⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2244.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                          C. NewmanRequest for Comments: 2244                                      InnosoftCategory: Standards Track                                    J. G. Myers                                                                Netscape                                                           November 1997           ACAP -- Application Configuration Access ProtocolStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society 1997.  All Rights Reserved.Abstract   The Application Configuration Access Protocol (ACAP) is designed to   support remote storage and access of program option, configuration   and preference information.  The data store model is designed to   allow a client relatively simple access to interesting data, to allow   new information to be easily added without server re-configuration,   and to promote the use of both standardized data and custom or   proprietary data.  Key features include "inheritance" which can be   used to manage default values for configuration settings and access   control lists which allow interesting personal information to be   shared and group information to be restricted.Newman & Myers              Standards Track                     [Page i]RFC 2244                          ACAP                     November 1997                           Table of ContentsStatus of this Memo ...............................................    iCopyright Notice ..................................................    iAbstract ..........................................................    iACAP Protocol Specification .......................................    11.       Introduction .............................................    11.1.     Conventions Used in this Document ........................    11.2.     ACAP Data Model ..........................................    11.3.     ACAP Design Goals ........................................    11.4.     Validation ...............................................    21.5.     Definitions ..............................................    21.6.     ACAP Command Overview ....................................    42.       Protocol Framework .......................................    42.1.     Link Level ...............................................    42.2.     Commands and Responses ...................................    42.2.1.   Client Protocol Sender and Server Protocol Receiver ......    42.2.2.   Server Protocol Sender and Client Protocol Receiver ......    52.3.     Server States ............................................    62.3.1.   Non-Authenticated State ..................................    62.3.2.   Authenticated State ......................................    62.3.3.   Logout State .............................................    62.4.     Operational Considerations ...............................    72.4.1.   Untagged Status Updates ..................................    72.4.2.   Response when No Command in Progress .....................    72.4.3.   Auto-logout Timer ........................................    72.4.4.   Multiple Commands in Progress ............................    82.5.     Server Command Continuation Request ......................    82.6.     Data Formats .............................................    82.6.1.   Atom .....................................................    92.6.2.   Number ...................................................    92.6.3.   String ...................................................    92.6.3.1. 8-bit and Binary Strings .................................   102.6.4.   Parenthesized List .......................................   102.6.5.   NIL ......................................................   103.       Protocol Elements ........................................   103.1.     Entries and Attributes ...................................   103.1.1.   Predefined Attributes ....................................   113.1.2.   Attribute Metadata .......................................   123.2.     ACAP URL scheme ..........................................   133.2.1.   ACAP URL User Name and Authentication Mechanism ..........   133.2.2.   Relative ACAP URLs .......................................   143.3.     Contexts .................................................   14Newman & Myers              Standards Track                    [Page ii]RFC 2244                          ACAP                     November 19973.4.     Comparators ..............................................   153.5.     Access Control Lists (ACLs) ..............................   173.6.     Server Response Codes ....................................   184.       Namespace Conventions ....................................   214.1.     Dataset Namespace ........................................   214.2.     Attribute Namespace ......................................   214.3.     Formal Syntax for Dataset and Attribute Namespace ........   225.       Dataset Management .......................................   235.1.     Dataset Inheritance ......................................   235.2.     Dataset Attributes .......................................   245.3.     Dataset Creation .........................................   255.4.     Dataset Class Capabilities ...............................   255.5.     Dataset Quotas ...........................................   266.       Command and Response Specifications ......................   266.1.     Initial Connection .......................................   266.1.1.   ACAP Untagged Response ...................................   266.2.     Any State ................................................   276.2.1.   NOOP Command .............................................   276.2.2.   LANG Command .............................................   286.2.3.   LANG Intermediate Response ...............................   286.2.4.   LOGOUT Command ...........................................   296.2.5.   OK Response ..............................................   296.2.6.   NO Response ..............................................   296.2.7.   BAD Response .............................................   306.2.8.   BYE Untagged Response ....................................   306.2.9.   ALERT Untagged Response ..................................   316.3.     Non-Authenticated State ..................................   316.3.1.   AUTHENTICATE Command .....................................   316.4.     Searching ................................................   336.4.1.   SEARCH Command ...........................................   336.4.2.   ENTRY Intermediate Response ..............................   376.4.3.   MODTIME Intermediate Response ............................   386.4.4.   REFER Intermediate Response ..............................   386.4.5.   Search Examples ..........................................   386.5.     Contexts .................................................   396.5.1.   FREECONTEXT Command ......................................   396.5.2.   UPDATECONTEXT Command ....................................   406.5.3.   ADDTO Untagged Response ..................................   406.5.4.   REMOVEFROM Untagged Response .............................   416.5.5.   CHANGE Untagged Response .................................   416.5.6.   MODTIME Untagged Response ................................   426.6.     Dataset modification .....................................   426.6.1.   STORE Command ............................................   426.6.2.   DELETEDSINCE Command .....................................   456.6.3.   DELETED Intermediate Response ............................   456.7.     Access Control List Commands .............................   456.7.1.   SETACL Command ...........................................   466.7.2.   DELETEACL Command ........................................   46Newman & Myers              Standards Track                   [Page iii]RFC 2244                          ACAP                     November 19976.7.3.   MYRIGHTS Command .........................................   476.7.4.   MYRIGHTS Intermediate Response ...........................   476.7.5.   LISTRIGHTS Command .......................................   476.7.6.   LISTRIGHTS Intermediate Response .........................   486.8.     Quotas ...................................................   486.8.1.   GETQUOTA Command .........................................   486.8.3.   QUOTA Untagged Response ..................................   496.9.     Extensions ...............................................   497.       Registration Procedures ..................................   497.1.     ACAP Capabilities ........................................   507.2.     ACAP Response Codes ......................................   507.3.     Dataset Classes ..........................................   517.4.     Vendor Subtree ...........................................   518.       Formal Syntax ............................................   529.       Multi-lingual Considerations .............................   6110.      Security Considerations ..................................   6211.      Acknowledgments ..........................................   6312.      Authors' Addresses .......................................   63Appendices ........................................................   64A.       References ...............................................   64B.       ACAP Keyword Index .......................................   66C.       Full Copyright StatementNewman & Myers              Standards Track                    [Page iv]RFC 2244                          ACAP                     November 1997ACAP Protocol Specification1.       Introduction1.1.     Conventions Used in this Document   In examples, "C:" and "S:" indicate lines sent by the client and   server respectively.  If such lines are wrapped without a new "C:" or   "S:" label, then the wrapping is for editorial clarity and is not   part of the command.   The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT",   and "MAY" in this document are to be interpreted as described in "Key   words for use in RFCs to Indicate Requirement Levels" [KEYWORDS].1.2.     ACAP Data Model   An ACAP server exports a hierarchical tree of entries.  Each level of   the tree is called a dataset, and each dataset is made up of a list   of entries.  Each entry has a unique name and may contain any number   of named attributes.  Each attribute within an entry may be single   valued or multi-valued and may have associated metadata to assist   access and interpretation of the value.   The rules with which a client interprets the data within a portion of   ACAP's tree of entries are called a dataset class.1.3.     ACAP Design Goals   ACAP's primary purpose is to allow users access to their   configuration data from multiple network-connected computers.  Users   can then sit down in front of any network-connected computer, run any   ACAP-enabled application and have access to their own configuration   data.  Because it is hoped that many applications will become ACAP-   enabled, client simplicity was preferred to server or protocol   simplicity whenever reasonable.   ACAP is designed to be easily manageable.  For this reason, it   includes "inheritance" which allows one dataset to inherit default   attributes from another dataset.  In addition, access control lists   are included to permit delegation of management and quotas are   included to control storage.  Finally, an ACAP server which is   conformant to this base specification should be able to support most   dataset classes defined in the future without requiring a server   reconfiguration or upgrade.Newman & Myers              Standards Track                     [Page 1]RFC 2244                          ACAP                     November 1997   ACAP is designed to operate well with a client that only has   intermittent access to an ACAP server.  For this reason, each entry   has a server maintained modification time so that the client may   detect changes.  In addition, the client may ask the server for a   list of entries which have been removed since it last accessed the   server.   ACAP presumes that a dataset may be potentially large and/or the   client's network connection may be slow, and thus offers server   sorting, selective fetching and change notification for entries   within a dataset.   As required for most Internet protocols, security, scalability and   internationalization were important design goals.   Given these design goals, an attempt was made to keep ACAP as simple   as possible.  It is a traditional Internet text based protocol which   massively simplifies protocol debugging.  It was designed based on   the successful IMAP [IMAP4] protocol framework, with a few   refinements.1.4.     Validation   By default, any value may be stored in any attribute for which the   user has appropriate permission and quota.  This rule is necessary to   allow the addition of new simple dataset classes without   reconfiguring or upgrading the server.   In some cases, such as when the value has special meaning to the   server, it is useful to have the server enforce validation by   returning the INVALID response code to a STORE command. These cases   MUST be explicitly identified in the dataset class specification   which SHOULD include specific fixed rules for validation.  Since a   given ACAP server may be unaware of any particular dataset class

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -