Changeset 2636 for draft-ietf-httpbis/latest/p2-semantics.xml
- Timestamp:
- 06/05/14 12:37:38 (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
draft-ietf-httpbis/latest/p2-semantics.xml
r2635 r2636 207 207 response messages. A client constructs request messages to communicate 208 208 specific intentions, and examines received responses to see if the 209 intentions were carried out and determine how to interpret the results.209 intentions were carried out, and determine how to interpret the results. 210 210 This document defines HTTP/1.1 request and response semantics in terms of 211 211 the architecture defined in <xref target="RFC7230"/>. … … 650 650 separated by a hyphen character ("-", %x2D). In most cases, a language tag 651 651 consists of a primary language subtag that identifies a broad family of 652 related languages (e.g., "en" = English) which is optionally followed by a652 related languages (e.g., "en" = English), which is optionally followed by a 653 653 series of subtags that refine or narrow that language's range (e.g., 654 654 "en-CA" = the variety of English as communicated in Canada). … … 1274 1274 &caching;. In general, safe methods that do not depend on a current or 1275 1275 authoritative response are defined as cacheable; this specification defines 1276 GET, HEAD and POST as cacheable, although the overwhelming majority of1276 GET, HEAD, and POST as cacheable, although the overwhelming majority of 1277 1277 cache implementations only support GET and HEAD. 1278 1278 </t> … … 1297 1297 <t> 1298 1298 It is tempting to think of resource identifiers as remote file system 1299 pathnames ,and of representations as being a copy of the contents of such1299 pathnames and of representations as being a copy of the contents of such 1300 1300 files. In fact, that is how many resources are implemented (see 1301 1301 <xref target="attack.pathname"/> for related security considerations). … … 1305 1305 other information systems. Even when the URI mapping mechanism is tied to a 1306 1306 file system, an origin server might be configured to execute the files with 1307 the request as input and send the output as the representation ,rather than1307 the request as input and send the output as the representation rather than 1308 1308 transfer the files directly. Regardless, only the origin server needs to 1309 know how each of its resource identifiers corresponds to an implementation ,1309 know how each of its resource identifiers corresponds to an implementation 1310 1310 and how each implementation manages to select and send a current 1311 1311 representation of the target resource in a response to GET. … … 1561 1561 between the <x:ref>target resource</x:ref> and its current functionality. 1562 1562 In effect, this method is similar to the rm command in UNIX: it expresses a 1563 deletion operation on the URI mapping of the origin server ,rather than an1563 deletion operation on the URI mapping of the origin server rather than an 1564 1564 expectation that the previously associated information be deleted. 1565 1565 </t> … … 1991 1991 the final recipient. If the received Max-Forwards value is greater than 1992 1992 zero, the intermediary &MUST; generate an updated Max-Forwards field in the 1993 forwarded message with a field-value that is the lesser of :a) the received1994 value decremented by one (1) ,or b) the recipient's maximum supported value1993 forwarded message with a field-value that is the lesser of a) the received 1994 value decremented by one (1) or b) the recipient's maximum supported value 1995 1995 for Max-Forwards. 1996 1996 </t> … … 2356 2356 a matching language tag, the origin server can either disregard the header 2357 2357 field by treating the response as if it is not subject to content 2358 negotiation ,or honor the header field by sending a <x:ref>406 (Not Acceptable)</x:ref>2358 negotiation or honor the header field by sending a <x:ref>406 (Not Acceptable)</x:ref> 2359 2359 response. However, the latter is not encouraged, as doing so can prevent 2360 2360 users from accessing content that they might be able to use (with … … 2387 2387 Since intelligibility is highly dependent on the individual user, user 2388 2388 agents need to allow user control over the linguistic preference (either 2389 through configuration of the user agent itself ,or by defaulting to a user2389 through configuration of the user agent itself or by defaulting to a user 2390 2390 controllable system setting). 2391 2391 A user agent that does not provide such control to the user &MUST-NOT; … … 2730 2730 prior to completing the requested action and sending a final response. 2731 2731 All 1xx responses consist of only the status-line and optional header 2732 fields , and thusare terminated by the empty line at the end of the header2732 fields and, thus, are terminated by the empty line at the end of the header 2733 2733 section. 2734 2734 Since HTTP/1.0 did not define any 1xx status codes, a server &MUST-NOT; send … … 3195 3195 the user agent to a selected resource, since doing so provides the 3196 3196 information corresponding to the POST response in a form that 3197 can be separately identified, bookmarked, and cached independent3197 can be separately identified, bookmarked, and cached, independent 3198 3198 of the original request. 3199 3199 </t> … … 3488 3488 information, when the client has descended into a "black hole" of 3489 3489 redirection (e.g., a redirected URI prefix that points to a suffix of 3490 itself) ,or when the server is under attack by a client attempting to3490 itself) or when the server is under attack by a client attempting to 3491 3491 exploit potential security holes. 3492 3492 </t> … … 4257 4257 when the condition is false. 4258 4258 Likewise, if the new method might have some use for partial response 4259 semantics (<xref target="RFC7233"/>), it ought to document this too.4259 semantics (<xref target="RFC7233"/>), it ought to document this, too. 4260 4260 </t> 4261 4261 <x:note> … … 4676 4676 <list style="symbols"> 4677 4677 <x:lt> 4678 <t>Whether the field is a single value ,or whether it can be a list4678 <t>Whether the field is a single value or whether it can be a list 4679 4679 (delimited by commas; see &header-fields;).</t> 4680 4680 <t>If it does not use the list syntax, document how to treat messages … … 4930 4930 mapping from effective request URI to resource representations. 4931 4931 Implementers need to be aware that most file systems are not designed to 4932 protect against malicious file or path names , and thusdepend on the4932 protect against malicious file or path names and, thus, depend on the 4933 4933 origin server to avoid mapping to file names, folders, or directories that 4934 4934 have special significance to the system.
Note: See TracChangeset
for help on using the changeset viewer.