1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
3119
3120
3121
3122
3123
3124
3125
3126
3127
3128
3129
3130
3131
3132
3133
3134
3135
3136
3137
3138
3139
3140
3141
3142
3143
3144
3145
3146
3147
3148
3149
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
3163
3164
3165
3166
3167
3168
3169
3170
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
3182
3183
3184
3185
3186
3187
3188
3189
3190
3191
3192
3193
3194
3195
3196
3197
3198
3199
3200
3201
3202
3203
3204
3205
3206
3207
3208
3209
3210
3211
3212
3213
3214
3215
3216
3217
3218
3219
3220
3221
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
3235
3236
3237
3238
3239
3240
3241
3242
3243
3244
3245
3246
3247
3248
3249
3250
3251
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
3281
3282
3283
3284
3285
3286
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
3306
3307
3308
3309
3310
3311
3312
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
3332
3333
3334
3335
3336
3337
3338
3339
3340
3341
3342
3343
3344
3345
3346
3347
3348
3349
3350
3351
3352
3353
3354
3355
3356
3357
3358
3359
3360
3361
3362
3363
3364
3365
3366
3367
3368
3369
3370
3371
3372
3373
3374
3375
3376
3377
3378
3379
3380
3381
3382
3383
3384
3385
3386
3387
3388
3389
3390
3391
3392
3393
3394
3395
3396
3397
3398
3399
3400
3401
3402
3403
3404
3405
3406
3407
3408
3409
3410
3411
3412
3413
3414
3415
3416
3417
3418
3419
3420
3421
3422
3423
3424
3425
3426
3427
3428
3429
3430
3431
3432
3433
3434
3435
3436
3437
3438
3439
3440
3441
3442
3443
3444
3445
3446
3447
3448
3449
3450
3451
3452
3453
3454
3455
3456
3457
3458
3459
3460
3461
3462
3463
3464
3465
3466
3467
3468
3469
3470
3471
3472
3473
3474
3475
3476
3477
3478
3479
3480
3481
3482
3483
3484
3485
3486
3487
3488
3489
3490
3491
3492
3493
3494
3495
3496
3497
3498
3499
3500
3501
3502
3503
3504
3505
3506
3507
3508
3509
3510
3511
3512
3513
3514
3515
3516
3517
3518
3519
3520
3521
3522
3523
3524
3525
3526
3527
3528
3529
3530
3531
3532
3533
3534
3535
3536
3537
3538
3539
3540
3541
3542
3543
3544
3545
3546
3547
3548
3549
3550
3551
3552
3553
3554
3555
3556
3557
3558
3559
3560
3561
3562
3563
3564
3565
3566
3567
3568
3569
3570
3571
3572
3573
3574
3575
3576
3577
3578
3579
3580
3581
3582
3583
3584
3585
3586
3587
3588
3589
3590
3591
3592
3593
3594
3595
3596
3597
3598
3599
3600
3601
3602
3603
3604
3605
3606
3607
3608
3609
3610
3611
3612
3613
3614
3615
3616
3617
3618
3619
3620
3621
3622
3623
3624
3625
3626
3627
3628
3629
3630
3631
3632
3633
3634
3635
3636
3637
3638
3639
3640
3641
3642
3643
3644
3645
3646
3647
3648
3649
3650
3651
3652
3653
3654
3655
3656
3657
3658
3659
3660
3661
3662
3663
3664
3665
3666
3667
3668
3669
3670
3671
3672
3673
3674
3675
3676
3677
3678
3679
3680
3681
3682
3683
3684
3685
3686
3687
3688
3689
3690
3691
3692
3693
3694
3695
3696
3697
3698
3699
3700
3701
3702
3703
3704
3705
3706
3707
3708
3709
3710
3711
3712
3713
3714
3715
3716
3717
3718
3719
3720
3721
3722
3723
3724
3725
3726
3727
3728
3729
3730
3731
3732
3733
3734
3735
3736
3737
3738
3739
3740
3741
3742
3743
3744
3745
3746
3747
3748
3749
3750
3751
3752
3753
3754
3755
3756
3757
3758
3759
3760
3761
3762
3763
3764
3765
3766
3767
3768
3769
3770
3771
3772
3773
3774
3775
3776
3777
3778
3779
3780
3781
3782
3783
3784
3785
3786
3787
3788
3789
3790
3791
3792
3793
3794
3795
3796
3797
3798
3799
3800
3801
3802
3803
3804
3805
3806
3807
3808
3809
3810
3811
3812
3813
3814
3815
3816
3817
3818
3819
3820
3821
3822
3823
3824
3825
3826
3827
3828
3829
3830
3831
3832
3833
3834
3835
3836
3837
3838
3839
3840
3841
3842
3843
3844
3845
3846
3847
3848
3849
3850
3851
3852
3853
3854
3855
3856
3857
3858
3859
3860
3861
3862
3863
3864
3865
3866
3867
3868
3869
3870
3871
3872
3873
3874
3875
3876
3877
3878
3879
3880
3881
3882
3883
3884
3885
3886
3887
3888
3889
3890
3891
3892
3893
3894
3895
3896
3897
3898
3899
3900
3901
3902
3903
3904
3905
3906
3907
3908
3909
3910
3911
3912
3913
3914
3915
3916
3917
3918
3919
3920
3921
3922
3923
3924
3925
3926
3927
3928
3929
3930
3931
3932
3933
3934
3935
3936
3937
3938
3939
3940
3941
3942
3943
3944
3945
3946
3947
3948
3949
3950
3951
3952
3953
3954
3955
3956
3957
3958
3959
3960
3961
3962
3963
3964
3965
3966
3967
3968
3969
3970
3971
3972
3973
3974
3975
3976
3977
3978
3979
|
Network Working Group J. Rosenberg
Request for Comments: 4825 Cisco
Category: Standards Track May 2007
The Extensible Markup Language (XML)
Configuration Access Protocol (XCAP)
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
This specification defines the Extensible Markup Language (XML)
Configuration Access Protocol (XCAP). XCAP allows a client to read,
write, and modify application configuration data stored in XML format
on a server. XCAP maps XML document sub-trees and element attributes
to HTTP URIs, so that these components can be directly accessed by
HTTP.
Rosenberg Standards Track [Page 1]
^L
RFC 4825 XCAP May 2007
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Overview of Operation . . . . . . . . . . . . . . . . . . . . 5
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Application Usages . . . . . . . . . . . . . . . . . . . . . . 7
5.1. Application Unique ID (AUID) . . . . . . . . . . . . . . . 7
5.2. Default Document Namespace . . . . . . . . . . . . . . . . 8
5.3. Data Validation . . . . . . . . . . . . . . . . . . . . . 9
5.4. Data Semantics . . . . . . . . . . . . . . . . . . . . . . 10
5.5. Naming Conventions . . . . . . . . . . . . . . . . . . . . 11
5.6. Resource Interdependencies . . . . . . . . . . . . . . . . 11
5.7. Authorization Policies . . . . . . . . . . . . . . . . . . 12
5.8. Data Extensibility . . . . . . . . . . . . . . . . . . . . 12
5.9. Documenting Application Usages . . . . . . . . . . . . . . 13
5.10. Guidelines for Creating Application Usages . . . . . . . . 13
6. URI Construction . . . . . . . . . . . . . . . . . . . . . . . 15
6.1. XCAP Root . . . . . . . . . . . . . . . . . . . . . . . . 15
6.2. Document Selector . . . . . . . . . . . . . . . . . . . . 16
6.3. Node Selector . . . . . . . . . . . . . . . . . . . . . . 18
6.4. Namespace Bindings for the Selector . . . . . . . . . . . 23
7. Client Operations . . . . . . . . . . . . . . . . . . . . . . 24
7.1. Create or Replace a Document . . . . . . . . . . . . . . . 26
7.2. Delete a Document . . . . . . . . . . . . . . . . . . . . 26
7.3. Fetch a Document . . . . . . . . . . . . . . . . . . . . . 26
7.4. Create or Replace an Element . . . . . . . . . . . . . . . 26
7.5. Delete an Element . . . . . . . . . . . . . . . . . . . . 29
7.6. Fetch an Element . . . . . . . . . . . . . . . . . . . . . 30
7.7. Create or Replace an Attribute . . . . . . . . . . . . . . 30
7.8. Delete an Attribute . . . . . . . . . . . . . . . . . . . 31
7.9. Fetch an Attribute . . . . . . . . . . . . . . . . . . . . 31
7.10. Fetch Namespace Bindings . . . . . . . . . . . . . . . . . 32
7.11. Conditional Operations . . . . . . . . . . . . . . . . . . 32
8. Server Behavior . . . . . . . . . . . . . . . . . . . . . . . 34
8.1. POST Handling . . . . . . . . . . . . . . . . . . . . . . 35
8.2. PUT Handling . . . . . . . . . . . . . . . . . . . . . . . 35
8.2.1. Locating the Parent . . . . . . . . . . . . . . . . . 35
8.2.2. Verifying Document Content . . . . . . . . . . . . . . 36
8.2.3. Creation . . . . . . . . . . . . . . . . . . . . . . . 37
8.2.4. Replacement . . . . . . . . . . . . . . . . . . . . . 41
8.2.5. Validation . . . . . . . . . . . . . . . . . . . . . . 42
8.2.6. Conditional Processing . . . . . . . . . . . . . . . . 43
8.2.7. Resource Interdependencies . . . . . . . . . . . . . . 44
8.3. GET Handling . . . . . . . . . . . . . . . . . . . . . . . 44
8.4. DELETE Handling . . . . . . . . . . . . . . . . . . . . . 45
8.5. Managing Etags . . . . . . . . . . . . . . . . . . . . . . 46
9. Cache Control . . . . . . . . . . . . . . . . . . . . . . . . 47
Rosenberg Standards Track [Page 2]
^L
RFC 4825 XCAP May 2007
10. Namespace Binding Format . . . . . . . . . . . . . . . . . . . 47
11. Detailed Conflict Reports . . . . . . . . . . . . . . . . . . 47
11.1. Document Structure . . . . . . . . . . . . . . . . . . . . 48
11.2. XML Schema . . . . . . . . . . . . . . . . . . . . . . . . 50
12. XCAP Server Capabilities . . . . . . . . . . . . . . . . . . . 53
12.1. Application Unique ID (AUID) . . . . . . . . . . . . . . . 54
12.2. XML Schema . . . . . . . . . . . . . . . . . . . . . . . . 54
12.3. Default Document Namespace . . . . . . . . . . . . . . . . 56
12.4. MIME Type . . . . . . . . . . . . . . . . . . . . . . . . 56
12.5. Validation Constraints . . . . . . . . . . . . . . . . . . 56
12.6. Data Semantics . . . . . . . . . . . . . . . . . . . . . . 56
12.7. Naming Conventions . . . . . . . . . . . . . . . . . . . . 56
12.8. Resource Interdependencies . . . . . . . . . . . . . . . . 56
12.9. Authorization Policies . . . . . . . . . . . . . . . . . . 56
13. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
14. Security Considerations . . . . . . . . . . . . . . . . . . . 59
15. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 60
15.1. XCAP Application Unique IDs . . . . . . . . . . . . . . . 60
15.2. MIME Types . . . . . . . . . . . . . . . . . . . . . . . . 61
15.2.1. application/xcap-el+xml MIME Type . . . . . . . . . . 61
15.2.2. application/xcap-att+xml MIME Type . . . . . . . . . . 62
15.2.3. application/xcap-ns+xml MIME Type . . . . . . . . . . 63
15.2.4. application/xcap-error+xml MIME Type . . . . . . . . . 64
15.2.5. application/xcap-caps+xml MIME Type . . . . . . . . . 64
15.3. URN Sub-Namespace Registrations . . . . . . . . . . . . . 65
15.3.1. urn:ietf:params:xml:ns:xcap-error . . . . . . . . . . 65
15.3.2. urn:ietf:params:xml:ns:xcap-caps . . . . . . . . . . . 66
15.4. XML Schema Registrations . . . . . . . . . . . . . . . . . 67
15.4.1. XCAP Error Schema Registration . . . . . . . . . . . . 67
15.4.2. XCAP Capabilities Schema Registration . . . . . . . . 67
16. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 67
17. References . . . . . . . . . . . . . . . . . . . . . . . . . . 67
17.1. Normative References . . . . . . . . . . . . . . . . . . . 67
17.2. Informative References . . . . . . . . . . . . . . . . . . 69
Rosenberg Standards Track [Page 3]
^L
RFC 4825 XCAP May 2007
1. Introduction
In many communications applications, such as Voice over IP, instant
messaging, and presence, it is necessary for network servers to
access per-user information in the process of servicing a request.
This per-user information resides within the network, but is managed
by the end user themselves. Its management can be done through a
multiplicity of access points, including the web, a wireless handset,
or a PC application.
There are many examples of per-user information. One is presence
[20] authorization policy, which defines rules about which watchers
are allowed to subscribe to a presentity, and what information they
are allowed to access. Another is presence lists, which are lists of
users whose presence is desired by a watcher [26]. One way to obtain
presence information for the list is to subscribe to a resource which
represents that list [21]. In this case, the Resource List Server
(RLS) requires access to this list in order to process a SIP [16]
SUBSCRIBE [28] request for it. Another way to obtain presence for
the users on the list is for a watcher to subscribe to each user
individually. In that case, it is convenient to have a server store
the list, and when the client boots, it fetches the list from the
server. This would allow a user to access their resource lists from
different clients.
This specification describes a protocol that can be used to
manipulate this per-user data. It is called the Extensible Markup
Language (XML) Configuration Access Protocol (XCAP). XCAP is a set
of conventions for mapping XML documents and document components into
HTTP URIs, rules for how the modification of one resource affects
another, data validation constraints, and authorization policies
associated with access to those resources. Because of this
structure, normal HTTP primitives can be used to manipulate the data.
XCAP is based heavily on ideas borrowed from the Application
Configuration Access Protocol (ACAP) [25], but it is not an extension
of it, nor does it have any dependencies on it. Like ACAP, XCAP is
meant to support the configuration needs for a multiplicity of
applications, rather than just a single one.
XCAP was not designed as a general purpose XML search protocol, XML
database update protocol, nor a general purpose, XML-based
configuration protocol for network elements.
Rosenberg Standards Track [Page 4]
^L
RFC 4825 XCAP May 2007
2. Overview of Operation
Each application (where an application refers to a use case that
implies a collection of data and associated semantics) that makes use
of XCAP specifies an application usage (Section 5). This application
usage defines the XML schema [2] for the data used by the
application, along with other key pieces of information. The
principal task of XCAP is to allow clients to read, write, modify,
create, and delete pieces of that data. These operations are
supported using HTTP/1.1 [6]. An XCAP server acts as a repository
for collections of XML documents. There will be documents stored for
each application. Within each application, there are documents
stored for each user. Each user can have a multiplicity of documents
for a particular application. To access some component of one of
those documents, XCAP defines an algorithm for constructing a URI
that can be used to reference that component. Components refer to
any element or attribute within the document. Thus, the HTTP URIs
used by XCAP point to a document, or to pieces of information that
are finer grained than the XML document itself. An HTTP resource
that follows the naming conventions and validation constraints
defined here is called an XCAP resource.
Since XCAP resources are also HTTP resources, they can be accessed
using HTTP methods. Reading an XCAP resource is accomplished with
HTTP GET, creating or modifying one is done with HTTP PUT, and
removing one of the resources is done with an HTTP DELETE. XCAP
resources do not represent processing scripts; as a result, POST
operations to HTTP URIs representing XCAP resources are not defined.
Properties that HTTP associates with resources, such as entity tags,
also apply to XCAP resources. Indeed, entity tags are particularly
useful in XCAP, as they allow a number of conditional operations to
be performed.
XML documents that are equivalent for the purposes of many
applications may differ in their physical representation. With XCAP
resources, the canonical form with comments [19] of an XML document
determines the logical equivalence. In other words, the canonical
specification determines how significant whitespace MUST be
processed. It also implies that, for example, new inserted
attributes may appear in any order within the physical
representation.
3. Terminology
In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in RFC 2119 [7] and
indicate requirement levels for compliant implementations.
Rosenberg Standards Track [Page 5]
^L
RFC 4825 XCAP May 2007
4. Definitions
The following terms are used throughout this document:
XCAP Resource: An HTTP resource representing an XML document, an
element within an XML document, or an attribute of an element
within an XML document that follows the naming and validation
constraints of XCAP.
XCAP Server: An HTTP server that understands how to follow the
naming and validation constraints defined in this specification.
XCAP Client: An HTTP client that understands how to follow the
naming and validation constraints defined in this specification.
Application: A collection of software components within a network
whose operation depends on data managed and stored on an XCAP
server.
Application Usage: Detailed information on the interaction of an
application with the XCAP server.
Application Unique ID (AUID): A unique identifier within the
namespace of application unique IDs created by this specification
that differentiates XCAP resources accessed by one application
from XCAP resources accessed by another.
Naming Conventions: The part of an application usage that specifies
well-known URIs used by an application, or more generally,
specifies the URIs that are typically accessed by an application
during its processing.
XCAP User Identifier (XUI): The XUI is a string, valid as a path
element in an HTTP URI, that is associated with each user served
by the XCAP server.
XCAP Root: A context that contains all the documents across all
application usages and users that are managed by the server.
Document Selector: A sequence of path segments, with each segment
being separated by a "/", that identify the XML document within an
XCAP root that is being selected.
Node Selector: A sequence of path segments, with each segment being
separated by a "/", that identify the XML node (element or
attribute) being selected within a document.
Rosenberg Standards Track [Page 6]
^L
RFC 4825 XCAP May 2007
Node Selector Separator: A single path segment equal to two tilde
characters "~~" that is used to separate the document selector
from the node selector within an HTTP URI.
Document URI: The HTTP URI containing the XCAP root and document
selector, resulting in the selection of a specific document. As a
result, performing a GET against the document URI would retrieve
the document.
Node URI: The HTTP URI containing the XCAP root, document selector,
node selector separator, and node selector, resulting in the
selection of a specific XML node.
XCAP Root URI: An HTTP URI that represents the XCAP root. Although
a syntactically valid URI, the XCAP Root URI does not correspond
to an actual resource on an XCAP server. Actual resources are
created by appending additional path information to the XCAP Root
URI.
Global Tree: A URI that represents the parent for all global
documents for a particular application usage within a particular
XCAP root.
Home Directory: A URI that represents the parent for all documents
for a particular user for a particular application usage within a
particular XCAP root.
Positional Insertion: A PUT operation that results in the insertion
of a new element into a document such that its position, relative
to other children of the same parent, is set by the client.
5. Application Usages
Each XCAP resource on a server is associated with an application. In
order for an application to use those resources, application specific
conventions must be specified. Those conventions include the XML
schema that defines the structure and constraints of the data, well-
known URIs to bootstrap access to the data, and so on. All of those
application specific conventions are defined by the application
usage.
5.1. Application Unique ID (AUID)
Each application usage is associated with a name, called an
Application Unique ID (AUID). This name uniquely identifies the
application usage within the namespace of application usages, and is
different from AUIDs used by other applications. AUIDs exist in one
of two namespaces. The first namespace is the IETF namespace. This
Rosenberg Standards Track [Page 7]
^L
RFC 4825 XCAP May 2007
namespace contains a set of tokens, each of which is registered with
IANA. These registrations occur with the publication of standards
track RFCs [27], based on the guidelines in Section 15. The second
namespace is the vendor-proprietary namespace. Each AUID in that
namespace is prefixed with the reverse domain name of the
organization creating the AUID, followed by a period, followed by any
vendor defined token. As an example, the example.com domain can
create an AUID with the value "com.example.foo" but cannot create one
with the value "org.example.foo". AUIDs within the vendor namespace
do not need to be registered with IANA. The vendor namespace is also
meant to be used in lab environments where no central registry is
needed. The syntax for AUIDs, expressed in ABNF [12] (and using some
of the BNF defined in RFC 3986 [13]), is:
AUID = global-a-uid / vendor-a-uid
global-a-uid = a-uid
a-uid = 1*a-uid-char
vendor-a-uid = rev-hostname "." a-uid
rev-hostname = toplabel *( "." domainlabel )
domainlabel = alphanum
/ alphanum *( alphanum / "-" ) alphanum
toplabel = ALPHA / ALPHA *( alphanum / "-" ) alphanum
a-uid-char = a-uid-unreserved / pct-encoded / sub-delims
/ ":" / "@"
;pct-encoded from RFC 3986
;sub-delims from RFC 3986
alphanum = ALPHA / DIGIT
;DIGIT from RFC 4234
;ALPHA from RFC 4234
a-uid-unreserved = ALPHA / DIGIT / "-" / "_" / "~"
The allowed characters for the auid production is a subset of the
pchar production defined in RFC 3986. In particular, it omits the
".", which allows for the auid to be separated from the reverse
hostname.
5.2. Default Document Namespace
In order for the XCAP server to match a URI to an element or
attribute of a document, any XML namespace prefixes used within the
URI must be expanded [3]. This expansion requires a namespace
binding context. That context maps namespace prefixes to namespace
URIs. It also defines a default namespace that applies to elements
in the URI without namespace prefixes. The namespace binding context
comes from two sources. First, the mapping of namespace prefixes to
namespace URIs is obtained from the URI itself (see Section 6.4).
However, the default document namespace is defined by the application
usage itself, and applies to all URIs referencing resources within
Rosenberg Standards Track [Page 8]
^L
RFC 4825 XCAP May 2007
that application usage. All application usages MUST define a
namespace URI that represents the default document namespace to be
used when evaluating URIs. The default document namespace does not
apply to elements or attributes within the documents themselves -- it
applies only to the evaluation of URIs within that application usage.
Indeed, the term 'default document namespace' is distinct from the
term 'default namespace'. The latter has the standard meaning within
XML documents, and the former refers to the default used in
evaluation of XCAP URIs. XCAP does not change in any way the
mechanisms for determining the default namespace within XML
documents. However, if a document contains a URI representing an
XCAP resource, the default document namespace defined by the
application usage applies to that URI as well.
5.3. Data Validation
One of the responsibilities of an XCAP server is to validate the
content of each XCAP resource when an XCAP client tries to modify
one. This is done using two mechanisms. Firstly, all application
usages MUST describe their document contents using XML schema [2].
The application usage MUST also identify the MIME type for documents
compliant to that schema.
Unfortunately, XML schemas cannot represent every form of data
constraint. As an example, one XML element may contain an integer
that defines the maximum number of instances of another element.
This constraint cannot be represented with XML schema. However, such
constraints may be important to the application usage. The
application usage defines any additional constraints beyond those in
the schema.
Of particular importance are uniqueness constraints. In many cases,
an application will require that there be only one instance of some
element or attribute within a particular scope. Each uniqueness
constraint needs to be specified by identifying the field, or
combinations of fields, that need to be unique, and then identifying
the scope in which that uniqueness applies. One typical scope is the
set of all elements of a certain name within the same parent.
Another typical scope is the set of all URIs valid within a
particular domain. In some cases, these constraints can be specified
using XML schema, which provides the <unique> element for this
purpose. Other uniqueness constraints, such as URI uniqueness across
a domain, cannot be expressed by schema. Whether or not the schema
is used to express some of the uniqueness requirements, the
application usage MUST specify all uniqueness requirements when it
defines its data validation needs.
Rosenberg Standards Track [Page 9]
^L
RFC 4825 XCAP May 2007
For example, the resource lists application usage [22] requires that
each <list> element have a unique value for the "name" attribute
within a single parent. As another example, the RLS services
application usage [22] requires that the value of the "uri" attribute
of the <service> element be a URI that is unique within the domain of
the URI.
URI constraints represent another form of constraints. These are
constraints on the scheme or structure of the scheme-specific part of
the URI. These kinds of constraints cannot be expressed in an XML
schema. If these constraints are important to an application usage,
they need to be explicitly called out.
Another important data constraint is referential integrity.
Referential integrity is important when the name or value of an
element or attribute is used as a key to select another element or
attribute. An application usage MAY specify referential integrity
constraints. However, XCAP servers are not a replacement for
Relational Database Management Systems (RDBMS), and therefore clients
MUST NOT depend on servers to maintain referential integrity. XCAP
clients are responsible for making all the appropriate changes to
documents in order to maintain referential integrity.
Another constraint is character encoding. XML allows documents to be
encoded using several different character sets. However, this
specification mandates that all documents used with XCAP MUST be
encoded using UTF-8. This cannot be changed by an application usage.
The data validation information is consumed by both clients, which
use them to make sure they construct requests that will be accepted
by the server, and by servers, which validate the constraints when
they receive a request (with the exception of referential integrity
constraints, which are not validated by the server).
5.4. Data Semantics
For each application usage, the data present in the XML document has
a well-defined semantic. The application usage defines that
semantic, so that a client can properly construct a document in order
to achieve the desired result. They are not used by the server, as
it is purposefully unaware of the semantics of the data it is
managing. The data semantics are expressed in English prose by the
application usage.
One particularly important semantic is the base URI that is to be
used for the resolution of any relative URI references pointed to
XCAP resources. As discussed below, relative URI references pointing
to XCAP resources cannot be resolved using the retrieval URI as the
Rosenberg Standards Track [Page 10]
^L
RFC 4825 XCAP May 2007
base URI. Therefore, it is up to the application usage to specify
the base URI.
5.5. Naming Conventions
In addition to defining the meaning of the document in the context of
a particular application, an application usage has to specify how the
applications obtain the documents they need. In particular, it needs
to define any well-known URIs used for bootstrapping purposes, and
document any other conventions on the URIs used by an application.
It should also document how documents reference each other. These
conventions are called naming conventions.
For many application usages, users need only a single document. In
such a case, it is RECOMMENDED that the application usage require
that this document be called "index" and exist within the user's home
directory.
As an example, the RLS services application usage allows an RLS to
obtain the contents of a resource list when the RLS receives a
SUBSCRIBE request for a SIP URI identifying an RLS service. The
application usage specifies that the list of service definitions is
present within a specific document with a specific name within the
global tree. This allows the RLS to perform a single XCAP request to
fetch the service definition for the service associated with the SIP
URI in a SUBSCRIBE request.
Naming conventions are used by XCAP clients to construct their URIs.
The XCAP server does not make use of them.
5.6. Resource Interdependencies
When a user modifies an XCAP resource, the content of many other
resources is affected. For example, when a user deletes an XML
element within a document, it does so by issuing a DELETE request
against the URI for the element resource. However, deleting this
element also deletes all child elements and their attributes, each of
which is also an XCAP resource. As such, manipulation of one
resource affects the state of other resources.
For the most part, these interdependencies are fully specified by the
XML schema used by the application usage. However, in some
application usages, there is a need for the server to relate
resources together, and such a relationship cannot be specified
through a schema. This occurs when changes in one document will
affect another document. Typically, this is the case when an
application usage is defining a document that acts as a collection of
information defined in other documents.
Rosenberg Standards Track [Page 11]
^L
RFC 4825 XCAP May 2007
As an example, when a user creates a new RLS service (that is, it
creates a new <service> element within an RLS services document), the
server adds that element to a read-only global list of services
maintained by the server in the global tree. This read-only global
list is accessed by the RLS when processing a SIP SUBSCRIBE request.
Resource interdependencies are used by both XCAP clients and servers.
5.7. Authorization Policies
By default, each user is able to access (read, modify, and delete)
all the documents below their home directory, and any user is able to
read documents within the global directory. However, only trusted
users, explicitly provisioned into the server, can modify global
documents.
The application usage can specify a different authorization policy
that applies to all documents associated with that application usage.
An application usage can also specify whether another application
usage is used to define the authorization policies. An application
usage for setting authorization policies can also be defined
subsequent to the definition of the main application usage. In such
a case, the main application usage needs only to specify that such a
usage will be defined in the future.
If an application usage does not wish to change the default
authorization policy, it can merely state that the default policy is
used.
The authorization policies defined by the application usage are used
by the XCAP server during its operation.
5.8. Data Extensibility
An XCAP server MUST understand an application usage in order to
process an HTTP request made against a resource for that particular
application usage. However, it is not required for the server to
understand all of the contents of a document used by an application
usage. A server is required to understand the baseline schema
defined by the application usage. However, those schemas can define
points of extensibility where new content can be added from other
namespaces and corresponding schemas. Sometimes, the server will
understand those namespaces and therefore have access to their
schemas. Sometimes, it will not.
A server MUST allow for documents that contain elements from
namespaces not known to the server. In such a case, the server
Rosenberg Standards Track [Page 12]
^L
RFC 4825 XCAP May 2007
cannot validate that such content is schema compliant; it will only
verify that the XML is well-formed.
If a client wants to verify that a server supports a particular
namespace before operating on a resource, it can query the server for
its capabilities using the XCAP Capabilities application usage,
discussed in Section 12.
5.9. Documenting Application Usages
Application usages are documented in specifications that convey the
information described above. In particular, an application usage
specification MUST provide the following information:
o Application Unique ID (AUID): If the application usage is meant
for general use on the Internet, the application usage MUST
register the AUID into the IETF tree using the IANA procedures
defined in Section 15.
o XML Schema
o Default Document Namespace
o MIME Type
o Validation Constraints
o Data Semantics
o Naming Conventions
o Resource Interdependencies
o Authorization Policies
5.10. Guidelines for Creating Application Usages
The primary design task when creating a new application usage is to
define the schema. Although XCAP can be used with any XML document,
intelligent schema design will improve the efficiency and utility of
the document when it is manipulated with XCAP.
XCAP provides three fundamental ways to select elements amongst a set
of siblings: by the expanded name of the element, by its position, or
by the value of a specific attribute. Positional selection always
allows a client to get exactly what it wants. However, it requires a
client to cache a copy of the document in order to construct the
predicate. Furthermore, if a client performs a PUT, it requires the
Rosenberg Standards Track [Page 13]
^L
RFC 4825 XCAP May 2007
client to reconstruct the PUT processing that a server would follow
in order to update its local cached copy. Otherwise, the client will
be forced to re-GET the document after every PUT, which is
inefficient. As such, it is a good idea to design schemas such that
common operations can be performed without requiring the client to
cache a copy of the document.
Without positional selection, a client can pick the element at each
step by its expanded name or the value of an attribute. Many schemas
include elements that can be repeated within a parent (often,
minOccurs equals zero or one, and maxOccurs is unbounded). As such,
all of the elements have the same name. This leaves the attribute
value as the only way to select an element. Because of this, if an
application usage expects the user to manipulate elements or
attributes that are descendants of an element that can repeat, that
element SHOULD include, in its schema, an attribute that can be
suitably used as a unique index. Furthermore, the naming conventions
defined by that application usage SHOULD specify this uniqueness
constraint explicitly.
URIs often make a good choice for such a unique index. They have
fundamental uniqueness properties, and are also usually of semantic
significance in the application usage. However, care must be taken
when using a URI as an attribute value. URI equality is usually
complex. However, attribute equality is performed by the server
using XML rules, which are based on case sensitive string comparison.
Thus, XCAP will match URIs based on lexical equality, not functional
equality. In such cases, an application usage SHOULD consider these
implications carefully.
XCAP provides the ability of a client to operate on a single element,
attribute, or document at a time. As a result, it may be possible
that common operations the client might perform will require a
sequence of multiple requests. This is inefficient, and introduces
the possibility of failure conditions when another client modifies
the document in the middle of a sequence. In such a case, the client
will be forced to detect this case using entity tags (discussed below
in Section 7.11), and undo its previous changes. This is very
difficult.
As a result, the schemas SHOULD be defined so that common operations
generally require a single request to perform. Consider an example.
Let's say an application usage is defining permissions for users to
perform certain operations. The schema can be designed in two ways.
The top level of the tree can identify users, and within each user,
there can be the permissions associated with the user. In an
alternative design, the top level of the tree identifies each
permission, and within that permission, the set of users who have it.
Rosenberg Standards Track [Page 14]
^L
RFC 4825 XCAP May 2007
If, in this application usage, it is common to change the permission
for a user from one value to another, the former schema design is
better for xcap; it will require a single PUT to make such a change.
In the latter case, either the entire document needs to be replaced
(which is a single operation), or two PUT operations need to occur --
one to remove the user from the old permission, and one to add the
user to the new permission.
Naming conventions form another key part of the design of an
application usage. The application usage should be certain that XCAP
clients know where to "start" to retrieve and modify documents of
interest. Generally, this will involve the specification of a well-
known document at a well-known URI. That document can contain
references to other documents that the client needs to read or
modify.
6. URI Construction
In order to manipulate an XCAP resource, the data must be represented
by an HTTP URI. XCAP defines a specific naming convention for
constructing these URIs. The URI is constructed by concatenating the
XCAP root with the document selector with the node selector separator
with a percent-encoded form of the node selector. This is followed
by an optional query component that defines namespace bindings used
in evaluating the URI. The XCAP root is the enclosing context in
which all XCAP resources live. The document selector is a path that
identifies a document within the XCAP root. The node selector
separator is a path segment with a value of double tilde ("~~"), and
SHOULD NOT be percent-encoded, as advised in Section 2.3 of RFC 3986
[13]. URIs containing %7E%7E should be normalized to ~~ for
comparison; they are equivalent. The node selector separator is a
piece of syntactic sugar that separates the document selector from
the node selector. The node selector is an expression that
identifies a component of the document, such as an element or
attribute. It is possible that a "~~" appears as part of the node
selector itself; in such a case, the first "~~" in the URI is the
node selector separator.
The sections below describe these components in more detail.
6.1. XCAP Root
The root of the XCAP hierarchy is called the XCAP root. It defines
the context in which all other resources exist. The XCAP root is
represented with an HTTP URI, called the XCAP Root URI. This URI is
a valid HTTP URI; however, it doesn't point to any resource that
actually exists on the server. Its purpose is to identify the root
of the tree within the domain where all XCAP documents are stored.
Rosenberg Standards Track [Page 15]
^L
RFC 4825 XCAP May 2007
It can be any valid HTTP URI, but MUST NOT contain a query component
(a complete XCAP URI may have a query component, but it is not part
of the XCAP root URI). It is RECOMMENDED that it be equal to
xcap.domain, where domain is the domain of the provider. As an
example, "http://xcap.example.com" might be used as the XCAP root URI
within the example.com domain. Typically, the XCAP root URI is
provisioned into client devices. If not explicitly provisioned,
clients SHOULD assume the form xcap.domain, where domain is the
domain of their service provider (for SIP, this would be the domain
part of their Address-of-Record (AOR)). A server or domain MAY
support multiple XCAP root URIs. In such a case, it is effectively
operating as if it were serving separate domains. There is never
information carryover or interactions between resources in different
XCAP root URIs.
When a client generates an HTTP request to a URI identifying an XCAP
resource, RFC 2616 procedures for the construction of the Request-URI
apply. In particular, the authority component of the URI may not be
present in the Request-URI if the request is sent directly to the
origin server.
The XCAP root URI can also be a relative HTTP URI. It is the
responsibility of the application usage to specify the base URI for
an HTTP URI representing an XCAP resource whenever such a URI appears
within a document defined by that application usage. Generally
speaking, it is unsafe to use the retrieval URI as the base URI.
This is because any URI that points to an ancestor for a particular
element or attribute can contain content including that element or
attribute. If that element or attribute contained a relative URI
reference, it would be resolved relative to whatever happened to be
used to retrieve the content, and this will often not be the base URI
defined by the application usage.
6.2. Document Selector
Each document within the XCAP root is identified by its document
selector. The document selector is a sequence of path segments,
separated by a slash ("/"). These path segments define a
hierarchical structure for organizing documents within any XCAP root.
The first path segment MUST be the XCAP AUID. So, continuing the
example above, all of the documents used by the resource lists
application would be under "http://xcap.example.com/resource-lists".
o Implementors making use of HTTP servlets should be aware that XCAP
may require them to get authorization from the server
administrator to place resources within this specific subset of
the URI namespace.
Rosenberg Standards Track [Page 16]
^L
RFC 4825 XCAP May 2007
It is assumed that each application will have data that is set by
users, and/or it will have global data that applies to all users. As
a result, beneath each AUID, there are two sub-trees. One, called
"users", holds the documents that are applicable to specific users,
and the other, called "global", holds documents applicable to all
users. The sub-tree beneath "global" is called the global tree. The
path segment after the AUID MUST either be "global" or "users".
Within the "users" tree are zero or more sub-trees, each of which
identifies documents that apply to a specific user. Each user known
to the server is associated with a username, called the XCAP User
Identifier (XUI). Typically, an endpoint is provisioned with the
value of the XUI. For systems that support SIP applications, it is
RECOMMENDED that the XUI be equal to the Address-of-Record (AOR) for
the user (i.e., sip:joe@example.com). Since SIP endpoints generally
know their AOR, they will also know their XUI. As a consequence, if
no XUI is explicitly provisioned, a SIP User Agent SHOULD assume it
is equal to their AOR. This XUI MUST be used as the path segment
beneath the "users" segment. Since the SIP URI allows for characters
that are not permitted in HTTP URI path segments (such as the '?' and
'/' characters, which are permitted in the user part of the SIP URI),
any such characters MUST be percent encoded. The sub-tree beneath an
XUI for a particular user is called their home directory. "User" in
this context should be interpreted loosely; a user might correspond
to a device, for example.
XCAP does not itself define what it means for documents to "apply" to
a user, beyond specification of a baseline authorization policy,
described below in Section 8. Each application usage can specify
additional authorization policies that depend on data used by the
application itself.
The remainder of the document selector (the path following "global"
or the XUI) points to specific documents for that application usage.
Subdirectories are permitted, but are NOT RECOMMENDED. XCAP provides
no way to create sub-directories or to list their contents, thus
limiting their utility. If subdirectories are used, there MUST NOT
be a document in a directory with the same name as a sub-directory.
The final path segment in the document selector identifies the actual
document in the hierarchy. This is equivalent to a filename, except
that XCAP does not require that its document resources be stored as
files in a file system. However, the term "filename" is used to
describe the final path segment in the document selector. In
traditional filesystems, the filename would have a filename
extension, such as ".xml". There is nothing in this specification
that requires or prevents such extensions from being used in the
filename. In some cases, the application usage will specify a naming
Rosenberg Standards Track [Page 17]
^L
RFC 4825 XCAP May 2007
convention for documents, and those naming conventions may or may not
specify a file extension. For example, in the RLS services
application usage [22], documents in the user's home directory with
the filename "index" will be used by the server to compute the global
index, which is also a document with the filename "index". Barring
specific guidelines in the application usage, if a user has a single
document for a particular application usage, this SHOULD be called
"index".
When the naming conventions in an application usage do not constrain
the filename conventions (or, more generally, the document selector),
an application will know the filename (or more generally, the
document selector) because it is included as a reference in a
document accessed by the client. As another example, within the
index document defined by RLS services, the <service> element has a
child element called <resource-list> whose content is a URI pointing
to a resource list within the users home directory.
As a result, if the user creates a new document, and then references
that document from a well-known document (such as the index document
above), it doesn't matter whether or not the user includes an
extension in the filename, as long as the user is consistent and
maintains referential integrity.
As an example, the path segment
"/resource-lists/users/sip:joe@example.com/index" is a document
selector. Concatenating the XCAP root URI with the document selector
produces the HTTP URI "http://xcap.example.com/resource-lists/users/
sip:joe@example.com/index". In this URI, the AUID is "resource-
lists", and the document is in the user tree with the XUI
"sip:joe@example.com" with filename "index".
6.3. Node Selector
The node selector specifies specific nodes of the XML document that
are to be accessed. A node refers to an XML element, an attribute of
an element, or a set of namespace bindings. The node selector is an
expression that identifies an element, attribute, or set of namespace
bindings. Its grammar is:
node-selector = element-selector ["/" terminal-selector]
terminal-selector = attribute-selector / namespace-selector /
extension-selector
element-selector = step *( "/" step)
step = by-name / by-pos / by-attr / by-pos-attr /
extension-selector
by-name = NameorAny
by-pos = NameorAny "[" position "]"
Rosenberg Standards Track [Page 18]
^L
RFC 4825 XCAP May 2007
position = 1*DIGIT
attr-test = "@" att-name "=" att-value
by-attr = NameorAny "[" attr-test "]"
by-pos-attr = NameorAny "[" position "]" "[" attr-test "]"
NameorAny = QName / "*" ; QName from XML Namespaces
att-name = QName
att-value = AttValue ; from XML specification
attribute-selector = "@" att-name
namespace-selector = "namespace::*"
extension-selector = 1*( %x00-2e / %x30-ff ) ; anything but "/"
The QName grammar is defined in the XML namespaces [3] specification,
and the AttValue grammar is defined in the XML specification XML 1.0
[1].
The extension-selector is included for purposes of extensibility. It
can be composed of any character except the slash, which is the
delimiter amongst steps. Any characters in an extension that cannot
be represented in a URI MUST be percent-encoded before placement into
a URI.
Note that the double quote, left square bracket and right square
bracket characters, which are meaningful to XCAP, cannot be directly
represented in the HTTP URI. As a result, they are percent-encoded
when placed within the HTTP URI. In addition to these characters, an
apostrophe (') character can be used as a delimiter within XPath
expressions. Furthermore, since XML allows for non-ASCII characters,
the names of elements and attributes may not be directly
representable in a URI. Any such characters MUST be represented by
converting them to an octet sequence corresponding to their
representation in UTF-8, and then percent-encoding that sequence of
octets.
Similarly, the XML specification defines the QName production for the
grammar for element and attribute names, and the AttValue production
for the attribute values. Unfortunately, the characters permitted by
these productions include some that are not allowed for pchar, which
is the production for the allowed set of characters in path segments
in the URI. The AttValue production allows many such characters
within the US-ASCII set, including the space. Those characters MUST
be percent-encoded when placed in the URI. Furthermore, QName and
AttValue allow many Unicode characters, outside of US-ASCII. When
these characters need to be represented in the HTTP URI, they are
percent-encoded. To do this, the data should be encoded first as
octets according to the UTF-8 character encoding [18], and then only
those octets that do not correspond to characters in the pchar set
should be percent-encoded. For example, the character A would be
represented as "A", the character LATIN CAPITAL LETTER A WITH GRAVE
Rosenberg Standards Track [Page 19]
^L
RFC 4825 XCAP May 2007
would be represented as "%C3%80", and the character KATAKANA LETTER A
would be represented as "%E3%82%A2".
As a result, the grammar above represents the expressions processed
by the XCAP server internally after it has decoded the URI. The on-
the-wire format is dictated by RFC 3986 [13]. In the discussions and
examples below, when the node selectors are not part of an HTTP URI,
they are presented in their internal format prior to encoding. If an
example includes a node selector within an HTTP URI, it is presented
in its percent-encoded form.
The node selector is based on the concepts in XPath [10]. Indeed,
the node selector expression, before it is percent-encoded for
representation in the HTTP URI, happens to be a valid XPath
expression. However, XPath provides a set of functionality far
richer than is needed here, and its breadth would introduce much
unneeded complexity into XCAP.
To determine the XML element, attribute, or namespace bindings
selected by the node selector, processing begins at the root node of
the XML document. The first step in the element selector is then
taken. Each step chooses a single XML element within the current
document context. The document context is the point within the XML
document from which a specific step is evaluated. The document
context begins at the root node of the document. When a step
determines an element within that context, that element becomes the
new context for evaluation of the next step. Each step can select an
element by its name (expanded), by a combination of name and
attribute value, by name and position, or by name, position and
attribute. In all cases, the name can be wildcarded, so that all
elements get selected.
The selection operation operates as follows. Within the current
document context, the children of that context are enumerated in
document order. If the context is the root node of the document, its
child element is the root element of the document. If the context is
an element, its children are all of the children of that element
(naturally). Next, those elements whose name is not a match for
NameorAny are discarded. An element name is a match if NameorAny is
the wildcard, or if it is not a wildcard, the element name matches
NameorAny. Matching is discussed below. The result is an ordered
list of elements.
The elements in the list are further filtered by the predicates,
which are the expressions in square brackets following NameorAny.
Each predicate further prunes the elements from the current ordered
list. These predicates are evaluated in order. If the content of
the predicate is a position, the position-th element is selected
Rosenberg Standards Track [Page 20]
^L
RFC 4825 XCAP May 2007
(that is, treat "position" as a variable, and take the element whose
position equals that variable), and all others are discarded. If
there are fewer elements in the list than the value of position, the
result is a no-match.
If the content of the predicate is an attribute name and value, all
elements possessing an attribute with that name and value are
selected, and all others are discarded. Note that, although a
document can have namespace declarations within elements, those
elements cannot be selected using a namespace declaration as a
predicate. That is, a step like "el-name[@xmlns='namespace']" will
never match an element, even if there is an element in the list that
specifies a default namespace of "namespace". In other words, a
namespace node is NOT an attribute. If the namespaces in scope for
an element are needed, they can be selected using the namespace-
selector described below. If there are no elements with attributes
having the given name and value, the result is a no-match.
After the predicates have been applied, the result will be a
no-match, one element, or multiple elements. If the result is
multiple elements, the node selector is invalid. Each step in a node
selector MUST produce a single element to form the context for the
next step. This is more restrictive than general XPath expressions,
which allow a context to contain multiple nodes. If the result is a
no-match, the node selector is invalid. The node selector is only
valid if a single element was selected. This element becomes the
context for the evaluation of the next step in the node selector
expression.
The last location step is either the previously described element
selector or a "terminal selector". If the terminal selector is an
attribute selector, the server checks to see if there is an attribute
with the same expanded name in the current element context. If there
is not, the result is considered a no-match. Otherwise, that
attribute is selected. If the terminal selector is a namespace
selector, the result is equal to the set of namespace bindings in
scope for the element, including the possible default namespace
declaration. This specification defines a syntax for representing
namespace bindings, so they can be returned to the client in an HTTP
response.
As a result, once the entire node selector is evaluated against the
document, the result will either be a no-match, invalid, a single
element, a single attribute, or a set of namespace bindings.
Matching of element names is performed as follows. The element being
compared in the step has its name expanded as described in XML
namespaces [3]. The element name in the step is also expanded. This
Rosenberg Standards Track [Page 21]
^L
RFC 4825 XCAP May 2007
expansion requires that any namespace prefix is converted to its
namespace URI. Doing that requires a set of bindings from prefixes
to namespace URIs. This set of bindings is obtained from the query
component of the URI (see Section 6.4). If the prefix of the QName
of an element is empty, the corresponding URI is then the default
document namespace URI defined by the application usage, or null if
not defined. Comparisons are then performed as described in XML
namespaces [3]. Note that the namespace prefix expansions described
here are different than those specified in the XPath 1.0
specification, but are closer to those currently defined by the XPath
2.0 specification [24].
Matching of attribute names proceeds in a similar way. The attribute
in the document has its name expanded as described in XML namespaces
[3]. If the attribute name in the attribute selector has a namespace
prefix, its name is expanded using the namespace bindings obtained
from the query component of the URI. An unprefixed attribute QName
is in no namespace.
Comments, text content (including whitespace), and processing
instructions can be present in a document, but cannot be selected by
the expressions defined here. Of course, if such information is
present in a document, and a user selects an XML element enclosing
that data, that information would be included in a resulting GET, for
example. Furthermore, whitespace is respected by XCAP. If a client
PUTs an element or document that contains whitespace, the server
retains that whitespace, and will return the element or document back
to the client with exactly the same whitespace. Similarly, when an
element is inserted, no additional whitespace is added around the
inserted element, and the element gets inserted in a very specific
location relative to any whitespace, comments, or processing
instructions around it. Section 8.2.3 describes where the insertion
occurs.
Rosenberg Standards Track [Page 22]
^L
RFC 4825 XCAP May 2007
As an example, consider the following XML document:
<?xml version="1.0"?>
<watcherinfo xmlns="urn:ietf:params:xml:ns:watcherinfo"
version="0" state="full">
<watcher-list resource="sip:professor@example.net"
package="presence">
<watcher status="active"
id="8ajksjda7s"
duration-subscribed="509"
event="approved">sip:userA@example.net</watcher>
<watcher status="pending"
id="hh8juja87s997-ass7"
display-name="Mr. Subscriber"
event="subscribe">sip:userB@example.org</watcher>
</watcher-list>
</watcherinfo>
Figure 3: Example XML Document
Assuming that the default document namespace for this application
usage is "urn:ietf:params:xml:ns:watcherinfo", the node selector
watcherinfo/watcher-list/watcher[@id="8ajksjda7s"] would select the
following XML element:
<watcher status="active"
id="8ajksjda7s"
duration-subscribed="509"
event="approved">sip:userA@example.net</watcher>
6.4. Namespace Bindings for the Selector
In order to expand the namespace prefixes used in the node selector,
a set of bindings from those namespace prefixes to namespace URI must
be used. Those bindings are contained in the query component of the
URI. If no query component is present, it means that only the
default document namespace (as identified by the application usage)
is defined. The query component is formatted as a valid xpointer
expression [5] after suitable URI encoding as defined in Section 4.1
of the Xpointer framework. This xpointer expression SHOULD only
contain expressions from the xmlns() scheme [4]. A server compliant
to this specification MUST ignore any xpointer expressions not from
the xmlns() scheme. The xmlns() xpointer expressions define the set
of namespace bindings in use for evaluating the URI.
Note that xpointer expressions were originally designed for usage
within fragment identifiers of URIs. However, within XCAP, they are
used within query components of URIs.
Rosenberg Standards Track [Page 23]
^L
RFC 4825 XCAP May 2007
The following example shows a more complex matching operation, this
time including the usage of namespace bindings. Consider the
following document:
<?xml version="1.0"?>
<foo xmlns="urn:test:default-namespace">
<ns1:bar xmlns:ns1="urn:test:namespace1-uri"
xmlns="urn:test:namespace1-uri">
<baz/>
<ns2:baz xmlns:ns2="urn:test:namespace2-uri"/>
</ns1:bar>
<ns3:hi xmlns:ns3="urn:test:namespace3-uri">
<there/>
</ns3:hi>
</foo>
Assume that this document has a document URI of
"http://xcap.example.com/test/users/sip:joe@example.com/index", where
"test" is the application usage. This application usage defines a
default document namespace of "urn:test:default-namespace". The XCAP
URI:
http://xcap.example.com/test/users/sip:joe@example.com/index/
~~/foo/a:bar/b:baz?xmlns(a=urn:test:namespace1-uri)
xmlns(b=urn:test:namespace1-uri)
will select the first <baz> child element of the <bar> element in the
document. The XCAP URI:
http://xcap.example.com/test/users/sip:joe@example.com/index/
~~/foo/a:bar/b:baz?xmlns(a=urn:test:namespace1-uri)
xmlns(b=urn:test:namespace2-uri)
will select the second <baz> child element of the <bar> element in
the document. The following XCAP URI will also select the second
<baz> child element of the <bar> element in the document:
http://xcap.example.com/test/users/sip:joe@example.com/index/
~~/d:foo/a:bar/b:baz?xmlns(a=urn:test:namespace1-uri)
xmlns(b=urn:test:namespace2-uri)
xmlns(d=urn:test:default-namespace)
7. Client Operations
An XCAP client is an HTTP/1.1 compliant client. Specific data
manipulation tasks are accomplished by invoking the right set of HTTP
methods with the right set of headers on the server. This section
describes those in detail.
Rosenberg Standards Track [Page 24]
^L
RFC 4825 XCAP May 2007
In all cases where the client modifies a document, by deleting or
inserting a document, element or attribute resource, the client
SHOULD verify that, if the operation were to succeed, the resulting
document would meet the data constraints defined by the application
usage, including schema validation. For example, if the client
performs a PUT operation to "http://xcap.example.com/rls-services/
users/sip:joe@example.com/mybuddies", rls-services is the application
unique ID, and the constraints defined by it SHOULD be followed.
The client will know what URI to use based on the naming conventions
described by the application usage.
If the document, after modification, does not meet the data
constraints, the server will reject it with a 409. The 409 response
may contain an XML body, formatted according to the schema in
Section 11.2, which provides further information on the nature of the
error. The client MAY use this information to try and alter the
request so that, this time, it might succeed. The client SHOULD NOT
simply retry the request without changing some aspect of it.
In some cases, the application usage will dictate a uniqueness
constraint that the client cannot guarantee on its own. One such
example is that a URI has to be unique within a domain. Typically,
the client is not the owner of the domain, and so it cannot be sure
that a URI is unique. In such a case, the client can either generate
a sufficiently random identifier, or it can pick a "vanity"
identifier in the hopes that it is not taken. In either case, if the
identifier is not unique, the server will reject the request with a
409 and suggest alternatives that the client can use to try again.
If the server does not suggest alternatives, the client SHOULD
attempt to use random identifiers with increasing amounts of
randomness.
HTTP also specifies that PUT and DELETE requests are idempotent.
This means that, if the client performs a PUT on a document and it
succeeds, it can perform the same PUT, and the resulting document
will look the same. Similarly, when a client performs a DELETE, if
it succeeds, a subsequent DELETE to the same URI will generate a 404;
the resource no longer exists on the server since it was deleted by
the previous DELETE operation. To maintain this property, the client
SHOULD construct its URIs such that, after the modification has taken
place, the URI in the request will point to the resource just
inserted for PUT (i.e., the body of the request), and will point to
nothing for DELETE. If this property is maintained, it is the case
that GET to the URI in the PUT will return the same content (i.e.,
GET(PUT(X)) == x). This property implies idempotency. Although a
request can still be idempotent if it does not possess this property,
XCAP does not permit such requests. If the client's request does not
Rosenberg Standards Track [Page 25]
^L
RFC 4825 XCAP May 2007
have this property, the server will reject the request with a 409 and
indicate a cannot-insert error condition.
If the result of the PUT is a 200 or 201 response, the operation was
successful. Other response codes to any request, such as a
redirection, are processed as per RFC 2616 [6].
7.1. Create or Replace a Document
To create or replace a document, the client constructs a URI that
references the location where the document is to be placed. This URI
MUST be a document URI, and therefore contain the XCAP root and
document selector. The client then invokes a PUT method on that URI.
The MIME content type MUST be the type defined by the application
usage. For example, it would be "application/rls-services+xml" for
an RLS services [22] document, and not "application/xml".
If the Request-URI identifies a document that already exists in the
server, the PUT operation replaces that document with the content of
the request. If the Request-URI does not identify an existing
document, the document is created on the server at that specific URI.
7.2. Delete a Document
To delete a document, the client constructs a URI that references the
document to be deleted. This URI MUST be a document URI. The client
then invokes a DELETE operation on the URI to delete the document.
7.3. Fetch a Document
As one would expect, fetching a document is trivially accomplished by
performing an HTTP GET request with the Request URI set to the
document URI.
7.4. Create or Replace an Element
To create or replace an XML element within an existing document, the
client constructs a URI whose document selector points to the
document to be modified. The node selector MUST be present in the
URI, delimited from the document selector with the node selector
separator. The query component MUST be present if the node selector
makes use of namespace prefixes, in which case, the xmlns()
expressions in the query component MUST define those prefixes. To
create this element within the document, the node selector is
constructed such that it is a no-match against the current document,
but if the element in the body of the request was added to the
document as desired by the client, the node selector would select
Rosenberg Standards Track [Page 26]
^L
RFC 4825 XCAP May 2007
that element. To replace an element in the document, the node
selector is constructed so that it is a match against the element in
the current document to be replaced, as well as a match to the new
element (present in the body of the PUT request) that is to replace
it.
Oftentimes, the client will wish to insert an element into a document
in a certain position relative to other children of the same parent.
This is called a positional insertion. They often arise because the
schema constrains where the element can occur, or because ordering of
elements is significant within the schema. To accomplish this, the
client can use a node selector of the following form:
parent/*[position][unique-attribute-value]
Here, "parent" is an expression for the parent of the element to be
inserted. "position" is the position amongst the existing child
elements of this parent where the new element is to be inserted.
"unique-attribute-value" is an attribute name and value for the
element to be inserted, which is different from the current element
in "position". The second predicate is needed so that the overall
expression is a no-match when evaluated against the current children.
Otherwise, the PUT would replace the existing element in that
position. Note that in addition to wildcard "*" a QName can also be
used as a node test. The insert logic is described in more detail in
Section 8.2.3.
Consider the example document in Figure 3. The client would like to
insert a new <watcher> element as the second element underneath
<watcher-list>. However, it cannot just PUT to a URI with the
watcherinfo/watcher-list/*[2] node selector; this node selector would
select the existing second child element of <watcher-list> and
replace it. Thus, the PUT has to be made to a URI with watcherinfo/
watcher-list/*[2][@id="hhggff"] as the node selector, where "hhggff"
is the value of the "id" attribute of the new element to be inserted.
This node-selector is a no-match against the current document, and
would be a match against the new element if it was inserted as the
second child element of <watcher-list>.
The "*" indicates that all element children of <watcher-info> are to
be considered when computing the position for insertion. If, instead
of a wildcard *, an element name (QName) was present, the expression
above would insert the new element as the position-th element amongst
those with the same expanded name (see Section 8.2.3 for a discussion
on insertion rules).
Once the client constructs the URI, it invokes the HTTP PUT method.
The content in the request MUST be an XML element. Specifically, it
Rosenberg Standards Track [Page 27]
^L
RFC 4825 XCAP May 2007
contains the element, starting with the opening bracket for the begin
tag for that element, including the attributes and content of that
element (whether it be text or other child elements), and ending with
the closing bracket for the end tag for that element. The MIME type
in the request MUST be "application/xcap-el+xml", defined in
Section 15.2.1. If the node selector, when evaluated against the
current document, results in a no-match, the server performs a
creation operation. If the node selector, when evaluated against the
current document, is a match for an element in the current document,
the server replaces it with the content of the PUT request. This
replacement is complete; that is, the old element (including its
attributes, namespace declarations and content: text, element,
comment and processing instruction nodes) are removed, and the new
one, including its attributes, namespace declarations and content, is
put in its place.
To be certain that element insertions have the GET(PUT(x))==x
property, the client can check that the attribute predicates in the
final path segment of the URI match the attributes of the element in
the body of the request. As an example of a request that would not
have this property, and therefore would not be idempotent, consider
the following PUT request (URIs are line-folded for readability):
PUT
/rls-services/users/sip:bill@example.com/index/~~/rls-services/
service%5b@uri=%22sip:good-friends@example.com%22%5d
HTTP/1.1
Content-Type:application/xcap-el+xml
Host: xcap.example.com
<service uri="sip:mybuddies@example.com">
<resource-list>http://xcap.example.com/resource-lists/users
/sip:joe@example.com/index/~~/resource-lists/list%5b@name=%22l1%22%5d
</resource-list>
<packages>
<package>presence</package>
</packages>
</service>
This request will fail with a 409. The Request URI contains a final
path segment with a predicate based on attributes:
@uri="sip:good-friends@example.com". However, this will not match
the value of the "uri" attribute in the element in the body
(sip:mybuddies@example.com).
The GET(PUT(x))==x property introduces some limitations on the types
of operations possible. It will not be possible to replace an
element with one that has a new value for an attribute that is the
Rosenberg Standards Track [Page 28]
^L
RFC 4825 XCAP May 2007
sole unique element identifier, if the URI contained a node selector
that was using the previous value of that attribute for purposes of
selecting the element. This is exactly the use case in the example
above. To get around this limitation, the selection can be done by
position instead of attribute value, or the parent of the element to
be replaced can be selected, and then the body of the PUT operation
would contain the parent, the child to be replaced, and all other
siblings.
7.5. Delete an Element
To delete an element from a document, the client constructs a URI
whose document selector points to the document containing the element
to be deleted. The node selector MUST identify a single element.
The node selector MUST be present following the node selector
separator, and identify the specific element to be deleted.
Furthermore, the node selector MUST match no element after the
deletion of the target element. This is required to maintain the
idempotency property of HTTP deletions. The query component MUST be
present if the node selector makes use of namespace prefixes, in
which case the xmlns() expressions in the query component MUST define
those prefixes.
If the client wishes to delete an element in a specific position,
this is referred to as a positional deletion. Like a positional
insertion, the node selector has the following form:
parent/*[position][unique-attribute-value]
Where "parent" is an expression for the parent of the element to be
deleted, "position" is the position of the element to be deleted
amongst the existing child elements of this parent, and "unique-
attribute-value" is an attribute name and value for the element to be
deleted, where this attribute name and value are different than any
of the siblings of the element.
Positional deletions without using a unique attribute name and value
are possible, but only in limited cases where idempotency is
guaranteed. In particular, if a DELETE operation refers to an
element by name and position alone (parent/elname[n]), this is
permitted only when the element to be deleted is the last element
amongst all its siblings with that name. Similarly, if a DELETE
operation refers to an element by position alone (parent/*[n]), this
is permitted only when the element to be deleted is the last amongst
all sibling elements, regardless of name.
The client then invokes the HTTP DELETE method. The server will
remove the element from the document (including its attributes,
Rosenberg Standards Track [Page 29]
^L
RFC 4825 XCAP May 2007
namespace declarations, and its descendant nodes, such as any
children).
7.6. Fetch an Element
To fetch an element of a document, the client constructs a URI whose
document selector points to the document containing the element to be
fetched. The node selector MUST be present following the node
selector separator, and must identify the element to be fetched. The
query component MUST be present if the node selector makes use of
namespace prefixes, in which case the xmlns() expressions in the
query component MUST define those prefixes.
The client then invokes the GET method. The 200 OK response will
contain that XML element. Specifically, it contains the content of
the XML document, starting with the opening bracket for the begin tag
for that element, and ending with the closing bracket for the end tag
for that element. This will, as a result, include all attributes,
namespace declarations and descendant nodes: elements, comments,
text, and processing instructions of that element.
7.7. Create or Replace an Attribute
To create or replace an attribute in an existing element of a
document, the client constructs a URI whose document selector points
to the document to be modified. The node selector, following the
node selector separator, MUST be present. The node selector MUST be
constructed such that, if the attribute was created or replaced as
desired, the node selector would select that attribute. If the node
selector, when evaluated against the current document, results in a
no-match, it is a creation operation. If it matches an existing
attribute, it is a replacement operation. The query component MUST
be present if the node selector makes use of namespace prefixes, in
which case the xmlns() expressions in the query component MUST define
those prefixes.
The client then invokes the HTTP PUT method. The content defined by
the request MUST be the value of the attribute, compliant to the
grammar for AttValue as defined in XML 1.0 [1]. Note that, unlike
when AttValue is present in the URI, there is no percent-encoding of
the body. This request MUST be sent with the Content-Type of
"application/xcap-att+xml" as defined in Section 15.2.2. The server
will add the attribute such that, if the node selector is evaluated
on the resulting document, it will return the attribute present in
the request.
To be certain that attribute insertions have the GET(PUT(x))==x
property, the client can check that any attribute predicate in the
Rosenberg Standards Track [Page 30]
^L
RFC 4825 XCAP May 2007
path segment that selects the element into which the attribute is
inserted, matches a different attribute than the one being inserted
by the request. As an example of a request that would not have this
property, and therefore would not be idempotent, consider the
following PUT request (URIs are line-folded for readability):
PUT
/rls-services/users/sip:bill@example.com/index/~~/rls-services
/service%5b@uri=%22sip:good-friends@example.com%22%5d/@uri
HTTP/1.1
Content-Type:application/xcap-att+xml
Host: xcap.example.com
"sip:bad-friends@example.com"
This request will fail with a 409.
As with element insertions and replacements, the GET(PUT(x))==x
property introduces limitations on attribute replacements. It will
not be possible to replace the attribute value of an attribute, when
that attribute is the sole unique element identifier, and the URI
contains a node selector that uses the previous value of the
attribute to select the affected element. This is the use case in
the example above. Instead, the element can be selected
positionally, or its entire parent replaced.
7.8. Delete an Attribute
To delete an attribute from the document, the client constructs a URI
whose document selector points to the document containing the
attribute to be deleted. The node selector MUST be present following
the node selector separator, and evaluate to an attribute in the
document to be deleted. The query component MUST be present if the
node selector makes use of namespace prefixes, in which case the
xmlns() expressions in the query component MUST define those
prefixes.
The client then invokes the HTTP DELETE method. The server will
remove the attribute from the document.
7.9. Fetch an Attribute
To fetch an attribute of a document, the client constructs a URI
whose document selector points to the document containing the
attribute to be fetched. The node selector MUST be present following
the node selector separator, containing an expression identifying the
attribute whose value is to be fetched. The query component MUST be
present if the node selector makes use of namespace prefixes, in
Rosenberg Standards Track [Page 31]
^L
RFC 4825 XCAP May 2007
which case the xmlns() expressions in the query component MUST define
those prefixes.
The client then invokes the GET method. The 200 OK response will
contain an "application/xcap-att+xml" document with the specified
attribute, formatted according to the grammar of AttValue as defined
in the XML 1.0 specifications.
7.10. Fetch Namespace Bindings
If a client wishes to insert an element or attribute into a document,
and that element or attribute is part of a namespace declared
elsewhere in the document, the client will need to know the namespace
bindings in order to construct the XML content in the request. If
the client has a cached copy of the document, it will know the
bindings. However, if it doesn't have the whole document cached, it
can be useful to fetch just the bindings that are in scope for an
element, in order to construct a subsequent PUT request.
To get those bindings, the client constructs a URI whose document
selector points to the document containing the element whose
namespace bindings are to be fetched. The node selector MUST be
present following the node selector separator, containing an
expression identifying the desired namespace bindings. The query
component MUST be present if the node selector makes use of namespace
prefixes, in which case the xmlns() expressions in the query
component MUST define those prefixes.
The client then invokes the GET method. The 200 OK response will
contain an "application/xcap-ns+xml" document with the namespace
definitions. The format for this document is defined in Section 10.
A client cannot set the namespace prefixes in scope for an element.
As such, a node selector that identifies namespace prefixes MUST NOT
appear in a PUT or DELETE request.
7.11. Conditional Operations
The HTTP specification defines several header fields that can be used
by a client to make the processing of the request conditional. In
particular, the If-None-Match and If-Match header fields allow a
client to make them conditional on the current value of the entity
tag for the resource. These conditional operations are particularly
useful for XCAP resources.
For example, it is anticipated that clients will frequently wish to
cache the current version of a document. So, when the client starts
up, it will fetch the current document from the server and store it.
Rosenberg Standards Track [Page 32]
^L
RFC 4825 XCAP May 2007
When it does so, the GET response will contain the entity tag for the
document resource. Each resource within a document maintained by the
server will share the same value of the entity tag. As a result, the
entity tag returned by the server for the document resource is
applicable to element and attribute resources within the document.
If the client wishes to insert or modify an element or attribute
within the document, but it wants to be certain that the document
hasn't been modified since the client last operated on it, it can
include an If-Match header field in the request, containing the value
of the entity tag known to the client for all resources within the
document. If the document has changed, the server will reject this
request with a 412 response. In that case, the client will need to
flush its cached version, fetch the entire document, and store the
new entity tag returned by the server in the 200 OK to the GET
request. It can then retry the request, placing the new entity tag
in the If-Match header field. If this succeeds, the Etag header
field in the response to PUT contains the entity tag for the resource
that was just inserted or modified. Because all resources in a
document share the same value for their entity tag, this entity tag
value can be applied to the modification of other resources.
A client can also conditionally delete elements or attributes by
including an If-Match header field in DELETE requests. Note that the
200 OK responses to a DELETE will contain an Etag header field,
containing the entity tag for all of the other resources in the
document, even though the resource identified by the DELETE request
no longer exists.
When a client uses conditional PUT and DELETE operations, it can
apply those changes to its local cached copy, and update the value of
the entity tag for the locally cached copy based on the Etag header
field returned in the response. As long as no other clients try to
modify the document, the client will be able to perform conditional
operations on the document without ever having to perform separate
GET operations to synchronize the document and its entity tags with
the server. If another client tries to modify the document, this
will be detected by the conditional mechanisms, and the client will
need to perform a GET to resynchronize its copy unless it has some
other means to learn about the change.
If a client does not perform a conditional operation, but did have a
cached copy of the document, that cached copy will become invalid
once the operation is performed (indeed, it may have become invalid
even beforehand). Unconditional operations should only be performed
by clients when knowledge of the entire document is not important for
the operation to succeed.
Rosenberg Standards Track [Page 33]
^L
RFC 4825 XCAP May 2007
As another example, a when a client fetches a document, and there is
an older version cached, it is useful for clients to use a
conditional GET in order to reduce network usage if the cached copy
is still valid. This is done by including, in the GET request, the
If-None-Match header field with a value equal to the current etag
held by the client for the document. The server will only generate a
200 OK response if the etag held by the server differs than that held
by the client. If it doesn't differ, the server will respond with a
304 response.
8. Server Behavior
An XCAP server is an HTTP/1.1 compliant origin server. The behaviors
mandated by this specification relate to the way in which the HTTP
URI is interpreted and the content is constructed.
An XCAP server MUST be explicitly aware of the application usage
against which requests are being made. That is, the server must be
explicitly configured to handle URIs for each specific application
usage, and must be aware of the constraints imposed by that
application usage.
When the server receives a request, the treatment depends on the URI.
If the URI refers to an application usage not understood by the
server, the server MUST reject the request with a 404 (Not Found)
response. If the URI refers to a user (identified by an XUI) that is
not recognized by the
server, it MUST reject the request with a 404 (Not Found). If the
URI includes extension-selectors that the server doesn't understand,
it MUST reject the request with a 404 (Not Found).
Next, the server authenticates the request. All XCAP servers MUST
implement HTTP Digest [11]. Furthermore, servers MUST implement HTTP
over TLS, RFC 2818 [14]. It is RECOMMENDED that administrators use
an HTTPS URI as the XCAP root URI, so that the digest client
authentication occurs over TLS.
Next, the server determines if the client has authorization to
perform the requested operation on the resource. The application
usage defines the authorization policies. An application usage may
specify that the default is used. This default is described in
Section 5.7.
Next, the server makes sure that it can properly evaluate the request
URI. The server MUST separate the document selector from the node
selector, by splitting the URI at the first instance of the node
selector separator ("~~"). The server MUST check the node selector
in the request URI, if present. If any qualified names are present
Rosenberg Standards Track [Page 34]
^L
RFC 4825 XCAP May 2007
that use a namespace prefix, and that prefix is not defined in an
xmlns() expression in the query component of the request URI, the
server MUST reject the request with a 400 response.
After checking the namespace prefix definitions, the specific
behavior depends on the method and what the URI refers to.
8.1. POST Handling
XCAP resources do not represent processing scripts. As a result,
POST operations to HTTP URIs representing XCAP resources are not
defined. A server receiving such a request for an XCAP resource
SHOULD return a 405.
8.2. PUT Handling
The behavior of a server in receipt of a PUT request is as specified
in HTTP/1.1, Section 9.6 -- the content of the request is placed at
the specified location. This section serves to define the notion of
"placement" and "specified location" within the context of XCAP
resources.
If the request URI contained a namespace-selector, the server MUST
reject the request with a 405 (Method Not Allowed) and MUST include
an Allow header field including the GET method.
8.2.1. Locating the Parent
The first step the server performs is to locate the parent, whether
it is a directory or element, in which the resource is to be placed.
To do that, the server removes the last path segment from the URI.
The rest of the URI refers to the parent. This parent can be a
document, element, or prefix of a document selector (called a
directory, even though this specification does not mandate that
documents are actually stored in a filesystem). This URI is called
the parent URI. The path segment that was removed is called the
target selector, and the node (element, document, or attribute) it
describes is called the target node.
If the parent URI has no node selector separator, it is referring to
the directory into which the document should be inserted. In normal
XCAP operations, this will be either the user's home directory or the
global directory, which will always exist on the server. However, if
an application usage is making use of subdirectories (despite the
fact that this is not recommended), it is possible that the directory
into which the document should be inserted does not exist. In this
case, the server MUST return a 409 response, and SHOULD include a
detailed conflict report including the <no-parent> element. Detailed
Rosenberg Standards Track [Page 35]
^L
RFC 4825 XCAP May 2007
conflict reports are discussed in Section 11. If the directory does
exist, the server checks to see if there is a document with the same
filename as the target node. If there is, the operation is the
replacement operation, discussed in Section 8.2.4. If it does not
exist, it is the creation operation discussed in Section 8.2.3.
If the parent URI has a node selector separator, the document
selector is extracted, and that document is retrieved. If the
document does not exist, the server MUST return a 409 response, and
SHOULD include a detailed conflict report including the <no-parent>
element. If it does exist, the node selector is extracted and
decoded (recall that the node selector is percent-encoded). The node
selector is applied to the document based on the matching operations
discussed in Section 6.3. If the result is a no-match or invalid,
the server MUST return a 409 response, and SHOULD include a detailed
conflict report including the <no-parent> element.
If the node-selector is valid, the server examines the target
selector, and evaluates it within the context of the parent node. If
the target node exists within the parent, the operation is a
replacement, as described in Section 8.2.4. If it does not exist, it
is the creation operation, discussed in Section 8.2.3.
Before performing the replacement or creation, as determined based on
the logic above, the server validates the content of the request as
described in Section 8.2.2.
8.2.2. Verifying Document Content
If the PUT request is for a document (the request URI had no node
selector separator), the content of the request body has to be a
well-formed XML document. If it is not, the server MUST reject the
request with a 409 response code. That response SHOULD include a
detailed conflict report including the <not-well-formed> element. If
the document is well-formed but not UTF-8 encoded, the server MUST
reject the request with a 409 response code. That response SHOULD
include a detailed conflict report including the <not-utf-8> element.
If the MIME type in the Content-Type header field of the request is
not equal to the MIME type defined for the application usage, the
server MUST reject the request with a 415.
If the PUT request is for an element, the content of the request body
has to be a well-balanced region of an XML document, also known as an
XML fragment body in The XML Fragment Interchange [23] specification,
including only a single element. If it is not, the server MUST
reject the request with a 409 response code. That response SHOULD
include a detailed conflict report including the <not-xml-frag>
element. If the fragment body is well-balanced but contains
Rosenberg Standards Track [Page 36]
^L
RFC 4825 XCAP May 2007
characters outside of the UTF-8 character set, the server MUST reject
the request with a 409 response code. That response SHOULD include a
detailed conflict report including the <not-utf-8> element. If the
MIME type in the Content-Type header field of the request is not
equal to "application/xcap-el+xml", the server MUST reject the
request with a 415.
If the PUT request is for an attribute, the content of the request
body has to be a sequence of characters that comply with the grammar
for AttValue as defined above. If it is not, the server MUST reject
the request with a 409 response code. That response SHOULD include a
detailed conflict report including the <not-xml-att-value> element.
If the attribute value is valid but contains characters outside of
the UTF-8 character set, the server MUST reject the request with a
409 response code. That response SHOULD include a detailed conflict
report including the <not-utf-8> element.If the MIME type in the
Content-Type header field of the request is not equal to
"application/xcap-att+xml", the server MUST reject the request with a
415.
8.2.3. Creation
The steps in this sub-section are followed if the PUT request will
result in the creation of a new document, element, or attribute.
If the PUT request is for a document, the content of the request body
is placed into the directory, and its filename is associated with the
target node, which is a document.
If the PUT request is for an element, the server inserts the content
of the request body as a new child element of the parent element
selected in Section 8.2.1. The insertion is done such that the
request URI, when evaluated, would now point to the element that was
inserted. There exist three possible ways in which new elements are
positioned.
First, if there were no other sibling elements with the same expanded
name, and the insertion is not positionally constrained, the new
element is inserted such that it is the last element amongst all
element siblings. Furthermore, if there were comment, text, or
processing instruction nodes after the former last element, they MUST
occur prior to the insertion of the new element. This case occurs
when one of the following are true:
o The element name in the target selector is not wildcarded. There
could be an attribute selector (in which case, it would have to
match an attribute of the element being inserted), and the
position in the target selector will either be absent or have a
Rosenberg Standards Track [Page 37]
^L
RFC 4825 XCAP May 2007
value of 1 (a value greater than 1 would always result in
rejection of the request, since this is the first element with the
given name underneath the parent).
o The element name in the target selector is wildcarded, but there
are no other elements underneath the same parent. There could be
an attribute selector (in which case, it would have to match an
attribute of the element being inserted), and the position in the
target selector will either be absent or have a value of 1 (a
value greater than 1 would always result in rejection of the
request, since this is the first element underneath the parent).
o The element name in the target selector is wildcarded, and there
are other elements underneath the same parent. However, there is
an attribute selector that matches none of the attributes in the
other sibling elements underneath the parent, but does match an
attribute of the element to be inserted. The position in the
target selector is absent.
Secondly, if there were sibling elements with the same name already
in the document, but the insertion is positionally unconstrained, the
server MUST insert the element such that it is in the "earliest last"
position. "Earliest last" means that the new element MUST be
inserted so that there are no elements after it with the same
expanded name, and for all insertion positions where this is true, it
is inserted such that as many sibling nodes (element, comment, text,
or processing instruction) appear after it as possible. This case
occurs when the target selector is defined by a by-name or by-attr
production, and there is no position indicated.
Lastly, if the element is positionally constrained, the server MUST
insert the element so that it is in the "earliest nth" position.
When n>1 and NameofAny is not a wildcard, the element MUST be
inserted so that there are n-1 sibling elements before it with the
same expanded name. If there are not n-1 sibling elements with the
same expanded name, the request will fail. When n>1 and NameorAny is
a wildcard, the element MUST be inserted so that there are n-1
sibling elements before it, each of which can have any expanded name.
If there are not n-1 sibling elements in the document, the request
will fail. In both of these cases, the new element is inserted such
that as many sibling nodes appear after it as possible. When n=1 and
NameorAny is not a wildcard, the insertion is positionally
constrained when an element with the same expanded name already
appears as a child of the same parent. In this case, the new element
MUST appear just before the existing first element with this same
expanded name. When n=1 and NameorAny is wildcarded, the insertion
is positionally constrained when there is also an attribute selector
Rosenberg Standards Track [Page 38]
^L
RFC 4825 XCAP May 2007
that didn't match the first sibling of the parent (if it did match,
or was absent, this wouldn't have been an insertion). In this case,
the new element MUST appear just before all existing elements,
regardless of their expanded name.
In practice, this insertion logic keeps elements with the same
expanded names closely together. This simplifies the application
logic when the content model is described by XML schema with
<sequence> rules and maxOccurs="unbounded" cardinalities, like:
<xs:element name="foobar">
<xs:complexType>
<xs:sequence>
<xs:element ref="foo" maxOccurs="unbounded" />
<xs:element ref="bar" maxOccurs="unbounded" />
</xs:sequence>
</xs:complexType>
</xs:element>
Based on this schema, the document contains some number of <foo>
elements followed by some number of <bar> elements. Either <bar> or
<foo> elements may easily be added without wildcards and positional
constraints. Note that if "minOccurs" cardinality of <foo> element
were zero and <foo> elements do not yet exist, a positional predicate
with the * wildcard must be used.
The whole insert logic is best described by complete examples.
Consider the following document:
<?xml version="1.0"?>
<root>
<el1 att="first"/>
<el1 att="second"/>
<!-- comment -->
<el2 att="first"/>
</root>
A PUT request whose content is <el1 att="third"/> and whose node
selector is root/el1[@att="third"] would result in the following
document:
<?xml version="1.0"?>
<root>
<el1 att="first"/>
<el1 att="second"/><el1 att="third"/>
<!-- comment -->
<el2 att="first"/>
</root>
Rosenberg Standards Track [Page 39]
^L
RFC 4825 XCAP May 2007
Notice how it has been inserted as the third <el1> element in the
document, and just before the comment and whitespace nodes. It would
have been inserted in exactly the same place if the node selector had
been root/el1[3][@att="third"] or root/*[3][@att="third"].
If the content of the request had been <el3 att="first"/> and the
node selector was root/el3, it would result in the following
document:
<?xml version="1.0"?>
<root>
<el1 att="first"/>
<el1 att="second"/>
<!-- comment -->
<el2 att="first"/>
<el3 att="first"/></root>
A PUT request whose content is <el2 att="2"/> and whose node selector
is root/el2[@att="2"] would result in the following document:
<?xml version="1.0"?>
<root>
<el1 att="first"/>
<el1 att="second"/>
<!-- comment -->
<el2 att="first"/><el2 att="2"/>
</root>
It would have been inserted in exactly the same place if the node
selector had been root/el2[2][@att="2"]. However, a selector root/
*[2][@att="2"] would result in the following document:
<?xml version="1.0"?>
<root>
<el1 att="first"/><el2 att="2"/>
<el1 att="second"/>
<!-- comment -->
<el2 att="first"/>
</root>
Rosenberg Standards Track [Page 40]
^L
RFC 4825 XCAP May 2007
Lastly, if the node selector had been root/el2[1][@att="2"] the
result would be:
<?xml version="1.0"?>
<root>
<el1 att="first"/>
<el1 att="second"/>
<!-- comment -->
<el2 att="2"/><el2 att="first"/>
</root>
It is possible that the element cannot be inserted such that the
request URI, when evaluated, returns the content provided in the
request. Such a request is not allowed for PUT. This happens when
the element in the body is not described by the expression in the
target selector. An example of this case is described in
Section 7.4. If this happens, the server MUST NOT perform the
insertion, and MUST reject the request with a 409 response. The body
of the response SHOULD contain a detailed conflict report containing
the <cannot-insert> element. It is important to note that schema
compliance does not play a role while performing the insertion. That
is, the decision of where the element gets inserted is dictated
entirely by the structure of the request-URI, the current document,
and the rules in this specification.
If the element being inserted (or any of its children) contain
namespace declarations, those declarations are retained when the
element is inserted, even if those same declarations exist in a
parent element after insertion. The XCAP server MUST NOT remove
redundant namespace declarations or otherwise change the namespace
declarations that were present in the element being inserted.
If the PUT request is for an attribute, the server inserts the
content of the request body as the value of the attribute. The name
of the attribute is equal to the att-name from the attribute-selector
in the target selector.
Assuming that the insertion can be accomplished, the server verifies
that the insertion results in a document that meets the constraints
of the application usage. This is discussed in Section 8.2.5.
8.2.4. Replacement
The steps in this sub-section are followed if the PUT request will
result in the replacement of a document, element, or attribute with
the contents of the request.
Rosenberg Standards Track [Page 41]
^L
RFC 4825 XCAP May 2007
If the PUT request is for a document, the content of the request body
is placed into the directory, replacing the document with the same
filename.
If the PUT request is for an element, the server replaces the target
node with the content of the request body. As in the creation case,
it is possible that, after replacement, the request URI does not
select the element that was just inserted. If this happens, the
server MUST NOT perform the replacement, and MUST reject the request
with a 409 response. The body of the response SHOULD contain a
detailed conflict report containing the <cannot-insert> element.
As with creation, replacement of an element does not result in the
changing or elimination of namespace declarations within the newly
modified element.
If the PUT request is for an attribute, the server sets the value of
the selected attribute to the content of the request body. It is
possible in the replacement case (but not in the creation case),
that, after replacement of the attribute, the request URI no longer
selects the attribute that was just replaced. The scenario in which
this can happen is discussed in Section 7.7. If this is the case,
the server MUST NOT perform the replacement, and MUST reject the
request with a 409 response. The body of the response SHOULD contain
a detailed conflict report containing the <cannot-insert> element.
8.2.5. Validation
Once the document, element, or attribute has been tentatively
inserted, the server needs to verify that the resulting document
meets the data constraints outlined by the application usage.
First, the server checks that the final document is compliant with
the schema. If it is not, the server MUST NOT perform the insertion.
It MUST reject the request with a 409 response. That response SHOULD
contain a detailed conflict report containing the <schema-validation-
error> element. If a schema allows for elements or attributes from
other namespaces, and the new document contains elements or
attributes from an unknown namespace, the server MUST allow the
change. In other words, it is not necessary for an XCAP server to
understand the namespaces and corresponding schemas for elements and
attributes within a document, as long as the schema itself allows for
such elements or attributes to be included. Of course, such unknown
namespaces would not be advertised by the server in its XCAP
capabilities document, discussed in Section 12.
If the final document contains elements or attributes from a
namespace that the server does understand (and has consequently
Rosenberg Standards Track [Page 42]
^L
RFC 4825 XCAP May 2007
advertised in its XCAP capabilities document), but the server does
not have the schema for that particular element or attribute, the
server MUST reject the request with a 409 response. That response
SHOULD contain a detailed conflict report containing the <schema-
validation-error> element.
Next, the server checks for any uniqueness constraints identified by
the application usage. If the application usage required that a
particular element or attribute had a unique value within a specific
scope, the server would check that this uniqueness property still
exists. If the application usage required that a URI within the
document was unique within the domain, the server checks whether it
is the case. If any of these uniqueness constraints are not met, the
server MUST NOT perform the insertion. It MUST reject the request
with a 409 response. That response SHOULD contain a detailed
conflict report containing the <uniqueness-failure> element. That
element can contain suggested values that the client can use to
retry. These SHOULD be values that, at the time the server generates
the 409, would meet the uniqueness constraints.
The server also checks for URI constraints and other non-schema data
constraints. If the document fails one of these constraints, the
server MUST NOT perform the insertion. It MUST reject the request
with a 409 response. That response SHOULD contain a detailed
conflict report containing the <constraint-failure> element. That
element indicates that the document failed non-schema data
constraints explicitly called out by the application usage.
Element or attribute removals have similar constraints. The server
checks the document for schema validity and compliance to constraints
defined by the application usage, and rejects the request as
described above, if either check fails.
8.2.6. Conditional Processing
A PUT request for an XCAP resource, like any other HTTP resource, can
be made conditional through usage of the If-Match and If-None-Match
header fields. For a replacement, these are processed as defined in
[6]. For an insertion of an element or attribute, conditional
operations are permitted. The entity tag that is used for the
procedures in [6] is the one for all of the resources within the same
document as the parent of the element or attribute being inserted.
One way to think of this is that, logically speaking, upon receipt of
the PUT request, the XCAP server instantiates the etag for the
resource referenced by the request, and then applies the processing
of the request. Because of this behavior, it is not possible to
perform a conditional insert on an attribute or element that is
conditioned on the operation being an insertion and not a
Rosenberg Standards Track [Page 43]
^L
RFC 4825 XCAP May 2007
replacement. In other words, a conditional PUT of an element or
attribute with an If-None-Match: * will always fail.
8.2.7. Resource Interdependencies
Because XCAP resources include elements, attributes, and documents,
each of which has its own HTTP URI, the creation or modification of
one resource affects the state of many others. For example,
insertion of a document creates resources on the server for all of
the elements and attributes within that document. After the server
has performed the insertion associated with the PUT, the server MUST
create and/or modify those resources affected by that PUT. The
structure of the document completely defines the inter-relationship
between those resources.
However, the application usage can specify other resource inter-
dependencies. The server MUST create or modify the resources
specified by the application usage.
If the creation or replacement was successful, and the resource
interdependencies are resolved, the server returns a 201 Created or
200 OK, respectively. Note that a 201 Created is generated for
creation of new documents, elements, or attributes. A 200 OK
response to PUT MUST not contain any content. Per the
recommendations of RFC 2616, the 201 can contain a Location header
field and entity that identify the resource that was created. An
entity tag MUST be included in all successful responses to a PUT.
8.3. GET Handling
The semantics of GET are as specified in RFC 2616. This section
clarifies the specific content to be returned for a particular URI
that represents an XCAP resource.
If the request URI contains only a document selector, the server
returns the document specified by the URI if it exists, else returns
a 404 response. The MIME type of the body of the 200 OK response
MUST be the MIME type defined by that application usage (i.e.,
"application/resource-lists+xml").
If the request URI contains a node selector, the server obtains the
document specified by the document selector, and if it is found,
evaluates the node-selector within that document. If no document is
found, or if the node-selector is a no-match or invalid, the server
returns a 404 response. Otherwise, the server returns a 200 OK
response. If the node selector identifies an XML element, that
element is returned in the 200 OK response as an XML fragment body
containing the selected element. The server MUST NOT add namespace
Rosenberg Standards Track [Page 44]
^L
RFC 4825 XCAP May 2007
bindings representing namespaces used by the element or its children,
but declared in ancestor elements; the client will either know these
bindings already (since it has a cached copy of the whole document),
or it can learn them by explicitly querying for the bindings. The
MIME type of the response MUST be "application/xcap-el+xml". If the
node selector identifies an XML attribute, the value of that
attribute is returned in the body of the response. The MIME type of
the response MUST be "application/xcap-att+xml". If the node
selector identifies a set of namespace bindings, the server computes
the set of namespace bindings in scope for the element (including the
default) and encodes it using the "application/xcap-ns+xml" format
defined in Section 10. That document is then returned in the body of
the response.
GET operations can be conditional, and follow the procedures defined
in [6].
Note that the GET of a resource that was just PUT might not be octet-
for-octet equivalent to what was PUT, due to XML normalization and
equivalency rules.
A successful response to a GET MUST include an entity tag.
8.4. DELETE Handling
The semantics of DELETE are as specified in RFC 2616. This section
clarifies the specific content to be deleted for a particular URI
that represents an XCAP resource.
If the request URI contained a namespace-selector, the server MUST
reject the request with a 405 (Method Not Allowed) and MUST include
an Allow header field including the GET method.
If the request URI contains only a document selector, the server
deletes the document specified by the URI if it exists and returns a
200 OK, else returns a 404 response.
If the request URI contains a node selector, the server obtains the
document specified by the document selector, and if it is found,
evaluates the node-selector within that document. If no document is
found, or if the node-selector is a no-match or invalid (note that it
will be invalid if multiple elements or attributes are selected), the
server returns a 404 response. Otherwise, the server removes the
specified element or attribute from the document and performs the
validation checks defined in Section 8.2.5. Note that this deletion
does not include any white space around the element that was deleted;
the XCAP server MUST preserve surrounding whitespace. It is possible
that, after deletion, the request URI selects another element in the
Rosenberg Standards Track [Page 45]
^L
RFC 4825 XCAP May 2007
document. If this happens, the server MUST NOT perform the deletion,
and MUST reject the request with a 409 response. The body of the
response SHOULD contain a detailed conflict report containing the
<cannot-delete> element. If the deletion will cause a failure of one
of the constraints, the deletion MUST NOT take place. The server
follows the procedures in Section 8.2.5 for computing the 409
response. If the deletion results in a document that is still valid,
the server MUST perform the deletion, process the resource
interdependencies defined by the application usage, and return a 200
OK response.
DELETE operations can be conditional, and follow the procedures
defined in [6].
Before the server returns the 200 OK response to a DELETE, it MUST
process the resource interdependencies as defined in Section 8.2.7.
As long as the document still exists after the delete operation, any
successful response to DELETE MUST include the entity tag of the
document.
8.5. Managing Etags
An XCAP server MUST maintain entity tags for all resources that it
maintains. This specification introduces the additional constraint
that when one resource within a document (including the document
itself) changes, that resource is assigned a new etag, and all other
resources within that document MUST be assigned the same etag value.
Effectively, there is a single etag for the entire document. An XCAP
server MUST include the Etag header field in all 200 or 201 responses
to PUT, GET, and DELETE, assuming the document itself still exists
after the operation. In the case of a DELETE, the entity tag refers
to the value of the entity tag for the document after the deletion of
the element or attribute.
XCAP resources do not introduce new requirements on the strength of
the entity tags.
As a result of this constraint, when a client makes a change to an
element or attribute within a document, the response to that
operation will convey the entity tag of the resource that was just
affected. Since the client knows that this entity tag value is
shared by all of the other resources in the document, the client can
make conditional requests against other resources using that entity
tag.
Rosenberg Standards Track [Page 46]
^L
RFC 4825 XCAP May 2007
9. Cache Control
An XCAP resource is a valid HTTP resource, and therefore, it can be
cached by clients and network caches. Network caches, however, will
not be aware of the interdependencies between XCAP resources. As
such, a change to an element in a document by a client will
invalidate other XCAP resources affected by the change. For
application usages containing data that is likely to be dynamic or
written by clients, servers SHOULD indicate a no-cache directive.
10. Namespace Binding Format
A node-selector can identify a set of namespace bindings that are in
scope for a particular element. In order to convey these bindings in
a GET response, a way is needed to encode them.
Encoding is trivially done by including a single XML element in an
XML fragment body. This element has the same local-name as the
element whose namespace bindings are desired, and also the same
namespace-prefix. The element has an xmlns attribute identifying the
default namespace in scope, and an xmlns:prefix declaration for each
prefix that is in scope.
For example, consider the XML document in Section 6.4. The node-
selector df:foo/df2:bar/df2:baz/namespace::* will select the
namespaces in scope for the <baz> element in the document, assuming
the request is accompanied by a query component that contains
xmlns(df=urn:test:default-namespace) and
xmlns(df2=urn:test:namespace1-uri). A GET containing this node
selector and namespace bindings will produce the following result:
<baz xmlns="urn:test:namespace1-uri"
xmlns:ns1="urn:tes:namespace1-uri"/>
It is important to note that the client does not need to know the
actual namespace bindings in order to construct the URI. It does
need to know the namespace URI for each element in the node-selector.
The namespace bindings present in the query component are defined by
the client, mapping those URIs to a set of prefixes. The bindings
returned by the server are the actual bindings used in the document.
11. Detailed Conflict Reports
In cases where the server returns a 409 error response, that response
will usually include a document in the body of the response which
provides further details on the nature of the error. This document
is an XML document, formatted according to the schema of
Rosenberg Standards Track [Page 47]
^L
RFC 4825 XCAP May 2007
Section 11.2. Its MIME type, registered by this specification, is
"application/xcap-error+xml".
11.1. Document Structure
The document structure is simple. It contains the root element
<xcap-error>. The content of this element is a specific error
condition. Each error condition is represented by a different
element. This allows for different error conditions to provide
different data about the nature of the error. All error elements
support a "phrase" attribute, which can contain text meant for
rendering to a human user.
The following error elements are defined by this specification:
<not-well-formed>: This indicates that the body of the request was
not a well-formed XML document.
<not-xml-frag>: This indicates that the request was supposed to
contain a valid XML fragment body, but did not. Most likely this
is because the XML in the body was malformed or not balanced.
<no-parent>: This indicates that an attempt to insert a document,
element, or attribute failed because the directory, document, or
element into which the insertion was supposed to occur does not
exist. This error element can contain an optional <ancestor>
element, which provides an HTTP URI that represents the closest
parent that would be a valid point of insertion. This HTTP URI
MAY be a relative URI, relative to the document itself. Because
this is a valid HTTP URI, its node selector component MUST be
percent-encoded.
<schema-validation-error>: This element indicates that the document
was not compliant to the schema after the requested operation was
performed.
<not-xml-att-value>: This indicates that the request was supposed to
contain a valid XML attribute value, but did not.
<cannot-insert>: This indicates that the requested PUT operation
could not be performed because a GET of that resource after the
PUT would not yield the content of the PUT request.
<cannot-delete>: This indicates that the requested DELETE operation
could not be performed because it would not be idempotent.
Rosenberg Standards Track [Page 48]
^L
RFC 4825 XCAP May 2007
<uniqueness-failure>: This indicates that the requested operation
would result in a document that did not meet a uniqueness
constraint defined by the application usage. For each URI,
element, or attribute specified by the client that is not unique,
an <exists> element is present as the content of the error
element. Each <exists> element has a "field" attribute that
contains a relative URI identifying the XML element or attribute
whose value needs to be unique, but wasn't. The relative URI is
relative to the document itself, and will therefore start with the
root element. The query component of the URI MUST be present if
the node selector portion of the URI contains namespace prefixes.
Since the "field" node selector is a valid HTTP URI, it MUST be
percent-encoded. The <exists> element can optionally contain a
list of <alt-value> elements. Each one is a suggested alternate
value that does not currently exist on the server.
<constraint-failure>: This indicates that the requested operation
would result in a document that failed a data constraint defined
by the application usage, but not enforced by the schema or a
uniqueness constraint.
<extension>: This indicates an error condition that is defined by an
extension to XCAP. Clients that do not understand the content of
the extension element MUST discard the xcap-error document and
treat the error as an unqualified 409.
<not-utf-8>: This indicates that the request could not be completed
because it would have produced a document not encoded in UTF-8.
As an example, the following document indicates that the user
attempted to create an RLS service using the URI
sip:friends@example.com, but that URI already exists:
<?xml version="1.0" encoding="UTF-8"?>
<xcap-error xmlns="urn:ietf:params:xml:ns:xcap-error">
<uniqueness-failure>
<exists field="rls-services/service/@uri">
<alt-value>sip:mybuddies@example.com</alt-value>
</exists>
</uniqueness-failure>
</xcap-error>
Rosenberg Standards Track [Page 49]
^L
RFC 4825 XCAP May 2007
11.2. XML Schema
<?xml version="1.0" encoding="UTF-8"?>
<xs:schema targetNamespace="urn:ietf:params:xml:ns:xcap-error"
xmlns="urn:ietf:params:xml:ns:xcap-error"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified"
attributeFormDefault="unqualified">
<xs:element name="error-element" abstract="true"/>
<xs:element name="xcap-error">
<xs:annotation>
<xs:documentation>Indicates the reason for the error.
</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence>
<xs:element ref="error-element"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="extension" substitutionGroup="error-element">
<xs:complexType>
<xs:sequence>
<xs:any namespace="##any" processContents="lax"
minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="schema-validation-error"
substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This element indicates
that the document was not compliant to the schema after the requested
operation was performed.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="not-xml-frag" substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the request was supposed to
contain a valid XML fragment body, but did not.</xs:documentation>
</xs:annotation>
Rosenberg Standards Track [Page 50]
^L
RFC 4825 XCAP May 2007
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="no-parent" substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that an attempt to insert
an element, attribute, or document failed because the document or
element into which the insertion was
supposed to occur does not exist.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence>
<xs:element name="ancestor" type="xs:anyURI" minOccurs="0">
<xs:annotation>
<xs:documentation>Contains an HTTP URI that points to the
element that is the closest ancestor that does exist.
</xs:documentation>
</xs:annotation>
</xs:element>
</xs:sequence>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="cannot-insert" substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the requested
PUT operation could not be performed because a GET of that resource
after the PUT would not yield the content of the PUT request.
</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="not-xml-att-value"
substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the
request was supposed to contain a valid XML attribute value, but did
not.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
Rosenberg Standards Track [Page 51]
^L
RFC 4825 XCAP May 2007
</xs:element>
<xs:element name="uniqueness-failure"
substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the
requested operation would result in a document that did not meet a
uniqueness constraint defined by the application usage.
</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence>
<xs:element name="exists" maxOccurs="unbounded">
<xs:annotation>
<xs:documentation>For each URI,
element, or attribute specified by the client that is not unique,
one of these is present.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence minOccurs="0">
<xs:element name="alt-value" type="xs:string"
maxOccurs="unbounded">
<xs:annotation>
<xs:documentation>An optional set of alternate values can be
provided.</xs:documentation>
</xs:annotation>
</xs:element>
</xs:sequence>
<xs:attribute name="field" type="xs:string" use="required"/>
</xs:complexType>
</xs:element>
</xs:sequence>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="not-well-formed"
substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the body of the request was
not a well-formed document.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
Rosenberg Standards Track [Page 52]
^L
RFC 4825 XCAP May 2007
<xs:element name="constraint-failure"
substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the
requested operation would result in a document that failed a data
constraint defined by the application usage, but not enforced by the
schema or a uniqueness constraint.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="cannot-delete" substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the requested DELETE
operation could not be performed because it would not be
idempotent.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
<xs:element name="not-utf-8" substitutionGroup="error-element">
<xs:annotation>
<xs:documentation>This indicates that the request could not be
completed because it would have produced a document not
encoded in UTF-8.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:attribute name="phrase" type="xs:string" use="optional"/>
</xs:complexType>
</xs:element>
</xs:schema>
12. XCAP Server Capabilities
XCAP can be extended through the addition of new application usages
and extensions to the core protocol. Application usages may define
MIME types with XML schemas that allow new extension nodes from new
namespaces. It will often be necessary for a client to determine
what extensions, application usages, or namespaces a server supports
before making a request. To enable that, this specification defines
an application usage with the AUID "xcap-caps". All XCAP servers
MUST support this application usage. This usage defines a single
Rosenberg Standards Track [Page 53]
^L
RFC 4825 XCAP May 2007
document within the global tree that lists the capabilities of the
server. Clients can read this well-known document, and therefore
learn the capabilities of the server.
The structure of the document is simple. The root element is <xcap-
caps>. Its children are <auids>, <extensions>, and <namespaces>.
Each of these contain a list of AUIDs, extensions, and namespaces
supported by the server. Extensions are named by tokens defined by
the extension, and typically define new selectors. Namespaces are
identified by their namespace URI. To 'support' a namespace, the
server must have the schemas for all elements within that namespace,
and be able to validate them if they appear within documents. Since
all XCAP servers support the "xcap-caps" AUID, it MUST be listed in
the <auids> element, and the "urn:ietf:params:xml:ns:xcap-caps"
namespace MUST be listed in the <namespaces> element.
The following sections provide the information needed to define this
application usage.
12.1. Application Unique ID (AUID)
This specification defines the "xcap-caps" AUID within the IETF tree,
via the IANA registration in Section 15.
12.2. XML Schema
<?xml version="1.0" encoding="UTF-8"?>
<xs:schema targetNamespace="urn:ietf:params:xml:ns:xcap-caps"
xmlns="urn:ietf:params:xml:ns:xcap-caps"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified" attributeFormDefault="unqualified">
<xs:element name="xcap-caps">
<xs:annotation>
<xs:documentation>Root element for xcap-caps</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence>
<xs:element name="auids">
<xs:annotation>
<xs:documentation>List of supported AUID.</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence minOccurs="0" maxOccurs="unbounded">
<xs:element name="auid" type="auidType"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="extensions" minOccurs="0">
Rosenberg Standards Track [Page 54]
^L
RFC 4825 XCAP May 2007
<xs:annotation>
<xs:documentation>List of supported extensions.
</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence minOccurs="0" maxOccurs="unbounded">
<xs:element name="extension" type="extensionType"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="namespaces">
<xs:annotation>
<xs:documentation>List of supported namespaces.
</xs:documentation>
</xs:annotation>
<xs:complexType>
<xs:sequence minOccurs="0" maxOccurs="unbounded">
<xs:element name="namespace" type="namespaceType"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:any namespace="##other" processContents="lax"
minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:simpleType name="auidType">
<xs:annotation>
<xs:documentation>AUID Type</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:string"/>
</xs:simpleType>
<xs:simpleType name="extensionType">
<xs:annotation>
<xs:documentation>Extension Type</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:string"/>
</xs:simpleType>
<xs:simpleType name="namespaceType">
<xs:annotation>
<xs:documentation>Namespace type</xs:documentation>
</xs:annotation>
<xs:restriction base="xs:anyURI"/>
</xs:simpleType>
</xs:schema>
Rosenberg Standards Track [Page 55]
^L
RFC 4825 XCAP May 2007
12.3. Default Document Namespace
The default document namespace used in evaluating a URI is
urn:ietf:params:xml:ns:xcap-caps.
12.4. MIME Type
Documents conformant to this schema are known by the MIME type
"application/xcap-caps+xml", registered in Section 15.2.5.
12.5. Validation Constraints
There are no additional validation constraints associated with this
application usage.
12.6. Data Semantics
Data semantics are defined above.
12.7. Naming Conventions
A server MUST maintain a single instance of the document in the
global tree, using the filename "index". There MUST NOT be an
instance of this document in the user's tree.
12.8. Resource Interdependencies
There are no resource interdependencies in this application usage
beyond those defined by the schema.
12.9. Authorization Policies
This application usage does not change the default authorization
policy defined by XCAP.
13. Examples
This section goes through several examples, making use of the
resource-lists and rls-services [22] XCAP application usages.
First, a user Bill creates a new document (see Section 7.1). This
document is a new resource-list, initially with a single list, called
friends, with no users in it:
PUT
/resource-lists/users/sip:bill@example.com/index HTTP/1.1
Content-Type:application/resource-lists+xml
Host: xcap.example.com
Rosenberg Standards Track [Page 56]
^L
RFC 4825 XCAP May 2007
<?xml version="1.0" encoding="UTF-8"?>
<resource-lists xmlns="urn:ietf:params:xml:ns:resource-lists">
<list name="friends">
</list>
</resource-lists>
Figure 24: New Document
Next, Bill creates an RLS services document defining a single RLS
service referencing this list. This service has a URI of
sip:myfriends@example.com (URIs are line-folded for readability):
PUT
/rls-services/users/sip:bill@example.com/index HTTP/1.1
Content-Type:application/rls-services+xml
Host: xcap.example.com
<?xml version="1.0" encoding="UTF-8"?>
<rls-services xmlns="urn:ietf:params:xml:ns:rls-services">
<service uri="sip:myfriends@example.com">
<resource-list>http://xcap.example.com/resource-lists/users/
sip:bill@example.com/index/~~/resource-lists/
list%5b@name=%22friends%22%5d
</resource-list>
<packages>
<package>presence</package>
</packages>
</service>
</rls-services>
Figure 25: RLS Services Example
Next, Bill creates an element in the resource-lists document
(Section 7.4). In particular, he adds an entry to the list:
PUT
/resource-lists/users/sip:bill@example.com/index
/~~/resource-lists/list%5b@name=%22friends%22%5d/entry HTTP/1.1
Content-Type:application/xcap-el+xml
Host: xcap.example.com
<entry uri="sip:bob@example.com">
<display-name>Bob Jones</display-name>
</entry>
Figure 26: Resource Lists Document
Rosenberg Standards Track [Page 57]
^L
RFC 4825 XCAP May 2007
Next, Bill fetches the document (Section 7.3):
GET
/resource-lists/users/sip:bill@example.com/index HTTP/1.1
Figure 27: Fetch Operation
And the result is (note how white space text nodes appear in the
document):
HTTP/1.1 200 OK
Etag: "wwhha"
Content-Type: application/resource-lists+xml
<?xml version="1.0" encoding="UTF-8"?>
<resource-lists xmlns="urn:ietf:params:xml:ns:resource-lists">
<list name="friends">
<entry uri="sip:bob@example.com">
<display-name>Bob Jones</display-name>
</entry></list>
</resource-lists>
Figure 28: Results of Fetch
Next, Bill adds another entry to the list, which is another list that
has three entries. This is another element creation (Section 7.4):
PUT
/resource-lists/users/sip:bill@example.com/index/~~/
resource-lists/list%5b@name=%22friends%22%5d/
list%5b@name=%22close-friends%22%5d HTTP/1.1
Content-Type: application/xcap-el+xml
Host: xcap.example.com
<list name="close-friends">
<entry uri="sip:joe@example.com">
<display-name>Joe Smith</display-name>
</entry>
<entry uri="sip:nancy@example.com">
<display-name>Nancy Gross</display-name>
</entry>
<entry uri="sip:petri@example.com">
<display-name>Petri Aukia</display-name>
</entry>
</list>
Figure 29: Adding an Entry
Rosenberg Standards Track [Page 58]
^L
RFC 4825 XCAP May 2007
Then, Bill decides he doesn't want Petri on the list, so he deletes
the entry (Section 7.5):
DELETE
/resource-lists/users/sip:bill@example.com/index/
~~/resource-lists/list/list/
entry%5b@uri=%22sip:petri@example.com%22%5d HTTP/1.1
Host: xcap.example.com
Figure 30: Deleting an Entry
Bill decides to check on the URI for Nancy, so he fetches a
particular attribute (Section 7.6):
GET
/resource-lists/users/sip:bill@example.com/index/
~~/resource-lists/list/list/entry%5b2%5d/@uri HTTP/1.1
Host: xcap.example.com
Figure 31: Fetching an Attribute
and the server responds:
HTTP/1.1 200 OK
Etag: "ad88"
Content-Type:application/xcap-att+xml
"sip:nancy@example.com"
Figure 32: Results of Fetch
14. Security Considerations
Frequently, the data manipulated by XCAP contains sensitive
information. To avoid eavesdroppers from seeing this information, it
is RECOMMENDED that an administrator hand out an HTTPS URI as the
XCAP root URI. This will result in TLS-encrypted communications
between the client and server, preventing any eavesdropping. Clients
MUST implement TLS, assuring that such URIs will be usable by the
client.
Client and server authentication are also important. A client needs
to be sure it is talking to the server it believes it is contacting.
Otherwise, it may be given false information, which can lead to
denial-of-service attacks against a client. To prevent this, a
client SHOULD attempt to upgrade [15] any connections to TLS.
Similarly, authorization of read and write operations against the
data is important, and this requires client authentication. As a
Rosenberg Standards Track [Page 59]
^L
RFC 4825 XCAP May 2007
result, a server SHOULD challenge a client using HTTP Digest [11] to
establish its identity, and this SHOULD be done over a TLS
connection. Clients MUST implement digest authentication, assuring
interoperability with servers that challenge the client. Servers
MUST NOT perform basic authentication without a TLS connection to the
client.
Because XCAP is a usage of HTTP and not a separate protocol, it runs
on the same port numbers as HTTP traffic normally does. This makes
it difficult to apply port-based filtering rules in firewalls to
separate the treatment of XCAP traffic from other HTTP traffic.
However, this problem exists broadly today because HTTP is used to
access a wide breadth of content, all on the same port, and XCAP
views application configuration documents as just another type of
HTTP content. As such, separate treatment of XCAP traffic from other
HTTP traffic requires firewalls to examine the URL itself. There is
no foolproof way to identify a URL as pointing to an XCAP resource.
However, the presence of the double tilde (~~) is a strong hint that
the URL points to an XML element or attribute. As always, care must
be taken in looking for the double-tilde due to the breadth of ways
in which a URI can be encoded on-the-wire [29] [13].
15. IANA Considerations
There are several IANA considerations associated with this
specification.
15.1. XCAP Application Unique IDs
Per this specification's instructions, IANA created a new registry
for XCAP application unique IDs (AUIDs). This registry is defined as
a table that contains three columns:
AUID: This will be a string provided in the IANA registrations into
the registry.
Description: This is text that is supplied by the IANA registration
into the registry.
Reference: This is a reference to the RFC containing the
registration.
Rosenberg Standards Track [Page 60]
^L
RFC 4825 XCAP May 2007
Per this specification's instructions, IANA created this table with
an initial entry. The resulting table looks like:
Application Unique
ID (AUID) Description Reference
-------------------- ------------------------------- ---------
xcap-caps Capabilities of an XCAP server RFC 4825
XCAP AUIDs are registered by the IANA when they are published in
standards track RFCs. The IANA Considerations section of the RFC
must include the following information, which appears in the IANA
registry along with the RFC number of the publication.
o Name of the AUID. The name MAY be of any length, but SHOULD be no
more than 20 characters long. The name MUST consist of alphanum
and mark [16] characters only.
o Descriptive text that describes the application usage.
15.2. MIME Types
This specification requests the registration of several new MIME
types according to the procedures of RFC 4288 [8] and guidelines in
RFC 3023 [9].
15.2.1. application/xcap-el+xml MIME Type
MIME media type name: application
MIME subtype name: xcap-el+xml
Mandatory parameters: none
Optional parameters: Same as charset parameter application/xml as
specified in RFC 3023 [9].
Encoding considerations: Same as encoding considerations of
application/xml as specified in RFC 3023 [9].
Security considerations: See Section 10 of RFC 3023 [9].
Interoperability considerations: none
Published specification: RFC 4825
Rosenberg Standards Track [Page 61]
^L
RFC 4825 XCAP May 2007
Applications that use this media type: This document type has been
used to support transport of XML fragment bodies in RFC 4825, the
XML Configuration Access Protocol (XCAP).
Additional Information:
Magic Number: none
File Extension: .xel
Macintosh file type code: "TEXT"
Personal and email address for further information:
Jonathan Rosenberg, jdrosen@jdrosen.net
Intended usage: COMMON
Author/Change controller: The IETF.
15.2.2. application/xcap-att+xml MIME Type
MIME media type name: application
MIME subtype name: xcap-att+xml
Mandatory parameters: none
Optional parameters: Same as charset parameter application/xml as
specified in RFC 3023 [9].
Encoding considerations: Same as encoding considerations of
application/xml as specified in RFC 3023 [9].
Security considerations: See Section 10 of RFC 3023 [9].
Interoperability considerations: none
Published specification: RFC 4825
Applications that use this media type: This document type has been
used to support transport of XML attribute values in RFC 4825, the
XML Configuration Access Protocol (XCAP).
Additional Information:
Magic Number: none
File Extension: .xav
Rosenberg Standards Track [Page 62]
^L
RFC 4825 XCAP May 2007
Macintosh file type code: "TEXT"
Personal and email address for further information:
Jonathan Rosenberg, jdrosen@jdrosen.net
Intended usage: COMMON
Author/Change controller: The IETF.
15.2.3. application/xcap-ns+xml MIME Type
MIME media type name: application
MIME subtype name: xcap-ns+xml
Mandatory parameters: none
Optional parameters: Same as charset parameter application/xml as
specified in RFC 3023 [9].
Encoding considerations: Same as encoding considerations of
application/xml as specified in RFC 3023 [9].
Security considerations: See Section 10 of RFC 3023 [9].
Interoperability considerations: none
Published specification: RFC 4825
Applications that use this media type: This document type has been
used to support transport of XML fragment bodies in RFC 4825, the
XML Configuration Access Protocol (XCAP).
Additional Information:
Magic Number: none
File Extension: .xns
Macintosh file type code: "TEXT"
Personal and email address for further information:
Jonathan Rosenberg, jdrosen@jdrosen.net
Intended usage: COMMON
Author/Change controller: The IETF.
Rosenberg Standards Track [Page 63]
^L
RFC 4825 XCAP May 2007
15.2.4. application/xcap-error+xml MIME Type
MIME media type name: application
MIME subtype name: xcap-error+xml
Mandatory parameters: none
Optional parameters: Same as charset parameter application/xml as
specified in RFC 3023 [9].
Encoding considerations: Same as encoding considerations of
application/xml as specified in RFC 3023 [9].
Security considerations: See Section 10 of RFC 3023 [9].
Interoperability considerations: none
Published specification: RFC 4825
Applications that use this media type: This document type conveys
error conditions defined in RFC 4825
Additional Information:
Magic Number: none
File Extension: .xer
Macintosh file type code: "TEXT"
Personal and email address for further information:
Jonathan Rosenberg, jdrosen@jdrosen.net
Intended usage: COMMON
Author/Change controller: The IETF.
15.2.5. application/xcap-caps+xml MIME Type
MIME media type name: application
MIME subtype name: xcap-caps+xml
Mandatory parameters: none
Optional parameters: Same as charset parameter application/xml as
specified in RFC 3023 [9].
Rosenberg Standards Track [Page 64]
^L
RFC 4825 XCAP May 2007
Encoding considerations: Same as encoding considerations of
application/xml as specified in RFC 3023 [9].
Security considerations: See Section 10 of RFC 3023 [9].
Interoperability considerations: none
Published specification: RFC 4825
Applications that use this media type: This document type conveys
capabilities of an XML Configuration Access Protocol (XCAP)
server, as defined in RFC 4825.
Additional Information:
Magic Number: none
File Extension: .xca
Macintosh file type code: "TEXT"
Personal and email address for further information:
Jonathan Rosenberg, jdrosen@jdrosen.net
Intended usage: COMMON
Author/Change controller: The IETF.
15.3. URN Sub-Namespace Registrations
This specification registers several new XML namespaces, as per the
guidelines in RFC 3688 [17].
15.3.1. urn:ietf:params:xml:ns:xcap-error
URI: The URI for this namespace is urn:ietf:params:xml:ns:xcap-error
Registrant Contact: IETF, SIMPLE working group, (simple@ietf.org),
Jonathan Rosenberg (jdrosen@jdrosen.net).
Rosenberg Standards Track [Page 65]
^L
RFC 4825 XCAP May 2007
XML:
BEGIN
<?xml version="1.0"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML Basic 1.0//EN"
"http://www.w3.org/TR/xhtml-basic/xhtml-basic10.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type"
content="text/html;charset=iso-8859-1"/>
<title>XCAP Error Namespace</title>
</head>
<body>
<h1>Namespace for XCAP Error Documents</h1>
<h2>urn:ietf:params:xml:ns:xcap-error</h2>
<p>See <a href="http://www.rfc-editor.org/rfc/rfc4825.txt">
RFC4825</a></p>
</body>
</html>
END
15.3.2. urn:ietf:params:xml:ns:xcap-caps
URI: The URI for this namespace is urn:ietf:params:xml:ns:xcap-caps
Registrant Contact: IETF, SIMPLE working group, (simple@ietf.org),
Jonathan Rosenberg (jdrosen@jdrosen.net).
XML:
BEGIN
<?xml version="1.0"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML Basic 1.0//EN"
"http://www.w3.org/TR/xhtml-basic/xhtml-basic10.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type"
content="text/html;charset=iso-8859-1"/>
<title>XCAP Capabilities Namespace</title>
</head>
<body>
<h1>Namespace for XCAP Capability Documents</h1>
<h2>urn:ietf:params:xml:ns:xcap-caps</h2>
<p>See <a href="http://www.rfc-editor.org/rfc/rfc4825.txt">
RFC4825</a></p>
</body>
</html>
END
Rosenberg Standards Track [Page 66]
^L
RFC 4825 XCAP May 2007
15.4. XML Schema Registrations
This section registers two XML schemas per the procedures in [17].
15.4.1. XCAP Error Schema Registration
URI: urn:ietf:params:xml:schema:xcap-error
Registrant Contact: IETF, SIMPLE working group, (simple@ietf.org),
Jonathan Rosenberg (jdrosen@jdrosen.net).
XML Schema: The XML for this schema can be found as the sole content
of Section 11.2.
15.4.2. XCAP Capabilities Schema Registration
URI: urn:ietf:params:xml:schema:xcap-caps
Registrant Contact: IETF, SIMPLE working group, (simple@ietf.org),
Jonathan Rosenberg (jdrosen@jdrosen.net).
XML Schema: The XML for this schema can be found as the sole content
of Section 12.2.
16. Acknowledgements
The author would like to thank Jari Urpalainen, who has contributed
many important comments and has assisted with edit passes in the
document. The author would also like to thank Ben Campbell,
Eva-Maria Leppanen, Hisham Khartabil, Chris Newman, Joel Halpern,
Lisa Dusseault, Tim Bray, Pete Cordell, Jeroen van Bemmel, Christian
Schmidt, and Spencer Dawkins for their input and comments. A special
thanks to Ted Hardie for his input and support.
17. References
17.1. Normative References
[1] Maler, E., Yergeau, F., Paoli, J., Bray, T., and C. Sperberg-
McQueen, "Extensible Markup Language (XML) 1.0 (Third
Edition)", World Wide Web Consortium FirstEdition REC-xml-
20040204, February 2004,
<http://www.w3.org/TR/2004/REC-xml-20040204>.
Rosenberg Standards Track [Page 67]
^L
RFC 4825 XCAP May 2007
[2] Thompson, H., Maloney, M., Mendelsohn, N., and D. Beech, "XML
Schema Part 1: Structures Second Edition", World Wide Web
Consortium Recommendation REC-xmlschema-1-20041028,
October 2004,
<http://www.w3.org/TR/2004/REC-xmlschema-1-20041028>.
[3] Layman, A., Hollander, D., and T. Bray, "Namespaces in XML",
World Wide Web Consortium FirstEdition REC-xml-names-19990114,
January 1999,
<http://www.w3.org/TR/1999/REC-xml-names-19990114>.
[4] Daniel, R., DeRose, S., Maler, E., and J. Marsh, "XPointer
xmlns() Scheme", World Wide Web Consortium Recommendation REC-
xptr-xmlns-20030325, March 2003,
<http://www.w3.org/TR/2003/REC-xptr-xmlns-20030325>.
[5] Grosso, P., Marsh, J., Maler, E., and N. Walsh, "XPointer
Framework", World Wide Web Consortium Recommendation REC-xptr-
framework-20030325, March 2003,
<http://www.w3.org/TR/2003/REC-xptr-framework-20030325>.
[6] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L.,
Leach, P., and T. Berners-Lee, "Hypertext Transfer Protocol --
HTTP/1.1", RFC 2616, June 1999.
[7] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
[8] Freed, N. and J. Klensin, "Media Type Specifications and
Registration Procedures", BCP 13, RFC 4288, December 2005.
[9] Murata, M., St. Laurent, S., and D. Kohn, "XML Media Types",
RFC 3023, January 2001.
[10] Clark, J. and S. DeRose, "XML Path Language (XPath) Version
1.0", World Wide Web Consortium Recommendation REC-xpath-
19991116, November 1999,
<http://www.w3.org/TR/1999/REC-xpath-19991116>.
[11] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S.,
Leach, P., Luotonen, A., and L. Stewart, "HTTP Authentication:
Basic and Digest Access Authentication", RFC 2617, June 1999.
[12] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", RFC 4234, October 2005.
Rosenberg Standards Track [Page 68]
^L
RFC 4825 XCAP May 2007
[13] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986,
January 2005.
[14] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.
[15] Khare, R. and S. Lawrence, "Upgrading to TLS Within HTTP/1.1",
RFC 2817, May 2000.
[16] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[17] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
January 2004.
[18] Yergeau, F., "UTF-8, a transformation format of ISO 10646",
STD 63, RFC 3629, November 2003.
[19] Boyer, J., "Canonical XML Version 1.0", World Wide Web
Consortium Recommendation REC-xml-c14n-20010315, March 2001,
<http://www.w3.org/TR/2001/REC-xml-c14n-20010315>.
17.2. Informative References
[20] Rosenberg, J., "A Presence Event Package for the Session
Initiation Protocol (SIP)", RFC 3856, August 2004.
[21] Roach, A., Campbell, B., and J. Rosenberg, "A Session
Initiation Protocol (SIP) Event Notification Extension for
Resource Lists", RFC 4662, August 2006.
[22] Rosenberg, J., "Extensible Markup Language (XML) Formats for
Representing Resource Lists", RFC 4826, May 2007.
[23] Grosso, P. and D. Veillard, "XML Fragment Interchange", World
Wide Web Consortium CR CR-xml-fragment-20010212, February 2001,
<http://www.w3.org/TR/2001/CR-xml-fragment-20010212>.
[24] Berglund, A., Boag, S., Chamberlin, D., Fernandez, M., Kay, M.,
Robie, J., and J. Simeon, "XML Path Language (XPath) 2.0",
World Wide Web Consortium
CR http://www.w3.org/TR/2005/CR-xpath20-20051103,
November 2005.
[25] Newman, C. and J. Myers, "ACAP -- Application Configuration
Access Protocol", RFC 2244, November 1997.
Rosenberg Standards Track [Page 69]
^L
RFC 4825 XCAP May 2007
[26] Day, M., Rosenberg, J., and H. Sugano, "A Model for Presence
and Instant Messaging", RFC 2778, February 2000.
[27] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
Considerations Section in RFCs", BCP 26, RFC 2434,
October 1998.
[28] Roach, A., "Session Initiation Protocol (SIP)-Specific Event
Notification", RFC 3265, June 2002.
[29] Duerst, M. and M. Suignard, "Internationalized Resource
Identifiers (IRIs)", RFC 3987, January 2005.
Author's Address
Jonathan Rosenberg
Cisco
Edison, NJ
US
EMail: jdrosen@cisco.com
URI: http://www.jdrosen.net
Rosenberg Standards Track [Page 70]
^L
RFC 4825 XCAP May 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Rosenberg Standards Track [Page 71]
^L
|