Internet-Draft | ADM | July 2023 |
Birrane, et al. | Expires 11 January 2024 | [Page] |
This document defines a data model that captures the information necessary to asynchronously manage applications. This model provides a set of common type definitions, data structures, and a template for publishing standardized representations of model elements.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 11 January 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The DTN Management Architecture (DTNMA) [I-D.ietf-dtn-dtnma] defines a concept for the open-loop control of applications (and protocols) in situations where timely, highly-available connections cannot exist among managing and managed nodes in a network. While the DTNMA provides a conceptual information model, it does not include details necessary to produce interoperable data models.¶
This document defines a two-level data model suitable for managing applications in accordance with the DTNMA. The two levels of model are:¶
This document also defines a text representation of an ADM using the types and structures defined by the AMM combined with the syntax and processing semantics of YANG modules [RFC7950]. With this representation, individual applications can capture their static management information in YANG modules.¶
Although this document defines a representation for the ADM, it does not define a representation for the objects and literal values modeled by the ADM/ODM. In order to communicate values between DTNMA Agents and Managers in a network, the model must be encoded for transmission. Any such encoding scheme is outside of the scope of this document. Generally, the encoding of the model is a separate concern from the specification of data within the model.¶
Because different networks may use different encodings for data, mandating an encoding format would require incompatible networks to encapsulate data in ways that could introduce inefficiency and obfuscation. It is envisioned that different networks would be able to encode values in their native encodings such that the translation of ADM data from one encoding to another can be completed using mechanical action taken at network borders.¶
Since the specification does not mandate an encoding format, the AMM and ADM must provide enough information to make encoding (and translating from one encoding to another) an unambiguous process. Therefore, where necessary, this document provides identification, enumeration and other schemes that ensure ADMs contain enough information to prevent ambiguities caused by different encoding schemes.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
The terms "Actor", "Agent", "Externally Defined Data", "Variable", "Constant", Control", "Literal", "Macro", "Manager", "Operator", "Report", "Report Template", "Rule", "State-Based Rule", "Table", "Table Template", and "Time-Based Rule" are used without modification from the definitions provided in [I-D.ietf-dtn-dtnma].¶
Additional terms defined in this document are as follows.¶
In order to asynchronously manage an application in accordance with the [I-D.ietf-dtn-dtnma], an application-specific data model must be created containing static structure for that application. This model is termed the Application Data Model (ADM) and forms the core set of information for that application in whichever network it is deployed. ADM structure and base ADMs are discussed in detail in Section 4.¶
The objects codified in the ADM represents static configurations and definitions that apply to any deployment of the application, regardless of the network in which it is operating. Within any given network, Managers supplement the information provided by ADMs with dynamic objects. Each namespace of dynamic objects is termed an Operational Data Model (ODM) and is discussed in detail in Section 5.¶
Both the ADMs and ODMs rely on a common meta-model, the Application Management Model of Section 3, which defines the basic structure of what kinds of types and objects are available to use within the DTNMA. The relationships among the AMM, ADM, and ODM are illustrated in Figure 1. Together, the set of objects in the union of all supported ADMs with dynamic ODM objects forms the data model used to manage an Agent.¶
While an agent hosts the actual object instances, each manager must contain the corresponding ADM and ODM definitions in order to identify and interact with those objects. Those interactions are performed using Application Resource Identifiers (ARIs) as depicted in Figure 2.¶
The ARI of [I-D.birrane-dtn-ari] is used as the basis for the values used internally for Agent Processing activities and for the basis of Agent-Manager Messaging contents.¶
Of the value-producing object types discussed in Section 3.4 and Section 6.5, the functions of these objects are summarized and compared with literals in Table 1 and the following list. In that table, "internal" means values are managed by the Agent itself and "external" means the source of values is outside the Agent.¶
ARI literals are, by definition, immutable and fully self-contained values.¶
For example, the number 4 is a literal value. The name "4" and the value 4 represent the same thing and are inseparable. Literal values cannot change ("4" could not be used to mean 5) and they are defined external to the autonomy model (the autonomy model is not expected to redefine what 4 means).¶
These objects are named values which are defined in specific revisions of an ADM and produced directly by the Agent implementing the ADM. Both the name and the value of the constant are fixed and cannot be changed (within a revision).¶
An example of a constant would be defining the numerical value pi to some predetermined precision.¶
These objects are named value storage entities which are defined in ADMs or ODMs and managed by the Agent implementing the ADM or ODM. While the name is constant the value can change over time due to controls acting upon the Agent. One standard interface is an ADM-defined initial state expression with a control available to reset to that initial state (which can itself reference other value producing objects and operators). Another standard interface is a control to set a variable to a specific value.¶
An example of a variable using just its initial expression would be an accumulator summing together a list of counter values produced by other objects. An example of a manager-controlled variable would be a threshold value used to compare against a sensor value in a rule predicate.¶
These objects are named entities which are defined in an ADM but produce values based on data provided to an Agent from its environment. These values are the foundation of state-based autonomy as they capture the state of the managed device. The autonomy model treats these values as read-only state. It is an implementation matter to determine how external data is transformed into values of the specific type specified for an EDD.¶
Examples of externally defined values include temperature sensor readings and the instantaneous data rate from a modem or radio.¶
Immutable | Mutable | |
---|---|---|
Internal | CONST | VAR |
External | LIT | EDD |
Based on the reasoning described in [I-D.ietf-dtn-dtnma], much of the closed-loop processing of the state of the DTNMA Agent is performed on the Agent itself using rule objects. The different types of processing performed on the Agent are separated into Execution, Evaluation, and Reporting with corresponding AMM object types related to each of these as indicated in Table 2 (e.g., execution relates to CTRL objects but not OPER objects). Some of the objects defined in the Agent ADM (Section 4.3) combine the use of these processing activities, but they are still independent of each other. There is no mixing of activities such as executing a control within an expression; although the execution of a control can result in an expression being evaluated they are independent activities.¶
Within the runtime of an Agent any input, output, and intermediate values can use the concept of a semantic type (Section 3.3) to do things like restrict the valid numeric range of a value or allow a union of disjoint types to be present (e.g., a certain value can be a boolean or an unsigned integer). This is combined with the literal types available from the ARI to allow complex type information to be present in an ADM or ODM without requiring additional over-the-wire encoding size. A Type Casting activity is defined for when implicit or explicit type conversion is needed.¶
Activity | Objects | Values |
---|---|---|
Execution | CTRL | MAC |
Evaluation | OPER, TYPEDEF | EXPR |
Reporting | N/A | RPTT |
Value Production | CONST, EDD, VAR | N/A |
Type Casting | TYPEDEF | N/A |
Rule Autonomy | SBR, TBR | N/A |
This document does not define a messaging protocol between agents and managers but full functioning of this data model behavior does rely on the following types of messages being available:¶
The contents of these messages, individual fields, are representable by ARI values so require only small additional message-type identifying and framing overhead to bind to whatever transport is being used (e.g. the Bundle Protocol).¶
This section describes the Application Management Model, which is the meta-model used to implement the DTNMA. This section also provides additional information necessary to work with this model, such as: literal value types, object structure, naming conventions, and processing semantics.¶
The overall AMM is decomposed into two categories:¶
Values within the AMM have two top-level classes: literal values, and object references. Each of these is discussed more detail in the following subsections. Both classes of AMM values are related to what can be represented externally as an ARI, as described in Section 3.1.3.¶
As defined in the DTNMA, Literal (LIT) values are those whose value and identifier are equivalent. These are the most simple values in the AMM. For example, the literal "4" serves as both an identifier and a value.¶
Because the value of a Literal object serves as its identifier, there is no concept of a parent namespace or parameters. A literal can be completely identified by its data type and data value.¶
Literals have two layers of typing:¶
BOOL
has two possible values, while an INT
has a large domain of integers).
There are a small number of literal types and they are managed with an IANA registry defined in Section 9.3 of [I-D.birrane-dtn-ari].¶
All literal values have a concrete and stand-alone representation independent of any ADM or ODM behavior in the form of an ARI (Section 3.1.3), but when represented as an ARI a value loses its semantic type.¶
Every object in the AMM is uniquely identifiable, regardless of whether the item is defined statically in an ADM or dynamically in an ODM. Object reference values are composed of four parts: a namespace, an object type, an object name, and object-specific optional parameters.¶
AMM objects are identified within unique namespaces to prevent conflicting names within network deployments, particularly in cases where network operators are allowed to define their own object names. In this capacity, namespaces exists to eliminate the chance of a conflicting object name. They MUST NOT be used as a security mechanism. An Agent or Manager MUST NOT infer security information or access control based solely on namespace information.¶
Two categories of namespaces available within the OBJ-REF and the ARI syntax:¶
Object types, each with a text-name and enumeration, are defined in an IANA registry by Section 9.3 of [I-D.birrane-dtn-ari].¶
Object names are text strings and enumerations whose value is determined by the creator of the object. For those objects defined in an ADM, the structure of the object name is given in Section 3.4.1.¶
Parameterization is used in the AMM to enable expressive autonomous function and reduce the amount of traffic communicated between Managers and Agents. In the AMM, most objects can be parameterized and the meaning of parameterization for each object type is defined in Section 3.4 with behaviors related to parameters defined in Section 6.¶
There are two notions of parameters defined in the AMM, which take their name from computer programming vernacular used for discussing function declarations and function calls, those are: formal parameters and actual parameters. Formal parameters are discussed in Section 3.4.1 and actual parameters are discussed here in relation to the object reference.¶
Actual parameters represent the data values passed to a parameterized AMM Object at runtime. They "fulfill" the parameter requirements defined by the formal parameters for that object. Each object type can have a slightly different notion of how its parameters affect its processing activities.¶
An actual parameter MUST specify a value and MAY specify a type. If a type is provided it MUST match the type provided by the formal parameter.¶
There are two ways in which the value of an actual parameter can be used:¶
LABEL
of some other processing-context-specific value and substituting, at runtime, that named value as the value of this parameter.
This method is useful when a parameterized AMM Object contains a value that references another parameterized AMM Object.
The contained object's actual parameter can be given as the LABEL
of the containing object's parameter.
In this way, a containing object's parameters can "flow down" to all of the objects it references.¶
In cases where a formal parameter contains a default value, the associated actual parameter may be omitted. Default values in formal parameters (and, thus, optional actual parameters) are encouraged as they reduce the size of data items communicated between Managers and Agents in a network.¶
The Application Resource Identifier (ARI) is used to represent AMM values outside of an Agent or Manager (i.e. in messaging between them) and is defined in [I-D.birrane-dtn-ari]. Another function of the ARI is for diagnostic or configuration purposes within either Managers or Agents. It is important to make the distinction that within an AMM entity (Agent or Manager) the semantic type of a value is kept, but when exchanged via ARI the semantic type is lost. The AMM defines type compression and reconstruction rules in Section 6.10 to handle this.¶
This section describes the literal type definitions used by the AMM. By definition, literal values are self-contained and literal types restrict the form and function of those values.¶
All literal types within the AMM exit within a flat namespace, but some types have complex relationships with other types beyond the "is a" concept of type inheritance. Types are defined within an IANA registry by Section 9.3 of [I-D.birrane-dtn-ari] and explained in this section. The following subsections divide the types into groups to simplify their explanation, not because of an intrinsic relationship within each group.¶
Simple types are those which cannot be subdivided and represent an "atomic" value within the AMM type system. They correspond roughly with the CBOR primitive types Section 3.3 of [RFC8610]. The simple types are summarized in Table 3.¶
Type | Description |
---|---|
NULL
|
The singleton null value. |
BOOL
|
A native boolean true or false value. |
BYTE
|
An 8-bit unsigned integer. |
INT
|
A 32-bit signed integer. |
UINT
|
A 32-bit unsigned integer. |
VAST
|
A 64-bit signed integer. |
UVAST
|
A 64-bit unsigned integer. |
REAL32
|
A 32-bit [IEEE.754-2019] floating point number. |
REAL64
|
A 64-bit [IEEE.754-2019] floating point number. |
TEXTSTR
|
A text string composed of (unicode) characters. |
BYTESTR
|
A byte string composed of 8-bit values. |
TP
|
An absolute time point (TP). |
TD
|
A relative time difference (TD) with a sign. |
LABEL
|
A text label of a parent object parameter. This is only valid in a nested parameterized ARI. |
CBOR
|
A byte string containing an encoded CBOR item. The structure is opaque to the Agent but guaranteed well-formed for the ADM using it. |
LITTYPE
|
An integer value representing one of the code points in this Literal Types table. |
The following subsections discuss nuances in sub-groups of these simple types.¶
The NULL
and BOOL
types are used to limit to specific discrete values.
Because there are CBOR primitive types corresponding exactly with these AMM types, generators of ARIs with these types can always be compressed by eliding the literal type as defined in Section 6.10.¶
The NULL
type has only a single value, null
, which is not useful for expressions or type casting but is useful for defining union types which have "optional value" semantics where the null
value is used to indicate the absence of a normal value.¶
The BOOL
type is useful for type casting (Section 6.9.1) where an arbitrary value is treated as "truthy" or "falsey" in a context such as a State-Based Rule (SBR) condition.¶
All of the numeric types (BYTE
, UINT
, INT
, UVAST
, VAST
, REAL32
, and REAL64
) exist within a domain where values can be cast between types (Section 6.9.1).
Some cases of implicit casting is done for type promotion as necessary for arithmetic operations.¶
The TP
type represents an instant in time in the UTC datum.
When in text form it is formatted in accordance with the date-time
symbol of Appendix A of [RFC3339] and always in the "Z" time-offset.¶
The TD
type represents an offset in time from a relative epoch instant, either later than (a positive offset) or earlier than (a negative offset).
When in text form it is formatted in accordance with the duration
symbol of Appendix A of [RFC3339] with a positive or negative sign prefix.
The epoch instant of a relative time MUST be unambiguously defined in the context using the time value.¶
AMM objects, or parameters associated with those objects, often need to represent groups of related data or more complex nesting of data. These are the literal types for collections, which can only be present in a typed-literal ARI form.¶
The AMM defines two collection literal types, AC and AM, and allows ADMs to combine these literal types with a complex pattern syntax to create semantic types constraining their contents (e.g., for macros and expressions in Section 4.2.3).¶
An ARI Collection (AC) is an ordered list of ARIs.¶
ACs are used when there exists a need to refer to multiple AMM objects as a single unit. For example, when defining a Report Template, the definition has an AC that defines the ordered ARIs whose values constitute that report.¶
An ARI Map (AM) is a mapping from a set of literal-value "key" ARI to arbitrary-valued "value" ARI. TBD¶
When an application requires a more complex or specialized literal type than one already available the preferred design procedure is as follows:¶
CBOR
type with interface documentation to explain the syntax of the encoded CBOR item.¶
Implementing a custom literal type requires implementation effort on both an Agent and its associated Manager(s) as well as being more opaque to diagnostic tools and middleboxes.¶
While literal types control the basic syntax and domain of AMM values, the concept of semantic type is to provide a means to augment literal types by expanding (via union), narrowing (via restrictions), and adding human-friendly attributes.¶
Semantic types can be defined in two ways: a named Semantic Type Definition (TYPEDEF) or an anonymous type.
Because this document defines the ADM syntax as an extension of YANG module syntax, the pre-existing type
statement logic from YANG is used in the AMM.¶
When a "type" is needed for an AMM value in an object definition it SHALL be either one of the literal types, a namespace-qualified semantic type, or an anonymous semantic type just for that value.¶
This section identifies the types of objects that make up the AMM and which are instantiated within each ADM and ODM. Each object type is defined by its logical structure and its behavior in "execution" and "evaluation" contexts within Agents. Each type can allow or disallow parameters within objects and, due to processing behaviors, can either allow or disallow use within an ADM or ODM.¶
Unless explicitly specified in the object type subsection, an object SHALL NOT be parameterized.¶
Every object type in the AMM includes a set of fields providing annotative or otherwise user-friendly descriptive information for the object. This information may be used as documentation (for example, only present in ADMs and on operator consoles) and/or encoded and transmitted over the wire as part of a management protocol.¶
The metadata supported by the AMM for all objects is as follows:¶
id-text
ABNF symbol of Section 4 of [I-D.birrane-dtn-ari].
Within each namespace and object type, the name of an object SHALL be unique.¶
Formal parameters define a method to customize an AMM object. When used by an object definition, it's formal Parameters SHALL be an ordered list of individual formal parameter definitions. Each formal parameter SHALL include type and name. Each formal parameter MAY include an optional default value. The application of default parameters and relationship of actual parameters (Section 3.1.2.1) to formal parameters is defined in Section 6.4.¶
An ADM can define a semantic type definition (TYPEDEF) to give a name to a semantic type (Section 3.3). This TYPEDEF name can then be used as a type anywhere else in the same ADM or another one which imports it.¶
The definition of a TYPEDEF consists of the following:¶
typedef
syntax and logic from YANG is used.¶
As defined in this document, TYPEDEFs and semantic types can only be defined within an ADM. Future capability could allow the use of TYPEDEFs within ODMs.¶
Externally defined data (EDD) objects, as defined in the DTNMA, represent data values that are produced based on a source external to the Agent itself. The Value Production occurs at the moment the value is needed, by either an Evaluation or a Reporting. The actual value could come from outside of the Agent proper, or be derived from data outside of the Agent.¶
The value production of an EDD SHOULD be nilpotent and have no side-effects in the processor. This property is not enforced by the Agent but requires consideration of the ADM designers, see Section 8.¶
For values managed entirely within the Agent use a Variable (VAR) or for constant-values use a Constant (CONST). For complex tabular data, use an EDD with a type which produces a Tabular Report (TBL).¶
The definition of an EDD consists of the following:¶
As defined in this document, EDDs can only be defined within an ADM. Future capability could allow the use of EDDs within ODMs.¶
A Constant (CONST) represents a named literal value, but unlike an Externally Defined Data (EDD) or Variable (VAR) a CONST always produces the same value. Examples include common mathematical values such as PI or well-known time epochs such as the UNIX Epoch. A CONST typed to produce a simple value can be used within an expression (see Section 6.7), where the object is used to produce a value at the moment of evaluation. A CONST can also be typed to produce an EXPR value to evaluate, or MAC value to execute.¶
The definition of a CONST consists of the following:¶
As defined in this document, CONSTs can only be defined within an ADM. Allowing network operators to define constants dynamically means that a Constant could be defined, removed, and then re-defined at a later time with a different value, which defeats the purpose of having Constants. When adding new "fixed" values to an ODM, a Variable (VAR) MUST be used instead of a Constant.¶
A Control (CTRL) represents a predefined function that can be executed on an Agent. Controls are not able to be defined as part of dynamic network configuration since their execution is typically part of the firmware or other implementation outside of the Agent proper.¶
The execution of a CTRL SHOULD be idempotent and have no effect if executed multiple times in sequence. This property is not enforced by the Agent but requires consideration of the ADM designers, see Section 8.¶
Controls can be executed in a "one shot" manner as part of messaging from a Manager to an Agent. Network operators that wish to autonomously execute functions on an Agent may use a State-Based Rule (SBR) or Time-Based Rule (TBR). When an execution involves the ordered sequence of controls, a Macro (MAC) SHOULD be used instead of a more fragile use of CTRL directly.¶
The definition of a CONST consists of the following:¶
A CTRL definition MAY include ARI parameters to be used when the CTRL is executed. Parameterized objects are discussed in Section 8.¶
As defined in this document, CTRLs can only be defined within an ADM. Future capability could allow the use of CTRLs within ODMs if there was some mechanism to bind a CTRL definition to some platform-specific execution specification (e.g., a command line sequence).¶
An Operator (OPER) represents a user-defined, typically mathematical, function that operates within the evaluation of an Expression (EXPR). It is expected that operators are implemented in the firmware of an Agent.¶
The AMM separates the concepts of Operators and Controls to prevent side-effects in Expression evaluation (e.g. to avoid constructs such as A = B + GenerateReport()
).
For this reason, Operators are given their own object type and Controls do not interact with operators.¶
The definition of an OPER consists of the following:¶
As defined in this document, OPERs can only be defined within an ADM. Future capability could allow the use of OPERs within ODMs if there was some mechanism to bind an OPER definition to some platform-specific evaluation specification.¶
A State-Based Rule (SBR) is a form of autonomy in which the Agent performs an action upon the change of state to meet a specific condition. The execution model of the SBR is to evaluate the Condition (as often as necessary to handle changes in its expression evaluation) and when it evaluates to a truthy (Section 6.9.1) value and it has been no shorter than the Minimum Interval since the last execution, the Action is executed. When the Maximum Count of executions is reached the TBR is disabled. The execution occurs concurrently with any time processing and may take longer than the Minimum Interval, so it is possible that multiple executions are requested to overlap in time.¶
Each SBR has an enabled state to allow rules to be retained in an ADM or ODM but not enabled during Manager-controlled time periods or under certain Manager-desired conditions. See Section 4.3 for details about what SBR-related controls are in the Agent ADM.¶
The definition of an SBR consists of the following:¶
BOOL
value after evaluation and used to determine when to execute the action of the SBR.¶
TD
value.
The interval MAY be zero to indicate that there is no minimum.
This is not a limit on the interval of evaluations of the condition.
This value can be used to limit potentially high processing loads on an Agent.¶
UVAST
value.
The count sentinel value zero SHALL be interpreted as having no maximum.
This is not a limit on the number of evaluations of the condition.¶
true
.¶
A Time-Based Rule (TBR) is a form of autonomy in which the Agent performs an action at even intervals of time. The execution model of the TBR is to start a timer at the Start Time of the TBR ticking at an even Period; each time the timer expires the Action is executed. When the Maximum Count of executions is reached the TBR is disabled. The execution occurs concurrently with any time processing and may take longer than the TBR Period, so it is possible that multiple executions are requested to overlap in time.¶
Each TBR has an enabled state to allow rules to be retained in an ADM or ODM but not enabled during Manager-controlled time periods or under certain Manager-desired conditions. See Section 4.3 for details about what TBR-related controls are in the Base ADM.¶
The definition of an SBR consists of the following:¶
TIME
(Section 4.2.2) value.
A relative start time SHALL be interpreted relative to the absolute time at which the Agent is initialized (for ADM rules) or the rule is created (for ODM rules).
The start time MAY be the relative time zero to indicate that the TBR is always active.
This is not a limit on the interval of evaluations of the condition.¶
TD
value.
The period SHALL NOT be zero but any non-zero small period is valid.¶
UVAST
value.
The count sentinel value zero SHALL be interpreted as having no maximum.
This is not a limit on the number of evaluations of the condition.¶
true
.¶
A Variable (VAR) is a stateful store of a value in an Agent. The evaluation of a VAR is similar to an EDD except that all the behavior of a VAR is entirely within an Agent, while the ultimate source of an EDD value is outside of the Agent. The evaluation of a VAR into a value SHALL be nilpotent and have no side-effects in the processor.¶
A VAR has an initializer, which is used at Agent initialization and to reset the VAR, but the VAR is otherwise stateful and will retain its last value between any actions which edit it.¶
The definition of a VAR consists of the following:¶
LABEL
value.¶
An ADM is a logical entity for defining static AMM object instances, which are discussed in detail in Section 3.4. Each ADM exists as a separate namespace for its contained objects, but allows importing object names from other ADMs to reuse them. Each Agent can support any number of ADMs at one time (subject to implementation limitations) and each Manager can operate with ADMs of different revisions to support diverse Agents.¶
The following subsections define what is present in an ADM generally and what objects necessary to operate a DTNMA Agent are present in two base ADMs.¶
An ADM is "static" in the sense that it is revision-controlled and a released revision of an ADM does not change. Besides AMM object definitions there are metadata and handling rules for the ADM itself, which are discussed in this section.¶
This section explains the purposes of the metadata fields of an ADM, while the profile of Section 7 defines a syntax for how these fields fit into a YANG module.¶
id-text
ABNF symbol of Section 4 of [I-D.birrane-dtn-ari].¶
id-text
ABNF symbol of Section 4 of [I-D.birrane-dtn-ari].¶
Following in the pattern of YANG features Section 5.6.2 of [RFC7950] and SMIv2 conformance groups [RFC2580], the AMM has the concept of ADM features and Agent conformance to those features. Each feature is a simple qualified name and each object in an ADM can be conditional on the conformance to a set of features.¶
The base DTNMA ADM is a necessary part of the AMM typing, execution, and evaluation models. Rather than having some Agent logic defined purely by specification, this document uses a base ADM to define semantic types and controls needed for normal Agent operations. The needed types are still set by specification and are unchanging within an ADM revision, but this avoids having a separate, intermediate typing system between the AMM-defined semantic types and the ARI-defined literal types. This is also in-line with how the SMIv2 [RFC2578] and NETCONF/YANG [RFC6991] both rely on base modules for some core behavior.¶
The most basic use of a semantic type is to provide additional meaning to simple types. None of these types associates a unit with the value, which it is expected that a derived type or an anonymous type (at the point of use) would add for additional clarity.¶
These are summarized below:¶
counter32
and counter64
:gauge32
and gauge64
:timestamp
:All of the literal types defined in [I-D.birrane-dtn-ari] have a flat structure, with some types sharing the same CBOR primitive encoding but having the concept of a derived "base" of another type. In order to allow types to fit into a more logical taxonomy, the base ADM defines some specific semantic typedefs to group literal types. These groups are not a strict logical hierarchy and are intended only to simplify the effort of an ADM designer when choosing type signatures.¶
These are summarized below:¶
TYPE-REF
:LITTYPE
and TYPEDEF-REF
types.¶
INTEGER
:BYTE
, UINT
, INT
, UVAST
, and VAST
types.¶
FLOAT
:REAL32
and REAL64
types.¶
NUMERIC
:INTEGER
and FLOAT
types.¶
PRIMITIVE
:NONE
, BOOL
, NUMERIC
, TEXTSTR
, and BYTESTR
types.¶
TIME
:TP
and TD
types.¶
SIMPLE
:PRIMITIVE
, and TIME
types.¶
LITERAL
:SIMPLE
, LITTYPE
, LABEL
, CBOR
, AC
, and AM
types. This matches all values that can be in a literal value ARI.¶
VALUE-REF
:CONST-REF
, EDD-REF
, and VAR-REF
reference types. This matches any reference to an object that can produce a value (Section 6.5).¶
An Expression (EXPR) is an ordered collection of references to Operators or operands. An EXPR takes the form of a semantic typedef refining an AC to be a list of ARIs referencing OPERs, ARIs referencing evaluate-able objects (see Section 6.7), or literal value ARIs (with Simple Types). These operands and operators form a mathematical expression that is used to compute a resulting value.¶
The evaluation procedure of an EXPR is defined in Section 6.7. Expressions are used within an ADM for defining the initializer of a Variable (VAR) and for defining the condition of a State-Based Rule (SBR).¶
Since the Expression is an AC, there are no annotative constructs such as parenthesis to enforce certain orders of operation. To preserve an unambiguous calculation of values, the ARIs that form an Expression MUST be represented in postfix order. Postfix notation requires no additional symbols to enforce precedence, always results in a more efficient encoding, and post-fix engines can be implemented efficiently in embedded systems.¶
For example, the infix expression A * (B * C)
is represented as the postfix A B C * *
.¶
A Macro (MAC) is an ordered collection of references to Controls or other Macros. A Macro takes the form of a semantic typedef refining an AC to be a list of ARIs referencing Controls or objects which produce other Macros.¶
The execution procedure of an MAC is defined in Section 6.6.3. Macros are used within an ADM for defining the action of a State-Based Rule (SBR) or Time-Based Rule (TBR).¶
In cases where a Macro references another Macro, Agent implementations MUST implement some mechanism for preventing infinite recursions, such as defining maximum nesting levels, performing Macro inspection, and/or enforcing maximum execution times.¶
A Report Template (RPTT) is an ordered list of object references or expression values used as a source for generating report (Section 4.2.6) values. A RPTT takes the form of a semantic typedef refining an AC to be a list of expressions or references to value-producing objects. The object which produces an RPTT can itself be parameterized so that the RPTT flows down parameters as described in Section 3.1.2.1.¶
A RPTT can be viewed as a schema that defines how to generate and interpret a Report; they contain no values and are either defined in an ADM or configured between Managers and Agents in an ODM. Reports themselves are ephemeral and not represented in the AMM object model directly, see Section 4.2.6. The procedure for reporting on a RPTT is defined in Section 6.8.2.¶
RPTT values SHOULD be used within a CONST where possible. RPTT values MAY be used within a VAR where necessary. This makes correlating a RPT value with its associated RPTT easier over time.¶
A Report (RPT) is an ordered list of data values populated in conformance to a source object being reported on. Reports do not have an individual identifier - rather they are uniquely identified by their source and the timestamp at which their data values were collected.¶
A RPT takes the form of a semantic typedef refining an AC to a sequence of the following:¶
TP
value.¶
BYTESTR
, if the report originated from an execution with a correlator value, or the null
value.¶
A list of ARIs corresponding to the source object, with cardinality according to the following:¶
VALUE-REF
source the item list SHALL be the result of reporting (Section 6.8.1) on that object.¶
undefined
indicates a failure executing the CTRL.¶
RPT values SHALL NOT be used directly within any value-producing object. Values within a RPT are generated by an Agent during reporting (Section 6.8).¶
A Tabular Report (TBL) is a collection of values which are logically structured as a two dimensional table of rows and columns. Similar to Report (RPT) values, tables are instantiated dynamically as part of evaluation and not intended to be user-input.¶
Also similar to RPT values, a TBL can only be interpreted within the context of a Tabular Report Template defined within an ADM. The TBLT takes the form of a structured type definition on a value-producing object which defines the columns of the table, including each of their column names and types and optional constraints on the number of rows in the TBL.¶
A TBL takes the form of a semantic typedef refining an AC to a sequence of the following:¶
TBL values SHOULD be used only within an EDD. Values within a TBL are generated by an Agent during value production (Section 6.5).¶
While the DTNMA ADM described in Section 4.2 contains definitions of static aspects of the AMM, the DTNMA Agent ADM is needed to include necessary dynamic aspects of the operation of an Agent. This separation is also helpful in order to allow the dynamic behaviors of an Agent to be modified over time while the AMM definitions stay stable and unchanging.¶
The Agent ADM contains the following EDD objects used to introspect the Agent's state, all of which can change over time.¶
feature
set, the contained objects in each ADM can be derived.
Because of this, the ADM-contained objects do not require additional introspection.¶
TBD defining boolean, bitwise, and numeric operators¶
An ODM is a logical entity for containing AMM objects, similar to an ADM (Section 4) but in an ODM the objects are not static. An ODM's objects can be added, removed, and (with some restrictions) modified during the runtime of an Agent. Like an ADM, each ODM exists as a separate namespace for its contained objects and an Agent can contain any number of ODMs.¶
Some object types, those which require implementation outside of the Agent proper, are not available to be created in an ODM. These include the CTRL, EDD, and OPER.¶
The actions for inspecting and manipulating the contents of an ODM are available through EDDs and CTRLs of the Agent ADM (Section 4.3.1).¶
This section discusses logic and requirements for processing of AMM objects and values. Each subsection is a separate class of processing that is performed by an Agent.¶
A Manager (or any other entity) MAY perform some of the same processing, e.g. evaluating an expression, in order to validate values or configurations before sending them to an Agent. That kind of behavior is effectively creating a "digital twin" of the managed Agent to ensure that the processing will behave as expected before it is sent. For this reason, the subject noun used in all of these activities is the "processor".¶
The initialization of the Agent state can be associated with a power-on event or, due to the use of volatile memory, can be an explicit activity initiated from outside the Agent runtime. If volatile memory is used the contents of the ODMs on an Agent will be present for the initialization procedure; otherwise the ODMs will be considered empty or absent.¶
The procedure to initialize an Agent is as follows:¶
All ADM-defined VAR objects SHALL have their value set to one of the following:¶
undefined
.¶
Any ODM-defined VAR objects MAY retain their state.¶
Within an ADM, ARIs present in the various fields of object definitions are URI References, which can take the form of Relative URIs (see Section 4.2 of [RFC3986]). Any ARIs within an ADM definition SHALL be handled as URI References and resolved in accordance with the procedure of Section 5 of [RFC3986] with the following used as a Base URI:¶
ari:/
SHALL be the Base URI.
This means that all ARIs within an ADM do not require a URI scheme part.¶
An object-reference value (Section 3.1.2) contains an identity and a parameter part. Dereferencing an OBJ-REF uses the identity to look up a specific defined object available to the agent.¶
The process of dereferencing a value is as follows:¶
An object-reference value (Section 3.1.2) contains an identity and a parameter part. The parameter part of an OBJ-REF represents the actual parameters (Section 3.1.2.1) being used.¶
The process to validate and reconcile provided actual parameters against an object's formal parameters is as follows:¶
For each actual parameter, the processor performs the following:¶
If the value is a TYPEDEF-REF
and the value itself has a parameter, the original value is replaced by the result of a type cast (Section 6.9.3) on the parameter value.
If the cast fails this procedure stops and is considered failed.¶
For each correlated pair of single formal and actual parameter, the processor performs the following:¶
If the actual parameter is undefined
and the formal parameter defines a default value, that default replaces the actual parameter value.¶
If the actual parameter is still undefined
, this procedure stops and is considered failed.
FIXME: should this pass through without failure? That's the ECMAscript way.¶
An implementation MAY perform deferred "lazy" processing of any of the above steps, causing a failure when the actual parameter value is needed. One caveat about deferred validation is that it will not fail if the parameter is unused, which is not necessarily a problem but could mask other issues in whatever generated the parameters.¶
Value production can be thought of as a common behavior used for Execution, Evaluation, and Reporting activities. Within the AMM the following entities have a value production procedure: CONST, EDD, and VAR object references.¶
Both CONST and VAR objects act as a store of a single literal value within the Agent.
Formal parameters on either CONST or VAR objects are applicable only when the objects store a value which itself contains parameters with at least one LABEL
type.¶
The value production for these are as follows:¶
When no actual parameters are present (regardless of formal parameters), the stored value is considered to be the produced value and this procedure is complete.¶
When actual parameters are present, the the stored value is augmented into the produced value by:¶
LABEL
actual parameters in the value, recursively in the case of a collection (Section 3.2.2) value.
This augmentation has no effect on the stored value, it occurs only in the produced value.¶
LABEL
in the value to not have a corresponding actual parameter and in such case this procedure stops and is considered failed.¶
For EDD object references, the actual parameters are used by the underlying implementation to produce the value in an arbitrary way.
The produced value is typically either a SIMPLE
(Section 4.2.2) value or a Tabular Report (Section 4.2.7).¶
The value production for these are as follows:¶
The processor passes the execution on to the underlying implementation of the EDD or TBLT being produced from.¶
The context given to the implementation is the following:¶
The initial state of the Result Storage is the undefined
value.
It is an implementation matter and author consideration (Section 8) to enforce that the produced value is consistent with the type of the object.¶
Within the AMM only two entities have an execution procedure: controls and macros. Controls are executed by reference, while macros are executed both by value and by reference.¶
The execution of a VALUE-REF
(Section 4.2.2) producing a value of any type is as follows:¶
LABEL
parameters within the value.¶
If the value is an MAC
(Section 4.2.4) type, this value is executed in accordance with Section 6.6.3.¶
Otherwise, the execution is considered failed.¶
The execution of an OBJ-REF referencing a Control (CTRL) is as follows:¶
The processor passes the execution on to the underlying implementation of the CTRL being executed.¶
The context given to the implementation is the following:¶
The initial state of the Result Storage is taken from the default result the CTRL, if defined, or null
otherwise.¶
If the execution procedure fails, the result value SHALL be treated as the undefined
value for the purposes of any subsequent reporting.¶
The execution of a Macro (MAC) value, which is structured as an AC, is as follows:¶
VALUE-REF
with their value produced in accordance with Section 6.5.
If any dereference fails this procedure stops and is considered failed.¶
From this point on the AC contains only CTRL-REF
values or nested AC with CTRL-REF
.
The processor iterates through all items of the AC recursively, in depth-first order, and performs the following:¶
If the item is an CTRL-REF
it is executed in accordance with Section 6.6.2.
If the execution fails, this procedure stops and is considered failed.¶
Otherwise, this procedure stops and is considered failed.¶
One effect of this procedure is that if any referenced MAC values cannot be produced the procedure fails before any CTRL is executed. Another effect of this procedure is that if any referenced CTRL fails during execution the processing fails immediately and subsequent CTRLs or MACs are not executed.¶
Within the AMM the following entities have an evaluation procedure: references to value-producing objects, OPERs, and TYPEDEFs and and EXPR values.¶
For the purposes of these procedures, it is important to distinguish between an EXPR value and a reference to a value-producing object which is typed to produce an EXPR
value.¶
The evaluation of a VALUE-REF
(Section 4.2.2) producing a value of any type is as follows:¶
LABEL
parameters within the value.¶
If the value is an EXPR
(Section 4.2.3) type, this value is considered to be a sub-expression and is evaluated in accordance with Section 6.7.4.¶
Otherwise, the produced value is considered to be the evaluation result.¶
This procedure applies only during the evaluation of a containing expression (Section 6.7.4); an OPER cannot be evaluated in isolation.¶
The evaluation of an OBJ-REF referencing a Operator (OPER) is as follows:¶
The processor passes the evaluation on to the underlying implementation of the OPER being evaluated.¶
The context available to the implementation is the following:¶
If the evaluation procedure fails, the failure SHALL propagate up to any expression evaluation.¶
This procedure applies only during the evaluation of a containing expression (Section 6.7.4); a TYPEDEF cannot be evaluated in isolation. The evaluation of a TYPEDEF reference is handled similarly to a unary OPER but it occurs entirely within the Agent and does not rely on an object-specific implementation.¶
The evaluation of an OBJ-REF referencing a Semantic Type Definition (TYPEDEF) is as follows:¶
The evaluation of an Expression (EXPR) value, which is structured as an AC, is as follows:¶
For each item of the AC, recursively, the processor performs the following:¶
If the value is a VALUE-REF
, the original value is replaced by the value produced in accordance with Section 6.5.
If the production fails this procedure stops and is considered failed.¶
From this point on the AC is treated as a Reverse Polish Notation (RPN) sequence, where the following is performed on each item in the AC in sequence:¶
If the item is an OPER-REF
it is evaluated in accordance with Section 6.7.2.
If the evaluation fails, this procedure stops and is considered failed.¶
Otherwise, the item is pushed onto the stack.¶
One effect of this procedure is that if any referenced values cannot be produced the procedure fails before any OPER is evaluated.
Another effect of this procedure is that if any referenced OPER fails during evaluation or any value production fails the EXPR processing fails immediately and subsequent OPER-REFs, EXPRs, or VALUE-REF
references are not evaluated.¶
Within the AMM the following entities have a reporting context: CONST, EDD, and VAR objects and RPTT values. The value-producing objects are reported-on by reference, while RPTT are reported-on both by value and by reference.¶
The reporting on a VALUE-REF
(Section 4.2.2) producing a value of any type is as follows:¶
LABEL
parameters within the value.¶
If the value is an RPTT
(Section 4.2.5) type, this value is used to generate report items in accordance with Section 6.8.2.¶
Otherwise, the produced value is used as the single RPT item.¶
The reporting on a Report Template (RPTT) value, which is structured as an AC, is as follows:¶
The processor iterates through all items of the AC, performing the following:¶
If the item is an EXPR
value it is replaced by the result of evaluation in accordance with Section 6.7.
If the evaluation fails the undefined
value is used as a substitute.¶
Otherwise, if the item is a VALUE-REF
it is replaced by the value produced in accordance with Section 6.5.
If the production fails the undefined
value is used as a substitute.¶
Otherwise, the result of the production is the value appended to the item list.¶
Because this procedure acts on an RPTT value and not an object reference, the report itself cannot be assembled within this context.
One effect of this procedure is that if any item of the RPTT cannot be reported on, the undefined
value is used as a sentinel and the other report items are still generated.¶
The type system of the AMM allows conversions of values between different literal and semantic types in a way which is supposed to preserve the "meaning" of the value.¶
In some cases, casting is performed implicitly by the Agent while other cases the casting is explicitly part of an expression. One example of implicit casting is during Parameter Handling to ensure each processed parameter meets the formal parameter type signature. Another example of implicit casting is for numeric operators in the Agent ADM (Section 4.3.2).¶
The AMM has the concepts of "truthy" and "falsey" as being the result of casting to BOOL
type.
Similar to the ToBoolean()
function from [ECMA-262], the AMM casting treats the following as falsey and every other value as truthy:¶
undefined
¶
null
value of NULL
¶
false
value of BOOL
¶
BYTE
, UINT
, INT
, UVAST
, and VAST
¶
REAL32
and REAL64
¶
TEXTSTR
and BYTESTR
¶
When casting a value to BOOL
type, the processor SHALL use the result value false
if the original value is falsey and true
otherwise.¶
The casting of a value to a NUMERIC
type is intended to easily allow mixed-type expressions while keeping the number of operators and parameter unions small.¶
When casting a value to an INTEGER
type from any other NUMERIC
type, the processor SHALL perform the following:¶
FLOAT
types and is not finite, the cast is considered failed.¶
FLOAT
types, the value is truncated to an integer by rounding toward zero.¶
When casting a value to an FLOAT
type from any other NUMERIC
type, the processor SHALL perform the following:¶
While the earlier discussion of numeric type casting is about converting from an input type to an output type, the concept of a type promotion is about finding a "least compatible type" which can accommodate most, if not all, of the input type range. Casting to a promoted type is called an "up" cast, and from a promoted type a "down" cast.¶
The promotion order for NUMERIC
types is as follows:¶
This promotion logic does not guarantee that an up-cast will always succeed (e.g. some large UVAST
values will not fit within a VAST
or REAL32
) but does provide a strict ordering for finding a compatible type between two NUMERIC
values.
The "least compatible type" between two types SHALL be defined as the smallest up-cast that will accommodate the input types, as indicated in Table 4.
This is almost a strict ordering except for the cast of INT
and UVAST
to VAST
to accommodate both the signed-ness and the size of the inputs.¶
BYTE | UINT | INT | UVAST | VAST | REAL32 | REAL64 | |
---|---|---|---|---|---|---|---|
BYTE | BYTE | UINT | INT | UVAST | VAST | REAL32 | REAL64 |
UINT | UINT | INT | UVAST | VAST | REAL32 | REAL64 | |
INT | INT | VAST | VAST | REAL32 | REAL64 | ||
UVAST | UVAST | VAST | REAL32 | REAL64 | |||
VAST | VAST | REAL32 | REAL64 | ||||
REAL32 | REAL32 | REAL64 | |||||
REAL64 | REAL64 |
Unlike literal type casting, which has the potential to change the form of the value itself, casting to a semantic type is meant to either affirm or add an association between an AMM value and a TYPEDEF object. All of this processing is performed independently of any literal-type-specific handling, so none of it needs to be specialized to specific TYPEDEF objects.¶
The cast of an input value to a TYPEDEF is as follows:¶
The procedures in this section allow AMM values, which can have a semantic type (Section 3.3), to be translated into and out of the ARI syntax (Section 3.1.3), which has no semantic type information. They also describe a way to use type-less literal values to give further compression of values in certain circumstances.¶
The compression of removing type information is possible only when the context in which the value is being used has a specific semantic or literal type associated with it. For example, when a formal object parameter or a report item is typed to either a literal type or a semantic type that doesn't represent a type union then a value being used for the parameter or item can only have that specific type; any other value type will be mismatched and invalid. Another way of looking at this compression is when the value has the same type as its context requires, then the value's type is redundant and can be elided without loss of information.¶
In addition to compression by eliding semantic type within a context, there are also some literal types which have values which only exist in that type.
For example, the BOOL
value true
exists only within that type while the UINT
value 5
is also within the domain of INT
and several others.¶
For the procedures below, the contexts which provide type information SHALL be: all formal parameters, VALUE-REF
values, report template items, tabular columns.¶
When translating from an AMM value into an ARI, the processor performs the following:¶
When translating from an ARI into an AMM value, the processor performs the following:¶
This section provides an ADM syntax in the form of a YANG module conforming to a profile of [RFC7950] defined in this section.¶
It is not required that this encoding be used for transmission of ADM information over the wire in the context of a network deployment. Since the AMM is designed to allow for multiple encodings, the expression of ADMs in a YANG module is intended to support translation to other encodings without loss of information.¶
Some aspects of this YANG profile restrict the allowable definitions to conform with Section 3.4 and by doing so make YANG modules defining ADMs incompatible with YANG modules intended for NETCONF, RESTCONF, or other applications. Because of this, YANG modules defining ADMs SHALL be managed separately from the "YANG Module Names" sub-registry of [IANA-YANG]. See the ADM sub-registry defined in Section 9.3 of [I-D.birrane-dtn-ari] for registration of ADM modules. For the remainder of this section, a YANG module defining an ADM will be referred to as an "ADM module" and a YANG module for any other purpose will be referred to as a "Legacy module" to differentiate it.¶
After explanation of extensions in Section 7.3, the following minimal ADM module will be expanded upon for further examples.¶
<CODE BEGINS> file "example-adm.yang" module "example-adm" { yang-version 1.1; namespace "ari:/example-adm"; prefix "example-adm"; import "ietf-amm" { prefix "amm"; } organization "Example Org."; description "Example module."; amm:enum "4294967296"; } <CODE ENDS>¶
The benefit of using the pre-existing YANG syntax is to take advantage of both tools that process YANG modules as well as the syntax and semantics provided by YANG.¶
The following statements and behaviors of YANG are usable within an ADM with no modification:¶
ari:/example-adm
which is valid YANG.¶
VALUE-REF
definitions, and table columns.¶
Because of the different interpretation of data definitions for an ADM module, the following restrictions are used to limit pre-existing valid YANG syntax within an ADM module:¶
NULL
type to indicate optional values and AMM values can use the null
value to represent that state.
In the case of formal parameters, the use of a "default" statement is used to indicate behavior when an actual parameter is undefined
.
In any case, the AMM value is always present when defined in the structure of an AMM object.
An ADM module SHALL NOT contain any "mandatory" statements.¶
Rather than fully redefine a data model for ADM module use, this profile reinterprets existing YANG node structure of Section 4.2.2 of [RFC7950] in the context of the AMM.¶
One difference in how the nodes are interpreted for an ADM module is related to the arguments to the node statements as identifiers. While Legacy modules have been used to model data for XML representation for NETCONF (or equivalent representations for equivalent protocols), in the AMM values do not have explicit identifiers. Because of this, data node identifiers in ADM modules are for local processing only and never appear in messages between Agents and Managers. They are still valuable and are used by parameter handling procedures and in report and table visualization tools.¶
The AMM interpretation of YANG nodes is defined in the following subsections.¶
A leaf node is used to indicate the presence of an AMM value of a specific literal or semantic type.
A leaf can either be top-level, to define the type of an object or parameter, or can be nested within a container node to define an AMM value within an AC.
As stated earlier, leaf nodes are always mandatory but can be typed to have a union with the NULL
type in order to represent optional values.¶
The substatements of "type", "units", "status", "reference", and "description" are valid in this profile. The "default" substatement applies only in certain circumstances, notably formal parameters (Section 6.4) and has no effect otherwise.¶
A leaf-list node is used to indicate the presence of an AMM value of a specific literal or semantic type. Because this node corresponds with multiple AMM values, this node applies only within a container node (see Section 7.2.3).¶
The substatements of "min-elements", "max-elements", "type", "units", "status", "reference", and "description" are valid in this profile.¶
A container node is used to indicate the presence of an AMM value that is an ARI Collection (AC) with a constrained internal structure (specified by child nodes).¶
The substatements of "leaf", "leaf-list", "container", "status", "reference", and "description" are valid in this profile. The leaf, leaf-list, and container substatements are interpreted as specification of the AC contents. This profile disallows definition of nested tables, so the "list" substatement is not valid.¶
A list node is used to define the structure of a table within a TBLT, which is used to produce a Tabular Report (TBL). Each leaf node within a list corresponds to a single column of the table.¶
The substatements of "key", "unique", "min-elements", "max-elements", "leaf", "container", "status", "reference", and "description" are valid in this profile. The leaf and container substatements are interpreted as specification of the column content, being either a single value or an AC respectively.¶
Although this profile makes no specific prohibitions against the use of the "choice" statement as a data node, it is expected that a choice will have limited utility in an ADM module. Most alternative specifying can be done with semantic types containing type unions; leaving the only use of a choice between a simple value and an structured AC.¶
The mechanisms of "grouping" and "uses" statements are allowed with an ADM module unchanged, however because an ADM does not allow nested object structure the utility of grouping/uses is more limited. One contrived example is a situation where sets of parameters are reused between multiple objects, which can define the formal parameters in a grouping statement and each "parameters" can apply "uses" substatement to pull in those formal parameter nodes.¶
In order to provide syntax necessary for AMM Objects definitions this document defines, via the DTNMA ADM (Appendix A), the following extensions for ADM modules.¶
amm:enum
Statement
This statement is used to apply an integer enumeration to an ADM module or object, which enables the compressed form of ARI discussed in Section 3.1 of [I-D.birrane-dtn-ari].
The argument to this statement is an integer in the YANG range 0..2^31-1
to fit within the ARI syntax.
There are no substatements defined in this profile.¶
amm:parameters
Statement
This statement is used to define the set of formal parameters that apply to the parent object. There is no argument to this statement.¶
The substatements under this are an ordered sequence of formal parameter definitions, each a choice between data node statements interpreted according to Section 7.2. The parameters list itself does not contain metadata statements.¶
Substatement | Cardinality |
---|---|
leaf | 0..n |
container | 0..n |
choice | 0..n |
uses | 0..n |
An example of the parameters statement is below, where there are three defined parameters two of which have default values.¶
amm:parameters { leaf first { type amm:uint { range "3..10"; } leaf second { type amm:textstr; default "\"value\""; } container third { leaf-list _ { type amm:uint; } default "/AC/(3,5,8)" }¶
amm:const
Statement
This statement is used to define a Constant (CONST) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, optional formal parameters, and a single node (Section 7.2) that represents the produced value of the CONST.
The node statement SHALL contain a default
value, which is the constant represented by this object.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
amm:parameters | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
One data node: | |
leaf | 0..1 |
container | 0..1 |
choice | 0..1 |
uses | 0..1 |
An example of a simple-typed CONST is below.¶
amm:const pi32 { leaf _ { type amm:real32; default "3.14159"; } description "A truncated value of Pi."; }¶
Another example of a semantic-typed MAC-valued (Section 4.2.4) CONST is below.¶
amm:const do_thing { container { leaf-list _ { type amm:MAC-item; } default "/AC/(../CTRL/first,../CTRL/second(2))"; } description "Execute two controls in sequence."; }¶
amm:ctrl
Statement
This statement is used to define a Control (CTRL) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, optional formal parameters, and an optional execution result.
If the amm:result
substatement is present it SHALL contain a default value, used to initialize the Result Storage for the execution procedure (Section 6.6.2).
If the amm:result
substatement is omitted the assumed result type SHALL be NULL
with a default value of null
.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
amm:parameters | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
amm:result | 0..1 |
An example of a single-parameter CTRL is below.¶
amm:ctrl reset_count { parameters { leaf src { type amm:textstr; description "The name of the source."; } } result { leaf previous { type amm:UVAST; description "The value just before reset."; } } description "This control resets counts for the given source."; }¶
amm:result
Statement
The result statement contains a single node which represents the result expected from executing a CTRL or evaluating an OPER.¶
Substatement | Cardinality |
---|---|
leaf | 0..1 |
container | 0..1 |
choice | 0..1 |
uses | 0..1 |
amm:edd
Statement
This statement is used to define a Externally Defined Data (EDD) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, optional formal parameters, and a single node (Section 7.2) that represents the produced value of the EDD. The node substatement SHALL NOT contain a default value.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
amm:parameters | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
One data node: | |
leaf | 0..1 |
container | 0..1 |
choice | 0..1 |
uses | 0..1 |
An example of a simple-typed EDD is below.¶
amm:edd tx_count { leaf _ { type amm:counter64; unit "frames"; } description "The count of the number of frames sent."; }¶
amm:oper
Statement
This statement is used to define a Operator (OPER) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, optional formal parameters, an operands list, and an evaluation result.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
amm:parameters | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
operands | 1 |
result | 1 |
An example of an arithmetic OPER is below.¶
amm:oper add { operands { leaf val_a { type amm:NUMERIC; } leaf val_b { type amm:NUMERIC; } } result { leaf _ { type amm:NUMERIC; } } description "Sum together the two operands."; }¶
A more complex "variadic" OPER with parameters is below. Also note the anonymous semantic type used to restrict the parameter.¶
amm:oper sum { parameters { leaf count { type amm:UINT { range "1..max"; } description "The number of operands to pop." } } operands { leaf-list value { type amm:NUMERIC; description "This is not within a container, so does not represent an AC; it is multiple operands."; } } result { leaf sum { type amm:NUMERIC; } } description "Sum together a sequence from the stack."; }¶
amm:operands
Statement
This statement is used to define the set of operands that apply to the parent object. There is no argument to this statement. The node substatement SHALL NOT contain a default value.¶
Substatement | Cardinality |
---|---|
leaf | 0..1 |
leaf-list | 0..1 |
container | 0..1 |
choice | 0..1 |
uses | 0..1 |
amm:sbr
Statement
This statement is used to define a State-Based Rule (SBR) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, the action to execute upon trigger, and rule control fields defined below.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
amm:action | 1 |
amm:condition | 1 |
amm:min-interval | 0..1 |
amm:max-count | 0..1 |
amm:init-enabled | 0..1 |
An example of an SBR with some default fields is below.¶
amm:sbr enable_safe_mode { amm:action "TBD"; amm:condition "(../EDD/sensor,../VAR/min_threshold,/ietf-amm/OPER/lessthan)"; description "Enable safe mode below threshold."; }¶
amm:min-interval
Statement
This statement is used to define the Minimum Interval field of State-Based Rule (SBR) objects.
The argument to this statement is the text form of a TD
value.
If not present, the default value of zero (meaning no minimum) is used.¶
amm:max-count
Statement
This statement is used to define the Maximum Count field of State-Based Rule (SBR) and Time-Based Rule (TBR) objects.
The argument to this statement is the text form of a UVAST
value.
If not present, the default value of zero (meaning no limit) is used.¶
amm:init-enabled
Statement
This statement is used to define the Initial Enabled state of State-Based Rule (SBR) and Time-Based Rule (TBR) objects.
The argument to this statement is the text form of a BOOL
value.
If not present, the default value of true
is used.¶
amm:tbr
Statement
This statement is used to define a Time-Based Rule (TBR) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, the action to execute upon trigger, and rule control fields defined below.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
amm:action | 1 |
amm:start | 1 |
amm:period | 0..1 |
amm:max-count | 0..1 |
amm:init-enabled | 0..1 |
An example of an TBR with some default fields is below.¶
amm:tbr tlm_rule { amm:action "(../CTRL/first,/adm2/CTRL/other)"; amm:period "/TD/PT30s"; description "Generate telemetry reports."; }¶
amm:start
Statement
This statement is used to define the Start field of Time-Based Rule (TBR) objects.
The argument to this statement is the text form of a TIME
(Section 4.2.2) value.
If not present, the default value of zero (meaning start immediately) is used.¶
amm:var
Statement
This statement is used to define a Variable (VAR) object. The argument to this statement is the name of the AMM object.¶
The substatements under this are the common object metadata, optional formal parameters, a single node (Section 7.2) that represents the stored-and-produced value of the VAR, and an optional initializer expression. The node substatement SHALL NOT contain a default value.¶
Substatement | Cardinality |
---|---|
if-feature | 0..1 |
amm:enum | 0..1 |
amm:parameters | 0..1 |
status | 0..1 |
reference | 0..1 |
description | 0..1 |
amm:initializer | 0..1 |
One data node: | |
leaf | 0..1 |
container | 0..1 |
choice | 0..1 |
uses | 0..1 |
An example of a simple-typed VAR with an initializer value is below.¶
amm:var min_threshold { leaf _ { type amm:real32; unit "meters"; } amm:initializer "1e4"; description "The lower threshold to enable safe mode."; }¶
amm:initializer
Statement
This statement is used to define an initial variable state as either an AMM value or an Expression (EXPR). The argument to this statement is the text form of the ARI encoding the expression.¶
The initializer is used as part of the Agent Initialization procedure and when new VAR objects are defined in an ODM.¶
An ADM module is identified, as defined in Section 7.1.1, by the module "namespace" having an "ari" scheme. Within an ADM module, this profile makes restrictions in Section 7.1.2 which are formalized in the following table of allowed module substatements. This table is adapted from Section 7.1. of [RFC7950].¶
Substatement | Cardinality |
---|---|
yang-version | 1 |
namespace | 1 |
prefix | 1 |
include | 0..n |
import | 0..n |
status | 0..1 |
reference | 0..1 |
organization | 0..1 |
description | 0..1 |
revision | 0..n |
extension | 0..n |
feature | 0..n |
deviation | 0..n |
amm:enum | 1 |
typedef | 0..n |
amm:const | 0..n |
amm:ctrl | 0..n |
amm:edd | 0..n |
amm:oper | 0..n |
amm:sbr | 0..n |
amm:tbr | 0..n |
amm:var | 0..n |
The AMM model provides multiple ways to represent certain types of data. This section provides informative guidance on how to express application management constructs efficiently when authoring an ADM document.¶
Parameters incur bandwidth and processing costs (such as type checking) and should only be used where necessary. If an EDD object can be parameterized, but the set of parameters is known and unchanging it may be more efficient to define multiple non-parameterized EDD objects instead. For example, consider a single parameterized EDD object reporting the number of bytes of data received for a specific, known set of priorities and a request to report on those bytes for the "low", "med", and "high" priorities. Below are two ways to represent these data: using parameters and not using parameters.¶
The use of parameters in this case only incurs the overhead of type checking, parameter encoding/decoding, and associative lookup. This situation should be avoided when deciding when to parameterize AMM objects.¶
This document does not define or modify any existing IANA registries. It does rely on the ARI-defined sub-registries defined in [IANA-DTNMP] by Section 9.3 of [I-D.birrane-dtn-ari].¶
This document does not describe any on-the-wire encoding or other messaging syntax. It is assumed that the exchange of AMM objects between Agents and Managers occurs within the context of an appropriate network environment.¶
This AMM model may be extended to include the concept of Access Control Lists (ACLs) to enforce roles and responsibilities among Managers in the network. This access control would be implemented separately from network security mechanisms.¶
The following is the YANG module implementing the entities described in Section 4.2:¶
<CODE BEGINS> file "ietf-amm.yang" module ietf-amm { namespace "ari:/ietf-amm"; prefix "amm"; amm:enum "0"; organization "IETF Delay Tolerant Networking Working Group"; contact "WG Web: <http://tools.ietf.org/wg/dtn/> WG List: <mailto:dtn@ietf.org> WG Chairs: Brian Haberman <mailto:brian@innovationslab.net> Marc Blanchet <mailto:Marc.Blanchet@viagenie.ca> Editor: Brian Sipos <mailto:brian.sipos@jhuapl.edu>"; description "This module implements the DTN Management Architecture (DTNMA) Application Data Model (ADM) base module within YANG"; reference "draft-birrane-dtn-adm"; revision "2023-06-08" { description "Updated for latest AMM contents."; reference "draft-birrane-dtn-adm"; } revision "2016-04-01" { description "Updated to fix typos."; reference "draft-bsipos-dtn-amp-yang"; } revision "2016-03-14" { description "Initial draft release."; reference "draft-bsipos-dtn-amp-yang"; } /**** * This section contains extension for AMM object definitions ****/ // This group of extensions are for common behavior for AMM objects extension enum { argument "value"; description "An enumeration identifies an object within a namespace. The argument to this statement is the integer value."; } extension parameters { description "A container for the formal parameters for an object. Each substatement is a parameter as either a leaf (ARI) or container (AC). Order of parameters is signifigant within this statement."; } // This group are AMM object keywords and their parameters extension const { argument "name"; description "Definition of a CONST within an ADM. The argument to this statement is the object name. A 'value' substatement must be present."; } extension value { argument "ari"; description "The literal value of a CONST object. The argument is the text form of the ARI"; } extension ctrl { argument "name"; description "Definition of a CTRL within an ADM. The argument to this statement is the object name."; } extension result { description "An result value reported as a response to a control. The substatement is the result value as either a leaf (ARI) or container (AC). Each CTRL can have a single optional result."; } extension edd { argument "name"; description "Definition of an EDD within an ADM. The argument to this statement is the object name."; } extension oper { argument "name"; description "Definition of an OPER within an ADM. The argument to this statement is the object name."; } extension operands { description "An individual operand taken from the expression stack during evaluation of the OPER. Each substatement is an operand as a leaf (ARI). Order of operands is signifigant within an object definition."; } extension var { argument "name"; description "Definition of a VAR within an ADM. The argument to this statement is the object name."; } extension init { argument "expr"; description "An EXPR value used to initialize a VAR."; } /**** * This section contains ARI (literal and object-reference) value types. ****/ extension int-labels { description "Type narrowing for an INTEGER to label enum values or bit positions."; } extension cddl { argument "text"; description "Type narrowing for a CBOR item in the form of CDDL syntax. The argument to this statement is the actual CDDL text."; } // Simple literal types as YANG typedefs typedef NULL { type enumeration { enum null { description "The only allowed value."; } } description "A single-valued type to represent a null value."; } typedef BOOL { type boolean; description "The same semantics as the YANG 'boolean' type."; } typedef BYTE { type uint8; description "The same semantics as the YANG 8-bit unsigned type."; } typedef UINT { type uint32; description "The same semantics as the YANG 32-bit unsigned type. Can contain an 'int-labels' substatement for documentation."; } typedef INT { type int32; description "The same semantics as the YANG 32-bit signed type. Can contain an 'int-labels' substatement for documentation."; } typedef UVAST { type uint64; description "The same semantics as the YANG 64-bit unsigned type. Can contain an 'int-labels' substatement for documentation."; } typedef VAST { type int64; description "The same semantics as the YANG 64-bit signed type. Can contain an 'int-labels' substatement for documentation."; } typedef REAL32 { type decimal64 { fraction-digits 10; } description "An IEEE-754 float32 value with a text representation in YANG. The ARI representation is different than the YANG type used here. Allows range restriction."; } typedef REAL64 { type decimal64 { fraction-digits 10; } description "An IEEE-754 float64 value with a text representation in YANG. The ARI representation is different than the YANG type used here. Allows range restriction."; } typedef TEXTSTR { type string; description "The same semantics as the YANG 'string' type. Allows length and pattern restriction."; } typedef BYTESTR { type binary; description "The same semantics as the YANG 'binary' type. Allows length restriction."; } typedef TP { type string; description "An absolute instant in time. The ARI representation is different than the YANG type used here. This is represented as either (narrowed RFC 3339) text or (fractional) seconds from the DTN epoch."; } typedef TD { type string; description "A relative time as a difference between two time instants. The ARI representation is different than the YANG type used here. This is represented as either (narrowed RFC 3339) text or (fractional) seconds."; } typedef LITTYPE { type string; description "An enumeration from IANA table of literal types."; } typedef LABEL { type string { pattern "[a-zA-Z_][a-zA-Z0-9_\\-\\.]*"; } description "An identifier label which fits the YANG 'identifier' pattern."; } typedef CBOR { type BYTESTR; description "A bytestr which contains a single well-formed CBOR item. Can contain a 'cddl' substatement for documentation."; } // Complex literals typedef AC { type string; description "When present within an ADM this uses the text encoding of an ARI Collection (AC)."; } typedef AM { type string; description "When present within an ADM this uses the text encoding of an ARI Map (AM)."; } // Object references typedef OBJ-REF { type string; description "A text representation of an ARI containing an object reference."; } typedef TYPEDEF-REF { type OBJ-REF; description "A reference to a TYPEDEF object."; } typedef CONST-REF { type OBJ-REF; description "A reference to a CONST object."; } typedef CTRL-REF { type OBJ-REF; description "A reference to a CTRL object."; } typedef EDD-REF { type OBJ-REF; description "A reference to an EDD object."; } typedef OPER-REF { type OBJ-REF; description "A reference to a OPER object."; } typedef SBR-REF { type OBJ-REF; description "A reference to an SBR object."; } typedef TBR-REF { type OBJ-REF; description "A reference to a TBR object."; } typedef VAR-REF { type OBJ-REF; description "A reference to a VAR object."; } // Named type unions for literals typedef TYPE-REF { type union { type LITTYPE; type TYPEDEF-REF; } description "Reference to either a literal type or a typedef."; } typedef INTEGER { type union { type BYTE; type UINT; type INT; type UVAST; type VAST; } description "Any type which represents a discrete integer."; } typedef FLOAT { type union { type REAL32; type REAL64; } description "Any type which represents a floating point number."; } typedef NUMERIC { type union { type INTEGER; type FLOAT; } description "Any type which can be used with numeric expressions."; } typedef TIME { type union { type TP; type TD; } description "Any type which can be used with time expressions."; } typedef SIMPLE { type union { type NULL; type BOOL; type NUMERIC; type TEXTSTR; type BYTESTR; type TIME; type LABEL; type CBOR; } description "Any type which contains a single value usable within an expression."; } typedef COMPLEX { type union { type AC; type AM; } description "A literal type which is not SIMPLE."; } typedef LITERAL { type union { type TYPE-REF; //FIXME: is typeref a literal or something else? type SIMPLE; type COMPLEX; } description "Any type which is represented as a literal ARI."; } typedef ANY { type union { type LITERAL; type OBJ-REF; } description "Any type representable by an ARI."; } typedef VALUE-REF { type union { type CONST-REF; type EDD-REF; type VAR-REF; } description "A reference to an object which can produce a value."; } // operational semantic types typedef counter32 { type UINT; description "A 32-bit counter with an arbitrary initial value that only increments. When the value reaches the upper range it wraps around to zero. At least two samples of this value need to be compared over time."; } typedef counter64 { type UVAST; description "A 64-bit counter with an arbitrary initial value that only increments. When the value reaches the upper range it wraps around to zero. At least two samples of this value need to be compared over time."; } typedef gauge32 { type INT; description "A 32-bit value sampling some quantized measurement. The value can increase or decrease arbitrarily over time."; } typedef gauge64 { type VAST; description "A 64-bit value sampling some quantized measurement. The value can increase or decrease arbitrarily over time."; } typedef timestamp { type TP; description "A time point representing the system clock at which a specific occurrence happened. The specific occurrence must be defined in the description of any node defined using this type."; } // Restrictions on AC item types for specific purposes typedef EXPR-item { type union { type SIMPLE; type VALUE-REF; type TYPEDEF-REF; type OPER-REF; } description "Each item of an EXPR list. The value-object must be typed to contain a SIMPLE."; } grouping EXPR { leaf-list _ { type EXPR-item; description "All items are the same type."; } description "The contents of an EXPR container."; } typedef EXEC-REF { type union { type VALUE-REF; type CTRL-REF; } description "A reference to an object which can be executed. The value-object must be typed to contain a MAC."; } grouping MAC { leaf-list _ { type EXEC-REF; description "All items are the same type."; } description "The contents of a MAC container."; } grouping RPTT-item { choice item { case value-ref { leaf ref { type VALUE-REF; description "An object to produce a report value."; } } case expr { container expr { uses EXPR; description "An expression to evaluate into a report value."; } } description "Each item references a value-producing object or contains an expression to be evaluated."; } description "Each item of a RPTT."; } grouping RPTT { container _ { uses RPTT-item; description "The sequence of items in the template."; } description "The contents of a report template, encoded as the sequence of items."; } grouping RPT-items { leaf-list item { type ANY; description "The sequence of items in the report."; } description "The contents of a report, encoded as the sequence of values reported. The semantics of each item are contained in the associated RPTT."; } grouping TBL { leaf col-count { type UVAST; description "The number of columns in the table."; } leaf-list tbl-item { type ANY; description "All table values listed in row-major order."; } description "The flattened contents of a table. The semantics of each column are contained in the associated TBLT."; } grouping RPT { leaf source { type OBJ-REF; description "Reference to the reported object."; } leaf generated-at { type timestamp; description "The generation timestamp."; } choice entries { case value-ref { leaf value { type ANY; } } case rptt { uses RPT-items; } case tblt { uses TBL; } case ctrl-ref { leaf result { type ANY; } } description "Each report content depends on the reported object."; } description "The contents of an RPT container."; } } <CODE ENDS>¶
The following is the YANG module implementing the entities described in Section 4.3:¶
<CODE BEGINS> file "ietf-dtnma-agent.yang" module ietf-dtnma-agent { namespace "ari:/ietf-dtnma-agent"; prefix "da"; import "ietf-amm" { prefix amm; } organization "IETF Delay Tolerant Networking Working Group"; contact "WG Web: <http://tools.ietf.org/wg/dtn/> WG List: <mailto:dtn@ietf.org> WG Chairs: Brian Haberman <mailto:brian@innovationslab.net> Marc Blanchet <mailto:Marc.Blanchet@viagenie.ca> Editor: Brian Sipos <mailto:brian.sipos@jhuapl.edu>"; description "This module implements the DTN Management Architecture (DTNMA) Agent core functionality."; reference "draft-birrane-dtn-adm"; revision "2023-06-08" { description "Updated for latest AMM contents."; reference "draft-birrane-dtn-adm"; } amm:enum "0"; feature rules { description "Conforming to this feature enables time-based and state-based autonomy rules."; } amm:edd amp_version { leaf _ { type amm:TEXTSTR; } description "The version of AMP which this agent supports."; } amm:edd capability { list columns { key adm_name; leaf adm_name { type amm:LABEL; description "The module name of the ADM"; } leaf revision { type amm:TEXTSTR; description "The specific revision the agent supports."; } container features { leaf-list _ { type amm:LABEL; } description "The features of the ADM which the agent supports."; } } description "A table to indicate the ADM capability of the sending agent."; } amm:const hello { uses amm:RPTT; amm:value "(../EDD/amp_version,../EDD/capability)"; description "A report template to indicate the presence of an agent on a network."; } // MAC helper controls amm:ctrl if_then_else { amm:parameters { container condition { uses amm:EXPR; description "The condition to evaluate."; } leaf on_truthy { type amm:EXEC-REF; description "The object to execute when the condition is truthy."; } leaf on_falsy { type union { type amm:NULL; type amm:EXEC-REF; } default "null"; description "An optional execution when the condition is falsey."; } } description "Evaluate an expression and follow one of two branches of further evaluation."; } amm:ctrl catch { amm:parameters { leaf try { type amm:EXEC-REF; description "The object to execute."; } leaf on_failure { type union { type amm:NULL; type amm:EXEC-REF; } default "null"; description "An optional execution after failure."; } } description "Attempt to execute an object, and if there is some failure catch it and execute an alternative object."; } amm:ctrl inspect { amm:parameters { leaf ref { type amm:VALUE-REF; description "An object to produce a value from."; } } amm:result { leaf val { type amm:ANY; description "The produced value."; } } description "Produce a result value to inspect the agent state. This does not perform any EXPR evaluation or RPTT handling."; } amm:ctrl report_on { amm:parameters { uses amm:RPTT-item; } description "Generate a report on an object without needing to define a RPTT. The parameter is a single item that would be in a RPTT. If used for more than one-shot diagnostics, defining a RPTT (e.g. in a VAR) is more efficient because the RPTT item would not be present in the report."; } grouping obj-list-params { leaf include_adm { type amm:BOOL; default "false"; description "If true, listings will include objects from ADMs"; } description "Common parameters for object listing"; } amm:edd typedef_list { amm:parameters { uses obj-list-params; } list _ { key obj; leaf obj { type amm:TYPEDEF-REF; } } description "A table of TYPEDEF within the agent."; } // Objects related to VAR handling amm:edd var_list { amm:parameters { uses obj-list-params; } list _ { key obj; leaf obj { type amm:VAR-REF; } leaf type { type amm:TYPE-REF; } } description "A table of VAR within the agent."; } amm:ctrl var_present { amm:parameters { leaf obj { type amm:VAR-REF; description "A reference to a VAR within an ODM only."; } leaf type { type amm:TYPE-REF; description "The type for the VAR object."; } choice init { case without { leaf _ { type amm:NULL; } } case with { container expr { uses amm:EXPR; } } default "null"; description "An optional initializer expression."; } } description "Ensure a specific VAR is present."; } amm:ctrl var_absent { amm:parameters { leaf obj { type amm:VAR-REF; description "A reference to a VAR within an ODM only."; } } description "Ensure a specific VAR is not present."; } // Objects related to SBR handling grouping sbr-fields { container action { uses amm:MAC; description "The execution when this rule triggers."; } leaf start_time { type amm:TIME; } container condition { uses amm:EXPR; } leaf min_interval { type amm:TD; } leaf max_count { type amm:UVAST; } } amm:edd sbr_list { if-feature rules; list _ { key obj; leaf obj { type amm:SBR-REF; } uses sbr-fields; } } amm:edd tbr_list { if-feature rules; list _ { key obj; leaf obj { type amm:OBJ-REF; } container action { uses amm:MAC; description "The execution when this rule triggers."; } leaf start_time { type amm:TIME; } leaf period { type amm:TD; } leaf max_count { type amm:UVAST; } } } grouping numeric-unary { leaf val { type amm:NUMERIC; description "The single value."; } } grouping numeric-binary { leaf left { type amm:NUMERIC; description "The left-side operand."; } leaf right { type amm:NUMERIC; description "The left-side operand."; } } amm:oper negate { amm:operands { uses numeric-unary; } amm:result { uses numeric-unary; } description "Negate a value. This is equivalent to multiplying by -1 but a shorter expression."; } amm:oper add { amm:operands { uses numeric-binary; } amm:result { uses numeric-unary; } description "Add two numeric values. The operands are cast to the least compatible numeric type before the arithmetic."; } // amm:oper sub // amm:oper multiply // amm:oper divide // amm:oper add // amm:oper bit_not // amm:oper bit_and // amm:oper bit_or // amm:oper bit_xor // amm:oper bool_not // amm:oper bool_and // amm:oper bool_or // amm:oper bool_xor // amm:oper compare_eq // amm:oper compare_ne // amm:oper compare_gt // amm:oper compare_ge amm:oper compare_lt { amm:operands { uses numeric-binary; } amm:result { uses numeric-unary; } description "Compare two operands by value. The result is true if the left value is less than the right. The operands are cast to the least compatible numeric type before the comparison."; } amm:oper compare_le { amm:operands { uses numeric-binary; } amm:result { uses numeric-unary; } description "Compare two operands by value. The result is true if the left value is less than or equal to the right. The operands are cast to the least compatible numeric type before the comparison."; } } <CODE ENDS>¶
For the sake of adhering to the proper syntax for ARIs, all of the example reports are timestamped at 2023-01-01T00:00:00Z.¶
ari:/dtnma-agent/CTRL/report_on(/example-adm/EDD/intvalue)¶
Executing that results in a report containing the following:¶
( /example-adm/EDD/intvalue, /TP/20230101T000000Z, /INT/10 )¶
If the produced value has a semantic type which is ambiguous within the EDD type, the report would instead contain:¶
( /example-adm/EDD/intvalue, /TP/20230101T000000Z, /example-adm/TYPEDEF/mycounter(/INT/10) )¶
For a similar CONST that contains an RPTT value, the report would contain:¶
( ../EDD/intvalue, ../EDD/boolvalue )¶
( /example-adm/CONST/report1, /TP/20230101T000000Z, /INT/10, /true )¶