQ@mail.gmail.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/7jXdsIvcOVoT9y0bs1Gh2J75r98>
Subject: Re: [netmod] false() vs 'false' in 'when' statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Aug 2018 16:09:13 -0000

Andy Bierman <andy@yumaworks.com> wrote:
> On Wed, Aug 8, 2018 at 8:44 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> 
> > Andy Bierman <andy@yumaworks.com> wrote:
> > > On Wed, Aug 8, 2018 at 6:50 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> > >
> > > > Hi,
> > > >
> > > > "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > > > > Thanks William.
> > > > > Please see below.
> > > > > Regards,
> > > > > Jason
> > > > >
> > > > > > -----Original Message-----
> > > > > > From: Ivory, William <william.ivory@intl.att.com>
> > > > > > Sent: Wednesday, August 8, 2018 3:27 AM
> > > > > > To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>;
> > > > > > netmod@ietf.org
> > > > > > Subject: Re: [netmod] false() vs 'false' in 'when' statements
> > > > > >
> > > > > > On 07/08/18 18:37, Sterne, Jason (Nokia - CA/Ottawa) wrote:
> > > > > > Hi all,
> > > > > >
> > > > > > When comparing the value of a boolean leaf in a 'when' statement
> > (or a
> > > > > > 'must'
> > > > > > statement), is an equality comparison to 'true' or 'false' the
> > same as
> > > > > > a check
> > > > > > against true() or false() ?
> > > > > >
> > > > > > For example:
> > > > > >
> > > > > > leaf a {
> > > > > >     type boolean;
> > > > > > }
> > > > > > leaf b {
> > > > > >     type uint32;
> > > > > >     when ".../a = 'true'";
> > > > > > }
> > > > > > leaf c {
> > > > > >     type uint32;
> > > > > >     when ".../a = 'false'";
> > > > > > }
> > > > > > (note that neither b nor c can be configured if leaf a isn't
> > > > > > explicitly configured
> > > > > > with a value since there is no default)
> > > > > >
> > > > > > If I replace the two 'when' statements above with the following
> > > > > > instead, is the
> > > > > > behavior the same ?
> > > > > >     ...
> > > > > >     when ".../a = true()";
> > > > > >     ...
> > > > > >     when ".../a = false()";
> > > > > >     ...
> > > > > >
> > > > > > Or does "../a = true()" behave as an existence check on leaf a and
> > > > > > would be
> > > > > > enabled whether a is configured as true or false ?
> > > > > >
> > > > > > Regards,
> > > > > > Jason
> > > > > >
> > > > > >
> > > > > >
> > > > > > See https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > > > > >
> > > > > > (a) "../a = 'true'"
> > > > > >
> > > > > > Compares 'string-value' (same as value of node if a leaf, rather
> > more
> > > > > > interesting if a list / container!) of each node in nodeset
> > generated
> > > > > > by '../a' and
> > > > > > if any node in the nodeset matches 'true', expression is true.
> > > > >
> > > > > [>>JTS: ] In my specific example, leaf a is a single Boolean leaf.
> > In
> > > > > that case, are these equivalent ?
> > > > >     when ".../a = 'true'";
> > > > >     when ".../a = true()";
> > > >
> > > > No...
> > > >
> > > > > and are these also equivalent ?
> > > > >     when ".../a = 'false'";
> > > > >     when ".../a = false()";
> > > >
> > > > .... and no.
> > > >
> > > > What you probably want is ".../a = 'true'" (or 'false').
> > > >
> > > > The expression:
> > > >
> > > >     ".../a = true()";
> > > >
> > > > will first take the string value of ".../a", which e.g. is "false".
> > > > This string value is then converted to a boolean, resulting in the
> > > > boolean value True (b/c the string is non-empty).
> > > >
> > > > This means that if "a" is set at all (to true or false), the
> > > > expression ".../a = true()" returns true.  The expression ".../a =
> > > > false()" will only return true if "a" is unset.
> > > >
> > > >
> > >
> > > I suggest reading the XPath definition of boolean comparisons:
> > > https://www.w3.org/TR/1999/REC-xpath-19991116/#booleans
> > >
> > > It is a bit complicated, but generally, a node-set is converted
> > > to a boolean (==false for empty, ==true for not empty) when
> > > compared to a boolean for equality/inequality.
> >
> > You're right.   But the result is the same in the example above; i.e.,
> > "../a = true()" is true iff a exists.
> >
> >
> > >  false is a boolean
> >
> > There are no boolean literals in XPath 1.0.  So false would refer to a
> > node with the name "false".
> >
> 
> 
> But there is the string() function is 4.2:
> 
> 
>    -
> 
>    The boolean false value is converted to the string false. The boolean
>    true value is converted to the string true.

Right, so:

   string(false()) --> "false"

> 
> > >  'false' is a string
> > >  false() is a function that return a boolean
> >
> >
> >
> compare node-set to boolean will not work correctly. It tests existence.

Right.

>     ../a = false

This compares two node sets.


/martin


> If one object to be compared is a node-set and the other is a boolean, then
> the comparison will be true if and only if the result of performing the
> comparison on the boolean and on the result of converting the node-set to a
> boolean using the *boolean
> <https://www.w3.org/TR/1999/REC-xpath-19991116/#function-boolean>* function
> is true.
> 
> 
> compare node-set to string will work as expected
> 
>   ../a = 'false'
> 
> If one object to be compared is a node-set and the other is a string, then
> the comparison will be true if and only if there is a node in the node-set
> such that the result of performing the comparison on the string-value
> <https://www.w3.org/TR/1999/REC-xpath-19991116/#dt-string-value> of the
> node and the other string is true.
> 
> 
> 
> 
> 
> > /martin
> >
> >
> >
> 
> Andy
> 
> 
> 
> > >
> > >
> > > Andy
> > >
> > >
> > > > (sorry if I'm being dense here, but I'm not 100% positive if I'm
> > > > > interpreting your explanations correctly and getting the right
> > > > > conclusion.  I've never seen must or when statements that use =
> > > > > false() or = true()).
> > > > >
> > > > > [>>JTS: ] Are the strings 'true' and 'false' the "string-value" (that
> > > > > you mention above) for a Boolean leaf ?
> > > >
> > > > Yes, according to 9.5.1 in RFC 7950.
> > > >
> > > > > 'a' is a single Boolean leaf so the nodeset is that single leaf and
> > > > > the value is 'true' or 'false'.
> > > > >
> > > > > >
> > > > > > (b) "../a = true()"
> > > > > >
> > > > > > Similar to above but after getting the string-value, this is
> > converted
> > > > > > to a
> > > > > > boolean before comparing with the boolean true.
> > > > >
> > > > > [>>JTS: ] I'm a bit confused here.  Are you saying that the
> > > > > string-value of leaf a is converted to a Boolean ?
> > > > > Do the string-values of a convert to something that is equal to
> > true()
> > > > > or false() ?
> > > >
> > > > See above.
> > > >
> > > >
> > > > /martin
> > > >
> > > >
> > > > >
> > > > > >
> > > > > > (c) '../a'
> > > > > >
> > > > > > True if the nodeset generated by this expression is not empty.
> > > > > >
> > > > > > ---
> > > > > >
> > > > > > Caveats alluded to above are that if '../a' matches multiple nodes,
> > > > > > then only
> > > > > > one of these nodes needs to pass the test for the test to be true.
> > > > > > Separately, if
> > > > > > any of the nodes are not leaves, the 'string-value' is a
> > concatenated
> > > > > > string of
> > > > > > the values of the node's child / grandchild leaves.
> > > > > >
> > > > > > Hope that helps.  You wouldn't believe the number of unit tests I
> > have
> > > > > > to make
> > > > > > sure we get this logic right!  Using '!=' when comparing a nodeset
> > > > > > with >1 node
> > > > > > with other values is very likely not to give the answer you expect
> > (-:
> > > > > >
> > > > > > Regards,
> > > > > >
> > > > > > William
> > > > > >
> > > > >
> > > > > _______________________________________________
> > > > > netmod mailing list
> > > > > netmod@ietf.org
> > > > > https://www.ietf.org/mailman/listinfo/netmod
> > > > >
> > > >
> > > > _______________________________________________
> > > > netmod mailing list
> > > > netmod@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/netmod
> > > >
> >


From nobody Wed Aug  8 17:03:01 2018
Return-Path: <alexander.clemm@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFC48129C6B for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 17:02:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LoPgvk_vLXGl for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 17:02:58 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C956129AB8 for <netmod@ietf.org>; Wed,  8 Aug 2018 17:02:58 -0700 (PDT)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 238909B531417 for <netmod@ietf.org>; Thu,  9 Aug 2018 01:02:52 +0100 (IST)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.399.0; Thu, 9 Aug 2018 01:02:54 +0100
Received: from SJCEML521-MBX.china.huawei.com ([169.254.1.107]) by SJCEML702-CHM.china.huawei.com ([169.254.4.139]) with mapi id 14.03.0399.000;  Wed, 8 Aug 2018 17:02:51 -0700
From: Alexander Clemm <alexander.clemm@huawei.com>
To: Joe Clarke <jclarke=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
Thread-Index: AQHUIDD8ZMTccLStt0Sk0cXgNwUk6qS2o2sw
Date: Thu, 9 Aug 2018 00:02:50 +0000
Message-ID: <644DA50AFA8C314EA9BDDAC83BD38A2E0EB43ACD@sjceml521-mbx.china.huawei.com>
References: <cc6a6f64-3bf5-68fe-ec01-259f94f2b2a7@cisco.com>
In-Reply-To: <cc6a6f64-3bf5-68fe-ec01-259f94f2b2a7@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.209.217.172]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/RulbCapo5rsztAcpwIi9Gi0Y8Jg>
Subject: Re: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Aug 2018 00:03:00 -0000

Hi Joe,

regarding the "who" made the change and when:  I would think it makes sense=
 to have the ability to include this information if it were available (anal=
ogous to how origin metadata can be included).  However, I don't think this=
 is captured today.  This would be a candidate to add as part of metadata o=
f a datastore itself that would have be specified as part of a separate to-=
be-developed draft, perhaps called something like "Audit trail metadata for=
 NMDA datastores". =20

As part of the nmda-diff draft, I would think  it would be reasonable to in=
clude, if the working group agreees, a "design pattern" that indicates how =
the model can include (possibly by means of extensions) additional metadata=
 items about datatastore nodes as they get defined. =20

--- Alex

> -----Original Message-----
> From: netmod [mailto:netmod-bounces@ietf.org] On Behalf Of Joe Clarke
> Sent: Friday, July 20, 2018 6:52 AM
> To: netmod@ietf.org
> Subject: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
>=20
> I just had a chance to finish reading this.  The in-person meeting group
> seems to strongly support this work, and I agree.
>=20
> Coming from a serviceability standpoint, I find this might serve as a
> precursor to a VCS-like "blame log".  Would it be reasonable to include
> identifiers as to who (or what) made the change and when?  Sorry if this
> was raised at the mic today.  I came to the room a bit late.
>=20
> Joe
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Wed Aug  8 17:16:08 2018
Return-Path: <alexander.clemm@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F92B129C6B for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 17:16:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pMX-JHKwRnDG for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 17:16:04 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1A7C12D7F8 for <netmod@ietf.org>; Wed,  8 Aug 2018 17:16:04 -0700 (PDT)
Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 6121C6FE7BD2B for <netmod@ietf.org>; Thu,  9 Aug 2018 01:16:01 +0100 (IST)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.399.0; Thu, 9 Aug 2018 01:16:02 +0100
Received: from SJCEML521-MBX.china.huawei.com ([169.254.1.107]) by SJCEML702-CHM.china.huawei.com ([169.254.4.139]) with mapi id 14.03.0399.000;  Wed, 8 Aug 2018 17:15:51 -0700
From: Alexander Clemm <alexander.clemm@huawei.com>
To: Qin Wu <bill.wu@huawei.com>, Joe Clarke <jclarke=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
Thread-Index: AdQgO9aPZMTccLStt0Sk0cXgNwUk6gPOHy6A
Date: Thu, 9 Aug 2018 00:15:50 +0000
Message-ID: <644DA50AFA8C314EA9BDDAC83BD38A2E0EB43AEC@sjceml521-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9AF59763@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9AF59763@nkgeml513-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.209.217.172]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/XNBq9LHYYK_zuh4Uxv_RCiN7CkE>
Subject: Re: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Aug 2018 00:16:07 -0000
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From nobody Wed Aug  8 21:01:08 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CDBA130F3F for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 21:01:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KgiEzEa3ScnQ for <netmod@ietfa.amsl.com>; Wed,  8 Aug 2018 21:01:05 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FC36130F72 for <netmod@ietf.org>; Wed,  8 Aug 2018 21:00:12 -0700 (PDT)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 82BB9738BCAC5 for <netmod@ietf.org>; Thu,  9 Aug 2018 05:00:07 +0100 (IST)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.399.0; Thu, 9 Aug 2018 05:00:07 +0100
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.163]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0399.000; Thu, 9 Aug 2018 11:59:58 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Alexander Clemm <alexander.clemm@huawei.com>, Joe Clarke <jclarke=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
Thread-Index: AdQgO9aPf9MFKlVCS3ix012Wcdg4yQO9zvkAABhodoA=
Date: Thu, 9 Aug 2018 03:59:58 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9AF9C187@nkgeml513-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9AF59763@nkgeml513-mbx.china.huawei.com> <644DA50AFA8C314EA9BDDAC83BD38A2E0EB43AEC@sjceml521-mbx.china.huawei.com>
In-Reply-To: <644DA50AFA8C314EA9BDDAC83BD38A2E0EB43AEC@sjceml521-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OWDRIgho3bc32WHt2sgWeYGfVH0>
Subject: Re: [netmod] Thoughts on draft-clemm-netmod-nmda-diff
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Aug 2018 04:01:07 -0000
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From nobody Fri Aug 10 08:19:48 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C821130E68 for <netmod@ietfa.amsl.com>; Fri, 10 Aug 2018 08:19:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MD-hMIj5_hlh for <netmod@ietfa.amsl.com>; Fri, 10 Aug 2018 08:19:43 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0116.outbound.protection.outlook.com [104.47.0.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D20212785F for <netmod@ietf.org>; Fri, 10 Aug 2018 08:19:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CAkgFy9mwQf2ijZ6CbGJBW3pxHfPly5AFWeC612eJdI=; b=krRjuAAYb1T6V2rpsXT+4uMqFHLyfET8bgpwyr6sIVrte3jnRBsdFCxckeeyDMI4llrvHkEYNpax3yn092NsuUQQJtS4HFKqXzSUMNYMeVbaB46LkHHsLZbo4ahdcnj3oL4tGN7IwKEoy69RupLoYHr4leP2Jx1OW7rdRYtVFv4=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB3486.eurprd07.prod.outlook.com (10.175.244.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1059.10; Fri, 10 Aug 2018 15:19:40 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1059.010; Fri, 10 Aug 2018 15:19:40 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: Module update rules: changing a type to a union
Thread-Index: AdQwu/McZzPv597ySjipjOU6kpIpKg==
Date: Fri, 10 Aug 2018 15:19:40 +0000
Message-ID: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB3486; 6:y7zbMhVLgImbupJ1OEI7MYOvKXAfHtW1ZLoTRzst3zE8NTo9stMW4N0zmOJm55RhhbYQJKiZuYCibD8EMVAo67sHPjmhn0i+VVyEncN62R55+RFsEzjwdQkguwvUSqhyfaDnMJvhkj1FLjwl5elgAjzlC5iY5B+04y6czu4TMKxC0M2kRD9lyp5Q4Si6H64BtdJQl6BCkmaVkb0FxtL4UMFx+6lpq5N/krbw1cIuuzA3gErzkxwn6COVS7fgSWgIKdmTkxttLiW17mUEwPQhBPKWH5ocsH3Oo9wVVEHw7LxkKrpY799p9GBAQ5WXYeRbSFMaUUMuWgXlLk3I1mwtQywMhRIxzn7+j3oKYhCuObzJ2ZRb/1+R+o4TCIfNVVIxbcB7SLHrRvcl1pDcthmrHUZ/8eksvDIMYMFRN4+co+YugZS0fDbJMi2JKN50FiQOmp37y2QhVtk6r/hTue1MfQ==; 5:cOEGdCZFtQ9p71JKZIdLcklYE8TlNL36VTaVr/z1SV15XDHUCcg3vATEwVN5ZrA4IFUTK4Q4uCnIWwSP0xZPYC5ekrx/t6QvkvOEfEqfbJ2MPA2tHM4kLR8HfbhpisxCPhuKzaIMeGqz58UyaUY6zJ8dluAudgbkf0t+sQa+YSI=; 7:72Z1DXPzLDLzlAG+k6ZKmVALhZXz82h3XFdkr6QPKXoNajYX3QVnS2LQFRkD9DjoFzZGeq1kKxhuE4BU+eA5bUronfJPeCsWMUqwGH57vFr2i6K7GG6XxbxGb0hr0UcGX3ZP7/2jo4mhSGo/gfJQTIFfD3oc7MVjwRl0otGoN1vmxuDtOtj4kdk8h9cUz4U7PU6o8YI/NEBR+p1B5fPciJ6jj6/Z5DU0LJL8EhCEDG6q6AukEtp2vSf5rqa8elr0
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 1a4e6623-23a7-46e2-6716-08d5fed4b188
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB3486; 
x-ms-traffictypediagnostic: VI1PR07MB3486:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-microsoft-antispam-prvs: <VI1PR07MB3486CC9E3FD4FB108DC922709B240@VI1PR07MB3486.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB3486; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB3486; 
x-forefront-prvs: 07607ED19A
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(396003)(136003)(39860400002)(376002)(346002)(53754006)(189003)(199004)(26005)(74316002)(7736002)(106356001)(105586002)(99286004)(5250100002)(33656002)(2501003)(2906002)(8676002)(8936002)(10710500007)(316002)(5660300001)(55016002)(1730700003)(81166006)(81156014)(2351001)(25786009)(476003)(486006)(186003)(9686003)(478600001)(66066001)(14454004)(6436002)(7696005)(15650500001)(3846002)(2420400007)(2900100001)(6916009)(790700001)(256004)(68736007)(5630700001)(86362001)(6506007)(102836004)(14444005)(7110500001)(53936002)(6306002)(54896002)(97736004)(5640700003)(6116002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB3486; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Xh+MgoYaC+YTK3lNaPJ3gfqgtvCWAYIo/LhZPJadxJLM1ZEwB0GIfJcZzVap/Wq1fpvl8dFuLt7KcOYbp1mPXXhoRCWk5L+h0BieH9+GIJcJqm0jncTqN7FLyI3xoj1eqQh4mK+xItG7UPN/NS47wzVtnJukvKcsCqeez3IPDwOLXw5sPtqm+NuHPPBoncZEEs6fN6ex71xDvDy4kl5zGTTB3q6yudUTIEuq2NOWpXekGACpwnxH3EmeG+/OdaxM0B8TVW8q6OhX+90CyBD7cb546NiFo5ND1yd3Yeb5ddB8jWtr+BHsh9ltdkrVZrxeWePu5Jjb2L+rZGprppUqXXGACI94rBAb6eTfT6hos1N2vngo1dCkmzYT2aSjFkE8pMQsCCLwwvgI9dOBPrVfNQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB39818C462606D318A99672B19B240VI1PR07MB3981eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a4e6623-23a7-46e2-6716-08d5fed4b188
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Aug 2018 15:19:40.6630 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3486
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/PYQVPFojM7LCQxzfBQWpdapY5ic>
Subject: [netmod] Module update rules: changing a type to a union
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Aug 2018 15:19:46 -0000

--_000_VI1PR07MB39818C462606D318A99672B19B240VI1PR07MB3981eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

I'm uncertain about how to interpret the YANG module update rules when a ty=
pe changes to a union.

Is the following change allowed?

From:
  typedef my-type {
    type enumeration {
      enum "foo";
    }
  }
To:
  typedef my-type {
    type union {
      type enumeration {
        enum "foo";
      }
      type uint32;
    }
  }

The general spirit of the rules is that expanding the value space is genera=
lly OK, but this case does seem to violate this paragraph of section 11:

   o  A "type" statement may be replaced with another "type" statement
      that does not change the syntax or semantics of the type.  For
      example, an inline type definition may be replaced with a typedef,
      but an int8 type cannot be replaced by an int16, since the syntax
      would change.


Does the addition of the union change the semantics of the type if that uni=
on encompasses the original type?

With XML encoding I can see how an "old" client could easily still communic=
ate with a "new" server for this change. But I wonder about other possible =
encodings that might change when a type becomes a union that contains addit=
ional types.

Regards,
Jason

--_000_VI1PR07MB39818C462606D318A99672B19B240VI1PR07MB3981eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-CA" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">I'm uncertain about how to interpret the YANG module update rules whe=
n a type changes to a union.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Is the following change allowed?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">From:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; typedef my-type {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; type enumeration {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;enum &quot;foo&quot;;<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">To:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; typedef my-type {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; type union {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;type enumeration {<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;enum &quot;foo&quot;;<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; type uint32;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">The general spirit of the rules is that expanding the value space is =
generally OK, but this case does seem to violate this paragraph of section =
11:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp; o&nbsp; A &quot;type&quot; statement may be replaced wit=
h another &quot;type&quot; statement<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that does not change the syntax or sem=
antics of the type.&nbsp; For<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; example, an inline type definition may=
 be replaced with a typedef,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; but an int8 type cannot be replaced by=
 an int16, since the syntax<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; would change.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Does the addition of the union change the semantics of the type if th=
at union encompasses the original type?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">With XML encoding I can see how an &quot;old&quot; client could easil=
y still communicate with a &quot;new&quot; server for this change. But I wo=
nder about other possible encodings that might change when a type
 becomes a union that contains additional types.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Regards,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Jason<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_VI1PR07MB39818C462606D318A99672B19B240VI1PR07MB3981eurp_--


From nobody Sun Aug 12 15:23:44 2018
Return-Path: <Hayden.Brown@Aviatnet.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95282130E47 for <netmod@ietfa.amsl.com>; Sun, 12 Aug 2018 15:23:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aviatus.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2fFrg4AFBHi for <netmod@ietfa.amsl.com>; Sun, 12 Aug 2018 15:23:38 -0700 (PDT)
Received: from NAM05-BY2-obe.outbound.protection.outlook.com (mail-eopbgr710045.outbound.protection.outlook.com [40.107.71.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94758129619 for <netmod@ietf.org>; Sun, 12 Aug 2018 15:23:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aviatus.onmicrosoft.com; s=selector1-aviatnet-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bLLG5Lq2fJ9Ji6NP3m3PmDZjotoFco9j68yZughhHic=; b=JLalaaaBSwCy7oW2XjjgO/uZAKMYgdRnmR2gHj//BiH1nhqNNCcUNHzPSm47g59mRmMWwEzckjzuD/wFGol/LgVVXdkvqHHHwdWssmCJWwD6WefShBnSQigL6osz2NtHOkK4H/w5q3Bmt88/G3cDAODBBMWlO165tyGzJiJKWo0=
Received: from BN6PR08CA0054.namprd08.prod.outlook.com (2603:10b6:404:b9::16) by DM5PR08MB2988.namprd08.prod.outlook.com (2603:10b6:3:146::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.23; Sun, 12 Aug 2018 22:23:36 +0000
Received: from BY2NAM03FT061.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e4a::209) by BN6PR08CA0054.outlook.office365.com (2603:10b6:404:b9::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1038.20 via Frontend Transport; Sun, 12 Aug 2018 22:23:36 +0000
Authentication-Results: spf=pass (sender IP is 192.147.115.54) smtp.mailfrom=Aviatnet.com; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=Aviatnet.com;
Received-SPF: Pass (protection.outlook.com: domain of Aviatnet.com designates 192.147.115.54 as permitted sender) receiver=protection.outlook.com;  client-ip=192.147.115.54; helo=mail-send.aviatnet.com;
Received: from mail-send.aviatnet.com (192.147.115.54) by BY2NAM03FT061.mail.protection.outlook.com (10.152.85.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1059.14 via Frontend Transport; Sun, 12 Aug 2018 22:23:35 +0000
From: Hayden Brown <Hayden.Brown@Aviatnet.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Fwd: Re: YANG schema mount - any early implementations?
Thread-Index: AdQyinE1eesRiFo4TM6ijhMiSXHHuQ==
Date: Sun, 12 Aug 2018 22:23:34 +0000
Message-ID: <807ef747b1134151b16eebcf5ede2f33@USP-EXCHPROD02.GNET.global.vpn>
Accept-Language: en-NZ, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.15.6.10]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:192.147.115.54; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(39840400004)(396003)(136003)(376002)(346002)(2980300002)(438002)(13464003)(189003)(199004)(53754006)(118246002)(5640700003)(25786009)(2501003)(8936002)(2351001)(106002)(47776003)(24736004)(108616005)(8676002)(1730700003)(86362001)(305945005)(3846002)(6116002)(7736002)(356003)(6246003)(6486002)(50466002)(7596002)(7636002)(436003)(966005)(9686003)(6306002)(6512007)(478600001)(102836004)(53546011)(956004)(186003)(476003)(2906002)(2486003)(72206003)(246002)(23676004)(486006)(316002)(336012)(36736006)(561944003)(5024004)(26005)(53416004)(345774005)(5660300001)(6916009)(229853002)(126002)(106466001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR08MB2988; H:mail-send.aviatnet.com; FPR:;  SPF:Pass; LANG:en; PTR:mail-send.aviatnet.com; MX:1; A:1; 
X-Microsoft-Exchange-Diagnostics: 1; BY2NAM03FT061; 1:ICPIfuQ9VzXLclL/PAYMiAEx8sNKNCr8iHU6sAYkUcbh9we6wfJwCZiDIKyZ5Rk/9x9lPBjutarM2Y8Ymq0Iy0wvJaM2opGd6G8y6X8h6pFwCkVeu9HmZobPoIcfUgO3
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9242b4b6-59ef-4f5d-8601-08d600a23ea7
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4608076)(2017052603328)(7153060)(7193020); SRVR:DM5PR08MB2988; 
X-Microsoft-Exchange-Diagnostics: 1; DM5PR08MB2988; 3:Iye1wOf0lWAPcue+16hFl+hzbvQ9XE6JFUx/ARN3Og9pTAVz45jCP6GnlS2OeyPDo8s1zrAGML6sl0J9EHYudZDt0lv6kELm45TeAaSUMXjUzNwYEGIDc9+M06ONqnpzCXWFKf75k+dgWo987BYKKEHDyYt6dIj6HvMdw/yJqkAIKKsokSIeYmNjlwe27XrCJZFfs4rXJebmdM+3eG0kfa7NhP5rFTHlyP4gO6/sJ0Y4UZTTJpVCZx+qahlH9LQm8q/93YODV+uHcy+cDru6cQleQkW0SXKmvutZ3SbjPlQ8h3gDavHGTGympxrl0JzDsNYfsO9OQQeu5Cbfs+/7X0i5g6YAtO0f0BkgX/Pibhs=; 25:cCm3IbDrQV97mXVNBV99YkOvbo2rvh4aWd1Gux3H+A+ai0m0YOC8fJXr2rWMbE1V0sxEJQeiudngj3M8BhsMw2ffxh/OQzpe4cUFjV2XJD3jc6GwreY3Eq5XdmdB8aYtXjwsWZG6LXgrZH8mX9yOl2n/v16YIGApQsvBf5WKKT4YuZJPnjiEuzly/zhZKGu/t1uXIKsdUAG9dtHKu7ZRVGCCpfWgiWIP2r8+mvaFLCPeMS20ue6myWy7Vpc6nEW8ur3xzCdMxZpdfLLoCDwt2nFHo+1zFpczlvswFAfMq6BcNZTkfX7j2qITfRIjY2gEEJ5P+DGI4xL29SADALjeKQ==
X-MS-TrafficTypeDiagnostic: DM5PR08MB2988:
X-Microsoft-Exchange-Diagnostics: 1; DM5PR08MB2988; 31:CEtFNpRrSiaZ3qnl356N7b5EqCSUN52g0ThmYVYsIxm71P1wtir6fPOKIAb09zKpQl4aqzlLWyqmLweK5kittz7g4BNNtgChmxB6S3VQusEh1o+ytsIJBGH5FOYGbLbBcViKzsdiPSQ9/hBnLRIPhY5yEZNCmRCy3OVp5HxKQtdo1BJWJa1/PGwc9QV+ozt3/flCfZ3+F3DQdExcoZP6AXMI5OAIs4TU/+Ly53OQVwM=; 20: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
X-Microsoft-Antispam-PRVS: <DM5PR08MB298863BD5F8280164D162993F63A0@DM5PR08MB2988.namprd08.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(120809045254105);
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93004095)(3231311)(944501410)(52105095)(10201501046)(3002001)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123562045)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:DM5PR08MB2988; BCL:0; PCL:0; RULEID:; SRVR:DM5PR08MB2988; 
X-Microsoft-Exchange-Diagnostics: 1; DM5PR08MB2988; 4:tSVaGpnNXUkfGdiZPTtRVA0/cJFc7vxHIeB0Sa3K5EWSYB0MwPKMrStF7jJgmFh3yLYMYrCAVsEKsOb6AgvN3AYHi6fX0FrZYdvnkcN3aYlfBP+qkEAdKD1PTvGXoQUkpxKzmZv/IH0Yh5/6+pYBLeuaCTXrAXpaHQxeRJ87Cr6P8kHL+2L+xPs70Rn5xZJu4lhqxC4a5gmvk9Bp9GDGLQ+75i/Qc16rX3X6XHE2wFcKZZ8ztif2VG5am0CqZO3ME9eM6QNZ7qQrmmW0NpPoO58KC3d5qiPZFFfliyR2c1QHvg/Eg5qRnDQYhZK1emVbMOdQ97JeWQO9kSCUxByQmoP6trJpvKYVqwZVKUaKZBM=
X-Forefront-PRVS: 0762FFD075
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTVQUjA4TUIyOTg4OzIzOmR1T3lJZ1cxMWNvdDEyMEl3MzY0TE1rWWV6?= =?utf-8?B?VWJDZDdvalRpNlB3L0E3c3J4NWhwckQ4YVJiWUhVM3NzUDFHUjNheWo0dEdT?= =?utf-8?B?ZjBSTTBSWEVlblNmTFh6N2g2RndKV1picXJLQTdNZU1RdjRLU21zUWY2Mjho?= =?utf-8?B?alJrb3dzZjNxUnhLU25GSDZQV0pldWwyTWtRYXRNQ01hM21LUjZwSWNkVVpz?= =?utf-8?B?QzhHbTVucjhVSTUzVXg4SGc5eTlzZVVlYklPc1dpU3ExcDdXcHl4cXh6NmI2?= =?utf-8?B?clhvbEFKTXhRbjg5RkJOQml5cENiTjJBajhDcUpCcVpidFhvUS9hbjNOSEp1?= =?utf-8?B?TCsxazk1TE1uWEFEMFJvOHZQQ0lNZk9OS3pBZzN1anJhMDhZNjdrTE01N3NF?= =?utf-8?B?R01ZTjk0bFp5NmE3RjdxeUt3eWZaRk9wL1B4bmlOZU1hVUxyYlNFSTBac3Ey?= =?utf-8?B?TlQ2RUpDT2Vld3lsYysrckNBbmdIazJzUmpDRzM5QUVYOTJjU29MQktOeDMw?= =?utf-8?B?azM5Z2FZQmlZOVRzZWFmWGc0bWNLUjU3SDh4bFZEc2p3WksvTFordk9YUFFN?= =?utf-8?B?M3F1T1FMbjNCRXNMVUxINHFwazlSRmowVlNBcURjaGlZUk5FQW80cnl4aVRB?= =?utf-8?B?SHUwVi9WLzlpbW0veGdMNjl2ZjJPUy80OWJhYjBDOStNekZKd3lwMW5mWUtM?= =?utf-8?B?TnZLalR5K0laNVYvdThia0o4MW02NjNJOW4zYW9pZ0dCYTBVWWMyd2dYZEhm?= =?utf-8?B?RVRJMjhoa3BXWGFEcnpwN3NoaTUxTFFoQkJmaFZvbk52aGlMTTg3aTkyR0lh?= =?utf-8?B?Z01OQ05wSnduUUh0UGFzN0FqSW9WZGVKRVorZVhmc2hQczdIdDFEdCs5M1oy?= =?utf-8?B?R0hDc0s5aG4yREVKMWkzU0dXSXFrYWsxeDlBR0tBdzRybVIxY1NpYnBnK1dv?= =?utf-8?B?SXFvVE4vZFFwQU9UaTFEWHR0dmFzVUpSWlJCdVN6aXp4ay9BVTU5OW1lVUoy?= =?utf-8?B?anhEbW5GZlNoRlhqcDJqRjN1WmRJRmFCbXpKS0UwR0hkdmNEYUJGSjhzMHk0?= =?utf-8?B?Yno2UG9PQ0RUblp2VDFiWVZYT1dOTlY2VWRGakg4ZHcyaGFmdEZCK2NXUnB1?= =?utf-8?B?ZVFpaU8xS1JGSG1GZGdVaUtKS1NCcnZnTzMxWHFjZ0h1d3dVcW1uUUl0Q0lp?= =?utf-8?B?eUNvVWNrZXhXYy83bG45Vll4V1NmcENhdjZYbGJnY1lqNU5oN2VFOGVqUkxv?= =?utf-8?B?SVZTdWVvaG03dFVPMDdUMTJFK0xuM01CL2NJMExybkhjOHovL3RkL0pPdFpw?= =?utf-8?B?Wk15R0dUaVZWOE8wd254eWh5MW9XbFFUY2NZRXdJcWo5c1BOcFk1RytRRS95?= =?utf-8?B?NEoxK0JQVzF6RkwwR1JraWpNanUzMEpGaVo0YlArUDg1VVp3aFJZZEU2dHNj?= =?utf-8?B?QjFqT2ZnZklCc0VENDk4OFZwSEYwQncySnh1eVBnNEpYdm5FYXQzblZEZmpR?= =?utf-8?B?OWV4cy9BYjZtZlFwakhLSDgwclprUnZobmJsL0dNZjQ0UFpJSXBka3laZ2Yz?= =?utf-8?B?a1BvMVRBQWZzV3pNK1E1aEJCUTFrdWt5SWxQQ0VSb1VOY2twOEExeUtVMlBV?= =?utf-8?B?bkx0Y1QyNWJCWVlRVGt6VU1WaVZIZnB6Rk53YmUwYTV1b3ZEaWtJb0VzSDRm?= =?utf-8?B?Y2dkNjlFMEdnMWJuT3V3YWxiWWdlMk5YWW9wOUMvaTdEZmkyWm9HRUpBUWZv?= =?utf-8?B?RVdMck8wKzBUSmpjN0o2aVptVklOZ01VTjdXWnJEd1QvcGdGd3FLcndyV0hQ?= =?utf-8?B?dkViQ2RWZmE0d1lsa1JrbTRzdGtNMmwreWZBZHlxRWFJUzJIQmdpVnhORFJp?= =?utf-8?Q?1acsUH4Zp7A=3D?=
X-Microsoft-Antispam-Message-Info: 2tlsbNhY2E5wbf8+s4RbSxY+ToSgxnGNm73Hu6dUaX/eSzL3OqoSz+H66BaSuO42aYh7i61TBaasGnGIK0BQC/ZZ1u4C62OMPQSrmwpl4cv7MreeGA3iryI6F7Uo95u3rRjMPfzCvtHvaNDmjcI/PoXoJC+SfeiQe58L5OmngapoNrJjGlXbWUM3fJrUAJfP8X8sLmnOlseVKTZ2ojyZbArRass7N4mNNamwIWVsGpWxElG+CQRi7lJIsJUXyPomzueO7xajcPjIyULK8rffbAYfMHydqUiySsum8XHMdxDAaczv3TZxtIHMpbKZPOeiA/EHRLZQIjhE94UEl2YWVKK4cbU5bRm/MhHSwwbtlEA=
X-Microsoft-Exchange-Diagnostics: 1; DM5PR08MB2988; 6:Cyz3KHjpE3bauax7uRBTy52/Ss9O49etPv4HcM31po0Db9TEJDG+ftPtLEdbJBMbzXDZMo5Su3yQJURBoi0EFMXoPOEYMOlcoNxJKRgsRffUWYBJgqZTbeDW8i9wx1LYTHKfIKx8K6sg9CKYDWTU/60d2I06rNjG40Ld+GG4Qhendy+erSQUzdQJVreu5GU1VsGVIqPNvUbVHwdJDot/NldSBhz5t9zsxm1oI5kJVxG91Jp5rYZ+Aln/LA5ARm8LJ1VYqNBDqWoiyfbeop3FfsF1q2uzsVV6Apg43IpYSI4YHo7nqPKOOSA/SXOw406hlPWSRVvg7vl15x3JQ1jbQ8Lmz+tFzqRoc7pvLa+/BtT7TPUOP9fPTtyKhufVYKMbS5IOtMwvgqQme587xXkdU/o5ECJ6uf6Fv8Vor2Eg7hrTya3tkpBO+XU187phmX5cHuWoNvhBVDRF72USnjQ+Ug==; 5:yD4593xVah1hDKMrtndQpY+9Snx+OwYdqziU1tX7GwHY8hyMOPbhG6TqsJmOYvue0gqtCNUm473K6BLTWi+U+Sqioy6SxHP+6NHmqngiyeihfm1uF4vl8oL06zjKNMPZ4ywUtG9ODR6xaQulGGWHa2Xg2Ww2U+P22U53C6ZFdho=; 7:rSwrR0NSurH4/a88I0sbeS2hd/6o5Uj1LZ3LGAlmObT3GAJ1/SXQ4PHDFXnB73QZLYRF33ATxW4BXjt8NxWvLwnNJpKyAsXzYqmcaO1YfMNfpafJ50WkINhAvlEu53P7a2ghHMKa82wLmG/FzVmTPalrMgH+DG1l7bM0Cpict3SzsfIj0ZzU5sJxBDabGv9h05rrugOGdmtfFDlfwuy7fuNlRDtcZkYScQ6wG/as0mTYPVJk/yZOnXD4EOf6DApY
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: aviatnet.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2018 22:23:35.4747 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9242b4b6-59ef-4f5d-8601-08d600a23ea7
X-MS-Exchange-CrossTenant-Id: 8d7d22b9-3890-4eef-95a6-a226e64151be
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=8d7d22b9-3890-4eef-95a6-a226e64151be; Ip=[192.147.115.54];  Helo=[mail-send.aviatnet.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR08MB2988
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/XenRJbJvGTweokZelc4Z5W2KYSQ>
Subject: Re: [netmod] Fwd: Re: YANG schema mount - any early implementations?
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Aug 2018 22:23:42 -0000

SGksDQoNCk9rLCBpbiBhbnkgY2FzZSwgbXkgb3JpZ2luYWwgcG9pbnQgd2FzIHJlZ2FyZGluZyB0
aGUgYW1iaWd1aXR5IGluIHRoZSB3b3JkaW5nICJzcGVjaWZpZXMgdGhlIG1vdW50ZWQgc2NoZW1h
Ii4NCg0KVGhlIGFkZGl0aW9uYWwgdGV4dCBjYW4gYmUgZHJvcHBlZCBpZiBpdCBpcyBkZWVtZWQg
dG8gbm90IGJlIGFkZGluZyB2YWx1ZS4NCg0KS2luZCByZWdhcmRzLA0KSGF5ZGVuDQoNCg0KDQot
LS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogTWFydGluIEJqb3JrbHVuZCBbbWFpbHRv
Om1iakB0YWlsLWYuY29tXSANClNlbnQ6IFdlZG5lc2RheSwgOCBBdWd1c3QgMjAxOCA4OjAyIFBN
DQpUbzogSGF5ZGVuIEJyb3duDQpDYzogbmV0bW9kQGlldGYub3JnDQpTdWJqZWN0OiBFWFRFUk5B
TDogUmU6IFtuZXRtb2RdIEZ3ZDogUmU6IFlBTkcgc2NoZW1hIG1vdW50IC0gYW55IGVhcmx5IGlt
cGxlbWVudGF0aW9ucz8NCg0KSGksDQoNCkknbSBub3Qgc3VyZSBpZiB0aGVzZSBjaGFuZ2VzIG1h
a2UgdGhlIGRvYyBiZXR0ZXIuICAiaG93IHRoZSBzY2hlbWEgaXMNCm1vdW50ZWQiIGlzIG5vdCBq
dXN0ICJpbmxpbmUiIC8gInNoYXJlZC1zY2hlbWEiLCBidXQgdGhlcmUgaXMgYWxzbyB0aGUNCiJj
b25maWciIGxlYWYuICBBbmQgaGF2aW5nIHRvIHJlcGVhdCB0aGF0IGluIG1hbnkgcGxhY2VzIG1h
a2VzIHRoZQ0KdGV4dCBhIGJpdCBjbHVtc3kgaW1vLiAgIE1heWJlIG90aGVycyBjYW4gY2hpbWUg
aW4gYXMgd2VsbD8NCg0KDQoNCi9tYXJ0aW4NCg0KDQpIYXlkZW4gQnJvd24gPEhheWRlbi5Ccm93
bkBBdmlhdG5ldC5jb20+IHdyb3RlOg0KPiBIaSBNYXJ0aW4sDQo+IA0KPiBUaGFuayB5b3UgZm9y
IHlvdXIgY29tbWVudHMuIE9rLCBhZ3JlZWQgLSBpdCB3b3VsZCBiZSBiZXR0ZXIgdG8gbm90IGlu
dHJvZHVjZSBhIG5ldyBtb3VudGVkLXNjaGVtYSAndHlwZScgdGVybS4gUGVyaGFwcyB0aGUgd29y
ZGluZyAiaG93IHRoZSBzY2hlbWEgaXMgbW91bnRlZCIgaXMgYSBiZXR0ZXIgYWx0ZXJuYXRpdmU/
DQo+IEkndmUgcHJvdmlkZWQgcG9zc2libGUgd29yZGluZyBzdWdnZXN0aW9ucyBhZ2FpbiBiZWxv
dyBpbiBicmFja2V0cy4NCj4gIA0KPiANCj4gU2VjdGlvbiAzLjMg4oCTIFBhZ2UgNw0KPiBUaGUg
Ii9zY2hlbWEtbW91bnRzIiBjb250YWluZXIgaGFzIHRoZSAibW91bnQtcG9pbnQiIGxpc3QgYXMg
b25lIG9mIGl0cyBjaGlsZHJlbi4gRXZlcnkgZW50cnkgb2YgdGhpcyBsaXN0IHJlZmVycyB0aHJv
dWdoIGl0cyBrZXkgdG8gYSBtb3VudCBwb2ludCBhbmQgc3BlY2lmaWVzIFtob3cgdGhlIHNjaGVt
YSBpcyBtb3VudGVkLCBhcyBlaXRoZXIgImlubGluZSIgb3IgInNoYXJlZC1zY2hlbWEiXS4NCj4g
DQo+IA0KPiBTZWN0aW9uIDMuMyAtIFBhZ2UgOA0KPiBBbiBlbnRyeSBvZiB0aGUgIm1vdW50LXBv
aW50IiBsaXN0IGNhbiBzcGVjaWZ5IFtob3cgdGhlIHNjaGVtYSBpcyBtb3VudGVkXSBpbiB0d28g
ZGlmZmVyZW50IHdheXMsICJpbmxpbmUiIG9yICJzaGFyZWQtc2NoZW1hIi4NCj4gDQo+IA0KPiBT
ZWN0aW9uIDkgLSBQYWdlIDEzDQo+IEEgbW91bnQgcG9pbnQgZGVmaW5lcyBhIHBsYWNlIGluIHRo
ZSBub2RlIGhpZXJhcmNoeSB3aGVyZSBvdGhlciBkYXRhIG1vZGVscyBtYXkgYmUgYXR0YWNoZWQu
IEEgc2VydmVyIHRoYXQgaW1wbGVtZW50cyBhIG1vZHVsZSB3aXRoIGEgbW91bnQgcG9pbnQgcG9w
dWxhdGVzIHRoZSAvc2NoZW1hLW1vdW50cy9tb3VudC1wb2ludCBsaXN0IHdpdGggZGV0YWlsZWQg
aW5mb3JtYXRpb24gb24gW3doZXRoZXIgdGhlIGRhdGEgbW9kZWxzIG1vdW50ZWQgYXQgZWFjaCBp
bnN0YW5jZSBvZiBhIG1vdW50IHBvaW50IE1BWSBiZSBkaWZmZXJlbnQgKCJpbmxpbmUiIGNhc2Up
IG9yIGlmIHRoZXkgTVVTVCBhbGwgaGF2ZSB0aGUgc2FtZSBZQU5HIGxpYnJhcnkgY2hlY2tzdW0g
KCJzaGFyZWQtc2NoZW1hIiBjYXNlKS4gXQ0KPiANCj4gW0ZvciBhICJzaGFyZWQtc2NoZW1hIiBt
b3VudC1wb2ludCBsaXN0IGVudHJ5LCB0aGUgZW50cnkgTUFZIGluY2x1ZGUgb25lIG9yIG1vcmUg
InBhcmVudC1yZWZlcmVuY2UiIGxpc3QgZW50cmllcyB0aGF0IGFyZSB1c2VkIHRvIHNwZWNpZnkg
dGhlIGNvbnRleHQgbm9kZXNldCBmb3IgYW55IFhQYXRoIDEuMCBleHByZXNzaW9ucyBkZWZpbmVk
IHdpdGhpbiB0aGUgbW91bnRlZCBzY2hlbWEuXQ0KPiANCj4gDQo+IFNlY3Rpb24gOSAtIFBhZ2Ug
MTQNCj4gbGlzdCBtb3VudC1wb2ludCB7DQo+ICAgICBrZXkgIm1vZHVsZSBsYWJlbCI7DQo+ICAg
ICBkZXNjcmlwdGlvbg0KPiAgICAgIkVhY2ggZW50cnkgb2YgdGhpcyBsaXN0IHNwZWNpZmllcyBb
aG93IHRoZV0gc2NoZW1hIGZvciBhIHBhcnRpY3VsYXIgbW91bnQgcG9pbnQgW2lzIG1vdW50ZWQg
KCJpbmxpbmUiIG9yICJzaGFyZWQtc2NoZW1hIikuIF0NCj4gDQo+IA0KPiBSZWdhcmRzLA0KPiBI
YXlkZW4NCj4gDQo+IA0KPiANCj4gDQo+IA0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0K
PiBGcm9tOiBNYXJ0aW4gQmpvcmtsdW5kIFttYWlsdG86bWJqQHRhaWwtZi5jb21dIA0KPiBTZW50
OiBNb25kYXksIDYgQXVndXN0IDIwMTggMTE6MDYgUE0NCj4gVG86IEhheWRlbiBCcm93bg0KPiBD
YzogbmV0bW9kQGlldGYub3JnDQo+IFN1YmplY3Q6IEVYVEVSTkFMOiBSZTogW25ldG1vZF0gRndk
OiBSZTogWUFORyBzY2hlbWEgbW91bnQgLSBhbnkgZWFybHkgaW1wbGVtZW50YXRpb25zPw0KPiAN
Cj4gSGksDQo+IA0KPiBIYXlkZW4gQnJvd24gPEhheWRlbi5Ccm93bkBBdmlhdG5ldC5jb20+IHdy
b3RlOg0KPiA+IOKAi0hpIExvdSwNCj4gPiANCj4gPiANCj4gPiBUaGFuayB5b3UgZm9yIHlvdXIg
cmVzcG9uc2UuIEluIHRoZSBuZXcgY29weSBvZiB0aGUgc2VjdGlvbnMgYmVsb3cgSSd2ZSBhdHRl
bXB0ZWQgdG8gY29udmV5IGhvdyBJIHRoaW5rIHRoZSBwYXJhZ3JhcGhzIGNvdWxkIHJlYWQuDQo+
ID4gDQo+ID4gDQo+ID4gSW4gbXkgbWluZCwgdGhlIG1haW4gInBvaW50IG9mIGFtYmlndWl0eSIg
aXMgdGhhdCBpdCBzZWVtZWQgdGhlIGV4aXN0aW5nIHdvcmRpbmcgaW1wbGllczoNCj4gPiANCj4g
PiAgICogICDigIsgdGhlIG1vdW50LXBvaW50IGxpc3Qgc3BlY2lmaWVzIHdoaWNoIG1vZHVsZXMg
YXJlIG1vdW50ZWQgYmVsb3cgdGhlIHJvb3Qgb2YgdGhlIG1vdW50IHBvaW50Lg0KPiA+IA0KPiA+
IGhvd2V2ZXIsIEkgdGhpbmsgd2UgaGF2ZSBhbGwgYWdyZWVkIHRoYXQ6DQo+ID4gDQo+ID4gICAq
ICAg4oCLdGhlIG1v4oCLdW50LXBvaW50IGxpc3Qgc3BlY2lmaWVzIHRoZSBwYXJlbnQgbW9kdWxl
IHRoYXQgY29udGFpbnMgdGhlIG1vdW50LXBvaW50LC4NCj4gPiANCj4gPiBJIHNlZSB0aGlzIGFz
IGp1c3QgYSBzdWJ0bGUgaW50ZXJwcmV0YXRpb24gZGlmZmVyZW5jZSBpbiB0aGUgd29yZGluZyAi
c3BlY2lmaWVzIHRoZSBtb3VudGVkIHNjaGVtYSIuDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gSG9w
ZWZ1bGx5IHRoZSB3b3JkaW5nIChlZGl0ZWQgaW4gdGhlIGJyYWNrZXRzKSBiZWxvdyBiZXR0ZXIg
Y29udmV5cyBteSB0aG91Z2h0cy4gUGxlYXNlIGZlZWwgZnJlZSB0byBjb3JyZWN0IG1lLCBvciBp
bXByb3ZlIHRoZSB3b3JkaW5nIGJlbG93IGFzIHlvdSBzZWUgZml0Lg0KPiA+IA0KPiA+IFNlY3Rp
b24gMy4zIOKAkyBQYWdlIDcNCj4gPiA+IFRoZSAiL3NjaGVtYS1tb3VudHMiIGNvbnRhaW5lciBo
YXMgdGhlICJtb3VudC1wb2ludCIgbGlzdCBhcyBvbmUgb2YgaXRzIGNoaWxkcmVuLiBFdmVyeSBl
bnRyeSBvZiB0aGlzIGxpc3QgcmVmZXJzIHRocm91Z2ggaXRzIGtleSB0byBhIG1vdW50IHBvaW50
IGFuZCBzcGVjaWZpZXMgdGhlIFt0eXBlIG9mXSBtb3VudGVkIHNjaGVtYSBbYXMgImlubGluZSIg
b3IgInNoYXJlZC1zY2hlbWEiXS4NCj4gPiANCj4gPiBTZWN0aW9uIDMuMyAtIFBhZ2UgOA0KPiA+
ID4gQW4gZW50cnkgb2YgdGhlICJtb3VudC1wb2ludCIgbGlzdCBjYW4gc3BlY2lmeSB0aGUgW3R5
cGUgb2ZdIG1vdW50ZWQgc2NoZW1hIGluIHR3byBkaWZmZXJlbnQgd2F5cywgImlubGluZSIgb3Ig
InNoYXJlZC1zY2hlbWEiLg0KPiANCj4gVGhlIGRvY3VtZW50IGRvZXMgbm90IGRlZmluZSB0aGUg
InR5cGUiIG9mIGEgbW91bnRlZCBzY2hlbWEsIHNvIEkNCj4gZG9uJ3QgdGhpbmsgd2Ugc2hvdWxk
IHVzZSB0aGF0IHRlcm0gaW4ganVzdCBhIGZldyBwbGFjZXMuDQo+IA0KPiA+IFNlY3Rpb24gOSAt
IFBhZ2UgMTMNCj4gPiA+IEEgbW91bnQgcG9pbnQgZGVmaW5lcyBhIHBsYWNlIGluIHRoZSBub2Rl
IGhpZXJhcmNoeSB3aGVyZSBvdGhlciBkYXRhIG1vZGVscyBtYXkgYmUgYXR0YWNoZWQuIEEgc2Vy
dmVyIHRoYXQgaW1wbGVtZW50cyBhIG1vZHVsZSB3aXRoIGEgbW91bnQgcG9pbnQgcG9wdWxhdGVz
IHRoZSAvc2NoZW1hLW1vdW50cy9tb3VudC1wb2ludCBsaXN0IHdpdGggZGV0YWlsZWQgaW5mb3Jt
YXRpb24gb24gd2hldGhlciB0aGUgW2RhdGEgbW9kZWxzIG1vdW50ZWQgYXQgZWFjaCBpbnN0YW5j
ZSBvZiBhIG1vdW50IHBvaW50IE1BWSBiZSBkaWZmZXJlbnQgKCJpbmxpbmUiIGNhc2UpIG9yIE1V
U1QgYWxsIGhhdmUgdGhlIHNhbWUgWUFORyBsaWJyYXJ5IGNoZWNrc3VtICgic2hhcmVkLXNjaGVt
YSIgY2FzZSkuDQo+ID4gDQo+ID4gRm9yIGEgInNoYXJlZC1zY2hlbWEiIG1vdW50LXBvaW50IGxp
c3QgZW50cnksIHRoZSBlbnRyeSBNQVkgaW5jbHVkZSBvbmUgb3IgbW9yZSAicGFyZW50LXJlZmVy
ZW5jZSIgbGlzdCBlbnRyaWVzIHRoYXQgYXJlIHVzZWQgdG8gc3BlY2lmeSB0aGUgY29udGV4dCBu
b2Rlc2V0IGZvciBhbnkgWFBhdGggMS4wIGV4cHJlc3Npb25zIGRlZmluZWQgd2l0aGluIHRoZSBt
b3VudGVkIHNjaGVtYS5dDQo+ID4gDQo+ID4gDQo+ID4gU2VjdGlvbiA5IC0gUGFnZSAxNA0KPiA+
IGxpc3QgbW91bnQtcG9pbnQgew0KPiA+ICAgICBrZXkgIm1vZHVsZSBsYWJlbCI7DQo+ID4gICAg
IGRlc2NyaXB0aW9uDQo+ID4gICAgICJFYWNoIGVudHJ5IG9mIHRoaXMgbGlzdCBzcGVjaWZpZXMg
W3RoZSB0eXBlIG9mXSBzY2hlbWEgZm9yIGEgcGFydGljdWxhciBtb3VudCBwb2ludCBbICgiaW5s
aW5lIiBvciAic2hhcmVkLXNjaGVtYSIpIF0uDQo+ID4gDQo+ID4gDQo+ID4gVGhhbmtzIGFuZCBi
ZXN0IHJlZ2FyZHMsDQo+ID4gDQo+ID4gSGF5ZGVuDQo+ID4gDQo+IA0KPiANCj4gL21hcnRpbg0K
PiANCj4gDQo+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IF9fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fDQo+ID4gRnJvbTogTG91IEJlcmdlciA8bGJlcmdlckBsYWJuLm5ldD4N
Cj4gPiBTZW50OiBGcmlkYXksIDMgQXVndXN0IDIwMTggNzoyOCBhLm0uDQo+ID4gVG86IEhheWRl
biBCcm93bjsgbmV0bW9kQGlldGYub3JnDQo+ID4gU3ViamVjdDogRVhURVJOQUw6IFJlOiBbbmV0
bW9kXSBGd2Q6IFJlOiBZQU5HIHNjaGVtYSBtb3VudCAtIGFueSBlYXJseSBpbXBsZW1lbnRhdGlv
bnM/DQo+ID4gDQo+ID4gDQo+ID4gSGksDQo+ID4gDQo+ID4gICAgIGhvcGVmdWxseSBvdGhlcnMg
d2lsbCBjaGltZSBpbiB0b28sIGJ1dCBoZXJlJ3MgbXkgdmlldyAoYXMgYSB1c2VyIG9mIHNjaGVt
YSBtb3VudCwgc2VlIGh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLXJ0Z3dn
LW5pLW1vZGVsKS4uLg0KPiA+IA0KPiA+IE9uIDcvMzAvMjAxOCA3OjI3IFBNLCBIYXlkZW4gQnJv
d24gd3JvdGU6DQo+ID4gDQo+ID4gSGkgZXZlcnlvbmUsDQo+ID4gDQo+ID4gSSBqdXN0IHdhbnRl
ZCB0byBhc2sgaWYgaXQgd291bGQgYmUgcG9zc2libGUgdG8gY2xhcmlmeSB0aGUgaW50ZW50aW9u
cyBhcm91bmQgc29tZSBvZiB0aGUgd29yZGluZyBvZiB0aGUgZHJhZnQgc2NoZW1hIG1vdW50IHN0
YW5kYXJkIChSZXYtMTApLiBJbiBwYXJ0aWN1bGFyLCByZWdhcmRpbmcgZW50cmllcyBvZiB0aGUg
L3NjaGVtYS1tb3VudHMvbW91bnQtcG9pbnRzIGxpc3QuDQo+ID4gDQo+ID4gTXkgaW50ZXJwcmV0
YXRpb24gaXMgdGhhdCB0aGUgaW50ZW5kZWQgdXNlIG9mIHRoZSAvc2NoZW1hLW1vdW50cy9tb3Vu
dC1wb2ludHMgbGlzdCBlbnRyaWVzIGFyZSB0byBzcGVjaWZ5IHRoZSBwYXJlbnQgbW9kdWxlcyB0
aGF0IGNvbnRhaW4gYSBtb3VudCBwb2ludC4NCj4gPiANCj4gPiB5ZXMNCj4gPiANCj4gPiBGb2xs
b3dpbmcgb24gZnJvbSB0aGlzLCB0aGUgY2xpZW50IHNob3VsZCB1c2UgdGhlIFlBTkcgbGlicmFy
eSBpbnN0YW5jZSB0byBkZXRlcm1pbmUgd2hpY2ggc2NoZW1hIG9wdGlvbnMgY2FuIGJlIG1vdW50
ZWQgYXQgdGhlIHJvb3Qgb2YgYSBtb3VudCBwb2ludC4gVGhpcyBzZWVtcyBjb25zaXN0ZW50IHdp
dGggdGhlIGV4YW1wbGVzIG9mIEFwcGVuZGl4IEEgb2YgdGhlIGRyYWZ0IHN0YW5kYXJkLg0KPiA+
IA0KPiA+IGlmIHlvdSBkcm9wIHRoZSB3b3JkICJvcHRpb25zIiwgdGhlbiB5ZXMuICBPdGhlciBl
eGFtcGxlcyBjYW4gYmUgZm91bmQgaW4gZHJhZnQtaWV0Zi1ydGd3Zy1uaS1tb2RlbA0KPiA+IA0K
PiA+IA0KPiA+IEluIHRoaXMgZW1haWwgSSB3YW50ZWQgdG8gaGlnaGxpZ2h0IHRoZSBmb2xsb3dp
bmcgc2VjdGlvbnMgb2YgdGhlIGRyYWZ0IFJGQyBiZWxvdy4gSW4gbXkgdmlldyB0aGV5IHNlZW0g
dG8gbWUgdG8gYmUgc29tZXdoYXQgYW1iaWd1b3VzLCBpbiBpbXBseWluZyB0aGF0IHRoZSBtb3Vu
dC1wb2ludCBsaXN0IGVudHJpZXMgc3BlY2lmeSB0aGUgKmNoaWxkKiBtb2R1bGUgKHN1Yi1zY2hl
bWEpOg0KPiA+IA0KPiA+IA0KPiA+ID5Gcm9tIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv
ZG9jL2RyYWZ0LWlldGYtbmV0bW9kLXNjaGVtYS1tb3VudC8/aW5jbHVkZV90ZXh0PTENCj4gPiBT
ZWN0aW9uIDMuMyDigJMgUGFnZSA3DQo+ID4gPiBUaGUgIi9zY2hlbWEtbW91bnRzIiBjb250YWlu
ZXIgaGFzIHRoZSAibW91bnQtcG9pbnQiIGxpc3QgYXMgb25lIG9mIGl0cyBjaGlsZHJlbi4gRXZl
cnkgZW50cnkgb2YgdGhpcyBsaXN0IHJlZmVycyB0aHJvdWdoIGl0cyBrZXkgdG8gYSBtb3VudCBw
b2ludCBhbmQgc3BlY2lmaWVzIHRoZSBtb3VudGVkIHNjaGVtYS4NCj4gPiANCj4gPiBTZWN0aW9u
IDMuMyAtIFBhZ2UgOA0KPiA+ID4gQW4gZW50cnkgb2YgdGhlICJtb3VudC1wb2ludCIgbGlzdCBj
YW4gc3BlY2lmeSB0aGUgbW91bnRlZCBzY2hlbWEgaW4gdHdvIGRpZmZlcmVudCB3YXlzLCAiaW5s
aW5lIiBvciAic2hhcmVkLXNjaGVtYSIuDQo+ID4gDQo+ID4gDQo+ID4gU2VjdGlvbiA5IC0gUGFn
ZSAxMw0KPiA+ID4gQSBtb3VudCBwb2ludCBkZWZpbmVzIGEgcGxhY2UgaW4gdGhlIG5vZGUgaGll
cmFyY2h5IHdoZXJlIG90aGVyIGRhdGEgbW9kZWxzIG1heSBiZSBhdHRhY2hlZC4gQSBzZXJ2ZXIg
dGhhdCBpbXBsZW1lbnRzIGEgbW9kdWxlIHdpdGggYSBtb3VudCBwb2ludCBwb3B1bGF0ZXMgdGhl
IC9zY2hlbWEtbW91bnRzL21vdW50LXBvaW50IGxpc3Qgd2l0aCBkZXRhaWxlZCBpbmZvcm1hdGlv
biBvbiB3aGljaCBkYXRhIG1vZGVscyBhcmUgbW91bnRlZCBhdCBlYWNoIG1vdW50IHBvaW50Lg0K
PiA+IA0KPiA+IFNlY3Rpb24gOSAtIFBhZ2UgMTQNCj4gPiBsaXN0IG1vdW50LXBvaW50IHsNCj4g
PiAgICAga2V5ICJtb2R1bGUgbGFiZWwiOw0KPiA+ICAgICBkZXNjcmlwdGlvbg0KPiA+ICAgICAi
RWFjaCBlbnRyeSBvZiB0aGlzIGxpc3Qgc3BlY2lmaWVzIGEgc2NoZW1hIGZvciBhIHBhcnRpY3Vs
YXIgbW91bnQgcG9pbnQuDQo+ID4gDQo+ID4gDQo+ID4gSSBoYXZlIHJlcmVhZCB0aGUgYSBmZXcg
dGltZXMgYW5kIGFtIGhhdmluZyBhIGhhcmQgdGltZSB1bmRlcnN0YW5kIHdoYXQgc2hvdWxkIGJl
IGNoYW5nZWQuICBDYW4geW91IHN1Z2dlc3Qgc3BlY2lmaWMgY2hhbmdlcyB0aGF0IHdvdWxkIGFk
ZHJlc3MgeW91ciBjb25jZXJuL2NvbW1lbnQ/ICBUaGlzIG1pZ2h0IGhlbHAgdG8gdW5kZXJzdGFu
ZCB0aGUgaXNzdWUgeW91IGFyZSBzZWVpbmcuDQo+ID4gDQo+ID4gDQo+ID4gVGhlIHdvcmRpbmcg
bWFrZXMgbWUgd29uZGVyIGlmIHRoZXNlIHBhc3NhZ2VzIG1pZ2h0IGFjdHVhbGx5IGp1c3QgYmUg
ImxlZnQtb3ZlciIgY29udGV4dCBmcm9tIGVhcmxpZXIgcmV2aXNpb25zIG9mIHRoZSBkcmFmdCBz
dGFuZGFyZCAoUmV2aXNpb24gOCBhbmQgcHJpb3IpIC0tIGVmZmVjdGl2ZWx5IHJlZmVycmluZyBi
YWNrIHRvIHRoZSBzY2hlbWEtbW91bnQgJ3VzZS1zY2hlbWEnIGxpc3QuDQo+ID4gDQo+ID4gQWdh
aW4sIEknbSBzZWVpbmcgdGhlIGlzc3VlLg0KPiA+IA0KPiA+IA0KPiA+IEkgZG8gb2YgY291cnNl
IGFja25vd2xlZGdlIHRoYXQgaXQgaXMgZW50aXJlbHkgcG9zc2libGUgdGhhdCBJJ3ZlIG1pc2lu
dGVycHJldGVkIHRoZSB3b3JkaW5nIG9mIHRoZSBwYXNzYWdlcyBhYm92ZSwgaG93ZXZlciBpZiB0
aGF0IGlzIHRoZSBjYXNlLCBJIHN1c3BlY3QgSSBtYXkgbm90IGJlIHRoZSBvbmx5IG9uZSBpbiBm
dXR1cmUuDQo+ID4gQW5kIEknbSBzdXJlIEknbSBzdWZmZXJpbmcgZnJvbSBoYXZpbmcgc3BlbnQg
d2F5IHRvbyBtdWNoIHRpbWUgb24gdGhpcyB0b3BpYyBzbyBtYXkgYmUgc2VlaW5nIHRoaW5ncyBp
biB0aGUgdGV4dCB0aGF0IGFyZW4ndCBhY3R1YWxseSB0aGVyZSENCj4gPiANCj4gPiBDaGVlcnMs
DQo+ID4gTG91DQo+ID4gKG5vIGhhdHMpDQo+ID4gDQo+ID4gDQo+ID4gTWFueSB0aGFua3MgZm9y
IHlvdXIgdGltZSBvbiB0aGlzIG1hdHRlci4NCj4gPiANCj4gPiBCZXN0IHJlZ2FyZHMsDQo+ID4g
SGF5ZGVuDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gDQo+ID4gT24g
MjAvMDcvMjAxOCA4OjA5IFBNLCBKdWVyZ2VuIFNjaG9lbndhZWxkZXIgd3JvdGU6DQo+ID4gDQo+
ID4gT24gV2VkLCBKdWwgMTEsIDIwMTggYXQgMDk6NDM6MzJBTSArMTIwMCwgaGF5ZGVuIHdyb3Rl
Og0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IEkgdW5kZXJzdGFuZCB0aGF0IHRoZSBzY2hlbWEgbW91
bnQgcHJvcG9zYWwgaXMgc3RpbGwgZWZmZWN0aXZlbHkgaW4gYQ0KPiA+IA0KPiA+IHN0YXRlIG9m
IGZsdXgsIGJ1dCBhcmUgdGhlcmUgYW55IHB1YmxpY2x5IHZpc2libGUgaW1wbGVtZW50YXRpb25z
IG9yDQo+ID4gDQo+ID4gZGVwbG95bWVudHMgb2YgYSBORVRDT05GIG9yIFJFU1RDT05GIHNlcnZl
ciB0aGF0IHRob3NlIGludGVyZXN0ZWQgY291bGQNCj4gPiANCj4gPiBleHBlcmltZW50IHdpdGgg
KGUuZy4gdG8gYWlkIGluIGNsaWVudCBkZXZlbG9wbWVudCk/DQo+ID4gDQo+ID4gDQo+ID4gDQo+
ID4gU3RhdGUgb2YgZmx1eD8gSXQgaXMgcGFzdCBXRyBsYXN0IGNhbGwgYW5kIElFVEYgbGFzdCBj
YWxsLg0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcv
ZG9jL2RyYWZ0LWlldGYtbmV0bW9kLXNjaGVtYS1tb3VudC9oaXN0b3J5Lw0KPiA+IA0KPiA+IA0K
PiA+IA0KPiA+IC9qcw0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0KPiA+IA0K
PiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+ID4g
bmV0bW9kIG1haWxpbmcgbGlzdA0KPiA+IG5ldG1vZEBpZXRmLm9yZzxtYWlsdG86bmV0bW9kQGll
dGYub3JnPg0KPiA+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9k
DQo+ID4gDQo+ID4gDQo+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fDQo+IG5ldG1vZCBtYWlsaW5nIGxpc3QNCj4gbmV0bW9kQGlldGYub3JnDQo+IGh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo=


From nobody Sun Aug 12 16:22:48 2018
Return-Path: <Alex.Campbell@Aviatnet.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 926AD130E2C for <netmod@ietfa.amsl.com>; Sun, 12 Aug 2018 16:22:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aviatus.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PXgV2onDcR84 for <netmod@ietfa.amsl.com>; Sun, 12 Aug 2018 16:22:45 -0700 (PDT)
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (mail-eopbgr690067.outbound.protection.outlook.com [40.107.69.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A7F7129619 for <netmod@ietf.org>; Sun, 12 Aug 2018 16:22:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aviatus.onmicrosoft.com; s=selector1-aviatnet-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hLWS4gZVa13PEoIq3cpcjS8MI/BGYXCcYLHwGY4lBIA=; b=Z5v01TDP+WSMdQqg9LU/yPI5mZxrbbuehLFa8mV++mu39MsT0mCVoIrR3raX8Iu6An7VZAj8zxmjqSQ5jU5gWWMvCUiI7RPX9nofJKwlvyq6D+bVrnVx7MebQian5iTx3zG/RPmghxXLsH24dt5DMhY25MCbQg4wyE1rTeJyTR8=
Received: from DM6PR08CA0009.namprd08.prod.outlook.com (2603:10b6:5:80::22) by SN2PR0801MB2205.namprd08.prod.outlook.com (2603:10b6:804:17::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1038.21; Sun, 12 Aug 2018 23:22:43 +0000
Received: from BY2NAM03FT009.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e4a::208) by DM6PR08CA0009.outlook.office365.com (2603:10b6:5:80::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1038.19 via Frontend Transport; Sun, 12 Aug 2018 23:22:42 +0000
Authentication-Results: spf=pass (sender IP is 192.147.115.53) smtp.mailfrom=Aviatnet.com; nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=bestguesspass action=none header.from=Aviatnet.com;
Received-SPF: Pass (protection.outlook.com: domain of Aviatnet.com designates 192.147.115.53 as permitted sender) receiver=protection.outlook.com;  client-ip=192.147.115.53; helo=mail-send.aviatnet.com;
Received: from mail-send.aviatnet.com (192.147.115.53) by BY2NAM03FT009.mail.protection.outlook.com (10.152.84.120) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1059.14 via Frontend Transport; Sun, 12 Aug 2018 23:22:42 +0000
From: Alex Campbell <Alex.Campbell@Aviatnet.com>
To: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: EXTERNAL: [netmod] Module update rules: changing a type to a union
Thread-Index: AdQwu/McZzPv597ySjipjOU6kpIpKgB10lX6
Date: Sun, 12 Aug 2018 23:22:41 +0000
Message-ID: <1534116160999.19498@Aviatnet.com>
References: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-NZ, en-US
Content-Language: en-NZ
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.15.6.10]
Content-Type: multipart/alternative; boundary="_000_153411616099919498Aviatnetcom_"
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:192.147.115.53; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(136003)(396003)(39840400004)(376002)(346002)(2980300002)(438002)(53754006)(189003)(199004)(26005)(86362001)(486006)(126002)(446003)(11346002)(2616005)(476003)(186003)(30436002)(97876018)(6246003)(956004)(19627405001)(25786009)(229853002)(336012)(54896002)(6486002)(53546011)(14444005)(102836004)(6116002)(3846002)(106466001)(16586007)(106002)(296002)(8936002)(72206003)(76176011)(36756003)(15650500001)(316002)(7696005)(110136005)(84326002)(7636002)(478600001)(117636001)(53416004)(7596002)(2906002)(4546004)(356003)(118246002)(7736002)(2501003)(8676002)(36736006)(5660300001)(246002)(19607625011); DIR:OUT; SFP:1101; SCL:1; SRVR:SN2PR0801MB2205; H:mail-send.aviatnet.com; FPR:; SPF:Pass; LANG:en; PTR:mail-send.aviatnet.com; MX:1; A:1; 
X-Microsoft-Exchange-Diagnostics: 1; BY2NAM03FT009; 1:679TCiIccdOT9XK1cgEy1wXA8xQOzjr2BBb9jxrYhmOpPwfSlNIcQ6yNpMLPj7A9zhgFuh1ae6JoXRvAKvUMrlscXBzNOxAATrYstj73i++bVw2hq5vUTRXFmZHBHle5
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fb1ee6a2-f1e3-47a0-0e9f-08d600aa80ab
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4608076)(2017052603328)(7153060)(7193020); SRVR:SN2PR0801MB2205; 
X-Microsoft-Exchange-Diagnostics: 1; SN2PR0801MB2205; 3:UbpoqODrTo5jP8e7tLdb/O4sOHKmc/EPiqeRlE4JKK1PJdwJuG9BBkYYH9htbIXeyDIfhtlYQoUxvvIu8goMRw2zkOgZLHieGgLkLZjwwr0rMp8SxjthM+Ll3gMW/tCNeCd3DFziuHz/KK1jcszn2ALHQUp254LDIppmeMxxKOcx96p0x02m70SIGw7lATkUgN/8USKp6sxsr+m6wgIBWAEWubufpsHE99OicJymhIm/fTfT20Nu3+9x3qB8BiHRXylSXthag0mTtkAjTND6L0g2+cyAaKGIB0H9pxc110x8/NlFBObbS5CiOB6M/uDWjsjoSrpwLySVf1lJdy0D7zIQKqPPVUixo2gimgt5NA8=; 25:J5zHYfYlFNkAlUobsmbdL3T1wVKXNo4/I7X1S64T+z4uFtylHL72lBwDvgCcRi5rOOd78jhy0vFyQLHTwE1/hzw2a31c1aFmscO4wI/i0YuZzzhZv0ThMosHKMPpJyDBRT62t25P0QDEveO7lNg7IV5nJDAoouH3EbZ3YJnaCK0vCENpMQCkXKZ7SVVSZsBRyVVc45Q61lbmUhUGcEnvIOy9atyQCtQbot9/Aeyri+C8ZyQET82zfbNm+JDAubIUxsSTbqSav8XeKJlyNTzY/kyGKrX5Op+dktjW0NIByCcxulCCe95s7d7wYucbHlkCTT+HnPCmMMmecOD6tCDxwg==
X-MS-TrafficTypeDiagnostic: SN2PR0801MB2205:
X-Microsoft-Exchange-Diagnostics: 1; SN2PR0801MB2205; 31:scy0ibbYoBucSp/xuwFZ4rHGjK9BxYn/jHeEaS2SyC/uaIN8LZwj71rDpPC7J6KOntEyBlz7xjPK9vgFkDjflddUf91T20+QkU3EN2cOpa5ygVE0VNTNIsygirGOv9LXK4vg2d0t7XpkoayZIyNZqzXnrdrXE3qtLdfwIqK+Lhw5okakOoXWLUHo4d/j7fTrpi9qmc1DR6ZVVr7fg++f+MxDoU0lEYQ0CcuE8iaTYQs=; 20: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
X-Microsoft-Antispam-PRVS: <SN2PR0801MB2205743015F3CC42D5F60B57873A0@SN2PR0801MB2205.namprd08.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(82608151540597)(109105607167333)(195916259791689); 
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231311)(944501410)(52105095)(93006095)(93004095)(149027)(150027)(6041310)(201703131423095)(201703031522075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:SN2PR0801MB2205; BCL:0; PCL:0; RULEID:; SRVR:SN2PR0801MB2205; 
X-Microsoft-Exchange-Diagnostics: 1; SN2PR0801MB2205; 4:P2q5oWqvo6jY810SrxS3lHTDCp7V/yjzMxf0To5xDRwYq2BXzqMSyT2xHpr3Ro/RbHB9OZltuFeFKGWJBZomrLGeIow4ZlqjBKnhKivhVFYB0zxinHNps/0zmCJOPUCub7qxkkwo38DlhtiQTGi6Cm+8NHSrcTF8AKEz2m1mCC5mzDqBLK0EnxgYN0WXq68UtKbWxynzs0keKxGv2tUi/Z/JfGxPqwrK4zfvW9XUEVB4oS+yGHLrVw8BD4GFm+TxysxyXuNtra9inYHZ0lWeyptLIdW/GrLCkToxssaEKWcQ6RT0SLc7otx9zBHUHVSllpYk6yvZXbFsQo8GpBnUSmbGNa46E0yYfIGX0nRPIRsm9lqwTvoNVogovCKre4V89u0nCy5+cmmRTp1CzE3AYfN1q4kyvyJtA3cb2QHMbMI=
X-Forefront-PRVS: 0762FFD075
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN2PR0801MB2205; 23:pp1SNT6E/gCO7786z4CAz/3+eMhEm2lMxR4LpJg?= =?us-ascii?Q?NVSyraeyS3qMAjh3FjT4UeigG0huV8kI9c+Qrmbwa6YeVRFDHclXNX7I1U5p?= =?us-ascii?Q?kdS58mnQPfjeeP8XOZIjWvHSJFLUMr0UUxiThpPgux1AHnzvHveslt6OwIMG?= =?us-ascii?Q?iHyb5m6uOcw5RJZrqxsES76L9q74s4OqLu4LFwyZwGJn9W9wHp6EXfcSsXCs?= =?us-ascii?Q?w54DTwJaiSlnOYj/KeeCG7V2JafOiPci7EXSh0MEODzQcT10kE5Sz1bp174a?= =?us-ascii?Q?yPM8NFdmK1n6DjE5ljYfHPrV5hBjJ4afZSOSxRlzm/BSOnjQWuV7LqXurPx8?= =?us-ascii?Q?g7IiAVDDPiidI3h1+fl6t+Vuk7d678skzlcVfZSe74neFQffqRZ1E2Wt+d4g?= =?us-ascii?Q?N9PVMUikMdoQrXUc7DtI2/8lsasVVVynPLAGMQ5va6NgoyMsh//HnZw2yFcZ?= =?us-ascii?Q?x/PPnbc4oHgNoyPmnsiZxPuW+terM1VCls43Ys1nWycK9kY8T6449pzGtkJX?= =?us-ascii?Q?CwTBx+nr/3at4DhkJHv5eCpMryX9bhRyXpDfyuqc39Pyp9bc0UZXT3Q+DfKg?= =?us-ascii?Q?AIcc/V+6eXKSvU9vTm8dKo+5UNNG6Bcl7s9PSKyZS80Cc59DzcgNdRh8fgkI?= =?us-ascii?Q?DVyB+dTogpFevJ4wnBcviv5Pu+uIiC5JsqoMB/UQbXhSjHndZYKg8Idumltm?= =?us-ascii?Q?MayaN791nV0ueFffVB5en6RidscyxMsh1giP+KGEsRHJWOWXW7TgqfATBWxs?= =?us-ascii?Q?hb8eTCnszZaTQB0nnxDWxy82SYox25xKT8HziI1rPAo3BmW1d2zBspTjWjnW?= =?us-ascii?Q?gKX/3zKlAekV+/befq3gFAotuNsXmiRhj2YW50CaQLfXv0ybPRok0E3dCmPp?= =?us-ascii?Q?j0FW7bkkY8a6NaPwpEOYjXvmiIiidYkeZ1BjaBdX2ERzsMGAHu7X0hkOQE3F?= =?us-ascii?Q?wGD/Kwpsmtedy9c5E3G27NGvRBb+3MFDbFGSKSbBfncXk43GhS/8vqz+RHNu?= =?us-ascii?Q?oZ6Udvps6QHwcI3k+2noowyXNDQucJGgEuPJULvxCUZYFjbKN/TNK5B1Hm/n?= =?us-ascii?Q?UWSnAmyLeTJI1EXwcYEYnwWUyYfduAH02FL2vo82MnTVnLA41XgdxMaswVVz?= =?us-ascii?Q?V8L1fwOkNV2b6XDPwCG3yRDU4y9OGGxaDe3OH2f3JdaNidQrgdirKRNo3iE1?= =?us-ascii?Q?CFxgegX1gov4Jpq2jt5eh3J+k10GlszMsWfwvCgvrgniP0BfbtSXIVMGnSL4?= =?us-ascii?Q?b/auxk5c+HEavoFFmpyctY5CukUf3DHgg2gUtYzyX67Pj7d17zBUhbTNot11?= =?us-ascii?Q?OIyxJgD99pDhMa65SVmqyXR4VEu54MAvYVMom9fdyXQfo7zS4A3RLFr8+9ZD?= =?us-ascii?Q?dKLfiyQRvvdpJXK9xac8uZKbTNrk=3D?=
X-Microsoft-Antispam-Message-Info: jR39lIoGQ1t4f4j/jQjz3ziNQkeT4kQd+xaunWIhor+XcoCNXR03UDanJpK6K3MX7uZs3gqBgnB8zwF3v/B2c4Cuo5sixHVY6akCi6cvkByG+IW7MpZy/rLluUelE8hfZSY64/p+DjqcfNyfRDGlFvdexDk53qwFqBfPUqeZue9mFx9MJVPagQPxi/JJ+0tb8M0c9z2cOihlzNupiILUxffLpzNT3tgLmYYrBJqfJ8WAt7TfAwYGBZiIeFS4jrvDlNa1od2DlG5YENwUE5LbHziFdEwaNUGawFFOQzkxkZbfYMRftL07Xddvq4R8tgj76YWPyOhX9gwyUr2Uqodz08BEjQG32kZU2sstf2Gv0ZI=
X-Microsoft-Exchange-Diagnostics: 1; SN2PR0801MB2205; 6:GDGtunT17vFki+L2vVnLoXBLWud/iHMjW7aHJEnRFWBYc+1JFU3QPxulJTwbC93OYEJyuTjohr1aXXqk8GBK256nLhGauO9ZR5kswyleRDW7KQsy1O4TpgMASVLg0kRn73U00bKzUQ43wFzqhW/M6FouuaL9giIi6Dek4a2COVs/tQPHLjhXifWeyWLX8Cmy9otZdm7N+9BQL1ewPXCFVzVoPofvrakQNXx7N6/dh1AE/V8EIxOM+4HWIDuZTvlV7jweeeb+lX03ZkdE1kOp026OHwtFAG/cyML7o13cCtll6S9EockjjypEaq3AX6D+owDv1J+1mixTc3z+Bv3okqv7ph2ZIwI0BrE5sAais8Nwms9VGuOP+a5Pt6L2nciTqmQTq3GqBUWmW3jCFjOc7FgVxoV9m5PxxvLhtf8TTM+06DHJj+Gf1EDxoJhFMVyCwtIBRtLRPJgxu55ESDDZpA==; 5:z9PFEG/JYLJLb946Zeeih4M2abZouMTahen/AZdZ6zpaR80CEB0QHXDH11wA3P4TKB7+fAqZTAD4dVMdKwU4icvPIesLzYYz7cNrj0zKMSzi2xLwS3nUs05jESPU6q5IgfU5rRfrWXZbsXk9oBfLNdMvk0Hd/p8O31NGXyEpg1Y=; 7:ItVcANQoLa+ew/mLvmbz4M0cZi44m/5PHhEjQNWrvz/xPg2GctXyawWqDIL1xggWsBEb2RHbJXAz6NY+z4bBtbv2mQTGyaKvY1Zjpj4bIFYcZoyp28+u8SD9EoEaUgBWz8HF5uuBdyaXOR2jTVk4Unb/UUcyJTpW43JahthBy2g3TLppImxLyYxzwR6hZirLVZT6IwC+yN3jCzA7JLd2jkZp490y1j3kDZOJcRniNYyqlvVeCNZxKwZFeC5SI4JG
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: aviatnet.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Aug 2018 23:22:42.2013 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: fb1ee6a2-f1e3-47a0-0e9f-08d600aa80ab
X-MS-Exchange-CrossTenant-Id: 8d7d22b9-3890-4eef-95a6-a226e64151be
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=8d7d22b9-3890-4eef-95a6-a226e64151be; Ip=[192.147.115.53];  Helo=[mail-send.aviatnet.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR0801MB2205
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jS7FKaxBdXNgJhIhnEpsAYaMQ90>
Subject: Re: [netmod] EXTERNAL: Module update rules: changing a type to a union
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Aug 2018 23:22:47 -0000

--_000_153411616099919498Aviatnetcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi,


It seems to be that the rule you quoted specifically states that expanding =
the value space is not okay:


   o  A "type" statement may be replaced with another "type" statement
      that does not change the syntax or semantics of the type.  For
      example, an inline type definition may be replaced with a typedef,
      but an int8 type cannot be replaced by an int16, since the syntax
      would change.



________________________________
From: netmod <netmod-bounces@ietf.org> on behalf of Sterne, Jason (Nokia - =
CA/Ottawa) <jason.sterne@nokia.com>
Sent: Saturday, 11 August 2018 3:19 a.m.
To: netmod@ietf.org
Subject: EXTERNAL: [netmod] Module update rules: changing a type to a union

Hi all,

I'm uncertain about how to interpret the YANG module update rules when a ty=
pe changes to a union.

Is the following change allowed?

From:
  typedef my-type {
    type enumeration {
      enum "foo";
    }
  }
To:
  typedef my-type {
    type union {
      type enumeration {
        enum "foo";
      }
      type uint32;
    }
  }

The general spirit of the rules is that expanding the value space is genera=
lly OK, but this case does seem to violate this paragraph of section 11:

   o  A "type" statement may be replaced with another "type" statement
      that does not change the syntax or semantics of the type.  For
      example, an inline type definition may be replaced with a typedef,
      but an int8 type cannot be replaced by an int16, since the syntax
      would change.


Does the addition of the union change the semantics of the type if that uni=
on encompasses the original type?

With XML encoding I can see how an "old" client could easily still communic=
ate with a "new" server for this change. But I wonder about other possible =
encodings that might change when a type becomes a union that contains addit=
ional types.

Regards,
Jason

--_000_153411616099919498Aviatnetcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none"><!--P{margin-top:0;margin-b=
ottom:0;} @font-face=0A=
	{font-family:"Cambria Math"}=0A=
@font-face=0A=
	{font-family:Calibri}=0A=
p.MsoNormal, li.MsoNormal, div.MsoNormal=0A=
	{margin:0cm;=0A=
	margin-bottom:.0001pt;=0A=
	font-size:11.0pt;=0A=
	font-family:"Calibri",sans-serif}=0A=
a:link, span.MsoHyperlink=0A=
	{color:#0563C1;=0A=
	text-decoration:underline}=0A=
a:visited, span.MsoHyperlinkFollowed=0A=
	{color:#954F72;=0A=
	text-decoration:underline}=0A=
span.EmailStyle17=0A=
	{font-family:"Calibri",sans-serif;=0A=
	color:windowtext}=0A=
@page WordSection1=0A=
	{margin:72.0pt 72.0pt 72.0pt 72.0pt}=0A=
div.WordSection1=0A=
	{}--></style>
</head>
<body dir=3D"ltr" style=3D"font-size:12pt;color:#000000;background-color:#F=
FFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
<p>Hi,</p>
<p><br>
</p>
<p>It seems to be that the rule you quoted specifically states that expandi=
ng the value space is
<strong>not</strong> okay:</p>
<p><br>
</p>
<span style=3D"font-family:&quot;Courier New&quot;,serif">&nbsp;&nbsp; o&nb=
sp; A &quot;type&quot; statement may be replaced with another &quot;type&qu=
ot; statement</span>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that does not change the syntax or sem=
antics of the type.&nbsp; For</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; example, an inline type definition may=
 be replaced with a typedef,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; but <strong>
an int8 type cannot be replaced by an int16, since the syntax</strong></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; would change.</strong></span><=
/p>
<p><br>
</p>
<p><br>
</p>
<div style=3D"color: rgb(33, 33, 33);">
<hr tabindex=3D"-1" style=3D"display:inline-block; width:98%">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font style=3D"font-size:11pt" face=
=3D"Calibri, sans-serif" color=3D"#000000"><b>From:</b> netmod &lt;netmod-b=
ounces@ietf.org&gt; on behalf of Sterne, Jason (Nokia - CA/Ottawa) &lt;jaso=
n.sterne@nokia.com&gt;<br>
<b>Sent:</b> Saturday, 11 August 2018 3:19 a.m.<br>
<b>To:</b> netmod@ietf.org<br>
<b>Subject:</b> EXTERNAL: [netmod] Module update rules: changing a type to =
a union</font>
<div>&nbsp;</div>
</div>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Hi all,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">I'm uncertain about how to interpret the YANG module update rules whe=
n a type changes to a union.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Is the following change allowed?</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">From:</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; typedef my-type {</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; type enumeration {</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;enum &quot;foo&quot;;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; }</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; }</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif"></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">To:</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; typedef my-type {</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; type union {</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;type enumeration {</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;enum &quot;foo&quot;;</spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;}</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; type uint32;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp; }</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp; }</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">The general spirit of the rules is that expanding the value space is =
generally OK, but this case does seem to violate this paragraph of section =
11:</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp; o&nbsp; A &quot;type&quot; statement may be replaced wit=
h another &quot;type&quot; statement</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that does not change the syntax or sem=
antics of the type.&nbsp; For</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; example, an inline type definition may=
 be replaced with a typedef,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; but an int8 type cannot be replaced by=
 an int16, since the syntax</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; would change.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Does the addition of the union change the semantics of the type if th=
at union encompasses the original type?</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">With XML encoding I can see how an &quot;old&quot; client could easil=
y still communicate with a &quot;new&quot; server for this change. But I wo=
nder about other possible encodings that might change when a type
 becomes a union that contains additional types.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Regards,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;,s=
erif">Jason</span></p>
</div>
</div>
</div>
</body>
</html>

--_000_153411616099919498Aviatnetcom_--


From nobody Mon Aug 13 03:08:21 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07320130EC1 for <netmod@ietfa.amsl.com>; Mon, 13 Aug 2018 03:08:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MdtPZfV2--JM for <netmod@ietfa.amsl.com>; Mon, 13 Aug 2018 03:08:18 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 97CC8130EBF for <netmod@ietf.org>; Mon, 13 Aug 2018 03:08:18 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id 2B3561AE0144; Mon, 13 Aug 2018 12:08:17 +0200 (CEST)
Date: Mon, 13 Aug 2018 12:08:16 +0200 (CEST)
Message-Id: <20180813.120816.949834847603219014.mbj@tail-f.com>
To: jason.sterne@nokia.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/yQSrlqFnrMEibLwuzMkyWt63kXQ>
Subject: Re: [netmod] Module update rules: changing a type to a union
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2018 10:08:20 -0000

"Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> Hi all,
> 
> I'm uncertain about how to interpret the YANG module update rules when a type changes to a union.
> 
> Is the following change allowed?
> 
> From:
>   typedef my-type {
>     type enumeration {
>       enum "foo";
>     }
>   }
> To:
>   typedef my-type {
>     type union {
>       type enumeration {
>         enum "foo";
>       }
>       type uint32;
>     }
>   }
> 
> The general spirit of the rules is that expanding the value space is generally OK, but this case does seem to violate this paragraph of section 11:
> 
>    o  A "type" statement may be replaced with another "type" statement
>       that does not change the syntax or semantics of the type.  For
>       example, an inline type definition may be replaced with a typedef,
>       but an int8 type cannot be replaced by an int16, since the syntax
>       would change.

Right.  I think that changing from an enumeration to a union changes
the syntax of the type, so this would not be allowed.


/martin


> 
> 
> Does the addition of the union change the semantics of the type if that union encompasses the original type?
> 
> With XML encoding I can see how an "old" client could easily still communicate with a "new" server for this change. But I wonder about other possible encodings that might change when a type becomes a union that contains additional types.
> 
> Regards,
> Jason


From nobody Mon Aug 13 04:35:12 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B13D2130E95 for <netmod@ietfa.amsl.com>; Mon, 13 Aug 2018 04:35:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y66Prues_u2K for <netmod@ietfa.amsl.com>; Mon, 13 Aug 2018 04:35:08 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00116.outbound.protection.outlook.com [40.107.0.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92EB7130EDD for <netmod@ietf.org>; Mon, 13 Aug 2018 04:35:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kJMCjX6sgD+QBQ8FQN9r8cNBt/T1nx42TRw+umo6JBE=; b=S99I6EWNblt0whxd3W/1jU1RUQgHS9cGNynbqXjyxJVVeqwWtmTujD3Vr+p3CoMGuH2F8Bx15BgTpa8XAZ/6zAENWBZVd10WReRCzDlKEcrwG409qUd+65Bk2pAi6x04TqIANUjRni6/3RlhHo5lFQheNIoAPEvi64c84wxGVGQ=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB4541.eurprd07.prod.outlook.com (20.177.56.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1059.13; Mon, 13 Aug 2018 11:35:04 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1059.010; Mon, 13 Aug 2018 11:35:04 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Module update rules: changing a type to a union
Thread-Index: AdQwu/McZzPv597ySjipjOU6kpIpKgCMZowAAAMA6nA=
Date: Mon, 13 Aug 2018 11:35:04 +0000
Message-ID: <VI1PR07MB39813B8154587F972FC413889B390@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB39818C462606D318A99672B19B240@VI1PR07MB3981.eurprd07.prod.outlook.com> <20180813.120816.949834847603219014.mbj@tail-f.com>
In-Reply-To: <20180813.120816.949834847603219014.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [24.140.239.90]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4541; 6:AGn4HSleYFOTKG+RmpS/7HIrnAN+vLW7wnBfz6Sq1jZGrSQf2d0sUNhvJp3RgXhIZdYpmTJPTO5Ns5J5p80oLJ71VpprNsGgZNt1F+PJYvkDdHekGFDp73lDm/4/+deRv8jq9V0mUqQcQVS1FnB5piZUTZL09HnjXieGP62qTNPfj5xE+nJEkAe2QbPll3JKZ+iFvVfRlvGPWAhTAyNXM4U0gAeNGMtvUO3lIwldrE8hrwuJUOtKk1hHWxJwXGqwj6hj5dnQ/hUHdD2XpKvrnvo5HE5yTN5siYKPNuAIeEHLZuCwMKergBmD/blDN74Tzr9n0X2kISt3CkBbg65GSok39/VksqrQjq2hG/uqWcpJuNOrBLZZEuXObUsHmC7oeEa2vU0RdX3wk4O8qRJwEoJWhGwnOyk3hRoix1l9Jx87nDSikItWKe28ra9HVYbME5+0XlyQhIowoJsHVLCFvQ==; 5:v2KW+xTXtEWFadp6/JATza7VoWhOSC5B7QsQPrkkgSxW1aK0e0gmy8fNZizsxa655Y4w9s9B1Dh8DAquwLYJR810Yfyx8TszMQ1rgJDhekDtkWCEP4I5c6u8pNRYWz3zvGEpNyNhQtUZ1JTQOgMBmRW6FfD/+lmA7ihYIH5QTAw=; 7:A2jHTKYwtpyJhuJMOaBMkXjpfGhNeulJykOvVSAldgAaGQsxBssB0ICDkd2/PudKkp2RMPkUAcKqeWevcr2mK3MOwCqFyopyocwQk8QWLqkOM+eDSN5feg1FX7AWvEQ9ph+eOsfpVPkzd21vXMoMtUyF1gZYDTyR6sJaS/q1seVH9gWG28DYwejJrdmeL6ARgD1dsKsK853nXRVL3FROFmBl7/PvNnT9lNBBdiJ7haelJSEOKOsvHjEcP3FrCwyT
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: f0cc9425-8532-4e1f-9aa1-08d60110d015
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB4541; 
x-ms-traffictypediagnostic: VI1PR07MB4541:
x-microsoft-antispam-prvs: <VI1PR07MB454167047FE7E836BF55AF849B390@VI1PR07MB4541.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(82608151540597)(109105607167333)(195916259791689); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231311)(11241501184)(806099)(944501410)(52105095)(93006095)(93001095)(3002001)(10201501046)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(20161123560045)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:VI1PR07MB4541; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4541; 
x-forefront-prvs: 07630F72AD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(366004)(396003)(136003)(39860400002)(13464003)(51444003)(189003)(199004)(53754006)(105586002)(66066001)(53546011)(6916009)(14444005)(53936002)(256004)(4326008)(6246003)(97736004)(106356001)(99286004)(186003)(76176011)(478600001)(14454004)(316002)(6506007)(102836004)(86362001)(2900100001)(26005)(446003)(7696005)(11346002)(7736002)(486006)(476003)(74316002)(8936002)(81166006)(81156014)(8676002)(5250100002)(305945005)(25786009)(68736007)(15650500001)(55016002)(3846002)(6116002)(2906002)(5660300001)(6436002)(9686003)(229853002)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4541; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: bqfWF+KNucEfKfEoN6w4Mzl2vIPajFoOyjBx4ZPfpRl+2r2q5nwayxvbh5m2BA6FUfaNhU+1l4TQzqJLi+/2JIcS4xM49zaVfxFmGLNEsS6NxRTFmSr17dGcY5lDxxGI8H6JVt9FOZUzQI4FJMdPcA4TKJCia0SVozinFFwmeF/BIk2H4O58wQGpDLC+GhLITt22AX00Glz3Jb+tGHKyoGcfAJ0+eglasSlL5sZTe80xiIselpEM8drpOd9I1ThJ5MJNFhP3wHSrjdX/fIgWBs5BGTtHSDQrz29syZwzpDDunFxXfVmi4/J4piYUn2yR7ZN9WMXOZFQuh4KrmJJP0sWW+gUpA1fCLAa6kEazbs/gngGC/19slkKUJliTsZwfmvPAgaCWXI75rGeqD/mUfw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f0cc9425-8532-4e1f-9aa1-08d60110d015
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Aug 2018 11:35:04.0524 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4541
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/eJjcn-PuHUJm3YbtvpKqxBTS1TM>
Subject: Re: [netmod] Module update rules: changing a type to a union
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Aug 2018 11:35:11 -0000

OK - thx Martin and Alex.  It seems the conclusion is that changing a type =
to a union is not allowed.

> -----Original Message-----
> From: Martin Bjorklund <mbj@tail-f.com>
> Sent: Monday, August 13, 2018 6:08 AM
> To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>
> Cc: netmod@ietf.org
> Subject: Re: [netmod] Module update rules: changing a type to a union
>=20
> "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > Hi all,
> >
> > I'm uncertain about how to interpret the YANG module update rules when
> a type changes to a union.
> >
> > Is the following change allowed?
> >
> > From:
> >   typedef my-type {
> >     type enumeration {
> >       enum "foo";
> >     }
> >   }
> > To:
> >   typedef my-type {
> >     type union {
> >       type enumeration {
> >         enum "foo";
> >       }
> >       type uint32;
> >     }
> >   }
> >
> > The general spirit of the rules is that expanding the value space is ge=
nerally
> OK, but this case does seem to violate this paragraph of section 11:
> >
> >    o  A "type" statement may be replaced with another "type" statement
> >       that does not change the syntax or semantics of the type.  For
> >       example, an inline type definition may be replaced with a typedef=
,
> >       but an int8 type cannot be replaced by an int16, since the syntax
> >       would change.
>=20
> Right.  I think that changing from an enumeration to a union changes
> the syntax of the type, so this would not be allowed.
>=20
>=20
> /martin
>=20
>=20
> >
> >
> > Does the addition of the union change the semantics of the type if that
> union encompasses the original type?
> >
> > With XML encoding I can see how an "old" client could easily still
> communicate with a "new" server for this change. But I wonder about other
> possible encodings that might change when a type becomes a union that
> contains additional types.
> >
> > Regards,
> > Jason


From nobody Thu Aug 16 04:51:46 2018
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26CB6130F17 for <netmod@ietfa.amsl.com>; Thu, 16 Aug 2018 04:51:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.187
X-Spam-Level: ***
X-Spam-Status: No, score=3.187 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RATWARE_OUTLOOK_NONAME=2.95, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G4AuG3OHPvau for <netmod@ietfa.amsl.com>; Thu, 16 Aug 2018 04:51:42 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10113.outbound.protection.outlook.com [40.107.1.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1649B130F1C for <netmod@ietf.org>; Thu, 16 Aug 2018 04:51:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p9uVqqqvSwpKpfmCzqbGs7dKRhWCgyaJfa0hu5Cr1Os=; b=X3wpxkDUwr2CiODp23KYM/VprbWCXhDlt3x7u/PQlafFkNjK4AHzpito3K7DZeDag+O/wvNQCJrpLLfEnonu877caO37IpAHPvg6eiIEt6qb2gWS1Eqc/f0NOCY5YX1AD77IoTm55uwX0Ym3QO6iiACH7C8vKU4tMBI0tEPwA58=
Received: from VI1PR07MB0831.eurprd07.prod.outlook.com (10.161.107.154) by VI1PR07MB3486.eurprd07.prod.outlook.com (10.175.244.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1059.10; Thu, 16 Aug 2018 11:51:39 +0000
Received: from VI1PR07MB0831.eurprd07.prod.outlook.com ([fe80::715f:f4a2:caef:d939]) by VI1PR07MB0831.eurprd07.prod.outlook.com ([fe80::715f:f4a2:caef:d939%2]) with mapi id 15.20.1059.017; Thu, 16 Aug 2018 11:51:39 +0000
From: tom petch <ietfc@btconnect.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: IANA Considerations
Thread-Index: AQHUNVd9D5dW4VfrAUyctAMpV7x6GQ==
Date: Thu, 16 Aug 2018 11:51:39 +0000
Message-ID: <07ba01d43557$064ca460$4001a8c0@gateway.2wire.net>
References: <98a58631-0c57-7ed8-5277-5dcb3ee9dd86@nokia.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: VI1PR0601CA0030.eurprd06.prod.outlook.com (2603:10a6:800:1e::40) To VI1PR07MB0831.eurprd07.prod.outlook.com (2a01:111:e400:508e::26)
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [86.165.128.211]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB3486; 6:7cRox+S8DqrH2QcJ4un9saEsj7yZXq+zr5kvs5OPAFrYlNq3WlofngGz+gKs2geqPgX3DUZcS2P0CcQ7Xp7J1ygBEinTVwifxAxDaQ3sVhwWzyBXxqJFyy1Ks3Qma83jHlcSgWdDg7h7rwLjzDf/sniaYzFr0gTn4spgBRiQuLMKu0iK2Z7FDA2iie5X4tSRIsR7FoNVvEMVmbLFKZpUuijUQavHEQZMzZsP0JQ2kMmwd73qUKbe/T/xpABhQro4023bT/vaha6Z9/zG0z7zyjeDcfyVN+QJszTU2CSRQGHdzKR6hgPz/e/O3lxbbBW+kw/dzYArf8wwS+XOywS3/bI/CVCQKQL5BpdUq6TICdtFU3J0cvMjsrQNVbCokFMPeoehAxPqjgRXMidyWuJ0lKHuoiw2tekkCf+XcdiOSduPDW+ZkNOP54P4HE12cX1Wm/M3sPAFOS6otnxU0JggCg==; 5:qSkZjGEzv3DE2qS3PBKrF+i6r/glWyZoG3xPp0CW+GNGQFQKLjDaSjVP9oKDw8ybYtv+Il1AVaNgNuJagK4LE8Vw+B2LP+W3uv26lleUnwh73k4qDLle+hbSu5WnKARdKJQeBN50Q746dGxiKU4+9aesvSlQTM+XnNHhtksSJ9I=; 7:6oXlyebYzBxHLJmAZeJBTduyUE73K21iZWWSYZvgHDDX440ADSXDYLcgFQgcrq4zhuGMUL4udcUd8GpwnjKK/1BBj0EIcX6cB6BGHT6yUkgAClNq6WmFI63SoBH69b40OB8ht9oKjO0COR6Q1x1ijbI9TlYytf0VuPHzzGGyf4+v+SsnPk3UD5ps835Br0MBh38WgJbxOg1JuaDzdS/ruCnxnipT/DzukR1iaEaWVuj33JCn0qFxRX4iNn7pb/4v
x-ms-office365-filtering-correlation-id: 5be834d7-7d02-47a4-5376-08d6036e9fbe
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7193020); SRVR:VI1PR07MB3486; 
x-ms-traffictypediagnostic: VI1PR07MB3486:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-microsoft-antispam-prvs: <VI1PR07MB3486D1B70650CDB0EAC4A97CA03E0@VI1PR07MB3486.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231311)(944501410)(52105095)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(20161123560045)(20161123562045)(201708071742011)(7699016); SRVR:VI1PR07MB3486; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB3486; 
x-forefront-prvs: 07665BE9D1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(366004)(136003)(376002)(39860400002)(346002)(189003)(199004)(81166006)(26005)(81156014)(7736002)(305945005)(2501003)(99286004)(106356001)(105586002)(5250100002)(2906002)(1730700003)(7116003)(5660300001)(2351001)(476003)(316002)(8936002)(486006)(25786009)(84392002)(8676002)(6512007)(9686003)(66066001)(33896004)(14454004)(1556002)(221733001)(446003)(44736005)(6436002)(76176011)(52116002)(478600001)(3480700004)(6486002)(68736007)(256004)(86152003)(6506007)(6916009)(14496001)(2900100001)(186003)(386003)(86362001)(53936002)(3846002)(97736004)(6116002)(102836004)(5640700003); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB3486; H:VI1PR07MB0831.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: /Zkyf6GyI9nYKImhU95bCIjvdvx7pKiOQDm+OOUW3AQ+D/4wzbzOL4lBkO7wlOgIARuUe068jTplqH4/3lFPQsdb75qbKKK1DP1rjrfNGuClMgKga5cDL+Ce/3dco+mG6tYIl4SbJh4x/6sVvOKcazV86RXBPPuQLO7PTH4pk6FwWYUMJhJDvfCfR3r6JKg6uEX+u/uRpBO40RIha37rMbFILGEStrS4h6QRq4IBLAFynNjs58OUug9Nifiltqmn8Da8946Na6qI64fp1K+88CZvExrwxEEFaLXK3xMxe3jRSEPRDF2f+Q1NWI9kyvQnZq6hxA6qs9r55YbX5AcUoA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <F422908DF6E58B4FBDE79CE99B41570D@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5be834d7-7d02-47a4-5376-08d6036e9fbe
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Aug 2018 11:51:39.1658 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3486
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9BSn0e34eFoDvUqKHXlMkE_1Id0>
Subject: [netmod] IANA Considerations
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Aug 2018 11:51:44 -0000

I see that some recent YANG module I-Ds reference RFC6020 for
registering a YANG module name, others reference RFC7950, and did some
homework before suggesting that one or the other needed changing.

The IANA website refers the user to

RFC 6020, Internet Draft draft-ietf-netmod-rfc6087bis-20

draft-ietf-netmod-rfc6087bis-20
points the user to RFC6020 and seems to add nothing to that.

RFC7950 points the user to RFC6020 and seems to add nothing to that.  In
fact, the IANA Considerations section of RFC7950, unlike that of
RFC6020, is not helpful on this point - the relevant section is 6.3.

I conclude that the better reference is RFC6020 (and that the IANA
website might be clearer just referring to that).

Tom Petch


From nobody Thu Aug 16 05:01:00 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 229AC130E7C for <netmod@ietfa.amsl.com>; Thu, 16 Aug 2018 05:00:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gnnENu9mhNe4 for <netmod@ietfa.amsl.com>; Thu, 16 Aug 2018 05:00:55 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id CD14C130DC5 for <netmod@ietf.org>; Thu, 16 Aug 2018 05:00:54 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id 856BF1AE03DD; Thu, 16 Aug 2018 14:00:53 +0200 (CEST)
Date: Thu, 16 Aug 2018 14:00:45 +0200 (CEST)
Message-Id: <20180816.140045.2220594458012874135.mbj@tail-f.com>
To: ietfc@btconnect.com
Cc: netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <07ba01d43557$064ca460$4001a8c0@gateway.2wire.net>
References: <98a58631-0c57-7ed8-5277-5dcb3ee9dd86@nokia.com> <07ba01d43557$064ca460$4001a8c0@gateway.2wire.net>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/X7-El2962GoXfJWHNe-UY_OrWMg>
Subject: Re: [netmod] IANA Considerations
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Aug 2018 12:00:58 -0000

Hi,

tom petch <ietfc@btconnect.com> wrote:
> I see that some recent YANG module I-Ds reference RFC6020 for
> registering a YANG module name, others reference RFC7950, and did some
> homework before suggesting that one or the other needed changing.
> 
> The IANA website refers the user to
> 
> RFC 6020, Internet Draft draft-ietf-netmod-rfc6087bis-20
> 
> draft-ietf-netmod-rfc6087bis-20
> points the user to RFC6020 and seems to add nothing to that.
> 
> RFC7950 points the user to RFC6020 and seems to add nothing to that.  In
> fact, the IANA Considerations section of RFC7950, unlike that of
> RFC6020, is not helpful on this point - the relevant section is 6.3.
> 
> I conclude that the better reference is RFC6020

Yes, the YANG module registry is defined in RFC 6020, which is still a
proposed standard RFC (not obsoleted by RFC 7950).  RFC 7950 does not,
as you noted, take over ownership of the registry.

(this procedure was discussed in some detail when we did RFC 7950)


/martib


(and that the IANA
> website might be clearer just referring to that).
> 
> Tom Petch
> 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
> 


From nobody Fri Aug 17 11:06:43 2018
Return-Path: <session-request@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BF8313102D; Fri, 17 Aug 2018 11:06:34 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: netmod-chairs@ietf.org, ibagdona@gmail.com, lberger@labn.net, netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153452919412.18067.12616140019299764255.idtracker@ietfa.amsl.com>
Date: Fri, 17 Aug 2018 11:06:34 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/WECBCi0D1cyiI7L0J8kzYYu4RZo>
Subject: [netmod] netmod - New Meeting Session Request for IETF 103
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Aug 2018 18:06:39 -0000

A new meeting session request has just been submitted by Lou Berger, a Chair of the netmod working group.


---------------------------------------------------------
Working Group Name: Network Modeling
Area Name: Operations and Management Area
Session Requester: Lou Berger

Number of Sessions: 2
Length of Session(s):  2 Hours, 2 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: netconf
 Second Priority: teas i2rs anima rtgwg
 Third Priority: saag


People who must be present:
  Lou Berger
  Joel Jaeggli
  Kent Watsen
  Ignas Bagdonas

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Thu Aug 23 01:48:33 2018
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99B65130E48 for <netmod@ietfa.amsl.com>; Thu, 23 Aug 2018 01:48:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.586
X-Spam-Level: 
X-Spam-Status: No, score=-3.586 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.723, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=NkS1BC4Y; dkim=pass (1024-bit key) header.d=ericsson.com header.b=PF0gAuHH
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJFZ_0jnY0xK for <netmod@ietfa.amsl.com>; Thu, 23 Aug 2018 01:48:29 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECF05130DD1 for <netmod@ietf.org>; Thu, 23 Aug 2018 01:48:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1535014107; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=B3zxcUTfKENjR4m8MOpA1q6+gj8X3AgQcM+UeBB5zuQ=; b=NkS1BC4YFxQuthx7sfq7FDZP1vPMmc2qHdAiYdAb5hUVxUT3uyxR6+0W13R4ZSZ+ NVRvDcBhEY7zwGvY5w868g8xBOQrm92V5cvNSowltqMZzpXOXI5Mu/UiW4cgGYvl GJHn3jNLHIzYWZETQqXrPs2J75Ki4r1OfSDXQfBAuls=;
X-AuditID: c1b4fb2d-5ecb19c0000055ff-82-5b7e74db3611
Received: from ESESSMB501.ericsson.se (Unknown_Domain [153.88.183.119]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id D2.C0.22015.BD47E7B5; Thu, 23 Aug 2018 10:48:27 +0200 (CEST)
Received: from ESESSMB504.ericsson.se (153.88.183.165) by ESESSMB501.ericsson.se (153.88.183.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Thu, 23 Aug 2018 10:48:25 +0200
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (153.88.183.157) by ESESSMB504.ericsson.se (153.88.183.165) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3 via Frontend Transport; Thu, 23 Aug 2018 10:48:24 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z8lswmhXHt9SsvVB4iIFeyl9Gl+aQVf1jHO+JAK5xsQ=; b=PF0gAuHH2UobK/9dXRtUhQrRxfW4Y9Mezme+1Qo3nAEQu7/CrglJ1ZGlpjCjkxpqLiZ8guRY6e+U7k9FnQ1hGcRLFpSQIdN6HW17iG8BWkSUwCHU6xwL6tyC/4F0zl3pg2f99/B8gkQwUhexaXFbT8dCVCs4Uvng6X1OZx08rAw=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
Received: from [159.107.196.240] (89.135.192.225) by VI1PR0701MB2736.eurprd07.prod.outlook.com (2603:10a6:801:8::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1080.11; Thu, 23 Aug 2018 08:48:23 +0000
References: <153230555695.23069.11514685954663665890.idtracker@ietfa.amsl.com>
To: "netmod@ietf.org" <netmod@ietf.org>
From: Balazs Lengyel <balazs.lengyel@ericsson.com>
X-Forwarded-Message-Id: <153230555695.23069.11514685954663665890.idtracker@ietfa.amsl.com>
Message-ID: <7e8a4e1d-4a15-91ea-0f5d-766b40a7bb39@ericsson.com>
Date: Thu, 23 Aug 2018 10:48:17 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <153230555695.23069.11514685954663665890.idtracker@ietfa.amsl.com>
Content-Type: text/html; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Originating-IP: [89.135.192.225]
X-ClientProxiedBy: AM0PR0202CA0028.eurprd02.prod.outlook.com (2603:10a6:208:1::41) To VI1PR0701MB2736.eurprd07.prod.outlook.com (2603:10a6:801:8::20)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0516ae99-4e98-44f5-3d2c-08d608d52fb9
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:VI1PR0701MB2736; 
X-Microsoft-Exchange-Diagnostics: 1; VI1PR0701MB2736; 3:CV7CVeIBj24ceL/bedYJIhzCbWFigO8aitpTX/hvLUIA/jYlG5Hq+J9o4qRU4aM1JwudOmeerC1DOj/D2RcdBpaeAxlOM2V7HlyFmcDVZzNmGhMcV8+nQg74WsJYg0j9xm6HBoABvE5HPq65+ROvi2QFROQJdaZGV1QVEXUH7oPUMFvdhWpsJX1Scaq2IyrlwjydueN2L/jFSaizJrYlyG0Dsxlx15Cj8gLbHxu3oOYO8sHXnpW7pHOGeIo+X40k; 25:7PcD8nXG2OFFeS9lvUL2PsyEcYnw0S+7oQ7LNt8t3LVGtNjTyvta01fETBMsoelhTgJEIzv1ZNi1b14GijcreVtqth6X7QlPprtgjfh6wd3o+o6UkbqrcyCwJVOI/O5wXC/XRKWTfjQ3rm2Z6LEByabEOStpnIdPKhSvRCpgDTdiFWX7yakE3vCQi8BPNMeU+C6ApGItKMGge/VxMvVYDBAoGQDXeI6YsrdsZvaqlALaGcpIDcPfRyKJj7mXy/ZMyWXHuLFtHGlxJHWHxtnzyt5RjFp+MDLR1K8Q3seX0ODb6TKrw2e1fz6kWLBXo1g3CA9JU3/+QB4e2mOuyw5nTg==; 31:iRS013TKfUtPE0v4JbEFFEi8qYUQdyzToxdomHG44VtvJhYgt1l1jye63ePhHQxgeoVeol9TKkKTsH8BzsH1075JHaH3luA6mC/rKb2WaqoNfOHafu6jmgpAGO6mvcTP0WSLxqZVk1t6WSLL9JnA6pnpJMI7CPz/f0iGLOVR5bqAXm5UbxX7xRe9jFbt7CuOKC+U0myvXBsO8hEFkgGmUP6uo4Mtv4W6GBeYGup3ipw=
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2736:
X-Microsoft-Exchange-Diagnostics: 1; VI1PR0701MB2736; 20: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
X-Microsoft-Antispam-PRVS: <VI1PR0701MB27362A52D2DD6EF063F8AA17F0370@VI1PR0701MB2736.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(37575265505322)(158342451672863)(120809045254105)(95692535739014)(248295561703944);
X-MS-Exchange-SenderADCheck: 1
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231311)(944501410)(52105095)(10201501046)(93006095)(93001095)(3002001)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(201708071742011)(7699016); SRVR:VI1PR0701MB2736; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0701MB2736; 
X-Microsoft-Exchange-Diagnostics: 1; VI1PR0701MB2736; 4:Z1TaX8t2mLp+lxolsC1o8h7Lkde3X+9bR+XRx50NHfFGV2cY8i4U1C3OGoVk2ErN6cT8V1G5QRccuupnshsaTm7UVYmDPMANcBqII33pdIBZpT39Md1r5LRCEml/FHiv88AEKzZpRiN69wM1iVD3JOxIeXS6GAwQ6r3PldfQqdZGY+9QgjXptdxmt5E7gw3NqrnpVsHpePxWyk526BFK5kW+HJVIGA93+8B+J2TBOgubbBj1pE9gqfL7Qd/vfxlYJG+KP3nOzvCJtwFS+p7LK0qIXvCOTp+BNCnJivG5F+Q25zcTZPNeUFgtKxDhEpr0Q36OgrrmLwLXG7cyBEytm1GkgEOI0YEkMcArCHlC/eJX685mpP6rmzrqLOC6LnzQPnWAbfX+/d4oWQkTpPPRXEhDNwqJQfhqjp/4c2D01jKn/oNvegboTjMLUOiWgxL/cJdIi+LBs7chGlFkM5My7Q==
X-Forefront-PRVS: 0773BB46AC
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(6049001)(136003)(39860400002)(346002)(366004)(396003)(376002)(199004)(189003)(252514010)(2351001)(5660300001)(65956001)(106356001)(66066001)(105586002)(65826007)(65806001)(3846002)(6916009)(25786009)(7736002)(2616005)(956004)(966005)(6666003)(31686004)(6116002)(49976009)(8676002)(16526019)(386003)(478600001)(186003)(26005)(64126003)(15650500001)(81166006)(81156014)(1730700003)(52146003)(52116002)(446003)(16576012)(31696002)(2486003)(50466002)(23676004)(8936002)(36756003)(316002)(97736004)(76176011)(68736007)(2906002)(44832011)(58126008)(6486002)(86362001)(486006)(11346002)(606006)(5640700003)(2501003)(2473003)(229853002)(230700001)(54896002)(14444005)(476003)(6306002)(23846002)(53936002)(236005)(78286006); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0701MB2736; H:[159.107.196.240]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
Received-SPF: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtWSTFQUjA3MDFNQjI3MzY7MjM6Y2oxUVNaVlNLaU0zZFFvczFHUlFnRjUr?= =?utf-8?B?bTIzRkNjL0lyalRacm1KSFoydHozVzhsWEFJaiswYnZ3aHQrdG9EQytuUEVB?= =?utf-8?B?QUQweXAzS3czSFpkbnR4WGNualFoZk4wK0Z1ZVowYkJXOW5ZVE5HQ3FtNUlT?= =?utf-8?B?OUhBWUMyc1dLUlhLa2xKMDFYYnVMcGg4YnV3QWhJRyswMVJBUmZ6aDlraGhI?= =?utf-8?B?QXJEQjh0c1NFTGVhdnhpVkhWb2dPR0hXTER2eGd0RmVWZWZWamlQN3BxN2RI?= =?utf-8?B?ZDExNlFyZk5PbmRXQ0xlc25FMXlVdUkyWjNCVTM4Q292Y0xGd1dWcysxWi9k?= =?utf-8?B?RC9rQjJFU295TUdWVk9zbnR5UVNMZ3RZd0g5YjFQaEVmN3Zoa3QvU0lKUC9S?= =?utf-8?B?ZlZJVzRTVWFMUUlxejlkejN0MmhpWEpJUWlRc3g3elBKcFpwQklPazhmOVly?= =?utf-8?B?ZGIrdlRUU1JWYVp5YXZNZHovYm92NG1LQnZ2TnNOUXhNaHk2N1RHVDRTY2lr?= =?utf-8?B?R3pyY2kxREF6VUNuNWxheElTamEzT05YS3ZkWGRqOVdjQ0hCS082bFh4dkxw?= =?utf-8?B?K25oaVRPZHJpMlh4RW95V3luVFhLZzRwdEFyc3RKdEttT0ZvRzdoczNJRWVt?= =?utf-8?B?b3JVUzl0VlNCY0N5M3ZBQWJIbkNWWGgyaHpFMG5sb3JFQXBVVityTHBxREZ1?= =?utf-8?B?M0hpdXB4RGViNG5lYjY4VHdCNFhyOHNVWnY3TVRYandTNHBWV2hUUzYzT2Q5?= =?utf-8?B?aHBqSm1wTzJjVVdtcFAveDZ6VDRtT09WWUF3Z0NyMEpZd0FnOGJQN1lQMGpq?= =?utf-8?B?R1JQQk5hMXFRRFRFM2hMaDZLZzZnQWVTV0hQZTkxZzJYNlM2UkdtRTd6bnBn?= =?utf-8?B?bHN5OHUxNWxvWG1leGJFL0hZamovZTNaUmxIS2Jwd05jK0hlYzBmMDZJczVC?= =?utf-8?B?WjAwUHJoUi9Sb2NpWG4yTHVET2Rha2xCSUZQdmJhRCtISUpnQmV6UnN1R3U1?= =?utf-8?B?N0tTSlRQQkFtKzBwbThxang1ZmM1eVRQaU9QYmw4MGFiUEFrKzh1cTQvblpK?= =?utf-8?B?WEpqVlhOdnROWHJBN05FcUp0cFE0YXNURWhtZ1hxK0xxakpRQXBuZG1lWnhr?= =?utf-8?B?cnAxZ2VEZHo1TlZKc3MxOUEzU29OelRWMVU0N20vVWNLVmJVVkhmY3ZRNzIv?= =?utf-8?B?VDFxQjg4UTJWRjdGM1p0NEN1djh1c3FZdEhRUnNJYldiMElPbGM1SExoUWMx?= =?utf-8?B?RlM0cFI4aGlVN05TZFNiSHd0a1d3NTk0RFFYeFRRSXRMaXkzaWsrLzRnV1Js?= =?utf-8?B?R2IyZWxZK0o3QnJxY0JvTm1hZi83YmVIUkUxT1lJMStXVXZRMitMbzZreE5R?= =?utf-8?B?cjhza1d1akdQR1JISituNTRiZkh5aWgwWldBY2FLS09YdVU4VXdVMHdXU1Mv?= =?utf-8?B?QjJsOEk4emV3ampEMVNNT2NCTFZOUjZaNkRGcm1oeFg1VVJrUFh0SW5PWDEz?= =?utf-8?B?SkprVzQwK3Z2VUl6SDFRaXhLSkEzc3ZGNWpqRkJvK0lSTWhRR25yMFpKSit6?= =?utf-8?B?Y1dxb3V5VXVEZlRaSXhOdDFGa3VkWlJQSVJZQmNQcDEyNGxlS0tsbmFOdjJT?= =?utf-8?B?d3M2dzhpLzcrRTZwWnUycUVuWFpFaEhNQjM5VW1uZjVaUGhTdFozaFVvKzVv?= =?utf-8?B?aVZLRDNlOGVRS3cxc0gvSXYxYzhkUGtrNmFxTWJLaVBmQWVyTnFvVWd5d2JX?= =?utf-8?B?cFpOY0VJZWRYSkthQ3R0QzNYZmd4RngxN1BMenVxc3R0d1M1TDhMK0owR1Vk?= =?utf-8?B?akU3SGt0b0tleWxGOUp6VVJRSWRsbGk5MmJ3c1V2RmZYcEYyQWhRc1hYellX?= =?utf-8?B?L3YzbHNoZlFLblpXdWtpdlQ1clEyaXJERW9GbGxOUjZwRDR5UTVDQjBpVWhY?= =?utf-8?B?bVlnRCt4bUJsMjRycGhYQW1RSEZLNkJaemwwOW9YRTlrVDNmQjNlMlVIcGhC?= =?utf-8?B?bG5TM0s0SThhRUxtSHQxU2p3eVZvYkIrTkNRNnFqRFBXVjFRcGY1UEJ4aFU1?= =?utf-8?B?Z2VkUnZYMHJxOHVNb3FFa0NMbmk1Ui9ldnRZVFBNdW5yV2hCT2dwU29WdS90?= =?utf-8?B?dGU5by9ZemxsdkhSL3kvVkpTcHVpTG9SMktoNXh2TXkyWUl0OExoVkROUncy?= =?utf-8?Q?nlKJLMzF2qkIIYjGZETU/iYSmKW5SWDtfu2pJSfOvVls=3D?=
X-Microsoft-Antispam-Message-Info: 3H/Cf+Kox0SVU9Hc0NCvSUTPoV7mG6oM7lH3W4WyE5kMEynY7EQaGL9Biv6rHh0i/dhikWKBEOAtbadPIx9MqB7GrjeWu+NNuXpmJ02ukUpAYH7IP4zDPngp4KpRfaHtdgI6CDlcsqJoaRc7i3tAPWlLthhzXZGxEpHew32v7+e765pvIPEQ1qknHYroPWm/IiR7O8BIHXJ+4FxBaxY+DH3bhPrQmRTHuKpjPrh4a8qnoL+M+PWGCyRpkSwA9h6rNi61rfPhQL2mNxF4XNxrvRDrcqOMovtrRfy0axtDzSPiLS4eev9Xu/GcF2zUbiayt9KErXOvpxJ1yMi5ZSJY6SjQZOpa4pi8/lQgzW/pjo0=
X-Microsoft-Exchange-Diagnostics: 1; VI1PR0701MB2736; 6:IJjodAmAxids7yiqhqsCfjkCcI/adrFZ1J8J+bKerj9UUzfJkv/GT4ngbC/iwjUyJVAc7Cmi25hvNI8D/Lj4SX8YuBzljC3CsaaeM//mU4c2uX3oFLAsIE51/9dra0rM3tkcosNXGiFWZTwMy4JvNxO48RROL4zpjXH23QINmeELrV82Eol512+QWtq9PpCRFLMJe3hxRgxfKNhO445kApvP6MDfaGix1cElCLWvQvx+ct/DgopdT9zTkgbe7y9SFYCNbgDzza26Z3k1uiyHg3gf/6yx6xvjVVQHRb1toFoTyTLwycHWQlvswT+nCIGYGX30KyaDpWHMfbkzur8MA8nbPnbJZJvjBPDlJI0ZIlRNoANWROzJUZb0iE1rQj+az5aNQy0aCOaPEpwyx0vtkGMWEwP5ASmYt/70KBbMMQkjEl92LshsY1VTRzPkmodaTl9iDEEe/vVDtDxJMJSKAQ==; 5:P6gBZkWl2IM4+Qv6ENdaVs4fWwAf1+5YVZ+I2a9yziV+UUAMW6K0IfNfnwcw4r8eNBhaENxgVLWeBBNcrjBJTqcsFKoG+t8fUip7wXl21Fsn3HEXFId0maW3I6yLX5cTO8/m/iAvtAqvR71y6HWVRS/NHVjSwQZ3tEBzKknMkx8=; 7:U+m2JcoTYm0s86TgpcLg56nkkDwBEJN9ReT3VStaxB0qWCxgpKAKRTuTzGJ2d2pUU1H58hEOAur+EFKJPIcEvvB3qTGpcKZ3ql7NKuZK3AgSMHzHjMe8gA0hKF9VdCWksTs7KfGjVBaM/1B3xrOhVzIm3f3UqOHneVLh0EfIKG5U5/q6Ilxnl/BxnoexpgafoAJ6Ev9Y9t3Zj1+fmpd8LLxJeec496IMYSnnuspEBowklbvL+BCKU8EKZSPXjVL+
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Aug 2018 08:48:23.8656 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0516ae99-4e98-44f5-3d2c-08d608d52fb9
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2736
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrJIsWRmVeSWpSXmKPExsUyM2J7ue7tkrpogz97OSzmX2xkdWD0WLLk J1MAYxSXTUpqTmZZapG+XQJXxt4NU9gLfihUrNyynrmB8bxkFyMnh4SAicTH+VvYuxi5OIQE jjJK3D21ixnC+cYosWlyG1RmCZPEhQPTmUAcFoEJzBLz7s9gAulnFIiT2LlmIStEVQeTxKFv d1lBEsIC0RI7jh0EmsUBlPCT6H2cCxIWEVCXmLlzPRuIzSZgJDG1/zwLSImEQJTEvlfWICav gL3E5YfFIBUsAqoSE9dOABsoKhAjcXRyC1gnr4CgxMmZT1hAbE4Bf4kHz5+wgbQyC6hJLGtV AgkzC4hL3HoynwnClpfY/nYOM8TDShKXvkxjATlYQmAmo8S0eZfBioQENCQeXvjLClEkK3H0 7BwWCNtXYgfYLpCGk4wSr/afYodwmtglbjfCVOlIrDmyghkisZ1FYuqPD4wQiXyJ/Xs/QY2t lbi/vRsqLidxqvcc0wRGg1lIPpqF8MUsJF/MQvLFAkaWVYyixanFxbnpRsZ6qUWZycXF+Xl6 eaklmxiBCeLglt+6OxhXv3Y8xCjAwajEwyuSWxctxJpYVlyZe4hRgoNZSYT3+eaaaCHelMTK qtSi/Pii0pzU4kOM0hwsSuK8eqv2RAkJpCeWpGanphakFsFkmTg4pRoY13xfWxi+4vbTjOXb 6rpyn9zbGJkl36eukfxyQbcFb8jhS343/zq975/Wrz6ne0FRe5H4bTefX/IPNWoFt7Ya5ehN zzARsLFwtBGq/+rn/tzu6NaWBT6szZu8RWouOE366sCyYXJ80EK5y6e+nZkVdL5Y0DW8P/HD 19AS7RQmc/tD+l38xqeUWIozEg21mIuKEwEwbu6QDAMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/be0vpL04geU4nEd1In9USRcSL7U>
Subject: [netmod] Fwd: New Version Notification for draft-lengyel-netmod-yang-instance-data-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Aug 2018 08:48:32 -0000

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Hello,
      <br>
      <br>
      I updated the draft according to the comments from the IETF102
      meeting. I am hoping for adoption by the WG now.
      <br>
      <br>
      regards Balazs
    </p>
    <div class="moz-forward-container"><br>
      <br>
      -------- Forwarded Message --------
      <table class="moz-email-headers-table" cellspacing="0"
        cellpadding="0" border="0">
        <tbody>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">Subject:
            </th>
            <td>New Version Notification for
              draft-lengyel-netmod-yang-instance-data-03.txt</td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">Date: </th>
            <td>Sun, 22 Jul 2018 17:25:56 -0700</td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">From: </th>
            <td><a class="moz-txt-link-abbreviated" href="mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a></td>
          </tr>
          <tr>
            <th nowrap="nowrap" valign="BASELINE" align="RIGHT">To: </th>
            <td>Benoit Claise <a class="moz-txt-link-rfc2396E" href="mailto:bclaise@cisco.com">&lt;bclaise@cisco.com&gt;</a>, Balazs Lengyel
              <a class="moz-txt-link-rfc2396E" href="mailto:balazs.lengyel@ericsson.com">&lt;balazs.lengyel@ericsson.com&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-lengyel-netmod-yang-instance-data-03.txt
has been successfully submitted by Balazs Lengyel and posted to the
IETF repository.

Name:		draft-lengyel-netmod-yang-instance-data
Revision:	03
Title:		YANG Instance Data Files and their use for Documenting Server Capabilities
Document date:	2018-07-22
Group:		Individual Submission
Pages:		12
URL:            <a class="moz-txt-link-freetext" href="https://www.ietf.org/internet-drafts/draft-lengyel-netmod-yang-instance-data-03.txt">https://www.ietf.org/internet-drafts/draft-lengyel-netmod-yang-instance-data-03.txt</a>
Status:         <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-lengyel-netmod-yang-instance-data/">https://datatracker.ietf.org/doc/draft-lengyel-netmod-yang-instance-data/</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-lengyel-netmod-yang-instance-data-03">https://tools.ietf.org/html/draft-lengyel-netmod-yang-instance-data-03</a>
Htmlized:       <a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/html/draft-lengyel-netmod-yang-instance-data">https://datatracker.ietf.org/doc/html/draft-lengyel-netmod-yang-instance-data</a>
Diff:           <a class="moz-txt-link-freetext" href="https://www.ietf.org/rfcdiff?url2=draft-lengyel-netmod-yang-instance-data-03">https://www.ietf.org/rfcdiff?url2=draft-lengyel-netmod-yang-instance-data-03</a>

Abstract:
   This document specifies a standard file format for YANG instance
   data, that is data that could be stored in a datastore and whose
   syntax and semantics is defined by YANG models.  Instance data files
   can be used to provide information that is defined in design time.
   There is a need to document Server capabilities (which are often
   specified in design time).  Defining server capabilities is foreseen
   as the most important use of YANG instance data files.

                                                                                  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


</pre>
    </div>
    <pre class="moz-signature" cols="72">-- 
Balazs Lengyel                       Ericsson Hungary Ltd.
Senior Specialist
Mobile: +36-70-330-7909              email: <a class="moz-txt-link-abbreviated" href="mailto:Balazs.Lengyel@ericsson.com">Balazs.Lengyel@ericsson.com</a> 
</pre>
  </body>
</html>


From nobody Thu Aug 23 04:59:30 2018
Return-Path: <rharolde@umich.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 99F5F128CB7 for <netmod@ietfa.amsl.com>; Thu, 23 Aug 2018 04:59:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=umich.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0UWevjO66B2Y for <netmod@ietfa.amsl.com>; Thu, 23 Aug 2018 04:59:25 -0700 (PDT)
Received: from mail-lf1-x144.google.com (mail-lf1-x144.google.com [IPv6:2a00:1450:4864:20::144]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56DF8126DBF for <netmod@ietf.org>; Thu, 23 Aug 2018 04:59:25 -0700 (PDT)
Received: by mail-lf1-x144.google.com with SMTP id z11-v6so3842057lff.9 for <netmod@ietf.org>; Thu, 23 Aug 2018 04:59:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=google-2016-06-03; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EemEq+3NDapD/z/SoN8uOls/31RbyQM7KiL1eNeR260=; b=hwJI0+AfzcJe9MtidIRFrAwAgUAdHUX/CSkZcCtKXmzMp2GW6QTEPMDLMfjZsGmGYP gS7JBLDj8BoHbs6fPFLuZ1JGIHMRN9DOiBxQLHbqJRF5VT4iU0lEsXYetTezaenO09FF g8x3uh1li/EWZDurwDv8EcXt0J6QTZDdpr7tpZ7mTEnt9tF0VlvL4EUG7N2AJS3ZzeBY 14cIWnuzS5qPC9Vp32uS/HpAjX7m/z9Ap0NuIFKwsqQap48MS7x0f7fVyOlQXFO+dHVL ucKuaJ34ByxPKkmcyESPs6SuiqPEvcnI3tDQybZVxUFv3qFQfsxukBhZ/MNYe1teKHkm u3ng==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EemEq+3NDapD/z/SoN8uOls/31RbyQM7KiL1eNeR260=; b=ivLb9d1v2fU3CrsBVbfvA8RGBFXqlTLFR8WFmNxHlgm01mzImTPYU8Wn8a6YoOz/qN ckhSwlMLCM+98E1oTp+vKrg8jzZVV38638HXtur4/Vv+Og1un9x+chWYvlIYEPAIDiNu RDEUlmo8kSN7szxTT5VCP9YbGI0yiwhtasAXiuwASe1rCPUtNRQP7qVAGQLYldxCfKxm x3BRbWWT1jJkL2VtzMKOSYijCeg9OJ9pKvcNcdo6ZwjG32oheWkecBn23UrXWAqxLqJT QJ0tXQDlXQi5/NDDPFaziV4O7hI90KFUDilOOEKrnYMQd5DnotRlW9u12rT/zislBV5U 6dmA==
X-Gm-Message-State: AOUpUlFEWStzI3c/AMMsnzAfVx2EGZ6ydF5gAX72FlmbWNeJCB3cg/cg CuUIxdHoAmUlysmaJcr0mBUXqD/bbF0K97woPOBq1Q==
X-Google-Smtp-Source: AA+uWPyCny3W5y6/l7PCuNufv6OFuyjsZQlx81WBqvD0fEFw+wD7O5SoeWhOseD+BE3U/67Pre+NfRw9HwnJBeggxA4=
X-Received: by 2002:a19:f015:: with SMTP id p21-v6mr10069494lfc.56.1535025563141;  Thu, 23 Aug 2018 04:59:23 -0700 (PDT)
MIME-Version: 1.0
References: <153230555695.23069.11514685954663665890.idtracker@ietfa.amsl.com> <7e8a4e1d-4a15-91ea-0f5d-766b40a7bb39@ericsson.com>
In-Reply-To: <7e8a4e1d-4a15-91ea-0f5d-766b40a7bb39@ericsson.com>
From: Bob Harold <rharolde@umich.edu>
Date: Thu, 23 Aug 2018 07:59:11 -0400
Message-ID: <CA+nkc8ApCZCb_MFirsbNZeUyQe3g5MzJXiwKVoL85OKi+7hp-w@mail.gmail.com>
To: balazs.lengyel@ericsson.com
Cc: netmod@ietf.org
Content-Type: multipart/alternative; boundary="000000000000699bf2057418fd75"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/CC4CR_KMiS10YdVMWJRipBwAbf8>
Subject: Re: [netmod] Fwd: New Version Notification for draft-lengyel-netmod-yang-instance-data-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Aug 2018 11:59:29 -0000

--000000000000699bf2057418fd75
Content-Type: text/plain; charset="UTF-8"

On Thu, Aug 23, 2018 at 4:48 AM Balazs Lengyel <balazs.lengyel@ericsson.com>
wrote:

> Hello,
>
> I updated the draft according to the comments from the IETF102 meeting. I
> am hoping for adoption by the WG now.
>
> regards Balazs
>
>
> -------- Forwarded Message --------
> Subject: New Version Notification for
> draft-lengyel-netmod-yang-instance-data-03.txt
> Date: Sun, 22 Jul 2018 17:25:56 -0700
> From: internet-drafts@ietf.org
> To: Benoit Claise <bclaise@cisco.com> <bclaise@cisco.com>, Balazs Lengyel
> <balazs.lengyel@ericsson.com> <balazs.lengyel@ericsson.com>
>
> A new version of I-D, draft-lengyel-netmod-yang-instance-data-03.txt
> has been successfully submitted by Balazs Lengyel and posted to the
> IETF repository.
>
> Name:		draft-lengyel-netmod-yang-instance-data
> Revision:	03
> Title:		YANG Instance Data Files and their use for Documenting Server Capabilities
> Document date:	2018-07-22
> Group:		Individual Submission
> Pages:		12
> URL:            https://www.ietf.org/internet-drafts/draft-lengyel-netmod-yang-instance-data-03.txt
> Status:         https://datatracker.ietf.org/doc/draft-lengyel-netmod-yang-instance-data/
> Htmlized:       https://tools.ietf.org/html/draft-lengyel-netmod-yang-instance-data-03
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-lengyel-netmod-yang-instance-data
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-lengyel-netmod-yang-instance-data-03
>
> Abstract:
>    This document specifies a standard file format for YANG instance
>    data, that is data that could be stored in a datastore and whose
>    syntax and semantics is defined by YANG models.  Instance data files
>    can be used to provide information that is defined in design time.
>    There is a need to document Server capabilities (which are often
>    specified in design time).  Defining server capabilities is foreseen
>    as the most important use of YANG instance data files.
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
> --
> Balazs Lengyel                       Ericsson Hungary Ltd.
> Senior Specialist
> Mobile: +36-70-330-7909              email: Balazs.Lengyel@ericsson.com
>
>
Minor typo

In 2.5,
"The operator curerntly has no way to know what the default"

"curerntly" -> "currently"

-- 
Bob Harold

--000000000000699bf2057418fd75
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div dir=3D"ltr" class=3D"gmail_signature" data-smart=
mail=3D"gmail_signature"><br></div></div><div class=3D"gmail_quote"><div di=
r=3D"ltr">On Thu, Aug 23, 2018 at 4:48 AM Balazs Lengyel &lt;<a href=3D"mai=
lto:balazs.lengyel@ericsson.com">balazs.lengyel@ericsson.com</a>&gt; wrote:=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex">
 =20

   =20
 =20
  <div text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p>Hello,
      <br>
      <br>
      I updated the draft according to the comments from the IETF102
      meeting. I am hoping for adoption by the WG now.
      <br>
      <br>
      regards Balazs
    </p>
    <div class=3D"m_-7273665965144044814moz-forward-container"><br>
      <br>
      -------- Forwarded Message --------
      <table class=3D"m_-7273665965144044814moz-email-headers-table" cellsp=
acing=3D"0" cellpadding=3D"0" border=3D"0">
        <tbody>
          <tr>
            <th nowrap valign=3D"BASELINE" align=3D"RIGHT">Subject:
            </th>
            <td>New Version Notification for
              draft-lengyel-netmod-yang-instance-data-03.txt</td>
          </tr>
          <tr>
            <th nowrap valign=3D"BASELINE" align=3D"RIGHT">Date: </th>
            <td>Sun, 22 Jul 2018 17:25:56 -0700</td>
          </tr>
          <tr>
            <th nowrap valign=3D"BASELINE" align=3D"RIGHT">From: </th>
            <td><a class=3D"m_-7273665965144044814moz-txt-link-abbreviated"=
 href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">internet-drafts=
@ietf.org</a></td>
          </tr>
          <tr>
            <th nowrap valign=3D"BASELINE" align=3D"RIGHT">To: </th>
            <td>Benoit Claise <a class=3D"m_-7273665965144044814moz-txt-lin=
k-rfc2396E" href=3D"mailto:bclaise@cisco.com" target=3D"_blank">&lt;bclaise=
@cisco.com&gt;</a>, Balazs Lengyel
              <a class=3D"m_-7273665965144044814moz-txt-link-rfc2396E" href=
=3D"mailto:balazs.lengyel@ericsson.com" target=3D"_blank">&lt;balazs.lengye=
l@ericsson.com&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
      <pre>A new version of I-D, draft-lengyel-netmod-yang-instance-data-03=
.txt
has been successfully submitted by Balazs Lengyel and posted to the
IETF repository.

Name:		draft-lengyel-netmod-yang-instance-data
Revision:	03
Title:		YANG Instance Data Files and their use for Documenting Server Capab=
ilities
Document date:	2018-07-22
Group:		Individual Submission
Pages:		12
URL:            <a class=3D"m_-7273665965144044814moz-txt-link-freetext" hr=
ef=3D"https://www.ietf.org/internet-drafts/draft-lengyel-netmod-yang-instan=
ce-data-03.txt" target=3D"_blank">https://www.ietf.org/internet-drafts/draf=
t-lengyel-netmod-yang-instance-data-03.txt</a>
Status:         <a class=3D"m_-7273665965144044814moz-txt-link-freetext" hr=
ef=3D"https://datatracker.ietf.org/doc/draft-lengyel-netmod-yang-instance-d=
ata/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-lengyel-netm=
od-yang-instance-data/</a>
Htmlized:       <a class=3D"m_-7273665965144044814moz-txt-link-freetext" hr=
ef=3D"https://tools.ietf.org/html/draft-lengyel-netmod-yang-instance-data-0=
3" target=3D"_blank">https://tools.ietf.org/html/draft-lengyel-netmod-yang-=
instance-data-03</a>
Htmlized:       <a class=3D"m_-7273665965144044814moz-txt-link-freetext" hr=
ef=3D"https://datatracker.ietf.org/doc/html/draft-lengyel-netmod-yang-insta=
nce-data" target=3D"_blank">https://datatracker.ietf.org/doc/html/draft-len=
gyel-netmod-yang-instance-data</a>
Diff:           <a class=3D"m_-7273665965144044814moz-txt-link-freetext" hr=
ef=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-lengyel-netmod-yang-instanc=
e-data-03" target=3D"_blank">https://www.ietf.org/rfcdiff?url2=3Ddraft-leng=
yel-netmod-yang-instance-data-03</a>

Abstract:
   This document specifies a standard file format for YANG instance
   data, that is data that could be stored in a datastore and whose
   syntax and semantics is defined by YANG models.  Instance data files
   can be used to provide information that is defined in design time.
   There is a need to document Server capabilities (which are often
   specified in design time).  Defining server capabilities is foreseen
   as the most important use of YANG instance data files.

                                                                           =
      =20


Please note that it may take a couple of minutes from the time of submissio=
n
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" target=3D"_blank">tools.ietf.org</a>.

The IETF Secretariat


</pre>
    </div>
    <pre class=3D"m_-7273665965144044814moz-signature" cols=3D"72">--=20
Balazs Lengyel                       Ericsson Hungary Ltd.
Senior Specialist
Mobile: +36-70-330-7909              email: <a class=3D"m_-7273665965144044=
814moz-txt-link-abbreviated" href=3D"mailto:Balazs.Lengyel@ericsson.com" ta=
rget=3D"_blank">Balazs.Lengyel@ericsson.com</a> </pre></div></blockquote><d=
iv><br></div><div>Minor typo</div><div><br></div><div>In 2.5,</div><div>&qu=
ot;The operator curerntly has no way to know what the default&quot;<br><br>=
&quot;curerntly&quot; -&gt; &quot;currently&quot;</div><div><br></div><div>=
--=C2=A0<br>Bob Harold</div><div><br></div></div></div>

--000000000000699bf2057418fd75--


From nobody Fri Aug 24 06:27:31 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF6F0127148 for <netmod@ietfa.amsl.com>; Fri, 24 Aug 2018 06:27:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SmaAwyszXCd9 for <netmod@ietfa.amsl.com>; Fri, 24 Aug 2018 06:27:27 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0132.outbound.protection.outlook.com [104.47.2.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFBBA126BED for <netmod@ietf.org>; Fri, 24 Aug 2018 06:27:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PlAsi9Ly3vD5GWJ2l49W7/nebCPsmyPqVGlmbaZ8sbQ=; b=KcRWtEdFPmel04Z6ezJ9Aj8/pdgkLJL6QCN9D3R4pEZMdkFdSiM3NPkcOhe+KMS7+Ne1t8of/fVbWs05Ip9STw0wpaTmQNYqMcWRB3/msgMUy9r9FetLXt1gFmMi37TmrRBB88UuG22CMRnzJD729e4aE8AO6hXfpV7dvjbAMfs=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB0782.eurprd07.prod.outlook.com (10.161.107.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1101.5; Fri, 24 Aug 2018 13:27:23 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1080.010; Fri, 24 Aug 2018 13:27:23 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: RFC6243 "with defaults" report-all and YANG "when" statements
Thread-Index: AdQ7rMaDBNtcalfDT0eZd7GJIrIdPg==
Date: Fri, 24 Aug 2018 13:27:23 +0000
Message-ID: <VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB0782; 6:NMVFPWnnCldXpxJoffCGBIwMUax/hRUC33m9uTrZ2pWO0wq7fptgyGF+Azz6tcGPuNq1HKs3Q+Wtb6O99cHkv+bmkucZfjSCW9WuN3tci/av2FbFZR4AoINbuDBygjCjpRrdyRZrad1XgEPUhXCEFgcqKUQbU6wnYwMwFkEYjshFLZilvQdWcmsnr82U2SMnGmgiBQx3HVWe6PzZWfJ7xA0UTDQuCmsXy3ll+55WBtUoxuTnEOWzLfDfuLs45qWfbd944Dsg823RCKFw2+kAxXcILcYmUqcynh4nv3ewq9eaYw3JTIJ/0hMqEim7NVeBlNkdDjg6x6xBITUfZcpi8jt5dUYYYW4ms2q2R2nBq1a1ovl9+B0QaSpyzsXenH6wc4jnXBUX1HES51xX4lDwPYpjTvIfe59SyTfCc6YZMs51Bn3d6XuLgMmdZSGXft/ngZ7bXm0d14qIFNzvtctrxA==; 5:+ulo3MvVnxa/+pjeiYVLGg/Bt7/oyO4wdTScuyQyexTJ9xHo/5dqhh4m6i9G0h5Qg067I1hw8Hs19s3EJ9qnqY5Pt9zYC5AdvFca7ZkARndJne7CDAUQr10WW9AdN2kleTLtoAyKUigmBhw2BXPnXzNa13tYEyx9Y7KaBor3XU4=; 7:OEjFjdeUaZW0bNdxp9c3CbO0DwOsE5KA5hpvQLwMT8tkkWwxreqLVkh3vm5md9F0Cta8MJOuxttIsVUGGb/iLTdg6Azn6UpmPwidnh5H7wV1iDL6nt0McgG8s5bpsOOVELlDdW+I10xEYdi/p84luw6ErBy0N3kcYMtCY9fOgGcWPx6jYhBSlyJ+7XEAcaFwg0wzYgXgesaw50LT32vhZr7drTq3SHWmq5RCtpvmKDtk8QOT8eMEl6IdczF864Rl
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 80c9a6e2-a0d7-483a-a98d-08d609c5538c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB0782; 
x-ms-traffictypediagnostic: VI1PR07MB0782:
x-microsoft-antispam-prvs: <VI1PR07MB0782F8E1C21811D1DAA0CD3B9B360@VI1PR07MB0782.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(35073007944872)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699016); SRVR:VI1PR07MB0782; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB0782; 
x-forefront-prvs: 07749F8C42
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(366004)(136003)(346002)(376002)(53754006)(189003)(199004)(14454004)(8676002)(33656002)(99286004)(6436002)(106356001)(7696005)(105586002)(316002)(6116002)(790700001)(3846002)(5660300001)(2900100001)(2906002)(2351001)(74316002)(5630700001)(5250100002)(2501003)(81156014)(68736007)(7736002)(14444005)(256004)(102836004)(1730700003)(8936002)(81166006)(66066001)(6506007)(26005)(186003)(5640700003)(6916009)(476003)(486006)(9686003)(55016002)(54896002)(6306002)(86362001)(478600001)(97736004)(53936002)(25786009); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB0782; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: TM9aKyZ+YFs9lG9F8FOeBTisLTnnR+Ry5TQCaUSVnj9QV351jViWpiCYTzyj1WP0wGlB4hzoVWjggToo3GKbTYLNCnVQ5QyJLIBwUqBdMaW5UsRiRvVccPevwryZMbYQkVyC/L8PKnyPwdFNwXKESxmrTGAZVuUQEvcy+rJZmIAU6rzGdAYU8/Jly5IT+NlNBmEwp2BlHdycLd48x/GfvQVIsdCahUGympXtvF01vGh0TQX1MeYB/6OFUxkJ+EtCdjfCk/mGJJSUNLrrbPXyH8C9J1FuPBu6YidGTJblfefeQJBno83m3tyyFEbwL+deVnrbddh2qqzoq+3OJDFSIqCZGW7XpoPv81ocu2NZzeGNb7Av4HRdF1W0J7dL+bZN75eZadARlXlUo77XGO5/cA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360VI1PR07MB3981eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 80c9a6e2-a0d7-483a-a98d-08d609c5538c
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Aug 2018 13:27:23.2897 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB0782
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/umZypxn7JHrPbtd3yr124iXwanA>
Subject: [netmod] RFC6243 "with defaults" report-all and YANG "when" statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Aug 2018 13:27:30 -0000

--_000_VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360VI1PR07MB3981eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

RFC6243 has a 'report-all' retrieval mode:

   When data is retrieved with a <with-defaults> parameter equal to
   'report-all', all data nodes MUST be reported, including any data
   nodes considered to be default data by the server.

I wanted to confirm how YANG "when" statements are supposed to interact wit=
h 'report-all'.

If a 'when' statement is (e.g. in some container abc) is currently not sati=
sfied, then I believe a 'report-all' would not report the container abc or =
any of the descendant nodes of abc.  Is that correct ?

A "when" statement (when not satisfied) makes the associated nodes "invalid=
" so I assume that means they don't exist with their default values at all.

e.g.
leaf foo { type uint32; }
container abc {
   when "../foo =3D 1";
   leaf test1 { type uint32; default 50 }
}

If the <running> currently has this instance data:
    foo =3D 2
then I believe a 'report-all' retrieval would only return the following:
    <foo>2</foo>
and it would *not* return this data:
    <abc>
       <test1>50</test1>
    </abc>

Jason

--_000_VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360VI1PR07MB3981eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-CA" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">RFC6243 has a 'report-all' retr=
ieval mode:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; When data is retri=
eved with a &lt;with-defaults&gt; parameter equal to<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; 'report-all', all =
data nodes MUST be reported, including any data<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; nodes considered t=
o be default data by the server.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I wanted to confirm how YANG &q=
uot;when&quot; statements are supposed to interact with 'report-all'.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">If a 'when' statement is (e.g. =
in some container abc) is currently not satisfied, then I believe a 'report=
-all' would not report the container abc or any of the descendant nodes of =
abc.&nbsp; Is that correct ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">A &quot;when&quot; statement (w=
hen not satisfied) makes the associated nodes &quot;invalid&quot; so I assu=
me that means they don't exist with their default values at all.<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">e.g.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">leaf foo { type uint32; }<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">container abc {<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; when &quot;../foo =
=3D 1&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; leaf test1 { type =
uint32; default 50 }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">If the &lt;running&gt; currentl=
y has this instance data:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; foo =3D 2<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">then I believe a 'report-all' r=
etrieval would only return the following:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp; &nbsp;&nbsp;&lt;foo&gt;2=
&lt;/foo&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">and it would *<b>not</b>* retur=
n this data:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp; &nbsp;&nbsp;&lt;abc&gt;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&lt;test1&gt;50&lt;/test1&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &lt;/abc&gt;=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Jason<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360VI1PR07MB3981eurp_--


From nobody Fri Aug 24 06:28:12 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41916129C6A; Fri, 24 Aug 2018 06:28:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Na0EPcjcaEW; Fri, 24 Aug 2018 06:28:09 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0706.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe02::706]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35FEC127148; Fri, 24 Aug 2018 06:28:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OO05VoOWQOUP8Mx5kWqztntyLOWwQmwerSAj2XE8wOY=; b=iJvpOvFJIPMM/Mwbr7sJroza1gdfEKc0wZxloHvExp1ZgAaaMaIkpK8aR5T7vszsg2zxdrMgPDbOhy2ZNVrjfyCXujS6A0/VuzkG8quLVal0pE289MbBy0SsLGzakfzLhLf+UAF61e0v7Sc+tnuy+JsxxFHmGxLXVcicth2SIj4=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB0782.eurprd07.prod.outlook.com (10.161.107.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1101.5; Fri, 24 Aug 2018 13:28:06 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1080.010; Fri, 24 Aug 2018 13:28:06 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "netmod@ietf.org" <netmod@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: RFC6243 "with defaults" report-all and YANG "when" statements
Thread-Index: AdQ7rMaDBNtcalfDT0eZd7GJIrIdPgAAXbJg
Date: Fri, 24 Aug 2018 13:28:06 +0000
Message-ID: <VI1PR07MB398181F0ECB96E28BBC290EB9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
In-Reply-To: <VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB0782; 6:y3czOBrZuyHcWRzqfen6KZCdT0l30V3NZDvxO0+m09ZVURC5OB6mXpoCXElnbV3lxw3aoq9lSvmkvQrZBg4QUmX7dIJcbyHHL7GBxqT/fp5Ba7Lg16VJflT9JsEBMxBmDrI7BmIXTyliazy0E6eoOo9sbUQZ7ang/8ggMHNem9yuhhRvvzdxognmXbUQzoNgCKVtL/H4KPQb7vy2TEPYmq+R361NCTKu2ilEPQVgxFY262tcq87yrsQag13m8zmRDBJ3oS30Xn8sqSQ56QVD2EfmtPaUzBl84pYZV1LXu2juBwpR0y20zWrKilzkL2M/7DDLkMjnUaV8UPyqTt/tfop7DpVgHsfApiSgMBAFa+axCXRSpfyg13+pfuCWuUu9bQO51daQntlrjCdqIFp7ZONgu6VAaEgVv7kFw5eBMWOv8D4NjTQmgp81l+PelveS4/Jr/4fbPjfUSNiO6qKeWA==; 5:gvg7PqzgbHIzuugECiQ4yyHArt2C4Zuzz6CSLCGWEWkozSZzv0AWTxBTRBAFDJ2zICvJjhyHhzCzgLXZ0U1xQZjMOIfdohAGV29knYhibSim6O3iD77v1jq77zW/YdVcJc7xPpHFSy5fTEDZqZdculJGJdEN73RfLkib+DyzqjI=; 7:JxcxpsVZOmnQhrwWeeVV4tNc7FyuzljqLpy/bc0+r+V+EBKyxtYRnWXoqT9sjXUu99pBfoAetL/s+zhr35+ulWxrpQJXLLtQX/JjlHvPdfmEsFYUKzntQqlE5U94FwGOON2Vm6h7jgQEfD4Pvos/UZlXEXXN14NIY4oXMt40eujcvzP8GrtQMy06OwJYLV5jvaC6WTdB0LFR6JDBcnt9GgQmC+pJOhMgMWR5KIOXwhqD7HCs4LfScI+D0gpKZpvU
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 65b089b9-1a10-47bb-630d-08d609c56d59
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB0782; 
x-ms-traffictypediagnostic: VI1PR07MB0782:
x-microsoft-antispam-prvs: <VI1PR07MB07826917F5592B00551F8E4C9B360@VI1PR07MB0782.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(35073007944872)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699016); SRVR:VI1PR07MB0782; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB0782; 
x-forefront-prvs: 07749F8C42
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(366004)(136003)(346002)(376002)(53754006)(189003)(199004)(14454004)(2940100002)(8676002)(33656002)(99286004)(6436002)(106356001)(7696005)(110136005)(105586002)(316002)(6116002)(790700001)(3846002)(5660300001)(229853002)(2900100001)(2906002)(76176011)(74316002)(5250100002)(2501003)(81156014)(68736007)(7736002)(14444005)(446003)(256004)(93156006)(102836004)(53546011)(8936002)(81166006)(66066001)(6506007)(26005)(186003)(476003)(11346002)(486006)(9686003)(55016002)(54896002)(6306002)(86362001)(478600001)(97736004)(450100002)(53936002)(25786009)(6246003); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB0782; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: cRW6/RSEgpbsi44+aCy1tXhzLgNPhwo/PTvLIN5k0fvdVdRlFHdj1WTpoEuRiJHH704TIap6r+PMRtQ8wIKHBry2TJslyIq0VjxfoqRhUR4DhsLMKaD9k6Sja8eW/7CgXX/Ca/E3LLvlVt39AZRvsSw7qXl+MnovRUhoDKiS2cfwQ4YzBmuFkMy4YgbNCqE6Uipp8fsu2PvX5Rwkg2tg/2Wl7kPZ4qeMn2UosizAe3M9Oh8FqurDxUIiZu2sXJp1AzAb0paOpCAVAG0lKpbhZgeaRx7lZw4ko0ikjH/kL4Y0IO4qVCxRuO1oReBQ1KpMnf2ChNtQGzDbeeuDbQ41dzKdknS6JNwj/peUhrf5VAUUj2z1fy3pfv/4Gd1JiPxqYDVIVi591cRfj/1fOLK+lQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB398181F0ECB96E28BBC290EB9B360VI1PR07MB3981eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 65b089b9-1a10-47bb-630d-08d609c56d59
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Aug 2018 13:28:06.6325 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB0782
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/l0Bht9oyoNWRHDiqzdUk9Zidad4>
Subject: Re: [netmod] RFC6243 "with defaults" report-all and YANG "when" statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Aug 2018 13:28:11 -0000

--_000_VI1PR07MB398181F0ECB96E28BBC290EB9B360VI1PR07MB3981eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Also adding NETCONF.  This spans both groups.

From: Sterne, Jason (Nokia - CA/Ottawa)
Sent: Friday, August 24, 2018 9:27 AM
To: netmod@ietf.org
Subject: RFC6243 "with defaults" report-all and YANG "when" statements

Hi all,

RFC6243 has a 'report-all' retrieval mode:

   When data is retrieved with a <with-defaults> parameter equal to
   'report-all', all data nodes MUST be reported, including any data
   nodes considered to be default data by the server.

I wanted to confirm how YANG "when" statements are supposed to interact wit=
h 'report-all'.

If a 'when' statement is (e.g. in some container abc) is currently not sati=
sfied, then I believe a 'report-all' would not report the container abc or =
any of the descendant nodes of abc.  Is that correct ?

A "when" statement (when not satisfied) makes the associated nodes "invalid=
" so I assume that means they don't exist with their default values at all.

e.g.
leaf foo { type uint32; }
container abc {
   when "../foo =3D 1";
   leaf test1 { type uint32; default 50 }
}

If the <running> currently has this instance data:
    foo =3D 2
then I believe a 'report-all' retrieval would only return the following:
    <foo>2</foo>
and it would *not* return this data:
    <abc>
       <test1>50</test1>
    </abc>

Jason

--_000_VI1PR07MB398181F0ECB96E28BBC290EB9B360VI1PR07MB3981eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-CA" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Also adding NETCONF.&nbsp; This spans both groups.<o=
:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"mso-fareast-languag=
e:EN-CA">From:</span></b><span lang=3D"EN-US" style=3D"mso-fareast-language=
:EN-CA"> Sterne, Jason (Nokia - CA/Ottawa)
<br>
<b>Sent:</b> Friday, August 24, 2018 9:27 AM<br>
<b>To:</b> netmod@ietf.org<br>
<b>Subject:</b> RFC6243 &quot;with defaults&quot; report-all and YANG &quot=
;when&quot; statements<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">RFC6243 has a 'report-all' retr=
ieval mode:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; When data is retri=
eved with a &lt;with-defaults&gt; parameter equal to<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; 'report-all', all =
data nodes MUST be reported, including any data<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; nodes considered t=
o be default data by the server.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I wanted to confirm how YANG &q=
uot;when&quot; statements are supposed to interact with 'report-all'.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">If a 'when' statement is (e.g. =
in some container abc) is currently not satisfied, then I believe a 'report=
-all' would not report the container abc or any of the descendant nodes of =
abc.&nbsp; Is that correct ?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">A &quot;when&quot; statement (w=
hen not satisfied) makes the associated nodes &quot;invalid&quot; so I assu=
me that means they don't exist with their default values at all.<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">e.g.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">leaf foo { type uint32; }<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">container abc {<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; when &quot;../foo =
=3D 1&quot;;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp; leaf test1 { type =
uint32; default 50 }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">}<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">If the &lt;running&gt; currentl=
y has this instance data:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; foo =3D 2<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">then I believe a 'report-all' r=
etrieval would only return the following:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp; &nbsp;&nbsp;&lt;foo&gt;2=
&lt;/foo&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">and it would *<b>not</b>* retur=
n this data:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp; &nbsp;&nbsp;&lt;abc&gt;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&lt;test1&gt;50&lt;/test1&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp; &lt;/abc&gt;=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Jason<o:p></o:p></span></p>
</div>
</div>
</body>
</html>

--_000_VI1PR07MB398181F0ECB96E28BBC290EB9B360VI1PR07MB3981eurp_--


From nobody Mon Aug 27 00:06:48 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41921130DF3; Mon, 27 Aug 2018 00:06:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x0mNhZx60CbT; Mon, 27 Aug 2018 00:06:40 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id C62FE130DDF; Mon, 27 Aug 2018 00:06:39 -0700 (PDT)
Received: from localhost (unknown [173.38.220.61]) by mail.tail-f.com (Postfix) with ESMTPSA id F095A1AE0312; Mon, 27 Aug 2018 09:06:34 +0200 (CEST)
Date: Mon, 27 Aug 2018 09:06:34 +0200 (CEST)
Message-Id: <20180827.090634.908058368768636307.mbj@tail-f.com>
To: jason.sterne@nokia.com
Cc: netmod@ietf.org, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <VI1PR07MB398181F0ECB96E28BBC290EB9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360@VI1PR07MB3981.eurprd07.prod.outlook.com> <VI1PR07MB398181F0ECB96E28BBC290EB9B360@VI1PR07MB3981.eurprd07.prod.outlook.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/VhPUK5jMA2M6pRB7lEBIBRWjpKs>
Subject: Re: [netmod] RFC6243 "with defaults" report-all and YANG "when" statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2018 07:06:42 -0000

"Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> Also adding NETCONF.  This spans both groups.
> 
> From: Sterne, Jason (Nokia - CA/Ottawa)
> Sent: Friday, August 24, 2018 9:27 AM
> To: netmod@ietf.org
> Subject: RFC6243 "with defaults" report-all and YANG "when" statements
> 
> Hi all,
> 
> RFC6243 has a 'report-all' retrieval mode:
> 
>    When data is retrieved with a <with-defaults> parameter equal to
>    'report-all', all data nodes MUST be reported, including any data
>    nodes considered to be default data by the server.
> 
> I wanted to confirm how YANG "when" statements are supposed to interact with 'report-all'.
> 
> If a 'when' statement is (e.g. in some container abc) is currently not satisfied, then I believe a 'report-all' would not report the container abc or any of the descendant nodes of abc.  Is that correct ?

Yes.

> A "when" statement (when not satisfied) makes the associated nodes "invalid" so I assume that means they don't exist with their default values at all.

Correct.

An invalid "when" expression has the same effect on the node as
erasing the definition from the module.


/martin


> 
> e.g.
> leaf foo { type uint32; }
> container abc {
>    when "../foo = 1";
>    leaf test1 { type uint32; default 50 }
> }
> 
> If the <running> currently has this instance data:
>     foo = 2
> then I believe a 'report-all' retrieval would only return the following:
>     <foo>2</foo>
> and it would *not* return this data:
>     <abc>
>        <test1>50</test1>
>     </abc>
> 
> Jason


From nobody Mon Aug 27 05:30:40 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32562130E71; Mon, 27 Aug 2018 05:30:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MfglHx0k28Op; Mon, 27 Aug 2018 05:30:36 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0700.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1f::700]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1943C130DD7; Mon, 27 Aug 2018 05:30:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3Ye4/0p0vQkmTmn4dCdxzRpdWlojtzP7s8cZgDuR3ZM=; b=glYUZOMkP9xSmiaku7edBEYnx3+JKZrdsW3QPJSFyb/mzKkuhm4wiD9VB8sMumnyOtJ222Dqa6LsWR2CIrDzDBTH21aKQjIt0Li3kJ6vat5+kG2vj/6zjU2mFuJCP07ubvlr6VSJBRfWnyN26dqBhnfMkRaZXI5gPCp+TGA0yMk=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB4064.eurprd07.prod.outlook.com (52.134.20.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1101.10; Mon, 27 Aug 2018 12:30:33 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::dd01:b567:f507:8f07%4]) with mapi id 15.20.1101.007; Mon, 27 Aug 2018 12:30:33 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netmod@ietf.org" <netmod@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netmod] RFC6243 "with defaults" report-all and YANG "when" statements
Thread-Index: AdQ7rMaDBNtcalfDT0eZd7GJIrIdPgAAXbJgAImP7AAAC0ptwA==
Date: Mon, 27 Aug 2018 12:30:33 +0000
Message-ID: <VI1PR07MB398154A79720297C1F2435769B0B0@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB3981EC4CC1EF663F59A6A4EF9B360@VI1PR07MB3981.eurprd07.prod.outlook.com> <VI1PR07MB398181F0ECB96E28BBC290EB9B360@VI1PR07MB3981.eurprd07.prod.outlook.com> <20180827.090634.908058368768636307.mbj@tail-f.com>
In-Reply-To: <20180827.090634.908058368768636307.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.245.20.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB4064; 6:hYLjSbBMwIA8SioAoyeQ5W5m6nGQcrMoCmCgSRcS1pVLea1BXbaoJoETV7OP20f4DZ8aAOuf+SLXS038Ty4OWSRDvQiNXNqxrT9jtSONOJtZxvaFmDOmTPDNknJeGTRDTAG7gcgywI/n4Vj7KuXE99Jys61mevr9jHkArhqr8zEV1b9P5fT00XSlN1hwUBb0gUaP9K1L51I7tt15g2SP8m5k3xG0MMqFmtNNTJ4k2C/c2lfms/7J/w8UqDtKHKfdIE7dOGj2NQsE5xo5qX1RSIr+usi4HcUBOQLkc6rG//ls6rY5VYzGHaNn18snBGHfvkcl7njF3bQER52jDQqRdU5NX/5a93eCzAoM9AhiZlB+TnLgjbxJfsZxuZ2lpIi/hJ60ugEE6ZVhINH0yC2KUAMqjR3IXFExXfaUOBtkNM606PijBWmaL4DvcH+5wlrVAobXd5b0+DdA0bu7pW7Zrw==; 5:+qMMRPUb7e+r05xhTRwo6QPCOKzlen+iuZuCs5iexKODNn3C0adffVx+qogHoH6m7pYxz94pt1XWt5dswUy+L9FwywOFcAimnJ7/8gtWHL6DTEzWxLOpx+kkMN8ioY0GmIGjXhQilK/Cm2f9f6hIdAEKD8zTT4E6nAT11K/uhx4=; 7:A+xvLWVl62idX18XGzRy54rYB3irKK7PYSxOAQ6KP7kl3CKV0yLAHGsGiF8KJV++RIvPX59anled5r2lFX08uHEHRf4TrfRDrrehFuxHgGCj9n4AqcShHYcQ/d/yZVGvDIT7on8MypfQhLyokpv2cNxM7kAqEIKNtECNfWhvtHhfKIe+jk1l5hwykPUTScR3tU/8/U1qZNk8rf2MtjIBjipB5KdNxcLD+FT5KMv4T6n3Sx73W78O1IrdSEjMl/4y
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 17f82021-42eb-4c3d-4a9e-08d60c18e26a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:VI1PR07MB4064; 
x-ms-traffictypediagnostic: VI1PR07MB4064:
x-microsoft-antispam-prvs: <VI1PR07MB40647C2871F6CCB147AE91359B0B0@VI1PR07MB4064.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(35073007944872)(82608151540597)(109105607167333)(195916259791689); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231311)(11241501184)(806099)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699049)(76991033); SRVR:VI1PR07MB4064; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB4064; 
x-forefront-prvs: 07778E4001
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(39860400002)(366004)(136003)(396003)(53754006)(13464003)(199004)(189003)(6116002)(3846002)(7696005)(305945005)(7736002)(2906002)(6346003)(99286004)(11346002)(68736007)(446003)(81166006)(54906003)(8676002)(81156014)(53546011)(6506007)(476003)(486006)(102836004)(76176011)(26005)(25786009)(55016002)(4326008)(6436002)(256004)(229853002)(9686003)(86362001)(74316002)(478600001)(316002)(53936002)(14444005)(6246003)(105586002)(106356001)(33656002)(2900100001)(14454004)(5250100002)(5660300001)(97736004)(6916009)(186003)(8936002)(66066001); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB4064; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-microsoft-antispam-message-info: /ob5njWUXSEYY0ukRUmKTRdBVg/m1Yq50nD35zP0txoO5gv4asdcsk7LCmoHjVwATE3aLRU3uOjK9Uy5jq7fyKu7WTnyiNUYNvo2L0gz+FpBWN3L2/R7GGJSjJ0ReXrBTRWMmStg3lxBvqMCZOVpEHE1A5mZd+o9QMMpQVPsjoFp8eePRkS4vZIyTsPf6EBGITI2xTy9IqtmJmzXcnXVVjzE7xODr5moS/cQh9pLvOQDroS1s77QkCLtayp5YnIjDVBXQnQpPNoMWzCCXDXkt2rackDmgl54/yDcdGOTqexU7s6ikcvTCHRTonbwIsF9Km7mr7DHiAqu4DrlHWcICtu62FQRMDRJFor2T9rp17Ex59XmflvldYH1SVeZsDJo+7DFX5iOhCy0yekxTJE6bg==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 17f82021-42eb-4c3d-4a9e-08d60c18e26a
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Aug 2018 12:30:33.5878 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4064
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/po0AQBBN00T8cPTbtd96YUwfIlY>
Subject: Re: [netmod] RFC6243 "with defaults" report-all and YANG "when" statements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Aug 2018 12:30:39 -0000

Thanks Martin. That makes sense and matches the impression I got from vario=
us statements in the RFCs.

> -----Original Message-----
> From: Martin Bjorklund <mbj@tail-f.com>
> Sent: Monday, August 27, 2018 3:07 AM
> To: Sterne, Jason (Nokia - CA/Ottawa) <jason.sterne@nokia.com>
> Cc: netmod@ietf.org; netconf@ietf.org
> Subject: Re: [netmod] RFC6243 "with defaults" report-all and YANG "when"
> statements
>=20
> "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> > Also adding NETCONF.  This spans both groups.
> >
> > From: Sterne, Jason (Nokia - CA/Ottawa)
> > Sent: Friday, August 24, 2018 9:27 AM
> > To: netmod@ietf.org
> > Subject: RFC6243 "with defaults" report-all and YANG "when" statements
> >
> > Hi all,
> >
> > RFC6243 has a 'report-all' retrieval mode:
> >
> >    When data is retrieved with a <with-defaults> parameter equal to
> >    'report-all', all data nodes MUST be reported, including any data
> >    nodes considered to be default data by the server.
> >
> > I wanted to confirm how YANG "when" statements are supposed to interact
> with 'report-all'.
> >
> > If a 'when' statement is (e.g. in some container abc) is currently not =
satisfied,
> then I believe a 'report-all' would not report the container abc or any o=
f the
> descendant nodes of abc.  Is that correct ?
>=20
> Yes.
>=20
> > A "when" statement (when not satisfied) makes the associated nodes
> "invalid" so I assume that means they don't exist with their default valu=
es at
> all.
>=20
> Correct.
>=20
> An invalid "when" expression has the same effect on the node as
> erasing the definition from the module.
>=20
>=20
> /martin
>=20
>=20
> >
> > e.g.
> > leaf foo { type uint32; }
> > container abc {
> >    when "../foo =3D 1";
> >    leaf test1 { type uint32; default 50 }
> > }
> >
> > If the <running> currently has this instance data:
> >     foo =3D 2
> > then I believe a 'report-all' retrieval would only return the following=
:
> >     <foo>2</foo>
> > and it would *not* return this data:
> >     <abc>
> >        <test1>50</test1>
> >     </abc>
> >
> > Jason

