A shortcoming with HTTP is that it does not provide for authoring through an HTTP channel. That is, the standard HTTP specifications do not specifically provide for clients to manage resources on servers. There is no way for a client to perform resource management operations like copying resources (e.g., files, documents, etc.), moving resources on a server, setting or obtaining properties of resources on a server, locking resources, and so on. In response to this shortcoming, various public and private extensions to HTTP have been devised.
The WebDAV extension to HTTP provides functionality to create, change and move documents on a remote server (typically a web server). WebDAV implementations are useful, among other things, for remotely authoring documents or resources served by a web server. WebDAV implementations can also be used for general access-anywhere web-based file storage. Many operating systems, such as Windows, Linux, and Mac OSX provide built-in client and server support for WebDAV, thus allowing transparent use of files on a WebDAV server somewhat as if they were stored in a local directory.
The methods and headers of WebDAV are fully documented elsewhere, however, the main methods are: PUT—put a resource or collection on the server; DELETE—delete a resource or collection from the server; PROPFIND—retrieve properties (as XML) of a resource; PROPPATCH—change and delete properties of a resource; MKCOL—create collections or directories; COPY—copy a resource from one URI to another on the server; MOVE—move a resource from one URI to another on the server; LOCK—put a lock on a resource; UNLOCK—remove a lock from a resource. Some notable headers (field names) are: destination—specifies a URI as a destination resource for methods such as COPY and MOVE; Lock-Token—specifies a token that identifies a particular lock; and Timeout—specifies a duration of a lock.
It has not previously been recognized that there are certain inefficiencies and weaknesses built into WebDAV that can become significant in certain circumstances.
Another problem with the example in
The atomic nature of WebDAV and the inability of WebDAV clients and servers to use compound or multi-aspect authoring requests with one discrete exchange may have other problems and inconveniences. Without necessity, some embodiments discussed below may alleviate some problems associated with HTTP authoring.
The following summary is included only to introduce some concepts discussed in the Detailed Description below. This summary is not comprehensive and is not intended to delineate the scope of protectable subject matter, which is set forth by the claims presented at the end.
Certain client-server communication conventions extend compounded web authoring methods to a web authoring protocol such as WebDAV. More particularly, a web authoring request can be provided with special header information to signify a first web authoring method compounded with a second web authoring method indicated by a verb in the request. Clients and servers are provided with techniques to use the web authoring extensions. Extended error handling can be used to allow servers to provider richer web authoring error information to clients.
Many of the attendant features will be more readily appreciated by referring to the following detailed description considered in connection with the accompanying drawings.
Like reference numerals are used to designate like parts in the accompanying Drawings.
In the Figures, the symbols “+” and “|” (vertical bar) respectively represent compounding and “or”. So, for example, the “POST|GET+LOCK|REFRESH|UNLOCK” method 144 represents a number of discrete compound methods: “POST+LOCK”, “POST+UNLOCK”, “GET+LOCK”, etc. An explanation of how the method extensions 140 can be implemented using header extensions 142 will follow. Methods 144 and 146 will be discussed with reference to
To establish the availability of compounding, the client 172 performs a process 192 that starts with sending a standard OPTIONS request 194 (request 194 is only an example). A process 196 on the server 174 receives the OPTIONS request 194 and generates a response such as response 198 that includes a compounding indicator, in this embodiment, non-standard response header 190. The actual name of the non-standard response header 190 is not important other than it be known in advance by the client 172 so that when the client's 172 process 192 receives the response 198 it can recognize it and communicate with the server 174 as appropriate.
The lock timeout header 224 signifies the creation of a new lock according to the value of the lock timeout header 224. If the Lock-Token header 222 is included then the lock timeout header 224 signals the refresh of an existing lock. If the lock timeout header 224 is set to 0 seconds than an unlock is indicated (in this case, the Lock-Token header 222 and a correct token are required to unlock the file). Furthermore, a Lock-Token header 222 and token are preferably included in the response to any write operation on a locked resource. Example request 228 shows what a typical POST+UNLOCK request might look like. Note the inclusion of a Lock-Token header 222 and a lock timeout header 224.
Referring to the PUT verb combined with a locking operation, note that the Lock-token header 222 and correct token are needed to modify a locked resource. No token is needed if the resource is not locked. If no token is included but a lock time is specified, then the natural locking logic occurs; a lock is granted if no lock exists, and the PUT and lock are denied if a lock already exists. In sum, if the correct token is included with a PUT request the client can perform any PUT operation or any PUT operation combined with a lock operation. A typical PUT+REFRESH request is shown by request 230. The lock timeout value of 120 seconds indicates a refresh or resetting of the lifetime of the lock to run for another 120 seconds, and the lock token is the key that the server uses to authorize both the PUT operation and the REFRESH operation. In a preferred embodiment a Lock-Token header included in a non-write operation is ignored; i.e., “GET+verify an existing lock” is not supported.
In conformance with the rules of table 244, an example GET+PROPFIND request 246 is shown. Note the inclusion of an indication of the PROPFIND portion of the method in the form of the special extensions header 242 with the appropriate value or verb.
Although in one embodiment property related methods are compounded onto other methods using headers and a message body extension, other approaches may also be used. For example, the WebDAV PROPFIND and PROPPATCH methods could be overloaded using new headers. Furthermore, there are different ways for combining a resource and a set of properties in a message body. All of the properties can be put in separate headers, since most property sets are of manageable size. The properties could be assigned to respective different headers, although this would require more coding to handle transport of properties. In another embodiment, all of the properties (XML structure) can be placed in one large header, however, headers could potentially become larger than the buffers that some web servers allocate for header handling.
It is possible that some implementations may need to simultaneously set properties (PROPATCH) and get properties (PROPFIND) of a resource. For example, to determine whether a particular property was properly set, or to determine what a property was set to before it was changed with a PROPPATCH. In this case, “PROPPATCH” and “PROPFIND” can both be included, and a convention can be established for the location of sent and returned properties in the message body.
Although the WebDAV protocol does not specify particular properties for resources, some typical properties are analogous to properties of objects in a file system, for example content size, creation date, date of last modification, last modifying user, special folder type, resource tag, file attributes, creation time, last access time, last modified time, and so on.
Referring back to the methods 152, 154 in
As seen in
Regarding compounding extensions of web authoring protocols in general, it should be noted that some proxy servers may attempt to interpret requests and send back cached responses. Therefore, it is preferable that clients only use the new extensions or methods with POST rather than GET. Furthermore, when responding to a concatenated method or verb as discussed above, a server should mark a response to indicate that it should not be cached, using, for example, a header like “cache-control: private”.
The server and client processes for using extended compound authoring methods are fairly straight forward given conventions as discussed above. Publicly available source code and documentation can be consulted to determine how to implement servers and clients with the functionality for performing atomic authoring methods and in particular locking and property functionality. This functionality can be performed in serial fashion when a compound method is encountered. For example, whereas previously a server may have had a function to handle a LOCK method and a function to handle a POST method, roughly, those functions can be invoked consecutively when a compounded POST+LOCK method is received.
Although HTTP and WebDAV have been discussed above, the ideas discussed above are expected to be applicable to any future variations or versions of HTTP and WebDAV. Furthermore, a standard protocol is considered to refer to any future or current standard protocol.
Further to aspects of extended error passing, there may be provided a volatile or non-volatile machine-readable media storing information to enable a device to perform a process for servicing requests from clients, the process including: handling standard HTTP get requests, standard HTTP post requests, and standard HTTP options requests and sending responses to corresponding clients; handling HTTP standard or non-standard authoring requests that direct the device to lock/unlock resources or direct the device to obtain or set properties of resources; and when errors occur handling the HTTP authoring requests, returning responses comprising error information that is not a HTTP status code. The error information can correspond to a system error of the device that caused the errors to occur. The error information can include an extended error header name and an accompanying header field comprising identifying and/or describing a corresponding error, and furthermore, in such a case the header field may include a system error code of the device, or the header field can include a string specifically describing the error, or the header field can include a system error code of the device (the error code being or identifying a system error of the device), or the system error comprises a file locking error, or a file or directory read error, or a file or directory write error.
Further to another aspect of extended error passing, a volatile or non-volatile medium for storing digital data may be provided, the medium storing an HTTP response, the HTTP response including: a standard HTTP status code header and corresponding error code; and an indication of a server-side error, where the indication is not defined by a standard HTTP. The indication can include an HTTP header field specifically defined for conveying extended error information other than standard HTTP error codes, in which case the header field may include a field name not defined by a standard HTTP protocol and a field body that carries information about the server-side error, in which case it is further possible that the field body identifies a particular type of server-side error and that error does not correspond to a standard HTTP error code. The field body can include an operating system error code or a string describing an operating system error, and furthermore, the server-side error can comprise an operating system locking error, or an error reading or writing a server file or server directory.
In still another extended error handling embodiment, there may be provided a volatile or non-volatile storage for use with a processing device and storing information for enabling the processing device to perform a process, the process comprising: generating an HTTP request and sending the HTTP request to a server; receiving from the server an HTTP response to the HTTP request; and parsing the HTTP response for a non-standard extended error header and extracting from the non-standard extended error header information about an error on the server. The HTTP request can further include a standard HTTP status code header and corresponding error number. The information about the error on the system can comprise detail about a specific type of filesystem or operating system error on the server. The information about the error on the server can comprise an operating system error number. The information about the error on the server can include a string describing an operating system error. The information about the error on the server may either identify or describe a specific system-level error of the server, further to which the HTTP requests may comprise an HTTP-based authoring request, either compounded or non-compounded, and the error on the server was an error performing a locking-related or properties-related method.
In conclusion, those skilled in the art will realize that storage devices utilized to store program instructions can be distributed across a network. For example a remote computer may store an example of the process described as software. A local or terminal computer may access the remote computer and download a part or all of the software to run the program. Alternatively the local computer may download pieces of the software as needed, or distributively process by executing some software instructions at the local terminal and some at the remote computer (or computer network). Those skilled in the art will also realize that by utilizing conventional techniques known to those skilled in the art, all or a portion of the software instructions may be carried out by a dedicated circuit, such as a DSP, programmable logic array, or the like.
All of the embodiments and features discussed above can be realized in the form of information stored in volatile or non-volatile computer or device readable medium. This is deemed to include at least media such as CD-ROM, magnetic media, flash ROM, etc., storing machine executable instructions, or source code, or any other information that can be used to enable a computing device to perform the various embodiments. This is also deemed to include at least volatile memory such as RAM storing information such as CPU instructions during execution of a program carrying out an embodiment.
Number | Name | Date | Kind |
---|---|---|---|
5491822 | Allen et al. | Feb 1996 | A |
5600826 | Ando | Feb 1997 | A |
5793966 | Amstein et al. | Aug 1998 | A |
5848234 | Chernick et al. | Dec 1998 | A |
5935211 | Osterman | Aug 1999 | A |
5956483 | Grate et al. | Sep 1999 | A |
5999979 | Vellanki et al. | Dec 1999 | A |
6012087 | Freivald et al. | Jan 2000 | A |
6067558 | Wendt et al. | May 2000 | A |
6128653 | Del Val et al. | Oct 2000 | A |
6208427 | Lee | Mar 2001 | B1 |
6208640 | Spell et al. | Mar 2001 | B1 |
6208952 | Goertzel et al. | Mar 2001 | B1 |
6243396 | Somers | Jun 2001 | B1 |
6253217 | Dourish et al. | Jun 2001 | B1 |
6260148 | Aggarwal | Jul 2001 | B1 |
6266701 | Sridhar et al. | Jul 2001 | B1 |
6269380 | Terry et al. | Jul 2001 | B1 |
6332127 | Bandera et al. | Dec 2001 | B1 |
6351748 | Deen et al. | Feb 2002 | B1 |
6356907 | Hopmann | Mar 2002 | B1 |
6356920 | Vandersluis | Mar 2002 | B1 |
6401097 | McCotter et al. | Jun 2002 | B1 |
6408298 | Van et al. | Jun 2002 | B1 |
6408336 | Schneider et al. | Jun 2002 | B1 |
6415327 | Beckerman et al. | Jul 2002 | B1 |
6449633 | Van et al. | Sep 2002 | B1 |
6526435 | Lippert | Feb 2003 | B1 |
6557040 | Friedman et al. | Apr 2003 | B1 |
6581099 | Deen et al. | Jun 2003 | B1 |
6615231 | Deen | Sep 2003 | B1 |
6629127 | Deen et al. | Sep 2003 | B1 |
6658476 | Deen | Sep 2003 | B1 |
6654794 | French | Nov 2003 | B1 |
6675353 | Friedman | Jan 2004 | B1 |
6691119 | Lippert | Feb 2004 | B1 |
6694335 | Hopmann | Feb 2004 | B1 |
6748470 | Goldick et al. | Jun 2004 | B2 |
6760886 | Nadon | Jul 2004 | B1 |
6839735 | Wong | Jan 2005 | B2 |
6842770 | Serlet et al. | Jan 2005 | B1 |
6944642 | Hopmann | Sep 2005 | B1 |
6947991 | Burton et al. | Sep 2005 | B1 |
6985936 | Agarwalla | Jan 2006 | B2 |
20020091738 | Rohrabaugh et al. | Jul 2002 | A1 |
20030046366 | Pardikar | Mar 2003 | A1 |
20030050964 | Debaty | Mar 2003 | A1 |
20030074392 | Campbell | Apr 2003 | A1 |
20040122897 | Seelemann, II et al. | Jun 2004 | A1 |
20040163037 | Friedman et al. | Aug 2004 | A1 |
20040163086 | Friedman et al. | Aug 2004 | A1 |
20040167983 | Friedman et al. | Aug 2004 | A1 |
20040193940 | Snyder et al. | Sep 2004 | A1 |
20040215747 | Maron | Oct 2004 | A1 |
20050033776 | Kircher | Feb 2005 | A1 |
20050055333 | Deen et al. | Mar 2005 | A1 |
20060126809 | Halpern | Jun 2006 | A1 |
20060150036 | Pierce | Jul 2006 | A1 |
Number | Date | Country |
---|---|---|
2351573 | Mar 2001 | GB |
Number | Date | Country | |
---|---|---|---|
20070050512 A1 | Mar 2007 | US |