HTTP J. Reschke Internet-Draft greenbytesUpdates: 5323 (if approved) A. MalhotraIntended status: Standards Track A. Malhotra Expires:10 December 202113 May 2022 J.M. Snell8 June9 November 2021 The HTTPSEARCHQUERY Methoddraft-ietf-httpbis-safe-method-w-body-01draft-ietf-httpbis-safe-method-w-body-02 Abstract This specificationupdates the definition and semantics of thedefines a new HTTPSEARCHmethod, QUERY, as a safe, idempotent request methodoriginally defined by RFC 5323.that can carry request content. Editorial Note This note is to be removed before publishing as an RFC. Discussion of this draft takes place on the HTTP working group mailing list (ietf-http-wg@w3.org), which is archived at https://lists.w3.org/Archives/Public/ietf-http-wg/. Working Group information can be found at https://httpwg.org/; source code and issues list for this draft can be found at https://github.com/httpwg/http-extensions/labels/safe-method-w-body. The changes in this draft are summarized in AppendixA.1.A.2. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on10 December 2021.13 May 2022. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2.SEARCHQUERY . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Caching . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. The"Accept-Search""Accept-Query" Header Field . . . . . . . . . . . . . . . 5 4. Examples . . . . . . . . . . . . . . . . . . . . . . . . . .65 4.1. SimpleSEARCHQUERY with a Direct Response . . . . . . . . . .6. 5 4.2. SimpleSEARCHQUERY with indirect response (303 See Other) . . . 6 5. Security Considerations . . . . . . . . . . . . . . . . . . . 7 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 7. Normative References . . . . . . . . . . . . . . . . . . . . 7 Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . .87 A.1. Since draft-ietf-httpbis-safe-method-w-body-00 . . . . . 8 A.2. Since draft-ietf-httpbis-safe-method-w-body-01 . . . . . 8 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .98 1. Introduction This specificationupdatesdefines the HTTPSEARCHQUERY request methodoriginally defined in [RFC5323]. Many existing HTTP-based applications use the HTTP GET and POST methods in various ways to implement the functionality provided by SEARCH. Usingas aGET request with some combinationmeans ofquery parameters included within themaking a safe, idempotent requestURI (as illustrated in the example below)that contains content. Most often, this isarguablydesirable when themost common mechanism for implementing searchdata conveyed inweb applications. With this approach, implementations are required to parse thea requestURIis too voluminous to be encoded intodistinct path (everything before the '?') and query elements (everything after the '?'). The path identifies the resource processingthequery (in this case 'http://example.org/ feed')request's URI. For example, whilethe query identifies the specific parameters of the search operation. A typical use of HTTP GET for requesting a searchthis is an common and interoperable query: GET /feed?q=foo&limit=10&sort=-published HTTP/1.1 Host: example.orgWhile there are definite advantages to using GET requests in this manner, the disadvantages should not be overlooked. Specifically: * Without specific knowledge of the resource and server to which the GET request is being sent, there is no way forif theclient to know that a search operation is being requested. Identical requests sent to two different servers can implement entirely different semantics. * Encodingquery parametersdirectly into the request URI effectively casts every possible combinationextend to several kilobytes or more ofquery inputs as distinct resources. For instance,data it may not be, becausemechanisms such as HTTP caching handle request URIs as opaque character sequences, queries such as 'http://example.org/?q=foo' and 'http://example.org/?q=Foo' will be treated as entirely separate resources even if they yield identical results. * While most modern browser and servermany implementationsallow for long request URIs, there is no standardized minimum or maximum length for URIs in general. Many resource constrained devices enforce strictplace limits onthe maximum number of characters that can be included in a URI. Suchtheir size. Often these limitscan prove impractical for largeare not known orcomplex query parameters. * Query expressions included withindiscoverable ahead of time, because a request can pass through many uncoordinated systems. Additionally, expressing some data in the target URImust either be restrictedis inefficient, because it needs torelatively simple key value pairs orbe encodedsuch that the query canto besafely represented in the limited character- set allowed by URL standards. Such encoding can add significant complexity, introduce bugs, or otherwise reducea valid URI. Encoding query parameters directly into theoverall visibilityrequest URI also effectively casts every possible combination ofthequerybeing requested.inputs as distinct resources. Depending on the application, that may not be desirable. As an alternative to using GET, many implementations make use of the HTTP POST method to perform queries, as illustrated in the example below. In this case, the input parameters to the search operation are passed along within the request payload as opposed to using the request URI. A typical use of HTTP POST for requesting a search POST /feed HTTP/1.1 Host: example.org Content-Type: application/x-www-form-urlencoded q=foo&limit=10&sort=-published This variation, however, suffers from the same basic limitation as GET in that it is not readily apparent -- absent specific knowledge of the resource and server to which the request is being sent -- that asearch operation is whatsafe, idempotent query is beingrequested. Web applications use the POST method for a wide variety of uses including the creation or modification of existing resources. Sending the request above to a different server, or even repeatedly sending the request to the same server could have dramatically different effects.performed. TheSEARCHQUERY method provides a solution that spans the gap between the use of GET and POST. As with POST, the input to the query operation is passed along within the payload of the request rather than as part of the request URI. Unlike POST,however the semantics ofhowever, theSEARCHmethodare specifically defined.is explicitly safe and idempotent, allowing functions like caching and automatic retries to operate. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2.SEARCHQUERY TheSEARCHQUERY method is used to initiate a server-sidesearch.query. Unlike the HTTP GET method, which requests that a server return a representation of the resource identified by the target URI (as defined by Section 7.1 of [RFCHTTP]), theSEARCHQUERY method is used to ask the server to perform a query operation (described by the request payload) over some set of data scoped to the effective request URI. The payload returned in response to aSEARCHQUERY cannot be assumed to be a representation of the resource identified by the effective request URI. The body payload of the request defines the query. Implementations MAY use a request body of any content type with theSEARCH method; however, for backwards compatibility with existing WebDAV implementations, SEARCH requestsQUERY method, provided thatuse the text/xml or application/xml media types with a root element (Section 2.1 of [XML]) in the "DAV:" XML namespace ([XMLNS]) MUST be processed per the requirements established by [RFC5323]. SEARCHit has appropriate query semantics. QUERY requests are both safe and idempotent with regards to the resource identified by the request URI. That is,SEARCHQUERY requests do not alter the state of the targeted resource. However, while processing asearchQUERY request, a server can be expected to allocate computing and memory resources or even create additional HTTP resources through which the response can be retrieved. A successful response to aSEARCHQUERY request is expected to provide some indication as to the final disposition of thesearchoperation. For instance, a successfulsearchquery that yields no results can be represented by a 204 No Content response. If the response includesacontent, it is expected to describe the results of thesearchoperation. In some cases, the server may choose to respond indirectly to theSEARCHQUERY request by returning a 3xx Redirection with a Location header field specifying an alternate Request URI from which thesearchresults can be retrieved using an HTTP GET request. Various non-normative examples of successfulSEARCHQUERY responses are illustrated in Section 4. Theresponse to a SEARCH request is not cacheable. It ought to be noted, however, that because SEARCH requests are safe and idempotent, responses to a SEARCH MUST NOT invalidate previously cached responses to other requests directed at the same effective request URI. // By default, that is. We need to figure out under which conditions // we can make the result cacheable. Thesemantics of theSEARCHQUERY method change to a "conditionalSEARCH"QUERY" if the request message includes an If-Modified-Since, If-Unmodified- Since, If-Match, If-None-Match, or If-Range header field ([RFCHTTP], Section 13). A conditionalSEARCHQUERY requests that the query be performed only under the circumstances described by the conditional header field(s). It is important to note, however, that such conditions are evaluated against the state of the target resource itself as opposed to the collected results of the search operation. 2.1. Caching The response to a QUERY method is cacheable; a cache MAY use it to satisfy subsequent QUERY requests as per Section 4 of [HTTP-CACHING]). The cache key for a query (see Section 2 of [HTTP-CACHING]) MUST incorporate the request content. When doing so, caches SHOULD first normalize request content to remove semantically insignificant differences, thereby improving cache efficiency, by: * Removing content encoding(s) * Normalizing based upon knowledge of format conventions, as indicated by the any media type suffix in the request's Content- Type field (e.g., "+json") * Normalizing based upon knowledge of the semantics of the content itself, as indicated by the request's Content-Type field. Note that any such normalization is performed solely for the purpose of generating a cache key; it does not change the request itself. 3. The"Accept-Search""Accept-Query" Header Field The"Accept-Search""Accept-Query" response header field MAY be used by a server to directly signal support for theSEARCHQUERY method while identifying the specific query format mediatypestype(s) that may be used.Accept-SearchAccept-Query = 1#media-type TheAccept-SearchAccept-Query header field specifies a comma-separated listing of media types (with optional parameters) as defined by Section 8.3.1 of [RFCHTTP]. The order of types listed by theAccept-SearchAccept-Query header field is insignificant. 4. Examples The non-normative examples in this section make use of a simple, hypothetical plain-text based query syntax based on SQL with results returned as comma-separated values. This is done for illustration purposes only. Implementations are free to use any format they wish on both the request and response. 4.1. SimpleSEARCHQUERY with a Direct Response A simple query with a direct response:SEARCHQUERY /contacts HTTP/1.1 Host: example.org Content-Type: example/query Accept: text/csv select surname, givenname, email limit 10 Response: HTTP/1.1 200 OK Content-Type: text/csv surname, givenname, email Smith, John, john.smith@example.org Jones, Sally, sally.jones@example.com Dubois, Camille, camille.dubois@example.net 4.2. SimpleSEARCHQUERY with indirect response (303 See Other) A simple query with an Indirect Response (303 See Other):SEARCHQUERY /contacts HTTP/1.1 Host: example.org Content-Type: example/query Accept: text/csv select surname, givenname, email limit 10 Response: HTTP/1.1 303 See Other Location: http://example.org/contacts/query123 Fetch Query Response: GET /contacts/query123 HTTP/1.1 Host: example.org Response: HTTP/1.1 200 OK Content-Type: text/csv surname, givenname, email Smith, John, john.smith@example.org Jones, Sally, sally.jones@example.com Dubois, Camille, camille.dubois@example.net 5. Security Considerations TheSEARCHQUERY method is subject to the same general security considerations as all HTTP methods as described in [RFCHTTP]. 6. IANA Considerations IANA is requested toupdate the registration of the SEARCHadd QUERY method in the permanent registry at<http://www.iana.org/assignments/http- methods><http://www.iana.org/assignments/http-methods> (see Section 16.1.1 of [RFCHTTP]). +=============+======+============+===============+ | Method Name | Safe | Idempotent | Specification | +=============+======+============+===============+ |SEARCHQUERY | Yes | Yes | Section 2 | +-------------+------+------------+---------------+ Table 1 7. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>.[RFC5323] Reschke, J., Ed., Reddy, S., Davis, J., and A. Babich, "Web Distributed Authoring and Versioning (WebDAV) SEARCH", RFC 5323, DOI 10.17487/RFC5323, November 2008, <https://www.rfc-editor.org/info/rfc5323>.[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>. [RFCHTTP] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, Ed., "HTTP Semantics", Work in Progress, Internet-Draft,draft-ietf-httpbis-semantics-16, 27 Maydraft-ietf-httpbis-semantics-19, 10 September 2021,<https://tools.ietf.org/html/draft-ietf-httpbis-semantics- 16>. [XML] Bray, T., Paoli, J., Sperberg-McQueen, M., Maler, E., and F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth Edition)", W3C Recommendation REC-xml-20081126, 26 November 2008, <https://www.w3.org/TR/2008/REC-xml-20081126/>. Latest version available at https://www.w3.org/TR/xml/. [XMLNS] Bray, T., Hollander, D., Layman, A., Tobin,<https://datatracker.ietf.org/doc/html/draft-ietf-httpbis- semantics-19>. [HTTP-CACHING] Fielding, R., Ed., Nottingham, M., Ed., andH. Thompson, "NamespacesJ. Reschke, Ed., "HTTP Semantics", Work inXML 1.0 (Third Edition)", W3C Recommendation REC-xml-names-20091208, 8 December 2009, <https://www.w3.org/TR/2009/REC-xml-names-20091208/>. Latest version available at https://www.w3.org/TR/xml- names/.Progress, Internet-Draft, draft-ietf-httpbis-cache-19, 10 September 2021, <https://datatracker.ietf.org/doc/html/draft-ietf-httpbis- cache-19>. Appendix A. Change Log This section is to be removed before publishing as an RFC.// (see https://trac.tools.ietf.org/tools/xml2rfc/trac/ticket/622)A.1. Since draft-ietf-httpbis-safe-method-w-body-00 * Use "example/query" media type instead of undefined "text/query" (https://github.com/httpwg/http-extensions/issues/1450) * In Section 3, adjust the grammar to just define the field value (https://github.com/httpwg/http-extensions/issues/1470) * Update to latest HTTP core spec, and adjust terminology accordingly (https://github.com/httpwg/http-extensions/ issues/1473) * Reference RFC 8174 and markup bcp14 terms (https://github.com/httpwg/http-extensions/issues/1497) * Update HTTP reference (https://github.com/httpwg/http-extensions/ issues/1524) * Relax restriction of generic XML media type in request body (https://github.com/httpwg/http-extensions/issues/1535) A.2. Since draft-ietf-httpbis-safe-method-w-body-01 * Add minimal description of cacheability (https://github.com/httpwg/http-extensions/issues/1552) * Use "QUERY" as method name (https://github.com/httpwg/http- extensions/issues/1614) * Update HTTP reference (https://github.com/httpwg/http-extensions/ issues/1669) Authors' Addresses Julian Reschke greenbytes GmbH Hafenweg 16 48155 Münster Germany Email: julian.reschke@greenbytes.de URI: https://greenbytes.de/tech/webdav/ Ashok Malhotra Email: malhotrasahib@gmail.com James M Snell Email: jasnell@gmail.com