Agree. There is an exception in some Cyberian applications. Some require splitting the parser from the validator as separate processes, because the validators are considered critical processes which must be isolated and protected. Some network security systems have requirements such as "two separate implementations"; one for inbound, different one for outbound. In some such systems, the parser is not (always) subject to this constraint, and may not even run on the same piece of equipment.
-mikeb On Wed, Aug 3, 2022 at 2:34 PM Roger L Costello <coste...@mitre.org> wrote: > *Desired Parsing Behavior*: If data is well-formed and valid, we want > parsing to produce XML and display no errors. If data is well-formed but > not valid, we want parsing to produce XML and display errors. If data is > not well-formed, we want parsing to not produce XML and display errors. Use > the Daffodil “-V limited” option when parsing from a command line, as it > results in the desired parsing behavior. > > > > Do you agree? > > > > /Roger >